Lone Wolf Terrorism and the1996 Atlanta Olympic Bombing
Introduction
The 1996 Atlanta Olympic Bombing was the act of lone wolf terrorist Eric Rudolph, motivated by an ideological standpoint from which he opposed abortion, homosexuality, corporatism, and the US governments promotion of what he viewed as the values of global socialism (Rudolph, n.d.). Rudolph would eventually be captured in 2003 and convicted of the Atlanta bombing along with the bombings of two abortion clinics and a lesbian bar. Prior to his arrest, attention had been placed on security guard Richard Jewell, who discovered the backpack bomb at Centennial Olympic Park and alerted authorities just before its detonation. Jewell became a suspect, at least in the media, during an FBI investigation that included a raid on Jewells home. Jewells reputation never fully recovered from the suspicion placed upon him following his heroic efforts to save lives. Jewell went on to sue the Bureau and even to testify before Congress about the need for an investigative method that would better protect the rights of people like him. This paper will discuss the policy impact of the Atlanta Olympic Bombing, how Homeland Security should address investigative matters, and how DHS could mitigate the risk of future lone wolf terrorist attacks.
Policy Impact
Since the 1996 bombing, DHS has published several documents aimed at protecting the public, such as Mass Evacuations: Planning for Sports Venues, Christian Extremism as a Domestic Terror Threat, and Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst (Chapman, 2012). The last of these focused on the pattern of radicalization common to three of the most high-profile lone wolf terrorists in US historyTimothy McVeigh, Ted Kaczynski, and Eric Rudolph. The report sought to help law enforcement to prevent tragedies emerging from the identified population through psychological assistance, evaluation, training, or, in the worst case, detention (Springer, 2009, p. v). One of the key defining characteristics of the three terrorists was their experience of isolation, loneliness, and socio-cultural pressure from their familial environments to conform to strident ideologies (Springer, 2009).
In the more than 20 years that have passed since the Atlanta bombing, DHS has developed a strategy for combating lone wolf terrorism, most recently evidenced by its Strategic Framework for Countering Terrorism and Targeted Violence(CTTV Framework) and a Public Action Plandesigned to identify emerging threats and promote information sharing. This strategic framework and the associated action plan rely heavily on digital information sharing tools that were not available in 1996 but that, thanks to the arrival of social media and the much more accessible Internet of the Digital Age, have made information sharing much easier.
While the value of monitoring for signs of lone wolf terrorism is indisputable, the problem that Jewell identified was the lack of professionalism...
In that regard, further policy reform is needed. Issues of trust are important when it comes to federal agencies conducting investigations into terrorism, and if the public feelsas was certainly the case with Richard Jewellthat federal agencies lack the necessary ethical and professional standards to engage in investigations of this nature it will be less likely to assist in the kind of information sharing that the strategic framework and associated action plan of the DHS calls for and depends upon.Addressing Investigative Matters
One of the important arguments about lone wolf terrorists is that they are never really alone....
…that they are being denied due process, civil liberties, or respect for autonomy and the right to self-determination. In a democratic society, people want to know that their voices are heard and that their government is accountable to them and not the other way around. When authoritarian leadership takes over in an environment where there is already a great deal of hostility towards its aims, it is like a powder keg ready to explode. The DHS must act swiftly in demonstrating a greater show of authentic leadership; it risks losing the support of the public, already so divided and dangerous, if it does not. If it does nothing, it can fully expect to face more and more Eric Rudolphs in the near future.Conclusion
The 1996 Atlanta Olympic Games bombing committed by lone wolf terrorist Eric Rudolph. The investigation into the bombing quickly put attention on Richard Jewell, an innocent man, who came to believe that his rights had been violated and that the FBI had acted unprofessionally and unethically. The ensuing lawsuits and Congressional testimony given by Jewell revealed a significant problem with the way federal agencies approach the investigative process. Today, DHS has focused on creating a strategic plan and policy of using the digital environment to share information and monitor the development of potential lone wolf terrorists. However, if DHS does not control the investigative process as well as surveillance procedures with authentic leadership and an ethical framework, it risks undermining the publics trust in its own practices and ability to hold itself as well as other agencies accountable for their actions. Without the establishment of trust, DHS risks creating an environment in which more lone wolfs proliferate. Already a great many people have experienced the necessary isolation and loneliness associated with lone wolf terrorism creation. For that reason, there…
References
The Activities of the Federal Bureau of Investigation, Part III. (1997). Retrieved from http://commdocs.house.gov/committees/judiciary/hju52836.000/hju52836_0f.htm
Brenner, M. (1997). American nightmare: The ballad of Richard Jewell. Retrieved from https://archive.vanityfair.com/article/share/1fd2d7ae-10d8-474b-9bf1-d1558af697be
Chapman, S. (2012). Looking Back: The 1996 Centennial Olympic Park Bombing.
Retrieved from https://www.hsdl.org/c/looking-back-the-1996-centennial-olympic-park-bombing/
Rudolph, E. (n.d.). Statement. Retrieved from http://www.armyofgod.com/EricRudolphStatement.html
Springer, N. (2009). Patterns of Radicalization: Identifying the Markers and WarningSigns of Domestic Lone Wolf Terrorists in Our Midst. Retrieved from https://www.hsdl.org/?abstract&did=29620
Utset, M. A. (2016). Digital Surveillance and Preventive Policing. Conn. L. Rev., 49,1453.
Weimann, G. (2016). Lone wolves in cyberspace. Journal of Terrorism Research, 3(2),1-16.
Winter, J. (2021). The Postal Service is running a 'covert operations program' thatmonitors Americans' social media posts. Retrieved from https://news.yahoo.com/the-postal-service-is-running-a-running-a-covert-operations-program-that-monitors-americans-social-media-posts-160022919.html?soc_src=social-sh&soc_trk=tw&tsrc=twtr
Digital Evidence: Plan of ActionIntroductionThis paper outlines the approach for examining digital evidence related to a suspected violation of company policy. It presents senior management with a plan for collecting and maximizing evidence in the case of John Smith, accused of digital IP theft. The methods described are grounded in forensic best practices and standards.Strategy for Maximizing Evidence Collection and Minimizing ImpactBased on the standards of ISO/IEC 27037 and National
evidence, it seems possible that an altercation occurred between the husband and wife and the two of them are 'covering' up this incident. Ideally, a detective with expertise in domestic violence cases should be in charge of the investigation. Separate officers should interview both the wife and husband before the couple has a chance to 'get their stories straight,' and note any inconsistencies between the two accounts. The other
Criminal Investigation Investigative Task Force Assuming that legal authority was not an issue, should this investigation be conducted by VPD personnel or a multijurisdictional task force? This investigation should be carried about by VPD personnel as the lead agency and head of a multijurisdictional task force. There are several reasons for this. First, VPD was the first agency to begin investigation of the crimes because the first explosion and damage occurred there.
Antitrust Investigation: Google It was reported in 2011 that the 'Wall Street Journal' reported that the FTC was preparing a major antitrust investigation into Google's core search advertising business. Specifically stated by the Wall Street Journal was: "The new FTC investigation . . . will examine fundamental issues relating to Google's core search advertising business, which still accounts for the overwhelming majority of its revenues. Those will include whether Google --
As a result, if an illegitimate interrogation or investigation contributes to the identification of physical evidence, the investigation and physical evidence must be excluded from trial. In this case, the interrogation or investigation is excluded on the basis of the exclusionary rule while the physical evidence is excluded on the basis that it's the fruit or product of illegal interrogation. The significance of the exclusionary and the fruit of poisonous
Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now