FB2

CONTERTERROR. Mikhail Kryzhanovsky, New York

Монография / Политика
Аннотация отсутствует
Объем: 2.337 а.л.

By Mikhail kryzhanovsky, a former KGB sniper and CIA, FBI and the U. S. Secret Service killer "Filament  

kryzhanovsky7777@gmail. com  

585-456-7836, New York  

 

 

 

 

 

Part 1. PROFESSIONAL TERROR  

 

 

 

KGB instructions on terror – I got them at KGB PGU Institute (intelligence), Moscow, same Institute Putin graduated  

I wrote them for CIA..  

 

Stephen Paddoc, Las Vegas shooter, killed 53 and wounded 500 on October, 2, 2017.  

 

 

 

 

T e r r o r is a political tactic, a form of unconventional and psychological warfare against people or property to coerce or intimidate governments or societies, to achieve political, religious or ideological objectives.  

The #1 method is the act of violence devised to have a big national or international impact.  

“Red” terror is aimed against certain politicians; “black” refers more to mass murders. The two can be mixed.  

 

Purposes:  

– to scare the nation  

– neutralize the government and show its inability to rule the country  

– to make the government admit that terror organization is a real political power  

– to draw media and public (international) attention to a certain political problem  

– to provoke the government to use military force and start civil war  

– to prove some political or religious ideology  

– to prevent or delay important political decisions or legislation  

– to discourage foreign investments or foreign government assistance programs  

– change the government through revolution or civil war  

 

Types of terror.  

 

Civil disorders.  

Political terrorism – violent acts designed primarily to generate fear in the nation for political purposes. Civil disorders are very effective here..  

Non-political terrorism – terrorism that is not aimed at political purposes but which exhibits conscious design to create and maintain high degree of fear for coercive purposes..  

Official or state terrorism – referring to nations whose rule is based upon fear and oppression that reach similar to terrorism or such proportions.  

 

Objectives  

 

1. Recognition  

Groups seeking recognition require events that have high probability of attracting media attention. Specific incidents may be suicide bombing in public place (e. g. a green market), hijacking of an aircraft, the kidnapping of a politician or other prominent person, the seizing of occupied buildings (schools, hospitals) or other hostage barricade situations. Once they gain attention, the terrorists may demand that political statement be disseminated. Terrorist groups sometimes use organizational names or labels designed to imply legitimacy or widespread support. For example, a tiny isolated group may use “front”, “army”, or “brigade” in its name to achieve this effect.  

2. Coercion.  

Coercion is the attempt to force a desired behavior by individuals, groups, or governments. This objective calls for a strategy of a very selective targeting which rely on publicly announced bombings, destruction of property and other acts which are initially less violent than the taking of human life. Contemporary examples include the bombing of corporate headquarters and banking facilities with little or no loss of life.  

3. Intimidation.  

Intimidation attempts to prevent individuals or groups from acting: coercion attempts to force actions. Terrorists may use intimidation to reduce the effectiveness of security forces by making them afraid to act. Intimidation can discourage competent citizens from seeking or accepting positions within the government. The threat of violence can also keep the general public from taking part in important political activities such as voting. As in the case of coercion, terrorists use a strategy of selective targeting although they may intend the targets to look as though they were chosen indiscriminately.  

4. Provocation.  

Provoking overreaction on the part of government forces. The strategy normally calls for attacking targets symbolic of the government ( for example, the police, the military, and other officials). Attacks of this type demonstrate vulnerability to terrorist acts and contribute to a loss of confidence in the government’s ability to provide security. More important, if the security forces resort to a heavy-handed response, the resulting oppression can create public sympathy, passive acceptance, or active support for an insurgent or terrorist group.  

5. Insurgency support.  

Terrorism in support of an insurgency is likely to include provocation, intimidation, coercion and the quest for recognition.. Terrorism can also aid an insurgency by causing the government to overextend itself in attempting to protect all possible targets. Other uses of terrorist skills in insurgencies include acquiring funds, coercing recruits, obtaining logistical support, and enforcing internal discipline.  

The media is a valuable “helper” by giving terrorists international recognition and also to attract recruits, obtaining funds. Once they gain attention, the terrorists may demand that political statements be disseminated. The danger is that this kind of attention tends to incite acts of violence by other terrorist groups. Terrorists use different methods and taking hostages, bombing, arson (low risk action) assassinations, ambushes and hijacking are the most popular ones.  

Factors that may contribute to terrorism:high population growth rates, high unemployment, weak economies, extremism, ethnic, religious or territorial conflict.  

 

Organization and tactic  

 

Organized terror is “organized construction”:  

 

–search and recruitment of people (active and passive supporters), including informants and supporters in government agencies, counterintelligence and police  

–getting money (robberies, illegal operations with drugs and weapons, legal business, searching for donors with the same political views)  

–security system, including a system of “cells” or small groups (some groups may organize multifunctional cells that combine several skills into one tactical unit). Preparing places where members can hide, relax, get medical care; keep weapons, money, special literature. System also includes fake IDs and counter-intelligence (detection of traitors, preventing collapse of the group and uncontrolled criminal activity (robberies)  

–training camps (shooting, working with explosives). If the group is state supported or directed, the leadership usually includes one or more members who have been trained and educated by the sponsoring state  

–“brainwashing” sessions (the group may include professional terrorists for hire who are not necessarily ideologically motivated)  

–planning the actions  

–making special connections with other groups and mafia  

The typical terrorist organization is pyramidal. This format takes more people to support operations than to carry them out. Therefore, the majority of people who work in terrorist organizations serve to keep terrorists in the field. The most common job in terrorist groups is support, not combat.  

 

Usually, organization is divided into 4 levels:  

1st level. Command level. The smallest, most secret group at the top.  

2nd level. Active cadre. Responsible for carrying out the mission of the terrorist organization..  

3rd level. Active supporters. The active supporters are critical to terrorist operations. Any group can carry out a bombing, but to maintain a campaign of bombings takes support. Active supporters keep the terrorists in the field. They maintain communication channels, provide safe houses, gather intelligence. This is the largest internal group in the organization, and one which can be effectively countered by economic measures.  

4th level. Passive supporters.  

Most terrorist groups number fewer than 50 people and are incapable of mounting a long-term campaign. Under the command of only a few people, the group is divided according to specific tasks. Intelligence sections are responsible for assessing targets and planning operations. Support sections provides the means necessary to carry out the assault, and the tactical units are responsible for the actual terrorist action.  

Terrorist organizations tend to have two primary types of subunits: a cell and a column.  

The cell is the most basic type. Composed of 4 to 6 people, the cell usually has a mission specialty, but it my be a tactical cell or an intelligence section. In some organizations, the duties of tactical cells very with the assignment. Other cells may exist as support wing.  

Sometimes groups of cells will form to create columns. Columns are semiautonomous conglomerations of cells with a variety of specialties and a separate command structure. As combat units, columns have questionable effectiveness. They are usually too cumbersome to be used in major operations, and the secrecy demanded by terrorism prevents effective inter-column cooperation. Hence, columns are most often found fulfilling a function of combat support.  

 

Terrorist groups can be divided into three categories:  

a. non-state supported groups which operate autonomously, receiving no support from any government  

b. state supported groups, which operate alone but receive support from one or more governments  

c. state directed groups, which operate as the agents of a government, receiving substantial intelligence, logistic, and operational support  

Clandestine cell system  

 

A clandestine cell structure is a method for organizing a group of people like resistance fighters, sleeper agents or terrorists in such a way that it can more effectively resist penetration by an opposing organization (such as a law enforcement organization). In a cell structure, each small group of people in the cell know the identities of only the people in their cell. Thus, a cell member who is apprehended and interrogated will not know the identities of the higher-ranking individuals in the organization; unless the cell member happens to be a member who necessarily knows and communicates with higher-ranking individuals in the organization. Depending on the group's philosophy, its operational area, the communications technologies available and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization.  

 

It is also a method used by criminal organizations, undercover operatives, and unconventional warfare units led by special forces. Historically, clandestine organizations have avoided electronic communications, as signals intelligence is a strength of conventional militaries and counterintelligence organizations.  

 

In the context of tradecraft, covert and clandestine are not synonymous. As noted in the definition (which has been used by NATO since World War II) in a covert operation the identity of the sponsor is concealed, but in a clandestine operation, the operation itself is concealed. At least insofar as someone or something that is known to exist by at least two individuals can be "concealed". Put differently, clandestine means "hidden", and covert means "deniable". The adversary is aware that a covert activity is happening, but theoretically and hypothetically does not know who is doing it and certainly not the sponsorship. Separating action from "sponsorship" is a technicality hopefully (for the "sponsor") providing sufficient distance from the action so that the sponsor can claim ignorance in the event the "covert" plot is discovered. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. Such "neutralization" of the intended goal, actions or results does not grant the sponsor deniability of responsibility, blame and guilt and is not a legal, ethical or moral defense if negative consequences have resulted from the operation. Espionage is espionage regardless of whether or not the intelligence and information provided to the sponsor – friend or foe – is of benefit or use or not. Even if the information was intentionally misleading, fake or inaccurate the crime is in passing it to a foreign government.  

 

A sleeper cell refers to a cell, or isolated grouping of sleeper agents that lies dormant until it receives orders or decides to act.  

 

World War II French Resistance  

In World War II, Operation Jedburgh teams parachuted into occupied France to lead unconventional warfare units. [1][2] They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i. e., a subcell). If the mission was sabotage, reconnaissance or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations.  

 

National Front for the Liberation of South Vietnam  

Also known as the Viet Cong, this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II. [3] Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See Viet Cong and PAVN strategy and tactics.  

A dual, but sometimes overlapping, Party and Military structure was top-down  

The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of self-criticism common, as a bonding method, to Communist organizations.  

 

Provisional Irish Republican Army  

As opposed to the French Resistance, the modern Provisional Irish Republican Army (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.  

Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e. g., transportation, intelligence, cover and security). Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells.  

The IRA has an extensive network of inactive or sleeper cells, so new ad hoc organizations may appear for any specific operation.  

 

Parallel organizations  

The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the Vietnam War. After the war ended, surviving NLF officials held high office.  

In the case of the PIRA, its political wing, Sinn Féin, became increasingly overt, and then a full participant in politics. Hamas and Hezbollah also have variants of overt political/social service and covert military wings.  

The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy could limit freedom of action, distort information about goals and ideals, and restrict communication within the insurgency. In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine.  

 

External support  

Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi).  

External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran[citation needed], but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the CIA and United States Army Special Forces. As the latter conflict escalated, the US participation became overt.  

Note that both unconventional warfare (UW) (guerrilla operations) and foreign internal defense (FID) (counterinsurgency) may be covert and use cellular organization.  

In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under Operation White Star, US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962.  

 

Models of insurgency and associated cell characteristics  

While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine, cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The Eighth Route Army did not run on a cell model.  

 

When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07. [8] Drawing on this work, Nyberg (a United States Marine Corps officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports. [9] At present, there is a new type associated with transnational terrorist insurgencies.  

1. Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy. " The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. al-Qaeda generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form.  

2. Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as Sinn Féin or the National Liberation Front) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy. " The Nazi rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model.  

3. Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "shadow government" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic coup d'etat, [10] and often tries to minimize violence. Variants include the Sandinista takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within. " Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the Cuban revolution[11] and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions. "  

4. Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government. " The revolution that produced the Peoples' Republic of China, the American Revolution, and the Shining Path insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization.  

 

Classic models for cell system operations  

Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for espionage, sabotage, or the organization for unconventional warfare. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles. [7] The examples here will use CIA cryptonyms as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e. g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word.  

 

Operations under official cover  

 

Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE.  

 

Representative diplomatic-cover station and networks  

Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. [citation needed] Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat.  

In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled.  

Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BETTY knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender.  

 

Clandestine presence  

The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other.  

 

Initial team presence by 2 separate clandestine teams with no official cover  

Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2.  

ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE.  

The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells.  

 

Clandestine teams have built initial subcells  

 

As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell.  

 

Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R. H. A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137).  

If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of dead drops, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN.  

These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through SIGINT or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors.  

When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance.  

 

Non-traditional models, exemplified by al-Qaeda  

 

Due to cultural differences, assuming the al-Qaeda Training Manual is authentic, eastern cell structures may differ from the Western mode. Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.  

Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through COMINT or, in rare cases, by compromising a member.  

The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see infrastructure cells), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points.  

 

Core group, with contact ring and ideological hierarchy  

Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells.  

 

While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process.  

 

"Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.  

In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect.  

If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected.  

Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him.  

 

Infrastructure cells  

 

Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:[13]  

1. Forged documents and counterfeit currency  

2. Apartments and hiding places  

3. Communication means  

4. Transportation means  

5. Information  

6. Arms and ammunition  

7. Transport  

 

Other functions include psychological operations, training, and finance.  

 

A national intelligence service has a support organization to deal with services such as finance, logistics, facilities (e. g., safehouses), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations.  

 

Some of these functions, such as finance, are far harder to operate in remote areas, such as the FATA of Pakistan, than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for couriers, who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media.  

 

Stay behind operation  

 

In a stay-behind operation, a country places secret operatives or organisations in its own territory, for use in the event that an enemy occupy that territory. If this occurs, the operatives would then form the basis of a resistance movement or act as spies from behind enemy lines. Small-scale operations may cover discrete areas, but larger stay-behind operations envisage reacting to the conquest of entire countries.  

Stay-behind operations of significant size existed during World War II. The United Kingdom put in place the Auxiliary Units. Partisans in Axis-occupied Soviet territory in the early 1940s operated with a stay-behind element.  

During the Cold War, the North Atlantic Treaty Organisation (NATO) and the Central Intelligence Agency (CIA) sponsored stay-behind networks in many European countries, intending to activate them in the event of that country being taken over by the Warsaw Pact or if a communist party came to power in a democratic election. According to Martin Packard they were "financed, armed, and trained in covert resistance activities, including assassination, political provocation and disinformation. "  

Many hidden weapons caches were found in Italy, Austria, Germany, the Netherlands and other countries, at the disposition of these "secret armies". The most famous of these NATO operations was Operation Gladio, acknowledged by Italian Prime Minister Giulio Andreotti on October 24, 1990.  

The United Kingdom's Territorial Army regiments of SAS and Honourable Artillery Company provided such stay-behind parties in the UK's sector of West Germany.  

 

 

Methods  

 

Hostage-taking.  

An overt seizure of one or more people to gain publicity, concessions, or ransom in return for the release of the hostage or hostages. While dramatic, hostage situations are risky for the terrorist in an unfriendly environment..  

You must always negotiate if hostages have been taken. Negotiation produces some advantages for you. These advantages are: (a) the longer situation is prolonged, the more intelligence can be gathered on the location, motivation and identity, (b) the passage of time generally reduces anxiety, allowing the hostage taker to assess the situation rationally, (c) given enough time, the hostages may find a way to escape on their own, (c) the necessary resolve to kill or hold hostages lessens with timer, (d) terrorists may make mistakes. The negotiation team must have information to support negotiations (you get it from interviews with witnesses, escaped and released hostages, and captured suspects — it’s very important to get the identities, personalities, motives, habits and abilities of the offenders).  

One of the complications facing you in a siege involving hostages is the Stockholm syndrome where sometimes hostages can develop a sympathetic rapport with their captors. If this helps keep them safe from harm, this is considered to be a good thing, but there have been cases where hostages have tried to shield the captors during an assault or refused to co- operate with the authorities in bringing prosecutions. (In Britain if the siege involves perpetrators who are considered by the government to be terrorists, then if an assault is to take place, the civilian authorities hand command and control over to military).  

 

Bombing.  

Advantage includes it’s attention-getting capacity and the terrorist’s ability to control casualties through time of detonation and placement of the device. The bomb is a popular weapon, because it is cheap to produce, easy to make, has variable uses, and is difficult to detect and trace after the action. In Iraq they usually use booby-trapped vehicles and car- bombs. A car bomb is an explosive device placed in a car or other vehicle and then exploded. It is commonly used as a weapon of assassination, terrorism or guerrilla warfare to kill the occupant(s) of the vehicle, people near the blast site, or to damage buildings or other property. Car bombs act as their own delivery mechanisms and can carry a relatively large amount of explosives without attracting suspicion. The earliest car bombs were intended for assassination. These were often wired to the car’s ignition system – to explode when the car was started. Ignition triggering is now rare, as it is easy to detect and hard to install – interfering with the circuitry is time-consuming and car alarms can be triggered by drains on the car’s electrical system. Also, the target may start the car remotely (inadvertently or otherwise), or the target may be a passenger a safe distance away when the car starts. It is now more common for assassination bombs to be affixed to the underside of the car and then detonated remotely or by the car motion. The bomb is exploded as the target approaches or starts the vehicle or, more commonly, after the vehicle begins to move, when the target is more likely to be inside. For  

this reason, security guards have to check the underside of vehicles with a long mirror mounted on a pole.  

The effectiveness of a car bomb is that an explosion detonated inside a car is momentarily contained. If the force of explosion were to double each fraction of a second and the car were to contain the explosion for one second before its chassis gave way, this would result in a much greater force then if the detonation took place outside the car. Therefore a greater amount of damage is obtained from a given amount of explosive. Car bombs are also used by suicide bombers who seek to ram the car into a building and simultaneously detonate it. Defending against a car bomb involves keeping vehicles at a distance from vulnerable targets by using Jersey barriers, concrete blocks or by hardening buildings to withstand an explosion. Where major public roads pass near government buildings, road closures may be the only option (thus, the portion of Pennsylvania Avenue immediately behind the White house is closed to traffic. These tactics encourage potential bombers to target unprotected targets, such as markets.  

 

Suicide attack.  

A major reason for the popularity of suicide attacks is tactical advantages over other types of terrorism. A terrorist can conceal weapons, make last-minute adjustments, infiltrate heavily guarded targets and he does not need a remote or delayed detonation, escape plans or rescue teams. Suicide attacks often target poorly- guarded, non-military facilities and personnel. Examples of different suicide attacks include:  

–attempted suicide attack with a plane as target  

–suicide car bomb  

–suicide attack by a boat with explosives  

–suicide attack by a woman  

–suicide attack by a bicycle with explosives  

–suicide attack by a hijacked plane with fuel: September 11, 2001 attacks  

–suicide attack by diverting a bus to an abyss  

–suicide attack with guns  

 

Ambush  

A well-planned ambush seldom fails. The terrorists have time on their side, and can choose a suitable place. Raid (armed attack) on facilities usually have one of three purposes: to gain access to radio or TV stations (to make a public statement); to demonstrate the government’s inability to guarantee the security of critical facilities; or to acquire money and weapons ( by bank pr armory robberies).  

Assassination  

Assassination is the oldest terrorist tactic. Targets mostly are government officials, as well as the defectors from the terrorist group.  

 

Kidnapping  

Kidnapping is usually a covert action and the perpetrators may not make themselves known for some time, while hostage  

–takers seek immediate publicity. Because of the time involved, a successful kidnapping requires elaborate planning and logistics, although the risk to the terrorists is less than in a hostage situation.  

 

Sabotage  

Its objective is to demonstrate how vulnerable society is to the terrorists’ actions on utilities, communications and transportation systems. In the more developed countries they are so interdependent that a serious disruption of one affects all and gains immediate public attention. Sabotage of industrial, commercial or military facilities is a tool to show vulnerability of the target and the society while simultaneously making a statement or political, or monetary demand.  

 

Hoaxes  

A threat against a person’s life causes him and those around him to devote more time and effort to security measures.. A bomb threat can close down a commercial building, empty a theater, or disrupt a transportation system at no cost to the terrorist. The longer-term effects of false alarms on the security forces are more dangerous than the temporary disruption of the hoax. Repeated threats that do not materialize dull the analytical and operational effectiveness of security personnel.  

 

Part 2. PROFESSIONAL COUNTERTERROR  

 

Homegrown terrorists  

 

"Lone wolf" – top danger  

A "lone wolf" or "lone-wolf” terrorist, is someone who prepares and commits violent acts alone, outside of any command structure and without material assistance from any group. He or she may be influenced or motivated by the ideology and beliefs of an external group and may act in support of such a group. In its original sense, a "lone wolf" is an animal or person that generally lives or spends time alone instead of with a group. The attacks are a relatively rare type of terrorist attack but have been increasing in number, and that it is sometimes difficult to tell whether an actor has received outside help and what appears to be a lone wolf attack may actually have been carefully orchestrated from outside  

Homegrown terrorists are not easy targets, especially if you deal with a "lonely wolf" (individual) or a separate small group of 2-3 people. They are not connected to any terrorist groups, organizations, radical parties, mafia.  

That's why you have to:  

 

1. Recruit assets among illegal weapons dealers, they have to inform you about anybody, trying to buy a gun and a lot of ammunition, automatic weapons, explosives.  

2. The assets have to inform you about any person with radical views and ready for radical action (to blackmail the governmand ent and make it change it's policy).  

3. NSA has to fix all phone calls where you hear key words like "kill", "gun", "explosive", "explosion", "FBI", "surveillance", "kidnapping", "sniper", "torture", etc.  

4. Create fake radical sites to detect those who look for contacts and instructions.  

5. Create fake radical groups inside USA and around the world for the same purpose.  

6. Watch a "lone wolf" who's obviously trying to gather intelligence on security system and surveillance in most populated areas of the city, inside and around government and big business buildings.  

ATTENTION. A "lone wolf" may try to check how police and security work in certain areas by calling 911 with fake news about explosion or even staging small fire or explosion.  

7. Remember, a "lone wolf" usually changes his behavior before the crime : he leaves the job, he may disappear for a few days to assemble the bomb in a place nobody can disturb him, he avoids talking to people, he's trying to avoid police, he's paying his debts to friends and family.  

8. Detect people who search Internet, looking for instructions on "home made" explosives.  

9. Watch terrorists in jail – they might keep contacts with with those outside. Watch terrorists who are out of jail.  

10. Keep under control all shooting ranges in the country and people who try to get training as snipers.  

11. ATTENTION: keep under control scientists who work with explosives. And companies which produce weapons, explosives, and sell them.  

12. Watch army veterans with radical views, pay special attention to those who served in special forces and involved in war zones special operations.  

 

Preventing Suicide Bombing  

 

 

 

"Detection by detonation. "  

Soldiers at a military checkpoint would fire radiation at each approaching car. If there were no explosives on board, the car would pass through the beam safely. But if the car carried suicide attackers, the radiation would cause their bombs to explode, killing everyone on board (and anyone unlucky enough to be nearby), but leaving the checkpoint unharmed.  

 

"Distributed biological sensors".  

Bees, moths, butterflies or rats specially trained to pick up bomb vapors, buzzing or fluttering through a crowd, sniffing for fumes. (The rats, equipped with global-positioning-system chips, would work the sewers. )  

 

Even if you manage to detect a suicide bomber, what do you do next?  

It turns out that very few people are killed by the concussive force of a suicide explosion; the deadly weapon is in fact the shrapnel -- the ball bearings, nails or pieces of metal that the attacker attaches to the outside of his bomb. The explosions, though, are usually not powerful enough to send these projectiles all the way through a human body, which means that if your view of a suicide bomber is entirely obscured by other people at the moment of detonation, you are much more likely to escape serious injury. Because of the geometry of crowds, a belt bomb set off in a heavily populated room will actually yield fewer casualties than one set off in a more sparsely populated area; the unlucky few nearest to the bomb will absorb all of its force.  

 

Police officers who find a bomber in a crowd should fire shots into the air to cause people near the bomber to scatter or hit the deck.  

But this would make things worse -- as a packed crowd ran away from a bomber or dropped to the ground, the circle of potential victims around him would get wider and thus more populous, and more lives could be lost. The best thing to do in that situation would be to approach the bomber and hug him or her, sacrificing yourself but saving the lives of many people behind you.  

 

It's recommended that police on the scene simply shoot suspected bombers in the head -- specifically, at the tip of the nose when facing the bomber or about one inch below the base of the skull from behind.  

 

There are other techniques to disarm a bomber that don't involve guns.  

It's is extremely difficult to shoot someone in the head perfectly, a shot to the head could in fact set off a suicide bomb. So, if you're behind a bomber, the best thing to do is grab him around the shins, lift up and push forward. The bomber will instinctively use his hands to block his fall. Once his hands are away from the trigger of his bomb, you grab them. If you are facing a bomber head-on, you use a different move, one that basically amounts to punching the bomber in the face and grabbing his hands.  

 

Now comes my instruction  

 

Responses to terrorism include:  

–targeted laws, criminal procedures, deportations and enhanced police powers  

–target hardening, such as locking doors or adding traffic barriers  

–pre-emptive or reactive military action  

–increased intelligence and surveillance activities  

–pre-emptive humanitarian activities  

–more permissive interrogation and detention policies  

–official acceptance of torture as a valid tool  

 

You must gather the following information:  

 

1. Group information.  

Names, ideology (political or social philosophy), history of the group, dates significant to the group, and dates when former leaders have been killed or imprisoned (terrorist groups often strike on important anniversary dates).  

2. Financial information.  

Source of funds, proceeds from criminal activities, bank accounts information (sudden influxes of funding or bank withdrawals indicate preparation for activity). It’s also important to determine the group’s legal and financial supporters. Generally, anyone who would write an official letter of protest or gather names on a petition for a terrorist is a legal supporter. Sometimes, an analysis of support will reveal linkages and mergers with other groups.  

3. Personnel information.  

List of leaders, list of members (and former members), any personnel connections with other groups of similar ideology. The skills of all group members (weapons expertise, electronics expertise) – knowing the skills of the group is an important part of threat assessment. If the philosophy revolves around one leader, it’s important to know what will occur if something happens to that leader. Often, the analysis of family background is useful to determine how radically a leader or member was raised. Group structure, particularly if the organizational pattern is cellular, determines who knows whom.  

 

As a group, terrorists are very team-oriented and always prepared for suicide missions. They are well-prepared for their mission, are willing to take risks and are attack-oriented. If captured, they will usually not confess or snitch on others as ordinary criminals do. Traditional law enforcement are not that effective when it comes to the investigation or intelligence of terrorism.  

4. Location information.  

Location of group’s headquarters, location of group’s “safe” houses (where they hide from authorities) and location of the group’s “stash” houses (where they hide weapons and supplies). Regular attacks on “stash” houses is the most frequently used counterterrorism technique). It’ important to specify the underground that exists where terrorists can flee. Terrorists like to live in communal homes instead of living alone.  

Remember this:  

1. Knowing just the functions of terrorism is a fight. Since terrorists are usually trying to provoke government’s overreaction, anything the government can do to keep itself from overreacting works against them.  

2. Since terrorists are usually trying to provoke government’s overreaction, anything the government can do to keep itself from overreacting works against them. Since terrorists are trying to gain control of the media, anything on the part of the media which stifles exposure also stiles terrorism. Bombings make the best pictures (watch TV! ), that’s why terrorists use them mostly.  

3. Terrorists often demand to release political prisoners, but this is never a true objective. The real trick is politization of all prisoners, the winning over of new recruits among the prison population.  

4. Go after financial supporters of terrorism, not the terrorists themselves. It’s only with narcoterrorism that this strategy fails, since the drug market doesn’t respond to simple supply-demand forces.  

5. Terrorists are imitators, not innovators. They often wait until some other group makes the first move. Most of them do this because they are sorely trying to imitate military strategy, others do it because of standardized paramilitary training or textbook lessons in guerrilla tactics, and still others do it to throw off suspicion from themselves..  

6. The Stockholm Syndrome works in the favor of anti-terrorist forces. The longer the hostages stay alive, the less likelihood harm will come to them. With this syndrome, the hostages come to think of their captors as protecting them from the police and soon start to identify with their captors. The captors themselves start to develop a parent/child relationship with their hostages. Other syndromes include the Penelope Syndrome, where women find violent criminals sexually attractive.  

7. In assessing the threat of terrorism, it’s important to concentrate on counting the number of incidents, not the number of victims or the value of harm. The only true comparison is the number of attacks since terrorists often have no idea themselves about how many victims will be killed by their actions. Nationalist groups tend to seek a high number of fatalities while revolutionary groups tend to seek fewer deaths and more wounds or injuries. Splinter or spin-off groups seem more interested in death counts and fatalities. The point is that no matter how many victims are targeted, the group is only a threat via its number of attacks as a percent of total activity.  

8. Do count the number of victims saved by any preventive action. If you manage through some leverage to get the terrorist leader to stop things with a cease-fire agreement, regardless of whether further negotiation follows or not, it will help your agency if you have calculated how many lives you’ve saved, and can report this information to policymakers. Everyone wins by a cease-fire – the terrorist leaders look good, your leaders look good too. After the cease-fire, it’s important to also measure the resumed level of violence and compare to pre-cease-fire levels.  

9. Giving into terrorists’ demands for political change only changes the pattern of violence, not violence itself. Economic and political reforms aimed at helping a certain group and resolving its grievances will win over some supporters among the general population, but in the long-run, will create new problems and a new set of grievances over the precise implementation of policy and the degree of power sharing. A much better strategy is to initiate economic and political reforms for all nation. Economic development solutions have worked in Ireland, Uruguay andItaly.  

10. Reduction of recruits, supplies and support. You have to reduce the number of active trainee members of the terrorist organization. Capture and imprisonment works (it has helped to keep Spain fairly terrorism-free), as well as preemptive strikes against training camps. The number of terrorists captured or killed should be counted, and this can be put as the denominator in a fraction with the number of government security forces killed in the numerator. You’ve also got to keep weapons, ammo and supplies out of hands of terrorists by destruction of their “stash” houses. Unfortunately, many religious terrorist groups operate under the cover of religion and blowing up religious buildings has a strong negative effect.  

11. Terrorism does not respond to coalition-based sanctions which are intended to express the international community’s disregard for them. Terrorist actually want their enemies to wage a war on terrorism because this gives them some pseudo-legitimacy that they are soldiers-at war. If they are broken up from receiving any psychological rewards or sympathy from their social support groups, this strategy might work.  

12. Sharing of information and intelligence by counter-terrorism agents is essential. But there’s always a threat, thata secret source might be “burnt out” during such“sharing”.  

13. Terrorist groups with a cell structure are most likely to thwart human intelligence since the purpose of the cell structure is to prevent any members from knowing who is the immediate leader. This may or may not be true with some groups (like the IRA) which mix family with business, depending upon levels of fidelity. The best approach for such groups may electronic surveillance. However, groups with military or paramilitary organization might be easier to infiltrate or penetrate.  

 

In November, 2011 more than a dozen spies working for the CIA in Iran and Lebanon have been caught and the U. S. government fears they will be or have been executed. The spies were paid informants recruited by the CIA for two distinct espionage rings targeting Iran and the Beirut-based Hezbollah organization.  

In Beirut, two Hezbollah double agents pretended to go to work for the CIA. Hezbollah then learned of the Beirut Pizza Hut restaurant where multiple CIA officers were meeting with several agents, according to the four current and former officials briefed on the case. The CIA used the code word "PIZZA" when discussing where to meet with the agents. From there, Hezbollah's internal security arm identified at least a dozen informants, and the identities of several CIA case officers.  

CIA officers ignored the rule that the operation could be compromised by using the same location for meetings with multiple assets. Idiots who loved free pizza paid by the U. S. government too much.  

 

 

Use special influence methods against terrorists  

 

Tortures  

 

Torture is a category of methods of interrogation designed to shock, hurt and humiliate the object and get information or to make him do something (if used for blackmail). Points to remember:  

–ongoing torture decreases pain sensitivity  

–people with strong will power take torture as a test  

–resistance to torture is often a form of hysterics after arrest  

–the object could take himself as a martyr if you torture him too much  

–torture could damage object’s psyche and you won’t be able to work with him (that’s why we keep terrorists in Guantanamo Bay without trial – we turn them into idiots)  

–people usually trust "after torture information" more than voluntary confessions  

–there are different types of torture and professionals often combine them  

Techniques of psychological torture include:  

– fake execution  

– complete isolation ("wall therapy")  

– daylight deprivation  

– forcible narcotics addiction. Here you can use depressants, stimulants, opiates or hallucinogens : depressants (alcohol, barbiturates, antianxiety drugs  

with effects of euphoria, tension reduction,, muscle relaxation, drowsiness; stimulants (cocaine, amphetamine, methamphetamine (crystal meth), with effects of fast  

euphoria, exhilaration, high physical and mental energy, reduced appetite, perceptions of power, and sociability; hallucinogens with effects of euphoria, hallucinations, distorted perceptions and sensations  

–making the object observe others being tortured (such as family members)  

–abuse of object’s national, religious feelings or political views)  

The effects of psychological torture are: anxiety, depression, fear, psychosis, difficulty concentrating, communication disabilities, insomnia, impaired memory, headaches, hallucinations, sexual disturbances, destruction of self-image, inability to socialize  

Techniques of physical torture include:  

–food, water, sleep deprivation  

–damage to vital body organs (brain, lungs, kidneys, liver, private parts) plus electric shock. The brain is particularly dependent on a continuous and stable supply of oxygen and glucose.  

–rape  

–face deformation  

–water cure ( the torturer pours water down the throat of the subject to inflict the terror of drowning. In another variation, the subject is tied or held don in a chair, his face is covered with a cloth or plastic sheet, and water is poured slowly or quickly over his face to encourage him to talk  

The effects of physical torture are: extreme (unbearable) pain, hypertension, fatigue, cardiopulmonary and other disorders, brain atrophy.  

 

ATTACHMENT  

 

List of "lone wolf" attacks  

Africa, the Middle East and Asia  

 

On 15 November 1988, Barend Strydom, a Christian Afrikaner, shot and killed seven people, and wounded 15 more, in and around Strijdom Square, Pretoria, South Africa. He declared that he was the leader of the White Wolves organisation, which proved to be a figment of his imagination.  

On 24 February 1994, Israeli Baruch Goldstein, a former member of the Jewish Defence League and follower of the Kahanist movement, opened fire inside the Cave of the Patriarchs in Hebron, killing 29 people and injuring at least 100.  

On 19 March 2005, Egyptian national Omar Ahmad Abdullah Ali detonated a car bomb outside a theatre filled with Westerners in Doha, Qatar, killing a British director and injuring 12 others. Police believe he was acting alone.  

On 4 August 2005, Israeli Eden Natan-Zada, an alleged Kahanist, killed four Israeli Arabs on a bus and wounded 12 before being killed by other passengers. Natan-Zada was a 19-year-old soldier who had deserted his unit after he refused to remove settlers from the Gaza Strip. Less than two weeks later, on 17 August 2005, Asher Weisgan, a 40-year-old Israeli bus-driver, shot and killed four Palestinians and injured two others in the West Bank settlement of Shiloh.  

On 4 September 2006, Nabil Ahmad Jaoura, a Jordanian of Palestinian origin, opened fire on tourists at the Roman Amphitheatre in Amman, Jordan. One British tourist died and six others, including five tourists, were injured. Police said he was not connected with any organized group but was angered by Western and Israeli actions in the Middle East.  

On 6 March 2008, Alaa Abu Dhein opened fire on a Jewish seminary in Jerusalem, killing eight and injuring 11 before he himself was shot dead. His family denied he was a member of any militant group, and described him as intensely religious.  

On 2 July 2008, Husam Taysir Dwayat attacked several cars with a front-end loader. He killed three Israelis and injured dozens more before being shot to death. He was not a member of any militant group.  

22 September 2008: Jerusalem BMW attack in which a Palestinian used a BMW as a murder weapon.  

On 19 August 2010, an individual Uyghur was suspected in having planted a bicycle bomb in Aksu that killed 7 people.  

In January 2011, Salman Taseer, the governor of Punjab, Pakistan was assassinated by a lone wolf.  

4 August 2014: the Jerusalem tractor attack.  

On 1 December 2014, Romanian-American Ibolya Ryan was stabbed to death in Abu Dhabi by an attacker apparently targeting a random foreigner.  

3 October 2015: a series of knife stabbings around Israel occurred, including the Lions' Gate stabbings, this spate of attacks by lone-wolf Palestinians has sometimes been dubbed the "Knife Intifada. " These occurred through the early months of 2016, then became sporadic. Social media incitement is considered as a possible cause for many of these attacks.  

 

Europe  

 

During late 1991 and early 1992 in Sweden, right-wing Swiss-German immigrant John Ausonius shot eleven dark-skinned people, killing one.  

In February 1992, RUC Constable Allen Moore shot three Catholic men dead with a shotgun in the Belfast Sinn Féin head office on Falls Road. Moore committed suicide shortly afterwards before arrest.  

Between 1993 and 1997 in Austria, Franz Fuchs engaged in a campaign against foreigners, and organizations and individuals he believed to be friendly to foreigners. He killed four people and injured 15, some seriously, using three improvised explosive devices and five waves of 25 mailbombs in total.  

In April 1999 in London, David Copeland targeted blacks, Asians and gays with nail bombs, killing three and injuring 129. His aim was to start a race war. He was sentenced to at least 50 years and is now in a secure mental hospital.  

On 6 May 2002, in the Netherlands, nine days before elections, Dutch politician Pim Fortuyn was murdered by Volkert van der Graaf, who said that he killed the politician for his having exploited Muslims as "scapegoats. "  

On 11 May 2006, the Belgian student Hans Van Themsche shot and killed a Malinese au pair and the 2 year old child she was caring for, before being caught by police. He told police he targeted people of different skin color.  

On 2 March 2011, in Germany, Arid Uka shot and killed two United States soldiers and seriously wounded two others in the 2011 Frankfurt Airport shooting. German authorities suspected that this was an Islamist attack, which would make it the first deadly act of this kind in Germany.  

On 22 July 2011, in Norway, Norwegian Anders Behring Breivik killed 77 people in two consecutive attacks. First, he killed eight people with a heavy car-bomb placed in the heart of the Norwegian government headquarters in Oslo. An hour later, he appeared at the summer camp of the Worker's Youth League, the youth organization of the Labour Party, at the island of Utøya, 35 kilometers west of Oslo. He shot for approximately 90 minutes, killing 69 people.  

In 2012, French Islamist Mohammed Merah killed seven people in the city of Toulouse. He was eventually killed after a 32-hour siege at his flat in the city.  

On 26 May 2013, in La Défense, a man stabbed soldier Cédric Cordier in the throat. Cordier was hospitalized but officials said his throat wound was not life-threatening. The man, named as Alexandre Dhaussy, was a convert to Islam.  

On 20 December 2014, in Joué-lès-Tours, France, a Burundi-born French national attacked the local police station with a knife while shouting 'Allahu Akbar'. He managed to injure three police before he was shot dead.  

On 14 July 2016, Mohamed Lahouaiej Bouhlel drove a truck into crowds celebrating Bastille day in Nice, France killing 86 people.  

 

United States  

 

1990-2009  

On 25 January 1993 Pakistani national Mir Aimal Kansi shot CIA employees in their cars as they were waiting at a stoplight, killing two and injuring three others. He reportedly got angry watching news reports of attacks on Muslims and stated his motive was that he was "angry with the policy of the U. S. government in the Middle East, particularly toward the Palestinian people".  

On 10 March 1993, American Michael Frederick Griffin murdered Dr. David Gunn in Pensacola, Florida, shooting him three times in the back. Reportedly he yelled, "Don't kill any more babies, " just before the shooting.  

On 6 August 1993 American Neo Nazi Jonathan Preston Haynes shot and killed Wilmette, Illinois plastic surgeon Dr. Martin Sullivan, claiming that he wanted to warn the world about the coming extinction of Aryans. Haynes also confessed to the unsolved 1987 killing of San Francisco hair-colorist Frank Ringi.  

On 4 October 1993 Lynda Lyon Block and common-law husband George Sibley Jr., members of the American Patriot Movement on the run from a domestic abuse charge, [48] shot and killed Opelika, Alabama police Sergeant Roger Motley while officer Motley was performing a welfare check on the family.  

On 1 March 1994 on the Brooklyn Bridge in New York City, Lebanese-born immigrant Rashid Baz shot at a van of 15 Chabad-Lubavitch Orthodox Jewish students that was traveling on the bridge, killing one and injuring three others.  

On 29 July 1994 Dr. John Britton and his bodyguard James Barrett were killed by American anti-abortion extremist Paul Jennings Hill with a shotgun blast to their heads. Mr. Barrett's wife June, a retired nurse, was injured in the attack. Hill was sentenced to death by lethal injection and was executed on 3 September 2003.  

On 16 September 1994 white supremacist, anti-government extremist, and self-proclaimed assassin for the Citizens for the Kingdom of Christ Timothy Thomas Coombs shot Missouri Highway Patrol Corporal Bobbie J. Harper through the chest in the kitchen of his McDonald County, Missouri home. Colonel Fred Mills, chief of the Missouri Highway Patrol, later said he believed Harper was shot in retaliation for an incident three months earlier, when Harper and other officers arrested Robert N. Joos on charges of "simulating legal process" for serving "people's court" papers. Coombs was never caught.  

On 30 December 1994 anti-abortion extremist John C. Salvi III carried out fatal shootings at two Planned Parenthood reproductive health clinics in Brookline, Massachusetts, killing two and wounding five.  

Timothy McVeigh is often given as a classic example of the "lone wolf". McVeigh was convicted and executed for the 19 April 1995 Oklahoma City bombing, which killed 168 people and injured hundreds with a truck bomb. Though McVeigh conceived of, planned and carried out the bombing, he did not act totally alone. Terry Nichols was convicted of conspiring with him, though his involvement was limited to helping mix the fertilizer and other bomb ingredients; McVeigh had threatened to harm him and his family if he did not help.  

Between 1978 and 1995, Theodore Kaczynski, known as the "Unabomber", engaged in a mail bombing campaign that killed three and wounded 23. He threatened to continue the bombings unless his anti-industrial manifesto was published by The New York Times, which acquiesced.  

On 9 October 1995 an unknown saboteur pulled spikes from the rails and overrode the railroad's safety system near Palo Verde, Arizona, causing the Sunset Limited train to derail, killing Mitchell Bates, a sleeping car attendant, and injuring 78 passengers, 12 of them seriously. Four identical notes signed "Sons of the Gestapo" claiming to be from an anti-government, anti-police terror cell were found at the accident site. [54] No one has been arrested for the crime. [55]  

Between 1996 and 1998, Eric Rudolph engaged in a series of bombings against civilians in the Southern United States, resulting in the deaths of three people and injuries to at least 150 others. His targets included abortion clinics, gay nightclubs, and the 1996 Olympics in Atlanta. Some people have called him a Christian Identity adherent, a claim Eric flatly denies in his writings.  

On 12 April 1996 anti-government white supremacist Larry Shoemake shoots eight African-Americans from an abandoned Jackson, Mississippi restaurant before committing suicide.  

Between 1996 and December 2001 anti-abortion extremist Clayton Waagner sent envelopes to more than 500 abortion providers containing a white powder and a note which said, "You have been exposed to anthrax. We are going to kill all of you. From the Army of God, Virginia Dare Chapter. " For the anthrax letter spree, he received a 53-count indictment, and on 3 December 2003, he was convicted on 51 of the 53 counts, including charges of violating the Freedom of Access to Clinic Entrances Act, threatening the use of weapons of mass destruction, and mailing threatening communications. He was sentenced to 19 years in a federal prison.  

On 16 January 1997 anti-abortion extremist Eric Rudolph set two bombs to explode, one an hour after the first, destroying the Sandy Springs Professional Building in Atlanta, Georgia, containing the Atlanta Northside Family Planning Service. The second blast is apparently designed to injure or kill responders such as firemen, paramedics, and others responding to the first blast. Seven people are injured in the blasts.  

On 19 August 1997, self-declared sovereign citizen Carl Drega opened fire on two New Hampshire state troopers following a traffic stop, killing both of them. Drega then stole one of the officers' Police Car, drove to the office of Colebrook, New Hampshire District Court judge Vickie Bunnell, shooting her in the back when she tried to flee, then shot & killed Dennis Joos, editor of the local Colebrook News and Sentinel, as he attempted to disarm Drega after Bunnell fell. Drega then returned to his property and set his house on fire, and wounded three other law enforcement officers before being shot to death in a firefight with police.  

On 23 February 1997, Ali Hassan Abu Kamal opened fire in the observation deck of the Empire State Building, killing one and wounding six others before committing suicide.  

On 26 March 1997 Michigan Militia activist Brendon Blasz is arrested for plotting to bomb the federal building in Battle Creek, Michigan, the IRS building in Portage, Michigan, a Kalamazoo television station, and federal armories.  

On 23 April 1997 Neo-Nazi National Alliance member Todd Vanbiber is arrested with a dozen or so pipe bombs after accidentally setting off one he was building. The bombs were part of a series of bank robberies Vanbiber was carrying out to help fund the National Alliance.  

During the weekend of 2–4 July 1998, white supremacist, and member of the white separatist organization now known as the Creativity Movement, Benjamin Nathaniel Smith embarked upon a three-day, two-state shooting spree, targeting racial and religious minorities across Illinois and Indiana. Smith also shot at but missed another nine people. On Sunday, 4 July, while fleeing the police in a high-speed chase on a southern Illinois highway, Smith shot himself twice in the head and crashed his automobile into a metal post. He then shot himself again, in the heart, this time fatally. He was later pronounced dead at the hospital.  

On 23 October 1998 anti-abortion extremist James Charles Kopp assassinated Dr. Barnett Slepian as Dr. Slepian made his son soup in their kitchen after attending his father's funeral. The FBI notes that Dr. Slepian's assassination bears much similarity to shootings in the Rochester, New York area, and three Canadian cities during the fall of 1997, in which abortion doctors were shot in their homes. Kopp has been charged by Canadian authorities in the 1995 shooting of an Ontario, Canada doctor, Hugh Short, one of a string of Remembrance Day Shootings.  

On 29 October 1998 sovereign citizen Scott Joseph Merrill shot a county road worker in Emery County, Utah in an ambush-style attack. Merrill claimed that he acted on a commandment from God to kill the county road worker, believing this commandment to supersede Utah law.  

On 29 January 1999, white supremacist Paul Warner Powell killed 16-year-old Stacie Reed because he was angry that she had a black boyfriend. Powell then waited, for Stacie's 14-year-old sister, Kristie Reed, to come home from school. When she did, Powell raped her, slashed her throat, stabbed her, and left her for dead. Kristie survived the attack and was able to testify against Powell.  

On 3 April 1999 Neo-Nazi skinhead Jessy Joe Roten fired shots into the home of a multi-racial family in St. Petersburg, Florida, killing 6-year-old Ashley Mance and the wounding of her twin sister Aleesha and younger half-sister Jailene Jones.  

On 15 May 1999, anti-government extremist Kim Michael Cook shot & killed Palmer, Alaska police officer James Rowland Jr. during a welfare check. Authorities believe that Cook killed the officer in ambush because of his hatred of law enforcement.  

On 10 August 1999, Buford O. Furrow, Jr., a member of the white supremacist group Aryan Nations, attacked a Jewish daycare in Los Angeles, injuring five, and subsequently shot dead a Filipino American mail carrier.  

On 28 April 2000, white supremacist Richard Scott Baumhammers began a racially motivated crime spree in Pittsburgh, Pennsylvania which left five individuals dead and one paralyzed. Baumhammers was pulled over in his Jeep and arrested at 3:30 p. m. EST in the town of Ambridge, Pennsylvania. Baumhammers' spree lasted two hours and ran a 15-mile trail that crossed three townships.  

On 13 October 2000 Palestinian American Ramses "Ramzi" Uthman set an arson fire in the Temple Beth El in Syracuse, New York, causing extensive damage to the temple building. According to an acquaintance's testimony, after Uthman set fire to the Temple, he yelled "I did this for you, God! "  

In May 2002, Lucas John Helder placed a series of 18 pipe bombs packed with BBs and nails in mailboxes across the US, rigging to explode as the mailboxes were opened, injuring 6, including 4 mail carriers. Helder sent a manifesto to The Badger Herald of the University of Wisconsin–Madison decrying government control of our daily lives, complaining of the illegality of marijuana, and promoting astral projection as a method to reach a higher level of consciousness.  

On 4 July 2002, Egyptian-American Hesham Mohamed Hadayet opened fire at an El Al ticket stand at Los Angeles International Airport (LAX), killing two.  

On 3 March 2006, Mohammed Reza Taheri-azar drove a Jeep Cherokee into a crowd of students at University of North Carolina at Chapel Hill, injuring nine people. Press accounts said that he "matches the modern profile of the unaffiliated, lone-wolf terrorist"  

On 28 July 2006, Naveed Afzal Haq, saying "I am a Muslim American, angry at Israel", perpetrated the Seattle Jewish Federation shooting in the Belltown neighborhood of Seattle, killing one woman and wounding five others.  

On 27 July 2008 Jim David Adkisson fired a shotgun at members of the Knoxville Unitarian Universalist church congregation during a youth performance of a musical, killing two people and wounding seven others. After his arrest, Adkisson said that he was motivated by hatred of Democrats, liberals, African Americans and homosexuals.  

On 31 May 2009, anti-abortion activist Scott Roeder murdered obstetrician George Tiller.  

On 10 June 2009 White Supremacist, Holocaust denier, and Neo-Nazi James Wenneker von Brunn drove his car to the 14th Street entrance of the United States Holocaust Memorial Museum in Washington, DC, shooting Museum Special Police Officer Stephen Tyrone Johns when he opened the door, killing him. Two other Special Police Officers stationed with Officer Johns, Harry Weeks and Jason "Mac" McCuiston, returned fire, wounding von Brunn with a shot to the face. While awaiting trial, von Brunn died on 6 January 2010.  

2010  

On 18 February 2010, Joseph Andrew Stack III flew a small personal plane into an office complex containing an IRS office in Austin, Texas after posting a manifesto on his website stating his anti-government motives and burning his house. One person other than Stack died; 13 were injured.  

On 4 March 2010, John Patrick Bedell, a self-proclaimed Libertarian and 9/11 truther, shot and wounded two Pentagon police officers at a security checkpoint in the Pentagon Station of the Washington Metro rapid transit system in Arlington County, Virginia, just outside Washington, D. C. The officers returned fire, striking him in the head. He died a few hours later, on the next day, 5 March 2010.  

On 10 May 2010, Sandlin Matthew Smith set off a pipe bomb at the rear entrance of the Islamic Center of Northeast Florida. No one is injured in the attack, but authorities found remnants of the pipe bomb at the scene, and shrapnel from the blast was found a hundred yards away. FBI agents later learned Smith was staying in a tent in Glass Mountain State Park in northwest Oklahoma. When approached by federal and state law enforcement officers Smith drew a firearm, and was fatally shot.  

On 18 July 2010, 45-year-old convicted felon Byron Williams was stopped by a CHP officer for speeding & weaving through traffic on I-580 in Oakland, California. After being approached by the officer, Williams or the officer began firing with a handgun. As additional CHP officers arrived on scene Williams started firing an M1A. 308 rifle, and the CHP returned fire, firing a collective 198 rounds from pistols, shotguns, and. 223 rifles, hitting Williams multiple times in the arms & legs. Oakland police confirmed at Williams’ 20 July arraignment that Williams planned to target the San Francisco offices of the American Civil Liberties Union of Northern California and the Tides Foundation. Investigators reported Williams told them he wanted to "start a revolution by traveling to San Francisco and killing people of importance at the Tides Foundation and the ACLU. "  

On 17 August 2010, 29-year-old Patrick Gray Sharp parked his truck and trailer in front of the Texas Department of Public Safety building in McKinney, Texas about 30 miles north of Dallas. Sharp set fire to the truck, which contained spare ammunition, and attempted to set fire to the trailer, which was believed to contain an improvised explosive device. Sharp then opened fire on the building's offices and windows, on employees who were outside, and on first responders with multiple firearms. Responding police returned fire, and when they reached Sharp found him dead of a gunshot.  

On 1 September 2010, James J. Lee, an Anti-immigrant environmental activist armed with two starter pistols and an explosive device, took three people hostage inside of the Discovery Communications headquarters in Silver Spring, Maryland. Mr. Lee was shot & killed by police after a 4-hour standoff.  

On 2 September 2010 school bus driver and self-proclaimed member of the "American Nationalist Brotherhood" Donny Eugene Mower threw a Molotov Cocktail through the window of the Madera Planned Parenthood Clinic. After being arrested Mower also acknowledged having vandalized a local mosque.  

On 26 November 2010, Somali-American student Mohamed Osman Mohamud is arrested by the FBI in a sting operation after attempting to set off what he thought was a car bomb at a Christmas tree lighting in Portland, Oregon. He was charged with attempting to use a weapon of mass destruction.  

On 28 November 2010, 24-year-old Cody Seth Crawford firebombed the Salman Al-Farisi Islamic Center in Corvallis, Oregon in response to Mohamed Osman Mohamud's attempted car bombing of a Portland, Oregon Christmas tree lighting.  

2011  

On 17 January 2011, a Neo-Nazi and racist with connections to the National Alliance, Kevin William Harpham, placed a radio-controlled pipe bomb on the route of that year's Martin Luther King Jr. memorial march. The bomb was discovered before it was exploded, the parade was rerouted, and the bomb defused. [86]  

On 21 July 2011, Sovereign Citizen Joseph M. Tesi was stopped by a Colleyville, Texas Police officer for multiple traffic warrants. Mr. Tesi exited his vehicle with a gun drawn and pointing at the officer, the officer drew his weapon in response, and there was an exchange of gunfire, during which Mr. Tesi was struck in the face and foot. [87] Mr. Tesi, a member of the Moorish National Republic Sovereign Citizen movement, had previously sent letters to the court about his traffic warrants threatening to use "deadly force" if any Police officer attempted to arrest him on his own property.  

2012  

On 1 April 2012 Francis G. Grady put an incendiary device in a window of the Grand Chute, Wisconsin Planned Parenthood clinic, causing a small fire which damaged the building but injured no one.  

On 17 June 2012 fugitive tax protester Anson Chi accidentally injured himself while attempting to blow up a Plano, Texas natural gas pipeline. Police officers find an explosive device, bomb making chemicals & equipment, and books on terrorism in his bedroom in his parents house.  

On 5 August, 2012 40-year-old white supremacist and neo-Nazi Wade Michael Page fatally shot six people and wounded four others at a Sikh temple in Oak Creek, Wisconsin. Page took his life by shooting himself in the head after he was shot in the stomach by a responding police officer.  

2013  

On 15 April 2013, Dzhokhar and Tamerlan Tsarnaev set off two pressure cooker bombs at the finish line of the 2013 Boston Marathon, killing three people and wounding over 260 others.  

On 1 November 2013 Paul Anthony Ciancia, aged 23, is accused of opening fire in Terminal 3 of the Los Angeles International Airport with a. 223-caliber Smith & Wesson M&P15 rifle, killing a U. S. Federal Transportation Security Administration officer and injuring several other people. After the shooting ended, Ciancia was found to be carrying a note stating that he "wanted to kill TSA" and describing them as "pigs". The note also mentioned "fiat currency" and "NWO", the latter likely being a reference to the New World Order conspiracy theory.  

2014  

On 13 April 2014 Frazier Glenn Miller, Jr., former leader of the White Patriot Party, advocate of white nationalism, white separatism, and a proponent of anti-Semitic conspiracy theories, opened fire at a Jewish Community Center and at a retirement home in Overland Park, Kansas, killing 3.  

On 6 June 2014 sovereign citizen Dennis Marx drove up to the Forsyth County, Georgia court house with a rented SUV full of improvised explosives, guns, ammunition, smoke grenades, and supplies, while wearing body armor and more explosive devices, ostensibly to plead guilty to charges of possessing marijuana with the intent to distribute. Mr. Marx was spotted by Forsyth County Sheriff Deputy James Rush while the deputy was performing a routine security sweep outside the court house, exchanged gunfire with Mr. Marx, the sound of which alerted deputies within the court house, 8 of whom opened fire on Mr. Marx, killing him.  

