SlideShare a Scribd company logo
Learning Objectives
After reading this chapter the reader should be able to:
1. Differentiate the bio-agents obtainable by terrorists and list the
ways biological agents may be used as weapons of mass destruction.
2. Explain the manner in which terrorist groups might exploit
chemical and radiological weapons.
3. Compare the lethality of viruses and bacteriological infections.
4. Summarize what cyber terrorism and cyber security mean and
debate the issue.
5. Describe the intelligence reform spawned by the 9/11
Commission.
6. Elaborate on the need to share information.
SUBTOPICS
INTRODUCTION
THE AVAILABILITY OF VARIOUS FORMS OF CHEMICAL,
BIOLOGICAL, AND NUCLEAR MATERIALS IS
FRIGHTENING. EVEN MORE FRIGHTENING IS THE LACK
OF EFFORTS TO CONTROL THEIR PROLIFERATION AND
TO PREVENT THE USE OF THEM. AS THE POTENTIAL
THREAT OF CHEMICAL, BIOLOGICAL, AND OTHER
UNCONVENTIONAL WEAPONS GROWS AT THE LOCAL,
STATE, AND FEDERAL LEVELS, PREPARATION FOR
SUCH AN EVENT IS RAPIDLY BECOMING A SIGNIFICANT
ISSUE TO THE PRIVATE SECTOR.
BIOTERRORISM
THE USE OF BIOLOGICALAGENTS IN WAR IS NOTHING NEW AND
HAS EXISTED SINCE THE 6TH CENTURY. CONTROLLING AND
CONTAINING A BIOTERRORISM ATTACK WILL REQUIRE
INCREDIBLE EFFORT AND COOPERATION ACROSS
INTERNATIONAL BOUNDARIES. MODERN MAN HAS SHOWN TO
BE JUST AS RUTHLESS AS HISTORICALARMIES AND
GOVERNMENTS. THE 20TH CENTURY'S FIRST USE OF
BIOWEAPONS OCCURRED DURING WORLD WAR I WHEN A
GERMAN UNDERCOVER AGENT SUPPOSEDLY INFECTED THE
FRENCH FOOD SUPPLY. BIOLOGICAL AGENTS OF SPECIFIC
CONCERN FOR HUMAN HEALTH INCLUDE VIRUSES, BACTERIA,
AND TOXINS SUCH AS THOSE CAUSING SMALLPOX, ANTHRAX,
PLAGUE, TULAREMIA, BOTULISM TOXIN, AND VIRAL
HEMORRHAGIC FEVERS (FOR EXAMPLE, EBOLA VIRUS).
http://emergency.cdc.gov/agent/agentlist.asp
THE POTENTIAL CHEMICAL THREATS WHICH MAY BE ENCOUNTERED BY
EMERGENCY PROFESSIONALS INCLUDE BOTH CHEMICAL WARFARE
AGENTS AND TOXIC INDUSTRIAL CHEMICALS. CHEMICAL WARFARE
AGENTS ARE USED TO KILL, SERIOUSLY INJURE, OR INCAPACITATE
PEOPLE THROUGH PHYSIOLOGICAL EFFECTS. THERE ARE TWO
CATEGORIES OF CHEMICAL AGENTS: NERVE AGENTS AND BLISTER
AGENTS. NERVE AGENTS INCLUDE SARIN, TABUN, SOMAN, AND GF OR
VX. THESE ARE COMPOUNDS THAT ATTACK THE CENTRAL NERVOUS
SYSTEM AND ARE ABSORBABLE THROUGH THE SKIN, RESPIRATORY, AND
ORAL ENTRY POINTS. THEY ARE EASILY DISPERSED AND HIGHLY TOXIC,
WITH SPEEDY EFFECTS. EXPOSURE TO THESE AGENTS THROUGH
RESPIRATORY MEANS CAN RESULT IN RAPID DEATH. EXPOSURE
THROUGH THE SKIN CAN CAUSE SYMPTOMS WITHIN 30 MINUTES AND
EVENTUAL DEATH AS WELL. ORAL EXPOSURE CAN OCCUR BY EATING
CONTAMINATED FOOD FROM AN AREA WHERE THE AGENT HAS BEEN
DISPERSED. BLISTER AGENTS SUCH AS MUSTARD GAS BURN OR BLISTER
THE SKIN, EYES OR LUNGS. THE SYMPTOMS MAY NOT APPEAR
IMMEDIATELY, POSSIBLY BEING DELAYED FOR TWO TO 24 HOURS AFTER
EXPOSURE. LARGE QUANTITIES OF THESE AGENTS ARE ACTUALLY
STORED IN THE UNITED STATES AND POSE TANTALIZING TARGETS FOR
TERRORISTS.
NUCLEAR THREATS
WITH THE END OF THE COLD WAR, THE WEST HAD STARTED TO
STOP REFERRING TO SUCH TERMS AS NUCLEAR DETERRENCE,
MASSIVE ASSURED DESTRUCTION, AND NUCLEAR
RETALIATION. HOWEVER, TERRORISM HAS RENEWED THE
THREAT FROM SUCH WEAPONS. THE CONCEPT OF NUCLEAR
TERROR RELIES ALMOST ENTIRELY ON ITS ASSUMPTION THAT
ROGUE STATES COULD PROVIDE NUCLEAR WEAPONS
"SECRETLY" TO TERRORISTS. THE GOVERNMENT THEN
REASONED THAT SHOULD THESE SECRET LINKS BE EXPOSED,
DETERRENCE COULD LARGELY BE RESTORED BECAUSE THE
UNITED STATES WOULD THREATEN UNACCEPTABLE
RETALIATION. ROGUE STATES WOULD HAVE TO CONSIDER THE
GRIM REALITY OF MASSIVE RETALIATION. IT IS UNCLEAR
WHETHER SUCH NATION STATES AS IRAN HAVE EVEN
CONSIDERED RETALIATION AS A REALISTIC RESPONSE FROM
THE WEST. IN ADDITION, IT MUST ALSO BE RECOGNIZED THAT
DIRTY BOMBS, ALTHOUGH NOWHERE NEAR AS DEVASTATING
AS NUCLEAR BOMBS, CAN STILL CAUSE MASSIVE DAMAGE,
MAJOR HEALTH PROBLEMS, AND INTENSE PSYCHOLOGICAL
HARM.
CYBER TERRORISM AND COMPUTER SECURITY
COMPUTER CRIME IS DEFINED GENERALLY DEFINED
AS THOSE CRIMES WHICH INVOLVE ACCESSING A
COMPUTER’S DATABASE WITHOUT AUTHORIZATION
OR EXCEEDING AUTHORIZATION FOR THE PURPOSE
OF SABOTAGE OR FRAUD. IT ALSO COMPRISES THEFT
OR DESTRUCTION OF SOFTWARE AND HARDWARE.
COMPUTER SECURITY, THEREFORE, IS THE
PROTECTION OF ALL ASSETS, ESPECIALLY
INFORMATIONAL, FROM BOTH HUMAN MADE AND
NATURAL DISASTERS. COMPUTER SECURITY
INCLUDES PROTECTING DATA,
TELECOMMUNICATIONS, PERSONNEL, AND THE
PHYSICAL ENVIRONMENT.
COMPUTER SECURITY INCIDENT RESPONSE TEAM
(CSIRT)
SOON AFTER 9/11, THE ADMINISTRATION SOUGHT TO
IMPLEMENT THE PRESIDENT’S NATIONAL STRATEGY
TO SECURE CYBERSPACE. THE RESULTS INCLUDED
THE FORMULATION OF A STANDARDIZED INCIDENT
HANDLING PROCEDURE FOR CYBER SECURITY
INCIDENTS AND THE FUTURE CONSOLIDATION OF
CYBER WATCH CENTERS. THE NATIONAL COMPUTER
EMERGENCY RESPONSE TEAM (US-CERT) TOGETHER
WITH CARNEGIE MELLON’S CERT/COORDINATION
CENTER IS MEANT TO BE A COORDINATION CENTRAL
POINT FOR ADDRESSING CYBER ATTACKS.
INTELLIGENCE AGENCY CAPABILITIES
INTELLIGENCE IS THE ART OF LEARNING WHAT YOUR ENEMY, OR
POTENTIAL ENEMY, IS DOING, THINKING, PLANNING, OR
PLOTTING. THERE ARE TWO BASIC FORMS OF INTELLIGENCE:
HUMAN INTELLIGENCE (HUMINT) AND TECHNICAL
INTELLIGENCE (TECHINT). IN 1949, THE CIA CREATED THE OFFICE
OF SCIENTIFIC INTELLIGENCE. SINCE THEN, THE AGENCY’S
SCIENCE AND TECHNOLOGY EFFORT HAS HAD A DRAMATIC
IMPACT ON THE COLLECTION AND ANALYSIS OF INTELLIGENCE.
AT THE BEGINNING OF THE COLD WAR, BOTH HUMINT AND
TECHINT GENERALLY UNDERTOOK COLLABORATIVE EFFORTS,
DUE LARGELY IN PART TO A COMMON OBJECTIVE OF DEFEATING
THE SOVIET THREAT. AT THE HEIGHT OF THE COLD WAR,
HOWEVER, THE RELIANCE ON TECHNOLOGY HAD REACHED A
DISPROPORTIONATE LEVEL WITH HUMAN INTELLIGENCE
GATHERING MECHANISMS. REORIENTING HUMINT COLLECTION
TO GIVE SIGNIFICANTLY GREATER ATTENTION TO TERRORIST OR
POTENTIALLY TERRORIST GROUPS WOULD HAVE IMPORTANT
AND HOPEFULLY POSITIVE IMPLICATIONS FOR THE
INTELLIGENCE COLLECTION PROCESS.
TERRORISM, AND ESPECIALLY TERRORIST
ACTS ASSOCIATED WITH BIOLOGICAL,
CHEMICAL, OR NUCLEAR WEAPONS IS AN
EXTREMELY DEMANDING ISSUE. THE
INTELLIGENCE COMMUNITY BEARS THE
BURDEN OF ACQUIRING INFORMATION
SUFFICIENTLY ACCURATE TO PREVENT SUCH
ATTACKS. WHETHER THE GOVERNMENT IS
SUCCESSFUL IN COMBATING TERRORISM
WILL BE JUDGED NOT ONLY ON ITS EFFORTS
TO CIRCUMVENT AN ATTACK, BUT ON HOW IT
REACTS TO A WEAPON OF MASS
DESTRUCTION ATTACK.
CASE STUDY: HEMORRHAGIC FEVERS ARE
CAUSED BY VIRUSES. DISCUSS THE ETHICS
OF SHOOTING DOWN AN AIRCRAFT WHERE
THE VIRUS HAS SPREAD THROUGHOUT THE
CREW AND PASSENGERS.
WEB RESOURCES
GERMS: BIOLOGICAL WEAPONS AND AMERICA’S
SECRET WAR, NEW YORK: SIMON AND
SHUSTER, 2002, ISBN: 0684871599
EPILOGUE- “BUYING DUCT TAPE BY THE MILE
AND HAVING ELDERLY WOMEN REMOVE THEIR
SHOES AT AIRPORTS DO ABSOLUTELY NOTHING
TO INCREASE HOMELAND SECURITY.” MARCUS
RAMEN, THE MYTH OF HOMELAND SECURITY.
LEARNING OBJECTIVES
AFTER READING THIS CHAPTER THE READER
SHOULD BE ABLE TO:
1. DEBATE INTELLIGENTLY THE MAJOR
ISSUES FACING TRANSPORTATION SECURITY
IN THE FUTURE.
2. REASON THE NEXT BEST STEPS TO TAKE
IN THE WAR ON TERRORISM.
DISCUSSION QUESTIONS AND EXERCISES- CONTROVERSIAL ISSUES WHICH CAN
BE DEBATED
1. DOES TORTURE WORK? IS IT JUSTIFIABLE IN A DOOMSDAY SCENARIO?
2. INDIVIDUALS WHO PARTICIPATED WITH OR ASSISTED AL Q’AEDA ARE
CHARGED WITH OFFENSES AGAINST THE LAWS OF WAR. YET THE BUSH
ADMINISTRATION HAS DENIED THAT THEY REPRESENT A “MILITARY FORCE” OR
HAVE POW STATUS. NORMALLY, THE UNIFORM CODE OF MILITARY JUSTICE
WOULD APPLY. OR, IS THERE A CONCURRENT POWER THAT CAN BE USED TO
IMPLEMENT BY PRESIDENTIAL ORDER?
3. ARE THE AIR AND SEA MARSHAL PROGRAMS COST EFFECTIVE?
4. IS THE WEST PREPARED FOR A WEAPON OF MASS DESTRUCTION
ATTACK?
5. SHOULD TERRORISM BE FOUGHT VIA LAW ENFORCEMENT MEANS OR
MILITARY?
6. HAS THE PATRIOT ACT STRIPPED AWAY CRITICAL INDIVIDUAL RIGHTS IN
VIOLATION OF THE U.S. CONSTITUTION?
7. HAS THE CREATION OF THE DEPARTMENT OF HOMELAND SECURITY
ESTABLISHED JUST ANOTHER BUREAUCRACY?
8. HAS THE TRANSPORTATION SECURITY ADMINISTRATION BEEN
EFFECTIVE?
9. WHAT ARE THE ROOTS OF TERRORISM IN THE MIDDLE EAST AND HOW
DO CONTROL IT?
10. IS A DECLARATION OF WAR NECESSARY IN THE “WAR ON TERRORISM?”

More Related Content

What's hot

Terrorism
TerrorismTerrorism
Terrorism
Nitika Nikks
 
The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010 The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010
Enterprise Security Risk Management
 
Online assignment soumya.r
Online assignment soumya.rOnline assignment soumya.r
Online assignment soumya.r
Ajith Vazhappally
 
POLITICAL SCIENCE
POLITICAL SCIENCEPOLITICAL SCIENCE
POLITICAL SCIENCE
Myprivateresearcher.com
 
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Exopolitics Hungary
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Power
pendalld
 
Terrorism
TerrorismTerrorism
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
AishaAL9
 
Global Gun Grab issue of "The New American Nov 22, 1999
Global Gun Grab issue of "The New American Nov 22, 1999Global Gun Grab issue of "The New American Nov 22, 1999
Global Gun Grab issue of "The New American Nov 22, 1999
Hal Shurtleff
 
Terrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismTerrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorism
Anthony Veluz
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threatabhinav_cfa
 
Preventing conflict and promoting peace and security within nepad and the afr...
Preventing conflict and promoting peace and security within nepad and the afr...Preventing conflict and promoting peace and security within nepad and the afr...
Preventing conflict and promoting peace and security within nepad and the afr...Kayode Fayemi
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global ThreatFaheem Ul Hasan
 
HI 82a -Cluster munition systems : situation and inventory (English)
HI 82a -Cluster munition systems : situation and inventory  (English)HI 82a -Cluster munition systems : situation and inventory  (English)
HI 82a -Cluster munition systems : situation and inventory (English)
Bernard hardy
 
Sipri yearbook 2013
Sipri yearbook 2013Sipri yearbook 2013
Sipri yearbook 2013
bueno buono good
 
Security sector reform defence diplomacy
Security sector reform defence diplomacySecurity sector reform defence diplomacy
Security sector reform defence diplomacyLita Najwa
 
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
paperpublications3
 

What's hot (20)

Terrorism
TerrorismTerrorism
Terrorism
 
The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010 The Marsh Report-Terrorism Risk Insurance 2010
The Marsh Report-Terrorism Risk Insurance 2010
 
491
491491
491
 
Online assignment soumya.r
Online assignment soumya.rOnline assignment soumya.r
Online assignment soumya.r
 
POLITICAL SCIENCE
POLITICAL SCIENCEPOLITICAL SCIENCE
POLITICAL SCIENCE
 
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Power
 
Terrorism
TerrorismTerrorism
Terrorism
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Global Gun Grab issue of "The New American Nov 22, 1999
Global Gun Grab issue of "The New American Nov 22, 1999Global Gun Grab issue of "The New American Nov 22, 1999
Global Gun Grab issue of "The New American Nov 22, 1999
 
Terrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismTerrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorism
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threat
 
Preventing conflict and promoting peace and security within nepad and the afr...
Preventing conflict and promoting peace and security within nepad and the afr...Preventing conflict and promoting peace and security within nepad and the afr...
Preventing conflict and promoting peace and security within nepad and the afr...
 
E059
E059E059
E059
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global Threat
 
HI 82a -Cluster munition systems : situation and inventory (English)
HI 82a -Cluster munition systems : situation and inventory  (English)HI 82a -Cluster munition systems : situation and inventory  (English)
HI 82a -Cluster munition systems : situation and inventory (English)
 
Sipri yearbook 2013
Sipri yearbook 2013Sipri yearbook 2013
Sipri yearbook 2013
 
Security sector reform defence diplomacy
Security sector reform defence diplomacySecurity sector reform defence diplomacy
Security sector reform defence diplomacy
 
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
 
Sipriyb12 summary
Sipriyb12 summarySipriyb12 summary
Sipriyb12 summary
 

Viewers also liked

403 13
403 13403 13
403 10
403 10403 10
403 11
403 11403 11
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
Doing What I Do
 
Chapter 10 oversight and accountability 1
Chapter 10  oversight and accountability 1Chapter 10  oversight and accountability 1
Chapter 10 oversight and accountability 1
Doing What I Do
 
403 12
403 12403 12
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
Doing What I Do
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
Doing What I Do
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
Doing What I Do
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
Doing What I Do
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
Doing What I Do
 

Viewers also liked (19)

403 2
403 2403 2
403 2
 
403 13
403 13403 13
403 13
 
403 1
403 1403 1
403 1
 
403 10
403 10403 10
403 10
 
403 11
403 11403 11
403 11
 
403 8
403 8403 8
403 8
 
403 3
403 3403 3
403 3
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Tsa's positive 1
Tsa's positive 1Tsa's positive 1
Tsa's positive 1
 
Chapter 10 oversight and accountability 1
Chapter 10  oversight and accountability 1Chapter 10  oversight and accountability 1
Chapter 10 oversight and accountability 1
 
403 9
403 9403 9
403 9
 
403 4
403 4403 4
403 4
 
403 12
403 12403 12
403 12
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 

Similar to 403 14

basic concept of disaster and disaster risk (PPT1).pptx
basic concept of disaster and disaster risk (PPT1).pptxbasic concept of disaster and disaster risk (PPT1).pptx
basic concept of disaster and disaster risk (PPT1).pptx
WALTONMARBRUCAL
 
Emerging Threats: Creation of a Regional Foresight Matrix by Mathew Maavak
Emerging Threats: Creation of a Regional Foresight Matrix by Mathew MaavakEmerging Threats: Creation of a Regional Foresight Matrix by Mathew Maavak
Emerging Threats: Creation of a Regional Foresight Matrix by Mathew Maavak
Mathew Maavak
 
Terrorists, States And Biological Weapons Development
Terrorists, States And Biological Weapons DevelopmentTerrorists, States And Biological Weapons Development
Terrorists, States And Biological Weapons Development
JillS13
 
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfKeeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
HassaanSial1
 
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
wilfredoa1
 
C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terror
Matthew Boutross
 
National Security Emergencies
National Security EmergenciesNational Security Emergencies
National Security EmergenciesEdward Dobson
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
ambersalomon88660
 
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docxANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
SHIVA101531
 
Suicidal attacks
Suicidal attacksSuicidal attacks
Suicidal attacks
Hadia Tariq
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeeration
Abdelhamied El-Rafie
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear Prolifeeration
Abdelhamied El-Rafie
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
aryan532920
 
International intellectual property law and human security
International intellectual property law and human securityInternational intellectual property law and human security
International intellectual property law and human securitySpringer
 
DRRR-CHAPTER-2-1.pptx
DRRR-CHAPTER-2-1.pptxDRRR-CHAPTER-2-1.pptx
DRRR-CHAPTER-2-1.pptx
AkiraCeron
 
TERRORISM.pptx
TERRORISM.pptxTERRORISM.pptx
TERRORISM.pptx
MarcoParodi6
 
Protecting_the_Agricultural_Infrastructure
Protecting_the_Agricultural_InfrastructureProtecting_the_Agricultural_Infrastructure
Protecting_the_Agricultural_InfrastructureMatthew Richert
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalredacooil
 

Similar to 403 14 (20)

basic concept of disaster and disaster risk (PPT1).pptx
basic concept of disaster and disaster risk (PPT1).pptxbasic concept of disaster and disaster risk (PPT1).pptx
basic concept of disaster and disaster risk (PPT1).pptx
 
Emerging Threats: Creation of a Regional Foresight Matrix by Mathew Maavak
Emerging Threats: Creation of a Regional Foresight Matrix by Mathew MaavakEmerging Threats: Creation of a Regional Foresight Matrix by Mathew Maavak
Emerging Threats: Creation of a Regional Foresight Matrix by Mathew Maavak
 
Terrorists, States And Biological Weapons Development
Terrorists, States And Biological Weapons DevelopmentTerrorists, States And Biological Weapons Development
Terrorists, States And Biological Weapons Development
 
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdfKeeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
Keeping Control of Terrorists Without Losing Control of Constitutionalism.pdf
 
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
 
Page of contents
Page of contentsPage of contents
Page of contents
 
C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terror
 
National Security Emergencies
National Security EmergenciesNational Security Emergencies
National Security Emergencies
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
 
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docxANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
 
Suicidal attacks
Suicidal attacksSuicidal attacks
Suicidal attacks
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeeration
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear Prolifeeration
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 
International intellectual property law and human security
International intellectual property law and human securityInternational intellectual property law and human security
International intellectual property law and human security
 
DRRR-CHAPTER-2-1.pptx
DRRR-CHAPTER-2-1.pptxDRRR-CHAPTER-2-1.pptx
DRRR-CHAPTER-2-1.pptx
 
RAND_RR573
RAND_RR573RAND_RR573
RAND_RR573
 
TERRORISM.pptx
TERRORISM.pptxTERRORISM.pptx
TERRORISM.pptx
 
Protecting_the_Agricultural_Infrastructure
Protecting_the_Agricultural_InfrastructureProtecting_the_Agricultural_Infrastructure
Protecting_the_Agricultural_Infrastructure
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
 

Recently uploaded

ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
SERUDS INDIA
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
OECDregions
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
johnmarimigallon
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
elmerdalida001
 
A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
Roger Valdez
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
Cuyahoga County Planning Commission
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
JSchaus & Associates
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
Congressional Budget Office
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
JSchaus & Associates
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Christina Parmionova
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 

Recently uploaded (20)

ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
 
A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 

403 14

  • 1.
  • 2. Learning Objectives After reading this chapter the reader should be able to: 1. Differentiate the bio-agents obtainable by terrorists and list the ways biological agents may be used as weapons of mass destruction. 2. Explain the manner in which terrorist groups might exploit chemical and radiological weapons. 3. Compare the lethality of viruses and bacteriological infections. 4. Summarize what cyber terrorism and cyber security mean and debate the issue. 5. Describe the intelligence reform spawned by the 9/11 Commission. 6. Elaborate on the need to share information.
  • 3. SUBTOPICS INTRODUCTION THE AVAILABILITY OF VARIOUS FORMS OF CHEMICAL, BIOLOGICAL, AND NUCLEAR MATERIALS IS FRIGHTENING. EVEN MORE FRIGHTENING IS THE LACK OF EFFORTS TO CONTROL THEIR PROLIFERATION AND TO PREVENT THE USE OF THEM. AS THE POTENTIAL THREAT OF CHEMICAL, BIOLOGICAL, AND OTHER UNCONVENTIONAL WEAPONS GROWS AT THE LOCAL, STATE, AND FEDERAL LEVELS, PREPARATION FOR SUCH AN EVENT IS RAPIDLY BECOMING A SIGNIFICANT ISSUE TO THE PRIVATE SECTOR.
  • 4. BIOTERRORISM THE USE OF BIOLOGICALAGENTS IN WAR IS NOTHING NEW AND HAS EXISTED SINCE THE 6TH CENTURY. CONTROLLING AND CONTAINING A BIOTERRORISM ATTACK WILL REQUIRE INCREDIBLE EFFORT AND COOPERATION ACROSS INTERNATIONAL BOUNDARIES. MODERN MAN HAS SHOWN TO BE JUST AS RUTHLESS AS HISTORICALARMIES AND GOVERNMENTS. THE 20TH CENTURY'S FIRST USE OF BIOWEAPONS OCCURRED DURING WORLD WAR I WHEN A GERMAN UNDERCOVER AGENT SUPPOSEDLY INFECTED THE FRENCH FOOD SUPPLY. BIOLOGICAL AGENTS OF SPECIFIC CONCERN FOR HUMAN HEALTH INCLUDE VIRUSES, BACTERIA, AND TOXINS SUCH AS THOSE CAUSING SMALLPOX, ANTHRAX, PLAGUE, TULAREMIA, BOTULISM TOXIN, AND VIRAL HEMORRHAGIC FEVERS (FOR EXAMPLE, EBOLA VIRUS). http://emergency.cdc.gov/agent/agentlist.asp
  • 5. THE POTENTIAL CHEMICAL THREATS WHICH MAY BE ENCOUNTERED BY EMERGENCY PROFESSIONALS INCLUDE BOTH CHEMICAL WARFARE AGENTS AND TOXIC INDUSTRIAL CHEMICALS. CHEMICAL WARFARE AGENTS ARE USED TO KILL, SERIOUSLY INJURE, OR INCAPACITATE PEOPLE THROUGH PHYSIOLOGICAL EFFECTS. THERE ARE TWO CATEGORIES OF CHEMICAL AGENTS: NERVE AGENTS AND BLISTER AGENTS. NERVE AGENTS INCLUDE SARIN, TABUN, SOMAN, AND GF OR VX. THESE ARE COMPOUNDS THAT ATTACK THE CENTRAL NERVOUS SYSTEM AND ARE ABSORBABLE THROUGH THE SKIN, RESPIRATORY, AND ORAL ENTRY POINTS. THEY ARE EASILY DISPERSED AND HIGHLY TOXIC, WITH SPEEDY EFFECTS. EXPOSURE TO THESE AGENTS THROUGH RESPIRATORY MEANS CAN RESULT IN RAPID DEATH. EXPOSURE THROUGH THE SKIN CAN CAUSE SYMPTOMS WITHIN 30 MINUTES AND EVENTUAL DEATH AS WELL. ORAL EXPOSURE CAN OCCUR BY EATING CONTAMINATED FOOD FROM AN AREA WHERE THE AGENT HAS BEEN DISPERSED. BLISTER AGENTS SUCH AS MUSTARD GAS BURN OR BLISTER THE SKIN, EYES OR LUNGS. THE SYMPTOMS MAY NOT APPEAR IMMEDIATELY, POSSIBLY BEING DELAYED FOR TWO TO 24 HOURS AFTER EXPOSURE. LARGE QUANTITIES OF THESE AGENTS ARE ACTUALLY STORED IN THE UNITED STATES AND POSE TANTALIZING TARGETS FOR TERRORISTS.
  • 6. NUCLEAR THREATS WITH THE END OF THE COLD WAR, THE WEST HAD STARTED TO STOP REFERRING TO SUCH TERMS AS NUCLEAR DETERRENCE, MASSIVE ASSURED DESTRUCTION, AND NUCLEAR RETALIATION. HOWEVER, TERRORISM HAS RENEWED THE THREAT FROM SUCH WEAPONS. THE CONCEPT OF NUCLEAR TERROR RELIES ALMOST ENTIRELY ON ITS ASSUMPTION THAT ROGUE STATES COULD PROVIDE NUCLEAR WEAPONS "SECRETLY" TO TERRORISTS. THE GOVERNMENT THEN REASONED THAT SHOULD THESE SECRET LINKS BE EXPOSED, DETERRENCE COULD LARGELY BE RESTORED BECAUSE THE UNITED STATES WOULD THREATEN UNACCEPTABLE RETALIATION. ROGUE STATES WOULD HAVE TO CONSIDER THE GRIM REALITY OF MASSIVE RETALIATION. IT IS UNCLEAR WHETHER SUCH NATION STATES AS IRAN HAVE EVEN CONSIDERED RETALIATION AS A REALISTIC RESPONSE FROM THE WEST. IN ADDITION, IT MUST ALSO BE RECOGNIZED THAT DIRTY BOMBS, ALTHOUGH NOWHERE NEAR AS DEVASTATING AS NUCLEAR BOMBS, CAN STILL CAUSE MASSIVE DAMAGE, MAJOR HEALTH PROBLEMS, AND INTENSE PSYCHOLOGICAL HARM.
  • 7. CYBER TERRORISM AND COMPUTER SECURITY COMPUTER CRIME IS DEFINED GENERALLY DEFINED AS THOSE CRIMES WHICH INVOLVE ACCESSING A COMPUTER’S DATABASE WITHOUT AUTHORIZATION OR EXCEEDING AUTHORIZATION FOR THE PURPOSE OF SABOTAGE OR FRAUD. IT ALSO COMPRISES THEFT OR DESTRUCTION OF SOFTWARE AND HARDWARE. COMPUTER SECURITY, THEREFORE, IS THE PROTECTION OF ALL ASSETS, ESPECIALLY INFORMATIONAL, FROM BOTH HUMAN MADE AND NATURAL DISASTERS. COMPUTER SECURITY INCLUDES PROTECTING DATA, TELECOMMUNICATIONS, PERSONNEL, AND THE PHYSICAL ENVIRONMENT.
  • 8. COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) SOON AFTER 9/11, THE ADMINISTRATION SOUGHT TO IMPLEMENT THE PRESIDENT’S NATIONAL STRATEGY TO SECURE CYBERSPACE. THE RESULTS INCLUDED THE FORMULATION OF A STANDARDIZED INCIDENT HANDLING PROCEDURE FOR CYBER SECURITY INCIDENTS AND THE FUTURE CONSOLIDATION OF CYBER WATCH CENTERS. THE NATIONAL COMPUTER EMERGENCY RESPONSE TEAM (US-CERT) TOGETHER WITH CARNEGIE MELLON’S CERT/COORDINATION CENTER IS MEANT TO BE A COORDINATION CENTRAL POINT FOR ADDRESSING CYBER ATTACKS.
