Skip to main content

Two decades after 9/11: Deciphering lone wolf attacks and their methods (Part 3)

IN the final part of this article, I would like to dwell more on lone wolf attacks by extremist groups. Lone wolves will become the “new norm” for current and future terrorist attacks.

As proven in Auckland, New Zealand, terrorist Ahamed Aathil Mohamed entered a supermarket, snatched a knife from the shelf and stabbed seven individuals, critically injuring three of them. With a simple plan and no expenses, the terrorist completed his “mission” even though he knew he would die as a result of his crime.

Despite the fact that security and intelligence officials knew Aathil was capable of committing a crime, they were powerless to stop him on this occasion. That demonstrates how dangerous the extremists are to the society.

In most circumstances, they will act as a sleeper cell, and security agencies could only act once the attacks have been carried out.

Lone wolves

Lone wolves are the term for these terrorists. They are regarded a low-risk terrorist, supporter or sympathiser because they have no obvious ties to any terror organisation. Furthermore, they employ inferior and readily available weapons in their attacks to ensure a high level of casualties.

They are regarded the less significant terrorist in most situations, such as the Reading, Streatham, and London bridge attacks, although their strikes can be devastating.

Unfortunately, there is no universally agreed-upon definition for a lone wolf terrorist. According to criminologist Joel A Capellan, there are two types of lone wolf terrorists.

The most visible are lone wolves who are either not affiliated with any terrorist organisations or have not gotten any aid from them. Typically, they radicalised themselves by devising their own attack strategy.

The other type is connected to certain terror network. While they may act alone, these individuals are directed by a certain terrorist organisation. From the outset to the finish of any terror act, the leader of a terrorist group will train these lone wolves by offering all help and support.

But there are also two other types; which is the lone wolf pack, where a group of people having become self-radicalised. And finally, the lone attacker, who attacks alone, with the direct backing and influence of a terror organisation.

Overall, this is an unprecedented phenomenon. Finding a member of a sleeper cell or a lone wolf is a challenge for our intelligence and security forces. Lone wolves are distinguished by their independence.

They usually act without direct supervision and through premeditated planning. They are also emotionally disturbed and have weak interpersonal/social skills.

But according to Bruce Hoffman, a senior fellow at the Combating Terrorism Centre at the United States Military Academy, the lone wolf terrorist concept is not new. He also said that lone wolf attacks are less violent than other types of terrorism.

However, he warned that the growing number of lone wolf threats could overwhelm and divert intelligence and law enforcement resources.

Clear and present danger

The rule of law is never acknowledged or followed by terrorists or their organisations. They are vicious individuals. Their only goal is to meet benchmarks and maintain their ideology. Anything else won’t matter to them.

Terrorism takes on new forms all the time and they use a variety of methods. They always seem to find a small window of opportunity to carry out their deadly acts, such as in Auckland, Nice, Paris, Brussels and London. The intelligence and security services should act against these terrorist organisations.

These groups’ methods are changing to include non-conventional weapons such as kitchen knives and vehicles. Furthermore, they are deceiving security forces and the public by wearing phony suicide vests to “protect” themselves.

They are effectively utilising technology to their advantage, employing it to plan and execute their operation while avoiding detection by intelligence agencies.

Lone wolves are difficult to spot. In general, they look like any one of us and tend to keep a low profile, to avoid exposing themselves to intelligence or security authorities.

Furthermore, our security agencies are perplexed as to how to prevent lone wolf attacks. Therefore, the public must take a proactive role by notifying these agencies if any of their family members or friends are found acting “strangely”.

To confront this group’s ideology, intelligence and security agencies must work with religious authorities. They also need to build a powerful narrative against this ideology by identifying what the religion’s genuine teachings are. Furthermore, they can employ artificial intelligence (AI) to counter the terrorist groups’ propaganda materials.

To summarise, the rise of the Taliban and the unwillingness of international organisations like the United Nations (UN) and the Organisation of Islamic Cooperation (OIC) to issue a forceful statement condemning the Taliban’s atrocities sends a wrong message to the world, particularly foreign terrorist groups.

Another “Sept 11 attack” is unfathomable, and with the COVID-19 pandemic still active, another war on terror is out of the question.

Therefore, all countries must work together to push the current Taliban Government in Afghanistan to honour the Doha Agreement, or risk economic sanctions, which will compel them to fulfil their duties under the agreement. – Sept 13, 2021

Source: https://focusmalaysia.my/two-decades-after-9-11-deciphering-lone-wolf-attacks-and-their-methods-part-3/

Comments

Popular posts from this blog

Terrorism in Africa

According to state.gov, ISIS was defeated a few years ago. However, the organization's presence and existence remain conspicuous in Africa. Ongoing conflicts in Somalia, Ethiopia, Mozambique, Nigeria, and Burkina Faso demonstrate that ISIS has shifted its focus away from Iraq and Syria. Although ISIS lacks a clear hierarchy like Al-Qaeda, its followers and supporters wholeheartedly believe in its strong ideology. In 2014, the United States led the formation of a broad international coalition known as 'The Global Coalition to Defeat ISIS' to combat the organization during the height of the Syrian and Iraqi conflict. The primary objectives of this 83-member coalition are to degrade and defeat ISIS, which poses a threat to international peace and security. ISIS has brought thousands of foreign fighters from around the world to combat zones like Syria and Iraq, and it has used technology to promote its violent extremist ideology and instigate terrorist attacks. For example, t

Sedition Act 1948 should have been repealed a long time ago. But why?

THE Sedition Act 1948 is a legislative measure that was enacted in Malaysia during the colonial era, designed to curb any form of speech or expression that was deemed to be seditious in nature with the aim of maintaining public order and security. The Sedition Act has been subject to much debate and criticism, with some arguing that it is a violation of freedom of speech and expression. Despite this, the Act remains in force in Malaysia to this day, albeit with some amendments made over the years. Although I concur with the abolition of this Act, it is imperative that a comparable new legislation be enacted to address the escalating prevalence of racially and religiously bigoted remarks that have been unsettling our distinctive multicultural and multi-religious society as of late. An instance that exemplifies the prudent decision-making of the governing body is the substitution of the Internal Security Act of 1960 with the Security Offences (Special Measures) Act 2012 (SOSMA). This rep

THE HISTORY OF TERRORISM: MORE THAN 200 YEARS OF DEVELOPMENT

The history of terrorism dates back at least 1500 years when Jewish resistance groups (66 - 72 A.D.) known as Zealots killed Roman soldiers and destroyed Roman property. The term assassin comes from a Shi'ite Muslim sect (Nizari Isma'ilis - also known as hashashins "hashish-eaters") fighting Sunni Muslims (1090 - 1275) and during Medieval Christendom resisting occupation during the Crusades (1095-1291). The hashashins were known to spread terror in the form of murder, including women and children. The brotherhood of Assassins committed terror so as to gain paradise and seventy-two virgins if killed and to receive unlimited hashish while on earth. The modern development of terrorism began during the French Revolution's Reign of Terror (1793 - 1794). During this period the term terrorism was first coined. Through the past two hundred years, terrorism has been used to achieve political ends and has developed as a tool for liberation, oppression, and i