Lone Wolf Terrorism

Home > Other > Lone Wolf Terrorism > Page 33
Lone Wolf Terrorism Page 33

by Jeffrey D. Simon


  18. Ian Evans, “Report: London No Safer for All Its CCTV Cameras,” Christian Science Monitor, February 22, 2012, http://www.csmonitor.com/World/Europe/2012/0222/Report-London-no-safer-for-all-its-CCTV-cameras (accessed March 12, 2012).

  19. Christopher Hope, “1,000 CCTV Cameras to Solve Just One Crime, Met Police Admits,” Telegraph, August 25, 2009, http://www.telegraph.co.uk/news/uknews/crime/6082530/1000-CCTV-cameras-to-solve-just-one-crime-Met-Police-admits.html (accessed March 12, 2012).

  20. Lone-Wolf Terrorism, COT, Instituut voor Veiligheids-en Crisismanagement, Final draft, June 7, 2007, Case Study for Work Package 3, p. 22, http://www.scribd.com/doc/34968770/Lone-Wolf-Terrorism (accessed June 10, 2011).

  21. Ibid., pp. 77–78.

  22. “Real Crime—Nailing the Nailbomber,” Real Crime, June 4, 2007, http://www.throng.co.nz/real-crime/real-crime-nailing-the-nailbomber (accessed March 13, 2012).

  23. Lone-Wolf Terrorism, p. 77.

  24. Ian Evans, “London Riots Caught on CCTV Camera: ‘We Will Pursue You’ Say Police,” Christian Science Monitor, August 9, 2011, http://www.csmonitor.com/World/Europe/2011/0809/London-riots-caught-on-CCTV-camera-We-will-pursue-you-say-police-VIDEO (accessed March 16, 2012).

  25. Fred Burton, “The Challenge of the Lone Wolf,” Stratfor, May 30, 2007, http://www.stratfor.com/challenge_lone_wolf (accessed December 23, 2011).

  26. Scott Stewart and Fred Burton, “Lone Wolf Lessons,” Stratfor, 2009, http://www.trapwire.com/stratforreport4.htm (accessed March 15, 2012).

  27. Jeff Salton, “Smarter CCTV System to Be Used to Recognize and Prevent Crime,” Gizmag, September 29, 2009, http://www.gizmag.com/intelligent-cctv-system-recognizes-prevents-crime/12971/ (accessed March 15, 2012).

  28. Michael Pollitt, “Surveillance: The Next Generation,” Guardian, February 18, 2009, http://www.guardian.co.uk/technology/2009/feb/19/cctv-behaviour-patterns (accessed March 15, 2012).

  29. “Could ‘Smart CCTV Surveillance’ Help in Fight against Terror,” PRNewswire, July 18, 2011, http://www.prnewswire.co.uk/cgi/news/release?id=150279 (accessed March 15, 2012).

  30. Mimi Hall, “Feds Focus on Detecting Bombs,” USA Today, November 27, 2007, http://www.usatoday.com/news/nation/2007-11-26-bomb-detection_N.htm (accessed March 9, 2012).

  31. Retired Department of Defense intelligence analyst, telephone interview with author, March 2, 2012.

  32. “Introduction to Biometrics,” National Science and Technology Council (NSTC), Committee on Technology, Committee on Homeland and National Security, Subcommittee on Biometrics, August 7, 2006, http://www.biometrics.gov/ReferenceRoom/Introduction.aspx (accessed March 19, 2012); “History of Biometrics,” Global Security, July 13, 2011, http://www.globalsecurity.org/security/systems/biometrics-history.htm (accessed March 18, 2012).

  33. “The Bertillon System,” US National Library of Medicine, National Institutes of Health, February 16, 2006, http://www.nlm.nih.gov/visibleproofs/galleries/technologies/bertillon.html (accessed March 19, 2012).

  34. “History of Biometrics.”

  35. “The FBI and the American Gangster, 1924–1938,” Federal Bureau of Investigation, http://www.fbi.gov/about-us/history/a-centennial-history/fbi_and_the_american_gangster_1924-1938 (accessed March 17, 2012).

  36. The National Biometrics Challenge, National Science and Technology Council, Subcommittee on Biometrics and Identity Management, September 2011, p. 6; “Introduction to Biometrics.”

  37. National Biometrics Challenge, p. 5.

  38. Ibid., p. 6.

  39. Ibid., pp. 5, 16.

  40. CJIS Annual Report 2011, US Department of Justice, Federal Bureau of Investigation, Criminal Justice Information Services Division, p. 20.

  41. William M. Casey, interview with author, February 22, 2012, Clarksburg, West Virginia.

  42. “The Biometric News Portal,” http://www.biometricnewsportal.com/biometrics_definition.asp (accessed February 20, 2012); “Introduction to Biometrics”; National Biometrics Challenge, pp. 11–15; CJIS Annual Report 2011, p. 24; “Biometrics,” Global Security, July 13, 2011, http://www.globalsecurity.org/security/systems/biometrics.htm (accessed March 20, 2012).

  43. Stephen G. Fischer Jr., interview with author, February 22, 2012, Clarksburg, West Virginia.

  44. “Biometric News Portal”; “Biometrics.”

  45. Rym Momtaz and Lee Ferran, “French School Shooter Was on US No Fly List,” ABC News, http://abcnews.go.com/Blotter/french-school-shooter-us-fly-list/story?id=15981115#.T24CfxxBnw4 (accessed March 23, 2012); Scott Sayare, “Suspect in French Killings Slain as Police Storm Apartment after 30-Hour Siege,” New York Times, March 22, 2012, http://www.nytimes.com/2012/03/23/world/europe/mohammed-merah-toulouse-shooting-suspect-french-police-standoff.html (accessed March 23, 2012).

  46. National Biometrics Challenge, p. 20.

  47. Margit Sutrop and Katrin Laas-Mikko, “From Identity Verification to Behavior Prediction: Ethical Implications of Second Generation Biometrics,” Review of Policy Research 29, no. 1 (2012): 21–36; Ellen Messmer, “Can Behavioral Biometrics Help Detect Terrorists Entering the U.S.?” Network World, September 22, 2010, http://www.networkworld.com/news/2010/092210-biometrics.html (accessed March 19, 2012).

  48. Privacy Impact Assessment for the Future Attribute Screening Technology (FAST) Project, Science and Technology Directorate, Department of Homeland Security, December 15, 2008, p. 2.

  49. Declan McCullagh, “Real-Life ‘Minority Report’ Program Gets a Try-Out,” CBS News, October 7, 2011, http://www.cbsnews.com/2100-503063_162-20117207.html (accessed March 26, 2012).

  50. Privacy Impact Assessment, p. 4.

  51. Sharon Weinberger, “Terrorist ‘Pre-Crime’ Detector Field Tested in United States,” Nature, May 27, 2011, http://www.nature.com/news/2011/110527/full/news.2011.323.html (accessed March 24, 2012); McCullagh, “Real-Life ‘Minority Report’ Program”; Wilmer Heck, “EU to Monitor Deviant Behavior in Fight against Terrorism,” Spiegel Online International, October 21, 2009, http://www.spiegel.de/international/europe/0,1518,656468,00.html (accessed March 24, 2012).

  52. Elizabeth Montalbano, “Homeland Security Tests Crime Prediction Tech,” Information Week, October 11, 2011, http://www.informationweek.com/news/government/security/231900555 (accessed March 24, 2012).

  53. Weinberger, “Terrorist ‘Pre-Crime’ Detector.”

  54. Joseph A. Bernstein, “Big Idea Seeing Crime before It Happens,” Discover Magazine, January 23, 2012, http://discovermagazine.com/2011/dec/02-big-idea-seeing-crime-before-it-happens/article_view?b_start:int=1&-C (accessed March 26, 2012).

  55. Steven Cherry and Anne-Marie Corely, “Loser: Bad Vibes: A Quixotic U.S. Government New Security System Seeks to Look into Your Soul,” IEEE Spectrum, January 2010, http://spectrum.ieee.org/computing/embedded-systems/loser-bad-vibes (accessed March 24, 2012).

