Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Leadership and ManagementSecurity Education & Training

Countering the Effects of New Age Terrorism on Business and Travel

By Michael Payne
Countering the Effects of New Age Terrorism on Business and Travel
September 1, 2017

Businesses must expand their abilities in countering the effects of ‘new age’ terrorism to ensure that their assets remain available and effective to succeed in today’s rapidly expanding global marketplace. The growing frequency of terror-related events and their resulting effects are due in part to the threat’s ability to rapidly change targets and methodologies. Terror organizations now leverage everyday media tools to enhance the motivation and capabilities of their followers while the security industry lumbers behind in mitigating this asymmetrical threat with conventional measures. Although the definition as to what constitutes terrorism are many, the ability to use violence to alter the behavior of those they oppose is typically considered a core attribute. For example, in 2015, MarketWatch identified the impact of increasing acts of violence eliminated a potential $8.2 billion for the travel industry. Last year, Travel Wire Asia posted a study that polled 605 business travelers and 270 corporate travel executives, finding that 67 percent of travelers stated travel to an unsafe region had a negative effect on them. These findings demonstrate that ‘new age’ terrorism is achieving the desired effect with increasing efficiency.

What is ‘new age’ terrorism? In a paper addressing changes in terrorism, Dr. Arvind Adityaraj states: “…the magnitude of violence, lethality and the extensive use of technology to disseminate ideology, indoctrinate, and mold the mind of the youth in their fold…[with] business-like network structures clearly point towards the significant departure of old terrorism.” This is reinforced in research by RAND Corporation, finding: “At one time…terrorists wanted a lot of people watching, not a lot of people dead…but…headlines demanded higher body counts; [with]…hatred and…fanaticism replacing political agendas.” These major shifts highlight that terrorists have evolved from a suite of predictable attack scenarios into highly innovative networks operating in an asymmetrical environment. This ability to change course quickly is the primary obstacle to businesses being as agile as the threat. To effectively counter terror’s macroevolution, businesses must expand their capabilities beyond previous norms. Without establishing and continuously monitoring their operational risk profile, businesses will continue to rely on ad hoc mitigation while enduring the equivalent of “Death by a Thousand Cuts.”

 

Characteristics, Trends and the Rise of Low-Tech Attacks

A principal characteristic of ‘new age’ terrorism is the ability to capitalize on the significant risk found in a number of areas originating from the increase of social dysfunction in conjunction with technological advances. The RAND Corporation’s Networks and Netwars reports: “…terrorists are on the cutting edge of organizational networking and gaining significantly from the information revolution. They harness technology to enable less hierarchical, more networked designs – enhancing flexibility, responsiveness and resilience to improve offensive operational capabilities for the war of ideas as well as…violent acts.” These capabilities are demonstrated by capitalizing on the large numbers of discontent unemployed or underemployed youth via social media as networked terror groups have created and maintain a level of conflict just short of all-out war. Using this new methodology, terrorists are conducting integrated operations via dispersed nodes without the formalized structure or operational oversight of the past.

Also unlike the past, terror has become a globalized industry. In Dr. Adityaraj’s paper, he asserts: “…The world is witnessing an organized global insurgency of non-state actors aimed at the overthrow of values, cultures or societies on a global level to establish a new world order. With new age technology and an ability to move in open societies, a virtual nation has risen which possesses informational, military and economic instruments of power.” Terrorists are developing clusters of organized networks to achieve their strategic objectives. No longer limited to fixed geographical points, terror has evolved to a scale that can impact large metropolitan areas up to and including global events. Furthermore, fanaticism has surpassed sociopolitical and socioeconomic interests as terror’s primary motivation. Noted historian Walter Laqueur submits that any survey of terror-related casualties reveal not only a growing fanaticism, but also an indiscriminate lust for killing and power. With the advent of dispersed operational nodes, vis-à-vis an inherent need for infamy, ‘new age’ terrorists are operating largely unrestrained.

After almost two decades of conflict, we now face a threat that has the capability to motivate those with shared ideologies to act independently in facilitating terror objectives. The effectiveness of ‘new age’ terror on social media has spawned a persistent threat supplemented by well-trained operatives. These successes fuel the rise of low-tech attacks by at-risk or unstable actors with just enough ability to use everyday items to commit acts of terror. This affirms public and business traveler anxieties while reinforcing decision-maker uncertainties. Just as companies form alliances and networks to provide complex services with common objectives, so have the terrorists. Their small and decentralized teams also increase the likelihood of convergence. This requires improved monitoring as convergence has the potential to exponentially increase threat variations as well as shifts in target selection and attack methodologies.

 

Monitoring the Threat

All too frequently, when monitoring threats or performing an analysis, no distinction is made between the different stakeholders the output is intended to support and the process’s contribution to business goals. As a result, analysts resourced to monitor the environment inaccurately portray what assets are at risk or how the threat can exploit them. In most cases, terror threats originate from more than one group using different strategies and tactics. Once the who, why, what and how have been analyzed, each threat is prioritized by considering their presence, previous activity and current capabilities to determine the level of risk each represent. At this point, threat motivations and capabilities are monitored for change with decision-makers understanding the absence of indicators should never be presumed as the absence of threats.

Also essential is the understanding that the time and location of every activity presents a unique blend of threats to be monitored. To assist in this effort, it can be helpful to establish an Event Profile of the threat modes, duration, effects and conditions. Another way to aid threat monitoring is through the use of Suspicious Activity Reports. However, one of the most often overlooked resources is establishing relationships and communications with governments, law enforcement and other location-relevant organizations.

Communications are paramount in effectively monitoring the threat and alerting personnel of changes in its intensity. Leadership’s common response to increasing risk is to inform everyone to be vigilant and heighten their situational awareness. Unfortunately, what is routinely missing from this advice is training in how to go about it. Without training, this communication creates the dangerous illusion that risk has been sufficiently addressed while unknowingly creating an opportunity for significant peril.

 

Reducing Expat/Traveler Risk

It is well known that it is the state’s responsibility to proactively reduce risk to the public and maintain the ability to mount an effective response based on intelligence resources. Also widely acknowledged is that duty of care requires businesses to take all reasonable steps necessary to ensure their employee’s wellbeing. Given the ease of identifying expats and the shared vulnerabilities of travelers in transit, the most effective means to reduce expatriate and traveler risk is for them to learn how to manage their risk profile based on prediction versus response. There are several automated risk management tools available to assist in this effort. Regrettably, this assistance often leads to an abdication of ownership for one’s personal safety by transferring unwarranted levels of reliance onto these technologies. As advanced as many of these tools are, there remains a need to offset the overconfidence in their capabilities. In addressing this offset, regardless of position, it is wise to invest in developing risk management competencies to ensure that every leader and employee understands what to protect, what to protect it from and what to protect it with. In order to leverage these competencies and further reduce the risks in today’s entropic environment, risk management must be treated as a formal business process.

One of the risks for expats and travelers that benefits terrorism is the terrorist’s ability to reach targets with relative ease. Among the factors that contribute to this are loose border controls and the development of transient infrastructure which unwittingly aid and support terror recruitment, fundraising and other logistical functions. As events trending on social media can push unstable actors on the fringe to act, it is important for everyone to know how to quickly recognize and respond to changes in their risk profile. Adding this capability to a business’s duty of care efforts will ensure a requisite level of employee preparedness, enhance and expand risk monitoring and forgo accepting crisis management as the only viable response.

The battle for society’s hearts and minds rages as societal fear and government fragility permit the terrorists to pursue their apocalyptic vision unabated. Although numerous businesses operate within this environment, there remains a resistance to develop and manage their operational risk profile beyond a cursory level. Given terrorism’s effectiveness in exploiting social dysfunction and the resulting consequences of terror-related events on society at large, the evidence is overwhelming that businesses and travelers must expand their abilities to counter the effects of ‘new age’ terrorism; otherwise, brace for impact.

KEYWORDS: executive protection international security security risk management Terrorism travel security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael payne

 Michael Payne, CPP, CBCP, is the Organizational Resilience Manager for iJET International, an Integrated Risk Management company providing custom intelligence, preparedness, and response solutions. He has more than 30 years of experience planning, training, and leading these solutions at the operational and strategic level for multi-national corporations and within the U.S. government.  In times of crisis, Payne assumes the role of Global Operations Incident Manager leading crisis and resource surge management efforts for major natural disasters, socio-political situations and terrorism critical response operations. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Operational Risk management model © iJET International, Inc. All rights reserved.

    Proactive Planning for International Response and Recovery

    See More
  • SEC1020-Business-Feat-slide1_900px

    Mitigating the risks of business travel during the pandemic

    See More
  • public safety - police

    The new age of safety and security

    See More

Events

View AllSubmit An Event
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing