Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of remote recruits via social media.

Analysts and intelligence officials periodically get together to anticipate what tomorrow’s terrorists might do.

 

  • Will terrorists threaten mass destruction with nuclear weapons or global pandemics with designer pathogens? Will cities be contaminated with dirty bombs? Will tech-savvy terrorists remotely sabotage power grids or other, vital infrastructure via the Internet?
  • Are terrorists capable of triggering electromagnetic pulses that fry electronics, reducing modern technology dependent society to a Mad Max movie?
  • Will they shoot down airliners with hand-held missiles or bring them down with miniaturised bombs concealed in laptops or perhaps surgically implanted?
  • Will they attack crowds in stadiums with drones carrying hand grenades or anthrax or merely white powder to provoke deadly panics?
  • Or might there be a mass uprising of individual fanatics ramming trucks into pedestrians, attacking diners with machetes, and carrying out other primitive, but nearly impossible to prevent attacks?  

The scenarios are endless and unnerving. All of the ones above have been discussed publicly. And if analysts can think about them, one presumes, so can terrorists who fill the Internet with their ambitious fantasies.

Some of these are pretensions of omnipotence that make their authors feel good; some support the terrorists’ campaign to promote fear. Few can be entirely disregarded. Had the 9/11 hijackers been arrested one week before their attack, their plan might have been dismissed as a far-fetched scheme, which it was.

US Secretary of Homeland Security John Kelly recently warned that if Americans knew what he knows about terrorism, they’d “ never leave the house ”, a dismaying message coming from a Marine four-star general.  There are several ways analysts try to gaze into the future. One is to look at trends in terrorism itself and see where these might take us.

Extrapolation doesn’t always work. According to data from the Global Terrorism Database, from 1970 to 2001, fatalities in the worst terrorist attacks increased by an order of magnitude every 10 to 15 years, culminating in the 9/11 attacks, in which thousands died. It was widely presumed immediately after 9/11 that terrorists would continue to escalate by orders of magnitude, pushing the analysis toward scenarios involving tens of thousands or even hundreds of thousands of fatalities. Death on this scale could be achieved only with the use of biological or nuclear weapons, which became a presumption.

A second way to look at the future is to try to forecast the state of world affairs and examine how this might affect the trajectory of terrorism. Analysts correctly anticipated that the US invasion of Iraq would mobilise new cohorts of jihadist extremists, but many mistakenly thought that the rise of anarchist elements in the wake of the 2008 economic crisis might reinvigorate the violent edge of the left, it did not. It is expected that the conflicts in Syria and adjacent areas will remain sources of future terrorist violence.

A third approach is to look at how terrorists might exploit new technologies coming on line. Years ago, we worried about surface-to-air missiles, which terrorists have rarely used, but we missed the Internet. Then in its infancy, the Internet was to have a profound impact on terrorist communications, recruiting and strategy, underscoring that terrorism is mainly about manipulating perceptions. Analysts currently are looking at terrorists using drones and exploiting the Internet of Things.
A fourth approach is to try to think as terrorists and conjure up scenarios of future attacks.

This is a way to prevent failures of imagination, but possibilities are often misread as forecasts. In the early 1980s, It was thought that terrorists might fly hijacked airliners into large buildings. This involved no prescience as, in 1972, hijackers had threatened to fly a hijacked plane into the nuclear facilities at Oak Ridge, Tennessee. 

Any review of what we might have forecast about the future trajectory of terrorism in the past should be humbling. Fifty years ago, who knew that the following decades would see the dramatic rise of terrorism in its contemporary form? One of the major events was the 1967 Six Day War, which would lead to Israel’s occupation of the West Bank, contributing to the rise of the Palestinian terrorism. Who in 1977 forecast the emergence of Islamist extremism in the form of the Iranian revolution, the rise of Iranian-supported Shia extremism in Lebanon, and an escalation of terrorist violence with massive vehicle bombs and suicide attacks becoming routine?

The Middle East would remain a major theater of concern for the US during this decade, and Washington would increasingly resort to military force to retaliate for attacks on US Marines in Lebanon, apprehend terrorist hijackers escaping from Egypt, and deter further Libyan support for terrorist attacks that had cost American lives. Hardly any analysts in 1987 foresaw the fall of the Soviet Union in 1989, which would fundamentally change the world’s political environment and significantly affect the course of terrorism. By 1997, al Qaeda had already declared war on the US, but 1998 would see a dramatic escalation of that campaign, culminating in the 9/11 attacks that would lead to the Global War on Terror, a massive worldwide effort that continues to this day. And in 2007, who foresaw the uprisings that would sweep across the Arab world in 2011, distracting governments, creating new opportunities for jihadists, and leading to Syria’s civil war and the rise of ISIS?  

Terrorism has become a mode of armed conflict, it will persist. But the worldwide growth in the volume of terrorism is misleading. It reflects the invention of the category of terrorism, better reporting worldwide, and the now routine employment of terrorist tactics in irregular conflicts.

Although terrorism is a global phenomenon, outside of conflict zones, where terrorist campaigns comprise merely one aspect of ongoing wars, terrorist attacks occur only occasionally. In 2015, more than 55 percent of all attacks took place in Iraq, Afghanistan, Pakistan, India, and Nigeria, and 74 percent of all fatalities occurred in five countries Iraq, Afghanistan, Nigeria, Syria, and Pakistan.

Terrorism remains concentrated in the Middle East and bordering areas of North Africa and western Asia. Current conflicts in these areas are likely to persist and will remain the major source of the terrorist threat. For the US, terrorism and Middle East policy have become inextricably intertwined.

Events external to terrorism can have enormous effects on the course of terrorism, the Six Day War and Vietnam War as catalysts for protest and ultimately violence; the Iranian revolution; the Soviet invasion of Afghanistan and the rise of Islamic extremism; the fall of the Soviet Union; the Arab Spring.

Our worst fears have not been realised. Terrorists have seldom used chemical or biological weapons and then not very effectively. There has been one incident of radiological terrorism, carried out as a publicity stunt, and no nuclear weapons. Nonetheless, the lure of doom continues, with many arguing that it is not if, but when terrorists will employ such weapons.
The terrorists’ arsenal has changed very little. Bombs still comprise three-quarters of terrorist attacks. Some bombs are becoming more sophisticated. Terrorist attacks still involve automatic or semi-automatic weapons not different from a half-century ago.

Tactical innovations include suicide bombings, multiple suicide bombings, increasingly random attacks on soft targets, the use of vehicles in ramming attacks. This reflects the enlistment of remote recruits with limited capabilities, which is itself a consequence of social media.

Terrorism appears to have escalated horizontally rather than vertically. Instead of weapons of mass destruction, there has been a proliferation of low level attacks, frustrating, but certainly preferable. The trick will be to use what is known about terrorism now to predict and prevent new attacks.

Newsweek:

You Might Also Read:

What Happens If Criminals & Terrorists Get To Use AI?:

Exploring Alternatives: Terrorism Converging With Cyber Crime:

 

 

« India Internet Shutdowns 'Violate Human Rights'
WannaCry Returns To Attack Honda »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

Inveteck Global

Inveteck Global

Inveteck Global is a Ghana-based cyber security firm providing strategic guidance and technical solutions to all our clients to best serve their individual needs.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

RedNode

RedNode

RedNode is a cybersecurity service provider that offers customized security testing solutions to protect any size of business worldwide.

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.