Subscribe free to our newsletters via your
. Space Travel News .




TERROR WARS
The 'lone wolf' terrorist
by Staff Writers
Haifa, Israel (SPX) Aug 06, 2012


The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

A mounting global threat is of terrorists who act as "lone wolves". Locating and preventing such terrorist activity is more complicated than organizational terror threats. A new study conducted by Prof. Gabriel Weimann of the University of Haifa, reveals that these "lone wolves" are not in fact so isolated and belong to virtual terrorist communities on the Internet.

"We may be able to better prevent 'lone wolf' terrorist attacks by following the radicalization of opinions being expressed online and by tracking the enlistment and training processes that are happening in that sphere," noted Prof. Weimann.In recent years the number of "lone wolf" terrorists has been on the rise.

They act alone, influenced by radical ideologies, and are not members of any organization or subjects of any organizational hierarchy, making it particularly difficult and almost impossible to locate them before they carry out attacks. Making it even more difficult to locate such individuals is the fact that they do not belong to any specific sector of the population and could in fact be "the guy next door".

According to Prof. Weimann, intelligence organizations are aware that much of the terrorist activity is shifting from the known terrorist organizations to "lone wolf" activity, and even President of the United States Barack Obama commented in 2011 that this type of attack has become the most likely to cause harm in the Western world.

In his new study, Prof. Weimann shows that these wolves are probably not so 'lonely'. As part of a long-term study that he launched over ten years ago, Prof. Weimann has been surveying encoded and public international terror organization websites, as well as sites supporting these organizations, forums, video clips, and whatever information there is on the net relating to global terrorism.

According to Prof. Weimann, most of the "lonely wolves" make contact, share information, and acquire training through the Internet, whether from sites that are linked with terror organizations, from forums supporting such organizations, or from other platforms.

In addition to this sort of "regular" activity on the web, social networks provide these individuals with their virtual wolfpack: a virtual community of people who think like them, who share their ideals, and with whom they can consult and share advice. "The virtual community gives the 'lone wolf' social environment, support, and moral encouragement," Prof. Weimann notes.

The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

Another known example is the Internet activity that followed Mohamed Merah's attack killing four Jews in Toulouse a number of months ago. Monitoring the web, Prof. Weimann has observed that immediately after Merah was killed in a police siege, members of Jihadist online forums began praising Merah's act and encouraged additional acts like it.

A Facebook page praising the killings was promptly created and by the time it was closed down with the involvement of the French government, 500 Facebook users had joined it. According to Prof. Weimann, it is these types of forums and activity that must be monitored to locate and identify the next "lone wolf".

"Enlistment, confidence building, explanations as well as social support for the 'lone wolves' are all becoming available on the Internet. These sites can be monitored.

Depending on how deeply the law will get involved in this sort of Internet activity is what will determine the time it takes to sound the alarm on an individualist's intended act of terror.

Clearly, undercover agents will be able to penetrate the terrorists' social networks by becoming more familiar with this sort of activity," concludes Prof. Weimann.

.


Related Links
University of Haifa
The Long War - Doctrine and Application






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








TERROR WARS
DHS Funded Study Finds Conciliatory Tactics More Effective Than Punishment In Reducing Terrorism
Washington DC (SPX) Aug 03, 2012
Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review. Titled, "Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel," the study looked specifically at the Israel ... read more


TERROR WARS
Ariane 5 performs 50th successful launch in a row

Boeing Delivers 2nd Intelsat 702MP Satellite to Sea Launch Home Port

The Indian GSAT-10 satellite is prepared for Arianespace's fifth Ariane 5 flight of 2012

Arianespace: 50 successful Ariane 5 launches in a row!

TERROR WARS
Mars Science Lab Curiosity Lands On Mars: First Photos

Mars Express marks the spot for Curiosity landing

Opportunity Prepares for Curiosity's Arrival

What to Expect When Curiosity Starts Snapping Pictures

TERROR WARS
US flags still on the moon, except one: NASA

Another Small Step for Mankind

Russia starts building Moon spaceship, eyes Lunar base

Plans to revisit Moon impeded by financial difficulties

TERROR WARS
Fly New Horizons through the Kuiper Belt

Hubble Discovers a Fifth Moon Orbiting Pluto

Hubble telescope spots fifth moon near Pluto

New Horizons Doing Science in Its Sleep

TERROR WARS
RIT Leads Development of Next-generation Infrared Detectors

UCF Discovers Exoplanet Neighbor

Can Astronomers Detect Exoplanet Oceans

The Mysterious Case of the Disappearing Dust

TERROR WARS
NASA cash boosts efforts for shuttle successor

NASA's Space Launch System Passes Major Agency Review, Moves to Preliminary Design

A Summer of Records for Engine Testing

NASA Tests Hypersonic Inflatable Heat Shield

TERROR WARS
China's Long March-5 carrier rocket engine undergoes testing

China to land first moon probe next year

China launches Third satellite in its global data relay network

Looking Forward to Shenzhou 10

TERROR WARS
Dawn Completes Intensive Phase Of Vesta Exploration

Planetary Resources Announces Agreement with Virgin Galactic for Payload Services

Explained: Near-miss asteroids

The B612 Foundation Announces The First Privately Funded Deep Space Mission




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement