SlideShare a Scribd company logo
1 of 10
Proactive Counter-Terrorism
    in the 21st Century


              A presentation by Simon Williams
                 University College London, UK
                                 Autumn 2011
Terrorism: The Threat Today
Terrorism: Unlawful use of force or violence against
  persons or property, to intimidate or coerce a
  government, its civilian population, or any segment
  thereof, in furtherance of political or social
  objectives. (Modified from U.S. FBI)

   Countries today are threatened by modern and
    sophisticated terrorist organizations. Improvements in
    technology, specifically mobile communication and the
    internet, allow terrorist organizations to execute larger and
    more precise operations that surpass the scale of 9/11.

   Throughout the past two decades terrorists have been
    raising funds, independently, and through countries that
    support their motives or tactics.

   Terrorist organizations now have professional training,
    intelligence resources, state of the art technology, and top
    notch weapons to carry out their attacks.
Possible Modes of Attack
  Hot-Attacks (IED)              Chemical & Biological          Armed Attacks &
                                                                Assassinations
 Utilizing explosive devices,      These types of attacks are
 usually home-made                 difficult to detect and      Means for this attack are
 “improvised explosive             spread substances that       simple and easily
 devices”                          affect large areas outside   obtainable with little
 Types:                            of the original area of      training required. Small
 •Covertly placed bomb             exposure.                    arms, machine guns, rifles,
 •Body Borne (suicide vest)        •Dirty bomb: an              hand grenades, etc.
 •Vehicle Borne                    explosive device
 •In the Post                      containing radioactive       Can take numerous forms
 •Mortar Weapon                    material                     such as:
                                   •Chemical weapon:            •Shooting from vehicle
 Three distinct                    chemical substance in the    •Brute force entrance
 components:                       form of gas, liquid, or      •Single/multi-Target Sniper
 1. Explosives, e.g., TNT ,        powder
    plastic explosives, or         •Biological weapon:
    liquid explosives.             spray or powder
 2. Detonators, such as
    fuses and light bulbs.
 3. Activating device/power
    source, timer, pin,
    cellular phone, beeper, or
    remote control.
Mitigating Threats
The fundamental truth about a successful terrorist attack is the
element of surprise. A successful terrorist attack catches society
completely off-guard. While security forces adopt defenses
against common techniques of terrorist organizations, these
organizations are already in search of new loopholes that they can
exploit.
The current system for dealing with terrorist incidents focuses on
response, not prevention. It is reactive, but should be proactive.
Increased preventative measures need to be employed to thwart
terrorist attacks before they occur, such as:

                  1. Acquisition of Actionable Real-Time Intelligence
                  2. Improved Counter-Surveillance
                  3. Stronger Physical Deterrents
Intelligence Collection
 Law Enforcement entities and Intelligence Agencies identify,
 infiltrate, and exploit known terrorist organizations in order to
 collect information on their modus operandi and potential
 targets.

 With such information they can take the necessary
 precautions to mitigate the threat, arrest the perpetrators,
 and destroy the structure of their organization.

 Military forces are conducting superb intelligence gathering
 operations in hostile areas around the world. These
 techniques need to be applied to domestic counter-terror
 operations, and local law enforcement entities need to
 learn how to utilize human assets within their jurisdiction
 to identify and monitor terrorist threats.
The Common Denominator

Question: What do almost all terrorist
 attacks have in common?




  target casing
 Answer: Pre-operation surveillance and
Counter-Surveillance
If all terrorist attacks involve surveillance,
  then the most logical preventative measure
  would be counter-surveillance.
 Counter-surveillance, or more precisely “offensive counter-
 intelligence” refers to measures taken by a party to prevent
 hostile groups from gathering intelligence against them by
 employing actions to make the task more difficult.


  Counter-surveillance is based around two secrets:
  1. Hostile surveillance is vulnerable to observation because they are
     not familiar with the target
  2. Hostile surveillance can be manipulated and the operatives forced
     into making errors that reveal their presence
Counter-Surveillance (Cont.)
  Different assailants will have different attack cycles, however, all potential threats
  will share the Target Selection and Planning phases. They conduct their surveillance
  on the target or even employ a team to advise on target movements during an
  attack.

