by Ahmed Sami Abdel-Fattah
Introduction
Despite the end of conventional warfare after the formation of the European Union (EU), which adopts policy bases on accepting all ethnicities and religious minorities, EU countries still face security threats posed by extremists. Nowadays, killing and intimidating civilians become terrorists’ common tactic to undermine Europe’s security. The governments, therefore, are harshly criticised by their societies if a terrorist attack targeted civilians.
Recently, extremist groups have intensified their attacks in Europe, exploiting the democratic atmosphere and the right of privacy given to European citizens. Therefore, the security agencies legally find difficulties to bring the society the security without violating people’s freedoms.
Lack of finding solutions has created a security vacuum exploited by the extremists to permeate through the society and launch their bloody attacks. Although, the security agencies have recently started to deal with such threat, the extremist groups adopted what is known as “lone-wolf terrorism”. It is another approach recruit those who marginalised or suffer from ethnic or social discrimination or those who adopt extremist ideologies to carry out attacks against their communities.
“Lone wolf” terrorism helped the extremists to surpass the counter-terrorism restrictions imposed by the security agencies, which consequently suffer from a state of confusion. Thus, this study aims to investigate this phenomena and possible solutions to deal with and curb its repercussions.
Lone-wolf definition
The term of “Lone wolf” associates with violence since it was used for the first time by supremacists Tom Metzger and Alex Curtis 1990s. Currently, Islamist extremists adopted this unpredictable tactic and re-applied it, systematically, to serve their violent goals.
The phenomena talks about aggressive individual attacks committed by individuals on personal or ideological motives to cause damages against the states and the societies.2 Embracing an extremist idea could be the main motive behind such atrocities as terrorists change this cyberspace idea into an awful reality. Also,the social exclusion could be one of the reasons behind deepening the crisis; the marginalised people could target their communities to revenge for themselves.
Recently, the terrorist groups such as the Islamic State (Daesh or ISIS) have incited militants in Europe to carry out revenge attacks without giving them direct commands. The indirect incitement boils down to terrorist groups’ audio and visual calls to instigate violence among lone-wolf terrorists and those who are easily deplored towards extremism, which could bring its disastrous results later.
Terrorist groups usually announce their responsibilities for the attacks committed by lone-wolf terrorists, exploiting the wolves’ desire to embarrass the targeted country. Despite the lack of direct connection, lone-wolf terrorists do not deny other groups’ claims; on the contrary, those wolves sometime feel happy as they became a part of an international action as long as both sides have the same ideology. Therefore, countries have to adopt more effective measures to fight the social extremism.
Lone-wolf terrorism is divided into two categories. First, chaos form (single event) as the terrorist targets the public or social events, using bombs, explosive belts, or shooting. Chaos attacks are always plotted by the individual attackers without returning to any terrorist groups as it happened in the 2017 Istanbul nightclub shooting, which claimed lives of 39 people. Notably, most attacks that have been carried out by the lone wolves belong to this form.
Second form is career category (serial) as lone-wolf terrorists adopt the “systematic killing” against the society without having any direct links with extremist groups. So the lone wolf can plot for the attack via using posts or e-mails from the groups. Unlike the first form, the individual attacker drew up best-laid plans using technological tools to achieve his bloody goals.
The term of “lone-wolf career terrorism” was used for first time by the Federal Bureau of Investigations (FBI) against terrorist Theodore J. Kaczynski. 4
Why do extremists adopt lone-wolf terrorism?
Terrorist groups are usually use conventional tactics to carry out their armed attacks and shootings against European communities or police. Although such attacks were effective at the beginning, the intelligence bodies exerted great efforts to relatively curb them and to prevent their serious repercussions. Curbing such conventional tactics based on tracking weapon trafficking and money transfers from individuals and civil society organisations to the groups that plot terrorist attacks.
Conventional tactics also include recruiting locals or foreigners, who have the ability to make explosives or get them from international traffickers. Conventional terrorists put very fiendish plots to cause gravest damages, depending on security vulnerability, which could be detected later by the police to prevent any possible similar attacks.
Due to the security measures taken against conventional tactics, the extremist groups used “lone-wolf terrorism” to achieve their bloody goals, depending on the country’s security failure to spy or monitor all civilians. So the groups headed to the secret private work where suspicion could be away from the “lone wolf”. Secret working enables lone-wolf terrorists to calmly carry out their attack and to carefully pinpoint the targets.
In some cases, we find “lone wolf” can get, rent, or steal a car for his attacks. He also can incidentally carry out his attack in markets without any prior planning or terrorist commands. So the security agencies find difficulties to trace those terrorists. In Sweden, an attacker stole a car and ploughed through a crowd in Drottninggatan street in Stockholm, where three people were killed and others were injured 5. Although the Swedish police reacted very fast, they could not stop attacker.
Internet has a major role in helping the lone wolves to carry out their job as they can online follow terrorist groups’ messages. Consequently, a lone wolf, who inspired by such messages, can volunteer to launch a terrorist attack against unspecified target without any direct contact with systematic groups.
It also is a great platform, from which the lone wolf can learn techniques of making explosives. Intelligence bodies revealed that some terrorists, who plotted attacks against vital centres in UK, downloaded an article titled “How can you make a bomb in your mother’s kitchen?” . U.S. soldier Naser Jason Abdo has used this article to make explosives to attack Fort Hoot military base. He was arrested while he was possessing explosive chemicals. 7
Because terrorist groups have suffered several defeats in their havens, they have increasingly depended on “lone-wolf terrorism”. In Afghanistan, Al-Qaeda had lost its power, comparing to the pre-U.S. invasion. Also Daesh was heavily defeated in Syria and Iraq. So both groups were forced to find lone-wolf terrorism to tell the world that they are “undefeatable” and to recruit more militants.
Lone-wolf attacks in Europe:
- 2015 Charlie Hebdo attack: Al-Qaeda announced its responsibility for the attack, which killed 12 people. The attack sparked a big reaction internationally as it was a clear violation against freedom of expression. 7
- 2016 Brussels bombings: IS militants targeted Brussels International Airport and metro stations in March 2016, killing 34 people.
- 2017 Istanbul nightclub shooting: A terrorist opened fire and threw bombs inside a nightclub in Istanbul, Turkey, during the New Year celebration on January 1, 2017, killing 39 people. But he managed to escape .
- 2017 Manchester Arena Bombing: Libyan -British man blew himself up in a concert, leaving 22 people killed.
EU counter-terrorism strategies
Unlike the terrorist groups, the lone-wolves depend on themselves and avoid connection with surrounding people to guarantee their own safety. But group work has the possibility of committing mistakes against the whole group.
As the identity of the lone-wolf terrorist is unknown, Europe depends mainly on terrorist’s possible mistakes that could reveal his intentions when he carry out his attack. However, before launching any terror attack, lone-wolf monitor and collect information on the targets to set an appropriate time for cause grave damages.
Consequently, it is hard to reveal the lone-wolf’s possible attack. The European services intensify their intelligence works in and around the vital entities.
European countries also find difficulties to know the extremist tendency of their citizens. So they have an urgent desire to monitor the society’s behaviour, but the right of privacy stands as a stumble against them. To overcome this security vacuum, governments started to monitor suspects’ accounts to prevent any possible attacks.
Furthermore, EU governments press on the social media of Facebook and Twitter to provide them with information on suspects’ personal messages. The social media platforms responded by imposing restrictions on their ads and closing the accounts inciting and disseminating violence. The lone-wolf terrorism is cyber-virus spreads in the society, trying to send its echo of anger to people outside world in very violent form.
Some European countries also created a secret cyber network spying on the citizens to identify those who can be easily infected by lone-wolf virus, or those who bear violence ideologies. Such security measures are not officially announced, as they contradict with the European freedom laws. However, they are used as inevitable means to root out lone-wolf terrorism.
Other EU countries spy on its neighbours to protect its national security. The spying country believes that it should not be a blind-man who awaits help from a neighbours, seeking to have permeative information on links between its nationals and those who are abroad.
EU countries provide each others with necessary information in terror-related cases; however, each country trust only in their security analysis to achieve its security. In 2017, a parliamentary secret investigation was launched to probe into Germany’s surveillance activities on international bodies. Also, Germany has spied on France after Eduard Snowden leaked classified information from the U.S. National Security Agency in 2013,revealing that U.S. is spying on its allies. .
To enhance their security network, European countries signed joint bilateral agreements to enhance their security measures. They also signed other counter-terrorism agreements with other countries outside the Union such as a deal signed between Egypt and Germany in 2016. Also, EU countries inked a cooperation protocol to combat terrorism in 2016 to update the joint security conventions, which were signed at EU formation in 1990s. This protocol was adopted to primary curb the movement of people fleeing civil wars in the Middle East. 17
Moreover, governments have conduct effective operations to trace money transfers from abroad to Europe. They also tracked networks of weapon trafficking, which are considered vital tools for the extremists.
Extremists’ mechanism to keep lone-wolf effectiveness
Extremist groups are keen to keep the lone-wolf terrorism, which has a great ability to escape from the eyes of western intelligence. They created certain ways to overcome counter-terrorism security measures.
- Cyber-militia:
Those militia adopt systematic ways to psychologically recruit lone-wolves, providing them with extremist tactics before committing the attacks. The psychological element is their main factor to encourage militants to sacrifice themselves. Also, we find if a Twitter account was closed, extremists can create dozens of other accounts to disseminate their ideologies
- Special operations by unknown identities:
ISIS has used unknown identities of terrorists to send them to European countries where they carry out the lone-wolf attacks such as 2017 Istanbul nightclub shooting. The identity of British terrorist Jihadi John, who appeared in Daesh videos of beheading their hostages, has been revealed after a long time in 2015.
- Refugees and illegal migrants:
Illegal migration is a good channel for terrorist groups to infiltrate their militants among illegal migrants and refugees, who are eying European shores. Extremists misuse refugees in espionage and information transpiration. Undoubtedly, such exploitation causes a grave harm to the refugees in general, forcing Europe to take harsh measures against them.
- Technology:
Technology is extremists’ secret tool to communicate with militants and can change the lone-wolf ’s activity from “chaos” form to “career” one, which enables the terrorist groups to launch systematic cyber attacks via individuals outside Europe. These cyber-attacks aims to cause paralyse in governmental sectors before launching terrorist attacks in separate places and to create disorder in the security agencies.
Conclusion
The next round of the battle between Europe and extremists would last for a long time. Current relative quietness in their war does not mean that security bodies succeeded in curbing the foreign threats; it could be a period of re-arrangement and re-distribution inside the terrorist groups.
So, the security agencies should be aware that terrorist groups are tireless in catching security vulnerabilities to cause bloody damages. European countries should pay a close attention to monitor the social behaviour, which could drift into delinquency. They have to create preventive and rehabilitation programs for the youth, particularly the delinquents.
Terrorist groups do not care about the lone-wolf’s identity as they care about his violent attacks. So rehabilitating the delinquents could sap the terrorist group’s depolarisation threat.
Also, the public should give the government a helping hand to reveal the social delinquency and to rehabilitate the society against the cases of depolarisation. In short, It is very difficult to legally and securely deal with conventional terrorism in general and lone-wolf terrorism in particular.
admin in: How the Muslim Brotherhood betrayed Saudi Arabia?
Great article with insight ...
https://www.viagrapascherfr.com/achat-sildenafil-pfizer-tarif/ in: Cross-region cooperation between anti-terrorism agencies needed
Hello there, just became aware of your blog through Google, and found ...