econintersect.com
       
  

FREE NEWSLETTER: Econintersect sends a nightly newsletter highlighting news events of the day, and providing a summary of new articles posted on the website. Econintersect will not sell or pass your email address to others per our privacy policy. You can cancel this subscription at any time by selecting the unsubscribing link in the footer of each email.



posted on 16 September 2016

Minding The Gaps: The Risks And Rewards Of Information

from STRATFOR

-- this post authored by Scott Stewart

In last week's Security Weekly, I talked about the threat posed by skilled and imaginative terrorists who are capable of conceiving, planning and conducting sophisticated attacks. Countering these novel means and tactics takes an equally creative approach to crafting security measures.

This idea dovetails nicely with a presentation I gave Sept. 14 at an InfraGard conference in Orlando on the dangers and limitations of using information found on the internet. The key point of my talk was that although a lot of data is available online and can be used by those planning an attack, there are also critical pieces of information that cannot be found on any website and can be gleaned only through physical surveillance.

Where these two topics intersect is the terrorist attack cycle. No matter how innovative a terrorist planner is or how sophisticated his tradecraft, he is still bound by the constraints inherent to the attack cycle. Furthermore, though information found on the internet can greatly assist terrorists and reduce the amount of physical surveillance required, gaps between what is available online and what is needed to plan an attack remain. By identifying and monitoring these gaps, security personnel can detect attack preparations in time to stop a plot in its tracks.

The Importance of Information

But before we can discuss how to target and track information gaps, we must first understand how that information relates to the attack cycle as a whole.

Information is essential to the terrorist attack cycle because, in many ways, it enables planners to move from one stage to the next. The phases of the cycle build upon one another as actionable intelligence, which is based on information, accumulates. Intelligence also becomes more focused and specific as the cycle progresses. When identifying potential targets, for example, the information needed may be as general as a list of people. But as the planner narrows down the list, more detailed information is required to determine which target is most vulnerable and the best type of attack to use. Information like where the target lives and works, and what security measures are in place, must be obtained so that planners can determine whether they are capable of launching a successful assault.

Once the target has been chosen, even more specific intelligence is needed to plan the attack. Gathering such information often takes more effort, including surveillance to learn daily routines and pinpoint predictable times and places that the target can be confronted. These opportunities are frequently found in commutes to and from work, recurring appointments or planned events announced on social media. Knowing that the target will be in certain locations at set times, planners will then evaluate these possible attack sites for their merits: Do they offer an attack team the access, cover and concealment required to execute the plot and hide or escape if necessary?

Finding the Missing Pieces

Information is clearly vital to every stage of the attack cycle. Security practitioners (or even targets themselves) who are aware of that can then concentrate on figuring out what information about the buildings or people they are protecting exists on the internet. Data can be culled from websites, social media outlets and paid searches by information aggregators - the results of which can be quite shocking to those who have never used them.

Once this information has been collected, it must be reviewed with an eye toward how it might be used by attack planners to spot and exploit vulnerabilities. How useful a piece of information is might depend on the type of target being protected: The intelligence needed to attack a person is very different from that needed to assault a factory.

After the information has been assembled into a mosaic based on the attack cycle, the next step is to find which pieces of the emerging picture are missing. The bits of information needed to conduct an attack that couldn't be found online represent the things that a would-be assailant must learn by other means - in all likelihood, by surveillance.

Going on the Offensive

Knowledge of these gaps should not simply be filed away for later. Rather, it is an excellent opportunity to take deliberate action by looking for signs of pre-operational surveillance. Security professionals can determine where someone would have to look to find the missing information and then monitor those locations using countersurveillance operatives or electronic surveillance equipment, such as cameras, that can be coupled with a system for flagging and recording activity in sensitive areas. Of course, cameras are not a tool unique to security personnel; hostile parties can use them as well. Earlier this year, Islamic State members in Belgium used hidden cameras to watch a victim and his residence. Security professionals therefore must look for hidden cameras in addition to operatives performing surveillance in key areas around the principal or facility being guarded.

An alternative option is to "heat up" those areas with more security resources, discouraging potential perpetrators from monitoring them in the process. Depending on the resources available, protective details could even use some combination of the two tactics, heating up some areas to force surveillants to observe other locations where they can be more easily detected by security assets stationed there.

Because information gaps must be filled before an attack can be planned, minding them in this manner gives security teams a chance to identify hostile surveillance and disrupt the attack cycle in its early stages. And as every security professional knows, acting proactively to stop an attack is far better than reacting to one that has already happened.

"Minding the Gaps: The Risks and Rewards of Information" is republished with permission of Stratfor.

>>>>> Scroll down to view and make comments <<<<<<

Click here for Historical News Post Listing










Make a Comment

Econintersect wants your comments, data and opinion on the articles posted.  As the internet is a "war zone" of trolls, hackers and spammers - Econintersect must balance its defences against ease of commenting.  We have joined with Livefyre to manage our comment streams.

To comment, using Livefyre just click the "Sign In" button at the top-left corner of the comment box below. You can create a commenting account using your favorite social network such as Twitter, Facebook, Google+, LinkedIn or Open ID - or open a Livefyre account using your email address.



You can also comment using Facebook directly using he comment block below.





Econintersect Contributors


search_box

Print this page or create a PDF file of this page
Print Friendly and PDF


The growing use of ad blocking software is creating a shortfall in covering our fixed expenses. Please consider a donation to Econintersect to allow continuing output of quality and balanced financial and economic news and analysis.


Take a look at what is going on inside of Econintersect.com
Main Home
Analysis Blog
Energy and Falling Productivity
Reinhard Selten: Pioneering Analyst of Rationality and Human Behaviour
News Blog
Aging Populations May Mean Lower Economic Growth
Urban Rebound Causes Large Shift In Lower Credit Borrowers To Seek The Outer Suburbs
Infographic Of The Day: How Oil Is Formed
Early Headlines: Japan Needs Fed Hike, Mexico Tanker Ablaze, 1.5C Limit Within 10 Yrs, Africa's Growth Problems, Did US Destroy Syria Truce?, Merkel: No Help For DB And More
Americans Wary Of Drone Delivery
Britain's Wealthiest Households
What Next In The South China Sea
The Dollar - Gold Relationship
Almost Half Of Rape Cases End Without A Conviction
People With 'Obesity Gene' Can Still Lose Weight
The World's Most Generous Countries In 2016
What We Read Today 24 September 2016
Is The Butterfly Effect Real
Investing Blog
The Week Ahead: How Will Election News Impact The Market?
How To Protect Your Money Against Negative Interest Rates
Opinion Blog
There's No Wall Between The Fed And Banco De Mexico
The Setting Sun: Japan Faces Monetary Exhaustion
Precious Metals Blog
War On Cash Turns To $20, $50, And $100 Bills
Live Markets
23Sep2016 Market Close: US Indexes Close Lower As Crude Prices Slip, Fed Lowers Economic Growth Prospects, Indicators Melting Into Bearish Territory
Amazon Books & More






.... and keep up with economic news using our dynamic economic newspapers with the largest international coverage on the internet
Asia / Pacific
Europe
Middle East / Africa
Americas
USA Government



Crowdfunding ....






























 navigate econintersect.com

Blogs

Analysis Blog
News Blog
Investing Blog
Opinion Blog
Precious Metals Blog
Markets Blog
Video of the Day
Weather

Newspapers

Asia / Pacific
Europe
Middle East / Africa
Americas
USA Government
     

RSS Feeds / Social Media

Combined Econintersect Feed
Google+
Facebook
Twitter
Digg

Free Newsletter

Marketplace - Books & More

Economic Forecast

Content Contribution

Contact

About

  Top Economics Site

Investing.com Contributor TalkMarkets Contributor Finance Blogs Free PageRank Checker Active Search Results Google+

This Web Page by Steven Hansen ---- Copyright 2010 - 2016 Econintersect LLC - all rights reserved