Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of remote recruits via social media.

Analysts and intelligence officials periodically get together to anticipate what tomorrow’s terrorists might do.

 

  • Will terrorists threaten mass destruction with nuclear weapons or global pandemics with designer pathogens? Will cities be contaminated with dirty bombs? Will tech-savvy terrorists remotely sabotage power grids or other, vital infrastructure via the Internet?
  • Are terrorists capable of triggering electromagnetic pulses that fry electronics, reducing modern technology dependent society to a Mad Max movie?
  • Will they shoot down airliners with hand-held missiles or bring them down with miniaturised bombs concealed in laptops or perhaps surgically implanted?
  • Will they attack crowds in stadiums with drones carrying hand grenades or anthrax or merely white powder to provoke deadly panics?
  • Or might there be a mass uprising of individual fanatics ramming trucks into pedestrians, attacking diners with machetes, and carrying out other primitive, but nearly impossible to prevent attacks?  

The scenarios are endless and unnerving. All of the ones above have been discussed publicly. And if analysts can think about them, one presumes, so can terrorists who fill the Internet with their ambitious fantasies.

Some of these are pretensions of omnipotence that make their authors feel good; some support the terrorists’ campaign to promote fear. Few can be entirely disregarded. Had the 9/11 hijackers been arrested one week before their attack, their plan might have been dismissed as a far-fetched scheme, which it was.

US Secretary of Homeland Security John Kelly recently warned that if Americans knew what he knows about terrorism, they’d “ never leave the house ”, a dismaying message coming from a Marine four-star general.  There are several ways analysts try to gaze into the future. One is to look at trends in terrorism itself and see where these might take us.

Extrapolation doesn’t always work. According to data from the Global Terrorism Database, from 1970 to 2001, fatalities in the worst terrorist attacks increased by an order of magnitude every 10 to 15 years, culminating in the 9/11 attacks, in which thousands died. It was widely presumed immediately after 9/11 that terrorists would continue to escalate by orders of magnitude, pushing the analysis toward scenarios involving tens of thousands or even hundreds of thousands of fatalities. Death on this scale could be achieved only with the use of biological or nuclear weapons, which became a presumption.

A second way to look at the future is to try to forecast the state of world affairs and examine how this might affect the trajectory of terrorism. Analysts correctly anticipated that the US invasion of Iraq would mobilise new cohorts of jihadist extremists, but many mistakenly thought that the rise of anarchist elements in the wake of the 2008 economic crisis might reinvigorate the violent edge of the left, it did not. It is expected that the conflicts in Syria and adjacent areas will remain sources of future terrorist violence.

A third approach is to look at how terrorists might exploit new technologies coming on line. Years ago, we worried about surface-to-air missiles, which terrorists have rarely used, but we missed the Internet. Then in its infancy, the Internet was to have a profound impact on terrorist communications, recruiting and strategy, underscoring that terrorism is mainly about manipulating perceptions. Analysts currently are looking at terrorists using drones and exploiting the Internet of Things.
A fourth approach is to try to think as terrorists and conjure up scenarios of future attacks.

This is a way to prevent failures of imagination, but possibilities are often misread as forecasts. In the early 1980s, It was thought that terrorists might fly hijacked airliners into large buildings. This involved no prescience as, in 1972, hijackers had threatened to fly a hijacked plane into the nuclear facilities at Oak Ridge, Tennessee. 

Any review of what we might have forecast about the future trajectory of terrorism in the past should be humbling. Fifty years ago, who knew that the following decades would see the dramatic rise of terrorism in its contemporary form? One of the major events was the 1967 Six Day War, which would lead to Israel’s occupation of the West Bank, contributing to the rise of the Palestinian terrorism. Who in 1977 forecast the emergence of Islamist extremism in the form of the Iranian revolution, the rise of Iranian-supported Shia extremism in Lebanon, and an escalation of terrorist violence with massive vehicle bombs and suicide attacks becoming routine?

The Middle East would remain a major theater of concern for the US during this decade, and Washington would increasingly resort to military force to retaliate for attacks on US Marines in Lebanon, apprehend terrorist hijackers escaping from Egypt, and deter further Libyan support for terrorist attacks that had cost American lives. Hardly any analysts in 1987 foresaw the fall of the Soviet Union in 1989, which would fundamentally change the world’s political environment and significantly affect the course of terrorism. By 1997, al Qaeda had already declared war on the US, but 1998 would see a dramatic escalation of that campaign, culminating in the 9/11 attacks that would lead to the Global War on Terror, a massive worldwide effort that continues to this day. And in 2007, who foresaw the uprisings that would sweep across the Arab world in 2011, distracting governments, creating new opportunities for jihadists, and leading to Syria’s civil war and the rise of ISIS?  

Terrorism has become a mode of armed conflict, it will persist. But the worldwide growth in the volume of terrorism is misleading. It reflects the invention of the category of terrorism, better reporting worldwide, and the now routine employment of terrorist tactics in irregular conflicts.

Although terrorism is a global phenomenon, outside of conflict zones, where terrorist campaigns comprise merely one aspect of ongoing wars, terrorist attacks occur only occasionally. In 2015, more than 55 percent of all attacks took place in Iraq, Afghanistan, Pakistan, India, and Nigeria, and 74 percent of all fatalities occurred in five countries Iraq, Afghanistan, Nigeria, Syria, and Pakistan.

Terrorism remains concentrated in the Middle East and bordering areas of North Africa and western Asia. Current conflicts in these areas are likely to persist and will remain the major source of the terrorist threat. For the US, terrorism and Middle East policy have become inextricably intertwined.

Events external to terrorism can have enormous effects on the course of terrorism, the Six Day War and Vietnam War as catalysts for protest and ultimately violence; the Iranian revolution; the Soviet invasion of Afghanistan and the rise of Islamic extremism; the fall of the Soviet Union; the Arab Spring.

Our worst fears have not been realised. Terrorists have seldom used chemical or biological weapons and then not very effectively. There has been one incident of radiological terrorism, carried out as a publicity stunt, and no nuclear weapons. Nonetheless, the lure of doom continues, with many arguing that it is not if, but when terrorists will employ such weapons.
The terrorists’ arsenal has changed very little. Bombs still comprise three-quarters of terrorist attacks. Some bombs are becoming more sophisticated. Terrorist attacks still involve automatic or semi-automatic weapons not different from a half-century ago.

Tactical innovations include suicide bombings, multiple suicide bombings, increasingly random attacks on soft targets, the use of vehicles in ramming attacks. This reflects the enlistment of remote recruits with limited capabilities, which is itself a consequence of social media.

Terrorism appears to have escalated horizontally rather than vertically. Instead of weapons of mass destruction, there has been a proliferation of low level attacks, frustrating, but certainly preferable. The trick will be to use what is known about terrorism now to predict and prevent new attacks.

Newsweek:

You Might Also Read:

What Happens If Criminals & Terrorists Get To Use AI?:

Exploring Alternatives: Terrorism Converging With Cyber Crime:

 

 

« India Internet Shutdowns 'Violate Human Rights'
WannaCry Returns To Attack Honda »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

UL

UL

UL is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.