Waiting for Terror: How Realistic Is the Biological, Chemical and Nuclear Threat?

Total Page:16

File Type:pdf, Size:1020Kb

Waiting for Terror: How Realistic Is the Biological, Chemical and Nuclear Threat? OXFORD · RESEARCH · GROUP WAITING FOR TERROR: HOW REALISTIC IS THE BIOLOGICAL, CHEMICAL AND NUCLEAR THREAT? October 2001 BY DR. FRANK BARNABY OXFORD RESEARCH GROUP Oxford Research Group was established in 1982 to develop effective methods whereby people can bring about positive change on issues of global and local security by non-violent means. Our work involves: • researching how policy decisions are made and who makes them • promoting accountability and transparency • providing information on current decisions so that informed public debate can take place • fostering dialogue between policy-makers and their critics. Our areas of research include the building of a more secure world through the elimination of nuclear weapons, reduction and control of the arms trade, and the effective non-violent resolution of conflict. We bring policy-makers – senior government officials, the military, scientists, weapons designers and strategists – together with independent experts to develop ways past the obstacles to disarmament, control of the arms trade and greater global security. In an informal environment with skilled facilitation we help to build bridges of understanding as a means of opening up new ideas and making possible significant policy shifts. In this new millennium, human beings are faced with challenges to survival on and of our planet; these challenges can only be solved collectively and co-operatively. Oxford Research Group is committed to this approach. Oxford Research Group is a small independent team of researchers and support staff; it is a public company limited by guarantee with charitable status, governed by a Board of Directors and supported by a Council of Advisers. The Group enjoys a strong reputation for objective and effective research, and attracts the support of foundations, charities and private individuals, many of Quaker origin, in Britain, Europe and the United States. It has no political or religious affiliations and does not campaign. About the author Dr. Frank Barnaby is consultant to Oxford Research Group on technical and scientific issues, and has been on the Group’s Council of Advisers since its inception. He is a nuclear physicist by training, and a prolific author. He worked at the Atomic Weapons Research Establishment, Aldermaston (1951-1957) and was on the senior scientific staff of the Medical Research Council. He was Director of the Stockholm International Peace Research Institute for many years (1971-81) and Guest Professor at the Free University, Amsterdam (1981-85). 2 WAITING FOR TERROR: HOW REALISTIC IS THE BIOLOGICAL, CHEMICAL AND NUCLEAR THREAT? CONTENTS Executive Summary........................................................................................................................................... 4 1. What is terrorism?......................................................................................................................................... 8 Types of terrorist.................................................................................................................................................. 8 Terrorism by an individual .................................................................................................................................. 9 Religious terrorism .............................................................................................................................................. 9 Political-nationalist terrorism............................................................................................................................... 11 Right-wing terrorist groups.................................................................................................................................. 16 The number of international terrorist attacks....................................................................................................... 16 2. Terrorist use of chemical weapons ............................................................................................................... 18 Chemical warfare agents...................................................................................................................................... 18 Symptoms of exposure to a nerve agent .............................................................................................................. 19 The dispersal of a nerve agent ............................................................................................................................. 19 3. Terrorist use of biological weapons.............................................................................................................. 21 How terrorists could acquire biological agents.................................................................................................... 21 Biological agents ................................................................................................................................................. 22 Genetic engineering ............................................................................................................................................. 23 4. Terrorist use of nuclear weapons ................................................................................................................. 24 Design of primitive nuclear explosives................................................................................................................ 24 The dispersal of plutonium .................................................................................................................................. 25 5. Keys to counter-terrorism............................................................................................................................. 27 The physical protection of key chemical, biological and nuclear materials......................................................... 27 The urgent need for effective intelligence ........................................................................................................... 27 6. Future terrorism ............................................................................................................................................ 29 Cyberterrorism..................................................................................................................................................... 29 Attacks on nuclear power plants.......................................................................................................................... 29 Future trends in terrorism..................................................................................................................................... 30 References........................................................................................................................................................... 31 Appendix 1 Active international terrorist groups listed by the Department of State............................................................... 32 Appendix 2 Total number of deaths and injuries in various regions, 1995 to 2000 inclusive, caused by international terrorism.....................................................................................................34 3 Executive Summary There is no agreed and unambiguous definition of terrorism. There is, therefore, no agreed list of terrorist groups. It is clear, however, that terrorism is on the increase. It is estimated that only 11 terrorist groups were active in 1968. In the past 33 years, there has been a fivefold increase in the number of terrorist groups operating in the world. Five types of terrorism can be usefully identified, each of which has distinct characteristics. These are: terrorism by an individual; terrorism by religious fundamentalists; political terrorism, usually with nationalist aims; terrorism by extreme political groups, right and left wing; terrorism carried out by single issue groups, such as anti-abortionists and radical ecologists; and terrorism by millennial groups. Religious terrorism Religious terrorists are generally the most fanatical of all terrorists. They are willing, and even anxious, to die for their cause. Religious terrorists are prepared to commit almost limitless violence against almost any target. Of all the terrorists groups, the religious ones are the most likely to acquire and use weapons of mass destruction. The AUM group started this process by its nerve gas attack in Tokyo. It may only be a matter of time before a religious terrorist group makes and uses a nuclear explosive. Two main groups of religious terrorists, the Islamic Fundamentalists and the Christian White Supremacists, are operating today. Both justify and legitimise terrorist violence on the basis of their religious beliefs. White supremacist groups preach a virulent anti-Semitic, white supremacist theology, vilifying Jews and non-whites as the children of Satan. Political-nationalist terrorism Most terrorist groups with political aims are nationalist, usually aiming to create an independent homeland. Typical examples are the Basque Fatherland and Liberty group (Euzkadi ta Askatasuna or ETA as it is usually called), the Tamil Tigers, groups within the Palestinian Liberation Organisation (PLO) and groups in Northern Ireland. Right-wing terrorist groups Right-wing terrorists generally believe that conflict and violence are essential elements in society. Extreme right-wing groups in America are closely aligned with religious fundamentalist movements, as they are in Eastern
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Pandemic Disease, Biological Weapons, and War
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2014 Pandemic Disease, Biological Weapons, and War Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1296 http://ssrn.com/abstract=2350304 Laura K. Donohue, Pandemic Disease, Biological Weapons, and War in LAW AND WAR: (Sarat, Austin, Douglas, Lawrence, and Umphrey, Martha Merrill, eds., Stanford University Press, 2014) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Defense and Security Studies Commons, Military and Veterans Studies Commons, Military, War, and Peace Commons, and the National Security Law Commons PANDEMIC DISEASE , BIOLOGICAL WEAPONS , AND WAR Laura K. Donohue * Over the past two decades, concern about the threat posed by biological weapons has grown. Biowarfare is not new. 1 But prior to the recent trend, the threat largely centered on state use of such weapons. 2 What changed with the end of the Cold War was the growing apprehension that materials and knowledge would proliferate beyond industrialized states’ control, and that “rogue states” or nonstate actors would acquire and use biological weapons. 3 Accordingly, in 1993 senators Samuel Nunn, Richard Lugar, and Pete Dominici expanded the Cooperative Threat Reduction Program to assist the former Soviet republics in securing biological agents and weapons knowledge. The Defense Against Weapons of Mass Destruction Act gave the Pentagon lead agency responsibility. 4 Senator Lugar explained, “[B]iological weapons, materials, and know-how are now more available to terrorists and rogue nations than at any other time in our history.”5 The United States was not equipped to manage the crisis.
    [Show full text]
  • Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
    Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Preparation of Aromatic Carbonyl Compounds
    ~" ' MM II II II Ml I III II II I Ml II I II J European Patent Office © Publication number: 0 178 184 B1 Office_„. europeen- desj brevets^ » © EUROPEAN PATENT SPECIFICATION © Date of publication of patent specification: 28.04.93 © Int. CI.5: C07C 45/45, C07C 49/76, C07C 51/58 © Application number: 85307320.3 @ Date of filing: 11.10.85 © Preparation of aromatic carbonyl compounds. © Priority: 11.10.84 US 659598 (73) Proprietor: RAYCHEM CORPORATION (a Dela- ware corporation) @ Date of publication of application: 300 Constitution Drive 16.04.86 Bulletin 86/16 Menlo Park, California 94025(US) © Publication of the grant of the patent: @ Inventor: Horner, Patrick James 28.04.93 Bulletin 93/17 139 Buckthorn Way Menlo Park California 94025(US) © Designated Contracting States: Inventor: Jansons, Vlktors AT BE CH DE FR GB IT LI NL SE 123 New York Avenue Los Gatos California 95030(US) References cited: Inventor: Gors, Helnrlch Carl EP-A- 0 024 286 EP-A- 0 069 598 2508 Mardell Way DE-A- 2 014 514 GB-A- 1 420 506 Mountain View California, 94043(US) GB-A- 2 103 604 US-A- 1 874 580 US-A- 3 282 989 Representative: Jay, Anthony William et al Raychem Limited Intellectual Property Law Department Faraday Road Dorcan Swindon Wiltshire (GB) 00 00 00 Note: Within nine months from the publication of the mention of the grant of the European patent, any person ® may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition CL shall be filed in a written reasoned statement.
