Friday, August 10

Can Publicly Available Information Be Used in Planning Terrorist Attacks?

I wrote yesterday about the dangers of providing free information to terrorists and as if by magic, this RAND report came out today. The report talks about whether you can use publicly available information to plan terrorist attacks? the answer is definitely yes, but the devil is in the detail. As I mentioned, professional terrorists will go to deep lenghts to investigate and analyse the target, so as to increase the chances of success and to know all there is to know about the risks and benefits. Similarly, this longer process helps the security services to catch them as well.

But the RAND report offers a good systematic way of analysing the information content for target selection. Please remember that this is exactly how an air-force target planner will go about selecting his targets as well. So it cuts both ways. In any case, mum's the word and wall's have ears! :)


All this to be taken with a grain of piquant salt!!!

Can Publicly Available Information Be Used in Planning Terrorist Attacks?
With the ever-growing presence of the Internet in people’s lives, it is easier than ever to obtain information from publicly available sources on a wide range of topics. This raises the question of whether terrorists can exploit this availability of information when planning terrorist attacks. Conversely, familiarity with public sources of information can also be useful to policymakers in defending potential targets. However, given the vast array of publicly available information, identifying all the information relevant to a potential target and assessing its possible value to terrorist planners is daunting. What is needed is a way to define the kinds of information that would be useful for planning and executing attacks on particular targets.
A RAND Corporation study developed a framework to guide assessments of the availability of such information for planning attacks on the U.S. air, rail, and sea transportation infrastructure and applied the framework in a red-team information-gathering exercise. Working with six plausible attack scenarios — two each in air, rail, and sea transportation infrastructures — and a modified intelligence preparation of the battlefield (ModIPB) framework based on U.S. Army doctrine, red-team members serving as proxies for terrorists were instructed to find information sufficient to complete an operation plan for each of the six scenarios.
Based on the exercise, the study found the following:
The ModIPB framework is a useful guide to identifying information relevant to the planning and execution of terrorist attacks. Relying on checklists provided by the study team, red-team members were able to identify information that, with scattered exceptions, proved useful for planning the hypothetical terrorist attacks in all six scenarios. The results of three validation exercises support this assertion.
Ease of identifying relevant information varied across information categories. General, descriptive information was the easiest to find, and detailed information about security procedures was the most difficult to find. Some types of information could be found for one class of infrastructure target or for one scenario but not others.
Based on these findings, the authors recommend that, to prevent information that includes security details from becoming public, infrastructure owners should review and revise procedures for operational and informational security. This is especially pertinent given that new information becomes public every day, as do new capabilities for searching and fusing information.
The authors also recommend that infrastructure owners consider information that can be obtained from easily accessible public-information sources, such as the Internet, in vulnerability assessments. Given that new information can become publicly available at any time, such vulnerability assessments should be conducted frequently.

No comments: