Read Lone Wolf Terrorism Online
Authors: Jeffrey D. Simon
41
. William M. Casey, interview with author, February 22, 2012, Clarksburg, West Virginia.
42
. “The Biometric News Portal,”
http://www.biometricnewsportal.com/biometrics_definition.asp
(accessed February 20, 2012); “Introduction to Biometrics”;
National Biometrics Challenge
, pp. 11â15;
CJIS Annual Report 2011
, p. 24; “Biometrics,” Global Security, July 13, 2011,
http://www.globalsecurity.org/security/systems/biometrics.htm
(accessed March 20, 2012).
43
. Stephen G. Fischer Jr., interview with author, February 22, 2012, Clarksburg, West Virginia.
44
. “Biometric News Portal”; “Biometrics.”
45
. Rym Momtaz and Lee Ferran, “French School Shooter Was on US No Fly List,” ABC News,
http://abcnews.go.com/Blotter/french-school-shooter-us-fly-list/story?id=15981115#.T24CfxxBnw4
(accessed March 23, 2012); Scott Sayare, “Suspect in French Killings Slain as Police Storm Apartment after 30-Hour Siege,”
New York Times
, March 22, 2012,
http://www.nytimes.com/2012/03/23/world/europe/mohammed-merah-toulouse-shooting-suspect-french-police-standoff.html
(accessed March 23, 2012).
46
.
National Biometrics Challenge
, p. 20.
47
. Margit Sutrop and Katrin Laas-Mikko, “From Identity Verification to Behavior Prediction: Ethical Implications of Second Generation Biometrics,”
Review of Policy Research
29, no. 1 (2012): 21â36; Ellen Messmer, “Can Behavioral Biometrics Help Detect Terrorists Entering the U.S.?” Network World, September 22, 2010,
http://www.networkworld.com/news/2010/092210-biometrics.html
(accessed March 19, 2012).
48
.
Privacy Impact Assessment for the Future Attribute Screening Technology (FAST) Project
, Science and Technology Directorate, Department of Homeland Security, December 15, 2008, p. 2.
49
. Declan McCullagh, “Real-Life âMinority Report' Program Gets a Try-Out,”
CBS News, October 7, 2011,
http://www.cbsnews.com/2100-503063_162-20117207.html
(accessed March 26, 2012).
50
.
Privacy Impact Assessment
, p. 4.
51
. Sharon Weinberger, “Terrorist âPre-Crime' Detector Field Tested in United States,”
Nature
, May 27, 2011,
http://www.nature.com/news/2011/110527/full/news.2011.323.html
(accessed March 24, 2012); McCullagh, “Real-Life âMinority Report' Program”; Wilmer Heck, “EU to Monitor Deviant Behavior in Fight against Terrorism,”
Spiegel Online International
, October 21, 2009,
http://www.spiegel.de/international/europe/0,1518,656468,00.html
(accessed March 24, 2012).
52
. Elizabeth Montalbano, “Homeland Security Tests Crime Prediction Tech,”
Information Week
, October 11, 2011,
http://www.informationweek.com/news/government/security/231900555
(accessed March 24, 2012).
53
. Weinberger, “Terrorist âPre-Crime' Detector.”
54
. Joseph A. Bernstein, “Big Idea Seeing Crime before It Happens,”
Discover Magazine
, January 23, 2012,
http://discovermagazine.com/2011/dec/02-big-idea-seeing-crime-before-it-happens/article_view?b_start:int=1&-C
(accessed March 26, 2012).
55
. Steven Cherry and Anne-Marie Corely, “Loser: Bad Vibes: A Quixotic U.S. Government New Security System Seeks to Look into Your Soul,”
IEEE Spectrum
, January 2010,
http://spectrum.ieee.org/computing/embedded-systems/loser-bad-vibes
(accessed March 24, 2012).
56
. Sageman,
Leaderless Jihad
, p. 114.
57
. Ibid., pp. 115â16.
58
. Ibid., p. 122.
59
. Charlie Savage, “Homeland Analysts Told to Monitor Policy Debates in Social Media,”
New York Times
, February 22, 2012,
http://www.nytimes.com/2012/02/23/us/house-questions-homeland-security-program-on-social-media.html
(accessed March 27, 2012).
60
. Ibid.
61
. Lori Andrews, “Facebook Is Using You,”
New York Times
, February 4, 2012,
http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using-you.html?pagewanted=all
(accessed March 31, 2011).
62
. Mark F. Giuliano, interview with author, October 1, 2009, Washington, DC.
63
. David Johnston and James Risen, “Lone Terrorists May Strike in the U.S., Agencies Warn,”
New York Times
, February 23, 2003,
http://www.nytimes.com/2003/02/23/world/threats-responses-domestic-security-lone-terrorists-may-strike-us-agencies-warn.html?pagewanted=all&src=pm
(accessed April 1, 2012).
