Showing posts with label hotel terrorism. Show all posts
Showing posts with label hotel terrorism. Show all posts

Tuesday, June 28, 2011

Kabul Hotel Attack Reflects Emerging Terror Strategy

Today’s attack on the Kabul InterContinental Hotel reinforces the assessment that terrorists are embracing Mumbai style commando attacks as an effective strategy. As previously discussed, it seems likely that commando style terror plots targeting hotel facilities in Europe and possibly the United States are on the horizon. See, New Commando Style Terror Plot Predicted in Mumbai Security Briefing – September 2010 , and Lessons Learned from the Mumbai Attacks – April,2010.

As recently as a week ago, Fox News reported that intelligence obtained in Somalia pointed to a potential Mumbai style plot aimed at a luxury hotel in London. Earlier in May, 2011, Anwar al-Awlaki, a senior Al-Qaeda leader threatened Mumbai style attacks on Europe, as reported by The Sun, a U.K. based newspaper. Overall, the gestalt of the Islamic inspired terror network seems to be shifting towards this style of attack.

As noted in past analysis, hotels, particularly luxury-style international hotels, are attractive targets. This is because of their symbolic representation as centers of western business and commercial interests, more affluent clientele and high value targets are present, and there is a cross section of various nationalities and religions peaceably coexisting in contravention of extremist ideals. Most significantly, hotels are soft targets.

For all intents and purposes, hotels have no effective means of resisting or thwarting an armed assault. Further, hotels can be easily surveilled and penetrated, because they are generally open to the public and there are transient visitors. Militants can pose as guests with a minimum of suspicion, especially in international hotel venues where peoples of diverse origin are present. Finally, smuggling weapons into hotels is a low risk exercise because weapons can be concealed wiithin baggage without arousing suspicion, and groups can quietly build by staggering their check-ins, concealing their association.

In terms of high impact and low personnel requirements, hotels offer themselves up as good targets as well. Hotels house large numbers of guests that are generally confined to floors with a limited numbers of exits and common egress stairwells. By controlling lower level floors, entire facilities can be effectively controlled with a limited number of militant personnel. Effective control can further be projected by detonating bombs or starting fires and maintaining fire zones at main doorways and entrances covered by shooters. Once control of the premises is achieved, members of the terrorist team are set up to sweep from the bottom to the top of the hotel facility executing guests, taking hostages and/or planting explosives.

Once physical control over the facility and hotel guests is established, the terror group has achieved a position of strength. Efforts to dislodge hostile operators by direct assault become a high risk operation due to concerns about potential collateral losses, the use of human shields, and/or triggering a preplanned mass killing event. This psychological advantage is likely to be more effective in Western countries where both real time news coverage and more open government create intense political pressures not to place hostages and victims at further risk. This situation also plays into the hands of the terrorists by providing a global stage for protracted hysteria and attention.

In both the Mumbai attack and Kabul Hotel attacks, the terrorists were wearing suicide vests and were operating to inflict maximum loss of life. Looking at other prototypical terror attacks such as the Beslan School incident and Moscow Theater attack, Islamic militants also intended to ultimately kill as many hostages as possible. Once they consolidated hostage groups, they extensively wired explosives in holding areas and detonated them.

These behaviors speak to the need for Western police and anti-terror units to quickly respond to any attack and actively engage hostile actors to deny them the ability to establish control over the facility and interrupt or delay planned operations that can further entrench their position and/or gain mass killing opportunities. With regard to hotel facilities, it is nearly impossible to adequately secure these venues. Attentiveness on the part of Hotel personnel in identifying suspicious actors is essential. Hotel personnel must be capable of identifying anomalies such as unusual numbers of younger single men originating from suspect destinations checking in with overlapping stay dates. Persons who are overly protective of their baggage and refuse to allow others near it may be a sign of unusual activity. Persons that are evasive as to the purpose of their stay, that are secretive or avoid public interaction may be a sign of suspect activity.

In addition to being alert, hotels must improve response coordination capabilities with law enforcement. In cases of an emergency, a rapid response aided by real time situational information that can assist a quick reaction force in effectively engaging and contesting militants. Allowing police to view the interior of the hotel through the sharing of security camera feeds would provide a tactical edge over the militants by enabling responders to identify militants, their positions and weaponry, command elements and monitor movements. Similarly enabling direct communication between on-scene responders and hotel staff and guests via cell phones, mobile chat, and even streaming video from smart phones, provides additional “eyes on” capability and situational awareness that can provide responders with a lifesaving edge.

The threat posed by this new mode of terror attack is not insignificant and offers many challenges to homeland security and public safety agencies. While we hope plots can continue to be successfully detected and thwarted before they become real operational threats, we must be prepared to handle and respond to a commando style terror attack. Hotels can be better prepared for these security risk scenarios and should invest in concealed video monitoring systems, interoperable communications and video sharing capabilities so they are equipped to give responders the information they need should the quite thinkable occur.

Thursday, September 30, 2010

New Commando Style Terror Plot Predicted in Mumbai Security Briefing

In December, 2008, I wrote an after action Mumbai Attacks Security Briefing in which I advised that the public safety agencies and high risk/high impact targets should be prepared for coordinated multi-site urban terror assaults (commando style attacks) that are modeled after the Mumbai terror attacks. Specifically, I suggested that the operational signature of the Mumbai attacks provided important information that can assist officials in preparing for and responding to potentially similar events in the future. The recently reported terror plot which appears to have been foiled should serve as a stark reminder to our public safety and emergency response agencies that the specter of a large scale coordinated terrorist attack focused on multiple soft targets remains a major concern.

Few details regarding the uncovered plot have been disclosed but some key information has been released, including the fact that the terror plot involved numerous operatives across Europe, attacks were to be coordinated and targets where possibly focused on hotels, malls and stadiums. This information suggests a fit with the Mumbai attacks. The significance of the Mumbai attacks should not be lost in that it represented a continuing departure from the historically favored terror targets of air and rail transportation, and a move towards commando style coordinated attacks. The Mumbai attacks were immensely “successful” from a terrorist perspective, causing large scale carnage and disruption across a major metropolitan region and “success” breeds emulation.

The Mumbai attacks should be seen as part of a natural progression and continuing adaptation of tactics that are moving towards exploiting soft targets using commando like operations. Predecessor events pointed to this new type of threat. These include the savage Beslan School attack in Russia on September 1, 2004, where Chechen terrorists took more than 1,100 people hostage and 334 hostages (including 186 school children) were massacred when they detonated explosives inside the school building. The Beslan attack was preceded by a similar large scale soft target attack on the Moscow Theater on October 22, 2002. The Moscow Theater attack involved over 40 Chechen terrorists taking 850 people hostage. After a two day standoff, Russian security forces conducted a raid and 170 people died. In addition to large scale attacks on soft targets involving many operatives, terrorists have shown an increased attraction towards attacking hotels. Attacks include hotels in Bali, Egypt, and Israel. The Somali terror affiliate of Al Qaeda, Al Shabab, claimed responsibility for a recent August 24, 2010 military commando style attack on the Muna Hotel in Somalia where parliamentarians were meeting, resulting in the death of 31 people.

In retrospect, it comes as little surprise that the Mumbai attacks represented an adaptation and progression of tactics which emulated components of previous attacks. The focal point of the Mumbai attacks was the Taj Hotel, in keeping with predecessor hotel bombing attacks. Borrowing from its Chechen counterparts, the Mumbai terrorists employed a commando style bloody hostage taking assault, and in keeping with Al Queda’s coordinated attack signature adapted further by undertaking coordinated attacks across 10 locations striking key response infrastructure.

There is little reason to doubt that similar plans were underway in this most recent terror plot. In terms of the future, it would seem likely that a domestic terrorist attack will be a coordinated and distributed commando style attack aimed at soft targets and possibly first responders and support response infrastructure. The likely targets appear to be schools, hotels, stadiums and high capacity facilities. Among these targets, hotels remain the most likely target because they are uniquely open to transient traffic, they house large numbers of people, and the ability to surreptitiously smuggle weapons and explosives in luggage as guest is relatively easy. Further, the rooms at the hotel become ideal operational bases from which operatives can meet, prepare and deploy to designated targets. Further, removing and transporting weapons is easy because the can be transported in innocuous looking luggage. Finally, operatives can check-in to rooms at varying intervals to appear unrelated to other conspirators and can request rooms at strategic locations where they can wire explosives and incendiary devices.

Hotels that are most a risk would appear to be larger hotel facilities which are located in metropolitan areas with more diverse populations that include Middle Eastern and African immigrant populations, so that terrorists can more easily blend in to the population. Thus, hotels in localities that serve as gateways for international air traffic like Atlanta, Chicago, Dallas, Detroit, Los Angeles, Miami, New York, San Francisco and Washington DC, would seem to be more at risk than others. Among these, smaller cities would seem to carry a possibly higher t risk because they have less resources and security assets at their immediate disposal to combat an attack. This would make Atlanta, Dallas, Detroit, Miami and San Francisco possibly more attractive potential targets. This pragmatic consideration, however, may be offset by the desire to attack a more significant and symbolic city.

Among types of hotels, skyscraper style hotels would seem to be more at risk than those that are more campus oriented and have more distributed entrances and exits, because it is easier to control the entire hotel facility with many floors by controlling a ground floor with limited entrance and exits. Additionally, traditional American associated brand hotels would seem to be more likely targets because of their symbolic value.

In addition to hotels, large elementary and middle schools in metropolitan areas appear to be potential targets of concern. Generally, these facilities are not well protected against sudden commando style raids. Attacking grade school level facilities also offers terrorists distinct advantages, including a hostage population that will be unable to resist in early stages of an operation, and adults who will be over taxed in attending to children. Further, great political pressure will be placed on officials to avoid any action on the part of public safety and security forces, yet it will command and tie down considerable resources due to the nature of the event. Attacking this target in concert with others will place tremendous stress on available response resources, thus giving terrorists more opportunity to inflict large scale carnage and damage at secondary targets.

As a final note, from a historical perspective it appears that early and aggressive action on the part of security forces would appear to be appropriate. The longer that time passes, the more terrorists are able to entrench, wire explosives and prepare for an assault. In most instances of radical Islamic terrorist attacks, the record indicates it is unlikely there will be a peaceful conclusion and that negotiation merely affords terrorists time to prepare for final acts of mayhem and martyrdom.

Strong emphasis should be placed on building regional terror response teams capable of responding with military like force and special operations capabilities. Response time to the scene should be gauged in minutes, not hours or days. The sooner responding forces can insert into a scene the more they can take advantage of a chaotic and unstable environment. In order to effectively deploy these types of capabilities, tools that provide real time situational awareness are key. These tools include ensuring that advanced interoperable communications and information sharing are in place. This includes enabling communications between hostages and field level responders, sharing video and communicating across multiple responding agencies.

While we all are relieved that a serious terror plot may have been stopped, we all know this is not the last in a determined effort by increasingly worldwide fanatical terror networks to strike a devastating blow against the West.