{"id":13306,"date":"2016-03-19T07:56:43","date_gmt":"2016-03-19T12:56:43","guid":{"rendered":"http:\/\/hcstx.org\/?p=13306"},"modified":"2016-03-19T07:56:43","modified_gmt":"2016-03-19T12:56:43","slug":"crusader-corner-tracking-down-salah-abdeslam","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/03\/19\/crusader-corner-tracking-down-salah-abdeslam\/","title":{"rendered":"Crusader Corner: Tracking Down Salah Abdeslam"},"content":{"rendered":"<h4 id=\"1301\" class=\"graf--h4 graf-after--h3\" style=\"text-align:center;\">Man Hunting, The Sport of Security Forces<\/h4>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-13307\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/03\/mickey.jpeg?w=620\" alt=\"Mickey\" width=\"620\" height=\"468\" \/><\/p>\n<p>&nbsp;<\/p>\n<section class=\" section--body section--first section--last\">\n<div class=\"section-content\">\n<div class=\"section-inner layoutSingleColumn\">\n<h4 id=\"9d9c\" class=\"graf--h4 graf-after--figure\">Bottom Line Up Front<\/h4>\n<ul class=\"postList\">\n<li id=\"9f97\" class=\"graf--li graf-after--h4\">Intelligence agencies must cooperate more rapidly and proactively to counter ISIS\u2019 rapid and haphazard operational tempo.<\/li>\n<li id=\"85e2\" class=\"graf--li graf-after--li\">Clandestine operatives must rely on support networks that include overt members of the public. These networks are easily mapped out based on metadata available to nation state level security forces.<\/li>\n<li id=\"2ea6\" class=\"graf--li graf-after--li\">Fugitives should learn to cook if they want to minimize their footprint and improve their security.<\/li>\n<li id=\"7cfa\" class=\"graf--li graf-after--li\">Exposure of clandestine networks is inevitable, given modern data sources. Only extremely disciplined non-organic organizations can hope to survive for long.<\/li>\n<\/ul>\n<p id=\"533a\" class=\"graf--p graf-after--li\">The capture of Salah Abdeslam is certainly good news, he will be a rich source of information about ISIS inside Europe. The man hunt was intense and his ability to remain hidden inside Belgium for months was quite an accomplishment, <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/medium.com\/@thegrugq\/the-paris-attacks-were-en-clair-92cf51566fe6#.lkqy2wexc\">particularly given the poor ISIS security.<\/a> Belgian police, with considerable assistance from international intelligence agencies, have been following leads and conducting raids.<\/p>\n<h4 id=\"fdeb\" class=\"graf--h4 graf--startsWithDoubleQuote graf-after--p\">\u201cChanged my mind, haven\u2019t seen Paul Blart Mall Cop 2 yet\u201d<\/h4>\n<p id=\"b4e5\" class=\"graf--p graf-after--h4\">Salah went missing after he wimped out of \u201cmartyrdom,\u201d ditching his suicide vest and calling friends to come pick him up and take him home. The car was stopped by the French and everyone IDed, but their names weren\u2019t available to the police yet.<\/p>\n<p id=\"1fd9\" class=\"graf--p graf-after--p\">Clearly, security forces are not sharing counterterrorism information fast enough to handle modern operations. A slow moving target like the Soviets, or even al Qaeda, allows for a more relaxed approach. ISIS\u2019 operational tempo and behavior is too fast and haphazard.<\/p>\n<h4 id=\"736e\" class=\"graf--h4 graf-after--p\">Defunct Safe Houses<\/h4>\n<p id=\"f83c\" class=\"graf--p graf-after--h4\">The Molenbeek area where Salah has been hiding is riddled with radical support networks and sympathizers. He was able to rely on his friends and other support networks. Police targeted elements of these support networks, and eventually discovered a link to Salah himself.<\/p>\n<blockquote id=\"4476\" class=\"graf--blockquote graf-after--p\"><p>Belgian and French police, who had worked intensively together since November 13, carried out a midday check on what, according to several officials, they thought was a defunct terrorist safe house. The utility bills hadn\u2019t been paid in months, officials said, leading police to assume the apartment in the Forest district of southern Brussels stood empty. The six-person team didn\u2019t expect to meet resistance and brought no police backup or special forces support.<\/p><\/blockquote>\n<blockquote id=\"f4f8\" class=\"graf--blockquote graf-after--blockquote\"><p>When the police opened the door, they were shot at with a Kalashnikov and \u201ca riot gun,\u201d according to the Belgian authorities. Four officers were wounded, including a French policewoman. Heavily-armed police pursued suspects across the rooftops. One gunman was killed. Two fled the scene, evading capture even though police had sealed off the area.<\/p><\/blockquote>\n<p id=\"b86f\" class=\"graf--p graf-after--blockquote\"><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.politico.eu\/article\/hunt-for-europes-most-wanted-man-abdeslam-isil-brussels-belgium-france-paris-attacks\/\" rel=\"nofollow\">The \u201cdefunct\u201d safe house had a glass with Salah\u2019s fingerprint<\/a>. Police developed a number of leads and ended up monitoring a house in the Molenbeek area.<\/p>\n<p id=\"1c33\" class=\"graf--p graf-after--p\"><strong class=\"markup--strong markup--p-strong\">Speculation<\/strong>: those leads were based on analysis of mobile devices, and knowledge of existing social networks. Using the identities of the suspects from the safe house as an entry point into the support network, based on social ties, further likely suspects could be identified.<\/p>\n<p id=\"463b\" class=\"graf--p graf-after--p\"><strong class=\"markup--strong markup--p-strong\">Update<\/strong>: <a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.standaard.be\/cnt\/dmf20160319_02191724?utm_source=feedburner&amp;utm_medium=twitter&amp;utm_campaign=Feed%3A+dso-front+%28De+Standaard+Online%3A+Voorpagina%29\" rel=\"nofollow\">the lead was based on metadata\u200a\u2014 a phone cal<\/a>l.<\/p>\n<blockquote id=\"b4ec\" class=\"graf--blockquote graf-after--p\"><p>Staking out the house, the police became convinced that a larger group of people was there after a woman who seemed to live there ordered several pizzas, according to two security officials<\/p><\/blockquote>\n<p id=\"ced1\" class=\"graf--p graf-after--blockquote\"><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/medium.com\/@thegrugq\/the-rise-and-fall-of-the-tunnel-rat-king-58352d4f2f65#.8ohtwka2m\">Just like the raid on el Chapo Guzman was triggered by a large food order<\/a>, it seems Salah\u2019s capture was based on too many pizzas. Maybe fugitives might want to consider cooking at home, rather than ordering delivery.<\/p>\n<h4 id=\"1a42\" class=\"graf--h4 graf-after--p\">Social Networks, Not Just For Entrepreneurs<\/h4>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-13308\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/03\/fb1.jpg\" alt=\"FB1\" width=\"600\" height=\"453\" \/><\/p>\n<figure id=\"5a0f\" class=\"graf--figure graf--iframe graf-after--h4\">\n<div class=\"iframeContainer\">\n<div class=\"content clearfix\">\n<div class=\"permalink-header\">\n<div class=\"follow-bar\"><\/div>\n<div class=\"content clearfix\">\n<div class=\"permalink-header\">\n<div class=\"follow-bar\">\n<div class=\"user-actions btn-group not-following \"><a class=\"account-group js-account-group js-action-profile js-user-profile-link js-nav\" href=\"https:\/\/twitter.com\/evil_SDOC\"><img decoding=\"async\" class=\"avatar js-action-profile-avatar\" src=\"https:\/\/pbs.twimg.com\/profile_images\/694534099302768640\/jNn9ZtcN_bigger.jpg\" alt=\"\" \/><strong class=\"fullname js-action-profile-name show-popup-with-id\">Weekend Warrior<\/strong>\u200f<span class=\"username js-action-profile-name\"><s>@<\/s><b>evil_SDOC<\/b><\/span><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"js-tweet-text-container\">\n<p class=\"TweetTextSize TweetTextSize--26px js-tweet-text tweet-text\" lang=\"en\">How Salah <a class=\"twitter-hashtag pretty-link js-nav\" href=\"https:\/\/twitter.com\/hashtag\/Abdelslam?src=hash\"><s>#<\/s><b>Abdelslam<\/b><\/a> fits into ISIS terror nexus in France\/Belgium. Already had 1-2 names missing before today&#8230;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"js-tweet-text-container\"><\/div>\n<\/div>\n<\/figure>\n<p id=\"cf43\" class=\"graf--p graf-after--figure\">It seems that significant parts of the manhunt were enabled by recovering and analyzing mobile phones used by the various suspects.<\/p>\n<blockquote id=\"c2ba\" class=\"graf--blockquote graf-after--p\"><p>Aside from the fingerprint found on Tuesday, earlier raids on suspected terrorist hideouts brought other important leads, according to officials. Electronic devices confiscated in earlier raids helped authorities track Abdeslam down, said a Belgian source. Once a suspect\u2019s mobile number and sim card have been identified, investigators can then serve a court order on telecoms operators to track the number and card down to the nearest phone tower.<\/p><\/blockquote>\n<p id=\"71c2\" class=\"graf--p graf-after--blockquote\">The location information generated by the mobile devices (phones and possibly tablets) enabled security forces to track not only individuals, but to map out their networks via e.g. co-location. Mobile phones, even when encrypted and <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/medium.com\/@thegrugq\/signal-intelligence-free-for-all-5993c2f72f90\">even when using encrypted communications tools<\/a>, still provide a rich source of intelligence information to security forces.<\/p>\n<h4 id=\"6b87\" class=\"graf--h4 graf-after--p\">Big Data Analysis Beats Covert Networks<\/h4>\n<p id=\"751c\" class=\"graf--p graf-after--h4\">Modern connected society is a huge data source for the intelligence analyst. Social connections are mapped out via online social networks such as Facebook, but also in meat space via the mobility of personal tracking devices such as mobile phones. An underground operative, such as Salah, can avoid using mobiles and computers, but the various elements of his above ground support network are as reliant on modern tools as anyone else.<\/p>\n<blockquote id=\"9c0d\" class=\"graf--pullquote pullquote graf--startsWithDoubleQuote graf-after--p\"><p>\u201cThe guerrilla must move amongst the people as a fish swims in the sea.\u201d\u200a\u2014\u200aMao Zedong<\/p><\/blockquote>\n<p id=\"b1e1\" class=\"graf--p graf-after--pullquote graf--last\">The problem for underground operatives is that they are reliant on support networks. <a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/grugq.tumblr.com\/post\/134073633338\/the-structure-of-ignorance\" rel=\"nofollow\">Support networks for clandestine organizations are almost always based on social networks<\/a>. Modern society makes support networks an open book for anyone with access to the data (social apps, telco records, etc) and the analytic tools to parse that data (eg <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.palantir.com\/\" rel=\"nofollow\">Palintir<\/a>, <a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www-03.ibm.com\/software\/products\/en\/analysts-notebook\" rel=\"nofollow\">analysts notebook<\/a>, etc). Tracing threads has become trivial (even with encrypted comms), the hard part is merely finding an entry point.<\/p>\n<p class=\"graf--p graf-after--pullquote graf--last\">Read the Original Article at<strong> <a href=\"https:\/\/medium.com\/@thegrugq\/man-hunting-the-sport-of-security-forces-373d167a3066#.j8p6w5eiz\">Medium<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/section>\n<footer class=\"postArticle-footer\">\n<div class=\"postActionsFooter container u-size740\"><\/div>\n<\/footer>\n","protected":false},"excerpt":{"rendered":"<p>Man Hunting, The Sport of Security Forces &nbsp; Bottom Line Up Front Intelligence agencies must cooperate more rapidly and proactively to counter ISIS\u2019 rapid and haphazard operational tempo. Clandestine operatives must rely on support networks that include overt members of the public. These networks are easily mapped out based on metadata available to nation state&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[5406,1704,5072,3140,13,74,4445,4126,2417,2413,1928,10384,1189,4880,272,10],"tags":[10383,1865,3102,10385,1520,10386,10387],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13306"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=13306"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13306\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=13306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=13306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=13306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}