1. Proactive Counter-Terrorism
in the 21st Century
A presentation by Simon Williams
University College London, UK
Autumn 2011
2. Terrorism: The Threat Today
Terrorism: Unlawful use of force or violence against
persons or property, to intimidate or coerce a
government, its civilian population, or any segment
thereof, in furtherance of political or social
objectives. (Modified from U.S. FBI)
Countries today are threatened by modern and
sophisticated terrorist organizations. Improvements in
technology, specifically mobile communication and the
internet, allow terrorist organizations to execute larger and
more precise operations that surpass the scale of 9/11.
Throughout the past two decades terrorists have been
raising funds, independently, and through countries that
support their motives or tactics.
Terrorist organizations now have professional training,
intelligence resources, state of the art technology, and top
notch weapons to carry out their attacks.
3. Possible Modes of Attack
Hot-Attacks (IED) Chemical & Biological Armed Attacks &
Assassinations
Utilizing explosive devices, These types of attacks are
usually home-made difficult to detect and Means for this attack are
“improvised explosive spread substances that simple and easily
devices” affect large areas outside obtainable with little
Types: of the original area of training required. Small
•Covertly placed bomb exposure. arms, machine guns, rifles,
•Body Borne (suicide vest) •Dirty bomb: an hand grenades, etc.
•Vehicle Borne explosive device
•In the Post containing radioactive Can take numerous forms
•Mortar Weapon material such as:
•Chemical weapon: •Shooting from vehicle
Three distinct chemical substance in the •Brute force entrance
components: form of gas, liquid, or •Single/multi-Target Sniper
1. Explosives, e.g., TNT , powder
plastic explosives, or •Biological weapon:
liquid explosives. spray or powder
2. Detonators, such as
fuses and light bulbs.
3. Activating device/power
source, timer, pin,
cellular phone, beeper, or
remote control.
4. Mitigating Threats
The fundamental truth about a successful terrorist attack is the
element of surprise. A successful terrorist attack catches society
completely off-guard. While security forces adopt defenses
against common techniques of terrorist organizations, these
organizations are already in search of new loopholes that they can
exploit.
The current system for dealing with terrorist incidents focuses on
response, not prevention. It is reactive, but should be proactive.
Increased preventative measures need to be employed to thwart
terrorist attacks before they occur, such as:
1. Acquisition of Actionable Real-Time Intelligence
2. Improved Counter-Surveillance
3. Stronger Physical Deterrents
5. Intelligence Collection
Law Enforcement entities and Intelligence Agencies identify,
infiltrate, and exploit known terrorist organizations in order to
collect information on their modus operandi and potential
targets.
With such information they can take the necessary
precautions to mitigate the threat, arrest the perpetrators,
and destroy the structure of their organization.
Military forces are conducting superb intelligence gathering
operations in hostile areas around the world. These
techniques need to be applied to domestic counter-terror
operations, and local law enforcement entities need to
learn how to utilize human assets within their jurisdiction
to identify and monitor terrorist threats.
6. The Common Denominator
Question: What do almost all terrorist
attacks have in common?
target casing
Answer: Pre-operation surveillance and
7. Counter-Surveillance
If all terrorist attacks involve surveillance,
then the most logical preventative measure
would be counter-surveillance.
Counter-surveillance, or more precisely “offensive counter-
intelligence” refers to measures taken by a party to prevent
hostile groups from gathering intelligence against them by
employing actions to make the task more difficult.
Counter-surveillance is based around two secrets:
1. Hostile surveillance is vulnerable to observation because they are
not familiar with the target
2. Hostile surveillance can be manipulated and the operatives forced
into making errors that reveal their presence
8. Counter-Surveillance (Cont.)
Different assailants will have different attack cycles, however, all potential threats
will share the Target Selection and Planning phases. They conduct their surveillance
on the target or even employ a team to advise on target movements during an
attack.
Surveillance looks for possible weakness to develop an attack plan:
•If the target is a person, surveillance looks for behaviour patterns, routine,
transportation
•If the target is a structure, surveillance will look for physical security
measures, guard change frequency and times, visibility, escape routes, etc.
The more surveillance they conduct, the
more likely they will be observed and their
operation compromised.
Counter-Surveillance techniques that can be employed are:
Using TEDD to identify hostile operatives (Time, Environment, Distance, Demeanor)
Employ „Surveillance Detection Routes‟ to evoke certain behaviours and identify hostiles
Positioning uniformed guards or CCTV to scare off hostile operatives
Changing Force-Protection Conditions (passwords, badges, entry requirements) at random to keep hostiles in the dark
9. Physical Barriers
Physical barriers are the last preventative method in thwarting a terrorist attack, but
possibly the most important.
Should intelligence not gather any information on possible attack plans, counter-
surveillance fail to detect target casing, and a terrorist attempts an attack, the
physical barriers could prevent catastrophe.
Perimeter Access Electronic Detection
Security Control and Imaging
Maritime Barriers
Screening Checkpoint CCTV
Security Fencing Bollards
Ground Sensors
10. Proactive Counter-Terrorism in the
21st Century
The imminent threat of a terrorist attack is growing, and the
frequency and intensity of such attacks are increasing every day.
If public and private institutions implement
1. Acquisition of Actionable Real-Time Intelligence
2. Improved Counter-Surveillance
3. Stronger Physical Deterrents
they will successfully prevent attacks, apprehend dangerous
criminals, and destroy terrorist networks. Through international
dialogue and cooperation, this goal can be achieved and a safer
world will come into existence.