Aviation Security

Total Page:16

File Type:pdf, Size:1020Kb

Aviation Security HOMELAND SECURITY AND DEFENSE CENTER CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security and Defense Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occa- sional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity. O CC A S I O N A L PAPER HOMELAND SECURITY AND DEFENSE CENTER Aviation Security After Four Decades, It's Time for a Fundamental Review Brian Michael Jenkins RAND RESEarCH arEAS he recovery earlier this year of a new, CHILDREN AND FAMILIES Overview EDUCATION AND THE ARTS improved bomb designed to avoid detec- ENERGY AND ENVIRONMENT tion by airport security underscores ter- Aviation security is costly, controversial, and HEALTH AND HEALTH CARE rorists’ continuing determination to bring INFRASTRUCTURE AND TRANSPORTATION contentious; no other security measures directly down commercial airliners. Like the bomb carried by INTERNATIONAL AFFAIRS T affect such a large portion of the country’s LAW AND BUSINESS Umar Abdulmutallab in his unsuccessful attempt to population. Because of the nature of the threat, NATIONAL SECURITY sabotage an airliner in 2009, the new device designed POPULATION AND AGING aviation security is the most intrusive form of by al Qaeda’s bomb-maker was intended to be con- PUBLIC SAFETY security, pushing hard on the frontier of civil SCIENCE AND TECHNOLOGY cealed in the saboteur’s underwear. The device was liberties. And the threat is real: terrorists remain TERRORISM AND obtained by an intelligence operative who managed to HOMELAND SECURITY obsessed with attacking airplanes. persuade his al Qaeda handlers that he was ready to carry out that suicide mission. While it is necessary to At the same time, passenger loads are increas- investigate possible ways to counter this latest terror- ing, while security budgets are likely to decline. ist innovation, a more fundamental review of how we Performance suffers. Meanwhile, public toler- secure the airplanes that 2 million passengers board ance and cooperation are beginning to fray. every day in the United States is imperative. But the Transportation Security Administration Evolving terrorist tactics and technology pose new is often blamed for things beyond its control. threats, as growing passenger loads and added security And post-catastrophe reviews can push us in procedures are already straining airport screeners. the wrong direction, usually resulting in new And terrorists are not the only problem faced by the security measures rather than a reexamination Transportation Security Administration (TSA). Air- of strategy. line passengers have become increasingly hostile to the After 40 years of focus on tactical measures, This product is part of the very measures deployed to protect them, while TSA is RAND Corporation occasional it is time for a sweeping review of aviation paper series. RAND occasional under continuous assault in Congress. security. Instead of forming the usual federal papers may include an informed perspective on a timely policy commission to undertake this task, several issue, a discussion of new How Did We Get Where We Are? research methodologies, non-government research institutions could be essays, a paper presented at In terms of the total volume of terrorist violence in selected to independently design an optimal a conference, a conference the world and the casualties it causes, attacks on avia- summary, or a summary of aviation security system, beginning not with the work in progress. All RAND tion do not loom large. Between 9/11 and the end of four decades of accumulated security measures occasional papers undergo rigorous peer review to ensure 2011, there were 75 terrorist attacks on airliners and currently in place but with a clean slate. The that they meet high standards for airports worldwide, resulting in 157 deaths. Compare research quality and objectivity. competing models would be reviewed and the that with nearly 2,000 terrorist attacks on trains and best ideas or combination of ideas would be put © RAND 2012 buses, resulting in approximately 4,000 fatalities dur- forward. Even if the results turn out to resemble 1 ing the same period. what is already in place, at least the process In view of this, why is so much of our effort and offers some comfort that we are pretty close to our precious resources focused on protecting airplanes getting it right. 1 www.rand.org These statistics were obtained from the Mineta Transportation Institute's database of attacks on transportation targets. – 2 – and airports? From the earliest days of contemporary although the term is no longer used, America still international terrorism in the late 1960s, terrorists considers itself “at war” with terrorism, with overt have made commercial aviation a theater of combat, and covert military operations ongoing in a number mainly through hijackings. While governments were of countries. Military action in response to terrorism trying to build international consensus on outlawing is today a well-carved path. airline hijacking and sabotage as acceptable modes of Aviation security remains one of the most impor- Aviation security conflict, they were, at the same time, obliged to pro- tant components of our overall defense against ter- remains one of the tect their own airlines. And they also had to protect rorism. It is costly, controversial, and contentious. It most important themselves. dramatically demonstrates the basic tenet of terror- components of our Aviation security was never viewed solely as a ism—that small groups with a limited capacity for overall defense problem of passenger safety. Far more people die in power can achieve disproportionate effects by using against terrorism. ordinary traffic accidents. Hijackings and incidents terrorist tactics. The threat of one terrorist bomber of airline sabotage are spectacular events that put obliges the nation to divert vast sums to airport passengers’ lives in the balance for hours, days, even security. Terrorists need to recruit only one bomber; weeks, or cause airplanes to explode in the air. They the United States has to protect 450 commercial have created dangerous political crises. Hijackings airports, with tens of thousands of flights daily. Mil- have forced governments to negotiate for the lives of lions of passengers are inconvenienced, some possibly hostages, to stand by while hostages were murdered, humiliated. or to attempt long-shot rescues—all bad options. That raises strategic, even philosophical questions. Sabotage of aircraft represented a significant esca- If security is such a bad exchange, should the United lation in terrorist violence, matching the most mas- States instead track down and kill terrorist leaders sive truck bombings. It led to popular demands for and bomb-makers—itself a controversial mission? retribution, including sanctions, military retaliation, Must the United States go further and attempt large- acts of war—decisions governments did not want to scale military missions to destroy terrorist organiza- be forced to make. tions and stabilize the failing states in which they Imagine the impact on the country if the shoe reside? In the wake of 9/11, the United States invaded bomber had brought down a commercial airliner just Afghanistan. Al Qaeda’s bomb-maker currently three months after 9/11 or the consequences if the resides in Yemen. Must American troops now follow? underwear bomber had succeeded in bringing down Aviation security is also important because it is a plane in 2009. Nor is such a disaster a far-fetched there, as nowhere else, that security measures directly possibility today. affect such a large portion of the country’s popula- Al Qaeda leader Anwar al-Awlaki’s alleged tion. Moreover, because of the nature of the threat, involvement in terrorist operations, including the aviation security is the most intrusive form of secu- 2009 airline sabotage attempt, made him the target rity, pushing hard on the frontier of civil liberties. of an American drone
Recommended publications
  • Staff Statement No
    Outline of the 9/11 Plot Staff Statement No. 16 Members of the Commission, your staff is prepared to report its preliminary findings regarding the conspiracy that produced the September 11 terrorist attacks against the United States. We remain ready to revise our understanding of this subject as our work continues. Dietrich Snell, Rajesh De, Hyon Kim, Michael Jacobson, John Tamm, Marco Cordero, John Roth, Douglas Greenburg, and Serena Wille did most of the investigative work reflected in this statement. We are fortunate to have had access to the fruits of a massive investigative effort by the Federal Bureau of Investigation and other law enforcement agencies, as well intelligence collection and analysis from the Central Intelligence Agency, the National Security Agency, the State Department, and the Department of Defense. Much of the account in this statement reflects assertions reportedly made by various 9/11 conspirators and captured al Qaeda members while under interrogation. We have sought to corroborate this material as much as possible. Some of this material has been inconsistent. We have had to make judgment calls based on the weight and credibility of the evidence. Our information on statements attributed to such individuals comes from written reporting; we have not had direct access to any of them. Plot Overview Origins of the 9/11 Attacks The idea for the September 11 attacks appears to have originated with a veteran jihadist named Khalid Sheikh Mohammed (KSM). A Kuwaiti from the Baluchistan region of Pakistan, KSM grew up in a religious family and claims to have joined the Muslim Brotherhood at the age of 16.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Honorable Kevin Thomas Duffy
    U N I T E D S T A T E S D I S T R I C T C O U R T S O U T H E R N DISTRICT OF NEW YORK Office of the District Court Executive COLLEEN MCMAHON EDWARD A. FRIEDLAND Chief Judge District Court Executive Hon. Kevin Thomas Duffy (1933 - 2020) The Court is saddened to note the passing of Honorable Kevin Thomas Duffy, our former colleague who served this Court for 44 years (1972-2016), making him the third longest serving judge in the Court’s 230 history. A young Kevin Duffy arrived at the federal courthouse at Foley Square 65 years ago as bailiff to Circuit Judge J. Edward Lumbard. He later served as an Assistant United States Attorney in this the SDNY and Regional Administrator for the SEC. He will be remembered for his acts of kindness and compassion towards others around him and for his smile and wry sense of humor. For his work on terrorism cases, Judge Duffy and his wife were under United States Marshal protection for 10 years. Judge Duffy presided over difficult and important trials, including the following: • Two trials of those involved in the 1993 bombing of the World Trade Center, a terrorist act that resulted in 6 deaths and more than a thousand injured. The first trial last six months and the second three months. All tried defendants were convicted and the principal defendants received sentences of 140 years each. • The three-month Bojinka Plot trial in which defendant Ramzi Yousef was tried and convicted of conspiring to hijack and fly 12 US-bound planes on a coordinated schedule into the Pacific Ocean.
    [Show full text]
  • Military Commissions: a Place Outside the Law’S Reach
    MILITARY COMMISSIONS: A PLACE OUTSIDE THE LAW’S REACH JANET COOPER ALEXANDER* “We have turned our backs on the law and created what we believed was a place outside the law’s reach.” Colonel Morris D. Davis, former chief prosecutor of the Guantánamo military commissions1 Ten years after 9/11, it is hard to remember that the decision to treat the attacks as the trigger for taking the country to a state of war was not inevitable. Previous acts of terrorism had been investigated and prosecuted as crimes, even when they were carried out or planned by al Qaeda.2 But on September 12, 2001, President Bush pronounced the attacks “acts of war,”3 and he repeatedly defined himself as a “war president.”4 The war * Frederick I. Richman Professor of Law, Stanford Law School. I would like to thank participants at the 2011 Childress Lecture at Saint Louis University School of Law and a Stanford Law School faculty workshop for their comments, and Nicolas Martinez for invaluable research assistance. 1 Ed Vulliamy, Ten Years On, Former Chief Prosecutor at Guantanamo Slams ‘Camp of Torture,’ OBSERVER, Oct. 30, 2011, at 29. 2 Previous al Qaeda attacks that were prosecuted as crimes include the 1993 bombing of the World Trade Center, the Manila Air (or Bojinka) plot to blow up a dozen jumbo jets, and the 1998 embassy bombings in East Africa. Mary Jo White, Prosecuting Terrorism in New York, MIDDLE E.Q., Spring 2001, at 11, 11–14; see also Christopher S. Wren, U.S. Jury Convicts 3 in a Conspiracy to Bomb Airliners, N.Y.
    [Show full text]
  • A Noted Irregular Warfare Expert Reveals the Terrorist Organization’S Way of War and the Strategy of Jihad
    SPECIAL FEATURE A NOTED IRREGULAR WARFARE EXPERT REVEALS THE TERRORIST ORGANIZATION’S WAY OF WAR AND THE STRATEGY OF JIHAD . BY S EBASTIAN G ORKA SEPTEMBER 2011 marked the 10th anniversary of America’s longest ever war, the war against al- S E G A M Qaeda and its affiliates. Four months earlier, on May 2 , 2011 , the founder and head of al-Qaeda, Osama bin I Y T T E G / E Laden , was killed in Pakistan by members of U.S. Seal Team VI. The war is far from over ; but given these two I R E U G I V E historical markers, we should pause to examine the way of war that brought us September 11 , 2001 (9/11), D E U Q I N O R E and the strategy behind the deadliest terrorist organization in the modern history of irregular warfare . V 44 * ARMCHAIR GENERAL * MAY 2012 December 22, 2009. A new recruit from Lashkar-e-Taiba Islamist militant group waits to shoot during a training exercise somewhere in Pakistan’s North-West Frontier Province. Members of Lashkar- e-Taiba are among the best trained and most hardened fighters battling against NATO forces in the region. MAY 2012 * ARMCHAIR GENERAL * 45 The CIA initiated its largest ever covert mission, providing TOP ROW, FAR LEFT: Abdullah Azzam, a Pales - tinian ideologue and mentor to Osama bin Laden, heavily recruited young Muslims from around the world to take up arms against the Soviet Union following its invasion of Afghanistan. LEFT: Osama bin Laden, re - cruited and mentored by Abdullah Azzam, used his wealth and influence to aid the Mu - jahedeen in their struggle against the Rus - sians during the Soviet War in Afghanistan.
    [Show full text]
  • Timeline and Attachments
    9/11 FAMILIES UNITED TO BANKRUPT TERRORISM POSITION PAPER 1: Foreseeability of the 9-11-01 Attacks on the U.S. Homeland Overview In its work to root out and bankrupt the logistical and funding sources of terrorism, Ness, Motley, on behalf of the 9/11 Families United To Bankrupt Terrorism, has compiled significant evidence and information that illustrates a requisite knowledge, years in advance of September 11, 2001, by industry, government, and financiers of terrorism of a likely plot whereby suicidal hijackers would use civilian aircraft as a weapon of mass destruction against high profile domestic landmarks. We believe the below analysis regarding pre-September 11th terrorist activities and the failure of government and industry to protect the public from these threats may be of value to the Commission as it attempts to identify the systemic deficiencies in government and industry leading up to the attacks. Specifically, the compilation of the referenced information illustrates: · A decades-long pattern of increased violence and lethality of terrorist attacks against commercial aircraft; · A number of earlier plots by Al-Qaeda and other terrorist groups to use airplanes as guided missiles against high-profile landmarks; · An inability by government and industry to prevent such an attack from taking place; · An understanding and acknowledgement of these terrorist activities by financial supporters of Saudi Arabian based charities. We hope the Commission will utilize this information in its broader effort to enhance our nation’s understanding of the events leading up to the 9/11 attacks. Historical Trends It is instructive to examine the history of terrorist acts against civilian aircraft in order to better understand the overarching trends of terrorism and challenges in aviation security.
    [Show full text]
  • Pair of Lone Wolves
    Case 6: Khan and the Parachas 1 Case 6: Khan and the Parachas John Mueller April 12, 2015 In his book, Mastermind: The Many Faces of the 9/11 Architect, Khalid Shaikh Mohammed, journalist Richard Miniter begins by listing his subject’s admitted (or claimed) involvement with terrorist efforts in addition to 9/11. These include the 1993 World Trade Center and 2002 Bali bombings; plots on Heathrow airport, Big Ben, and the Panama Canal; plans to assassinate Bill Clinton, the Pope, and several prime ministers of Pakistan; two efforts to infiltrate agents into the United States; and the plan for a “second wave” of attacks by hijacked airliners on major U.S. landmarks to include the U.S. Bank Tower in Los Angeles, the Sears Tower in Chicago, the Plaza Bank Building in Seattle.1 Actually, Miniter does not do full service to his subject’s bloviating. In addition, to the plots on Miniter’s list, KSM declared himself to be the power behind the shoe bomber operation of 2001; an October 2002 attack in Kuwait; plots to attack oil tankers and U.S. naval ships in the Straits of Hormuz, the Straits of Gibraltar and the port of Singapore; plans to assassinate Jimmy Carter; a plot to blow up suspension bridges in New York City; a plan to destroy the Sears Tower in Chicago with burning fuel trucks; plans to “destroy” Canary Wharf in London; a planned attack on “many” nightclubs in Thailand; Barot’s plot of 2004 targeting U.S. financial targets; a plan to destroy buildings in Eilat, Israel; plans to destroy U.S.
