Crumbs and Tradecraft of Terrorism
One of the distinctive features behind ICESERVE24 Intel analysis is its focus on the methodology of attacks. Of course, identifying those responsible for an attack is important, especially in ensuring that the perpetrators are brought to justice. But at ICESERVE24, we believe that analyzing the way in which an attack is conducted is more important because it can prevent future attacks and protect potential victims. It is likewise important to recognize that even if a terrorist is killed or arrested, other groups and individuals share terrorist tactics. Sometimes this comes from direct interaction. For example, many of the terrorist groups that trained together in South Yemen, Lebanon, Iraq and Libya employed similar tactics. Remember: a tactic's popularity is derived from its effectiveness. We have seen what suicide car bombers and suicide vests have done, now watch what drones can do in its reign of terror.
The method of terrorism goes far beyond target selection and the method of attack. This is especially true of aspiring transnational terrorists. Basic military skills may be helpful in waging terrorist attacks in areas where a militant group has access to men, weapons and targets — as in Libya, Iraq and Egypt. But an entirely different set of skills is required to operate in a hostile environment or at a distance. This set of skills is known as terrorist tradecraft.
Before an attack can be planned, an aspiring terrorist group must be organized, funded and trained. Would-be terrorists in Libya, Yemen, Iraq, or Syria can achieve these skills relatively easily. However, aspiring terrorists in UK, and USA encounter more difficulty.
Therefore, operational security is a critical skill that must be mastered to protect the fledgling organization from infiltration by law enforcement or intelligence agencies. Every person brought into the group decreases the group's operational security. So, the very existence of the group must remain hidden, and every new member must be thoroughly vetted to ensure they are not plants. As the organization matures and becomes involved in actual attacks, operational security will continue to be vitally important to the organization's success and survival.
A key sub-skill to operational security is the ability to procure false identification documents. False identification is required for more than just international travel; these documents are required for domestic travel as well as for commercial transactions, such as buying or renting vehicles, procuring safe-houses and purchasing firearms, explosives and other components of manufactured explosives and improvised explosive devices. False documents are more important for operatives or organizations that want to attack continually than they are for suicide bombers -- provided that authorities do not know the identity of the bomber and provided that the bomber can travel to the operational destination.
Establishing a secure form of communication is also a priority. As a terrorist group grows, communication tradecraft must evolve beyond the verbal communication. Naturally, the more members a group has, and the farther away they are from one another, the more challenging secure communication becomes.
Once a group is securely organized, the members must fund their operations. Indeed, the ability to transfer funds clandestinely is a skill closely related to communication. Funding varies greatly from organization and location. Some terrorist groups obtain funding from the surrounding population. In places where the group is seen as fighting a current government or a dictator, financial support may be willingly given. In other circumstances, the population may give support grudgingly through extortion or informal taxes levied by the terrorist group.
State sponsors are another source of funding, as are wealthy individuals sympathetic to the terrorists' causes. Terrorists also are funded through illegal activity, including large-scale narcotics sales, front companies, scamming banks, selling antiques and artifacts donations, oil and taxation. Kidnapping or better known as ransoms is also an age-old method of funding terrorism.
With organizational structure and funding in place, the terrorist organization can then turn to acquiring the skills necessary to conduct an attack. But to understand the tradecraft skills required to conduct an attack, one must first recognize that attacks do not happen randomly. They are the result of planning that follows a discernable attack cycle.
The specific skills required to conduct an attack can range from constructing an improvised explosive device to marksmanship, to driving a truck or even piloting a drone. Sometimes these skills can be acquired legally by joining a gun club or attending driver or pilot training. In other instances, skills like bombmaking must be learned illicitly, either by trial and error or by attending a terrorist training camp.
Perhaps the most important tradecraft skill in the attack planning cycle is surveillance tradecraft, or the ability to observe a potential target without alerting anyone that the target is being watched. The vulnerabilities noted during surveillance are frequently used in selecting the target. Further surveillance is often used to plan the attack, and then another round of surveillance may be conducted as part of the attack to track the target's progress to the attack site.
Planning the attack is another tradecraft skill, which requires the ability to observe a target, identify a security weakness and then contrive a means to exploit the vulnerability. The best planners devise novel approaches, such as using drones as human-guided cruise missiles, or invent ways to disguise more traditional devices, like improvised explosive devices, in such items as dolls, radios, shoes, underwear, animals, bottles of contact lens solution, brassieres and pregnancy prosthetics.
An attack tradecraft component that has often proved vulnerable during the attack planning cycle is weapons acquisition. In fact, many attacks were disrupted when the plotters attempted to procure firearms or explosives.
Operational security continues to be important during the attack planning phase. Operatives must be able to create believable cover stories to explain their presence and actions in certain locations. This cover ranges from clothing or wearing a maintenance company uniform while conducting a kidnapping or dressing as a military officer to plant an improvised explosive device, or for example renting a farm in order to purchase large quantities of ammonium nitrate fertilizer, a common ingredient in improvised explosive mixtures.
Generally, these tradecraft skills are not concentrated in one member of a terrorist organization. Some people will be proficient at surveillance while some have a knack for making money or procuring weapons. Others may be good at manufacturing improvised explosive mixtures or assembling improvised explosive devices. However, this is true only of groups operating in their native areas.
The problem comes when a group wants to project power and conduct transnational attacks outside its core territory. In such a case, the group must identify a person proficient in a number of these tradecraft skills who can conduct an operation alone or with the assistance of a small group. This person must also be able to travel to the targeted country — a requirement that has caused groups like al Qaeda and ISIS to attempt transnational strikes from afar and conduct them.
Many groups simply cannot plan and execute complex transnational attacks like the 9/11 plot and the Paris attacks. However, this does not mean they are not threats. Operating in their home territory, they are very capable of causing carnage.
In short, at ICESERVE24, we look a fill a critical gap in risk assessment; we look at shortcomings emanating from populations and manifests as protests, strikes, litigation, sabotage, sudden policy shifts, petty crimes, organized criminal activities, and terrorism. ICESERVE24 analysis provides a more nuanced understanding of geopolitical risk, improves existing security protocols, creates an additional security layer, and safeguards against reputational risk and provide duty of care to your people