This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Building AppSec in Enterprises
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Countering the Effects of New Age Terrorism on Business and Travel
Security Leadership and ManagementSecurity Education & TrainingColumns

Countering the Effects of New Age Terrorism on Business and Travel

Countering the Effects of New Age Terrorism
September 1, 2017
Michael Payne
KEYWORDS executive protection / international security / security risk management / Terrorism / travel security
Reprints
No Comments

Businesses must expand their abilities in countering the effects of ‘new age’ terrorism to ensure that their assets remain available and effective to succeed in today’s rapidly expanding global marketplace. The growing frequency of terror-related events and their resulting effects are due in part to the threat’s ability to rapidly change targets and methodologies. Terror organizations now leverage everyday media tools to enhance the motivation and capabilities of their followers while the security industry lumbers behind in mitigating this asymmetrical threat with conventional measures. Although the definition as to what constitutes terrorism are many, the ability to use violence to alter the behavior of those they oppose is typically considered a core attribute. For example, in 2015, MarketWatch identified the impact of increasing acts of violence eliminated a potential $8.2 billion for the travel industry. Last year, Travel Wire Asia posted a study that polled 605 business travelers and 270 corporate travel executives, finding that 67 percent of travelers stated travel to an unsafe region had a negative effect on them. These findings demonstrate that ‘new age’ terrorism is achieving the desired effect with increasing efficiency.

What is ‘new age’ terrorism? In a paper addressing changes in terrorism, Dr. Arvind Adityaraj states: “…the magnitude of violence, lethality and the extensive use of technology to disseminate ideology, indoctrinate, and mold the mind of the youth in their fold…[with] business-like network structures clearly point towards the significant departure of old terrorism.” This is reinforced in research by RAND Corporation, finding: “At one time…terrorists wanted a lot of people watching, not a lot of people dead…but…headlines demanded higher body counts; [with]…hatred and…fanaticism replacing political agendas.” These major shifts highlight that terrorists have evolved from a suite of predictable attack scenarios into highly innovative networks operating in an asymmetrical environment. This ability to change course quickly is the primary obstacle to businesses being as agile as the threat. To effectively counter terror’s macroevolution, businesses must expand their capabilities beyond previous norms. Without establishing and continuously monitoring their operational risk profile, businesses will continue to rely on ad hoc mitigation while enduring the equivalent of “Death by a Thousand Cuts.”

 

Characteristics, Trends and the Rise of Low-Tech Attacks

A principal characteristic of ‘new age’ terrorism is the ability to capitalize on the significant risk found in a number of areas originating from the increase of social dysfunction in conjunction with technological advances. The RAND Corporation’s Networks and Netwars reports: “…terrorists are on the cutting edge of organizational networking and gaining significantly from the information revolution. They harness technology to enable less hierarchical, more networked designs – enhancing flexibility, responsiveness and resilience to improve offensive operational capabilities for the war of ideas as well as…violent acts.” These capabilities are demonstrated by capitalizing on the large numbers of discontent unemployed or underemployed youth via social media as networked terror groups have created and maintain a level of conflict just short of all-out war. Using this new methodology, terrorists are conducting integrated operations via dispersed nodes without the formalized structure or operational oversight of the past.

Also unlike the past, terror has become a globalized industry. In Dr. Adityaraj’s paper, he asserts: “…The world is witnessing an organized global insurgency of non-state actors aimed at the overthrow of values, cultures or societies on a global level to establish a new world order. With new age technology and an ability to move in open societies, a virtual nation has risen which possesses informational, military and economic instruments of power.” Terrorists are developing clusters of organized networks to achieve their strategic objectives. No longer limited to fixed geographical points, terror has evolved to a scale that can impact large metropolitan areas up to and including global events. Furthermore, fanaticism has surpassed sociopolitical and socioeconomic interests as terror’s primary motivation. Noted historian Walter Laqueur submits that any survey of terror-related casualties reveal not only a growing fanaticism, but also an indiscriminate lust for killing and power. With the advent of dispersed operational nodes, vis-à-vis an inherent need for infamy, ‘new age’ terrorists are operating largely unrestrained.

After almost two decades of conflict, we now face a threat that has the capability to motivate those with shared ideologies to act independently in facilitating terror objectives. The effectiveness of ‘new age’ terror on social media has spawned a persistent threat supplemented by well-trained operatives. These successes fuel the rise of low-tech attacks by at-risk or unstable actors with just enough ability to use everyday items to commit acts of terror. This affirms public and business traveler anxieties while reinforcing decision-maker uncertainties. Just as companies form alliances and networks to provide complex services with common objectives, so have the terrorists. Their small and decentralized teams also increase the likelihood of convergence. This requires improved monitoring as convergence has the potential to exponentially increase threat variations as well as shifts in target selection and attack methodologies.

 

Monitoring the Threat

All too frequently, when monitoring threats or performing an analysis, no distinction is made between the different stakeholders the output is intended to support and the process’s contribution to business goals. As a result, analysts resourced to monitor the environment inaccurately portray what assets are at risk or how the threat can exploit them. In most cases, terror threats originate from more than one group using different strategies and tactics. Once the who, why, what and how have been analyzed, each threat is prioritized by considering their presence, previous activity and current capabilities to determine the level of risk each represent. At this point, threat motivations and capabilities are monitored for change with decision-makers understanding the absence of indicators should never be presumed as the absence of threats.

Also essential is the understanding that the time and location of every activity presents a unique blend of threats to be monitored. To assist in this effort, it can be helpful to establish an Event Profile of the threat modes, duration, effects and conditions. Another way to aid threat monitoring is through the use of Suspicious Activity Reports. However, one of the most often overlooked resources is establishing relationships and communications with governments, law enforcement and other location-relevant organizations.

Communications are paramount in effectively monitoring the threat and alerting personnel of changes in its intensity. Leadership’s common response to increasing risk is to inform everyone to be vigilant and heighten their situational awareness. Unfortunately, what is routinely missing from this advice is training in how to go about it. Without training, this communication creates the dangerous illusion that risk has been sufficiently addressed while unknowingly creating an opportunity for significant peril.

 

Reducing Expat/Traveler Risk

It is well known that it is the state’s responsibility to proactively reduce risk to the public and maintain the ability to mount an effective response based on intelligence resources. Also widely acknowledged is that duty of care requires businesses to take all reasonable steps necessary to ensure their employee’s wellbeing. Given the ease of identifying expats and the shared vulnerabilities of travelers in transit, the most effective means to reduce expatriate and traveler risk is for them to learn how to manage their risk profile based on prediction versus response. There are several automated risk management tools available to assist in this effort. Regrettably, this assistance often leads to an abdication of ownership for one’s personal safety by transferring unwarranted levels of reliance onto these technologies. As advanced as many of these tools are, there remains a need to offset the overconfidence in their capabilities. In addressing this offset, regardless of position, it is wise to invest in developing risk management competencies to ensure that every leader and employee understands what to protect, what to protect it from and what to protect it with. In order to leverage these competencies and further reduce the risks in today’s entropic environment, risk management must be treated as a formal business process.

One of the risks for expats and travelers that benefits terrorism is the terrorist’s ability to reach targets with relative ease. Among the factors that contribute to this are loose border controls and the development of transient infrastructure which unwittingly aid and support terror recruitment, fundraising and other logistical functions. As events trending on social media can push unstable actors on the fringe to act, it is important for everyone to know how to quickly recognize and respond to changes in their risk profile. Adding this capability to a business’s duty of care efforts will ensure a requisite level of employee preparedness, enhance and expand risk monitoring and forgo accepting crisis management as the only viable response.

The battle for society’s hearts and minds rages as societal fear and government fragility permit the terrorists to pursue their apocalyptic vision unabated. Although numerous businesses operate within this environment, there remains a resistance to develop and manage their operational risk profile beyond a cursory level. Given terrorism’s effectiveness in exploiting social dysfunction and the resulting consequences of terror-related events on society at large, the evidence is overwhelming that businesses and travelers must expand their abilities to counter the effects of ‘new age’ terrorism; otherwise, brace for impact.

Subscribe to Security Magazine

Recent Articles by Michael Payne

Proactive Planning for International Response and Recovery

Michael_payne

 Michael Payne, CPP, CBCP, is the Organizational Resilience Manager for iJET International, an Integrated Risk Management company providing custom intelligence, preparedness, and response solutions. He has more than 30 years of experience planning, training, and leading these solutions at the operational and strategic level for multi-national corporations and within the U.S. government.  In times of crisis, Payne assumes the role of Global Operations Incident Manager leading crisis and resource surge management efforts for major natural disasters, socio-political situations and terrorism critical response operations. 

Related Articles

Proactive Planning for International Response and Recovery

Business Travelers: Worrying About Terrorism May Kill You

Related Events

A4M 27th Annual World Congress

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

Mark Hargraves

Security Industry Mourns Passing of Mark Hargraves

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

SEC1219-Cover-Feat-slide1_900px

Contracted vs. In-House Guarding: No Universal Right Answer

360x184customcontent_1.23Everbridge

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe. Organizations need to be prepared through a unified and rapid response to these events.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing