Lone Wolf Terrorism and the1996 Atlanta Olympic Bombing
Introduction
The 1996 Atlanta Olympic Bombing was the act of lone wolf terrorist Eric Rudolph, motivated by an ideological standpoint from which he opposed abortion, homosexuality, corporatism, and the US governments promotion of what he viewed as the values of global socialism (Rudolph, n.d.). Rudolph would eventually be captured in 2003 and convicted of the Atlanta bombing along with the bombings of two abortion clinics and a lesbian bar. Prior to his arrest, attention had been placed on security guard Richard Jewell, who discovered the backpack bomb at Centennial Olympic Park and alerted authorities just before its detonation. Jewell became a suspect, at least in the media, during an FBI investigation that included a raid on Jewells home. Jewells reputation never fully recovered from the suspicion placed upon him following his heroic efforts to save lives. Jewell went on to sue the Bureau and even to testify before Congress about the need for an investigative method that would better protect the rights of people like him. This paper will discuss the policy impact of the Atlanta Olympic Bombing, how Homeland Security should address investigative matters, and how DHS could mitigate the risk of future lone wolf terrorist attacks.
Policy Impact
Since the 1996 bombing, DHS has published several documents aimed at protecting the public, such as Mass Evacuations: Planning for Sports Venues, Christian Extremism as a Domestic Terror Threat, and Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst (Chapman, 2012). The last of these focused on the pattern of radicalization common to three of the most high-profile lone wolf terrorists in US historyTimothy McVeigh, Ted Kaczynski, and Eric Rudolph. The report sought to help law enforcement to prevent tragedies emerging from the identified population through psychological assistance, evaluation, training, or, in the worst case, detention (Springer, 2009, p. v). One of the key defining characteristics of the three terrorists was their experience of isolation, loneliness, and socio-cultural pressure from their familial environments to conform to strident ideologies (Springer, 2009).
In the more than 20 years that have passed since the Atlanta bombing, DHS has developed a strategy for combating lone wolf terrorism, most recently evidenced by its Strategic Framework for Countering Terrorism and Targeted Violence(CTTV Framework) and a Public Action Plandesigned to identify emerging threats and promote information sharing. This strategic framework and the associated action plan rely heavily on digital information sharing tools that were not available in 1996 but that, thanks to the arrival of social media and the much more accessible Internet of the Digital Age, have made information sharing much easier.
While the value of monitoring for signs of lone wolf terrorism is indisputable, the problem that Jewell identified was the lack of professionalism in the leaking of his name to the press and his belief that the Justice Department does not hold itself accountable to the degree that it should given its service to the public (The Activities of the Federal Bureau of Investigation, Part III, 1997). In that regard, further policy reform is needed. Issues of trust are important when it comes to federal agencies conducting investigations into terrorism, and if the public feelsas was certainly the case with Richard Jewellthat federal agencies lack the necessary ethical and professional standards to engage in investigations of this nature it will be less likely to assist in the kind of information sharing that the strategic framework and associated action plan of the DHS calls for and depends upon.
Addressing Investigative Matters
One of the important arguments about lone wolf terrorists is that they are never really alone....
Conclusion
The 1996 Atlanta Olympic Games bombing committed by lone wolf terrorist Eric Rudolph. The investigation into the bombing quickly put attention on Richard Jewell, an innocent man, who came to believe that his rights had been violated and that the FBI had acted unprofessionally and unethically. The ensuing lawsuits and Congressional testimony given by Jewell revealed a significant problem with the way federal agencies approach the investigative process. Today, DHS has focused on creating a strategic plan and policy of using the digital environment to share information and monitor the development of potential lone wolf terrorists. However, if DHS does not control the investigative process as well as surveillance procedures with authentic leadership and an ethical framework, it risks undermining the publics trust in its own practices and ability to hold itself as well as other agencies accountable for their actions. Without the establishment of trust, DHS risks creating an environment in which more lone wolfs proliferate. Already a great many people have experienced the necessary isolation and loneliness associated with lone wolf terrorism creation. For that reason, there…
References
The Activities of the Federal Bureau of Investigation, Part III. (1997). Retrieved from http://commdocs.house.gov/committees/judiciary/hju52836.000/hju52836_0f.htm
Brenner, M. (1997). American nightmare: The ballad of Richard Jewell. Retrieved from https://archive.vanityfair.com/article/share/1fd2d7ae-10d8-474b-9bf1-d1558af697be
Chapman, S. (2012). Looking Back: The 1996 Centennial Olympic Park Bombing.
Retrieved from https://www.hsdl.org/c/looking-back-the-1996-centennial-olympic-park-bombing/
Rudolph, E. (n.d.). Statement. Retrieved from http://www.armyofgod.com/EricRudolphStatement.html
Springer, N. (2009). Patterns of Radicalization: Identifying the Markers and WarningSigns of Domestic Lone Wolf Terrorists in Our Midst. Retrieved from https://www.hsdl.org/?abstract&did=29620
Utset, M. A. (2016). Digital Surveillance and Preventive Policing. Conn. L. Rev., 49,1453.
Weimann, G. (2016). Lone wolves in cyberspace. Journal of Terrorism Research, 3(2),1-16.
Winter, J. (2021). The Postal Service is running a 'covert operations program' thatmonitors Americans' social media posts. Retrieved from https://news.yahoo.com/the-postal-service-is-running-a-running-a-covert-operations-program-that-monitors-americans-social-media-posts-160022919.html?soc_src=social-sh&soc_trk=tw&tsrc=twtr
Workplace Violence Everyday in the United States millions of Americans leave their homes and enter the places of their employment. Captain Among these millions, most report to work unaware of the prevalence of workplace violence or fully understand the gamut of actions that represent such violence. It is typical of the media to only report high profile cases including a former employee or a worker losing control - the most
Corporate Criminal Justice The following study is a critical analysis of four articles or book passages relevant to the study of criminal justice in a corporate context. Each essay or book excerpt will be analyzed in turn and in the context that each has a significant intellectual contribution to make to the contemporary study of corporate criminal justice. While this is a relatively new specialization within the corporate and criminal justice
NIn spite of touch being very significant as a communication means, very little is known on why and when touch takes place and what can be deduced when it takes place in opposite-gender or same-gender interactions. Studies focusing on this topic concerning gender and touch have had a focus on touch occurrences that are observed, those that are reported, the beliefs people hold on touch meanings, the perceptions of observers
Digital Evidence: Plan of ActionIntroductionThis paper outlines the approach for examining digital evidence related to a suspected violation of company policy. It presents senior management with a plan for collecting and maximizing evidence in the case of John Smith, accused of digital IP theft. The methods described are grounded in forensic best practices and standards.Strategy for Maximizing Evidence Collection and Minimizing ImpactBased on the standards of ISO/IEC 27037 and National
evidence, it seems possible that an altercation occurred between the husband and wife and the two of them are 'covering' up this incident. Ideally, a detective with expertise in domestic violence cases should be in charge of the investigation. Separate officers should interview both the wife and husband before the couple has a chance to 'get their stories straight,' and note any inconsistencies between the two accounts. The other
Criminal Investigation Investigative Task Force Assuming that legal authority was not an issue, should this investigation be conducted by VPD personnel or a multijurisdictional task force? This investigation should be carried about by VPD personnel as the lead agency and head of a multijurisdictional task force. There are several reasons for this. First, VPD was the first agency to begin investigation of the crimes because the first explosion and damage occurred there.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now