WorldWideScience

Sample records for terrorists attack state

  1. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  2. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  3. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  4. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  5. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  6. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  7. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  8. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  9. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  10. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States

    DEFF Research Database (Denmark)

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...

  11. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  12. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  13. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  14. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  15. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  16. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  17. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  18. Spatial proximity and the risk of psychopathology after a terrorist attack

    OpenAIRE

    DiMaggio, Charles; Galea, Sandro; Emch, Michael

    2010-01-01

    Previous studies concerned with the relation of proximity to the September 11, 2001 terrorist attacks and subsequent psychopathology have produced conflicting results. The goals of this analysis are to assess the appropriateness of using Bayesian hierarchical spatial techniques to answer the question of the role of proximity to a mass trauma as a risk factor for psychopathology. Using a set of individual-level Medicaid data for New York State, and controlling for age, gender, median household...

  19. The Nation That Cried Lone Wolf : A Data-Driven Analysis of Individual Terrorists in the United States Since 9/11

    OpenAIRE

    Eby, Charles A.

    2012-01-01

    Approved for public release; distribution is unlimited Lone-wolf terrorist attacks have occurred in the United States throughout the countrys history. Attempted attacks from individual terrorists unaffiliated with terrorist groups may be becoming more prevalent. Both the general public and government officials acknowledge the presence and importance of these attacks; however, relatively little literature exists on the subject compared to group terrorism. Much of the information on lone wol...

  20. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  1. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  2. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  3. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  4. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  5. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  6. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  7. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  8. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  9. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  10. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  11. Computer Network Attack and Its Effectiveness against Non-State Actors

    National Research Council Canada - National Science Library

    Presby, Timothy D

    2006-01-01

    .... With the United States engaged in counter-insurgency operations against terrorist groups, synchronizing the effects of CNA with more traditional forms of kinetic attacks, as well as other instruments...

  12. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  13. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  14. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  15. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  16. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  17. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    Science.gov (United States)

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  18. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  19. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  20. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  1. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  2. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  3. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  4. [Stories and drawings by children after the 2015 terrorist attacks in Paris].

    Science.gov (United States)

    Poget, Marc; Bouaziz, Nora; Apter, Gisèle

    2016-01-01

    Through the stories and drawings of children in a medical-psychological centre, it is possible to explore their psychological representations of the terrorist attacks which took place in Paris in January 2015. This work highlights the need to rethink the methods of care provided to these children in order to adapt them to their specific needs. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  5. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    International Nuclear Information System (INIS)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il'kaev, R.I.; Shapovalov, V.I.

    2004-01-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks

  6. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    Energy Technology Data Exchange (ETDEWEB)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il' kaev, R.I.; Shapovalov, V.I. [Russian Federal Nuclear Center - All-Russian Research Inst. of Experimental Physics, Sarov (Russian Federation)

    2004-07-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks.

  7. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  8. The Representation of Islam in Western Media: The Coverage of Norway Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Emad A. Alghamdi

    2015-05-01

    Full Text Available Undeniably mass media have become the primary source of information and communication for the majority of, if not all, members of modern societies. The nature of the information thus communicated and the manner in which it is dispensed through media certainly have a profound influence on people’s perceptions of the world around them. The relation between the media, on one hand, and culture, social life, and politics on the other, is an interesting one in which media fulfills dual functions, reflecting and also shaping issues occurring within these three domains (Bell & Garrett, 1998. In the initial media coverage of the 2011 Norway terrorist attacks, some western media authors, inaccurately and unjustly, held Muslims and Islamic groups as being responsible for the attacks. Using Critical Discourse Analysis (CDA, this study seeks to ascertain how language was manipulated in this coverage of the terrorist attacks in order to give expression to blind prejudice against Islam and Muslims. As findings of the analyses reveal, the tones of allegation in these articles and reports differed dramatically from one article to another ranging from tones of mere suspicion to those of overt accusation. The varying degrees of uncertainty or assertion of the authors’ statements were reflected in the varied linguistic forms and devices used within the discourse.

  9. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    Science.gov (United States)

    Bennett, Russell L.

    2006-01-01

    The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD) on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11) and the tragic incidents involving twenty-three people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO) nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection and analysis. Six hypotheses were tested. Using a

  10. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  11. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  12. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  13. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    OpenAIRE

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critica...

  14. Operation the laboratory for NBC protection and bio monitoring in the case of terrorist attack with NBC weapons

    International Nuclear Information System (INIS)

    Tusek, D.; Vucemilovic, A; Klobucar, J.

    2009-01-01

    The aim of this study was to develop efficacy of Operation the Laboratory for NBC protection and Bio monitoring in the case of terrorist attack with chemical weapons. When is necessary quickly, adeptly Operation and unambiguous confirmation about use chemical warfare agent, the Laboratory must be ready and qualified for reaction. The Laboratory had to develop capability for the timely sampling and unambiguous identification chemical warfare agents in a battlefield or in case of the terrorist attack. The need for quality sample collection and analyses is critical to verify use of chemical weapon (CW) by an enemy or terrorists. Collection, packaging, transport and analysis of samples must be carried out on proper way and quickly enough for military, medical or political purposes. Precise records must accompany each sample but these records must not contaminate samples anyway. All sampling team personnel have to be equipped with appropriate equipment and qualified in its handling. After arriving samples at our Laboratory, we will handle with them on standard procedures; carry out preparation such as Headspace, Liquid/liquid extraction, Solid phase extraction, Liquid/solid extraction, concentration and derivatization. After that we will analyze samples by gas-chromatography mass-spectrometry (GC/MS) method.(author)

  15. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  16. Review of the Estimates for the Impact of the September 11, 2001, Terrorist Attacks on New York Tax Revenues

    National Research Council Canada - National Science Library

    2002-01-01

    As a follow-up to our May 2002 report, reviewing the estimates of the economic impact of the September 11, 2001, terrorist attacks on New York, Congress requested additional information on New York tax revenues...

  17. 9/11, Act II: a fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.

    Science.gov (United States)

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-12-01

    Terrorists can strike twice--first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variations in increased driving. Two factors, in turn, explained these variations in increased driving. The weaker factor was proximity to New York City, where stress reactions to the attacks were previously shown to be greatest. The stronger factor was driving opportunity, which was operationalized both as number of highway miles and as number of car registrations per inhabitant. Thus, terrorists' second strike exploited both fear of dread risks and, paradoxically, an environmental structure conducive to generating increased driving, which ultimately increased fatalities.

  18. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  19. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  20. Chronic thought suppression and posttraumatic symptoms: data from the Madrid March 11, 2004 terrorist attack.

    Science.gov (United States)

    Vázquez, Carmelo; Hervás, Gonzalo; Pérez-Sales, Pau

    2008-12-01

    Although a considerable number of people either witnessed directly or in the mass media the traumatic scenes of the terrorist attack that took place on March 11th, 2004 in Madrid, only a fraction of Madrid citizens developed posttraumatic symptoms. In this study, posttraumatic stress-related symptoms, degree of exposure, coping strategies related to the attack, and chronic attempts to avoid intrusive thoughts (i.e., thought suppression) were assessed in a general population Madrid sample (N=503) 2-3 weeks after the attacks. Our results showed that participants with higher scores in chronic thought suppression exhibited higher levels of PTSD symptoms. Higher scores in chronic thought suppression also correlated positively with the use of avoidant coping strategies after the attacks. We discuss the possible common roots of avoidance of intrusive thoughts and avoidant coping strategies and the implications of this relationship for the emergence of stress-related symptoms as well as for public health policies.

  1. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    Science.gov (United States)

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21390292

  2. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations.

    Science.gov (United States)

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D; Dolislager, Fredrick; Love, Adam H; Hanna, M Leslie

    2011-02-13

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  3. [Defusing of victims of the terrorist attacks in Paris. Elements of assessment one-month post-event].

    Science.gov (United States)

    Prieto, N; Cheucle, E; Faure, P; Digard, F; Dalphin, C; Pachiaudi, V; Simond, M; Darbon, R; Collinet, C; Habibi, R; Gueugniaud, P-Y

    2018-04-01

    The terrorist attacks (fusillades and suicide attacks) in Paris on 13 November 2015 have had a major psychic impact on all individuals directly or secondarily exposed to them. Medico-psychological unit (CUMP) of the Paris Île-de-France region's immediate care services were immediately mobilized and rapidly strengthened by all regional medico-psychological units (CUMP) throughout the country. Psychological assistance has been provided in several key points of Paris and specifically in the 11th district City Hall of Paris where Lyon's Medico-psychological unit was located. These specific immediate psychological assistances, referred to as a "defusing process" by the medico-psychological unit (CUMP), are mostly devoted to provide the victims with an entry point to a psychological healthcare relationship and give them a first sense of soothing and relief even though they do not prevent further psychological care follow up for the victims. Nonetheless, the potential therapeutic effect of this "defusing process" has not yet been sufficiently established nor demonstrated by any scientific study. A phoning survey was carried out one-month post-terrorist attacks and interviewed the 129 victims who benefited from the "defusing process" conducted by Lyon's medico-psychological unit (CUMP) in order to collect data and assess its effects. These people, whether directly exposed, bereaved relatives or witnesses, whose average age is 35, are mostly living in the Île-de-France region. Most of them present a high score on the IES-R scale, whether they were directly exposed, bereaved relatives or witnesses. Almost all of them (96.5%) experienced at least one medical care contact within this one-month post-trauma period with psychotropic medication for 37% of them. Regarding the defusing conducted by Lyon's medico-psychological unit (CUMP) in the 11th district City Hall of Paris, it appears that 93% of the victims who were looked after indicated that they were satisfied and 87.4% of

  4. A project to develop restoration methods for buildings and facilities after a terrorist attack

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.F. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre; Volchek, K.; Hornof, M.; Boudreau, L.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Best, M. [Health Canada, Ottawa, ON (Canada); Garbutt, M.; Krishnan, J.; Wagener, S.; Bernard, K. [Health Canada, Winnipeg, MB (Canada); Cousins, T.; Haslip, D. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2004-07-01

    A multi-agent project was initiated to review site restoration after a terrorist attack. The objective was to acquire and compile information on all known restoration procedures for buildings, exteriors of buildings, their interior contents, and adjacent areas such as parking lots, lawns and vehicles. All procedures were then tested and validated. Restoration procedures included pickup, neutralization, decontamination, removal and final destruction/deposition of the contaminant, cleaning material and contaminated debris resulting from the terrorist act. This research and development project considered chemical, biological and nuclear contamination with the intent to develop methods to decontaminate and restore buildings after a chemical, biological and radiological (CBR) attack. Ideas were collected from work conducted around the world. The efficacy of best candidates was tested along with all selected chemical target items. The project also involved the preparation of procedures for decontamination and restoration. Ultimately, a tradeoff decision basis will be developed to provide information on abandonment and quarantine versus cleanup. The study revealed that there are several technologies that can be used for the decontamination of structures and equipment after acts of terrorism, however, no one technique will work for all contaminants on all surfaces. The selection of a decontamination method depends on the contaminant, the surface being decontaminated and economic, social and health factors. The amount of waste generated by decontamination is a major feasibility factor. 25 refs., 6 tabs.

  5. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  6. Long-Term Memory for the Terrorist Attack of September 11: Flashbulb Memories, Event Memories, and the Factors that Influence Their Retention

    Science.gov (United States)

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2009-01-01

    More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…

  7. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  8. 9/11, Act II : A Fine-Grained Analysis of Regional Variations in Traffic Fatalities in the Aftermath of the Terrorist Attacks

    OpenAIRE

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-01-01

    Terrorists can strike twice - first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variatio...

  9. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  10. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  11. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  12. Architectural and structural engineering aspects of protective design for nuclear power plants against terrorist attack

    International Nuclear Information System (INIS)

    Musacchio, J.M.; Rozen, A.

    1987-01-01

    This paper presents the results of several threat studies which have been performed, provides collective data on costs, and discusses, in a general sense, architectural/structural aspects of passive protection design measures which have been developed and utilized at several nuclear power plants. By combining relevant architectural and structural measures in the standard design, it is possible to substantially reduce the vulnerability of nuclear power plants to terrorist attack and the estimated damage to a manageable level with a minimal investment. (orig./HP)

  13. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  14. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  15. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  16. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  17. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    Science.gov (United States)

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  18. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  19. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  20. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  1. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  2. Post-traumatic stress reactions following the March 11, 2004 terrorist attacks in a Madrid community sample: a cautionary note about the measurement of psychological trauma.

    Science.gov (United States)

    Vázquez, Carmelo; Pérez-Sales, Pau; Matt, Georg

    2006-05-01

    Posttraumatic stress reactions related to the Madrid March 11, 2004, terrorist attacks were examined in a sample of Madrid residents (N = 503) 18-25 days after the attacks, using multiple diagnostic criteria and different cut-off scores. Based on the symptoms covered by the Posttraumatic Stress Disorder Checklist-Civilian (PCL-C; Weathers, Litz, Herman, Huska, and Keane, 1993), rates of probable posttraumatic stress disorder (PTSD) ranged from 3.4% to 13.3%. Taking into account additional criteria from the Diagnostic and Statistical Manual of Mental Disorders (American Psychiatric Association, 200; i.e., the impact of initial reaction and problems in daily functioning as a consequence of the traumatic event), only 1.9% of respondents reported probable PTSD. These results suggest that inferences about the impact of traumatic events on the general population are strongly influenced by the definition of traumatic response. Our findings also revealed that the magnitude of posttraumatic reactions is associated with several risk factors, including living close to the attacked locations, physical proximity to the attacks when they occurred, perception of one's life being at risk, intensity of initial emotional reactions, and being a daily user of the attacked train lines. The use of different cut-off scores did not affect the pattern of risk to develop traumatic stress. The implications of these results for public health policies related to terrorist attacks are discussed.

  3. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  4. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    Science.gov (United States)

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  5. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  6. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    Science.gov (United States)

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  7. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  8. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  9. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    Science.gov (United States)

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  10. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    Science.gov (United States)

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21399674

  11. Narratives from caregivers of children surviving the terrorist attack in Beslan: issues of health, culture, and resilience.

    Science.gov (United States)

    Moscardino, Ughetta; Axia, Giovanna; Scrimin, Sara; Capello, Fabia

    2007-04-01

    Acts of terrorism have an extremely negative impact on the mental health of children and families. The school siege in Beslan, Russia, in 2004, represents a particularly traumatizing event as it was directed specifically at children and involved the entire community. This qualitative study aims to: (a) examine caregiver reactions to the terrorist attack in Beslan as reported 3 months after the traumatic event; (b) determine the extent to which indigenous cultural values and religious belief systems play a role in Beslan's caregivers' reactions to such event; and (c) identify variables that may function as sources of resilience to caregivers. A convenience sample of 17 primary caregivers from Beslan with at least one child who survived the school siege were asked to participate in semi-structured interviews. Narratives generated from the interviews were qualitatively analyzed using a thematic approach; nine major themes were identified. Caregivers' concerns centered on children's physical and psychological well-being, the reorganization of family life, and the disruption of community ties. Cultural values of pride, heroism, courage, and revenge emerged as relevant aspects shaping caregivers' reactions to the traumatic event. Possible sources of resilience included the willingness to return to normality, social support, and the reaffirmation of positive, culturally shared values in face of the perceived threat of future terrorist attacks. Findings are discussed in terms of their theoretical implications on the effects of trauma on children and families as well as interventions with highly traumatized populations in diverse cultural settings.

  12. An Analysis of Media’s Role: Case Study of Army Public School (APS Peshawar Attack

    Directory of Open Access Journals (Sweden)

    Qureshi Rameesha

    2016-12-01

    Full Text Available The study aimed at analyzing the role of media during and after terrorist attacks by examining the media handling of APS Peshawar attack. The sample consisted of males and females selected on convenience basis from universities of Rawalpindi and Islamabad. It was hypothesized that (1 Extensive media coverage of terrorist attacks leads to greater publicity/recognition of terrorist groups (2 Media coverage of APS Peshawar attack increased fear and anxiety in public (3 Positive media handling/coverage of APS Peshawar attack led to public solidarity and peace. The results indicate that i Media coverage of terrorist attacks does help terrorist groups to gain publicity and recognition amongst public ii Media coverage of Aps Peshawar attack did not increase fear/anxiety in fact it directed the Pakistani nation towards public solidarity and peace.

  13. Small to Mid-Size Sporting Events: Are We Prepared to Recover from an Attack?

    Directory of Open Access Journals (Sweden)

    Brian M. Harrell

    2010-01-01

    Full Text Available This article describes a fictional deadly attack by a lone-wolf terrorist during a high school football event in a small town, here in the United States. The authors begin by describing an attack and then focus on the response from the medical community, city, county, state, and federal government officials. Next, the authors make several recommendations on what actions are needed to develop an effective plan to combat terrorist activities during a small- to mid-size sports event. Among the actions needed, the authors focus on the following: response planning, emergency action plan, incident command, policies and procedures, and security staff training.

  14. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  15. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  16. The day Norway cried: Proximity and distress in Norwegian citizens following the 22nd July 2011 terrorist attacks in Oslo and on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Aakvaag, Helene Flood; Wentzel-Larsen, Tore; Dyb, Grete; Hjemdal, Ole Kristian

    2012-01-01

    Terrorism may create fear and stress reactions not only in the direct victims, but also in the general population. This study investigated emotional responses in the Norwegian population following the 22nd July 2011 terrorist attacks. We hypothesized that Oslo residents would report a higher level of fear responses compared with people living outside Oslo and that proximity would be associated with early distress and later post-traumatic stress reactions. Representative samples were drawn from the Norwegian Population Registry. Telephone interviews were conducted 4-5 months after the attacks. The response rate for the Oslo sample (N=465) was 24% of the total sample, and 43% of those who were actually reached by phone and asked to participate. Corresponding figures for the sample living outside Oslo (N=716) were 19% and 30%. Our results show strong immediate emotional responses, particularly sadness and a feeling of unreality, in both samples. Jumpiness and other fear responses were significantly higher among Oslo residents. Current level of risk perception was low 4-5 months after the attacks; however, a significant minority reported to feel less safe than before. Geographical and psychological proximity were associated with early emotional responses. Psychological proximity was significantly associated with post-traumatic stress reactions, while measures of geographical proximity were not. Immediate emotional responses, first-week reactions, and first-week jumpiness were uniquely and significantly associated with post-traumatic stress reactions. Post-traumatic stress reactions were elevated in ethnic minorities. The terrorist attacks seem to have had a significant effect on the Norwegian population, creating sadness and insecurity, at least in the short term. Proximity to the terrorist attacks was strongly associated with distress in the population, and early distress was strongly related to later post-traumatic stress reactions. Our results indicate that

  17. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  18. Construction of War Discourse on International News Agencies: Case Study Terrorist attacks November 13th 2015

    Directory of Open Access Journals (Sweden)

    Ángel TORRES-TOUKOUMIDIS

    2017-01-01

    Full Text Available This study analyzes warmongering rhetoric presented by international agencies Reuters, Al Arabiya, Al Jazeera and Associated Press (AP of the information related to the terrorist attacks in Paris on November 13th, 2015 for 15 days after the event. We have started from a quantitative and qualitative analysis of 550 information units using the software MAXQDA (v. 11.0.11. Subsequently, the semantic criteria of media discourse: functionality, significance and direction of the goal was applied on the selected sample. The results demonstrate the prevailing demonization of Islam, the exaltation of fear and panic in the discursive construction and it highlighted the spectacle of the information as a communicative strategy on the rhetorical guidance.

  19. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  20. Lessons Learnt from the Westgate Shopping Mall Terrorist Attack in Nairobi, Kenya: Involving the Meetings, Incentives, Conferences and Exhibitions Sector in Crisis Communications

    Directory of Open Access Journals (Sweden)

    Ashley Schroeder

    2014-11-01

    Full Text Available The terrorist attacks in Nairobi Kenya have been widely disseminated by the world media, thus, affecting the long-term interests of stakeholders. The tourism industry is made up of a vast number of these stakeholders, with the operating sector alone including the accommodation, tourism services, transportation, entertainment, food services, adventure and outdoor recreation, attractions, meetings, incentive, conventions, and exhibitions (MICE, and travel trade sectors. Within each operating sector, there is also a variety of different stakeholders in various segments and organisations. The purpose of this manuscript is to examine tourism crisis communications surrounding the Westgate Shopping Mall attacks in Kenya. The main research question which guided this study was: did tourism communications surrounding the Westgate Shopping Mall attacks follow best practices for tourism crisis communications? Accordingly, this paper used participant observation to highlight communications surrounding the attacks from the perspective of a conference planner and a conference attendee.

  1. Islamic State and Chemical Weapons

    Directory of Open Access Journals (Sweden)

    Lukáš Rafay

    2016-09-01

    Full Text Available The article deals with topic of Islamic State and chemical weapons. The issue is analysed in three dimensions: origin of used chemical weapons and possibility of independent production; known chemical attacks and tactical regularities in their execution; and traits of future chemical terrorist attacks. By providing a thorough examination of the problem, the article aims at predicting the future development of the group’s chemical program as well as describing any prospective chemical terrorist attacks in Europe

  2. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    OpenAIRE

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and de...

  3. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    Science.gov (United States)

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  4. Urban planning after terrorism:The case of Oslo with focus on the impacts of the terrorist attack on the consideration of security, memorialisation and conservation in urban planning

    OpenAIRE

    Paizs, Franziska

    2013-01-01

    Terrorism is a targeted way to hurt a population but also to destroy and annihilate a part of the civilization by attacking the built environment, especially iconic and symbolic buildings with its values of collective memory and cultural heritage, which is at the latest created by the iconic act of destruction. The resilient city with its integrated plans and programs but also technical, personal or physical security aims to reduce the probability and the dimension of terrorist attacks. Howev...

  5. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  6. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: Case study of New Jersey

    International Nuclear Information System (INIS)

    Greenberg, Michael; Mantell, Nancy; Lahr, Michael; Felder, Frank; Zimmerman, Rae

    2007-01-01

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened

  7. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: case study of New Jersey

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, M.; Mantell, N.; Lahr, M.; Felder, F. [Rutgers University, New Brunswick, NJ (United States). Edward J. Bloustein School; Zimmerman, R. [New York University (United States). Robert F. Wagner School of Public Service

    2007-01-15

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened. (author)

  8. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  9. An Estimation of a Nonlinear Dynamic Process Using Latent Class Extended Mixed Models: Affect Profiles After Terrorist Attacks.

    Science.gov (United States)

    Burro, Roberto; Raccanello, Daniela; Pasini, Margherita; Brondino, Margherita

    2018-01-01

    Conceptualizing affect as a complex nonlinear dynamic process, we used latent class extended mixed models (LCMM) to understand whether there were unobserved groupings in a dataset including longitudinal measures. Our aim was to identify affect profiles over time in people vicariously exposed to terrorism, studying their relations with personality traits. The participants were 193 university students who completed online measures of affect during the seven days following two terrorist attacks (Paris, November 13, 2015; Brussels, March 22, 2016); Big Five personality traits; and antecedents of affect. After selecting students whose negative affect was influenced by the two attacks (33%), we analysed the data with the LCMM package of R. We identified two affect profiles, characterized by different trends over time: The first profile comprised students with lower positive affect and higher negative affect compared to the second profile. Concerning personality traits, conscientious-ness was lower for the first profile compared to the second profile, and vice versa for neuroticism. Findings are discussed for both their theoretical and applied relevance.

