Cutting Through the Lone-Wolf Hype

It must also be recognized that attacks, even those conducted by lone wolves, do not simply materialize out of a vacuum. Lone-wolf attacks must follow the same planning process as an attack conducted by a small cell or hierarchical group. This means that lone wolves are also vulnerable to detection during their planning and preparation for an attack — even more so, since a lone wolf must conduct each step of the process alone and therefore must expose himself to detection on multiple occasions rather than delegate risky tasks such as surveillance to someone else in order to reduce the risk of detection. A lone wolf must conduct all the preoperational surveillance, acquire all the weapons, assemble and test all the components of the improvised explosive device (if one is to be used) and then deploy everything required for the attack before launching it.

Certainly, there is far more effort in a truck bomb attack than a simple attack with a knife, and the planning process is shorter for the latter, but the lone wolf still must follow and complete all the steps. While this operational model offers security advantages regarding communications and makes it impossible for the authorities to plant an informant in a group, it also increases operational security risks by exposing the lone operator at multiple points of the planning process.

Operating alone also takes more time, does not allow the lone attacker to leverage the skills of others and requires that the lone attacker provide all the necessary resources for the attack. When we consider all the traits required for someone to bridge the gap between lone-wolf theory and practice, from will and discipline to self-sufficiency and tactical ability, there simply are not many people who have both the ability and the intent to conduct such attacks. This is why we have not seen more lone-wolf attacks despite the fact that the theory does offer some tactical advantages and has been around for so long.

The limits of working alone also mean that, for the most part, lone-wolf attacks tend to be smaller and less damaging than attacks conducted by independent cells or hierarchical organizations. Breivik’s attack in Norway and Hasan’s attack at Fort Hood are rare exceptions and not the rule.

When we set aside the mystique of the lone wolf and look at the reality of the phenomenon, we can see that the threat is often far less daunting in fact than in theory. One of the most vocal proponents of the theory in the white supremacist movement in the late 1990s was a young California neo-Nazi named Alex Curtis. After Curtis was arrested in 2000 and convicted of harassing Jewish figures in Southern California, it was said that when he made the jump from “keyboard commando” to conducting operations in the physical world he proved to be more of a “stray mutt” than a lone wolf.

Lone wolves — or stray mutts — do pose a threat, but that threat must be neither overstated nor ignored. Lone attackers are not mythical creatures that come out of nowhere to inflict harm. They follow a process and are vulnerable to detection at certain times during that process. Cutting through the hype is an important step in dispelling the mystique and addressing the problems posed by such individuals in a realistic and practical way.

Cutting Through the Lone-Wolf Hype is republished with permission of STRATFOR.”

Page 3 of 4 | Previous page | Next page