Where Next? Paris Attacks Show Mumbai Strikes Are Global Blueprint

The Paris attacks show that 2008 Mumbai strikes have become global terror blueprint.  Nearly three weeks ago a senior Indian intelligence official was lamenting about the death of an initiative that could have vastly improved India’s counter-terrorism capabilities.

Worried at the lack of cooperation between security agencies, two key intelligence chiefs, the Intelligence Bureau’s Asif Ibrahim and the Research and Analysis Wing’s Alok Joshi got together in the summer of 2014 to put together a bold plan to address inter-agency issues. Their plan was simple in concept, but both appreciated the difficulty it would have in implementing it.

“The plan was to bring together those professionals who deal with Counter-Terrorism under one roof and then work together as a team,” the official told me. “The two chiefs had hoped that once they began to sit together, the flow of information would be much faster, and ensure that the counter measures were far more effective than what they are currently.”

A global network

But with most good ideas, the resistance to a new idea was so strong that even the two intelligence chiefs couldn’t push it through. Both of them retired and the proposal was buried in the voluminous files of North and South Block.

As the Paris attacks unfolded on Friday night, it was clear that terrorism today is a global alliance. Unfortunately, the response to global terrorism is far from being united. As India has shown, even getting two premier security agencies to cooperate is a challenge and political will to force radical change remains abysmally low. Every step that was thought of as a counter measure to India’s fight against terrorism after the attack by Lashkar-e-Toiba terrorists on Mumbai on 26/11 has been put into cold storage by India’s vast bureaucracy.

The 26/11 Mumbai attack by the LeT has now become the blueprint for terrorist attacks globally, as the latest Paris tragedy shows. While a 9/11 is spectacular in planning and execution, it is also far more difficult to do so in today’s age of increased surveillance. But a Mumbai-style 26/11 attack is far easier to plan and execute with equally deadlier results. To procure and smuggle in small arms, motivate suicide attackers and then unleash them on vulnerable public spaces is the worst nightmare for security professionals and that has now come true.

Countering such attacks will have to begin on a premise that they are impossible to stop. Such attacks will continue to occur and will become the hallmark of terrorism in the future. What security professionals can do is to start planning counter-measures to mitigate such attacks – improve the resilience of public spaces, quicken response capabilities of counter terrorism forces, work out worst-case scenarios, build up targeted intelligence that stays away from the lure of mass surveillance and work on mitigating the underlying causes that lead to terrorism.

Complicated task

Terrorism is gaining and learning from new electronically connected doctrines. The United Nations Office on Organised Crime and Drugs commissioned a study on how terrorists use online communities to further their aims.

It noted:
“The speed, global reach and relative anonymity with which terrorists can use the Internet to promote their causes or facilitate terrorist acts, together with complexities related to the location, retention, seizure and production of Internet-related data, makes timely and effective international cooperation between law enforcement and intelligence agencies an increasingly critical factor in the successful investigation and prosecution of many terrorism cases.”

But the absence of a universal instrument in dealing with cyber issues prevents governments from cooperating on taking on terrorist networks that are proliferating online. Issues of jurisdiction, extradition and prosecution are key differences that are continuing to keep governments from arriving at common ways to take on international terrorism.

The Islamic State, as researchers have shown, is an established master at using social media networks for financing and recruiting that helps their terrorism to grow. As researchers discovered recently, many of these ISIS social media networks are most active in Europe, rather than the usual suspects from the Middle East.

Clearly, the Paris attacks won’t be the last. Countries like India have already been mentioned as a key target by international terror outfits like the Al Qaeda and the ISIS. Merely acknowledging the threat is not enough. It needs a united response domestically as well as internationally. Unless nations agree on how to tackle the scourge of terrorism together, they shall be doomed to play the role of its eternal victim forever.

Scroll

 

« Essential Cyber Security Tips to Stay Safe Travelling
UK Banks Face Cyber Security Stress Test - Operation Resilient Shield »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Symantec

Symantec

Symantec delivers data-centric hybrid security for the largest, most complex organizations in the world – on devices, in private data centers, and in the cloud.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Harrison Clarke

Harrison Clarke

Harrison Clarke is a leading staffing and recruiting firm in the Cloud, Cybersecurity, Data & AI space.