    [Show full text]
  • Biological Toxins As the Potential Tools for Bioterrorism
    International Journal of Molecular Sciences Review Biological Toxins as the Potential Tools for Bioterrorism Edyta Janik 1, Michal Ceremuga 2, Joanna Saluk-Bijak 1 and Michal Bijak 1,* 1 Department of General Biochemistry, Faculty of Biology and Environmental Protection, University of Lodz, Pomorska 141/143, 90-236 Lodz, Poland; [email protected] (E.J.); [email protected] (J.S.-B.) 2 CBRN Reconnaissance and Decontamination Department, Military Institute of Chemistry and Radiometry, Antoniego Chrusciela “Montera” 105, 00-910 Warsaw, Poland; [email protected] * Correspondence: [email protected] or [email protected]; Tel.: +48-(0)426354336 Received: 3 February 2019; Accepted: 3 March 2019; Published: 8 March 2019 Abstract: Biological toxins are a heterogeneous group produced by living organisms. One dictionary defines them as “Chemicals produced by living organisms that have toxic properties for another organism”. Toxins are very attractive to terrorists for use in acts of bioterrorism. The first reason is that many biological toxins can be obtained very easily. Simple bacterial culturing systems and extraction equipment dedicated to plant toxins are cheap and easily available, and can even be constructed at home. Many toxins affect the nervous systems of mammals by interfering with the transmission of nerve impulses, which gives them their high potential in bioterrorist attacks. Others are responsible for blockage of main cellular metabolism, causing cellular death. Moreover, most toxins act very quickly and are lethal in low doses (LD50 < 25 mg/kg), which are very often lower than chemical warfare agents. For these reasons we decided to prepare this review paper which main aim is to present the high potential of biological toxins as factors of bioterrorism describing the general characteristics, mechanisms of action and treatment of most potent biological toxins.
    [Show full text]
  • 5 Phosphorus Oxychloride1 Acute Exposure Guideline Levels
    Acute Exposure Guideline Levels for Selected Airborne Chemicals: Volume 10 Committee on Acute Exposure Guideline Levels Committee on Toxicology Board on Environmental Studies and Toxicology Division on Earth and Life Studies Copyright © National Academy of Sciences. All rights reserved. Acute Exposure Guideline Levels for Selected Airborne Chemicals: Volume 10 THE NATIONAL ACADEMIES PRESS 500 FIFTH STREET, NW WASHINGTON, DC 20001 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Insti- tute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. This project was supported by Contract No. W81K04-06-D-0023 and EP-W-09-007 be- tween the National Academy of Sciences and the U.S. Department of Defense and the U.S. Environmental Protection Agency. Any opinions, findings, conclusions, or recom- mendations expressed in this publication are those of the author(s) and do not necessarily reflect the view of the organizations or agencies that provided support for this project. International Standard Book Number-13: 978-0-309-21987-7 International Standard Book Number-10: 0-309-21987-6 Additional copies of this report are available from The National Academies Press 500 Fifth Street, NW Box 285 Washington, DC 20055 800-624-6242 202-334-3313 (in the Washington metropolitan area) http://www.nap.edu Copyright 2011 by the National Academy of Sciences.
    [Show full text]
  • Psilocybin † † † ‡ Haden A
    Review pubs.acs.org/chemneuro DARK Classics in Chemical Neuroscience: Psilocybin † † † ‡ Haden A. Geiger, Madeline G. Wurst, and R. Nathan Daniels*, , † Department of Pharmaceutical Sciences, Lipscomb University College of Pharmacy and Health Sciences, Nashville, Tennessee 37204, United States ‡ Department of Pharmacology, Vanderbilt University Medical Center, Nashville, Tennessee 37232-6600, United States ABSTRACT: Psilocybin is found in a family of mushrooms commonly known as “magic mushrooms” that have been used throughout history to induce hallucinations. In the late 1950s Albert Hofmann, of Sandoz Laboratories, identified and synthesized the psychoactive compounds psilocybin and psilocin which are found in psilocybe mushrooms. Psilocybin was marketed by Sandoz as Indocybin for basic psychopharmacological and therapeutic clinical research. Psilocybin saw a rapid rise in popularity during the 1960s and was classed as a Schedule I drug in 1970. This led to a significant decrease in psilocybin research. Recently, however, preliminary studies with psilocybin have shown promise as potential for the treatment of obsessive compulsive disorder, alcohol addiction, tobacco addiction, and major depressive disorder, and the treatment of depression in terminally ill cancer patients. This review describes in detail the synthesis, metabolism, pharmacology, adverse drug reactions, and importance of psilocybin to neuroscience in the past and present. KEYWORDS: Psilocybin, psilocin, indolealkylamine, hallucinogen, psychedelic, magic mushrooms, mushrooms, O-acetylpsilocin, indocybin I. INTRODUCTION The structure of psilocybin, and other indolealkylamine Psilocybin (1, Figure 1), a tryptamine alkaloid, is found in a hallucinogens, is similar to that of the endogenous neuro- family of mushroom-forming fungi that when ingested can transmitter serotonin (3), the hormone melatonin (4), and the hypothesized endogenous psychedelic, N,N-dimethyltrypt- cause hallucinations.
