Subscribe free to our newsletters via your
. Military Space News .




TERROR WARS
The 'lone wolf' terrorist
by Staff Writers
Haifa, Israel (SPX) Aug 06, 2012


The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

A mounting global threat is of terrorists who act as "lone wolves". Locating and preventing such terrorist activity is more complicated than organizational terror threats. A new study conducted by Prof. Gabriel Weimann of the University of Haifa, reveals that these "lone wolves" are not in fact so isolated and belong to virtual terrorist communities on the Internet.

"We may be able to better prevent 'lone wolf' terrorist attacks by following the radicalization of opinions being expressed online and by tracking the enlistment and training processes that are happening in that sphere," noted Prof. Weimann.In recent years the number of "lone wolf" terrorists has been on the rise.

They act alone, influenced by radical ideologies, and are not members of any organization or subjects of any organizational hierarchy, making it particularly difficult and almost impossible to locate them before they carry out attacks. Making it even more difficult to locate such individuals is the fact that they do not belong to any specific sector of the population and could in fact be "the guy next door".

According to Prof. Weimann, intelligence organizations are aware that much of the terrorist activity is shifting from the known terrorist organizations to "lone wolf" activity, and even President of the United States Barack Obama commented in 2011 that this type of attack has become the most likely to cause harm in the Western world.

In his new study, Prof. Weimann shows that these wolves are probably not so 'lonely'. As part of a long-term study that he launched over ten years ago, Prof. Weimann has been surveying encoded and public international terror organization websites, as well as sites supporting these organizations, forums, video clips, and whatever information there is on the net relating to global terrorism.

According to Prof. Weimann, most of the "lonely wolves" make contact, share information, and acquire training through the Internet, whether from sites that are linked with terror organizations, from forums supporting such organizations, or from other platforms.

In addition to this sort of "regular" activity on the web, social networks provide these individuals with their virtual wolfpack: a virtual community of people who think like them, who share their ideals, and with whom they can consult and share advice. "The virtual community gives the 'lone wolf' social environment, support, and moral encouragement," Prof. Weimann notes.

The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

Another known example is the Internet activity that followed Mohamed Merah's attack killing four Jews in Toulouse a number of months ago. Monitoring the web, Prof. Weimann has observed that immediately after Merah was killed in a police siege, members of Jihadist online forums began praising Merah's act and encouraged additional acts like it.

A Facebook page praising the killings was promptly created and by the time it was closed down with the involvement of the French government, 500 Facebook users had joined it. According to Prof. Weimann, it is these types of forums and activity that must be monitored to locate and identify the next "lone wolf".

"Enlistment, confidence building, explanations as well as social support for the 'lone wolves' are all becoming available on the Internet. These sites can be monitored.

Depending on how deeply the law will get involved in this sort of Internet activity is what will determine the time it takes to sound the alarm on an individualist's intended act of terror.

Clearly, undercover agents will be able to penetrate the terrorists' social networks by becoming more familiar with this sort of activity," concludes Prof. Weimann.

.


Related Links
University of Haifa
The Long War - Doctrine and Application






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TERROR WARS
DHS Funded Study Finds Conciliatory Tactics More Effective Than Punishment In Reducing Terrorism
Washington DC (SPX) Aug 03, 2012
Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review. Titled, "Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel," the study looked specifically at the Israel ... read more


TERROR WARS
U.S. Patriot deal to boost Kuwait defenses

US plans $4.2 bn Patriot missile sale to Kuwait

Lockheed Martin Receives Contract For PAC-3 MSE Production

US building missile defense station in Qatar: report

TERROR WARS
Iran says upgraded short-range missile test-fired

Raytheon awarded contract to produce new Rolling Airframe Missile

Raytheon Evolved SeaSparrow program delivers 2,000th missile

New Raytheon warhead lethal to enemy rockets

TERROR WARS
Elbit Systems of America Showcases the Skylark I-LE Block II at AUVSI's Unmanned Systems North America 2012

US Marines to Keep K-Max in Theater for Second Deployment Extension

First East Coast Flight of X-47B Autonomous Unmanned Aircraft

Britain and France sign two deals on drone cooperation

TERROR WARS
NATO Special Forces Taps Mutualink for Global Cross Coalition Communications

Northrop Grumman Demonstrates Integrated Receiver Circuit Under DARPA Program

Boeing Receives 10th WGS Satellite Order from USAF

Lockheed Martin-built Military Communications Satellite Marks 20 Years in Service

TERROR WARS
Lockheed Martin, Raytheon Demonstrate SEWIP Electronic Attack Capability for US Navy at Rim of Pacific Exercise

New chemical sensor makes finding landmines and buried IEDs easier

Lockheed Martin's Gyrolink Selected for US Army's Remote - Vehicle Optics Sensor System Program

Northrop Grumman Next Gen Jammer Program Demonstrates Integrated Prime Power Generation System

TERROR WARS
Japan defence chief to meet US equal over Osprey

French defence spending spared cuts

BAE Systems posts flat first-half profits

Profit plunge at Italian aerospace giant Finmeccanica

TERROR WARS
British diplomats to attend Chinese trial of Bo Xilai's wife

China's Gu to be found guilty but spared execution

US criticizes new China garrison in tense sea

Pussy Riot trial tests rebranded Putin

TERROR WARS
Cutting the graphene cake

A giant step in a miniature world

A new era in modern analytical chemistry with Nano-FTIR

Entropy can lead to order, paving the route to nanostructures




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement