How Serious is the “WMD Terrorism” Threat?: Terrorist Motivations and Capabilities for Using Chemical, Biological, Radiological, and Nuclear Weapons Gary.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Hospital Emergency Management
Aum Shinrikyo‘s (Supreme Truth) Aum Shinrikyo, an extremist religious sect founded in 1987 by Shoko Asahara, a blind yoga guru from Tokyo. Religious status.
The Four Faces of Nuclear Terrorism Dr. Charles D. Ferguson Science and Technology Fellow Council on Foreign Relations September 29, 2004 Georgetown University.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
F. STEINHAUSLER AND A. SOBEL CBRN Terrorism Mitigation: New Aspects.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Homeland Security: Emerging Security Needs Casualty Actuaries in Reinsurance Special Interest Seminar: Terrorism September 13, 2004 New York, NY Asha M.
1 Continuity Planning for transportation agencies.
© 2005 John Wiley & Sons PPT 1-1 Chapter 6 - Internal Analysis Aims to provide a detailed understanding of the organization in terms of four aspects: 1.Financial.
Leslie W Kennedy Director RUTGERS Newark. Sponsored by the Rutgers School of Criminal Justice, Center for Global Change and Governance, College of Nursing.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
The Strategic Management Process
1. 2 Learning Objectives To understand: the elements or stages of the strategic management process the different perspectives on strategy development.
Planning and Strategic Management
Tools used by Entrepreneurs for Venture Planning
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
ENSURING SUSTAINABILITY TEMPUS FINAL CONFERENCE, SEPTEMBER.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Sustainable Consumption and Production Working Group: Practical application Strategies and Tools.
1. 2 Learning Objectives To understand: the elements or stages of the strategic management process the different perspectives on strategy development.
Defense Against Weapons of Mass Destruction Act of 1996 On June 26, 1996, the Senate passed the Defense Against Weapons of Mass Destruction Act of 1996.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
BSAF-BIONET Meeting Robert J. Hashimoto, CBSP University of California, Berkeley October 2, 2009.
Competing For Advantage Part IV – Monitoring and Creating Entrepreneurial Opportunities Chapter 12 – Strategic Entrepreneurship.
State Homeland Security Assessment and Strategy Program Develop Planning Factors for CBRNE Scenarios.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
1 Terrorist Use of WMD: A Concrete Threat? Dr. Yair Sharan –ICTAF Director 2nd Annual Arms Control Conference: New Trends in WMD.
Terrorism Introduction Meg Scott Phipps, Commissioner John T. Hoffman Director, Threat & Mitigation
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
Characterization, Inventory and Monitoring of trends in indigenous livestock Dr. E. D. Ilatsia D. N. Kamiti 23-Oct-15Animal Breeding and Genomics Group1.
Creating and Managing Change Chapter 18 Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
CHAPTER 2 SCARE OF THE WEEK: RISK PERCEPTION AND BEHAVIOR.
in the Contemporary Operational Environment (COE) Learning Activity 2
Is your leadership style blocking the ability of your organization to change?
Module V: Writing Your Sustainability Plan Cheri Hayes Consultant to Nebraska Lifespan Respite Statewide Sustainability Workshop June 23-24, 2015 © 2011.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Strategic Direction Janice Melnychuk Russ Dahms If you don’t know where you are going Any path will get you there.
Intro to Justice THREAT ASSESSMENT EXERCISE. Group Presentation Terrorist Group Ideologies Terrorist Group Modus Operandi Terrorist group past target.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
SOUTH-EASTERN EUROPEAN DATA SERVICES Institute for Democracy and Mediation 1.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Strategy and Leadership – An Integrated Approach What is Strategy? What is Strategy? Why organizations strategize their activities? Why organizations strategize.
© 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
DHS S&T Investment in Chemical and Biological Incident Response Technology Erik M. Lucas, Ph.D. Science and Engineering Technical Assistant to Chemical.
Mayoral Seminar for Weapons of Mass Destruction (WMD) and Terrorism Incident Preparedness Fort Collins, Colorado November 21, 2002.
SPANISH NATIONAL POLICE INNOVATION & DEVELOPMENT SERVICE LOGISTICS GENERAL DIRECTORATE SMI2GS - H2020, BRUSSELS 26 & 27 February 2016 H2020 (CALL 2016)
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Subway Chemical Detection: A Proposed System Process for a Detect-to-Warn Capability to Save Lives CAPT Joselito Ignacio, MA, MPH, CIH, CSP, REHS Acting.
CYSM Risk Assessment Methodology Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.
Risk Assessment: A Practical Guide to Assessing Operational Risk
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Maritime Security as an Integral Part of an
Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port Workshop on Critical Infrastructure Protection June 5-7,
and Security Management: ISO 28000
Jason Briggeman and Jeremy Horpedahl George Mason University
Profiling the Biological Adversary
Foundations of Planning
Articulate how the practice of management has evolved
PLANNING.
International Strategy
Organizational Change and Stress Management
Copyright © 2005 Prentice Hall, Inc. All rights reserved.
Presentation transcript:

How Serious is the “WMD Terrorism” Threat?: Terrorist Motivations and Capabilities for Using Chemical, Biological, Radiological, and Nuclear Weapons Gary Ackerman Director, WMD Terrorism Research Program Center for Nonproliferation Studies Monterey Institute of International Studies September 28, 2005 Jeffrey Bale Senior Research Associate, WMD Terrorism Research Program Center for Nonproliferation Studies Monterey Institute of International Studies

WMD Terrorism

Hype

Security condition upgrades Government warnings How far we have come … from 1950s ‘Duck & Cover’ to 2003 ‘Duct tape & Cover your windows’

Hype or Threat? Media want to inform us but inevitably sensationalize things. After Sept 11, government officials don’t want to be accused of being complacent or not warning public, so tend to dwell on worst-case scenarios.

