Police Magazine Logo
MenuMENU
SearchSEARCH

Beware the Lone Wolf

Lone wolves operate on the fringes of extremist movements, with such loose associations being encouraged by terrorist organizations such as al-Qaeda and Hezbollah, and that makes them harder to detect.

Beware the Lone Wolf

Photo courtesy of Zuma Press.

10 min to read


"We've put a lot of resources into combating organized terrorist groups and cells and until recently we've ignored the lone wolf terrorist," says Jeffrey Simon, author of "Lone Wolf Terrorism: Understanding the Growing Threat."

But he cautions there's reason to fear the big bad wolf, who may be coming to a "theater" near you, and he stresses the time is now for law enforcement to bone up on its defense against solitary individuals bent on destruction for a cause.

Ad Loading...

Few better examples exist of the tragedy and terror lone wolves can incite than the Fort Hood shooting of 2009 and the Boston Marathon bombings of 2013.

The Fort Hood shooting was a jihadist mass murder near Killeen, Texas, where U.S. Army Maj. Nidal Malik Hasan fatally shot 13 people and injured more than 30 others because of his extremist beliefs. The Boston bombings, which occurred in April of this year, gave Americans another sobering reminder of the tragedy lone wolf terrorists can trigger. Here Tamerlan and Dzhokhar Tsarnaev, also motivated by extremist beliefs, detonated two pressure cooker bombs near the Boston Marathon finish line, killing three people and injuring more than 260 others. Like Hasan, the brothers were not connected to known terrorist groups. They learned to build explosive weapons from an online magazine published by al-Qaeda affiliates.

These examples highlight that terrorist operations are not always broad-scale sophisticated attacks, organized with plenty of resources and funding. "Even low-level terrorist attacks by lone wolves can have a tremendous negative impact on government and society," Simon says. "When fighting terrorism, we need to be as concerned about lone wolves as we are about large-scale terrorist events."

Two years prior to the Boston bombings, Homeland Security Secretary Janet Napolitano warned that lone wolf terror plots were on the rise. "What we see now is smaller plots," she said at the time. "But we are also seeing a rise of activities by individuals who are acting by themselves, and that kind of attack is the most difficult to prevent because there is nothing to intercept."

Lone wolves operate on the fringes of extremist movements, with such loose associations being encouraged by terrorist organizations such as al-Qaeda and Hezbollah, and that makes them harder to detect.

Ad Loading...

Don Alwes, an instructor for Double Star Training Corp., who also teaches active shooter courses for the National Tactical Officers Association, emphasizes that "good intelligence on a national level, information sharing on a regional level, and when it comes right down to it, good old-fashioned community policing" are all good ways to wage war on lone wolf terrorist tactics.

The Internet Connection

The Internet increases connectedness across the globe, making it easier for would-be lone wolves to uncover ideologies and associations supporting their belief systems. In this technological age of terrorism, would-be extremists become radicalized online, studying attack strategies, tactics and weapons, potential targets, and extremist ideologies.

"Before the Internet, individuals had to make more of an effort to be engaged," says Simon. "Now they can turn on a computer and read a blog on extremism or learn about a terrorist group. They can turn to the Internet for advice on how to make explosives. An online jihadist magazine taught the Tsarnaev brothers to make pressure cooker bombs."

But the Internet presents a double-edged sword because while lone wolves tailor their tactics online, they also brag about them there. They use social media, chat rooms, and email to share their intentions and actions with others. "And the more these individuals use the Internet, the better the chances are of learning about would-be attacks before they occur," Simon adds.

Ad Loading...

According to Brad Barker, president of HALO Corporation, a San Diego, Calif.-based counter-terrorism training consultant, in a high percentage of adjudicated cases perpetrators shared their intentions or exhibited indicators online. "Social media outlets are where they share and propagate intelligence indicating means, motive, and opportunity," he says.

Hasan espoused beliefs in e-mails and in person that should have generated concern about his intentions, while the Tsarnaev brothers made radical statements about their beliefs and intentions online.

Because of this, Barker believes the Internet represents the first space law enforcement needs to inhabit to thwart lone wolf attacks.

"Software programs allowing law enforcement to crawl social media and open-source Internet looking for keywords and images of weapons are available," Barker says. "You would not believe the number of felonies that are recorded by perpetrators just prior to, after, or even during an event. They boast, 'This is what I'm planning, this is what I'm doing, and this is what I just did.' "

Many agencies already troll the Internet for intel, says Michael Downing, commanding officer of the Counter-Terrorism and Special Operations Bureau of the Los Angeles Police Department. In fact, he says large departments such as the LAPD rely heavily on the Internet to pursue and hunt bad guys.

Ad Loading...

"But look at how many Websites, chat rooms, and social media outlets criminals can use," he says, explaining the complexity of the problem. "Law enforcement's use of social media and the Internet needs to grow and we need to become more skilled at using it because it is a training camp for violent extremists who are using the Internet to post propaganda, recruit members, finance their operations, and send encrypted covert messages."