  • 9. INTELLIGENCE AGENCY CAPABILITIES INTELLIGENCE IS THE ART OF LEARNING WHAT YOUR ENEMY, OR POTENTIAL ENEMY, IS DOING, THINKING, PLANNING, OR PLOTTING. THERE ARE TWO BASIC FORMS OF INTELLIGENCE: HUMAN INTELLIGENCE (HUMINT) AND TECHNICAL INTELLIGENCE (TECHINT). IN 1949, THE CIA CREATED THE OFFICE OF SCIENTIFIC INTELLIGENCE. SINCE THEN, THE AGENCY’S SCIENCE AND TECHNOLOGY EFFORT HAS HAD A DRAMATIC IMPACT ON THE COLLECTION AND ANALYSIS OF INTELLIGENCE. AT THE BEGINNING OF THE COLD WAR, BOTH HUMINT AND TECHINT GENERALLY UNDERTOOK COLLABORATIVE EFFORTS, DUE LARGELY IN PART TO A COMMON OBJECTIVE OF DEFEATING THE SOVIET THREAT. AT THE HEIGHT OF THE COLD WAR, HOWEVER, THE RELIANCE ON TECHNOLOGY HAD REACHED A DISPROPORTIONATE LEVEL WITH HUMAN INTELLIGENCE GATHERING MECHANISMS. REORIENTING HUMINT COLLECTION TO GIVE SIGNIFICANTLY GREATER ATTENTION TO TERRORIST OR POTENTIALLY TERRORIST GROUPS WOULD HAVE IMPORTANT AND HOPEFULLY POSITIVE IMPLICATIONS FOR THE INTELLIGENCE COLLECTION PROCESS.
  • 10. TERRORISM, AND ESPECIALLY TERRORIST ACTS ASSOCIATED WITH BIOLOGICAL, CHEMICAL, OR NUCLEAR WEAPONS IS AN EXTREMELY DEMANDING ISSUE. THE INTELLIGENCE COMMUNITY BEARS THE BURDEN OF ACQUIRING INFORMATION SUFFICIENTLY ACCURATE TO PREVENT SUCH ATTACKS. WHETHER THE GOVERNMENT IS SUCCESSFUL IN COMBATING TERRORISM WILL BE JUDGED NOT ONLY ON ITS EFFORTS TO CIRCUMVENT AN ATTACK, BUT ON HOW IT REACTS TO A WEAPON OF MASS DESTRUCTION ATTACK.
  • 11. CASE STUDY: HEMORRHAGIC FEVERS ARE CAUSED BY VIRUSES. DISCUSS THE ETHICS OF SHOOTING DOWN AN AIRCRAFT WHERE THE VIRUS HAS SPREAD THROUGHOUT THE CREW AND PASSENGERS.
  • 12. WEB RESOURCES GERMS: BIOLOGICAL WEAPONS AND AMERICA’S SECRET WAR, NEW YORK: SIMON AND SHUSTER, 2002, ISBN: 0684871599
  • 13. EPILOGUE- “BUYING DUCT TAPE BY THE MILE AND HAVING ELDERLY WOMEN REMOVE THEIR SHOES AT AIRPORTS DO ABSOLUTELY NOTHING TO INCREASE HOMELAND SECURITY.” MARCUS RAMEN, THE MYTH OF HOMELAND SECURITY.
  • 14. LEARNING OBJECTIVES AFTER READING THIS CHAPTER THE READER SHOULD BE ABLE TO: 1. DEBATE INTELLIGENTLY THE MAJOR ISSUES FACING TRANSPORTATION SECURITY IN THE FUTURE. 2. REASON THE NEXT BEST STEPS TO TAKE IN THE WAR ON TERRORISM.
  • 15. DISCUSSION QUESTIONS AND EXERCISES- CONTROVERSIAL ISSUES WHICH CAN BE DEBATED 1. DOES TORTURE WORK? IS IT JUSTIFIABLE IN A DOOMSDAY SCENARIO? 2. INDIVIDUALS WHO PARTICIPATED WITH OR ASSISTED AL Q’AEDA ARE CHARGED WITH OFFENSES AGAINST THE LAWS OF WAR. YET THE BUSH ADMINISTRATION HAS DENIED THAT THEY REPRESENT A “MILITARY FORCE” OR HAVE POW STATUS. NORMALLY, THE UNIFORM CODE OF MILITARY JUSTICE WOULD APPLY. OR, IS THERE A CONCURRENT POWER THAT CAN BE USED TO IMPLEMENT BY PRESIDENTIAL ORDER? 3. ARE THE AIR AND SEA MARSHAL PROGRAMS COST EFFECTIVE? 4. IS THE WEST PREPARED FOR A WEAPON OF MASS DESTRUCTION ATTACK? 5. SHOULD TERRORISM BE FOUGHT VIA LAW ENFORCEMENT MEANS OR MILITARY? 6. HAS THE PATRIOT ACT STRIPPED AWAY CRITICAL INDIVIDUAL RIGHTS IN VIOLATION OF THE U.S. CONSTITUTION? 7. HAS THE CREATION OF THE DEPARTMENT OF HOMELAND SECURITY ESTABLISHED JUST ANOTHER BUREAUCRACY? 8. HAS THE TRANSPORTATION SECURITY ADMINISTRATION BEEN EFFECTIVE? 9. WHAT ARE THE ROOTS OF TERRORISM IN THE MIDDLE EAST AND HOW DO CONTROL IT? 10. IS A DECLARATION OF WAR NECESSARY IN THE “WAR ON TERRORISM?”