  10. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  11. ACTS OF TERRORISM AS A TACTIC OF THE ISLAMIC STATE AND IMPLICATIONS FOR RUSSIAN FOREIGN POLICY

    Directory of Open Access Journals (Sweden)

    Aleksandr Nikolaevich Xaribin

    2016-02-01

    Full Text Available In the article the analysis of the Islamic state: emergence, current status, reasons for success, control methods and prospects. The last terrorist attacks: Russian aircraft over the Sinai and the terrorist attack in Paris. A comparative analysis and reasons for election purposes by terrorists to attack, the consequences for Egypt, Europe, the middle East and Russia. At the end of the article gives practical recommendations for Russian foreign policy and the forecast of development of events in this region, it is hypothesized that the further growth of the Islamic state and the inability to move it to the borders of Russia

  12. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  13. Following the terrorist attacks recently committed in the United States of America, and according to the recommendations of the Council of the European Union, the CERN staff observed 3 minutes of silence on Friday 14 September 2001 at 12h00, as a sign of deepest sympathy for all the victims and their families, and of solidarity with the American people

    CERN Multimedia

    Maximilien Brice

    2001-01-01

    Following the terrorist attacks recently committed in the United States of America, and according to the recommendations of the Council of the European Union, the CERN staff observed 3 minutes of silence on Friday 14 September 2001 at 12h00, as a sign of deepest sympathy for all the victims and their families, and of solidarity with the American people

  14. Managing mild casualties in mass-casualty incidents: lessons learned from an aborted terrorist attack.

    Science.gov (United States)

    Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron

    2007-01-01

    Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to

  15. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  16. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  17. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  18. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  19. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  20. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  1. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  2. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  3. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  4. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  5. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  6. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  7. State and Local Preparedness for Terrorism: Selected Policy Issues

    National Research Council Canada - National Science Library

    Canada, Ben

    2002-01-01

    While the federal government has resources at hand for responding to terrorist attacks, the proximity of state and local first responders insures they will almost always be the first to arrive at the site of an attack...

  8. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001

    Directory of Open Access Journals (Sweden)

    Conlin Ava Marie S

    2009-07-01

    Full Text Available Abstract Background Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Methods Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002. We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. Results No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. Conclusion The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes.

  9. Mobile system for radiation reconnaissance after terrorist attack

    International Nuclear Information System (INIS)

    Resehetin, V. P.

    2009-01-01

    Well-timed radiation reconnaissance aimed at identifying a source of radiation contamination and drawing up a contamination map represents an important and complex problem, the solution of which allows for the reduction of the irradiation dose, the implementation of decontamination works, and finally minimizing the consequences of a terrorist attack. New opportunities for operational gathering of radiation contamination data and corresponding space coordinates can be associated with the development of mobile systems which provide measurements of ionizing radiation dose rate and corresponding space coordinates, and subsequent transferral to the crisis centre server where these data are processed and used for mapping radiation contamination. In such a way, the data obtained on radiation contamination could be incorporated in a timely manner as input data to computer models, describing the dispersion of radionuclides in an environment that makes it possible not only to forecast the development of a situation but to define necessary protection measures for mitigating and localizing the consequences. The mobile reconnaissance system was developed as a prototype of such a solution, based on a cellular terminal such as the Nokia 12i (Teltonika BoxGPS). A Global Positioning System (GPS) was used to determine space coordinates. A Russian BDMG device measured the dose rate of ionizing radiation, and the subsequent data were transferred to the server of the crisis centre of the Nuclear Safety Institute of RAS (IBRAE). The main operation regime involved setting the GPRS connection, transferring data, and switching off the connection. A change of the operation regime can be produced via SMS commands from the crisis centre's terminal or with the help of a cellular phone. When a connection is not available, the data are aggregated in memory and transferred to the server when the connection channel arises. A few data transfer protocols, including FTP and HTTP/HTTPS, are provided

  10. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  11. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  12. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  13. Table top exercise: State Response to a terrorist attack against an NPP. STAR Contract

    International Nuclear Information System (INIS)

    Nannini, A.; Aurelle, J.

    2012-01-01

    The response to a severe attack on a NPP encompasses protection of public and environment, maintaining public order and protection. To this end, the large number of local and national entities involved in the response will have to cooperate efficiently (security and safety authorities, operator teams, dedicated response forces, judicial authorities). The objective of STAR exercise:to develop a cultural integration of the implied agencies namely a mutual understanding between the safety and security stakes through national exercises,and to share with our European counterparts common modes for emergency management of a nuclear crisis. STAR is a scenario-driven case study, time-stepped facilitated discussion to address crisis decision management. The scenario considers an attack against a NPP requesting an emergency response at national level. Although NPPs are designed to sustain such attacks, the emergency preparedness and response management has to be prepared. The scenario provides successive failures of safety functions requiring timely and appropriate measures to be taken to stop the aggression and to restore safety. The objective is to identify and develop key issues related to the effectiveness of the response through a facilitated discussion. The scenario is organised by time-steps and used by facilitators to lead participants through the case study to express theirs comments, points of view, criticisms. The final discussion allows identifying good practices and recommendations. The first STAR session showed the importance of human factor and organizational issues such as: the coordination between the involved agencies, the need for a common language, the need to simplify the decision channels, the management of contradictory orders, or the management of available skills. The article is followed by the slides of the presentation

  14. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  15. Terrorism, memory and dealing with a trauma. Spontaneous memorialization of the 2016 Brussels attacks

    OpenAIRE

    Milosevic, Ana

    2017-01-01

    Whilst the interest of memory scholars in political violence and more specifically in terrorism is not novel, after the terrorist attacks in Paris (2015) and Brussels (2016) there appears to be a certain urgency to reflect upon these nascent memories in collective, European immaginarium. This article traces the development of a “bottom-up” memorialization process in the immediate aftermath of terrorist attacks in Brussels (March - July 2016) questioning how these acts of terrorisms will settl...

  16. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  17. 34 CFR 674.64 - Discharge of student loan indebtedness for survivors of victims of the September 11, 2001, attacks.

    Science.gov (United States)

    2010-07-01

    ..., other safety or rescue personnel, or as a member of the Armed Forces; and (ii)(A) Died due to injuries... to injuries suffered in the terrorist attacks on September 11, 2001. (2) Died due to injuries suffered in the terrorist attacks on September 11, 2001 means the individual was present at the World Trade...

  18. Social integration buffers stress in New York police after the 9/11 terrorist attack.

    Science.gov (United States)

    Schwarzer, Ralf; Bowler, Rosemarie M; Cone, James E

    2014-01-01

    Being socially integrated is regarded as a protective factor enabling people to cope with adversity. The stress-buffering effect reflects an interaction between stress and a social coping resource factor on subsequent outcomes. This study, based on 2943 police officers, examines mental health outcomes among officers who responded to the 9/11 terrorist attack on the World Trade Center. The Wave 1 data collection took place between September 2003 and November 2004 with a follow-up study (Wave 2) conducted from November 2006 through December 2007. A moderated mediation model was specified that uses event exposure as a distal predictor, earlier stress response as a mediator, and later stress response as an outcome, and social integration as a moderator of this relationship. The mediation hypothesis was confirmed, and moderation occurred at two stages. First, there was a multiplicative relationship between exposure levels and social integration: The higher the exposure level, the more stress responses occur, but this effect was buffered by a high level of social integration. Second, Wave 1 stress interacted with social integration on Wave 2 stress: The more the police officers were socially integrated, the lower the Wave 2 stress, which happened in a synergistic manner. The findings contribute to the understanding of mediating and moderating mechanisms that result in health outcomes such as posttraumatic stress disorder or resilience.

  19. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  20. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  1. Occupational Practitioner's Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack.

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  2. Occupational practitioner's role in the management of a crisis: lessons learned from the Paris November 2015 terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexis Descatha

    2016-09-01

    Full Text Available In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015.During and after the Paris attack, occupational practitioners in collaboration with emergency and security professionals were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans.Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events, and participate in preventing, to the extent possible, post-traumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols.In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  3. State, Foreign Operations, and Related Programs: FY2008 Appropriations

    National Research Council Canada - National Science Library

    Veillette, Connie; Epstein, Susan B

    2007-01-01

    ... an unprecedented level compared with the past 40 years. Emergency supplementals enacted since the September 11, 2001, terrorist attacks to assist the front-line states in the war on terrorism, fund Afghanistan and Iraq reconstruction, and upgrade State...

  4. US foreign policy towards West Africa after September 11 attacks

    OpenAIRE

    Akinwande, FO

    2014-01-01

    The United States foreign policy towards West Africa experienced a significant shift after the terrorist attacks of US strategic institutions in September 11, 2001. This was marked by the securitization of US foreign policy beyond the military-security context of security into other aspects of US security strategy after the Cold War. In that context, political, economic and environmental sectors became part of US security agenda, as reflected in the post-9/11 US\\ud War on Terror in global reg...

  5. Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

    National Research Council Canada - National Science Library

    Wilson, Clay

    2005-01-01

    Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a coordinated attack against...

  6. Occupational Practitioner’s Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up. PMID:27703965

  7. Defending and attacking a network of two arcs subject to traffic congestion

    International Nuclear Information System (INIS)

    Bier, Vicki M.; Hausken, Kjell

    2013-01-01

    To study the effects of intentional attacks on transportation systems, we consider drivers who choose the more time-efficient of two arcs (possibly of different lengths). Both arcs are subjected to traffic congestion, and also to interdiction or blockage (e.g., by a terrorist attack). The model has three types of strategic actors: the government; the terrorist; and potential drivers. The government protects travel, while the terrorist interdicts travel, along the two arcs. Drivers choose the arc that gives the shortest travel time, and cannot choose an interdicted arc. The drivers have reservation travel times, such that if the actual travel time will exceed an individual driver's reservation travel time, that driver would prefer not to travel; the reservation travel times are allowed to vary among drivers. The objective function of the master problem, which the government minimizes and the terrorist maximizes, is the sum of the total travel time plus the reservation travel times of the non-travelers. Each potential driver decides endogenously whether to travel, according to whether the actual travel time is greater or lesser than that driver's reservation travel time

  8. Plastic Surgery Management of Victims of Terrorist Violence in Ankara, Turkey.

    Science.gov (United States)

    İğde, Murat; Kaplan, Ahmet

    2017-12-01

    Terror attacks have been progressively increasing worldwide through the present era. The management of the consequences of terrorism events is under debate in almost every scientific area. The organization and advancement of health services constitute important components of the crisis management. Similar to other specialty areas in medicine, the medical management of terrorist attacks is becoming important in terms of plastic and reconstructive surgery.Ankara, the capital of Turkey, has been subject to 2 terrorist events in public places within a year. The total number of patients involved in both cases was 434. Ankara Numune Training and Research Hospital is a tertiary health care institution and one of the most important trauma centers in the region. A total of 178 Patients exposed to these events referred to our hospital. Of the total, 34 patients were completely or partially treated in the plastic and reconstructive surgery clinic. In this study, we tried to discuss the difficulties encountered in the classification of patients and plastic surgery during the treatment period of patients who experienced these attacks.Data were obtained from The National News Agency, hospital, and our own clinic registries. Patient classification was based on the injured parts of the body. Statistical analysis was performed for all data. In conclusion, the role and the importance of plastic surgery department especially in trauma management have been emphasized in the light of our findings.

  9. Continuity and Change in the Operational Dynamics of the Islamic State

    Directory of Open Access Journals (Sweden)

    James Regens

    2017-03-01

    Full Text Available In this article we estimate the influence of leadership changes on the operational dynamics associated with terrorist attacks conducted by the Islamic State and its predecessors. Because the focus of our research is empirical, the study uses data for 2,131 successful attacks between October 2002 and December 2014 to examine differentials in operational tempo, attack severity, primary tactics employed, and principal targets. The data are aggregated on a monthly basis to estimate the probabilities associated with specific attack sequences in terms of the following primary tactics: (1 firearms, (2 explosives, (3 hostage-taking/kidnapping, and (4 attacks involving combinations of (1, (2, and/or (3. The analysis is placed in a broad historical and strategic context in order to explore two key issues: (1 The effect of leadership change on terrorist group activity and (2 The implications for counterterrorism and counterinsurgency efforts. Our analysis reveals a myriad of conceptual, theoretical, and policy implications.

  10. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  11. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  12. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  13. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  14. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

    National Research Council Canada - National Science Library

    Wilson, Clay

    2003-01-01

    Persistent computer security vulnerabilities may expose U.S. critical infrastructure and government computer systems to possible cyber attack by terrorists, possibly affecting the economy or other areas of national security...

  15. Politické násilí a koncept failed state - komparace Iráku a Somálska

    OpenAIRE

    Nemešová, Lucie

    2011-01-01

    There is recently growing interest, and also the political and academic debate connected to it, in the so called failed states. The problem of state failure in some of the world regions was securitized, particularly after the 9/11 terrorist attacks, and the failed states began being understood as a security threat by the international community. This change in perception of the failed states reflects the concerns that such states' areas could serve as a "safe havens" of various terrorist grou...

  16. "Evita Una Muerte, Esta en Tus Manos" Program: Bystander First Aid Training for Terrorist Attacks.

    Science.gov (United States)

    Pajuelo Castro, J J; Meneses Pardo, J C; Salinas Casado, P L; Hernandez Martin, P; Montilla Canet, R; Del Campo Cuesta, J L; Incera Bustio, G; Martin Ayuso, D

    The latest terrorist attacks in Europe and in the rest of the world, and the military experience in the most recent conflicts leave us with several lessons learned. The most important is that the fate of the wounded rests in the hands of the one who applies the first dressing, because the victims usually die within the first 10 minutes, before professional care providers or police personnel arrive at the scene. A second lesson is that the primary cause of preventable death in these types of incidents involving explosives and firearms is massive hemorraghe. There is a need to develop a training oriented to citizens so they can identify and use available resources to avoid preventable deaths that occur in this kind of incidents, especially massive hemorrhage. A 7-hour training intervention program was developed and conducted between January and May 2017. Data were collected from participants' answers on a multiple-choice test before and after undertaking the training. Improved mean score for at least 75% of a group's members on the posttraining test was considered reflective of adequate knowledge. A total of 173 participants (n = 74 men [42.8%]; n = 99 women [57.2%]) attended the training. They were classified into three groups: a group of citizens/ first responders with no prior health training, a group of health professionals, and a group of nursing students. Significant differences (ρ first responders group. 2017.

  17. The Islamic State and U.S. Policy

    Science.gov (United States)

    2016-06-14

    global sense of urgency about further weakening the group and preventing future attacks. Members of Congress, Administration officials, and their...organization, IS terrorist attacks may restore a sense of pride and accomplishment among its members but also may galvanize new patterns of multilateral...question “Is the Islamic State Islamic?” to focus on whether or not the group’s members and actions are authentically Islamic in the sense of

  18. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  19. Terrorist attacks and the male-to-female ratio at birth: The Troubles in Northern Ireland, the Rodney King riots, and the Breivik and Sandy Hook shootings.

    Science.gov (United States)

    Grech, Victor

    2015-12-01

    Males are usually born in excess of females. The ratio is often expressed as M/F (male divided by total births). A wide variety of factors have been shown to influence M/F. Terrorist attacks reduce M/F. This study was carried out in order to ascertain whether individual terrorist attacks influenced M/F in relevant populations. The following events were studied: the Troubles in Northern Ireland, the Los Angeles Riots (the Rodney King affair), the Breivik shooting (Norway), and the Sandy Hook shooting (Connecticut). Northern Ireland M/F was significantly lower during the Troubles (1969-1998) than during the period before (p=0.0006). There was a very sharp dip in 1978 (p≤0.004) during this particular year of renewed violence and heavy civilian attacks. Rodney King riots-late April 1992 M/F dipped significantly in August 1992, 4months after the riots (p=0.044). Breivik Shooting-22/07/2011 M/F dipped significantly in December 2011, 5months after the event (p=0.004). Sandy Hook Shooting-14/12/2012 M/F dipped significantly in April 2013, 4months after the event (p=0.009). M/F dips follow catastrophic or tragic events if these are felt to be momentous enough by a given population. All of the above events caused significant population stress. The M/F dips noted may have been caused by population stress which is known to lead to the culling of frail/small male foetuses. The dips noted are comparable to a substantial proportion of quoted values for perinatal mortality, potentially elevating this a public health issue. 1. The male-to-female ratio at birth is decreased by stressful events. 2. This is due to an excess of male foetal losses in established pregnancies. 3. Such losses in response to acute events are transient. 4. This ratio may be a useful indicator of population stress. RESEARCH DIRECTIONS: 1. Gender ratios in populations could be routinely monitored in order to assess the impact of stressful events that may reduce the male-to-female birth ratio. Copyright

  20. The Swedish School Attack in Trollhättan.

    Science.gov (United States)

    Erlandsson, Åsa; Reid Meloy, J

    2018-04-23

    This is a case report of the offender and offense characteristics of a targeted attack on a Swedish school using a sword, with a particular focus upon the offender's history, the relationship between mental disorder and ideology, and whether or not it was an act of terrorism. Findings indicate that the offender had no drug or psychiatric treatment history, but postoffense analysis suggests autism spectrum disorder, depression, and both suicidal ideation and intent. The offender planned and prepared for his attack, and the triggering event appeared to be the loss of a temporary job. He expressed chronic anger concerning immigrants to Sweden and blamed them for his failures. Comparison of the fact pattern to other cases of lone actor terrorism with the Terrorist Radicalization Assessment Protocol (TRAP-18) empirically demonstrates excellent criterion validity with other lone actor terrorists in Europe and North America-including right wing extremists-and contributes to further understanding of ideologically motivated mass murder. © 2018 American Academy of Forensic Sciences.

  1. Asthma and posttraumatic stress symptoms 5 to 6 years following exposure to the World Trade Center terrorist attack.

    Science.gov (United States)

    Brackbill, Robert M; Hadler, James L; DiGrande, Laura; Ekenga, Christine C; Farfel, Mark R; Friedman, Stephen; Perlman, Sharon E; Stellman, Steven D; Walker, Deborah J; Wu, David; Yu, Shengchao; Thorpe, Lorna E

    2009-08-05

    The World Trade Center Health Registry provides a unique opportunity to examine long-term health effects of a large-scale disaster. To examine risk factors for new asthma diagnoses and event-related posttraumatic stress (PTS) symptoms among exposed adults 5 to 6 years following exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack. Longitudinal cohort study with wave 1 (W1) enrollment of 71,437 adults in 2003-2004, including rescue/recovery worker, lower Manhattan resident, lower Manhattan office worker, and passersby eligibility groups; 46,322 adults (68%) completed the wave 2 (W2) survey in 2006-2007. Self-reported diagnosed asthma following September 11; event-related current PTS symptoms indicative of probable posttraumatic stress disorder (PTSD), assessed using the PTSD Checklist (cutoff score > or = 44). Of W2 participants with no stated asthma history, 10.2% (95% confidence interval [CI], 9.9%-10.5%) reported new asthma diagnoses postevent. Intense dust cloud exposure on September 11 was a major contributor to new asthma diagnoses for all eligibility groups: for example, 19.1% vs 9.6% in those without exposure among rescue/recovery workers (adjusted odds ratio, 1.5 [95% CI, 1.4-1.7]). Asthma risk was highest among rescue/recovery workers on the WTC pile on September 11 (20.5% [95% CI, 19.0%-22.0%]). Persistent risks included working longer at the WTC site, not evacuating homes, and experiencing a heavy layer of dust in home or office. Of participants with no PTSD history, 23.8% (95% CI, 23.4%-24.2%) reported PTS symptoms at either W1 (14.3%) or W2 (19.1%). Nearly 10% (9.6% [95% CI, 9.3%-9.8%]) had PTS symptoms at both surveys, 4.7% (95% CI, 4.5%-4.9%) had PTS symptoms at W1 only, and 9.5% (95% CI, 9.3%-9.8%) had PTS symptoms at W2 only. At W2, passersby had the highest rate of PTS symptoms (23.2% [95% CI, 21.4%-25.0%]). Event-related loss of spouse or job was associated with PTS symptoms at W2. Acute and prolonged exposures were both

  2. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  3. Vulnerability of industrial facilities to attacks with improvised explosive devices aimed at triggering domino scenarios

    International Nuclear Information System (INIS)

    Landucci, Gabriele; Reniers, Genserik; Cozzani, Valerio; Salzano, Ernesto

    2015-01-01

    Process- and chemical plants may constitute a critical target for a terrorist attack. In the present study, the analysis of industrial accidents induced by intentional acts of interference is carried out focusing on accident chains triggered by attacks with home-made (improvised) explosives. The effects of blast waves caused by improvised explosive devices are compared with those expected from a net equivalent charge of TNT by using a specific methodology for the assessment of stand-off distances. It is demonstrated that a home-made explosive device has a TNT efficiency comprised between 0.2 and 0.5. The model was applied to a case study, demonstrating the potentiality of improvised explosives in causing accident escalation sequences and severe effects on population and assets. The analysis of the case-study also allowed obtaining suggestions for an adequate security management. - Highlights: • Improvised explosives possibly used for terrorist attacks were described. • The TNT efficiency of ANFO and TATP was characterized. • Domino effects caused by an attack with improvised explosive were analyzed. • Domino scenarios induced by an attack were compared to conventional scenarios

  4. Strengthening Hospital Surge Capacity in the Event of Explosive or Chemical Terrorist Attacks

    Science.gov (United States)

    2009-03-01

    and become more specialized and efficient over the past decade in order to survive in the tight financial markets . Capacity is not keeping pace...Surge Capacity for Terrorist Bombings,” Atlanta, Georgia, (April 2007): 6. 197 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler ...activated in several bombings, 200 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler

  5. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  6. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    Science.gov (United States)

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  7. Intelligence and Security Standards on Industrial Facilities Protection in Case of Terrorism and Military Attack

    International Nuclear Information System (INIS)

    Stipetic, D.

    2007-01-01

    team. A terrorism event or hazmat crime brings multiple agencies together, but their integration needs to be seamless. Response to these incidents presents acute and long term health risks to public safety personnel. There are many factors involved in the selection and use of protective equipment. New threats and technology are emerging. Then we will describe the specific situation by participating in joint-agency working groups and by maintaining regular liaison and routine coordination with local and state law enforcement and intelligence agencies. Applicable regulations and national consensus standards governing emergency response and post-emergency response operations conducted at criminal or terrorist incidents involving hazardous materials or attack on oil, chemical and petrochemical industry.(author)

  8. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  9. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  10. NATIONAL PREPAREDNESS: Integration of Federal, State, Local, and Private Sector Efforts Is Critical to an Effective National Strategy for Homeland Security

    National Research Council Canada - National Science Library

    2002-01-01

    .... Federal, state, and local governments have a shared responsibility in preparing for catastrophic terrorist attacks, but the initial responsibility falls upon local governments and their organizations...

  11. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  12. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  13. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  14. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  15. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  16. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  17. The State of Integrated Air and Missile Defense Held in Laurel, Maryland on July 14, 2011

    Science.gov (United States)

    2011-07-14

    compromised from servers (-22%) 86% were discovered by a third party (+25%) 96% of breaches were avoidable (+-0) Source 2011 Data Breach Investigations...Foreign Espionage - Terrorists - State Sponsored Attacks UNCLASSIFIED UNCLASSIFIED 11 What commonalities exist? How do breaches occur? Verizon Data ... Breach Study “Breaching organizations still doesn’t typically require highly sophisticated attacks, most victims are a target of opportunity rather

  18. Foreign Students in the United States: Policies and Legislation

    National Research Council Canada - National Science Library

    Haddal, Chad C

    2007-01-01

    Five years after the September 11, 2001, terrorist attacks by foreign nationals -- including several terrorists on student visas -- the security concerns over foreign student visas are being weighed...

  19. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  20. THE FAILURE OD THE INTELLIGENCE COMMUNITY OF THE UNITED STATES ON SEPTEMBER 11. SYSTEMIC OR HUMAN FLAWS?

    Directory of Open Access Journals (Sweden)

    FRANKLIN BARRIENTOS RAMÍREZ

    2018-01-01

    Full Text Available The terrorist attacks of September 11th, put the blame on to the US’ intelligence community, and mainly the CIA, FBI and the NSA, because they failed to set an early warning alert of the incoming terrorist threat. The Senate’s Intelligence Committee and the Intelligence Permanent Committee of the House of Representatives were the first to create an investigation commission to analyze the causes that drove to the 911 attacks. Later on, and due to the citizen’s pressure, President Bush installed the National Investigation Commission for the Terrorist Attacks to the US. Beyond of the criticisms both commission received, it can be said that they perform an honest and accurate work over the real causes of the terrorist attacks. Among the aws and mistakes of the security and intelligence agencies, organizational, cultural, systemic and human flaws were detected.

