Terrorism, A Sea Change In Tactics

Another terrorist attack took place in a European city, this time in Barcelona; just south of the city in the tourist resort of Cambrils a number of potential suicide bombers have been shot dead; the Spanish Police are linking the two incidents and it seems likely that this terror cell had planned and prepared their deadly attacks from a house located in Alcanar which blew up on Wednesday night killing one person. 

As inspired in the last edition of the magazine "Rumiyah", a vehicle was used as a weapon. Sadly more than a dozen people lost their lives, over 100 were injured, some in critical condition. So, why are vehicles being used? What can be done to stop this and other types of attacks, such as Nice, Berlin, London and now Barcelona?

Going back in time, we can see that this modus operandi is not new, nor was it introduced by the Islamic State, but a tactic used by Hamas in Israeli territories for many years. Al-Qaeda then championed it in their Inspire magazine in 2010 with an article titled “The Ultimate Mowing Machine.”  A car was used in London in May 2013 to knock down the British Soldier Lee Rigby before he was hacked to death with kitchen knives.  

So how is it that individuals and groups are inspired and instructed in how to carry out these types of attacks? At the heart of the issue is the introduction of social and encrypted networks in our social media enabled society. These are accessible to any individual with access to smartphones or laptops/computers and from there can access almost any information or communicate with anyone without any restriction.

Attack on Barcelona

It seems that the vehicle attack on Barcelona was probably planned quickly after an explosion in the town of Alcanar some 120 miles South of Barcelona destroyed a probable bomb factory the extremists were using to prepare a series of suicide devices.  It is possible that they intended to use similar tactics to the London Bridge attackers and drive a vehicle into a crowded area, then disperse and blow themselves up to cause further carnage, but when the house in Alcanar exploded on Wednesday night they quickly formulated a backup attack plan.

Whilst this theory as yet to be proven, analysts at Global Intelligence Insight believe it is a credible explanation of why a light truck was used along Las Ramblas in Barcelona and then 5 extremists wearing fake suicide vests were shot dead by police in the resort town of Cambrils some hours later.

 

 

 

 

 

 

 

 

 

 

Through monitoring of encrypted groups and channels used by sympathizers of the so called Islamic State, the Global Intelligence Insight  team can see at first hand the congratulatory chatter amongst extremist supporters before the official claim through the "Amaq" news agency, the “official” channel belonging to the Islamic State.

As in previous attacks, images, content and themes related to the subject have been spread and disseminated within the Jihadist community. Generally, they are coordinated by senior sympathizers, the latter being in close cooperation with the central command. 

We have reasons to believe that once again there was no direct order from the chain of command but rather from an autonomous cell that at least has to be composed of a number of elements, some of which are still at large. For an operation of this magnitude, there will have been a lot of surveillance and counter surveillance work done by those who carried out this type of attack. It will have been carefully planned and careful reconnaissance will have been carried out.

All this seems surreal to us after several similar attacks and nothing has been done so far regarding the monitoring and analysis of the various groups and channels. We continue to urge that immediate preventive measures should be taken so that no further attacks happen. Public areas need anti Vehicle Mitigation measures, intelligence agencies need additional capability.  

The one thing is certain, we have seen a sea change in tactics and overall sophistication; the threat to Europe has grown once more.

Vasco Da Cruz Almador is CEO at GlobalIntelligence Insight

You Might Also Read

Learning About ISIS Intentions Using Open Source Intelligence:

New Cyber Tricks Make ISIS Sophisticated:

Terrorist Activities On Social Media:

 

 

 

 

« Online Credit Card Fraud In Australia Surges
Can Tech Solve The Brexit Border Puzzle? »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

Tricerion

Tricerion

SafeLogin from Tricerion is an entirely software based identity access management solution that uses picture based passwords rather than alphanumeric text.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Tutanota

Tutanota

Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.