Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of remote recruits via social media.

Analysts and intelligence officials periodically get together to anticipate what tomorrow’s terrorists might do.

 

  • Will terrorists threaten mass destruction with nuclear weapons or global pandemics with designer pathogens? Will cities be contaminated with dirty bombs? Will tech-savvy terrorists remotely sabotage power grids or other, vital infrastructure via the Internet?
  • Are terrorists capable of triggering electromagnetic pulses that fry electronics, reducing modern technology dependent society to a Mad Max movie?
  • Will they shoot down airliners with hand-held missiles or bring them down with miniaturised bombs concealed in laptops or perhaps surgically implanted?
  • Will they attack crowds in stadiums with drones carrying hand grenades or anthrax or merely white powder to provoke deadly panics?
  • Or might there be a mass uprising of individual fanatics ramming trucks into pedestrians, attacking diners with machetes, and carrying out other primitive, but nearly impossible to prevent attacks?  

The scenarios are endless and unnerving. All of the ones above have been discussed publicly. And if analysts can think about them, one presumes, so can terrorists who fill the Internet with their ambitious fantasies.

Some of these are pretensions of omnipotence that make their authors feel good; some support the terrorists’ campaign to promote fear. Few can be entirely disregarded. Had the 9/11 hijackers been arrested one week before their attack, their plan might have been dismissed as a far-fetched scheme, which it was.

US Secretary of Homeland Security John Kelly recently warned that if Americans knew what he knows about terrorism, they’d “ never leave the house ”, a dismaying message coming from a Marine four-star general.  There are several ways analysts try to gaze into the future. One is to look at trends in terrorism itself and see where these might take us.

Extrapolation doesn’t always work. According to data from the Global Terrorism Database, from 1970 to 2001, fatalities in the worst terrorist attacks increased by an order of magnitude every 10 to 15 years, culminating in the 9/11 attacks, in which thousands died. It was widely presumed immediately after 9/11 that terrorists would continue to escalate by orders of magnitude, pushing the analysis toward scenarios involving tens of thousands or even hundreds of thousands of fatalities. Death on this scale could be achieved only with the use of biological or nuclear weapons, which became a presumption.

A second way to look at the future is to try to forecast the state of world affairs and examine how this might affect the trajectory of terrorism. Analysts correctly anticipated that the US invasion of Iraq would mobilise new cohorts of jihadist extremists, but many mistakenly thought that the rise of anarchist elements in the wake of the 2008 economic crisis might reinvigorate the violent edge of the left, it did not. It is expected that the conflicts in Syria and adjacent areas will remain sources of future terrorist violence.

A third approach is to look at how terrorists might exploit new technologies coming on line. Years ago, we worried about surface-to-air missiles, which terrorists have rarely used, but we missed the Internet. Then in its infancy, the Internet was to have a profound impact on terrorist communications, recruiting and strategy, underscoring that terrorism is mainly about manipulating perceptions. Analysts currently are looking at terrorists using drones and exploiting the Internet of Things.
A fourth approach is to try to think as terrorists and conjure up scenarios of future attacks.

This is a way to prevent failures of imagination, but possibilities are often misread as forecasts. In the early 1980s, It was thought that terrorists might fly hijacked airliners into large buildings. This involved no prescience as, in 1972, hijackers had threatened to fly a hijacked plane into the nuclear facilities at Oak Ridge, Tennessee. 

Any review of what we might have forecast about the future trajectory of terrorism in the past should be humbling. Fifty years ago, who knew that the following decades would see the dramatic rise of terrorism in its contemporary form? One of the major events was the 1967 Six Day War, which would lead to Israel’s occupation of the West Bank, contributing to the rise of the Palestinian terrorism. Who in 1977 forecast the emergence of Islamist extremism in the form of the Iranian revolution, the rise of Iranian-supported Shia extremism in Lebanon, and an escalation of terrorist violence with massive vehicle bombs and suicide attacks becoming routine?

The Middle East would remain a major theater of concern for the US during this decade, and Washington would increasingly resort to military force to retaliate for attacks on US Marines in Lebanon, apprehend terrorist hijackers escaping from Egypt, and deter further Libyan support for terrorist attacks that had cost American lives. Hardly any analysts in 1987 foresaw the fall of the Soviet Union in 1989, which would fundamentally change the world’s political environment and significantly affect the course of terrorism. By 1997, al Qaeda had already declared war on the US, but 1998 would see a dramatic escalation of that campaign, culminating in the 9/11 attacks that would lead to the Global War on Terror, a massive worldwide effort that continues to this day. And in 2007, who foresaw the uprisings that would sweep across the Arab world in 2011, distracting governments, creating new opportunities for jihadists, and leading to Syria’s civil war and the rise of ISIS?  

Terrorism has become a mode of armed conflict, it will persist. But the worldwide growth in the volume of terrorism is misleading. It reflects the invention of the category of terrorism, better reporting worldwide, and the now routine employment of terrorist tactics in irregular conflicts.

Although terrorism is a global phenomenon, outside of conflict zones, where terrorist campaigns comprise merely one aspect of ongoing wars, terrorist attacks occur only occasionally. In 2015, more than 55 percent of all attacks took place in Iraq, Afghanistan, Pakistan, India, and Nigeria, and 74 percent of all fatalities occurred in five countries Iraq, Afghanistan, Nigeria, Syria, and Pakistan.

Terrorism remains concentrated in the Middle East and bordering areas of North Africa and western Asia. Current conflicts in these areas are likely to persist and will remain the major source of the terrorist threat. For the US, terrorism and Middle East policy have become inextricably intertwined.

Events external to terrorism can have enormous effects on the course of terrorism, the Six Day War and Vietnam War as catalysts for protest and ultimately violence; the Iranian revolution; the Soviet invasion of Afghanistan and the rise of Islamic extremism; the fall of the Soviet Union; the Arab Spring.

Our worst fears have not been realised. Terrorists have seldom used chemical or biological weapons and then not very effectively. There has been one incident of radiological terrorism, carried out as a publicity stunt, and no nuclear weapons. Nonetheless, the lure of doom continues, with many arguing that it is not if, but when terrorists will employ such weapons.
The terrorists’ arsenal has changed very little. Bombs still comprise three-quarters of terrorist attacks. Some bombs are becoming more sophisticated. Terrorist attacks still involve automatic or semi-automatic weapons not different from a half-century ago.

Tactical innovations include suicide bombings, multiple suicide bombings, increasingly random attacks on soft targets, the use of vehicles in ramming attacks. This reflects the enlistment of remote recruits with limited capabilities, which is itself a consequence of social media.

Terrorism appears to have escalated horizontally rather than vertically. Instead of weapons of mass destruction, there has been a proliferation of low level attacks, frustrating, but certainly preferable. The trick will be to use what is known about terrorism now to predict and prevent new attacks.

Newsweek:

You Might Also Read:

What Happens If Criminals & Terrorists Get To Use AI?:

Exploring Alternatives: Terrorism Converging With Cyber Crime:

 

 

« India Internet Shutdowns 'Violate Human Rights'
WannaCry Returns To Attack Honda »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.