SOFREP has partnered with Escape the Wolf and their Predator series to bring you articles that address an increased threat environment in the US and abroad. In May we will offer a boosted membership that will allow our Team Room members to tap into Escape The Wolf programs at discounts made available exclusively for our community. With this partnership you will be able to tap into the top experts in the world on a regular basis when considering how to better protect yourselves and your family.
Brandon Webb, Editor
What makes us unique and our articles invaluable are our bench of Professional Predators and debriefed bad guys. Our lessons collect bad guy dirty tricks and professional tactics combined together to provide a capability for our members. Basically, each lesson will give you a capability NOT a familiarization. Whether its cyber threats, active shooters, rapist or murderers – we will cover the counter tactics.
You've reached your daily free article limit.
Subscribe and support our veteran writing staff to continue reading.
SOFREP has partnered with Escape the Wolf and their Predator series to bring you articles that address an increased threat environment in the US and abroad. In May we will offer a boosted membership that will allow our Team Room members to tap into Escape The Wolf programs at discounts made available exclusively for our community. With this partnership you will be able to tap into the top experts in the world on a regular basis when considering how to better protect yourselves and your family.
Brandon Webb, Editor
What makes us unique and our articles invaluable are our bench of Professional Predators and debriefed bad guys. Our lessons collect bad guy dirty tricks and professional tactics combined together to provide a capability for our members. Basically, each lesson will give you a capability NOT a familiarization. Whether its cyber threats, active shooters, rapist or murderers – we will cover the counter tactics.
Predator: Cullen TenEyk: Joint Special Operator, Global Shooter of Bad Guys and extremely professional predator of all enemies to the United States.
Discussion: I agree with Joshua Keating’s comments in his September 2013 Slate Magazine article, “Why Shopping Malls are Attractive Targets for Terrorists”, where Keating suggests that the primary lesson learned from the swarming siege at the Westgate Mall in Nairobi, Kenya in September 2013 by Somali Al Shabaab jihadists is that Al Shabaab appears to have developed a global reach, and Al Qaeda is certainly not on the run.
It leads me to wonder how vulnerable we are in the U.S. to similar swarming attacks by homegrown surrogate groups or individuals. Are ideologies, motivations and relationships with larger, perhaps international sponsors relevant in our analysis to develop deterrence, preventive and response measures? Or can we develop generic prevention and response procedures that are independent of those considerations?
The idea that terrorist groups or individuals will target shopping centers for attacks is not new. Keating cites a 2006 Rand Corporation analysis warned that, “in terms of their potential role as terrorist targets, shopping centers present numerous challenges for security.” The study also reported that there have been over 60 terrorist attacks against shopping centers in 21 countries since 1998.
Shopping centers and malls can attract crowds of people, and, as the Rand study suggests, “allow unimpeded access to the public and attract a wide cross-section of the nation’s population”. Therefore, U.S. shopping malls make particularly attractive soft targets, and we can expect them to feature prominently in future attacks; it’s a threat that is unlikely to fade anytime soon. Indeed, there is evidence that international terrorists or groups have threatened to attack malls in the United States, although none of those threats or planned attacks have been implemented.
Furthermore, shopping centers and malls “differ markedly from facilities like airports, which provide an essential service with few alternatives,” the Rand study authors write, and “[f]or this reason, shopping center customers and tenants may not tolerate the expense and inconvenience of increased security.” Moreover, malls often have complex ownership and stakeholder structures that “increase the difficulties of implementing security and other risk-reduction measures.” The high marginal costs of additional security measures force many mall managers to discard those measures.
The result is that most shopping centers and malls throughout the U.S. remain relatively unprotected from well-planned swarming attacks. On the other hand, anecdotal evidence suggests that many Americans may not tolerate preventive measures that would keep them safe.
We know that jihadist groups often conduct thorough after action reviews of other successful and unsuccessful attacks around the world to build on success and to improve on mistakes. Al Shabaab seems to have modeled the Westgate Mall attack on the 2008 Mumbai, India attack conducted by the Pakistani group Lashkar-e-Taiba, with minor variations. We can expect groups or individuals to build on the India and Kenya attacks to refine their methods as they conduct reconnaissance for the next vulnerable soft target.
We can presume that most of these groups and individuals will conduct all or part of the phases traditionally associated with an attack cycle, and I will explore those phases in a subsequent posting. Building on that presumption, we can then develop collective and discrete strategies and tactics to detect these subtle or overt early warning signs of a potential attack which, in turn, allows stakeholders to develop, fund, coordinate and rehearse the most effective prevention and response measures.
Given the potential for individuals or groups to increase these types of attacks in the U.S. calls for public and private stakeholders at all levels to integrate resources and develop a unified response to this growing threat. State and federal law enforcement and intelligence efforts will continue to develop templates that help stakeholders at any soft target recognize activities indicative of the planning phase of these operations. Meanwhile, I propose that our near-term efforts should focus on the development of a formal stakeholder consortium to sponsor a nation- wide effort to educate citizens on how they should respond to such an attack.
So, for now, we can focus our discussion on this question: What immediate actions should you take in the event of a terrorist or active shooter attack? The U.S. Department of Homeland Security (DHS) along with recent lessons learned from the Nairobi Westgate Mall and other attacks, such as the Columbia, Maryland mall attack, offer procedures that apply in nearly any venue.
DHS defines an active shooter as, “[a]n individual actively engaged in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims.”
Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims.
Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.”
Awareness, training and rehearsal of the following immediate actions will go a long way to increase the odds of surviving an active shooter incident.
Tactics: Immediate Actions: RUN, HIDE, FIGHT!
RUN. Have an escape route and plan in mind. Move away from the assailant immediately, keep your hands visible. Leave your belongings behind. If the assailant is active inside a specific building, move immediately to a safer location away from the assailant, only if it is safe to do so. If you find yourself in an open area, immediately seek protection:
HIDE. Always try to hide with an exit strategy. Hide in an area out of the assailant’s view. Silence your cell phone and/or other digital devices. Secure the immediate area. Whether a classroom, office, residence hall room, restroom, or other type of confined or contained space:
Call Out. USE CAUTION – Call for help using mobile devices, landline, email, text and radios to get first responders moving to your location. Attempt to provide information in a calm clear manner so that the other person can understand the situation and assist quickly with the right kind of response. You may hear multiple rings – stay on the line until it is answered – do not hang up. Be prepared to provide as much information as possible about the situation and assailant(s), including:
FIGHT. The goal is create enough space and time between you and the assailant to escape to relative safety. As a last resort and only when your life is in imminent danger, and only if other options have failed or unavailable, attempt to incapacitate the assailant. Act with physical aggression and violence of action; throw anything available at the assailant. Work as a team when with others.
Response Forces. Civil, military or private forces, or a mix of these elements, may respond to the incident. Other emergency service (EMS) agencies, such as fire and rescue, may respond to the site but will not be able to enter the area until it is cleared and secured. You may need to treat the injured as best you can until the area is secure.
Responders will attempt to locate, contain, and stop the assailant. The safest place for you to be is inside a secure room. The assailant may not flee when responders enter a building, but instead may target arriving officers.
Responders will attempt to establish safe corridors for persons to evacuate. This may be time consuming. Remain in secure areas until instructed otherwise. Remember to:
After evacuation you may be taken to a staging or holding area for medical care, interviewing, counseling, etc. You may be searched. Once you have been evacuated you will not be permitted to retrieve items or access the area until someone releases the crime scene. Remain inside the secure area.
Injured Persons. Initial responders will not treat the injured or begin evacuation until the threat is neutralized and the area is secure. You may need to explain this to others in order to calm them. Once the threat is neutralized, officers will begin treatment and evacuation.
Look for continuing monthly updates via SOFREP & Our Predator Monthly Security Lessons
(Main photo: Reuters/Ray Stubblebine)
Join SOFREP for insider access and analysis.
TRY 14 DAYS FREEAlready a subscriber? Log In
COMMENTS
You must become a subscriber or login to view or post comments on this article.