Nuclear Terrorism and South Asia

Total Page:16

File Type:pdf, Size:1020Kb

Nuclear Terrorism and South Asia SAND98-0505/25 February 2003 Nuclear Terrorism and South Asia Rajesh M. Basrur Mumbai, India Hasan-Askari Rizvi Lahore, Pakistan Cooperative Monitoring Center Occasional Paper/25 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract DE-AC04-94AL85000. Nuclear Terrorism and South Asia The Cooperative Monitoring Center (CMC) at Sandia National Laboratories assists political and technical experts from around the world to acquire the technology-based tools they need to assess, design, analyze, and implement nonproliferation, arms control, and other cooperative security measures. As part of its mission, the CMC sponsors research on cooperative security and the role of technology. Reports of that work are provided through the Occasional Papers series. Research is conducted by Sandia staff, international technical experts, and visiting scholars based on unclassified, publicly available information. (The CMC’s Visiting Scholars Program is administered by the Institute for Public Policy at the University of New Mexico.) For additional information on the CMC’s programs, visit the CMC home page on the World Wide Web at <http://www.cmc.sandia.gov> or write to: Cooperative Monitoring Center Sandia National Laboratories Mail Stop 1373 Albuquerque, NM 87185-1373 For specific information on this report contact: Kent Biringer at the above address. This report was prepared by Sandia National Laboratories Albuquerque, NM 87185 and Livermore, CA 94550 4 Nuclear Terrorism and South Asia Nuclear Terrorism and South Asia Abstract Nuclear terrorism involves the actual or potential use of nuclear materials to generate fear to achieve political goals. This study focuses on the use of terror by non-state actors – mainly terrorist groups, but conceivably individual malcontents – through their attainment of some level of nuclear capability or threats to existing nuclear infrastructure. This study assesses the character and extent of the threat of nuclear terrorism. It reviews numerous forms of nuclear terrorism, ranging from the detonation of a nuclear weapon to the use of a nuclear bluff to blackmail a government. The potential political, psychological, economic, health, and social effects of a nuclear terrorist incident are described. National and international measures to combat the threat are discussed. The study then focuses on the specific situation in Pakistan and India, examining their respective political conditions, the terrorist threats faced by them, and their vulnerabilities to nuclear terrorism. It concludes with a series of recommendations on how Pakistan and India can tackle these threats individually as well as through bilateral cooperation based on mutual interests. The role of the United States in strengthening this cooperation and that of the global community in providing a framework for multilateral cooperation are also highlighted. 5 Nuclear Terrorism and South Asia Acknowledgements The authors are deeply indebted to Kent Biringer, a constant source of advice and support throughout the duration of the project. Special thanks go to George Baldwin and Amir Mohagheghi for their invaluable criticism and support. We also thank Gaurav Rajen for his very useful suggestions and comments. Fred Luetters was a constant source of warmth and encour- agement. But for the unstinting administrative support of Patricia Dickens, Stephanie Sustaita, Eric Whitmore, and Adam Pool, we would have accomplished little. Diane Ross sorted out our literary efforts with skill and good humor. The strengths of this work reflect the contributions of all; its failings those of the authors alone. 6 Nuclear Terrorism and South Asia Contents 1. INTRODUCTION .............................................................................................................15 2. DIMENSIONS OF NUCLEAR TERRORISM ..............................................................17 2.1. TERRORIST GOALS AND THE NUCLEAR THRESHOLD ...................................................18 2.2. HOW SERIOUS IS THE THREAT?...................................................................................24 3. POTENTIAL EFFECTS OF NUCLEAR TERRORISM..............................................26 3.1. POLITICAL IMPACT ......................................................................................................27 3.2. ECONOMIC IMPACT .....................................................................................................29 3.3. HEALTH IMPACT..........................................................................................................30 3.4. PSYCHOLOGICAL IMPACT ............................................................................................31 4. NATIONAL MEASURES TO COMBAT THE THREAT OF NUCLEAR TERRORISM ....................................................................................................................32 4.1. DETECTION OF RADIOLOGICAL WEAPONS AND MATERIALS .......................................33 4.2. IMMIGRATION AND BORDER CONTROLS......................................................................33 