Category — Public Safety
(Reprinted with Permission – STRATFOR)
In the early hours of July 20, a gunman entered a packed movie theater in Aurora, Colo., and opened fire on the audience that had gathered to watch the premiere of the new Batman movie, The Dark Knight Rises. The gunman killed 12 people and injured 58 others. Though police are looking for potential accomplices, the attack appears to have been conducted by James Holmes, a lone gunman who, according to some police reports, may have had a delusional fixation on the Joker, a violent villain from an earlier Batman movie.
On July 18, just two days before the Colorado attack, a man reportedly disguised in a wig and posing as an American tourist in the Black Sea resort town of Burgas, Bulgaria, detonated an improvised explosive device hidden in his backpack as a group of Israeli tourists boarded a bus bound for their hotel. The blast killed five Israelis and the Bulgarian bus driver and wounded dozens more. It is unclear if the incident was an intentional suicide attack; the device could have detonated prematurely as the man placed it on the bus. In any case, the tourists clearly were the intended targets.
The Burgas attacker has not yet been identified. Based on his profile, there is some speculation that he could have been a grassroots jihadist. However, it is also possible that he was acting on behalf of Iran and that this attack was merely the latest installment in the ongoing covert war between Iran and Israel.
While these two attacks occurred on different continents and were committed by people with different motivations and objectives, they nonetheless have one thing in common: They were directed against what are referred to in security parlance as “soft” targets, or targets that do not have much security. Soft targets are much easier to attack than hard targets, which deter attacks by maintaining a comparatively strong security presence.
Evolution of Targets and Tactics
In the 1960s, the beginning of the modern terrorism era, there were few hard targets. In the 1970s, the American radical leftist Weather Underground Organization was able to conduct successful bombing attacks against the U.S. Capitol, the Pentagon and the State Department buildings — the very heart of the U.S. government. At the same time commercial airliners were easy targets for political dissidents, terrorists and criminal hijackers.
Nongovernmental organizations were also seen as soft targets. The Black September Organization conducted an operation targeting Israeli athletes at the 1972 Olympic Games, and Ilich Ramirez Sanchez, known as Carlos the Jackal, and his compatriots seized the OPEC headquarters in Vienna in December 1975.
Embassies did not fare much better. During the 1970s, militant groups seized control of embassies in several cities, including Stockholm, The Hague, Khartoum and Kuala Lumpur. The 1970s concluded with the seizure of the U.S. Embassy in Tehran and the storming and destruction of the U.S. Embassy in Islamabad. The 1980s saw major attacks against U.S. diplomatic posts in Beirut (twice) and Kuwait.
Just as the Weather Underground Organization attacks prompted security improvements at the U.S. government buildings they had targeted, the attacks against U.S. and other embassies prompted increased security at their diplomatic missions. However, this turned into a long process. The cost of providing security for diplomatic posts strained already meager foreign affairs budgets. For most countries, including the United States, security was not increased at all diplomatic missions. Rather, security was improved in accordance with a threat matrix that assessed the risk levels at various missions. Those deemed more at risk received funding before those deemed less at risk.
In some cases, this approach has worked well for the United States. For example, despite the persistent jihadist threat in Yemen, the new embassy compound in Sanaa, which was completed in the early 1990s and constructed to the strict security specifications laid out by the Inman Commission in 1985, has proved to be a very difficult target to attack. However, as embassies became more difficult to attack, militants turned to easier targets. Often this has involved targeting diplomats outside the secure embassy compound, as was the case in the 2002 assassination of U.S. diplomat Laurence Foley in Amman, Jordan, and the April 2010 failed suicide bombing attack against the motorcade carrying the British ambassador to Yemen.
Transnational groups also changed regions to find softer embassy targets. This shift was evident in August 1998, when al Qaeda attacked U.S. embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania. Similarly, during the 1991 Gulf War, Iraqi agents attempted to conduct terrorist attacks against U.S. diplomatic facilities in Manila, Jakarta, Bangkok and Beijing — far from the Middle East. The February 2012 attack against an Israeli Embassy employee in New Delhi is an example of both changing the region and targeting an employee away from the security of the embassy.
There was a similar trend with airliners, which initially were very vulnerable to attack. After many high-profile hijackings, such as that of TWA Flight 847, airliner security, particularly in the West, was increased. But as security was increased in one place, hijackers began to shift operations to places where security was less robust, such as Bangkok or Karachi. And as security was improved globally and hijackings became more difficult in the 1980s, attackers shifted their tactics and began using improvised explosive devices against airliners.
In response to security measures implemented after bombing attacks in the 1980s, attackers underwent yet another paradigm shift. In December 1994, Philippine Airlines Flight 434 was attacked with an improvised explosive device that had been carried onto the aircraft in separate components, assembled in the plane’s restroom and left on board when the attacker left at an intermediate stop on a multiple city flight. This attack was a dry run for a plan against multiple airlines called Operation Bojinka. The operational mastermind of Bojinka, Khalid Sheikh Mohammed, would later plan the 9/11 attacks on the United States.
When security measures were put in place to protect against Bojinka-style attacks in the 1990s, jihadists adapted again and conducted the 9/11 attacks using a different method of attack. When security measures were put in place to counter 9/11-style attacks, jihadists quickly responded by shifting to onboard suicide attacks with concealed improvised explosive devices inside shoes. When that tactic was discovered and shoes began to be screened, jihadists changed to camouflaged containers filled with liquid explosives. Security measures were adjusted to restrict the quantity of liquids that people could take aboard aircraft, and jihadists altered the paradigm once more and attempted underwear bombing using a device with no metal components. When security measures were taken to increase passenger screening in response to the underwear bombing, al Qaeda in the Arabian Peninsula decided to attack cargo aircraft with improvised explosive devices hidden in printer cartridges. Currently, there is a concern that the next evolutionary step will be to hide non-metallic improvised explosive devices in body cavities or to surgically implant them in suicide bombers.
While some jihadists have remained fixated on hardened airline targets, other attackers — especially grassroot and lone wolf attackers who do not possess the ability to attack hardened targets — have sought other, softer airline targets to attack. After Israeli airline El Al beefed up security on its airliners in the 1980s, the Abu Nidal Organization compensated by attacking crowds of El Al customers at ticket counters outside of airport security in Rome and Vienna in 1985. Then in November 2002, jihadists attempted to attack an Israeli airliner in Mombasa, Kenya, with SA-7 surface-to-air missiles. More recently, a dual suicide bombing in the arrival lounge of Moscow’s Domodedovo Airport in January 2011 killed 35 and injured more than 160, proving that areas outside an airport’s security measures are vulnerable to attack. Further illustrating this vulnerability was an attack at an airport in Frankfurt, Germany, in March 2011. In that attack, a jihadist killed two U.S. airmen and wounded two others at the airport’s bus departure area.
As embassies and other government installations have become more difficult to attack, we have noted a discernable trend toward the targeting of hotels, which are similarly symbolic of Western influence and are often described in jihadist literature as spy dens and brothels. In many cities of the developing world, major hotels are frequented by foreign tourists, journalists, visiting officials and military officers, and local government and business leaders. In addition, high-profile restaurants have been attacked in places such as Bali, Indonesia, Mumbai, India, and Marrakech, Morocco. There have also been attacks on theaters in Moscow and Mogadishu, on schools in Beslan, Russia, and Toulouse, France, and on marketplaces all over the world.
As long as there are groups or individuals bent on conducting attacks — whatever their motivation — they will be able to find vulnerable soft targets to attack. It is impossible to protect every potential target. In fact, it is often said that when you try to protect everything, you end up protecting nothing. Not even the vast manpower of the Chinese government or the advanced security technology employed by the U.S. government can cover every potential target.
While attacks against soft targets are an unfortunate prospect in the contemporary world — if not throughout all human history — people are not helpless in defending against them. Terrorism is a continuing concern, but it is one that can be understood. Once understood, measures can be taken to thwart terrorist plots and mitigate the effects of attacks.
Perhaps the most important and fundamental point to understand about terrorism is that attacks do not appear out of nowhere. Individuals planning a terrorist attack follow a discernible cycle, and that cycle and the behaviors associated with it can be detected. The places where terrorism-related behavior can be most readily observed are referred to as vulnerabilities in the terrorist attack cycle.
As the attacks in Aurora and Burgas are investigated, authorities very likely will uncover behaviors in the perpetrators that could have prevented the attacks if they were properly investigated. Every attacker — even a lone wolf assailant — leaves evidence of a pending attack. This fact was brought up by the recent release of a report by the William H. Webster Commission into the investigation of 2009 Ft. Hood shooter Nidal Hasan. The report highlighted the mistakes made in the investigation of Hasan, who was brought to the FBI’s attention prior to the attack.
But since it is impossible for any government to prevent all attacks, people have to assume responsibility for their own security. This means citizens need to report possible planning activity when it is spotted. Such reporting helped avert an attack in July 2011 against a restaurant outside of Ft. Hood, Texas.
The threat against soft targets necessitates practicing common sense security measures. It also involves practicing an appropriate degree of situational awareness of the environment a person is in, as well as establishing appropriate contingency plans for families and businesses.
FACTA NON VERBA
July 31, 2012 No Comments
This past week saw charring wildfires consume thousands of acres and hundreds of homes outside of Ft. Collins and Colorado Springs Colorado forcing the evacuations of tens of thousands of families. Thursday however saw the development of a rare weather phenomena just south of the Chicago area that formed a destructive line of vicious deadly storms that raced across the Midwest to the Atlantic Ocean sometimes at speeds of 80 miles per hour. Derecho…
On Friday, here in the mid-Atlantic region, daytime temperatures were over 100 degrees with high humidity with little relief at night. Friday evening saw the skies turn to a wicked boiling caldron of foreboding clouds. The skies roiled with dark hues of gray, oranges and black making one think of movie special effects, but this was no movie. Lightning bolts angrily scratched across the sky only to strike the ground in an awesome display of nature’s fury. Lights flickered several times and then there were none. No streetlights, no traffic signals. Just headlights from cars driven by startled motorists – many trying to get to the safety of home. But some found no safety at home…
High, hot winds ripped trees from the ground and toppled power lines with hurricane strength. The drive home was surreal with debris swirling everywhere. On two occasions we narrowly missed tree’s falling across the road. As millions of homes were relentlessly plunged into darkness the derecho pummeled communities with storm bands that cut a swath of destruction across three Mid-Atlantic States.
Maryland, District of Columbia and Virginia have declared states of emergency as down trees and power lines lay strewn seemingly everywhere. There is no electricity for millions of area residents, hundreds of grocery stores or gas stations. With no air conditioning, refrigeration and, in many areas, no telephone there is an air of “concern”. In addition to Internet being mostly inaccessible, VOIP users also lost use of their voice telephones. Elderly residents and those with disabilities living alone are particularly vulnerable at this time. Power companies are scrambling to repair damage typically associated with a hurricane making landfall and expect that repairs make take up to a week and perhaps longer. The buzz from local county officials is that emergency plans have fallen well short of the current crisis. Local agencies are scrambling to locate facilities to stage large-scale water distribution – that is once they have secured the actual supply of water of course. How much worse can it get?
We are among the fortunate. We opted to be prepared and not paranoid about emergency preparedness. Our All Hazards NOAA Weather Radio did not fail us! Storm tracking and local news gave us a good view of what was going on before we ventured outside of our “safehaven” Saturday morning. After clearing fallen trees from our driveway and road with recently maintained chain saws and fresh two-cycle oil and gas, we were able to get mobile. Debris was everywhere and we had to be watchful for downed power lines.
A quick recon of our neighbors found them to be a bit scared but ok. A couple neighbors have portable generators that are running small air conditioning units, fans and refrigerators. The generators are outside and power cords snake their way thru windows and doors slightly ajar. Water for personal sanitation seems to be the big issue at present, but fuel is key now. It’s hard to safely keep any quantity of gas at hand for emergencies safely. A number of local gas stations did not have power so their pumps were down. Long lines at gas stations that do have power; though, this is to be expected. We’ve heard reports of communities that have water supply issues as their water purification and pump stations are without power. We have a well and are thankful. We planned for power outages with a backup generator and underground LP storage and think we’ll be good to go for several days until we can arrange for a re-supply of LP.
We are now two days into the aftermath of the derecho, temperatures remain cozily close to if not over 100 degrees. Still no power and over breakfast we’ve just been alerted to NOAA storm watch #442 more storms are possible, the heat index is 100 to 107 and conditions are changing and not for the better… The pets have been brought in to protect them from the sweltering heat. In many communities people are not doing well… As local county officials and relief agencies to whom so many are desperately turning for resources and assistance struggle with the mere logistics of delivering critically needed water and stumble in shock at the shortfall of their emergency plans, we pray for relief from the heat… We are now at event +3 days…
Derecho. Not a screenplay, just reality….
Facta non Verba
July 2, 2012 1 Comment
Building Evacuation Technology Takes a Step Forward: iEvac® Smoke/Fire Hood Receives NIOSH Approval!
We have to commend Ira Gurvitch President of Elmridge Protection for his determination to manufacture the best smoke/fire escape hood in the world. Although the iEvac product has been on the market since 2009 and certified well beyond ANSI 110 testing standards, the approval process with NIOSH took more time. We’ve briefed and demonstrated the iEvac smoke and fire escape hood to many federal agencies and private sector organizations and NIOSH approvals were high on their list despite outstanding performance in the demanding ANSI 110 trials.
The following photos were taken during a live demonstration & workshop for iEvac at our local Albemarle County Fire Department’s Burn House.
Considering the iEvac is an advanced emergency preparedness product that is specifically engineered to help you safely evacuate a smoke compromised building, we thought it worthwhile to revisit a prior blog post published on that very subject. Enjoy!
Escape and Evacuation:
Emergency Egress from High Rise Buildings, Factories and Industrial Facilities
Whether you work in a modern skyscraper office building or live in a residential high-rise condominium apartment, you have to plan how you will safely evacuate and egress to safety in the event of an explosion or fire emergency. If you travel internationally for work, we’re confident your company’s risk management department has cautioned you against occupying a hotel room higher than floors which can typically be reached by local fire department ladder trucks.
Building fires with dense toxic smoke are not specific to high-rise structures and, in fact, can occur in any building, factory or industrial complex. A practiced building evacuation plan with posted escape routes, trained personnel and fire drills is the logical place to start. Imagine the reality of you and your co-workers traversing debris strewn floors, collapsed ceiling grids, smoke-filled darkened stairwells, and passing intensely hot areas consumed by fire as you make your escape from the building. Where are you meeting others from your office? Is everyone accounted for and has anyone been injured? Did everyone make it out? Where’s Bob? I thought he was with you?
The most likely potential danger faced by a workforce, whether as a result of industrial accident, terrorist activity or from other causes, would be fire and the highly toxic smoke and gases it generates. The next step is choosing the most appropriate and effective means of protecting people and this means finding a way to assist them in safely evacuating a building engulfed with smoke and fire. A number of safety devices have been engineered to address the issue of high-rise building evacuation.
Another element of the ICE PACK™ brand are Escape & Evacuation systems that provide persons potentially trapped by smoke and fire, with a safe and protective means to egress the building. There is no doubt that toxic smoke and fire are deadly combinations especially inside a darkened building. Being prepared and equipped to egress through and out of a building fire takes courage, determination and technology at a very personal level.
The ICE PACK™ Building Evac-Pack is a lightweight gym bag sized package that easily fits under your office desk. It is designed to provide the user with basic to advanced levels of protection, and in the most dire of circumstances, approximately 15 to 30 minutes of respiratory protection from smoke, carbon monoxide, toxic gases and radiant heat. The Building Evac-Pack’s cornerstone of protection is the advanced technology iEvac Smoke/Fire Hood. The Evac-Pack also includes eye, hand and body protection, emergency lighting and signaling equipment.
Time, tools and tenacity are what you need to escape safely!
Facta non Verba
May 18, 2012 No Comments