Lone Wolf Terrorism (45 page)

Read Lone Wolf Terrorism Online

Authors: Jeffrey D. Simon

BOOK: Lone Wolf Terrorism
2.97Mb size Format: txt, pdf, ePub

lone wolves of the future learning to evade,
250

used for prevention and response,
215
–
17

verification vs. identification,
197

See also
face recognition; fingerprints; iris recognition;
photo inserts
; retina scanning

bioterrorism.
See
biological weapons

BioWatch system,
293
–
94n16

“Black Hand, The.”
See
“Union of Death”

“black swan” attacks,
107
,
279
–
80n51

Black Swan: The Impact of the Highly Improbable, The
(Taleb),
107

Black Tigers of the LTTE,
123

“black widows” in Chechen rebel movement,
124
,
125
,
135

Blaine, James G.,
151
,
152
,
154
,
155
,
178

Bledsoe, Carlos.
See
Muhammad, Abdulhakim Mujahid

Bloom, Mia,
283n36

bombings as a terrorist tactic,
vii
–
viii
,
37
,
40
,
44
,
61
,
101
,
104
,
109
,
132
,
226

as an “act of war,”
251

Congress passing law in 1956 on bombings of planes and commercial vehicles,
69

escalating to WMDs,
90
,
92

methods for identifying bombs,
186
–
89

monitoring purchases of bomb-making materials,
209

nail bombs,
24
,
31
,
190
,
203
,
213
.
See also
Copeland, David; Reilly, Nicky

psychological profiling,
217
–
19

use of by different types of lone wolves,
83

See also
Abu Nidal; Fuchs, Franz; Kaczynski, Theodore; Kurbegovic, Muharem; Lockerbie, Scotland, bombing plane over; Metesky, George; Narodnaya Volya; New York, NY; Norway; Oklahoma City, OK, bombing; planes and terrorism; Rudolph, Eric; suicide attacks; Tsarnaev, Dzhokhar; Tsarnaev, Tamerlan; vehicle bombing; Wall Street bombing of 1920; World Trade Center

Bonaparte, Napoleon, attempt to assassinate,
95

Book of Poison, The
(book found in Kurbegovic's apartment),
106

Booth, John Wilkes,
177

Boston Marathon bombing,
vii
–
viii

Boxer Rebellion,
158
,
289n45

Boyle, Maureen,
191

Branch Davidian cult,
17
,
47
,
84

Breivik, Anders,
49
–
54
,
86
,
202
,
231
,
242
,
257
,
272n42

manifesto of,
10
,
29
–
30
,
50
–
51
,
52
,
53
,
202
,
204
–
205
,
235
,
236

mental state of,
234

motivations of,
30
,
52
,
84
,
230

shootings at youth camp on Utoya Island,
10
,
19
,
40
,
83
,
230
,
240
,
241

use of the Internet,
29
–
30
,
52
,
84
,
202
,
204
–
205
,
206

vehicle bombs in Oslo,
10
,
19
,
40
,
83
,
230
,
241

See also
photo inserts

Bremer, Arthur,
177

Brinks armored car robbery,
281
–
82n24

Bristol, England, suicide bomb attempt,
24

Britain,
24
,
36
,
55
,
142
,
186
–
87
,
189
–
90
,
191
,
232
,
240

British case leading to the M'Naghten Rule,
289
–
90n58

See also
Choudhry, Roshonara; Copeland, David; Reilly, Nicky

British Overseas Airlines Corporation, hijackings,
116

Brokaw, Tom,
100

Brussel, James,
220
–
21

Buda, Mario,
15
,
16
,
18
,
19
,
94
–
95
,
104
–
105
,
241
.
See also
photo inserts

Bundy, McGeorge,
170

Bureau of Investigation (forerunner of FBI),
195

Bush, George W.,
182
,
252
,
303Appendixn6

Busic, Julienne and Zvonko,
116
–
17
,
118

Cambodia and Pol Pot,
286n1

Canadian Security Intelligence Service,
232

cargo screening,
187
–
88

Carnegie Mellon University,
200

Carter, Jimmy,
89
,
239

Case Closed
(Posner),
164
,
169

Casey, William M.,
196
,
217

Castro, Fidel,
168

CCTV.
See
closed-circuit television

Celexa (antidepressant drug),
98

Central Intelligence Agency (CIA),
23
,
81

Kanzi killing two CIA employees,
261

Charleston, South Carolina, massacre in,
vii
,
ix

Chechnya,
112

rebel movement

“black widows,”
124
,
125
,
135

efforts to sabotage the 2014 Winter Olympic Games in Russia,
246

use of rape to coerce women into combat,
283n36

chemical weapons as a terrorist tactic,
8
,
24
,
40
,
91
,
92
,
94
,
111

Alphabet Bomber's threats to use,
79
,
81
,
82
,
106

detection of,
193
,
206
,
209

the Internet as a source of information,
106
,
108

potassium chloride, plan to use to poison water supplies,
93

threat to use in Cyprus,
72
–
74
,
85

as WMD of choice for lone wolves,
108

See also specific chemicals, i.e.,
potassium chloride, sarin gas,
etc.

Chernobyl, Soviet Union, nuclear reactor disaster,
73

Chesterton, IN, plane bombing over,
69
–
70
,
267n4

Chicago, AQAP attempt to send bombs to,
186

Chicago Tribune
(newspaper),
117

China, Boxer Rebellion in,
158
,
289n45

Choudhry, Roshonara,
139
–
43
,
203
,
234
,
248
,
285n69
.
See also
photo inserts

Christian Democrats party (in Netherlands),
64

“Christian extremism,”
51
.
See also
Breivik, Anders

Christian Identity movement,
44
,
45
,
57
,
63

CIA.
See
Central Intelligence Agency

Civil Aviation Administration,
69
,
264

Civil Service Commission,
157

civil-service reforms after Garfield assassinated,
150
,
157

CJIS.
See
Criminal Justice Information Services Division (CJIS) of the FBI

Clark, Judith,
281
–
82n24

Clarke, James,
153
,
160
,
177

Clinton, Bill,
49
,
175

closed-circuit television (CCTV),
189
–
94
,
205
,
213
,
215
–
16

“smart CCTV,”
193
–
94
,
199

Cold War,
121
,
170
,
237

USS
Cole
(destroyer),
279
–
80n51

Commander Nemo of Force Majerus.
See
Koupparis, Panos

Committee on Public Safety in France,
286n1

communicate, encouraging lone wolves to,
222
–
24

Communism,
34
,
170

and Lee Harvey Oswald,
148
,
166
,
178

lone wolves advocating end of,
81
,
85

community outreach to counterterrorism,
212

Conkling, Roscoe,
153

Connally, John,
167
,
169

Consolidated Edison “Con Ed,”
219
,
220
,
221
,
223

“conspiracy” theories

and assassinations,
148
,
168
–
69
,
170

and September 11, 2001,
147
–
48

Copeland, David (aka “London Nailbomber”),
24
,
31
,
190
–
91
,
213

counter-ideology,
210

counterterrorism,
27
,
56
,
106
–
107
,
119
,
181
–
227
,
245
,
257
,
259

impact of lone wolves on,
252
–
53

as a propaganda war,
210
–
12

Counterterrorism Division of the FBI,
208

Counterterrorism Section of the Department of Justice,
101

“Country Reports on Terrorism” (US State Department),
303Appendixn1

Covenant, the Sword, and the Arm of the Lord (white-supremacist group),
93

creative and innovative nature of lone wolves,
21
–
22
,
85
,
103
–
107
,
112
,
241
–
42
,
255

future innovations,
248
–
50

Criminal Justice Information Services Division (CJIS) of the FBI,
196
,
197
.
See also
photo inserts

criminal lone wolves,
45
,
67
–
74
,
83
,
84
,
85
,
86
,
263
.
See also
Graham, John Gilbert; Koupparis, Panos

Croatian extremists,
77
,
116
,
117

Cruise, Tom,
200

CSI
(TV show),
214

Cuba

Cuban missile crisis,
170
,
291n86

Oswald wishing to move to,
166
,
178

cyanide, use of in Tylenol capsules,
86

cyberterrorism as a terrorist tactic,
32
–
33
,
40
,
105
,
302n11

potential threats in future,
248
–
49

Cyprus, threat to use dioxin in,
72
–
74
,
84
,
86

Czolgosz, Leon,
158
–
63
,
176
,
177
,
178
,
290nn59
,
64
.
See also
photo inserts

Dallas, TX, and assassination of Kennedy,
167

Danzig, Richard,
111
,
250

Daschle, Tom,
100

Davis, David,
190

DDoS.
See
distributed denial of service attacks

“dead-enders,”
303Appendixn6

Death of a President, The
(Manchester),
148

Defenbaugh, Danny,
48

Dekmejian, R. Hrair,
146
,
176
–
77

denial of service.
See
distributed denial of service attacks

de Nugent, John,
58

Denver plane bombing.
See
Graham, John Gilbert

Department of Defense,
194
,
196
,
251
,
303Appendixn6

Department of Homeland Security,
23
–
24
,
36
,
195

and aftermath of the killing of bin Laden,
54

Automated Biometric Identification System (IDENT),
195

on dangers of lone wolves and rightwing extremists,
36

Future Attribute Screening Technology (FAST),
199
–
201

National Operations Center,
205

Department of Justice,
98
,
102

Counterterrorism Section,
101

Department of Transportation,
76

detection devices,
185
–
89
,
200
,
235
,
257
.
See also
closed-circuit television (CCTV)

Detroit, MI, attempted plane bombing over.
See
Abdulmutallab, Umar Farouk

Deutsche Bank,
121

din rodef
,
173

distributed denial of service attacks (DDoS),
105

DNA analysis, use of for identification,
196
–
97
,
214

Other books

B00AFU6252 EBOK by Alba, Jessica
The Truth is Dead by Marcus Sedgwick, Sedgwick, Marcus
Inside Straight by Banks, Ray
Little, Big by John Crowley
Men of No Property by Dorothy Salisbury Davis
Cam - 04 - Nightwalkers by P. T. Deutermann