Lone Wolf Terrorism

Home > Other > Lone Wolf Terrorism > Page 3
Lone Wolf Terrorism Page 3

by Jeffrey D. Simon


  It is understandable, however, if one is skeptical of anybody who writes that the terrorist threat is “growing” or “increasing” in any shape or form. Haven't we had enough warnings about terrorism over the years, often fueled by self-interested politicians, government officials, terrorism experts, and others? The Department of Homeland Security's ill-conceived “color-coded alert” system is still fresh in many minds, and its only effect was scaring people about terrorist threats that never materialized. Keeping the terrorist threat high in the public's mind and on the government's agenda is good for business, both for terrorists, who thrive on the psychological fear that terrorism evokes, and for those who talk, write, or consult about terrorism. But there is enough evidence to indicate that the lone wolf threat is real and is not likely to fade away anytime soon.

  A dizzying array of recent lone wolf attacks and plots illustrates the diversity of this threat, as noted in the introduction. The twin terror attacks in Norway by an anti-Islamic extremist were among the worst lone wolf incidents in history. In the United States, lone wolf attacks in recent years have ranged from terrorists motivated by single issues and antigovernment ideology to those inspired by Islamic extremism and white supremacy. Britain has also experienced a diverse array of lone wolf incidents. A lone wolf Islamic extremist was arrested in April 2008 before he could carry out a suicide attack on a shopping center in Bristol. Among the items police found in a search of the man's apartment were the unstable explosive hexamethylene triperoxide diamine (HMTD), an electrical circuit capable of detonating the explosive, and a suicide vest. Just over a month later, another lone wolf terrorist sympathetic to Islamic extremism was injured in a failed suicide attack in a restaurant in Exeter. He was preparing three nail bombs in the restaurant's bathroom when one accidently exploded in his hands. Lone wolf incidents in Britain also included a plot by a neo-Nazi to wage a violent campaign against “non-British” people using shrapnel bombs. When the man was arrested on the platform of a Suffolk train station in October 2008, police found two homemade explosives in his possession. A search of his home uncovered explosive ingredients and white supremacist and neo-Nazi literature. He also reportedly idolized Timothy McVeigh, the Oklahoma City bomber, and David Copeland, another lone wolf neo-Nazi, who became known as the “London Nailbomber.”

  Lone wolf terrorism is not limited to just a few incidents and places. Rather, it is increasingly occurring in countries throughout the world. How, then, can we explain the rise of lone wolf terrorism? Explanations for any type of terrorism are fraught with difficulties. The study of terrorism is a speculative endeavor at best, with cultural and personal biases potentially affecting explanations as to why individuals or groups may resort to violence against a wide range of targets. There have been explanations posited that range from poverty, alienation, and humiliation as the root causes of terrorism to explanations that focus on foreign state sponsorship of terrorist activity. The diverse nature of terrorism precludes any overall theory from being capable of explaining this phenomenon. It is difficult, for example, to argue that terrorism is due to specific conditions or situations when terrorism exists in virtually every country around the world. As Norwegian scholars Brynjar Lia and Katja H-W Skjolberg correctly point out, “We find terrorists among deprived and uneducated people, and among the affluent and well educated; we find terrorists among psychotic and ‘normal’ healthy people; and among people of both sexes and of all ages. Terrorism occurs in rich as well as in poor countries; in the modern industrialised world and in less developed areas; during a process of transition and development, prior to or after such a process; in former colonial states and in independent ones; and, in established democracies as well as in less democratic regimes.”5

  One way, however, to explain the rise in lone wolf terrorism is to view it as part of an emerging trend in terrorism that can best be described as the “Technological Wave.” This wave permeates all aspects of terrorism and is of immense value to the individual who wants to embark upon a campaign of terrorist violence.

  THE TECHNOLOGICAL WAVE OF TERRORISM

  The concept of “waves” of terrorist activity was first formulated by pioneering terrorism scholar David C. Rapoport to explain the history of modern terrorism.6 A wave can be thought of as a “cycle of activity in a given time period—a cycle characterized by expansion and contraction phases. A crucial feature is its international character; similar activities occur in several countries, driven by a common predominant energy that shapes the participating groups’ characteristics and mutual relationships.”7 According to Rapoport, there have been four basic waves of terrorism since the late 1880s. The first wave began with the anarchist movement of the late-nineteenth and early-twentieth centuries. The Anarchist Wave was followed by the Anti-Colonial Wave, which began in the 1920s; the New Left Wave, which began in the 1960s; and the Religious Wave, which began in 1979. While there can be overlap in the waves, as one ebbs and another emerges, the lifespan of a wave is a generation, or about forty years, “a suggestive time frame closest in duration to that of a human life cycle, in which dreams inspiring parents lose their attractiveness for children.”8

  If Rapoport is correct, then we can expect the current Religious Wave to end, or at least be overtaken by a new wave of terrorism, by 2020. While it might be hard to imagine religious-inspired terrorism by organized, decentralized, or ad hoc groups not being the main form of terrorism for several more decades, given the numerous attacks perpetrated by Islamic extremists around the world, the history of terrorism has been characterized by the changing of the guard at different periods. Each of Rapoport's four waves, for example, was launched into a global movement by some type of grand event or incident. Rapoport points out that the wounding of a Russian police commander who had mistreated political prisoners in 1878 by Vera Zasulich inspired the Russian anarchist movement, particularly her proclamation that she was a “terrorist, not a killer,” after she threw her weapon to the floor.9 She was acquitted at her trial and treated as a heroine after she was freed. German newspapers reported that the pro-Zasulich demonstrations meant a revolution was imminent in Russia.10

  The Treaty of Versailles, which ended World War I, precipitated the Anti-Colonial Wave, as the “victors applied the principle of national self-determination to break up the empires of the defeated states.”11 The third wave, the New Left Wave, found its inspiration in the Vietnam War and the effective role of the Viet Cong in its battles with American and South Vietnamese troops. The war led to the formation of radical groups in the Third World and the West, where “the war stimulated enormous ambivalence among the youth about the value of the existing system. Many Western groups—such as the American Weather Underground, the West German Red Army Faction (RAF), the Italian Red Brigades, the Japanese Red Army, and the French Action Directe—saw themselves as vanguards for the Third World masses. The Soviet world encouraged the outbreaks and offered moral support, training, and weapons.”12

  The fourth wave, the Religious Wave, was launched after the 1979 Iranian Revolution, which, along with the Soviet invasion of Afghanistan that same year, led to religious extremism in many parts of the world. The Iranian Revolution “was clear evidence to believers that religion now had more political appeal than did the prevailing third-wave ethos because Iranian Marxists could only muster meager support against the Shah.”13 The Ayatollah Khomeini regime in Iran “inspired and assisted Shiite terror movements outside of Iran, particularly in Iraq, Saudi Arabia, Kuwait, and Lebanon.”14

  While terrorist groups with religious agendas will undoubtedly be active for many years to come, a new wave, the Technological Wave, is emerging and making for a more level playing field among terrorists with different ideologies and agendas.15 No single type of terrorist ideology will dominate this new wave in the same way that anarchism, anticolonialism, “New Left” ideology, and religious fundamentalism dominated the preceding four waves. Instead, technology is there for all to take advantage of, offering any gr
oup or individual the opportunity to compete in the world of terrorism. We can see technology's influence in all aspects of terrorism, from the rapid growth in the use of technology by governments and militaries for surveillance, detection of weapons, counterterrorist operations, and other purposes to its use by a wide variety of terrorists.

  No one type of terrorist movement has a monopoly on the use of technology. For example, virtually every terrorist group has a website and is utilizing the Internet for recruitment, spreading its message, communications, and a variety of other purposes. In terms of weapons, insurgents in Iraq have used sophisticated improvised explosive devices (IEDs) in their attacks. The insurgents have proved to be technologically adaptable, as they switched from first using remote-controlled IEDs to then using long wires buried in the ground (also known as “command wires”) in order to detonate the bombs after US troops acquired the ability to successfully jam the remote-controlled devices. Another indication of the technological savvy of the Iraqi insurgents is their use of explosively formed penetrators (EFPs). The EFPs “fire a slug of high density metal at between 4,000 and 6,500 miles per hour with much more energy than roadside bombs made from artillery shells. The penetrator's high velocity punches a relatively small hole in a vehicle's armor, then sprays occupants inside with a stream of shrapnel.”16

  IED and EFP technology is likely to be exported around the world as many insurgents leave Iraq and Afghanistan and take their terrorist campaigns to other countries. The Technological Wave will not only witness extremists from Iraq and Afghanistan using sophisticated IEDs and EFPs in different countries but will also include other terrorists, including lone wolves, who have their own agendas and who learn how to make the latest IEDs and EFPs from veterans of the Iraqi and Afghan insurgencies. They may also acquire the knowledge even without the cooperation of the militants from Iraq and Afghanistan, since it is difficult in the world of terrorism for one group or cell to keep weapons technology a secret from other extremists. Furthermore, there won't be the billion-dollar effort in other countries that the United States used in Iraq and Afghanistan to neutralize and defeat the IED and EFP threat. That will make it easier for extremists to use these and other technologically sophisticated weapons in their attacks.

  THE INTERNET AND THE LONE WOLF

  The most important aspect of the Technological Wave that helps explain the growing prominence of the lone wolf terrorist is the Internet. In fact, the Internet can be considered the grand event that helped launch the wave. The Internet is the “energy” for this new wave, continually revolutionizing the way information is gathered, processed, and distributed; the way communications are conducted and social networks are formed; and the way single individuals, such as lone wolves, can become significant players by using the Internet to learn about weapons, targets, and techniques.

  By the first decade of the twenty-first century, the Internet was an integral part of everyday life for many people. One could find information on virtually any topic and feel connected to the world at large with a laptop computer or a smartphone. For the individual interested in perpetrating a terrorist attack, everything from how to build homemade bombs to maps and diagrams of potential targets were available on the Internet. So, too, were detailed accounts of terrorist incidents around the world, which lone wolves could study in order to determine what might work for them. In addition, the Internet provided a mechanism for lone wolves to become infatuated with extremist ideologies through the reading of websites, blogs, Facebook pages, and other tools available online. Lone wolves could also find other like-minded individuals on the Internet and obtain help from one or two other people in perpetrating an attack.

  We only have to look at some of the recent lone wolf incidents to see the significant role that the Internet is playing for the individual terrorist. Anders Breivik, the Norwegian lone wolf who perpetrated the dual terrorist attacks in Norway, posted a fifteen-hundred-page manifesto on the Internet shortly before he embarked on his campaign of terror. The manifesto called for an end to “the Islamic colonisation and Islamisation of Western Europe” and blamed Norwegian politicians for allowing that to happen. He hoped his attacks would bring attention to his manifesto, which it certainly did, as his document suddenly became known throughout the world. Breivik was also influenced by anti-Islamic bloggers and writers in the United States whom he found on the Internet and whose quotations he used in his manifesto.17

  Another lone wolf who posted a manifesto on the Internet before his terrorist attack was Joseph Stack. After setting fire to his home in Austin, Texas, on the morning of February 18, 2010, Stack flew his single-engine plane into a downtown Austin office building in which nearly two hundred people worked for the Internal Revenue Service (IRS). One person besides Stack was killed in the attack. Stack was motivated by a hatred for the IRS, which he blamed for ruining his life. He was particularly upset with a 1986 change in the tax law that prevented contract software engineers like him from taking certain deductions. The new law made it difficult for information-technology professionals to work as self-employed individuals. This forced many of them to become company employees.18 In his manifesto, Stack wrote about the new tax law, saying that “they could only have been more blunt if they would have came out and directly declared me a criminal and non-citizen slave.”19 Stack's manifesto revealed the frustration that was building up inside him. He wrote, “I would only hope that by striking a nerve that stimulates the inevitable double standard, knee-jerk government reaction that results in more stupid draconian restrictions people wake up and begin to see the pompous political thugs and their mindless minions for what they are. Sadly, though I spent my entire life trying to believe it wasn't so, but violence not only is the answer, it is the only answer.”20

