The Lone Wolf Terrorist: Past Lessons, Future Outlook, and Response Strategies

Total Page:16

File Type:pdf, Size:1020Kb

The Lone Wolf Terrorist: Past Lessons, Future Outlook, and Response Strategies THE INTER-UNIVERSITY CENTER FOR TERRORISM STUDIES The Lone Wolf Terrorist: Past Lessons, Future Outlook, and Response Strategies Table of Contents Professor Yonah Alexander ............................................................................................. 1 Marion (Spike) Bowman ................................................................................................... 9 Professor Amit Kumar .................................................................................................... 11 Kyle B. Olson ...................................................................................................................... 15 Captain Dave Martin ........................................................................................................ 18 Professor Carol Flynn ...................................................................................................... 22 Lisa Curtis ............................................................................................................................ 25 Dr. Nimrod Raphaeli ........................................................................................................ 29 Professor Dean Alexander ............................................................................................. 32 Disclaimer The authors, editors, and research staff cannot be held responsible for errors or any consequences arising from the use of information contained in this publication. The views expressed do not necessarily reflect those of the institutions associated with this report. Copyright © 2017 by the Inter-University Center for Terrorism Studies directed by Professor Yonah Alexander. All rights reserved. No part of this report may be reproduced, stored, or distributed without the prior written consent of the copyright holder. Please contact the Inter-University Center for Terrorism Studies at the Potomac Institute for Policy Studies, 901 North Stuart Street, Suite 200, Arlington, VA 22203 Tel. 703-562-4513, 703-525-0770 ext. 237 Fax 703-525-0299 [email protected] www.potomacinstitute.org www.terrorismelectronicjournal.org www.iucts.org Cover Design By Alex Taliesen The Lone Wolf Terrorist 1 Introduction “The Lone Wolf Terrorist: Some Perspectives” Professor Yonah Alexander Director, Inter-University Center for Terrorism Studies From the dawn of history humanity has continuously faced two critical security challenges. The first is “natural” or “Mother Nature’s” disasters. It includes a wide range of disruptions and destruction of human lives and property. Hurricanes, tornadoes, earthquakes, tsunamis, monsoons, droughts, floods, heat waves, wildfires, and varieties of pandemics arising from biological pathogens cause some of the most frequent catastrophic costs to individuals, communities, and civilizations. The second permanent and equally significant security concern consists of “man-made” threats such as technological and economic calamities, ideological and political radicalization and extremism, terrorism, insurgencies, and wars. The purpose of this report is to focus only on some of the specifically “lone wolf” challenges among the larger man-made security threats to the safety, welfare, and rights of ordinary people; the stability of the state system; the impact on national, regional, and global economic development; the expansion of democratic societies; and the prevention of the destruction of civilization by biological, chemical, and nuclear weapons. Thus, this academic effort is by its very nature narrow in scope and reflects selected assessments of terrorist threats undertaken by individuals independent of direct sponsorship by groups and nation-states. First, consider the conceptual fog surrounding the classification of “lone wolf” offenders. The list includes terms ranging from “crazies” and “criminals” to “crusaders” and “martyrs.” Other frequent identifications utilized invariably by both academic literature and the media include “anarchists,” “radicals,” “extremists,” “leaderless activists,” “hate militants,” “solo and autonomous terrorists,” “self-tested actors,” and “lone operatives.” In this connection, some related historical and contemporary lessons come to mind when assessing the “lone wolf” challenge. For instance, Homer’s Odyssey (XVI) in 1000 B.C. observed that “the blade itself incites to violence.” Also, General Matthew B. Ridgway in a Cleveland speech on November 10, 1953, asserted: “There is still one absolute weapon …that weapon is man himself.” And a famous Russian proverb reminds us that “even if the bear is gone, he left the place for the wolf.” Despite these insights, the international community still does not have a universally accepted definition as to who are “lone