Lone Wolf Terrorism
Page 35
Brinks armored car robbery, 281–82n24
Bristol, England, suicide bomb attempt, 24
Britain, 24, 36, 55, 142, 186–87, 189–90, 191, 232, 240
British case leading to the M'Naghten Rule, 289–90n58
See also Choudhry, Roshonara; Copeland, David; Reilly, Nicky
British Overseas Airlines Corporation, hijackings, 116
Brokaw, Tom, 100
Brussel, James, 220–21
Buda, Mario, 15, 16, 18, 19, 94–95, 104–105, 241. See also photo inserts
Bundy, McGeorge, 170
Bureau of Investigation (forerunner of FBI), 195
Bush, George W., 182, 252, 303Appendixn6
Busic, Julienne and Zvonko, 116–17, 118
Cambodia and Pol Pot, 286n1
Canadian Security Intelligence Service, 232
cargo screening, 187–88
Carnegie Mellon University, 200
Carter, Jimmy, 89, 239
Case Closed (Posner), 164, 169
Casey, William M., 196, 217
Castro, Fidel, 168
CCTV. See closed-circuit television
Celexa (antidepressant drug), 98
Central Intelligence Agency (CIA), 23, 81
Kanzi killing two CIA employees, 261
Charleston, South Carolina, massacre in, vii, ix
Chechnya, 112
rebel movement
“black widows,” 124, 125, 135
efforts to sabotage the 2014 Winter Olympic Games in Russia, 246
use of rape to coerce women into combat, 283n36
chemical weapons as a terrorist tactic, 8, 24, 40, 91, 92, 94, 111
Alphabet Bomber's threats to use, 79, 81, 82, 106
detection of, 193, 206, 209
the Internet as a source of information, 106, 108
potassium chloride, plan to use to poison water supplies, 93
threat to use in Cyprus, 72–74, 85
as WMD of choice for lone wolves, 108
See also specific chemicals, i.e., potassium chloride, sarin gas, etc.
Chernobyl, Soviet Union, nuclear reactor disaster, 73
Chesterton, IN, plane bombing over, 69–70, 267n4
Chicago, AQAP attempt to send bombs to, 186
Chicago Tribune (newspaper), 117
China, Boxer Rebellion in, 158, 289n45
Choudhry, Roshonara, 139–43, 203, 234, 248, 285n69. See also photo inserts
Christian Democrats party (in Netherlands), 64
“Christian extremism,” 51. See also Breivik, Anders
Christian Identity movement, 44, 45, 57, 63
CIA. See Central Intelligence Agency
Civil Aviation Administration, 69, 264
Civil Service Commission, 157
civil-service reforms after Garfield assassinated, 150, 157
CJIS. See Criminal Justice Information Services Division (CJIS) of the FBI
Clark, Judith, 281–82n24
Clarke, James, 153, 160, 177
Clinton, Bill, 49, 175
closed-circuit television (CCTV), 189–94, 205, 213, 215–16
“smart CCTV,” 193–94, 199
Cold War, 121, 170, 237
USS Cole (destroyer), 279–80n51
Commander Nemo of Force Majerus. See Koupparis, Panos
Committee on Public Safety in France, 286n1
communicate, encouraging lone wolves to, 222–24
Communism, 34, 170
and Lee Harvey Oswald, 148, 166, 178
lone wolves advocating end of, 81, 85
community outreach to counterterrorism, 212
Conkling, Roscoe, 153
Connally, John, 167, 169
Consolidated Edison “Con Ed,” 219, 220, 221, 223
“conspiracy” theories
and assassinations, 148, 168–69, 170
and September 11, 2001, 147–48
Copeland, David (aka “London Nailbomber”), 24, 31, 190–91, 213
counter-ideology, 210
counterterrorism, 27, 56, 106–107, 119, 181–227, 245, 257, 259
impact of lone wolves on, 252–53
as a propaganda war, 210–12
Counterterrorism Division of the FBI, 208
Counterterrorism Section of the Department of Justice, 101
“Country Reports on Terrorism” (US State Department), 303Appendixn1
Covenant, the Sword, and the Arm of the Lord (white-supremacist group), 93
creative and innovative nature of lone wolves, 21–22, 85, 103–107, 112, 241–42, 255
future innovations, 248–50
Criminal Justice Information Services Division (CJIS) of the FBI, 196, 197. See also photo inserts
