{"id":11817,"date":"2016-02-10T12:18:52","date_gmt":"2016-02-10T18:18:52","guid":{"rendered":"http:\/\/hcstx.org\/?p=11817"},"modified":"2016-02-10T12:18:52","modified_gmt":"2016-02-10T18:18:52","slug":"crusader-corner-the-inside-terror-threat","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/02\/10\/crusader-corner-the-inside-terror-threat\/","title":{"rendered":"Crusader Corner: The Inside Terror Threat"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-11818\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/02\/cctv.jpg\" alt=\"CCTV\" width=\"615\" height=\"410\" \/><\/p>\n<p><strong>Bottom Line Up Front:<\/strong><\/p>\n<p class=\"p1\"><span class=\"s1\">\u2022\u00a0The February 2, 2016 suicide bombing onboard a Daallo Airlines flight from Mogadishu to Djibouti appears to have been an inside job<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u2022 An employee is also suspected to be responsible for the October 31, 2015 bombing of a Russian MetroJet flight from Sharm al-Sheikh, Egypt to St. Petersburg<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u2022 The\u00a0threat of extremist insider plots is not just confined to the aviation industry or to unstable countries; the global spread of support for groups like the Islamic State means the threat of insider attacks spans across the world<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u2022\u00a0Better background checks and more comprehensive security procedures are important, but preventing a cleared employee from carrying out a terrorist attack is a considerable challenge.<\/span><\/p>\n<p><span class=\"s1\"><b>One of the main concerns about the dispersed nature<\/b> of support for groups like\u00a0<a href=\"http:\/\/soufangroup.com\/the-islamic-state\/\"><span class=\"s2\">the so-called Islamic State<\/span><\/a>\u00a0and\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-the-strong-state-of-a-stateless-al-qaeda\/\"><span class=\"s2\">al-Qaeda<\/span><\/a>\u00a0is that some proponents of violent extremism may have access to critical infrastructure such as transportation or energy networks.\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-when-terrorists-assault-cities\/\"><span class=\"s2\">Assault-style terror attacks<\/span><\/a>\u00a0like those in\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-paris-and-the-pain-of-hindsight\/\"><span class=\"s2\">Paris<\/span><\/a>\u00a0or\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-in-the-wake-of-san-bernardino\/\"><span class=\"s2\">San Bernardino<\/span><\/a>\u00a0may be more common, but the risk of insider terror attacks is quite real. While these\u00a0attacks are relatively rare,\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-a-region-choked-by-bin-ladin-ism\/\"><span class=\"s2\">the spread of bin-Ladinism<\/span><\/a>\u00a0among such a broad population suggests they could increase.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">There are two types of insider terror threats: those that exploit poor or insufficient security systems, and those\u00a0that exploit the assignment of trust and access within an otherwise well-run system.\u00a0There have been two recent examples of terrorists exploiting the combination of poor security and employee access, both involving aviation. Aviation remains an obsession for terrorists; few attacks\u00a0demand the same level of international attention as the downing of\u00a0commercial airliners.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The February 2 suicide bombing aboard a Daallo Airlines flight from\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-dispatch-from-mogadishu\/\"><span class=\"s2\">Mogadishu<\/span><\/a>\u00a0to Djibouti was reportedly an insider attack. CCTV footage from the airport waiting area shows an individual beyond the security checkpoint\u00a0handing what is believed to be an explosive device to the bomber. The negligible death toll\u2014the bomber alone was killed\u2014would have been far greater had the plane reached cruising altitude before detonation. The difference between one death and 74 was evidently the result of bad timing by the bomber\u2014something no security system should rely upon.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">On October 31, 2015,\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-terror-in-the-skies\/\"><span class=\"s2\">a bomb brought down a MetroJet flight<\/span><\/a>\u00a0heading from\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-sisis-trouble-in-paradise\/\"><span class=\"s2\">Sharm al-Sheikh, Egypt<\/span><\/a>, to St. Petersburg, Russia, killing all 224 people on board. The bomb, which went off at 31,000 feet\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-terror-in-the-skies\/\"><span class=\"s2\">to ensure catastrophic decompression<\/span><\/a>, was reportedly placed in the cargo hold by someone with access to the plane at the Sharm al-Sheikh airport. In both this and the Daallo Airlines bombing, passengers and transiting flight crews reported paltry security standards at the respective airports. At Sharm al-Sheikh, passengers reported lax security procedures and claimed that bribes were paid to avoid security lines. The pilot who safely landed the Daallo flight described the situation around the Mogadishu airport as chaotic, with too many people appearing to have access to the tarmac and aircraft. It is likely these airports are not the only ones operating under the assumption of security.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Even well-run systems are vulnerable to a trusted employee determined to commit an act of violence or sabotage. On September 26, 2014, an employee accessed a radar facility that provided coverage for Chicago-O\u2019Hare, one of the world\u2019s busiest airports. He set a small fire that damaged cables and computers, resulting in massive flight cancelations that spread across the United States. Though the culprit may have had no links to terrorism, his ability to cause such extensive damage in the course of a normal routine was significant.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Aviation is far from the only hardened target on terrorists\u2019 radars. Power grids, water supplies, and other critical infrastructure are always under threat. The threat is easy to both exaggerate and underestimate, given the level of trust placed in the background clearance process and the monitoring of trusted employees. In a report sent to the U.S. Congress on February 9, 2016, the Director of National Intelligence James Clapper stated, \u2018the perceived success of attacks by HVEs (Homegrown Violent Extremists) in Europe and North America, such as those in\u00a0<a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-terror-in-tennessee\/\"><span class=\"s2\">Chattanooga<\/span><\/a>\u00a0and San Bernardino, might motivate others to replicate opportunistic attacks with little or no warning, diminishing our ability to detect terrorist operational planning and readiness.\u2019 That some of these potential attacks could emanate from inside of the systems they target is a possibility that warrants reviews of applicable security protocols.<\/span><\/p>\n<p class=\"p1\">Read the Original Article at <strong><a href=\"http:\/\/soufangroup.com\/tsg-intelbrief-the-insider-terror-threat\/\">Soufan Group<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bottom Line Up Front: \u2022\u00a0The February 2, 2016 suicide bombing onboard a Daallo Airlines flight from Mogadishu to Djibouti appears to have been an inside job \u2022 An employee is also suspected to be responsible for the October 31, 2015 bombing of a Russian MetroJet flight from Sharm al-Sheikh, Egypt to St. Petersburg \u2022 The\u00a0threat&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1704,13,2574,74,2417,2413,2726,2990,1189,272],"tags":[3852,1115,4554,4555,3911,4443,3391],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11817"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=11817"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/11817\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=11817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=11817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=11817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}