ATTACK MODALITIES. Draft 1 Charles P. Blair

Similar documents
PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER

Modeling Terrorist Beliefs and Motivations

Kevin Murphy The Pennsylvania State University, International Center for the Study of Terrorism. June 2008

OUR RECOMMENDED INDIVIDUAL S STRATEGY

White Paper. Human Behavior Analytics with Proxy Interrogatories

The Impact of Emerging Infectious Diseases on Military Operations

Module 2 - Public Health Preparedness

Alternative Threat Methodology

Mark R. Wilson, Ph.D. Chemical Biological Sciences Unit FBI Laboratory

TERRORIST WATCHER: AN INTERACTIVE WEB- BASED VISUAL ANALYTICAL TOOL OF TERRORIST S PERSONAL CHARACTERISTICS

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict

PROTECTION IN A NUCLEAR EMERGENCY

Modeling Terrorist Beliefs and Motivations

MSc Enterprise Security and Digital Forensics. Examinations for / Semester 1

The Threat of Agroterrorism and Zoonotic Diseases in the United States

Unweaving the Web: Deception and Adaptation in Future Urban Operations

Effectiveness of Radicalisation and Deradicalisation Concepts

David Siegel MD FAAP Eunice Shriver National Institute of Child Health and Human Development

Towards a Sustainable Global Infrastructure for Medical Countermeasures

reward based power have ability to give you what you want. coercive have power to punish

2.4: Air Power. Alex Montgomery

LIVING UNDER TERRORISM THREATS: SECURING OUR PUBLIC SPACES, MAINTAINING OUR FREEDOM

RESEARCH PAPER. The psychological basis for terrorism and terrorists

Laboratory Biosecurity: A Survey of the U.S. Bioscience Community

Module 4: Emergencies: Prevention, Preparedness, Response and Recovery

SESHA--Graduate Lecture Series--Emerging Issues. Elizabeth Aton Washington University School of Medicine

Ostracism and Women in the Military

Agent Based Simulation of Terrorist Attacks Protection of Potential Targets

Proliferation Threats from Biotechnology: What is Dual-Use Research?

Public Health Emergencies: Mass Dispensing in the Community

GOALS, OBJECTIVES, & STRATEGIES

THE PSYCHOLOGICAL ASPECT OF SAFETY CULTURE: APPLICATION OF THE THEORY OF GENERATIONS FOR THE FORMATION OF SAFETY CULTURE AMONG PERSONNEL

Continuity of Operations (COOP)

Defense Threat Reduction Agency 8725 John J. Kingman Road, MSC 6201 Fort Belvoir, VA Terrifying Landscapes:

Coping with Threats of Terrorism A Protocol for Group Intervention by Richard J. Ottenstein, Ph.D., CEAP, CTS

Revised Prevent Duty Guidance: for England and Wales School Sector, 1 st July ASCL Cymru Council

Business Continuity and Crisis Management. Cardinal Health s Approach

Agnieszka A. Gorzkowska-Sobas, PhD Senior researcher FFI Norwegian Defence Research Establishment, Division Comprehensive Defence, Kjeller, Norway

"Preparedness and Personal Awareness" - Albert Timen

Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1

Program Priorities 2018

DEFINING THE ESOTERIC FACTORS OF DECISION MAKING IN INTELLIGENCE ANALYSIS

FirstNet & NG9-1-1 The Future of End-To-End Public Safety Communication

2013 NEHA AEC July 9 11, One Health and All-Hazards: the New Environmental Health. Want this on you?

NEUROCOGNITIVE SEEDS OF RACIAL & ETHNIC DISCRIMINATION: IT S ALL IN THE MIND

INTERNATIONAL NUCLEAR SAFEGUARDS ENGAGEMENT PROGRAM. National Nuclear Security Administration. Nuclear Safeguards

Establishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze

Constructing a Three-Part Instrument for Emotional Intelligence, Social Intelligence and Learning Behavior

Enhancing Public Resilience to Mass-Casualty WMD Terrorism in the United States Definitions, Challenges, and Recommendations

Local Government Pandemic Influenza Planning. Mac McClendon, Chief / Office of Public Health Preparedness Emergency Management Coordinator

Modeling the Role of Theory of Mind in Social Interaction and Influence

Potential Threats from Biotechnology and Life Sciences: What is Dual-Use Research?

Biological Warfare & Terrorism

THE MULTI-SECTORAL APPROACH TO AIDS CONTROL IN UGANDA EXECUTIVE SUMMARY

Fifth report of Committee A

Combating HIV/AIDS and stigmatisation

Conversation with Tom Inglesby on October 2, 2013

NIGERIAN EXPERIENCE OF THE BIOLOGICAL AND TOXIN WEAPONS CONVENTION

Science Applied to. Saving Lives. Uganda s Progress in. Implementing Lab. Biosafety / Biosecurity

Flash War! AUTONOMOUS WEAPONS AND STRATEGIC STABILITY! Paul Scharre! Director, 20YY Future of Warfare Initiative!

STRONG EMOTIONAL RESPONSES

Moving Towards a Continuum of Services. Plumas County Alcohol & Drug Strategic Planning Process DRAFT PLAN

The Effectiveness of Suicide Terrorism

MARK SCHEME MAXIMUM MARK: 60

Implementing a National Biodefense Strategy

Chapter 14. Social Psychology. How Does the Social Situation Affect our Behavior? Social Psychology

WHAT IS SELF? MODULE-IV OBJECTIVES 16.1 CONCEPT OF SELF. What is Self? Self and Personality. Notes

Resilience and the Threat of Terrorism Robert Brooks, Ph.D.

REVISED CODEX GENERAL STANDARD FOR IRRADIATED FOODS CODEX STAN , REV

Re: Trust for America s Health Comments on Biennial Implementation Plan for the National Health Security Strategy

New Effects-Based Operations Models in War Games. Lee W. Wagenhals Larry K. Wentz

THE GLOBAL HEALTH SECURITY AGENDA. We have to change our mindsets and start thinking about biological threats as the security threats that they are.

Bioterrorism: Assessing the Threat

Complexity, Networking, and Effects-Based Operations

NEW HORIZONS IN BIOTERRORISM

Section 11. Terrorism. Weapons of Mass Destruction

College of Medicine. Behavioral Science

Enhancing Public Health Disease Surveillance, Detection, Diagnosis and Containment Capability in Nigeria.

The Global Health Security Agenda. Ambassador Bonnie Jenkins U.S. Department of State

THEORY OF UNIPOLAR POLITICS forthcoming at Cambridge University Press

Psychological Theories

Character Education Framework

General Douglas MacArthur Military Leadership Writing Competition

HOW TO IDENTIFY A RESEARCH QUESTION? How to Extract a Question from a Topic that Interests You?

Emergency Preparedness

Vision. Mission. Hopelink s Values. Introduction. A community free of poverty

Design of the Autonomous Intelligent Simulation Model(AISM) using Computer Generated Force

Patterns of CBRN Use by Non-State Actors:

Identifying the Operational Cultural Narrative

Accord-cadre (Framework Agreement)

Safer East Sussex Team Newsletter

Sociology Matters. Culture and Socialization. Culture and Socialization. What is Culture? What is Culture? 9/5/2012

FAQ: An Organizational Vision. Question 1: Why is it important for a mission statement to be so succinct? Answer 1:

The Power to Change Your Life: Ten Keys to Resilient Living Robert Brooks, Ph.D.

TESTIMONY OF PHYLLIS ARTHUR, SENIOR DIRECTOR FOR VACCINES, IMMUNOTHERAPEUTICS AND DIAGNOSTICS POLICY, BIOTECHNOLOGY INDUSTRY ORGANIZATION (BIO)

Hospital Response to Natural Disasters : form Tsunami to Hurricane Katrina

Detention and Reintegration Working Group. Workshop on Capacity Building and Training for the Appropriate Management of Violent Extremist Offenders

POD RISK COMMUNICATION. How to help ensure that your emergency message is RECEIVED UNDERSTOOD and ACTED UPON!

