Terrorism, A Sea Change In Tactics

Another terrorist attack took place in a European city, this time in Barcelona; just south of the city in the tourist resort of Cambrils a number of potential suicide bombers have been shot dead; the Spanish Police are linking the two incidents and it seems likely that this terror cell had planned and prepared their deadly attacks from a house located in Alcanar which blew up on Wednesday night killing one person. 

As inspired in the last edition of the magazine "Rumiyah", a vehicle was used as a weapon. Sadly more than a dozen people lost their lives, over 100 were injured, some in critical condition. So, why are vehicles being used? What can be done to stop this and other types of attacks, such as Nice, Berlin, London and now Barcelona?

Going back in time, we can see that this modus operandi is not new, nor was it introduced by the Islamic State, but a tactic used by Hamas in Israeli territories for many years. Al-Qaeda then championed it in their Inspire magazine in 2010 with an article titled “The Ultimate Mowing Machine.”  A car was used in London in May 2013 to knock down the British Soldier Lee Rigby before he was hacked to death with kitchen knives.  

So how is it that individuals and groups are inspired and instructed in how to carry out these types of attacks? At the heart of the issue is the introduction of social and encrypted networks in our social media enabled society. These are accessible to any individual with access to smartphones or laptops/computers and from there can access almost any information or communicate with anyone without any restriction.

Attack on Barcelona

It seems that the vehicle attack on Barcelona was probably planned quickly after an explosion in the town of Alcanar some 120 miles South of Barcelona destroyed a probable bomb factory the extremists were using to prepare a series of suicide devices.  It is possible that they intended to use similar tactics to the London Bridge attackers and drive a vehicle into a crowded area, then disperse and blow themselves up to cause further carnage, but when the house in Alcanar exploded on Wednesday night they quickly formulated a backup attack plan.

Whilst this theory as yet to be proven, analysts at Global Intelligence Insight believe it is a credible explanation of why a light truck was used along Las Ramblas in Barcelona and then 5 extremists wearing fake suicide vests were shot dead by police in the resort town of Cambrils some hours later.

 

 

 

 

 

 

 

 

 

 

Through monitoring of encrypted groups and channels used by sympathizers of the so called Islamic State, the Global Intelligence Insight  team can see at first hand the congratulatory chatter amongst extremist supporters before the official claim through the "Amaq" news agency, the “official” channel belonging to the Islamic State.

As in previous attacks, images, content and themes related to the subject have been spread and disseminated within the Jihadist community. Generally, they are coordinated by senior sympathizers, the latter being in close cooperation with the central command. 

We have reasons to believe that once again there was no direct order from the chain of command but rather from an autonomous cell that at least has to be composed of a number of elements, some of which are still at large. For an operation of this magnitude, there will have been a lot of surveillance and counter surveillance work done by those who carried out this type of attack. It will have been carefully planned and careful reconnaissance will have been carried out.

All this seems surreal to us after several similar attacks and nothing has been done so far regarding the monitoring and analysis of the various groups and channels. We continue to urge that immediate preventive measures should be taken so that no further attacks happen. Public areas need anti Vehicle Mitigation measures, intelligence agencies need additional capability.  

The one thing is certain, we have seen a sea change in tactics and overall sophistication; the threat to Europe has grown once more.

Vasco Da Cruz Almador is CEO at GlobalIntelligence Insight

You Might Also Read

Learning About ISIS Intentions Using Open Source Intelligence:

New Cyber Tricks Make ISIS Sophisticated:

Terrorist Activities On Social Media:

 

 

 

 

« Online Credit Card Fraud In Australia Surges
Can Tech Solve The Brexit Border Puzzle? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Information Commissioner's Office (ICO) - UK

Information Commissioner's Office (ICO) - UK

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Slovak National Accreditation Service (SNAS)

Slovak National Accreditation Service (SNAS)

SNAS is the national accreditation body for Slovakia. The directory of members provides details of organisations offering certification services for ISO 27001.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

Chaos Computer Club (CCC)

Chaos Computer Club (CCC)

The Chaos Computer Club is Europe's largest association of hackers.

AVIANET

AVIANET

AVIANET's goal is to empower enterprises and corporations worldwide and manage their digital transformation journey with confidence.