wolf” perpetrators. Yet, limited attempts have been made to provide some definitional suggestions. For example, a U.S. official provision on the “lone wolf” is included in relation to terrorist wiretapping issues. H. Rept. 112-79 – FISA Sunsets Reauthorization Act of 2011 explains that the provision “allows the government to track a foreign national who engages in acts to prepare for a terrorist attack against the U.S. but is not affiliated, or cannot immediately be shown to 2 The Lone Wolf Terrorist be affiliated, with a foreign terrorist organization. The lone wolf definition cannot be used to investigate U.S. persons, and only applies in cases of international terrorism.” To be sure, some other characterizations of the “lone wolf” are observable. These include individuals with little or no direct contact with “inspirational” extremist organizations; people who are poorly trained and less successful and who are often isolated within society; and those actors who give little advanced warning to pending attacks. However, characteristic differences also exist. For example, the age of the “lone wolf” perpetrator varies from young adults to seniors, and intelligence levels range from average to genius IQ. The process of radicalization of the “lone wolf” takes place through numerous ties with family, educational instruction, religious bodies, friends and neighbors, places of work, prisons, printed extremist literature, media influence, and Internet propaganda. It is noteworthy that modern society in general, and particularly the technological advantages of the Internet, have made the spreading and radicalization of the “lone wolf” participants easier and potentially more dangerous and deadly. Additionally, radical social networking from right-wing websites to jihadist forums serve as meeting places for like-minded individuals and thereby lead to incitement of violence in names of “higher principles,” from “just war” to even “peace with justice.” The existing literature, both published and unpublished, on the “lone wolf” distinguishes three different identifiable operations. First are individual attacks that aim only to harm a particular person rather than a larger target of a group of people. The second category consists of selected attacks targeting a specific group while excluding those who are not connected to or affiliated with the specific perceived “enemy.” The third type of operation is indiscriminate targeting which is designed to inflict massive damage and loss of life. Motivated by political, ideological, and cultural discontent and nourishment, the “lone wolf” resorts to a broad range of primitive to more sophisticated tactics in justification of secular, theological, or single-issue causes. Selected historical and contemporary cases include numerous assassinations by “lone wolf” perpetrators, including John Wilkes Booth (President Abraham Lincoln), Gaetano Bresci (King Umberto I of Italy), Leon Czolgosz (President William McKinley), Gavrilo Princip (Archduke Franz Ferdinand), Nathanuram Godsey (Mahatma Gandhi), Lee Harvey Oswald (President John F. Kennedy), Sirhan Sirhan (Senator Robert Kennedy), and Yigal Amir (Prime Minister Yitzhak Rabin). Another list of infamous “lone wolf” actors consists of people who have inflicted mass disruptions and wide-spread terror and death. Mention should be made of the legacy of Theodore Kaczynski (the “Unabomber”), Major Nidal Malik Hasan (Fort Hood, Texas), and Anders Breivik (Norway). United States. Cong. Committee on the Judiciary. FISA Sunsets Reauthorization Act of 2011: Report Together with Dissenting Views (to Accompany H.R. 1800) (including Cost Estimate of the Congressional Budget Office). Cong. Rept. Washington, D.C.: U.S. G.P.O., 2011. The Lone Wolf Terrorist 3 Against the backdrop of the foregoing brief discussion, as well as the expanded rise in contemporary “lone wolf” attacks around the world, it behooves all concerned nations to undertake “best practices” strategies that necessarily must be based on three main levels. First is the local response. It includes elements such as vigilance (“if you see something, say something”), resilience, community awareness and education, local law enforcement training, community outreach for citizens (e.g., grassroots programs for those with perceived injustices), fostering programs for young adults (e.g., mentoring), community-oriented policing, and family-oriented Internet filtering and monitoring. The second level is that of national responses such as information sharing, local- national law enforcement synergy, safeguards against dangerous materials (e.g., licensing, red flags), public-private partnerships, successful immigration assimilation, representative and efficient government, protection of civil liberties, heightened monitoring/targeting/removal
Recommended publications
  • Nightclub Security Strategy in Finland
    1 Nightclub Security Strategy in Finland Simittchiev, Robert 2018 2 Laurea University of Applied Sciences Nightclub Security Strategy in Finland Simittchiev Robert Security Management HCA214SN Bachelor's Thesis August 2018 3 Laurea University of Applied Sciences Abstract Degree Programme in Security Management Bachelor Thesis Robert Simittchiev Nightclub Security Strategy in Finland Year 2018 Pages 33 The aim of this thesis was to find out in what kind of position the nightclub safety and security is in Finland currently, and to propose a new business model between the security companies and nightclubs as well to propose a new security procedure in order to increase the safety and security in the nightclubs. This study was based on the bigger nightclubs in Finland that have a capacity of 400 and above. The ratio of nightclubs and bars towards every Finn is very high, thus the subject of improving the safety and security is more important than we may think. The increased drug offences and threat of terrorism should definitely be considered. This topic was picked by author because of his background as a security guard in various nightclubs and his interest in the subject. The results showed that the vision of the nightclub security and safety differed greatly by the interviewed groups. While the clientele thought that the nightclubs are safe, the security staff stated that there are improvements to be made and that there are some major deficiencies. The nightclub manager was looking at the case from a business point of view and didn’t necessarily understand the connection between security and business.
    [Show full text]
  • Industrial Chocolate Manufacture and Use
    INDUSTRIAL CHOCOLATE MANUFACTURE AND USE Industrial Chocolate Manufacture and Use: Fourth Edition. Edited by Stephen T. Beckett © 2009 Blackwell Publishing Ltd. ISBN: 978-1-405-13949-6 SSBeckett_FM.inddBeckett_FM.indd i 110/1/20080/1/2008 110:00:430:00:43 AAMM INDUSTRIAL CHOCOLATE MANUFACTURE AND USE Fourth Edition Edited by Stephen T. Beckett Formerly Nestlé PTC York, UK SSBeckett_FM.inddBeckett_FM.indd iiiiii 110/1/20080/1/2008 110:00:440:00:44 AAMM This edition fi rst published 2009 Third edition published 1999 Second edition published 1994 by Chapman and Hall First edition published 1988 by Chapman and Hall © 1999, 2009 by Blackwell Publishing Ltd Blackwell Publishing was acquired by John Wiley & Sons in February 2007. Blackwell’s publishing programme has been merged with Wiley’s global Scientifi c, Technical, and Medical business to form Wiley-Blackwell. Registered offi ce John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom Editorial offi ces 9600 Garsington Road, Oxford, OX4 2DQ, United Kingdom 2121 State Avenue, Ames, Iowa 50014-8300, USA For details of our global editorial offi ces, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com/wiley-blackwell. The right of the author to be identifi ed as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
    [Show full text]
  • Is It Time to Reform the Counter-Terrorist
    ‘Is it time to reform the counter-terrorist financing reporting obligations? A critical and comparative assessment of the counter-terrorist financing reporting obligations in the European Union and the United Kingdom’. Dr. Nicholas Ryder, Professor in Financial Crime, Bristol Law School, Faculty of Business and Law, University of the West of England, Bristol 1 Abstract This paper critically considers the effectiveness of the European Union’s (EU) counter-terrorist financing (CTF) strategies. In particular, it concentrates on the use of financial intelligence gathered from the submission of suspicious activity reports (SARs) by reporting entities to Member States Financial Intelligence Units (FIU). The paper identifies a series of weaknesses in the United Kingdom’s (UK) reporting regime: defensive reporting, increased compliance costs and the definition of suspicion. The paper concludes by making a series of recommendations that are aimed at improving the effectiveness of the EU and UK CTF reporting obligations. 2 A. Introduction The European Union is suffering from the second decade of the most intense wave of international terrorism since the 1970s and nation states have been subjected to an increasing number of terrorist attacks. For example, there have been terrorist attacks in France (Toulouse, Montauban, Joué-lès-Tours, Île-de-France, Nice, Saint-Quentin-Fallavier, Oignies, Paris, Saint-Denis, Marseille, Magnanville, Saint-Étienne-du-Rouvray, Orly Airport, Garges-lès-Gonesse, Levallois-Perret, Carcassone and Trèbes), Belgium (Brussels, Zaventem and Charleroi), Germany (Berlin, Hanover, Essen, Würzburg, Ansbach and Hamburg), Sweden (Stockholm), Turkey (Istanbul), the United Kingdom (London and Manchester), Finland (Turku) and Russia (Kizlyar, Saint Petersburg and Moscow). These terrorist attacks have three common themes: evidence of a sophisticated terrorist support network, the use of low capability weapons and cheap acts of terrorism.
    [Show full text]
  • What Terrorist Migration Over European Borders Can Teach About American Border Security by Todd Bensman
    CIS Letterhead_Layout 1 7/26/12 4:34 PM Page 1 Center for Immigration Studies C I S November 2019 What Terrorist Migration Over European Borders Can Teach About American Border Security By Todd Bensman The irregular migrant flow was exploited in order to dispatch terrorist operatives clandestinely to Europe. IS and possibly other jihadist terrorist organizations may continue to do so. — “European Union Terrorism Situation and Trend Report 2017”1 It remains a theoretical vulnerability but not one that terrorists have been able to exploit. — Nicholas Rasmussen, former National Counterterrorism Center director under the Obama administration, January 2019, regarding such infiltration over the U.S. southern border.2 Key Findings • At least 104 Islamist extremists entered the European Union’s (EU) external borders using long-haul ir- regular migration methods between 2014-2018, establishing proof-of-concept for a previously theoretical terrorism travel tactic over borders. • Of the 104 migrant terrorists identified for the 2014-2018 period, 28 successfully completed attacks that claimed the lives of 170 victims and wounded 878. An additional 37 were arrested or killed plotting at- tacks, and 39 others were arrested for illegal involvement with foreign terrorist organizations. • A majority of the 104 terrorists applied for international protections such as asylum and were able to re- main in European nations for an average of 11 months before attacks or arrests for plots, demonstrating that asylum processes accommodated plot incubation. • While total numbers of migrant-terrorists were a fraction of overall irregular migration, their activities demonstrate that small numbers present outsized threats to the United States should only a few strike here.
    [Show full text]
  • The Islamic State Threat to the World
    Combating Terrorism Center at West Point Objective • Relevant • Rigorous | May 2018 • Volume 11, Issue 5 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE The Islamic State Rukmini Callimachi Threat to the World Cup New York Times Foreign Brian Glyn Williams and Robert Troy Souza Correspondent FEATURE ARTICLE 1 The Islamic State Threat to the 2018 FIFA World Cup Editor in Chief Brian Glyn Williams and Robert Troy Souza Paul Cruickshank INTERVIEW Managing Editor Kristina Hummel 12 A View from the CT Foxhole: Rukmini Callimachi, New York Times Foreign Correspondent Bryan Price with Mikki Franklin EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 16 Jihadi Brides? Examining a Female Guesthouse Registry from the Islamic State's Caliphate Lieutenant Colonel Bryan Price, Ph.D. Daniel Milton and Brian Dodwell Director, CTC 23 "Trucks, Knives, Bombs, Whatever:" Exploring Pro-Islamic State Brian Dodwell Instructional Material on Telegram Bennett Clifford Deputy Director, CTC 30 "Deutsche Schabab:" The Story of German Foreign Fighters in Somalia, 2010-2016 CONTACT Christian Jokinen Combating Terrorism Center U.S. Military Academy On June 14, 2018, the FIFA World Cup kicks of in Moscow with host Rus- 607 Cullum Road, Lincoln Hall sia facing Saudi Arabia in the opening match. Brian Williams and Robert West Point, NY 10996 Souza warn in our cover article that the massive global media spotlight on Phone: (845) 938-8495 Russia during the month-long tournament may incentivize jihadi terrorists to carry out attacks on Russian soil to retaliate for the country’s ongoing military intervention against Sunni rebel and jihadi Email: [email protected] fighters in Syria.
