Advertisement
theunpromisedone3

Trapwire Stratfor Email 34

Aug 10th, 2012
275
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.25 KB | None | 0 0
  1. RE: Counterterrorism: Shifting from 'Who' to 'How'
  2.  
  3. Released on 2012-08-09 18:00 GMT
  4. Email-ID 376889
  5. Date 2009-11-05 01:46:25
  6. Appreciate the update Fred. Thanks and all the best. Hope the new book is
  7. working out
  8. for you. Steve
  9.  
  10. Very respectfully,
  11.  
  12. Steve Musgrove
  13.  
  14.  
  15. > Subject: Counterterrorism: Shifting from 'Who' to 'How'
  16. > Date: Wed, 4 Nov 2009 16:57:03 -0600
  17. >
  18. >
  19. >
  20. > COUNTERTERRORISM: SHIFTING FROM 'WHO' TO 'HOW'
  21. >
  22. > By Scott Stewart and Fred Burton
  23. >
  24. > In the 11th edition of the online magazine Sada al-Malahim (The Echo of
  25. > Battle), which was released to jihadist Web sites last week, al Qaeda in
  26. the
  27. > Arabian Peninsula (AQAP) leader Nasir al-Wahayshi wrote an article that
  28. > called for jihadists to conduct simple attacks against a variety of
  29. targets.
  30. > The targets included "any tyrant, intelligence den, prince" or
  31. "minister"
  32. > (referring to the governments in the Muslim world like Egypt, Saudi
  33. Arabia
  34. > and Yemen), and "any crusaders whenever you find one of them, like at
  35. the
  36. > airports of the crusader Western countries that participate in the wars
  37. > against Islam, or their living compounds, trains etc.," (an obvious
  38. > reference to the United States and Europe and Westerners living in
  39. Muslim
  40. > countries).
  41. >
  42. >
  43. > Al-Wahayshi, an ethnic Yemeni who spent time in Afghanistan serving as a
  44. > lieutenant under Osama bin Laden, noted these simple attacks could be
  45. > conducted with readily available weapons such as knives, clubs or small
  46. > improvised explosive devices (IEDs). According to al-Wahayshi, jihadists
  47. > "don't need to conduct a big effort or spend a lot of money to
  48. manufacture
  49. > 10 grams of explosive material" and that they should not "waste a long
  50. time
  51. > finding the materials, because you can find all these in your mother's
  52. > kitchen, or readily at hand or in any city you are in."
  53. >
  54. > That al-Wahayshi gave these instructions in an Internet magazine
  55. distributed
  56. > via jihadist chat rooms, not in some secret meeting with his operational
  57. > staff, demonstrates that they are clearly intended to reach grassroots
  58. > jihadists -- and are not intended as some sort of internal guidance for
  59. AQAP
  60. > members. In fact, al-Wahayshi was encouraging grassroots jihadists to
  61. "do
  62. > what Abu al-Khair did" referring to AQAP member Abdullah Hassan Taleh
  63. > al-Asiri, the Saudi suicide bomber who attempted to kill Saudi Deputy
  64. > Interior Minister Prince Mohammed bin Nayef with a small IED on Aug. 28.
  65. >
  66. > The most concerning aspect of al-Wahayshi's statement is that it is
  67. largely
  68. > true. Improvised explosive mixtures are in fact relatively easy to make
  69. from
  70. > readily available chemicals -- if a person has the proper training --
  71. and
  72. > attacks using small IEDs or other readily attainable weapons such as
  73. knives
  74. > or clubs (or firearms in the United States) are indeed quite simple to
  75. > conduct.
  76. >
  77. > As STRATFOR has noted for several years now, with al Qaeda's structure
  78. under
  79. > continual attack and no regional al Qaeda franchise groups in the
  80. Western
  81. > Hemisphere, the most pressing jihadist threat to the U.S. homeland at
  82. > present stems from grassroots jihadists, not the al Qaeda core. This
  83. trend
  84. > has been borne out by the large number of plots and arrests over the
  85. past
  86. > several years, to include several so far in 2009. The grassroots have
  87. > likewise proven to pose a critical threat to Europe (although it is
  88. > important to note that the threat posed by grassroots operatives is more
  89. > widespread, but normally involves smaller, less strategic attacks than
  90. those
  91. > conducted by the al Qaeda core).
  92. >
  93. > From a counterterrorism perspective, the problem posed by grassroots
  94. > operatives is that unless they somehow self-identify by contacting a
  95. > government informant or another person who reports them to authorities,
  96. > attend a militant training camp, or conduct electronic correspondence
  97. with a
  98. > person or organization under government scrutiny, they are very
  99. difficult to
  100. > detect.
  101. >
  102. > The threat posed by grassroots operatives, and the difficulty
  103. identifying
  104. > them, highlight the need for counterterrorism programs to adopt a
  105. proactive,
  106. > protective intelligence approach to the problem -- an approach that
  107. focuses
  108. > on "the how" of militant attacks instead of just "the who."
  109. >
  110. > The How
  111. >
  112. > In the traditional, reactive approach to counterterrorism, where
  113. authorities
  114. > respond to a crime scene after a terrorist attack to find and arrest the
  115. > militants responsible for the attack, it is customary to focus on the
  116. who,
  117. > or on the individual or group behind the attack. Indeed, in this
  118. approach,
  119. > the only time much emphasis is placed on the how is either in an effort
  120. to
  121. > identify a suspect when an unknown actor carried out the attack, or to
  122. prove
  123. > that a particular suspect was responsible for the attack during a trial.
  124. > Beyond these limited purposes, not much attention is paid to the how.
  125. >
  126. > In large part, this focus on the who is a legacy of the fact that for
  127. many
  128. > years, the primary philosophy of the U.S. government was to treat
  129. > counterterrorism as a law-enforcement program, with a focus on
  130. prosecution
  131. > rather than on disrupting plots.
  132. >
  133. > Certainly, catching and prosecuting those who commit terrorist attacks
  134. is
  135. > necessary, but from our perspective, preventing attacks is more
  136. important,
  137. > and prevention requires a proactive approach. To pursue such a proactive
  138. > approach to counterterrorism, the how becomes a critical question. By
  139. > studying and understanding how attacks are conducted -- i.e., the exact
  140. > steps and actions required for a successful attack -- authorities can
  141. > establish systems to proactively identify early indicators that planning
  142. for
  143. > an attack is under way. People involved in planning the attack can then
  144. be
  145. > focused on, identified, and action can be taken prevent them from
  146. conducting
  147. > the attack or attacks they are plotting. This means that focusing on the
  148. how
  149. > can lead to previously unidentified suspects, e.g., those who do not
  150. > self-identify.
  151. >
  152. > "How was the attack conducted?" is the primary question addressed by
  153. > protective intelligence, which is, at its core, a process for
  154. proactively
  155. > identifying and assessing potential threats. Focusing on the how, then,
  156. > requires protective intelligence practitioners to carefully study the
  157. > tactics, tradecraft and behavior associated with militant actors
  158. involved in
  159. > terrorist attacks. This allows them to search for and identify those
  160. > behaviors before an attack takes place. Many of these behaviors are not
  161. by
  162. > themselves criminal in nature; visiting a public building and observing
  163. > security measures or standing on the street to watch the arrival of a
  164. VIP at
  165. > their office are not illegal, but they can be indicators that an attack
  166. is
  167. > being plotted. Such legal activities ultimately could be overt actions
  168. in
  169. > furtherance of an illegal conspiracy to conduct the attack, but even
  170. where
  171. > conspiracy cannot be proved, steps can still be taken to identify
  172. possible
  173. > assailants and prevent a potential attack -- or at the very least, to
  174. > mitigate the risk posed by the people involved.
