How did the Terrorist Attacks in Norway Change the Country?

How did the terrorist attacks in Norway change the country? That question has been put to three social scientists at the University of Stavanger (UiS).

"Norwegians are still in a state of shock," said professor Odd Einar Olsen. "These incidents were so extensive and gruesome that people need time to come to terms with them."

He is very interested to see what content Norway will give to promises made about more openness and democracy after the car-bombing in Oslo and the massacre at Utøya north of the capital.

"While people have united in sorrow, a crippling consensus has emerged that certain subjects can't be discussed. That's a sinister development which could undermine necessary criticism."

To illustrate his case, Prof Olsen points to the debate on the data storage directive, a security measure adopted earlier in Norway this year.

"If this discussion had arisen now, it would have been conducted very differently," he maintains. "Opponents would have been much more cautious and unassertive."

He regards that as a major challenge for the future, and fears that the trend will be towards an extension of over-exaggerated surveillance and many additional security measures.

"The media picture is characterized by calls for 'something to be done', and an expansion in security is the response," Prof Olsen notes.

"It's frightening to read articles shrieking for more sharpshooters and special forces with a 'license to kill'.

"The danger with the crippling consensus is that nobody dares to question what's happening. Society will be transformed. Slowly but surely, we're shifting towards a security regime characterized by intelligence gathering and surveillance."

No greater threat

He is backed by fellow professor Ole Andreas Engen and postdoctoral researcher Bjørn Ivar Kruke, who say the terrorist threat in Norway is no greater than it was before 22 July.

"Although it might seem insensitive and arrogant to say so, little has actually changed after the attacks in Oslo and on Utøya," Engen said.

New measures should therefore be as limited as possible, he argues. Norway has what it needs to guard against threats, in so far as protection from "the unthinkable" is attainable.

The terrorist attacks in the USA on Sept. 11 were followed by a number of security measures in Norway at such locations as airports, ports and embassies. New anti-terror legislation was also adopted by the country, with increased powers extended to the police and defense forces.

"The attacks on the government buildings in Oslo and the youth camp on Utøya put our emergency response to the test," Dr Kruke adds.

"With hindsight, you can naturally discuss whether the contingency plans were good enough. We must learn from these incidents. New measures must be based on a detailed analysis of the response, and not on ad-hoc action which could quickly create a false sense of security", he says.

"Very clear lines of command and systems are now in place. Within these frameworks, much improvement is naturally possible. The challenge is to get the systems to work well together."

The UiS researchers believe that the police, the police security service (PST) and the Ministry of Justice will have much to answer for in the time to come.

Recurring questions are likely to be security in the government quarter, use of resources in the PST, the police response to the Utøya shootings and security at Utøya Camping.

"However, nothing ever goes smoothly in a crisis," observes Prof Olsen. "That's in the nature of an emergency. But you can discuss whether the failures were serious or to be expected."

In his view, the cost of maintaining full emergency preparedness nationwide and around the clock would be exorbitantly high.

The need for security

"People naturally need to feel secure, but the chance of terrorism in Norway is actually very small," he adds. "Statistically, we should fear cancer, cardiovascular diseases and road accidents."

Asked what Norway should do now, Prof Engen calls for a debate on what societal safety is and should be. "That's a question of the kind of society we want."

He says it will only be possible to say whether the terrorist attacks will change Norway positively or negatively once the commission of inquiry has reported and measures are proposed.

In his view, the 2000 report from Norway's commission on the vulnerability of society could provide an important basis for such a debate. It remains the only official document to analyze systematically how vulnerable the Norwegian community is.

But Prof Olsen does not think that a proposal in the report to concentrate resources in a separate ministry of homeland security would be the best solution.

"That solution would also represent a concentration of power which could ultimately undermine security. Everyone thinking the same way constitutes a danger".

"We need several organizations with different perspectives on what's dangerous and what should be done."

"In addition to a general debate, we need a further assessment of any measures the July 22 commission will propose," says Prof Engen, and is backed by Dr Kruke and Prof Olsen.

"If we're going to learn from these attacks, we need something more than this commission will be able to manage," he adds.

The trio believe that the inquiry team's composition indicates that its work could be difficult, and are therefore waiting with interest to see if it will raise major and sensitive issues. These include such questions as ways in which coordination within the police and support from military forces could have been improved.

"The lessons must be drawn in complete openness," Engen said. "After such a serious crisis, many people will fear being treated as scapegoats."

"To secure closure for the crisis, big issues must be discussed in the public arena," Kruke said. "And there must be scope for criticism. The more that goes on behind closed doors, the longer the crisis will remain alive with the general population."

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities