WASHINGTON 鈥斅燗rmed security personnel, high walls, long standoff distances and access controls are no longer good enough to secure facilities from terror attacks, security experts say.
Those facilities are called 鈥渉ard targets鈥 by most Western security standards.聽However, Mike Maness, director of TrapWire, a global threat detection firm, said: 鈥淲e do not believe our adversaries share the same view.鈥
The Western view of what constitutes a hard target for terrorists to attack may no longer be effective, not because modern security protocols don鈥檛 work, but because modern terrorists work differently.
The fundamental difference is that terrorists no longer view physical barriers as 鈥渉ard targets.鈥
鈥淕uns, guards and gates don鈥檛 constitute a hard target for terrorists today,” said Maness. “Their inability to gather valuable pre-attack intelligence about the facility to launch an attack is what makes it hard.鈥
However, 鈥渙nce a terror organization decides a target is worth attacking, they will surveil and collect intelligence for as long as it takes to devise a plan that circumvents existing security systems and/or procedures,鈥 said Maness, a former CIA officer who鈥檚 conducted covert operations against terrorists for 20 years.
Our operations teams have conducted similar surveillance operations against hundreds of critical infrastructure sites across the US, many of which were deemed 鈥渉ard targets.鈥 At nearly every site they discovered, through basic surveillance techniques, security vulnerabilities that could be exploited to launch a successful attack.
Since 2012, the direct connection between radicalized individuals in the West and hard-core terrorists in Syria and Iraq has made less-secure targets a great concern to U.S. law enforcement.
But recent intelligence gathered from the attacks in Paris, San Bernardino and Belgium have highlighted a new reality:聽Hard or soft 鈥- a target is a target to today鈥檚 terrorists, especially in D.C.
鈥淭he FBI takes all threats seriously,鈥 said Supervisory Special Agent Craig Moringiello, spokesman for the Washington Field Office of the FBI. 鈥淲e cover every tip and every lead immediately, regardless of whether the suspected target is considered a soft one or a hard one.聽 We will continue to investigate anyone who may seek to cause harm against Americans.鈥
“The terrorism threat is evolving,” Moringiello added. “ISIL is very effective in using social media to radicalize others and spread their message of violence. We鈥檙e very concerned about individuals who are radicalized online and are inspired to commit acts of violence here in the United States.鈥
The threat from terrorists, even to 鈥渉ard targets,鈥 appears to have been exponentially increased by evolving technology that alleviates the need to conduct physical surveillance.
鈥淚SIS and al-Qaida have got fantastic capacity to get this kind of information now with the flourishing forms of communications 鈥 with smartphones and the information that鈥檚 available online,鈥 said Robin Simcox, Margaret Thatcher Fellow at the Heritage Foundation, in D.C.
Remote surveillance is not new among professional terror groups and not just limited to them.聽 New technology has boosted the ability of amateur jihadists to also conduct what鈥檚 called 鈥渉ostile鈥 surveillance.
In January, a plot was disrupted in the United Kingdom after police discovered four men utilizing remote reconnaissance to聽plot a bloody attack on the streets.
鈥淚SIS-inspired supporters had been carrying out online reconnaissance on London police officers and London military barracks,鈥 said Simcox, 鈥淭hose are two places considered to be ‘hard targets.’鈥
Nyall Hamlett, 25; Nathan Cuffy, 26; Tarik Hassane, 22; and Suhaib Majeed, 21, were all sentenced to life in prison after being convicted of attempting to carry out a series of 鈥渄rive-by鈥 terrorist shootings.
British prosecutors in the process of planning the attacks, Hassane used Google Street View on his iPad to surveil the Shepherd鈥檚 Bush police station and the Parachute Regiment Territorial Army barracks at White City.
The four had been radicalized by the Islamic State of Iraq and the Levant (ISIL), primarily by extremist speeches and excerpts from ISIL propaganda found on their mobile phones, authorities said.
That specific remote surveillance capability, and the fact that top ISIL leaders can communicate directly and secretly with operatives, worry聽officials in the U.S.
On Thursday, the U.S. Department of Justice brought forward a case highlighting this very concern.
David Daoud Wright, 26, of Everett, Massachusetts; and Nicholas Alexander Rovinski, 25, of Warwick, Rhode Island, were charged in a superseding indictment with conspiracy to commit acts of terrorism transcending national boundaries.
They are charged with 鈥渃onspiring with each other, known and unknown conspirators,鈥 according to court documents.
Not only were the two allegedly planning to behead Americans on behalf of ISIL through their 鈥淢artyrdom Operations Cell,鈥 but one member, who was killed by police earlier, had been 鈥渃ommunicating with ISIL members overseas, including Junaid Hussain.鈥
Hussain, ISIL鈥檚 chief of social media outreach, was killed Aug. 24, 2015, in a U.S. airstrike in Raqqah, Syria.
Since the Paris attacks, 鈥渃afes, rock concerts, bars, like those attacked in Paris, are increasingly targeted because they are very hard to defend. There isn鈥檛 any security in place,鈥 said Simcox.
TrapWire鈥檚 blog suggests a range of things that can be done to improve security at those locations:
Train your employees to spot and report suspicious activities. Encourage them to engage suspicious strangers in conversation to determine why they are at your site. If you have CCTV cameras, ensure that they can provide coverage of your surroundings, pointed out toward the perimeter where surveillants operate, rather than straight down at an entrance.
