Man Hunting, The Sport of Security Forces

Tracking Down Salah Abdeslam

Image for post
Image for post

Bottom Line Up Front

  • Intelligence agencies must cooperate more rapidly and proactively to counter ISIS’ rapid and haphazard operational tempo.
  • Clandestine operatives must rely on support networks that include overt members of the public. These networks are easily mapped out based on metadata available to nation state level security forces.
  • Fugitives should learn to cook if they want to minimize their footprint and improve their security.
  • Exposure of clandestine networks is inevitable, given modern data sources. Only extremely disciplined non-organic organizations can hope to survive for long.

“Changed my mind, haven’t seen Paul Blart Mall Cop 2 yet”

Salah went missing after he wimped out of “martyrdom,” ditching his suicide vest and calling friends to come pick him up and take him home. The car was stopped by the French and everyone IDed, but their names weren’t available to the police yet.

Defunct Safe Houses

The Molenbeek area where Salah has been hiding is riddled with radical support networks and sympathizers. He was able to rely on his friends and other support networks. Police targeted elements of these support networks, and eventually discovered a link to Salah himself.

Social Networks, Not Just For Entrepreneurs

Big Data Analysis Beats Covert Networks

Modern connected society is a huge data source for the intelligence analyst. Social connections are mapped out via online social networks such as Facebook, but also in meat space via the mobility of personal tracking devices such as mobile phones. An underground operative, such as Salah, can avoid using mobiles and computers, but the various elements of his above ground support network are as reliant on modern tools as anyone else.

“The guerrilla must move amongst the people as a fish swims in the sea.” — Mao Zedong

The problem for underground operatives is that they are reliant on support networks. Support networks for clandestine organizations are almost always based on social networks. Modern society makes support networks an open book for anyone with access to the data (social apps, telco records, etc) and the analytic tools to parse that data (eg Palintir, analysts notebook, etc).

If there is real risk involved, as in political or criminal undergrounds, people build links in the secret society through stronger ties. One result is that secret societies rarely have the lovely cell structure that people think is best for overall organizational secrecy and survival. Most underground networks just grow along the messy lines of pre-existing strong ties, unless some people have enough resources to control this growth and force it into a more hierarchical outcome.

Tracing threads has become trivial (even with encrypted comms), the hard part is merely finding an entry point.

Written by

Information Security Researcher :: https://gru.gq :: keybase.io/grugq :: https://www.patreon.com/grugq

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store