Analysis of 15 Failed Terrorist Plots Against Surface Transportation Provides Insight into Tactics, Weapons

The Mineta Transportation Institute has released its newest research report, Carnage Interrupted: An Analysis of Fifteen Terrorist Plots Against Public Surface Transportation, which examines several factors in 13 plots that authorities uncovered and foiled before attacks could be carried out. It also presents an additional two cases in which terrorists attempted to carry out attacks that failed. Principal investigators were Brian Michael Jenkins and Joseph Trella.

"We can learn much from terrorists' failures," said Mr. Jenkins, "because they provide insights into terrorist ambitions, clues to possible new directions in tactics and weapons, and details about how the plots evolve. These details often are more difficult to discern when an attack has succeeded and its perpetrators are dead or have fled."

The reports analyze plots in the West from 1997-2012, primarily in the United States and the United Kingdom because they have been frequent targets. These incidents have involved publicized arrests and trials, which provide additional information.

Among others, the 15 plots include:

  • 1997 – Flatbush Plot (New York)
  • 2002 – Poison Gas on London Underground Plot
  • 2004 – Herald Square Bomb Plot (New York)
  • 2005 – Melbourne and Sydney Terrorist Plots
  • 2006 – Milan Metro Bomb Plot
  • 2006 – Attempted German Train Bombings (Cologne)
  • 2008 – Barcelona Metro Bomb Plot
  • 2009 – Zazi Bomb Plot (New York)

  • 2010 – Washington Metro Bomb Plot (Washington, DC)

Jenkins explains that these plots were part of an ongoing global campaign of terrorism directed against a variety of targets in Western nations. The campaign was inspired by continuing exhortations from al Qaeda and waged by individuals or small groups determined to be part of the global armed struggle.

The report describes each plot in terms of the terrorists' plan, their motivation, objective, target selection, tactics and weapons, reconnaissance, timing, security measures in place at the target, and how the plot was disrupted.

Jenkins said, "Terrorists tend to imitate what's been done before, so they will try to replicate attacks -- including targets, tactics, and techniques -- that they see as successful. It is not possible to identify the source of inspiration or instruction for all of the 15 cases, but some spectacular precedents are likely to have inspired these plots. For example, four of the plots involved chemical or biological substances -- poison gas or ricin. It seems highly likely that the plotters in these cases had in mind the 1995 sarin attack in Tokyo, where terrorists dispersed nerve gas in subways, killing 12 and sending over 5,000 to hospitals. Further inspiration and instruction came from al Qaeda's own interest in chemical and biological weapons."

Jenkins further noted that none of these exotic plots succeeded. Indeed few progressed beyond the talking stage, and it seems doubtful that any would have resulted in mass casualties.

"By mid-decade the poison fad was over," he said. "Meanwhile, terrorists in Madrid and London demonstrated that by using more reliable explosive devices on trains and subways, terrorists could achieve the slaughter they desired. Multiple bombs became the new prototype for terrorist attacks, a pattern that continued through the end of the decade."

The complete report is available for free download at http://transweb.sjsu.edu/project/2979.html.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3