FRAMEWORK TO COUNTER LONE WOLF TERRORIST ACTIVITY VIA WEB

http://dx.doi.org/10.31703/gmcr.2021(VI-II).02      10.31703/gmcr.2021(VI-II).02      Published : Jun 2021
Authored by : Shabnam Gul , Muhammad Faizan Asghar , Zahid Akbar

02 Pages : 13-25

    Abstract:

    Lone wolf is one of the most dangerous shape of terrorism as they are almost undetectable. Although lone wolf is almost untraceable, it is possible that they leave footprints while using internet. However, internet is primarily used to communicate ideology to potential lone wolf, and visitors of such internet sources or websites require technical expertise which is not very common. This enables lone wolf to operate effectively, staying in low profile till the time an opportunity does not offer itself. It has the most devastating effect on the morale of counter terrorist force and is also the most effective terrorist tool to spread fear in the hearts of populous

    Key Words

    Lone Wolf, Internet, Digital Media, Terrorist Attacks, Rational, Detecting

    Introduction

    Lone wolf terrorism is the most recent level of expertise in the field of terrorism. The bunch of lone actor attacks assaults likewise raises the apparition of copycat assaults, a marvel saw by crime analysts, ordinarily among youthful guys who are motivated by exciting exposure that encompasses mass homicides and who show a blend of serious psychological maladjustment, criminal records, or a past filled with brutal conduct. In any case, independent analysts Mark S. Hamm and Ramón Saaijof person’s illegal intimidation, found that of the 12 independent person fear monger copycat assailants they examined, just three were youthful and just three had dysfunctional behaviors. Thought process seems, by all accounts, to be the greatest contrast between copycat mass killers and copycat independent person fear-based oppressors. Copycat mass killers look for notoriety for themselves, while copycat solitary

    fear mongers need to add on in connection to a political reason. 

    Terrorism being a socially constructed phenomenon is the practical implementation of extremism. In this research article we will go through some examples which clearly show the rational attitude and extremism which is directly proportional to the lone wolf terrorism. 

    Meaning of Lone Wolf

    Lone wolf means a criminal that isn't part of a bigger illicit association or organization. This is the terrorist attacks made by only one person and he is not a part of any terrorist group. A lone wolf terrorist is, similar to some other assortment of fear monger, a vicious political radical. The unmistakable part of the lone wolf terrorist is that the person designs and executes demonstrations of dread autonomously, with no immediate impact from a psychological militant association. Since 2001, these kinds of fear monger assaults are expanding in number and recurrence and are especially hard to connect with from a deterrent standpoint. US law authorization and knowledge offices may have to foster on a very basic level new techniques for battling and forestalling independent person dread.

    IS Lone Wolf Really Alone? 

    A typical analysis of exploration on lone wolf terrorism is that solitary aggressors are "not really alone" and they frequently have contribution with radical gatherings. There is some legitimacy to that contention.

    Example

    Think about the noteworthy death of Martin Luther King, Jr. of USA Subsequent to getting away from the Missouri State Penitentiary in 1967, James Earl Ray advanced toward Los Angeles where he joined the 1968 official mission of the previous segregationist legislative head of Alabama, George Wallace, who was running on an outsider ticket behind the motto "Support America." 

    Beam turned into a volunteer at Wallace crusade central command in North Hollywood, where he savaged the roads and bars begging individuals to decide in favor of Wallace. Beam related to Wallace's tirades against enormous government, his supporting of the functioning man, and his distinct situation on race relations. 

    It was in Alabama that MLK had accomplished his most prominent social liberties triumphs, so Ray planned an arrangement to kill King dependent on the unusual conviction that by killing King, Ray could acquire acknowledgment from the large numbers of white Americans who censured King, further accepting that if Wallace were chosen president, he would absolve Ray after a concise sentence in an Alabama jail. "Revolutionaries regularly neglect to get what their toxin does," commented a death master of Wallace's impact. "They establish a climate where lost spirits can feel like they're enabled to accomplish something like [assassination], and that the way of life will bless their wrongdoing.”  

    Origin of Lone Wolf Terrorism

    Again, in USA in the Las Vegas attack, on a blue grass concert, the shooter, Stephen Paddock, was immediately named a "lone wolf," which means he acted alone. 

    While the expression "lone wolf" has been utilized for quite a long time, it is progressively being co-picked political and polemical reasons. 

    The ramifications are that there's some kind of problem with a "lone wolf". After all, wolves are extremely friendly creatures that generally run-in packs. The "lone wolf" is now and then a pariah who needs to stow away from the principal pack, however they're really uncommon. 

    To begin with, the set of experiences. Merriam-Webster characterizes "lone wolf" as "an individual who likes to work, act, or live alone." That positively appears to depict Paddock, who news reports called a "recluse," somebody not cordial or well-disposed to neighbors. (The image of the mass executioner as "a calm person" was transformed into a 2007 film, with a wind) 

    As Ben Zimmer wrote in The Wall Street Journal, "lone wolf" has been with us for quite a long time. Not surprisingly, Native Americans had some incredible bosses or champions named "lone wolf" however, as individuals from ancestral networks, they were not actually "independent people." 

    The non-literal utilization of "lone wolf" can be followed to famous fiction. Zimmer noticed that a human "lone wolf" showed up in H.G. Wells' The Invisible Man, distributed in 1897, as the imperceptible man is being encouraged: "Don't be an independent person. Distribute your outcomes." The author Steven Crane called war reporters "lone wolf" in his 1899 novel, Active Service. 

    Criminal investigators were soon looking into the issue: Zimmer refers to a progression of 1914 books where a gem cheat turned analyst is known as a "independent person." The Oxford English Dictionary says the non-literal utilization displayed in the United States in 1909 in the F.H. Tillotson book How to Be a Detective: "Sometimes the police stumble into Panhandlers known as 'solitary individuals'— that is they don't blend in with others of their group." 

    Before long the actual cheats were "lone wolf" in the event that they weren't important for a group. 

    All the more as of late, assaults completed by a solitary individual have regularly been marked as "independent people" assaults, regardless of whether they were motivated by a fear monger gathering or, similar to the Las Vegas assault, apparently autonomous. 

    In August, one of President Trump's associates, Sebastian Gorka, asserted the Obama organization created the expression "lone wolves terrorism," saying that each assault considered psychological oppression was associated with ISIS or Al Qaeda. That guarantee was marked "Jeans on Fire" by PolitiFact, which recorded heaps of where the term had been utilized years sooner. 

    The politicization of the expression "independent person" proceeded after the Las Vegas assault, when Shaun King of The Intercept wrote in The White Privilege of the 'lone wolf' Shooter that "Whiteness, some way or another, shields men from being named fear mongers." The Associated Press proceeded with the conversation with a story looking at whether the expression "independent person" was utilized in a racial setting, generally for whites charged in assaults. The wrongdoings of minorities, these articles say, are generally attached to their race or their association with revolutionary Islam, which some of the time turns out to be a significant stretch, while white "lone wolf" violations are accounted for as abnormalities. 

    "Independent person" is another mark that brings implications, purposefully or not. As we've regularly said, naming individuals as opposed to acts, without more explicit portrayals of those individuals, prompts a distortion. Maybe than calling any executioner "lone wolf" a direct portrayal is less inclined to turn: "he acted alone."

    Recent Examples of Lone Wolf Terrorism

    Muslim Family Killed in Canada in ‘Premeditated’ Truck Attack

    The assault occurred in the city of London, Ontario territory. A kid matured nine, the family's just survivor, is in clinic with genuine wounds. 

    A 20-year-old Canadian man has been accused of four checks of homicide and one tally of endeavored murder. 

    "It is accepted that these casualties were focused on in light of the fact that they were Muslim," Det Supt Paul Waight told a news meeting on Monday. 

    Police are gauging conceivable psychological warfare charges, he said, adding that it is accepted to be a disdain wrongdoing.

    This all was done by only one man. It was his hatred towards the religion Islam and the concept of Islam phobia.  

    New Zealand Attack, on Muslims in Mosque

    A About 51 Muslims were martyred, while praying their holy prayer in mosque. This was also done by a lone wolf. This was influenced by social media. Some reports say that it was planned according to the game” PUBG” 

    Days before the primary commemoration of a shooting in Christchurch that killed 51 Muslim admirers, a post showed up on a scrambled informing application showing a balaclava-clad man outside one of the assaulted mosques with a danger and a weapon emoticon. 

    The message was the most recent in various dangers against minorities in New Zealand, proof of what specialists say is an increment in disdain wrongdoing and xenophobia since the mosque slaughter by a presumed racial oppressor on March 15 last year. 

    The shooter, equipped with quick firing weapons, assaulted Muslims going to Friday supplications in the South Island's biggest city, broadcasting New Zealand's most exceedingly terrible mass shooting live on Facebook. 

    Brenton Tarrant, an Australian public, deals with 92 indictments comparable to the assaults on Al Noor and Linwood mosques. He has argued not blameworthy and faces preliminary in June. 

    New Zealand's unprecedented overflowing of adoration and empathy for the Muslim people group after the assault was driven from the front by Prime Minister Jacinda Ardern. She quickly presented new firearm laws and began a worldwide development to get rid of online disdain in a reaction that was hailed as a model for different pioneers. 

    Yet, the assault likewise enlivened extreme right patriots and hostile to movement campaigners to be more dynamic both on the web and disconnected, as indicated by Muslim pioneers, activists and specialists. 

    "The assault unquestionably encouraged individuals who need to spread disdain," said Anjum Rahman from the New Zealand Muslim Council of Women.

    The gathering has more than once alarmed the public authority in the previous year about the ascent of the outrageous right and the developing danger felt by Muslim ladies in New Zealand. 

    Rahman announced the most recent danger against the Al Noor Mosque to police after she was shown the picture which was being shared on the scrambled online media informing application Telegram. 

    Police said a 19-year-elderly person was accused of neglecting to help police with a court order corresponding to the occurrence and would show up in court not long from now. 

    Neighborhood media reports have connected the man to a white patriot bunch called Action Zealandia, which was shaped in July 2019, only months after the Christchurch assault. On its site it says it is centered on "building a local area for European New Zealanders". 

    In light of the episode, Action Zealandia said in a proclamation on Twitter the supposed activities of the blamed are not inside its code for direct and was "juvenile and useless as we don't utilize savagery to arrive at our objectives". 

    Police said they were attempting to guarantee they have an inside and out information on people and gatherings whose activities represent a danger yet didn't remark on a particular gathering.

    Mohammed Taheri-Azar

    In 2006, Taheri-azar drove his vehicle into a group at the University of North Carolina at Chapel Hill trying to kill Americans in assumed retribution for the conflicts in Iraq and Afghanistan. A letter he left for police read: "I live with the heavenly Koran as my constitution for good and bad and meaning of treachery… I've perused every one of the 114 sections around multiple times since June of 2003 when I began perusing the Koran. The U.S. government is liable for the passings and torment of endless supporters of Allah, my siblings and sisters. My assault on Americans at UNC-CH March 3, was in reprisal for comparative assaults organized by the U.S. government on my kindred supporters of Allah in Iraq, Afghanistan, Palestine, Saudi Arabia and other Islamic regions."

    February 2010

    U.S. Pilot Andrew Joseph Stack III intentionally crashes his airplane into a structure in Austin, Texas, offing himself and one other. He posted a self-destruction note communicating dismay with the "covetousness" of the U.S. government.

    Role of Social Media in Spreading Lone Wolf

    Social media is the most important part of our lives. Almost everything is done through social media, and it has huge impact on our lives, especially on the minds of people having an ideology of extremism and hatred towards different ethnicities, sects or religions which ultimately leads towards terrorism. 

    Talking about lone wolf terrorism, it is mainly done through social media and internet. One of the Netflix series, money heist, shows perfectly how they use media as their powerful tool. The Professor gains public support through social media, and he becomes an influencer within a short period of time. He with the help of media experts from Pakistan, gets every single information and uses it against the government, Police, and ministry of Internal Affairs.

    Detecting Lone Wolf Terrorists

    Despite the fact that the lone wolf terrorists are overall very difficult to recognize by customary methods, there are regularly numerous frail signs accessible that, whenever identified and intertwined, can be utilized as markers of conceivably fascinating conduct that must be examined further and researched further. As has been referenced by Fredholm, essentially all radicalization of independent person fear based oppressors happen on the Internet. 

    One illustration of a notable online asset rousing local terrorism is the online magazine Inspire, distributed by the al-Qaeda in the Arabian Peninsula (AQAP). Web based enlistment to fear based oppressor bunches is likewise prone to fill in importance, in spite of the fact that enrollment to dread associations are all the more regularly subordinate additionally on disconnected organizations. 

    These sorts of Internet based radicalization measures regularly bring about different advanced follows, made when visiting radical gatherings, making postings with hostile substance, and so on There are likewise numerous different models where Internet has been utilized by solitary individuals to spread their perspectives and suppositions prior to submitting a genuine assault. One such model is the counter early termination lobbyistScott Roeder who killed doctor George Tiller in 2009.

    Turner was one of the few professionals in the United States who arrived late, and even before the attack Scott Roeder wrote a paragraph on the front page of the dissertation in which he shared his views on Tiller's child removal and work. Another portrait of a wolf who used the Internet to express his views was James von Brunn, also known as the Holocaust Museum. Von Brunn was an enemy of the Semitic dictators who turned the enemy into a Semitic site where he could talk to people he met before he was attacked. When a terrorist organization takes place, it is not surprising that, for example, the media collects various computers that follow every conceivable, moreover, raising questions about police inefficiency or understanding of inefficiency. However, unless it can be easy to find linked evidence when an act of terrorism has taken place, it is very difficult to find out what the key points (weak signals) are before the actual attack.

    There are a few symptoms that can be distinguished, however. One such feature is the movement in dynamic conversations or the various forms of web-based media. Another sign is changing or derogatory words in compiled content. In it, various ideas of social change markers of change are produced. These public tags are derived from a series of warning practices displayed in. The behavioral traits considered are:

    Leakage: that is, contact with an outsider who is expected to do harm to the purpose, for example, posts made by many school shooters before their attack.

    Correction: e.g., undeniable neurotic disorder with a person or cause, such as Clayton Waagner's public case of data directed at primary care specialists.

    Identification: that is, the longing to be like a good example, a “hero who separates the evidence,” or an ID for gathering or a great cause. Another image of a champion ID could be photos of Anders Behring Breivik pointing a fixed weapon against the camera.

    These behavioral markers can be used as indicators to support that someone is planning to instill fear. Apart from the fact that there is still a debate about the quality and value of web performance by one wolf, the way private individuals use the web includes the slightest uncertainty. In any case, when they do not want to be intimidated by the tactics of the oppressors or do not initiate a military protest, they may be communicating with their opine particles on the web or conducting conversations with different people who have adopted the same philosophy. This task force may be used to detect single wolf terrorists before launching a psychological attack.

    Leaks

    The outstanding level of lone wolf terrorists is that they often report their ideas and aim ahead. From the examples of school shooters (an eye-opener with individual depression) under investigation, the vast majority of perpetrators disclosed their intentions to online media before ending their attacks. Rewarding correspondence with an outsider for the purpose of doing evil on purpose. Leaks can be all things that are considered intentional or unexpected and the sky is the limit from there or clearly in relation to a real attack. Expectedly deleted data is likely to contain the words of the helper actions marking the goal (e.g., "..... Likes ...," "... I'm going to ...," "... Should ...") and words that speak by violent activity, either explicitly or, perhaps, by doublespeak's. By looking at these ideas, leaks can be detected using the basic method in which distributed content following the termination or production of drugs (reduces termination to restore the base of the common word) is combined against a predefined term for malpractice. Since there are innumerable parallels that can be applied to action words that signal malicious intent, the use of metaphysics, for example, the lexical knowledge base of WordNet3 in which semantic relationships between similar word sets can be used. An example of such a semantic connection would be that the verb word "stab" has a place with the same set as the words "cut down" and "butcher." By using such a semantic relationship, the number of words that should be clearly defined in the name of the diminishing of the words you should look for can decrease.

    Since a single wolf word event referring to an aggressive activity is far enough to collect a sentence as a sign of disintegration, the inclusion of a grammatical label should be viewed in the same way when searching for signs of demolition. This type of text-testing techniques obviously bears the brunt of accustomed to unexpected statements, leading to the risk of false positives where jokes are collected as a sign or possible leak. However, by blocking spatial considerations or discussions that with robotic content experiments or previous data are known for over-displayed content, the best can be set.

    Service

    Encouraging behavior called identification is manifested as behavior that shows a desire to be a “pseudo-commando,” to have a fighting attitude, to cooperate with weapons or to re-use other soldiers or law enforcement gears, related to past abusers or professional assassins, classify them as experts to present a cause. This perhaps broad explanation indicates the complexity of the miracle. To make sense, we follow the above, dividing the evidence into two categories: the ID with the conversion function and the ID with the function model. Collection identification is considered to be an important part of the radicalization of independent individuals as organized psychologists.

    Identification of a circle or cause can be conveyed for example by using constructive explanations in relation to the purpose of the meeting. Similarly, the use of words with a negative connotation in relation to a meeting reference or also an individual may indicate a bad identity. To determine what positive or negative ideas are contained in the content, or what emotions are conveyed, to measure and influence the investigative methods that can be used. Meeting indicators can be identified by researching the use of first pronouns ("we" and "us"), while the third pronouns (eg "them" and "them") are used more frequently as they can be used as an indicator of zeal. In the product LIWC is used to check the total record of al-Qaeda records. A professional ID, which is thought to be warlike, can be seen in the use of certain words, while a sense of goodwill can be conveyed by using words marked with responsibility, respect, equality, and other identification with another superhuman artist, without quoting and pointing sequentially. Often the same repetition as a good example is used and it makes sense to use a comparative sentence structure. In these cases it is possible to use the creators' consent methods to identify similarities.

    Fixation

    The admonition conduct fixation demonstrates a distraction with an individual or a reason, for example expanding perseveration on the object of obsession, progressively obnoxious assessment, or progressively bad portrayal of the object of obsession. 

    Fixation can be seen as a propensity to more than once remark on an issue or an individual, which in composed correspondence would bring about text wherein one individual, gathering or issue is referenced by the subject with an altogether higher recurrence than it is referenced by other discussants. Additionally, successive mixes of certain key terms, for example "Jew" and "socialism," can uncover a fixation with a specific thought. Fixation taking the structure of broad truth social event must be identified in correspondence if an individual decides to share a portion of the data. 

    To track down this sort of fixation in text, the family member recurrence of key terms identifying with named elements, for example, people, associations, and so on, can be tallied. To discover which words that identify with named elements, calculations for named element acknowledgment can be utilized. Executions of such calculations are accessible in free normal language handling tool stash. 

    Conclusion

    One of the serious issues with regards to identifying conceivable lone wolf terrorists is that there is no steady or then again regular profile of a lone wolf. Besides, the independent people are difficult to catch utilizing conventional knowledge techniques since there are no actual gatherings to penetrate or wiretap. Notwithstanding, there are many substantial activities and exercises (that are not really illicit) taken by a person that can be treated as feeble signs and that joined may show an interest in psychological warfare acts. Perceiving what's more, dissecting computerized follows from online exercises of conceivable lone wolf is one key to the troublesome issue of identifying lone wolf terrorists before they strike. We have given a structure for working such computerized follows using procedures, for example, theme separated web reaping and content examination utilizing regular language handling. Portions of the proposed framework have been executed, while work still needs to be accomplished for other parts. 

    As the danger of homegrown and worldwide lone wolf terrorism expands, the recognizable proof and following of fear mongers is the main part of counterterrorism. Given the variety of the wellsprings of lone wolf terrorism, every danger is related with various underlying conditions and likely members. Profiling lone wolf terrorists is extremely troublesome. Be that as it may, zeroing in on the courses to psychological warfare has permitted us to more readily comprehend the enrollment, radicalization, and related exercises related with illegal intimidation overall and lone wolf warfare specifically. Computerized pieces left as they become radicalized and move from observer to potential danger give pieces of information to their distinguishing proof. At the global and public levels, criminological bookkeeping, the checking of the Internet and the Dark Web, also, the utilization of covert digital agents assume significant parts in powerful counterterrorism. Nearby law requirement can utilize the data created by other organizations and can give local area mindfulness and neighborhood commitment to address the danger of independent person fear mongers. The main component stays the cautiousness and inclusion of residents and even relatives. While independent person psychological militants are difficult to recognize and track, getting familiar with their courses and practices gives us the devices and strategies for 

    more powerful counterterrorism. 

    Feature that the proposed framework isn't expected to be completely programmed. The focal segment of the framework will be the human expert, yet this examiner will be upheld in crafted by finding, investigating, what's more, melding computerized hints of interest for discovering potential solitary individual psychological oppressors. Later on, we might want to perform more nitty gritty examinations with the model framework, to all the more appropriately assess the degree to which it is valuable for policemen.

References

Cite this article

    CHICAGO : Gul, Shabnam, Muhammad Faizan Asghar, and Zahid Akbar. 2021. "Framework to Counter Lone Wolf Terrorist Activity via Web." Global Mass Communication Review, VI (II): 13-25 doi: 10.31703/gmcr.2021(VI-II).02
    HARVARD : GUL, S., ASGHAR, M. F. & AKBAR, Z. 2021. Framework to Counter Lone Wolf Terrorist Activity via Web. Global Mass Communication Review, VI, 13-25.
    MHRA : Gul, Shabnam, Muhammad Faizan Asghar, and Zahid Akbar. 2021. "Framework to Counter Lone Wolf Terrorist Activity via Web." Global Mass Communication Review, VI: 13-25
    MLA : Gul, Shabnam, Muhammad Faizan Asghar, and Zahid Akbar. "Framework to Counter Lone Wolf Terrorist Activity via Web." Global Mass Communication Review, VI.II (2021): 13-25 Print.
    OXFORD : Gul, Shabnam, Asghar, Muhammad Faizan, and Akbar, Zahid (2021), "Framework to Counter Lone Wolf Terrorist Activity via Web", Global Mass Communication Review, VI (II), 13-25
    TURABIAN : Gul, Shabnam, Muhammad Faizan Asghar, and Zahid Akbar. "Framework to Counter Lone Wolf Terrorist Activity via Web." Global Mass Communication Review VI, no. II (2021): 13-25. https://doi.org/10.31703/gmcr.2021(VI-II).02