TrapWire MENU

TrapWire Articles

Working Against Modern Terror Cells: A Change in Tactics

This is an excellent article on the make-up of a modern Jihadist terror cell. We have noted for some time (even prior to 9/11) the fact that many terror “cadres” are built around family ties. Much like the Mafia and other organized crime groups, the honor code amongst family and clan members helps ensure loyalty and the Jihadist version of “Omertà.” … [READ MORE]

A Well-Planned Assassination

In response to several queries we received about the tactics used by the RAF we have decided to post an analysis of an assassination carried out by the RAF in Germany in 1989. … [READ MORE]

Berlin Attack Fits Recent Terror Pattern

The attack against a Christmas market in Berlin follows an all too familiar pattern. … [READ MORE]

Orlando Nightclub Shooting: A Disturbing Pattern

While details are still emerging, all indications are this was a terror attack possibly carried out by a jihadist inspired individual or group. The Orlando shooting fits a troubling pattern of attacks targeting crowded public entertainment venues such as what happened in Paris, Brussels and Tel Aviv. … [READ MORE]

How To Spot a Terrorist: The Dangers of Profiling

Beginning with the Baader-Meinhoff group in Germany the 1970s, to Timothy McVeigh in Oklahoma, and on through Anders Breivik in Norway, terrorists have been motivated by a wide-variety of causes. As such, security professionals must not focus exclusively on ethnic profiling, but rather on the actions and activities associated with preparing for an attack. … [READ MORE]

New ISIS Hit Lists

TRAPWIRE analysts have been closely following developments related to the alleged new ISIS targeting list which appears to include private citizens in addition to government employees and security officials. … [READ MORE]

The Pre-Attack Sequence

Understanding the goals (and limitations) of hostile reconnaissance operations should be part of every law enforcement and private security training program. While their intelligence collection practices are critical to their success, they also represent a major vulnerability. Knowing how to exploit that vulnerability is key to establishing an effective defense against terrorism. The first step in that process is understanding the Terrorist Pre-Attack Sequence. … [READ MORE]

ALERRT Conference

We had a great time at the ALERRT conference; thanks again to our hosts.  We enjoyed conversing with visitors to our booth about TRAPWIRE’s unique approach to security, and our training session on surveillance detection was very well received.  We look forward to next year. … [READ MORE]

12