Read Lone Wolf Terrorism Online

Authors: Jeffrey D. Simon

Lone Wolf Terrorism (3 page)

BOOK: Lone Wolf Terrorism
3.32Mb size Format: txt, pdf, ePub
ads

The third theme of this book is the creative and innovative nature of the lone wolf terrorist. Because these individuals work alone or with just one or two other people, lone wolves are not burdened by any group decision-making processes or intergroup dynamics that can sometimes stifle creativity in formulating plans and operations. Lone wolves are therefore free to think up any type of scenario they want and then try to act upon it, because they are accountable only to themselves. Related to this is the fact that, because they are not part of a group, lone wolves will not be concerned, as would be some terrorist groups, about potential government and law-enforcement crackdown following an incident that could lead to the virtual elimination of the group through arrests and other measures. And if a lone wolf is suffering from a mental illness, then he or she will not think rationally about the risks and consequences of a particular terrorist tactic. Furthermore, because they do not rely upon any segment
of the population for financial, logistical, or political support, lone wolves, unlike many terrorist groups, do not have to worry about negative reactions by the public to a particular attack.

The world of the lone wolf is indeed a fascinating one. This book is intended to take the reader on a journey into that world. The lone wolf terrorist threat clearly demonstrates why combating terrorism is an endless struggle. We cannot expect to “defeat” terrorism, when terrorism can be viewed as just one person with one bomb and one cause. Perhaps the best description of the difficult task we face in dealing with terrorism was made by the Irish Republican Army (IRA). Following a failed attempt to assassinate British prime minister Margaret Thatcher in 1984, the IRA issued the following chilling statement: “Today, we were unlucky! But remember, we only have to be lucky once. You will have to be lucky always!”
8
Unfortunately, we can't always expect to be lucky in the battle against terrorism. We are living in an age in which all types of terrorists, including lone wolves, can gain access to weapons, including weapons of mass destruction, and commit horrendous terrorist attacks. Yet while it is unrealistic to expect that we can ever totally defeat terrorism, it is not unrealistic to believe that we can be better prepared to deal with all types of terrorist contingencies, including those centered on lone wolves. It is crucial, therefore, that we do not ignore the lone wolf threat in the ongoing battle against terrorism and that we be as committed to understanding and combating it as we are with respect to all the other forms of global terrorism.

“The biggest concern we have right now…is the lone wolf terrorist,” President Barack Obama said in 2011.
1
Central Intelligence Agency (CIA) director Leon Panetta told Congress a year earlier that “it's the lone-wolf strategy that I think we have to pay attention to as the main threat to this country.”
2
India's home secretary, G. K. Pillai, echoed those sentiments, warning that “terrorists can be anywhere. The real challenge is the lone wolf, someone who is not known.”
3
Australian foreign minister Stephen Smith joined the list of concerned public officials when he said in a radio interview that “we are now seeing emerging the potential so-called lone wolf escapade where we don't have sophisticated planning but an individual is seduced by the international jihad and as a lone wolf does extreme things.”
4
Whether it is homegrown terrorists influenced by jihadist websites and chat rooms or individuals bent on terrorist activity for a wide range of causes or issues, the threat of lone wolf terrorism is growing around the world.

It is understandable, however, if one is skeptical of anybody who writes that the terrorist threat is “growing” or “increasing” in any shape or form. Haven't we had enough warnings about terrorism over the years, often fueled by self-interested politicians, government officials, terrorism experts, and others? The Department of Homeland Security's ill-conceived “color-coded alert” system is still fresh in many minds, and its only effect was scaring people about terrorist threats that never materialized. Keeping the terrorist threat high in the public's mind and on the government's agenda is good
for business, both for terrorists, who thrive on the psychological fear that terrorism evokes, and for those who talk, write, or consult about terrorism. But there is enough evidence to indicate that the lone wolf threat is real and is not likely to fade away anytime soon.

A dizzying array of recent lone wolf attacks and plots illustrates the diversity of this threat, as noted in the introduction. The twin terror attacks in Norway by an anti-Islamic extremist were among the worst lone wolf incidents in history. In the United States, lone wolf attacks in recent years have ranged from terrorists motivated by single issues and antigovernment ideology to those inspired by Islamic extremism and white supremacy. Britain has also experienced a diverse array of lone wolf incidents. A lone wolf Islamic extremist was arrested in April 2008 before he could carry out a suicide attack on a shopping center in Bristol. Among the items police found in a search of the man's apartment were the unstable explosive hexamethylene triperoxide diamine (HMTD), an electrical circuit capable of detonating the explosive, and a suicide vest. Just over a month later, another lone wolf terrorist sympathetic to Islamic extremism was injured in a failed suicide attack in a restaurant in Exeter. He was preparing three nail bombs in the restaurant's bathroom when one accidently exploded in his hands. Lone wolf incidents in Britain also included a plot by a neo-Nazi to wage a violent campaign against “non-British” people using shrapnel bombs. When the man was arrested on the platform of a Suffolk train station in October 2008, police found two homemade explosives in his possession. A search of his home uncovered explosive ingredients and white supremacist and neo-Nazi literature. He also reportedly idolized Timothy McVeigh, the Oklahoma City bomber, and David Copeland, another lone wolf neo-Nazi, who became known as the “London Nailbomber.”

