Sample records for detecting terrorist activity

  1. A data fusion approach to indications and warnings of terrorist attacks

    NASA Astrophysics Data System (ADS)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  2. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    PubMed Central

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  3. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    PubMed

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  4. In Search of Police Investigative Thinking Styles: An Exploratory Study of Detectives in Norway and Singapore

    ERIC Educational Resources Information Center

    Dean, Geoff; Fahsing, Ivar Andre; Gottschalk, Petter

    2007-01-01

    In this paper, we argue that more research attention needs to be devoted to profile how investigators think when attempting to solve crimes and dismantle terrorist networks. Since 9/11, there is much activity focused on profiling criminals and terrorists but little on the other side of the investigative equation the detectives/investigators…

  5. The adaptive safety analysis and monitoring system

    NASA Astrophysics Data System (ADS)

    Tu, Haiying; Allanach, Jeffrey; Singh, Satnam; Pattipati, Krishna R.; Willett, Peter

    2004-09-01

    The Adaptive Safety Analysis and Monitoring (ASAM) system is a hybrid model-based software tool for assisting intelligence analysts to identify terrorist threats, to predict possible evolution of the terrorist activities, and to suggest strategies for countering terrorism. The ASAM system provides a distributed processing structure for gathering, sharing, understanding, and using information to assess and predict terrorist network states. In combination with counter-terrorist network models, it can also suggest feasible actions to inhibit potential terrorist threats. In this paper, we will introduce the architecture of the ASAM system, and discuss the hybrid modeling approach embedded in it, viz., Hidden Markov Models (HMMs) to detect and provide soft evidence on the states of terrorist network nodes based on partial and imperfect observations, and Bayesian networks (BNs) to integrate soft evidence from multiple HMMs. The functionality of the ASAM system is illustrated by way of application to the Indian Airlines Hijacking, as modeled from open sources.

  6. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  7. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    PubMed Central

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-01-01

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted. PMID:27879941

  8. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    PubMed

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  9. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khan, M. Umer

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues,more » motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.« less

  10. Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities

    NASA Astrophysics Data System (ADS)

    Galitsky, Boris; Kovalerchuk, Boris

    2006-04-01

    We develop a software system Text Scanner for Emotional Distress (TSED) for helping to detect email messages which are suspicious of coming from people under strong emotional distress. It has been confirmed by multiple studies that terrorist attackers have experienced a substantial emotional distress at some points before committing a terrorist attack. Therefore, if an individual in emotional distress can be detected on the basis of email texts, some preventive measures can be taken. The proposed detection machinery is based on extraction and classification of emotional profiles from emails. An emotional profile is a formal representation of a sequence of emotional states through a textual discourse where communicative actions are attached to these emotional states. The issues of extraction of emotional profiles from text and reasoning about it are discussed and illustrated. We then develop an inductive machine learning and reasoning framework to relate an emotional profile to the class "Emotional distress" or "No emotional distress", given a training dataset where the class is assigned by an expert. TSED's machine learning is evaluated using the database of structured customer complaints.

  11. Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier

    PubMed Central

    Akram, M. Usman; Khan, Shoab A.; Javed, Muhammad Younus

    2014-01-01

    National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict key players from a covert network by applying a hybrid framework. The proposed system calculates certain centrality measures for each node in the network and then applies novel hybrid classifier for detection of key players. Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destabilize the involved network. As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network. PMID:25136674

  12. Organized Crime and Terrorist Activity in Mexico, 1999-2002

    DTIC Science & Technology

    2003-02-01

    ORGANIZED CRIME AND TERRORIST ACTIVITY IN MEXICO, 1999-2002 A Report Prepared by the Federal Research Division, Library of...REPORT DATE FEB 2003 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Organized Crime and Terrorist Activity in Mexico, 1999-2002...scope of organized crime and terrorist activity in the Republic of Mexico during the period 1999 to 2002, and the extent of cooperation and possible

  13. Two Models for Semi-Supervised Terrorist Group Detection

    NASA Astrophysics Data System (ADS)

    Ozgul, Fatih; Erdem, Zeki; Bowerman, Chris

    Since discovery of organization structure of offender groups leads the investigation to terrorist cells or organized crime groups, detecting covert networks from crime data are important to crime investigation. Two models, GDM and OGDM, which are based on another representation model - OGRM are developed and tested on nine terrorist groups. GDM, which is basically depending on police arrest data and “caught together” information and OGDM, which uses a feature matching on year-wise offender components from arrest and demographics data, performed well on terrorist groups, but OGDM produced high precision with low recall values. OGDM uses a terror crime modus operandi ontology which enabled matching of similar crimes.

  14. Optical and acoustical UAV detection

    NASA Astrophysics Data System (ADS)

    Christnacher, Frank; Hengy, Sébastien; Laurenzis, Martin; Matwyschuk, Alexis; Naz, Pierre; Schertzer, Stéphane; Schmitt, Gwenael

    2016-10-01

    Recent world events have highlighted that the proliferation of UAVs is bringing with it a new and rapidly increasing threat for national defense and security agencies. Whilst many of the reported UAV incidents seem to indicate that there was no terrorist intent behind them, it is not unreasonable to assume that it may not be long before UAV platforms are regularly employed by terrorists or other criminal organizations. The flight characteristics of many of these mini- and micro-platforms present challenges for current systems which have been optimized over time to defend against the traditional air-breathing airborne platforms. A lot of programs to identify cost-effective measures for the detection, classification, tracking and neutralization have begun in the recent past. In this paper, lSL shows how the performance of a UAV detection and tracking concept based on acousto-optical technology can be powerfully increased through active imaging.

  15. Military-Media Relationships: Analyzing U.S. Navy Officers’ Attitudes Towards the News Media

    DTIC Science & Technology

    2003-12-01

    Terrorist activities 4. Effect on reaching policy goals 5. Quality of life/Human casualties In order to understand if the military is sensitive to the...threats 19-2 51 55.43% Counter-terrorist activities 19-3 78 84.78% Military readiness 19-4 58 63.04% Effect on reaching policy goals...following issues? o Terrorist threats o Counter-terrorist activities o Military readiness o Effect on reaching policy goals o Physical damage o

  16. 31 CFR 1025.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...

  17. 31 CFR 1025.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...

  18. 31 CFR 1025.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...

  19. 31 CFR 1025.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...

  20. 31 CFR 1028.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...

  1. 31 CFR 1028.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...

  2. 31 CFR 1028.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...

  3. 31 CFR 1028.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...

  4. IMPROVED TECHNNOLOGY TO PREVENT ILLICIT TRAFFICKING IN NUCLEAR MATERIALS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Richardson, J H

    2005-07-20

    The proliferation of nuclear, chemical, and biological weapons (collectively known as weapons of mass destruction, or WMD) and the potential acquisition and use of WMD against the world by terrorists are extremely serious threats to international security. These threats are complex and interrelated. There are myriad routes to weapons of mass destruction--many different starting materials, material sources, and production processes. There are many possible proliferators--threshold countries, rogue states, state-sponsored or transnational terrorists groups, domestic terrorists, and even international crime organizations. Motives for acquiring and using WMD are similarly wide ranging--from a desire to change the regional power balance, deny accessmore » to a strategic area, or alter international policy to extortion, revenge, or hate. Because of the complexity of this threat landscape, no single program, technology, or capability--no silver bullet--can solve the WMD proliferation and terrorism problem. An integrated program is needed that addresses the WMD proliferation and terrorism problem from end to end, from prevention to detection, reversal, and response, while avoiding surprise at all stages, with different activities directed specifically at different types of WMD and proliferators. Radiation detection technologies are an important tool in the prevention of proliferation. A variety of new developments have enabled enhanced performance in terms of energy resolution, spatial resolution, predictive modeling and simulation, active interrogation, and ease of operation and deployment in the field. The radiation properties of nuclear materials, particularly highly enriched uranium (HEU), make the detection of smuggled nuclear materials technically difficult. A number of efforts are under way to devise improved detector materials and instruments and to identify novel signatures that could be detected. Key applications of this work include monitoring for radioactive materials at choke points, searching for nuclear materials, and developing instruments for response personnel.« less

  5. Transmission Line Security Monitor

    ScienceCinema

    None

    2017-12-09

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  6. 31 CFR 1021.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...

  7. 31 CFR 1021.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...

  8. 31 CFR 1021.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...

  9. 31 CFR 1021.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...

  10. 31 CFR 1024.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... to deter money laundering and terrorist activity for mutual funds. 1024.520 Section 1024.520 Money... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR MUTUAL FUNDS Special Information Sharing Procedures... deter money laundering and terrorist activity for mutual funds. (a) Refer to § 1010.520 of this chapter...

  11. From IEDs to AIDS? Detection of HIV in human corpses by rapid screening tests after suspected intentional transmission in terrorist attacks.

    PubMed

    Frickmann, Hagen; Wulff, B; Loderstædt, U; Hagen, R M; Sturm, D; Polywka, S

    2013-12-01

    We evaluated the feasibility of intentional transmission of HIV by means of suicide bombing and rape as a terrorist tactic in asymmetric conflicts by evaluating the recognised optimum conditions for biological warfare. We also estimated the suitability of a fourth-generation rapid test for HIV detection in the blood of dead terrorists killed in the completion of their mission. The feasibility of deliberate transmission of HIV for terroristic ends was evaluated on the basis of published experience from passive biological warfare research. In addition, blood from four recently deceased HIV-positive patients and four HIV-negative control corpses, stored at 4°C in a mortuary, was analysed at 12, 24, 36 and 48 h postmortem by rapid serological testing. The feasibility of HIV infection for terroristic purposes was established. The fourth-generation HIV rapid test we evaluated identified all HIV-positive samples and was negative for all HIV-negative samples. Rapid HIV testing from the remains of dead terrorists in the deployed military environment is possible. Samples should be acquired quickly, basic sample preparation is advisable and consequent decisions concerning postexposure prophylaxis should take into account the diagnostic gap in early infections.

  12. 31 CFR 103.100 - Information sharing between Federal law enforcement agencies and financial institutions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... FOREIGN TRANSACTIONS Special Information Sharing Procedures To Deter Money Laundering and Terrorist... money laundering—(1) In general. A law enforcement agency investigating terrorist activity or money... suspected based on credible evidence of engaging in, terrorist activity or money laundering; include enough...

  13. 75 FR 6560 - Financial Crimes Enforcement Network; Expansion of Special Information Sharing Procedures To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-10

    ...; Expansion of Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity AGENCY... continuing effort to increase the efficiency and effectiveness of its anti-money laundering and counter...-5332, to promote the prevention, detection, and prosecution of international money laundering and the...

  14. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    NASA Astrophysics Data System (ADS)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  15. Terrorism in Canada.

    PubMed

    Kollek, Daniel

    2003-01-01

    This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.

  16. Analysis of the Use of Unmanned Combat Aerial Vehicles in Conjunction with Manned Aircraft to Counter Active Terrorists in Rough Terrain

    DTIC Science & Technology

    2015-06-01

    UCAVs) may enhance Turkey’s ability to counter active terrorists in that region. In this research, Map Aware Non-uniform Automata (MANA) is used to...Aerial Vehicles (UCAVs) may enhance Turkey’s ability to counter active terrorists in that region. In this research, Map Aware Non-uniform Automata (MANA...Attack Munition LOS Line-of-Sight MALE Medium-Altitude Long-Endurance MANA Map Aware Non-Uniform Automata MANA-V Map Aware Non-Uniform Automata

  17. 75 FR 60377 - Financial Crimes Enforcement Network; Cross-Border Electronic Transmittals of Funds

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... Treasury (Treasury), to further its efforts against money laundering and terrorist financing, and is... regulatory authorities detect, investigate, and prosecute money laundering and other financial crimes by... at national and international levels, to combat money laundering and terrorist financing. See...

  18. Active Shooters: Is Law Enforcement Ready for a Mumbai Style Attack?

    DTIC Science & Technology

    2013-09-01

    wolves and small terrorist cells ” represented the nation’s biggest terrorist threat because their low profile made it difficult to intervene or...and small terrorist cells ” represent the nation’s biggest terrorist threat because their low profile making it difficult to intervene before they act...conversation on his cell phone, “…Everything is being 38 recorded by the media. Inflict the maximum damage. Keepfighting. Don’t be taken alive

  19. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    ERIC Educational Resources Information Center

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  20. Detection of nerve gases using surface-enhanced Raman scattering substrates with high droplet adhesion

    NASA Astrophysics Data System (ADS)

    Hakonen, Aron; Rindzevicius, Tomas; Schmidt, Michael Stenbæk; Andersson, Per Ola; Juhlin, Lars; Svedendahl, Mikael; Boisen, Anja; Käll, Mikael

    2016-01-01

    Threats from chemical warfare agents, commonly known as nerve gases, constitute a serious security issue of increasing global concern because of surging terrorist activity worldwide. However, nerve gases are difficult to detect using current analytical tools and outside dedicated laboratories. Here we demonstrate that surface-enhanced Raman scattering (SERS) can be used for sensitive detection of femtomol quantities of two nerve gases, VX and Tabun, using a handheld Raman device and SERS substrates consisting of flexible gold-covered Si nanopillars. The substrate surface exhibits high droplet adhesion and nanopillar clustering due to elasto-capillary forces, resulting in enrichment of target molecules in plasmonic hot-spots with high Raman enhancement. The results may pave the way for strategic life-saving SERS detection of chemical warfare agents in the field.Threats from chemical warfare agents, commonly known as nerve gases, constitute a serious security issue of increasing global concern because of surging terrorist activity worldwide. However, nerve gases are difficult to detect using current analytical tools and outside dedicated laboratories. Here we demonstrate that surface-enhanced Raman scattering (SERS) can be used for sensitive detection of femtomol quantities of two nerve gases, VX and Tabun, using a handheld Raman device and SERS substrates consisting of flexible gold-covered Si nanopillars. The substrate surface exhibits high droplet adhesion and nanopillar clustering due to elasto-capillary forces, resulting in enrichment of target molecules in plasmonic hot-spots with high Raman enhancement. The results may pave the way for strategic life-saving SERS detection of chemical warfare agents in the field. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr06524k

  1. 18 CFR 260.9 - Reports by natural gas pipeline companies on service interruptions and damage to facilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...

  2. 18 CFR 260.9 - Reports by natural gas pipeline companies on service interruptions and damage to facilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...

  3. 18 CFR 260.9 - Reports by natural gas pipeline companies on service interruptions and damage to facilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...

  4. 18 CFR 260.9 - Reports by natural gas pipeline companies on service interruptions and damage to facilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...

  5. 75 FR 75607 - Notice of Availability of Final Interpretative Guidance-Sharing Suspicious Activity Reports by...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... law or regulation, or a suspicious activity related to money laundering, terrorist financing, or other...). \\2\\ The Annunzio-Wylie Anti-Money Laundering Act of 1992 (the Annunzio-Wylie Act), amended the BSA... authorized the sharing of information relating to suspected terrorist or money laundering activities between...

  6. An Analysis of the Development and Effectiveness of the United States Border Patrol Strategic Plans, 1994-2013

    DTIC Science & Technology

    2013-06-13

    Security 2009, 4). Additionally, CBP is the component within the DHS that serves as America’s first line of defense to detect and prevent terrorist and...especially smugglers of humans and drugs. The USBP’s concentration of efforts and resources shifted to preventing terrorists and their weapons from

  7. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    PubMed

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  8. Nano-Structured Solids and Heterogeneous Catalysts: Powerful Tools for the Reduction of CBRN Threats

    NASA Astrophysics Data System (ADS)

    Guidotti, M.; Rossodivita, A.; Ranghieri, M. C.

    In the field of non-conventional CBRN weapons, the recent rapid development of nanotechnology and catalysis over nanosized solids provides innovative tools for the detection, protection and decontamination against these threats. By improving the efficiency of the countermeasures and by minimizing the negative effects of a deliberate use of CBRN agents, the practical application of the new technologies will readily represent a step forward in lowering the vulnerability of the civilian populations and in preventing the use of mass destruction weapons by terrorist groups or by `rogue states' supporting terrorists' activity. In such scenario, some relevant examples of nanosystems applied to the defense from non-conventional warfare agents will be here presented and commented. The key role of nanotechnology and heterogeneous catalysis for a multidisciplinary approach in counteracting CBRN threats will be highlighted too.

  9. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  10. 22 CFR 40.32 - Terrorist activities. [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Terrorist activities. [Reserved] 40.32 Section 40.32 Foreign Relations DEPARTMENT OF STATE VISAS REGULATIONS PERTAINING TO BOTH NONIMMIGRANTS AND IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Security and Related Grounds § 40.32...

  11. 78 FR 12420 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-22

    ... of Special Information Sharing Procedures to Deter Money Laundering and Terrorist Activity. Abstract... efficiency and effectiveness of its anti-money laundering and counter- terrorist financing policies. Affected...

  12. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    ERIC Educational Resources Information Center

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  13. 31 CFR 103.110 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Information Sharing Procedures To Deter Money Laundering and Terrorist Activity § 103.110 Voluntary.... 5312(a)(2) that is required under this part to establish and maintain an anti-money laundering program... suspects may involve possible terrorist activity or money laundering. (2) Notice requirement. A financial...

