ATTACK MODALITIES. Draft 1 Charles P. Blair

Size: px
Start display at page:

Download "ATTACK MODALITIES. Draft 1 Charles P. Blair"

Transcription

1 ATTACK MODALITIES Draft 1 Charles P. Blair ATTACK MODALITIES Attack Modalities refers to the actual methods and techniques that terrorists choose to employ to attack particular targets. There are several subfactors in this category, including Choice of Weapons, which is self-explanatory, and Choice of Tactical Methods, which refers to the actual mechanics used to approach the target, carry out the attack, and withdraw after the attack is carried out. Another is Insiders and Outsiders, which refers to whether the terrorist group has infiltrated its own personnel into the facility s workforce or managed to coopt someone who already works there, i.e., has assistance from an insider. For understandable reasons, attacks that are launched with inside help may well have a better chance of success. Depending upon the choice of targets, the potential array of attack modalities can be quite extensive and diverse Choice of Weapons (NON-AGENT / DEVICE / WEAPON), which is self-explanatory 2. Choice of Tactical Methods, actual mechanics used to approach the target, carry out the attack, and withdraw after the attack is carried out. This dovetails with other factors below. 3. Target Selection 1 This in progress work is largely based on the works of Jeffrey M. Bale. Specifically, most of his quotes are drawn from Bales excellent scholarship and analyses in, for example, Gary Ackerman, Praveen Abhayaratne, Jeffrey M. Bale, A Bhattacharjee, Charles P. Blair, L. Hansell, A. Jayne, Margaret Kosal, Sean Lucas, Keven S Moran, L. Seroki and Sundara. Vadlamudi, Assessing Terrorist Motivations for Attacking Critical Infrastructure. Lawrence Livermore National Laboratory, UCRL-TR , January 2007, and Ackerman, Bale, Blair, Kosal, and Vadlamudi, Chemical & Biological Defense Multivariate Decision Support Tools, Weapons of Mass Destruction Terrorism Research Program (TRP), Center for Nonproliferation Studies, December See also, Gary A. Ackerman, Charles P. Blair, Jeffrey M. Bale, Victor Asal and R. Karl Rethemeyer, Anatomizing Radiological and Nuclear Non-State Adversaries: Identifying the Adversary, report prepared for the Science and Technology Directorate, Department of Homeland Security, grant number N (College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism, 2009). See Last Updated July Ibid.

2 Target Selection refers to the process by which terrorists first identify and later choose targets to attack. As experienced terrorism researchers know, different groups make decisions somewhat differently, if not in an entirely idiosyncratic manner. That said, this process of selection is normally involves several general stages. First, there is typically a preliminary planning phase in which more than one potential target is considered for attack. Second, those targets are all examined and evaluated, if possible via direct reconnaissance on the ground. If they still seem promising, they may be brought under more regular but discreet surveillance. Less promising targets are progressively weeded out and discarded, leaving only one (or a handful) to be decided upon. In the end, the actual targets are selected on the basis of their perceived importance, vulnerability, and suitability for accomplishing the group s aims Decision Making Entities 5. Attack Timing 6. Order of Attack Planning 7. Agent / Device / Weapon Type Options [CBRN Specific] 8. Agent / Device / Weapon Sub-Type Options 9. Specific Agent / Device / Weapon Selected 10. Acquisition of Materials a. Additional resources to devote b. Raw materials vs. intact weapon / device c. Source of Materials d. Particular knowledge regarding facilities where RN Materials Houses 11. Group s Weaponization of Agent / Device / Weapon(s) 12. Pre-attack Preparations a. Production of weapon /device b. Operational Team c. Familiarity with Targeting Environment(s) d. Target Surveillance e. Operational Security (OPSEC) 13. Ingress in / Egress from Target area 3 Ibid. Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 2 of 6

3 14. Experience with Inter/Intra-State Transfers 15. Insiders and Outsiders Insiders and Outsiders, which refers to whether the terrorist group has infiltrated its own personnel into the facility s workforce or managed to co-opt someone who already works there, i.e., has assistance from an insider. For understandable reasons, attack that are launched with inside help may well have a better chance of success. Depending upon the choice of targets, the potential array of attack modalities can be quite extensive and diverse Transport to Target Area(s) 17. Use of Agent / Weapon / Device 18. Escape Plan 19. Claims of Success / Responsibility 4 Ibid. Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 3 of 6

4 F. APPENDIX Ideological Motivational Factors. Ideological motivational factors are those main factors that frame the basic set of political, social, cultural and/or religious beliefs that members of a particular attacking group hold. In a rudimentary sense, these factors frame what a group is for and what it is against. Any assessment of such factors should include analysis of: general group attitudes and orientations; the substance of its espoused doctrines; and the near unconscious set of values and behavioral precepts the norms that group members have absorbed through their national, cultural and extremist associations. 1 Incentives Achieves goals in an ideologically consistent manner. Certain groups may perceive chemical or biological weapons to be uniquely well suited for achieving particular ends in an ideologically consistent fashion. Apocalyptic groups, for example, might consider biological agents a divine or natural tool for bringing about the end of the world. Racist groups might believe that certain pathogens can be used to selectively target specific populations. And still other extremist groups might seek to conduct chemical or biological attacks simply because of the WMD label associated with biological weapons holds out the promise of extreme, mass consequences. Groups believing that the U.S. military has used chemical or biological agents in the past, may deploy such weapons against U.S. military facilities as a form of just retribution. 5 Enhances status. In that WMD have traditionally been possessed exclusively by state actors with well developed militaries, some groups might seek a chemical or biological weapons capability mainly as a symbol of power and status. This may be particularly true for nonstate actors such as terrorists. Aum leaders, for example, considered their organization a government and military in waiting. Acquiring and using biological (and chemical and even nuclear) weapons was seen as a rational step in the organization s development. Strategic Motivational Factors. Strategic motivational factors are largely concerned with the particular political, social, or religious goals and 5 Ibid. See also, Gary A. Ackerman and Kevin S. Moran, Bioterrorism and Threat Assessment. Center for Nonproliferation Studies, Monterey Institute of International Studies, The Weapons of Mass Destruction Commission, Report No 22, Available at: Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 4 of 6