    [Show full text]
  • I 37 the Current Terrorism Threat in Europe
    The Current Terrorism Threat in Europe Yoram Schweitzer Senior members of the security establishment have claimed that the current terrorist threat in Europe is unprecedented. This essay examines this claim against the background of the waves of terrorism that have plagued Europe over the last five decades, and specifically in light of the nature of the current threat and the response that it demands. The terrorist threat in Europe in recent years has focused primarily on Muslim Europeans and converts to Islam. These perpetrators are usually veterans of the wars in Iraq and Syria who joined the ranks of the Islamic State and internalized its ideas and methods. Also participating in this activity are Europeans who did not emigrate to the Middle East to take part in the fighting, along with immigrants who operate under the inspiration of the Islamic State. The essay presents the challenges currently facing Europe’s leaders and its security services and the ways in which they must respond to the real and potential threats that exist, in view of the threats by Salafi jihadist organizations, particularly the Islamic State and al-Qaeda, to flood Europe “with a river of blood.” According to the media and statements by members of the security establishment and various analysts, Europe is currently under a serious terrorist threat, perhaps the worst it has ever known.1 This contention comes in the wake of a series of terrorist attacks that have killed hundreds, as well as the fear of what will happen when those among the over 5000 Europeans who joined the Salafi jihadist ranks in the war zones of Syria The European Union in Turbulent Times: Challenges, Trends, and Significance for Israel I 37 Yotam Rosner and Adi Kantor, Editors 38 I Yoram Schweitzer and Iraq return to Europe with the goal of continuing the fight.
    [Show full text]
  • Terrorism in the West: an Age of Extremes”
    TerrorismTerrorism inin TheThe WesT:WesT: AnAn AgeAge oFoF exTremesexTremes BY TOM WILSON Published in 2018 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society, 2018. All rights reserved. The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: “TERRORISM IN THE WEST: AN AGE OF EXTREMES” ISBN: 978-1-909035-48-5 £49.50 where sold Cover images (from top to bottom): Armed police at Manchester Arena after reports of an explosion at the venue during an Ariana Grande concert on 22 May 2017 (Picture by: Peter Byrne/PA Archive/PA Images), 31 October 2017 – NYPD and other law enforcement at the scene where the van was halted at the Manhattan terro r attack in New York. The driver in the Manhattan attack that killed eight people had been planning for weeks and appeared to have ties to terror suspects, officials said. (Credit Image: © Bryan Smith via ZUMA Wire); and Neo Nazis, Alt-Right, and White Supremacists encircle counter protestors at the base of a statue of Thomas Jefferson after marching through the University of Virginia campus with torches in Charlottesville, Va., USA, on 11 August 2017 (Photo by Shay Horse/NurPhoto). Terrorism in The WesT: An Age oF exTremes BY TOM WILSON October 2018 TERRORISM IN THE WEST: AN AGE OF EXTREMES About the Author Tom Wilson is a Research Fellow in the Centre on Radicalisation and Terrorism at the Henry Jackson Society.