  14. 31 CFR 1023.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...

  15. 31 CFR 1023.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...

  16. 31 CFR 1023.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...

  17. 31 CFR 1023.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...

  18. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Medina, Richard M; Siebeneck, Laura K.; Hepner, George F.

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  19. Purpose-Driven Communities in Multiplex Networks: Thresholding User-Engaged Layer Aggregation

    DTIC Science & Technology

    2016-06-01

    dark networks is a non-trivial yet useful task. Because terrorists work hard to hide their relationships/network, analysts have an incomplete picture...them identify meaningful terrorist communities. This thesis introduces a general-purpose algorithm for community detection in multiplex dark networks...aggregation, dark networks, conductance, cluster adequacy, mod- ularity, Louvain method, shortest path interdiction 15. NUMBER OF PAGES 155 16. PRICE CODE

  20. 31 CFR 1026.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...

  1. 31 CFR 1026.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...

  2. 31 CFR 1026.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...

  3. 31 CFR 1026.520 - Special information sharing procedures to deter money laundering and terrorist activity for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...

  4. 31 CFR 1022.520 - Special information sharing procedures to deter money laundering and terrorist activity for money...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...

  5. 31 CFR 1022.520 - Special information sharing procedures to deter money laundering and terrorist activity for money...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...

  6. 31 CFR 1022.520 - Special information sharing procedures to deter money laundering and terrorist activity for money...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...

  7. 31 CFR 1022.520 - Special information sharing procedures to deter money laundering and terrorist activity for money...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...

  8. Proactive Guide for the Threat of Terrorism in Schools.

    ERIC Educational Resources Information Center

    Texas School Safety Center, San Marcos.

    Although American schools have not been targeted for terrorist activity, circumstances do warrant that schools adopt a heightened state of awareness. This guide addresses the potential for terrorist activity within the context of September 11, 2001, and the new reality America faces. A significant portion of the information in this guide was…

  9. Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven

    DTIC Science & Technology

    2011-06-03

    havens—such as activities funded through State’s Peacekeeping Operations and State-funded DHS training to combat money laundering and bulk cash...Management, Committee on Homeland Security House of Representatives COMBATING TERRORISM U.S. Government Strategies and Efforts to Deny Terrorists... Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hoffman, B.

    This report examines recent trends and future prospects of terrorism in the United States and assesses their implications for the possibility of a terrorist group attempting an act of nuclear terrorism involving either the theft of a weapons system or strategic nuclear material or an attack on a weapons facility. An emerging trend of ideologically motivated terrorism by groups espousing white supremacist and anti-federalist beliefs or opposing specific issues such as abortion has largely supplanted the ethnic centered violence that dominated earlier domestic terrorist activity. The threat to U.S. nuclear weapons facilities from unknown terrorist groups in this country cannotmore » be considered high at this time. There is no evidence to suggest that any of the organizations reviewed in this study have seriously contemplated a nuclear-related act, nor is there any indication that any group is poised to undertake such an attack in the future. Nevertheless, trends in the terrorist activities of certain groups must be considered in the context of possible operations directed against nuclear weapons sites. Members of these groups are considerably more skilled with weapons than are other terrorist in this country, they possess large stockpiles of sophisticated weapons, they are well trained guerrilla warfare and survival techniques, and they possess an apocalyptic vision of the future-factors that make them the most likely domestic terrorists to attempt an act of nuclear terrorism. In sum, while the volume of annual terrorist incidents in the United States is relatively small, the emerging trends merit intensive and continuing attention.« less

  11. 31 CFR 1029.520 - Special information sharing procedures to deter money laundering and terrorist activity for loan...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for loan or finance companies. 1029.520 Section 1029.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...

  12. 31 CFR 1029.520 - Special information sharing procedures to deter money laundering and terrorist activity for loan...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for loan or finance companies. 1029.520 Section 1029.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...

  13. 31 CFR 1029.520 - Special information sharing procedures to deter money laundering and terrorist activity for loan...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for loan or finance companies. 1029.520 Section 1029.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...

  14. JPRS Report, Near East & South Asia

    DTIC Science & Technology

    1989-01-05

    in the field of war production reflects on civilian activity . Success in producing a satellite-carrying rocket could serve the civilian...sives for use in their terrorist operations against the citizens and the police. Among the strange activities of the terrorists is the formation of...responsible in the field . He has his jail and his court system . We do not interfere.

  15. 76 FR 12209 - Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ..., a recent history of violent terrorist activity in the geographic area in which the transportation is...-oriented security concern'' that requires an employee to travel on a company plane for business and... history of violent terrorist activity in the geographic area in which the transportation is provided, or a...

  16. Evaluation of Terrorist Interest in Radioactive Wastes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McFee, J.N.; Langsted, J.M.; Young, M.E.

    2006-07-01

    Since September 11, 2001, intelligence gathered from Al Qaeda training camps in Afghanistan, and the ensuing terrorist activities, indicates nuclear material security concerns are valid. This paper reviews available information on sealed radioactive sources thought to be of interest to terrorists, and then examines typical wastes generated during environmental management activities to compare their comparative 'attractiveness' for terrorist diversion. Sealed radioactive sources have been evaluated in numerous studies to assess their security and attractiveness for use as a terrorist weapon. The studies conclude that tens of thousands of curies in sealed radioactive sources are available for potential use in amore » terrorist attack. This risk is mitigated by international efforts to find lost and abandoned sources and bring them under adequate security. However, radioactive waste has not received the same level of scrutiny to ensure security. This paper summarizes the activity and nature of radioactive sources potentially available to international terrorists. The paper then estimates radiation doses from use of radioactive sources as well as typical environmental restoration or decontamination and decommissioning wastes in a radioactive dispersal device (RDD) attack. These calculated doses indicate that radioactive wastes are, as expected, much less of a health risk than radioactive sources. The difference in radiation doses from wastes used in an RDD are four to nine orders of magnitude less than from sealed sources. We then review the International Atomic Energy Agency (IAEA) definition of 'dangerous source' in an adjusted comparison to common radioactive waste shipments generated in environmental management activities. The highest waste dispersion was found to meet only category 1-3.2 of the five step IAEA scale. A category '3' source by the IAEA standard 'is extremely unlikely, to cause injury to a person in the immediate vicinity'. The obvious conclusion of the analysis is that environmental management generated radioactive wastes have substantially less impact than radioactive sources if dispersed by terrorist-induced explosion or fire. From a health standpoint, the impact is very small. However, there is no basis to conclude that wastes are totally unattractive for use in a disruptive or economic damage event. Waste managers should be cognizant of this potential and take measures to ensure security of stored waste and waste shipments. (authors)« less

  17. The Development of Decision Aids for Counter-Terrorist Applications

    DTIC Science & Technology

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  18. Preparing Schools for Terrorist Attacks.

    ERIC Educational Resources Information Center

    School Safety, 1991

    1991-01-01

    Outlines 21 actions, both immediate and over the long term, that administrators can take to protect students and schools from terrorist activities. Includes establishing a chain of command, a command post, a crisis response team, a communications staff, and inservice training. (four references) (MLF)

  19. Current technologies for detection of ricin in different matrices

    USDA-ARS?s Scientific Manuscript database

    Ricin is a convenient, potent, and available toxin for terrorist acts. The importance of detecting it in various matrices is obvious. This chapter reviews methods for ricin detection based on the mechanisms used for assay development. Five detection approaches are reviewed: 1. Antibody-based metho...

  20. Myths and realities of female-perpetrated terrorism.

    PubMed

    Jacques, Karen; Taylor, Paul J

    2013-02-01

    The authors examined the backgrounds and social experiences of female terrorists to test conflicting accounts of the etiology of this offending group. Data on 222 female terrorists and 269 male terrorists were examined across 8 variables: age at first involvement, educational achievement, employment status, immigration status, marital status, religious conversion, criminal activity, and activist connections. The majority of female terrorists were found to be single, young (<35 years old), native, employed, educated to at least secondary level, and rarely involved in criminality. Compared with their male counterparts, female terrorists were equivalent in age, immigration profile, and role played in terrorism, but they were more likely to have a higher education attainment, less likely to be employed, and less likely to have prior activist connections. The results clarify the myths and realities of female-perpetrated terrorism and suggest that the risk factors associated with female involvement are distinct from those associated with male involvement.

  1. Age and Terrorist Victimization.

    ERIC Educational Resources Information Center

    Trela, James; Hewitt, Christopher

    While research has examined how age-related factors structure the probability of experiencing a particular event or suffering a particular kind of injury, one issue which has not been empirically addressed is the age structure of victimization from terrorist activity and civil strife. To explore the relationship between age and terrorist…

  2. Stolen Vehicles for Export: A Major Concern for Domestic and International Security

    DTIC Science & Technology

    2018-03-01

    Terrorists and Organized Crime Join Forces,” New York Times, May 24, 2005. 5 Bryan Bender, “Stolen U.S. Vehicles End up as Bombs in Iraq, FBI Says,” New...also trafficked to finance other crimes. They can also be used as bomb carriers or in the perpetration of other crimes.31 In an effort to address...as VBIEDs in terrorist activities, but it is believed to be in the dozens.67 “A car bomb is the absolute favorite delivery methods of terrorists

  3. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    DTIC Science & Technology

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  4. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

    DTIC Science & Technology

    2007-01-01

    signed bit string composed of a photograph or some other biometric; the identification name or number; and information about the date, time, and...Also, a person who looked sufficiently like the person in the photograph on the card could use an exact copy of a valid card (although, with other...Afghanistan in the early 1990s, al Qaeda provided instruction in using cameras and how to develop photographs without being detected (United States v

  5. Immunosorbent analysis of ricin contamination in milk using colorimetric, chemiluminescence, and electrochemiluminescence detection

    USDA-ARS?s Scientific Manuscript database

    Analytical methodology to detect ricin in food matrices is important because of the potential use of foodborne ricin as a terrorist weapon. Monoclonal antibodies (mAbs) that bind ricin were used for both capture and detection in sandwich enzyme-linked immunosorbent assay (ELISA) and electrochemilumi...

  6. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    PubMed

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  7. Designating Domestic Terrorist Individuals or Groups

    DTIC Science & Technology

    2010-09-01

    77 V. STOP HUNTINGDON ANIMAL CRUELTY (SHAC) CASE STUDY: A FOCUS ON THE VULNERABILITIES...designated terrorist SHAC Stop Huntingdon Animal Cruelty SMART Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking SORNA...generalizations (p. 136). The first case study analyzed the activities of an Animal Rights Extremist Group known as Stop Huntingdon Animal Cruelty (SHAC

  8. Terrorism in Britain: On the Limits of Free Expression.

    ERIC Educational Resources Information Center

    Jaehnig, Walter B.

    The recent rise in political terrorism has brought to light the conflict between the government's duty to maintain order and the subsequent suspension of the news media's right to report the terrorists' activities to the public. Terrorists recognize that the surest guarantee of publicity for their cause lies in a shocking appeal to traditional…

  9. 76 FR 43585 - Bank Secrecy Act Regulations; Definitions and Other Regulations Relating to Money Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... international terrorism.'' \\1\\ In addition, the Secretary is authorized to impose anti-money laundering (``AML... the MSB from being used to facilitate money laundering and the financing of terrorist activities; \\7... businesses posed a high risk of money laundering and terrorist financing. In 2006, FinCEN issued an advance...

  10. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    PubMed

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  11. Applying face identification to detecting hijacking of airplane

    NASA Astrophysics Data System (ADS)

    Luo, Xuanwen; Cheng, Qiang

    2004-09-01

    That terrorists hijacked the airplanes and crashed the World Trade Center is disaster to civilization. To avoid the happening of hijack is critical to homeland security. To report the hijacking in time, limit the terrorist to operate the plane if happened and land the plane to the nearest airport could be an efficient way to avoid the misery. Image processing technique in human face recognition or identification could be used for this task. Before the plane take off, the face images of pilots are input into a face identification system installed in the airplane. The camera in front of pilot seat keeps taking the pilot face image during the flight and comparing it with pre-input pilot face images. If a different face is detected, a warning signal is sent to ground automatically. At the same time, the automatic cruise system is started or the plane is controlled by the ground. The terrorists will have no control over the plane. The plane will be landed to a nearest or appropriate airport under the control of the ground or cruise system. This technique could also be used in automobile industry as an image key to avoid car stealth.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martin, Audrey Noreen

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are notmore » commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid phase microextraction (SPME) and identified using gas chromatography - mass spectrometry (GC-MS). Modifications to the sampling apparatus allowed for increased VOC collection efficiency, and reduced the time of sampling and analysis by over 25%. The VOCs are present in breath due to either endogenous production, or exposure to an external source through absorption, inhalation, or ingestion. Detection of these exogenous chemicals can provide information on the prior location and activities of the subject. Breath samples collected before and after exposure in a hardware store and nail salon were analyzed to investigate the prior location of a subject; breath samples collected before and after oral exposure to terpenes and terpenoid compounds, pseudoephedrine, and inhalation exposure to hexamine and other explosive related compounds were analyzed to investigate the prior activity of a subject. The elimination of such compounds from the body was also monitored. In application, this technique may provide an early warning system to identify persons of interest in the prevention and preemption stages of homeland security.« less

  13. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  14. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  15. Applying Science and Technology to Combat WMD Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wuest, C R; Werne, R W; Colston, B W

    2006-05-04

    Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This papermore » provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.« less

  16. Applying science and technology to combat WMD terrorism

    NASA Astrophysics Data System (ADS)

    Wuest, Craig R.; Werne, Roger W.; Colston, Billy W.; Hartmann-Siantar, Christine L.

    2006-05-01

    Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This paper provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.

  17. A data-stream classification system for investigating terrorist threats

    NASA Astrophysics Data System (ADS)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  18. Proximal detection of energetic materials on fabrics by UV-Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Chirico, R.; Almaviva, S.; Colao, F.; Fiorani, L.; Nuvoli, M.; Schweikert, W.; Schnürer, F.; Cassioli, L.; Grossi, S.; Mariani, L.; Angelini, F.; Menicucci, I.; Palucci, A.

    2014-05-01

    In the last decades there have been several terroristic attacks with improvised explosive devices (IED) that have raised the need for new instrumentation, for homeland security applications, to obtain a reliable and effective fight against terrorism. Public transportation has been around for about 150 years, but terroristic attacks against buses, trains, subways, etc., is a relatively recent phenomenon [1]. Since 1970, transportation has been an increasingly attractive target for terrorists. Most of the attacks to transport infrastructures take place in countries where public transportation is the primary way to move. Terrorists prefer to execute a smaller-scale attack with certainty of success rather than a complex and demanding operation to cause massive death and destruction. [1]. Many commonly available materials, such as fertilizer, gunpowder, and hydrogen peroxide, can be used as explosives and other materials, such as nails, glass, or metal fragments, can be used to increase the amount of shrapnel propelled by the explosion. The majority of substances that are classified as chemical explosives generally contain oxygen, nitrogen and oxidable elements such as carbon and hydrogen [2]. The most common functional group in military explosives is NO2. That functionality can be attached to oxygen (ONO2) in the nitrate esters (PETN), to carbon (C-NO2) in the nitroarenes (TNT) and nitroalkanes (Nitromethane), and to nitrogen (N-NO2) as in the nitramines (RDX). Some organic peroxides, such as TATP and HMTD, are popular amongst terrorists because they are powerful initiators that can be easily prepared from easily available ingredients. Azides are also powerful primary explosives commonly used as initiators (commercial detonators) in civilian and military operations, therefore they could be potentially used by terrorists as initiators for IEDs.

  19. Thin film sensor materials for detection of Nitro-Aromatic explosives

    NASA Astrophysics Data System (ADS)

    Ramdasi, Dipali; Mudhalwadkar, Rohini

    2018-03-01

    Many countries have experienced terrorist activities and innocent people have suffered. Timely detection of explosives can avoid this situation. This paper targets the detection of Nitrobenzene and Nitrotoluene, which are nitroaromatic compounds possessing explosive properties. As direct sensors for detecting these compounds are not available, Polyaniline based thin film sensors doped with palladium are developed using the spin coating technique. The response of the developed sensors is observed for varying concentrations of explosives. It is observed that zinc oxide based sensor is more sensitive to Nitrotoluene exhibiting a relative change in resistance of 0.78. The tungsten oxide sensor is more sensitive to Nitrobenzene with a relative change in resistance of 0.48. The sensor performance is assessed by measuring the response and recovery time. The cross sensitivity of the sensors is evaluated for ethanol, acetone and methanol which was observed as very low.

  20. Locating bomb factories by detecting hydrogen peroxide.

    PubMed

    Romolo, Francesco Saverio; Connell, Samantha; Ferrari, Carlotta; Suarez, Guillaume; Sauvain, Jean-Jacques; Hopf, Nancy B

    2016-11-01

    The analytical capability to detect hydrogen peroxide vapour can play a key role in localizing a site where a H2O2 based Improvised Explosive (IE) is manufactured. In security activities it is very important to obtain information in a short time. For this reason, an analytical method to be used in security activity needs portable devices. The authors have developed the first analytical method based on a portable luminometer, specifically designed and validated to locate IE manufacturing sites using quantitative on-site vapour analysis for H2O2. The method was tested both indoor and outdoor. The results demonstrate that the detection of H2O2 vapours could allow police forces to locate the site, while terrorists are preparing an attack. The collected data are also very important in developing new sensors, able to give an early alarm if located at a proper distance from a site where an H2O2 based IE is prepared. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Correlation of Concepts "Extremism" and "Terrorism" in Countering the Financing of Terrorism and Extremism

    ERIC Educational Resources Information Center

    Baisagatova, Diana B.; Kemelbekov, Saken T.; Smagulova, Diana A.; Kozhamberdiyeva, Aigul S.