64
. Michael Brick, “Man Crashes Plane into Texas I.R.S. Office,”
New York Times
, February 18, 2010,
http://www.nytimes.com/2010/02/19/us/19crash.html?_r=1
(accessed April 2, 2012).
65
. Matthew Harwood, “Tripping up Terrorists,”
Security Management
, January 2012,
http://www.securitymanagement.com/print/9356
(accessed April 1, 2012).
66
. Sageman,
Leaderless Jihad
, pp. 156â57.
67
. Ibid., pp. 151â54; Liat Shetret, “Use of the Internet for Counter-Terrorist Purposes,” Policy Brief, Center on Global Counterterrorism Cooperation, February 2011, pp. 6â7.
68
. Shetret, “Use of the Internet,” p. 6.
69
. “Empowering Local Partners to Prevent Violent Extremism in the United States,” Office of the Press Secretary, White House, August 2011,
http://www.whitehouse.gov/the-press-office/2011/08/03/empowering-local-partners-prevent-violent-extremism-united-states
(accessed April 2, 2012).
70
. Benjamin Weiser and Colin Moynihan, “A Guilty Plea in Plot to Bomb Times Square,”
New York Times
, June 22, 2010,
http://query.nytimes.com/gst/fullpage.html?res=9B05E0DA1030F931A15755C0A9669D8B63&pagewanted=allAft
(accessed April 10, 2012).
71
. Carl Franzen, “How Faisal Shahzad Was Apprehended, Step by Step,” AOL News, May 4, 2010,
http://www.aolnews.com/2010/05/04/how-faisal-shahzad-was-apprehended-step-by-step/
(accessed April 10, 2012); “FBI Team âLost' Suspected Times Square Bomber during Critical Hours,” Fox News, May 5, 2010,
http://www.foxnews.com/us/2010/05/05/fbi-team-lost-suspected-times-square-bomber-crucial-hours/
(accessed April 10, 2012). After learning Shahzad's identity, the FBI placed him on the no-fly list and alerted other federal agencies that he was a suspect in the attempted bombing in Times Square. An updated no-fly list, however, had not yet been activated in computer systems. That was how Shahzad was able to board the plane. It wasn't until Shahzad was already on the plane that Customs and Border Protection officials received the final passenger list with his name from Emirates Airlines. Had the authorities been just a few minutes late before notifying air-traffic control at Kennedy Airport to not allow the plane to take off, Shahzad would have safely fled the country.
72
.
CJIS Annual Report 2011
, p. 18.
73
. Yanjun Yan and Lisa Ann Osadciw, “Bridging Biometrics and Forensics,” in
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, ed. Edward J. Delp, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon (San Jose, CA: ProceedingsâSPIE, 2008).
74
. Fischer Jr., interview.
75
.
CJIS Annual Report 2011
, p. 24.
76
. Casey, interview.
77
.
Lone-Wolf Terrorism
, pp. 26, 66; Adrian Bridge, “Austria's âUnabomber' Taunts Police with History and Myth,”
Independent
, December 15, 1996,
http://www.independent.co.uk/news/world/austrias-unabomber-taunts-police-with-history-and-myth-1314636.html
(accessed April 11, 2012).
78
.
Lone-Wolf Terrorism
, pp. 80â82; Ramon Spaaij,
Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention
(New York: Springer, 2012), pp. 84â86.
79
. Ibid.
80
. Ibid.
81
. Michael M. Greenburg,
The Mad Bomber of New York: The Extraordinary True Story of the Manhunt That Paralyzed a City
(New York: Union Square Press, 2012), p. 79; Spaaij,
Understanding Lone Wolf Terrorism
, pp. 23â24; Melissa Ann Madden, “George Metesky: New York's Mad Bomber (City Under Siege),” TruTV Crime Library,
http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/1.html
(accessed April 12, 2012
).
82
. Don DeNevi and John H. Campbell,
Into the Minds of Madmen: How the FBI's Behavioral Science Unit Revolutionized Crime Investigation
(Amherst, NY: Prometheus Books, 2004), pp. 60â65; Lyn Bixby, “âMad Bomber' of Waterbury Terrorized New York for 17 Years,”
Hartford Courant
, July 2, 1995,
http://articles.courant.com/1995-07-02/news/9507020146_1_unabomber-s-signature-first-bomb-george-metesky
(accessed April 12, 2012); Madden, “George Metesky (Small Beginnings),” TruTV Crime Library,
http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/2.html
(
accessed April 12, 2012
).
83
. DeNevi and Campbell,
Into the Minds of Madmen
, pp. 60â65.
