Lone Wolf Terrorism

Home > Other > Lone Wolf Terrorism > Page 35
Lone Wolf Terrorism Page 35

by Jeffrey D. Simon


  Brinks armored car robbery, 281–82n24

  Bristol, England, suicide bomb attempt, 24

  Britain, 24, 36, 55, 142, 186–87, 189–90, 191, 232, 240

  British case leading to the M'Naghten Rule, 289–90n58

  See also Choudhry, Roshonara; Copeland, David; Reilly, Nicky

  British Overseas Airlines Corporation, hijackings, 116

  Brokaw, Tom, 100

  Brussel, James, 220–21

  Buda, Mario, 15, 16, 18, 19, 94–95, 104–105, 241. See also photo inserts

  Bundy, McGeorge, 170

  Bureau of Investigation (forerunner of FBI), 195

  Bush, George W., 182, 252, 303Appendixn6

  Busic, Julienne and Zvonko, 116–17, 118

  Cambodia and Pol Pot, 286n1

  Canadian Security Intelligence Service, 232

  cargo screening, 187–88

  Carnegie Mellon University, 200

  Carter, Jimmy, 89, 239

  Case Closed (Posner), 164, 169

  Casey, William M., 196, 217

  Castro, Fidel, 168

  CCTV. See closed-circuit television

  Celexa (antidepressant drug), 98

  Central Intelligence Agency (CIA), 23, 81

  Kanzi killing two CIA employees, 261

  Charleston, South Carolina, massacre in, vii, ix

  Chechnya, 112

  rebel movement

  “black widows,” 124, 125, 135

  efforts to sabotage the 2014 Winter Olympic Games in Russia, 246

  use of rape to coerce women into combat, 283n36

  chemical weapons as a terrorist tactic, 8, 24, 40, 91, 92, 94, 111

  Alphabet Bomber's threats to use, 79, 81, 82, 106

  detection of, 193, 206, 209

  the Internet as a source of information, 106, 108

  potassium chloride, plan to use to poison water supplies, 93

  threat to use in Cyprus, 72–74, 85

  as WMD of choice for lone wolves, 108

  See also specific chemicals, i.e., potassium chloride, sarin gas, etc.

  Chernobyl, Soviet Union, nuclear reactor disaster, 73

  Chesterton, IN, plane bombing over, 69–70, 267n4

  Chicago, AQAP attempt to send bombs to, 186

  Chicago Tribune (newspaper), 117

  China, Boxer Rebellion in, 158, 289n45

  Choudhry, Roshonara, 139–43, 203, 234, 248, 285n69. See also photo inserts

  Christian Democrats party (in Netherlands), 64

  “Christian extremism,” 51. See also Breivik, Anders

  Christian Identity movement, 44, 45, 57, 63

  CIA. See Central Intelligence Agency

  Civil Aviation Administration, 69, 264

  Civil Service Commission, 157

  civil-service reforms after Garfield assassinated, 150, 157

  CJIS. See Criminal Justice Information Services Division (CJIS) of the FBI

  Clark, Judith, 281–82n24

  Clarke, James, 153, 160, 177

  Clinton, Bill, 49, 175

  closed-circuit television (CCTV), 189–94, 205, 213, 215–16

  “smart CCTV,” 193–94, 199

  Cold War, 121, 170, 237

  USS Cole (destroyer), 279–80n51

  Commander Nemo of Force Majerus. See Koupparis, Panos

  Committee on Public Safety in France, 286n1

  communicate, encouraging lone wolves to, 222–24

  Communism, 34, 170

  and Lee Harvey Oswald, 148, 166, 178

  lone wolves advocating end of, 81, 85

  community outreach to counterterrorism, 212

  Conkling, Roscoe, 153

  Connally, John, 167, 169

  Consolidated Edison “Con Ed,” 219, 220, 221, 223

  “conspiracy” theories

  and assassinations, 148, 168–69, 170

  and September 11, 2001, 147–48

  Copeland, David (aka “London Nailbomber”), 24, 31, 190–91, 213

  counter-ideology, 210

  counterterrorism, 27, 56, 106–107, 119, 181–227, 245, 257, 259

  impact of lone wolves on, 252–53

  as a propaganda war, 210–12

  Counterterrorism Division of the FBI, 208

  Counterterrorism Section of the Department of Justice, 101

  “Country Reports on Terrorism” (US State Department), 303Appendixn1

  Covenant, the Sword, and the Arm of the Lord (white-supremacist group), 93

  creative and innovative nature of lone wolves, 21–22, 85, 103–107, 112, 241–42, 255

  future innovations, 248–50

  Criminal Justice Information Services Division (CJIS) of the FBI, 196, 197. See also photo inserts

  criminal lone wolves, 45, 67–74, 83, 84, 85, 86, 263. See also Graham, John Gilbert; Koupparis, Panos

  Croatian extremists, 77, 116, 117

  Cruise, Tom, 200

  CSI (TV show), 214

  Cuba

  Cuban missile crisis, 170, 291n86

  Oswald wishing to move to, 166, 178

  cyanide, use of in Tylenol capsules, 86

  cyberterrorism as a terrorist tactic, 32–33, 40, 105, 302n11

  potential threats in future, 248–49

  Cyprus, threat to use dioxin in, 72–74, 84, 86

  Czolgosz, Leon, 158–63, 176, 177, 178, 290nn59, 64. See also photo inserts

  Dallas, TX, and assassination of Kennedy, 167

  Danzig, Richard, 111, 250

  Daschle, Tom, 100

  Davis, David, 190

  DDoS. See distributed denial of service attacks

  “dead-enders,” 303Appendixn6

  Death of a President, The (Manchester), 148

  Defenbaugh, Danny, 48

  Dekmejian, R. Hrair, 146, 176–77

  denial of service. See distributed denial of service attacks

  de Nugent, John, 58

  Denver plane bombing. See Graham, John Gilbert

  Department of Defense, 194, 196, 251, 303Appendixn6

  Department of Homeland Security, 23–24, 36, 195

  and aftermath of the killing of bin Laden, 54

  Automated Biometric Identification System (IDENT), 195

  on dangers of lone wolves and rightwing extremists, 36

  Future Attribute Screening Technology (FAST), 199–201

  National Operations Center, 205

  Department of Justice, 98, 102

  Counterterrorism Section, 101

  Department of Transportation, 76

  detection devices, 185–89, 200, 235, 257. See also closed-circuit television (CCTV)

  Detroit, MI, attempted plane bombing over. See Abdulmutallab, Umar Farouk

  Deutsche Bank, 121

  din rodef, 173

  distributed denial of service attacks (DDoS), 105

  DNA analysis, use of for identification, 196–97, 214

  Domestic Counterterrorism Center (headed by FBI), 49

  domestic terrorism, 36, 59, 61, 260, 261, 300–301n14

  “Do Not Rely on Others, Take the Task upon Yourself” (Gadahn), 231–32

  Dresdner Bank, 119

  Drummond, Edward, 289–90n58

  Druze parable, 134–35

  Earth Liberation Front (ELF), 35, 44

  EFPs (explosively formed penetrators), 28

  Einstein, Albert, 255

  Eisenhower, Dwight D., 69, 263

  El Al airlines

  attack at Los Angeles ticket counter, 10, 262

  attacks on planes, 115–16

  ELF. See Earth Liberation Front (ELF)

  Emerson, Steven, 235

  Emirates Airlines, 297–98n71

  emotion and impulse leading women to kill, 133–34

  environmental extremism, 35, 44, 59, 65, 231

  Environmental Protection Agency, 101

  Epstein, Charles, 78–79, 257

  ethnic-nationalism and lone wolf activities, 247

  European Union, 199–201, 245

  Europol (European
Law Enforcement Agency), 36, 245–46, 247

  Exeter, England, bombing attempt. See Reilly, Nicky

  explosively formed penetrators. See EFPs

  eyewitness accounts, use of to identify lone wolf attackers, 216, 238

  Facebook, 20, 29, 44, 201, 205, 207, 225

  face recognition, use of for identification, 195, 196, 199, 216. See also photo inserts

  Fadden, Richard, 232

  “Fair Play.” See Metesky, George

  “false positives” and biometrics, 201

  Farook, Syed Rizwan, viii

  “Fatima LaRose.” See LaRose, Colleen

  fatwas, 173

  FBI, 42, 195

  and aftermath of the killing of bin Laden, 54

  and Amil Kanzi, 304Appendixn11

  and anthrax letters investigation, 97, 100, 101–102

  Biometric Center of Excellence, 216

  and Colleen LaRose, 137, 138

  Counterterrorism Division, 208

  Criminal Justice Information Services Division, 196, 197. See also photo inserts

  defining terrorism, 260–62

  Domestic Counterterrorism Center headed by, 49

  efforts to detect explosives in luggage, 264

  and Eric Rudolph, 62

  Integrated Automated Fingerprint Identification System, 215

  and John Gilbert Graham, 68–69

  Joint Terrorism Task Force, 209

  most wanted terrorists, 44

  Next Generation Identification system, 196, 197. See also photo inserts

  “no-fly” list, 198, 297–98n71

  Operation Tripwire, 209

  sting operations, 9

  TattooID program, 216

  and Theodore Kaczynski, 75, 76, 77, 186

  Federal Reserve Board, 57–58

  Federation of American Scientists, 200

  Fienberg, Stephen, 200–201

  financial gain and the criminal lone wolf, 16–17, 45, 67–74, 85

  fingerprints, use of for identification, 194, 196, 197, 199, 215, 250. See also photo inserts

  First Gulf War. See Persian Gulf War (1990–1991)

  Fischer, Stephen G., Jr., 197, 216

  Food and Drug Administration, 98

  Force Majerus. See Koupparis, Panos

  Ford, Franklin L., 146–47, 149

  Ford, Gerald, attempted assassination of, 177

  Foreign Policy (journal), 7

  forensic sciences, use of after an attack, 214–16, 257

  Fort Detrick (Frederick, MD). See Ivins, Bruce

  Fort Hood, TX. See Hasan, Nidal Malik

  Fortuyn, Pim, assassination of, 64–66, 86, 192, 240, 242

  Four Rs as motivations for women terrorists, 127

  adding rape to list, 283n36

  Foxman, Abraham, 225

  France

  Action Directe, 27

  Committee on Public Safety, 286n1

  first use of term “terrorism,” 145, 286n1

  terrorist attacks in, 198

  Franz Ferdinand (archduke), assassination of, 148–49

  freedom fighter vs. terrorist, 37, 117

  Free Society (anarchist newspaper), 160, 290n64

  freezing assets of groups involved with terrorism, 182

  French Revolution and term “terrorism,” 145, 286n1

  Fromme, Lynette, 177

  Fuchs, Franz, 217–19, 222, 241

  Future Attribute Screening Technology (FAST), 199–201

  future of terrorism, 243–53

  Gadahn, Adam, 231–32

  Gadhafi, Moammar, 181–82, 252

  Galleani, Luigi, 16, 140

  Galleanists (anarchist group), 16, 104, 186

  Gandhi, Rajiv, assassination of, 123

  Garfield, James A., assassination of, 149–58, 160–61, 176, 178, 234, 287–88n15. See also photo inserts

  Garrett, Brad, 262

  Germany

  bombing of nightclub in West Berlin, 182

  Hitler's Germany, 286n1

  mail bombings in, 217–19

  Red Army Faction of West Germany, 27, 119–22

  Giffords, Gabrielle, 131

  Giuliano, Mark F., 207–208

  glanders, research on, 98

  Gmail, 205

  Goldman, Emma, 159, 290n64

  Goldstein, Baruch, 172

  Google, 33, 205

  government-sponsored terrorism, 25, 94, 181–82, 184, 252, 257

  Graham, Gloria. See photo inserts

  Graham, John Gilbert, 15–17, 18, 68–72, 74, 83, 84, 85, 86, 132–33, 263–64, 267n4. See also photo inserts

  Grand Central Station, bombing of, 220

  Grant, Ulysses S., 151, 152

  Guide to Chemical and Gas Warfare (book found in Kurbegovic's apartment), 106

  Guiteau, Charles, 149–58, 161, 287–88n15

  mental state of, 176, 177, 178, 234

  See also photo inserts

  Hadayet, Hesam Mohamed, 10, 262

  Halakhah [Jewish law], 173

  “Half-Breeds” of the Republican Party in 1880, 151–52

  Hamas, 124

  Hamour, Thawiya, 125

  Hasan, Nidal Malik, 8, 9, 54–56, 83, 84, 132, 133, 202, 230

  and Anwar al-Awlaki, 31, 56, 139, 202

  mental state of, 208, 234

  See also photo inserts

  Hatfill, Steven, 101, 102

  Haymarket Square bombing, 158

  Hearst, Patty, 122

  Hearst, William Randolph, 122

  Henry, Émile, 39, 264–65

  Herbeck, Dan, 270n10

  “hero status” of a lone wolf, 9, 26, 56, 59, 62, 115, 117, 211

  countering of, 225–26

  Herrhausen, Alfred, assassination of, 121

  hexamethylene triperoxide diamine. See HMTD

  Hezbollah, 123, 282n27

  hijackings as a terrorist tactic, 19, 37, 40, 77, 90, 92, 101, 106, 109, 113, 121, 132, 149, 171, 233, 251, 263

