. Energy News .




.
TERROR WARS
The 'lone wolf' terrorist
by Staff Writers
Haifa, Israel (SPX) Aug 06, 2012

The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

A mounting global threat is of terrorists who act as "lone wolves". Locating and preventing such terrorist activity is more complicated than organizational terror threats. A new study conducted by Prof. Gabriel Weimann of the University of Haifa, reveals that these "lone wolves" are not in fact so isolated and belong to virtual terrorist communities on the Internet.

"We may be able to better prevent 'lone wolf' terrorist attacks by following the radicalization of opinions being expressed online and by tracking the enlistment and training processes that are happening in that sphere," noted Prof. Weimann.In recent years the number of "lone wolf" terrorists has been on the rise.

They act alone, influenced by radical ideologies, and are not members of any organization or subjects of any organizational hierarchy, making it particularly difficult and almost impossible to locate them before they carry out attacks. Making it even more difficult to locate such individuals is the fact that they do not belong to any specific sector of the population and could in fact be "the guy next door".

According to Prof. Weimann, intelligence organizations are aware that much of the terrorist activity is shifting from the known terrorist organizations to "lone wolf" activity, and even President of the United States Barack Obama commented in 2011 that this type of attack has become the most likely to cause harm in the Western world.

In his new study, Prof. Weimann shows that these wolves are probably not so 'lonely'. As part of a long-term study that he launched over ten years ago, Prof. Weimann has been surveying encoded and public international terror organization websites, as well as sites supporting these organizations, forums, video clips, and whatever information there is on the net relating to global terrorism.

According to Prof. Weimann, most of the "lonely wolves" make contact, share information, and acquire training through the Internet, whether from sites that are linked with terror organizations, from forums supporting such organizations, or from other platforms.

In addition to this sort of "regular" activity on the web, social networks provide these individuals with their virtual wolfpack: a virtual community of people who think like them, who share their ideals, and with whom they can consult and share advice. "The virtual community gives the 'lone wolf' social environment, support, and moral encouragement," Prof. Weimann notes.

The researcher presents a number of examples of such terrorists who supposedly acted alone. It was revealed that American officer Nidal Hasan, who shot and killed thirteen American soldiers, had communicated with a known terrorist through the Internet. Arif Uka, a young Bosnian who shot and killed American soldiers in Frankfurt, was a Facebook friend of various known Islamist radicals.

Another known example is the Internet activity that followed Mohamed Merah's attack killing four Jews in Toulouse a number of months ago. Monitoring the web, Prof. Weimann has observed that immediately after Merah was killed in a police siege, members of Jihadist online forums began praising Merah's act and encouraged additional acts like it.

A Facebook page praising the killings was promptly created and by the time it was closed down with the involvement of the French government, 500 Facebook users had joined it. According to Prof. Weimann, it is these types of forums and activity that must be monitored to locate and identify the next "lone wolf".

"Enlistment, confidence building, explanations as well as social support for the 'lone wolves' are all becoming available on the Internet. These sites can be monitored.

Depending on how deeply the law will get involved in this sort of Internet activity is what will determine the time it takes to sound the alarm on an individualist's intended act of terror.

Clearly, undercover agents will be able to penetrate the terrorists' social networks by becoming more familiar with this sort of activity," concludes Prof. Weimann.

Related Links
University of Haifa
The Long War - Doctrine and Application




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries




.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



TERROR WARS
DHS Funded Study Finds Conciliatory Tactics More Effective Than Punishment In Reducing Terrorism
Washington DC (SPX) Aug 03, 2012
Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review. Titled, "Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel," the study looked specifically at the Israel ... read more


TERROR WARS
Test flight over Peru ruins could revolutionize archaeological mapping

Interview With Scott Braun About NASA's Upcoming Hurricane Campaign

France orders Google to hand over Street View data

Space Technologies Tackle Human and Environmental Security Problems

TERROR WARS
Raytheon completes GPS OCX iteration 1.4 Critical Design Review

Mission accomplished, GIOVE-B heads into deserved retirement

Boeing Ships 3rd GPS IIF Satellite to Cape Canaveral for Launch

GPS Can Now Measure Ice Melt, Change In Greenland Over Months Rather Than Years

TERROR WARS
WSU researcher sees how forests thrive after fires and volcanoes

New Hampshire leads U.S. in tree cover

Turkmenistan to plant huge forest in Aral Sea region

Taking Stock Of Georgia State Forests

TERROR WARS
German National Academy of Sciences issues a critical statement on the use of bioenergy

U.S, Australian navies focus on new fuels

Strategies to improve renewable energy feedstocks

Brazil to build first algae-based biofuel plant

TERROR WARS
SolarCraft Brings Solar to Altamont Apartments

Walmart Unveils 100th Solar Installation in California

Tecta Solar Completes Solar Photovoltaic Installation at Augustine Casino

REC rolls out its industry-leading certification program for solar installers in the US

TERROR WARS
Mexico goes ahead with wind power project

Wales wind power line plans draw protests

Offshore use of vertical-axis wind turbines gets closer look

SeaRoc to provide full installation services on Narec's Offshore Anemometry Hub

TERROR WARS
53 rescued from China coal mine: state media

Huge Australian coal mine wins conditional approval

Russia expands presence on Spitsbergen

Australia scraps coal port expansion

TERROR WARS
Tibetan sets himself alight in China: group

Workshop blast in east China kills 13

China's passion for fashion catapults blogger to stardom

China accuses US of prejudice on religious issues


Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement