Where Next? Paris Attacks Show Mumbai Strikes Are Global Blueprint

The Paris attacks show that 2008 Mumbai strikes have become global terror blueprint.  Nearly three weeks ago a senior Indian intelligence official was lamenting about the death of an initiative that could have vastly improved India’s counter-terrorism capabilities.

Worried at the lack of cooperation between security agencies, two key intelligence chiefs, the Intelligence Bureau’s Asif Ibrahim and the Research and Analysis Wing’s Alok Joshi got together in the summer of 2014 to put together a bold plan to address inter-agency issues. Their plan was simple in concept, but both appreciated the difficulty it would have in implementing it.

“The plan was to bring together those professionals who deal with Counter-Terrorism under one roof and then work together as a team,” the official told me. “The two chiefs had hoped that once they began to sit together, the flow of information would be much faster, and ensure that the counter measures were far more effective than what they are currently.”

A global network

But with most good ideas, the resistance to a new idea was so strong that even the two intelligence chiefs couldn’t push it through. Both of them retired and the proposal was buried in the voluminous files of North and South Block.

As the Paris attacks unfolded on Friday night, it was clear that terrorism today is a global alliance. Unfortunately, the response to global terrorism is far from being united. As India has shown, even getting two premier security agencies to cooperate is a challenge and political will to force radical change remains abysmally low. Every step that was thought of as a counter measure to India’s fight against terrorism after the attack by Lashkar-e-Toiba terrorists on Mumbai on 26/11 has been put into cold storage by India’s vast bureaucracy.

The 26/11 Mumbai attack by the LeT has now become the blueprint for terrorist attacks globally, as the latest Paris tragedy shows. While a 9/11 is spectacular in planning and execution, it is also far more difficult to do so in today’s age of increased surveillance. But a Mumbai-style 26/11 attack is far easier to plan and execute with equally deadlier results. To procure and smuggle in small arms, motivate suicide attackers and then unleash them on vulnerable public spaces is the worst nightmare for security professionals and that has now come true.

Countering such attacks will have to begin on a premise that they are impossible to stop. Such attacks will continue to occur and will become the hallmark of terrorism in the future. What security professionals can do is to start planning counter-measures to mitigate such attacks – improve the resilience of public spaces, quicken response capabilities of counter terrorism forces, work out worst-case scenarios, build up targeted intelligence that stays away from the lure of mass surveillance and work on mitigating the underlying causes that lead to terrorism.

Complicated task

Terrorism is gaining and learning from new electronically connected doctrines. The United Nations Office on Organised Crime and Drugs commissioned a study on how terrorists use online communities to further their aims.

It noted:
“The speed, global reach and relative anonymity with which terrorists can use the Internet to promote their causes or facilitate terrorist acts, together with complexities related to the location, retention, seizure and production of Internet-related data, makes timely and effective international cooperation between law enforcement and intelligence agencies an increasingly critical factor in the successful investigation and prosecution of many terrorism cases.”

But the absence of a universal instrument in dealing with cyber issues prevents governments from cooperating on taking on terrorist networks that are proliferating online. Issues of jurisdiction, extradition and prosecution are key differences that are continuing to keep governments from arriving at common ways to take on international terrorism.

The Islamic State, as researchers have shown, is an established master at using social media networks for financing and recruiting that helps their terrorism to grow. As researchers discovered recently, many of these ISIS social media networks are most active in Europe, rather than the usual suspects from the Middle East.

Clearly, the Paris attacks won’t be the last. Countries like India have already been mentioned as a key target by international terror outfits like the Al Qaeda and the ISIS. Merely acknowledging the threat is not enough. It needs a united response domestically as well as internationally. Unless nations agree on how to tackle the scourge of terrorism together, they shall be doomed to play the role of its eternal victim forever.

Scroll

 

« Essential Cyber Security Tips to Stay Safe Travelling
UK Banks Face Cyber Security Stress Test - Operation Resilient Shield »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.