Methodologies utilised by terrorist groups are varied and innovative often evolving as situational crime prevention displaces traditionally employed techniques. Explosive devices can be delivered to their targets in vehicles, by post or in person. Car bombs were frequently used by the IRA whereas Islamist groups have often made use of suicide operators in order to deliver the explosive devices to their target more effectively. It could be asserted that the rise in suicide operations from Islamic groups was a somewhat inevitable low-tech response to overwhelming military and economic power by the United States. As the US has adopted a less direct military approach in recent years, the number of suicide attacks has also diminished.
The nature of terrorist groups has also evolved moving from highly organized and secretive paramilitary groups, such as the IRA and the PLO, to ideologies exhorting a wider base of supporters to undertake unsophisticated attacks. Simple attack methodologies such as using a vehicle as a weapon require little in the way of resources or planning compared to smuggling weapons on board a plane to facilitate a hijacking. These groups have effectively utilized the internet to promote their cause and call to supporters to action.
Although terrorist bombings, shootings and kidnapping continue to take place, the threat is ever evolving as crime prevention makes traditional methods more difficult. For example, improved airport security and technology makes it harder to get explosive devices onto planes. The attackers of the World Trade Centers used the plane itself as the weapon and FAA rules at that time allowed them to board the plane carrying knives up to 4 inches in length. Air security rules developed yet again following the 9/11 attacks with far greater screening and restrictions on items that could be carried on to planes.
The rise in technology and the ever-increasing digital connectivity of the modern world does, however, also offer new opportunities to terrorists. Global Navigation Satellite Systems (GNSS) are integral to our daily lives not only in ensuring the global supply lines that underpin our economy but also supporting electricity supplies and our emergency services. GNSS signals can be vulnerable to spoofing and jamming using equipment that is both cheap and can be sourced from outlets as accessible as Amazon. Whilst the most basic GNSS jammers would be of little use to terrorists, it’s not a huge jump up to the level of equipment and expertise that could have significant impact on an organisation or society and, thus, could be seen as a high likelihood risk. Also given current political tensions between Russia and the West, GNSS attacks could be seen as viable grey zone operations both as a way of reducing the positional capabilities of weapons and unmanned arial vehicles as well as affecting critical national industry and the supply of goods.
On behalf of a government agency, we have recently been examining this threat to GNSS systems and the plans in place to mitigate against their disruption. Unlike simple access control measures to a threat, GNSS attacks can take many forms from attacks against the satellite itself down to jamming and spoofing on the ground. This entails a co-ordinated multi-agency response which adds to the difficulty of controlling such attacks and could well make such attacks even more attractive to hostile actors.
Whilst terrorists in the developing world may continue to employ traditional techniques with success, 21st Century terrorism is likely to continue to evolve as technology provides new ways for attacking powerful and advanced nations. The challenge for crisis managers will be to ensure that risk assessments and emergency response frameworks continue to adapt to respond to this.