Since the terrorist attacks of September 11, 2001, the manifestation of terrorism as a form of conflict has seen the introduction and expansion of different unconventional methods designed to achieve an array of political, religious and ideological objectives. Of such examples, the concept of ‘lone-wolf’ terrorism has re-emerged as what is perceived to be a relatively contemporary yet effective tactic, causing particular concern among counter-terrorism institutes. Moreover, it has incited claims by noted authorities reiterating its status as a threat, including a statement given by US President Barack Obama claiming that lone-wolf terrorism is the primary threat to US security.
This essay seeks to discern the unique dynamics of lone-wolf terrorism, focussing on five particular aspects of the concept; first, its definition and how this distinguishes it from other forms of terrorism; second, the lack of a definitive background and how this makes terrorist profiling a difficult task; third, the notion of self-radicalisation and the …show more content…
challenge the internet creates for counter-radicalisation forces; fourth, the absence of connections with larger terrorist organisations and how this adversely affects terrorist identification and preventative action; and fifth, the potential lethality of attacks and how this provokes government authorities. The essay consequently argues that lone-wolf terrorism’s presence as a challenge to counter-terrorism organisations has been a direct product of the unique dynamics encompassed by the concept.
Defining lone-wolf terrorism
In an attempt to establish a context from which to analyse the dynamics of lone-wolf terrorism, various strategic scholars have offered their own educated definitions of the concept.
While this may allow for a broadened understanding of the identity of lone-wolf terrorists, it has also caused the term to be confused with other similar notions, in particular that of ‘sleeper operatives’; this has posed a dilemma to counter-terrorist and law enforcement agencies aiming to distinguish the lone-wolf terrorist from other operatives, primarily due to the fact that excessively generalised definitions of lone-wolf terrorism inadvertently encompass traits that incorporate other tactics. As a result, the distinctive nature of lone-wolf terrorism tends to be disregarded through a loss of clarity on the
issue.
To avoid the aforementioned ambiguities, the following discussion considers the definition suggested by Stratfor’s Fred Burton and Scott Stewart, who state that, “a lone wolf is a standalone operative who by his very nature is embedded in the targeted society and is capable of self-activation at any time”. While this definition exemplifies attributes that are often associated with similar types of terrorism, it is the particular reference to ‘self-activation’ that differentiates lone-wolf terrorism from such other types; for example, sleeper operatives also act alone and embed themselves in the given target society, yet they are activated through communication with extended organisations. Lone-wolf terrorists, however, are predisposed to self-activation ensuing from their own construction of motives and the strategies designed to achieve them. While this clarification reveals the definitional discrepancy, other challenges concerning identification exist as equally significant challenges to countering lone-wolf terrorism.
No distinct background
It is evident that the myriad of profiles under which lone-wolf terrorists construct their plans and attacks presents an arduous task to counter-terrorism groups. The variation in the types of background from which these radicalised individuals appear prevents such security units from fabricating any datasets relating to recurrent patterns or correlations between the individual and their methodology. While the general processes exhibited by various lone-wolf terrorists are reflective of pre-existing extremist characteristics, the objectives and driving factors vary greatly; individuals represent a multitude of divergent ideological, religious and political backgrounds ranging from white supremacy to environmental extremism. This diversity can be elucidated by examining two dissimilar cases of lone-wolf terrorism; the example of Eric Roberts Rudolph, known most commonly for his bombings in Atlanta in the 1980s, epitomises a religiously motivated case that contrasts with that of Theodore John Kaczynski, whose comparatively ideological motives led him to carry out a sequence of attacks over several years and earned him his title as the Unabomber. While both were considered right-wing extremists, the differences between their radical foundations confine them to their own respective classifications as lone-wolf terrorists.
In his teenage years, Eric Rudolph had been exposed to anti-Semitic and white supremacist views introduced to him through immersion in the Church of Israel. The combination of his mother’s imperious nature regarding the church, and his juvenile age, served as prime catalysts for a mentality susceptible to extremist influences. Furthermore, the notion of the “Christian Identity” movement, advocated by the majority of churches attended by Rudolph at the time, functioned as the foremost source of his radicalisation and encouraged his intense views; the system maintained that concepts and practises including miscegenation, abortion and homosexuality were evil, stimulating Rudolph’s characteristic attacks.
Between 1996 and 1998, Rudolph carried out four bomb attacks. The first occurred at Atlanta’s Centennial Olympic Park, killing one person and injuring 111, while the remaining three attacks took place at an abortion clinic in Atlanta, a gay/lesbian nightclub in the same city, and an abortion clinic in Alabama respectively. In total, two people died and more than 150 sustained injuries as result of the four incidents. Despite the relatively low number of deaths, the Rudolph case demonstrates how an embedded history of religious influence contributed to his development as a terrorist.
In contrast to the radical religious elements exhibited by Rudolph, Theodore Kaczynski’s case depicts an ideological foundation illustrated by his strong anti-industrial sentiments. As a proficient student, Kaczynski entered Harvard University in 1958 at the age of sixteen, where he pursued mathematical studies. Already predisposed to social seclusion due to factors including but not limited to the age difference he faced at university, his beliefs became amalgamated into a more tangible conviction; an intense preoccupation with studies inspired him to question the purpose of his education. As noted by Nathan R. Springer in his thesis on the patterns of radicalisation, Kaczynski ‘began to recognize his feelings of loathing toward his personal situation and hate toward society’. Such notions gradually developed into the anti-industrial, pro-environmentalist attitude expressed in Kaczynski’s own manifesto, Industrial Society and Its Future, in which he writes,
The Industrial Revolution and its consequences have been a disaster for the human race. They have greatly increased the life-expectancy of those of us who live in “advanced” countries, but they have destabilized society… There is no way of reforming or modifying the system so as to prevent it from depriving people of dignity and autonomy.
The bombings carried out by Kaczynski between 1978 and 1995 reflected his political direction in the same way that Rudolph’s attacks displayed his religious views; various airline companies, namely Boeing, United Airlines and American Airlines were targeted, while universities including Vanderbilt University and the University of Illinois also experienced attacks. Comparing the casualties to Rudolph’s case, only three people were killed alongside 23 injuries. In Kaczynski’s circumstance, however, it was his Neo-Luddhite antics that posed an equivalent challenge to law enforcement authorities attempting to comprehend his developmental process and the motives it involved.
Each of the presented cases offers an insight into the expanse of motivations and ideological influences encompassed by lone-wolf terrorism. As a counter-terrorism issue, the concern caused by a lack of any specific profile is entrenched in the task of establishing a comprehensive background from which to analyse underlying factors responsible for extremist inspiration; much of the process of terrorist identification relies on a deeper understanding of personal influences, which is increasingly difficult to achieve with a growth in the number of different ideologies encouraging lone-wolf terrorism. The Rudolph and Kaczynski cases, for example, followed two tremendously different developmental patterns, offering few consistent correlations other than the similar nature of their isolationist habits following their attacks. Moreover, the problem of this scarce knowledge regarding social and developmental influences on personal motivation is exacerbated by closely related key dynamics of lone-wolf terrorism, in particular when approaching the issue of self-radicalisation.
Self-radicalisation online
The characteristic of self-activation proposed by Burton and Stewart is essentially the secondary outcome of another challenging facet of lone-wolf terrorism that stems from the fundamental procedure of radicalisation. While previous examples of extremist individuals have revealed prolonged radicalisation processes and demarcated ideological exposure, the modernisation of technology and communication capabilities has allowed self-radicalisation to occur throughout a progressively expanding network. The internet, in particular, poses an unquestionable problem to counter-terrorism groups; its anonymity, accessibility and generally detached nature are significant issues that have characterised its predisposition to promoting lone-wolf terrorism.
In a self-radicalisation case study on Abdul Basheer Abdul Kader, Kumar Ramakrishna notes that individuals exposed to radical ideas on the internet cultivate ‘deeply dehumanised notions about their enemies’, such that they ‘will not necessarily shy away from mass-casualty terrorist attacks on civilian populations’. The desensitisation associated with online content is a crucial factor employed by terrorist groups including Al Qaeda, whose promotion of lone-wolf terrorism is prominent in their online English magazine Inspire. In the autumn 2011 issue of the magazine, one article encourages the extremist individual to ‘pursue his everyday life in a natural way, and to pursue jihad and Resistance in secrecy and alone’; this blatant enforcement of lone-wolf traits is an indicator of the path that Al Qaeda and many other terrorist groups have taken in virtually ‘recruiting’ individuals. Other radical material, including that expressing Jihadist connotations, exists online in copious quantities, enforcing the same ideals and beliefs that terrorists in the past have been exposed to primarily through more physically-based interaction.
Despite the presence of clear and unrestricted content on such extremist websites, distinguishing material with a potential for violent individual radicalisation from material that is radical yet innocuous presents a significant challenge for counter-radicalisation. As stated by former GCHQ senior official John Bassett,
the challenge... is to produce good intelligence that gives advanced warning of attacks without either suffocating in huge masses of irrelevant material or intruding unduly into civil liberties.
To identify and regulate each individual website, blog, or link pertaining to lone-wolf terrorism would therefore be inconceivable, if not counter-productive. However, insufficient scrutiny of accessible terrorist propaganda would have detrimental effects and verify a lack of thoroughness on the behalf of intelligence organisations. To demonstrate the effortlessness with which stimulus material can be distributed online, the ‘manifesto’ of Norwegian lone-wolf Anders Behring Breivik is commonly used as an example. Breivik, who killed a total of 77 people in both Oslo and Utøya during a bombing and mass shooting attack on July 22, 2011, electronically distributed his script on the morning of the events. Titled 2083 – A European Declaration of Independence, the 1518 page compendium of his ideologies was designed as a foundation for expressing and sharing his radically patriotic European perspectives. In it, he provides numerous methods for further circulation of the text, recommending links and explaining in detail how to utilise various websites in order to fulfil his ambition of imposing radical views upon the European population.
It is inevitable that counter-terrorism is hindered by the expanse of social content online, dramatically offsetting the balance between existing problems and the efficiency of approaches taken towards confronting them. Terrorist organisations have acknowledged and exploited this weakness, relying increasingly on their inspiration of individuals and then allowing the resulting radicalisation to yield a functioning product of their terrorist ideals; principally, an individual capable of engaging in violence without any direct link to the initial terrorist organisation.
Absence of links to organisations
A core component of the self-radicalised extremist’s modus operandi is the entirely solitary nature of conduct exhibited by the individual. By lacking any external links to primary organisations, lone-wolves possess comparative immunity against the processes of identification and monitoring undertaken by intelligence groups. The foremost basis of this is the absence of communication with other groups or even individuals; the success of counter-terrorism operations relies heavily on effective interception of communication lines and the detection of suspicious material, including information transmitted via emails and mobile phone messages. In contrast, lone-wolf terrorists depend on evasive tactics by ensuring that such material does not exist in any traceable form. Lone-wolves have naturally acknowledged the risk associated with communication of procedures, locations and objectives; in Breivik’s declaration, he insists,
you will increase your chance of being apprehended by 100% for every person you involve. Don’t trust anyone unless you absolutely need to (which should never be the case). Do absolutely everything yourself.
Considering the surreptitious and autonomous nature of lone-wolf operations, intelligence agencies are consequently troubled by the inevitable shift towards clandestine individual procedures as a means of avoiding exposure. However, to escalate the problem of identification, there is also a general degree of ambiguity created when successfully apprehended lone-wolves proclaim direct affiliation with a given terrorist group. For example, Toulouse terrorist Mohammed Merah was already recognised as a criminal by French authorities before instigating three attacks that killed seven people in total. However, it was only during a standoff, in which he was eventually shot dead, that he made allusions to a connection with Al Qaeda. While French intelligence had initially dismissed Merah as a relatively low threat, prior knowledge of his alleged association with Al Qaeda could have facilitated his monitoring and possibly prevented his attacks. Nevertheless, by limiting communication and distinguished links to organisations, lone-wolf terrorists like Merah have adequate time to execute their plans before being captured.
Lethality of attacks
Numerous scholars and intelligence experts have argued that lone-wolf terrorist attacks do not pose a significant threat because the number of casualties resulting from such incidents is relatively low. However, these claims are influenced by the specialist’s perceived definition of lone-wolf terrorism. For example a 2010 in the journal Studies in Conflict & Terrorism asserts that,
The largest numbers of casualties associated with attacks that correspond to the proposed definition of lone wolf terrorism are eighteen (Joseph Paul Franklin, 1977–80) and ten (Mark Essex, 1972–73), both in the United States. Although the information presented is accurate according to the definition applied in the given article, it is also limited by this factor. Other definitions would comprise lone-wolves including Anders Breivik and Timothy McVeigh, whose attacks killed 77 and 168 respectively, greatly exceeding the killings of both Franklin and Essex. Examining the Breivik case merely in terms of its lethality offers a new perspective on the danger of lone-wolf terrorism; as a terrorist radicalised largely by online material, including content propagated by Al Qaeda, Breivik was capable of independently procuring the necessary equipment, weaponry and information that he needed to successfully target his victims. While his intent was to kill all 600 people in Utøya, the effectiveness of his attacks gained international recognition and has since been used as a pivotal reference point for security statements regarding lone-wolf terrorism.
On August 16, 2011, President Barack Obama nationally announced that lone-wolf terrorism is the primary security concern for the US. Affirming his apprehension towards the possibility of another attack ‘of the sort that we saw in Norway recently’, he acknowledged the dire consequences that such a terrorist incident would entail. This augmented recognition has resulted in a shift of counter-terrorism priorities towards lone-wolf terrorism. Organisations have, as a result, begun to display a greater degree of awareness where individuals demonstrating radical behaviour show a potential for violent action. Security planning for London 2012 Olympics in particular has seen previously unanticipated measures being implemented to prevent a lone-wolf attack; at least 500 MI5 agents have already been deployed by the British government to monitor the games, focussing solely on information and insights pertinent to the event itself. Essentially, the varying lethality of individual terrorist attacks, including the potential damage of such inexpert and often improvised incidents, has directly impacted upon the counter-terrorism strategies of several governments. Many continue to reshape their terrorist policy systems in order to accommodate for this changing threat.
Conclusion
Ultimately, the mutually constitutive nature in which the five proposed dynamics influence each other is a critical aspect of the predicament lone-wolf terrorism presents for counter-terrorism institutions. While the subject remains relatively understudied in comparison to the extensive evaluations of other terrorist methodologies, there exists a corpus of incidents and evidence to suggest its prominence as a security threat. Furthermore, an expanding array of manifestos and case studies confirms the extent to which lone-wolf terrorism impedes upon counter-terrorism. The political, religious and ideological objectives pursued by lone-wolves, and their modus operandi for achieving them, have effectively instilled a renewed fear in governments that has not been so prominent since the months following the September 11 attacks.
As a concept that has experienced reformation in recent years, lone-wolf terrorism is recognised as an effective and considerably dangerous tactic distinguished by its unique factors. These dynamics therefore pose an unavoidable and arduous challenge for intelligence agencies and law enforcement establishments alike, and will undoubtedly remain of high priority to such institutions as the threat of lone-wolf terrorism persists.
Bibliography
Ahmed, Houriya, “The Frightening Rise of Lone-Wolf Terrorism”, The Henry Jackson Society, 6 August 2011, at http://henryjacksonsociety.org/2011/08/06/the-frightening-rise-of-lone-wolf-terrorism/, [accessed 18 May 2012].
Al-Suri, Abu Mus’ab, “The Jihadi Experiences: The Main Arenas of Operation for Individual Jihad”, Inspire, 1:8, Fall 2011, pp. 18-19.
Apps, Peter, “Analysis: Radicalized online, "lone wolves" hard to combat”, Reuters, 29 July 2011, at http://www.reuters.com/article/2011/07/29/us-norway-lonewolf-idUSTRE76S1FR20110729, [accessed 7 May 2012].
