picture

Lone Wolf Terrorism Prospects and Potential Strategies to Address the Threat


Table of Contents

Table of Contents


Acknowledgments


Synopsis

1. Introduction

2. Overview of the Results of a Real-Time Delphi Study

3. The Role of New Technologies: Tools and Targets of Terror

4. The Cyber Dimension

5. Detection of Potential Lone Wolves

6. Legal and Ethical Aspects Related to Lone Wolf Phenomenon

7. Conclusions and Recommendations


Appendices

Appendix A. The RTD Questionnaire

Appendix B. RTD Responses—full listing

Appendix C. Demographics of the Participants in the RTD

Appendix D. The Real-Time Delphi Method

Appendix E: Examples of LW Cases

Appendix F: Authors Biographies


List of Figures and Tables

Acronyms and Abbreviations