Terrorism, A Sea Change In Tactics

Another terrorist attack took place in a European city, this time in Barcelona; just south of the city in the tourist resort of Cambrils a number of potential suicide bombers have been shot dead; the Spanish Police are linking the two incidents and it seems likely that this terror cell had planned and prepared their deadly attacks from a house located in Alcanar which blew up on Wednesday night killing one person. 

As inspired in the last edition of the magazine "Rumiyah", a vehicle was used as a weapon. Sadly more than a dozen people lost their lives, over 100 were injured, some in critical condition. So, why are vehicles being used? What can be done to stop this and other types of attacks, such as Nice, Berlin, London and now Barcelona?

Going back in time, we can see that this modus operandi is not new, nor was it introduced by the Islamic State, but a tactic used by Hamas in Israeli territories for many years. Al-Qaeda then championed it in their Inspire magazine in 2010 with an article titled “The Ultimate Mowing Machine.”  A car was used in London in May 2013 to knock down the British Soldier Lee Rigby before he was hacked to death with kitchen knives.  

So how is it that individuals and groups are inspired and instructed in how to carry out these types of attacks? At the heart of the issue is the introduction of social and encrypted networks in our social media enabled society. These are accessible to any individual with access to smartphones or laptops/computers and from there can access almost any information or communicate with anyone without any restriction.

Attack on Barcelona

It seems that the vehicle attack on Barcelona was probably planned quickly after an explosion in the town of Alcanar some 120 miles South of Barcelona destroyed a probable bomb factory the extremists were using to prepare a series of suicide devices.  It is possible that they intended to use similar tactics to the London Bridge attackers and drive a vehicle into a crowded area, then disperse and blow themselves up to cause further carnage, but when the house in Alcanar exploded on Wednesday night they quickly formulated a backup attack plan.

Whilst this theory as yet to be proven, analysts at Global Intelligence Insight believe it is a credible explanation of why a light truck was used along Las Ramblas in Barcelona and then 5 extremists wearing fake suicide vests were shot dead by police in the resort town of Cambrils some hours later.

 

 

 

 

 

 

 

 

 

 

Through monitoring of encrypted groups and channels used by sympathizers of the so called Islamic State, the Global Intelligence Insight  team can see at first hand the congratulatory chatter amongst extremist supporters before the official claim through the "Amaq" news agency, the “official” channel belonging to the Islamic State.

As in previous attacks, images, content and themes related to the subject have been spread and disseminated within the Jihadist community. Generally, they are coordinated by senior sympathizers, the latter being in close cooperation with the central command. 

We have reasons to believe that once again there was no direct order from the chain of command but rather from an autonomous cell that at least has to be composed of a number of elements, some of which are still at large. For an operation of this magnitude, there will have been a lot of surveillance and counter surveillance work done by those who carried out this type of attack. It will have been carefully planned and careful reconnaissance will have been carried out.

All this seems surreal to us after several similar attacks and nothing has been done so far regarding the monitoring and analysis of the various groups and channels. We continue to urge that immediate preventive measures should be taken so that no further attacks happen. Public areas need anti Vehicle Mitigation measures, intelligence agencies need additional capability.  

The one thing is certain, we have seen a sea change in tactics and overall sophistication; the threat to Europe has grown once more.

Vasco Da Cruz Almador is CEO at GlobalIntelligence Insight

You Might Also Read

Learning About ISIS Intentions Using Open Source Intelligence:

New Cyber Tricks Make ISIS Sophisticated:

Terrorist Activities On Social Media:

 

 

 

 

« Online Credit Card Fraud In Australia Surges
Can Tech Solve The Brexit Border Puzzle? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).

SixMap

SixMap

SixMap is a continuous threat exposure management platform that automatically provides comprehensive enterprise visibility, contextual threat intelligence, and a suite of remediation actions.

RELIANOID

RELIANOID

RELIANOID is an application delivery controller and load balancing system that ensures high performance and security of IT services on a massive scale.