Public Safety and Health Cooperation from the Canadian Perspective

Toronto Mental Health and Addictions Supportive Housing Network TERMS OF REFERENCE

Transcription:

ATTACK MODALITIES Draft 1 Charles P. Blair ATTACK MODALITIES Attack Modalities refers to the actual methods and techniques that terrorists choose to employ to attack particular targets. There are several subfactors in this category, including Choice of Weapons, which is self-explanatory, and Choice of Tactical Methods, which refers to the actual mechanics used to approach the target, carry out the attack, and withdraw after the attack is carried out. Another is Insiders and Outsiders, which refers to whether the terrorist group has infiltrated its own personnel into the facility s workforce or managed to coopt someone who already works there, i.e., has assistance from an insider. For understandable reasons, attacks that are launched with inside help may well have a better chance of success. Depending upon the choice of targets, the potential array of attack modalities can be quite extensive and diverse. 2 1. Choice of Weapons (NON-AGENT / DEVICE / WEAPON), which is self-explanatory 2. Choice of Tactical Methods, actual mechanics used to approach the target, carry out the attack, and withdraw after the attack is carried out. This dovetails with other factors below. 3. Target Selection 1 This in progress work is largely based on the works of Jeffrey M. Bale. Specifically, most of his quotes are drawn from Bales excellent scholarship and analyses in, for example, Gary Ackerman, Praveen Abhayaratne, Jeffrey M. Bale, A Bhattacharjee, Charles P. Blair, L. Hansell, A. Jayne, Margaret Kosal, Sean Lucas, Keven S Moran, L. Seroki and Sundara. Vadlamudi, Assessing Terrorist Motivations for Attacking Critical Infrastructure. Lawrence Livermore National Laboratory, UCRL-TR-227068, January 2007, and Ackerman, Bale, Blair, Kosal, and Vadlamudi, Chemical & Biological Defense Multivariate Decision Support Tools, Weapons of Mass Destruction Terrorism Research Program (TRP), Center for Nonproliferation Studies, December 2004. See also, Gary A. Ackerman, Charles P. Blair, Jeffrey M. Bale, Victor Asal and R. Karl Rethemeyer, Anatomizing Radiological and Nuclear Non-State Adversaries: Identifying the Adversary, report prepared for the Science and Technology Directorate, Department of Homeland Security, grant number N00140510629 (College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism, 2009). See http://www.start.umd.edu/start/research/projects/project.asp?id=78 Last Updated July 2013. 2 Ibid.

Target Selection refers to the process by which terrorists first identify and later choose targets to attack. As experienced terrorism researchers know, different groups make decisions somewhat differently, if not in an entirely idiosyncratic manner. That said, this process of selection is normally involves several general stages. First, there is typically a preliminary planning phase in which more than one potential target is considered for attack. Second, those targets are all examined and evaluated, if possible via direct reconnaissance on the ground. If they still seem promising, they may be brought under more regular but discreet surveillance. Less promising targets are progressively weeded out and discarded, leaving only one (or a handful) to be decided upon. In the end, the actual targets are selected on the basis of their perceived importance, vulnerability, and suitability for accomplishing the group s aims. 3 4. Decision Making Entities 5. Attack Timing 6. Order of Attack Planning 7. Agent / Device / Weapon Type Options [CBRN Specific] 8. Agent / Device / Weapon Sub-Type Options 9. Specific Agent / Device / Weapon Selected 10. Acquisition of Materials a. Additional resources to devote b. Raw materials vs. intact weapon / device c. Source of Materials d. Particular knowledge regarding facilities where RN Materials Houses 11. Group s Weaponization of Agent / Device / Weapon(s) 12. Pre-attack Preparations a. Production of weapon /device b. Operational Team c. Familiarity with Targeting Environment(s) d. Target Surveillance e. Operational Security (OPSEC) 13. Ingress in / Egress from Target area 3 Ibid. Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 2 of 6

14. Experience with Inter/Intra-State Transfers 15. Insiders and Outsiders Insiders and Outsiders, which refers to whether the terrorist group has infiltrated its own personnel into the facility s workforce or managed to co-opt someone who already works there, i.e., has assistance from an insider. For understandable reasons, attack that are launched with inside help may well have a better chance of success. Depending upon the choice of targets, the potential array of attack modalities can be quite extensive and diverse. 4 16. Transport to Target Area(s) 17. Use of Agent / Weapon / Device 18. Escape Plan 19. Claims of Success / Responsibility 4 Ibid. Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 3 of 6

F. APPENDIX Ideological Motivational Factors. Ideological motivational factors are those main factors that frame the basic set of political, social, cultural and/or religious beliefs that members of a particular attacking group hold. In a rudimentary sense, these factors frame what a group is for and what it is against. Any assessment of such factors should include analysis of: general group attitudes and orientations; the substance of its espoused doctrines; and the near unconscious set of values and behavioral precepts the norms that group members have absorbed through their national, cultural and extremist associations. 1 Incentives Achieves goals in an ideologically consistent manner. Certain groups may perceive chemical or biological weapons to be uniquely well suited for achieving particular ends in an ideologically consistent fashion. Apocalyptic groups, for example, might consider biological agents a divine or natural tool for bringing about the end of the world. Racist groups might believe that certain pathogens can be used to selectively target specific populations. And still other extremist groups might seek to conduct chemical or biological attacks simply because of the WMD label associated with biological weapons holds out the promise of extreme, mass consequences. Groups believing that the U.S. military has used chemical or biological agents in the past, may deploy such weapons against U.S. military facilities as a form of just retribution. 5 Enhances status. In that WMD have traditionally been possessed exclusively by state actors with well developed militaries, some groups might seek a chemical or biological weapons capability mainly as a symbol of power and status. This may be particularly true for nonstate actors such as terrorists. Aum leaders, for example, considered their organization a government and military in waiting. Acquiring and using biological (and chemical and even nuclear) weapons was seen as a rational step in the organization s development. Strategic Motivational Factors. Strategic motivational factors are largely concerned with the particular political, social, or religious goals and 5 Ibid. See also, Gary A. Ackerman and Kevin S. Moran, Bioterrorism and Threat Assessment. Center for Nonproliferation Studies, Monterey Institute of International Studies, The Weapons of Mass Destruction Commission, Report No 22, 2006. Available at: http://www.un.org/disarmament/education/wmdcommission/files/no22.pdf Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 4 of 6

objectives a group has established. They concern what the group seeks to achieve and how it intends to accomplish such ends. Incentives Causes specific outcomes. Attackers may use chemical or biological agents to attack because they believe such weapons have the ability to produce specific outcomes. The results most groups are likely to seek from such weapons are: mass casualties; economic damage; target contamination; generation of public fear; strategic function interruption for example, disrupting an essential service such as transportation by targeting key transit nodes; facilitation of terrorism proper by using a WMD attack to generate publicity, foster fear, and undermine public confidence in government officials; or a combination of the proceeding. Serves as a strong blackmail tool. Given the particularly strong public fears associated with chemical and biological attacks, some groups might seek to demonstrable such a capability primarily to leverage the threat of its use as a negotiating tactic. Helps build the organization. Non-state actors seeking to strengthen the image and status of their organization vis-à-vis other similar groups, might conduct chemical or biological attacks, specifically because so few attacks have been done to date. Tactical Motivational Factors. Tactical motivational factors directly concern the methods and techniques that a group employs to achieve its objectives. Incentives Exploits perceived target weaknesses. Accurate or not, a large amount of WMD related media has emphasized the vulnerability of modern society to chemical and (especially) biological attack. Such information might encourage attackers to consider CBW as an asymmetric attack that takes advantage of their enemies particular weaknesses. Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 5 of 6

Exploits target characteristics. Many military facilities store large quantities of toxic industrial chemicals (TICs) onsite. Attackers might specifically target such storage areas in an effort to use the chemicals as weapons against the facilities in which they are stored. Facilitates covert development and use. As discussed previously, chemical and biological weapons are extremely well suited for covert development and deployment. Attackers interested in maintaining secrecy for instrumental or operational reasons might find such attacks particularly attractive options. Makes use of dual-use technologies. Most equipment needed for the development of chemical and (especially) biological weapons is dual-use and can be easily acquired for justifiable purposes. Groups seeking a WMD capability may choose to pursue such weapons because of the relative ease with which such weapons production facilities can be established and because of the low security profile such facilities can maintain. Mimics previous attack. Some groups may seek to engage in chemical or biological terrorism simply because they are aware of previous successful or unsuccessful attacks conducted by other groups (e.g. Aum). A state might be particularly willing to attack using such weapons, if it believed it was responding in kind to a similar type of attack already conducted against it. Meets idiosyncratic needs. Some groups may pursue chemical or biological weapons largely because they are driven by a personal, idiosyncratic fascination regarding a specific weapon (or agent). Aum s leader Shoko Asahara, for example, is known to have been obsessed with sarin to the extent that he wrote songs about it. 6 6 See, for example, Jonathan Tucker, War of Nerves (XX:XX, 200X), pp. Xx-XX.s Working Paper Charles P. Blair, Federation of American Scientists 01/11/13 Page 6 of 6