• Home
  • About RSIS
    • Introduction
    • Building the Foundations
    • Welcome Message
    • Board of Governors
    • Staff Profiles
      • Executive Deputy Chairman’s Office
      • Dean’s Office
      • Management
      • Distinguished Fellows
      • Faculty and Research
      • Associate Research Fellows, Senior Analysts and Research Analysts
      • Visiting Fellows
      • Adjunct Fellows
      • Administrative Staff
    • Honours and Awards for RSIS Staff and Students
    • RSIS Endowment Fund
    • Endowed Professorships
    • Career Opportunities
    • Getting to RSIS
  • Research
    • Research Centres
      • Centre for Multilateralism Studies (CMS)
      • Centre for Non-Traditional Security Studies (NTS Centre)
      • Centre of Excellence for National Security (CENS)
      • Institute of Defence and Strategic Studies (IDSS)
      • International Centre for Political Violence and Terrorism Research (ICPVTR)
    • Research Programmes
      • National Security Studies Programme (NSSP)
      • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
    • Future Issues and Technology Cluster
    • [email protected] Newsletter
    • Other Research
      • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
    • Graduate Programmes Office
    • Overview
    • MSc (Asian Studies)
    • MSc (International Political Economy)
    • MSc (International Relations)
    • MSc (Strategic Studies)
    • NTU-Warwick Double Masters Programme
    • PhD Programme
    • Exchange Partners and Programmes
    • How to Apply
    • Financial Assistance
    • Meet the Admissions Team: Information Sessions and other events
    • RSIS Alumni
  • Alumni & Networks
    • Alumni
    • Asia-Pacific Programme for Senior Military Officers (APPSMO)
    • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
    • International Strategy Forum-Asia (ISF-Asia)
    • SRP Executive Programme
    • Terrorism Analyst Training Course (TATC)
  • Publications
    • RSIS Publications
      • Annual Reviews
      • Books
      • Bulletins and Newsletters
      • Commentaries
      • Counter Terrorist Trends and Analyses
      • Commemorative / Event Reports
      • IDSS Paper
      • Interreligious Relations
      • Monographs
      • NTS Insight
      • Policy Reports
      • Working Papers
      • RSIS Publications for the Year
    • Glossary of Abbreviations
    • External Publications
      • Authored Books
      • Journal Articles
      • Edited Books
      • Chapters in Edited Books
      • Policy Reports
      • Working Papers
      • Op-Eds
      • External Publications for the Year
    • Policy-relevant Articles Given RSIS Award
  • Media
    • Great Powers
    • Sustainable Security
    • Other Resource Pages
    • Media Highlights
    • News Releases
    • Speeches
    • Vidcast Channel
    • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
Facebook
Twitter
YouTube
RSISVideoCast RSISVideoCast rsis.sg
Linkedin
instagram instagram rsis.sg
RSS
  • Home
  • About RSIS
      • Introduction
      • Building the Foundations
      • Welcome Message
      • Board of Governors
      • Staff Profiles
        • Executive Deputy Chairman’s Office
        • Dean’s Office
        • Management
        • Distinguished Fellows
        • Faculty and Research
        • Associate Research Fellows, Senior Analysts and Research Analysts
        • Visiting Fellows
        • Adjunct Fellows
        • Administrative Staff
      • Honours and Awards for RSIS Staff and Students
      • RSIS Endowment Fund
      • Endowed Professorships
      • Career Opportunities
      • Getting to RSIS
  • Research
      • Research Centres
        • Centre for Multilateralism Studies (CMS)
        • Centre for Non-Traditional Security Studies (NTS Centre)
        • Centre of Excellence for National Security (CENS)
        • Institute of Defence and Strategic Studies (IDSS)
        • International Centre for Political Violence and Terrorism Research (ICPVTR)
      • Research Programmes
        • National Security Studies Programme (NSSP)
        • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      • Future Issues and Technology Cluster
      • [email protected] Newsletter
      • Other Research
        • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      • Graduate Programmes Office
      • Overview
      • MSc (Asian Studies)
      • MSc (International Political Economy)
      • MSc (International Relations)
      • MSc (Strategic Studies)
      • NTU-Warwick Double Masters Programme
      • PhD Programme
      • Exchange Partners and Programmes
      • How to Apply
      • Financial Assistance
      • Meet the Admissions Team: Information Sessions and other events
      • RSIS Alumni
  • Alumni & Networks
      • Alumni
      • Asia-Pacific Programme for Senior Military Officers (APPSMO)
      • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
      • International Strategy Forum-Asia (ISF-Asia)
      • SRP Executive Programme
      • Terrorism Analyst Training Course (TATC)
  • Publications
      • RSIS Publications
        • Annual Reviews
        • Books
        • Bulletins and Newsletters
        • Commentaries
        • Counter Terrorist Trends and Analyses
        • Commemorative / Event Reports
        • IDSS Paper
        • Interreligious Relations
        • Monographs
        • NTS Insight
        • Policy Reports
        • Working Papers
        • RSIS Publications for the Year
      • Glossary of Abbreviations
      • External Publications
        • Authored Books
        • Journal Articles
        • Edited Books
        • Chapters in Edited Books
        • Policy Reports
        • Working Papers
        • Op-Eds
        • External Publications for the Year
      • Policy-relevant Articles Given RSIS Award
  • Media
      • Great Powers
      • Sustainable Security
      • Other Resource Pages
      • Media Highlights
      • News Releases
      • Speeches
      • Vidcast Channel
      • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
  • instagram instagram rsis.sg
Connect

Getting to RSIS

Map

Address

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

View location on Google maps Click here for directions to RSIS

Get in Touch

    Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
    RSISVideoCast RSISVideoCast rsisvideocast
      school/rsis-ntu
    instagram instagram rsis.sg
      RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    RSIS Intranet

    S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
    Nanyang Technological University Nanyang Technological University

    Skip to content

     
    • RSIS
    • Publication
    • RSIS Publications
    • CO14019 | Countering the Self-Radicalised Lone Wolf: A New Paradigm?
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • Commentaries
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • IDSS Paper
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers
    • RSIS Publications for the Year

    CO14019 | Countering the Self-Radicalised Lone Wolf: A New Paradigm?
    Kumar Ramakrishna

    28 January 2014

    download pdf
    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Synopsis

    Internet-driven self-radicalisation of the lone wolf is an increasing cause of concern for governments and societies everywhere. A new paradigm for countering self-radicalisation is suggested, comprising the five dimensions of Sender, Message, Recipient, Mechanism and Context.

    Commentary

    FOLLOWING THE Boston marathon terrorist bombing of April 2013, US President Barack Obama acknowledged that one of the dangers we now face are ‘self-radicalised individuals’ who might “not be part of any network” – in short lone wolves.

    Obama offered one reason why the threat of lone-wolf terrorism has emerged in recent years: “The pressure we put on Al Qaeda and other networks that are well financed and more sophisticated has pushed potential terrorists to the margins, where they are forced to plot smaller-level attacks that are tougher to track.”

    Only part of the story

    Intensified security force pressure is only part of the story, though. Ideological trends in violent Islamist circles globally since the mid-2000s have stressed operational decentralisation to small autonomous cells and lone wolves. Thus while the late Anwar al-Awlaki of Al Qaeda in the Arabian Peninsula (AQAP) promoted lone wolf action the Al Qaeda Syrian propagandist Abu Musab al-Suri likewise argued for more autonomous small scale terrorist attacks that are harder to detect and prevent.

    Moreover, technological trends such as easy Internet access expedite direct action by lone wolves. For instance the online English-language AQAP magazine Inspire even had an article called “Make a Bomb in Your Mom’s Kitchen” translated into Bahasa by Indonesian jihadists.

    While lone wolves would not be able to cause massive 9/11 style destruction, it is all too clear what they can accomplish. For example, Timothy McVeigh was responsible for 168 deaths in the Oklahoma City bombing of April 1995, while Anders Breivik killed 77 people in Norway in 2011.

    Some military strategists moreover warn of so-called Fifth Generation Warfare in which ‘super-empowered’ lone wolves may in the coming decade exploit digital technology to mount crippling cyber-attacks on national infrastructure or even deploy small radiological devices (dirty bombs) against cities.

    Lone wolves in Singapore

    Singapore has not been immune from the threat of self-radicalised lone wolves. Since 2007, six such individuals were detained, but three were subsequently released. Another group of six was placed on restriction orders that sharply circumscribed their activities and movement.

    At a June 2013 retreat of Singapore’s Religious Rehabilitation Group that counsels Jemaah Islamiyah detainees and their families, Deputy Prime Minister Teo Chee Hean emphasised the significant concern posed by lone wolves who are “radicalised by what they see and read on the Internet in the privacy of their homes or through their smartphones” and that “do not leave physical traces for the security services to follow”.

    Five dimensions in countering the lone wolf

    What can be done to counter the self-radicalised lone wolf threat? It is widely accepted that it is futile to attempt to monitor or censor the Internet by technical means to prevent extremist ideologies from proliferating. There are more than 6000 extremist websites now online, and the number is steadily increasing. More creative solutions are needed.

    It is suggested that, adapting and building upon ideas by leading Indonesian counter-terror expert Tito Karnavian, five dimensions need to be considered in any comprehensive, systematic strategy for countering the threat of self-radicalisation producing lone wolves: these dimensions comprise Sender, Message, Recipient, Mechanism, Context.

    1 Sender: The credibility of the purveyor of the extremist ideology must be studied and potential weaknesses discovered and exploited. Many violent extremist clerics project an outward image of piety, which makes their call authoritative. Furthermore they are frequently eloquent and come across as very charismatic, like the late Anwar al-Awlaki. ‘Counter-ideologues’ must therefore be found who are equally eloquent and able to couch messages in terms that would resonate with local audiences. Moreover they must also be seen by the target community to possess unimpeachable integrity.

    Conversely any potential character flaws on the part of the violent extremist ideologues must be discovered through targeted intelligence gathering and amplified via social media to question his credibility – and hence his ability to influence the broad masses.

    2. Message: The violent extremist message that self-radicalises people is usually simple and easy to recall: “The West is at war with our religion, so we must fight back.” Counter-messaging must likewise move from highly abstract theological formulations to equally easy to recollect themes that are culturally authentic and of practical relevance to a target community. These are what Malcolm Gladwell calls ‘sticky’ messages.

    3. Recipient: The vulnerable individuals in front of computer screens are usually young males whose emotional development is proceeding faster than their mental maturation. Hence they tend to think in relatively unsophisticated black-and-white terms and seek the certainty and clear answers usually provided by skillful extremist ideologues.

    This is why critical thinking skills and what the think tank DEMOS in the United Kingdom calls digital literacy – the ability to evaluate what is read or seen online – must be inculcated in young people throughout their education. This ability is arguably more important than the actual content of their religious or mainstream syllabi.

    4. Mechanism: Liberal circles argue that a free-wheeling marketplace of ideas would ensure the demolition of extremist ideologies. Others argue for imposing a ‘chilling effect’ through legal means that restrict the circulation of certain anti-social ideas. What would be particularly useful is a moderated debate between non-violent extremists and moderates either online or in the real world, so that the theological weaknesses and contradictions within extremist ideologies can be exposed and debunked.

    5. Context: In societies where governance is poor and security, welfare and justice are seen to be in deficit, the chances for self-radicalisation or even more organised group radicalisation is very great. In particular, the perception by local communities of heavy-handed police and military action – such as civilian casualties caused by drone strikes in Afghanistan and Yemen and perceived over-use of force in police counter-terrorist operations in Indonesia – all strengthen the extremist narrative of a war on the entire religion. In short, context facilitates the ‘ease of transmission’ of extremist ideas, and self-radicalisation of lone wolves.

    In sum, given that Internet-driven self-radicalisation into lone wolves appears to be a growing and dangerous trend, it behooves governments and communities to work together – perhaps along the five dimensions described – to deal effectively with the problem.

    About the Author

    Kumar Ramakrishna is Associate Professor and Head of the Centre of Excellence for National Security at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University.

    Categories: Commentaries /

    Last updated on 04/09/2014

    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Synopsis

    Internet-driven self-radicalisation of the lone wolf is an increasing cause of concern for governments and societies everywhere. A new paradigm for countering self-radicalisation is suggested, comprising the five dimensions of Sender, Message, Recipient, Mechanism and Context.

    Commentary

    FOLLOWING THE Boston marathon terrorist bombing of April 2013, US President Barack Obama acknowledged that one of the dangers we now face are ‘self-radicalised individuals’ who might “not be part of any network” – in short lone wolves.

    Obama offered one reason why the threat of lone-wolf terrorism has emerged in recent years: “The pressure we put on Al Qaeda and other networks that are well financed and more sophisticated has pushed potential terrorists to the margins, where they are forced to plot smaller-level attacks that are tougher to track.”

    Only part of the story

    Intensified security force pressure is only part of the story, though. Ideological trends in violent Islamist circles globally since the mid-2000s have stressed operational decentralisation to small autonomous cells and lone wolves. Thus while the late Anwar al-Awlaki of Al Qaeda in the Arabian Peninsula (AQAP) promoted lone wolf action the Al Qaeda Syrian propagandist Abu Musab al-Suri likewise argued for more autonomous small scale terrorist attacks that are harder to detect and prevent.

    Moreover, technological trends such as easy Internet access expedite direct action by lone wolves. For instance the online English-language AQAP magazine Inspire even had an article called “Make a Bomb in Your Mom’s Kitchen” translated into Bahasa by Indonesian jihadists.

    While lone wolves would not be able to cause massive 9/11 style destruction, it is all too clear what they can accomplish. For example, Timothy McVeigh was responsible for 168 deaths in the Oklahoma City bombing of April 1995, while Anders Breivik killed 77 people in Norway in 2011.

    Some military strategists moreover warn of so-called Fifth Generation Warfare in which ‘super-empowered’ lone wolves may in the coming decade exploit digital technology to mount crippling cyber-attacks on national infrastructure or even deploy small radiological devices (dirty bombs) against cities.

    Lone wolves in Singapore

    Singapore has not been immune from the threat of self-radicalised lone wolves. Since 2007, six such individuals were detained, but three were subsequently released. Another group of six was placed on restriction orders that sharply circumscribed their activities and movement.

    At a June 2013 retreat of Singapore’s Religious Rehabilitation Group that counsels Jemaah Islamiyah detainees and their families, Deputy Prime Minister Teo Chee Hean emphasised the significant concern posed by lone wolves who are “radicalised by what they see and read on the Internet in the privacy of their homes or through their smartphones” and that “do not leave physical traces for the security services to follow”.

    Five dimensions in countering the lone wolf

    What can be done to counter the self-radicalised lone wolf threat? It is widely accepted that it is futile to attempt to monitor or censor the Internet by technical means to prevent extremist ideologies from proliferating. There are more than 6000 extremist websites now online, and the number is steadily increasing. More creative solutions are needed.

    It is suggested that, adapting and building upon ideas by leading Indonesian counter-terror expert Tito Karnavian, five dimensions need to be considered in any comprehensive, systematic strategy for countering the threat of self-radicalisation producing lone wolves: these dimensions comprise Sender, Message, Recipient, Mechanism, Context.

    1 Sender: The credibility of the purveyor of the extremist ideology must be studied and potential weaknesses discovered and exploited. Many violent extremist clerics project an outward image of piety, which makes their call authoritative. Furthermore they are frequently eloquent and come across as very charismatic, like the late Anwar al-Awlaki. ‘Counter-ideologues’ must therefore be found who are equally eloquent and able to couch messages in terms that would resonate with local audiences. Moreover they must also be seen by the target community to possess unimpeachable integrity.

    Conversely any potential character flaws on the part of the violent extremist ideologues must be discovered through targeted intelligence gathering and amplified via social media to question his credibility – and hence his ability to influence the broad masses.

    2. Message: The violent extremist message that self-radicalises people is usually simple and easy to recall: “The West is at war with our religion, so we must fight back.” Counter-messaging must likewise move from highly abstract theological formulations to equally easy to recollect themes that are culturally authentic and of practical relevance to a target community. These are what Malcolm Gladwell calls ‘sticky’ messages.

    3. Recipient: The vulnerable individuals in front of computer screens are usually young males whose emotional development is proceeding faster than their mental maturation. Hence they tend to think in relatively unsophisticated black-and-white terms and seek the certainty and clear answers usually provided by skillful extremist ideologues.

    This is why critical thinking skills and what the think tank DEMOS in the United Kingdom calls digital literacy – the ability to evaluate what is read or seen online – must be inculcated in young people throughout their education. This ability is arguably more important than the actual content of their religious or mainstream syllabi.

    4. Mechanism: Liberal circles argue that a free-wheeling marketplace of ideas would ensure the demolition of extremist ideologies. Others argue for imposing a ‘chilling effect’ through legal means that restrict the circulation of certain anti-social ideas. What would be particularly useful is a moderated debate between non-violent extremists and moderates either online or in the real world, so that the theological weaknesses and contradictions within extremist ideologies can be exposed and debunked.

    5. Context: In societies where governance is poor and security, welfare and justice are seen to be in deficit, the chances for self-radicalisation or even more organised group radicalisation is very great. In particular, the perception by local communities of heavy-handed police and military action – such as civilian casualties caused by drone strikes in Afghanistan and Yemen and perceived over-use of force in police counter-terrorist operations in Indonesia – all strengthen the extremist narrative of a war on the entire religion. In short, context facilitates the ‘ease of transmission’ of extremist ideas, and self-radicalisation of lone wolves.

    In sum, given that Internet-driven self-radicalisation into lone wolves appears to be a growing and dangerous trend, it behooves governments and communities to work together – perhaps along the five dimensions described – to deal effectively with the problem.

    About the Author

    Kumar Ramakrishna is Associate Professor and Head of the Centre of Excellence for National Security at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University.

    Categories: Commentaries

    Last updated on 04/09/2014

    Back to top

    Terms of Use | Privacy Statement
    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
    OK
    Latest Book
    CO14019 | Countering the Self-Radicalised Lone Wolf: A New Paradigm?

    Synopsis

    Internet-driven self-radicalisation of the lone wolf is an increasing cause of concern for governments and soc ...
    more info