In this Stratfor article Scott Stewart points out that to successfully avoid terrorist attacks they must be disrupted during their planning cycle. For that reason it is important to understand the various phases of the attack cycle: selecting a target, conducting surveillance of it, planning the attack, selecting and training personnel to conduct the attack, conducting dry-runs and so forth.
Each of these phases can leave tell-tales, so it obviously behooves security forces to look for behavior that might warn of an attack in planning. In future articles he will discuss these tell-tales in more detail. I've excerpted the beginning of the article below, with a link to the full article after the excerpt.
For the article's Hot Stratfor Babe the comedy/action movie True Lies came to mind. In that film the female terrorist, Juno Skinner, was played by Tia Carrere and so she is the natural choice to get the Hot Stratfor Babe honor for this article.
Ms Carrere is far from being an A-list actress, but she has had an extremely busy career none the less. She's starred in a couple of TV series, as well as guest starring in many other TV shows and also regularly working in movies.
As with many Hot Stratfor Babes she has also tried her hand at singing. Unlike most other Hot Stratfor Babes, who's singing careers are generally complete flops, she's won a couple of Grammy awards. However, those awards are in the "Best Hawaiian Music Album" category. No offense to Hawaiian musicians intended, but I'm guessing that's probably a pretty small field and might even be easier to win than the "Best Polka Band in Milwaukee" category.
In fact, and I'm sure you'll agree with me, winning a Hot Stratfor Babe award surely easily tops winning those stupid Grammy awards in terms of prestige.
Detection Points in the Terrorist Attack Cycle
By Scott Stewart, March 1, 2012
Last week's Security Weekly discussed the fact that terrorism is a tactic used by many different classes of actors and that, while the perpetrators and tactics of terrorism may change in response to shifts in larger geopolitical cycles, these changes will never result in the end of terrorism. Since that analysis was written, there have been jihadist-related attacks in Afghanistan, Nigeria, Yemen and Pakistan, an assassination attempt against the president of Abkhazia, and a failed timed-incendiary attack against the Athens subway. (The latter incident, which militant anarchists claimed, reinforces that jihadists are not the only ones who practice terrorism.)
But while terrorism is a continuing concern, it can be understood, and measures can be taken to thwart terrorist plots and mitigate the effects of attacks. Perhaps the most important and fundamental point to understand about terrorism is that attacks do not appear out of nowhere. Individuals planning a terrorist attack follow a discernable cycle -- and that cycle and the behaviors associated with it can be observed if they are being looked for. We refer to these points where terrorism-related behavior can be most readily observed as vulnerabilities in the terrorist attack cycle.
The Attack Cycle
Many different actors can commit terrorist attacks, including sophisticated transnational terrorist groups like al Qaeda; regional militant groups like India's Maoist Naxalites; small, independent cells like the anarchists in Greece; and lone wolves like Oslo attacker Anders Breivik. There can be great variance in attack motives and in the time and process required to radicalize these different actors to the point that they decide to conduct a terrorist attack. But once any of these actors decides to launch an attack, there is remarkable similarity in the planning process.
First, there is the process of selecting or identifying a target. Often an actor will come up with a list of potential targets and then select one to focus on. In some cases, the actor has preselected a method of attack, such as a vehicle-borne improvised explosive device, and wants to find a target that would be vulnerable to that specific type of attack. In other cases, the actor will pick a target and then devise a method of attack based on that target's characteristics and vulnerabilities. Simply put, the execution of these steps can be somewhat fluid; some degree of planning or preparation can come before target selection, and sometimes target selection will be altered during the planning process. The time required to execute these steps can also vary considerably. Some attacks can be planned and executed within hours or days, while more complex plans, such as those used in the 9/11 or Mumbai attacks, may take months or even years to complete.
Frequently, those planning an attack will conduct detailed surveillance of potential targets to determine what security measures are in place around the target and to gauge whether they have the ability to successfully attack it. If the target is too difficult to attack -- commonly known as a hard target -- the attack planners will typically move on to their next target, which may prove easier to attack. (When they do continue with attacks against targets whose security measures exceed the attackers' capabilities, those attacks fail.) We refer to this stage as preoperational surveillance, which means surveillance that is conducted before the operation is fully planned.
After the target has been selected, a second round of surveillance is conducted. This round will be far more detailed and is intended to provide all the details necessary for planning the attack. For example, if the attack is being planned against a static facility, this round of surveillance will generally try to obtain a detailed description of the target's physical security features and security force procedures. It will also focus on establishing a baseline understanding of the activity that can be expected around the facility at the time of day the attack is anticipated.
Read the rest of Detection Points in the Terrorist Attack Cycle at Stratfor.
The Clinton context
33 minutes ago