criminal lone wolves, 45, 67–74, 83, 84, 85, 86, 263. See also Graham, John Gilbert; Koupparis, Panos
Croatian extremists, 77, 116, 117
Cruise, Tom, 200
CSI (TV show), 214
Cuba
Cuban missile crisis, 170, 291n86
Oswald wishing to move to, 166, 178
cyanide, use of in Tylenol capsules, 86
cyberterrorism as a terrorist tactic, 32–33, 40, 105, 302n11
potential threats in future, 248–49
Cyprus, threat to use dioxin in, 72–74, 84, 86
Czolgosz, Leon, 158–63, 176, 177, 178, 290nn59, 64. See also photo inserts
Dallas, TX, and assassination of Kennedy, 167
Danzig, Richard, 111, 250
Daschle, Tom, 100
Davis, David, 190
DDoS. See distributed denial of service attacks
“dead-enders,” 303Appendixn6
Death of a President, The (Manchester), 148
Defenbaugh, Danny, 48
Dekmejian, R. Hrair, 146, 176–77
denial of service. See distributed denial of service attacks
de Nugent, John, 58
Denver plane bombing. See Graham, John Gilbert
Department of Defense, 194, 196, 251, 303Appendixn6
Department of Homeland Security, 23–24, 36, 195
and aftermath of the killing of bin Laden, 54
Automated Biometric Identification System (IDENT), 195
on dangers of lone wolves and rightwing extremists, 36
Future Attribute Screening Technology (FAST), 199–201
National Operations Center, 205
Department of Justice, 98, 102
Counterterrorism Section, 101
Department of Transportation, 76
detection devices, 185–89, 200, 235, 257. See also closed-circuit television (CCTV)
Detroit, MI, attempted plane bombing over. See Abdulmutallab, Umar Farouk
Deutsche Bank, 121
din rodef, 173
distributed denial of service attacks (DDoS), 105
DNA analysis, use of for identification, 196–97, 214
Domestic Counterterrorism Center (headed by FBI), 49
domestic terrorism, 36, 59, 61, 260, 261, 300–301n14
“Do Not Rely on Others, Take the Task upon Yourself” (Gadahn), 231–32
Dresdner Bank, 119
Drummond, Edward, 289–90n58
Druze parable, 134–35
Earth Liberation Front (ELF), 35, 44
EFPs (explosively formed penetrators), 28
Einstein, Albert, 255
Eisenhower, Dwight D., 69, 263
El Al airlines
attack at Los Angeles ticket counter, 10, 262
attacks on planes, 115–16
ELF. See Earth Liberation Front (ELF)
Emerson, Steven, 235
Emirates Airlines, 297–98n71
emotion and impulse leading women to kill, 133–34
environmental extremism, 35, 44, 59, 65, 231
Environmental Protection Agency, 101
Epstein, Charles, 78–79, 257
ethnic-nationalism and lone wolf activities, 247
European Union, 199–201, 245
Europol (European
Law Enforcement Agency), 36, 245–46, 247
Exeter, England, bombing attempt. See Reilly, Nicky
explosively formed penetrators. See EFPs
eyewitness accounts, use of to identify lone wolf attackers, 216, 238
Facebook, 20, 29, 44, 201, 205, 207, 225
face recognition, use of for identification, 195, 196, 199, 216. See also photo inserts
Fadden, Richard, 232
“Fair Play.” See Metesky, George
“false positives” and biometrics, 201
Farook, Syed Rizwan, viii
“Fatima LaRose.” See LaRose, Colleen
fatwas, 173
FBI, 42, 195
and aftermath of the killing of bin Laden, 54
and Amil Kanzi, 304Appendixn11
and anthrax letters investigation, 97, 100, 101–102
Biometric Center of Excellence, 216
and Colleen LaRose, 137, 138
Counterterrorism Division, 208
Criminal Justice Information Services Division, 196, 197. See also photo inserts
defining terrorism, 260–62
Domestic Counterterrorism Center headed by, 49
efforts to detect explosives in luggage, 264
and Eric Rudolph, 62
Integrated Automated Fingerprint Identification System, 215
and John Gilbert Graham, 68–69
Joint Terrorism Task Force, 209
most wanted terrorists, 44
Next Generation Identification system, 196, 197. See also photo inserts
“no-fly” list, 198, 297–98n71
Operation Tripwire, 209
sting operations, 9
TattooID program, 216
and Theodore Kaczynski, 75, 76, 77, 186
Federal Reserve Board, 57–58
Federation of American Scientists, 200
Fienberg, Stephen, 200–201
financial gain and the criminal lone wolf, 16–17, 45, 67–74, 85
fingerprints, use of for identification, 194, 196, 197, 199, 215, 250. See also photo inserts
First Gulf War. See Persian Gulf War (1990–1991)
Fischer, Stephen G., Jr., 197, 216
Food and Drug Administration, 98
Force Majerus. See Koupparis, Panos
Ford, Franklin L., 146–47, 149
Ford, Gerald, attempted assassination of, 177
Foreign Policy (journal), 7
forensic sciences, use of after an attack, 214–16, 257
Fort Detrick (Frederick, MD). See Ivins, Bruce
Fort Hood, TX. See Hasan, Nidal Malik
Fortuyn, Pim, assassination of, 64–66, 86, 192, 240, 242
Four Rs as motivations for women terrorists, 127
adding rape to list, 283n36
Foxman, Abraham, 225
France
Action Directe, 27
Committee on Public Safety, 286n1
first use of term “terrorism,” 145, 286n1
terrorist attacks in, 198
Franz Ferdinand (archduke), assassination of, 148–49
freedom fighter vs. terrorist, 37, 117
Free Society (anarchist newspaper), 160, 290n64
freezing assets of groups involved with terrorism, 182
French Revolution and term “terrorism,” 145, 286n1
Fromme, Lynette, 177
Fuchs, Franz, 217–19, 222, 241
Future Attribute Screening Technology (FAST), 199–201
future of terrorism, 243–53
Gadahn, Adam, 231–32
Gadhafi, Moammar, 181–82, 252
Galleani, Luigi, 16, 140
Galleanists (anarchist group), 16, 104, 186
Gandhi, Rajiv, assassination of, 123
Garfield, James A., assassination of, 149–58, 160–61, 176, 178, 234, 287–88n15. See also photo inserts
Garrett, Brad, 262
Germany
bombing of nightclub in West Berlin, 182
Hitler's Germany, 286n1
mail bombings in, 217–19
Red Army Faction of West Germany, 27, 119–22
Giffords, Gabrielle, 131
Giuliano, Mark F., 207–208
glanders, research on, 98
Gmail, 205
Goldman, Emma, 159, 290n64
Goldstein, Baruch, 172
Google, 33, 205
government-sponsored terrorism, 25, 94, 181–82, 184, 252, 257
Graham, Gloria. See photo inserts
Graham, John Gilbert, 15–17, 18, 68–72, 74, 83, 84, 85, 86, 132–33, 263–64, 267n4. See also photo inserts
Grand Central Station, bombing of, 220
Grant, Ulysses S., 151, 152
Guide to Chemical and Gas Warfare (book found in Kurbegovic's apartment), 106
Guiteau, Charles, 149–58, 161, 287–88n15
mental state of, 176, 177, 178, 234
See also photo inserts
Hadayet, Hesam Mohamed, 10, 262
Halakhah [Jewish law], 173
“Half-Breeds” of the Republican Party in 1880, 151–52
Hamas, 124
Hamour, Thawiya, 125
Hasan, Nidal Malik, 8, 9, 54–56, 83, 84, 132, 133, 202, 230
and Anwar al-Awlaki, 31, 56, 139, 202
mental state of, 208, 234
See also photo inserts
Hatfill, Steven, 101, 102
Haymarket Square bombing, 158
Hearst, Patty, 122
Hearst, William Randolph, 122
Henry, Émile, 39, 264–65
Herbeck, Dan, 270n10
“hero status” of a lone wolf, 9, 26, 56, 59, 62, 115, 117, 211
countering of, 225–26
Herrhausen, Alfred, assassination of, 121
hexamethylene triperoxide diamine. See HMTD
Hezbollah, 123, 282n27
hijackings as a terrorist tactic, 19, 37, 40, 77, 90, 92, 101, 106, 109, 113, 121, 132, 149, 171, 233, 251, 263
emotional effects of, 118–19, 281n8
hijacking/suicide attack. See September 11, 2001
hostage exchange after hijackings, 280–81n7
use of the Internet by hijackers, 32
women involved in, 115–17, 118–19
See also barricade-hostage incidents, hostage taking; kidnappings
Hinckley, John, Jr., 177
Hitler, Adolf, 286n1
HMTD (hexamethylene triperoxide diamine), 24
Holland. See Netherlands
Holocaust denial, 58
Holocaust Memorial Museum, attack at, 57–59, 84, 86, 203, 230
homosexuality, extremist acts against, 62
Hoover, J. Edgar, 195
Horgan, John, 234
hostage taking. See barricade-hostage incidents
Hot Zone, The (Preston), 95
How to Make Bombs: Book Two (on the Internet), 31
human interactions, women's need for, 130–31
Hunting Eric Rudolph (Schuster and Stone), 62
Hussein, Saddam, 237
IAFIS. See Integrated Automated Fingerprint Identification System
IDENT. See Automated Biometric Identification System
identifying terrorists. See biometrics; tattoos
ideology, 27, 42, 122, 126, 177, 210
of al Qaeda, 7, 9, 36
counter-ideology, 210
extremist ideologies, 7, 9, 24, 36, 44, 56, 57, 84
shared ideology, 34, 36
ways to spread, 247
idiosyncratic lone wolves, 42, 45–46, 74–83, 84, 85, 86, 183.
See also Kaczynski, Theodore; Kurbegovic, Muharem
IEDs (improvised explosive devices), 28, 247–48
immigration as an issue
for Anders Breivik, 51, 52, 84
for Franz Fuchs, 217
immigration law banning anarchists (1903), 163
for Muharem Kurbegovic, 81–82
for Pim Fortuyn, 64–65, 66
improvised explosive devices. See IEDs
&nbs
p; India, 190
assassination of Rajiv Gandhi, 123
chemical factory explosion in Bhopal, 73
terrorist attack in Mumbai, 89, 191
individuality and the lone wolf, 129, 255
“innocent victims,” 7, 56n114, 114, 211, 226, 233, 264
insanity. See mental state of lone wolves
“insurgents,” definition of, 260
Integrated Automated Fingerprint Identification System (IAFIS) of the FBI, 196, 215
Integrated Threat Assessment Centre (Canada), 36
Internal Revenue Service (IRS), attack on Austin, TX, building, 30, 202, 209, 225
International Criminal Police Organization (Interpol), 119
international terrorism, 20, 171, 300–301n14
Soviet Union as main source of in the 1970s and 1980s, 232
statistics on, 239
waves of, 244
Internet and terrorism, 8, 20, 21, 31, 54, 58, 223
addictive nature of Internet, 33
al Qaeda's use of, 210, 247
“conspiracy” theories, 147–48
cyberterrorism, 32–33, 40, 105, 249, 302n11
potential threats in future, 248–49
government efforts to monitor, 205
impact of acting recklessly on the Internet, 138–39
and lone wolves, ix, 20, 29–34, 52, 84, 236
allowing to achieve “hero status,” 225
encouraging women to be lone wolves, 142–43
need for the Internet, 201–207, 236, 256
as a tool to combat lone wolf terrorism, 206, 257
as a way to communicate, 224, 235, 256
radicalization of individuals via Internet, 203–204
and the Technological Wave of terrorism, 245–48
use of by terrorists
to glamorize terrorist activities, 211
to learn techniques, 105–106, 256
providing information on targets, 32, 65, 137, 192, 235
religious extremists, 231–32, 247, 248
terrorists needing, 201–207, 236, 249, 256
Interpol. See International Criminal Police Organization (Interpol)
intifada. See Palestine
IRA. See Irish Republican Army (IRA)
Iran
Iranian Revolution of 1979, 27
and US hostage crisis in, 89, 239
Iraq, 27, 134
Iraqi war, 140–41, 260
attacks on US troops, 260, 303Appendixn6
end of US involvement in, 244–45
female suicide terrorists in, 125, 135
insurgents use of IEDs and EFPs, 28, 247–48
Nidal Malik Hasan opposing, 55, 230
use of rape to coerce women into combat, 283n36
use of technology to identify terrorists, 193–94, 195–96, 198. See also photo inserts
Persian Gulf War (1990–1991), 48, 237
Irish Republican Army (IRA), 21–22, 35–36, 91
iris recognition, use of for identification, 196, 197, 199