Lone wolf terrorism is not limited to just a few incidents and places. Rather, it is increasingly occurring in countries throughout the world. How, then, can we explain the rise of lone wolf terrorism? Explanations for any type of terrorism are fraught with difficulties. The study of terrorism is a speculative endeavor at best, with cultural
and personal biases potentially affecting explanations as to why individuals or groups may resort to violence against a wide range of targets. There have been explanations posited that range from poverty, alienation, and humiliation as the root causes of terrorism to explanations that focus on foreign state sponsorship of terrorist activity. The diverse nature of terrorism precludes any overall theory from being capable of explaining this phenomenon. It is difficult, for example, to argue that terrorism is due to specific conditions or situations when terrorism exists in virtually every country around the world. As Norwegian scholars Brynjar Lia and Katja H-W Skjolberg correctly point out, “We find terrorists among deprived and uneducated people, and among the affluent and well educated; we find terrorists among psychotic and ‘normal' healthy people; and among people of both sexes and of all ages. Terrorism occurs in rich as well as in poor countries; in the modern industrialised world and in less developed areas; during a process of transition and development, prior to or after such a process; in former colonial states and in independent ones; and, in established democracies as well as in less democratic regimes.”
5

One way, however, to explain the rise in lone wolf terrorism is to view it as part of an emerging trend in terrorism that can best be described as the “Technological Wave.” This wave permeates all aspects of terrorism and is of immense value to the individual who wants to embark upon a campaign of terrorist violence.

THE TECHNOLOGICAL WAVE OF TERRORISM

The concept of “waves” of terrorist activity was first formulated by pioneering terrorism scholar David C. Rapoport to explain the history of modern terrorism.
6
A wave can be thought of as a “cycle of activity in a given time period—a cycle characterized by expansion and contraction phases. A crucial feature is its international character; similar activities occur in several countries, driven by a
common predominant energy that shapes the participating groups' characteristics and mutual relationships.”
7
According to Rapoport, there have been four basic waves of terrorism since the late 1880s. The first wave began with the anarchist movement of the late-nineteenth and early-twentieth centuries. The Anarchist Wave was followed by the Anti-Colonial Wave, which began in the 1920s; the New Left Wave, which began in the 1960s; and the Religious Wave, which began in 1979. While there can be overlap in the waves, as one ebbs and another emerges, the lifespan of a wave is a generation, or about forty years, “a suggestive time frame closest in duration to that of a human life cycle, in which dreams inspiring parents lose their attractiveness for children.”
8

If Rapoport is correct, then we can expect the current Religious Wave to end, or at least be overtaken by a new wave of terrorism, by 2020. While it might be hard to imagine religious-inspired terrorism by organized, decentralized, or ad hoc groups not being the main form of terrorism for several more decades, given the numerous attacks perpetrated by Islamic extremists around the world, the history of terrorism has been characterized by the changing of the guard at different periods. Each of Rapoport's four waves, for example, was launched into a global movement by some type of grand event or incident. Rapoport points out that the wounding of a Russian police commander who had mistreated political prisoners in 1878 by Vera Zasulich inspired the Russian anarchist movement, particularly her proclamation that she was a “terrorist, not a killer,” after she threw her weapon to the floor.
9
She was acquitted at her trial and treated as a heroine after she was freed. German newspapers reported that the pro-Zasulich demonstrations meant a revolution was imminent in Russia.
10

The Treaty of Versailles, which ended World War I, precipitated the Anti-Colonial Wave, as the “victors applied the principle of national self-determination to break up the empires of the defeated states.”
11
The third wave, the New Left Wave, found its inspiration in the Vietnam War and the effective role of the Viet Cong in its
battles with American and South Vietnamese troops. The war led to the formation of radical groups in the Third World and the West, where “the war stimulated enormous ambivalence among the youth about the value of the existing system. Many Western groups—such as the American Weather Underground, the West German Red Army Faction (RAF), the Italian Red Brigades, the Japanese Red Army, and the French Action Directe—saw themselves as vanguards for the Third World masses. The Soviet world encouraged the outbreaks and offered moral support, training, and weapons.”
12