On 8 June 2014 anti-government conspiracy theorists & former Bundy Ranch protesters Jerad and Amanda Miller shot & killed two Las Vegas police officers at a restaurant before fleeing into a Walmart, where they killed an intervening armed civilian. The couple died after engaging responding officers in a shootout; police shot and killed Jerad, while Amanda committed suicide after being wounded.  

On 11 August 2014 Sovereign Citizen Douglas Lee LeGuin started a dumpster fire in an upscale Dallas suburb, planning to occupy a house there as his own sovereign nation, opening fire on fire & police first responders before surrendering to SWAT officers.  

On 23 October 2014 in the 2014 New York City hatchet attack, a radicalized Islamic convert, Zale F. Thompson, charged at 4 NYPD officers with a hatchet. He injured 2 of them, and the two that weren't affected shot him to death.  

On 28 November 2014 self-proclaimed member of the Phineas Priesthood Larry Steve McQuilliams went into downtown Austin, Texas with firebombs, and improvised explosive devices firing over 100 shots into the Austin Police headquarters, the Federal Courthouse, the Mexican Consulate (which he also attempted to firebomb), and a local bank, before being killed by a mounted Austin Police officer with a 1 handed 312 feet shot through the heart.  

2015  

On 3 May 2015, two men fired rifles outside an exhibit featuring cartoon images of Muhammad at the Curtis Culwell Center in Garland, Texas. A security officer was injured and the men were killed by police.  

On 4 November 2015, Faisal Mohammed stabbed and injured four people with a hunting knife on the campus of the University of California, Merced in Merced, California. He was then shot dead by university police. Mohammad's history was put under investigation by federal authorities due to questions raised about possible Islamism inspired lone wolf terrorism. The Federal Bureau of Investigation eventually concluded that Mohammad was inspired to commit the attack by the Islamic State of Iraq and the Levant.  

On 2 December 2015, in the 2015 San Bernardino attack, 14 people were killed and 22 injured in an Islamic extremism-inspired mass shooting at San Bernardino, California, United States. A married couple, Rizwan Farook and Tashfeen Malik, attacked the San Bernardino County Department of Public Health training event and holiday party.  

2016  

On 12 June 2016, in the Orlando nightclub shooting, Omar Mateen, a 29-year-old Muslim American of Afghan descent, opened fire at the Pulse gay nightclub, killing 49 people and wounding 53 others. He pledged allegiance to ISIL during the attack.  

On 17–19 September 2016, there were four bombings or bombing attempts in Seaside Park, New Jersey; Manhattan, New York; and Elizabeth, New Jersey. Thirty-one civilians were injured in one of the bombings. Ahmad Khan Rahami was identified as a suspect in all of the incidents and apprehended on 19 September in Linden, New Jersey, after a shootout that injured three police officers. According to authorities, Rahami was not part of a terrorist cell, but was motivated and inspired by the extremist Islamic ideology espoused by al-Qaeda founder Osama bin Laden and al-Qaeda chief propagandist Anwar al-Awlaki.  

On 28 November 2016, in the Ohio State University attack, a car ramming attack and mass stabbing occurred at 9:52 a. m. EST at Ohio State University (OSU)'s Watts Hall in Columbus, Ohio. The attacker, Somali refugee Abdul Razak Ali Artan, was shot and killed by the first responding OSU police officer, and 11 people were hospitalized for injuries. According to authorities, Artan was inspired by terrorist propaganda from the Islamic State and radical Muslim cleric Anwar al-Awlaki.  

2017  

On 1 October 2017, Stephen Paddock, a 64-year-old U. S. citizen, opened fire with an automatic weapon from the 32nd floor of the Mandalay Bay hotel in Las Vegas, Nevada, on a crowd at the Route 91 Harvest country music festival, which was taking place near the hotel. At least 59 people were killed and more than 500 wounded from gunshots and other injuries. Paddock, who killed himself, was described by police as a lone wolf, although, as of yet, the police have refrained from describing the incident as an act of terrorism.  

On December 11, 2017, Akayed Ullah, 27, immigrant from Bangladesh, detonated in New York a pipe bomb filled with powder and shrapnel, and strapped to his body in the subway station under the Bus Terminal, injuring himself and three others. Ullah said he acted alone and carried out attack for ISIS. He was influenced by al-Qaida's online magazine "Inspire".  

 

Canada  

On 20 October 2014, in the 2014 Saint-Jean-sur-Richelieu ramming attack, the radicalized Saint-Jean-sur-Richelieu citizen Abu Ibrahim AlCanadi ran a soldier down and shot another. Couture-Rouleau was, in the aftermath, shot dead by an officer of the Sûreté du Québec.  

On 22 October 2014, Michael Zehaf-Bibeau opened fire at the National War Memorial. One soldier was shot. The suspect ran to the Parliament of Canada. The suspect was then engaged in a shoot out with security and police forces.  

On 29 January 2017 in the Quebec City mosque shooting, Alexandre Bissonnette, a Political science student at the University of Laval, opened fire in the Islamic Cultural Centre of Quebec City and killed six worshipers.  

 

Australia  

On 15 December 2014, a hostage crisis in the Lindt Café in Martin Place, Sydney ended with three deaths, including the suspect Man Haron Monis. There is doubt as to whether or not Monis fit the definition of a lone wolf terrorist. Queensland University of Technology criminologist Associate Professor Mark Lauchs said it was important the siege wasn't elevated to a "terrorist attack" as such. Associate Professor Lauchs said Monis was simply a deranged person running a hostage situation: "This incident was not about religion and neither was it a terrorist attack, but given that perception by the paraphernalia Monis used. " The Australian Prime Minister Tony Abbott said, "[Man Haron Monis] had a long history of violent crime, infatuation with extremism and mental instability. As the siege unfolded yesterday, he sought to cloak his actions with the symbolism of the ISIL death cult. " Former counter-terrorism adviser to the White House Richard Clarke said, "I don't think this was a lone wolf terrorist, I don't think this was a terrorist at all, I think this was someone who was committing suicide by police as a lot of people with mental problems do, and now, if they say they're a terrorist, if they say they're somehow associated with ISIS or Al Qaeda, it becomes a major event that shuts down the city and gets international attention. This was a person with a mental problem who tried to gain attention and succeeded, tried to shut down the city and succeeded, merely by putting up a flag that was something like the flag of ISIS. "

| 1404 | 5 / 5 (голосов: 1) | 17:46 11.12.2017

Комментарии

Книги автора


PUTIN : THE BOOMERANG OPERATION. Movie script. Mikhail Kryzhanovsky
Автор: Kryzhanovsky
Сценарий / Политика
Аннотация отсутствует
Объем: 1.38 а.л.
01:50 01.12.2023 | оценок нет

PUTIN/TRUMP :"THE BOOMERANG" OPERATION. Mikhail Kryzhanovsky
Автор: Kryzhanovsky
Монография / Боевик Политика Психология Публицистика
Аннотация отсутствует
Объем: 12.399 а.л.
18:29 06.09.2023 | оценок нет

I SEND TRUMP TO JAIL. Mikhail Kryzhanovsky, KGB/CIA
Автор: Kryzhanovsky
Монография / Политика
Аннотация отсутствует
Объем: 8.006 а.л.
21:04 25.07.2023 | оценок нет

I CAN STOP TIME. Mikhail Kryzhanovsky
Автор: Kryzhanovsky
Статья / Естествознание
Аннотация отсутствует
Объем: 0.143 а.л.
20:32 25.07.2023 | оценок нет

IMMORTALITY. Mikhail Kryzhanovsky System.
Автор: Kryzhanovsky
Монография / Естествознание
Аннотация отсутствует
Объем: 3.437 а.л.
00:25 21.07.2023 | оценок нет

Instructions on special operations. Mikhail Kryzhanovsky
Автор: Kryzhanovsky
Статья / Боевик Военная проза Мемуар
Аннотация отсутствует
Объем: 0.087 а.л.
23:54 18.07.2023 | оценок нет

Авторские права на произведения принадлежат авторам и охраняются законом. Перепечатка произведений возможна только с согласия его автора, к которому вы можете обратиться на его авторской странице.