     Surveillance looks for possible weakness to develop an attack plan:
         •If the target is a person, surveillance looks for behaviour patterns, routine,
         transportation
         •If the target is a structure, surveillance will look for physical security
         measures, guard change frequency and times, visibility, escape routes, etc.

  The more surveillance they conduct, the
  more likely they will be observed and their
  operation compromised.

Counter-Surveillance techniques that can be employed are:
  Using TEDD to identify hostile operatives (Time, Environment, Distance, Demeanor)
  Employ „Surveillance Detection Routes‟ to evoke certain behaviours and identify hostiles
  Positioning uniformed guards or CCTV to scare off hostile operatives
  Changing Force-Protection Conditions (passwords, badges, entry requirements) at random to keep hostiles in the dark
Physical Barriers
Physical barriers are the last preventative method in thwarting a terrorist attack, but
  possibly the most important.

Should intelligence not gather any information on possible attack plans, counter-
  surveillance fail to detect target casing, and a terrorist attempts an attack, the
  physical barriers could prevent catastrophe.
    Perimeter                        Access                Electronic Detection
    Security                         Control                   and Imaging




   Maritime Barriers
                                Screening Checkpoint                  CCTV




    Security Fencing                   Bollards
                                                                  Ground Sensors
Proactive Counter-Terrorism in the
21st Century
   The imminent threat of a terrorist attack is growing, and the
    frequency and intensity of such attacks are increasing every day.
    If public and private institutions implement
             1. Acquisition of Actionable Real-Time Intelligence
             2. Improved Counter-Surveillance
             3. Stronger Physical Deterrents
    they will successfully prevent attacks, apprehend dangerous
    criminals, and destroy terrorist networks. Through international
    dialogue and cooperation, this goal can be achieved and a safer
    world will come into existence.

More Related Content

Viewers also liked

ASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceFiretide
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
 
Forecasting Technological Change (1)
Forecasting Technological Change (1)Forecasting Technological Change (1)
Forecasting Technological Change (1)Paul Schumann
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Keith Harris
 
Surveillance and Notification of Diseases
Surveillance and Notification of DiseasesSurveillance and Notification of Diseases
Surveillance and Notification of DiseasesDr Ghaiath Hussein
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceGeorge Moulton
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 

Viewers also liked (10)

ASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & Surveillance
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
Forecasting Technological Change (1)
Forecasting Technological Change (1)Forecasting Technological Change (1)
Forecasting Technological Change (1)
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
 
Surveillance and Notification of Diseases
Surveillance and Notification of DiseasesSurveillance and Notification of Diseases
Surveillance and Notification of Diseases
 
Introduction to Epidemiology and Surveillance
Introduction to Epidemiology and SurveillanceIntroduction to Epidemiology and Surveillance
Introduction to Epidemiology and Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 

Similar to [Challenge:Future] Proactive Counter-Terrorism

Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsNovoQuad
 
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard GarrityRichard Garrity
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Roger Johnston
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustryLawrence Nagazina
 
National Security Emergencies
National Security EmergenciesNational Security Emergencies
National Security EmergenciesEdward Dobson
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologyNovoQuad
 
Breaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone TechnologiesBreaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone TechnologiesNovoQuad
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxIRESH3
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
Role of Emergency Physicians During CBRNE Attack - The Malaysian Context
Role of Emergency Physicians During CBRNE Attack - The Malaysian ContextRole of Emergency Physicians During CBRNE Attack - The Malaysian Context
Role of Emergency Physicians During CBRNE Attack - The Malaysian ContextChew Keng Sheng
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyNovoQuad
 
Chris hunter
Chris hunterChris hunter
Chris hunterIPPAI
 
Chris hunter
Chris hunterChris hunter
Chris hunterIPPAI
 
Security Sector- Training Methodology at College Of Security Studies
Security Sector- Training Methodology at College Of Security StudiesSecurity Sector- Training Methodology at College Of Security Studies
Security Sector- Training Methodology at College Of Security StudiesCollege Of Security Studies
 
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...Margolis Healy
 

Similar to [Challenge:Future] Proactive Counter-Terrorism (20)

Protecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big EventsProtecting the Public: Role of Anti-Drone Systems in Big Events
Protecting the Public: Role of Anti-Drone Systems in Big Events
 
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality Industry
 
National Security Emergencies
National Security EmergenciesNational Security Emergencies
National Security Emergencies
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone Technology
 
Breaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone TechnologiesBreaking Down the Applications of Anti-Drone Technologies
Breaking Down the Applications of Anti-Drone Technologies
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docx
 
weapon of mass destruction
weapon of mass destructionweapon of mass destruction
weapon of mass destruction
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
Role of Emergency Physicians During CBRNE Attack - The Malaysian Context
Role of Emergency Physicians During CBRNE Attack - The Malaysian ContextRole of Emergency Physicians During CBRNE Attack - The Malaysian Context
Role of Emergency Physicians During CBRNE Attack - The Malaysian Context
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public Safety
 
Chris hunter
Chris hunterChris hunter
Chris hunter
 
Chris hunter
Chris hunterChris hunter
Chris hunter
 
Security Sector- Training Methodology at College Of Security Studies
Security Sector- Training Methodology at College Of Security StudiesSecurity Sector- Training Methodology at College Of Security Studies
Security Sector- Training Methodology at College Of Security Studies
 
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
CBRNE - An Introduction
CBRNE - An IntroductionCBRNE - An Introduction
CBRNE - An Introduction
 

More from Challenge:Future

[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quittingChallenge:Future
 
[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide JobChallenge:Future
 
[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."Challenge:Future
 
[Challenge:Future] What is life?
[Challenge:Future] What is life?[Challenge:Future] What is life?
[Challenge:Future] What is life?Challenge:Future
 
[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of HappinessChallenge:Future
 
[Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it![Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it!Challenge:Future
 
[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourselfChallenge:Future
 
[Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience![Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience!Challenge:Future
 
[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a signChallenge:Future
 
[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your SoulChallenge:Future
 
[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015Challenge:Future
 
[Challenge:Future] box of choices
[Challenge:Future] box of choices[Challenge:Future] box of choices
[Challenge:Future] box of choicesChallenge:Future
 
[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo LudensChallenge:Future
 
[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders[Challenge:Future] Break the Borders
[Challenge:Future] Break the BordersChallenge:Future
 
[Challenge:Future] Passion
[Challenge:Future] Passion[Challenge:Future] Passion
[Challenge:Future] PassionChallenge:Future
 
[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELFChallenge:Future
 
[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong LearningChallenge:Future
 
[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the ChallangeChallenge:Future
 
[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVEChallenge:Future
 
[Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity [Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity Challenge:Future
 

More from Challenge:Future (20)

[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting
 
[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job
 
[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."
 
[Challenge:Future] What is life?
[Challenge:Future] What is life?[Challenge:Future] What is life?
[Challenge:Future] What is life?
 
[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness
 
[Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it![Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it!
 
[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself
 
[Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience![Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience!
 
[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign
 
[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul
 
[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015
 
[Challenge:Future] box of choices
[Challenge:Future] box of choices[Challenge:Future] box of choices
[Challenge:Future] box of choices
 
[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens
 
[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders
 
[Challenge:Future] Passion
[Challenge:Future] Passion[Challenge:Future] Passion
[Challenge:Future] Passion
 
[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF
 
[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning
 
[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange
 
[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE
 
[Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity [Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity
 

[Challenge:Future] Proactive Counter-Terrorism

  • 1. Proactive Counter-Terrorism in the 21st Century A presentation by Simon Williams University College London, UK Autumn 2011
  • 2. Terrorism: The Threat Today Terrorism: Unlawful use of force or violence against persons or property, to intimidate or coerce a government, its civilian population, or any segment thereof, in furtherance of political or social objectives. (Modified from U.S. FBI)  Countries today are threatened by modern and sophisticated terrorist organizations. Improvements in technology, specifically mobile communication and the internet, allow terrorist organizations to execute larger and more precise operations that surpass the scale of 9/11.  Throughout the past two decades terrorists have been raising funds, independently, and through countries that support their motives or tactics.  Terrorist organizations now have professional training, intelligence resources, state of the art technology, and top notch weapons to carry out their attacks.
  • 3. Possible Modes of Attack Hot-Attacks (IED) Chemical & Biological Armed Attacks & Assassinations Utilizing explosive devices, These types of attacks are usually home-made difficult to detect and Means for this attack are “improvised explosive spread substances that simple and easily devices” affect large areas outside obtainable with little Types: of the original area of training required. Small •Covertly placed bomb exposure. arms, machine guns, rifles, •Body Borne (suicide vest) •Dirty bomb: an hand grenades, etc. •Vehicle Borne explosive device •In the Post containing radioactive Can take numerous forms •Mortar Weapon material such as: •Chemical weapon: •Shooting from vehicle Three distinct chemical substance in the •Brute force entrance components: form of gas, liquid, or •Single/multi-Target Sniper 1. Explosives, e.g., TNT , powder plastic explosives, or •Biological weapon: liquid explosives. spray or powder 2. Detonators, such as fuses and light bulbs. 3. Activating device/power source, timer, pin, cellular phone, beeper, or remote control.
  • 4. Mitigating Threats The fundamental truth about a successful terrorist attack is the element of surprise. A successful terrorist attack catches society completely off-guard. While security forces adopt defenses against common techniques of terrorist organizations, these organizations are already in search of new loopholes that they can exploit. The current system for dealing with terrorist incidents focuses on response, not prevention. It is reactive, but should be proactive. Increased preventative measures need to be employed to thwart terrorist attacks before they occur, such as: 1. Acquisition of Actionable Real-Time Intelligence 2. Improved Counter-Surveillance 3. Stronger Physical Deterrents
  • 5. Intelligence Collection Law Enforcement entities and Intelligence Agencies identify, infiltrate, and exploit known terrorist organizations in order to collect information on their modus operandi and potential targets. With such information they can take the necessary precautions to mitigate the threat, arrest the perpetrators, and destroy the structure of their organization. Military forces are conducting superb intelligence gathering operations in hostile areas around the world. These techniques need to be applied to domestic counter-terror operations, and local law enforcement entities need to learn how to utilize human assets within their jurisdiction to identify and monitor terrorist threats.
  • 6. The Common Denominator Question: What do almost all terrorist attacks have in common? target casing Answer: Pre-operation surveillance and
  • 7. Counter-Surveillance If all terrorist attacks involve surveillance, then the most logical preventative measure would be counter-surveillance. Counter-surveillance, or more precisely “offensive counter- intelligence” refers to measures taken by a party to prevent hostile groups from gathering intelligence against them by employing actions to make the task more difficult. Counter-surveillance is based around two secrets: 1. Hostile surveillance is vulnerable to observation because they are not familiar with the target 2. Hostile surveillance can be manipulated and the operatives forced into making errors that reveal their presence
  • 8. Counter-Surveillance (Cont.) Different assailants will have different attack cycles, however, all potential threats will share the Target Selection and Planning phases. They conduct their surveillance on the target or even employ a team to advise on target movements during an attack. Surveillance looks for possible weakness to develop an attack plan: •If the target is a person, surveillance looks for behaviour patterns, routine, transportation •If the target is a structure, surveillance will look for physical security measures, guard change frequency and times, visibility, escape routes, etc. The more surveillance they conduct, the more likely they will be observed and their operation compromised. Counter-Surveillance techniques that can be employed are:  Using TEDD to identify hostile operatives (Time, Environment, Distance, Demeanor)  Employ „Surveillance Detection Routes‟ to evoke certain behaviours and identify hostiles  Positioning uniformed guards or CCTV to scare off hostile operatives  Changing Force-Protection Conditions (passwords, badges, entry requirements) at random to keep hostiles in the dark
  • 9. Physical Barriers Physical barriers are the last preventative method in thwarting a terrorist attack, but possibly the most important. Should intelligence not gather any information on possible attack plans, counter- surveillance fail to detect target casing, and a terrorist attempts an attack, the physical barriers could prevent catastrophe. Perimeter Access Electronic Detection Security Control and Imaging Maritime Barriers Screening Checkpoint CCTV Security Fencing Bollards Ground Sensors
  • 10. Proactive Counter-Terrorism in the 21st Century  The imminent threat of a terrorist attack is growing, and the frequency and intensity of such attacks are increasing every day. If public and private institutions implement 1. Acquisition of Actionable Real-Time Intelligence 2. Improved Counter-Surveillance 3. Stronger Physical Deterrents they will successfully prevent attacks, apprehend dangerous criminals, and destroy terrorist networks. Through international dialogue and cooperation, this goal can be achieved and a safer world will come into existence.