Terrorism, A Sea Change In Tactics

Another terrorist attack took place in a European city, this time in Barcelona; just south of the city in the tourist resort of Cambrils a number of potential suicide bombers have been shot dead; the Spanish Police are linking the two incidents and it seems likely that this terror cell had planned and prepared their deadly attacks from a house located in Alcanar which blew up on Wednesday night killing one person. 

As inspired in the last edition of the magazine "Rumiyah", a vehicle was used as a weapon. Sadly more than a dozen people lost their lives, over 100 were injured, some in critical condition. So, why are vehicles being used? What can be done to stop this and other types of attacks, such as Nice, Berlin, London and now Barcelona?

Going back in time, we can see that this modus operandi is not new, nor was it introduced by the Islamic State, but a tactic used by Hamas in Israeli territories for many years. Al-Qaeda then championed it in their Inspire magazine in 2010 with an article titled “The Ultimate Mowing Machine.”  A car was used in London in May 2013 to knock down the British Soldier Lee Rigby before he was hacked to death with kitchen knives.  

So how is it that individuals and groups are inspired and instructed in how to carry out these types of attacks? At the heart of the issue is the introduction of social and encrypted networks in our social media enabled society. These are accessible to any individual with access to smartphones or laptops/computers and from there can access almost any information or communicate with anyone without any restriction.

Attack on Barcelona

It seems that the vehicle attack on Barcelona was probably planned quickly after an explosion in the town of Alcanar some 120 miles South of Barcelona destroyed a probable bomb factory the extremists were using to prepare a series of suicide devices.  It is possible that they intended to use similar tactics to the London Bridge attackers and drive a vehicle into a crowded area, then disperse and blow themselves up to cause further carnage, but when the house in Alcanar exploded on Wednesday night they quickly formulated a backup attack plan.

Whilst this theory as yet to be proven, analysts at Global Intelligence Insight believe it is a credible explanation of why a light truck was used along Las Ramblas in Barcelona and then 5 extremists wearing fake suicide vests were shot dead by police in the resort town of Cambrils some hours later.

 

 

 

 

 

 

 

 

 

 

Through monitoring of encrypted groups and channels used by sympathizers of the so called Islamic State, the Global Intelligence Insight  team can see at first hand the congratulatory chatter amongst extremist supporters before the official claim through the "Amaq" news agency, the “official” channel belonging to the Islamic State.

As in previous attacks, images, content and themes related to the subject have been spread and disseminated within the Jihadist community. Generally, they are coordinated by senior sympathizers, the latter being in close cooperation with the central command. 

We have reasons to believe that once again there was no direct order from the chain of command but rather from an autonomous cell that at least has to be composed of a number of elements, some of which are still at large. For an operation of this magnitude, there will have been a lot of surveillance and counter surveillance work done by those who carried out this type of attack. It will have been carefully planned and careful reconnaissance will have been carried out.

All this seems surreal to us after several similar attacks and nothing has been done so far regarding the monitoring and analysis of the various groups and channels. We continue to urge that immediate preventive measures should be taken so that no further attacks happen. Public areas need anti Vehicle Mitigation measures, intelligence agencies need additional capability.  

The one thing is certain, we have seen a sea change in tactics and overall sophistication; the threat to Europe has grown once more.

Vasco Da Cruz Almador is CEO at GlobalIntelligence Insight

You Might Also Read

Learning About ISIS Intentions Using Open Source Intelligence:

New Cyber Tricks Make ISIS Sophisticated:

Terrorist Activities On Social Media:

 

 

 

 

« Online Credit Card Fraud In Australia Surges
Can Tech Solve The Brexit Border Puzzle? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

Sardine

Sardine

Sardine is a leader in financial crime prevention. Using unparalleled device intelligence and behavior biometrics, Sardine applies machine learning to detect and stop fraud before it happens.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Cyber Brain Academy

Cyber Brain Academy

At Cyber Brain Academy, our mission is to provide high-quality IT certification training for the cyber security workforce.