    [Show full text]
  • Transnational Jihadism & Civil Wars
    Transnational Jihadism & Civil Wars Martha Crenshaw Abstract: When rebels also employ terrorism, civil wars can become more intractable. Since the 1980s, jihadism, a form of violent transnational activism, has mobilized civil war rebels, outside entrepreneurs, foreign fighters, and organizers of transnational as well as domestic terrorism. These activities are inte- Downloaded from http://direct.mit.edu/daed/article-pdf/146/4/59/1831094/daed_a_00459.pdf by guest on 01 October 2021 gral to the jihadist trend, representing overlapping and conjoined strands of the same ideological current, which in turn reflects internal division and dissatisfaction within the Arab world and within Islam. Jihad- ism, however, is neither unitary nor monolithic. It contains competing power centers and divergent ideo- logical orthodoxies. Different jihadist actors emphasize different priorities and strategies. They disagree, for example, on whether the “near” or the “far” enemy should take precedence. The relationship between jihadist terrorism and civil war is far from uniform or constant. This essay traces the trajectory of this evo- lution, beginning in the 1980s in the context of the Soviet invasion of Afghanistan. Transnational violence in the name of jihadist ide- ology is intermingled with civil conflict in the Mid- dle East, Asia, and Africa. Jihadists are civil war ac- tors as well as transnational terrorists.1 According to James Fearon, in 1990, only 5 percent of civil conflicts featured jihadist rebels; by 2014, the proportion had increased to 40 percent.2 Since the 1980s, jihadism has incorporated a medley of civil war rebels, out- side entrepreneurs, trainers, funders, recruiters of foreign fighters, and organizers of transnational as well as domestic terrorism.
    [Show full text]
  • The 9/11 Commission Report
    Final 5-7.5pp 7/17/04 11:46 AM Page 145 5 AL QAEDA AIMS AT THE AMERICAN HOMELAND 5.1 TERRORIST ENTREPRENEURS By early 1999, al Qaeda was already a potent adversary of the United States. Bin Ladin and his chief of operations, Abu Hafs al Masri, also known as Mohammed Atef, occupied undisputed leadership positions atop al Qaeda’s organizational structure. Within this structure, al Qaeda’s worldwide terrorist operations relied heavily on the ideas and work of enterprising and strong- willed field commanders who enjoyed considerable autonomy.To understand how the organization actually worked and to introduce the origins of the 9/11 plot,we briefly examine three of these subordinate commanders:Khalid Sheikh Mohammed (KSM), Riduan Isamuddin (better known as Hambali), and Abd al Rahim al Nashiri. We will devote the most attention to Khalid Sheikh Mohammed, the chief manager of the “planes operation.” Khalid Sheikh Mohammed No one exemplifies the model of the terrorist entrepreneur more clearly than Khalid Sheikh Mohammed, the principal architect of the 9/11 attacks. KSM followed a rather tortuous path to his eventual membership in al Qaeda.1 Highly educated and equally comfortable in a government office or a terror- ist safehouse, KSM applied his imagination, technical aptitude, and managerial skills to hatching and planning an extraordinary array of terrorist schemes. These ideas included conventional car bombing, political assassination, aircraft bombing, hijacking, reservoir poisoning, and, ultimately, the use of aircraft as missiles guided by suicide operatives. Like his nephew Ramzi Yousef (three years KSM’s junior), KSM grew up in Kuwait but traces his ethnic lineage to the Baluchistan region straddling Iran and Pakistan.Raised in a religious family,KSM claims to have joined the Mus- lim Brotherhood at age 16 and to have become enamored of violent jihad at youth camps in the desert.
    [Show full text]
  • Political Violence in South Asia, 1995-2020
    6 POLITICAL VIOLENCE IN SOUTH ASIA, 1995-2020 Shyam Tekwani Years before Osama bin Laden and al-Qaeda became household names, South Asia had been in the grip of diverse forms of terrorism prevalent since the 1940s. With the assassinations of the former Prime Minister of India1 and the President of Sri Lanka2 in the first half of the 1990s, Sri Lanka’s Liberation Tigers of Tamil Eelam (LTTE),3 a group that represented the deprived Tamil minority, burst into the international limelight with their pioneering methods of suicide bombings, captivating a global audience. Three terrorist events in 1995, one with far-reaching consequences in the subregion, presaged the future of terrorism that continues to preoccupy counterterrorism practitioners across the globe today. The first was the To- kyo subway sarin attack4 by the religious cult Aum Shinrikyo in March 1995, which killed 12 and injured thousands, flagging the threat of chemical, bio- logical, radiological, and nuclear (CBRN) attacks. A month later, in the Unit- ed States, a U.S. Army veteran parked a rental truck packed full of explosives outside a federal office building in Oklahoma City, detonating his bomb just as the workday was starting.5 The attack, carried out by a homegrown ter- rorist motivated by extremist ideologies, killed 168 people and left hundreds more injured.6 Among the first messages of condolence after the bombing was one from the Tamil Tigers, offering “the American Government and the American people their sympathy and sense of distress over the senseless bombing incident
    [Show full text]
  • Notes on the Future of Terrorism
    D. Benjamin / Notes on the Future of Terrorism Notes on the Future of Terrorism By Daniel Benjamin * the countless prophecies, analyses and clichés spawned by the Of events of September 11, 2001, few have been spread as widely or accepted as uncritically as the expression, “Everything has changed.” In fact, a great deal did not change, including many of the fundamental patterns of behavior among nations. The one thing that did change dramatically, of course, was terrorism. This tactic, which involves the use of violence against non- combatants in order to advance a program that is typically political, has, depending on your perspective, either been around forever or perhaps since gunpowder became widely used or perhaps since the invention of dynamite. For roughly a century and a half, the practice of terror has shown remarkable continuities. Weaponry was virtually always the bullet or the bomb, and so assassinations, massacres, hostage-taking, hijackings, and bombings accounted for the overwhelming majority of attacks. Terrorists have historically been conservative about their trade: they did not want to try things that might not work, so they have stuck to the tried and true, sacrificing potential greater effects to reliability. That is not to say there have been no innovations: suicide bombings, which have been used to great effect first by such disparate actors as the Tamil Tigers of Sri Lanka and the Lebanese Shiites in the early 1980s have now been taken up by Sunni Muslims—the transmission appears to have occurred through the Palestinians, who were impressed by the accomplishments of Hezbollah. But by and large the tools had remained the same.
    [Show full text]
  • The Security of NATO Nuclear Weapons: Issues and Implications
    chapter THREE The Security of NATO Nuclear Weapons Issues and Implications maJoR geneRal RobeRtus c.n. Remkes (USAF, Ret.) t the Lisbon Summit in November 2010, NATO confirmed that as long as there are nuclear weapons in the world, NATO will remain a nuclear A Alliance, and that deterrence based on an appropriate mix of nuclear and conventional capabilities remains a core element of NATO’s overall strategy. NATO is now reviewing its nuclear posture as part of a broader Deterrence and Defense Posture Review (DDPR) tasked at Lisbon. A key question for that re- view should be: What are the security concerns and related risks associated with NATO’s existing nuclear posture? Of course, this begs the following question: How can these concerns and risks be reduced? curreNt u.s./NATO Nuclear Posture aNd receNt Nuclear securIty coNcerNs Estimates from various nongovernmental sources indicate that the United States currently deploys approximately 150–250 air-delivered nuclear weapons (B-61 gravity bombs) that are deliverable by NATO aircraft (F-15Es, F-16s, and Tornados) at a handful of storage sites in Europe.1 A combined force of U.S. and European NATO personnel assigned to the stor- age sites retains the custody and provides security of these nuclear weapons. The B-61 weapons are stored in underground hardened storage bunkers at undis- closed locations around each storage site. Custody, repair, and improvements to the weapons and the storage bunkers are the responsibility of the U.S. Air Force. 1. Malcolm Chalmers, Occasional Paper, March 2010: NATO’s Tactical Nuclear Dilemma, (Washing- ton, DC: Royal United Services Institute, March 2010), 1–2.
    [Show full text]