Weapons of Mass Destruction An Introduction to Terrorism By Dr. Charles Feer Criminal Justice Instructor Video.

Slides:



Advertisements
Similar presentations
Terrorism.
Advertisements

Al-Qaeda The Threat Today Chuck Feer Criminal Justice Dept. Bakersfield College.
NATO – Credit level Exam Practice NATO in the exam Remember that NATO is an organisation concerned with military and defence issues. Do not discuss NATO.
P. Urbano per il Master in Medicina NBC Intervista ad Alibek EmergencyNet NEWS Service Special Report Wednesday, July 14, 1999 EmergencyNet Exclusive:
Emerging Infectious Diseases and Bioterrorism Dr Peter Washer Southern Association for the History of Medicine and Science. Birmingham, AL, USA 6-7 March.
Visual 8.1 Terrorism and CERT  Define terrorism.  Identify potential targets in the community.  Identify CERT operating procedures for a terrorist incident.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Globalization, technology and terrorism
Terrorism and Security Matrix Inspired by the Haddon Matrix Kent Roach Anti-Terrorism and Privacy, One Year After Privacy and Security: Totally Committed.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Emergency Management Administration Associate of Arts Degree for the State of Nevada Presented by Dr. Ronald J. Casey Criminal Justice Professor Department.
FORESEC Academy FORESEC Academy Security Essentials (II)
Charles Feer WMD Instructor Center for Domestic Preparedness Instructor of Criminal Justice Bakersfield College.
Wars Games By: Chris Hill. What is a Cyberwar? Cyberwar is a type of warfare that is all electronic attach instead of a physical attack which involves.
Today’s World Section 3 Preview Main Idea / Reading Focus The Threat of Terrorism Map: World Terrorism Incidents Other Threats to Security Threats to World.
Terrorism Time Line. Munich Olympics  This action was in danger for the murdering of eleven Israeli Olympians. During this day eight Palestinian.
The Fight Against Terrorism
Homeland Security Planning Scenarios The White House Homeland Security Council (HSC) - in partnership with the Department of Homeland Security (DHS), the.
The Case of the Dirty Bomber TERRORISM IN AMERICA.
Radiological Terrorism: Introduction. Nuclear WMD Modern time weapons First used in WWII.
Unit 3 CJ307: Crisis Management in Terrorist Attacks and Disasters Instructor: Christopher L. Elg.
A Review Of The Threat To Civil Aviation & The International Response
THE WAR ON TERRORISM Sec Pages September 11, 2001 Prime suspect, Osama bin Laden Muslim – someone who believed in and practices the religion.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
1 Terrorist Use of WMD: A Concrete Threat? Dr. Yair Sharan –ICTAF Director 2nd Annual Arms Control Conference: New Trends in WMD.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
1 Introduction to Security Chapter 14 Securing the Infrastructure.
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
1 Biological Agents Slides will automatically advance seconds after clicking on start button.
Chemical and Biological Weapons Garrett Knopp, Dylan Scott, Grace Skolosh, and Kaylla Vaughn.
© 2012 Delmar, Cengage Learning Chapter 16 Weapons of Mass Destruction, Hurricanes and Natural Disasters.
Homeland Security Planning Scenarios The White House Homeland Security Council (HSC) - in partnership with the Department of Homeland Security (DHS), the.
1 “Dirty Bombs” Biology What is a Dirty Bomb?  An Explosive designed to spread Radioactive material  Also known as Radiological Dispersal Device.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
The Fox School of Business and Management Temple University Charles E. Wilhelm October 3, 2003.
Copyright © 2008 Delmar. All rights reserved. Part V Public Health Nursing in the 21 st Century.
The US and the Middle East. Terrorism and the US 2 basic schools of Terrorism 1)Terrorism can be deterred by striking back at its perpetrators and cowering.
The Technical Challenges of Homeland Security John R Wootton V. Pres. Technology Engineered Support Systems Inc.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
UNDERSTANDING BIOTERRORISM: Tara O’Toole, MD, MPH The United States Conference of Mayors Mayors Emergency, Safety & Security Summit October 24, 2001.
Citizen Corps Citizen Corps areas of emphasis: Crime Natural disasters
TERR0RiSM [ TERR0RiSM ] Kevin Putnam Period 3. Terrorism Terrorism -- the unlawful use or threatened use of force or violence by a person or an organized.
Chapter 24 Terrorism Awareness.
Ukraine. Background On April 26, 1986, a sudden surge of power during a reactor systems test destroyed Unit 4 of the nuclear power station at Chernobyl,
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Chapter 17: Foreign Policy and National Defense Section 2.
Weapons Of Mass Destruction Unit 3. W.M.D C hemical B iological R adiological N uclear.
CJ-180 Private Security Seminar Unit 8. Overview of Unit 8 Terrorism Other Threats White Collar Crime Burglary & Robbery Labor Disputes Espionage Piracy.
Directions Complete the PowerPoint Guided Notes. When finished with the PowerPoint, read the article on page 4 and analyze the political cartoons on pages.
August 2005 EMS & Trauma Systems Section Office of Public Health Preparedness RADIOLOGICAL NUCLEAR EXPLOSIVE.
Terrorism and War Maps Osama Bin Laden Timeline America at War
GOVT Module 16 Defense Policy.
Disaster and Emergency Management
Contemporary Global Issues
Citizen Corps Citizen Corps areas of emphasis: Crime Natural disasters
Col Randy Larsen, USAF (Ret.)
Disaster Preparedness
Terrorism Strikes the United States
WEAPONS OF MASS DESTRUCTION
Chapter 4 Hazards.
Objectives Explain why nuclear, biological, and chemical weapons threaten global security. Analyze the various terrorist groups and why they are becoming.
Wiktor WOJTAS European Commission DG Home Affairs
Chapter 17: Foreign Policy and National Defense Section 2
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
Presentation transcript:

Weapons of Mass Destruction An Introduction to Terrorism By Dr. Charles Feer Criminal Justice Instructor Video

2 Terrorism is a Crime Terrorist Goal: To force a government or group to change its stance or position.

3 California, a Target? Public / Government Buildings Mass Transit Communication Facilities Utilities Water Supply Food Production Recreational Facilities Malls Stadiums

4 Nature of Terrorism Eight Stages of Terrorist Plot Recruit Finance Weapon Date & Time of Attack Location Surveillance Means of Attack Escape (?)

5 Security Response Recognize Report React

6 What are Weapons of Mass Destruction? Firearms Ambush Ambush Explosives VBIED Bomb Bomb Incendiary Chemical Biological Nuclear Radiological

7 Three Main Concepts of Protective Measures: Time Distance Shielding

8 CONVENTIONAL BOMBS Scenario: Terrorists explode truck bombs and suicide bombers blow themselves up at venues such as sports arenas, train stations and, later, hospitals. A hundred people die. Threat: Improvised explosives remain the weapon of choice for al-Qaida and other jihadists. Of 63 al-Qaida attacks in the last 10 years, all but 12 were bombings, not including 9/11 and the conflicts in Iraq and Afghanistan

9 CONVENTIONAL BOMBS Vulnerability: It is impossible to protect all potential targets. Experts say the government needs to issue more realistic public warnings, turn to the community for tips and instill a resiliency to terrorism as a way of life.

10 CHEMICAL EXPLOSION Scenario: Terrorists blow up a storage tank of pressurized chlorine gas. A yellow-green cloud spreads 25 miles in six hours. Death toll is 17,500. Threat: Videotapes seized in Afghanistan in 2002 showed al-Qaida experiments on dogs using a lethal gas. Al-Qaida has sought chemical weapons but there is little evidence they acquired any. Such weapons are difficult to deploy.

11 CHEMICAL EXPLOSION Vulnerability: The bipartisan Partnership for a Secure America said more is needed to identify terrorist threats and secure chemical plants and rail cargo. Large volumes of toxic chemicals pass through cities on poorly protected rail cars.

12 DIRTY BOMB Scenario: Terrorists explode a bomb packed with radioactive Cesium-137 in a major U.S. city's downtown. About 180 people die, and a 36-block area is contaminated for years. Threat: Chicago al-Qaida recruit Jose Padilla admitted to planning a dirty bomb attack and was convicted in August on conspiracy charges. Most experts agree Padilla didn't have a thorough plan or the ability to carry it out, but concur that al-Qaida has long sought a dirty bomb.

13 DIRTY BOMB Vulnerability: The House Homeland Security Committee reported the government missed a deadline to screen sea cargo for radiological weapons and failed to improve counter- proliferation.

14 BIOLOGICAL AGENT Scenario: Terrorists release plague spores in three busy public restrooms. Within four days, the bacterium has spread to 11 countries and killed 2,500 people in North America. Status: The best-known biological attack was the 2001 anthrax one, which killed five. No firm evidence exists that al-Qaida has developed a bio-weapon.

15 BIOLOGICAL AGENT Vulnerability: Counter-terror officials worry about former Soviet “super-germ weapons labs” or lax security at U.S. labs. “A one-year grad student knows exactly where to get toxins that can kill 100,000 people,” said Matt Rojansky, executive director of Partnership for a Secure America.

16 CYBER-ATTACK Scenario: Terrorists hack into the nation's financial system, causing 20 million credit cards to cancel and a panic over bank stability. Threat: Russian and Chinese agents routinely hack into sensitive government sites, the U.S. government says. The Russians crippled Georgian military computers weeks before invading its southern neighbor early in U.S. officials say al-Qaida is Internet-savvy and can recruit or hire hackers to shut down a power grid.

17 CYBER-ATTACK Vulnerability: Director of National Intelligence Michael McConnell testified in February that the threat of a cyber attack is growing and America's defenses are poor.