6,795
Views
10
CrossRef citations to date
0
Altmetric
Articles

Early detection of the lone wolf: advancement of counter-terrorism investigations with an absence or abundance of information and intelligence

Pages 35-53 | Published online: 29 May 2013
 

Abstract

The consequences of large-scale, al-Qaeda style operations have seen billions of dollars spent on military interventions; a raft of new law enforcement and intelligence agency (LEIA) powers and laws; and an exponential growth in public and private security interventions. Large-scale terrorist operations aside, lone-wolf terrorists have now become one of society's greatest threats. This is because lone wolves are fundamentally and ideologically driven to undertake terrorist activities autonomously; they generally adhere to no hierarchal structure; and they meticulously plan and prepare such acts while maintaining virtual invisibility within the community. As a result of their independence, astute preparation, and adept anonymity, the threat of lone-wolf terrorism presents a range of issues that are problematic for LEIA in their attempt at identifying those with a manifest hatred that leads to extreme violence. LEIA are further disadvantaged by a number of operational obstacles, which include the navigation of complex investigations offering limited, or conversely, an abundance of information. It is essential to recognise, however, that the lone-wolf terrorist never truly operates without the influence and/or assistance of like-minded individuals or groups; and that this may be the key to their undoing. It is the position of this paper that religion is not the sole motivating factor behind individual acts of terror, and that gathering and deciphering of information in juxtaposition with detecting, identifying, and tracking radical individuals pertains to a singular and/or combination of differing motives—political, ideological, and/or religious.

This article is part of the following collections:
New Frontiers in Intelligence Studies

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.