Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of remote recruits via social media.

Analysts and intelligence officials periodically get together to anticipate what tomorrow’s terrorists might do.

 

  • Will terrorists threaten mass destruction with nuclear weapons or global pandemics with designer pathogens? Will cities be contaminated with dirty bombs? Will tech-savvy terrorists remotely sabotage power grids or other, vital infrastructure via the Internet?
  • Are terrorists capable of triggering electromagnetic pulses that fry electronics, reducing modern technology dependent society to a Mad Max movie?
  • Will they shoot down airliners with hand-held missiles or bring them down with miniaturised bombs concealed in laptops or perhaps surgically implanted?
  • Will they attack crowds in stadiums with drones carrying hand grenades or anthrax or merely white powder to provoke deadly panics?
  • Or might there be a mass uprising of individual fanatics ramming trucks into pedestrians, attacking diners with machetes, and carrying out other primitive, but nearly impossible to prevent attacks?  

The scenarios are endless and unnerving. All of the ones above have been discussed publicly. And if analysts can think about them, one presumes, so can terrorists who fill the Internet with their ambitious fantasies.

Some of these are pretensions of omnipotence that make their authors feel good; some support the terrorists’ campaign to promote fear. Few can be entirely disregarded. Had the 9/11 hijackers been arrested one week before their attack, their plan might have been dismissed as a far-fetched scheme, which it was.

US Secretary of Homeland Security John Kelly recently warned that if Americans knew what he knows about terrorism, they’d “ never leave the house ”, a dismaying message coming from a Marine four-star general.  There are several ways analysts try to gaze into the future. One is to look at trends in terrorism itself and see where these might take us.

Extrapolation doesn’t always work. According to data from the Global Terrorism Database, from 1970 to 2001, fatalities in the worst terrorist attacks increased by an order of magnitude every 10 to 15 years, culminating in the 9/11 attacks, in which thousands died. It was widely presumed immediately after 9/11 that terrorists would continue to escalate by orders of magnitude, pushing the analysis toward scenarios involving tens of thousands or even hundreds of thousands of fatalities. Death on this scale could be achieved only with the use of biological or nuclear weapons, which became a presumption.

A second way to look at the future is to try to forecast the state of world affairs and examine how this might affect the trajectory of terrorism. Analysts correctly anticipated that the US invasion of Iraq would mobilise new cohorts of jihadist extremists, but many mistakenly thought that the rise of anarchist elements in the wake of the 2008 economic crisis might reinvigorate the violent edge of the left, it did not. It is expected that the conflicts in Syria and adjacent areas will remain sources of future terrorist violence.

A third approach is to look at how terrorists might exploit new technologies coming on line. Years ago, we worried about surface-to-air missiles, which terrorists have rarely used, but we missed the Internet. Then in its infancy, the Internet was to have a profound impact on terrorist communications, recruiting and strategy, underscoring that terrorism is mainly about manipulating perceptions. Analysts currently are looking at terrorists using drones and exploiting the Internet of Things.
A fourth approach is to try to think as terrorists and conjure up scenarios of future attacks.

This is a way to prevent failures of imagination, but possibilities are often misread as forecasts. In the early 1980s, It was thought that terrorists might fly hijacked airliners into large buildings. This involved no prescience as, in 1972, hijackers had threatened to fly a hijacked plane into the nuclear facilities at Oak Ridge, Tennessee. 

Any review of what we might have forecast about the future trajectory of terrorism in the past should be humbling. Fifty years ago, who knew that the following decades would see the dramatic rise of terrorism in its contemporary form? One of the major events was the 1967 Six Day War, which would lead to Israel’s occupation of the West Bank, contributing to the rise of the Palestinian terrorism. Who in 1977 forecast the emergence of Islamist extremism in the form of the Iranian revolution, the rise of Iranian-supported Shia extremism in Lebanon, and an escalation of terrorist violence with massive vehicle bombs and suicide attacks becoming routine?

The Middle East would remain a major theater of concern for the US during this decade, and Washington would increasingly resort to military force to retaliate for attacks on US Marines in Lebanon, apprehend terrorist hijackers escaping from Egypt, and deter further Libyan support for terrorist attacks that had cost American lives. Hardly any analysts in 1987 foresaw the fall of the Soviet Union in 1989, which would fundamentally change the world’s political environment and significantly affect the course of terrorism. By 1997, al Qaeda had already declared war on the US, but 1998 would see a dramatic escalation of that campaign, culminating in the 9/11 attacks that would lead to the Global War on Terror, a massive worldwide effort that continues to this day. And in 2007, who foresaw the uprisings that would sweep across the Arab world in 2011, distracting governments, creating new opportunities for jihadists, and leading to Syria’s civil war and the rise of ISIS?  

Terrorism has become a mode of armed conflict, it will persist. But the worldwide growth in the volume of terrorism is misleading. It reflects the invention of the category of terrorism, better reporting worldwide, and the now routine employment of terrorist tactics in irregular conflicts.

Although terrorism is a global phenomenon, outside of conflict zones, where terrorist campaigns comprise merely one aspect of ongoing wars, terrorist attacks occur only occasionally. In 2015, more than 55 percent of all attacks took place in Iraq, Afghanistan, Pakistan, India, and Nigeria, and 74 percent of all fatalities occurred in five countries Iraq, Afghanistan, Nigeria, Syria, and Pakistan.

Terrorism remains concentrated in the Middle East and bordering areas of North Africa and western Asia. Current conflicts in these areas are likely to persist and will remain the major source of the terrorist threat. For the US, terrorism and Middle East policy have become inextricably intertwined.

Events external to terrorism can have enormous effects on the course of terrorism, the Six Day War and Vietnam War as catalysts for protest and ultimately violence; the Iranian revolution; the Soviet invasion of Afghanistan and the rise of Islamic extremism; the fall of the Soviet Union; the Arab Spring.

Our worst fears have not been realised. Terrorists have seldom used chemical or biological weapons and then not very effectively. There has been one incident of radiological terrorism, carried out as a publicity stunt, and no nuclear weapons. Nonetheless, the lure of doom continues, with many arguing that it is not if, but when terrorists will employ such weapons.
The terrorists’ arsenal has changed very little. Bombs still comprise three-quarters of terrorist attacks. Some bombs are becoming more sophisticated. Terrorist attacks still involve automatic or semi-automatic weapons not different from a half-century ago.

Tactical innovations include suicide bombings, multiple suicide bombings, increasingly random attacks on soft targets, the use of vehicles in ramming attacks. This reflects the enlistment of remote recruits with limited capabilities, which is itself a consequence of social media.

Terrorism appears to have escalated horizontally rather than vertically. Instead of weapons of mass destruction, there has been a proliferation of low level attacks, frustrating, but certainly preferable. The trick will be to use what is known about terrorism now to predict and prevent new attacks.

Newsweek:

You Might Also Read:

What Happens If Criminals & Terrorists Get To Use AI?:

Exploring Alternatives: Terrorism Converging With Cyber Crime:

 

 

« India Internet Shutdowns 'Violate Human Rights'
WannaCry Returns To Attack Honda »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Start-Up Chile (SUP)

Start-Up Chile (SUP)

Start-Up Chile is a business accelerator program created by the Chilean Government for high-potential tech entrepreneurs.