  175. >
  176. > Protective intelligence is based on the fact that successful attacks
  177. don't
  178. > just happen out of the blue. Rather, terrorist attacks follow a
  179. discernable
  180. > attack cycle. There are critical points during that cycle where a plot
  181. is
  182. > most likely to be detected by an outside observer. Some of the points
  183. during
  184. > the attack cycle when potential attackers are most vulnerable to
  185. detection
  186. > are while surveillance is being conducted and weapons are being
  187. acquired.
  188. > However, there are other, less obvious points where people on the
  189. lookout
  190. > can spot preparations for an attack.
  191. >
  192. > It is true that sometimes individuals do conduct ill-conceived, poorly
  193. > executed attacks that involve shortcuts in the planning process. But
  194. this
  195. > type of spur-of-the-moment attack is usually associated with mentally
  196. > disturbed individuals and it is extremely rare for a militant actor to
  197. > conduct a spontaneous terrorist attack without first following the steps
  198. of
  199. > the attack cycle.
  200. >
  201. > To really understand the how, protective intelligence practitioners
  202. cannot
  203. > simply acknowledge that something like surveillance occurs. Rather, they
  204. > must turn a powerful lens on steps like preoperational surveillance to
  205. gain
  206. > an in-depth understanding of them. Dissecting an activity like
  207. > preoperational surveillance requires not only examining subjects such as
  208. the
  209. > demeanor demonstrated by those conducting surveillance prior to an
  210. attack
  211. > and the specific methods and cover for action and status used. It also
  212. > requires identifying particular times where surveillance is most likely
  213. and
  214. > certain optimal vantage points (called perches in surveillance jargon)
  215. from
  216. > where a surveillant is most likely to operate when seeking to surveil a
  217. > specific facility or event. This type of complex understanding of
  218. > surveillance can then be used to help focus human or technological
  219. > countersurveillance efforts where they can be most effective.
  220. >
  221. > Unfortunately, many counterterrorism investigators are so focused on the
  222. who
  223. > that they do not focus on collecting this type of granular how
  224. information.
  225. > When we have spoken with law enforcement officers responsible for
  226. > investigating recent grassroots plots, they gave us blank stares in
  227. response
  228. > to questions about how the suspects had conducted surveillance on the
  229. > intended targets. They simply had not paid attention to this type of
  230. detail
  231. > -- but this oversight is not really the investigators' fault. No one had
  232. > ever explained to them why paying attention to, and recording, this type
  233. of
  234. > detail was important. Moreover, it takes specific training and a
  235. practiced
  236. > eye to observe and record these details without glossing over them. For
  237. > example, it is quite useful if a protective intelligence officer has
  238. first
  239. > conducted a lot of surveillance, because conducting surveillance allows
  240. one
  241. > to understand what a surveillant must do and where he must be in order
  242. to
  243. > effectively observe surveillance of a specific person or place.
  244. >
  245. > Similarly, to truly understand the tradecraft required to build an IED
  246. and
  247. > the specific steps a militant needs to complete to do so, it helps to go
  248. to
  249. > an IED school where the investigator learns the tradecraft firsthand.
  250. > Militant actors can and do change over time. New groups, causes and
  251. > ideologies emerge, and specific militants can be killed, captured or
  252. retire.
  253. > But the tactical steps a militant must complete to conduct a successful
  254. > attack are constant. It doesn't matter if the person planning an attack
  255. is a
  256. > radical environmentalist, a grassroots jihadist or a member of the al
  257. Qaeda
  258. > core, for while these diverse actors will exhibit different levels of
  259. > professionalism in regard to terrorist tradecraft, they still must
  260. follow
  261. > essentially the same steps, accomplish the same tasks and operate in the
  262. > same areas. Knowing this allows protective intelligence to guard against
  263. > different levels of threats.
  264. >
  265. > Of course, tactics can be changed and perfected and new tactics can be
  266. > developed (often in response to changes in security and law enforcement
  267. > operations). Additionally, new technologies can emerge (like cell phones
  268. and
  269. > Google Earth) -- which can alter the way some of these activities are
  270. > conducted, or reduce the time it takes to complete them. Studying the
  271. > tradecraft and behaviors needed to execute evolving tactics, however,
  272. allows
  273. > protective intelligence practitioners to respond to such changes and
  274. even
  275. > alter how they operate in order to more effectively search for potential
  276. > hostile activity.
  277. >
  278. > Technology does not only aid those seeking to conduct attacks. There are
  279. a
  280. > variety of new tools, such as Trapwire, a software system designed to
  281. work
  282. > with camera systems to help detect patterns of preoperational
  283. surveillance,
  284. > that can be focused on critical areas to help cut through the fog of
  285. noise
  286. > and activity and draw attention to potential threats. These
  287. technological
  288. > tools can help turn the tables on unknown plotters because they are
  289. designed
  290. > to focus on the how. They will likely never replace human observation
  291. and
  292. > experience, but they can serve as valuable aids to human perception.
  293. >
  294. > Of course, protective intelligence does not have to be the sole
  295. > responsibility of federal authorities specifically charged with
  296. > counterterrorism. Corporate security managers and private security
  297. > contractors should also apply these principles to protecting the people
  298. and
  299. > facilities in their charge, as should local and state police agencies.
  300. In a
  301. > world full of soft targets -- and limited resources to protect those
  302. targets
  303. > from attack -- the more eyes looking for such activity the better. Even
  304. the
  305. > general public has an important role to play in practicing situational
  306. > awareness and spotting potential terrorist activity.
  307. >
  308. > Keeping it Simple?
  309. > Al-Wahayshi is right that it is not difficult to construct improvised
  310. > explosives from a wide range of household chemicals like peroxide and
  311. > acetone or chlorine and brake fluid. He is also correct that some of
  312. those
  313. > explosive mixtures can be concealed in objects ranging from electronic
  314. items
  315. > to picture frames, or can be employed in forms ranging from hand
  316. grenades to
  317. > suicide vests. Likewise, low-level attacks can also be conducted using
  318. > knives, clubs and guns.
  319. >
  320. > Furthermore, when grassroots jihadists plan and carry out attacks acting
  321. as
  322. > lone wolves or in small compartmentalized cells without inadvertently
  323. > betraying their mission by conspiring with people known to the
  324. authorities,
  325. > they are not able to be detected by the who-focused systems, and it
  326. becomes
  327. > far more difficult to discover and thwart these plots. This focus on the
  328. how
  329. > absolutely does not mean that who-centered programs must be abandoned.
  330. > Surveillance on known militants, their associates and communications
  331. should
  332. > continue, efforts to identify people attending militant training camps
  333. or
  334. > fighting in places like Afghanistan or Somalia must be increased, and
  335. people
  336. > who conduct terrorist attacks should be identified and prosecuted.
  337. >
  338. > However -- and this is an important however -- if an unknown militant is
  339. > going to conduct even a simple attack against some of the targets
  340. > al-Wahayshi suggests, such as an airport, train, or specific leader or
  341. media
  342. > personality, complexity creeps into the picture, and the planning cycle
  343. must
  344. > be followed if an attack is going to be successful. The prospective
  345. attacker
  346. > must observe and quantify the target, construct a plan for the attack
  347. and
  348. > then execute that plan. The demands of this process will force even an
  349. > attacker previously unknown to the authorities into a position where he
  350. is
  351. > vulnerable to discovery. If the attacker does this while there are
  352. people
  353. > watching for such activity, he will likely be seen. But if he does this
  354. > while there are no watchers, there is little chance that he will become
  355. a
  356. > who until after the attack has been completed.
  357. >
  358. >
  359. > This report may be forwarded or republished on your website with
  360. attribution
  361. > to www.stratfor.com.
  362. >
  363. > Copyright 2009 Stratfor.
  364. >
  365. >
  366. >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement