Combatting Cyber Terrorism (for Raymond Rhine) by Alice Turley
Author:Alice Turley
Language: eng
Format: epub
ISBN: 9781787785212
Publisher: IT Governance Publishing Ltd
CBRN
Terror attacks and plots designed to deploy chemical, biological, radiological and nuclear materials are thankfully rare. Before mass-scale digital communications, instances of terror groups and lone actors ordering bomb-making manuals from educational outlets or sharing explosive designs via couriers and CD-ROMs were relatively rare (compared to other security threats) and generally intercepted or monitored by security agencies and law enforcement bodies. In attempting to overthrow their own state by provoking nuclear warfare, Japanâs cult group Aum Shinrikyo (âSupreme Truthâ) carried out 17 known chemical and biological attacks against citizens during the early 1990s, including lethal sarin gas attacks in Matsumoto City (1994) and against commuters using Tokyoâs subway system a year later (Monterey Institute of International Studies: 2001). A biological attack (anthrax), supposedly targeting the New York subway, conducted by two active members of white supremacist group Aryan Nation â was foiled by an informerâs tip-off in 1997 (CBS News: 1998). One week after the 9/11 atrocities in America, letters containing anthrax spores were posted to prominent senators and news media offices in an episode of bioterrorism that claimed five lives and injured up to 68 others (Cymet and Kerkvliet: 2004).
In 2003, a prominent Al-Qaeda-supporting theologian published online âa twenty-five page fatwah seeking to legitimise the use of weapons of mass destruction against the United Statesâ (Dean: 2018: 265). One passage read: âIf those engaged in jihad establish that the evil of the infidels can be repelled only by attacking them with weapons of mass destruction in a surprise manner, they may be used even if they annihilate all the infidelsâ (ilmway.com cited in Tenet: 2007: 273â4 and Suskind: 2006). The âelectronic blueprintsâ for constructing a chemical weapon (dubbed âal-Mubtakkarâ, translated as âThe Inventionâ) were then posted onto several Al-Qaeda online forums, the recipe then spread âlike a virusâ during early 2004. The âeight-page manualâ provided more than thirty diagrams providing advice on construction and target selection (Dean: 2018: 265). By November 2004, a prominent US news organisation published instructions to assemble chemical dispersal devices that had originated from Al-Qaedaâs dedicated, central bomb-making research laboratory, located within an Afghanistan terrorism training camp until US-coalition airstrikes forced its closure in Autumn 2001. Three years later, Americaâs mainstream news agencies fanned out the productâs design and intent far and wide: âLittle or no training is required to assemble and deploy such a device, due to its simplicity [â¦] One or more devices assembled devices could easily be brought aboard a train or subway [â¦] It is difficult to judge the number of casualties that would result from the use of multiple devices; however, such an attack will likely generate fear and panic among the local populationâ (Dean: 2018: 264).
Nevertheless, predictions and fears that the Internet will open up a Pandoraâs Box of CBRN threats, particularly within urban environments laced with soft targets, are yet to materialise into anything other than periodic threats. In 2015, a software programmer from Liverpool, UK, was sent to prison after attempting to purchase the toxin ricin from an undercover FBI officer.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26274)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18805)
Shot Through the Heart by Mercy Celeste(18686)
The Fifty Shades Trilogy & Grey by E L James(18578)
The Subtle Art of Not Giving a F*ck by Mark Manson(13899)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13841)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(12768)
Scorched Earth by Nick Kyme(12509)
Drei Generationen auf dem Jakobsweg by Stein Pia(10738)
Suna by Ziefle Pia(10671)
Scythe by Neal Shusterman(10020)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9281)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9096)
This is Going to Hurt by Adam Kay(8727)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(7342)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(6748)
He Loves Me...KNOT by RC Boldt(6630)
Unleashing the Power of UX Analytics: Proven techniques and strategies for uncovering user insights [Team-IRA] [True PDF] by Jeff Hendrickson(6300)
Interdimensional Brothel by F4U(6086)