  Richard Poplawski, a white supremacist who killed three police officers in Pittsburgh, Pennsylvania, in April 2009, used the Internet to frequent a neo-Nazi chat room, “Stormfront,” where he shared his racist, anti-Semitic, and antigovernment views with other like-minded individuals. Finding kindred souls on the Internet seemed to embolden Poplawski. His postings from November 2008 until March 2009 revealed an increasingly confrontational nature. He urged other white supremacists not to “retreat peaceably into the hills,” but rather to strive for “ultimate victory for our people [by] taking back our nation.” He also wrote that he would likely be “ramping up the activism” in the near future.21 Poplawski surfed the Internet to order the AK-47 assault-style rifle that he used in his attack. The Internet seller delivered the rifle to a store, where Poplawski purchased the weapon.22

  Another example of a lone wolf who used the Internet was Colleen LaRose (who is discussed in further detail in chapter 4), also known as “Jihad Jane,” one of the few female lone wolves. She was attracted to the global reach of the Internet and hoped it would aid her in forming a terrorist network in 2008 and 2009 for high-profile attacks in Europe and South Asia. Meanwhile, a US Army major, Nidal Malik Hasan (who is discussed in further detail in chapter 2) opened fire at a soldier-processing center in Fort Hood, Texas, in November 2009, killing thirteen people and wounding thirty-two others. Hasan used the Internet to communicate with an American-born radical Islamic cleric who at the time was living in Yemen, Anwar al-Awlaki.

  The Internet has been indispensable for lone wolves interested in learning about potential weapons. David Copeland, the British neo-Nazi mentioned earlier, who set off three bombs packed with nails in April 1999, discovered how to make the nail bombs after searching the Internet for information. Among the Internet sources he used were The Terrorist's Handbook and How to Make Bombs: Book Two. He acquired the bomb-making materials from shops and hardware stores but was not able to effectively assemble the necessary ingredients that were detailed in the web-based guides. He therefore used less-sophisticated bombs comprised of fireworks material and nails that were still powerful enough to kill three people and injure 139 others.23

  Another British lone wolf terrorist, Nicky Reilly, w
ho had converted to Islam, downloaded videos from YouTube in order to learn how to make nail bombs. His attempt in May 2008 failed, as noted earlier, when one of the three nail bombs he was preparing in the restroom of a restaurant in Exeter exploded in his hands. Reilly was in contact over the Internet with two men believed to be living in Pakistan who encouraged Reilly to perpetrate a suicide terrorist attack. The men, who were never located, discussed with Reilly potential targets, including an attack on police, civil servants, or the general public. They ultimately persuaded him to commit an attack on the public.24

  The Internet also provides lone wolves with an easy means for conducting surveillance of potential targets, including detailed maps of airports and buildings, flight and train schedules, and even computer images of the inside of a specific plane, indicating how many passengers will be on a flight and the exact location of available seats. This could be valuable information for a lone wolf hijacker, who would not want to seize a plane with too many passengers on board, since that could make controlling the passengers difficult. Knowing the seating chart would also be an advantage because the hijacker would know exactly where everyone is located and could choose a seat that works to his or her advantage. For example, there have been plots by terrorists to use liquid bombs on a plane that require the terrorists to assemble the bomb while onboard due to the unstable nature of the explosives (which could explode prematurely). A lone wolf could, therefore, use the Internet to choose a seat in the rear of the plane by the bathroom in order to not be noticed missing for an extended period of time as he or she assembles the bomb.

  The Internet not only offers lone wolves a convenient way to conduct surveillance of a target, but it also can be the target itself. The lone wolf cyberterrorist threat includes using the Internet and other communication and information systems that are linked by computers to cause disruptions and chaos in government, businesses, and everyday life. The threat of cyber attacks has received increased attention in recent years. Most of this attention, however, has focused on foreign governments and terrorist groups launching cyber attacks, not on lone wolves. Yet lone wolves have demonstrated throughout history that they should not be ignored. A computer-savvy lone wolf could be as dangerous as the most sophisticated terrorist group or cell in using the Internet to perpetrate a major cyberterrorist attack. Cyberterrorism may also be a natural fit for lone wolves who prefer to stay at home and perpetrate their attacks over the Internet, whether that be sending computer viruses or hacking into government databases and deleting or altering files. The lure of never having to venture out into the “real world” but instead being able to launch an attack from the comfort and privacy of their own home is something that isolated and socially maladjusted lone wolves may find appealing.

 

‹ Prev