The document provides a historical overview of CBRN incidents from antiquity to present day. It summarizes the development and use of chemical, biological, radiological, and nuclear agents in warfare, terrorism, and accidents. Key events discussed include the first large-scale chemical weapons attack in WWI, development of chemical and biological weapons programs by numerous nations in the 20th century, industrial accidents like Bhopal, and the first and only uses of nuclear weapons in wartime. The document aims to contextualize CBRN threats by examining the history of related agents and incidents.
The USMC is shaping a 21st century approach to force insertion and to the sea base as a key element of such an approach. A key element of working the way ahead is the USMC approach to digital interoperability in shaping an integrated force with reach range and punch.
The USMC is shaping a 21st century approach to force insertion and to the sea base as a key element of such an approach. A key element of working the way ahead is the USMC approach to digital interoperability in shaping an integrated force with reach range and punch.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
2. Learning objective: To identify historical CBRN events and put them
into context
Presentation 3.1.1: Elaborated history: developmentof agents, actual
incidentsfrom the past & context
3. ElaboratedHistory: (non)deliberaterelease
• Elaborated history: development of agents, actual incidents from the past & context
3
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Radiological & Nuclear agents
Biological agents
Chemical agents
4. ElaboratedHistory: (non)deliberaterelease
• Elaborated history: development of agents, actual incidents from the past & context
4
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Radiological & Nuclear agents
Biological agents
Chemical agents
Non-deliberate release:
Accidental or naturally released which has the
potential to cause physical or psychological harm to
humans, including loss of life, damage or losses of
property, and/or disruption to the environment or of
economic social, political structures
Deliberate release:
Intentional release or dissemination by state-actors or
individuals, to cause fear, illness or death in people, animals
or plants and/or disrupting social, economic or political
stability.
5. Deliberaterelease
• Warfare
• Intentional release of agents for the purpose of killing or harming enemy
military personnel or populations
• Terrorism
• The intentional release or dissemination by terrorist of agents to cause fear,
illness or death in people, animals or plants and/or disrupting social,
economic or political stability
• Crime
• The use of an agent to kill or make ill a single individual or a small group of
individuals, motivated by revenge or monetary gain through extortion, rather
by than political, ideological, religious or other beliefs.
5
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
7. Chemicalwarfare: historic perspective
• 429 BC, Greece Peloponnesian War, the siege of Platea
• Spartans burned sulfur, creating toxic gases, resulting
in Plateans abandoning their posts.
• 1456, Siege of Belgrade
• Alchemist created poison clouds by burning rags that
may have contained chlorine gas
• Fifteenth century
• Leonardo da Vinci designed explosive shells filled with arsenic and sulfur for
use against ships
7
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
8. Chemicalwarfare: WorldWar I
• 1915-1918, World War I
• French, German, & British troops
• 22 April 1915, Ypres, Belgium:
• First large-scale attack using chemical weapons taking place at Leper
8
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
• 124,200 tonnes of chlorine, mustard and
other chemical agents released
• > 90,000 soldiers had suffered painful
deaths due to exposure to them
• ~ 1.000.000 people blind, disfigured or
debilitating injuries
9. Chemicalwarfare: GenevaProtocol
• 1925 Geneva Protocol
• Protocol for the Prohibition of the Use of Asphyxiating, Poisonous or Other
Gases, and of Bacteriological Methods of Warfare
• Meant to prevent recurrence of chemical weapons after horrors of World War I
• Prohibits the use of chemical and biological weapons in interstate wars
• Does not prohibit the development, production or possession of chemical and
biologiweapons
9
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
10. Chemicalwarfare: Chemicalweaponprograms
24 Countries with known or possible chemical weapons after World War II
• USSR
• 1967 decree: directing preparations for chemical-biological war
• The stockpile of chemical weapons consisted of a declared stockpile of
nearly 40,000 metric tons of chemical nerve, blister and choking agents
• United States
• The chemical weapons program began in 1917 during World War I with
the creation of the U.S. Army's Gas Service Section and ended 73 years
later in 1990
10
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
11. Chemicalwarfare: Late20th century
• 1980-1988, Iran-Iraq war
• Iraq used mustard gas and tabun on Iranian forces and civilians
• 1990-1991, Threat of chemical warfare during the Gulf War
• Late 1980s, Improvement in superpower relations
• 1990, bilateral United States–Soviet Union agreement:
• to destroy most of their Chemical Weapon stockpiles
• to refrain from further CW production
11
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
12. ChemicalWeapons Convention
12
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
• Prohibits the large-scale use, development, production, stockpiling and
transfer of chemical weapons and their precursors
• 1993, Opened for signature
• 1997, Entered into force
• Most states have joined the Chemical Weapons Convention, which
required the destruction of all chemical weapons by 2012.
• Many nations continue to research and/or stockpile chemical weapon
agents despite numerous efforts to reduce or eliminate them.
• According to the United States government, at least 17 nations currently
have active chemical weapons programs.
13. ChemicalWeapons Convention
13
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
• Organisation for the Prohibition of Chemical Weapons (OPCW) is the
implementing body for the Chemical Weapons Convention
• 2013 Nobel Prize for Peace was awarded to the OPCW
As of 31 March 2021:
• 98.5% of world’s declared chemical weapons stockpiles destroyed
• Total destroyed stockpiles of chemical agents: 71,270 metric tonnes
• 97 Chemical Weapons Production Facilities (CWPF) declared
• 74 Destroyed
• 23 Converted for peaceful purpose
14. Chemicalterrorism
• 1995, Aum Shinrikyo cult released Sarin on 3 metro lines, Tokyo, Japan
• 2015, 35 Kurdish fighters wounded in a chemical attack by ISIS terrorists,
Erbil, Iraq
• 2016, ISIS launched a chemical attack on a town injuring 600 persons,
Taza, Iraq
14
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
15. UN SecurityCouncil Resolution1540 (2004)
• Adopted unanimously on 28 April 2004
• Member States are obliged to prevent the spread of weapons of mass
destruction by non-state actors
• Resolution is universal by covering nuclear, chemical and biological weapons
and their means of delivery
• States are required to ensure a national legal framework of laws, regulations
and controls
15
MELODY 3.1.1 Elaborated history : development of agents, actual incidents from the past & context
16. Chemicalassasination
• 2018, Poisoning of Sergei and Yulia Skripal
• Both were poisoned in Salisbury, England, with a Novichok nerve agent
16
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
17. Chemicalagents: transport accidents
• 1979, Train derailment, Florida, USA
• Train with 29 cars derailed
• 26 cars contained hazardous materials
• 2 tank cars with anhydrous ammonia ruptured and
rocketed
• 12 tank cars were ruptured, content burned
• acetone, methyl alcohol, chlorine, carbolic acid, and
anhydrous ammonia
• 14 persons were injured as a result of the release
of anhydrous ammonia and other materials or
during the evacuation of 4,500 persons.
17
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
18. Chemicalagents: industrial accidents(1)
• 1984, chemical plant leakage release, Bhopal, India
• Union Carbide India Limited (UCIL) pesticide plant in Bhopal,
released methyl isocyanate (MIC) gas in the night 2 -3
December 1984
• Considered to be the world's worst industrial disaster.
• Over 500,000 people were exposed
• In retrospect (2006): leak caused 560,000 injuries, including
39,000 temporary partial injuries and approximately 4,000
severely and permanently disabling injuries.
18
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
19. Chemicalagents: industrial accidents(2)
• 2010, Oil spill, Gulf of Mexico, USA
• Upwelling natural gas caused an explosion on
the Deepwater Horizon oil platform in April
• Subsequent sinking of the platform left the oil
well uncovered
• Oil well was declared sealed in September
• Considered the largest marine oil spill
and one of the largest environmental disasters
in American history
• 11 people were killed, 17 people injured
19
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
21. • 184 B.C. Naval battle, King Eumenes vs Hannibal of Carthage
• Hanibal’s navy catapulted pots with venomous snakes towards
enemy ships.
• 1346, Siege of Caffa (Feodosia, Crimea), by the Mongolian army
• Tartar forces catapulted bubonic plague victims over the walls of
the city
21
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
BiologicalWarfare: historic perspective(I)
22. • 1863, American Civil War. Confederate versus Union forces
• Confederates sell clothing from yellow fever & smallpox patients to
Union troops
• 1916, WW I. Germany (attempted) anti-agricultural biological warfare, by
using
• Ampoules with anthrax, which were placed by agents in horse stables of
Russian forces in Finland
• Acquired laboratory produced glanders to infect livestock in ports &
collection points in the USA
• 1925, Geneva protocol
• Prohibits the use of chemical and biological weapons
22
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
BiologicalWarfare: historic perspective(II)
23. Biologicalweapon programs
• Biological weapon: combination of a biological agent with a dissemination
system
• Identification of countries running biological weapon programs is not easy
• Based on what is known, 15 countries had biological weapon programs
• The Soviet Union and US programs have the largest and most
sophisticated programs as compared to the other countries
23
MELODY 3.1.1 Elaborated history : development of agents, actual incidents from the past & context
24. • Biological weapon programs: USSR (52 sites
employing over 50,000 people)
• 1920 - 1992 (according to Boris Yeltsin)
• 1946: biological weapons facility established in
Sverdlovsk.
• 1973: A "civilian" main directorate, Biopreparat,
was founded.
• Human experimentation occurred with typhus,
glanders and melioidosis in the Solovetsky camp
• Stockpiles of battle-ready biological weapons
24
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Biologicalweapon programs: USSR
25. • Biological weapon programs: USA
• 1943 until 1969
• Fort Detrick
• Laboratory and field testing had been
common, some of the latter using simulants
on non-consenting individuals.
• Stockpiles of battle-ready biological
weapons
25
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Biologicalweapon program:USA
26. Biologicalweapon programs
• 1979, accidentally release of anthrax
• Soviet military research facility near
Sverdlovsk, Russia
• Weaponized Anthrax strain (836)
• Accident during change of filters
• Wind was away from the city
• Deaths ≥ 75
• Reported ill: 120-400
26
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
27. • Biological weapon programs
27
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Biologicaland ToxinWeapons Convention
Biological and
Toxin Weapons
Convention
BTWC (1972)
28. Biologicalagents: naturalepidemics
• 1918, Spanish flu, influenza pandemic
• Unusually deadly influenza pandemic.
• Estimation 50 million / up to 100 million
deaths, i.e. 3-5 % of Earth's population
• Deadliest epidemics in human history
28
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
29. Biologicalindustrial outbreak
• 2007 -2011, Q fever outbreak in The Netherlands
• Spill-over from animals to humans
• 5000 people diagnosed with Q fever
• Goats and sheep designated as the source of the outbreak.
29
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
30. • 1984, Intentional release of Salmonella in salad
bars (The Dallas, Oregon, USA)
• Bhagwan followers contaminated 10 salad bars
with S. enterica Typhimurium
• 2001, Anthrax attacks (Amerithrax), one week
after the September 11 attack
• Letters containing anthrax spores mailed to
news media offices and senators
30
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Biologicalterrorism
31. 31
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Biologicalassasinations
• 1978 Umbrella murder, London. Bulgarian
dissident (injected with ricin pellet)
• Bulgarian secret police injected Marcov with
ricin, using an umbrella-like device.
• 1996 Intentional release of Shigella dysenteriae
(pastries in laboratory canteen)
• Bacterial strain originated from own laboratory
stock, released by lab technician.
33. Nuclearwarfare
• USA detonated two bombs over Japan
• 1945 August 6, Hiroshima:
• "Little Boy", uranium gun-type bomb
• blast killed 90-146,000 people
• 1945 August 9, Nagasaki:
• "Fat Man", plutonium implosion bomb
• blast killed 39-80,000 thousand
• people continued to die for months afterwards
• radiation protection today is largely built on the
long-term effects in survivors
33
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
34. Nuclearweapon programstreaties
34
Monitoring network for Nuclear Detonation
• Limited Nuclear Test Ban, 1963
• testing in outer space, underwater or in atmosphere.
• signed by USSR, USA, UK
• Comprehensive Test Ban, 1996
• weapon test or other nuclear explosion
• signed by the five NWS +184 nations
• note: ratification is still in progress
• Non-Proliferation, 1968
• into force 1970
• non-NWS never acquire nuclear weapons
• NWS share benefits of peaceful technology and pursue disarmament
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
35. 35
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
CNEN, Brazil
• 1960 - 2001 34 incidents worldwide:
• 42 early deaths (children and adults)
• >300 affected
• Orphan sources
• abandoned or never registered
• Teletherapy sources
• Radioisotope Thermoelectric Generator
• dismantled for scrap metal or
taken home as they look "interesting"
• Major incident: Goiânia, Brasil, 1987
• 4 death, 129 people affected
• 3500 m3 of radioactive waste
Radiologicalrelease:ignorance
36. • 1987, Iraq tests dirty bomb, radiation level deemed too low, Iraq
• 1995, Cesium found in park in Moscow, Russia
• 1998, Undetonated dirty bomb found in Grozny, Chechnya
• 2002, J. Padilla arrested for planning dirty bomb attack, Chicago, USA
• 2003, British claim Al Qaeda built a dirty bomb, statement was withdrawn
• 2006, Litvinenko assassination using Polonium 210, London, UK
• 2007, D. Barot convicted planning dirty bomb attack, UK
36
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Radiologicalterrorism and assasination
37. • Accidents, but no radiological accidents
• To date, none have resulted in any significant releases
• Strict and extensive regulations on
packing prevent accidental releases
• Transported radioactive materials
are not explosive, they do not burn
Radiologicalagents: Transport accidents
37
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
38. • Non-deliberate release: transport accidents
• 1968 Thule, USAF B-52 crashed carrying 4 B28FI thermonuclear bombs
• nuclear payload ruptures and dispersed
• Denmark requested removal of all contaminations
38
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
Nuclearmaterials
39. 39
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
• Non-deliberate release: industrial accidents
• Criticality accidents:
• 23 criticality accidents reported in 1945 - 2003
• most related to nuclear weapons program
• 7 accidents, exposures of the environment,
and potentially to the general public
• Nuclear Power Plants:
• Three Mile Island,1979. Harrisburg, USA
• Reactor 4, 1986, Chernobyl, USSR/Ukraine
• Daiichi, 2011, Fukushima, Japan
Nuclearindustrial accidents
40. Nuclearmaterials:aboveground testing
40
• Over 2100 detonations world wide
• Around 500 above ground, continued
until 1975
• Increased background radiation
world wide
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context
1945
2013
Partial Test-Ban Treaty
opened for signature, 1963
bans atmospheric testing
Comprehensive Nuclear-Test-Ban Treaty
opened for signature, 1996
bans explosive testing
41. Takehome message
• Large scale accidents, deliberate releases and assassinations with CBRN
agents have occurred with long-lasting consequences for man and the
environment
• Treaties to prevent further development and use of CBRN as warfare
agents exist, both for state as for non-state actors, but not all countries
ratified these treaties
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context 41
42. Thank you for your attention
42
MELDOY Presentation 3.1.1: Elaborated history: development of agents, actual incidents from the past & context