1FOOD VULNERABILITY AND TERRORIST THREAT CW2 Frank M. McLaughlin Unclassified, CW2 Frank McLaughlinBioterrorism and Our Food SupplyUnclassified, CW2 McLaughlinBioterrorism and our Food Supply2Objectives Historical Examples Exponential Rise Bioterrorism Agents New Laws Overview Current Trends Detection Methods ConclusionUnclassified, CW2 McLaughlinBioterrorism and our Food Supply3TerroristsScare People (killing is Scare People (killing is secondary, maybe)secondary, maybe)Affect Most Vulnerable Affect Most Vulnerable (Children?)(Children?)Create Chaos (people Create Chaos (people afraid to eat foods)afraid to eat foods)Create Economic Create Economic Disaster (won’t buy Disaster (won’t buy foods)foods)Create Farm CrisesCreate Farm CrisesUnclassified, CW2 McLaughlinBioterrorism and our Food Supply4The Bad Guys Well organized State supported Small groups Wild-cardsUnclassified, CW2 McLaughlinBioterrorism and our Food Supply5Terrorist ProfilesNew recruits: 17New recruits: 17--24 yrs, male, educated, not 24 yrs, male, educated, not socially integrated, stable backgrounds, unhappysocially integrated, stable backgrounds, unhappyBombers: 25Bombers: 25--35 yrs, male, more patient now35 yrs, male, more patient nowLeadership: 35Leadership: 35--45 yrs, least reckless45 yrs, least recklessAnimal Rights activists: Female or male, young to Animal Rights activists: Female or male, young to middle aged, college educated and often affluent middle aged, college educated and often affluent More prone to vandalism than violenceMore prone to vandalism than violenceAntiAnti--technology activists: Disaffected but may be technology activists: Disaffected but may be educated.educated.Unclassified, CW2 McLaughlinBioterrorism and our Food Supply6Definitions Of Terrorism?““Terrorism is the use or threatened use of Terrorism is the use or threatened use of force designed to bring about political force designed to bring about political change”.change”.----Brian Jenkins Brian Jenkins Terrorism constitutes the illegitimate use of Terrorism constitutes the illegitimate use of force to achieve a political objective when force to achieve a political objective when innocent people are targeted.innocent people are targeted.----Walter Walter Laqueur Laqueur2Unclassified, CW2 McLaughlinBioterrorism and our Food Supply7More… ““Terrorism is the unlawful use of force or Terrorism is the unlawful use of force or violence against persons or property to violence against persons or property to intimidate or coerce a government, the intimidate or coerce a government, the civilian population, or any segment thereof, civilian population, or any segment thereof, in furtherance of political or social in furtherance of political or social objectives. objectives. ----FBI Definition FBI Definition ."."Unclassified, CW2 McLaughlinBioterrorism and our Food Supply8The DOD Definition Of Terrorism ““The calculated use of violence or the The calculated use of violence or the threat of violence to inculcate fear; threat of violence to inculcate fear; intended to coerce or to intimidate intended to coerce or to intimidate governments or societies in the pursuit governments or societies in the pursuit of goals that are generally political, of goals that are generally political, religious, or ideological."religious, or ideological."Unclassified, CW2 McLaughlinBioterrorism and our Food Supply9Definition of Bioterrorism ““bioterrorism is assumed to involve the threat or use of biological agents by individuals or groups motivated by political, religious, ecological, or other ideological objectives”.--Seth CarusUnclassified, CW2 McLaughlinBioterrorism and our Food Supply10Is This Something New? 6thCentury B.C. Assyrians - Rye ergot Tartar Army at Kaffa- Plague Russians at Carolstein – 1710 Native Americans – 1763, 1767 Horses – WW I Japanese Unit 731Unclassified, CW2 McLaughlinBioterrorism and our Food Supply11U.S. in the 20thCentury 1943 US Biological Warfare program 1953 Defensive program established 1969 Offensive program disbanded 1971 Stockpiles destroyedUnclassified, CW2 McLaughlinBioterrorism and our Food Supply12What Are The Threats?What Are The Threats?ChemicalChemicalBiologicalBiologicalPhysicalPhysicalRadiologicalRadiologicalExplosivesExplosivesHoaxHoax3Unclassified, CW2 McLaughlinBioterrorism and our Food Supply13Potential Intents for ThreatTampering for blackmail or to cause Tampering for blackmail or to cause widespread fear and economic loss to the widespread fear and economic loss to the processor or the industryprocessor or the industrySabotage to destroy the food product or Sabotage to destroy the food product or processingprocessing--related facilitiesrelated facilitiesTerrorism to cause massive causalities or Terrorism to cause massive causalities or economic disruption.economic disruption.Unclassified, CW2 McLaughlinBioterrorism and our Food Supply14Potential Outcomes ofFood Tampering or BioterrorismIllnessesIllnessesDisruption of domestic food production Disruption of domestic food production and delivery systemsand delivery systemsDisruption of international tradeDisruption of international tradeDeathsDeathsMission degradation/failure.Mission degradation/failure.Unclassified, CW2 McLaughlinBioterrorism and our Food Supply15Rise in Bioterrorism/HoaxesUnclassified, CW2 McLaughlinBioterrorism and our Food Supply16Recent Events 1984 - Bhagwan Shree Rajneesh 1990’s - Aum Shinrinkyo Cult 1996 – Texas Laboratory 2003 – Michigan Ground BeefUnclassified, CW2 McLaughlinBioterrorism and our Food Supply17Recent Incidents Anthrax Letters Ricin in England Ricin and “other toxins” Caster Beans in Baby Food Ricin Found in Majority Leader Bill Frist’s OfficeUnclassified, CW2 McLaughlinBioterrorism and our Food Supply18Assessing Threat AgentsEase of obtaining:Ease of obtaining:Commercial sourcesCommercial sourcesSelf productionSelf productionCastor beans Castor beans ----castor oil castor oil ----ricinricintoxintoxinEase of dissemination: powder, liquid, solid, gas, Ease of dissemination: powder, liquid, solid, gas, protective barriers, or delivery mechanismprotective barriers, or delivery
View Full Document