DOC PREVIEW
UW CSEP 590 - Lecture Notes

This preview shows page 1-2-3-19-20-39-40-41 out of 41 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

How Serious is the “WMD Terrorism” Threat?: Terrorist Motivations and Capabilities for Using Chemical, Biological, Radiological, and Nuclear WeaponsWMD TerrorismHypeSlide 4Slide 5Hype or Threat?Conflating Events?Conflating Events Again?Slide 9Slide 10Incidents per YearThe Empirical RecordSlide 13Slide 14Slide 15The Empirical Record: CasualtiesDistribution by Event TypeThe Empirical Record: GeographySlide 19Slide 20Slide 21Slide 22Key Motivational FactorsWho makes the Decisions?Slide 25CapabilitiesSlide 27Slide 28DesiderataCBRN Terrorism Risk PlaneSlide 31Terrorists and TechnologySlide 33Slide 34Slide 35Bad News …Slide 37But Some Good NewsSlide 39The Bottom LineThe EndHow Serious is the “WMD Terrorism” Threat?: Terrorist Motivations and Capabilities for Using Chemical, Biological, Radiological, and Nuclear WeaponsGary AckermanDirector, WMD Terrorism Research ProgramCenter for Nonproliferation StudiesMonterey Institute of International StudiesE-mail: [email protected] 28, 2005Jeffrey BaleSenior Research Associate, WMD Terrorism Research ProgramCenter for Nonproliferation StudiesMonterey Institute of International StudiesE-mail: [email protected] TerrorismHypeHypeHype•Security condition upgrades•Government warningsHow far we have come … from 1950s ‘Duck & Cover’ to 2003 ‘Duct tape & Cover your windows’Hype or Threat?•Media want to inform us but inevitably sensationalize things.•After Sept 11, government officials don’t want to be accused of being complacent or not warning public, so tend to dwell on worst-case scenarios.Conflating Events?Conflating Events Again?WMD Terrorism DatabaseIncidents per YearYear Excluding HoaxesHoaxes Total1999 53 76 1292000 77 27 1042001 68 239 3072002 56 68 1242003 54 41 952004 28 17 452005 37 32 69The Empirical RecordThe Empirical RecordThe Empirical RecordThe Empirical RecordThe Empirical Record: CasualtiesDistribution by Event TypeThe Empirical Record: GeographyChemical Incident DistributionNumber of cases by Group Type all biological chemical combination nuclear radiological unknown Criminal Organization 10 2 % Left-wing 36 7 % Lone actor (s) 79 15 % N/A 7 1 % Nationalists / Separatists 100 18 % Religious (cults) 40 7 % Religious (fundamentalists) 54 10 % Right-wing 26 5 % Single-issue 33 6 % Unknown 157 29 % Total 542 100 %Number of cases by Motive all biological chemical combination nuclear radiological unknown False Case 1 0 % To Act Because of an Ideology/Belief System 162 30 % To Act on a Personal/Professional Grudge 15 3 % To Establish Ethno-Nationalist Sovereignty 98 18 % To Express Abortion-Related Sentiment 39 7 % To Extort Money/Pure Financial Gain 41 8 % To Fulfill Individualized Objective 43 8 % To Protest Treatment of Animals 9 2 % To Support Other Single-Issue 25 5 % Unknown 110 20 % Total 543 100 %Delivery Type for CBRN Attacks0 50 100 150Number of AttacksDelivery TypeWater SupplyVentilation SystemUnknownReaction DeviceN/AMail/Letter/PackageJug/Jar/CanisterInjection/ProjectileFood/DrinkExplosive DeviceConsumer ProductTamperingCasual/Personal/DirectContactAerosol/SprayKey Motivational FactorsRelevant determinants of terrorist behavior:Factors Relating to the Nature of the GroupIdeology, Organizational Structure, Organizational Dynamics, Organizational Lifecycle Status, Demographics, Resources, Operational Capabilities Factors External to the GroupHistorical Events, Relations w/ External Actors (media; other extremists; state apparatus; targeted audience; non-targeted audience; supporters), Security Environment, (Potential) Target CharacteristicsFactors Relating to Decision-MakingGeneral Planning Characteristics (risk thresholds; time horizons), Perceptual Filter, Operational ObjectivesWho makes the Decisions?Decision to carry out attack XIndividual terroristSub-group Organization LeadershipAll members (democracy)CommitteeIndividual terroristIndividual terroristIndividual terroristCommitteeIndividual terroristIndividual terroristIndividual terroristIndividual terroristIndividual terroristSub-groupsCapabilitiesMain questions:–Do terrorists currently have the capability to engage in true WMD attacks?–Is the capability of terrorists with regard to WMD increasing?–If terrorists’ WMD capabilities are increasing, what is the rate of this change?CapabilitiesBroad Trends–Terrorist capabilities in general are increasing–Societal changes can increase vulnerabilities and facilitate terrorist capabilitiesCapabilities•Organizational Capabilities•Logistical Resources•Financial Resources•Knowledge/Skill Acquisition•Materials and Technology Acquisition–C,B,R, and N differ•Initial Production of Agent–C,B,R, and N differ•Weaponization of Agent–C,B,R, and N differDesiderata•Insiders•State sponsorship•Attacks on FacilitiesRadiologicalBiologicalNuclearChemicalConventional ExplosivesProbability (based on capability considerations only) ConsequenceCBRN Terrorism Risk Plane RISK = Probability x Consequence•Traditionally, terrorists have tended in their use of weapons and tactics to be both:–Conservative •“Path of least resistance” – terrorists generally seek to use the easiest, cheapest, tried-and-true methods–Imitative•Terrorists often utilize the successful tactics and weapons types of other groups (albeit with some localization, e.g. Mao to Carlos Marighella)•Why?–Most groups have limited resources and there are costs associated with identifying, researching and implementing new technologies, in terms of time, finances, personnel etc. –There are also often uncertainties about the reliability of any new technology in terms of achieving desired effects.–Soft targets vulnerable to traditional weapons are plentiful.Terrorists and Technology•BUT, there are exceptions to the above (may be becoming more common) where terrorists will seek new technologies:A. Specific ideological orientation towards innovating technologically•Examples: Aum Shinrikyo sending operatives to explore the documents of Nikola Tesla in hopes of building an earthquake generating machine; in some groups ideology may drive members to push the technological envelope, such as in a conceivably violent version of the Raelian cult (who pursue human cloning and worship extraterrestrials).B. Existing methods insufficient to achieve aims•For example, when current weapons do not (or are perceived to not) result in enough casualties,


View Full Document

UW CSEP 590 - Lecture Notes

Documents in this Course
Sequitur

Sequitur

56 pages

Sequitur

Sequitur

56 pages

Protocols

Protocols

106 pages

Spyware

Spyware

31 pages

Sequitur

Sequitur

10 pages

Load more
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?