    2016-01-01

    The main threats to world order are terrorist and extremist activities. On the world stage, countries unite into a coalition with the aim to increase the efficiency of the fight against terrorism. At the local level, the terrorist threat is fought by the security services. In order to prevent global human victims, which may arise as a result of…

  2. What Strategy Should Bulgaria Pursue to Track and Disrupt Terror Networks in the Balkans?

    DTIC Science & Technology

    2014-03-01

    important function of law enforcement is to “disrupt terrorist financing that includes by uncovering links between terrorists and organized criminal groups... money laundering , black market activity, and drug trade.”119 C. SUMMARY International terrorism is constantly evolving in its tactics and...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited WHAT STRATEGY SHOULD

  3. Radiological threat assessment and the Federal Response Plan--a gap analysis.

    PubMed

    Conklin, W Craig; Liotta, Philip L

    2005-11-01

    The ability of the federal government to effectively and efficiently respond to nuclear or radiological terrorist attacks has been the subject of intense discussion and analysis for many years. Because of recent terrorist activities and intelligence information, there is strong sentiment that it is not a question of if, but when, a radiological or nuclear terrorist attack will occur. As a result, there is considerable concern that the federal government may not be adequately prepared to respond to an attack involving a radiological dispersal device or improvised nuclear device. In response to these concerns, federal departments and agencies have initiated actions to develop a better understanding of the magnitude of the radiological/nuclear terrorist threat, assess the ability of the federal government to support state and local responses to such attacks, and improve the Nation's ability to prepare for, respond to, and recover from these types of attacks. In an era of limited fiscal growth and competing priorities, the federal government will have to enhance its collaboration with state and local governments, the private sector, and academia to ensure that the Nation is capable of responding to a terrorist attack involving radioactive or nuclear material.

  4. Detecting terrorist nuclear weapons at sea: The 10th door problem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Slaughter, D R

    2008-09-15

    While screening commercial cargo containers for the possible presence of WMD is important and necessary smugglers have successfully exploited the many other vehicles transporting cargo into the US including medium and small vessels at sea. These vessels provide a venue that is currently not screened and widely used. Physics limits that make screening of large vessels prohibitive impractical do not prohibit effective screening of the smaller vessels. While passive radiation detection is probably ineffective at sea active interrogation may provide a successful approach. The physics limits of active interrogation of ships at sea from standoff platforms are discussed. Autonomous platformsmore » that could carry interrogation systems at sea, both airborne and submersible, are summarized and their utilization discussed. An R&D program to investigate the limits of this approach to screening ships at sea is indicated and limitations estimated.« less

  5. Attogram sensing of trinitrotoluene with a self-assembled molecular gelator.

    PubMed

    Kartha, Kalathil K; Babu, Sukumaran S; Srinivasan, Sampath; Ajayaghosh, Ayyappanpillai

    2012-03-14

    Detection of explosives is of utmost importance due to the threat to human security as a result of illegal transport and terrorist activities. Trinitrotoluene (TNT) is a widely used explosive in landmines and military operations that contaminates the environment and groundwater, posing a threat to human health. Achieving the detection of explosives at a sub-femtogram level using a molecular sensor is a challenge. Herein we demonstrate that a fluorescent organogelator exhibits superior detection capability for TNT in the gel form when compared to that in the solution state. The gel when coated on disposable paper strips detects TNT at a record attogram (ag, 10(-18) g) level (∼12 ag/cm(2)) with a detection limit of 0.23 ppq. This is a simple and low-cost method for the detection of TNT on surfaces or in aqueous solutions in a contact mode, taking advantage of the unique molecular packing of an organogelator and the associated photophysical properties.

  6. EPA QUICK REFERENCE GUIDES

    EPA Science Inventory

    EPA Quick Reference Guides are compilations of information on chemical and biological terrorist agents. The information is presented in consistent format and includes agent characteristics, release scenarios, health and safety data, real-time field detection, effect levels, samp...

  7. Dual energy detection of weapons of mass destruction

    NASA Astrophysics Data System (ADS)

    Budner, Gregory J.

    2006-03-01

    There is continuing plans and actions from terrorists to use "violence to inculcate fear with intent to coerce or try to intimidate governments or societies in the pursuit of goals that are generally political, religious or ideological." (Joint Pub 3-07.2) One can characterize the types of attacks and plan to interdict terrorist actions before they become crises. This paper focuses on Radiological (RDD) and Nuclear (WMD) threats. The X-ray inspection process and the use of dual-energy imaging will interdict materials for WMDs. Listed herewith is "several major characteristics that one can exploit for the detection. First, both WMDs and RDDs are radioactive. Therefore, one can hope to detect radiation coming from the containers to identify the threat. However since uranium and plutonium are largely self-shielding and since lead can be used to shield and hide these substances, passive detection of emitted radiation can be easily defeated. An important second characteristic is that WMDs and shielded dirty bombs contain materials with very high atomic numbers. Since normal commerce rarely contains materials with atomic numbers higher than that of iron, dual-energy imaging technology can detect such materials automatically, for the successful interdiction of WMDs and dirty bombs". (Bjorkolm 2005)

  8. Sensitive detection of chemical agents and toxic industrial chemicals using active open-path FTIRs

    NASA Astrophysics Data System (ADS)

    Walter, William T.

    2004-03-01

    Active open-path FTIR sensors provide more sensitive detection of chemical agents than passive FTIRs, such as the M21 RSCAAL and JSLSCAD, and at the same time identify and quantify toxic industrial chemicals (TIC). Passive FTIRs are bistatic sensors relying on infrared sources of opportunity. Utilization of earth-based sources of opportunity limits the source temperatures available for passive chemical-agent FTIR sensors to 300° K. Active FTIR chemical-agent sensors utilize silicon carbide sources, which can be operated at 1500° K. The higher source temperature provides more than an 80-times increase in the infrared radiant flux emitted per unit area in the 7 to 14 micron spectral fingerprint region. Minimum detection limits are better than 5 μgm/m3 for GA, GB, GD, GF and VX. Active FTIR sensors can (1) assist first responders and emergency response teams in their assessment of and reaction to a terrorist threat, (2) provide information on the identification of the TIC present and their concentrations and (3) contribute to the understanding and prevention of debilitating disorders analogous to the Gulf War Syndrome for military and civilian personnel.

  9. Detection of Terrorist Preparations by an Artificial Intelligence Expert System Employing Fuzzy Signal Detection Theory

    DTIC Science & Technology

    2004-10-25

    FUSEDOT does not require facial recognition , or video surveillance of public areas, both of which are apparently a component of TIA ([26], pp...does not use fuzzy signal detection. Involves facial recognition and video surveillance of public areas. Involves monitoring the content of voice...fuzzy signal detection, which TIA does not. Second, FUSEDOT would be easier to develop, because it does not require the development of facial

  10. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drame, B.; Toler, L.; Bachner, Katherine

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approachesmore » to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information sharing, an essential tool for combating money laundering and terrorist financing, verifying sanctions against rogue nations and non-state actors, tracking nuclear proliferation networks, and protecting dual-use materials. These steps can save lives without interfering with state sovereignty or individual rights. The specter of nuclear threat is real and constant. This paper will provide forensic analysis of the most effective financial tools and policies to combat that threat, placing special emphasis on multinational and public-private cooperation.« less

  11. The Rise of Pan-Islamism in Britain

    DTIC Science & Technology

    2006-12-01

    Algerian GIA (Groupe Islamique Arm) in Europe.”48 By the late 1990s Abu Hamza was the leader of the Finsbury Park Mosque.49 A police raid on the...2006). Abu Hamza is also wanted in the U.S. for the following charges: involvement with Earnest James Ujaama, providing support and finance to al...group. Such activities included anti-Libyan regime propaganda, financing , and terrorist planning, as well as alliance with other terrorist organization

  12. Structural monitoring for rare events in remote locations

    NASA Astrophysics Data System (ADS)

    Hale, J. M.

    2005-01-01

    A structural monitoring system has been developed for use on high value engineering structures, which is particularly suitable for use in remote locations where rare events such as accidental impacts, seismic activity or terrorist attack might otherwise go undetected. The system comprises a low power intelligent on-site data logger and a remote analysis computer that communicate with one another using the internet and mobile telephone technology. The analysis computer also generates e-mail alarms and maintains a web page that displays detected events in near real-time to authorised users. The application of the prototype system to pipeline monitoring is described in which the analysis of detected events is used to differentiate between impacts and pressure surges. The system has been demonstrated successfully and is ready for deployment.

  13. Cyber terror.

    PubMed

    Haugh, Richard

    2003-06-01

    If terrorists attack America's health care info-tech systems, it probably won't be one big blow but rather a series of small incursions that are much more difficult to detect. How can your hospital protect its IT system before and after such insidious attacks.

  14. Training dogs to detect Triacetone Triperoxide (TATP)

    NASA Astrophysics Data System (ADS)

    Oxley, Jimmie C.; Smith, James L.; Moran, Jesse; Nelson, Ken; Utley, William E.

    2004-09-01

    Dogs have been used successfully to detect drugs and conventional high explosives. The world-wide rise in terrorist activities has placed emphasis on the detection of non-conventional explosive materials such as the multi-functional peroxides, triacetone triperoxide (TATP) and hexamethylene triperoxide diamine (HMTD). This study demonstrates that dogs can detect both solid TATP and TATP adsorbed to cotton balls. An effective procedure to train dogs to detect TATP using cotton balls permeated with TATP vapor is provided. The various trials showed that dogs were capable of detecting as little as 200 μg of TATP adsorbed to a one gram cotton ball under a variety of circumstances. However, since TATP vaporizes rapidly at room temperature, significant depletion of TATP from cotton balls can occur in as little as 20 minutes, hampering the ability of the dogs to detect it. The TATP depleted cotton ball can be refreshed by returning it to a sealed container with TATP residue for about 20 minutes. A presumed decomposition product of TATP, acetone, cannot be used in place of TATP to train dogs.

  15. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  16. Suicide Terrorists: Are They Suicidal?

    ERIC Educational Resources Information Center

    Townsend, Ellen

    2007-01-01

    Are suicide terrorists suicidal? A review of the worldwide literature on suicide terrorism uncovered five published empirical studies describing data collected from potential suicide terrorists or the surviving friends and families of deceased terrorists. The many discrepancies uncovered between suicide terrorists and other suicides on key factors…

  17. United States Counterterrorism Strategy In the Trans-Sahara and the Rise of Salafi-Jihadism In the Sahel

    DTIC Science & Technology

    2015-09-01

    157 “ Anti - Money Laundering /Counter Terrorist Financing ,” United States Department of State, May 10, 2015, http://www.state.gov/j/inl/c/crime...20the%20US%20Homeland.pdf. United States Department of State. “ Anti - Money Laundering /Counter Terrorist Financing ,” May 10, 2015. http://www.state.gov...state security, transnational criminal activity, and extremist financing demands regional collaboration, requiring these states to look past their

  18. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kadner, S.; Turpen, E.; Rees, B.

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizingmore » possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.« less

  19. Nanoplasmonic imaging of latent fingerprints with explosive RDX residues.

    PubMed

    Peng, Tianhuan; Qin, Weiwei; Wang, Kun; Shi, Jiye; Fan, Chunhai; Li, Di

    2015-09-15

    Explosive detection is a critical element in preventing terrorist attacks, especially in crowded and influential areas. It is probably more important to establish the connection of explosive loading with a carrier's personal identity. In the present work, we introduce fingerprinting as physical personal identification and develop a nondestructive nanoplasmonic method for the imaging of latent fingerprints. We further integrate the nanoplasmonic response of catalytic growth of Au NPs with NADH-mediated reduction of 1,3,5-trinitro-1,3,5-triazinane (RDX) for the quantitative analysis of RDX explosive residues in latent fingerprints. This generic nanoplasmonic strategy is expected to be used in forensic investigation to distinguish terrorists that carry explosives.

  20. Understanding Ricin from a Defensive Viewpoint

    PubMed Central

    Griffiths, Gareth D.

    2011-01-01

    The toxin ricin has long been understood to have potential for criminal activity and there has been concern that it might be used as a mass-scale weapon on a military basis for at least two decades. Currently, the focus has extended to encompass terrorist activities using ricin to disrupt every day activities on a smaller scale. Whichever scenario is considered, there are features in common which need to be understood; these include the knowledge of the toxicity from ricin poisoning by the likely routes, methods for the detection of ricin in relevant materials and approaches to making an early diagnosis of ricin poisoning, in order to take therapeutic steps to mitigate the toxicity. This article will review the current situation regarding each of these stages in our collective understanding of ricin and how to defend against its use by an aggressor. PMID:22174975

  1. A Review of Ethiopia’s Security Challenges in The Horn of Africa

    DTIC Science & Technology

    2013-03-01

    Dec 14, 2006 ), in Haile Araya , Terrorist Activities Challenging the Horn of Africa, The 2nd Annual Combating and Preventing Terrorism in Africa, Pretoria (South Africa, 2007), 15-17. ...border town of Dollo Ado during the same period. The Somalia-based terrorist threat to Ethiopia reached a peak in 2006 when another group, the...Federal Government (TFG) in 2004. Ethiopia’s military intervention in 2006 also provided the conditions for the TFG to relocate from Nairobi, Kenya to

  2. Effectiveness of Unmanned Aerial Vehicles in Helping Secure a Border Characterized by Rough Terrain and Active Terrorists

    DTIC Science & Technology

    2013-06-01

    background map is used on top of the battlefield for 26 cosmetic purposes to improve visualization of the scenario. The background map has no effect on...personalities. We assumed that terrorists have a perfect stealth value in enemy contact state and their propensity towards the destination degrades with...Available: http://www.bbc.co.uk/news/world-europe-19615995. [11] “Powerful blast rocks eastern Turkish city, seven reportedly killed ( PHOTOS )” [Online

  3. Does the Massachusetts National Guard’s Police Mission Partnership Initiative (MPMPI) Training Model Have Utility Outside the Commonwealth of Massachusetts

    DTIC Science & Technology

    2016-06-10

    Boston Marathon terrorist bombing of 15 April 2013, and the active shooters during the early 2000s are on the rise, as well as domestic emergencies...MSP) in events such as the weather related emergencies, the Boston Marathon , and Boston’s Fourth of July Celebration including the Boston Pops...relationships between agencies, career professionalism, and quality training. MP forces were on duty when the 2013 Boston Marathon terrorist bombing took

  4. Joint Transformation and the Decision to Use Force

    DTIC Science & Technology

    2007-03-09

    and visitors necessary for detecting terrorists. Business interests would oppose the cost increases associated with restricting the international...Channels: The Inteligence Community; Drug Plant Attack on Target, Says CIA Chief,” The Washington Post, 21 October 1999 [database on-line]; available from

  5. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    PubMed

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  6. Optimal Deployment of Unmanned Aerial Vehicles for Border Surveillance

    DTIC Science & Technology

    2014-06-01

    and intercept intruders that are trying to trespass a border. These intruders can include terrorists, drug traffickers, smugglers, illegal immigrants...routes, altitudes, and speeds in order to maximize the probability of detecting intruders trying to trespass a given border. These models will...Border surveillance is an important concern for most nations wanting to detect and intercept intruders that are trying to trespass a border. These

  7. Automated intelligent video surveillance system for ships

    NASA Astrophysics Data System (ADS)

    Wei, Hai; Nguyen, Hieu; Ramu, Prakash; Raju, Chaitanya; Liu, Xiaoqing; Yadegar, Jacob

    2009-05-01

    To protect naval and commercial ships from attack by terrorists and pirates, it is important to have automatic surveillance systems able to detect, identify, track and alert the crew on small watercrafts that might pursue malicious intentions, while ruling out non-threat entities. Radar systems have limitations on the minimum detectable range and lack high-level classification power. In this paper, we present an innovative Automated Intelligent Video Surveillance System for Ships (AIVS3) as a vision-based solution for ship security. Capitalizing on advanced computer vision algorithms and practical machine learning methodologies, the developed AIVS3 is not only capable of efficiently and robustly detecting, classifying, and tracking various maritime targets, but also able to fuse heterogeneous target information to interpret scene activities, associate targets with levels of threat, and issue the corresponding alerts/recommendations to the man-in- the-loop (MITL). AIVS3 has been tested in various maritime scenarios and shown accurate and effective threat detection performance. By reducing the reliance on human eyes to monitor cluttered scenes, AIVS3 will save the manpower while increasing the accuracy in detection and identification of asymmetric attacks for ship protection.

  8. Development of a QCL based IR polarimetric system for the stand-off detection and location of IEDs

    NASA Astrophysics Data System (ADS)

    Stokes, Robert J.; Normand, Erwan L.; Carrie, Iain D.; Foulger, Brian; Lewis, Colin

    2009-09-01

    Following the development of point sensing improvised explosive device (IED) technology[1] Cascade Technologies have initial work in the development of equivalent stand-off capability. Stand-off detection of IEDs is a very important technical requirement that would enable the safe identification and quantification of hazardous materials prior to a terrorist attack. This could provide advanced warning of potential danger allowing evacuation and mitigation measures to be implemented. With support from the UK government, Cascade Technologies is currently investigating technology developments aimed at addressing the above stand-off IED detection capability gap. To demonstrate and validate the concept, a novel stand-off platform will target the detection and identification of common high vapor pressure IED precursor compounds, such as hydrogen peroxide (H2O2), emanating from a point source. By actively probing a scene with polarized light, the novel platform will offer both enhanced selectivity and sensitivity as compared to traditional hyperspectral sensors, etc. The presentation will highlight the concept of this novel detection technique as well as illustrating preliminary results.

  9. Sverdlovsk Anthrax Outbreak: An Educational Case Study

    NASA Astrophysics Data System (ADS)

    Steele, S. J.; van der Vink, G.

    2002-05-01

    In April and May of 1979 an Anthrax epidemic broke out in the city of Sverdlovsk (now Ekaterinburg) in the former Soviet Union. Sixty-four people were reported to have died from the outbreak, although there is still debate concerning the actual number of victims. While Soviet officials initially attributed this outbreak to contaminated meat, the US Government maintained that the outbreak was due to a leakage from a biological weapons facility. We have created and implemented an undergraduate educational exercise based on the forensic analysis of this event. Students were provided case data of the victims, area satellite images and meteorological data. One goal of the exercise was for students to reconstruct the most probable scenario of events through valid inference based on the limited information and uncertainties associated with the data set. Another goal was to make students sensitive to issues of biological weapons and bioterrorism. The exercise was highly rated by students even before the events of September 11. There is a clear need to educate students, particularly in the sciences, to be aware of the signatures of terrorist activities. Evidence of terrorist activities is more likely to appear from unintended discoveries than from active intelligence gathering. We believe our national security can be enhanced by sensitizing those that monitor the natural environment to the signatures of terrorist activities through the types of educational exercises that we have developed.

  10. Technology and the hydra of terrorism?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LePoire, D. J.; Glenn, J. C.; Environmental Assessment

    2007-02-01

    In the application of new technologies that address the terrorism problem, an objective is to ensure that the technology does not cause more problems than it solves. Potential new technologies, including convergences of genomics, robotics, information technology, and nanotechnology, might rapidly develop. As with any technological advance, each of these offers a mixture of benefits and risks. At first, a direct approach is reviewed by looking at how these technologies might deter the motive, means, and opportunity for terrorist activities. While there are many potential deterrence applications, other issues are identified that might cause unintended problems in the system. Somemore » of these problems include the possible contribution to terrorist motives by increasing stresses toward divisiveness in society, terrorist means through the development of dual-use technologies, or terrorist opportunities by further developing technological vulnerabilities. Next, a more systemic approach is taken by reviewing a wider range of issues, such as resource availability, management of science and technology, and general societal trends. The balance between technological change and social response is important in realizing benefits while mitigating unintended consequences such as harmful uses through terrorist actions. To explore issues concerning this balance, possible technological development scenarios are reviewed, including the possibility of accelerating or slowing technological development. Some recent recommendations are considered within this context. The need for a balance between technological and social response in this asymmetric situation suggests that the benefits of a rapid technological response against terrorism might not be as large as those observed during World War II.« less

  11. Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indicator Technology Program

    PubMed Central

    Wein, Lawrence M.; Baveja, Manas

    2005-01-01

    Motivated by the difficulty of biometric systems to correctly match fingerprints with poor image quality, we formulate and solve a game-theoretic formulation of the identification problem in two settings: U.S. visa applicants are checked against a list of visa holders to detect visa fraud, and visitors entering the U.S. are checked against a watchlist of criminals and suspected terrorists. For three types of biometric strategies, we solve the game in which the U.S. Government chooses the strategy's optimal parameter values to maximize the detection probability subject to a constraint on the mean biometric processing time per legal visitor, and then the terrorist chooses the image quality to minimize the detection probability. At current inspector staffing levels at ports of entry, our model predicts that a quality-dependent two-finger strategy achieves a detection probability of 0.733, compared to 0.526 under the quality-independent two-finger strategy that is currently implemented at the U.S. border. Increasing the staffing level of inspectors offers only minor increases in the detection probability for these two strategies. Using more than two fingers to match visitors with poor image quality allows a detection probability of 0.949 under current staffing levels, but may require major changes to the current U.S. biometric program. The detection probabilities during visa application are ≈11–22% smaller than at ports of entry for all three strategies, but the same qualitative conclusions hold. PMID:15894628

  12. Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indicator Technology Program.

    PubMed

    Wein, Lawrence M; Baveja, Manas

    2005-05-24

    Motivated by the difficulty of biometric systems to correctly match fingerprints with poor image quality, we formulate and solve a game-theoretic formulation of the identification problem in two settings: U.S. visa applicants are checked against a list of visa holders to detect visa fraud, and visitors entering the U.S. are checked against a watchlist of criminals and suspected terrorists. For three types of biometric strategies, we solve the game in which the U.S. Government chooses the strategy's optimal parameter values to maximize the detection probability subject to a constraint on the mean biometric processing time per legal visitor, and then the terrorist chooses the image quality to minimize the detection probability. At current inspector staffing levels at ports of entry, our model predicts that a quality-dependent two-finger strategy achieves a detection probability of 0.733, compared to 0.526 under the quality-independent two-finger strategy that is currently implemented at the U.S. border. Increasing the staffing level of inspectors offers only minor increases in the detection probability for these two strategies. Using more than two fingers to match visitors with poor image quality allows a detection probability of 0.949 under current staffing levels, but may require major changes to the current U.S. biometric program. The detection probabilities during visa application are approximately 11-22% smaller than at ports of entry for all three strategies, but the same qualitative conclusions hold.

  13. Visualizing disaster attitudes resulting from terrorist activities.

    PubMed

    Khalid, Halimahtun M; Helander, Martin G; Hood, Nilwan A

    2013-09-01

    The purpose of this study was to analyze people's attitudes to disasters by investigating how people feel, behave and think during disasters. We focused on disasters induced by humans, such as terrorist attacks. Two types of textual information were collected - from Internet blogs and from research papers. The analysis enabled forecasting of attitudes for the design of proactive disaster advisory scheme. Text was analyzed using a text mining tool, Leximancer. The outcome of this analysis revealed core themes and concepts in the text concerning people's attitudes. The themes and concepts were sorted into three broad categories: Affect, Behaviour, and Cognition (ABC), and the data was visualized in semantic maps. The maps reveal several knowledge pathways of ABC for developing attitudinal ontologies, which describe the relations between affect, behaviour and cognition, and the sequence in which they develop. Clearly, terrorist attacks induced trauma and people became highly vulnerable. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  14. Is television traumatic? Dreams, stress, and media exposure in the aftermath of September 11, 2001.

    PubMed

    Propper, Ruth E; Stickgold, Robert; Keeley, Raeann; Christman, Stephen D

    2007-04-01

    The terrorist attacks of September 11, 2001, were traumatic for people living throughout the United States. It has been suggested that people living far from the attacks experienced increased stress because of their exposure to the terrorist events via the media, particularly via television. Following a traumatic or stressful event, individuals may have dreams that reflect that experience. As part of a course on dreaming, individuals recorded their dreams both prior to and following the terrorist attacks of September 11, 2001. On September 12, these same individuals reported their activities and media exposure the previous day. Results revealed (a) changes in dream features following the attacks and (b) a strong relation between exposure to the events on television and changes in dream features after the attacks. Because of the study's within-subjects design, the results provide evidence for a direct association between television viewing and subsequent increases in stress and trauma.

  15. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    ERIC Educational Resources Information Center

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  16. Remote Detection of Covert Tactical Adversarial Intent of Individuals in Asymmetric Operations

    DTIC Science & Technology

    2010-04-01

    nameless people, and organizations not affiliated with any government, has occurred throughout human history but has recently become more prevalent. 2.1...hiding, and the terrorists are dispersed. Defeating such a faceless, nameless enemy embedding itself within a peaceful civilian population is a

  17. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    DTIC Science & Technology

    2007-01-22

    originated in the United States and in China (although some of the attacks apparently only traversed through networks in China, casting some doubt on the...detection. CRS-21 86 Louise Shelly , Organized Crime, Cybercrime and Terrorism, Computer Crime Research Center, September 27, 2004, [http://www.crime

  18. Refugees Flexing Social Power as Agents of Stability: Creating Modes of Economic Livelihoods in Kenya’s Camps

    DTIC Science & Technology

    2017-11-21

    incubator for terrorism Official Kenyan policy was that refugees remain within the camps, but it was not until al-Qaeda bombed the U.S. embassy in Kenya...during 1998, and another terrorist bombing occurred at a hotel in the Kenyan city of Mombasa in 2002 that the government actively pursued this policy...evidence for most, if not all, of the bombings and attacks. The nature of bombings , and what makes them so appealing to terrorists, is the difficulty

  19. Integrated response to the dynamic threat of school violence.

    PubMed

    Callaway, David W; Westmoreland, Ted C; Baez, Alejandro A; McKay, Sean A; Raja, Ali S

    2010-01-01

    A terrorist attack on US schools no longer can be considered a Black Swan event. Mounting evidence suggests that extremist organizations actively are targeting US schools. Equally disturbing are data suggesting that schools, universities, and communities are unprepared for large-scale violence. The Operational Medicine Institute Conference on an Integrated Response to the Modern Urban Terrorist Threat revealed significant variations in the perceived threats and critical response gaps among emergency medical providers, law enforcement personnel, politicians, and security specialists. The participants recommended several steps to address these gaps in preparedness, training, responses, and recovery.

  20. [Terrorism and mental health (problem's scale, population tolerance, management of care)].

    PubMed

    Iastrebov, V S

    2004-01-01

    The consequences of terrorist threat and terrorist acts for mental health of the individual, groups of individuals and community in general are analyzed. Mental disorders emerging in the victims of terrorism is described. The problem of terrorist threats use as a psychic weapon is discussed. Tolerance of population to terrorism can be divided into two types--psychophysiological and socio-psychological. The ways for elevating tolerability to terrorist threat and terrorist acts are suggested. Help in the centers of terrorist act must be of the complex character, being provided by different specialists including psychologists and psychiatrists. The importance of state structures and community support in this work is emphasized.

  1. Selection, Availability, and Opportunity: The Conditional Effect of Poverty on Terrorist Group Participation

    ERIC Educational Resources Information Center

    Kavanagh, Jennifer

    2011-01-01

    Poverty is often identified as a determinant of terrorist group participation, but existing research reveals mixed support for this relationship. Some studies find that macroeconomic decline is associated with increased production of terrorists, but micro-level research suggests terrorists have above average socioeconomic status and educational…

  2. Microfluidic chip with optical sensor for rapid detection of nerve agent Sarin in water samples

    NASA Astrophysics Data System (ADS)

    Tan, Hsih Yin; Nguyen, Nam-Trung; Loke, Weng Keong; Tan, Yong Teng

    2007-12-01

    The chemical warfare agent Sarin is an organophosphate that is highly toxic to humans as they can act as cholinesterase inhibitors, that disrupts neuromuscular transmission. As these nerve agents are colorless, odorless and highly toxic, they can be introduced into drinking water as a means of terrorist sabotage. Hence, numerous innovative devices and methods have been developed for rapid detection of these organophosphates. Microfluidic technology allows the implementation of fast and sensitive detection of Sarin. In this paper, a micro-total analysis systems (TAS), also known as Lab-on-a-chip, fitted with an optical detection system has been developed to analyze the presence of the nerve agent sarin in water samples. In the present set-up, inhibition of co-introduced cholinesterase and water samples containing trace amounts of nerve agent sarin into the microfluidic device was used as the basis for selective detection of sarin. The device was fabricated using polymeric micromachining with PMMA (poly (methymethacrylate)) as the substrate material. A chromophore was utilized to measure the activity of remnant cholinesterase activity, which is inversely related to the amount of sarin present in the water samples. Comparisons were made between two different optical detection techniques and the findings will be presented in this paper. The presented measurement method is simple, fast and as sensitive as Gas Chromatography.

  3. Real Time Big Data Analytics for Predicting Terrorist Incidents

    ERIC Educational Resources Information Center

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  4. 76 FR 56631 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-13

    ... declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11... terrorist threat continues, the national emergency declared on September 14, 2001, and the powers and... September 14, 2001, with respect to the terrorist threat. This notice shall be published in the Federal...

  5. Understanding Why Terrorist Operations Succeed or Fail

    DTIC Science & Technology

    2009-01-01

    well matched with current threats will cut those attackers’ chances of 48 For example, even canine detection of explosives—one of the central modes of...a canine explosive detection program in Department of Energy, Office of the Inspector General, 2007). Analogous points could be made about the...example, for vaccines to have a beneficial protective effect, they must match the agent that is actually used in a subsequent attack. 59 See, for example

  6. Neutron Interrogation System For Underwater Threat Detection And Identification

    NASA Astrophysics Data System (ADS)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-01

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  7. Highly sensitive and selective dynamic light-scattering assay for TNT detection using p-ATP attached gold nanoparticle.

    PubMed

    Dasary, Samuel S R; Senapati, Dulal; Singh, Anant Kumar; Anjaneyulu, Yerramilli; Yu, Hongtao; Ray, Paresh Chandra

    2010-12-01

    TNT is one of the most commonly used nitro aromatic explosives for landmines of military and terrorist activities. As a result, there is an urgent need for rapid and reliable methods for the detection of trace amount of TNT for screenings in airport, analysis of forensic samples, and environmental analysis. Driven by the need to detect trace amounts of TNT from environmental samples, this article demonstrates a label-free, highly selective, and ultrasensitive para-aminothiophenol (p-ATP) modified gold nanoparticle based dynamic light scattering (DLS) probe for TNT recognition in 100 pico molar (pM) level from ethanol:acetonitile mixture solution. Because of the formation of strong π-donor-acceptor interaction between TNT and p-ATP, para-aminothiophenol attached gold nanoparticles undergo aggregation in the presence of TNT, which changes the DLS intensity tremendously. A detailed mechanism for significant DLS intensity change has been discussed. Our experimental results show that TNT can be detected quickly and accurately without any dye tagging in 100 pM level with excellent discrimination against other nitro compounds.

  8. Precipitating the Decline of Terrorist Groups: A Systems Analysis

    DTIC Science & Technology

    1994-03-24

    terrorist group. The author assumes terrorsst groups are social organizations, therefore terrorist groups come to va~lue organiwaionwsl survival over...ideological or programmatir achievements. The same determinants that cause social organizations to decline will cause terrorist organizations to decline... social orgainizations. eventually come to value organizational su~rvival over ideological or progcinmrnatic achievements. 20 Distribution/Availability

  9. Childhood reactions to terrorism-induced trauma: a review of the past 10 years.

    PubMed

    Fremont, Wanda P

    2004-04-01

    To summarize the literature about the clinical presentation and treatment interventions of childhood reactions to terrorism-induced trauma. The literature on children's responses to terrorist activities was reviewed. Over the past 10 years, more research has emerged on the subject of terrorism in children. Many of the effects of terrorism-induced trauma are similar to the effects of natural and man-made trauma. Children's responses include acute stress disorder, posttraumatic stress disorder, anxiety, depression, regressive behaviors, separation problems, sleep difficulties, and behavioral problems. However, several aspects of terrorist attacks result in unique stressors and reactions and pose specific challenges for treatment. The unpredictable, indefinite threat of terrorist events, the profound effect on adults and communities, and the effect of extensive terrorist-related media coverage exacerbates underlying anxieties and contributes to a continuous state of stress and anxiety. Intervention strategies include early community-based interventions, screening of children at risk, triage and referral, and trauma-loss-focused treatment programs. Advances have been made in the research of childhood reactions to terrorism-induced trauma. Further research is needed to identify children at risk and to determine the long-term impact on children's development. Although the preliminary results of interventions developed to help children are promising, outcome data have not been examined, and further research is needed to evaluate their effectiveness.

  10. Advances in Analysis and Detection of Explosives. Proceedings of the International Symposium on Analysis and Detection of Explosives (4th), Held in Jerusalem, Israel on September 7-10, 1992

    DTIC Science & Technology

    1992-09-01

    by Supercritical Fluid Extraction in Explosives; The Semtex-H Story; The Identification of Organic Peroxides; Slurry and Emulsion...Among the topics presented at this symposium were: Birmingham Six Pub Bombing Case (Keynote Lecture); A Scheme for the Analysis of Explosives and...Explosives: New Tools for Terrorists, New Challenges, for Detection and Identification; The Work of the Explosives and Gunshot Residues Unit of the Forensic Science Service (UK)

  11. Aviation Security, Risk Assessment, and Risk Aversion for Public Decisionmaking

    ERIC Educational Resources Information Center

    Stewart, Mark G.; Mueller, John

    2013-01-01

    This paper estimates risk reductions for each layer of security designed to prevent commercial passenger airliners from being commandeered by terrorists, kept under control for some time, and then crashed into specific targets. Probabilistic methods are used to characterize the uncertainty of rates of deterrence, detection, and disruption, as well…

  12. Military Role in Countering Terrorist Use of Weapons of Mass Destruction

    DTIC Science & Technology

    1999-04-01

    chemical and biological mobile point detection. “The M21 Remote Sensing Chemical Agent Alarm (RSCAAL) is an automatic scanning, passive infrared sensor...The M21 detects nerve and blister agent clouds based on changes in the background infrared spectra caused by the presence of the agent vapor.”15...required if greater than 3 years since last vaccine. VEE Yes Multiple vaccines required. VHF No Botulism Yes SEB No Ricin No Mycotoxin s No Source

  13. 31 CFR 1021.530 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.530 [Reserved] ...