    [Show full text]
  • China's False Allegations of the Use of Biological Weapons by the United
    W O R K I N G P A P E R # 7 8 China’s False Allegations of the Use of Biological Weapons by the United States during the Korean War By Milton Leitenberg, March 2016 THE COLD WAR INTERNATIONAL HISTORY PROJECT WORKING PAPER SERIES Christian F. Ostermann, Series Editor This paper is one of a series of Working Papers published by the Cold War International History Project of the Woodrow Wilson International Center for Scholars in Washington, D.C. Established in 1991 by a grant from the John D. and Catherine T. MacArthur Foundation, the Cold War International History Project (CWIHP) disseminates new information and perspectives on the history of the Cold War as it emerges from previously inaccessible sources on “the other side” of the post-World War II superpower rivalry. The project supports the full and prompt release of historical materials by governments on all sides of the Cold War, and seeks to accelerate the process of integrating new sources, materials and perspectives from the former “Communist bloc” with the historiography of the Cold War which has been written over the past few decades largely by Western scholars reliant on Western archival sources. It also seeks to transcend barriers of language, geography, and regional specialization to create new links among scholars interested in Cold War history. Among the activities undertaken by the project to promote this aim are a periodic BULLETIN to disseminate new findings, views, and activities pertaining to Cold War history; a fellowship program for young historians from the former Communist bloc to conduct archival research and study Cold War history in the United States; international scholarly meetings, conferences, and seminars; and publications.
    [Show full text]
  • Solvent-Free and Safe Process for the Quantitative Production of Phosgene from Triphosgene by Deactivated Imino-Based Catalysts
    Organic Process Research & Development 2010, 14, 1501–1505 Solvent-Free and Safe Process for the Quantitative Production of Phosgene from Triphosgene by Deactivated Imino-Based Catalysts Heiner Eckert* and Johann Auerweck Department of Chemistry, Technische UniVersitaet Muenchen, Lichtenbergstr. 4, Garching 85747, Germany Abstract: Scheme 1. Decomposition of triphosgene (1a) into carbon tetrachloride, carbon dioxide, and 1 equiv of phosgene (3) Phosgene is quantitatively formed from solid triphosgene in a solvent-free and safe process without any reaction heat, catalyzed by planar N-heterocycles with deactivated imino functions. The rate of phosgene generation is adjustable to the rate of phosgene consumption in the subsequent phosgenation reaction by thermal control, catalyst concentration, and in some cases, specific proper- ties of selected metal phthalocyanines. A thermal runaway reaction of this process is impossible. phosgene in most reactions, yet several phosgenation reactions are advantageously carried out with phosgene, that is, when excessive triphosgene is difficult to remove during the reaction Introduction workup because of its high boiling point of over 200 °C. Its Phosgene (3) is a highly useful and versatile chemical in excess can be destroyed by hydrolysis, when phosgenation performing syntheses.1a Although consisting of only four atoms, products are not sensitive to moisture as are carbonates, four important transformations can be carried out with it in carbamates, ureas, diarylketones, alkylhalides, cyanides, and organic
    [Show full text]
  • Chemical Warfare Agents
    . Chemical Warfare Agents ........ Using Detector Tubes as a Means of Detecting Chemical Warfare Agents in HazMat Response by Victor Vendetti International Sales and Marketing Manager - Instruments For years, detector tubes have been a reliable and Crush ampoule inside tube effective tool in HazMat response. Used for Insert tube into pump detecting a wide array of contaminants such as aromatic hydrocarbons (benzene, toluene), Manual Versus Automatic Sample- oxidizing gases (nitrogen dioxide, chlorine), and Taking acid gases (hydrogen chloride), detector tubes have helped emergency responders quickly The most common and cost-effective means of assess hazardous conditions. taking detector tube samples is with a manual pump (squeezed by hand). Such pumps typically In the past, the compounds of concern to HazMat vary in cost between $150 and $300 each. responders primarily have been industrial However, because of the low detection range on compounds such as those listed above. However, CW agent detector tubes, often 30 or more pump the newest and most lethal concern to HazMat, strokes are required with a manual pump. This law enforcement and security forces is the threat can take a considerable amount of time and of chemical warfare attacks and the need to require significant repetition of pump-stroke respond to potential attacks. motions. Capable of mass destruction, chemical warfare agents are the number one concern in the industry today. Because chemical warfare agents are so deadly, they must be detected quickly and effectively in order to minimize the effects on those in the vicinity of an attack. Detector tubes offer a quick, reliable, and cost-effective means of detecting chemical warfare agents, helping HazMat professionals respond quickly to attacks.
    [Show full text]