Lone Wolf Terrorism Prospects and Potential Strategies to Address the Threat

Table of Contents

Table of Contents



1. Introduction

2. Overview of the Results of a Real-Time Delphi Study

3. The Role of New Technologies: Tools and Targets of Terror

4. The Cyber Dimension

5. Detection of Potential Lone Wolves

6. Legal and Ethical Aspects Related to Lone Wolf Phenomenon

7. Conclusions and Recommendations


Appendix A. The RTD Questionnaire

Appendix B. RTD Responses—full listing

Appendix C. Demographics of the Participants in the RTD

Appendix D. The Real-Time Delphi Method

Appendix E: Examples of LW Cases

Appendix F: Authors Biographies

List of Figures and Tables

Acronyms and Abbreviations