Combatting Cyber Terrorism (for Raymond Rhine) by Alice Turley

Combatting Cyber Terrorism (for Raymond Rhine) by Alice Turley

Author:Alice Turley
Language: eng
Format: epub
ISBN: 9781787785212
Publisher: IT Governance Publishing Ltd


CBRN

Terror attacks and plots designed to deploy chemical, biological, radiological and nuclear materials are thankfully rare. Before mass-scale digital communications, instances of terror groups and lone actors ordering bomb-making manuals from educational outlets or sharing explosive designs via couriers and CD-ROMs were relatively rare (compared to other security threats) and generally intercepted or monitored by security agencies and law enforcement bodies. In attempting to overthrow their own state by provoking nuclear warfare, Japan’s cult group Aum Shinrikyo (‘Supreme Truth’) carried out 17 known chemical and biological attacks against citizens during the early 1990s, including lethal sarin gas attacks in Matsumoto City (1994) and against commuters using Tokyo’s subway system a year later (Monterey Institute of International Studies: 2001). A biological attack (anthrax), supposedly targeting the New York subway, conducted by two active members of white supremacist group Aryan Nation – was foiled by an informer’s tip-off in 1997 (CBS News: 1998). One week after the 9/11 atrocities in America, letters containing anthrax spores were posted to prominent senators and news media offices in an episode of bioterrorism that claimed five lives and injured up to 68 others (Cymet and Kerkvliet: 2004).

In 2003, a prominent Al-Qaeda-supporting theologian published online “a twenty-five page fatwah seeking to legitimise the use of weapons of mass destruction against the United States” (Dean: 2018: 265). One passage read: “If those engaged in jihad establish that the evil of the infidels can be repelled only by attacking them with weapons of mass destruction in a surprise manner, they may be used even if they annihilate all the infidels” (ilmway.com cited in Tenet: 2007: 273–4 and Suskind: 2006). The “electronic blueprints” for constructing a chemical weapon (dubbed ‘al-Mubtakkar’, translated as ‘The Invention’) were then posted onto several Al-Qaeda online forums, the recipe then spread “like a virus” during early 2004. The “eight-page manual” provided more than thirty diagrams providing advice on construction and target selection (Dean: 2018: 265). By November 2004, a prominent US news organisation published instructions to assemble chemical dispersal devices that had originated from Al-Qaeda’s dedicated, central bomb-making research laboratory, located within an Afghanistan terrorism training camp until US-coalition airstrikes forced its closure in Autumn 2001. Three years later, America’s mainstream news agencies fanned out the product’s design and intent far and wide: “Little or no training is required to assemble and deploy such a device, due to its simplicity […] One or more devices assembled devices could easily be brought aboard a train or subway […] It is difficult to judge the number of casualties that would result from the use of multiple devices; however, such an attack will likely generate fear and panic among the local population” (Dean: 2018: 264).

Nevertheless, predictions and fears that the Internet will open up a Pandora’s Box of CBRN threats, particularly within urban environments laced with soft targets, are yet to materialise into anything other than periodic threats. In 2015, a software programmer from Liverpool, UK, was sent to prison after attempting to purchase the toxin ricin from an undercover FBI officer.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(52945)
What's Done in Darkness by Kayla Perrin(26274)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18805)
Shot Through the Heart by Mercy Celeste(18686)
The Fifty Shades Trilogy & Grey by E L James(18578)
The Subtle Art of Not Giving a F*ck by Mark Manson(13899)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13841)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(12768)
Scorched Earth by Nick Kyme(12509)
Drei Generationen auf dem Jakobsweg by Stein Pia(10738)
Suna by Ziefle Pia(10671)
Scythe by Neal Shusterman(10020)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9281)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9096)
This is Going to Hurt by Adam Kay(8727)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(7342)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(6748)
He Loves Me...KNOT by RC Boldt(6630)
Unleashing the Power of UX Analytics: Proven techniques and strategies for uncovering user insights [Team-IRA] [True PDF] by Jeff Hendrickson(6300)
Interdimensional Brothel by F4U(6086)