  emotional effects of, 118–19, 281n8

  hijacking/suicide attack. See September 11, 2001

  hostage exchange after hijackings, 280–81n7

  use of the Internet by hijackers, 32

  women involved in, 115–17, 118–19

  See also barricade-hostage incidents, hostage taking; kidnappings

  Hinckley, John, Jr., 177

  Hitler, Adolf, 286n1

  HMTD (hexamethylene triperoxide diamine), 24

  Holland. See Netherlands

  Holocaust denial, 58

  Holocaust Memorial Museum, attack at, 57–59, 84, 86, 203, 230

  homosexuality, extremist acts against, 62

  Hoover, J. Edgar, 195

  Horgan, John, 234

  hostage taking. See barricade-hostage incidents

  Hot Zone, The (Preston), 95

  How to Make Bombs: Book Two (on the Internet), 31

  human interactions, women's need for, 130–31

  Hunting Eric Rudolph (Schuster and Stone), 62

  Hussein, Saddam, 237

  IAFIS. See Integrated Automated Fingerprint Identification System

  IDENT. See Automated Biometric Identification System

  identifying terrorists. See biometrics; tattoos

  ideology, 27, 42, 122, 126, 177, 210

  of al Qaeda, 7, 9, 36

  counter-ideology, 210

  extremist ideologies, 7, 9, 24, 36, 44, 56, 57, 84

  shared ideology, 34, 36

  ways to spread, 247

  idiosyncratic lone wolves, 42, 45–46, 74–83, 84, 85, 86, 183.

  See also Kaczynski, Theodore; Kurbegovic, Muharem

  IEDs (improvised explosive devices), 28, 247–48

  immigration as an issue

  for Anders Breivik, 51, 52, 84

  for Franz Fuchs, 217

  immigration law banning anarchists (1903), 163

  for Muharem Kurbegovic, 81–82

  for Pim Fortuyn, 64–65, 66

  improvised explosive devices. See IEDs

&nbs
p; India, 190

  assassination of Rajiv Gandhi, 123

  chemical factory explosion in Bhopal, 73

  terrorist attack in Mumbai, 89, 191

  individuality and the lone wolf, 129, 255

  “innocent victims,” 7, 56n114, 114, 211, 226, 233, 264

  insanity. See mental state of lone wolves

  “insurgents,” definition of, 260

  Integrated Automated Fingerprint Identification System (IAFIS) of the FBI, 196, 215

  Integrated Threat Assessment Centre (Canada), 36

  Internal Revenue Service (IRS), attack on Austin, TX, building, 30, 202, 209, 225

  International Criminal Police Organization (Interpol), 119

  international terrorism, 20, 171, 300–301n14

  Soviet Union as main source of in the 1970s and 1980s, 232

  statistics on, 239

  waves of, 244

  Internet and terrorism, 8, 20, 21, 31, 54, 58, 223

  addictive nature of Internet, 33

  al Qaeda's use of, 210, 247

  “conspiracy” theories, 147–48

  cyberterrorism, 32–33, 40, 105, 249, 302n11

  potential threats in future, 248–49

  government efforts to monitor, 205

  impact of acting recklessly on the Internet, 138–39

  and lone wolves, ix, 20, 29–34, 52, 84, 236

  allowing to achieve “hero status,” 225

  encouraging women to be lone wolves, 142–43

  need for the Internet, 201–207, 236, 256

  as a tool to combat lone wolf terrorism, 206, 257

  as a way to communicate, 224, 235, 256

  radicalization of individuals via Internet, 203–204

  and the Technological Wave of terrorism, 245–48

  use of by terrorists

  to glamorize terrorist activities, 211

  to learn techniques, 105–106, 256

  providing information on targets, 32, 65, 137, 192, 235

  religious extremists, 231–32, 247, 248

  terrorists needing, 201–207, 236, 249, 256

  Interpol. See International Criminal Police Organization (Interpol)

  intifada. See Palestine

  IRA. See Irish Republican Army (IRA)

  Iran

  Iranian Revolution of 1979, 27

  and US hostage crisis in, 89, 239

  Iraq, 27, 134

  Iraqi war, 140–41, 260

  attacks on US troops, 260, 303Appendixn6

  end of US involvement in, 244–45

  female suicide terrorists in, 125, 135

  insurgents use of IEDs and EFPs, 28, 247–48

  Nidal Malik Hasan opposing, 55, 230

  use of rape to coerce women into combat, 283n36

  use of technology to identify terrorists, 193–94, 195–96, 198. See also photo inserts

  Persian Gulf War (1990–1991), 48, 237

  Irish Republican Army (IRA), 21–22, 35–36, 91

  iris recognition, use of for identification, 196, 197, 199

 

‹ Prev