84
. Madden, “George Metesky (The Game Begins),” TruTV Crime Library,
http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/5.html
(accessed April 12, 2012); Madden, “George Metesky (Revelations),” TruTV Crime Library,
http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/7.html
(accessed April 12, 2012); DeNevi and Campbell,
Into the Minds of Madmen
, pp. 60â65.
85
. Madden, “George Metesky (Aftermath),” TruTV Crime Library,
http://www.trutv.com/library/crime/terrorists_spies/terrorists/metesky/9.html
(accessed April 12, 2012); Alexander Feinberg, “Edison Clerk Finds Case in File; Bomber's Words Alerted Her,”
New York Times
, January 23, 1957, p. 18; “The Bomber's Grievances Came to Light in a Series of Letters,”
New York Times
, January 23, 1957, p. 19; Malcolm Gladwell, “Dangerous Minds: Criminal Profiling Made Easy,”
New Yorker
, November 12, 2007,
http://www.newyorker.com/reporting/2007/11/12/071112fa_fact_gladwell
(accessed April 12, 2012); Michael T. Kaufman, “âMad Bomber,' Now 70, Goes Free Today,”
New York Times
, December 13, 1973, p. 1.
86
. “Bomber's Grievances Came to Light.”
87
. “Extremist Chatter Praises Eric Rudolph as âHero,'” Anti-Defamation League,
June 3, 2003,
http://www.adl.org/presrele/asus_12/4264_72.htm
(accessed April 14, 2012).
88
. Edecio Martinez, “Joe Stack Is a âTrue American Hero': Facebook Groups Support Domestic Terrorist,” CBS News, February 19, 2010,
http://www.cbsnews.com/8301-504083_162-6223132-504083.html
(accessed May 8, 2011).
89
. Andrea Canning and Lee Ferran, “Stack's Daughter Retracts âHero,' Statement,” ABC News, February 22, 2010,
http://abcnews.go.com/GMA/joe-stacks-daughter-samantha-bell-calls-dad-hero/story?id=9903329#.T4svwBxBnw5
(accessed April 14, 2012).
90
. Jeffrey D. Simon, “Biological Terrorism: Preparing to Meet the Threat,”
Journal of the American Medical Association
278, no. 5 (August 6, 1997): 428â30.
CHAPTER 7. UNCOVERING THE LESSONS LEARNED
1
. George Santayana,
Reason in Common Sense
, vol. 1,
The Life of Reason, or, The Phases of Human Progress
(New York: Scribner's, 1905), p. 284.
2
. Matthew Cole, “New Al Qaeda Video: American Muslims Should Buy Guns, Start Shooting People,” ABC News, June 3, 2011,
http://abcnews.go.com/Blotter/al-qaeda-video-buy-automatic-weapons-start-shooting/story?id=13704264#.T5bzKxxLmfc
(accessed April 24, 2012).
3
. David Ljunggren, “Al Qaeda Challenges with Lone Wolf Tactics: Canada,” Reuters, April 23, 2012,
http://www.reuters.com/article/2012/04/23/us-alqaeda-idUSBRE83M1HP20120423
(accessed April 23, 2012).
4
. Claire Sterling,
The Terror Network
(New York: Henry Holt, 1981).
5
. Jerry S. Piven, “On the Psychosis (Religion) of Terrorists,” in
Terror and the Apocalypse: Psychological Undercurrents of History, Volume II
, ed. Jerry S. Piven, Paul Zilio, and Henry W. Lawton (Lincoln, NE: Bloomusalem Press, 2002), p. 186.
6
. Jeffrey D. Simon,
The Terrorist Trap: America's Experience with Terrorism
, 2nd ed. (Bloomington: Indiana University Press, 2001), pp. 5â6.
7
. See, for example, Martha Crenshaw, “The Causes of Terrorism,” in
International Terrorism
, ed. Charles W. Kegley Jr. (New York: St. Martin's Press, 1990), p. 121; John Horgan,
The Psychology of Terrorism
(London: Routledge, 2005), pp. 62â79; Marc Sageman,
Leaderless Jihad: Terror Networks in the Twenty-First Century
(Philadelphia: University of Pennsylvania Press, 2008), pp. 62â65; Jerrold M. Post,
The Mind of the Terrorist: The Psychology of Terrorism from the IRA to al-Qaeda
(New York: Palgrave Macmillan, 2007), pp. 3â4.
8
. Christopher Hewitt,
Understanding Terrorism in America: From the Klan to al Qaeda
(London: Routledge, 2003), p. 80.
9
. Ibid.
10
. Ramon Spaaij, “The Enigma of Lone Wolf Terrorism: An Assessment,”
Studies in Conflict & Terrorism
33, no. 9 (2010): 862.
11
. Horgan,
Psychology of Terrorism
, p. 48.