  1. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  2. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  3. Terrorist Attacks in Mumbai, India, and Implications for U.S. Interests

    National Research Council Canada - National Science Library

    Kronstadt, K. A

    2008-01-01

    On the evening of November 26, 2008, a number of well-trained militants came ashore from the Arabian Sea on small boats and attacked numerous high-profile targets in Mumbai, India, with automatic weapons and explosives...

  4. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  5. Posse Comitatus and the Use of the Military in Denying Terrorist Access to the United States Along the Border with Mexico

    National Research Council Canada - National Science Library

    Thomas, Greg A

    2005-01-01

    .... The largely unsecured border we share with Mexico is an enticing avenue for illegal immigrants and drug smugglers but also, and more importantly, for potential terrorists hostile to the United States...

  6. September 11th, an attack at the limits of thought.

    Science.gov (United States)

    Patalano, Roberta

    2017-10-01

    The paper deals with imagination and its failures from a psychoanalytic perspective. We offer a definition of imagination failures and suggest how they can be interpreted as an opportunity to learn from experience. In order to show that the topic has a concrete and not only speculative significance we consider the public report on September 11 as a case study. The report was published by the National Commission on Terrorist Attacks Upon the United States after a long investigation of the facts and circumstances relating to the September 11 attacks. The document has been the object of strong criticisms, as we argue in the paper. Both the document and some of the critiques that it received focus, however, on significant aspects of the debate about imagination, such us the fragility of imaginative thought, its dependence on unconscious desires and its plurality of outcomes: a plethora of imaginaries can in fact be developed at any time, from the same set of information about reality. We comment on these aspects and reinterpret them from a Bionian perspective. The concepts of 'unthinkability', 'imagination failure' and 'depressive position' are used to inform the necessity of dealing with an evolving and conflictual geopolitical scenario. Particular attention is paid to the proposal of 'routinizing, even bureaucratizing, the exercise of imagination' within the institutions that deal with National Defense. This possibility is discussed in depth in order to suggest how it may be concretely implemented. In conclusion, a strong case is made for the usefulness of psychoanalytic reflection in the arena of relationships among countries, with particular emphasis on the new terrorist challenges. Copyright © 2016 Institute of Psychoanalysis.

  7. Analysis of Protection Measures for Naval Vessels Berthed at Harbor Against Terrorist Attacks

    Science.gov (United States)

    2016-06-01

    of discriminating neutral vessels from threats. A naval vessel berthed at harbor is more susceptible to attack than a vessel in open seas. The...discriminating neutral vessels from threats. A naval vessel berthed at harbor is more susceptible to attack than a vessel in open seas. The chances of...this thesis. He was a source of inspiration, encouragement, and reassurance. Captain Jeffery E. Kline, I am really thankful to you for your ideas

  8. Relevance of terrorism for Italian students not directly exposed to it: The affective impact of the 2015 Paris and the 2016 Brussels attacks.

    Science.gov (United States)

    Raccanello, Daniela; Burro, Roberto; Brondino, Margherita; Pasini, Margherita

    2018-04-01

    Notwithstanding the dramatically increasing frequency of acts of terrorism in Europe and the extent of their media coverage, there is lack of knowledge on people's affective reactions and associated emotion regulation strategies. We explored the affective impact on two cohorts of Italian students (n = 193) possibly exposed vicariously through the mass media to the 2015 Paris or the 2016 Brussels terrorist attacks, respectively. We accessed data from three online questionnaires: one on emotion regulation administered before each attack; one on daily affect administered just before and after each attack; and one on causes of weekly affect and life satisfaction administered at the end of the week in which each attack occurred. The attacks were perceived as relevant for influencing negative affect for 22% of the students. For them, suppression-less frequently used than reappraisal-was associated with an improvement of affect after each attack but negatively related to life satisfaction concerning the week in which the attacks occurred. Our data showed that the recent terrorist attacks occurring in Europe had an affective impact on people at some distance who were vicariously exposed and point to the protective role of emotion regulation as a key resource for individuals' well-being. Copyright © 2017 John Wiley & Sons, Ltd.

  9. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  10. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  11. Evaluation of current state of amplification-based DDoS attacks

    NARCIS (Netherlands)

    Bohte, Edgar; Stamatogiannakis, Manolis; Bos, Herbert

    2018-01-01

    Amplification-based DDoS attacks are still a big threat to the availability of the internet. In quite some time there is no new paper published that gave an update on the current state of amplification DDoS attacks, taken into consideration it was a huge problem a few years ago. We performed

  12. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  13. Conduct of Occupational Health During Major Disasters: A Comparison of Literature on Occupational Health Issues in the World Trade Center Terrorist Attack and the Fukushima Nuclear Power Plant Accident.

    Science.gov (United States)

    Toyoda, Hiroyuki; Mori, Koji

    2017-01-01

    Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.

  14. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  15. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  16. What Are We Really Afraid Of? The Practitioner View of the Terrorist Threat in the United States

    Science.gov (United States)

    2005-03-01

    like intelligence gathering and courier work • 80% single • Familiarity with home ground. Thus terrorists come from both rural and urban areas • 66...codes also help disaggregate intra- - 114 - state regions by identifying urban areas from suburban and rural . Finally, through geographic mapping...National Laboratory for Tourism and eCommerce (NLTEC), University of Illinois at Urbana-Champaign. 2002. Self-Selection Biases in the Internet

  17. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  18. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  19. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  20. Formulating a strategy for securing high-speed rail in the United States.

    Science.gov (United States)

    2013-03-01

    This report presents an analysis of information relating to attacks, attempted attacks, and plots against high-speed rail (HSR) : systems. It draws upon empirical data from MTIs Database of Terrorist and Serious Criminal Attacks Against Public Sur...

  1. Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    Science.gov (United States)

    McCormick, Gordon H.; Owen, Guillermo

    We consider the conditions that lead to the dissolution of state-terrorist coalitions. While such coalitions have well known advantages, they also have structural weaknesses that are largely ignored in the literature on the state sponsorship of terrorism. Each player in the coalition has interests that are only partially shared and, in some cases, at odds with those of its partner. Long term cooperation must be based on mutual advantage and mutual trust, both of which are subject to change over time.We examine the conditions that are needed to begin and maintain a cooperative strategy and the circumstances that lead a state and a terrorist group to leave the coalition and double-cross its partner. Equilibrium strategies for both players are defined and interpreted.

  2. Can News Draw Blood The Impact of Media Coverage on the Number and Severity of Terror Attacks

    Science.gov (United States)

    2016-05-01

    groups devote to carrying out attacks, p are the costs of a single attack, and E measures the effectiveness of terrorist attacks, e.g. the average...8i) h A. h · A ( b) (r r ) A 2(a+b)JP , w ere IS t e expressiOn = a+ jP u3 + s- u1 . s A2 + 4bEw > 0, all three eigenvalues will be elements of the...May 2016 164 Jahn, Vera ; Steinhardt, Max Friedrich : Innovation and Immigration - Insights from a Placement Policy, February 2016 163 Beckmann

  3. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  4. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  5. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. State health policy for terrorism preparedness.

    Science.gov (United States)

    Ziskin, Leah Z; Harris, Drew A

    2007-09-01

    State health policy for terrorism preparedness began before the terrorist attacks on September 11, 2001, but was accelerated after that day. In a crisis atmosphere after September 11, the states found their policies changing rapidly, greatly influenced by federal policies and federal dollars. In the 5 years since September 11, these state health policies have been refined. This refinement has included a restatement of the goals and objectives of state programs, the modernization of emergency powers statutes, the education and training of the public health workforce, and a preparation of the health care system to better care for victims of disasters, including acts of terrorism.

  7. Inoculation Policies in Response to Terrorist or WMD Attacks: Additional Factors to Consider

    International Nuclear Information System (INIS)

    Leitner, P. M.

    2007-01-01

    When viewed on its own merits, the debate over who should be inoculated during a period of biological emergency is a rather straightforward public policy decision. The classic public policy 'balancing act' decision-making model is defaulted to as issues of fairness, efficiency, cost-effectiveness, adequacy of supply, mission performance, and constituencies are arrayed and adjudicated. This mainstream approach is appropriate as far as it goes but it also exemplifies a series of structural and perceptual weaknesses when applied to wartime or localized terrorism scenarios. In fact, the establishment of a vaccination policy appropriate to a flu pandemic falls squarely within this mainstream debate. Although the notion of a pandemic carries an assumption of a great many fatalities it does not possess the fear quotient, uncertainty, horror, unnaturalness, or inevitability of a bio-terror or biological warfare incident. As a result, the reliability and responsiveness of key personnel responding to a flu pandemic should be less of an issue than it will be in the event of an intentional man-made biological incident. The principal policy weakness in instances an intentional bio-attack stems from a generalized failure, or refusal, to systematically study the behavior of key personnel, first-responders, soldiers, or critical senior leadership during severe crises occurring in their own backyards. In other words, when the 'balloon goes up' how many of your responders and critical personnel will show up for work? This presentation considers many of the 'unaddressed' factors that experience has shown may have a determinative effect upon the efficacy of a response to a biological incident. Lessons are drawn from experiences of US forces station in the former West Germany, US Defense Department Continuity of Operations Programs, Hurricane Katrina, and the 9/11 attacks on the United States. (author)

  8. About a hypothetical terrorist attack on a nuclear power plant

    International Nuclear Information System (INIS)

    2001-10-01

    After the terrorism attack on the World Trade Center, a record number ( two thirds) of US citizens favour the use of nuclear energy and consider nuclear plants to be safe. At the same time 59% definitely support building more nuclear plants, less than in March during the Californian crisis, but more than earlier., Most american citizens ( 84%) continue to support licence renewal for nuclear plants and 72 % agree with keeping the option open to build new nuclear plants in the future. The strongest supporters are those who have visited a nuclear plant or information centre. (N.C.)

  9. Moments of Goodness: An Analysis of Ethical and Educational Dimensions of the Terror Attack on Utøya, Norway (July 22, 2011)

    Science.gov (United States)

    Kristiansen, Aslaug

    2015-01-01

    The analysis is based on some moral experiences taking place during a terrorist attack on the Norwegian Labor Party's youth camp on the island of Utøya (outside of Oslo) July 22, 2011, where 69 young people were killed and several seriously injured. After the attack many of the survivors told stories of how strangers spontaneous had helped and…

  10. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  11. Does the Statue of Liberty Still Face out? The Diversion of Foreign Students from the United States to Canada in the Post 9/11 Period

    Science.gov (United States)

    Mueller, Richard E.

    2009-01-01

    The terrorist attacks of September 11, 2001, have resulted in the increased scrutiny of both immigrants and non-immigrants entering the United States. The latter group includes students who enter the country on temporary visas to complete programs of higher education. Depending on the source, the number of foreign students in the United States has…

  12. Authorities for Military Operations Against Terrorist Groups: The State of the Debate and Options for Congress

    Science.gov (United States)

    2016-01-01

    of these operations are high-precision strikes conducted by special forces ground teams or air- ground attack aircraft, such as armed drones , with...The unsettling truth is that the difference between a plot to attack a local mall in Kenya , for example, and a mall in Europe or the United States may

  13. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    Science.gov (United States)

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  14. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  15. Reducing Mortality from Terrorist Releases of Chemical and Biological Agents: I. Filtration for Ventilation Systems in Commercial Building

    Energy Technology Data Exchange (ETDEWEB)

    Thatcher, Tracy L.; Daisey, Joan M.

    1999-09-01

    There is growing concern about potential terrorist attacks involving releases of chemical and/or biological (CB) agents, such as sarin or anthrax, in and around buildings. For an external release, the CB agent can enter the building through the air intakes of a building's mechanical ventilation system and by infiltration through the building envelope. For an interior release in a single room, the mechanical ventilation system, which often recirculates some fraction of the air within a building, may distribute the released CB agent throughout the building. For both cases, installing building systems that remove chemical and biological agents may be the most effective way to protect building occupants. Filtration systems installed in the heating, ventilating and air-conditioning (HVAC) systems of buildings can significantly reduce exposures of building occupants in the event of a release, whether the release is outdoors or indoors. Reduced exposures can reduce the number of deaths from a terrorist attack. The purpose of this report is to provide information and examples of the design of filtration systems to help building engineers retrofit HVAC systems. The report also provides background information on the physical nature of CB agents and brief overviews of the basic principles of particle and vapor filtration.

  16. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  17. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  18. The role of revenge, denial, and terrorism distress in restoring just world beliefs: the impact of the 2008 Mumbai attacks on British and Indian students.

    Science.gov (United States)

    Ferguson, Neil; Kamble, Shanmukh V

    2012-01-01

    Just world beliefs for students (N = 413) from India and the United Kingdom were measured. The participants then read a scenario about the 2008 terrorist attacks on Mumbai. The participants were then assessed for terrorism distress and offered multiple strategies (revenge and denial) to restore their just world beliefs. The findings indicate that students resident in India along with those who hold strong just world beliefs felt more distress, held a greater desire for revenge, and demonstrated more denial than the British students and those who had weak beliefs in a just world. These results indicate the important role just world beliefs play in responding to the threat created by mass casualty terrorist attacks. The implications for just world theory are also discussed.

  19. Hotels as a target for terrorism: a study of the Helsinki area hotels’ preparedness for an attack

    OpenAIRE

    Kovalevskiy, Andrey

    2015-01-01

    The threat of terrorism is an issue that is not to be taken lightly in the world of today. The year 2015 has sadly been marked with an unsettlingly high number of acts of terror across the globe that claimed a multitude of civilian lives. The hospitality industry and hotels in particular are especially vulnerable to a potential terrorist attack, and this fact attracted the author’s attention to the issue of the prevention of such attacks and the measures (if any) that the Helsinki hotels are ...

  20. Great Britain Against Libya’s state Terrorism in the 1980s

    Directory of Open Access Journals (Sweden)

    Łukasz Jureńczyk

    2018-06-01

    Full Text Available The aim of this paper is to present and assess Britain’s attitude towards Libya’s state terrorism in the 1980s. It presents the circumstances of involvement of Libyan authorities in the acts of terror, as well as the reasons for directing such activity against the United Kingdom. The paper discusses the response of the British authorities to the Libyan-backed terrorist activity and the results of investigations into attacks perpetrated by Libyans against British citizens. The main thesis of the paper is the statement that the politics of Great Britain in reaction for support offered by Muammar Gaddafi’s regime to the international terrorist network was formulated in line with the main directions of US policy towards Libya.

  1. Exploring the Iran-Hezbollah Relationship: A Case Study of how State Sponsorship affects Terrorist Group Decision-Making

    Directory of Open Access Journals (Sweden)

    Marc R. DeVore

    2012-10-01

    Full Text Available Understanding the impact of state sponsorship on the decision-making of violent non-state actors is among the more important issues to scholars of security studies. This article addresses the issue by examining the relationship between Iran and Lebanon’s Hezbollah. To preview its conclusions, there are two main perspectives to consider with regard to the terrorist group – state sponsor relationship. First, state support has a powerful, yet indirect effect on violent non-state actor decision-making by shaping the options available to groups’ leaders.  Second, state sponsors can also directly leverage their aid to shape the strategic decisions of armed non-state actors, forcing their clients to either expand or restrict their activities. Because of inevitable lacunae and contradictions amongst published accounts, this study relies heavily upon primary sources and data collected during field research in Lebanon, including interviews with leaders from Hezbollah, the Lebanese Army, the United Nations' Peacekeeping Mission in Southern Lebanon (UNIFIL and the rival Shia organization, Amal.

  2. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  3. US State-level income inequality and risks of heart attack and coronary risk behaviors: longitudinal findings.

    Science.gov (United States)

    Pabayo, Roman; Kawachi, Ichiro; Gilman, Stephen E

    2015-07-01

    To examine prospectively the association between US state income inequality and incidence of heart attack. We used data from the National Epidemiologic Survey on Alcohol and Related Conditions (n = 34,445). Respondents completed interviews at baseline (2001-2002) and follow-up (2004-2005). Weighted multilevel modeling was used to determine if US state-level income inequality (measured by the Gini coefficient) at baseline was a predictor of heart attack during follow-up, controlling for individual-level and state-level covariates. In comparison to residents of US states in the lowest quartile of income inequality, those living in the second [Adjusted Odds Ratio (AOR) = 1.71, 95 % CI 1.16-2.53)], third (AOR = 1.81, 95 % CI 1.28-2.57), and fourth (AOR = 2.04, 95 % CI 1.26-3.29) quartiles were more likely to have a heart attack. Similar findings were obtained when we excluded those who had a heart attack prior to baseline. This study is one of the first to empirically show the longitudinal relationship between income inequality and coronary heart disease. Living in a state with higher income inequality increases the risk for heart attack among US adults.

  4. Psychological distress and prejudice following terror attacks in France.

    Science.gov (United States)

    Goodwin, Robin; Kaniasty, Krzysztof; Sun, Shaojing; Ben-Ezra, Menachem

    2017-08-01

    Terrorist attacks have the capacity to threaten our beliefs about the world, cause distress across populations and promote discrimination towards particular groups. We examined the impact of two different types of attacks in the same city and same year on psychological distress and probable posttraumatic stress symptoms, and the moderating effects of religion or media use on distress/posttraumatic symptoms and inter-group relations. Two panel surveys four weeks after the January 2015 Charlie Hebdo attack (N = 1981) and the November 2015 Bataclan concert hall/restaurant attacks (N = 1878), measured intrinsic religiosity, social and traditional media use, psychological distress (K6), probable posttraumatic stress symptoms (proposed ICD-11), symbolic racism and willingness to interact with Muslims by non-Muslims. Prevalence of serious mental illness (K6 score > 18) was higher after November 2015 attacks (7.0% after the first attack, 10.2% the second, χ2 (1) = 5.67, p < 0.02), as were probable posttraumatic stress symptoms (11.9% vs. 14.1%; χ2 (1) = 4.15, p < 0.04). In structural equation analyses, sex, age, geographic proximity, media use and religiosity were associated with distress, as was the interaction between event and religiosity. Distress was then associated with racism symbolism and willingness to interact with Muslims. Implications are considered for managing psychological trauma across populations, and protecting inter-group harmony. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  6. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  7. Radiology response in the emergency department during a mass casualty incident: a retrospective study of the two terrorist attacks on 22 July 2011 in Norway

    International Nuclear Information System (INIS)

    Young, Victoria Solveig; Eggesboe, Heidi B.; Enden, Tone; Gaarder, Christine; Naess, Paal Aksel

    2017-01-01

    To describe the use of radiology in the emergency department (ED) in a trauma centre during a mass casualty incident, using a minimum acceptable care (MAC) strategy in which CT was restricted to potentially severe head injuries. We retrospectively studied the initial use of imaging on patients triaged to the trauma centre following the twin terrorist attacks in Norway on 22 July 2011. Nine patients from the explosion and 15 from the shooting were included. Fourteen patients had an Injury Severity Score >15. During the first 15 h, 22/24 patients underwent imaging in the ED. All 15 gunshot patients had plain films taken in the ED, compared to three from the explosion. A CT was performed in 18/24 patients; ten of these were completed in the ED and included five non-head CTs, the latter representing deviations from the MAC strategy. No CT referrals were delayed or declined. Mobilisation of radiology personnel resulted in a tripling of the staff. Plain film and CT capacity was never exceeded despite deviations from the MAC strategy. An updated disaster management plan will require the radiologist to cancel non-head CTs performed in the ED until no additional MCI patients are expected. (orig.)

  8. Radiology response in the emergency department during a mass casualty incident: a retrospective study of the two terrorist attacks on 22 July 2011 in Norway

    Energy Technology Data Exchange (ETDEWEB)

    Young, Victoria Solveig; Eggesboe, Heidi B.; Enden, Tone [Oslo University Hospital, Division of Radiology and Nuclear Medicine, Oslo (Norway); Gaarder, Christine [Oslo University Hospital, Department of Traumatology, Oslo (Norway); Naess, Paal Aksel [Oslo University Hospital, Department of Traumatology, Oslo (Norway); Oslo University Hospital, Department of Paediatric Surgery, Oslo (Norway); University of Oslo, Institute of Clinical Medicine, Faculty of Medicine, Oslo (Norway)

    2017-07-15

    To describe the use of radiology in the emergency department (ED) in a trauma centre during a mass casualty incident, using a minimum acceptable care (MAC) strategy in which CT was restricted to potentially severe head injuries. We retrospectively studied the initial use of imaging on patients triaged to the trauma centre following the twin terrorist attacks in Norway on 22 July 2011. Nine patients from the explosion and 15 from the shooting were included. Fourteen patients had an Injury Severity Score >15. During the first 15 h, 22/24 patients underwent imaging in the ED. All 15 gunshot patients had plain films taken in the ED, compared to three from the explosion. A CT was performed in 18/24 patients; ten of these were completed in the ED and included five non-head CTs, the latter representing deviations from the MAC strategy. No CT referrals were delayed or declined. Mobilisation of radiology personnel resulted in a tripling of the staff. Plain film and CT capacity was never exceeded despite deviations from the MAC strategy. An updated disaster management plan will require the radiologist to cancel non-head CTs performed in the ED until no additional MCI patients are expected. (orig.)

  9. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  10. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  11. Influencing the Behavior of General Chang Wanquan to Protect United States Space Assets

    Science.gov (United States)

    2009-04-01

    China. The terrorist group, East Turkistan Islamic Movement, is active in this portion of the China, and since the terrorist attacks in the US on...Washington, D.C: White House], 2006. 31 AU/ACSC/BERGREN/AY09 Weber, Max. The Religion of China: Confucianism and Taoism . Edited and translated by Hans H

  12. 75 FR 57159 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten to Commit, or...

    Science.gov (United States)

    2010-09-20

    ... economy of the United States constituted by the grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the terrorist attacks on September 11, 2001, in New York and... security, foreign policy, and economy of the United States, the national emergency declared on September 23...

  13. 76 FR 58999 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten To Commit, Or...

    Science.gov (United States)

    2011-09-22

    ... economy of the United States constituted by the grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the terrorist attacks on September 11, 2001, in New York and... security, foreign policy, and economy of the United States, the national emergency declared on September 23...

  14. Fears of Children in the United States: An Examination of the American Fear Survey Schedule with 20 New Contemporary Fear Items

    Science.gov (United States)

    Burnham, Joy J.

    2005-01-01

    Twenty contemporary fears (e.g., terrorist attacks, drive-by shootings, having to fight in a war) were added to E. Gullone and N. J. King's (1992) Australian Fear Survey Schedule for Children-II for use in the United States. The revised survey, the American Fear Survey Schedule for Children (J. J. Burnham, 1995), was investigated. The component…

  15. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  16. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  17. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  18. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    Science.gov (United States)

    2007-06-04

    Ibrahim had exhibited antisocial behavior as early as high school217 and had a significant criminal past—in 1996, he was sentenced to five years in prison...media. In addition to long-term emotional health issues, the attacks of September 11 have had a lasting effect on the physical health of those who were...Psychological and Behavioural Reactions to the Bombings in London on 7 July 2005: Cross Sectional Survey of a Representative Sample of Londoners

  19. FINANCING TERRORISM: FROM OFFSHORE COMPANIES TO THE CHARITY PARADOX

    Directory of Open Access Journals (Sweden)

    Irina IONESCU

    2015-06-01

    Full Text Available The world is currently living to its edges, menaced at each corner by environmental changes, terrorist attacks, civil wars or biological weapons let loose. With the emerging of the Islamic State and other terrorist cells the entire world under the peaceful globalization sphere questions its security. The paper aims to focus on detailing the most modern ways of financing terrorism, including through tax haven offshore companies, and the charity paradox. Charity institutions, several banks and even Non-Profit Organizations go hand in hand with a full range of felonies, from money laundering to narcotic traffic, humans trafficking, organized crime, arms dealing and terrorist attacks. The paper aims to offer pertinent solutions to tax havens and light legislation in order to prevent terrorist groups and cells from becoming an extensively rich and potent menace to global and state security.

  20. LEARNING INSTITUTIONS’ VULNERABILITY TO TERRORISM. AN OVERVIEW OF ISSUE COVERAGE IN NOWADAYS’ MEDIA AND SPECIALISED LITERATURE & A CASE STUDY OF GARISSA UNIVERSITY COLLEGE, KENYA

    Directory of Open Access Journals (Sweden)

    Elijah Onyango Standslause ODHIAMBO

    2015-10-01

    Full Text Available Terrorist groups like the Islamic State of Iraq and the Levant, (ISIL, Al-Shabaab and Al-Qaeda have the knowledge and the capability to strike anywhere in Kenya and with Kenya Defense Forces’ (KDF incursion into Somalia in mid-October 2011, the citizens in Mandera, Moyale, Garrisa, Nairobi and Mombasa have been attacked and lives lost. This confirms that Al-Shabaab and Al-Qaeda have been motivated by Kenya Defense Forces’ (KDF, now under the African Union Mission for Somalia (AMISOM incursion into Somalia and they will continue to attack Kenya as a way of retaliation. The importance of Learning Institutions makes it a soft target for ISIL, Al-Shabaab and Al-Qaeda terrorists. The fact that ISIL, Al-Shabaab and Al-Qaeda terrorists will strike at Learning Institutions is real and this can be confirmed by the Garissa University College, Kenya terror attack where 148 people were killed on 2 April, 2015. The risk of terrorists attack against this critical infrastructure can result in communal disruptions, disarray, and even overreaction on the part of governments and the public as a result of any attack, may be high. We argue that Learning Institutions are vulnerable to ISIL, Al-Shabaab and Al-Qaeda terrorist attacks. In summary, the article looks at the concepts of terrorism, the dangers of attack on Learning Institutions, Kenya’s Learning Institutions preparedness and concludes with a set of recommendations.

  1. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  2. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  3. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    Science.gov (United States)

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  4. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  5. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  6. Portrayal of Immigrants in Newsmagazines

    Directory of Open Access Journals (Sweden)

    Goran Goldberger

    2004-03-01

    Full Text Available This article analyzes how United States newsmagazines represented immigrants in the aftermath of September 11th terrorist attacks. Methodologically, the paper uses the frame analysis from a social constructivist standpoint, identifying the four functions of frame, as defined by Entman. Three months prior to the attacks, newsmagazines framed immigrants as “needed” and, in most cases, they portrayed them positively. In the period after the attacks, the frame shifted and newsmagazines started representing immigrants as “feared”, potential harborers of terrorists, and so on. Before the attacks, illegal immigrants were represented as the greatest immigration problem. After the attacks, the attention of newsmagazines shifted to legal immigrants with terrorist intentions. The results suggest that the issue of immigrants and immigration policy in the media collided with the threat of terrorism as a foreign policy issue. Thus, it became a security issue that influenced the representation of immigrants. In newsmagazines’ portrayal of immigrants, political features became more prominent than economic ones.

  7. Radical Islam in Britain: Implications for the War on Terrorism

    National Research Council Canada - National Science Library

    Donalds, Thomas J

    2007-01-01

    .... As opposed to the terrorists who attacked the United States in September 2001, the perpetrators of the London transit bombings in July 2005 were born and raised in the country which they attacked...

  8. State of the art on defenses against wormhole attacks in wireless sensor networks

    DEFF Research Database (Denmark)

    Prasad, Neeli R.; Giannetsos, T.; Dimitriou, T.

    2009-01-01

    describe the wormhole attack, a severe routing attack against sensor networks that is particularly challenging to defend against. We detail its characteristics and study its effects on the successful operation of a sensor network. We present state-of-the-art research for addressing wormhole related...... the possibility of using more sophisticated methods, like intrusion detection systems, to achieve a more complete and autonomic defense mechanism against wormhole attackers. We present our work on intrusion detection and introduce a lightweight IDS framework, called LIDeA, designed for wireless sensor networks....... LIDeA is based on a distributed architecture, in which nodes overhear their neighboring nodes and collaborate with each other in order to successfully detect an intrusion. We conclude by highlighting how such a system can be used for defending against wormhole attackers....

  9. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  10. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  11. Underlying finite state machine for the social engineering attack detection model

    CSIR Research Space (South Africa)

    Mouton, Francois

    2017-08-01

    Full Text Available one to have a clearer overview of the mental processing performed within the model. While the current model provides a general procedural template for implementing detection mechanisms for social engineering attacks, the finite state machine provides a...

  12. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  13. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  14. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  15. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  16. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  17. Time-lagged relationships between leadership behaviors and psychological distress after a workplace terrorist attack.

    Science.gov (United States)

    Birkeland, Marianne Skogbrott; Nielsen, Morten Birkeland; Knardahl, Stein; Heir, Trond

    2016-05-01

    The impact of leadership practices on employee health may be especially evident after extreme events that have physical, psychological, or material consequences for the members of an organization. In this prospective study, we aimed to examine the association between leadership behavior and psychological distress in employees who had experienced a workplace terror attack. Ten and 22 months after the 2011 Oslo bombing attack targeting their workplace, ministerial employees (n = 2272) responded to a questionnaire assessing fair, empowering, supportive, and laissez-faire leadership, as well as psychological distress. Cross-sectional and time-lagged associations between the constructs were tested using structural equation modeling. Cross-sectionally, higher levels of supportive leadership were associated with lower levels of psychological distress. Longitudinally, negative relationships were found between psychological distress and subsequent ratings of fair and empowering leadership. Supportive leadership was associated with employees' psychological health after trauma, but seems not to have long-term effects on subsequent psychological distress. Rather, psychological distress may lead the employees to perceive their leaders as more negative across time.

  18. International legal problem in combating 'Islamic State' terrorist group in Syria

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2015-01-01

    Full Text Available 'Islamic State of Iraq and Syria' (ISIS has occupied parts of internationally recognized states and exerts further territorial pretensions. ISIS, also, implements a repressive rule, through violations of human rights and humanitarian law, which may constitute international crimes. In facing the threat od ISIS, the perception of international terrorism is important since this group has the features of a territorial entity. So far, facing with the threat of ISIS has been reduced to a model that is adopted by the UN Security Council against the terrorist network Al-Qaida. An international coalition of states, led by the United States, has undertaken air strikes on positions ISIS, on several grounds: the responsibility to protect, the protection of national security, and at the request of Iraq. At the same time, the strikes are applied in Syria, which can not be accountable for the actions of ISIS and has not requested international assistance. International law does not allow actions which would aim to destroy or jeopardize the territorial integrity or political independence of any sovereign and independent state, which is acting in accordance with the principle of equal rights and self-determination of peoples, and is hence governed by a representative government. The UNSC resolution 2249 remains short of recommending international armed action under the aegis of UNSC, but represents a step forward in recognizing the responsibility of this body in facing ISIS, at least as far as the 'destruction of refuge' is concerned. The use of force in the territory of Syria, without the express authorization of the UNSC is illegal, because terrorism does not constitute grounds for the use of force against countries. But, it opens broader issues of responsibility for the development of ISIS and the humanitarian crisis in the Middle East, as well as the functioning of the system of collective security. Overcoming the current crisis UNSC implies not just a

  19. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  20. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  1. Acts of terrorism in Paris and Brussels: common and different

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    Full Text Available The article investigates the common and distinctive features of the terrorist attacks in Paris and Brussels in 2015 and 2016. The attacks have confirmed the weakness of European security system in the context of the protection of its citizens from the threat № 1 in the world. The high level of democracy and liberalism are not allowed to use power instruments effectively in the fight against terrorism, which was the result of the fact that the terrorists were able to freely access to the place of their acts and to implement them. It was determined that the common features are the following: in Paris and in Brussels, the attacks were carried out by terrorist militaristic group «The Islamic State of Iraq and the Levant» (ISIL; the places of commission of terrorist acts; guns of terrorists; military units of France and Belgium are parties of the armed conflict in Syria on the side of the Syrian opposition and struggle against ISIL; there were a few terrorist attacks. It is proved that the differences are as follows: in Paris, in addition to explosives, packed with nails, also were used automatic weapons and grenades, but only explosives in Brussels; France is more active in the fight against terrorism in the international arena and in every way opposed to violence against humanity, so there is a terrorist attack can be seen as a blow to the democratic and humanitarian values; Belgium is a «political heart» of the European Union that’s why the terrorist attack on it can be seen as a blow to the political system of the EU; in Paris, the attack was supposed to apply except for the population and for high officials in the name of F. Hollande and F. Steinmeier, and in Brussels – only civilians.conducting effective public diplomacy by means of virtual diplomacy. In the context of the establishment of the global information society the key target groups must be: Diasporas, foreign media (including bloggers, investors, influential foreign

  2. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  3. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  4. JENIS INDUSTRI, KEPEMILIKAN SAHAM ASING DAN REAKSI PASAR MODAL AKIBAT SERANGAN BOM TERORIS

    Directory of Open Access Journals (Sweden)

    Cynthia Afriani Utama

    2012-12-01

    Full Text Available The purpose of this study is to investigate whether the Indonesian stock market reacts to terrorist bomb attack, and whether the Indonesian stock market reaction to terrorist bomb attack is affected by industry type and foreign ownership. Using data of terrorist bomb attack from 2000 until 2006, event study test shows that generally Indonesia capital market reacts negatively to terrorist bomb attack. Further, the multiple regression analysis shows that the stock market reaction is more negative for tourism industry than other industries while foreign ownership does not influence the stock market reaction. Thus, this study corroborates previous studies showing that terrorist attack is deemed as bad news in capital market and consequently will negatively affect the investment decision (Chen dan Siem 2004.

  5. Effects of the 2002 sniper attacks on the homeless population in Washington, DC.

    Science.gov (United States)

    Fullerton, Carol S; Gifford, Robert K; Flynn, Brian W; Peterson, Karen M; Ahearn, Frederick L; Donaldson, Linda Plitt; Ursano, Robert J

    2009-10-01

    Despite the prevalence of homelessness, this population has rarely been included in disaster and terrorism planning. To better understand the mental health needs of the homeless during a terrorist event and to highlight the need to address methodological limitations in research in this area, we examined responses to the October 2002 Washington, DC, sniper attacks. We interviewed 151 homeless individuals 1 year after the Washington, DC, sniper attacks. The majority (92.7%) was aware of the sniper events; 84.1% stayed informed through the media and 72.7% had someone to turn to for emotional support. Almost half (44%) reported identification with victims and 41% increased substance use during the attacks. More than half (61.7%) felt extremely frightened or terrified and 57.6% reported high perceived threat. Females, nonwhites, and participants with less than a high school education experienced greater threat. Women, nonwhites, and younger (homeless population may be difficult to reach or reluctant to comply with public health programs. Addressing barriers to health care in vulnerable groups is critical to effective public health disaster response.

  6. Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system

    Science.gov (United States)

    Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Youn, Chun Ju

    2018-01-01

    Even though unconditional security of B92 quantum key distribution (QKD) system is based on the assumption of perfect positive-operator-valued measures, practical B92 systems only utilize two projective measurements. Unfortunately, such implementation may degrade the security of the B92 QKD system due to Eve's potential attack exploiting the imperfection of system. In this paper, we propose an advanced attack strategy with an unambiguous state discrimination (USD) measurement which makes practical B92 QKD systems insecure even under a lossless channel. In addition, we propose an effective countermeasure against the advanced USD attack model by monitoring double-click events. We further address a fundamental approach to make the B92 QKD system tolerable to attack strategies with USD measurements using a multi-qubit scheme.

  7. Agravamento das Ações Terroristas: as Implicações Políticas, Econômicas e Sociais - 10.5102/uri.v4i2.22

    Directory of Open Access Journals (Sweden)

    Leila Bijos

    2007-10-01

    Full Text Available New strategies for social development imply on the regulation of policies, in which human security is a key element, after the terrorist attacks of September 11, 2001.\tThe impact of the terrorist attacks clearly shows the necessity of new procedures for the world security, once there are no barriers to the transit of persons and products. The international coalitions should be implemented to generate pro-active actions and agreements among the National States to avoid the aggression between one State to the other, and the creation of terrorist groups, “mafias”, which promote criminality, drug and weapon traffic, prostitution, money laundry and extortion. These underground imperialist powers need to be eliminated through international jurisdiction norms and the establishment of democratic regimes targeted to the stabilization of a new political and economic world order.

  8. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...

  9. Adult Public Education for Nuclear Terrorism: An Analysis of Cold War and War on Terror Preparedness Discourses

    Science.gov (United States)

    Fisher, Debra A.

    2014-01-01

    The nuclear terrorist threat is far greater today than ever before, but the United States is unprepared to respond to the aftermath of a nuclear attack, whether perpetrated by rogue nuclear countries or the terrorist groups they support. Following the detonation of an improvised nuclear device (IND), citizens, not government personnel, become the…

  10. Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks

    Science.gov (United States)

    Prichard, Janet J.; MacDonald, Laurie E.

    2004-01-01

    On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…

  11. Radiology response in the emergency department during a mass casualty incident: a retrospective study of the two terrorist attacks on 22 July 2011 in Norway.

    Science.gov (United States)

    Young, Victoria Solveig; Eggesbø, Heidi B; Gaarder, Christine; Næss, Pål Aksel; Enden, Tone

    2017-07-01

    To describe the use of radiology in the emergency department (ED) in a trauma centre during a mass casualty incident, using a minimum acceptable care (MAC) strategy in which CT was restricted to potentially severe head injuries. We retrospectively studied the initial use of imaging on patients triaged to the trauma centre following the twin terrorist attacks in Norway on 22 July 2011. Nine patients from the explosion and 15 from the shooting were included. Fourteen patients had an Injury Severity Score >15. During the first 15 h, 22/24 patients underwent imaging in the ED. All 15 gunshot patients had plain films taken in the ED, compared to three from the explosion. A CT was performed in 18/24 patients; ten of these were completed in the ED and included five non-head CTs, the latter representing deviations from the MAC strategy. No CT referrals were delayed or declined. Mobilisation of radiology personnel resulted in a tripling of the staff. Plain film and CT capacity was never exceeded despite deviations from the MAC strategy. An updated disaster management plan will require the radiologist to cancel non-head CTs performed in the ED until no additional MCI patients are expected. • Minimum acceptable care (MAC) should replace normal routines in mass casualty incidents. • MAC implied reduced use of imaging in the emergency department (ED). • CT in ED was restricted to suspected severe head injuries during MAC. • The radiologist should cancel all non-head CTs in the ED during MAC.

  12. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2005-01-01

    The September 11, 2001 terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  13. U.S.-EU Cooperation Against Terrorism

    National Research Council Canada - National Science Library

    Archick, Kristin

    2006-01-01

    The September 11, 2001, terrorist attacks gave new momentum to European Union (EU) initiatives to improve law enforcement cooperation against terrorism both among its 25 member states and with the United States...

  14. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  15. Congress Investigates: Pearl Harbor and 9/11 Congressional Hearing Exhibits

    Science.gov (United States)

    Blackerby, Christine

    2011-01-01

    On the morning of December 7, 1941, Japanese bombers staged a surprise attack on U.S. military forces at Pearl Harbor in Hawaii. Sixty years after the attack on Pearl Harbor, the United States was attacked again. On the morning of September 11, 2001, four commercial airplanes hijacked by 19 terrorists killed nearly 3,000 people when they crashed…

  16. Vulnerabilities of the security of nuclear material due to cyber attacks

    International Nuclear Information System (INIS)

    Daschil, F.

    2002-01-01

    Full text: The spread of new communication and computer technologies is now the potential for a dedicated, sophisticated adversary to conduct coordinated strikes against the computers, communications systems, and databases of nuclear material security systems. All weapons of cyber war, like viruses, Trojans, access to computer systems are potential risks for the security of nuclear material. New forms of destruction of electronic devices, e.g. Transient Electromagnetic Devices (TED), that could, in the hands of enemies, criminals, or terrorist pose a significant threat to nuclear safety infrastructure components that are based on micro-circuits and computer or micro-processor control. These examples shows the necessity to clearly identify possible risks as: information and communication based disorders and other disruptions and attacks; partial or complete failure of systems causing the risk of unexpected reaction or unmanageable situations; cracking of access codes and elimination of alarm equipment could give easy access to nuclear material; computer manipulation or complete computer and system takeover due to brute force attacks, viruses, Trojans and worms could lead to malfunctions, disruptions and nuclear disasters; computer spying and brute force attacks could give detailed information about technical, organizational and organizational data; combined actions of physical, electronic and computer attacks. The paper gives an overview of potential computer and communication safety gaps and points out strategic implications as the identification of the critical infrastructure, surveillance of computer systems, data access and communication paths. The basic necessity of the development of computer and communication breakdown backup systems as well as measures of precaution against cyber attacks is shown in the paper. (author)

  17. Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time-Series and Intervention Analysis.

    Science.gov (United States)

    Li, Shuying; Zhuang, Jun; Shen, Shifei

    2017-07-01

    In recent years, various types of terrorist attacks occurred, causing worldwide catastrophes. According to the Global Terrorism Database (GTD), among all attack tactics, bombing attacks happened most frequently, followed by armed assaults. In this article, a model for analyzing and forecasting the conditional probability of bombing attacks (CPBAs) based on time-series methods is developed. In addition, intervention analysis is used to analyze the sudden increase in the time-series process. The results show that the CPBA increased dramatically at the end of 2011. During that time, the CPBA increased by 16.0% in a two-month period to reach the peak value, but still stays 9.0% greater than the predicted level after the temporary effect gradually decays. By contrast, no significant fluctuation can be found in the conditional probability process of armed assault. It can be inferred that some social unrest, such as America's troop withdrawal from Afghanistan and Iraq, could have led to the increase of the CPBA in Afghanistan, Iraq, and Pakistan. The integrated time-series and intervention model is used to forecast the monthly CPBA in 2014 and through 2064. The average relative error compared with the real data in 2014 is 3.5%. The model is also applied to the total number of attacks recorded by the GTD between 2004 and 2014. © 2016 Society for Risk Analysis.

  18. Convergence And Exploitation: Transnational Organized Crime, Terrorism And The Threat To America

    Science.gov (United States)

    2015-05-18

    and avenues of approach that could enable a terrorist attack on U.S. soil . Background Since the fall of the Soviet Union, global stability as...2014. Revolutionary Armed Forces of Colombia (FARC). Communist terrorist organization established to overthrow the government of... Colombia . 4 John Kelly, “Testimony,” Senate, Posture Statement of General John F. Kelly, United States

  19. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  20. Preventing Terrorist Bombings on United States Subway Systems

    Science.gov (United States)

    2006-09-01

    cleanup, and structural assessment.5 The economic impact of the attack would cost millions in repairs and lost revenue, and public trust would be...houses over a dozen restaurants and other businesses and serves as the “ basement level” for the major high-rise buildings in Philadelphia. An... Arabian Peninsula and Northern Africa, the “profiling appearance” is not a viable solution. As a result, prevention efforts must emphasize the

  1. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  2. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  3. Impacts of the Events on the 11. of September 2001 in the United States on Radiation Protection, the Nuclear Waste Management and the Nuclear Security in Germany

    International Nuclear Information System (INIS)

    Krumbach, H.; Steinmetz, H.J.; Odoj, R.

    2009-01-01

    This report describes the effects of the terrorist attacks of the 11 September 2001, when four airliners hijacked and crashed. These attacks take effects on radiation protection, nuclear disposal and nuclear safety in Germany. Some of the measures, which where taken after the September 11, 2001 in order to improve the safety of nuclear installations are presented in the following. The taken measures increasing security against terrorist attacks are also exemplarily described in this report. The examples include the introduction of new identity papers, which offer a higher security level as well as the prohibition of carrying liquids with more than 100 ml in the hand luggage. Also the human security measures taken by different companies since the attack happened are subject of the contribution. Due to the necessary confidentiality regarding the threat scenarios and the taken protective measures detailed descriptions of the measures in this report are limited. (authors)

  4. Screening for generalized anxiety disorder symptoms in the wake of terrorist attacks: a study in primary care.

    Science.gov (United States)

    Ghafoori, Bita; Neria, Yuval; Gameroff, Marc J; Olfson, Mark; Lantigua, Rafael; Shea, Steven; Weissman, Myrna M

    2009-06-01

    Little is known about the mental health impact of terrorism beyond posttraumatic stress disorder (PTSD) and depression. The associations between exposure to the September 11, 2001 (9/11) attacks in New York City and generalized anxiety disorder (GAD) symptoms were examined in a sample of 929 primary care patients. After controlling for PTSD, depression, panic and substance use disorders, and pre-9/11 trauma, patients who screened positive (vs. negative) for GAD symptoms were roughly twice as likely to report having a loved one at the 9/11 disaster site, twice as likely to know someone who was killed by the attacks, and twice as likely to know someone who was involved with the rescue/recovery efforts after the disaster. Implications for treatment and future research are discussed.

  5. 48 CFR 252.209-7001 - Disclosure of ownership or control by the government of a terrorist country.

    Science.gov (United States)

    2010-10-01

    ...) (a) Definitions. As used in this provision— (1) Government of a terrorist country includes the state... the government of which has repeatedly provided support for acts of international terrorism. As of the...

  6. A networks analysis of terrorism in Africa: implications for Kenya

    Directory of Open Access Journals (Sweden)

    Steven Kigen Morumbasi

    2016-12-01

    Full Text Available This paper highlights the challenges that the international community faces in responding to the terrorists and the need to change tactics to respond more effectively to an increasingly nebulous enemy. Terrorism can take different forms and is perpetrated by both state and non-state actors. This research looks into the network structure of terrorism and terrorist groups. In the contemporary setting, terrorist organizations operate transnationally hence the use of the term ‘terrorism without borders’. An enabling factor of terrorism today is the network structure that it has adopted which gives it the ability to both project its reach and prevent easy infiltration. The network structure has also brought about renewed interests in Africa, where global terror networks such as al-Qaeda and the Islamic State compete for influence. Boko Haram in West Africa is an affiliate of the Islamic State and this provides possible linkages with the Islamic State in Libya. Boko Haram refers to itself as the Islamic State’s Western Province. Al-Shabaab has dominated headlines by carrying out deadly attacks in East Africa. The al-Qaeda affiliate has however faced resistance from a section of its members who seek ties with the Islamic State. This resulted in the formation of Jabha East Africa, a group that aligns itself to the Islamic State. The Sinai Peninsula has also witnessed an upsurge of terror attacks perpetrated by the Sinai Province, which views itself as a province of the Islamic State. This surmounts to a complex network structure of terrorist networks in Africa and the growing threat to militant Islam. The special attention is paid to analysis of terrorist challenges in Kenia.

  7. Improving Information Exchange and Coordination Amongst Homeland Security Organizations

    National Research Council Canada - National Science Library

    Goan, Terrance; Mayk, Israel

    2005-01-01

    Command and Control for coordinated response to domestic terrorist attack will require the ability of Federal, state, and local agencies to maintain awareness of the status, capabilities, requirements...

  8. Improving Information Exchange and Coordination amongst Homeland Security Organizations (Briefing Charts)

    National Research Council Canada - National Science Library

    Goan, Terrance; Mayk, Israel

    2005-01-01

    Command and Control for coordinated response to domestic terrorist attack will require the ability of Federal, state, and local agencies to maintain awareness of the status, capabilities, requirements...

  9. Offensive Counterterrorism Targeted killing in eliminating terrorist target: the case of the USA and Israel

    Directory of Open Access Journals (Sweden)

    Hermínio Matos

    2012-01-01

    Full Text Available Due to the "global terrorism project", some States have adopted offensive counterterrorism measures which, though within national strategies on security and defense, contemplate the use of military power and the use of lethal force against non-state actors - individuals, groups or terrorist organizations - beyond their national borders. Reformulating the security paradigm has led, in these cases, to policies against terrorism. This is the case of targeted killing - the killing of selected targets - by the USA and Israel. Targeted killing actions - using essentially but not only drones - in Pakistan and Yemen by the American administration, a well as the Israeli response to Palestinian terrorism, are under heated debate in terms of their efficiency and legality. Thus, this paper aims to not only provide an analytical framework on this theme but also analyze the scope and impact of these counter terrorist strategies by the two countries.