The fourth wave, the Religious Wave, was launched after the 1979 Iranian Revolution, which, along with the Soviet invasion of Afghanistan that same year, led to religious extremism in many parts of the world. The Iranian Revolution “was clear evidence to believers that religion now had more political appeal than did the prevailing third-wave ethos because Iranian Marxists could only muster meager support against the Shah.”
13
The Ayatollah Khomeini regime in Iran “inspired and assisted Shiite terror movements outside of Iran, particularly in Iraq, Saudi Arabia, Kuwait, and Lebanon.”
14

While terrorist groups with religious agendas will undoubtedly be active for many years to come, a new wave, the Technological Wave, is emerging and making for a more level playing field among terrorists with different ideologies and agendas.
15
No single type of terrorist ideology will dominate this new wave in the same way that anarchism, anticolonialism, “New Left” ideology, and religious fundamentalism dominated the preceding four waves. Instead, technology is there for all to take advantage of, offering any group or individual the opportunity to compete in the world of terrorism. We can see technology's influence in all aspects of terrorism, from the rapid growth in the use of technology by governments and militaries for surveillance, detection of weapons, counterterrorist operations, and other purposes to its use by a wide variety of terrorists.

No one type of terrorist movement has a monopoly on the use of technology. For example, virtually every terrorist group has a website and is utilizing the Internet for recruitment, spreading its
message, communications, and a variety of other purposes. In terms of weapons, insurgents in Iraq have used sophisticated improvised explosive devices (IEDs) in their attacks. The insurgents have proved to be technologically adaptable, as they switched from first using remote-controlled IEDs to then using long wires buried in the ground (also known as “command wires”) in order to detonate the bombs after US troops acquired the ability to successfully jam the remote-controlled devices. Another indication of the technological savvy of the Iraqi insurgents is their use of explosively formed penetrators (EFPs). The EFPs “fire a slug of high density metal at between 4,000 and 6,500 miles per hour with much more energy than roadside bombs made from artillery shells. The penetrator's high velocity punches a relatively small hole in a vehicle's armor, then sprays occupants inside with a stream of shrapnel.”
16

IED and EFP technology is likely to be exported around the world as many insurgents leave Iraq and Afghanistan and take their terrorist campaigns to other countries. The Technological Wave will not only witness extremists from Iraq and Afghanistan using sophisticated IEDs and EFPs in different countries but will also include other terrorists, including lone wolves, who have their own agendas and who learn how to make the latest IEDs and EFPs from veterans of the Iraqi and Afghan insurgencies. They may also acquire the knowledge even without the cooperation of the militants from Iraq and Afghanistan, since it is difficult in the world of terrorism for one group or cell to keep weapons technology a secret from other extremists. Furthermore, there won't be the billion-dollar effort in other countries that the United States used in Iraq and Afghanistan to neutralize and defeat the IED and EFP threat. That will make it easier for extremists to use these and other technologically sophisticated weapons in their attacks.

THE INTERNET AND THE LONE WOLF

The most important aspect of the Technological Wave that helps explain the growing prominence of the lone wolf terrorist is the Internet. In fact, the Internet can be considered the grand event that helped launch the wave. The Internet is the “energy” for this new wave, continually revolutionizing the way information is gathered, processed, and distributed; the way communications are conducted and social networks are formed; and the way single individuals, such as lone wolves, can become significant players by using the Internet to learn about weapons, targets, and techniques.

By the first decade of the twenty-first century, the Internet was an integral part of everyday life for many people. One could find information on virtually any topic and feel connected to the world at large with a laptop computer or a smartphone. For the individual interested in perpetrating a terrorist attack, everything from how to build homemade bombs to maps and diagrams of potential targets were available on the Internet. So, too, were detailed accounts of terrorist incidents around the world, which lone wolves could study in order to determine what might work for them. In addition, the Internet provided a mechanism for lone wolves to become infatuated with extremist ideologies through the reading of websites, blogs, Facebook pages, and other tools available online. Lone wolves could also find other like-minded individuals on the Internet and obtain help from one or two other people in perpetrating an attack.

BOOK: Lone Wolf Terrorism
3.32Mb size Format: txt, pdf, ePub
ads

Other books

Blood Money by Laura M Rizio
The Cassandra Sanction by Scott Mariani
Shadow Baby by McGhee, Alison
(5/10) Sea Change by Parker, Robert B.
The Bedroom Barter by Sara Craven
These Foolish Things by Thatcher, Susan
White Shark by Benchley, Peter
Dentelle by Heather Bowhay
I’ll Meet You There by Heather Demetrios