5 objectives a group has established. They concern what the group seeks to achieve and how it intends to accomplish such ends. Incentives Causes specific outcomes. Attackers may use chemical or biological agents to attack because they believe such weapons have the ability to produce specific outcomes. The results most groups are likely to seek from such weapons are: mass casualties; economic damage; target contamination; generation of public fear; strategic function interruption for example, disrupting an essential service such as transportation by targeting key transit nodes; facilitation of terrorism proper by using a WMD attack to generate publicity, foster fear, and undermine public confidence in government officials; or a combination of the proceeding. Serves as a strong blackmail tool. Given the particularly strong public fears associated with chemical and biological attacks, some groups might seek to demonstrable such a capability primarily to leverage the threat of its use as a negotiating tactic. Helps build the organization. Non-state actors seeking to strengthen the image and status of their organization vis-à-vis other similar groups, might conduct chemical or biological attacks, specifically because so few attacks have been done to date. Tactical Motivational Factors. Tactical motivational factors directly concern the methods and techniques that a group employs to achieve its objectives. Incentives Exploits perceived target weaknesses. Accurate or not, a large amount of WMD related media has emphasized the vulnerability of modern society to chemical and (especially) biological attack. Such information might encourage attackers to consider CBW as an asymmetric attack that takes advantage of their enemies particular weaknesses. Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 5 of 6

6 Exploits target characteristics. Many military facilities store large quantities of toxic industrial chemicals (TICs) onsite. Attackers might specifically target such storage areas in an effort to use the chemicals as weapons against the facilities in which they are stored. Facilitates covert development and use. As discussed previously, chemical and biological weapons are extremely well suited for covert development and deployment. Attackers interested in maintaining secrecy for instrumental or operational reasons might find such attacks particularly attractive options. Makes use of dual-use technologies. Most equipment needed for the development of chemical and (especially) biological weapons is dual-use and can be easily acquired for justifiable purposes. Groups seeking a WMD capability may choose to pursue such weapons because of the relative ease with which such weapons production facilities can be established and because of the low security profile such facilities can maintain. Mimics previous attack. Some groups may seek to engage in chemical or biological terrorism simply because they are aware of previous successful or unsuccessful attacks conducted by other groups (e.g. Aum). A state might be particularly willing to attack using such weapons, if it believed it was responding in kind to a similar type of attack already conducted against it. Meets idiosyncratic needs. Some groups may pursue chemical or biological weapons largely because they are driven by a personal, idiosyncratic fascination regarding a specific weapon (or agent). Aum s leader Shoko Asahara, for example, is known to have been obsessed with sarin to the extent that he wrote songs about it. 6 6 See, for example, Jonathan Tucker, War of Nerves (XX:XX, 200X), pp. Xx-XX.s Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 6 of 6

PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER

PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER CARVER + SHOCK PRIMER 1 CARVER PLUS SHOCK METHOD FOR FOOD SECTOR VULNERABILITY ASSESSMENTS 1 Overview The CARVER plus Shock method is an offensive targeting prioritization tool that has been adapted for

More information

Modeling Terrorist Beliefs and Motivations

Modeling Terrorist Beliefs and Motivations CREATE Research Archive Research Project Summaries 2010 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, richardj@usc.edu Heather Rosoff University of Southern

More information

Kevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008

Kevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008 Evaluation of Methods for Drawing Inferences about Non-State Actors Perceptions of the Risks and Benefits of Seeking and Acquiring Weapons of Mass Destruction Kevin Murphy The Pennsylvania State University,

More information

OUR RECOMMENDED INDIVIDUAL S STRATEGY

OUR RECOMMENDED INDIVIDUAL S STRATEGY Chapter Four CONCLUSIONS OUR RECOMMENDED INDIVIDUAL S STRATEGY Our recommended strategy involves actions that individuals can take that can save lives, even in catastrophic terrorist attacks. This can

More information

White Paper. Human Behavior Analytics with Proxy Interrogatories

White Paper. Human Behavior Analytics with Proxy Interrogatories White Paper Human Behavior Analytics with Proxy Interrogatories Introduction Mission sets across defense, intelligence and security organizations would benefit from applying effective human behavior analytics

More information

The Impact of Emerging Infectious Diseases on Military Operations

The Impact of Emerging Infectious Diseases on Military Operations INSTITUTE FOR DEFENSE ANALYSES The Impact of Emerging Infectious Diseases on Military Operations 27 April 2016 Biological Medical Defense Conference Munich, GERMANY Julia K. Burr Robert L. Cubeta Jeffrey

More information

Module 2 - Public Health Preparedness

Module 2 - Public Health Preparedness Module 2 - Public Health Preparedness Objectives Define a public health emergency List examples of types of public health events and emergencies Overview Protecting the public from health threats involves

More information

Alternative Threat Methodology

Alternative Threat Methodology Volume 4 Number 1 Volume 4, No. 1: Spring 2011 Article 5 Alternative Threat Methodology Charles B. King III Transportation Security Administration, chas.king@dhs.gov Follow this and additional works at:

More information

Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory

Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory Forensic Issues Regarding the Analysis of Evidence in Support of Agroterrorism Investigations Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory 703-632-7770 mwilson@fbiacademy.edu

