Bibliography on Future Trends in Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Bibliography on Future Trends in Terrorism BIBLIOGRAPHY ON FUTURE TRENDS IN TERRORISM A Report Prepared under an Interagency Agreement by the Federal Research Division, Library of Congress September 1998 Authors: LaVerle Berry Glenn Curtis Rex Hudson Project Manager: Helen C. Metz Federal Research Division Library of Congress Washington, D.C. 20540–4840 Tel: 202–707–3900 Fax: 202–707–3920 E-Mail: [email protected] Homepage: http://www.loc.gov/rr/frd/ PREFACE This bibliography provides annotations on future trends in terrorism from open-source literature published between 1996 and mid-1998. The dominant trend discussed in this literature is the increasing likelihood that terrorists will use weapons of mass destruction (WMD), particularly against the United States. Accordingly, many of the 295 monographs and journal articles surveyed in this bibliography discuss the potential threats of nuclear, biological, and chemical terrorism and the countermeasures that need to be implemented in responding to these threats. A number of other articles discuss the emerging threat of computer or cyberterrorism and the potential threat to the United States’ information-technology (IT)-based infrastructure. Many articles discuss new technologies to counter more conventional terrorist threat, such as detecting bombs at airports. The compilers of the bibliography have endeavored to include the most recent, relevant, and substantive articles on terrorism (those published in 1998) from journals, news magazines, selected newspapers, and monographs. The bibliography also includes relevant items published in 1996–97 but not annotated for the Federal Research Division’s previous terrorism bibliographies (June 1993 and October 1997). Several foreign-language items have been includes and are indicated as such. In general, however, the effort focused on English-language sources. The bibliography is organized into six geographic regions—Africa, Asia, Europe, Latin American, the Middle East, and North America—as well as a general International section. Most entries are listed under the International and North America sections. All entries have keywords, such as antiterrorism, WMD, cyberterrorism, and others. Upon request, the Federal Research Division will supply specialized, subject-oriented or geographical printouts. TABLE OF CONTENTS Africa .......................................................................1 Asia ........................................................................4 Europe ......................................................................9 International.................................................................18 Latin America ...............................................................77 Middle East .................................................................79 North America ...............................................................90 Library of Congress — Federal Research Division Future Trends in Terrorism Africa Anonymous. "International: A Case of Mistaken Identity?," Economist, 348, No. 8083, August 29, 1998, 43-44. The cruise missile attack on Sudan by the United States has aroused general skepticism, but the Sudanese government, which has alienated many of its neighbors, is finding that it has few friends, above all powerful friends, who are willing to come openly to its defense. After cruise missiles destroyed the Shifa pharmaceuticals factory in Khartoum on August 20, Sudan invited the United Nations to search the site for traces of the chemical-weapons components that, according to the United States, were the reason for the strike. The UN Security Council prevaricated, and the region has not rallied behind Sudan. Keyword(s): combating terrorism; counterterrorism; CBRNC; chemical weapons of mass destruction Anonymous. "Bombings Reiterate Need to Protect Windows," Security, 35, No. 9, September 1998, 109. The two bombings of U.S. embassies in Kenya and Tanzania in August 1998 are the latest tragedies to demonstrate the devastation that the combination of bombs and window glass can cause. In an interview, Rob Martin, director of the Technical Advisory Committee on Blast Resistant Glazing Systems, discussed the use of security and safety window film as a means of reducing death, injury, and property damage. Keyword(s): antiterrorism; combating terrorism; infrastructure protection; technology; blast mitigation Block, Robert. "Kenya, Tanzania Offer Fertile Soil for Intrigue," Wall Street Journal, August 11, 1998, A12. The search for an answer to the causes of the recent bombings of two US embassies in East Africa may relate to economic and security conditions in Kenya and Tanzania. Both are poverty-ridden countries in which bribery and money-making schemes are common and law-enforcement and security lax. In the case of Kenya, the country has recently experienced outbreaks of state-sponsored violence, destroying respect for the state, its institutions, and its laws. A proliferation of weapons, porous borders, and rampant government corruption are factors that may have proven attractive to terrorists wishing to strike at the United States via its embassies in vulnerable capitals. lb Keyword(s): terrorism; terrorist groups and activities; future trends "Gangsters Against Gangsterism"s," Foreign Report,[Surrey], no. 2520, November 12, 1998, 1-2. Security officials in South Africa have reported the existence of a terrorist organization based in Cape Town. Known as "People Against Gangsterism and Drugs" (Pagan), South African police believe the group has received training in Iran, Libya, and Sudan and may have been responsible for one or more terrorist bombings in South Africa. The Iranian government has denied having links with Pagan, but authorities note a virulent anti-Americanism among some Muslims in South Africa that may have Iranian 1 Library of Congress — Federal Research Division Future Trends in Terrorism roots. Keyword(s): terrorist groups and activities; terrorism Gunby, Phil. "US Military Medicine Responds to Results of Terrorism in Africa," JAMA [Journal of the American Medical Association], 280, No. 10, September 9, 1998, 870-71. The bombings of the U.S. embassies in Kenya and Tanzania on August 7, 1998, have proven once again the importance of high-speed, flexible medical response. U.S. Air Force, Air National Guard, and Air Force Reserve medical people flew approximately 4,000 miles from Germany to provide care within 20 hours of the explosions that killed 250 people and wounded 5,000 others. Twenty-two patients, all in critical condition, were flown from Nairobi to Ramstein, and eight of these patients were subsequently flown by the U.S. Air Force to the military's Walter Reed Medical Center in Washington, D.C. Other medical assistance is also discussed. Keyword(s): terrorism (general); antiterrorism; first responders; combating terrorism McKinley, James C. Jr. "Security Flaws Left Embassy in Nairobi Open to Attack," New York Times, September 9, 1998, A6. The American Embassy in Nairobi was an easy target for terrorists. Its perimeter was patrolled by unarmed guards earning about $100 a month. The embassy's parking lot, shared with a bank, had an exit lane protected by neither guards nor barricades. On August 7, 1998, attackers in a truck packed with explosives turned off Haile Selassie Avenue and roared up that lane, flashing past an uninstalled security barrier that the bank was planning to erect to protect the lot. The truck managed to drive close to the building, where it was stopped by an unarmed private security guard at a barrier at the entrance to an underground garage. The guard ran when the attackers threw a grenade-like device at him. Keyword(s): antiterrorism; combating terrorism; counterterrorism Pereira, Paul. "SA's Weimar Inheritance," Finance Week, 76, No. 35, September 3-9, 1998, 68-69. An old phenomenon, terrorism began with the kamikaze-style raids of the Islamic Sunni assassinations of Christians in the Crusader Kingdom of the twelfth century. Although the liberation of the communist states has ended terrorism in countries such as Germany, Italy, and Japan, terrorism continues apace in the Middle East and to a lesser extent in Northern Ireland. As a political strategy, terrorism has often failed. Yet Africa's flirtation with terrorism has had results. Keyword(s): terrorist groups and activities; future trends; terrorism 2 Library of Congress — Federal Research Division Future Trends in Terrorism Venter, Al J. "Targeting Sudan: Why We Bombed Osama bin Laden's Shadowy World of Intrigue," Soldier of Fortune, 23, No. 12, December 1998, 48-51, 69. The author suggests that the U.S. bombing of Khartoum's Al Shifa Pharmaceutical factory was probably a mistake. Nevertheless, he describes as "irrefutable" that the soil sample clandestinely removed from the factory's rose garden "does present incontrovertible evidence of EMPTA...," a precursor for the deadly manufacture of VX nerve gas. The article discusses Osama bin Laden and Sudan's status as a pariah state as well as a puppet state of Iran. Keyword(s): counterterrorism; combating terrorism; terrorism; terrorist groups and activities Weiser, Benjamin. "A Ben Laden Agent Left Angry Record of Gripes and Fears," New York Times, December 12, 1998, A1 and A6. Weiser discusses information gleaned from a computer seized in Nairobi, Kenya, following the embassy bombing in August 1998. One message in particular offers insight into the Ben Laden terrorist network's organization and operations in East Africa prior to the bombing, including the use of CNN and the Internet. The writer
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Pandemic Disease, Biological Weapons, and War
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2014 Pandemic Disease, Biological Weapons, and War Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1296 http://ssrn.com/abstract=2350304 Laura K. Donohue, Pandemic Disease, Biological Weapons, and War in LAW AND WAR: (Sarat, Austin, Douglas, Lawrence, and Umphrey, Martha Merrill, eds., Stanford University Press, 2014) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Defense and Security Studies Commons, Military and Veterans Studies Commons, Military, War, and Peace Commons, and the National Security Law Commons PANDEMIC DISEASE , BIOLOGICAL WEAPONS , AND WAR Laura K. Donohue * Over the past two decades, concern about the threat posed by biological weapons has grown. Biowarfare is not new. 1 But prior to the recent trend, the threat largely centered on state use of such weapons. 2 What changed with the end of the Cold War was the growing apprehension that materials and knowledge would proliferate beyond industrialized states’ control, and that “rogue states” or nonstate actors would acquire and use biological weapons. 3 Accordingly, in 1993 senators Samuel Nunn, Richard Lugar, and Pete Dominici expanded the Cooperative Threat Reduction Program to assist the former Soviet republics in securing biological agents and weapons knowledge. The Defense Against Weapons of Mass Destruction Act gave the Pentagon lead agency responsibility. 4 Senator Lugar explained, “[B]iological weapons, materials, and know-how are now more available to terrorists and rogue nations than at any other time in our history.”5 The United States was not equipped to manage the crisis.
    [Show full text]
  • Deterring and Dissuading Nuclear Terrorism
    Journal of Strategic Security Volume 5 Number 1 Volume 5, No. 1: Spring 2012 Article 6 Deterring and Dissuading Nuclear Terrorism John J. Klein ANSER, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 15-30 Recommended Citation Klein, John J.. "Deterring and Dissuading Nuclear Terrorism." Journal of Strategic Security 5, no. 1 (2012) : 15-30. DOI: http://dx.doi.org/10.5038/1944-0472.5.1.2 Available at: https://scholarcommons.usf.edu/jss/vol5/iss1/6 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Deterring and Dissuading Nuclear Terrorism Abstract While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack.
    [Show full text]
  • Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
    Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Biological Toxins As the Potential Tools for Bioterrorism
    International Journal of Molecular Sciences Review Biological Toxins as the Potential Tools for Bioterrorism Edyta Janik 1, Michal Ceremuga 2, Joanna Saluk-Bijak 1 and Michal Bijak 1,* 1 Department of General Biochemistry, Faculty of Biology and Environmental Protection, University of Lodz, Pomorska 141/143, 90-236 Lodz, Poland; [email protected] (E.J.); [email protected] (J.S.-B.) 2 CBRN Reconnaissance and Decontamination Department, Military Institute of Chemistry and Radiometry, Antoniego Chrusciela “Montera” 105, 00-910 Warsaw, Poland; [email protected] * Correspondence: [email protected] or [email protected]; Tel.: +48-(0)426354336 Received: 3 February 2019; Accepted: 3 March 2019; Published: 8 March 2019 Abstract: Biological toxins are a heterogeneous group produced by living organisms. One dictionary defines them as “Chemicals produced by living organisms that have toxic properties for another organism”. Toxins are very attractive to terrorists for use in acts of bioterrorism. The first reason is that many biological toxins can be obtained very easily. Simple bacterial culturing systems and extraction equipment dedicated to plant toxins are cheap and easily available, and can even be constructed at home. Many toxins affect the nervous systems of mammals by interfering with the transmission of nerve impulses, which gives them their high potential in bioterrorist attacks. Others are responsible for blockage of main cellular metabolism, causing cellular death. Moreover, most toxins act very quickly and are lethal in low doses (LD50 < 25 mg/kg), which are very often lower than chemical warfare agents. For these reasons we decided to prepare this review paper which main aim is to present the high potential of biological toxins as factors of bioterrorism describing the general characteristics, mechanisms of action and treatment of most potent biological toxins.
    [Show full text]
  • China's False Allegations of the Use of Biological Weapons by the United
    W O R K I N G P A P E R # 7 8 China’s False Allegations of the Use of Biological Weapons by the United States during the Korean War By Milton Leitenberg, March 2016 THE COLD WAR INTERNATIONAL HISTORY PROJECT WORKING PAPER SERIES Christian F. Ostermann, Series Editor This paper is one of a series of Working Papers published by the Cold War International History Project of the Woodrow Wilson International Center for Scholars in Washington, D.C. Established in 1991 by a grant from the John D. and Catherine T. MacArthur Foundation, the Cold War International History Project (CWIHP) disseminates new information and perspectives on the history of the Cold War as it emerges from previously inaccessible sources on “the other side” of the post-World War II superpower rivalry. The project supports the full and prompt release of historical materials by governments on all sides of the Cold War, and seeks to accelerate the process of integrating new sources, materials and perspectives from the former “Communist bloc” with the historiography of the Cold War which has been written over the past few decades largely by Western scholars reliant on Western archival sources. It also seeks to transcend barriers of language, geography, and regional specialization to create new links among scholars interested in Cold War history. Among the activities undertaken by the project to promote this aim are a periodic BULLETIN to disseminate new findings, views, and activities pertaining to Cold War history; a fellowship program for young historians from the former Communist bloc to conduct archival research and study Cold War history in the United States; international scholarly meetings, conferences, and seminars; and publications.
    [Show full text]
  • On International Law and Nuclear Terrorism
    GEORGIA JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW VOLUME 24 1994 NUMBER 1 ON INTERNATIONAL LAW AND NUCLEAR TERRORISM Louis Rene' Beres* It's farewell to the drawing-room's civilised cry, The professor's sensible whereto and why, The frock-coated diplomat's social aplomb, Now matters are settled with gas and with bomb. W.H. Auden, Danse Macabre Little did the poet Auden realize, just before the dawn of the Nuclear Age,' how completely the technology of destruction would come to outshout the dimming voice of reason.2 Today, this technology includes the unlocked secrets of the atom and can be exploited by terrorists as well as by states. Taken together with a world that has grown steadily inured to the pain of others-a world that has become anesthetized to anguish as it has fled from rationality-the prospect of nuclear terrorism should not be underestimated. With this in mind, we will now consider this prospect with particular respect * Professor of Political Science, Purdue University. Ph.D., Princeton University, 1971. Professor Beres has written many books and articles dealing with international law. The author is grateful to Ms. Betty Hartman of Purdue University's Department of Political Science for her skillful assistance in typing/word processing this manuscript. 'There now exists a huge literature dealing with the expected consequences of a nuclear war. For works on these consequences by this author see Louis R. BERES, APOCALYPSE: NUCLEAR CATASTROPHE IN WORLD POLITICs (1980); Louis R. BERES, MIMICKING SISYPHUS: AMERICA'S COUNTERVAILING NUCLEAR STRATEGY (1983); Louis R. BERES, REASON AND REALPOLITIK: U.S.
    [Show full text]
  • “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-Terrorism Related Subjects by Joshua Sinai
    PERSPECTIVES ON TERRORISM Volume 8, Issue 1 IV. Book Reviews “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects by Joshua Sinai "is column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by signi$cant publishers (listed in alphabetical order) - capsule reviews of 13 important books published by CRC Press. Note: Future columns will review books by publishers such as Hurst, Oxford University Press, Palgrave Macmillan, Polity, Routledge, Rowman & Little#eld, Springer, Stanford University Press, and the University of Chicago Press. General Reviews Gershon Baskin, with Ilene Prusher, !e Negotiator: Freeing Gilad Schalit From Hamas. New Milford, CT: "e Toby Press, 2013. 283 pages, US$24.95 [Hardcover], ISBN: 978-1592643493. "is is a $rst-hand account by an American-Israeli peace activist of his role in arranging for the release of Gilad Schalit, an Israeli soldier who was kidnapped by Hamas in 2006. Schalit was released in October 2011 as part of an exchange deal by the Israeli government and Hamas for 1,027 Palestinian and Israeli Arab prisoners with a nexus to terrorist activity. Acting in his non-governmental capacity, Jerusalem-based Dr. Baskin was extensively involved (with other players) in the secret back channel negotiations between Israel and Hamas, with these dealings and the wider context in which they were conducted revealed in the letters, e-mails, and other documents that were exchanged between the players over the $ve-year period, which are contained in the book, thus making it a valuable primary source for those analyzing Israeli-Hamas relations.
    [Show full text]
  • Making America Safer from Nuclear Terrorism
    Making America Safer from Nuclear Terrorism Graham Allison merican politics may be deeply polarized, but there appears to be Avirtual unanimity about what constitutes the greatest threat to our national security. When asked that question during the first pres- idential debate of 2004, Senator Kerry’s immediate answer was, “nuclear proliferation,” because “there are terrorists trying to get their hands on that stuff.” President Bush concurred: “I agree with my oppo- nent that the biggest threat facing this country today is weapons of mass destruction in the hands of a terrorist network.”1 That assessment was buttressed by the 9/11 Commission’s official report, which documented in chilling detail Al Qaeda’s search for nuclear weapons. The report concluded, “Al Qaeda has tried to acquire or make weapons of mass destruction for at least ten years. There is no doubt the United States would be a prime target.”2 In August 2001, for instance, during the final countdown to what Al Qaeda calls the “Holy Tuesday” attack, bin Laden received two key former officials from Pak- istan’s nuclear weapons program at his secret headquarters near Kabul. Over the course of three days of intense conversation, he and his second- in-command, Ayman al-Zawahiri, quizzed Sultan Bashiruddin Mah- mood and Abdul Majeed about chemical, biological, and especially nuclear weapons. Bin Laden, al-Zawahiri, and the two other as yet unidentified, top-level Al Qaeda operatives who participated in these conversations had clearly moved beyond the impending assault on the World Trade Center to visions of grander attacks to follow.3 The threats do not stop at Al Qaeda.
    [Show full text]
  • Chemical Warfare Agents
    . Chemical Warfare Agents ........ Using Detector Tubes as a Means of Detecting Chemical Warfare Agents in HazMat Response by Victor Vendetti International Sales and Marketing Manager - Instruments For years, detector tubes have been a reliable and Crush ampoule inside tube effective tool in HazMat response. Used for Insert tube into pump detecting a wide array of contaminants such as aromatic hydrocarbons (benzene, toluene), Manual Versus Automatic Sample- oxidizing gases (nitrogen dioxide, chlorine), and Taking acid gases (hydrogen chloride), detector tubes have helped emergency responders quickly The most common and cost-effective means of assess hazardous conditions. taking detector tube samples is with a manual pump (squeezed by hand). Such pumps typically In the past, the compounds of concern to HazMat vary in cost between $150 and $300 each. responders primarily have been industrial However, because of the low detection range on compounds such as those listed above. However, CW agent detector tubes, often 30 or more pump the newest and most lethal concern to HazMat, strokes are required with a manual pump. This law enforcement and security forces is the threat can take a considerable amount of time and of chemical warfare attacks and the need to require significant repetition of pump-stroke respond to potential attacks. motions. Capable of mass destruction, chemical warfare agents are the number one concern in the industry today. Because chemical warfare agents are so deadly, they must be detected quickly and effectively in order to minimize the effects on those in the vicinity of an attack. Detector tubes offer a quick, reliable, and cost-effective means of detecting chemical warfare agents, helping HazMat professionals respond quickly to attacks.
    [Show full text]