  14. 31 CFR 1021.530 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.530 [Reserved] ...

  15. 31 CFR 1021.530 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.530 [Reserved] ...

  16. 31 CFR 1021.530 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.530 [Reserved] ...

  17. Chemical Accident Prevention: Site Security

    EPA Pesticide Factsheets

    This chemical safety alert assists facilities that routinely handle extremely hazardous substances, along with SERCs, LEPCs, and emergency responders, in their efforts to reduce criminally caused releases and vulnerability to terrorist activity.

  18. Computational social network modeling of terrorist recruitment.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berry, Nina M.; Turnley, Jessica Glicken; Smrcka, Julianne D.

    2004-10-01

    The Seldon terrorist model represents a multi-disciplinary approach to developing organization software for the study of terrorist recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of and abstract agent category provided a means for capturing social concepts like cliques, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This paper provides an overview of the Seldon terrorist model developed to study the formation of cliques, which are used as the majormore » recruitment entity for terrorist organizations.« less

  19. The National Institute of Justice's Technology Efforts to Meet the Evolving Needs of the Responder Community

    NASA Astrophysics Data System (ADS)

    Boyd, D.

    2002-05-01

    The National Institute of Justice (NIJ) is the research arm of the Department of Justice. Through its Office of Science & Technology (OS&T), NIJ has actively pursued development of better tools for public safety agencies to combat terrorism since 1997, when, pursuant to the Anti-Terrorism and Effective Penalty Act of 1996 (P.L. 104 -132), it began development of technology to better enable law enforcement agencies to combat terrorism. NIJ quickly realized that effectively combating terrorism required a multi disciplinary, multi agency response. Additionally, it came to understand that, as noted by the Gilmore Commission, the best way to prepare the responder community to deal with the consequences of terrorist incidents, was to ``emphasize programs and initiatives that build appropriately on existing State and local capabilities for other emergencies and disasters.'' For example, an effective critical incident management system is just as important to the ability to deal with a terrorist attack, such as occurred at the World Trade Center, as with a major natural disaster or the crash of a commercial airliner or passenger train. Consequently, NIJ's efforts have evolved to focus on the responder community's common, unaddressed needs for better tools to deal with critical incidents. The Institutes efforts focus on five technology areas: infrastructure security, personnel location, explosives detection and remediation, communications and information technology and training, and development of standards.

  20. When Devils Walk the Earth: The Mentality and Roots of Terrorism, and How to Respond

    DTIC Science & Technology

    2004-01-01

    the statistical inability of terrorists of both kinds to form enduring sexual relationships with a beloved partner is an aspect of terrorist...for the trees. A review of historical terror cases makes it startlingly clear: Terrorists rarely have successful dating histories. Sexual fears...society and the more fervent its rejection of reciprocity in sexual relations, the more terrorists it produces, and the greater the gap in social status

  1. Leftist Terrorist Motivation.

    DTIC Science & Technology

    1979-08-01

    longer lasting was the brand of terror introduced in the United States in the early days of the industrial age-- the terror of capital and labor...terrorists are found among adherents of almost every brand of the left wing, and the right wing, the overwhelming majority of today’s terrorists can be...Jay Mallin stated that definitions are important since the rhetoric of political denunciation brands with the term "terrorist" those people whom others

  2. The alliance relationship analysis of international terrorist organizations with link prediction

    NASA Astrophysics Data System (ADS)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  3. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  4. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  5. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  6. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  7. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  8. Sticky bomb detection with other implications for vehicle security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnston, R. G.; Vetrone, J.; Warner, J. S.

    2010-01-01

    A 'sticky bomb' is a type of improvised explosive device (IED) placed on a motor vehicle by (for example) a terrorist. The bomb is typically attached with adhesive ('duct') tape, or with magnets. This paper reports some preliminary results for a very rudimentary demonstration of two techniques for detecting the placement of a sticky bomb on a motor vehicle. The two techniques are tire pressure and magnetic measurements. There are other possible security applications for these techniques as well.

  9. Long-term effect of September 11 on the political behavior of victims’ families and neighbors

    PubMed Central

    Hersh, Eitan D.

    2013-01-01

    This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims’ families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become—and have stayed—significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis. PMID:24324145

  10. Long-term effect of September 11 on the political behavior of victims' families and neighbors.

    PubMed

    Hersh, Eitan D

    2013-12-24

    This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims' families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become--and have stayed--significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis.

  11. A national survey of stress reactions after the September 11, 2001, terrorist attacks.

    PubMed

    Schuster, M A; Stein, B D; Jaycox, L; Collins, R L; Marshall, G N; Elliott, M N; Zhou, A J; Kanouse, D E; Morrison, J L; Berry, S H

    2001-11-15

    People who are not present at a traumatic event may also experience stress reactions. We assessed the immediate mental health effects of the terrorist attacks on September 11, 2001. Using random-digit dialing three to five days after September 11, we interviewed a nationally representative sample of 569 U.S. adults about their reactions to the terrorist attacks and their perceptions of their children's reactions. Forty-four percent of the adults reported one or more substantial stress symptoms; 91 percent had one or more symptoms to at least some degree. Respondents throughout the country reported stress syndromes. They coped by talking with others (98 percent), turning to religion (90 percent), participating in group activities (60 percent), and making donations (36 percent). Eighty-five percent of parents reported that they or other adults in the household had talked to their children about the attacks for an hour or more; 34 percent restricted their children's television viewing. Thirty-five percent of children had one or more stress symptoms, and 47 percent were worried about their own safety or the safety of loved ones. After the September 11 terrorist attacks, Americans across the country, including children, had substantial symptoms of stress. Even clinicians who practice in regions that are far from the recent attacks should be prepared to assist people with trauma-related symptoms of stress.

  12. Preparedness and response to terrorism: a framework for public health action.

    PubMed

    Gofin, Rosa

    2005-02-01

    Political group violence in the form of terrorist actions has become a reality worldwide, affecting the health and economies of populations. As a consequence, preparedness and response are becoming an integral part of public health action. Risk appraisal, preservation of human and civil rights and communications within and between countries are all issues to be considered in the process. The combination of the natural history of terrorist actions and the epidemiological triangle model has been adapted in this paper and suggested as a comprehensive approach for preparedness and action. It covers preparedness (pre-event), response (event) and the consequences (post-event) of a terrorist attack. It takes into account the human factor, vectors and environment involved in each one of the phases. Terrorism is a global reality with varying underlying causes, manifestations and impact on the health of the public. Preparedness, response and rehabilitation are an integral part of public health action. Consideration of the pre-event, event and post-event phases in terrorist actions, together with the human factor, vector/agent and environment in each of these phases, offers a framework for public health preparedness, response and rehabilitation. Planning should consider risk assessment, risk communication, inter-sectorial cooperation, enactment of laws and regulations which consider protection of the public's health and civil liberties. Allocation of resources would need to make allowance for maintenance and development of ongoing public health activities.

  13. The course of posttraumatic stress disorder in a follow-up study of survivors of the Oklahoma City bombing.

    PubMed

    North, Carol S; Pfefferbaum, Betty; Tivis, Laura; Kawasaki, Aya; Reddy, Chandrashekar; Spitznagel, Edward L

    2004-01-01

    The course of posttraumatic stress disorder (PTSD) in populations directly exposed to terrorist attacks is of major importance in the post-9/11 era. Because no systematic diagnostic studies of the most highly exposed individuals of the 9/11 terrorist attacks have yet been done, the Oklahoma City bombing remains a unique opportunity to examine PTSD over time in high-exposure terrorist victims. This study assessed 137 survivors in the direct path of the explosion at approximately 6 and 17 months postdisaster, using the Diagnostic Interview Schedule. Combined index and follow-up data yielded a higher (41%) incidence of PTSD than detected at index (32%) or follow-up (31%). All PTSD was chronic (89% unremitted at 17 months) with no delayed-onset cases. The avoidance and numbing symptom group C, unlike groups B and D alone, was pivotal to current PTSD status and was associated with indicators of functioning at index and follow-up. The findings at index were sustainable. This follow-up study confirmed the immediacy of onset of PTSD and its persistence over time, pointing to the need for early interventions that continue over the long term. Group C avoidance and numbing symptoms may aid in early recognition of PTSD and in predicting long-term functioning.

  14. The acquisition of dangerous biological materials: Technical facts sheets to assist risk assessments of 46 potential BW agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aceto, Donato Gonzalo; Astuto-Gribble, Lisa M.; Gaudioso, Jennifer M.

    Numerous terrorist organizations have openly expressed interest in producing and deploying biological weapons. However, a limiting factor for many terrorists has been the acquisition of dangerous biological agents, as evidenced by the very few successful instances of biological weapons use compared to the number of documented hoaxes. Biological agents vary greatly in their ability to cause loss of life and economic damage. Some agents, if released properly, can kill many people and cause an extensive number of secondary infections; other agents will sicken only a small number of people for a short period of time. Consequently, several biological agents canmore » potentially be used to perpetrate a bioterrorism attack but few are likely capable of causing a high consequence event. It is crucial, from a US national security perspective, to more deeply understand the likelihood that terrorist organizations can acquire the range of these agents. Few studies have attempted to comprehensively compile the technical information directly relevant to the acquisition of dangerous bacteria, viruses and toxins. In this report, technical fact sheets were assembled for 46 potentially dangerous biological agents. Much of the information was taken from various research sources which could ultimately and significantly expedite and improve bioterrorism threat assessments. By systematically examining a number of specific agent characteristics included in these fact sheets, it may be possible to detect, target, and implement measures to thwart future terrorist acquisition attempts. In addition, the information in these fact sheets may be used as a tool to help laboratories gain a rudimentary understanding of how attractive a method laboratory theft is relative to other potential acquisition modes.« less

  15. 77 FR 552 - Proposed Collection; Comment Request; Renewal of Suspicious Activity Reporting by the Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-05

    ..., to protect against international terrorism, and to implement counter-money laundering programs and... proceedings involving domestic and international money laundering, terrorist financing, tax violations, fraud...

  16. Review of Injuries from Terrorist Bombings and Earthquakes

    DTIC Science & Technology

    2016-08-31

    distribution is unlimited. August 2016 Review of Injuries from Terrorist Bombings and Earthquakes DTRA-TR-16-064 T E C H N IC A L R E P...08-16 Technical Report 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Review of Injuries Types from Terrorist Bombings and Earthquakes HDTRA1-14-D-0003...Terrorist bombings and earthquakes provide valuable insight on the types of injuries that may occur in an improvised nuclear device (IND) scenario

  17. Extremely High-Frequency Holographic Radar Imaging of Personnel and Mail

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMakin, Douglas L.; Sheen, David M.; Griffin, Jeffrey W.

    2006-08-01

    The awareness of terrorists covertly transporting chemical warfare (CW) and biological warfare (BW) agents into government, military, and civilian facilities to harm the occupants has increased dramatically since the attacks of 9/11. Government and civilian security personnel have a need for innovative surveillance technology that can rapidly detect these lethal agents, even when they are hidden away in sealed containers and concealed either under clothing or in hand-carried items such as mailed packages or handbags. Sensor technology that detects BW and CW agents in mail or sealed containers carried under the clothing are under development. One promising sensor technology presentlymore » under development to defeat these threats is active millimeter-wave holographic radar imaging, which can readily image concealed items behind paper, cardboard, and clothing. Feasibility imaging studies at frequencies greater than 40 GHz have been conducted to determine whether simulated biological or chemical agents concealed in mail packages or under clothing could be detected using this extremely high-frequency imaging technique. The results of this imaging study will be presented in this paper.« less

  18. Department of Treasury Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... from the abuses of terrorist financing, money laundering, and other financial crime. The proposed... money laundering, terrorist financing, and other illicit transactions through the financial system. This... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN...

  19. 75 FR 21867 - Semiannual Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... to safeguard the U.S. financial system from the abuses of terrorist financing, money laundering, and... prepaid access as a means for furthering money laundering, terrorist financing, and other illicit... products and services posing lower risks of money laundering and terrorist financing from certain...

  20. 77 FR 46086 - Commission Information Collection Activities (FERC-576); Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-02

    ... result of a hurricane, earthquake, or other natural disaster, or terrorist activity, (2) serious interruptions to service, and (3) damage to jurisdictional natural gas facilities due to natural disaster or... collection requirements with no changes to the reporting requirements. Abstract: A natural gas company must...

  1. 75 FR 75593 - Financial Crimes Enforcement Network; Confidentiality of Suspicious Activity Reports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... continuing effort to increase the efficiency and effectiveness of its anti-money laundering and counter... law or regulation, or a suspicious activity related to money laundering, terrorist financing, or other...). \\3\\ The Annunzio-Wylie Anti-Money Laundering Act of 1992 (the Annunzio-Wylie Act), amended the BSA...

  2. A Selective Chronology of Terrorist and Counter-Terrorist Incidents.

    ERIC Educational Resources Information Center

    Totten, Sam

    1986-01-01

    Beginning with the July 22, 1966, Palestinian hijacking of an El Al airliner and ending with the April 5, 1986, bombing raid on Libya by the United States, this chronology details 56 terrorist events which were covered in the world press. (JDH)

  3. Trends & Controversies: Sociocultural Predictive Analytics and Terrorism Deterrence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanfilippo, Antonio P.; McGrath, Liam R.

    2011-08-12

    The use of predictive analytics to model terrorist rhetoric is highly instrumental in developing a strategy to deter terrorism. Traditional (e.g. Cold-War) deterrence methods are ineffective with terrorist groups such as al Qaida. Terrorists typically regard the prospect of death or loss of property as acceptable consequences of their struggle. Deterrence by threat of punishment is therefore fruitless. On the other hand, isolating terrorists from the community that may sympathize with their cause can have a decisive deterring outcome. Without the moral backing of a supportive audience, terrorism cannot be successfully framed as a justifiable political strategy and recruiting ismore » curtailed. Ultimately, terrorism deterrence is more effectively enforced by exerting influence to neutralize the communicative reach of terrorists.« less

  4. Malevolent Creativity in Terrorist Organizations

    ERIC Educational Resources Information Center

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  5. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  6. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  7. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  8. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  9. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  10. Science and Technology Review May 2004

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henson, V E

    2004-04-02

    This month's issue has the following articles: (1) ''A Multidisciplinary Attack on Bioterrorism''--Commentary by Tomas Diaz de la Rubia. (2) ''Life at the Nanoscale''--Livermore researchers are exploring the molecules of life at the nanoscale to fight bioterrorism, improve human health, and understand how proteins function. (3) ''Screening Cargo Containers to Remove a Terrorist Threat''--A detection system for cargo containers will search for hidden nuclear materials that terrorists might try to ship to U.S. seaports. (4) ''Improved Algorithms Speed It Up for Codes''--Recent changes to the algorithms used in Monte Carlo calculations are reducing the time needed to run the high-fidelitymore » simulations being developed for the nation's supercomputers. (5) ''The Siren Call of the Seas: Sequestering Carbon Dioxide''--Scientists at Livermore evaluate possible methods for removing carbon dioxide from Earth's atmosphere and storing it in the planet's waters.« less

  11. Computer Modeling of Violent Intent: A Content Analysis Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanfilippo, Antonio P.; Mcgrath, Liam R.; Bell, Eric B.

    We present a computational approach to modeling the intent of a communication source representing a group or an individual to engage in violent behavior. Our aim is to identify and rank aspects of radical rhetoric that are endogenously related to violent intent to predict the potential for violence as encoded in written or spoken language. We use correlations between contentious rhetoric and the propensity for violent behavior found in documents from radical terrorist and non-terrorist groups and individuals to train and evaluate models of violent intent. We then apply these models to unseen instances of linguistic behavior to detect signsmore » of contention that have a positive correlation with violent intent factors. Of particular interest is the application of violent intent models to social media, such as Twitter, that have proved to serve as effective channels in furthering sociopolitical change.« less

  12. REMUS100 AUV with an integrated microfluidic system for explosives detection.

    PubMed

    Adams, André A; Charles, Paul T; Veitch, Scott P; Hanson, Alfred; Deschamps, Jeffrey R; Kusterbeck, Anne W

    2013-06-01

    Quantitating explosive materials at trace concentrations in real-time on-site within the marine environment may prove critical to protecting civilians, waterways, and military personnel during this era of increased threat of widespread terroristic activity. Presented herein are results from recent field trials that demonstrate detection and quantitation of small nitroaromatic molecules using novel high-throughput microfluidic immunosensors (HTMI) to perform displacement-based immunoassays onboard a HYDROID REMUS100 autonomous underwater vehicle. Missions were conducted 2-3 m above the sea floor, and no HTMI failures were observed due to clogging from biomass infiltration. Additionally, no device leaks were observed during the trials. HTMIs maintained immunoassay functionality during 2 h deployments, while continuously sampling seawater absent without any pretreatment at a flow rate of 2 mL/min. This 20-fold increase in the nominal flow rate of the assay resulted in an order of magnitude reduction in both lag and assay times. Contaminated seawater that contained 20-175 ppb trinitrotoluene was analyzed.

  13. Chemical Sniffing Instrumentation for Security Applications.

    PubMed

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  14. Optimising the neutron environment of Radiation Portal Monitors: A computational study

    NASA Astrophysics Data System (ADS)

    Gilbert, Mark R.; Ghani, Zamir; McMillan, John E.; Packer, Lee W.

    2015-09-01

    Efficient and reliable detection of radiological or nuclear threats is a crucial part of national and international efforts to prevent terrorist activities. Radiation Portal Monitors (RPMs), which are deployed worldwide, are intended to interdict smuggled fissile material by detecting emissions of neutrons and gamma rays. However, considering the range and variety of threat sources, vehicular and shielding scenarios, and that only a small signature is present, it is important that the design of the RPMs allows these signatures to be accurately differentiated from the environmental background. Using Monte-Carlo neutron-transport simulations of a model 3He detector system we have conducted a parameter study to identify the optimum combination of detector shielding, moderation, and collimation that maximises the sensitivity of neutron-sensitive RPMs. These structures, which could be simply and cost-effectively added to existing RPMs, can improve the detector response by more than a factor of two relative to an unmodified, bare design. Furthermore, optimisation of the air gap surrounding the helium tubes also improves detector efficiency.

  15. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    PubMed

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. Immunosorbent analysis of toxin contamination in milk and ground beef using IgY-based ELISA

    USDA-ARS?s Scientific Manuscript database

    Analytical methodology to detect ricin and Shiga toxins (Stx) in food matrices is important because of the potential use of ricin in food as a terrorist weapon, and the presence of Stx in food as a result of contamination with Shiga-toxin producing E. coli (STEC) that has lead to serious foodborne d...

  17. Data-Based Detection of Potential Terrorist Attacks: Statistical and Graphical Methods

    DTIC Science & Technology

    2010-06-01

    Naren; Vasquez-Robinet, Cecilia; Watkinson, Jonathan: "A General Probabilistic Model of the PCR Process," Applied Mathematics and Computation 182(1...September 2006. Seminar, Measuring the effect of Length biased sampling, Mathematical Sciences Section, National Security Agency, 19 September 2006...Committee on National Statistics, 9 February 2007. Invited seminar, Statistical Tests for Bullet Lead Comparisons, Department of Mathematics , Butler

  18. Biological and chemical terrorism: strategic plan for preparedness and response. Recommendations of the CDC Strategic Planning Workgroup.

    PubMed

    2000-04-21

    The U.S. national civilian vulnerability to the deliberate use of biological and chemical agents has been highlighted by recognition of substantial biological weapons development programs and arsenals in foreign countries, attempts to acquire or possess biological agents by militants, and high-profile terrorist attacks. Evaluation of this vulnerability has focused on the role public health will have detecting and managing the probable covert biological terrorist incident with the realization that the U.S. local, state, and federal infrastructure is already strained as a result of other important public health problems. In partnership with representatives for local and state health departments, other federal agencies, and medical and public health professional associations, CDC has developed a strategic plan to address the deliberate dissemination of biological or chemical agents. The plan contains recommendations to reduce U.S. vulnerability to biological and chemical terrorism--preparedness planning, detection and surveillance, laboratory analysis, emergency response, and communication systems. Training and research are integral components for achieving these recommendations. Success of the plan hinges on strengthening the relationships between medical and public health professionals and on building new partnerships with emergency management, the military, and law enforcement professionals.

  19. Terrorists and Nuclear Technology

    ERIC Educational Resources Information Center

    Krieger, David

    1975-01-01

    This essay explores the ways terrorist groups may gain possession of nuclear materials; the way in which they may use nuclear weapons and other nuclear technologies to their benefit; and various courses of action designed to minimize the possibilities of terrorists utilizing nuclear technology to their benefit and society's detriment. (BT)

  20. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    ERIC Educational Resources Information Center

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  1. 77 FR 7998 - Semiannual Agenda and Fiscal Year 2012 Regulatory Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-13

    ... to safeguard the U.S. financial system from the abuses of terrorist financing, money laundering, and... prepaid access as a means for furthering money laundering, terrorist financing, and other illicit... products and services posing lower risks of money laundering and terrorist financing from certain...

  2. 75 FR 79837 - Semiannual Agenda and Fiscal Year 2011 Regulatory Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-20

    .... financial system from the abuses of terrorist financing, money laundering, and other financial crime. The... furthering money laundering, terrorist financing, and other illicit transactions through the financial system... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN...

  3. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    PubMed Central

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21390292

  4. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    PubMed Central

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21399674

  5. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations.

    PubMed

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D; Dolislager, Fredrick; Love, Adam H; Hanna, M Leslie

    2011-02-13

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  6. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, Annetta Paule; Raber, Ellen; Dolislager, Frederick

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planningmore » in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.« less

  7. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemicalmore » warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.« less

  8. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 3 The President 1 2013-01-01 2013-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 11, 2012 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent...

  9. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 3 The President 1 2012-01-01 2012-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 9, 2011 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent...

  10. The Effect of Terrorist Incidents on the Occupational Attitude of Teachers

    ERIC Educational Resources Information Center

    Üstün, Ahmet

    2016-01-01

    This study examined how many terrorist incidents affected the teachers' occupational attitude by the variables of gender, marital status, birthplace, the term of employment and occupational status with "the effect of terrorist incidents on the occupational attitude of the teacher" scale. In this study, "descriptive scanning…

  11. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  12. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  13. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... national emergency declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on the United States. Because the terrorist threat continues, the national emergency declared on September 14, 2001...

  14. Identifying and structuring the objectives of terrorists.

    PubMed

    Keeney, Gregory L; Von Winterfeldt, Detlof

    2010-12-01

    The risk of terrorism is of great concern to many countries and significant resources are spent to counter this threat. A better understanding of the motivation of terrorists and their reasons for selecting certain modes and targets of attack can help improve the decisions to allocate resources in the fight against terrorism. The fundamental question addressed in this article is: "What do terrorists want?" We take the view that terrorists' preferences for actions are based on their values and beliefs. An important missing piece in our knowledge of terrorists' preferences is an understanding of their values. This article uses a novel approach to determine these values and state them as objectives, using principles from decision analysis and value-focused thinking. Instead of interviewing decisionmakers and stakeholders, as would be normal in decision analysis, we extract the values of terrorists by examining their own writings and verbal statements. To illustrate the approach, we extract the values of Al-Qaeda and structure them in terms of strategic, fundamental, and means objectives. These objectives are interrelated through a means-ends network. This information is useful for understanding terrorists' motivations, intent, and likely actions, as well as for developing policies to counter terrorism at its root causes. © 2010 Society for Risk Analysis.

  15. Rapid topographic and bathymetric reconnaissance using airborne LiDAR

    NASA Astrophysics Data System (ADS)

    Axelsson, Andreas

    2010-10-01

    Today airborne LiDAR (Light Detection And Ranging) systems has gained acceptance as a powerful tool to rapidly collect invaluable information to assess the impact from either natural disasters, such as hurricanes, earthquakes and flooding, or human inflicted disasters such as terrorist/enemy activities. Where satellite based imagery provides an excellent tool to remotely detect changes in the environment, the LiDAR systems, being active remote sensors, provide an unsurpassed method to quantify these changes. The strength of the active laser based systems is especially evident in areas covered by occluding vegetation or in the shallow coastal zone as the laser can penetrate the vegetation or water body to unveil what is below. The purpose of this paper is to address the task to survey complex areas with help of the state-of-the-art airborne LiDAR systems and also discuss scenarios where the method is used today and where it may be used tomorrow. Regardless if it is a post-hurricane survey or a preparation stage for a landing operation in unchartered waters, it is today possible to collect, process and present a dense 3D model of the area of interest within just a few hours from deployment. By utilizing the advancement in processing power and wireless network capabilities real-time presentation would be feasible.

  16. Protecting Small Communities Through Domestic Policing: Adopting an Early Warning System to Recognize Potential Terrorist Activity

    DTIC Science & Technology

    2009-09-01

    product of program activities or services used. For example, police officers have the authority to use force against the public such as their power......estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services

  17. Who wrote the "Letter to the Hebrews"?: data mining for detection of text authorship

    NASA Astrophysics Data System (ADS)

    Sabordo, Madeleine; Chai, Shong Y.; Berryman, Matthew J.; Abbott, Derek

    2005-02-01

    This paper explores the authorship of the Letter to the Hebrews using a number of different measures of relationship between different texts of the New Testament. The methods used in the study include file zipping and compression techniques, prediction by the partial matching technique and the word recurrence interval technique. The long term motivation is that the techniques employed in this study may find applicability in future generation web search engines, email authorship identification, detection of plagiarism and terrorist email traffic filtration.

  18. Are Suicide Terrorists Suicidal? A Critical Assessment of the Evidence

    PubMed Central

    2014-01-01

    Objective: Most of the research on suicide terrorism is conducted in the political science and international relations fields. The prevailing wisdom within this literature is that suicide terrorists are not suicidal. But how good is the evidence for this assumption? Knowing whether suicide terrorists are suicidal has implications for prevention, rehabilitation, and the “softer” side of counterterrorism designed to win minds and hearts. In addition it may deepen our understanding of suicide itself. Design: This article uses a review of existing literature to examine the arguments and evidence for and against the possibility that suicide terrorists could be suicidal in the context of a broad range of explanations for suicide terrorism. Results: Much of the evidence against the possibility that suicide terrorists are suicidal is based on anecdote or faulty assumptions about suicide. Relatively few formal systematic studies of suicidality in suicide terrorists have been conducted. Nonetheless, there is emerging evidence that suicidality may play a role in a significant number of cases. Conclusion: The field needs a more multidimensional approach, more systematic data at the individual level, and greater international cross-disciplinary collaboration. Would-be suicide terrorists (intercepted and arrested on their way to an attack) should be routinely interviewed using standard internationally accepted psychiatric diagnostic interviews as well as suicidality and homicidality rating scales. Psychological autopsies should also be routinely conducted worldwide. Since no one research site can collect all of the information that is needed, the creation of an internationally shared database that focuses on suicide terrorists rather than simply incidents is encouraged. PMID:25520891

  19. Near-space airships against terrorist activities

    NASA Astrophysics Data System (ADS)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  20. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from 5...

  1. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    ERIC Educational Resources Information Center

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  2. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    DOT National Transportation Integrated Search

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  3. The Meaning of Collective Terrorist Threat: Understanding the Subjective Causes of Terrorism Reduces Its Negative Psychological Impact

    ERIC Educational Resources Information Center

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    2011-01-01

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of…

  4. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... Terrorist Screening Database System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed... Use of the Terrorist Screening Database System of Records'' and this proposed rulemaking. In this... Use of the Terrorist Screening Database (TSDB) System of Records.'' DHS is maintaining a mirror copy...

  5. The Mass Media Role in Terrorist Campaigns.

    ERIC Educational Resources Information Center

    Moore, Tim; Clavier, David E.

    Terrorists seek recognition for their cause by using violence to create public fear which will force the government into repressive counter-measures. The mass media play a vital role in this strategy. News reports of terrorism may magnify the climate of fear, thereby augmenting the public's overreaction. Moreover, broadcast of terrorist acts may…

  6. How Terrorist Groups Survive: A Dynamic Network Analysis Approach to the Resilience of Terrorist Organizations

    DTIC Science & Technology

    2009-05-21

    Monterrey , CA: Naval Post Graduate School, 2002), 1. 12 Kathleen M. Carley, Jeffrey Reminga, and Natasha Kamneva, “Destabilizing Terrorist Networks...An example of this experience is when two colleagues in a professional school learn that one colleague was recently divorced from a woman the other

  7. [Bioterrorism--a public and health threat].

    PubMed

    Jezek, Z

    2000-11-01

    In recent years the fear of bioterrorism, of secret modernization and dissemination of biological weapons is increasing. Facts detected recently in Iran, Japan and the former Soviet Union provide evidence that there are countries and dissident groups which have access to modern technology of cultivation of dangerous pathogens as well as motivation for their use in acts of terrorism or war. The menace of biological terrorism is nowadays, as compared with the past, much greater. The most feared candidates as regards production of biological weapons are the pathogens of smallpox, anthrax and plague. The author discusses the serious character of possible events associated with terrorist dissemination of these pathogens. It is much esier to produce and use biological weapons than to create effective systems of defence against them. The menace of bioterrorism and bioweapons must not be exaggerated nor underestimated. The possible terrorist use of bioweapons is real. At present even the most advanced industrial countries cannot quarantee effective protection of their populations. Fortunately they are however aware of their present vulnerability. Our society is not equipped to cope with bioterrorism. Preparation and reinforcement of the health services, in particular of sections specialized in the control of infectious diseases is an effective step to divert the sequelae and suffering associated with terrorist use of biological agents. It is essential to be prepared. This calls for time and funds which unfortunately are not plentiful.

  8. LEPCs and Deliberate Releases: Addressing Terrorist Activities in the Local Emergency Plan

    EPA Pesticide Factsheets

    This fact sheet discusses how local emergency planning committees (LEPCs) can incorporate counter-terrorism issues when they review and update their local plans. Builds on the National Response Team's Hazardous Materials Emergency Planning Guide.

  9. Sharing the Cyber Journey

    DTIC Science & Technology

    2012-01-01

    destroy information; disrupt networks or communications; or deny service. In military terms, cyberspace is a contested environment. Hactivists, cyber ... criminals , terrorists, and adversarial nations are active in cyberspace networks across the globe; our military networks are no excep­ tion. DoD

  10. 2006 Joint Chemical Biological, Radiological and Nuclear (CBRN) Conference and Exhibition

    DTIC Science & Technology

    2006-06-28

    methods that might counter or cancel our current military advantages • Defeat terrorist networks • Defend homeland in depth • Prevent acquisition or...Systems approach to the detection of chemical and biological agents with a focus on genetically engineered organisms ( GMOs )/genetically engineered...and possessing breakthrough technological capabilities intended to supplant U.S. advantages in particular operational domains. (capsize our power

  11. Methodology to Improve Aviation Security With Terrorist Using Aircraft as a Weapon

    DTIC Science & Technology

    2013-09-01

    STATEMENT Approval for public release;distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) The aviation industry... Electronic Baggage Screening Program EDS Explosive Detection System EMMI Energy, Matter, Material wealth, and Information ETD Explosives Trace...12 All checked baggage in the United States has been subjected to 100% screening since December 2003 under TSA’s Electronic Baggage Screening

  12. Conducting Airport Anti-Terrorism Operations and Contingency Planning for Risk Reduction of the Terrorist Threat.

    DTIC Science & Technology

    1986-08-01

    victims of some of the most vicious terrorist acts occurring in the past year, airport security has come under increasing scrutiny by television...operations and contingency planning can be the weapons which airport security managers use to successfully battle the increasing trend of terrorist acts on airports today. (Author)

  13. 31 CFR Appendix A to Chapter V - Alphabetical Listing of Blocked Persons, Blocked Vessels, Specially Designated Nationals...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Alphabetical Listing of Blocked Persons, Blocked Vessels, Specially Designated Nationals, Specially Designated Terrorists, Specially Designated Global Terrorists, Foreign Terrorist Organizations, and Specially Designated Narcotics Traffickers (as of May 13, 2010) A Appendix A to Chapte...

  14. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2013 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies...

  15. Help-Seeking Behaviours of Adolescents in Relation to Terrorist Attacks: The Perceptions of Israeli Parents

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima; Kelman, Talia

    2011-01-01

    Exposure to terrorism poses a challenge for children and adolescents as well as parents. For many years, Israeli citizens have been exposed to ongoing terrorist attacks. The present article is aimed at revealing the reactions of Israeli parents when facing terrorist attacks and their perceptions regarding the help-seeking behaviours of their…

  16. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 3 The President 1 2011-01-01 2011-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2010 Continuation of the National Emergency With Respect to Certain TerroristAttacks Consistent with section 202(d) of the National Emergencies...

  17. Promethazine as a Novel Prophylaxis and Treatment for Nerve Agent Poisoning

    DTIC Science & Technology

    2008-12-01

    mitochondrial dysfunction. Mitochondrial damage after seizure activity has been previously documented (Cock et al., 2002), and mitochondrial...McDonough et al., 1998), the lack of brain pathology in surviving animals is solely due to the secondary anticholinergic activity of promethazine...rats, Experientia, 41(11), 1457-1458. Department of Health, Expert group on the management of chemical casualties by terrorist activity , 2003: Use

  18. Protecting Surface Transportation Systems and Patrons from Terrorist Activities

    DOT National Transportation Integrated Search

    1997-11-01

    This report documents the first phase of a continuing research effort carried out by the Norman Y. Mineta International Institute for Surface Transportation Policy Studies (IISTPS) on behalf of the U.S. Department of Transportation. It comprises a ch...

  19. 77 FR 28369 - Commission Information Collection Activities (FERC-576); Comment Request; Extension

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ... the requirements of the Paperwork Reduction Act of 1995, 44 U.S.C. 3506(c)(2)(A), the Federal Energy... hurricane, earthquake, or other natural disaster, or terrorist activity, (2) serious interruptions to... pipeline grid. \\1\\ Public Law 75 688; 15 U.S.C. 717 & 717w. Filings (in accordance with the provisions of...

  20. On the Radicalization Process.

    PubMed

    Leistedt, Samuel J

    2016-11-01

    This study aimed to provide an in-depth description of the radicalization process, which is a very important step in terrorist activities. The author proposes a translational analysis that is first based on the author's experience in the psychological evaluation of terrorist behavior and second on an exhaustive review of the current literature. The search terms "terrorism," "radicalization," "social psychology," and "psychopathology" were used to identify relevant studies in the following databases: Scopus, Medline, PubCentral, and Science Direct. Because of its importance, understanding radicalization process should be one of the priorities of behavioral scientists. International studies should be performed with a focus on several aspects, such as radicalization risk factors, brainwashing, the role of the media, and finally, in de-radicalization programs. © 2016 American Academy of Forensic Sciences.

  1. 3 CFR - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 3 The President 1 2011-01-01 2011-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 20, 2010 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...

  2. 3 CFR - Continuation of the National Emergency with Respect to Terrorists Who Threaten to Disrupt the...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Continuation of the National Emergency with Respect to Terrorists Who Threaten to Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 15, 2009 Continuation of the National Emergency with Respect to Terrorists Who Threaten to Disrupt the Middle...

  3. 3 CFR - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 3 The President 1 2013-01-01 2013-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 19, 2012 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...

  4. 3 CFR - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 3 The President 1 2012-01-01 2012-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 13, 2011 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...

  5. 3 CFR - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 17, 2013 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...

  6. The Violent Islamic Radicalization Process: A Framework for Understanding

    DTIC Science & Technology

    2011-12-01

    transformation from a non-violent and religiously based understanding and practice of the Islamic faith to one with a violent, religious and politically...Group Radicalization Narrative ................................37 3. Religiously Based Pathways and Theories of Salafi-Jihadi Radicalization...of terrorists, who becomes a terrorist, and why persons become terrorists in the first place, has long been a topic of study. Research conducted based

  7. Terrorism in the Maritime Domain

    DTIC Science & Technology

    2013-03-01

    Indonesia-based terrorist group formed in the early 1990s to establish an Islamic state encompassing southern Thailand, Malaysia , Singapore, Indonesia...overseas. There are instances where the warships need to replenish their fuel and food supplies in a foreign country’s harbor. The terrorist group...initiated to improve the maritime domain awareness in the tri-border area (TBA) between the Philippines, Malaysia , and Indonesia, where terrorist

  8. Swot analysis of using aerostats for surveillance in counter terrorism

    NASA Astrophysics Data System (ADS)

    Çetin, Hüseyin

    2013-06-01

    In today's conjuncture, the terrorist activities are the most compelling issue for the defence forces in maintaining homeland security. Especially, the terrorist elements that penetrate the homeland may give harm. This harm can be minimized by preventing the terrorist penetrations from homeland borders. In counter terrorism, having Intelligence, Surveillance and Reconnaissance (ISR) capability and using this capability by twenty four hours is deterrence for the terrorist groups. Aerostats emerge as the ideal platform which can provide this capability. Aerostats are unmanned and aerodynamically shaped balloons that are stayed in the air, fixed to the ground by steel cable(s). The aerostat is made of a large fabric envelope that is filled with nonflammable helium gas, which provides the lifting force. The cables also serve to supply the electrical power to the aerostat systems, and for data relay between the aerostat and the ground station. Aerostats are different from the other manned and Unmanned Aerial Vehicles (UAVs) because of aerostats' capabilities such as cost effectiveness, long endurance and high resolution image transmission. Especially having uninterrupted image transmission and surveillance capabilities is important to be advantageous in counter terrorism. In this article, a short definition of terrorism has been given and then the importance of ensuring the homeland border security has been emphasized in counter terrorism. In addition, the questions of "what are the technical capabilities, the usage areas and the purposes of aerostats?" will be introduced as a result of literature review. Finally the strengths and weaknesses of aerostats, opportunities and threats for the near future will be introduced by using "SWOT" analysis method.

  9. [Terrorism and human behavior].

    PubMed

    Leistedt, S J

    2018-04-01

    Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  10. Major depressive disorder following terrorist attacks: A systematic review of prevalence, course and correlates

    PubMed Central

    2011-01-01

    Background Terrorist attacks are traumatic events that may result in a wide range of psychological disorders for people exposed. This review aimed to systematically assess the current evidence on major depressive disorder (MDD) after terrorist attacks. Methods A systematic review was performed. Studies included assessed the impact of human-made, intentional, terrorist attacks in direct victims and/or persons in general population and evaluated MDD based on diagnostic criteria. Results A total of 567 reports were identified, 11 of which were eligible for this review: 6 carried out with direct victims, 4 with persons in general population, and 1 with victims and general population. The reviewed literature suggests that the risk of MDD ranges between 20 and 30% in direct victims and between 4 and 10% in the general population in the first few months after terrorist attacks. Characteristics that tend to increase risk of MDD after a terrorist attack are female gender, having experienced more stressful situations before or after the attack, peritraumatic reactions during the attack, loss of psychosocial resources, and low social support. The course of MDD after terrorist attacks is less clear due to the scarcity of longitudinal studies. Conclusions Methodological limitations in the literature of this field are considered and potentially important areas for future research such as the assessment of the course of MDD, the study of correlates of MDD or the comorbidity between MDD and other mental health problems are discussed. PMID:21627850

  11. Aviation Security: Implementation of Recommendations Is Under Way, but Completion Will Take Several Years

    DOT National Transportation Integrated Search

    1998-04-01

    As the threat of terrorist activities has increased in the United States, the need to improve domestic aviation security has grown. Currently, the Federal Aviation Administration (FAA), other federal agencies, and the aviation industry are implementi...

  12. Dielectrophoretic separation of Bacillus subtilis spores from environmental diesel particles.

    PubMed

    Fatoyinbo, Henry O; Hughes, Michael P; Martin, Stacey P; Pashby, Paul; Labeed, Fatima H

    2007-01-01

    Isolation of pathogenic bacteria from non-biological material of similar size is a vital sample preparation step in the identification of such organisms, particularly in the context of detecting bio-terrorist attacks. However, many detection methods are impeded by particulate contamination from the environment such as those from engine exhausts. In this paper we use dielectrophoresis--the induced motion of particles in non-uniform fields--to successfully remove over 99% of diesel particulates acquired from environmental samples, whilst letting bacterial spores of B. subtilis pass through the chamber largely unimpeded. We believe that such a device has tremendous potential as a precursor to a range of detection methods, improving the signal-to-noise ratio and ultimately improving detection rates.

  13. Solvent-Free Off-On Detection of the Improvised Explosive Triacetone Triperoxide (TATP) with Fluorogenic Materials.

    PubMed

    Calvo-Gredilla, Patricia; García-Calvo, José; Cuevas, José V; Torroba, Tomás; Pablos, Jesús-Luis; García, Félix C; García, José-Miguel; Zink-Lorre, Nathalie; Font-Sanchis, Enrique; Sastre-Santos, Ángela; Fernández-Lázaro, Fernando

    2017-10-09

    A fluorogenic perylenediimide-functionalized polyacrylate capable of generating color and fluorescence changes in the presence of triacetone triperoxide TATP), an improvised explosive used in terrorist attacks, under solvent-free, solid-state conditions has been developed. The material works by accumulating volatile TATP until it reaches a threshold; therefore, triggering colorimetric and fluorescent responses. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Defeating Improvised Explosive Devices (IED): Asymmetric Threats and Capability Gaps

    DTIC Science & Technology

    2011-03-23

    City, Oklahoma bombings in 1995. In order to adapt and avoid detection, terrorists are exploring other options, such as using potassium chlorate ...white, odorless powder) or sodium chlorate (yellow, odorless powder) when making IEDs. High-profile, historic examples include the London attacks...and potassium nitrate. It is the main ingredient found in fireworks. In the past it was used as a propellant powder in ammunition, http

  15. Toxicology of organophosphorus compounds in view of an increasing terrorist threat.

    PubMed

    Worek, Franz; Wille, Timo; Koller, Marianne; Thiermann, Horst

    2016-09-01

    The implementation of the Chemical Weapon Convention (CWC), prohibiting the development, production, storage and use of chemical weapons by 192 nations and the ban of highly toxic OP pesticides, especially class I pesticides according to the WHO classification, by many countries constitutes a great success of the international community. However, the increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents new challenges to our societies. Almost seven decades of research on organophosphorus compound (OP) toxicology was mainly focused on a small number of OP nerve agents despite the fact that a huge number of OP analogues, many of these agents having comparable toxicity to classical nerve agents, were synthesized and published. Only limited physicochemical, toxicological and medical information on nerve agent analogues is available in the open literature. This implies potential gaps of our capabilities to detect, to decontaminate and to treat patients if nerve agent analogues are disseminated and may result in inadequate effectiveness of newly developed countermeasures. In summary, our societies may face new, up to now disregarded, threats by toxic OP which calls for increased awareness and appropriate preparedness of military and civilian CBRN defense, a broader approach for new physical and medical countermeasures and an integrated system of effective detection, decontamination, physical protection and treatment.

  16. Investigations of chemical warfare agents and toxic industrial compounds with proton-transfer-reaction mass spectrometry for a real-time threat monitoring scenario.

    PubMed

    Kassebacher, Thomas; Sulzer, Philipp; Jürschik, Simone; Hartungen, Eugen; Jordan, Alfons; Edtbauer, Achim; Feil, Stefan; Hanel, Gernot; Jaksch, Stefan; Märk, Lukas; Mayhew, Chris A; Märk, Tilmann D

    2013-01-30

    Security and protection against terrorist attacks are major issues in modern society. One especially challenging task is the monitoring and protection of air conditioning and heating systems of buildings against terrorist attacks with toxic chemicals. As existing technologies have low selectivity, long response times or insufficient sensitivity, there is a need for a novel approach such as we present here. We have analyzed various chemical warfare agents (CWAs) and/or toxic industrial compounds (TICs) and related compounds, namely phosgene, diphosgene, chloroacetone, chloroacetophenone, diisopropylaminoethanol, and triethyl phosphate, utilizing a high-resolution proton-transfer-reaction time-of-flight mass spectrometry (PTR-TOFMS) instrument with the objective of finding key product ions and their intensities, which will allow a low-resolution quadrupole mass spectrometry based PTR-MS system to be used with high confidence in the assignment of threat agents in the atmosphere. We obtained high accuracy PTR-TOFMS mass spectra of the six compounds under study at two different values for the reduced electric field in the drift tube (E/N). From these data we have compiled a table containing product ions, and isotopic and E/N ratios for highly selective threat compound detection with a compact and cost-effective quadrupole-based PTR-MS instrument. Furthermore, using chloroacetophenone (tear gas), we demonstrated that this instrument's response is highly linear in the concentration range of typical Acute Exposure Guideline Levels (AEGLs). On the basis of the presented results it is possible to develop a compact and cost-effective PTR-QMS instrument that monitors air supply systems and triggers an alarm as soon as the presence of a threat agent is detected. We hope that this real-time surveillance device will help to seriously improve safety and security in environments vulnerable to terrorist attacks with toxic chemicals. Copyright © 2012 John Wiley & Sons, Ltd.

  17. Wireless system for explosion detection in underground structures

    NASA Astrophysics Data System (ADS)

    Chikhradze, M.; Bochorishvili, N.; Akhvlediani, I.; Kukhalashvili, D.; Kalichava, I.; Mataradze, E.

    2009-06-01

    Considering the growing threat of terrorist or accidental explosions in underground stations, underground highway and railway sections improvement of system for protecting people from explosions appears urgent. Current automatic protective devices with blast identification module and blast damping absorbers of various designs as their basic elements cannot be considered effective. Analysis revealed that low reliability of blast detection and delayed generation of start signal for the activation of an absorber are the major disadvantages of protective devices. Besides the transmission of trigger signal to an energy absorber through cable communication reduces the reliability of the operation of protective device due to a possible damage of electric wiring under blast or mechanical attack. This paper presents the outcomes of the studies conducted to select accurate criteria for blast identification and to design wireless system of activation of defensive device. The results of testing of blast detection methods (seismic, EMP, optical, on overpressure) showed that the proposed method, which implies constant monitoring of overpressure in terms of its reliability and response speed, best meets the requirements. Proposed wireless system for explosions identification and activation of protective device consists of transmitter and receiver modules. Transmitter module contains sensor and microprocessor equipped with blast identification software. Receiver module produces activation signal for operation of absorber. Tests were performed in the underground experimental base of Mining Institute. The time between the moment of receiving signal by the sensor and activation of absorber - 640 microsecond; distance between transmitter and receiver in direct tunnel - at least 150m; in tunnel with 900 bending - 50m. This research is sponsored by NATO's Public Diplomacy Division in the framework of "Science for Peace".

  18. The Spatial and Temporal Patterns of Insurgent Attacks

    DTIC Science & Technology

    2014-06-13

    INTRODUCTION We must not rely on changing the hearts and minds of terrorists. The motivation for terrorism results from long-term social, cultural and...psychological pressures, which are difficult to alter. But motivation is only part of the formula for terrorism. The other is opportunity for attack that...terrorists; motivation and opportunity reduction brings more immediate protection. In any case, easy opportunities encourage terrorists to attack

  19. Combatting the Terrorist Threat.

    DTIC Science & Technology

    1985-05-22

    tomorrow. Today terrorist actions carried out against US interests occur primarily in Guatemala, Honduras, El Salvador, Nicaragua, Colombia, Peru , and Chile...provided arms, financial support, and safehavens for revolutionary groups from El Salvador and Honduras. 9 In Peru the Maoist guerrilla group Sendero...I DTIC TAB U --anoinced El Justificatio By Distributi-,n/ WtI3ATIN THE TERRORIST THREAT Availability CodesAvail and/or A GRUP SIJDY PPOEC Dist Special

  20. Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces

    DTIC Science & Technology

    2009-04-01

    terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT

  1. Closing the Gap: Measuring the Social Identity of Terrorists

    DTIC Science & Technology

    2008-09-01

    considering social psychological aspects of terrorism studies. Despite what might be apparent within the media and even parts of academic circles, terrorism...MEASURING THE SOCIAL IDENTITY OF TERRORISTS by Keith W. Ludwick September 2008 Thesis Advisor: Anders Strindberg Second Reader: David...COVERED Master’s Thesis 4. TITLE AND SUBTITLE Closing the Gap: Measuring the Social Identity of Terrorists 6. AUTHOR(S) Keith W. Ludwick 5

  2. Low Dose Sarin Leads To Murine Cardiac Dysfunction

    DTIC Science & Technology

    2010-03-01

    work directly supported a grant held by Wright State University, grant # GW060050, from the United States Army Medical Research Acquisition Activity ...GB), acts as an irreversible AChE inhibitor. Sarin reacts with the serine hydroxyl residue in the active site of AChE to form a phosphate or...United States Air Force has become increasingly engaged with terrorist groups and other elusive enemies. As these activities increase, the potential for

  3. Body-borne IED detection: NATO DAT#10 BELCOAST 09 demonstration results

    NASA Astrophysics Data System (ADS)

    Alexander, Naomi; Gómez, Ignacio; Ortega, Isabel; Fiore, Franco; Coman, Cristian

    2010-04-01

    Belgium leads the tenth initiative in the CNAD Programme of Work for the Defense Against Terrorism (PoW DAT), dealing with Critical Infrastructure Protection (CIP). The BELCOAST 09 event, comprising a series of technology demonstrations, was organized to tackle the need for an event that brings together the operational, armaments and technological communities in the field of CIP. A counter terrorism scenario has been created: Terrorist with body-borne IED approaching the entrance of an installation, and a millimeter-wave imager's ability to detect IEDs has been demonstrated. The results of this scenario-based demonstration are presented in this paper.

  4. Fluid Mechanics and Homeland Security

    NASA Astrophysics Data System (ADS)

    Settles, Gary S.

    2006-01-01

    Homeland security involves many applications of fluid mechanics and offers many opportunities for research and development. This review explores a wide selection of fluids topics in counterterrorism and suggests future directions. Broad topics range from preparedness and deterrence of impending terrorist attacks to detection, response, and recovery. Specific topics include aircraft hardening, blast mitigation, sensors and sampling, explosive detection, microfluidics and labs-on-a-chip, chemical plume dispersal in urban settings, and building ventilation. Also discussed are vapor plumes and standoff detection, nonlethal weapons, airborne disease spread, personal protective equipment, and decontamination. Involvement in these applications requires fluid dynamicists to think across the traditional boundaries of the field and to work with related disciplines, especially chemistry, biology, aerosol science, and atmospheric science.

  5. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ball, Ryan Jokl

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly usedmore » by terrorists in asymmetric conflicts.« less

  6. 31 CFR 1021.500 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.500 General. Casinos and card clubs are subject to the special information sharing procedures to deter money laundering...