Bakker, Edwin & de Graaf, Beatrice, “Preventing Lone Wolf Terrorism: some CT Approaches Addressed”, Perspectives on Terrorism, 5:5-6, December 2011, pp. 43-50.
Bartlett, Jamie & Miller, Carl, “The Edge of Violence: Towards Telling the Difference Between Violent and Non-Violent Radicalization”, Terrorism and Political Violence, 24:1, January 2012, pp. 1-21.
Berwick, Andrew, 2083 – A European Declaration of Independence, London, 2011.
“Breivik describes hunting down teenage victims”, CTV News, 20 April 2012, at http://www.ctv.ca/CTVNews/TopStories/20120420/norway-breivik-qaeda-20120420/, [accessed 25 May 2012].
Burton, Fred & Stewart, Scott, “The ‘Lone’ Wolf Disconnect”, Stratfor, 30 January 2008, at http://www.stratfor.com/weekly/lone_wolf_disconnect, [accessed 19 May 2012].
Fonda, Daren, “How Luck Ran Out For A Most Wanted Fugitive", Time Magazine, 9 June 2003, at http://www.time.com/time/magazine/article/0,9171,1004966,00.html, [accessed 29 April 2012].
Foxell, Joseph W., “How Is the Terrorist Threat Changing?”, American Foreign Policy Interests: The Journal of the National Committee on American Foreign Policy, 31:6, December 2009, p. 389-399.
Jordan, Javier, “Analysis of Jihadi Terrorism Incidents in Western Europe, 2001–2010”, Studies in Conflict & Terrorism, 35:5, May 2012, pp. 382-484.
Kaczynski, Theodore, The Unabomber Manifesto: Industrial Society and Its Future, Berkeley, CA: Jolly Roger Press, 1995.
Lakhani, Suraj, “Mohammed Merah – Lone Wolf or Al-Qa’ida Operative?”, Peritus Magazine, 10 April 2012, at http://www.peritusmagazine.com/categorie/opinion/mohammed-merah---lone-wolf-or-al-qaida-operative/127, [accessed 8 May 2012].
Laville, Sandra, “Unpredictable ‘lone wolves’ pose biggest Olympic security threat”, The Guardian, 9 March 2012, at http://www.guardian.co.uk/uk/2012/mar/09/lone-wolves-olympic-security-threat, [accessed 27 April 2012].
‘Lone-Wolf’ Attacks: A Developing Islamist Extremist Strategy?, Unclassified Intelligence Assessment, Ontario: Integrated Threat Assessment Center, 2007.
Matthew Schofield, “After bin Laden’s death, offshoots and lone wolves keep terrorism danger high”, The Denver Post, 29 April 2012, at http://www.denverpost.com/nationworld/ci_20505219/after-bin-ladens-death-offshoots-and-lone-wolves, [accessed 8 May 2012].
“Obama: 'Lone wolf ' terror attack biggest concern”, CBS News, 16 August 2011, at http://www.cbsnews.com/stories/2011/08/16/ap/government/main20093283.shtml, [accessed 18 April 2012].
“Obituary: Toulouse gunman Mohamed Merah”, BBC News, 22 March 2012, at http://www.bbc.co.uk/news/world-europe-17456541, [accessed 3 May 2012].
“Out of the woods”, The Economist, 5 June 2003, at http://www.economist.com/node/1827143, [accessed 13 May 2012].
Petraeus, David H. & Amos, James F., FM 3-24 Counterinsurgency, Washington, DC: Headquarters, Department of the Army, 2006.
“Profile: Timothy McVeigh”, BBC News, 11 May 2001, at http://news.bbc.co.uk/2/hi/americas/1321244.stm, [accessed 13 May 2012].
Ramakrishna, Kumar, Self-Radicalisation: The Case of Abdul Basheer Abdul Kader, Case Study, Singapore: Nanyang Technological University, 2007.
“Raw Data: Timeline in Eric Rudolph Case”, Fox News, 2 June 2003, at http://www.foxnews.com/story/0,2933,88269,00.html, [accessed 13 May 2012].
Seegmiller, Beau, “Radicalized Margins: Eric Rudolph and Religious Violence”, Terrorism and Political Violence, 19:4, October 2007, pp. 511-528.
Spaaij, Ramón, “The Enigma of Lone Wolf Terrorism: An Assessment”, Studies in Conflict & Terrorism, 33:9, August 2010, pp. 854-870.
Springer, Nathan R., “Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst”, PhD thesis, Naval Postgraduate School, California, 2009.
Stewart, Scott, “Cutting Through the Lone Wolf Hype”, Stratfor, 22 September 2011, at http://www.stratfor.com/weekly/20110921-cutting-through-lone-wolf-hype, [accessed 19 May 2012].
Theodore Kaczynski Chronology”, San Francisco Chronicle, 23 January 1998, at http://www.sfgate.com/cgi-bin/article.cgi?f=/e/a/1998/01/23/NEWS9250.dtl, [accessed 16 May 2012].
Walton, Stephen J., “Anti-feminism and Misogyny in Breivik 's "Manifesto"”, NORA - Nordic Journal of Feminist and Gender Research, 20:1, March 2012, pp. 4-11.
--------------------------------------------
[ 1 ]. Javier Jordan, “Analysis of Jihadi Terrorism Incidents in Western Europe, 2001–2010”, Studies in Conflict & Terrorism, 35:5, May 2012, p. 389.
[ 2 ]. Fred Burton & Scott Stewart, “The ‘Lone’ Wolf Disconnect”, Stratfor, 30 January 2008, at http://www.stratfor.com/weekly/lone_wolf_disconnect, [accessed 19 May 2012].
[ 3 ]. David H. Petraeus & James F. Amos, FM 3-24 Counterinsurgency, Washington, DC: Headquarters, Department of the Army, 2006, p. 6.
[ 4 ]. Ramón Spaaij, “The Enigma of Lone Wolf Terrorism: An Assessment”, Studies in Conflict & Terrorism, 33:9, August 2010, p. 866.
[ 5 ]. Edwin Bakker & Beatrice de Graaf, “Preventing Lone Wolf Terrorism: some CT Approaches Addressed”, Perspectives on Terrorism, 5:5-6, December 2011, p. 44.
[ 6 ]. Daren Fonda, “How Luck Ran Out For A Most Wanted Fugitive", Time Magazine, 9 June 2003, at http://www.time.com/time/magazine/article/0,9171,1004966,00.html, [accessed 29 April 2012].
[ 7 ]. Beau Seegmiller, “Radicalized Margins: Eric Rudolph and Religious Violence”, Terrorism and Political Violence, 19:4, October 2007, p. 515.
[ 8 ]. “Raw Data: Timeline in Eric Rudolph Case”, Fox News, 2 June 2003, at http://www.foxnews.com/story/0,2933,88269,00.html, [accessed 13 May 2012].
[ 9 ]. Nathan R. Springer, Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst, PhD thesis, Naval Postgraduate School, California, 2009, p. 37.
[ 10 ]. Theodore Kaczynski, The Unabomber Manifesto: Industrial Society and Its Future, Berkeley, CA: Jolly Roger Press, 1995, p. 5.
[ 11 ]. “Theodore Kaczynski Chronology”, San Francisco Chronicle, 23 January 1998, at http://www.sfgate.com/cgi-bin/article.cgi?f=/e/a/1998/01/23/NEWS9250.dtl, [accessed 16 May 2012].
[ 12 ]. ‘Lone-Wolf’ Attacks: A Developing Islamist Extremist Strategy?, Unclassified Intelligence Assessment, Ontario: Integrated Threat Assessment Center, p. 5.
[ 13 ]. “Out of the woods”, The Economist, 5 June 2003, at http://www.economist.com/node/1827143, [accessed 13 May 2012].
[ 14 ]. Bakker & de Graaf, “Preventing Lone Wolf Terrorism”, p. 45.
[ 15 ]. Houriya Ahmed, “The Frightening Rise of Lone-Wolf Terrorism”, The Henry Jackson Society, 6 August 2011, at http://henryjacksonsociety.org/2011/08/06/the-frightening-rise-of-lone-wolf-terrorism/, [accessed 18 May 2012].
[ 16 ]. Kumar Ramakrishna, Self-Radicalisation: The Case of Abdul Basheer Abdul Kader, Case Study, Singapore: Nanyang Technological University, 2007, p. 3.
[ 17 ]. Matthew Schofield, “After bin Laden’s death, offshoots and lone wolves keep terrorism danger high”, The Denver Post, 29 April 2012, at http://www.denverpost.com/nationworld/ci_20505219/after-bin-ladens-death-offshoots-and-lone-wolves, [accessed 8 May 2012].
[ 18 ]. Abu Mus’ab Al-Suri, “The Jihadi Experiences: The Main Arenas of Operation for Individual Jihad”, Inspire, 1:8, Fall 2011, p. 18.
[ 19 ]. Peter Apps, “Analysis: Radicalized online, "lone wolves" hard to combat”, Reuters, 29 July 2011, at http://www.reuters.com/article/2011/07/29/us-norway-lonewolf-idUSTRE76S1FR20110729, [accessed 7 May 2012].
[ 20 ]. Stephen J. Walton, “Anti-feminism and Misogyny in Breivik 's "Manifesto"”, NORA - Nordic Journal of Feminist and Gender Research, 20:1, March 2012, p. 4.
[ 21 ]. Andrew Berwick, 2083 – A European Declaration of Independence, London, 2011, p. 8.
[ 22 ]. Schofield, “After bin Laden’s death”.
[ 23 ]. Jamie Bartlett & Carl Miller, “The Edge of Violence: Towards Telling the Difference Between Violent and Non-Violent Radicalization”, Terrorism and Political Violence, 24:1, January 2012, p. 13.
[ 24 ]. Berwick, A European Declaration of Independence, p. 844.
[ 25 ]. “Obituary: Toulouse gunman Mohamed Merah”, BBC News, 22 March 2012, at http://www.bbc.co.uk/news/world-europe-17456541, [accessed 3 May 2012].
[ 26 ]. Suraj Lakhani, “Mohammed Merah – Lone Wolf or Al-Qa’ida Operative?”, Peritus Magazine, 10 April 2012, at http://www.peritusmagazine.com/categorie/opinion/mohammed-merah---lone-wolf-or-al-qaida-operative/127, [accessed 8 May 2012].
[ 27 ]. Scott Stewart, “Cutting Through the Lone Wolf Hype”, Stratfor, 22 September 2011, at http://www.stratfor.com/weekly/20110921-cutting-through-lone-wolf-hype, [accessed 19 May 2012].
[ 28 ]. Spaaij, “The Enigma of Lone Wolf Terrorism”, p. 865.
[ 29 ]. “Profile: Timothy McVeigh”, BBC News, 11 May 2001, at http://news.bbc.co.uk/2/hi/americas/1321244.stm, [accessed 13 May 2012].
[ 30 ]. “Breivik describes hunting down teenage victims”, CTV News, 20 April 2012, at http://www.ctv.ca/CTVNews/TopStories/20120420/norway-breivik-qaeda-20120420/, [accessed 25 May 2012].
[ 31 ]. “Obama: 'Lone wolf ' terror attack biggest concern”, CBS News, 16 August 2011, at http://www.cbsnews.com/stories/2011/08/16/ap/government/main20093283.shtml, [accessed 18 April 2012].
[ 32 ]. Joseph W. Foxell, “How Is the Terrorist Threat Changing?”, American Foreign Policy Interests: The Journal of the National Committee on American Foreign Policy, 31:6, December 2009, p. 398.
[ 33 ]. Sandra Laville, “Unpredictable ‘lone wolves’ pose biggest Olympic security threat”, The Guardian, 9 March 2012, at http://www.guardian.co.uk/uk/2012/mar/09/lone-wolves-olympic-security-threat, [accessed 27 April 2012].