Skip to main content

Responses

  • Chapter
  • First Online:
Book cover Understanding Lone Wolf Terrorism

Part of the book series: SpringerBriefs in Criminology ((BRIEFSCRIMINOL))

  • 2962 Accesses

Abstract

When people are targeted by a terrorist attack, among the first questions that typically follow—apart from “why?” or “why us?”—are whether the attack could have been prevented, and what should be done in response. It is therefore no surprise that the output of counterterrorism literature has dramatically accelerated, especially since 9/11. This literature shows that a wide range of counterterrorist policies and programs have been tried over the years with mixed success, and that there are substantial dissimilarities between the counterterrorism approaches of different countries depending, among other factors, on historical factors, a country’s experiences with terrorism, and its political system and culture. As will be seen, responses to lone wolf terrorism are equally context-specific, reflecting a variety of counterterrorism and police cultures and legal traditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Transnational lone wolf terrorism can be defined as involving terrorist activities carried out by individuals who are foreign based or whose activities transcend national boundaries. Franz Fuchs’ bomb attacks in Austria and Germany are an example of lone wolf terrorism that transcends national boundaries, as is that by Umar Farouk Abdulmutallab, a 23-year-old Nigerian citizen who detonated an explosive device that was attached to his body aboard a flight from Amsterdam to Detroit in 2009 (see Appendix).

References

  1. Schmid AP, Crelinsten RD (eds) (1993) Western responses to terrorism. Frank Cass, London

    Google Scholar 

  2. Alexander Y (ed) (2002) Combating terrorism: Strategies of ten countries. University of Michigan Press, Ann Arbor

    Google Scholar 

  3. van Leeuwen M (ed) (2003) Confronting terrorism: European experiences threat perceptions and policies. Kluwer, The Hague

    Google Scholar 

  4. von Hippel K (ed) (2005) Europe confronts terrorism. Palgrave, London

    Google Scholar 

  5. TTSRL (2008) Radicalisation, recruitment and the EU counter-radicalisation strategy. European Commission Sixth Framework program Transnational Terrorism, Security and the Rule of Law, Brussels

    Google Scholar 

  6. TTSRL (2008) Mapping counterterrorism. European Commission Sixth Framework program Transnational Terrorism, Security and the Rule of Law, Brussels

    Google Scholar 

  7. Sederberg PC (1989) Terrorist myths: illusion, rhetoric, and reality. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  8. Sederberg PC (2003) Global terrorism: problems of challenge and response. In: Kegley CW Jr (ed) The new global terrorism: characteristics, causes, controls. Prentice Hall, Upper Saddle River, pp 267–284

    Google Scholar 

  9. Wilkinson P (2006) Terrorism versus democracy: the liberal state response, 2nd edn. Routledge, London

    Google Scholar 

  10. Brysk A, Shafir G (eds) (2007) National insecurity and human rights: Democracies debate counterterrorism. University of California Press, Berkeley

    Google Scholar 

  11. Bianchi A, Keller A (eds) (2008) Counterterrorism: democracy’s challenge. Hart Publishing, Portland

    Google Scholar 

  12. Crelinsten RD (2009) Counterterrorism. Polity, Cambridge

    Google Scholar 

  13. Martin G (2003) Understanding terrorism: challenges, perspectives, and issues. Sage, Thousands Oaks

    Google Scholar 

  14. Bazan EB (2004) Intelligence reform and terrorism prevention act of 2004: ‘lone wolf’amendment to the foreign intelligence surveillance act. CRS report for Congress. Congressional Research Service, Washington

    Google Scholar 

  15. Al Jazeera (2011) Obama signs patriot act extension. Al Jazeera, 27 May. http://english.aljazeera.net/news/americas/2011/05/201152715850301322.html. Accessed 9 July 2011

  16. Scahill T (2006) The domestic security enhancement act of 2003: a glimpse into a post-patriot act approach to combating domestic terrorism. CR: New Centennial Rev 6(1):69–94

    Article  Google Scholar 

  17. Bellia PL (2005) The ‘lone wolf’ amendment and the future of foreign intelligence surveillance law. Villanova Law Rev 50:425–455

    Google Scholar 

  18. Greenwald G (2011) An un-American response to the Oslo attack. Salon.com, 28 July. http://www.salon.com/news/opinion/glenn_greenwald/2011/07/28/norway. Accessed 29 July 2011

  19. American Civil Liberties Union (2011) House passes extension of overbroad patriot act provisions. http://www.aclu.org/national-security/house-passes-extension-overbroad-patriot-act-provisions. Accessed 20 Aug 2011

  20. American Civil Liberties Union 2011b Patriot Act: Eight years later. http://www.reformthepatriotact.org/. Accessed 20 August 2011

  21. American Civil Liberties Union (2009) Reclaiming patriotism: a call to reconsider the patriot act. ACLU, New York

    Google Scholar 

  22. Crelinsten RD, Schmid AP (1993) Western responses to terrorism: a twenty-five year balance sheet. In: Schmid AP, Crelinsten RD (eds) Western responses to terrorism. Frank Cass, London, pp 307–340

    Google Scholar 

  23. Crelinsten RD (1998) The discourse and practice of counter-terrorism in liberal democracies. Aust J Politics Hist 44(1):389–413

    Article  Google Scholar 

  24. Pedahzur A, Ranstorp M (2001) A tertiary model for countering terrorism in liberal democracies: the case of Israel. Terrorism Political Violence 13(2):1–26

    Article  Google Scholar 

  25. Karpin M, Friedman I (1998) Murder in the name of God: the plot to kill Yitzhak Rabin. Henry Holt and Co, New York

    Google Scholar 

  26. Sprinzak E (1999) Brother against brother: violence and extremism in Israeli politics from Altalena to the Rabin assassination. The Free Press, New York

    Google Scholar 

  27. Rodgers W (1995) Anti-Rabin sentiment had turned ugly: confessed assassin had been seen before. CNN World News, 5 November. http://www.cnn.com/WORLD/9511/rabin/why_now/index.html. Accessed 9 June 2007

  28. Commissie Van den Haak (2002) De veiligheid en beveiliging van Pim Fortuyn: Feiten en verantwoordelijkheden. SDU Uitgevers, The Hague

    Google Scholar 

  29. Brandt P, Sandler T (2010) What do transnational terrorists target? Has it changed? Are we safer? J Conflict Resolut 54(2):214–236

    Article  Google Scholar 

  30. Harpviken KB (2011) Norway after the terror. Plato’s Cave Blog, 1 August. http://platoscaveblog.wordpress.com/2011/08/01/norway-after-the-terror/. Accessed 5 Aug 2011

  31. Europol (2011) TE-SAT 2011: EU terrorism situation and trend report. Europol, The Hague

    Google Scholar 

  32. Shone A (2010) Countering lone wolf terrorism: sustaining the CONTEST vision. http://www.henryjacksonsociety.org/stories.asp?id=1582. Accessed 12 Aug 2011

  33. Stewart S (2011) Norway: lessons from a successful lone wolf attacker. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20110727-norway-lessons-successful-lone-wolf-attacker. Accessed 30 July 2011

  34. Stewart S (2011) Al Qaeda’s new video: a message of defeat. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20110608-AlQaedas-new-video-message-defeat. Accessed 30 July 2011

  35. Brock P (1999) The profiling method(s): interview mit Thomas Müller. Berliner Zeitung, 29 December

    Google Scholar 

  36. Stewart S, Burton F (2008) Lone wolf lessons. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20090603_lone_wolf_lessons. Accessed 4 Nov 2010

  37. Williams C (2011) Deadly, cruel lesson from Norway. The Australian, 26 July 11

    Google Scholar 

  38. Temple-Raston D (2010) Lone-wolf plots alter anti-terrorism strategy in US. National Public Radio, 30 December. http://www.npr.org/2010/12/30/132447190/lone-wolf-plotsalter-u-s-anti-terrorism-strategy. Accessed 6 Aug 2011

  39. Cruickshank P, Lister T (2011) The ‘lone wolf’—the unknowable terror. CNN Security Clearance Blog, 7 September. http://security.blogs.cnn.com/2011/09/07/the-lone-wolf-the-unknowable-face-of-terror/. Accessed 9 Sept 2011

  40. Clough S (2000) Copeland took nail bomb to a park to pass the time. The Daily Telegraph, 9 June

    Google Scholar 

  41. Metropolitan Police Service (2000) Copeland case special edition. The Job, 30 June

    Google Scholar 

  42. Hopkins N, Hall S (2000) David copeland: a quiet introvert, obsessed with Hitler and bombs. The Guardian, 30 June. http://www.guardian.co.uk/uk/2000/jun/30/uksecurity.sarahhall

  43. Müller T (2006) Beestmensen: vermomming leugens en strategie van seriemoordenaars. Mets & Schilt, Amsterdam

    Google Scholar 

  44. von Goos H (2005) Der Großwildjäger. Der Spiegel, 3 January

    Google Scholar 

  45. Grassl-Kosa M, Steiner H (1996) Der Briefbomber ist unter uns. GKS, Wien

    Google Scholar 

  46. Pühringer M (2003) Briefbomben: universalgenie franz fuchs? http://www.wienweb.at/content.aspx?id=59329&channel=2&cat=32. Accessed 17 June 2007

