太子探花

Growing pool of terrorists overwhelms tracking capabilities

WASHINGTON 鈥 Intelligence and security officials around the world are scrambling to head off the next big terror attack. 鈥淭his is the most significant threat we鈥檝e seen in at least a decade,鈥 said Rob Wainwright, director of Europol, in an interview with WTOP.

Intelligence collectors, counterterrorism analysts and security officials are poring over names, locations, phone numbers 鈥 even pocket litter gathered by various surveillance and screening methods. Their quest is to link them all together before something happens.

Part of the problem, Wainwright says, is the growing pool of people involved in terrorist activities.

鈥淭he large community of foreign fighters willing to put their lives on the line to carry out the atrocities we saw in Paris suggests they have enough numbers to plan and carry out these attacks,” he says.聽Europol recently launched a new counterterrorism center to combat the problem.

Figures from the Soufan Group, a provider of聽strategic security intelligence, show that more than 30,000聽foreign fighters left their countries beginning in 2012 to fight with the Islamic State of Iraq and the Levant (ISIL). The U.S. military indicates that tens of thousands have been killed.

Yet ISIL, Al Qaida and other terror groups continue to launch attacks, which are severely testing counterterrorism forces worldwide.

TSA Administrator Peter Neffenger said recently that part of the problem is competition among terror groups.

鈥淭hat competition means that the environment is a little more uncertain than it was before.鈥

Patrick Skinner, a former CIA case officer with deep experience in counterterrorism, told WTOP, 鈥淭he terror threat radar is overwhelmed.鈥 The competition and drive to seize publicity add to the operational tempo for terror groups, which feed off of the 鈥渙verall heightened concern and complicating issues like the refugee crisis in parts of the EU.”

The evolving skills of today鈥檚 terrorists comprise聽another part of the problem.

Skinner, director of special projects at the Soufan Group, says, 鈥淲e could be in for a nasty time of terror surprises in terms of bombs and plots. I say this because the terrorists collectively have had several years of invaluable live-action experiments in Syria, Iraq, Yemen and Afghanistan. They鈥檝e had lots of time lots of time to tinker and try out new ideas.鈥

Those ideas undoubtedly have seeped into the fabric of the terrorist community. The bomb that brought down Metrojet Flight 9268 on Oct. 31, 2015, over Egypt鈥檚 Sinai was estimated to contain two pounds of explosives packed into a soda can and wired in a rudimentary fashion to a detonator.

Explosives experts say it wasn鈥檛 terribly sophisticated, but well placed and timed. All 224 on board were killed. The bomb is believed to have been stowed on the plane by airport employees.

Today’s terrorists are rapidly mastering the technique of getting simple聽bombs on planes via聽corrupt airport personnel. Perhaps the clearest聽example happened on聽Daallo Airlines Flight 159, on Feb. 2, flying out of聽Mogadishu.

A bomb packed into a hollowed-out laptop computer ripped a hole in the fuselage of the airplane at 11,000 feet. The suicide bomber carrying it was sucked out of the plane, but the other 73 aboard survived.聽 The aircraft was able to return to the airport safely.

Somalian aviation authorities say the bomber was not successful in destroying the whole aircraft because the explosion occurred before the plane reached a higher altitude.

CCTV footage shows two men handing the laptop to the suicide bomber before he boarded the plane.

Skinner said, 鈥淚t’s difficult to say how sophisticated the (Metro Jet and Daallo) bombs were, given the insider possibility. There was no need to be super-sneaky when someone helps you put it on the plane. But appears both were small and designed for explosive decompression.鈥

He added, 鈥淭he difference between mass-casualty Sinai and one-casualty Mogadishu was a matter of minutes and altitude. Checked luggage is always the nightmare, given how much there is and how many possible vectors the explosive can be in.”

Terrorist sympathizers willing to participate in plots appear to play a large role in overwhelming the threat monitoring system.

Skinner equates the development of aviation explosive devices to the evolution of the improvised explosive device (IED) during the Iraq War in the 2000s.

鈥淭hey were constantly evolving and testing their devices against current countermeasures. That is the whole point of denying terrorists sanctuary: it gives them space, time, and opportunity to experiment on a large scale,鈥 said Skinner.

And for Skinner, that space has advanced far beyond a secluded training camp. 鈥淲e are way beyond terror sanctuary now; we moved on to terror states (re: Islamic State territory).鈥

But the learning process began well before 2003.

In the 1980s, aviation bombs were 鈥渧ery small and sophisticated [and]聽required a very unique skill set,鈥 said Fred Burton, a former State Department counterterrorism agent.

Burton, now vice president of intelligence at Stratfor, says the master bomber of that era was Ramzi Yousef, who led the plot to attack the World Trade Center in 1993. 鈥淗e utilized a very sophisticated bomb secreted inside of baby dolls. It was a very high-tech, complex IED, which utilized a Casio watch as the timer. It was his unique signature.鈥

Today, people with no experience or practice can read about bombs聽in terrorism magazines. Each day, dozens of attacks and plots are reported around the world. When attacks are successful, terror groups brag about them using perhaps their most dangerous weapon 鈥 the Internet.

Wainwright, of Europol, says聽terrorists now have聽鈥渢he ability to glorify their acts of terror 鈥 to brandish right across the Internet this twisted form of their religious belief along with their brutal ideology. The Internet allows them to spread it to potentially millions of people. It is very damaging to our society.鈥

It鈥檚 damaging in part because it replenishes their supply of fighters lured into the terror system and creating another person the authorities have to track.

J.J. Green

JJ Green is WTOP's National Security Correspondent. He reports daily on security, intelligence, foreign policy, terrorism and cyber developments, and provides regular on-air and online analysis. He is also the host of two podcasts: Target USA and Colors: A Dialogue on Race in America.

Federal 太子探花 Network Logo
Log in to your WTOP account for notifications and alerts customized for you.