Professional Documents
Culture Documents
JEAN-LUC MARRET
Senior fellow, FRS and Center for Transatlantic
Relations, Sais-Johns Hopkins University
EMMANUEL CLAVAUD
SDIS-04 Director, Firefighter,
Associate fellow, FRS
The attack in Norway, like every attack with a tragic events cannot only be perceived in this
major impact, should and will be carefully analy- way. Above all, the operational planning, as pre-
zed, both by police and by terrorists. If the Nor- sented in the now famous book titled 2083 – A
wegian authorities have officially called for a European declaration of independence, seems
technical evaluation of Counter-terrorism (CT) unprecedented. It presents and analyzes in a
and rescue national services, many sensitive as- particularly structured way, the protocol used by
pects still remain unsure: Breivik to prepare his attack. This is displayed
The profile and motivations of Anders Breivik from the initial idea, to the training, testing, the
Behring will be highly debated, and almost sure- search for precursors (explosive, ammo, indivi-
ly politically exploited. In particular, time will dual ceramic body suits), etc., and to the opera-
tell, because this attack probably crystallized in tional phase itself, including elements of action
Europe the first major violent answer to what vis-a-vis a possible SWAT team counter-strike.
some people on the political fringes, among the The author very likely studied recent terrorist
heterogeneous networks of the radical and non- events (cells dismantling and failed or successful
democrat far-rightists, see as an existential attacks). Most impressive, the systematic way he
threat – e.g. multiculturalism. However, these thinks about (and describes in his book) concre-
te means to hide his preparatory activities will Communist Colonel Julius Louis Amoss, who, in
most likely be seen as a sort of model for copy the early 1960s, defined the strategy as a defense
cats („Stealthy process‟). Truly, the possibility to against a Communist takeover of the United Sta-
reproduce such a terrorist attack seems to be the tes.
most serious problem. In the late 1990s white supremacists Tom Metz-
Lastly, the Norwegian police behaviour does not ger and Alex Curtis popularized the term „lone
appear to have been particularly adequate. This wolf‟. They envisioned lone-wolf and small-cell
country does not appear to have a strong opera- activism to be considerably more difficult to de-
tional security culture. tect and consequently, to dismantle than other
forms of terrorism. Curtis encouraged acting alo-
Profile and motivations ne in committing violent and heinous crimes so
This aspect is obviously the most interesting for that they would not incriminate others. Both
the media. It is probable that there is not here men recognized the opportunities the Internet
any simple answer. offered for the dissemination of information and
the communication with fellow militants.
Lone-wolf and Leaderless resistance? The most famous example of “leaderless resis-
The solitary dimension of Breivik, if it is confir- tance”/”lone wolves attack," until Oslo attacks, is
med, could be indicative of several aspects: First, certainly the attack perpetrated against the Al-
an operational loneliness directly coming from fred P. Murrah Federal Building in Oklahoma
white supremacists‟ practices. This aspect, which City on April 19, 1995, by T. McVeigh and Terry
needs to be assessed in-depth, is rather a com- Nichols. It must be noticed that the explosive
mon practice among violent supremacists' net- devices used in both cases are pretty much simi-
works. Two concepts, defined in the U.S., sum- lar (ANFO based). Having said that, it is certain-
marize this attitude: Lone wolf terrorism and « ly necessary to verify by a principle of precaution
leaderless resistance » which underlines the if the entity that Breivik claimed to have created
absence of pyramidal structure in a terrorist or- with others in 2002 throughout Europe and
ganization, and implies autonomous cells (this North America, is a fantasy or something more
can also be observed for jihadism). substantial.
4
Breivik seems to have found a breach in during large public events is organized by an in-
the existing security measures and counter terservices cooperation, from security to medical
-terrorism sensitivity and detection capac- emergency teams, under the police leadership.
ity. Every nation‟s CT services will have Crisis management is based on the capacity to
soon to « test » their own system with bring together different public actors, NGOs and
Breivik approach, by a necessary principle even private means, if necessary. Such organiza-
of precaution. tion, appealing in theory, has been regularly
criticized in Norway.: In practice, like in other
This attack in obviously a massive failure for the countries, interservices cooperation has occa-
Norwegian authorities (detection failure, preven- sionally been very challenging and produced un-
tion failure, SWAT team transportation delays, equal results.
neutralization/arrest delays). While Norway has
a deradicalization programme for its local far- Police and EMS intervention
rightists violent extremists and skinheads, this on Utoya island
country failed to detect Breivik while he was ac- The difficulties seem to have stem primarily
tive onlines in chatrooms, and probably in real from three causes:
life. The rescue phase did not seem particularly The first one is related to the time of interven-
well-managed either, at least on some specific tion by police forces. The Oslo Police seems to
aspects. have been overwhelmed by the bombing in Oslo,
The following key elements are intended to pro- in spite of many calls from the island, including
vide a first analysis of lessons learned, based on from the terrorist himself. Too many minutes
an incomplete knowledge. were needed, and wasted, before someone un-
derstood that a massive sniping attack was oc-
Lessons learned curring elsewhere. This is certainly indicative of
a lack of knowledge and training on redundant
Norwegian police – Organization terrorist attacks among the Norwegian security
and main characteristics community. One of the shooting victims was a
The Norwegian police, with about 13,000 offi- (unarmed) police officer. A lost opportunity, this
cers and other staffers, is organized in 27 re- officer could have provided some credible and
gional districts and 7 national units. Each re- actionable information.
gional district, with a certain administrative and The relative isolation of Utoya Island strongly
budgetary autonomy, has specialized units, mo- limited rapid deployment response, and seems
bile forces, including a SWAT team, able to act to to demonstrate that Norwegian SWAT teams did
neutralize individuals or in CT operations. Most not have, at least at that moment, appropriate
of the time, Police officers do not carry any means of transportation and projection. They
weapons, even though they can have one, in par- symptomatically used very basic boats provided
ticular, in patrolling cars. The use of a weapon is by private citizens. This highlights for sure some
highly restricted. The Norwegian police is re- under-dimensioned capacities of the Norwegian
puted to have opened fire 79 times between 1994 SWAT counter-terrorism teams. It must be no-
and 2004. ticed that the arrest phase benefited from favor-
Each regional district has an emergency calls able circumstances, since Breivik spontaneously
system able to respond to public calls and to mo- surrounded.
bilize and coordinate rescue means (Firefighters The last one is related to the official assessment
and Emergency Medical Services (EMS)). of the victims' number. In particular, the deaths
On a national level, an air unit, based in Oslo estimate gradually decreased from 92 (22/07/11)
and depending on this regional district, has two to 77 (29/07/11). This demonstrates incontesta-
helicopters that can be used, when it is neces- bly an organizational failure in centralizing in-
sary, by special units from other districts. One, formation, and a lack of coordination between
with optical systems, is mostly used for monitor- the field and the upper levels.
ing and surveillance. The other is for transporta-
tion, but has a very limited capacity (4 passen- Conclusion – Next steps?
gers). After such bloody attacks, any CT service will try
to assess what happened in Norway and will ex-
Norwegian rescue services and pect to receive actionable intelligence from Nor-
crisis management organization way. We can assume that part of the exchange of
The firefighters, at the local or intercity levels, information will be on a) the modus operandi
are responsible for rescuing populations. The details and b) possible international connections
operational direction for security and rescue or supports.
5
individual, both methodical and prudent, is per-
Norwegian CT services did not estimate as highly fectly able to perform a major terrorist attack,
probable a terrorist attack by radical and violent without raising suspicion. This truth is disturb-
far-rightist activists. Open sources also men- ing. It should help us to favor operational an-
tioned that they received some signs of Breivik‟s swers based on multiple capacity means, both
efforts to buy small quantity of chemical precur- mobile and largely adaptative. Any CT SWAT
sors. They did not see the inherent danger of his team should have sufficient and permanent
activity, partly because of the size and the low- (24/7) projection means (air, road, sea).
cost of the purchases, but also by reason of the
systematic security measures taken by him – he Furthermore, detection and the definition of
created operational invisibility. Finally, it is pos- sensitive and accurate indicators should obvi-
sible that the whole Norwegian security commu- ously be reassessed after Oslo attack.
nity was simply looking elsewhere, e.g. global
jihad. Emergency rescues teams and firefighters should
always be able to provide a verified/confirmed
This tragic event demonstrates how analysis is a casualty toll, in order to avoid any detrimental
sensitive and complicated process. It certainly imprecision.
also indicates how the scenario- based ap-
proaches, which tend to « predict » violent be- Finally, it is essential to be prepared against a)
haviours and terrorist practices from specific simultaneous attacks against multiple targets,
groups and individuals, in a routine way, can be and b) second or redundant strike against rescue
counter-productive, and even dangerous. Breivik teams. It is also necessary to disseminate that
just proves how a very organized and determined operational culture among the first-line workers.
6
Notes
8. J.Ross, “Beyond the Conceptualization of Terrorism: Psy-
1. Kaplan, J. (1997) „“Leaderless Resistance“, Terrorism chological- Structural Model of the Causes of this Activity”,
and Political Violence, vol.9, no. 3, pp. 80-95. from C.Summers & E.Markusen (eds), Collective Violence:
Harmful Behavior in Groups and Government, N.Y., Row-
man & Littlefield, 1999, pp.162-192.
2. Beam, L. (1992) „Leaderless Resistance„, Seditionist, No.
12. Accessed at www.louisbeam.com/leaderless.htm.
9. D.Della Porta, Social Movements, Political Violence, and
the State, Cambridge, Cambridge University Press, 1995.
3. http://www.transnationalterrorism.eu/tekst/
publications/Lone-Wolf%20Terrorism.pdf
10. F.Ferracuti & F.Bruno, Psychiatric Aspects of Terrorism
in Italy, in I.L.Barak-Glantz & C.R.Hufl~ (eds.), The Mad,
4. http://cyber.eserver.org/unabom.txt
the Bad and the Different Essays in Honor of Simon Dinitz,
Lexington, Lexington Books, 1981, pp. 199-213.
5. Johnson, S.C. (1998) „Psychological Evaluation of Theo-
dore John Kaczynski„, 16 January, North Carolina: Federal 11. D.W. Patterson (ed.), Crime and justice, MSS informa-
Correctional Institution Butner. tion communication, 1974, p.81.
The Transatlantic security paper series are technical-operational essays or reports our institutes consider should be made
available as a contribution to the debate on topical issues relevant to security/safety in the United States or in Europe
(Contact: Jean-Luc Marret – jl.marret@frstrategie.org or jmarret1@jhu.edu).
W W W . F R S T R AT E G I E . O R G