  47. TTSRL (2007) The evolving threat of terrorism in policymaking and media discourse. European Commission Sixth Framework program Rransnational Terrorism, Security and the Rule of Law, Brussels

    Google Scholar 

  48. Heinz W (2007) Germany: State responses to terrorist challenges and human rights. In: Brysk A, Shafir G (eds) National insecurity and human rights: democracies debate counterterrorism. University of California Press, Berkeley, pp 157–176

    Google Scholar 

  49. Friedrichsen G (1999) Nur irgendein Kasperl? Der Spiegel. 22 February, pp 184–186

    Google Scholar 

  50. Mappes-Niediek N (1997) Zufall führte zum österreichischen ‘Bombenhirn’. Berliner Zeitung, 4 October

    Google Scholar 

  51. Thomson JA (2007) Beating the odds: In the war on terrorism, it takes both skill and chance. RAND Rev 31(3):30

    Google Scholar 

  52. Johnson SC (1998) Psychological evaluation of theodore John Kaczynski. Federal Correctional Institution Butner, North Carolina

    Google Scholar 

  53. Kurtz H (1995) Unabomber manifesto is published: public safety reasons cited in joint decision by Post, NY Times. The Washington Post, 19 Sept, A01

    Google Scholar 

  54. Hoffman B (1998) Inside terrorism. Columbia University Press, New York

    Google Scholar 

  55. Laqueur W (1993) The uses and limits of intelligence. Transaction Publishers, Brunswick, NJ

    Google Scholar 

  56. Weimann G (2006) Terror on the internet. United States Institute of Peace Press, Washington, DC

    Google Scholar 

  57. Schwirtz M (2011) Norway’s premier vows to keep an open society. The New York Times, 27 July

    Google Scholar 

  58. MacDougall I Ritter K (2011) Norway PM: attacks response to be ‘more democracy’, The Washington Times, 27 July

    Google Scholar 

  59. MacDougall I Ritter K (2011) Norway suspect also considered other targets. Denver Post, 31 July

    Google Scholar 

  60. Pogatchnik S (2011) Oslo bombing: Norway police’s response to massacre criticized. Huffington Post, 6 Sept

    Google Scholar 

  61. Wildavsky A (1988) Searching for safety. Transaction Publishers, New Brunswick

    Google Scholar 

  62. Coaffee J (2006) From counterterrorism to resilience. The Eur Legacy 11(4):389–403

    Article  Google Scholar 

  63. Furedi F (2007) Invitation to terror: the expanding empire of the unknown. Continuum, London

    Google Scholar 

  64. Bakker E, de Graaf B (2010) Lone wolves: how to prevent this phenomenon?. International Centre for Counter-Terrorism, The Hague

    Google Scholar 

  65. Schuster H, Stone C (2005) Hunting eric rudolph. Berkley Books, New York

    Google Scholar 

  66. Buncombe A (2000) ‘Inspiration’ came from Atlanta Olympics bomb. The Independent, 30 June

    Google Scholar 

  67. Clough S (2000) Bombings ‘inspired by Atlanta attack’. The Daily Telegraph, 6 June

    Google Scholar 

  68. Demant F, Slootman M, Buijs F, Tillie J (2008) Decline and disengagement: an analysis of processes of deradicalisation. IMES, Universiteit van Amsterdam, Amsterdam

    Google Scholar 

  69. Wieviorka M (2003) The making of terrorism, 2nd edn. University of Chicago Press, Chicago

    Google Scholar 

  70. Brysk A (2007) Human rights and national insecurity. In: Brysk A, Shafir G (eds) National insecurity and human rights: democracies debate counterterrorism. University of California Press, Berkeley, pp 1–13

    Google Scholar 

  71. Geller A, Macdougall I (2011) Norway massacre forces new look at security in Europe. Denver Post, 5 August. http://www.denverpost.com/nationworld/ci_18620993. Accessed 7 Aug 2011

  72. Christensen C (2004) Political victims and media focus: the killings of Laurent Kabila, Zoran Djindjic, Anna Lindh and Pim Fortuyn. J Crime Conflict Media 1(2):23–40

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramón Spaaij .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 The Author(s)

About this chapter

Cite this chapter

Spaaij, R. (2012). Responses. In: Understanding Lone Wolf Terrorism. SpringerBriefs in Criminology. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2981-0_8

Download citation

Publish with us

Policies and ethics