  56. Sageman, Leaderless Jihad, p. 114.

  57. Ibid., pp. 115–16.

  58. Ibid., p. 122.

  59. Charlie Savage, “Homeland Analysts Told to Monitor Policy Debates in Social Media,” New York Times, February 22, 2012, http://www.nytimes.com/2012/02/23/us/house-questions-homeland-security-program-on-social-media.html (accessed March 27, 2012).

  60. Ibid.

  61. Lori Andrews, “Facebook Is Using You,” New York Times, February 4, 2012, http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using-you.html?pagewanted=all (accessed March 31, 2011).

  62. Mark F. Giuliano, interview with author, October 1, 2009, Washington, DC.

  63. David Johnston and James Risen, “Lone Terrorists May Strike in the U.S., Agencies Warn,” New York Times, February 23, 2003, http://www.nytimes.com/2003/02/23/world/threats-responses-domestic-security-lone-terrorists-may-strike-us-agencies-warn.html?pagewanted=all&src=pm (accessed April 1, 2012).

  64. Michael Brick, “Man Crashes Plane into Texas I.R.S. Office,” New York Times, February 18, 2010, http://www.nytimes.com/2010/02/19/us/19crash.html?_r=1 (accessed April 2, 2012).

  65.
Matthew Harwood, “Tripping up Terrorists,” Security Management, January 2012, http://www.securitymanagement.com/print/9356 (accessed April 1, 2012).

  66. Sageman, Leaderless Jihad, pp. 156–57.

  67. Ibid., pp. 151–54; Liat Shetret, “Use of the Internet for Counter-Terrorist Purposes,” Policy Brief, Center on Global Counterterrorism Cooperation, February 2011, pp. 6–7.

  68. Shetret, “Use of the Internet,” p. 6.

  69. “Empowering Local Partners to Prevent Violent Extremism in the United States,” Office of the Press Secretary, White House, August 2011, http://www.whitehouse.gov/the-press-office/2011/08/03/empowering-local-partners-prevent-violent-extremism-united-states (accessed April 2, 2012).

  70. Benjamin Weiser and Colin Moynihan, “A Guilty Plea in Plot to Bomb Times Square,” New York Times, June 22, 2010, http://query.nytimes.com/gst/fullpage.html?res=9B05E0DA1030F931A15755C0A9669D8B63&pagewanted=allAft (accessed April 10, 2012).

  71. Carl Franzen, “How Faisal Shahzad Was Apprehended, Step by Step,” AOL News, May 4, 2010, http://www.aolnews.com/2010/05/04/how-faisal-shahzad-was-apprehended-step-by-step/ (accessed April 10, 2012); “FBI Team ‘Lost’ Suspected Times Square Bomber during Critical Hours,” Fox News, May 5, 2010, http://www.foxnews.com/us/2010/05/05/fbi-team-lost-suspected-times-square-bomber-crucial-hours/ (accessed April 10, 2012). After learning Shahzad's identity, the FBI placed him on the no-fly list and alerted other federal agencies that he was a suspect in the attempted bombing in Times Square. An updated no-fly list, however, had not yet been activated in computer systems. That was how Shahzad was able to board the plane. It wasn't until Shahzad was already on the plane that Customs and Border Protection officials received the final passenger list with his name from Emirates Airlines. Had the authorities been just a few minutes late before notifying air-traffic control at Kennedy Airport to not allow the plane to take off, Shahzad would have safely fled the country.

  72. CJIS Annual Report 2011, p. 18.

  73. Yanjun Yan and Lisa Ann Osadciw, “Bridging Biometrics and Forensics,” in Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, ed. Edward J. Delp, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon (San Jose, CA: Proceedings—SPIE, 2008).

  74. Fischer Jr., interview.

  75. CJIS Annual Report 2011, p. 24.

  76. Casey, interview.

  77. Lone-Wolf Terrorism, pp. 26, 66; Adrian Bridge, “Austria's ‘Unabomber’ Taunts Police with History and Myth,” Independent, December 15, 1996, http://www.independent.co.uk/news/world/austrias-unabomber-taunts-police-with-history-and-myth-1314636.html (accessed April 11, 2012).

  78. Lone-Wolf Terrorism, pp. 80–82; Ramon Spaaij, Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention (New York: Springer, 2012), pp. 84–86.

  79. Ibid.

  80. Ibid.

  81. Michael M. Greenburg, The Mad Bomber of New York: The Extraordinary True Story of the Manhunt That Paralyzed a City (New York: Union Square Press, 2012), p. 79; Spaaij, Understanding Lone Wolf Terrorism, pp. 23–24; Melissa Ann Madden, “George Metesky: New York's Mad Bomber (City Under Siege),” TruTV Crime Library, http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/1.html (accessed April 12, 2012).

  82. Don DeNevi and John H. Campbell, Into the Minds of Madmen: How the FBI's Behavioral Science Unit Revolutionized Crime Investigation (Amherst, NY: Prometheus Books, 2004), pp. 60–65; Lyn Bixby, “‘Mad Bomber’ of Waterbury Terrorized New York for 17 Years,” Hartford Courant, July 2, 1995, http://articles.courant.com/1995-07-02/news/9507020146_1_unabomber-s-signature-first-bomb-george-metesky (accessed April 12, 2012); Madden, “George Metesky (Small Beginnings),” TruTV Crime Library, http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/2.html (accessed April 12, 2012).

  83. DeNevi and Campbell, Into the Minds of Madmen, pp. 60–65.

  84. Madden, “George Metesky (The Game Begins),” TruTV Crime Library, http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/5.html (accessed April 12, 2012); Madden, “George Metesky (Revelations),” TruTV Crime Library, http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/7.html (accessed April 12, 2012); DeNevi and Campbell, Into the Minds of Madmen, pp. 60–65.

  85. Madden, “George Metesky (Aftermath),” TruTV Crime Library, http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/9.html (accessed April 12, 2012); Alexander Feinberg, “Edison Clerk Finds Case in File; Bomber's Words Alerted Her,” New York Times, January 23, 1957, p. 18; “The Bomber's Grievances Came to Light in a Series of Letters,” New York Times, January 23, 1957, p. 19; Malcolm Gladwell, “Dangerous Minds: Criminal Profiling Made Easy,” New Yorker, November 12, 2007, http://www.newyorker.com/reporting/2007/11/12/071112fa_fact_gladwell (accessed April 12, 2012); Michael T. Kaufman, “‘Mad Bomber,’ Now 70, Goes Free Today,” New York Times, December 13, 1973, p. 1.

  86. “Bomber's Grievances Came to Light.”

  87. “Extremist Chatter Praises Eric Rudolph as ‘Hero,’” Anti-Defamation League, June 3, 2003, http://www.adl.org/presrele/asus_12/4264_72.htm (accessed April 14, 2012).

  88. Edecio Martinez, “Joe Stack Is a ‘True American Hero’: Facebook Groups Support Domestic Terrorist,” CBS News, February 19, 2010, http://www.cbsnews.com/8301-504083_162-6223132-504083.html (accessed May 8, 2011).

  89. Andrea Canning and Lee Ferran, “Stack's Daughter Retracts ‘Hero,’ Statement,” ABC News, February 22, 2010, http://abcnews.go.com/GMA/joe-stacks-daughter-samantha-bell-calls-dad-hero/story?id=9903329#.T4svwBxBnw5 (accessed April 14, 2012).

  90. Jeffrey D. Simon, “Biological Terrorism: Preparing to Meet the Threat,” Journal of the American Medical Association 278, no. 5 (August 6, 1997): 428–30.

  CHAPTER 7. UNCOVERING THE LESSONS LEARNED

  1. George Santayana, Reason in Common Sense, vol. 1, The Life of Reason, or, The Phases of Human Progress (New York: Scribner's, 1905), p. 284.

  2. Matthew Cole, “New Al Qaeda Video: American Muslims Should Buy Guns, Start Shooting People,” ABC News, June 3, 2011, http://abcnews.go.com/Blotter/al-qaeda-video-buy-automatic-weapons-start-shooting/story?id=13704264#.T5bzKxxLmfc (accessed April 24, 2012).

  3. David Ljunggren, “Al Qaeda Challenges with Lone Wolf Tactics: Canada,” Reuters, April 23, 2012, http://www.reuters.com/article/2012/04/23/us-alqaeda-idUSBRE83M1HP20120423 (accessed April 23, 2012).

  4. Claire Sterling, The Terror Network (New York: Henry Holt, 1981).

  5. Jerry S. Piven, “On the Psychosis (Religion) of Terrorists,” in Terror and the Apocalypse: Psychological Undercurrents of History, Volume II, ed. Jerry S. Piven, Paul Zilio, and Henry W. Lawton (Lincoln, NE: Bloomusalem Press, 2002), p. 186.

  6. Jeffrey D. Simon, The Terrorist Trap: America's Experience with Terrorism, 2nd ed. (Bloomington: Indiana University Press, 2001), pp. 5–6.

  7. See, for example, Martha Crenshaw, “The Causes of Terrorism,” in International Terrorism, ed. Charles W. Kegley Jr. (New York: St. Martin's Press, 1990), p. 121; John Horgan, The Psychology of Terrorism (London: Routledge, 2005), pp. 62–79; Marc Sageman, Leaderless Jihad: Terror Networks in the Twenty-First Century (Philadelphia: University of Pennsylvania Press, 2008), pp. 62–65; Jerrold M. Post, The Mind of the Terrorist: The Psychology of Terrorism from the IRA to al-Qaeda (New York: Palgrave Macmillan, 2007), pp. 3–4.

  8. Christopher Hewitt, Understanding Terrorism in America: From the Klan to al Qaeda (London: Routledge, 2003), p. 80.

  9. Ibid.

  10. Ramon Spaaij, “The Enigma of Lone Wolf Terrorism: An Assessment,” Studies in Conflict & Terrorism 33, no. 9 (2010): 862.

  11. Horgan, Psychology of Terrorism, p. 48.

  12. Steven Emerson, Jihad Incorporated: A Guide to Militant Islam in the US (Amherst, NY: Prometheus Books, 2006), p. 479.

  13. John H. Campbell and Don DeNevi, Profilers: Leading Investigators Take You inside the Criminal Mind (Amherst, NY: Prometheus Books, 2004), p. 194; Malcolm Glad
well, “Dangerous Minds: Criminal Profiling Made Easy,” New Yorker, November 12, 2007, http://www.newyorker.com/reporting/2007/11/12/071112fa_fact_gladwell (accessed April 12, 2012); Melissa Ann Madden, “George Metesky: New York's Mad Bomber,” Dinge en Goete (Things and Stuff), http://dingeengoete.blogspot.com/2012/03/george-metesky-new-yorks-mad-bomber.html (accessed April 29, 2012).

  14. “Patterns of Global Terrorism: 2002,” United States Department of State, April 2003, appendix H, p. 161. International terrorism refers to “terrorism involving citizens or the territory of more than one country” (p. xiii). In other words, it involves terrorist incidents “in which terrorists go abroad to strike their targets, stay at home but select victims because of their connections to a foreign state (e.g., diplomats or the executives of foreign corporations), or attack international lines of commerce (e.g., airliners). It excludes the considerable amount of terrorist violence carried out by terrorists operating within their own country against their own nationals and in many countries by governments against their own citizens.” (Brian Michael Jenkins, International Terrorism: The Other World War, Rand Corp, R-3302-AF, November 1985, p. 4.) Domestic terrorist incidents are now combined with international ones in the annual US government statistics on terrorism, bringing the numbers to staggering totals. For example, the number of terrorist incidents in 2011 was 10,283! See Country Reports on Terrorism: 2011, United States Department of State, National Counterterrorism Center: Annex of Statistical Information, July 2012, p. 2.

  15. Spaaij, “Enigma of Lone Wolf Terrorism,” p. 862; Hewitt, Understanding Terrorism in America, p. 80.

  16. Ramon Spaaij, Understanding Lone Wolf Terrorism: Global Patterns, Motivations, and Prevention (New York: Springer, 2012), pp. 27–33.

  17. Ibid., p. 31.

  18. Lone-Wolf Terrorism, COT, Instituut voor Veiligheids- en Crisismanagement, Final draft, June 7, 2007, Case Study for Work Package 3, p. 80, http://www.scribd.com/doc/34968770/Lone-Wolf-Terrorism (accessed June 10, 2011).

 

‹ Prev