The characterization of Islamist jihadist attacks as “spontaneous” or committed by “self-radicalized Lone Wolves” seems inaccurate and misleading. All attackers we
have seen in recent years were radicalized in mosques or Muslim schools they attended, online, in chatrooms and by social media they share with others.
While sometimes only one shooter, or stabber, was caught, they have relied on associates and networks for financial and tactical support. Moreover, they have chosen their targets and victims to “send a message.” The tight-knit Muslim communities supply a rich diet oh hatred to infidels and the Jews, and serve as a fertile ground for nurturing martyrs. Instead of pointing the finger at those who invite youngsters to join then train and support them, we seem to be overtaken by political correctness thus refusing to blame entire communities, which have done nothing to curb jihadist incitement, and from which the jihadists are setting out to attack us. Instead we parented that they are just a small group of misfits. This attitude will do little to stop such attacks – Rachel Ehrenfeld
The director of the Military and Strategic Affairs Program and Cyber Security Program at INSS, Gabi Siboni, has his own scholarly take on “Confronting Spontaneous Terrorist Attacks”:
“A prominent feature of many terrorist attacks in recent months by Islamic radicals is their independent, spontaneous, unplanned nature – sometimes called the work of lone wolves. The phenomenon presents a serious challenge to the security establishments in the nations where there has been a rise in the scope of spontaneous attacks, the West in general and Israel in particular. A critical review of the spontaneous attacks and some of the perpetrators points to two key characteristics that could help formulate a current doctrine of preventing attacks. The first is the basic profile of the attacker; the second is the behavior of the attacker just before the attack. Based on the combination of both factors, it is possible to construct a profile of the potential attacker and assign him/her a risk threshold that if crossed would indicate the intention to act. This in turn would raise the level of the risk to one that must be foiled….