Conflating Events?

Conflating Events Again?

WMD Terrorism Database

Incidents per Year YearExcluding Hoaxes HoaxesTotal

The Empirical Record

The Empirical Record: Casualties

Distribution by Event Type

The Empirical Record: Geography Chemical Incident Distribution

Key Motivational Factors Relevant determinants of terrorist behavior: Factors Relating to the Nature of the Group Ideology, Organizational Structure, Organizational Dynamics, Organizational Lifecycle Status, Demographics, Resources, Operational Capabilities Factors External to the Group Historical Events, Relations w/ External Actors (media; other extremists; state apparatus; targeted audience; non-targeted audience; supporters), Security Environment, (Potential) Target Characteristics Factors Relating to Decision-Making General Planning Characteristics (risk thresholds; time horizons), Perceptual Filter, Operational Objectives

Who makes the Decisions? Decision to carry out attack X Individual terrorist Sub-groupOrganization Leadership All members (democracy) Committee Individual terrorist Individual terrorist Individual terrorist Committee Individual terrorist Individual terrorist Individual terrorist Individual terrorist Individual terrorist Sub-groups

Capabilities Main questions: –Do terrorists currently have the capability to engage in true WMD attacks? –Is the capability of terrorists with regard to WMD increasing? –If terrorists’ WMD capabilities are increasing, what is the rate of this change?

Capabilities Broad Trends –Terrorist capabilities in general are increasing –Societal changes can increase vulnerabilities and facilitate terrorist capabilities

Capabilities Organizational Capabilities Logistical Resources Financial Resources Knowledge/Skill Acquisition Materials and Technology Acquisition –C,B,R, and N differ Initial Production of Agent –C,B,R, and N differ Weaponization of Agent –C,B,R, and N differ

Desiderata Insiders State sponsorship Attacks on Facilities

Radiological Biological Nuclear Chemical Conventional Explosives Probability (based on capability considerations only) Consequence CBRN Terrorism Risk Plane RISK = Probability x Consequence

Traditionally, terrorists have tended in their use of weapons and tactics to be both: –Conservative “Path of least resistance” – terrorists generally seek to use the easiest, cheapest, tried-and-true methods –Imitative Terrorists often utilize the successful tactics and weapons types of other groups (albeit with some localization, e.g. Mao to Carlos Marighella) Why? –Most groups have limited resources and there are costs associated with identifying, researching and implementing new technologies, in terms of time, finances, personnel etc. –There are also often uncertainties about the reliability of any new technology in terms of achieving desired effects. –Soft targets vulnerable to traditional weapons are plentiful. Terrorists and Technology

BUT, there are exceptions to the above (may be becoming more common) where terrorists will seek new technologies: A.Specific ideological orientation towards innovating technologically Examples: Aum Shinrikyo sending operatives to explore the documents of Nikola Tesla in hopes of building an earthquake generating machine; in some groups ideology may drive members to push the technological envelope, such as in a conceivably violent version of the Raelian cult (who pursue human cloning and worship extraterrestrials). B.Existing methods insufficient to achieve aims For example, when current weapons do not (or are perceived to not) result in enough casualties, publicity, or psychological impact. New means are needed to circumvent protective measures. C.Perceived competition Perceive the need to ‘stand out from the crowd’ and remain relevant. D.Group has very high level of resources Allows opportunity to engage in long-term development and explore different tools (two examples: Aum and Al Qa’ida). E.Costs associated with adopting new technology are lowered For example, the electronic privacy movement has enabled groups with very little resources, such as radical environmental extremists, to use the latest encryption and steganographic tools. Advent of commercial biotech “kits” and commercial modified PCR. Group recruiting members with advanced technical capabilities. Terrorists and Technology

No. of casualties per $1 cost* Year Tipping Point The Future: More CBRN? E. If costs associated with adopting new technology are lowered…

Hype or Threat?

Bad News … Terrorism trends are ominous Significant increase in number of incidents Al Qa`ida – sustained enemy Other groups: cults, militias, lone actors? More threat assessment is necessary

Bad News … September 11 – confirmed that terrorists will seek to inflict mass casualties Anthrax attacks – showed that the capability to get the agents is there (almost) Theoretically, a single person could now be capable of causing 1,000’s of casualties and willing to do so.

But Some Good News Very few incidents involving warfare agents More difficult to cause mass casualties with WMD than often assumed – difference between AGENTS and WEAPONS!

BUT The threat must be countered before this becomes easier to accomplish

The Bottom Line Threat of CBRN terrorism is real, but often distorted by hype. Remain mindful of more boring (but deadly threats): terrorism using conventional weapons is still likely to be prominent. ‘Don’t Panic’: Terrorists want us to panic – that’s why it’s called TERRORism.

The End