Terrorism

 

 

https://sm.asisonline.org/Pages/Book-Review-Lone-Wolf-Terrorism.aspxBook Review: Lone Wolf TerrorismGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652019-04-01T04:00:00Z<p>​Columbia University Press; <a href="https://cup.columbia.edu/">cup.columbia.edu</a>; 336 pages; $35.​</p><p>Well written and exhaustively researched, <em><a href="https://cup.columbia.edu/book/the-age-of-lone-wolf-terrorism/9780231181747">The Age of Lone Wolf Terrorism</a></em> is an encyclopedia of information on the history, characteristics, methodology, and evolution of the lone wolf threat. Historical data is broken into pre-9/11 and post-9/11 groupings for analysis. The book presents holistic information succinctly and in a readable fashion. Reviewing this comprehensive list of attacks condensed in summary form with the ability to compare and contrast each event provides an outstanding reference for those in security.  </p><p>Professionals tasked with identifying and stopping lone wolf actors will find that this resource provides information not found in previous material. The authors take up the challenge to classify these attacks and help to form a critical look at potential patterns and instigating events.</p><p>The book provides information and lessons learned from past attacks while acknowledging the difficulty in proactively identifying the lone wolves. For example, Chapter 11 examines two terrorists who each committed lone wolf attacks. Each had broadcasted for some time their radical beliefs through social media. One attacker, Carlos Bledsoe, was even on the FBI’s Terrorism Watch List prior to his attack. Yet, neither man presented enough of a threat to warrant arrest, questioning, or even surveillance by law enforcement.  </p><p>The book proposes sting operations as a preventive measure but warns of such challenges as racial profiling accusations and potential defamation of character lawsuits. </p><p>The radicalization process is also worth the attention of security professionals. Some lone wolf actors are indoctrinated by terrorist groups and others by their local environments, such as those bullied in school or at work. This book presents a compelling look at how lone wolf terrorists are made over time, not born.</p><p>For security professionals trying to understand the lone wolf threat, this book provides an excellent reference. It will engage both experienced professionals and those who are new to the topic.  </p><p><em>Reviewer: Bill Scott, CPP, PMP (Project Management Professional), is a senior director with ABS Group focused on security and emergency response operations planning. He is former chair of the ASIS Global Terrorism, Political Instability, and International Crime Council and a member of the committee writing the ASIS workplace violence standard.</em></p>

Terrorism

 

 

https://sm.asisonline.org/Pages/Book-Review-Lone-Wolf-Terrorism.aspx2019-04-01T04:00:00ZBook Review: Lone Wolf Terrorism
https://sm.asisonline.org/Pages/Book-Review-Beirut-Rules.aspx2019-04-01T04:00:00ZBook Review: Beirut Rules
https://sm.asisonline.org/Pages/Mass-Shooting-in-New-Zealand-Leaves-Numerous-Dead.aspx2019-03-15T04:00:00ZMass Shooting at New Zealand Mosques Leaves Numerous Dead, Injured
https://sm.asisonline.org/Pages/Less-Lethal,-More-Universal.aspx2019-03-01T05:00:00ZLess Lethal, More Universal
https://sm.asisonline.org/Pages/Book-Review-Theories-of-Terrorism-.aspx2019-03-01T05:00:00ZBook Review: Theories of Terrorism
https://sm.asisonline.org/Pages/March-2019-SM-Online.aspx2019-03-01T05:00:00ZMarch 2019 SM Online
https://sm.asisonline.org/Pages/Alone-Together-and-Angry-an-Incel-Revolution.aspx2019-03-01T05:00:00ZAlone Together and Angry: An Incel Revolution
https://sm.asisonline.org/Pages/Pushing-Buttons.aspx2019-03-01T05:00:00ZPushing Buttons
https://sm.asisonline.org/Pages/Book-Review-Corporate-Security.aspx2019-02-01T05:00:00ZBook Review: Corporate Security
https://sm.asisonline.org/Pages/Battlefield-in-the-Mind.aspx2019-01-01T05:00:00ZBattlefield in the Mind
https://sm.asisonline.org/Pages/Book-Review-Personal-Security.aspx2019-01-01T05:00:00ZBook Review: Personal Security
https://sm.asisonline.org/Pages/Maritime_Maladies.aspx2018-12-01T05:00:00ZMaritime Maladies
https://sm.asisonline.org/Pages/Something-in-the-Water.aspx2018-11-01T04:00:00ZSomething in the Water
https://sm.asisonline.org/Pages/Terror-Attacks-Are-Down,-But-Deaths-Are-Up.aspx2018-09-26T04:00:00ZTerror Attacks are Down, But Deaths are Up
https://sm.asisonline.org/Pages/Cyber-Trumps-Physical-as-Biggest-Threat.aspx2018-09-26T04:00:00ZCyber Trumps Physical as Biggest Threat
https://sm.asisonline.org/Pages/Book-Review-Anatomy-of-Terror.aspx2018-08-01T04:00:00ZBook Review--Anatomy of Terror
https://sm.asisonline.org/Pages/The-Returned.aspx2018-07-01T04:00:00ZThe Returned
https://sm.asisonline.org/Pages/Catastrophe-on-Delivery.aspx2018-07-01T04:00:00ZCatastrophe on Delivery
https://sm.asisonline.org/Pages/Book Review-Misunderstanding Terrorism.aspx2018-06-01T04:00:00ZBook Review: Misunderstanding Terrorism
https://sm.asisonline.org/Pages/Book-Review---Nanoweapons.aspx2018-05-01T04:00:00ZBook Review: Nanoweapons