Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of remote recruits via social media.

Analysts and intelligence officials periodically get together to anticipate what tomorrow’s terrorists might do.

 

  • Will terrorists threaten mass destruction with nuclear weapons or global pandemics with designer pathogens? Will cities be contaminated with dirty bombs? Will tech-savvy terrorists remotely sabotage power grids or other, vital infrastructure via the Internet?
  • Are terrorists capable of triggering electromagnetic pulses that fry electronics, reducing modern technology dependent society to a Mad Max movie?
  • Will they shoot down airliners with hand-held missiles or bring them down with miniaturised bombs concealed in laptops or perhaps surgically implanted?
  • Will they attack crowds in stadiums with drones carrying hand grenades or anthrax or merely white powder to provoke deadly panics?
  • Or might there be a mass uprising of individual fanatics ramming trucks into pedestrians, attacking diners with machetes, and carrying out other primitive, but nearly impossible to prevent attacks?  

The scenarios are endless and unnerving. All of the ones above have been discussed publicly. And if analysts can think about them, one presumes, so can terrorists who fill the Internet with their ambitious fantasies.

Some of these are pretensions of omnipotence that make their authors feel good; some support the terrorists’ campaign to promote fear. Few can be entirely disregarded. Had the 9/11 hijackers been arrested one week before their attack, their plan might have been dismissed as a far-fetched scheme, which it was.

US Secretary of Homeland Security John Kelly recently warned that if Americans knew what he knows about terrorism, they’d “ never leave the house ”, a dismaying message coming from a Marine four-star general.  There are several ways analysts try to gaze into the future. One is to look at trends in terrorism itself and see where these might take us.

Extrapolation doesn’t always work. According to data from the Global Terrorism Database, from 1970 to 2001, fatalities in the worst terrorist attacks increased by an order of magnitude every 10 to 15 years, culminating in the 9/11 attacks, in which thousands died. It was widely presumed immediately after 9/11 that terrorists would continue to escalate by orders of magnitude, pushing the analysis toward scenarios involving tens of thousands or even hundreds of thousands of fatalities. Death on this scale could be achieved only with the use of biological or nuclear weapons, which became a presumption.

A second way to look at the future is to try to forecast the state of world affairs and examine how this might affect the trajectory of terrorism. Analysts correctly anticipated that the US invasion of Iraq would mobilise new cohorts of jihadist extremists, but many mistakenly thought that the rise of anarchist elements in the wake of the 2008 economic crisis might reinvigorate the violent edge of the left, it did not. It is expected that the conflicts in Syria and adjacent areas will remain sources of future terrorist violence.

A third approach is to look at how terrorists might exploit new technologies coming on line. Years ago, we worried about surface-to-air missiles, which terrorists have rarely used, but we missed the Internet. Then in its infancy, the Internet was to have a profound impact on terrorist communications, recruiting and strategy, underscoring that terrorism is mainly about manipulating perceptions. Analysts currently are looking at terrorists using drones and exploiting the Internet of Things.
A fourth approach is to try to think as terrorists and conjure up scenarios of future attacks.

This is a way to prevent failures of imagination, but possibilities are often misread as forecasts. In the early 1980s, It was thought that terrorists might fly hijacked airliners into large buildings. This involved no prescience as, in 1972, hijackers had threatened to fly a hijacked plane into the nuclear facilities at Oak Ridge, Tennessee. 

Any review of what we might have forecast about the future trajectory of terrorism in the past should be humbling. Fifty years ago, who knew that the following decades would see the dramatic rise of terrorism in its contemporary form? One of the major events was the 1967 Six Day War, which would lead to Israel’s occupation of the West Bank, contributing to the rise of the Palestinian terrorism. Who in 1977 forecast the emergence of Islamist extremism in the form of the Iranian revolution, the rise of Iranian-supported Shia extremism in Lebanon, and an escalation of terrorist violence with massive vehicle bombs and suicide attacks becoming routine?

The Middle East would remain a major theater of concern for the US during this decade, and Washington would increasingly resort to military force to retaliate for attacks on US Marines in Lebanon, apprehend terrorist hijackers escaping from Egypt, and deter further Libyan support for terrorist attacks that had cost American lives. Hardly any analysts in 1987 foresaw the fall of the Soviet Union in 1989, which would fundamentally change the world’s political environment and significantly affect the course of terrorism. By 1997, al Qaeda had already declared war on the US, but 1998 would see a dramatic escalation of that campaign, culminating in the 9/11 attacks that would lead to the Global War on Terror, a massive worldwide effort that continues to this day. And in 2007, who foresaw the uprisings that would sweep across the Arab world in 2011, distracting governments, creating new opportunities for jihadists, and leading to Syria’s civil war and the rise of ISIS?  

Terrorism has become a mode of armed conflict, it will persist. But the worldwide growth in the volume of terrorism is misleading. It reflects the invention of the category of terrorism, better reporting worldwide, and the now routine employment of terrorist tactics in irregular conflicts.

Although terrorism is a global phenomenon, outside of conflict zones, where terrorist campaigns comprise merely one aspect of ongoing wars, terrorist attacks occur only occasionally. In 2015, more than 55 percent of all attacks took place in Iraq, Afghanistan, Pakistan, India, and Nigeria, and 74 percent of all fatalities occurred in five countries Iraq, Afghanistan, Nigeria, Syria, and Pakistan.

Terrorism remains concentrated in the Middle East and bordering areas of North Africa and western Asia. Current conflicts in these areas are likely to persist and will remain the major source of the terrorist threat. For the US, terrorism and Middle East policy have become inextricably intertwined.

Events external to terrorism can have enormous effects on the course of terrorism, the Six Day War and Vietnam War as catalysts for protest and ultimately violence; the Iranian revolution; the Soviet invasion of Afghanistan and the rise of Islamic extremism; the fall of the Soviet Union; the Arab Spring.

Our worst fears have not been realised. Terrorists have seldom used chemical or biological weapons and then not very effectively. There has been one incident of radiological terrorism, carried out as a publicity stunt, and no nuclear weapons. Nonetheless, the lure of doom continues, with many arguing that it is not if, but when terrorists will employ such weapons.
The terrorists’ arsenal has changed very little. Bombs still comprise three-quarters of terrorist attacks. Some bombs are becoming more sophisticated. Terrorist attacks still involve automatic or semi-automatic weapons not different from a half-century ago.

Tactical innovations include suicide bombings, multiple suicide bombings, increasingly random attacks on soft targets, the use of vehicles in ramming attacks. This reflects the enlistment of remote recruits with limited capabilities, which is itself a consequence of social media.

Terrorism appears to have escalated horizontally rather than vertically. Instead of weapons of mass destruction, there has been a proliferation of low level attacks, frustrating, but certainly preferable. The trick will be to use what is known about terrorism now to predict and prevent new attacks.

Newsweek:

You Might Also Read:

What Happens If Criminals & Terrorists Get To Use AI?:

Exploring Alternatives: Terrorism Converging With Cyber Crime:

 

 

« India Internet Shutdowns 'Violate Human Rights'
WannaCry Returns To Attack Honda »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

Endari

Endari

Endari specializes in building cybersecurity maturity within the operational DNA of early-stage startups and SMBs.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.

HazeGrayCyber

HazeGrayCyber

HazeGrayCyber offers comprehensive technical services to bring your company to the next level.