Texas Supreme Court Ends Abbott's Push to Expel Lawmakers Who Fled the State...
We All Know Why This House Dem Isn't Running for Re-Election
Dexter Taylor Shows Why New York's Anti-Gunners Can't Be Taken Seriously
Trump Just Clowned 'Vegan' James Talarico Into Oblivion With These Remarks
The AP Wants to Ban Guns Not Being Used; NBC News Frets a...
In the UK, Offensive Words Are Now an Offense Punishable by Death
Wait Until California Taxpayers Hear About yet Another Newsom Spending Debacle
Tim Walz Called Steve Scalise a 'Bootlicker' and Scalise's Response Was Perfect
The Justice Department Found Yale Discriminated Against White, Asian Med School Applicants
The Massachusetts Judge Who Gave Cambridge Gunman a Light Sentence Knew He Was...
Venezuela Opposition Leader Refuses to Take the Bait As CNN Presses Her on...
The UAE Has a Plan to Circumvent Iran and the Strait of Hormuz...
The CIA Lands in Havana: Trump Sends a Direct Message to the Cuban...
Greg Gutfeld Mocks Whoopi Goldberg After She Accuses Trump of Castrating the United...
Michigan Nurse Convicted in $1.6M Medicare Fraud Scheme Using Stolen Patient Records
OPINION

Infrastructure Attacks Are Cause for Concern

The opinions expressed by columnists are their own and do not necessarily represent the views of Townhall.com.
Infrastructure Attacks Are Cause for Concern

PARIS -- At a time when many of us have become fixated on U.S. intelligence agencies' "big data" programs, authorities are becoming aware of a much more insidious kind of threat -- one that could successfully exploit the growing blind spot created by our overreliance on technology.

Advertisement

Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission, told the Wall Street Journal that an April 2013 attack by multiple gunmen on Pacific Gas and Electric's Metcalf power station in San Jose, Calif., that powers Silicon Valley represents "the most significant incident of domestic terrorism involving the grid that has ever occurred."

When I asked Wellinghoff why the attack took so long to come to light, with initial reports referring only to "gunfire" that knocked out transformers (and making no reference to a coordinated attack), he replied: "Utility was trying to keep it low-key to prevent copycats, perhaps. I don't know."

The FBI, meanwhile, has downplayed the incident, saying that it doesn't think that a terrorist organization was responsible for the attack. The attackers may not have membership cards for any of the groups on the State Department's official list of terrorist organizations, but somehow I doubt that civilians who lost power or communications would find that any more comforting. If attackers are operating outside of the laws of warfare and targeting civilian infrastructure, then they're terrorists, period.

Back in the old days, before authorities started compiling lists of terror groups and their rosters as if they were baseball teams, there used to be a name for a group of people who came together to wreak havoc on civilian targets: guerrillas.

Advertisement

Unlike the Middle Eastern terrorist organizations that we've come to know so well, true guerrillas aren't obligated to have a clearly defined political cause. Just being against the government can suffice, with the idea of creating a power vacuum first before worrying about filling it.

As the Occupy Wall Street protesters proved when they took to the streets in 2011, creating an ideological fog of war serves to establish a big tent to maximize the size of the disgruntled assembly. It also means that intelligence officials end up chasing a moving ideological target.

Complicating matters in an age when law enforcement and intelligence are going increasingly high-tech, plans made the old-fashioned, low-tech way -- on a placemat at a local pizza joint -- can escape detection. Just try hacking a table at Pizza Hut.

And while federal agencies and local law enforcement are well-versed in antiterrorism strategies, it's not unreasonable to wonder how prepared they'd be to handle guerrillas. Even Napoleon Bonaparte was unable to successfully deal with guerrilla tactics. The Spanish guerrillas who forced the French army's retreat five years after its conquest of Spain were arguably Napoleon's Waterloo long before his actual Waterloo. He called the conflict his "Spanish Ulcer."

Advertisement

The goal of the guerrilla is to frustrate the government and make it appear inept and out of control, and nothing accomplishes that better than leaving civilians without power, transportation and communications. Target selection in urban warfare is far from random.

U.S. Special Operations forces use the CARVER system to maximize target selection and optimize resource allocation for its missions. CARVER is an acronym that stands for criticality, accessibility, recuperability, vulnerability, effect and recognizability -- factors that are each assigned numerical values ranging from 1 to 10, with a maximum score of 60. Based on the Pentagon field manual detailing the CARVER system, the San Jose transformer attack rated a score of 53.

Missions that disrupt communications and Internet access tend to earn high scores, which could feasibly explain the selection of a target that powers America's technology hub, Silicon Valley. The attackers also severed underground fiber optic cables, prompting AT&T to offer a $250,000 reward for any information leading to an arrest and conviction. And it wouldn't be the first time that attackers have disrupted communications systems in the same area.

In April 2009, about five miles away from the Metcalf power station, as well as at a second location nearby, "vandals" were reported to have cut AT&T cables 10 feet underground to knock out Internet and phone service to about 52,000 customers in Silicon Valley.

Advertisement

The critical question is: Are these "confidence targets" and opening gambits to something bigger? It would be nice if federal authorities offered us more information rather than just opining that these attacks were not the work of terrorist organizations. Stop playing semantic games, and instead give us assurances that you're working on a strategy for preventing such attacks.

Join the conversation as a VIP Member

Recommended

Trending on Townhall Videos

Advertisement
Advertisement
Advertisement