More information

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS Samah Mansoour School of Computing and Information Systems, Grand Valley State University, Michigan,

More information

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict Threat Assessment & Response to Mass Violence Mario J. Scalora, Ph.D. Agenda Brief Overview of Threat Assessment Principles Recent Trends in Targeted Violence Application to Mass Casualty Response Targeted

More information

PROTECTION IN A NUCLEAR EMERGENCY

PROTECTION IN A NUCLEAR EMERGENCY PROTECTION IN A NUCLEAR EMERGENCY There are 99 nuclear power reactors in the United States producing about one-quarter of the country s electricity. But around each plant is a 50-mile ring that could be

More information

Modeling Terrorist Beliefs and Motivations

Modeling Terrorist Beliefs and Motivations CREATE Research Archive Research Project Summaries 2009 Modeling Terrorist Beliefs and Motivations Richard John University of Southern California, richardj@usc.edu Heather Rosoff University of Southern

More information

MSc Enterprise Security and Digital Forensics. Examinations for / Semester 1

MSc Enterprise Security and Digital Forensics. Examinations for / Semester 1 MSc Enterprise Security and Digital Forensics Cohort: MESDF/16B/PT Examinations for 2016-2017 / Semester 1 MODULE: INFORMATION WARFARE AND SECURITY MANAGEMENT MODULE CODE: SECU5111C Duration: 3 Hours Reading

More information

The Threat of Agroterrorism and Zoonotic Diseases in the United States

The Threat of Agroterrorism and Zoonotic Diseases in the United States The Threat of Agroterrorism and Zoonotic Diseases in the United States Gary Alan Flory Gary.Flory@deq.virginia.gov http://garyflory.com Virginia Department of Environmental Quality, VA 22801, USA Written

More information

Unweaving the Web: Deception and Adaptation in Future Urban Operations

Unweaving the Web: Deception and Adaptation in Future Urban Operations SUMMARY Deception is widely appreciated as a powerful instrument of war, yet it is surprisingly understudied. There is much to be learned from the flexibility and innovation demonstrated at times by opposing

More information

Effectiveness of Radicalisation and Deradicalisation Concepts

Effectiveness of Radicalisation and Deradicalisation Concepts Effectiveness of Radicalisation and Deradicalisation Concepts Munir Zamir, Director, Fida Management & C7Email: munir@fidamanagement.com Twitter: @MunirZamir Key Considerations Do current R&DR discourses

More information

David Siegel MD FAAP Eunice Shriver National Institute of Child Health and Human Development

David Siegel MD FAAP Eunice Shriver National Institute of Child Health and Human Development David Siegel MD FAAP Eunice Shriver National Institute of Child Health and Human Development In the years following the September 11, 2001 terrorist attacks, the federal government, in collaboration with

More information

Towards a Sustainable Global Infrastructure for Medical Countermeasures

Towards a Sustainable Global Infrastructure for Medical Countermeasures Towards a Sustainable Global Infrastructure for Medical Countermeasures Institute of Medicine The Public Health Emergency Medical Countermeasures Enterprise: Innovative Strategies to Enhance Products from

More information

reward based power have ability to give you what you want. coercive have power to punish

reward based power have ability to give you what you want. coercive have power to punish Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator

More information

2.4: Air Power. Alex Montgomery

2.4: Air Power. Alex Montgomery 2.4: Air Power Alex Montgomery 2.4: Air Power Theories of Coercion and Deterrence Pape s Model of Coercion Predictions from the Model Testing the Model Definitions Coercion/Compellence: A threat to punish

More information

LIVING UNDER TERRORISM THREATS: SECURING OUR PUBLIC SPACES, MAINTAINING OUR FREEDOM

LIVING UNDER TERRORISM THREATS: SECURING OUR PUBLIC SPACES, MAINTAINING OUR FREEDOM LIVING UNDER TERRORISM THREATS: SECURING OUR PUBLIC SPACES, MAINTAINING OUR FREEDOM Husnul Fitri Doctoral Candidate at Dept. of Regional and City Planning Institut Teknologi Bandung - Indonesia They who

More information

RESEARCH PAPER. The psychological basis for terrorism and terrorists

RESEARCH PAPER. The psychological basis for terrorism and terrorists RESEARCH PAPER The psychological basis for terrorism and terrorists 2 1.0 Introduction The present research paper sheds light on the evidences that explain the psychological basis for terrorism and terrorists.

More information

Laboratory Biosecurity: A Survey of the U.S. Bioscience Community

Laboratory Biosecurity: A Survey of the U.S. Bioscience Community Article Applied Biosafety, 11(3) pp. 138-143 ABSA 2006 Laboratory Biosecurity: A Survey of the U.S. Bioscience Community Jennifer Gaudioso, Susan B. Rivera, Susan Caskey, and Reynolds M. Salerno Sandia

More information

Module 4: Emergencies: Prevention, Preparedness, Response and Recovery

Module 4: Emergencies: Prevention, Preparedness, Response and Recovery Module 4: Emergencies: Prevention, Preparedness, Response and Recovery Part 1: Introduction and Prevention Tamar: Hello, my name is Tamar Klaiman. I'm an Assistant Professor at the University of the Sciences

More information

SESHA--Graduate Lecture Series--Emerging Issues. Elizabeth Aton Washington University School of Medicine

SESHA--Graduate Lecture Series--Emerging Issues. Elizabeth Aton Washington University School of Medicine SESHA--Graduate Lecture Series--Emerging Issues Elizabeth Aton Washington University School of Medicine Elizabeth Aton Division of General Medical Sciences, Department of Internal Medicine, Campus Box

More information

Ostracism and Women in the Military

Ostracism and Women in the Military Ostracism and Women in the Military Kate McGraw, PhD Deputy Division Chief Psychological Health Center of Excellence National VA/DoD Women's Mental Health Mini-Residency: Building Clinical Expertise to

More information

Agent Based Simulation of Terrorist Attacks Protection of Potential Targets

Agent Based Simulation of Terrorist Attacks Protection of Potential Targets BERTSCHE AND SCHWARZ: AGENT BASED SIMULATION OF TERRORIST ATTACKS 439 Agent Based Simulation of Terrorist Attacks Protection of Potential Targets Karl A. Bertsche and Gunther Schwarz Business Development

More information

Proliferation Threats from Biotechnology: What is Dual-Use Research?

Proliferation Threats from Biotechnology: What is Dual-Use Research? Proliferation Threats from Biotechnology: What is Dual-Use Research? In Class Discussion Break into groups of 3, come up with definition dual use and present to class Biological Dual-Use Research Biotechnology

More information

Public Health Emergencies: Mass Dispensing in the Community

Public Health Emergencies: Mass Dispensing in the Community Public Health Emergencies: Mass Dispensing in the Community Chrissy Gamboa - Pinal County Public Health Chris Lyons, RN - Maricopa County Public Health Role of Public Health in an Disease prevention Emergency

More information

GOALS, OBJECTIVES, & STRATEGIES

GOALS, OBJECTIVES, & STRATEGIES GOALS, OBJECTIVES, & STRATEGIES HIGH PERFORMING ORGANIZATION Goal 1 Enhance the Bureau for Public Health s ability to function as an effective, efficient and flexible organization. a. Leadership skills

More information

THE PSYCHOLOGICAL ASPECT OF SAFETY CULTURE: APPLICATION OF THE THEORY OF GENERATIONS FOR THE FORMATION OF SAFETY CULTURE AMONG PERSONNEL

THE PSYCHOLOGICAL ASPECT OF SAFETY CULTURE: APPLICATION OF THE THEORY OF GENERATIONS FOR THE FORMATION OF SAFETY CULTURE AMONG PERSONNEL THE PSYCHOLOGICAL ASPECT OF SAFETY CULTURE: APPLICATION OF THE THEORY OF GENERATIONS FOR THE FORMATION OF SAFETY CULTURE AMONG PERSONNEL PROF. TATIANA MELNITCKAIA Affiliation Leading specialist, Central

More information

Continuity of Operations (COOP)

Continuity of Operations (COOP) Continuity of Operations (COOP) Bay Area InfraGard Chapter Meeting August 20, 2009 Presented by: James Macaulay, CEM DHS/FEMA Region IX Regional Continuity Program Manager 510.627.7009 August 6, 2009 What

More information

Defense Threat Reduction Agency 8725 John J. Kingman Road, MSC 6201 Fort Belvoir, VA Terrifying Landscapes:

Defense Threat Reduction Agency 8725 John J. Kingman Road, MSC 6201 Fort Belvoir, VA Terrifying Landscapes: Defense Threat Reduction Agency 8725 John J. Kingman Road, MSC 6201 Fort Belvoir, VA 22060-6201 Advanced Systems and Concepts Office FINAL REPORT Terrifying Landscapes: A Study of Scientific Research Into

More information

Coping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS

Coping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS Journal Submission: International Journal of Emergency Mental Health Published: Volume 5, Number 1, Winter 2003 Submitted by: Richard J. Ottenstein, Ph.D., CEAP, CTS Address: The Workplace Trauma Center

More information

Revised Prevent Duty Guidance: for England and Wales School Sector, 1 st July ASCL Cymru Council

Revised Prevent Duty Guidance: for England and Wales School Sector, 1 st July ASCL Cymru Council 1 Revised Prevent Duty Guidance: for England and Wales School Sector, 1 st July 2015 ASCL Cymru Council Cardiff Hilton, 9 th February 2016 Barrie Phillips, BiS HE/FE Prevent Coordinator (Wales) 2 Objectives:

More information

Business Continuity and Crisis Management. Cardinal Health s Approach

Business Continuity and Crisis Management. Cardinal Health s Approach Business Continuity and Crisis Management Cardinal Health s Approach Welcome We don t have ALL the answers Opportunity to share ideas Discussion around how we can work together to help prepare our communities,

More information

Agnieszka A. Gorzkowska-Sobas, PhD Senior researcher FFI Norwegian Defence Research Establishment, Division Comprehensive Defence, Kjeller, Norway

Agnieszka A. Gorzkowska-Sobas, PhD Senior researcher FFI Norwegian Defence Research Establishment, Division Comprehensive Defence, Kjeller, Norway Promotion of capacity building, through international cooperation, in biosafety and biosecurity to enhance preparedness and response capacities to outbreaks of infectious disease or biological weapons

More information

"Preparedness and Personal Awareness" - Albert Timen

Preparedness and Personal Awareness - Albert Timen For The Everyday Civilian The reality of Terrorism and Terror threats around us is not new, neither a surprising actuality, yet still the wave of events ranging from "Lone wolf" Active Shooter to a combined

More information

Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1

Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1 Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1 Theories and Theorists in Public Health Response to Bioterrorism Patricia Bolivar Walden University Research Theory, Design, and Method

More information

Program Priorities 2018

Program Priorities 2018 Program Priorities 2018 Blank Page 2 CONTENTS: About CPRIT Program Priorities Project...Page 5 Process to Develop Program Priorities...Page 6 Scope of Program Priorities Project...Page 6 CPRIT s Long-Term

More information

DEFINING THE ESOTERIC FACTORS OF DECISION MAKING IN INTELLIGENCE ANALYSIS

DEFINING THE ESOTERIC FACTORS OF DECISION MAKING IN INTELLIGENCE ANALYSIS Travis W. Jacox Clayton L. Niles Cohort 1 DEFINING THE ESOTERIC FACTORS OF DECISION MAKING IN INTELLIGENCE ANALYSIS Recently, a Marine LtCol was presenting a post deployment After Action Brief at the Marine

More information

FirstNet & NG9-1-1 The Future of End-To-End Public Safety Communication

FirstNet & NG9-1-1 The Future of End-To-End Public Safety Communication FirstNet & NG9-1-1 The Future of End-To-End Public Safety Communication Presented by: Bill Hinkle, FirstNet Senior 9-1-1 Advisor Bill.Hinkle@FirstNet.gov 202-641-5682 Jay English Director Comm. Center

More information

2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you?

2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you? One Health and All-Hazards: the New Environmental Health Christopher Eddy, MPH, REHS, RS, M.B.A. (candidate) Erik Balster, MPH, REHS, RS July 11, 2013 Next best thing to the Cover of the Rolling Stone?

More information

NEUROCOGNITIVE SEEDS OF RACIAL & ETHNIC DISCRIMINATION: IT S ALL IN THE MIND

NEUROCOGNITIVE SEEDS OF RACIAL & ETHNIC DISCRIMINATION: IT S ALL IN THE MIND ASHA 2013 Chicago NEUROCOGNITIVE SEEDS OF RACIAL & ETHNIC DISCRIMINATION: IT S ALL IN THE MIND Ahmed M. Abdelal, PhD., CCC-SLP Assistant Professor of Communication Sciences & Disorders Founder & Coordinator

More information

INTERNATIONAL NUCLEAR SAFEGUARDS ENGAGEMENT PROGRAM. National Nuclear Security Administration. Nuclear Safeguards

INTERNATIONAL NUCLEAR SAFEGUARDS ENGAGEMENT PROGRAM. National Nuclear Security Administration. Nuclear Safeguards 2017 INTERNATIONAL NUCLEAR SAFEGUARDS ENGAGEMENT PROGRAM National Nuclear Security Administration Nuclear Safeguards 1 Contents 1 2 4 6 The International Nuclear Safeguards Engagement Program About IAEA

More information

Establishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze

Establishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze Establishing a Best-in-Class Matthew Doherty, Senior Vice President, Hillard Heintze Agenda Employee Safety Is a Top Priority Protecting the Workplace What We Learned about Attackers Behavioral Threat

More information

Constructing a Three-Part Instrument for Emotional Intelligence, Social Intelligence and Learning Behavior

Constructing a Three-Part Instrument for Emotional Intelligence, Social Intelligence and Learning Behavior Constructing a Three-Part Instrument for Emotional Intelligence, Social Intelligence and Learning Behavior Mali Praditsang School of Education & Modern Language, College of Art & Sciences, Universiti Utara

More information

Enhancing Public Resilience to Mass-Casualty WMD Terrorism in the United States Definitions, Challenges, and Recommendations

Enhancing Public Resilience to Mass-Casualty WMD Terrorism in the United States Definitions, Challenges, and Recommendations Enhancing Public Resilience to Mass-Casualty WMD Terrorism in the United States Definitions, Challenges, and Recommendations Joshua H. Pollack Jason D. Wood Science Applications International Corporation

More information

Local Government Pandemic Influenza Planning. Mac McClendon, Chief / Office of Public Health Preparedness Emergency Management Coordinator

Local Government Pandemic Influenza Planning. Mac McClendon, Chief / Office of Public Health Preparedness Emergency Management Coordinator Local Government Pandemic Influenza Planning Mac McClendon, Chief / Office of Public Health Preparedness Emergency Management Coordinator Harris County Public Health & Environmental Service Veterinarian

More information

Modeling the Role of Theory of Mind in Social Interaction and Influence

Modeling the Role of Theory of Mind in Social Interaction and Influence Modeling the Role of Theory of Mind in Social Interaction and Influence David V. Pynadath Stacy Marsella The projects or efforts depicted were or are sponsored by the National Science Foundation, the Air

More information

Potential Threats from Biotechnology and Life Sciences: What is Dual-Use Research?

Potential Threats from Biotechnology and Life Sciences: What is Dual-Use Research? Potential Threats from Biotechnology and Life Sciences: What is Dual-Use Research? Adapted from presentation by Nonproliferation Education Program James Martin Center for Nonproliferation Studies Monterey

More information

Biological Warfare & Terrorism

Biological Warfare & Terrorism Biological Warfare & Terrorism COL Ted Cieslak, MC, USA Director, Clinical Services Division U.S. Army Medical Command Ft Sam Houston TX USAMRIID: A Unique National Resource Page 1 Page 2 USAMRIID 9/15/2011

More information

THE MULTI-SECTORAL APPROACH TO AIDS CONTROL IN UGANDA EXECUTIVE SUMMARY

THE MULTI-SECTORAL APPROACH TO AIDS CONTROL IN UGANDA EXECUTIVE SUMMARY THE MULTI-SECTORAL APPROACH TO AIDS CONTROL IN UGANDA EXECUTIVE SUMMARY Uganda AIDS Commission February 1993 EXECUTIVE SUMMARY 1. Introduction Background Information to AIDS in Uganda 1. AIDS was first

More information

Fifth report of Committee A

Fifth report of Committee A SIXTY-EIGHTH WORLD HEALTH ASSEMBLY (Draft) A68/73 26 May 2015 Fifth report of Committee A (Draft) Committee A held its twelfth and thirteenth meetings on 25 May 2015 under the chairmanship of Dr Eduardo

More information

Combating HIV/AIDS and stigmatisation

Combating HIV/AIDS and stigmatisation Goal and objectives Indicators Sources of verification Programme goal Health of vulnerable people has improved. Programme objective Georgian Red Cross has strengthened capacity to improve health of vulnerable

More information

Conversation with Tom Inglesby on October 2, 2013

Conversation with Tom Inglesby on October 2, 2013 Participants Conversation with Tom Inglesby on October 2, 2013 Tom Inglesby, M.D., Chief Executive Officer and Director, University of Pittsburgh Medical Center (UPMC) Center for Health Security Alexander

More information

NIGERIAN EXPERIENCE OF THE BIOLOGICAL AND TOXIN WEAPONS CONVENTION

NIGERIAN EXPERIENCE OF THE BIOLOGICAL AND TOXIN WEAPONS CONVENTION MEETING OF THE STATES PARTIES TO THE CONVENTION ON THE PROHIBITION OF THE DEVELOPMENT, PRODUCTION AND STOCKPILING OF BACTERIOLOGICAL (BIOLOGICAL) AND TOXIN WEAPONS AND ON THEIR DESTRUCTION BWC/MSP/2007/WP.8

More information

Science Applied to. Saving Lives. Uganda s Progress in. Implementing Lab. Biosafety / Biosecurity

Science Applied to. Saving Lives. Uganda s Progress in. Implementing Lab. Biosafety / Biosecurity Uganda s Progress in Science Applied to Implementing Lab Saving Lives Biosafety / Biosecurity Joel Peter Opio PHS Lab Biosafety, Biosecurity and Infrastructure [Presenter Name Presenter Title] U.S. Centers

More information

Flash War! AUTONOMOUS WEAPONS AND STRATEGIC STABILITY! Paul Scharre! Director, 20YY Future of Warfare Initiative!

Flash War! AUTONOMOUS WEAPONS AND STRATEGIC STABILITY! Paul Scharre! Director, 20YY Future of Warfare Initiative! Flash War! AUTONOMOUS WEAPONS AND STRATEGIC STABILITY! Paul Scharre! Director, 20YY Future of Warfare Initiative! Do Autonomous Weapons Pose Unique Challenges for Strategic Stability?! Lethal autonomous

More information

STRONG EMOTIONAL RESPONSES

STRONG EMOTIONAL RESPONSES STRONG EMOTIONAL RESPONSES A strong emotional response is created when an individual says or does something that makes us, as members of social groups, feel diminished, offended, threatened, stereotyped,

More information

Moving Towards a Continuum of Services. Plumas County Alcohol & Drug Strategic Planning Process DRAFT PLAN

Moving Towards a Continuum of Services. Plumas County Alcohol & Drug Strategic Planning Process DRAFT PLAN Moving Towards a Continuum of Services Plumas County Alcohol & Drug Strategic Planning Process DRAFT PLAN Summary Substance use, abuse and addiction range in intensity from experimentation to severe and

More information

The Effectiveness of Suicide Terrorism

The Effectiveness of Suicide Terrorism The Effectiveness of Suicide Terrorism Jibey Asthappan, The Richard Stockton College of New Jersey Killing more than 21, and injuring 5, between the years of 1981 and 28, suicide bombs have proven to be

More information

MARK SCHEME MAXIMUM MARK: 60

MARK SCHEME MAXIMUM MARK: 60 www.xtremepapers.com June 2003 INTERNATIONAL GCSE MARK SCHEME MAXIMUM MARK: 60 SYLLABUS/COMPONENT: 0495/01 SOCIOLOGY Paper 1 Page 1 Mark Scheme Syllabus Paper IGCSE EXAMINATIONS JUNE 2003 0495 1 1. People

More information

Implementing a National Biodefense Strategy

Implementing a National Biodefense Strategy Testimony Before the Committee on Homeland Security Subcommittee on Prevention of Nuclear and Biological Attack United States House of Representatives Implementing a National Biodefense Strategy Statement

More information

Chapter 14. Social Psychology. How Does the Social Situation Affect our Behavior? Social Psychology

Chapter 14. Social Psychology. How Does the Social Situation Affect our Behavior? Social Psychology Chapter 14 Social Psychology This multimedia product and its contents are protected under copyright law. The following are prohibited by law: Any public performance or display, including transmission of

More information

WHAT IS SELF? MODULE-IV OBJECTIVES 16.1 CONCEPT OF SELF. What is Self? Self and Personality. Notes

WHAT IS SELF? MODULE-IV OBJECTIVES 16.1 CONCEPT OF SELF. What is Self? Self and Personality. Notes What is Self? MODULE-IV 16 WHAT IS SELF? Self is focus of our everyday behaviour and all of us do have a set of perceptions and beliefs about ourselves. This kind of self concept plays important role in

More information

Resilience and the Threat of Terrorism Robert Brooks, Ph.D.

Resilience and the Threat of Terrorism Robert Brooks, Ph.D. Resilience and the Threat of Terrorism Robert Brooks, Ph.D. Fears about acts of terrorism have become prominent concerns in the lives of many individuals. We are reminded regularly of terrorist attacks

More information

REVISED CODEX GENERAL STANDARD FOR IRRADIATED FOODS CODEX STAN , REV

REVISED CODEX GENERAL STANDARD FOR IRRADIATED FOODS CODEX STAN , REV Irradiated foods Page 1 of 10 1. SCOPE REVISED CODEX GENERAL STANDARD FOR IRRADIATED FOODS CODEX STAN 106-1983, REV.1-2003 This standard applies to foods processed by ionizing radiation that is used in

More information

Re: Trust for America s Health Comments on Biennial Implementation Plan for the National Health Security Strategy

Re: Trust for America s Health Comments on Biennial Implementation Plan for the National Health Security Strategy Dr. Nicole Lurie, MD, MSPH Assistant Secretary for Preparedness & Response Department of Health and Human Services Washington, DC 20201 Re: Trust for America s Health Comments on Biennial Implementation

More information

New Effects-Based Operations Models in War Games. Lee W. Wagenhals Larry K. Wentz

New Effects-Based Operations Models in War Games. Lee W. Wagenhals Larry K. Wentz New Effects-Based Operations Models in War Games Lee W. Wagenhals Larry K. Wentz 2003 ICCRTS 8th International Command and Control Research and Technology Symposium June 19, 2002 National Defense University

More information

THE GLOBAL HEALTH SECURITY AGENDA. We have to change our mindsets and start thinking about biological threats as the security threats that they are.

THE GLOBAL HEALTH SECURITY AGENDA. We have to change our mindsets and start thinking about biological threats as the security threats that they are. THE GLOBAL HEALTH SECURITY AGENDA We have to change our mindsets and start thinking about biological threats as the security threats that they are. President Barack Obama September 26, 2014 1 Global Health

More information

Bioterrorism: Assessing the Threat

Bioterrorism: Assessing the Threat .United States House of Representatives Committee on Homeland Security Subcommittee on Emergency Preparedness, Response, and Communications Bioterrorism: Assessing the Threat Testimony of Tom Inglesby,

More information

Complexity, Networking, and Effects-Based Operations

Complexity, Networking, and Effects-Based Operations Complexity, Networking, and Effects-Based Operations Approaching the how to of EBO Dr. Ed Smith +1-703-872-4028 edward.a.smith-jr@boeing.com The Way Ahead Boeing Boeing 1 The Way Ahead 2 1. Why and What

More information

NEW HORIZONS IN BIOTERRORISM

NEW HORIZONS IN BIOTERRORISM NEW HORIZONS IN BIOTERRORISM WORKSHOP REPORT Arlington, VA 11-12 August 2008 September 17, 2008 PREPARED FOR: Office of the Secretary of Defense: Defense Research and Engineering (DDRE) & Rapid Reaction

More information

Section 11. Terrorism. Weapons of Mass Destruction

Section 11. Terrorism. Weapons of Mass Destruction Section 11 Terrorism Weapons of Mass Destruction Terrorism Terrorism is the unlawful use of force against persons or property to intimidate or coerce a government, the civilian population, or any segment

More information

College of Medicine. Behavioral Science

College of Medicine. Behavioral Science 152 YOU, ME, MYSELF, AND I: PSYCHOSOCIAL INFLUENCES ON HEALTH. (3) How do our individual thoughts, behaviors, and social interactions influence our health and wellbeing? In this interdisciplinary course,

More information

Enhancing Public Health Disease Surveillance, Detection, Diagnosis and Containment Capability in Nigeria.

Enhancing Public Health Disease Surveillance, Detection, Diagnosis and Containment Capability in Nigeria. Enhancing Public Health Disease Surveillance, Detection, Diagnosis and Containment Capability in Nigeria. A paper presented to the Meeting of Experts of States Parties to the Biological Weapons Convention,

More information

The Global Health Security Agenda. Ambassador Bonnie Jenkins U.S. Department of State

The Global Health Security Agenda. Ambassador Bonnie Jenkins U.S. Department of State The Global Health Security Agenda Ambassador Bonnie Jenkins U.S. Department of State THE GLOBAL HEALTH SECURITY AGENDA We have to change our mindsets and start thinking about biological threats as the

More information

THEORY OF UNIPOLAR POLITICS forthcoming at Cambridge University Press

THEORY OF UNIPOLAR POLITICS forthcoming at Cambridge University Press THEORY OF UNIPOLAR POLITICS forthcoming at Cambridge University Press Nuno P. Monteiro Assistant Professor Political Science Yale University nuno.monteiro@yale.edu July 9, 2013 Rationale and Scope Since

More information

Psychological Theories

Psychological Theories Psychological Theories Psychological explanations draw from basic concepts and principles: Mental processes (cognition, perception, and emotion) and their relations to an individual s personality, attitudes,

More information

Character Education Framework

Character Education Framework Character Education Framework March, 2018 Character Education: Building Positive Ethical Strength Character education is the direct attempt to foster character virtues the principles that inform decisionmaking

More information

General Douglas MacArthur Military Leadership Writing Competition

General Douglas MacArthur Military Leadership Writing Competition General Douglas MacArthur Military Leadership Writing Competition Major Hugh W. A. Jones Staff Section 24D Spring 2012 US Amy Command and General Staff College Anybody who says they're not afraid of war

More information

HOW TO IDENTIFY A RESEARCH QUESTION? How to Extract a Question from a Topic that Interests You?

HOW TO IDENTIFY A RESEARCH QUESTION? How to Extract a Question from a Topic that Interests You? Stefan Götze, M.A., M.Sc. LMU HOW TO IDENTIFY A RESEARCH QUESTION? I How to Extract a Question from a Topic that Interests You? I assume you currently have only a vague notion about the content of your

More information

Emergency Preparedness

Emergency Preparedness Emergency Preparedness EMERGENCY PREPAREDNESS ACADEMY RESPONSE GLOSSARY OF TERMS Adjuvant: A substance added to a vaccine to improve the immune response so that less vaccine is needed to provide protection.

More information

Vision. Mission. Hopelink s Values. Introduction. A community free of poverty

Vision. Mission. Hopelink s Values. Introduction. A community free of poverty Vision A community free of poverty Mission Hopelink s mission is to promote self-sufficiency for all members of our community; we help people make lasting change. Hopelink s Values Growth and Human Potential

More information

Design of the Autonomous Intelligent Simulation Model(AISM) using Computer Generated Force

Design of the Autonomous Intelligent Simulation Model(AISM) using Computer Generated Force Design of the Autonomous Intelligent Simulation Model(AISM) using Computer Generated Force SeongKee Lee, ChanGon Yoo, JungChan Park, JaeHyun Park, MyongGu Kang Directorate of Software Weapon Agency for

More information

Patterns of CBRN Use by Non-State Actors:

Patterns of CBRN Use by Non-State Actors: ISA 2013 Patterns of CBRN Use by Non-State Actors: Analyzing the Evidence Ronald Breiger 1 Paul Murray 1 Lauren Pinson 2 1 University of Arizona, Tucson, AZ 85718 2 National Consortium for the Study of

More information

Identifying the Operational Cultural Narrative

Identifying the Operational Cultural Narrative Identifying the Operational Cultural Narrative General sense that is important but Cultures are complex Rife with internal contradictions Multiple narratives Individuals within any particular group belong

More information

Accord-cadre (Framework Agreement)

Accord-cadre (Framework Agreement) Accord-cadre (Framework Agreement) Voici le texte original de l accord-cadre sans ses annexes. Des indications ont été supprimées à plusieurs endroits dans le texte et remplacées par le signe. Le caviardage

More information

Safer East Sussex Team Newsletter

Safer East Sussex Team Newsletter Safe in East Sussex Safer East Sussex Team Newsletter September 2014 In focus Prevent protecting vulnerable people from violent extremism Protecting the UK against Terrorism Prevent - an Introduction East

More information

Sociology Matters. Culture and Socialization. Culture and Socialization. What is Culture? What is Culture? 9/5/2012

Sociology Matters. Culture and Socialization. Culture and Socialization. What is Culture? What is Culture? 9/5/2012 2-2 Richard T. Schaefer Chapter Two: Culture and Socialization Sociology Matters Fifth Edition McGraw-Hill/Irwin Culture and Socialization 2-3 Culture and Socialization 2-4 What is Culture? Around the

More information

FAQ: An Organizational Vision. Question 1: Why is it important for a mission statement to be so succinct? Answer 1:

FAQ: An Organizational Vision. Question 1: Why is it important for a mission statement to be so succinct? Answer 1: FAQ: An Organizational Vision Question 1: Why is it important for a mission statement to be so succinct? Answer 1: The simpler the mission statement, the clearer the message. Think, for example, of a mission

More information

The Power to Change Your Life: Ten Keys to Resilient Living Robert Brooks, Ph.D.

The Power to Change Your Life: Ten Keys to Resilient Living Robert Brooks, Ph.D. The Power to Change Your Life: Ten Keys to Resilient Living Robert Brooks, Ph.D. The latest book I co-authored with my colleague Dr. Sam Goldstein was recently released. In contrast to our previous works

More information

TESTIMONY OF PHYLLIS ARTHUR, SENIOR DIRECTOR FOR VACCINES, IMMUNOTHERAPEUTICS AND DIAGNOSTICS POLICY, BIOTECHNOLOGY INDUSTRY ORGANIZATION (BIO)

TESTIMONY OF PHYLLIS ARTHUR, SENIOR DIRECTOR FOR VACCINES, IMMUNOTHERAPEUTICS AND DIAGNOSTICS POLICY, BIOTECHNOLOGY INDUSTRY ORGANIZATION (BIO) TESTIMONY OF PHYLLIS ARTHUR, SENIOR DIRECTOR FOR VACCINES, IMMUNOTHERAPEUTICS AND DIAGNOSTICS POLICY, BIOTECHNOLOGY INDUSTRY ORGANIZATION (BIO) SENATE HELP COMMITTEE May 17, 2011 Good morning Chairman

More information

Hospital Response to Natural Disasters : form Tsunami to Hurricane Katrina

Hospital Response to Natural Disasters : form Tsunami to Hurricane Katrina Hospital Response to Natural Disasters : form Tsunami to Hurricane Katrina Dr. WL Cheung Director Professional services & Operations Hospital Authority The Affected Tsunami Areas 2004 Tsunami 2004 Tsunami

More information

Detention and Reintegration Working Group. Workshop on Capacity Building and Training for the Appropriate Management of Violent Extremist Offenders

Detention and Reintegration Working Group. Workshop on Capacity Building and Training for the Appropriate Management of Violent Extremist Offenders Detention and Reintegration Working Group Workshop on Capacity Building and Training for the Appropriate Management of Violent Extremist Offenders 8-9 April 2015 Medan, Indonesia Summary Overview On 8-9

More information

POD RISK COMMUNICATION. How to help ensure that your emergency message is RECEIVED UNDERSTOOD and ACTED UPON!

POD RISK COMMUNICATION. How to help ensure that your emergency message is RECEIVED UNDERSTOOD and ACTED UPON! POD RISK COMMUNICATION How to help ensure that your emergency message is RECEIVED UNDERSTOOD and ACTED UPON! What Does the Public Want to Know about Infectious Disease Threats? How worried should they

More information

Public Safety and Health Cooperation from the Canadian Perspective

Public Safety and Health Cooperation from the Canadian Perspective 1 2 Public Safety and Health Cooperation from the Canadian Perspective Presentation by: Dr. Rainer Engelhardt Assistant Deputy Minister Infectious Disease Prevention and Control Public Health Agency of

More information

Toronto Mental Health and Addictions Supportive Housing Network TERMS OF REFERENCE

Toronto Mental Health and Addictions Supportive Housing Network TERMS OF REFERENCE 1 Toronto Mental Health and Addictions Supportive Housing Network BACKGROUND: TERMS OF REFERENCE The Toronto Mental Health and Addictions Supportive Housing Network (TMHASHN), is a network of organizations

More information