4.3. CONTROL AND PROTECTION OF NUCLEAR WEAPONS..................................................34 4.4. PHYSICAL PROTECTION OF NUCLEAR MATERIALS ......................................................35 4.5. NUCLEAR INSTALLATION SECURITY ...........................................................................36 4.6. PERSONNEL RELIABILITY ............................................................................................37 4.7. MATERIAL CONTROL AND ACCOUNTING.....................................................................38 4.8. TRANSPORTATION .......................................................................................................39 4.9. RADIOACTIVE WASTE .................................................................................................39 4.10. INTELLIGENCE GATHERING .........................................................................................40 5. INTERNATIONAL EFFORTS TO COMBAT THE THREAT OF NUCLEAR TERRORISM ....................................................................................................................41 5.1. BILATERAL COOPERATION: THE UNITED STATES AND RUSSIA ...................................41 5.2. MULTILATERAL COOPERATION ...................................................................................43 5.3. OBSTACLES TO COOPERATION ....................................................................................45 6. PAKISTAN AND NUCLEAR TERRORISM ................................................................47 6.1. PERCEPTIONS OF INSECURITY......................................................................................47 6.2. OFFICIAL POSTURES....................................................................................................51 6.3. PAKISTAN’S NUCLEAR PROGRAM AND INFRASTRUCTURE...........................................52 6.4. SECURITY MEASURES AFTER SEPTEMBER 11..............................................................55 6.5. POLITICAL DYNAMICS.................................................................................................56 6.6. HOW CREDIBLE IS THE THREAT? ................................................................................60 7. INDIA AND NUCLEAR TERRORISM .........................................................................63 7 Nuclear Terrorism and South Asia 7.1. THE ENDURING TERRORIST THREAT ...........................................................................63 7.2. NUCLEAR INFRASTRUCTURE AND VULNERABILITIES ..................................................65 7.3. RESPONSES TO THE NUCLEAR TERRORIST THREAT .....................................................70 7.4. WHAT NEEDS TO BE DONE.........................................................................................71 8. RECOMMENDATIONS ..................................................................................................73 8.1. NATIONAL MEASURES ................................................................................................73 8.2. BILATERAL MEASURES ...............................................................................................74 8.3. ROLE OF THE UNITED STATES .....................................................................................75 8.4. GLOBAL EFFORTS........................................................................................................77 ABOUT THE AUTHORS ...........................................................................................................78 8 Nuclear Terrorism and South Asia Acronyms ABNES Akhil Bharatiya Nepali Ekta Samaj ADM atomic demolition munition AEC Atomic Energy Commission AERB Atomic Energy Regulatory Board BARC Bhabha Atomic Research Centre C3 command, control, and communication CANDU Canadian Deuterium Uranium reactor CIA (US) Central Intelligence Agency CICP (UN) Center for International Crime Prevention CISF Central Industrial Security Force CMC Cooperative Monitoring Center CPPNM Convention on the Physical Protection of Nuclear Material CTC Counter-Terrorism Committee CTR Cooperative Threat Reduction DAE Department of Atomic Energy DBT Design Basis Threat DCC Development Control Committee DOE (US) Department of Energy DoD (US) Department of Defense ECC Employment Control Committee EU European Union FBI Federal Bureau of Investigation HEU highly enriched uranium HuM Harkat ul-Mujahedeen IAEA International
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Deterring and Dissuading Nuclear Terrorism
    Journal of Strategic Security Volume 5 Number 1 Volume 5, No. 1: Spring 2012 Article 6 Deterring and Dissuading Nuclear Terrorism John J. Klein ANSER, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 15-30 Recommended Citation Klein, John J.. "Deterring and Dissuading Nuclear Terrorism." Journal of Strategic Security 5, no. 1 (2012) : 15-30. DOI: http://dx.doi.org/10.5038/1944-0472.5.1.2 Available at: https://scholarcommons.usf.edu/jss/vol5/iss1/6 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Deterring and Dissuading Nuclear Terrorism Abstract While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack.
    [Show full text]
  • Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
    Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment
    [Show full text]
  • USAF Counterproliferation Center CPC Outreach Journal #967
    Issue No. 967, 28 December 2011 Articles & Other Documents: Featured Article: U.S. Preparing for Tactical Nuclear Cuts in Future Arms Deal with Russia 1. Iran to Hold War Games in Int'l Waters 2. Iran Rejects US Allegation on Al-Qaeda Operative 3. MP Describes Navy Wargames as Serious Warning to Western Powers 4. 1st VP: No Single Drop of Oil Will Pass through Hormuz Strait if Iran Oil Is Banned 5. 'Speculation of Israel's Nuclear Arms Deters Iran' 6. Iran Warns of Closing Strategic Hormuz Oil Route 7. S. Korea, China to 'Swiftly Reinvigorate' Efforts to Resume Six-Party Talks 8. In New N.Korea Leader, Rare Exposure to World 9. N Korea Likely to Resume Nuclear Game in Spring of 2012: Experts 10. Who Is in Charge of N.Korea's Nuclear Weapons? 11. US Senator Fears N. Korea Might Try to Sell Nuke Materials 12. N.Korea Closer to Nuclear-Tipped Missile: U.S. Expert 13. Pakistani Government Defends Nuclear Program Against Rising Internal Criticism 14. Pakistan, India Come Closer on Nuclear CBMs 15. U.N. Urges Libya to Sell Off Cache of ‘Yellowcake’ Uranium 16. Russia Successfully Test Fires Bulava Missiles 17. Russia Reports 25,000 Undersea Radioactive Waste Sites 18. Medvedev: Test of Much-Heralded New Missile Done 19. Russia Test Launches Stiletto Missile 20. Optimism on Missile Defense Agreement Decreasing 21. U.S. Preparing for Tactical Nuclear Cuts in Future Arms Deal with Russia 22. U.S. Missile Shield Deal with Romania Takes Effect 23. Pentagon’s Conventional Prompt-Strike Effort Takes 2012 Funding Hit 24.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • The Question of Afghanistan and Its Impact on US Relations with Pakistan
    1 Draft, Please Do Not Copy without Explicit Permission from Author The Question of Afghanistan and its Impact on U.S. Relations with Pakistan: The Need for Pragmatic Engagement Abstract: Relations between the U.S. and Pakistan have always been cyclical, oscillating from collaboration and friendship to noncooperation and enmity. A core reason for this is a failure by consecutive American administration to understand the nature of the Pakistani political system, in which social groups are central. Accordingly, U.S. policymakers have expectations and make demands that often manifest through the rubric of democracy promotion. The paper identifies two key obstacles to democracy promotion in Pakistan: ungoverned territories and social identity groups. The section examines these elements in respect to Afghanistan. The reason for that is because the second section expands the argument by shifting attention to U.S. policymakers who appear to have place Afghanistan at the heart of U.S. engagement in South Asia. In doing so, it is argue that as long as Afghanistan remains key to U.S. national security concerns, American interaction with Pakistan remains limited because the relations are not about the U.S. and Pakistan per se, but rather on how Pakistan can help the U.S. meet its national security interests in Afghanistan. Students of history and politics quickly learn that nothing is certain nor absolute, as even definite and incontrovertible evidence may obscure deeper complexities that define inter-state relations, as far too often, common interests trump values. This may explain why foreign policy analysis tends to be grounded in case studies, and less in theoretical scrutiny.
    [Show full text]
  • On International Law and Nuclear Terrorism
    GEORGIA JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW VOLUME 24 1994 NUMBER 1 ON INTERNATIONAL LAW AND NUCLEAR TERRORISM Louis Rene' Beres* It's farewell to the drawing-room's civilised cry, The professor's sensible whereto and why, The frock-coated diplomat's social aplomb, Now matters are settled with gas and with bomb. W.H. Auden, Danse Macabre Little did the poet Auden realize, just before the dawn of the Nuclear Age,' how completely the technology of destruction would come to outshout the dimming voice of reason.2 Today, this technology includes the unlocked secrets of the atom and can be exploited by terrorists as well as by states. Taken together with a world that has grown steadily inured to the pain of others-a world that has become anesthetized to anguish as it has fled from rationality-the prospect of nuclear terrorism should not be underestimated. With this in mind, we will now consider this prospect with particular respect * Professor of Political Science, Purdue University. Ph.D., Princeton University, 1971. Professor Beres has written many books and articles dealing with international law. The author is grateful to Ms. Betty Hartman of Purdue University's Department of Political Science for her skillful assistance in typing/word processing this manuscript. 'There now exists a huge literature dealing with the expected consequences of a nuclear war. For works on these consequences by this author see Louis R. BERES, APOCALYPSE: NUCLEAR CATASTROPHE IN WORLD POLITICs (1980); Louis R. BERES, MIMICKING SISYPHUS: AMERICA'S COUNTERVAILING NUCLEAR STRATEGY (1983); Louis R. BERES, REASON AND REALPOLITIK: U.S.
    [Show full text]
  • Making America Safer from Nuclear Terrorism
    Making America Safer from Nuclear Terrorism Graham Allison merican politics may be deeply polarized, but there appears to be Avirtual unanimity about what constitutes the greatest threat to our national security. When asked that question during the first pres- idential debate of 2004, Senator Kerry’s immediate answer was, “nuclear proliferation,” because “there are terrorists trying to get their hands on that stuff.” President Bush concurred: “I agree with my oppo- nent that the biggest threat facing this country today is weapons of mass destruction in the hands of a terrorist network.”1 That assessment was buttressed by the 9/11 Commission’s official report, which documented in chilling detail Al Qaeda’s search for nuclear weapons. The report concluded, “Al Qaeda has tried to acquire or make weapons of mass destruction for at least ten years. There is no doubt the United States would be a prime target.”2 In August 2001, for instance, during the final countdown to what Al Qaeda calls the “Holy Tuesday” attack, bin Laden received two key former officials from Pak- istan’s nuclear weapons program at his secret headquarters near Kabul. Over the course of three days of intense conversation, he and his second- in-command, Ayman al-Zawahiri, quizzed Sultan Bashiruddin Mah- mood and Abdul Majeed about chemical, biological, and especially nuclear weapons. Bin Laden, al-Zawahiri, and the two other as yet unidentified, top-level Al Qaeda operatives who participated in these conversations had clearly moved beyond the impending assault on the World Trade Center to visions of grander attacks to follow.3 The threats do not stop at Al Qaeda.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • What Every Public Safety Officer Should Know About Radiation and Radioactive Materials: a Resource Guide
    NATIONAL LAW ENFORCEMENT AND CORRECTIONS TECHNOLOGY CENTER A program of the National Institute of Justice From Summer 2003 TechBeat TECH b • e • a • t Dedicated to Reporting Developments in Technology for Law Enforcement, Corrections, and Forensic Sciences What Every Public Safety Officer Should Know About Radiation and Radioactive Materials: A Resource Guide his resource guide provides a broad list of sources of www.atsdr.cdc.gov/mhmi.html T information and guidance for law enforcement officers, Links to a three-volume planning guide (with accompany- firefighters, emergency medical personnel, and other public ing video) to help first responders, both onscene and at safety officers who may be the first responders to a terrorist the hospital, with the medical management of patients attack in which a nonnuclear radiological device (known exposed during a hazardous materials incident. as a radiological dispersal device (RDD) or a “dirty bomb”) is used. Centers for Disease Control and Prevention, National Center for Environmental Health, Radiation Studies These resources will help departments and agencies Casualty Management After a Deliberate Release of develop and update procedural guidelines and personnel Radioactive Material. training. Also covered are resources for response, equip- www.bt.cdc.gov/radiation/casualtiesradioactive.asp ment funding, and general information. Recommends immediate actions for police, firefighters, Although many of the following resources provide and emergency medical technicians who may be faced links to other websites, the list should not be considered with a nuclear terrorist act. all inclusive. A number of other government and non- Centers for Disease Control and Prevention, National government organizations also provide publications, Center for Environmental Health, Radiation Studies guidelines, information, and training for first responders.
    [Show full text]
  • Annual Report 2018-2019
    Annual Report 2018-2019 1. MISSION STATEMENT National Council for Promotion of Urdu Language (NCPUL) started its academic and administrative operations during IX Plan w.e.f. 01.04.1996. NCPUL was declared a national Nodal Agency for promotion of Urdu in the country and recognized as an important autonomous organization of Ministry of Human Resource Development, Government of India devoted to promotion of Urdu language and mainstreaming of Urdu education. NCPUL has been given the role of networking of Urdu organizations throughout the country so as the policies of the Government could be implemented in all Urdu speaking areas of the country. For past few years NCPUL has emerged as an effective coordination mechanism for promotion of Urdu language and Urdu medium education in India. During the course of discharging its responsibilities, NCPUL has been assigned the additional responsibility of promotion of Arabic & Persian languages which have played an important role in the development of composite culture of India. The broad goals of the Council are as under:- 1) To promote, develop and propagate Urdu language. 2) To take action for making available in Urdu language, the knowledge of scientific and technological development as well as knowledge of ideas evolved in the modern context. 3) To advise the Government of India on issues connected with Urdu language and having bearing on education as may be referred to it. 4) To undertake any other activity for the promotion of Urdu language as may be deemed fit by the Council. 1 2. COMPOSITION: NCPUL has been registered as a Society under the Societies Registration Act 1860.
    [Show full text]