Where Next? Paris Attacks Show Mumbai Strikes Are Global Blueprint

The Paris attacks show that 2008 Mumbai strikes have become global terror blueprint.  Nearly three weeks ago a senior Indian intelligence official was lamenting about the death of an initiative that could have vastly improved India’s counter-terrorism capabilities.

Worried at the lack of cooperation between security agencies, two key intelligence chiefs, the Intelligence Bureau’s Asif Ibrahim and the Research and Analysis Wing’s Alok Joshi got together in the summer of 2014 to put together a bold plan to address inter-agency issues. Their plan was simple in concept, but both appreciated the difficulty it would have in implementing it.

“The plan was to bring together those professionals who deal with Counter-Terrorism under one roof and then work together as a team,” the official told me. “The two chiefs had hoped that once they began to sit together, the flow of information would be much faster, and ensure that the counter measures were far more effective than what they are currently.”

A global network

But with most good ideas, the resistance to a new idea was so strong that even the two intelligence chiefs couldn’t push it through. Both of them retired and the proposal was buried in the voluminous files of North and South Block.

As the Paris attacks unfolded on Friday night, it was clear that terrorism today is a global alliance. Unfortunately, the response to global terrorism is far from being united. As India has shown, even getting two premier security agencies to cooperate is a challenge and political will to force radical change remains abysmally low. Every step that was thought of as a counter measure to India’s fight against terrorism after the attack by Lashkar-e-Toiba terrorists on Mumbai on 26/11 has been put into cold storage by India’s vast bureaucracy.

The 26/11 Mumbai attack by the LeT has now become the blueprint for terrorist attacks globally, as the latest Paris tragedy shows. While a 9/11 is spectacular in planning and execution, it is also far more difficult to do so in today’s age of increased surveillance. But a Mumbai-style 26/11 attack is far easier to plan and execute with equally deadlier results. To procure and smuggle in small arms, motivate suicide attackers and then unleash them on vulnerable public spaces is the worst nightmare for security professionals and that has now come true.

Countering such attacks will have to begin on a premise that they are impossible to stop. Such attacks will continue to occur and will become the hallmark of terrorism in the future. What security professionals can do is to start planning counter-measures to mitigate such attacks – improve the resilience of public spaces, quicken response capabilities of counter terrorism forces, work out worst-case scenarios, build up targeted intelligence that stays away from the lure of mass surveillance and work on mitigating the underlying causes that lead to terrorism.

Complicated task

Terrorism is gaining and learning from new electronically connected doctrines. The United Nations Office on Organised Crime and Drugs commissioned a study on how terrorists use online communities to further their aims.

It noted:
“The speed, global reach and relative anonymity with which terrorists can use the Internet to promote their causes or facilitate terrorist acts, together with complexities related to the location, retention, seizure and production of Internet-related data, makes timely and effective international cooperation between law enforcement and intelligence agencies an increasingly critical factor in the successful investigation and prosecution of many terrorism cases.”

But the absence of a universal instrument in dealing with cyber issues prevents governments from cooperating on taking on terrorist networks that are proliferating online. Issues of jurisdiction, extradition and prosecution are key differences that are continuing to keep governments from arriving at common ways to take on international terrorism.

The Islamic State, as researchers have shown, is an established master at using social media networks for financing and recruiting that helps their terrorism to grow. As researchers discovered recently, many of these ISIS social media networks are most active in Europe, rather than the usual suspects from the Middle East.

Clearly, the Paris attacks won’t be the last. Countries like India have already been mentioned as a key target by international terror outfits like the Al Qaeda and the ISIS. Merely acknowledging the threat is not enough. It needs a united response domestically as well as internationally. Unless nations agree on how to tackle the scourge of terrorism together, they shall be doomed to play the role of its eternal victim forever.

Scroll

 

« Essential Cyber Security Tips to Stay Safe Travelling
UK Banks Face Cyber Security Stress Test - Operation Resilient Shield »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MerlinCryption

MerlinCryption

MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.