Monitoring such information may soon become even more difficult as the result of disclosures by NSA contractor Edward Snowden, who leaked classified details of top-secret U.S. and British government mass surveillance programs. The Snowden case demonstrated that the  minute the government shows signs of over-arching invasions of privacy, public outcry over its efforts can be heard loud and clear. But Alwes believes people lose their expectation of privacy when using a public venue such as the Internet to plan, coordinate, and talk about an attack. "If someone makes statements about wanting to hurt others, we should be paying attention to that," he says.

Hello Neighbor

In the days of old, foot patrol officers walked their beats chatting up citizens in the neighborhood, becoming a trusted friend to those who lived there. That friend in uniform became the first person citizens turned to when things were amiss, but with today's officers spending the majority of their time cruising in heated/air-conditioned vehicles with the windows rolled up, this is no longer the case.

But it should be, says Downing, who indicates community outreach plays a critical role in proactively preventing and responding to lone wolf attacks. The LAPD, he says, has engaged in community outreach, especially in minority communities, for more than seven years. "Relationships in those communities have blossomed and developed into relationships built on trust," he says. "And as trusted friends of the community, when there is something wrong, citizens come to us because they know we are ready and willing to help.

Ad Loading...

"We have to create an environment where it's harder for these things to take root and easier for officers to detect them when they do," Downing continues. "When you work with communities that feel victimized, oppressed, and have grievances, and give them a voice and opportunities to participate, you develop good intelligence."

When citizens mistrust police, they may not report suspicious activity. Even with established and trusting relationships with the local men and women in blue, citizens may not share information on criminal acts. Police hope that technology such as crowd sourcing can change that.

Crowd sourcing provides the public with a means of reporting criminal activity in real-time from mobile devices. With 80 percent of the population owning at least one personal electronic device, this strategy becomes a boon to law enforcement intelligence. To date, more than 700 U.S. law enforcement agencies have deployed digital or cyber BOLO capabilities, where citizens can text, Tweet, or use other social media to communicate with law enforcement in real-time, and as they disseminate these messages, the system geotags and timestamps them.

"Digital BOLO capabilities give law enforcement real-time situational awareness so they know where, when, who, and what occurred," says Barker. "This is actionable intelligence coming to law enforcement that can be used to make decisions."

Know the Signs

Ad Loading...

After a lone wolf strikes, a wealth of Monday morning quarterbacking takes place, with people coming out of the woodwork to say they knew something wasn't right with the suspect.

"Typically, there are cries for help (before the attack), but these cries are never acknowledged until after the fact," says Simon.

The day of the Boston bombings was not the first time the FBI had heard of Tamerlan Tsarnaev. A "foreign government" had asked the bureau to check him out in early 2011, warning that he was a follower of radical Islam. In the case of Hasan, the warning signs were also there. Hasan made statements justifying homicide bombings, spewed of anti-American hatred, and reached out to al-Qaeda.

Simon believes law enforcement officers must learn the common behavior recognition patterns or pre-incident indicators of lone wolves and then engage community members to make reports when they spot them. The Department of Homeland Security has devised the "If you see something, say something" campaign, which Simon calls somewhat effective. "It's on the right track," he says. "A lot of people say nothing and do nothing when they spot an individual showing signs of trouble," he says.

Individuals need to feel confident enough to confide in law enforcement and share what they've seen. And when they do, law enforcement must be prepared to act, adds Simon. "When people start exhibiting these behavior patterns and indicators, law enforcement needs to start peeling back the onion and asking: Is this person under stress? Is everything OK? Are they seeing a professional? Are they on meds? Are they taking their meds?" he says.

Ad Loading...

Arguably this is where law enforcement needs the most help, insists Barker. "Where we need the attention, where we need the help, where we need funding is to the left of the 'flashpoint' or incident, where we need to identify pre-incident indicators." He suggests studying past lone wolf crimes to identify the common behavioral patterns and indicators seen before an event. "They need to be analyzed to determine what the catalysts are," he says.

With the right training in place, law enforcement officers will spot strange behaviors and indicators in the course of their jobs. "Law enforcement has an uncanny ability to identify negative behavior, a sort of sixth sense," says Barker. "And law enforcement has the desire and the aptitude to do the right thing based on what they've been taught. So you have to acknowledge these behaviors and indicators and develop training curriculum to work before the flashpoint occurs."

Tell Them About It

The last piece of the puzzle is information sharing. At the local level police may hear something from the community; at the state and federal level, there may be intelligence coming in from other sources. The point is that to be effective law enforcement at all levels must share the information they gather.

"I can tell you that there have been improvements since 9/11 but it's still nowhere near perfect in terms of information sharing," says Alwes. Joint Terrorism Task Forces have beefed up intelligence sharing between state and local and federal law enforcement. But when one considers that there are 800,000 law enforcement officers and 18,000 agencies in this country, communications among them becomes a challenge.

Ad Loading...

Downing stresses that cultural barriers, restrictions on access to information, and physical boundaries all complicate communications between law enforcement entities, making them less authentic and largely ineffective.

"When the FBI was done investigating Tsarnaev, officials should have let local law enforcement know they were done with him, but that they had had a concern with him," Downing says. "State and local authorities have many more tools available to monitor such individuals. They are out in the community 24/7, have relationships with the community, and know state and local laws that they can use to develop more actionable intelligence."

Combating lone wolf terrorism requires law enforcement to work together for the better good. "This cannot be solely a federal government problem," says Downing. "The state and locals have got to be involved because this threat is decentralized, and state and locals are often in a position to complement what the government is doing in a big way."

Leigh Hunt is a freelance writer based in Fort Atkinson, Wis.

Subscribe to our newsletter

More Patrol

Group of men and women seated in a circle around a room as one woman stands and leads discussion.
PatrolApril 9, 2026

Warriors Heart’s Mission to Serve America’s Veterans and First Responders

Warriors Heart works closely with federal and community partners to expand treatment options for veterans and first responders. By combining specialized clinical care with a peer-driven recovery environment, the program helps warriors rebuild strength, restore relationships, and rediscover purpose.

Read More →
Black background with police card lights and logo for POLICE, with headline in yellow: How are LE Boots Different for Women
Patrolby Wayne ParhamApril 9, 2026

How are LE Boots Different for Women?

Boots fit differently for men and women, so how are law enforcement boots for women designed differently from those worn by men? In this video, Kyle Ferdyn, of Garmont Tactical, shares all the details.

Read More →
Man standing in desert talking on radio.
PatrolApril 9, 2026

Motorola Solutions Extends Resilient, Mission-Critical Communications and AI with T-Satellite from T-Mobile

A collaboration between Motorola Solutions and T-Mobile helps deliver uninterrupted situational awareness and access to AI wherever the mission leads, enabled by satellite connectivity for Motorola Solutions' APX NEXT smart radios.

Read More →
Ad Loading...
Las Vegas skyline at dusk with headline 2026 Vision FirstNet Users Summit, dates for the event, and diagonally at bottom right words Registration Open.
PatrolApril 9, 2026

Registration Now Open for 2026 Vision FirstNet Users Summit

Registration is now open for the 2026 Vision FirstNet Users Summit. The Summit is an opportunity to connect with local and federal leaders, specifically the FirstNet Authority, which is hosting a track at the event this year.

Read More →
Two chest rig packs in camo in front of a blue themed SWAT background and a logo for Tasmanian Tiger.
PatrolApril 6, 2026

Tasmanian Tiger Launches Modular Chest Rig 4xM4 & Modular Chest Rig Pack for LE

Tasmanian Tiger has expanded its Modular Load-Carrying System with the new Modular Chest Rig 4xM4 and Modular Chest Rig Pack. Both provide adaptable, low-profile load options for military, law enforcement, and SWAT missions.

Read More →
Security worker watching computer monitors, with a white area at top with a logo for ZeroEyes.
PatrolApril 2, 2026

ZeroEyes Expands from AI Gun Detection to Knife Detection & Suspect Tracking

ZeroEyes has launched three new product categories to extend beyond firearms to address additional acute safety threats and basic security needs. Knife detection and suspect tracking are now also available.

Read More →
Ad Loading...
GALLS logo against a white box set atop a blue-tinted map of Tennessee.
PatrolApril 2, 2026

GALLS Acquires CMS Uniforms

GALLS has acquired CMS Uniforms and Equipment, Inc., a prominent regional provider based in Nashville, Tennessee. CMS Uniforms, founded in 2000, has built a reputation for delivering stellar customer service and managing complex uniform programs for more than 670 accounts.

Read More →
Police drone hovering over its charging nest against a blue sky background.
PatrolMarch 26, 2026

Brinc Unveils Guardian, Launching the Next Era of Drone as First Responder

Brinc’s new Guardian delivers 24/7 operations, Starlink connectivity, and a robotic charging nest that can swap batteries and change payload configurations without human intervention.

Read More →
image of trooper, shown from waist down, standing beside a police cruiser along the road and at right a headline Slow Down Move Over.
PatrolMarch 19, 2026

Colorado State Patrol Releases 2025 Struck-By Analysis

The Colorado State Patrol, after analyzing its 2025 struck-by incidents, identified one area for improvement: using traffic cones to provide advanced warning before the cruiser's location. Here is the agency’s final data.

Read More →
Ad Loading...
Image of a group of men in business attire receiving an award set against a black background and a Streamlight logo up top.
PatrolMarch 19, 2026

Streamlight Names 144th Marketing Group Law Enforcement Sales Rep Agency of the Year

Streamlight has recognized the 144th Marketing Group as its 2025 Sales Rep Agency of the Year Award for the Law Enforcement market.

Read More →