Subscribe free to our newsletters via your
. Space Industry and Business News .




TERROR WARS
The 'lone wolf' terrorist
by Staff Writers
Haifa, Israel (SPX) Aug 06, 2012


The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

A mounting global threat is of terrorists who act as "lone wolves". Locating and preventing such terrorist activity is more complicated than organizational terror threats. A new study conducted by Prof. Gabriel Weimann of the University of Haifa, reveals that these "lone wolves" are not in fact so isolated and belong to virtual terrorist communities on the Internet.

"We may be able to better prevent 'lone wolf' terrorist attacks by following the radicalization of opinions being expressed online and by tracking the enlistment and training processes that are happening in that sphere," noted Prof. Weimann.In recent years the number of "lone wolf" terrorists has been on the rise.

They act alone, influenced by radical ideologies, and are not members of any organization or subjects of any organizational hierarchy, making it particularly difficult and almost impossible to locate them before they carry out attacks. Making it even more difficult to locate such individuals is the fact that they do not belong to any specific sector of the population and could in fact be "the guy next door".

According to Prof. Weimann, intelligence organizations are aware that much of the terrorist activity is shifting from the known terrorist organizations to "lone wolf" activity, and even President of the United States Barack Obama commented in 2011 that this type of attack has become the most likely to cause harm in the Western world.

In his new study, Prof. Weimann shows that these wolves are probably not so 'lonely'. As part of a long-term study that he launched over ten years ago, Prof. Weimann has been surveying encoded and public international terror organization websites, as well as sites supporting these organizations, forums, video clips, and whatever information there is on the net relating to global terrorism.

According to Prof. Weimann, most of the "lonely wolves" make contact, share information, and acquire training through the Internet, whether from sites that are linked with terror organizations, from forums supporting such organizations, or from other platforms.

In addition to this sort of "regular" activity on the web, social networks provide these individuals with their virtual wolfpack: a virtual community of people who think like them, who share their ideals, and with whom they can consult and share advice. "The virtual community gives the 'lone wolf' social environment, support, and moral encouragement," Prof. Weimann notes.

The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

Another known example is the Internet activity that followed Mohamed Merah's attack killing four Jews in Toulouse a number of months ago. Monitoring the web, Prof. Weimann has observed that immediately after Merah was killed in a police siege, members of Jihadist online forums began praising Merah's act and encouraged additional acts like it.

A Facebook page praising the killings was promptly created and by the time it was closed down with the involvement of the French government, 500 Facebook users had joined it. According to Prof. Weimann, it is these types of forums and activity that must be monitored to locate and identify the next "lone wolf".

"Enlistment, confidence building, explanations as well as social support for the 'lone wolves' are all becoming available on the Internet. These sites can be monitored.

Depending on how deeply the law will get involved in this sort of Internet activity is what will determine the time it takes to sound the alarm on an individualist's intended act of terror.

Clearly, undercover agents will be able to penetrate the terrorists' social networks by becoming more familiar with this sort of activity," concludes Prof. Weimann.

.


Related Links
University of Haifa
The Long War - Doctrine and Application






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TERROR WARS
DHS Funded Study Finds Conciliatory Tactics More Effective Than Punishment In Reducing Terrorism
Washington DC (SPX) Aug 03, 2012
Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review. Titled, "Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel," the study looked specifically at the Israel ... read more


TERROR WARS
EU fights to catch Chinese in Greenland rare-earths goldrush

Apple co-founder Wozniak sees trouble in the cloud

You and your smartphone bill

Too cool to follow the law

TERROR WARS
NATO Special Forces Taps Mutualink for Global Cross Coalition Communications

Northrop Grumman Demonstrates Integrated Receiver Circuit Under DARPA Program

Boeing Receives 10th WGS Satellite Order from USAF

Lockheed Martin-built Military Communications Satellite Marks 20 Years in Service

TERROR WARS
Ariane 5 performs 50th successful launch in a row

Boeing Delivers 2nd Intelsat 702MP Satellite to Sea Launch Home Port

The Indian GSAT-10 satellite is prepared for Arianespace's fifth Ariane 5 flight of 2012

Arianespace: 50 successful Ariane 5 launches in a row!

TERROR WARS
Mission accomplished, GIOVE-B heads into deserved retirement

Boeing Ships 3rd GPS IIF Satellite to Cape Canaveral for Launch

GPS Can Now Measure Ice Melt, Change In Greenland Over Months Rather Than Years

SSTL announces the launch of exactView-1

TERROR WARS
BAE Systems wins contract to upgrade S.Korean F-16 jets

Japan's ANA posts small Q1 net profit, reversing loss

Boeing 737 Performance Improvement Package Delivers on Promise to Cut Fuel Burn

Australia's Hawk jets reach 75,000 hours

TERROR WARS
Dutch firm ASML clinches 1.1 bn euro deal with Taiwan's TSMC

How to avoid traps in plastic electronics

HP claims win in legal battle with Oracle

Japan's Toshiba falls into quarterly net loss

TERROR WARS
Test flight over Peru ruins could revolutionize archaeological mapping

Interview With Scott Braun About NASA's Upcoming Hurricane Campaign

France orders Google to hand over Street View data

Space Technologies Tackle Human and Environmental Security Problems

TERROR WARS
Philippine gold mine suspended over spill

Top researcher snubs French honour over 'industrial crimes'

1 in 5 streams damaged by mine pollution in southern West Virginia

Suez Environment posts sharply lower Q2 profit




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement