Where Next? Paris Attacks Show Mumbai Strikes Are Global Blueprint

The Paris attacks show that 2008 Mumbai strikes have become global terror blueprint.  Nearly three weeks ago a senior Indian intelligence official was lamenting about the death of an initiative that could have vastly improved India’s counter-terrorism capabilities.

Worried at the lack of cooperation between security agencies, two key intelligence chiefs, the Intelligence Bureau’s Asif Ibrahim and the Research and Analysis Wing’s Alok Joshi got together in the summer of 2014 to put together a bold plan to address inter-agency issues. Their plan was simple in concept, but both appreciated the difficulty it would have in implementing it.

“The plan was to bring together those professionals who deal with Counter-Terrorism under one roof and then work together as a team,” the official told me. “The two chiefs had hoped that once they began to sit together, the flow of information would be much faster, and ensure that the counter measures were far more effective than what they are currently.”

A global network

But with most good ideas, the resistance to a new idea was so strong that even the two intelligence chiefs couldn’t push it through. Both of them retired and the proposal was buried in the voluminous files of North and South Block.

As the Paris attacks unfolded on Friday night, it was clear that terrorism today is a global alliance. Unfortunately, the response to global terrorism is far from being united. As India has shown, even getting two premier security agencies to cooperate is a challenge and political will to force radical change remains abysmally low. Every step that was thought of as a counter measure to India’s fight against terrorism after the attack by Lashkar-e-Toiba terrorists on Mumbai on 26/11 has been put into cold storage by India’s vast bureaucracy.

The 26/11 Mumbai attack by the LeT has now become the blueprint for terrorist attacks globally, as the latest Paris tragedy shows. While a 9/11 is spectacular in planning and execution, it is also far more difficult to do so in today’s age of increased surveillance. But a Mumbai-style 26/11 attack is far easier to plan and execute with equally deadlier results. To procure and smuggle in small arms, motivate suicide attackers and then unleash them on vulnerable public spaces is the worst nightmare for security professionals and that has now come true.

Countering such attacks will have to begin on a premise that they are impossible to stop. Such attacks will continue to occur and will become the hallmark of terrorism in the future. What security professionals can do is to start planning counter-measures to mitigate such attacks – improve the resilience of public spaces, quicken response capabilities of counter terrorism forces, work out worst-case scenarios, build up targeted intelligence that stays away from the lure of mass surveillance and work on mitigating the underlying causes that lead to terrorism.

Complicated task

Terrorism is gaining and learning from new electronically connected doctrines. The United Nations Office on Organised Crime and Drugs commissioned a study on how terrorists use online communities to further their aims.

It noted:
“The speed, global reach and relative anonymity with which terrorists can use the Internet to promote their causes or facilitate terrorist acts, together with complexities related to the location, retention, seizure and production of Internet-related data, makes timely and effective international cooperation between law enforcement and intelligence agencies an increasingly critical factor in the successful investigation and prosecution of many terrorism cases.”

But the absence of a universal instrument in dealing with cyber issues prevents governments from cooperating on taking on terrorist networks that are proliferating online. Issues of jurisdiction, extradition and prosecution are key differences that are continuing to keep governments from arriving at common ways to take on international terrorism.

The Islamic State, as researchers have shown, is an established master at using social media networks for financing and recruiting that helps their terrorism to grow. As researchers discovered recently, many of these ISIS social media networks are most active in Europe, rather than the usual suspects from the Middle East.

Clearly, the Paris attacks won’t be the last. Countries like India have already been mentioned as a key target by international terror outfits like the Al Qaeda and the ISIS. Merely acknowledging the threat is not enough. It needs a united response domestically as well as internationally. Unless nations agree on how to tackle the scourge of terrorism together, they shall be doomed to play the role of its eternal victim forever.

Scroll

 

« Essential Cyber Security Tips to Stay Safe Travelling
UK Banks Face Cyber Security Stress Test - Operation Resilient Shield »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

AlgoSec

AlgoSec

AlgoSec is the market leader for security network security policy management, enabling organizations to simplify and automate security operations.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Northwave

Northwave

Northwave is 100% focused on providing integrated high quality information security services.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.