Geopolitics Magazine January - February 2016 | Page 82

There are a lot of other statements and possible indications that terrorists may have been able to seize some “dormant” pathogens and viruses from labs or even bought them at black market. Bu t will they be willing to use them? Answer is a simple Yes. According to RAND report such an action is highly probable and states should be prepared for it in the near future. Second and maybe more visible attacking method is via CyberWorld. It is no secret that terrorists are already using all new forms of communication to remain hidden and at the same time maintain contact with their teams and leaders. Somehow this according to recent Intelligence Report by USA will be changing and will form an offensive tactic against infrastructure or even more “soft targets” on the networks. According to former ASIO head David Irvine statement terrorists are very near of being able to launch such a massive attack: "While terrorist organizations have not yet exhibited sophisticated cyber-attack capability, we must anticipate, given the sophistication they demonstrated in using the internet for propaganda and other reasons, that they could well seek to develop destructive attack capabilities in the near term." What is even more interesting though is that these attacks, as said previously, won’t be limited only to infrastructure and network services, but they will aim also at “soft targets”. This means that even specific individuals might become targets depending on their profession, fame, etc. For example first responders are a very easy target and very valuable to terrorists since their gear and uniform might be used as a camouflage for them in order to accomplish their goals. So a first responder or even his family might become a target over the web at first where personal details will be gathered and then used by terrorists. This might be also applied against people that possess certain wealth or items needed by terrorists. We need to keep in mind here that the line between crime and terrorism is common and very thin. Same deal stands for those persons too, as more and more people tend to advertise them over web and social media, by giving willingly persona l details of their lives and relatives along with their hobbies and other data that could fit into a possible victim’s profile. Third method of attack is already in play. We have been seeing attacks all over the globe by use of firearms or even machetes in the hands of single terrorist. They just feel familiar with what terrorists represent on their propaganda material and subject themselves to radicalization. Then as part of their initiation might try to launch an attack. This will be done without getting caught or killed as it happened at Paris by the second generation migrants who fled to Belgium. Small arms, knives, even bats and kitchen knives might be used by a terrorist who just thinks he is offering services to the cause and act on behalf of something greater than him against enemies. This method is very hard to predict and prevent. There are no models or patterns to monitor (other than the behavior in early stages of radicalization) and single attackers are very hard to stop, especially if they get trained by manuals or by using existing methods of society (eg. Handling a knife is an easy lesson for a butcher in a shop). Geopolitics.com.gr all rights reserved 2016 Page 80