  10. Associations between work environment and psychological distress after a workplace terror attack: the importance of role expectations, predictability and leader support.

    Science.gov (United States)

    Birkeland, Marianne Skogbrott; Nielsen, Morten Birkeland; Knardahl, Stein; Heir, Trond

    2015-01-01

    Experiencing terrorism is associated with high levels of psychological distress among survivors. The aim of the present study was to examine whether work environmental factors such as role clarity and predictability, role conflicts, and leader support may protect against elevated levels of psychological distress after a workplace terrorist attack. Data from approximately 1800 ministerial employees were collected ten months after the 2011 Oslo bombing attack which targeted the Norwegian ministries. The results show that after a traumatic event, lower role conflicts, higher role clarity, higher predictability, and higher leader support were independently associated with lower psychological distress. These findings suggest that the workplace environment may be a facilitator of employees' mental health after stressful events.

  11. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  12. Deterring and Dissuading Nuclear Terrorism

    Directory of Open Access Journals (Sweden)

    John J. Klein

    2012-01-01

    Full Text Available While nuclear deterrence theory may be well-suited to dealing with nuclear-armed states, its suitability for deterring nuclear terrorism has frequently been questioned since 9/11. While terrorist organizations do not necessarily act uniformly or according to the same underlying beliefs, many of the most aggressive organizations are motivated by an ideology that embraces martyrdom and an apocalyptic vision.1 This ideology may be based on religion or a desire to overthrow a government. Consequently, terrorists motivated by ideology who intend to use a stolen or improvised nuclear device against the United States or its interests may not care about the resulting military repercussions following a nuclear attack. In such a scenario, some strategists think a terrorist organization's leadership may prove "undeterrable" by traditional military means. Nevertheless, deterrence is still a critical element in U.S. national strategy to prevent a nuclear attack. Furthermore, deterrence combined with dissuasion works to reduce the likelihood of nuclear terrorism being used against the United States, while also mitigating the consequences should such an act actually occur.

  13. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  14. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-05-15

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  15. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  16. Pakistan's Domestic Political Developments

    National Research Council Canada - National Science Library

    Kronstadt, K. A

    2005-01-01

    .... The September 2001 terrorist attacks on the United States and Musharraf's ensuing withdrawal of support for the Afghan Taliban regime, however, had the effect of greatly reducing Pakistan's international isolation...

  17. Cyber Security: A Crisis of Prioritization

    National Research Council Canada - National Science Library

    Benioff, Marc R; Lazowska, Edward D

    2005-01-01

    The information technology (IT) infrastructure of the United States, which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to terrorist and criminal attacks...

  18. Colombian Army Transformation and the Inflection Point of the Terrorist Groups

    Science.gov (United States)

    2011-03-30

    Prince (Cambridge: Cambridge University Press, 1988), 24. 2 James D Henderson, La Modernizacion en Colombia: Los años de Laureano Gomez, 1889-1965...prime factor that permits the terrorist´s isolation from the social base, as well as the legitimate use of force by the State. In summary, the FARC...his dismissal, for alleged meddling in political affairs. 23 3 Francisco Leal Buitrago, La Inseguridad de la Seguridad. Colombia 1958-2005

  19. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  20. Pakistan’s Inter-Services Intelligence Directorate: A State within a State?

    Science.gov (United States)

    2008-01-01

    Robinson, Bin Laden: Behind the Mask of the Terrorist (New York: Arcade Publishing, 2001), 95. 26 Abbas, 114. 27 Mary Ann Weaver, Pakistan: In the...The Truth Behind the Most Devastating Terror- ist Attack the World Has Ever Seen (New York: Arcade Publishing, 2003), 50. 77 Teresita C. Schaffer...2004), 37. 78 Robert Fisk, The Great War for Civilisation : The Conquest of the Middle East (New York: Knopf, 2005), 862. 79 Peter R. Lavoy

  1. Afghanistan, the Taliban, and Osama bin Laden: The Background to September 11

    Science.gov (United States)

    Social Education, 2011

    2011-01-01

    On May 1, 2011, a group of U.S. soldiers boarded helicopters at a base in Afghanistan, hoping to find a man named Osama bin Laden. Bin Laden, the leader of the al Qaeda terrorist network, was responsible for a number of terrorist attacks around the world, including those of September 11, 2001, that killed nearly 3,000 people in the United States.…

  2. Unshackling the Sphinx: Intelligence in the Post-9/11 World

    National Research Council Canada - National Science Library

    McNeill, Joseph M

    2005-01-01

    The terrorist attacks on 11 September 2001 in New York, Virginia and Pennsylvania caused an intense self-examination by the United States Federal Government in which it made tough decisions concerning...

  3. NATO'S Response to the 11 September 2001 Terrorism: Lessons Learned

    National Research Council Canada - National Science Library

    Kouzmanov, Krassi

    2003-01-01

    This thesis analyzes NATO's decisions and actions in response to the 11 September 2001 terrorist attacks against the United States and assesses the probable future role of the Alliance in combating...

  4. On the use of capillary electrophoresis for the determination of inorganic anions and cations, and carbohydrates in residues collected after a simulated suicide bombing attack.

    Science.gov (United States)

    Sarazin, Cédric; Delaunay, Nathalie; Costanza, Christine; Eudes, Véronique; Gareil, Pierre

    2013-01-15

    In order to train scientist field investigators after terrorist attacks, the laboratory of the Prefecture de Police of Paris simulated a suicide bombing attack in a bus. After collection of the residues, analyses were carried out to determine the composition of the original explosive charge. This article focuses on the combined use, for the first time, of three new capillary electrophoresis methods for the determination of inorganic anions and cations, and carbohydrates in two representative extracts. Capillary electrophoresis appears as an effective tool to identify and quantify the compounds in real extracts and is fully complementary to chromatographic methods. Copyright © 2012 Elsevier B.V. All rights reserved.

  5. September 11th, the Internet, and the Affects on Information Provision in Libraries.

    Science.gov (United States)

    Hamilton, Stuart

    The September 11th terrorist attacks on the United States have contributed greatly to a change in the information environment around the world. The weeks following the attacks saw governments around the world rush to pass legislation designed to prevent future acts of terrorism. Much of this legislation targeted information flow, especially on the…

  6. Meaning reconstruction in the face of terror: An examination of recovery and posttraumatic growth among victims of the 9/11 World Trade Center attacks.

    Science.gov (United States)

    Richardson, Katherine M

    2015-01-01

    This study examines the relationship between meaning reconstruction with posttraumatic growth and depreciation in the aftermath of terrorist trauma and loss. A group of individuals (n=118) who were personally affected by the September 11, 2001 terrorist attacks were surveyed about their experiences and administered the Posttraumatic Growth Inventory and Impact of Event scales. Subjects were volunteer docents at the Tribute World Trade Center Visitor Center. Results revealed that ability to make sense of one's 9/11 experience was related to recovery but not to posttraumatic growth, whereas ability to find some benefit in the experience was related to growth. In addition, location in downtown Manhattan on September 11, 2001 was related to higher levels of posttraumatic depreciation. Findings suggest that two aspects of meaning reconstruction are differentially related to recovery and posttraumatic growth.

  7. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  8. The Kefaya Movement: A Case Study of a Grassroots Reform Initiative

    National Research Council Canada - National Science Library

    Oweidat, Nadia; Benard, Cheryl; Stahl, Dale; Kildani, Walid; O'Connell, Edward; Grant, Audra K

    2008-01-01

    The United States has professed an interest in greater democratization in the Arab world, particularly since the September 2001 attacks by terrorists from Saudi Arabia, the United Arab Emirates, Egypt, and Lebanon...

  9. The Intelligence Community and 9/11: Congressional Hearings and the Status of the Investigation

    National Research Council Canada - National Science Library

    Best, Jr, Richard A

    2003-01-01

    The terrorist attacks of September 11, 2001 led many to inquire whether there had been a failure by United States intelligence agencies to collect all available information about the plots that led...

  10. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Directory of Open Access Journals (Sweden)

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  11. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  12. The Vulnerability of the United States Railroad System to Terrorist Attacks

    Science.gov (United States)

    2015-06-12

    can also assist during special political and sporting events, and provide humanitarian assistance after major weather events...essential to economic growth―not just for travel and tourism , but also for the mobility of the labor force.253 Many of Russia’s natural resources

  13. The dilemma of the failed state thesis in post-9/11 world affairs

    Directory of Open Access Journals (Sweden)

    A. Schoeman

    2008-07-01

    Full Text Available The 9/11 terrorist attacks shifted the emphasis of failed states as just a regional humanitarian problem to one that could present a global security threat. In this regard US policymakers, especially, identified failed states as possible terrorist threats. However, this renewed attention to the study of state failure has exposed a number of theoretical weaknesses in this body of literature. The latter could mainly be ascribed to the way in which US policy makers have often used generalised definitions of failed states and then applied it to states that are perceived as threats. Another problem is the fact that government sponsored research institutes and think tanks are operating independently from university academics. This situation has caused theoretical confusion as conditions in failed states are often interpreted differently resulting in the development of a number of opposing theories, definitions and confusing classification models. The body of literature is further accused of endorsing a “Weberian” definition (ideal type of the state against which degrees of “failure” in non-complying states are measured. This article will investigate the extent of these theoretical weaknesses and expose the dangers of following an approach that seem to misinterpret the political realities of developing states (often regarded as failed – this despite having an extensive popular following. It will further focus on possible alternative approaches – or the formulation of ideas that are better suited and relevant to the often unique internal political, social and economic dynamics of unstable states.

  14. Naming patterns reveal cultural values: patronyms, matronyms, and the U.S. culture of honor.

    Science.gov (United States)

    Brown, Ryan P; Carvallo, Mauricio; Imura, Mikiko

    2014-02-01

    Four studies examined the hypothesis that honor norms would be associated with a pronounced use of patronyms, but not matronyms, for naming children. Study 1 shows that men who endorse honor values expressed a stronger desire to use patronyms (but not matronyms) for future children, an association that was mediated by patriarchal attitudes. Study 2 presents an indirect method for assessing state patronym and matronym levels. As expected, patronym scores were significantly higher in honor states and were associated with a wide range of variables linked previously to honor-related dynamics. Study 3a shows that following the terrorist attacks of 9/11, patronyms increased in honor states, but not in non-honor states. Likewise, priming men with a fictitious terrorist attack (Study 3b) increased the association between honor ideology and patronym preferences. Together, these studies reveal a subtle social signal that reflects the masculine values of an honor culture.

  15. U.S., Russia and the Global War on Terror: "Shoulder to Shoulder" into Battle?

    National Research Council Canada - National Science Library

    Beene, Eric A; Kubiak, Jeffrey J; Colton, Kyle J

    2005-01-01

    .... Following the terrorist attacks in the United States on 11 September 2001, many assumed the resultant War on Terrorism would finally unite the two nations against a common enemy, aligning interests as never...

  16. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  17. Investigating the Aftermath of Terror: Fundamental Outcomes, Methodological Choices, and Future Directions.

    Science.gov (United States)

    Gradus, Jaimie L; Marx, Brian P; Sloan, Denise M

    2016-06-01

    Acts of terrorism are becoming increasingly common throughout the world. These events represent a significant public health concern given the associated health consequences. Although it is clear that terrorist attacks have mental and physical health sequelae, the exact nature and prevalence of these consequences are unclear. Epidemiological research can play an important role in better understanding the mental and physical impact of terrorist attacks. In this editorial, we highlight recent epidemiological research on these terrorism-related health outcomes. We also provide suggestions for how future studies can build on the existing literature and describe ways in which epidemiological methods can be harnessed to extend the current literature. Lastly, we offer recommendations on how to best prepare communities for the aftermath of terrorist attacks, highlighting secondary intervention and prevention strategies. Overall, multilevel strategies are needed to adequately cope with the growing rise of terrorist acts, and these strategies will have to be reassessed as the nature of terrorist attacks changes.

  18. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  19. How the science of complex networks can help developing strategies against terrorism

    International Nuclear Information System (INIS)

    Latora, Vito; Marchiori, Massimo

    2004-01-01

    A new method, based on a recently defined centrality measure, allows to spot the critical components of a generic complex network. The identification and protection of the critical components of a given communication-transportation network should be the first concern in order to reduce the consequences of terrorist attacks. On the other hand, the critical components of a terrorist organization are the terrorists to target to disrupt the organization and reduce the possibility of terroristic attacks

  20. Maritime Protection of Critical Infrastructure Assets in the Campeche Sound

    National Research Council Canada - National Science Library

    Tiburcio, Felix M

    2005-01-01

    Following the 9/11 terrorist events in the United States the Mexican Navy developed strategies designed to prevent similar attacks on the strategic facilities located in the Campeche Sound in the Gulf of Mexico...

  1. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  2. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  3. Striking at their Core: De-funding the Islamic State of Iraq and Syria

    Directory of Open Access Journals (Sweden)

    Alessio Shostak

    2017-02-01

    Full Text Available The fundraising efforts of the Islamic State of Iraq and Syria (ISIS have impressed academics, journalists, and government officials alike. The literature has thus far explored the methods via which ISIS acquire funds and transfer their proceeds across international borders. This article aims to expand upon these entries by analysing the failures of EU and US policy to counter terrorist financing since the 9/11 attacks, particularly with regards to the inability of both entities to adjust to digital transfer methods. The value of military operations will also be discussed within the context of halting the Islamic State’s fundraising capabilities.

  4. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  5. Could the United States Afford to Lose a Major Port?

    Science.gov (United States)

    2013-12-13

    58 vi ACRONYMS AMS Area Maritime Security BLEVE Boiling-Liquid Expanding-Vapor-Explosion CBP...explosives (a USS Cole style attack), rocket-propelled grenades, fire rockets and limpet mines that would convert an LNG tanker into a floating giant...liquid expanding-vapor-explosion ( BLEVE ) to flash the terrorist would need to bypass all the mechanical fail

  6. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  7. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  8. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  9. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  10. Value of senior level exercises in radiation protection

    International Nuclear Information System (INIS)

    Dickson, Howard; Landry, Steven

    2008-01-01

    The United States Department of Homeland Security (DHS) maintains the National Exercise Program (NEP) as one of the mechanisms to evaluate the preparation of the U.S. government (USG) to execute the full range of capabilities and responsibilities. The NEP is a national, interagency-wide program that prioritizes, focuses, and coordinates national security and homeland security preparedness-related exercise activities. Results from these exercises provide information that informs the policy process and ultimately improves the government's preparedness posture. Exercises are the primary tool available for evaluating the capability to perform in a crisis or emergency. The principal focus of the NEP is a program of capabilities-based exercises designed for the participation of heads of Federal Departments and Agencies and other top officials to examine and evaluate emerging national-level policy issues. TOPOFF (referring to 'Top Officials') is a national, biennial domestic counter terrorism exercise series consisting of a two-year planning endeavor, involving experts at all levels of government and the private sector. The TOPOFF 4 Full Scale Exercise (FSE), focused on radiological dispersal devices (RDD), was conducted in October 2007. The TOPOFF series of exercises are an important component of national preparedness, helping to build an integrated federal, state, territorial, local, and private sector capability to prevent terrorist attacks, and rapidly and effectively respond to, and recover from, any terrorist attack or major disaster that does occur. The full-scale exercises offer agencies and jurisdictions a way to test their plans and skills in a real-time, realistic environment and to gain the in-depth knowledge that only experience can provide. Participants also exercise prevention and intelligence gathering functions, which are critical to preventing terrorist attacks. Lessons learned from these exercises provide valuable insights to guide future planning for

  11. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  12. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  13. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  14. Cyber attacks, countermeasures, and protection schemes — A state of the art survey

    OpenAIRE

    Shabut, Antesar M.; Lwin, K.T.; Hossain, M.A.

    2017-01-01

    Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than befo...

  15. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  16. Transportation security : post-September 11th initiatives and long-term challenges : statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-04-01

    This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...

  17. Emergent information technologies and enabling policies for counter-terrorism

    CERN Document Server

    Popp, R

    2006-01-01

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberti...

  18. The effects of emotional states and traits on risky decision-making.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Smith, Bruce W., 1959- (,University of New Mexico, Albuquerque, NM-)

    2006-12-01

    Understanding the role of emotional states is critical for predicting the kind of decisions people will make in risky situations. Currently, there is little understanding as to how emotion influences decision-making in situations such as terrorist attacks, natural disasters, pandemics, and combat. To help address this, we used behavioral and neuroimaging methods to examine how emotion states and traits influence decisions. Specifically, this study used a wheel of fortune behavioral task and functional magnetic resonance imaging (fMRI) to examine the effects of emotional states and traits on decision-making pertaining to the degree of risk people are willing to make in specific situations. The behavioral results are reported here. The neural data requires additional time to analyze and will be reported at a future date. Biases caused by emotion states and traits were found regarding the likelihood of making risky decisions. The behavioral results will help provide a solid empirical foundation for modeling the effects of emotion on decision in risky situations.

  19. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    Science.gov (United States)

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  20. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  1. Workplace response of companies exposed to the 9/11 World Trade Center attack: a focus-group study

    Science.gov (United States)

    North, Carol S.; Pfefferbaum, Betty; Hong, Barry A.; Gordon, Mollie R.; Kim, You-Seung; Lind, Lisa; Pollio, David E.

    2014-01-01

    The terrorist attacks of 11 September 2001 (9/11) left workplaces in pressing need of a mental health response capability. Unaddressed emotional sequelae may be devastating to the productivity and economic stability of a company’s workforce. In the second year after the attacks, 85 employees of five highly affected agencies participated in 12 focus groups to discuss workplace mental health issues. Managers felt ill prepared to manage the magnitude and the intensity of employees’ emotional responses. Rapid return to work, provision of workplace mental health services, and peer support were viewed as contributory to emotional recovery. Formal mental health services provided were perceived as insufficient. Drawing on their post-9/11 workplace experience, members of these groups identified practical measures that they found helpful in promoting healing outside of professional mental health services. These measures, consistent with many principles of psychological first aid, may be applied by workplace leaders who are not mental health professionals. PMID:23066661

  2. Unity of Command: An Answer to the Maritime Homeland Security Interagency Quagmire

    National Research Council Canada - National Science Library

    Hanson, Darren J

    2008-01-01

    .... However, effective operational command and control (C2) to ensure unity of effort of the myriad federal and state agencies involved in MHS still does not exist to prevent or recover from a terrorist attack or natural disaster...

  3. Strengthening Foreign Policy Through Public Diplomacy

    National Research Council Canada - National Science Library

    Young, Claud

    2004-01-01

    In the aftermath of the Cold War and the terrorist attacks of September 11 2001 the United States of America is engaged in a major effort to inform and influence understanding of its foreign policy around the world...

  4. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  5. CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2016-06-01

    Full Text Available The author briefly tries to bring to the attention of those interested the complex issue developed globally on cyber risks, threats and vulnerabilities reaching to the "cyber warfare" with direct involvement of some state actors. Some means and vectors of attack are presented, as well as countermeasures to protect the individual users, companies, governmental and military structures. In the end, the article presents the situation in Romania with respect to some measures already taken and others that will be probably taken in the future, particularly in the legislative and administrative sector regarding cyber protection.

  6. Acrolein and asthma attack prevalence in a representative sample of the United States adult population 2000-2009.

    Science.gov (United States)

    deCastro, B Rey

    2014-01-01

    Acrolein is an air toxic and highly potent respiratory irritant. There is little epidemiology available, but US EPA estimates that outdoor acrolein is responsible for about 75 percent of non-cancer respiratory health effects attributable to air toxics in the United States, based on the Agency's 2005 NATA (National-Scale Air Toxics Assessment) and acrolein's comparatively potent inhalation reference concentration of 0.02 µg/m3. Assess the association between estimated outdoor acrolein exposure and asthma attack reported by a representative cross-sectional sample of the adult United States population. NATA 2005 chronic outdoor acrolein exposure estimates at the census tract were linked with residences oif adults (≥18 years old) in the NHIS (National Health Interview Survey) 2000-2009 (n = 271,348 subjects). A sample-weighted logistic regression model characterized the association between the prevalence of reporting at least one asthma attack in the 12 months prior to survey interview and quintiles of exposure to outdoor acrolein, controlling for potential confounders. In the highest quintile of outdoor acrolein exposure (0.05-0.46 µg/m3), there was a marginally significant increase in the asthma attack pOR (prevalence-odds ratio [95% CI]  = 1.08 [0.98∶1.19]) relative to the lowest quintile. The highest quintile was also associated with a marginally significant increase in prevalence-odds (1.13 [0.98∶1.29]) in a model limited to never smokers (n = 153,820). Chronic exposure to outdoor acrolein of 0.05-0.46 µg/m3 appears to increase the prevalence-odds of having at least one asthma attack in the previous year by 8 percent in a representative cross-sectional sample of the adult United States population.

  7. Acrolein and asthma attack prevalence in a representative sample of the United States adult population 2000-2009.

    Directory of Open Access Journals (Sweden)

    B Rey deCastro

    Full Text Available BACKGROUND: Acrolein is an air toxic and highly potent respiratory irritant. There is little epidemiology available, but US EPA estimates that outdoor acrolein is responsible for about 75 percent of non-cancer respiratory health effects attributable to air toxics in the United States, based on the Agency's 2005 NATA (National-Scale Air Toxics Assessment and acrolein's comparatively potent inhalation reference concentration of 0.02 µg/m3. OBJECTIVES: Assess the association between estimated outdoor acrolein exposure and asthma attack reported by a representative cross-sectional sample of the adult United States population. METHODS: NATA 2005 chronic outdoor acrolein exposure estimates at the census tract were linked with residences oif adults (≥18 years old in the NHIS (National Health Interview Survey 2000-2009 (n = 271,348 subjects. A sample-weighted logistic regression model characterized the association between the prevalence of reporting at least one asthma attack in the 12 months prior to survey interview and quintiles of exposure to outdoor acrolein, controlling for potential confounders. RESULTS: In the highest quintile of outdoor acrolein exposure (0.05-0.46 µg/m3, there was a marginally significant increase in the asthma attack pOR (prevalence-odds ratio [95% CI]  = 1.08 [0.98∶1.19] relative to the lowest quintile. The highest quintile was also associated with a marginally significant increase in prevalence-odds (1.13 [0.98∶1.29] in a model limited to never smokers (n = 153,820. CONCLUSIONS: Chronic exposure to outdoor acrolein of 0.05-0.46 µg/m3 appears to increase the prevalence-odds of having at least one asthma attack in the previous year by 8 percent in a representative cross-sectional sample of the adult United States population.

  8. Restoration projects for decontamination of facilities from chemical, biological and radiological contamination after terrorist actions

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Lumley, T.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Division, Environmental Technology Centre, Science and Technology Branch; Payette, P.; Laframboise, D.; Best, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Krishnan, J.; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Winnipeg, MB (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada); Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada)

    2006-07-01

    This paper reviewed studies that identified better decontamination methods for chemical, biological and radiological/nuclear (CBRN) attacks. In particular, it reviewed aspects of 3 projects in which procedures were tested and validated for site restoration. Cleanup targets or standards for decontaminating buildings and materials after a CBRN attack were also developed. The projects were based on physicochemical and toxicological knowledge of potential terrorist agents and selected surface matrices. The projects also involved modeling and assessing environmental and health risks. The first multi-agent project involved gathering information on known procedures for restoration of areas including interiors and exteriors of buildings, contents, parking lots, lawn, and vehicles. Air inside the building was included. The efficacy of some of the proposed concepts was tested. Results included the determination of appropriate surrogates for anthrax and tests of liquid and gaseous biocides on the surrogates. The development of new contamination procedures using peroxyacetic acid were also discussed. The second project involved decontamination tests on CBRN using specially-constructed buildings at the Counter-terrorism Technology Centre at Defence Research and Development Canada in Suffield. The buildings will be contaminated with chemical and biological agents and with short-lived radionuclides. They will be decontaminated using the best-performing technologies known. Information collected will include fate of the contaminant and decontamination products, effectiveness of the restoration methods, cost and duration of cleanup and logistical problems. The third project is aimed at developing cleanup standards for decontaminating buildings and construction materials after a chemical or biological attack. It will create as many as 12 algorithms for the development of 50 standards which will help cleanup personnel and first-responders to gauge whether proposed methods can achieve

  9. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  11. U.S. international trade and freight transportation trends

    Science.gov (United States)

    2003-01-01

    As the world's largest trading nation, the United States imports and exports more merchandise than any other country. The September 11, 2001, terrorist attacks exacerbated an economic slowdown already in progress, resulting in a marked decline in U.S...

  12. Potential use of advanced process control for safety purposes during attack of a process plant

    International Nuclear Information System (INIS)

    Whiteley, James R.

    2006-01-01

    Many refineries and commodity chemical plants employ advanced process control (APC) systems to improve throughputs and yields. These APC systems utilize empirical process models for control purposes and enable operation closer to constraints than can be achieved with traditional PID regulatory feedback control. Substantial economic benefits are typically realized from the addition of APC systems. This paper considers leveraging the control capabilities of existing APC systems to minimize the potential impact of a terrorist attack on a process plant (e.g., petroleum refinery). Two potential uses of APC are described. The first is a conventional application of APC and involves automatically moving the process to a reduced operating rate when an attack first begins. The second is a non-conventional application and involves reconfiguring the APC system to optimize safety rather than economics. The underlying intent in both cases is to reduce the demands on the operator to allow focus on situation assessment and optimal response planning. An overview of APC is provided along with a brief description of the modifications required for the proposed new applications of the technology

  13. Challenges for effective counter-terrorism communication

    DEFF Research Database (Denmark)

    Lindekilde, Lasse; Parker, David; Pearce, Julia

    2017-01-01

    Growing concerns about small-scale, low sophistication terrorist attacks, and the difficulties they present for security services, make public coproduction of security increasingly necessary. Communication to ensure that the public(s) is aware of the role they can play will be central to this....... This article, based on interviews with 30 expert practitioners, explores challenges associated with communication designed to prevent radicalisation, interdict attack planning and mitigate the impacts of a terrorist attack in the UK and Denmark. The interplay between these challenges and the contemporary...... terrorist context are analysed, highlighting that new, or adapted, communications and approaches may be necessary....

  14. 78 FR 58149 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten To Commit, or...

    Science.gov (United States)

    2013-09-20

    ... extraordinary threat to the national security, foreign policy, and economy of the United States constituted by... terrorist attacks on September 11, 2001, in New York and Pennsylvania and against the Pentagon, and the... extraordinary threat to the national security, foreign policy, and economy of the United States. For this reason...

  15. How Terrorism Affects Attitudes toward Democracy: Tunisia in 2015.

    Science.gov (United States)

    Andersen, Robert; Brym, Robert

    2017-11-01

    Tunisia is the only country that emerged from the Arab Spring as a democracy. However, Tunisian democracy is threatened by political divisions, economic problems, and the threat of terrorist attacks. We shed light on Tunisia's democratic prospects by examining (1) the degree to which major terrorist attacks in 2015 influenced Tunisian public opinion on democracy and (2) the extent to which preference for a democratic system affected opinions on the prospects for democracy in Tunisia. We use data from three waves of a nationwide survey conducted just before and just after Tunisia's first major terrorist attack, and just after the country's second major terrorist attack. We demonstrate that after the attacks the Tunisian public became less favourable toward democracy and less optimistic that Tunisia would soon be ready for it. Such scepticism was widespread, affecting people who preferred democracy as much as those who did not. We conclude that the prospects for Tunisian democracy are more precarious than is sometimes assumed. © 2017 Canadian Sociological Association/La Société canadienne de sociologie.

  16. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  17. The Tipping Point: Biological Terrorism

    Directory of Open Access Journals (Sweden)

    Scott Cary

    2009-01-01

    Full Text Available This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might happen or how it might be conducted? This article explores what is known and cannot be known about these questions, and will examine the threat of biological terrorism in the context of the strategic goals, operational methods, and tactical intentions of Islamist terrorists.

  18. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  19. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.

  20. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  1. Attack Detection/Isolation via a Secure Multisensor Fusion Framework for Cyberphysical Systems

    Directory of Open Access Journals (Sweden)

    Arash Mohammadi

    2018-01-01

    Full Text Available Motivated by rapid growth of cyberphysical systems (CPSs and the necessity to provide secure state estimates against potential data injection attacks in their application domains, the paper proposes a secure and innovative attack detection and isolation fusion framework. The proposed multisensor fusion framework provides secure state estimates by using ideas from interactive multiple models (IMM combined with a novel fuzzy-based attack detection/isolation mechanism. The IMM filter is used to adjust the system’s uncertainty adaptively via model probabilities by using a hybrid state model consisting of two behaviour modes, one corresponding to the ideal scenario and one associated with the attack behaviour mode. The state chi-square test is then incorporated through the proposed fuzzy-based fusion framework to detect and isolate potential data injection attacks. In other words, the validation probability of each sensor is calculated based on the value of the chi-square test. Finally, by incorporation of the validation probability of each sensor, the weights of its associated subsystem are computed. To be concrete, an integrated navigation system is simulated with three types of attacks ranging from a constant bias attack to a non-Gaussian stochastic attack to evaluate the proposed attack detection and isolation fusion framework.

  2. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  3. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  4. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  5. Acrolein and Asthma Attack Prevalence in a Representative Sample of the United States Adult Population 2000 – 2009

    Science.gov (United States)

    deCastro, B. Rey

    2014-01-01

    Background Acrolein is an air toxic and highly potent respiratory irritant. There is little epidemiology available, but US EPA estimates that outdoor acrolein is responsible for about 75 percent of non-cancer respiratory health effects attributable to air toxics in the United States, based on the Agency's 2005 NATA (National-Scale Air Toxics Assessment) and acrolein's comparatively potent inhalation reference concentration of 0.02 µg/m3. Objectives Assess the association between estimated outdoor acrolein exposure and asthma attack reported by a representative cross-sectional sample of the adult United States population. Methods NATA 2005 chronic outdoor acrolein exposure estimates at the census tract were linked with residences oif adults (≥18 years old) in the NHIS (National Health Interview Survey) 2000 – 2009 (n = 271,348 subjects). A sample-weighted logistic regression model characterized the association between the prevalence of reporting at least one asthma attack in the 12 months prior to survey interview and quintiles of exposure to outdoor acrolein, controlling for potential confounders. Results In the highest quintile of outdoor acrolein exposure (0.05 – 0.46 µg/m3), there was a marginally significant increase in the asthma attack pOR (prevalence-odds ratio [95% CI]  = 1.08 [0.98∶1.19]) relative to the lowest quintile. The highest quintile was also associated with a marginally significant increase in prevalence-odds (1.13 [0.98∶1.29]) in a model limited to never smokers (n = 153,820). Conclusions Chronic exposure to outdoor acrolein of 0.05 – 0.46 µg/m3 appears to increase the prevalence-odds of having at least one asthma attack in the previous year by 8 percent in a representative cross-sectional sample of the adult United States population. PMID:24816802

  6. Nations at Risk-- Indicators of Fragility in States Susceptible to Terrorist Attacks

    Science.gov (United States)

    2018-03-01

    influenced by reasonable cost - benefit considerations. Moreover, the authors conclude that terrorism is "predominantly rooted in unfavorable...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. NATIONS AT RISK...Advisor Ryan Garcia THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for

  7. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    OpenAIRE

    Asadi NEJMAH

    2015-01-01

    The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...

  8. ASSESSMENT OF DIOXIN INHALATION EXPOSURES AND POTENTIAL HEALTH IMPACTS FOLLOWING THE COLLAPSE OF THE WORLD TRADE CENTER TOWERS

    Science.gov (United States)

    In the days following the September 11, 2001, terrorist attack on New York City's World Trade Center (WTC) towers, EPA, other federal agencies, and New York City and New York State public health and environmental authorities initiated numerous air monitoring activities to better ...

  9. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  10. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    International Nuclear Information System (INIS)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-01-01

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarm rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.

  11. MARITIME VIOLENCE : IMPLICATIONS TO MALAYSIA

    Directory of Open Access Journals (Sweden)

    Nurulizwan Ahmad Zubir

    2014-04-01

    Full Text Available Abstract Maritime Piracy has been a serious threat to the international community especially in the SoutheastAsia region. This threat has caused tremendous implications towards the world economy, environment,political stability of the nations involved because 45% of the shipping company passes through theSoutheast Asia. The worrying fact is that these attacks were committed by terrorists as well as traditionalmaritime pirates. This paper examines on the implications of maritime crime in Malaysia and discusseswhether the definition of piracy under the International Law could be applied to these attacks. Thispaper concludes that cooperation between the region’s states and the enhancement of a good securitysystem of one state are needed to combat maritime violence. Thus it is imperative that the internationallaw need to be changed in order to enhance the meaning of piracy and also to include sea terrorism. Key words: piracy, maritime, terrorist

  12. Global rhetorics of disaster: media constructions of Bataclan and the 'Colectiv Revolution' in the wake of 9/11

    OpenAIRE

    Draga Alexandru, Maria-Sabina

    2017-01-01

    This article examines the recent global emergence of a rhetoric of disaster that connects violent events such as terrorist attacks and destructive accidents under an assumption of similarity based on their equally resulting in tragedy and mourning. I will compare discursive constructions of the terrorist attacks on 9/11, often considered the archetypal terrorist act of the new millennium, the Club Colectiv fire in Bucharest (October 30, 2015), followed by the “Colectiv Revolution” that led to...

  13. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  14. Dispersed Trading and the Prevention of Market Failure

    DEFF Research Database (Denmark)

    Porter, David C.; Tanggaard, Carsten; G. Weaver, Daniel

    With augmented demands on power grids resulting in longer and larger blackouts combined with heightened concerns of terrorist attacks, trading institutions and policy makers have widened their search for systems that avoid market failure during these disturbing events. We provide insight into thi......With augmented demands on power grids resulting in longer and larger blackouts combined with heightened concerns of terrorist attacks, trading institutions and policy makers have widened their search for systems that avoid market failure during these disturbing events. We provide insight...... combined with widely dispersed trading locations may be a viable means of protection against market failure during massive power disruptions or terrorist attacks....

  15. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  16. Cyberterrorism understanding, assessment, and response

    CERN Document Server

    Chen, Tom

    2014-01-01

    Presents a multidisciplinary approach to cyber-terrorism Evaluates the adequacy of current practical approaches to deter, identify, and respond to cyber-terrorist attacks Includes a glossary of key terms, graphic illustrations of cyber-terrorist threats, attacks, case studies and a brief guide to further reading and resources

  17. Current challenges of the European security caused by the refugee crisis. The EU's fight against terrorism

    Directory of Open Access Journals (Sweden)

    Andreea Florentina NICOLESCU

    2017-10-01

    Full Text Available The primary objective of this research is to identify the evolution of the terrorist attacks that appeared in Europe lately. In the article are mentioned the main causes that led to the terrorist attacks from France and Germany, emphasizing their effects over the 2 countries. The article brings forward the main types of attacks used by terrorists but also the number of injured persons or deaths. An essential aspect that was highlighted in the article refers to the results obtained after applying the EU – Turkey Statement but also to those regarding the transfer and relocation of the migrants in different countries. In this way, the analysis implied the selection of EU member states which received Syrian refugees by relocation together with the highlighting of the numeric situation of the persons returned from Greece to Turkey. A last part of this study assumes the identification of the personal categories who have been brought by Frontex and EASO in Greece in order to handle efficiently the crisis, which provide the expertise in the migration field. The primary question of this research is: “Is EU capable to administer the changes regarding migration, assuring in the same time its safety?”. To answer this question, I identified first the costs of EU securitizing its states. I consider that the approach of this matter has a high importance since it shows the necessity of some changes meant to help European states to face the events linked to migration and, implicitly, security from the last years.

  18. Computerized bioterrorism education and training for nurses on bioterrorism attack agents.

    Science.gov (United States)

    Nyamathi, Adeline M; Casillas, Adrian; King, Major L; Gresham, Louise; Pierce, Elaine; Farb, Daniel; Wiechmann, Carrie; Weichmann, Carrie

    2010-08-01

    Biological agents have the ability to cause large-scale mass casualties. For this reason, their likely use in future terrorist attacks is a concern for national security. Recent studies show that nurses are ill prepared to deal with agents used in biological warfare. Achieving a goal for bioterrorism preparedness is directly linked to comprehensive education and training that enables first-line responders such as nurses to diagnose infectious agents rapidly. The study evaluated participants' responses to biological agents using a computerized bioterrorism education and training program versus a standard bioterrorism education and training program. Both programs improved participants' ability to complete and solve case studies involving the identification of specific biological agents. Participants in the computerized bioterrorism education and training program were more likely to solve the cases critically without reliance on expert consultants. However, participants in the standard bioterrorism education and training program reduced the use of unnecessary diagnostic tests.

  19. Talking about terrorism: Q and A with Jessica Stern

    International Nuclear Information System (INIS)

    Stern, J.

    2006-01-01

    Nuclear terrorism remains a potent threat. We have known for some time that terrorist groups have been seeking weapons of mass destruction. There are various ways that terrorists could use nuclear and other radioactive materials: they could acquire a nuclear weapon from a nuclear State; they could acquire the necessary fissile material and produce a weapon on their own, creating an improvised nuclear device; they could attack a nuclear power plant; or they could create a radiation dispersal device, a so-called dirty bomb. The first possibility would be the most devastating, but it is also probably the least likely. Stealing a bomb would be difficult because of the generally high security of facilities where nuclear weapons are stored. And a State that gave nuclear weapons to terrorists would have to seriously consider the probability that the source of the bomb could be identified, so retaliation against the State would be likely. In this regard, the revelation that terrorist groups were carrying out reconnaissance missions at Russian nuclear-weapon storage sites in 2001 was troubling; but the terrorists' efforts quickly became known to security personnel. The second possibility-the risk that terrorists will acquire nuclear-weapons usable materials-must be taken extremely seriously, especially in light of revelations about meetings between Pakistani nuclear scientists and al Qaeda, and about a clandestine effort to export nuclear technology run by the Khan network. Terrorists' dispersal of radioactive materials - either by attacking a nuclear plant or disseminating those materials with a home-made device-is the most likely scenario. Still, it is important to keep the threat in perspective. Dirty bombs are far more frightening than lethal. The article provides responses of Jessica Stern on questions about how big a threat nuclear terrorism is, how to minimize the risks of nuclear terrorism, the behaviour of states to combat the roots and reach of nuclear terrorism

  20. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  1. Summary of the Seattle Urban Area Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Kirvel, R

    2010-09-13

    A terrorist attack involving a release of biological warfare agent in the Seattle urban area would require decision-makers to make a host of important, and sometimes untested, choices concerning how best to respond and recover. This technical supplement supports the Puget Sound Regional Biological Attack Recovery Plan Annex to the Regional Catastrophic Plan, which structures the region’s response and recovery approach, by providing technical details on how to conduct a biological remediation. More specifically, the technical supplement identifies the principal issues that must be addressed following a wide-area release of aerosolized Bacillus anthracis (B. anthracis) spores; explains the resources that are available to address the release; sets forth strategies to reduce the time required for consequence management; and focuses on remediation options, procedures, and tools that can be implemented today should such an incident occur. The content is intended to be used with the Interim Consequence Management Guidance for a Wide-Area Biological Attack (LLNL 2009). A second and related purpose of this technical supplement is to serve as a detailed guide for other geographical regions interested in formulating their own consequence management plans. This technical supplement is funded by, and was developed as part of, the Interagency Biological Restoration Demonstration (IBRD) program—a collaborative effort among Department of Homeland Security, Department of Defense, and numerous other Federal, state, and local agencies—to improve the nation’s ability to respond to and recover from a wide-area biological incident. Content of the technical supplement follows the six-phase diagram for responding to and recovering from a biological contamination incident (see Figure 1 on the next page), which represents a consensus scheme developed after multi-agency review and approval. Whereas the focus of the document is on remediation/cleanup activities, the topics of response

  2. Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

    2009-01-31

    This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

  3. Building Regional Economic Growth and Innovation Capacity

    Science.gov (United States)

    Rafn, H. Jeffrey

    2012-01-01

    Like many states at the turn of the century, Wisconsin was faced with a multibillion-dollar deficit due to a sagging economy brought on by the dotcom bubble burst and the economic impact of the 9/11 terrorist attack on the World Trade Center. As the state legislature grappled with the budget crisis, blame was freely assigned. The state was at…

  4. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  5. Hospitalizations for asthma among adults exposed to the September 11, 2001 World Trade Center terrorist attack.

    Science.gov (United States)

    Miller-Archie, Sara A; Jordan, Hannah T; Alper, Howard; Wisnivesky, Juan P; Cone, James E; Friedman, Stephen M; Brackbill, Robert M

    2018-04-01

    We described the patterns of asthma hospitalization among persons exposed to the 2001 World Trade Center (WTC) attacks, and assessed whether 9/11-related exposures or comorbidities, including posttraumatic stress disorder (PTSD) and gastroesophageal reflux symptoms (GERS), were associated with an increased rate of hospitalization. Data for adult enrollees in the WTC Health Registry, a prospective cohort study, with self-reported physician-diagnosed asthma who resided in New York State on 9/11 were linked to administrative hospitalization data to identify asthma hospitalizations during September 11, 2001-December 31, 2010. Multivariable zero-inflated Poisson regression was used to examine associations among 9/11 exposures, comorbid conditions, and asthma hospitalizations. Of 11 471 enrollees with asthma, 406 (3.5%) had ≥1 asthma hospitalization during the study period (721 total hospitalizations). Among enrollees diagnosed before 9/11 (n = 6319), those with PTSD or GERS had over twice the rate of hospitalization (adjusted rate ratio (ARR) = 2.5, 95% CI = 1.4-4.1; ARR = 2.1, 95% CI = 1.3-3.2, respectively) compared to those without. This association was not statistically significant in enrollees diagnosed after 9/11. Compared to higher educational attainment, completing less than college was associated with an increased hospitalization rate among participants with both pre-9/11- and post-9/11-onset asthma (ARR = 1.9, 95% CI = 1.2-2.9; ARR = 2.6, 95% CI = 1.6-4.1, respectively). Sinus symptoms, exposure to the dust cloud, and having been a WTC responder were not associated with asthma hospitalization. Among enrollees with pre-9/11 asthma, comorbid PTSD and GERS were associated with an increase in asthma hospitalizations. Management of these comorbidities may be an important factor in preventing hospitalization.

  6. A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiong Shi

    2017-01-01

    Full Text Available Internal attack is a crucial security problem of WSN (wireless sensor network. In this paper, we focus on the internal attack detection which is an important way to locate attacks. We propose a state transition model, based on the continuous time Markov chain (CTMC, to study the behaviors of the sensors in a WSN under internal attack. Then we conduct the internal attack detection model as the epidemiological model. In this model, we explore the detection rate as the rate of a compromised state transition to a response state. By using the Bellman equation, the utility for the state transitions of a sensor can be written in standard forms of dynamic programming. It reveals a natural way to find the optimal detection rate that is by maximizing the total utility of the compromised state of the node (the sum of current utility and future utility. In particular, we encapsulate the current state, survivability, availability, and energy consumption of the WSN into an information set. We conduct extensive experiments and the results show the effectiveness of our solutions.

  7. Medical and industrial radiation sources as radiological weapons

    International Nuclear Information System (INIS)

    Bielefeld, T.; Fischer, H.W.

    2006-01-01

    The execution of attacks with radiological weapons are well within the capabilities of both local terrorist groups and transnational terrorist networks. In a research project, plausible attack scenarios have been developed, based on medical and industrial radioactive sources widely used in Germany. Special emphasis was put on how such sources could be obtained applying criminal tactics. To this end, working procedures in hospitals and companies have been analyzed. Furthermore, by means of simulations, the consequences of a terrorist attack using such sources were estimated. None of the scenarios we investigated led to doses at the site of the explosion which might cause acute radiation effects. However, in some scenarios, an attack would result in the necessity of a potentially very costly clean-up of large urban areas. Therefore, improvements in sources security are recommended. (orig.)

  8. Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2013-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic “bull’s eye” disaster models, which assume the psychological effects are narrowly, geographically circumscribed, or by existing models of PTSD onset. In this article, the authors develop a researchable model to explain these and other terrorism-related phenomena by synthesizing research and concepts from the cognitive science, risk appraisal, traumatic stress, and anxiety disorders literatures. They propose the new term relative risk appraisal to capture the psychological function that is the missing link between the event and subjective response in these and other terrorism-related studies to date. Relative risk appraisal highlights the core notion from cognitive science that human perception is an active, multidimensional process, such that for unpredictable societal threats, proximity to the event is only one of several factors that influence behavioral responses. Addressing distortions in relative risk appraisal effectively could reduce individual and societal vulnerability to a wide range of adverse economic and ethnopolitical consequences to terrorist attacks. The authors present ways in which these concepts and related techniques can be helpful in treating persons with September 11– or terrorism-related distress or psychopathology. PMID:17516775

  9. Strategic Studies Quarterly- Spring 2016

    Science.gov (United States)

    2016-01-01

    martial culture -is instructive of deterrence calculations in the present day. On the contrary, many foreign strategists now believe that weapons in the...the coast of the Indian city of Porbandar, Gujarat, prompting specula- tion that a Mumbai -style terrorist attack had been narrowly averted.3 Later...specialists is that the likely catalyst for a Cold Start offensive is a major terrorist attack similar to the parliament incident or Mumbai attack of 2008

  10. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  11. Know Your Rights on Campus: A Guide on Racial Profiling, and Hate Crime for International Students in the United States.

    Science.gov (United States)

    Harvard Civil Rights Project, Cambridge, MA.

    This guide to the rights of international students explains racial profiling and hate crimes. Since the terrorist attacks of September 11, 2001, many immigrants and international students have experienced heightened scrutiny and outright discrimination. Racial profiling refers to the reliance by law enforcement officers on a person's ethnicity,…

  12. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  13. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  14. Psychometrical Assessment and Item Analysis of the General Health Questionnaire in Victims of Terrorism

    Science.gov (United States)

    Delgado-Gomez, David; Lopez-Castroman, Jorge; de Leon-Martinez, Victoria; Baca-Garcia, Enrique; Cabanas-Arrate, Maria Luisa; Sanchez-Gonzalez, Antonio; Aguado, David

    2013-01-01

    There is a need to assess the psychiatric morbidity that appears as a consequence of terrorist attacks. The General Health Questionnaire (GHQ) has been used to this end, but its psychometric properties have never been evaluated in a population affected by terrorism. A sample of 891 participants included 162 direct victims of terrorist attacks and…

  15. Exposure to 911 among Youth and Their Mothers in New York City: Enduring Associations with Mental Health and Sociopolitical Attitudes

    Science.gov (United States)

    Gershoff, Elizabeth T.; Aber, J. Lawrence; Ware, Angelica; Kotler, Jennifer A.

    2010-01-01

    The enduring impact of exposure to the 911 terrorist attacks on mental health and sociopolitical attitudes was examined in a sample of 427 adolescents (M = 16.20 years) and their mothers residing in New York City. Direct exposure to the terrorist attack was associated with youth depression symptoms and with mothers' posttraumatic stress disorder…

  16. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  17. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  18. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  19. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  20. An attempt to evaluate the risks associated with radiological terror

    International Nuclear Information System (INIS)

    Paschoa, A.S.; Dantas, B.M.

    2014-01-01

    The evaluation of the risk of a terrorist attack has been made frequently by multiplying the probability of occurrence of a terrorist attempt by the probability of its success and a quantity which represents the consequences of a successful attack. In the case of a radiological attack the consequences will vary in case the action will be active or passive. Thirteen radionuclides were examined for their potential uses in credible threats or terrorist attacks based on their availability from laboratories and hospitals. Taking into account the dose conversion coefficients published by the International Atomic Energy Agency, those radionuclides with higher dose effectiveness for ingestion are the following: 210 Po; 226 Ra and 241 Am. Other radionuclides which can be used in threats and terror attacks, like 137 Cs for example have also been examined. The risks associated with the selected radionuclides have been tentatively ranked as high, medium, or low. The probability used to evaluate risks depends on the motivation of the terrorist and the capacity, which implies availability or the actual possibility of obtaining a particular radionuclide. On the other hand, whenever a list of radionuclides to be used in a malevolent action is available to a terrorist, the choice of the most adequate will depend also on the action to be undertaken. This work ranks risks associated with radiological terror based on physical, chemical, radio-toxicological and other relevant data on radionuclides, which were either already used in terror attacks, or were pointed out as adequate to be used in such malevolent actions. (author)

  1. Stochastic nanopore sensors for the detection of terrorist agents: Current status and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Liu Aihua; Zhao Qitao [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States); Guan Xiyun, E-mail: xguan@uta.edu [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States)

    2010-08-24

    Nanopore stochastic sensor works by monitoring the ionic current modulations induced by the passage of analytes of interest through a single pore, which can be obtained from a biological ion channel by self-assembly or artificially fabricated in a solid-state membrane. In this minireview, we overview the use of biological nanopores and artificial nanopores for the detection of terrorist agents including explosives, organophosphorus nerve agents, nitrogen mustards, organoarsenic compounds, toxins, and viruses. We also discuss the current challenge in the development of deployable nanopore sensors for real-world applications.

  2. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  3. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  4. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  5. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures

    National Research Council Canada - National Science Library

    Foster, Jr., John S; Gjelde, Earl; Graham, William R; Hermann, Robert J; Kluepfel, Henry M; Lawson, Richard L; Soper, Gordon K; Wood, Lowell L; Woodard, Joan B

    2008-01-01

    ...) attack on our critical national infrastructures. An earlier report, Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP), Volume 1: Executive Report (2004...

  6. Protecting nuclear power plants. Chapter 2. On the importance of the security and safety of the reactor pressure vessel to external threats

    International Nuclear Information System (INIS)

    Ballesteros, A.; Gonzalez, J.; Debarberis, L.

    2006-01-01

    Nuclear power plants have blong been recognized as potential targets of terrorist attacks, and critics have long questioned the adequacy of the existing measures to defend against such attacks. The 11-S 2001, 11-M 2004 and 7-J 2005 attacks in USA, Spain and UK illustrated the deadly intention and abilities of modern terrorist groups. These attacks also brought to surface long standing concerns about the vulnerability of nuclear installations to possible terrorist attacks. Commercial nuclear reactors contain large inventory of radioactive fission products which, if dispersed, could pose a direct radiation hazard on the population. The reactor pressure vessel (RPV), which contains the nuclear fuel, is the most critical component of the plant. This paper shows that small amount of explosive material can produce irreversible damage in the RPV and the release of radioactive material. Therefor, access of working personal to the vicinity of the RPV during the refuelling outage should be stricktly limited. It should be considered a high priority security issue

  7. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  8. TOWARDS THE INVESTIGATION OF USING SOCIAL NETWORK ANALYSIS FOR COUNTER TERRORISM IN WEST AFRICA: CASE STUDY OF BOKO HARAM IN NIGERIA

    Directory of Open Access Journals (Sweden)

    F. OLAJIDE

    2016-11-01

    Full Text Available In this paper, an investigative review of social network analysis (SNA to counter terrorism is presented. Various measures used for predicting key players of terrorist networks are discussed. The methods used for the survey is based on the existing research work that was carried out on counter terrorism of insurgency, for example, 9/11 (2001 attack in the United States. The research papers have shown that the SNA is one of the most efficient and effective methods for understanding terrorist networks. For example, the National security agency has been mapping phone calls ever since the 9/11 event and through this research work, United States have been able to uncover so many hidden terrorist and criminal groups. This paper provides an avenue for a suggestive idea that the Nigerian government can make use of SNA technique by phone mapping. This is based on the fact that Nigeria can combat terrorism in the nation. The Nigerian government can emulate phone mapping technique as Boko Haram terrorists are within the country and they actually make use of phone calls. The government only needs to collaborate with the telecommunication and network providers companies in Nigeria to track down these terrorists. Using SNA to understand/discover terrorist networks in the region is novel.

  9. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  10. The effect of terrorism on public confidence : an exploratory study.

    Energy Technology Data Exchange (ETDEWEB)

    Berry, M. S.; Baldwin, T. E.; Samsa, M. E.; Ramaprasad, A.; Decision and Information Sciences

    2008-10-31

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the metrics it uses to assess the consequences of terrorist attacks. Hence, several factors--including a detailed understanding of the variations in public confidence among individuals, by type of terrorist event, and as a function of time--are critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data were collected from the groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery bombing, and cyber intrusions on financial institutions that resulted in identity theft and financial losses. Our findings include the following: (a) the subjects can be classified into at least three distinct groups on the basis of their baseline outlook--optimistic, pessimistic, and unaffected; (b) the subjects make discriminations in their interpretations of an event on the basis of the nature of a terrorist attack, the time horizon, and its impact; (c) the recovery of confidence after a terrorist event has an incubation period and typically does not return to its initial level in the long-term; (d) the patterns of recovery of confidence differ between the optimists and the pessimists; and (e) individuals are able to associate a monetary value with a loss or gain in confidence, and the value associated with a loss is greater than the value associated with a gain. These findings illustrate the importance the public places in their confidence in government

  11. Terrorism in South Korea.

    Science.gov (United States)

    Wang, Soon Joo; Choi, Jin Tae; Arnold, Jeffrey

    2003-01-01

    South Korea has experienced > 30 suspected terrorism-related events since 1958, including attacks against South Korean citizens in foreign countries. The most common types of terrorism used have included bombings, shootings, hijackings, and kidnappings. Prior to 1990, North Korea was responsible for almost all terrorism-related events inside of South Korea, including multiple assassination attempts on its presidents, regular kidnappings of South Korean fisherman, and several high-profile bombings. Since 1990, most of the terrorist attacks against South Korean citizens have occurred abroad and have been related to the emerging worldwide pattern of terrorism by international terrorist organizations or deranged individuals. The 1988 Seoul Olympic Games provided a major stimulus for South Korea to develop a national emergency response system for terrorism-related events based on the participation of multiple ministries. The 11 September 2001 World Trade Center and Pentagon attacks and the 2001 United States of America (US) anthrax letter attacks prompted South Korea to organize a new national system of emergency response for terrorism-related events. The system is based on five divisions for the response to specific types of terrorist events, involving conventional terrorism, bioterrorism, chemical terrorism, radiological terrorism, and cyber-terrorism. No terrorism-related events occurred during the 2002 World Cup and Asian Games held in South Korea. The emergency management of terrorism-related events in South Korea is adapting to the changing risk of terrorism in the new century.

  12. Extended analysis of the Trojan-horse attack in quantum key distribution

    Science.gov (United States)

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  13. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  14. Parents of terror victims. A longitudinal study of parental mental health following the 2011 terrorist attack on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Wentzel-Larsen, Tore; Dyb, Grete

    2016-03-01

    Little is known about parents' health following their children's exposure to trauma. We investigated the mental health of parents of young terrorist survivors and assessed parental distress and guilt as potential predictors of mental health. Mothers and fathers (N=531) participated in two study waves 4-5 and 14-15 months after the shooting. Posttraumatic stress reactions (PTSS) and anxiety/depression were compared with age- and gender-adjusted expected scores that were calculated from a concurrent population study. Mixed effects models investigated the associations between parental distress, parental guilt, and mental health. Parents' level of anxiety/depression was three times higher and PTSS was five times higher than that of the general population. Parental distress and guilt about their child's traumatic experience contributed uniquely to symptoms at both time points. Parents of traumatized youth constitute a vulnerable group that has been overlooked in the literature. Intervention strategies following trauma should include both survivors and their parents. Copyright © 2016 Z. Published by Elsevier Ltd.. All rights reserved.

  15. 77 FR 56519 - Continuation of the National Emergency With Persons Who Commit, Threaten To Commit, or Support...

    Science.gov (United States)

    2012-09-12

    ... extraordinary threat to the national security, foreign policy, and economy of the United States constituted by... terrorist attacks on September 11, 2001, in New York and Pennsylvania and against the Pentagon, and the... an unusual and extraordinary threat to the national security, foreign policy, and economy of the...

  16. Patriotism, Multiculturalism and Belonging: Political Discourse and the Teaching of History

    Science.gov (United States)

    Osler, Audrey

    2009-01-01

    This paper examines the British Labour government's developing political discourse on patriotism, citizenship and multiculturalism since 1997, particularly following the 2001 terrorist attacks in the United States and the 2005 London bombings. It focuses on the speeches of key government figures, notably Prime Ministers Tony Blair and Gordon…

  17. Countermeasures Against Blinding Attack on Superconducting Nanowire Detectors for QKD

    Directory of Open Access Journals (Sweden)

    Elezov M.S.

    2015-01-01

    Full Text Available Nowadays, the superconducting single-photon detectors (SSPDs are used in Quantum Key Distribution (QKD instead of single-photon avalanche photodiodes. Recently bright-light control of the SSPD has been demonstrated. This attack employed a “backdoor” in the detector biasing technique. We developed the autoreset system which returns the SSPD to superconducting state when it is latched. We investigate latched state of the SSPD and define limit conditions for effective blinding attack. Peculiarity of the blinding attack is a long nonsingle photon response of the SSPD. It is much longer than usual single photon response. Besides, we need follow up response duration of the SSPD. These countermeasures allow us to prevent blind attack on SSPDs for Quantum Key Distribution.

  18. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  19. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  20. Economic Impacts of Potential Foot and Mouth Disease Agro-terrorism in the United States: A Computable General Equilibrium Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Oladosu, Gbadebo A [ORNL; Rose, Adam [University of Southern California, Los Angeles; Bumsoo, Lee [University of Illinois

    2013-01-01

    The foot and mouth disease (FMD) virus has high agro-terrorism potential because it is contagious, can be easily transmitted via inanimate objects and can be spread by wind. An outbreak of FMD in developed countries results in massive slaughtering of animals (for disease control) and disruptions in meat supply chains and trade, with potentially large economic losses. Although the United States has been FMD-free since 1929, the potential of FMD as a deliberate terrorist weapon calls for estimates of the physical and economic damage that could result from an outbreak. This paper estimates the economic impacts of three alternative scenarios of potential FMD attacks using a computable general equilibrium (CGE) model of the US economy. The three scenarios range from a small outbreak successfully contained within a state to a large multi-state attack resulting in slaughtering of 30 percent of the national livestock. Overall, the value of total output losses in our simulations range between $37 billion (0.15% of 2006 baseline economic output) and $228 billion (0.92%). Major impacts stem from the supply constraint on livestock due to massive animal slaughtering. As expected, the economic losses are heavily concentrated in agriculture and food manufacturing sectors, with losses ranging from $23 billion to $61 billion in the two industries.

  1. Limited attacks on the United States and the Soviet Union

    International Nuclear Information System (INIS)

    Levi, B.; Hippel, F. von.

    1987-01-01

    This report is focused on calculations carried out at Princeton University of the consequences of so-called ''limited'' nuclear attacks by the USA and the USSR on one another - primarily because such scenarios seem to be motivating the acquisition of new nuclear weapons. The conclusions were: The use of only a fraction of the destructive capacity in USA and Soviet nuclear arsenals could have catastrophic consequences to human kind. Although the primary justification of the tens of thousands of nuclear warheads in USA and Soviet arsenals is their potential use against military targets, the most commonly discussed potential large-scale military uses of these weapons - in attacks against the nuclear weapons of the other side - would result in tens of millions of civilian casualties. Certainly, if a first strike resulted in such a huge civilian toll, there could be little assurance of restraint in the response of the country that was attacked. The use of even 1% of the strategic arsenals of the USSR or the USA against the population, military industry or strategic-nuclear targets of the other nation could result in tens of millions of casualties. 17 refs, 6 figs, 5 tabs

  2. Global rhetorics of disaster: media constructions of Bataclan and the “Colectiv Revolution” in the wake of 9/11

    Directory of Open Access Journals (Sweden)

    Maria-Sabina DRAGA ALEXANDRU

    2017-07-01

    Full Text Available This article examines the recent global emergence of a rhetoric of disaster that connects violent events such as terrorist attacks and destructive accidents under an assumption of similarity based on their equally resulting in tragedy and mourning. I will compare discursive constructions of the terrorist attacks on 9/11, often considered the archetypal terrorist act of the new millennium, the Club Colectiv fire in Bucharest (October 30, 2015, followed by the “Colectiv Revolution” that led to a change of government in Romania, and the Bataclan terrorist attack in Paris (November 13, 2016. In a dialogue with Noemi Marin's concept of rhetorical space, I argue that, within the horizon of expectation created by 9/11, Bataclan and Colectiv have given rise to a specific rhetoric of mourning and revolt in reaction to disaster, which has an important public dimension, but, through a strong emotional appeal, is directed at every member of the audience in a personal way.

  3. Pre-emptive Defence against International Terrorism and Weapons of Mass Destruction: A Reasoned Critique

    Directory of Open Access Journals (Sweden)

    Yolanda Gamarra Chopo

    2007-06-01

    Full Text Available The 9-11 terrorist attacks had serious repercussions on the world stage, giving rise, among other effects, to a protracted debate on the conditions in which the use of force to fight against terrorism might be justified or not under international law. In the UnitedStates, there were those who advocated in favour of pre-emptive action against the terrorists, and those who were protecting and harbouring them, within the framework of a large scale ‘war’ against terrorism. This gave rise to the ‘Bush doctrine’ of the ‘pre-emptive attack’ to fight against international terrorism and those who possessed weapons of mass destruction that might be used against opponents or for terrorist purposes. Although some people feltthat this version of ‘pre-emption’ in the unilateral use of force strayed from the traditional parameters of self-defence, others considered it to be an adaptation of these parameters to the new needs arising from the threat posed by terrorist groups and outlaw states.

  4. Fear of Terrorism and Preparedness in New York City 2 Years After the Attacks: Implications for Disaster Planning and Research

    Science.gov (United States)

    Boscarino, Joseph A.; Adams, Richard E.; Figley, Charles R.; Galea, Sandro; Foa, Edna B.

    2009-01-01

    Objectives To help improve disaster planning and research, we studied psychosocial predictors of terrorism fear and preparedness among New York City residents after the World Trade Center disaster (WTCD). Method We conducted a random cross-sectional survey of 1,681 adults interviewed 2 years after the WTCD. Participants were living in New York City at the time of the attack and exposed to ongoing terrorist threats. Results We found 44.9 percent (95% confidence interval [CI] = 41.9−47.9) of residents were concerned about future attacks and 16.9 percent (95% CI = 14.7−19.3) reported a fear level of “10” on a 10-point analog scale. Furthermore, 14.8 percent (95% CI = 12.8−17.0) reported they had made some plans for a future attack, a significant increase from the previous year. In addition, although 42.6 percent (95% CI = 39.6−45.7) indicated that they would likely wait for evacuation instructions following a chemical, biological, or nuclear attack, 34.4 percent (95% CI = 31.5−37.3) reported they would evacuate immediately against official advice. Predictors of high terrorism fear in a multivariate model included Hispanic ethnicity (odds ratio [OR] = 2.0, P = .006), lower education (OR = 4.4, P terrorism threats, terrorism fear and preparedness were related to socioeconomic factors, mental health status, terrorism exposure levels, and exposure to stressful life events. PMID:17041297

  5. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  6. A simple coherent attack and practical security of differential phase shift quantum cryptography

    International Nuclear Information System (INIS)

    Kronberg, D A

    2014-01-01

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8–12. We show that under this condition, no high level of practical distance between legitimate users can be achieved. (paper)

  7. Breivik--the Norwegian terrorist case.

    Science.gov (United States)

    Syse, Aslak

    2014-01-01

    On July 22, 2011, there were two murderous attacks in Norway. Both assaults - the bombing of governmental buildings in Oslo City center and the lethal shooting down of young members of the Labour Party on an island - were planned and accomplished by a lone perpetrator. These episodes give rise to several interesting questions. What happened really, and how could it happen? Was the perpetrator sane or insane? What was the ideological background for the attacks? It is unnecessary to discuss in any detail whether or not these acts should be categorized as terrorism. However, there is good reason to consider what these terror attacks imply for Norwegian society at large. What significance did the attacks have for Norwegian democracy, and did they have any impact on the 2013 parliamentary elections? What will be the future for the offender, both in the short term and in years to come? What will happen to the Norwegian insanity defense? These questions are addressed in this article. Copyright © 2014 John Wiley & Sons, Ltd.

  8. The current state of affairs for disaster planning for a nuclear terrorist attack.

    Science.gov (United States)

    Goffman, Thomas E

    2009-01-01

    The author presents current thinking on the effects of an atomic bomb blast from a medical point of view and will argue that current US Federal plans for a nuclear disaster are simply crude, insufficient, disarticulated, and principally relies on martial law as a means of crowd control. The simple physics of a fusion reaction bomb is discussed along with the plans of other countries, apparently "secret"American plans, which show a poor knowledge of the physics of nuclear bombs as well as poor insight into what will be needed to help the maximum number of citizens. An alternative plan involving computer modeling and educating the public to the effects of a fission explosion are presented. The key issue of statewide planning is discussed, as the Federal government has dumped medical problems on "the local level."

  9. The Impact of Terrorism on the Tourism Sector of Lithuania

    Directory of Open Access Journals (Sweden)

    Arvydas Survila

    2017-09-01

    Full Text Available Practically every day there are terrorist attacks executed somewhere. For this reason, the need to reveal the impact of terrorism on tourism sector of Lithuania and how well it is ready for this challenge occurs. The analysis of scientific literature and secondary data was used as well as two surveys (qualitative and quantitative were carried out. Since the possibility of a terrorist attack in Lithuania is trivial, the research focuses on the Lithuanian outbound tourism sector. The survey of interaction between terrorism and tourism and impact of terrorism to tourism in different countries is provided. It is worth emphasising that tourists become the victims of not only preplanned but also of individual terrorist attacks. Events of recent several years have caused the emergence of the terrorist tourism, when people with radical attitudes travel to, e.g., Syria. Despite the various attacks and subsequent dips in tourism the world of travel and hospitality has entered a new era of growth and transformation. The purpose of the research was to identify how Lithuanian tourists and experts perceive dangers and whether this affect their choice of trips and what measures can reduce the impact of terrorist attacks on tourism. Both the Lithuanian tourists and experts understand that the threat from terrorism has been growing, nevertheless the comparison with other surveys can lead to the statement that there is a specific tourist market in Lithuania which is characteristic of courage, inflexibility in terms of price and poor perception of possible threats.

  10. CTC Sentinel. Volume 8, Issue 2

    Science.gov (United States)

    2015-02-01

    dominated by the Philippine military until 2010. The Philippines is confronted with the most diverse set of internal security challenges in... diversity of Philippine terrorist groups. In 2002, Indonesia suffered 43 terrorist attacks compared to 48 attacks in the Philippines . In 2007...ideology is not directly to blame for the increase in child combatants. Most Communist insurgencies during the Cold War either used children in com- bat

  11. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  12. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  13. Helping Young Children in Frightening Times.

    Science.gov (United States)

    Young Children, 2001

    2001-01-01

    Presents ways parents and other adults can help young children deal with tragedy and violence in the wake of terrorist attacks on the United States. Suggests giving reassurance and physical comfort, providing structure and stability, expecting a range of reactions, helping children to talk if they are ready, turning off the television, and…

  14. Living Memorials: Understanding the Social Meanings of Community-Based Memorials to September 11, 2001

    Science.gov (United States)

    Erika S. Svendsen; Lindsay K. Campbell

    2010-01-01

    Living memorials are landscaped spaces created by people to memorialize individuals, places, and events. Hundreds of stewardship groups across the United States of America created living memorials in response to the September 11, 2001 terrorist attacks. This study sought to understand how stewards value, use, and talk about their living, community-based memorials....

  15. Social work and the house of Islam: orienting practitioners to the beliefs and values of Muslims in the United States.

    Science.gov (United States)

    Hodge, David R

    2005-04-01

    Despite the media attention focused on the Islamic community after the terrorist attacks on the World Trade Center on September 11, 2001, Muslims remain one of the most misunderstood populations in the United States. Few articles have appeared in the social work literature orienting practitioners to the Islamic community, and much of the mainstream media coverage misrepresents the population. This article reviews the basic beliefs, practices, and values that commonly characterize, or inform, the House of Islam in the United States. The organizations that embody and sustain the Muslim communities that constitute the House of Islam are profiled, and areas of possible value conflicts are examined. The article concludes by offering suggestions for integrating the article's themes into practice settings. Particular attention is given to enhancing cultural competence and to suggestions for spiritual assessment and interventions.

  16. Estimation of Radiological Terrorism Risk by Administrative Districts

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Suk Hoon; Kim, Ju Youl [Seoul National Univ., Seoul (Korea, Republic of); Yoo, Ho Sik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2008-10-15

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks.

  17. Estimation of Radiological Terrorism Risk by Administrative Districts

    International Nuclear Information System (INIS)

    Kim, Suk Hoon; Kim, Ju Youl; Yoo, Ho Sik

    2008-01-01

    Since the 9/11 attack in USA, the threat of terrorism across the world has dramatically increased. Accordingly, estimating terrorism risk has become an essential part of catastrophe risk strategies throughout the world. There are many forms of terrorism. Recently, the prospect of the radiological terrorist attack using the radioactive material is considered as one of the most serious threats. The aim of this paper is to assess the radiological terrorism risk by administrative districts based on the parameters that imply threat, vulnerability, and consequences of terrorist attacks

  18. Organizational factors and office workers' health after the World Trade Center terrorist attacks: long-term physical symptoms, psychological distress, and work productivity.

    Science.gov (United States)

    Osinubi, Omowunmi Y O; Gandhi, Sampada K; Ohman-Strickland, Pamela; Boglarsky, Cheryl; Fiedler, Nancy; Kipen, Howard; Robson, Mark

    2008-02-01

    To assess if organizational factors are predictors of workers' health and productivity after the World Trade Center attacks. We conducted a survey of 750 workers and compared those who had direct exposures to the World Trade Center attacks (south of Canal Street workers; primary victims) with those less directly exposed (north of Canal Street workers; other victims and non-victims). South of Canal Street workers reported headache more frequently than north of Canal Street workers did (P = 0.0202). Primary victims reported headache and cough more frequently than did other victims and non-victims (P = 0.0086 and 0.0043, respectively). Defensive organizational culture was an independent predictor of cough and job stress, and job stress was an independent predictor of on-the-job productivity losses. Organizational variables may modify health and productivity outcomes after a large-scale traumatic event in the workplace.

  19. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  20. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    Science.gov (United States)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  1. Policing and Law Enforcement in COIN -- The Thick Blue Line

    Science.gov (United States)

    2009-02-01

    terrorist group was by the Aum Shin Rikyo in the Tokyo subway gas attacks of 1995. This was followed by the innovative Al Qaeda attacks on the U.S...operates at the strategic level through an associa- tion of networks and franchises with a global strategy having protractedness as one of its...networked enterprises and franchises of a. terrorists, insurgents, and criminals—the strategy somewhat Maoist in application and an insurgent

  2. Remembering the present: Dealing with the memories of terrorism in Europe

    OpenAIRE

    Milosevic, Ana

    2017-01-01

    Whilst the interest of memory scholars in regards to political violence and more specifically, terrorism, is not novel, immediately following the terrorist attacks in Paris (2015) and Brussels (2016) there appears to be a certain urgency to reflect upon these nascent memories in collective, European immaginarium. This article traces the development of a “bottom-up” memorialization process in the immediate aftermath of terrorist attacks in Brussels (March - July 2016), questioni...

  3. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  4. Columbine High: Five Years Later

    Science.gov (United States)

    Hurst, Marianne D.

    2004-01-01

    A few weeks before the fifth anniversary of the Columbine High School shootings on April 20, 1999, Principal Frank DeAngelis reflects on how his school has changed over the past five years. Much like the September 11, 2001 terrorist attacks against the United States, "Columbine" carries a chilling meaning that resonates across the…

  5. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  6. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  7. DAG-based attack and defense modeling: don’t miss the forest for the attack trees

    NARCIS (Netherlands)

    Kordy, Barbara; Piètre-Cambacédès, Ludovic; Schweitzer, Patrick

    2015-01-01

    This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and

  8. Method and apparatus for detecting cyber attacks on an alternating current power grid

    Science.gov (United States)

    McEachern, Alexander; Hofmann, Ronald

    2017-04-11

    A method and apparatus for detecting cyber attacks on remotely-operable elements of an alternating current distribution grid. Two state estimates of the distribution grid are prepared, one of which uses micro-synchrophasors. A difference between the two state estimates indicates a possible cyber attack.

  9. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  10. Trapped in the Carceral Net: Race, Gender, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Yasmin Jiwani

    2011-01-01

    Full Text Available The events of September 11, 2001 unleashed a series of security measures designed ostensibly to protect Western nations from terrorist attacks. Many of these measures were aimed at keeping out potential terrorists and neutralizing potential terrorist activities. However, many were also aimed at citizens within the nation, legitimizing their exclusion and denial of rights. Drawing on the case of Omar Khadr, this paper argues that the carceral net ensnaring Omar Khadr was in operation well before 2001. However, since then, the carceral net has tightened to render Muslim bodies unworthy on the grounds of their putative criminality, and as undeserving victims, unbefitting state intervention and societal sympathy. The colour line, I argue, demarcates bodies that are considered worthy as opposed to those precarious others who can be penalized by the state and whose lives simply do not matter. Race, class and gender intersect and interlock to construct particular representations of victimhood as demonstrated by contemporary media representations of Muslim women.

  11. Injured civilian survivors of suicide bomb attacks: from partial PTSD to recovery or to traumatisation. Where is the turning point?

    Science.gov (United States)

    Dolberg, Ornah T; Barkai, Gabriel; Leor, Agnes; Rapoport, Helena; Bloch, Miki; Schreiber, Shaul

    2010-03-01

    To assess the short- (3-9 months) and medium-term (30 months) occurrence and severity of post-traumatic stress disorder (PTSD) in civilian survivors of suicide bombing terrorist attacks. We evaluated 129 injured survivors of nine attacks in Israel who were treated in our emergency room between June 2000 and September 2002. Data on demographics, physical injuries and psychiatric symptoms were collected by both a structured clinical interview and standard assessment scales for depression, anxiety, and sleep quality. Diagnosis of PTSD was based on a Hebrew-validated DSM-IV SCID-PTSD rating scale. At the first assessment (short-term), 20 survivors (15.5%) met the criteria for full-blown PTSD and 54 (42%) for sub-clinical PTSD, while 55 (42.5%) evidenced no symptoms of PTSD. Two years later, only 54 patients could be located: 19 (35%) of them had either persistent or de novo PTSD and none had residual sub-clinical PTSD. Relatively few survivors of suicide bomb attacks had full-blown PTSD, while a substantial number of survivors had short-term sub-clinical PTSD. Two-year follow-up evaluations revealed that a significant a number of the patients available for testing (35%) had full-blown PTSD. These findings imply that medium-term follow-up of survivors is needed in order to establish the actual prevalence of PTSD.

  12. Terrorism: some philosophical and ethical dilemmas

    OpenAIRE

    Stojanov, Trajce; Unsal, Zeynep

    2017-01-01

    Philosophers weren`t thinking a lot about terrorism before the terrorist attacks in the United States on 11 September 2001. Or even when they were thinking the main concern was how to deal with terrorism. But after this attack terrorism was high on the philosophical agenda mainly manifested as an ethical problem. The key concern was: can terrorism be morally justified? That is the issue we are dealing in this paper too. But, the answer of this question largely depends on the treatment of t...

  13. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  14. The effects of terrorism on adult mental health: a public health preparedness approach

    Directory of Open Access Journals (Sweden)

    Sameera S. Karnik

    2014-01-01

    Full Text Available Terrorism is a disruptive man-made disaster event challenging human health and wellbeing. It is a hostile activity which brings about much casualty, even death. It not only causes physical casualties but also brings about psychological morbidity and can lead to long term mental disorders. The effects of terrorist attacks on people’s psychological health covers a wide range such as acute stress symptoms to long term disorders like Post-traumatic Stress Disorder (PTSD. The psychological disorder due to traumatic distress is treated with psychotherapies such as psychosocial intervention, psychological debriefing, psychological first aid care, psychological counseling services, and psychoeducation. Government is supporting state and local public health departments to develop efficient public health preparedness planning programs in case of emergency situations. There are some newer approaches working towards enhancing health security and managing responses to a psychological impact of a disaster event like a terrorist attack.

  15. Terrorism in Canada.

    Science.gov (United States)

    Kollek, Daniel

    2003-01-01

    This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.

  16. Tracks FAQs: How Do Heart Attack Hospitalization Rates In My Community Compare With Other Counties Or States?

    Centers for Disease Control (CDC) Podcasts

    2011-09-01

    In this podcast, CDC Tracking experts discuss how to compare heart attack hospitalization rates in your community with other counties or states. Do you have a question for our Tracking experts? Please e-mail questions to trackingsupport@cdc.gov.  Created: 9/1/2011 by National Center for Environmental Health, Division of Environmental Hazards and Health Effects, Environmental Health Tracking Branch.   Date Released: 9/1/2011.

  17. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    Science.gov (United States)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  18. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    Science.gov (United States)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  19. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  20. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  1. Israel: Background and U.S. Relations in Brief

    Science.gov (United States)

    2017-02-24

    of the March 2015 Israeli electoral campaign, Netanyahu says that a Palestinian state will not be established under his watch, but after the elections...www.state.gov/p/nea/rls/rpt/259262.htm. It also lamented terrorist attacks against civilians and Palestinian incitement to violence . 29 The...U.S. Relations in Brief Congressional Research Service 10  Calls for immediate steps to prevent acts of violence against civilians and to

  2. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  3. Turkish Elementary School Students' Perceptions of Local and Global Terrorism

    Science.gov (United States)

    Aricak, Tolga; Bekci, Banu; Siyahhan, Sinem; Martinez, Rebecca

    2008-01-01

    Introduction: Historically, terrorism has occurred in various regions of the world and has been considered a local problem until the September, 11 terrorist attacks on the United States in 2001. After 9/11, terrorism has become a global concern. The definition of terrorism has changed from a violent act of a group of local people against their…

  4. 9/11 Leaves Small Imprint on Curricula

    Science.gov (United States)

    Robelen, Erik W.

    2011-01-01

    Ten years after terrorists crashed planes into the World Trade Center and the Pentagon, the profound impact on the United States is not hard to see, from heightened domestic-security measures to the U.S. role in conflicts deemed part of a war on terror. What's less obvious is how the attacks have filtered into American classrooms. Some observers…

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  7. The Defense Civilian Intelligence Personnel System: An Independent Assessment of Design, Implementation, and Impact

    Science.gov (United States)

    2010-06-01

    terrorist attacks: …[T]he necessity of defense against a terrorist attack is urgent… I am a real radical on personnel systems…[ Y ]ou need to have...recruiting among the “ millennial ” generation of workers who are more accustomed to instant feedback and recognition and would not be content with a...political affiliation, race, color, religion , national origin, sex, marital status, age, or handicap condition, and with proper regard for their

  8. Level I center triage and mass casualties.

    Science.gov (United States)

    Hoey, Brian A; Schwab, C William

    2004-05-01

    The world has been marked by a recent series of high-profile terrorist attacks, including the attack of September 11, 2001, in New York City. Similar to natural disasters, these attacks often result in a large number of casualties necessitating triage strategies. The end of the twentieth century was marked by the development of trauma systems in the United States and abroad. By their very nature, trauma centers are best equipped to handle mass casualties resulting from natural and manmade disasters. Triage assessment tools and scoring systems have evolved to facilitate this triage process and to potentially reduce the morbidity and mortality associated with these events.

  9. Distress of Routine Activities and Perceived Safety Associated with Post-Traumatic Stress, Depression, and Alcohol Use: 2002 Washington, DC, Sniper Attacks.

    Science.gov (United States)

    Fullerton, Carol S; Herberman Mash, Holly B; Benevides, K Nikki; Morganstein, Joshua C; Ursano, Robert J

    2015-10-01

    For over 3 weeks in October 2002, a series of sniper attacks in the Washington, DC, area left 10 people dead and 3 wounded. This study examined the relationship of distress associated with routine activities and perceived safety to psychological and behavioral responses. Participants were 1238 residents of the Washington, DC, metropolitan area (aged 18 to 90 years, mean=41.7 years) who completed an Internet survey including the Impact of Event Scale-Revised, Patient Health Questionnaire-9, and items pertaining to distress related to routine activities, perceived safety, and alcohol use. Data were collected at one time point approximately 3 weeks after the first sniper shooting and before apprehension of the suspects. Relationships of distress and perceived safety to post-traumatic stress, depressive symptoms, and increased alcohol use were examined by using linear and logistic regression analyses. Approximately 8% of the participants met the symptom criteria for probable post-traumatic stress disorder, 22% reported mild to severe depression, and 4% reported increased alcohol use during the attacks. Distress related to routine activities and perceived safety were associated with increased post-traumatic stress and depressive symptoms and alcohol use. Distress and perceived safety are associated with specific routine activities and both contribute to psychological and behavioral responses during a terrorist attack. These findings have implications for targeted information dissemination and risk communication by community leaders.

  10. Simulation of a terrorist attack with intent to a source of Iridium-192 and Radium Sulphate-226: procedures for radiation emergency actions

    International Nuclear Information System (INIS)

    Aguiar, Bruno Dias de

    2013-01-01

    The accomplishment of major public events comprises a previous radiological safety planning network, since both public safety and safeguards criteria are based upon risk factors, to which individuals and even the environment may be exposed to, moreover in radiological, nuclear and/or terrorist threats. Therefore, a preventive and extensive local radiological survey must be performed, aiming the detection of unexpected radioactive material, being it a sealed or unsealed source or even in the dispersed form. Once confirmed its presence, protective actions must be started up, with monitoring and restraint of the source/material, followed by dose and dose rate assessment in environment, as well as contamination in air and in surfaces in general. As a consequence, such measures must be carried out at once, according to specific protocols adopted by the responding team, as soon as the incident is confirmed. Aiming a better qualification in the attendance of major events, a simulated scenario is proposed in this study, comprising an incident with the malicious presence of a radioactive source in the Mario Filho Stadium (Maracana). (author)

  11. Probabilitas Teroris Perempuan di Indonesia

    Directory of Open Access Journals (Sweden)

    M. Endy Saputro

    2010-11-01

    Full Text Available Indonesian police through Densus 88 have analyzed and predicted the strategy of terrorism in Indonesia, which was important to note that those Indonesian terrorist are males. In short, the Indonesian terrorists need to set up their strategy of attack. Will the Indonesian terrorists build a new strategy with taking involve woman within the strategy? This paper aims to understand the involvement of women terrorist in some suicide actions in global context. To sum up, this paper argues that the emergence of women terrorist in Indonesia are possible, yet it requires the precedence conditions of world women terrorists in global contexts.

  12. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  13. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  14. Psychometric and demographic predictors of the perceived risk of terrorist threats and the willingness to pay for terrorism risk management programs.

    Science.gov (United States)

    Mumpower, Jeryl L; Shi, Liu; Stoutenborough, James W; Vedlitz, Arnold

    2013-10-01

    A 2009 national telephone survey of 924 U.S. adults assessed perceptions of terrorism and homeland security issues. Respondents rated severity of effects, level of understanding, number affected, and likelihood of four terrorist threats: poisoned water supply; explosion of a small nuclear device in a major U.S. city; an airplane attack similar to 9/11; and explosion of a bomb in a building, train, subway, or highway. Respondents rated perceived risk and willingness to pay (WTP) for dealing with each threat. Demographic, attitudinal, and party affiliation data were collected. Respondents rated bomb as highest in perceived risk but gave the highest WTP ratings to nuclear device. For both perceived risk and WTP, psychometric variables were far stronger predictors than were demographic ones. OLS regression analyses using both types of variables to predict perceived risk found only two significant demographic predictors for any threat--Democrat (a negative predictor for bomb) and white male (a significant positive predictor for airline attack). In contrast, among psychometric variables, severity, number affected, and likelihood were predictors of all four threats and level of understanding was a predictor for one. For WTP, education was a negative predictor for three threats; no other demographic variables were significant predictors for any threat. Among psychometric variables, perceived risk and number affected were positive predictors of WTP for all four threats; severity and likelihood were predictors for three; level of understanding was a significant predictor for two. © 2013 Society for Risk Analysis.

  15. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  16. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  17. The 'overlooked trio' of hypothetical terrorist nuclear weapons - reactor grade plutonium, neptunium-237 and tritium

    International Nuclear Information System (INIS)

    Sholly, S.

    2002-01-01

    Full text: Considerations revolving around physical protection of nuclear material are quite commonly and naturally focused on protecting weapons-grade plutonium (WGPu) and highly enriched uranium (HEU) from theft and diversion. These two materials are the center of attention because of their well-known (and demonstrated) potential for use in first-generation nuclear explosive devices of which potential terrorists are widely thought to be capable. They are also the center of attention because of retirements of these materials from military use as the Russian Federation and the United States reduce the number of nuclear weapons in their arsenals. Three other materials - an 'overlooked trio' - must also be borne in mind within this context: (1) reactor-grade plutonium (RGPu); (2) neptunium-237 (Np-237); and (3) tritium (H-3). Although there are still some authorities who either contend that RGPu cannot be used in a nuclear explosive or that there are (for a terrorist) insurmountable difficulties in doing so, the knowledgeable scientific and technical community, recognizes the potential utility of RGPu for hypothetical terrorist nuclear devices. A much smaller community of experts recognizes the usefulness of Np-237 for nuclear devices, but Np-237 is as straight-forwardly and easily usable as HEU and similarly abundant (but not often in separated form). Tritium can be used (with a modest increase in design sophistication) in a conventional first-generation nuclear device with any of the weapons-usable materials (WGPu, HEU, RGPu or Np-237) to increase the yield and/or increase the reliability of a non-fizzle yield. Given the presence of RGPu and Np-237 in abundant quantities in spent commercial reactor fuel, widely available knowledge of how to separate these materials, and a world-wide total of more than 400 nuclear power plants, spent reactor fuel also requires stringent controls. This is especially true of old spent fuel which has far less radiation dose

  18. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  19. The Changing Nonlinear Relationship between Income and Terrorism

    Science.gov (United States)

    Enders, Walter; Hoover, Gary A.

    2014-01-01

    This article reinvestigates the relationship between real per capita gross domestic product (GDP) and terrorism. We devise a terrorism Lorenz curve to show that domestic and transnational terrorist attacks are each more concentrated in middle-income countries, thereby suggesting a nonlinear income–terrorism relationship. Moreover, this point of concentration shifted to lower income countries after the rising influence of the religious fundamentalist and nationalist/separatist terrorists in the early 1990s. For transnational terrorist attacks, this shift characterized not only the attack venue but also the perpetrators’ nationality. The article then uses nonlinear smooth transition regressions to establish the relationship between real per capita GDP and terrorism for eight alternative terrorism samples, accounting for venue, perpetrators’ nationality, terrorism type, and the period. Our nonlinear estimates are shown to be favored over estimates using linear or quadratic income determinants of terrorism. These nonlinear estimates are robust to additional controls. PMID:28579636

  20. Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack

    International Nuclear Information System (INIS)

    Wang Wei-Long; Gao Ming; Ma Zhi

    2015-01-01

    Passive Faraday-mirror (PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure (POVM) operators plays an important role in this attack. In this paper, we propose a simple scheme to implement the POVM in PFM attack on an Faraday–Michelson quantum cryptography system. Since the POVM can not be implemented directly with previous methods, in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first, without changing the attacking effect by calculation. Based on the methods proposed by Ahnert and Payne, the linear-optical setup for implementing the POVM operators is derived. At last, the complete setup for realizing the PFM attack is presented with all parameters. Furthermore, our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. (paper)

  1. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  2. Reachable Sets of Hidden CPS Sensor Attacks : Analysis and Synthesis Tools

    NARCIS (Netherlands)

    Murguia, Carlos; van de Wouw, N.; Ruths, Justin; Dochain, Denis; Henrion, Didier; Peaucelle, Dimitri

    2017-01-01

    For given system dynamics, control structure, and fault/attack detection procedure, we provide mathematical tools–in terms of Linear Matrix Inequalities (LMIs)–for characterizing and minimizing the set of states that sensor attacks can induce in the system while keeping the alarm rate of the

  3. 105 ISSUES OF SECURITY AND INSECURITY IN BOKO HARAM ERA

    African Journals Online (AJOL)

    HP-G61

    terrorist activities of Boko Haram like the 1998 bombing of the American Embassy in ... Likewise the 9/11 terrorist attack was a karmic reaction and ex-president Bill ..... .com/newsweek/2012/01/15/wole-soyinka-on-nigeria-s-anti-christian-.

  4. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  5. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  6. The impact of terrorism on children and adolescents: terror in the skies, terror on television.

    Science.gov (United States)

    Fremont, Wanda P; Pataki, Caroly; Beresin, Eugene V

    2005-07-01

    Terrorist attacks and their aftermath have had a powerful impact on children and their families. Media and television exposure of terrorist events throughout the world has increased during the past few years. There is increasing concern about the effects of this exposure on children who witness these violent images. To develop a proactive and strategic response to reactions of fear, clinicians, educators, and policy makers must understand the psychologic effects of media coverage of terrorism on children. Previous research has focused on media coverage of criminal violence and war. Recent studies have examined the effect of remote exposure of terrorist attacks and have shown a significant clinical impact on children and families.

  7. Security concerns in the Middle East for oil supply: Problems and solutions

    International Nuclear Information System (INIS)

    Sen, Samil; Babali, Tuncay

    2007-01-01

    Comprising 65-70% of the world's oil reserves, the Gulf States (Saudi Arabia, Iran, Iraq, Kuwait, UAE and Qatar) are key countries for the solutions to the energy supply matters of the world. Free flow of oil to the world markets from Gulf region is an indispensable part of the major security issues. The Middle East has had mainly security related problems such as Arab-Israeli wars and conflicts, Arab-Iranian war and conflicts, Arab-Arab war and conflicts, US-Gulf wars and conflicts and more recently radicalism and terrorist attacks. Energy supply security requires the enhancement of the peace and cooperation between countries instead of competition. Preventive policy approaches are more suitable to address energy supply matters. Preventive strategy might be possible with the active participation of NATO within the 'out of area' type operations to the Middle East and quite possibly indirectly to the Asia-Pacific regions. Religious and ethnic radicalism and terrorist attacks has also direct effects over oil supply security matters

  8. Radiation Detection System for Prevention of Radiological and Nuclear Terrorism

    International Nuclear Information System (INIS)

    Kwak, Sung-Woo; Yoo, Ho-Sik; Jang, Sung-Sun; Kim, Jae-Kwang; Kim, Jung-Soo

    2007-01-01

    After the September 11 terrorist attack, the threat of a potential for a radiological or nuclear terrorist attack became more apparent. The threats relating to radiological or nuclear materials include a Radiological Dispersion Device (RDD), an Improved Nuclear Device (IND) or a State Nuclear Device (such as a Soviet manufactured suitcase nuclear weapon). For more effective countermeasures against the disaster, multilayer protection concept - prevention of smuggling of radioactive or nuclear material into our country through seaports or airports, detection and prevention of the threat materials in transit on a road, and prevention of their entry into a target building - is recommended. Due to different surrounding circumstances of where detection system is deployed, different types of radiation detection systems are required. There have been no studies on characteristics of detection equipment required under Korean specific conditions. This paper provides information on technical requirements of radiation detection system to achieve multi-layer countermeasures for the purpose of protecting the public and environment against radiological and nuclear terrorism

  9. Mezinárodně právní ochrana bezpečnosti civilního letectví

    OpenAIRE

    Štěpánková, Mirka

    2013-01-01

    International Protection of Civil Aviation Safety. This analysis is based on the idea that the obligation of states to protect civil aviation against acts of unlawful interference, especially terrorist attacks, has certain limits. These limits find its source in international treaties. States are not only subjects of treaties, which protect civil aviation, but also subjects of treaties, which protect individuals and there human rights. Both kind of obligation should be respected. These days w...

  10. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.

  11. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  12. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  13. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  14. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  15. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  16. Quarantine after an international biological weapons attack: medical and public health requirements for containment.

    Science.gov (United States)

    Oren, Meir

    2004-11-01

    The world now faces the dreadful possibility of biological weapons attacks by terrorists. Healthcare systems would have to cope with such emergencies should all preemptive measures fail. Information gained from the Global Mercury exercise and the SARS outbreak has shown that containing an outbreak at the start is more effective than reacting to it once it has spread and that containment should be treated both nationally and internationally. On the national level this entails developing rapid and effective methods to detect and identify infected cases, and implementing isolation and control measures to lower the risk of further transmission of the disease while assuring the safety of medical teams and laboratory workers. Strategic contingency plans should incorporate well-defined procedures for hospitalization and isolation of patients, providing regional backup of medical personnel and equipment and maintaining close cooperation between the various bodies in the healthcare system. Quarantine is an effective containment measure, especially if voluntarily imposed. Modern communication systems can help by sending professional teams timely instructions and providing the public with information to reduce panic and stress during quarantine procedures. Informing the public poses a dilemma: finding a balance between giving advance warning of an imminent epidemic outbreak and ascertaining the likelihood of its occurrence. Containment of international bioterrorist attacks depends entirely on close international cooperation to implement national and international strategic contingency plans with free exchange of information and recognition of procedures.

  17. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  18. Intelligence Sharing, Fusion Centers, and Homeland Security

    National Research Council Canada - National Science Library

    Newbill, III, Raymond R

    2008-01-01

    The final report by the bipartisan National Commission on Terrorist Attacks (2004) concluded that the attacks on September 11, 2001 were partly successful because information was not shared properly between agencies...

  19. The global initiative against the nuclear terrorism; La iniciativa global contra el terrorismo nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Lossada Torres-Quevedo, A.

    2008-07-01

    The magnitude of the terrorist attacks of September 11 and subsequent attacks in Madrid, London, Bali and Iraq have been cause for condemnation and have forced the international community to make a concerted effort to prevent this kind of attack. Moreover, the risk that Al Qaeda could get hold of weapons of mass destruction has led to the inclusion of non-proliferation as a key element of the strategies to combat terrorism and to the launch of several initiative to prevent the possibility of these types of weapons or their precursors from falling into the hands of terrorist groups and to adequately manage the consequences. (Author)

  20. Insurability of Terrorism Risks

    International Nuclear Information System (INIS)

    Harbruecker, D.

    2006-01-01

    Until 2001 losses caused by terrorist attacks have been covered under fire policies worldwide with two exceptions: Spain and UK where major and multiple losses caused by ETA and IRA had led to specific insurance solutions. The September 11, 2001 attacks on the World Trade Centre have changed the world in many aspects. This includes the insurance industry, which was compelled to exclude terrorism from coverage and to offer special solutions for extra premium. Nuclear power plants have been repeatedly called targets for terrorists as their destruction could cause a large catastrophe and more victims than the September 2001 attacks. How does the insurance industry respond? (author)