The Mumbai Terrorist Attacks and Open Source Warfare
We still don’t know for certain yet why the attacks in Mumbai took place or who the perpetrators were and we may not know for quite a while if ever. There are lots of speculations and accusations but precious little hard data. We don’t even know for certain how many were in the group that attacked Mumbai last week. The Indian government says ten, presumably because nine were killed and one captured. Among the things we do know are that
- They were Muslims or wanted us to believe they were Muslims. There are enough first-hand reports of the attackers screaming Allaho akbar that it’s a reasonable conclusion. Whether they were Islamist radicals, Indian or Pakistani, members of this group or that is getting ahead of the data.
- They used the techniques of what John Robb has called open source warfare:
THEIR battle fatigues are jeans, T-shirts and trainers. They are the new breed of terrorist — using everyday technology as a weapon of war.
Among their arsenal of weapons are bags of almonds and BlackBerry mobile phones — almonds to keep their energy up, and the mobile internet connections to stay one step ahead of police and the military.
They are the new breed of terrorist — using everyday technology as a weapon of war.
One of the rucksacks carried by one of the terrorists, later recovered by commandos, contained a Mauritian national’s identity card, Chinese-made grenades, seven ammunition magazines, 400 spare rounds of ammunition, seven credit cards from different banks, dry rations and thousands of dollars in cash.
However amid the arsenal of military hardware, it was the use of humble mobile phones and internet technology that proved a key weapon — one which caught the anti-terrorist forces by surprise.
The use of BlackBerrys by the terrorists to monitor international reaction to the atrocities, and to check on the police response via the internet, provided further evidence of the highly organised and sophisticated nature of the attacks.
The gunmen were able to trawl the internet for information after cable television feeds to the two luxury hotels and office block were cut by the authorities.
The physical evidence and first-hand reports are enough to draw this conclusion.
A post at Defense and the National Interest takes note of this and warns:
The urgency of the cyber threat and the extent to which readily available technology is being used against us to heinous effect presents serious challenges to the nation and to our community. Not to mention, the difficulties we face in countering these tactics by providing useful information quickly and down to the lowest levels of the chain of command.
In his column this morning David Ignatius warns of the possibility of a Mumbai-like attack being mounted on one of our cities:
What would happen if roving gunmen infiltrated U.S. cities and started shooting? Most U.S. police departments aren’t well prepared to deal with such “active shooters,” as they’re called. Police are trained to cordon off an area that’s under attack and then call in a paramilitary SWAT team to root out the gunmen. But what if the attackers keep moving and shooting? The response can be haphazard, as was clear in such disparate incidents as the 2002 Beltway sniper attacks in the Washington area and last year’s massacre at Virginia Tech.
“Mumbai is a worst-case ‘active shooter’ problem,” says a former CIA officer who helped organize a DHS pilot program on the subject last summer for police chiefs. “It had multiple shooters, multiple locations, mobile threats, willingness to fight the first responders and follow-on SWAT/commando units, well-equipped and well-trained operatives, and a willingness to die. Police department commanders in America should be scratching their heads and praying.”
What, if anything, should we be doing to foreclose such attacks? Are we doing enough? Too little? Too much?
I’d appreciate your thoughts and suggestions in the comments. I’ve put a few more thoughts of my own over at The Glittering Eye.