|By PR Newswire||
|March 24, 2014 03:44 PM EDT||
SAN JOSE, Calif., March 24, 2014 /PRNewswire-USNewswire/ -- The FBI arrested a California National Guard reservist on March 17 as he headed for the Canadian border on his way to Syria. Once in Syria, Nicholas Michael Teausant, who is also a student at San Joaquin Delta Community College in Stockton CA, planned to join the Islamic State of Iraq and the Levant (ISIL). The Mineta Transportation Institute's (MTI) security experts Brian Michael Jenkins and Bruce Butterworth offered some insight into the history of these kinds of transit attacks based on data collected in MTI's proprietary database on surface transportation attacks around the world.
Mr. Jenkins, director of MTI's National Transportation Safety and Security Center, said, "Although he had never attended the army's basic training course and was in the process of being discharged by the National Guard for failing to meet 'basic education requirements,' Teausant thought he could teach the Syrian jihadists shooting skills and urban warfare tactics."
Determined to deliver what he described as "a maximum blow to the US government," Mr. Teausant told a confidential informant working for the FBI that he had previously planned to bomb the Los Angeles subway and had inquired about buying powerful fireworks, presumably to use in an improvised explosive device. Teausant was charged with attempting to provide support to a foreign terrorist organization.
Is this case unusual? Not at all, says Mr. Jenkins. Buses, trains, and subways – unlike airliners – must provide more access points for the public and are more difficult to secure. They feature more prominently in attacks and plots. And the hardest to detect may be those involving one person – the "lone wolf" attacker – because they may not be collaborating with anyone.
Who is Nicholas Teausant?
It is not clear from the indictment how far Mr. Teausant's plan to attack the subway had progressed, noted Mr. Butterworth. Mr. Teausant told the informant that the plan had been "all set up," but he and the other plotters then "called it off" because he had heard about some arrests by the FBI and feared that the plot might be compromised.
Mr. Teausant, 20 years old, an American citizen, and a convert to Islam, appears to have had problems at home. He worried that his mother, whom he called an infidel, would betray him. But that, he said, would give him "an excuse to put a bullet in her head and five or six bullets in [his] stepfather's head."
Once in Syria, Mr. Teausant had ambitions to become a commander and be "on the front of every newspaper in the country." He said, "Like, I want my face on the FBI's top twelve most wanted. Because that means I'm doing something right."
Mr. Teausant's mother told reporters that her son might have been motivated to join militants in Syria after learning he would be discharged from the National Guard.
Transit attacks have a long history.
According to the two MTI security experts, Mr. Teausant's selection of LA's subway system parallels other homegrown terrorist plots in the United States and elsewhere. The March 11, 2004 bombing of Madrid's commuter trains by al Qaeda-linked jihadists, which just over ten years ago killed 191 people, has continued to be a source of inspiration. On July 7, 2005, four al Qaeda-inspired suicide bombers carried out bombings on London's Tube and a city bus, killing 52. Another four jihadists attempted to replicate this attack two weeks later, but their bombs failed to detonate. In 2007, bombs planted aboard a commuter train in Mumbai killed 2007.
Other terrorist plots targeting subways or commuter trains were uncovered in London in 2002 and 2003, Sydney in 2005, Milan in 2006, and Barcelona in 2008. Plots in the United States include a 2003 al Qaeda plot to disperse poison gas in New York's subways, a 2004 plot to bomb New York's Herald Square subway stations, a 2006 plot to blow up the subway tunnel under the Hudson River, a 2008 plot to carry out a terrorist attack against the Long Island Railroad, a 2009 plot to carry out suicide bombings on New York's subways, and a 2010 plot to bomb Washington DC's Metro. Of these, the 2009 plot, for which Najibullah Zazi had already prepared the explosives, posed the most immediate threat.
Out of 44 homegrown jihadist terrorist plots in the United States as of March 2014, five were directed against subways or commuter trains, including Teausant's alleged plan. In addition, two more plots prepared abroad targeted subways. In all, there were seven plots to attack surface transportation in the US.
Plotters go tor high body counts.
These plots are discussed in Carnage Interrupted: An Analysis of Fifteen Terrorist Plots against Public Surface Transportation (San Jose: Mineta Transportation Institute, 2012, free download). The MTI report notes that in all the cases, the plotters hoped to achieve a high body count. Subways offered easy access and crowds of potential victims. Bombings during rush hours were a preferred course of action.
The plotters obtained information from readily available public sources and conducted their own reconnaissance. (It is not known yet whether Mr. Teausant conducted any research or reconnaissance.) In some cases, we know that the plotters observed security measures such as closed-circuit television. A jihadist terrorist manual advises would-be terrorists to avoid train stations with CCTV cameras. In cases where information is available, existing security measures did not prove to be a deterrent to the plot, but of course, we have no information on plots that may have been deterred. Intelligence efforts were the key factor in interrupting most of the plots.
More on average are being killed per attack.
"The relative infrequency but relative lethality of attacks against subway trains and stations can be quantified by the Mineta Transportation Institute's database of terrorist and serious criminal attacks on public surface transportation throughout the world," said Mr. Butterworth. "The subway system in particular is an attractive target, as are intercity and commuter trains and their stations, along with buses."
The database contains information on 3,754 attacks committed between January 1, 1970 and recorded as of March 10, 2014 against buses, bus stops, and stations; passenger and freight trains and their stations and tracks; passenger ferries (which have suffered some particularly lethal attacks) and their terminals; and road infrastructure. All these attacks killed 9,368 and injured another 33,506, killing an overall average of 2.5 people per attack.
There were 1,810 attacks (48 percent of the total) against buses, bus stations, and stops, killing an average of 3 people per attack. By contrast, there were 788 (21 percent of the total) attacks against intercity commuter and passenger trains and their stations, but they killed on average more people – 3.8 instead of 3.0 per attack
"But let's turn now to subway trains and their stations in this same time period," said Mr. Jenkins. "Since 1970, there were only 63 such attacks. They represent a small percentage – only 2 percent -- of the total. However, the lethality of attacks is considerably greater at six victims per attack. Yet, to be more accurate overall, when we remove the February 18, 2003 arson incident in Daegu, South Korea, the number of victims falls back in line with attacks against other targets. In this case, a mentally disturbed man ignited a fire that killed and injured a very large number of people – with 198 killed and 147 injured. Without this single incident, attack lethality drops to 2.9, which is less than for passenger trains and stations (which includes the March 11, 2004 attack against the Madrid commuter rail system, which killed 191), and slightly less than for buses."
IEDs increase lethality.
But the comparison changes when looking at attacks since 9/11. Even with the Daegu arson excluded, the 23 attacks that occurred since 9/11 killed 157, an average of 6.8 per attack. In addition, the only attacks that caused fatalities involved the use of improvised explosive devices, such as those used in the 2005 London subway bombings. Those 12 attacks using improvised explosive devices (IEDs) yielded a substantial fatality rate of 13 deaths per attack.
By contrast, the lethality for 1,190 bus attacks since 9/11 was only 3.1 deaths per attack, and the lethality for the 481 attacks against intercity and commuter trains and their stations was only 2.2 deaths per attack.
Comparing both frequency and lethality before and after 9/11 is even more revealing. While the frequency of attacks for bus targets increased from 19.5 per year before 9/11 to 103.5 per year after 9/11, lethality went up only slightly, from 2.9 to 3.1 deaths per attack. For intercity and commuter train targets, the frequency went from 9.7 attacks per year to 41.8 attacks, but lethality (excluding two highly lethal attacks in the rural areas of Angola and one in Cambodia before 9/11) decreased from 4.6 to 2.2.
Turning to attacks against subway targets, the frequency of attacks went up only slightly – from 1.2 per year to 2.0. But the lethality of those attacks increased eleven-fold, from an average of 0.6 to 6.8 fatalities per attack.
Finally, one can look at the most lethal combination of targets, explosive devices, and method of delivery in western or similar cities elsewhere. Of the ten most lethal combinations since 1970, five involved subway trains or stations; four involved commuter or intercity train stations; and one involved the December 2013 bus trolley attack in Volgograd, Russia.
Transit attacks are not new.
According to the MTI database, the most lethal of all the 10 attacks was the August 2, 1981 bombing of the Bologna train station by a neo-fascist terrorist organization, which killed 85 people and injured more than 200. This demonstrates the long history of these attacks. The second and third most lethal combinations were the February 6, 2004 bombing of a Moscow metro train in a station by a Chechen terrorist group, killing 40 and injuring 122 with a single bomb, and the March 28, 2010 attack by two Chechen suicide bombers who detonated their devices in two underground Moscow metro stations, together killing 40 people and wounding at least 58. The other attacks include the infamous Madrid commuter train and London tube bombings, as well as the December 29, 2013 bombing against a train station in Volgograd.
Clearly, subway trains and stations, as well as passenger train stations, dominate the attacks using explosive devices in major cities
It is easy to understand, therefore, why so many plots target the urban subway and train systems and why the thoughts of this young jihadist recruit turned toward the metro system of Los Angeles, said Mr. Jenkins.
What to do?
Subway systems by their design have to remain open. Imposing airline-like security measures will make mass transit either slow, unable to carry masses of people, or both. Governments are working hard on detection measures, but these encounter many technological and operational limitations in the real transit environment.
Mr. Butterworth said, "Measures that make it harder for terrorists to predictably achieve success, such as roving patrols, random and selective screening, and improved CCTV monitoring, do help. And, of course, as we saw in the case of this would-be terrorist, competent intelligence and law enforcement intervention remains absolutely vital. We documented these in a 2007 MTI report, Selective Screening of Rail Passengers, and in a follow-up report in 2010, Supplement to MTI Study on Selective Passenger Screening in the Mass Transit Rail Environment. Both are available for free download."
Meanwhile, keeping both passengers and employees alert is key. "See Something, Say Something" may sound trite and tired in the rapid transit system, but it can work. While the MTI database doesn't reveal a huge number of cases where it did work, in the 3,754 attacks recorded against train, bus and other targets, there are indications that in somewhat less than 400, someone interrupted the attack. Sometimes the narratives do not specify who took the initial action (in about 170 cases). In other cases, they were interrupted by police, military, intelligence agencies, or anonymous tips. But we also know that in another roughly 45 cases, they were stopped by passengers or citizens in the area, and that in yet another 75 cases, by drivers or crew, transit employees, or security officials on the scene. Without these interventions, the collective death toll could have been much worse.
The experience of the bus system in Israel during the Second Intifada between September 2000 and the end of 2006 gives other examples that trained drivers and employees, and an alert traveling public, can reduce attacks or their lethality. We explored, along with an Israeli security expert, 16 cases of such attacks in a 2012 MTI study Security Awareness for Public Bus Transportation: Case Studies of Attacks Against the Israeli Public Bus System . In eight of the 16 attacks, good security measures and security awareness "played a role in stopping the attack or at least mitigating its consequence," although in some cases, poor tactics and bomb-making skills were also involved.
"Yes, our necessarily open transit system and our riders are, unfortunately, targets for people like Teausant," said Mr. Butterworth. "And yes, airline-like security isn't appropriate for open systems such as mass transit. But solutions are being investigated, in part by using data such as this. In the meantime, we are not helpless, nor should we see ourselves that way."
ABOUT BRIAN MICHAEL JENKINS
Brian Michael Jenkins is an international authority on terrorism and sophisticated crime. He directs the Mineta Transportation Institute's (MTI) National Transportation Safety and Security Center, which focuses on research into protecting surface transportation against terrorist attacks. He is also a senior advisor to the president of RAND. From 1989-98, Mr. Jenkins was deputy chairman of Kroll Associates, an international investigative and consulting firm. Before that, he was chairman of RAND's Political Science Department, where he also directed research on political violence. He has authored several books, chapters, and articles on counterterrorism, including International Terrorism: A New Mode of Conflict and Will Terrorists Go Nuclear? Most recently, he published When Armies Divide, a discussion about nuclear arms in the hands of rebelling armies. He also has been principal investigator for many peer-reviewed security-focused research reports for MTI.
ABOUT BRUCE R. BUTTERWORTH
Mr. Butterworth has worked at congressional, senior policy, and operational levels, including with the House Government Operations Committee, Department of Transportation, and the Office of the Secretary. He managed negotiations on air and maritime services in the General Agreement on Tariffs and Trade (GATT) (now the World Trade Organization), chaired U.S. delegations to United Nations committees, and was part of the response to the bombing of Pan Am 103. He was an executive in airline security, and he launched a successful program of dangerous-goods regulation and cargo security after the 1995 ValuJet crash. He worked closely with Congress and other federal-level agencies and departments. Currently, he is a research associate at the Mineta Transportation Institute. Mr. Butterworth received an MS degree from the London School of Economics and a BA degree from the University of the Pacific (magna cum laude). He was a California State Scholar and a Rotary Foundation Fellow.
ABOUT THE MINETA TRANSPORTATION INSTITUTE (MTI):
MTI conducts research, education, and information transfer programs focusing on surface transportation policy and management issues, especially related to transit. MTI was established by Congress in 1991 as part of the Intermodal Surface Transportation Efficiency Act and won national re-designation competitions in 2002, 2006 and 2011. The Institute is funded by Congress through the US DOT Research and Innovative Technology Administration, by the California Legislature through Caltrans, and public and private grants. In 2006 the US Department of Homeland Security selected MTI as a National Transportation Security Center of Excellence. The internationally respected members of the MTI Board of Trustees represent all major surface transportation modes. MTI is the lead institute for the Mineta National Transit Research Consortium, an affiliation of nine university transportation research centers. MTI is affiliated with San Jose (CA) State University's College of Business. Visit transweb.sjsu.edu
Contact: Donna Maurillo
MTI Communications Director
donna.maurillo (at) sjsu.edu
SOURCE Mineta Transportation Institute
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 3, 2016 05:45 PM EDT Reads: 1,236
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 3, 2016 05:45 PM EDT Reads: 181
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 3, 2016 05:15 PM EDT Reads: 1,205
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
May. 3, 2016 05:15 PM EDT Reads: 1,084
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 3, 2016 05:00 PM EDT Reads: 212
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
May. 3, 2016 05:00 PM EDT Reads: 168
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
May. 3, 2016 04:15 PM EDT Reads: 1,244
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 3, 2016 04:15 PM EDT Reads: 832
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 3, 2016 04:15 PM EDT Reads: 225
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 3, 2016 04:00 PM EDT Reads: 1,277
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
May. 3, 2016 04:00 PM EDT Reads: 990
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 3, 2016 03:45 PM EDT Reads: 1,068
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
May. 3, 2016 03:30 PM EDT Reads: 1,166
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 3, 2016 03:15 PM EDT Reads: 1,056
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 3, 2016 03:15 PM EDT Reads: 659