    [Show full text]
  • Annual Financial Statements TABLE of CONTENTS Annual Financial Statements
    Annual Financial Statements TABLE OF CONTENTS Annual Financial Statements Combined Annual Financial Management Report Statements 4 Fundamental Information 140 Balance Sheet as of December 31, 2020 about the Group 141 Income Statement for the period 4 The Group from January 1 to December 31, 2020 16 Strategy 142 Statement of Changes in Fixed Assets 25 Internal Management System 143 Notes for the fiscal year 2020 31 Sustainability 147 Notes to the Balance Sheet 40 Research and Development 157 Notes to the Income Statement 57 People 161 Other Disclosures 165 Members of the Executive Board 67 Report on Economic Position of Merck KGaA, Darmstadt, Germany 67 Macroeconomic and 166 Members of the Supervisory Board Sector-Specific Environment of Merck KGaA, Darmstadt, Germany 71 Review of Forecast 168 Disclosures in accordance with against Actual Business Developments section 160 (1) no. 8 of the German 79 Course of Business and Economic Position Stock Corporation Act (AktG) 79 Group 170 List of Shareholdings of Merck KGaA, Darmstadt, Germany, as of December 31, 2020 89 Healthcare 194 Reproduction of the Independent Auditor’s 95 Life Science Report 99 Performance Materials 201 Responsibility Statement in accordance 103 Corporate and Other with section 264 (2) sentence 3 HGB and section 289 (1) sentence 5 HGB 104 Report on Risks and Opportunities 202 Report of the Supervisory Board 121 Report on Expected Developments 206 Financial Calendar 126 Report in accordance with Section 315a (1) of the German Commercial Code (HGB) 129 Additional Information
    [Show full text]
  • Drugs and Terrorism: the Overlaps in Europe
    Drugs and Terrorism: The Overlaps in Europe Rajan Basra ACKNOWLEDGEMENTS Thanks to Johanna Fürst, Mariaelena Agostini, and Gokçe Oztürk for their assistance in data collection and translation, Charlie Winter for his comments on a draft version, and Dr. Teodora Groshkova from the EMCDDA. This report is published in conjunction with the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA), as a background paper for its 2019 EU Drug Markets Report. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London Strand London WC2R 2LS United Kingdom T. +44 20 7848 2098 E. [email protected] Twitter: @icsr_centre Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2019 Table of Contents Executive Summary 3 Introduction 5 Background 5 Structure 8 Methodology 9 Data Collection 9 Coding and Limitations 10 Table 1: Simplified Version of Jihadist-related Dataset 12 Jihadists 17 Consuming and Dealing Drugs Prior to Radicalising 18 Simultaneous Involvement in Drugs and Extremism 20 Case Study 1: Nourdeen Abdullah 23 Taking Drugs Before an Attack 24 Case Study 2: Ziyad Ben Belgacem 28 Other Instances 29 Paramilitaries 33 Drugs as One Crime of Many 34 ‘Punishment’ Attacks and Conflict with Criminals 36 Table 2: Number of Vigilante Attacks in Northern Ireland, 2012–2017 37 Internal Divisions over Drugs and Crime 38 Case Study 3: Alan Ryan 41 Damaging Community Relations 42 Other Groups 45 Conclusion 49 Appendix 51 Table 3: Deportations from Italy for Terrorism-Related Reasons, January 2014–June 2018 51 1 Drugs and Terrorism: The Overlaps in Europe A photo released by the dissident republican paramilitary Republican Action Against Drugs (RAAD) in 2010, ostensibly showing its members with an alleged drug dealer, hooded and bound, alongside seized drugs.
    [Show full text]
  • The Impact of Terrorism on Financial Markets
    ERASMUS UNIVERSITY ROTTERDAM ERASMUS SCHOOL OF ECONOMICS MSc Economics & Business Master Specialisation Financial Economics The Impact of Terrorism on Financial Markets The positive price effects of IS-terrorism on the European (social) Media and Telecom Industry Author: Jasper Daniel Kusse Student number: 406764 Thesis supervisor: Dr. Jan Lemmen Second reader: Dr. J. Chalabi Finish date: July 2019 PREFACE AND ACKNOWLEDGEMENTS As final part of my master program and thus the ending of my student career, I can only say that I wrote this thesis with a lot of joy and motivation and that I can look back with a satisfied feeling. I want to thank the Erasmus University of Rotterdam in general for making my Master such a success, for instance by teaching me so many new skills regarding empirical research in the field of financial economics. All facilities, teachers, courses, seminars and eventually this thesis have given me the experience and skills for all what is to come in the near future. I want to thank Dr. Jan Lemmen for his helpful feedback, kind approach and his attentive involvement in his supervision. Finally, I wish to thank my father, Frank, who has provided excellent advice, and my mother Hanneke, for always supporting me no matter what. When reading this thesis, I hope you will enjoy it as much as I did in writing it. NON-PLAGIARISM STATEMENT By submitting this thesis the author declares to have written this thesis completely by himself/herself, and not to have used sources or resources other than the ones mentioned. All sources used, quotes and citations that were literally taken from publications, or that were in close accordance with the meaning of those publications, are indicated as such.
    [Show full text]
  • Caliphate Soldiers and Lone Actors: What to Make of IS Claims for Attacks in the West 2016-2018
    ICCT Research Paper April 2019 DOI: 10.19165/2019.2.05 ISSN: 2468-0486 Caliphate Soldiers and Lone Actors: What to Make of IS Claims for Attacks in the West 2016-2018 Author: A staff member of the European Counter-Terrorism 1 Centre (ECTC) at Europol May 2016, IS began implementing a strategy aimed at inciting lone actor attacks in Western countries, under the supervision of its “external security” body. This report examines changes in the ways in which IS has claimed credit for violent incidents in Western countries under this strategy in an effort to shed light on the links between the external operations and the main leadership of the organisation. IS’s claiming behaviour for attacks in the West fluctuated between leaving the initiative to perpetrators and trying to centralise the communication flow. The organisation, however, has experienced increasing difficulties in ascertaining information received from external sources, ultimately leading to the flawed claim for the Las Vegas shooting on 1 October 2017. Since then, communication between IS’s central media outlets and external sources seems to have largely broken down. At present, the hierarchical external operations structures of IS seem to have been replaced by individuals that communicate and, possibly, cooperate based on their common experience and acquaintance. The threat they pose will depend on their personal influence on others and their motivation rather than their position in the IS hierarchy. ……………………………………………………………………………………………………………………… 1 The author is a trained Arabist and possesses a PhD in Islamic studies. He has worked in monitoring and analysis of jihadist propaganda for more than a decade.
    [Show full text]
  • Volume XII, Issue 2 April 2018 PERSPECTIVES on TERRORISM Volume 12, Issue 2
    ISSN 2334-3745 Volume XII, Issue 2 April 2018 PERSPECTIVES ON TERRORISM Volume 12, Issue 2 Table of Contents Welcome from the Editors Articles ‘Terrorism’ or ‘Liberation’? Towards a Distinction: A Case Study of the Armed Strug- gle of the Liberation Tigers of Tamil Eelam (LTTE)....................................................1 by Muttukrishna Sarvananthan Tackling Terrorism’s Taboo: Shame..........................................................................19 by Matthew Kriner Spaces, Ties, and Agency: The Formation of Radical Networks................................32 by Stefan Malthaner Headhunting among Extremist Organizations: An Empirical Assessment of Talent Spotting...................................................................................................................44 by Gina Ligon, Michael Logan and Steven Windisch Policy Brief Interview with Max Hill, QC, Independent Reviewer of Terrorism Legislation for the United Kingdom.......................................................................................................63 conducted by Sam Mullins Research Notes Erdogan's Turkey and the Palestinian Issue........................................................................................................................74 by Ely Karmon & Michael Barak 130+ (Counter-) Terrorism Research Centres – an Inventory...................................86 compiled and selected by Teun van Dongen Book Reviews Ronen Bergman. Rise and Kill First: The Secret History of Israel’s Targeted Assassinations. New York: Random
    [Show full text]