  7. 31 CFR 1021.500 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.500 General. Casinos and card clubs are subject to the special information sharing procedures to deter money laundering...

  8. 31 CFR 1021.500 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.500 General. Casinos and card clubs are subject to the special information sharing procedures to deter money laundering...

  9. 31 CFR 1021.500 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.500 General. Casinos and card clubs are subject to the special information sharing procedures to deter money laundering...

  10. National Institute of Justice (NIJ): technology challenges

    NASA Astrophysics Data System (ADS)

    Morgan, John S.

    2004-09-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. The National Institute of Justice (NIJ) is the focal point for the research, development, test and evaluation of technology for law enforcement. NIJ and the Department of Homeland Security's Directorate of Science & Technology (DHS S&T) have related missions to support research and technology development for public safety. DHS S&T provides law enforcement agencies technology to respond to terrorist threats involving weapons of mass destruction, while NIJ focuses on technologies applicable across the spectrum of law enforcement needs. Investment in C3I technology offers perhaps the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. Providing effective communications and information systems remains a key technology challenge, as does providing law enforcement responders accurate information that they can act on. Sensors and surveillance systems can play a key role in identifying terrorists and preventing or effectively responding to a terrorist attack.

  11. Investigating the Aftermath of Terror: Fundamental Outcomes, Methodological Choices, and Future Directions.

    PubMed

    Gradus, Jaimie L; Marx, Brian P; Sloan, Denise M

    2016-06-01

    Acts of terrorism are becoming increasingly common throughout the world. These events represent a significant public health concern given the associated health consequences. Although it is clear that terrorist attacks have mental and physical health sequelae, the exact nature and prevalence of these consequences are unclear. Epidemiological research can play an important role in better understanding the mental and physical impact of terrorist attacks. In this editorial, we highlight recent epidemiological research on these terrorism-related health outcomes. We also provide suggestions for how future studies can build on the existing literature and describe ways in which epidemiological methods can be harnessed to extend the current literature. Lastly, we offer recommendations on how to best prepare communities for the aftermath of terrorist attacks, highlighting secondary intervention and prevention strategies. Overall, multilevel strategies are needed to adequately cope with the growing rise of terrorist acts, and these strategies will have to be reassessed as the nature of terrorist attacks changes.

  12. Terrorist Group Brands: Understanding Terrorist Group Strategies Through Brand Exposure

    DTIC Science & Technology

    2016-06-01

    firms do, terrorist groups use branding to increase support and thus their capacity to conduct operations. This thesis introduces the new concept...The commercial marketplace uses branding to differentiate the products of one company from another.5 Scholars apply the term brand loosely and...these brands brings with it perceived added value to the product performance, trust, and reliability.11 Consumers also recognize people themselves as

  13. A European Solution to Islamic Extremism in Western Europe

    DTIC Science & Technology

    2006-04-14

    Physically destroying terrorist organizations (“direct action”) is an effective tool. Where freedom of action and freedom of movement exist, there... effectiveness and sometimes duplicate effort. This paper will explain the growing Islamic extremist threat in Western Europe and present a case for why that...native-born youth franchise al-Qa’ida and execute a terrorist attack that effects a change in government. Terrorists executed a planned and deliberate

  14. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    DTIC Science & Technology

    1999-09-01

    where many terrorists first become familiar with Marxist-Leninist ideology or other revolutionary ideas and get involved with radical groups. Russell...Terrorists have the ability to use a variety of weapons, vehicles, and communications equipment and are familiar with their physical environment...acquires the group’s mindset only after being fully indoctrinated and familiarized with its ideology, point of view, leadership attitudes, ways of

  15. The changing face of terrorism in the 21st century: the communications revolution and the virtual community of hatred.

    PubMed

    Post, Jerrold M; McGinnis, Cody; Moody, Kristen

    2014-01-01

    There are no psychological characteristics or psychopathology separating terrorists from the general population. Rather, it is group dynamics, with a particular emphasis on collective identity, that helps to explain terrorist psychology. Just as there is a diverse spectrum of kinds of terrorism, so too is there a spectrum of terrorist psychologies. Some terrorists, those in nationalist-separatist groups, such as Fatah and the IRA, are continuing with the mission of their parents who are dissident to the regime. The opposite generational provenance is seen among social-revolutionary terrorists, such as the Weather Underground and the Red Army Faction in Germany, who are rebelling against their parents' generation, which is loyal to the regime. Four waves of terrorism can be distinguished: the "anarchist wave"; the "anti-colonial wave" (nationalist-separatist), with minority groups seeking to be liberated from their colonial masters or from the majority in their country; the "new left" wave (social-revolutionary); and now the "religious" wave. With the communications revolution, a new phenomenon is emerging which may presage a fifth wave: lone wolf terrorists who through the Internet are radicalized and feel they belong to the virtual community of hatred. A typology of lone wolf terrorism is proposed. Copyright © 2014 John Wiley & Sons, Ltd.

  16. Damage Detection of a Concrete Column Subject to Blast Loads Using Embedded Piezoceramic Transducers.

    PubMed

    Xu, Kai; Deng, Qingshan; Cai, Lujun; Ho, Siuchun; Song, Gangbing

    2018-04-28

    Some of the most severe structural loadings come in the form of blast loads, which may be caused by severe accidents or even terrorist activities. Most commonly after exposure to explosive forces, a structure will suffer from different degrees of damage, and even progress towards a state of collapse. Therefore, damage detection of a structure subject to explosive loads is of importance. This paper proposes a new approach to damage detection of a concrete column structure subjected to blast loads using embedded piezoceramic smart aggregates (SAs). Since the sensors are embedded in the structure, the proposed active-sensing based approach is more sensitive to internal or through cracks than surface damage. In the active sensing approach, the embedded SAs act as actuators and sensors, that can respectively generate and detect stress waves. If the stress wave propagates across a crack, the energy of the wave attenuates, and the reduction of the energy compared to the healthy baseline is indicative of a damage. With a damage index matrix constructed by signals obtained from an array of SAs, cracks caused by blast loads can be detected throughout the structure. Conventional sensing methods such as the measurement of dynamic strain and acceleration were included in the experiment. Since columns are critical elements needed to prevent structural collapse, knowledge of their integrity and damage conditions is essential for safety after exposure to blast loads. In this research, a concrete column with embedded SAs was chosen as the specimen, and a series of explosive tests were conducted on the column. Experimental results reveal that surface damages, though appear severe, cause minor changes in the damage index, and through cracks result in significant increase of the damage index, demonstrating the effectiveness of the active sensing, enabled by embedded SAs, in damage monitoring of the column under blast loads, and thus providing a reliable indication of structural integrity in the event of blast loads.

  17. Damage Detection of a Concrete Column Subject to Blast Loads Using Embedded Piezoceramic Transducers

    PubMed Central

    Deng, Qingshan; Cai, Lujun; Ho, Siuchun; Song, Gangbing

    2018-01-01

    Some of the most severe structural loadings come in the form of blast loads, which may be caused by severe accidents or even terrorist activities. Most commonly after exposure to explosive forces, a structure will suffer from different degrees of damage, and even progress towards a state of collapse. Therefore, damage detection of a structure subject to explosive loads is of importance. This paper proposes a new approach to damage detection of a concrete column structure subjected to blast loads using embedded piezoceramic smart aggregates (SAs). Since the sensors are embedded in the structure, the proposed active-sensing based approach is more sensitive to internal or through cracks than surface damage. In the active sensing approach, the embedded SAs act as actuators and sensors, that can respectively generate and detect stress waves. If the stress wave propagates across a crack, the energy of the wave attenuates, and the reduction of the energy compared to the healthy baseline is indicative of a damage. With a damage index matrix constructed by signals obtained from an array of SAs, cracks caused by blast loads can be detected throughout the structure. Conventional sensing methods such as the measurement of dynamic strain and acceleration were included in the experiment. Since columns are critical elements needed to prevent structural collapse, knowledge of their integrity and damage conditions is essential for safety after exposure to blast loads. In this research, a concrete column with embedded SAs was chosen as the specimen, and a series of explosive tests were conducted on the column. Experimental results reveal that surface damages, though appear severe, cause minor changes in the damage index, and through cracks result in significant increase of the damage index, demonstrating the effectiveness of the active sensing, enabled by embedded SAs, in damage monitoring of the column under blast loads, and thus providing a reliable indication of structural integrity in the event of blast loads. PMID:29710807

  18. The ins and outs of terrorist bus explosions: injury profiles of on-board explosions versus explosions occurring adjacent to a bus.

    PubMed

    Golan, Ron; Soffer, Dror; Givon, Adi; Peleg, Kobi

    2014-01-01

    Terrorist explosions occurring in varying settings have been shown to lead to significantly different injury patterns among the victims, with more severe injuries generally arising in confined space attacks. Increasing numbers of terrorist attacks have been targeted at civilian buses, yet most studies focus on events in which the bomb was detonated within the bus. This study focuses on the injury patterns and hospital utilisation among casualties from explosive terrorist bus attacks with the bomb detonated either within a bus or adjacent to a bus. All patients hospitalised at six level I trauma centres and four large regional trauma centres following terrorist explosions that occurred in and adjacent to buses in Israel between November 2000 and August 2004 were reviewed. Injury severity scores (ISS) were used to assess severity. Hospital utilisation data included length of hospital stay, surgical procedures performed, and intensive care unit (ICU) admission. The study included 262 victims of 22 terrorist attacks targeted at civilian bus passengers and drivers; 171 victims were injured by an explosion within a bus (IB), and 91 were injured by an explosion adjacent to a bus (AB). Significant differences were noted between the groups, with the IB population having higher ISS scores, more primary blast injury, more urgent surgical procedures performed, and greater ICU utilisation. Both groups had percentages of nearly 20% for burn injury, had high percentages of injuries to the head/neck, and high percentages of surgical wound and burn care. Explosive terrorist attacks detonated within a bus generate more severe injuries among the casualties and require more urgent surgical and intensive level care than attacks occurring adjacent to a bus. The comparison and description of the outcomes to these terrorist attacks should aid in the preparation and response to such devastating events. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Bale, J; Moran, K

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attackmore » chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4) the refinement of the DECIDe--the Determinants Effecting Critical Infrastructure Decisions--analytical framework to make the factors and dynamics identified by the study more ''usable'' in future efforts to assess terrorist intentions to target chemical-related infrastructure.« less

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughlin, Gary L.

    The International, Homeland, and Nuclear Security (IHNS) Program Management Unit (PMU) oversees a broad portfolio of Sandia’s programs in areas ranging from global nuclear security to critical asset protection. We use science and technology, innovative research, and global engagement to counter threats, reduce dangers, and respond to disasters. The PMU draws on the skills of scientists and engineers from across Sandia. Our programs focus on protecting US government installations, safeguarding nuclear weapons and materials, facilitating nonproliferation activities, securing infrastructures, countering chemical and biological dangers, and reducing the risk of terrorist threats. We conduct research in risk and threat analysis, monitoringmore » and detection, decontamination and recovery, and situational awareness. We develop technologies for verifying arms control agreements, neutralizing dangerous materials, detecting intruders, and strengthening resiliency. Our programs use Sandia’s High-Performance Computing resources for predictive modeling and simulation of interdependent systems, for modeling dynamic threats and forecasting adaptive behavior, and for enabling decision support and processing large cyber data streams. In this report, we highlight four advanced computation projects that illustrate the breadth of the IHNS mission space.« less

  1. 31 CFR 597.506 - Official activities of certain international organizations; U.S. person employees of certain...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...

  2. 31 CFR 597.506 - Official activities of certain international organizations; U.S. person employees of certain...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...

  3. 31 CFR 597.506 - Official activities of certain international organizations; U.S. person employees of certain...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...

  4. 31 CFR 597.506 - Official activities of certain international organizations; U.S. person employees of certain...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...

  5. Tradeoffs Associated with Fighting Terrorism.

    ERIC Educational Resources Information Center

    Deming, Stuart H.

    1997-01-01

    Elucidates the inherent conflict between national security and public safety measures necessitated by terrorism and the Fourth Amendment protections against unreasonable search and seizure. Briefly discusses the rise in terrorist activity in the 1970s and the development of airline security. Identifies several areas where personal freedom has been…

  6. Fabricating Synthetic Data in Support of Training for Domestic Terrorist Activity Data Mining Research

    DTIC Science & Technology

    2010-09-01

    of Mannheim seeks to produce realistic digital images for student analysis ( Moch & Freiling, 2009). Using instructor generated scripts and the...laboratory. ACM Transactions on Information and System Security, (pp. 262-294). Moch , C., & Freiling, F. (2009). The forensic image generator

  7. 31 CFR 1024.500 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR MUTUAL FUNDS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity § 1024.500 General. Mutual funds are subject to the... forth and cross referenced in this subpart. Mutual funds should also refer to subpart E of part 1010 of...

  8. 75 FR 14245 - Voluntary Intermodal Sealift Agreement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-24

    ... emergency deployment and sustainment of U.S. military forces. This is to be accomplished through cooperation... significant portion of surge and sustainment requirements in the deployment of U.S. military forces during war... with military forces in response to: (i) Natural disasters; (ii) terrorists or subversive activities...

  9. Failure to Launch?

    ERIC Educational Resources Information Center

    Asquith, Christina

    2006-01-01

    When reporters from the Arabic news channel Aljazeera International traveled on assignment to Crosby, North Dakota, they did not receive a warm welcome from locals. Instead, someone called the sheriff, who then reported possible terrorist activity to the U.S. Border Patrol. After a brief interrogation, agents confirmed that they were American…

  10. Detecting Change in Longitudinal Social Networks

    DTIC Science & Technology

    2011-01-01

    organizational change may cause a manager to investigate the presence of good initiatives and see them through to implementation. On the other hand, terrorist... marketing campaigns and media on social behavior. Initial Construct populations, social and knowledge networks, can be hypothetical or real (Carley...mality Data tic data set f any) are 9 independe easible for th ication probl d, this is simp the radio lso known as e unit as a res significant t

  11. Wireless device for activation of an underground shock wave absorber

    NASA Astrophysics Data System (ADS)

    Chikhradze, M.; Akhvlediani, I.; Bochorishvili, N.; Mataradze, E.

    2011-10-01

    The paper describes the mechanism and design of the wireless device for activation of energy absorber for localization of blast energy in underground openings. The statistics shows that the greatest share of accidents with fatal results associate with explosions in coal mines due to aero-methane and/or air-coal media explosion. The other significant problem is terrorist or accidental explosions in underground structures. At present there are different protective systems to reduce the blast energy. One of the main parts of protective Systems is blast Identification and Registration Module. The works conducted at G. Tsulukidze Mining Institute of Georgia enabled to construct the wireless system of explosion detection and mitigation of shock waves. The system is based on the constant control on overpressure. The experimental research continues to fulfill the system based on both threats, on the constant control on overpressure and flame parameters, especially in underground structures and coal mines. Reaching the threshold value of any of those parameters, the system immediately starts the activation. The absorber contains a pyrotechnic device ensuring the discharge of dispersed water. The operational parameters of wireless device and activation mechanisms of pyrotechnic element of shock wave absorber are discussed in the paper.

  12. Radiation Detection for Homeland Security Applications

    NASA Astrophysics Data System (ADS)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.

  13. Psychophysiological characteristics in the ChNPP accident clean-up workers, exclusion zone evacuees and anti-terrorist operation servicemen.

    PubMed

    Loganovsky, K M; Gresko, M V

    2017-12-01

    Evaluation of interdependencies between psychometric parameters and spontaneous cerebral electric activity in the ChNPP accident clean up workers, evacuees from exclusion zone, and anti terrorist operation service men. Psychometric and neurophysiological parameters were reviewed in the study subjects retro spectively and in comparison. Study population included the ChNPP accident clean up workers (ACUW), evacuees from the 30 kilometer exclusion zone, specifically in a sample from a cohort of the NRCRM Clinical Epidemiological Register (n=316), and anti terrorist operation servicemen (n=81) undergoing rehabilitation in the NRCRM Radiation psychoneurology department. A control group of persons (n=84) was also involved in the study. Diagnostic method ology for the characteristic personality features, namely the personality test of character accentuation by G. Shmishek and K. Leonhard, and Eysenck Personality Inventory (by H. J. Eysenck) were applied. Computer EEGs were registered and analyzed on the 16 channel electroencephalograph DX 4000 (Kharkiv, Ukraine). In the aftermath of the emergency period, a personality deformation occurs in the clean up workers and survivors of the ChNPP accident, which is characterized by aggravation of such personality traits as jam (fixedness), emotiveness, pedantry, anxiety, cyclothymia, excitability and disthymia, with diminished hyperthymia and ostenta tion (demonstrability). Increased incidence of fixedness, pedantry, cyclothymia, affectability and disthymia with decreased hyperthymia were revealed in the group of ATO participants. Cerebral bioelectrical activity in the ChNPP ACUW was characterized by an increased delta activity power with decreased beta and theta activity power and dom inant frequency in comparison with all groups of survivors and control group. The ATO group was different from groups of survivors and control group with a lower power of delta, theta and beta activity, and a higher dominant frequency. Introversion featured a negative correlation with delta and theta activity index along with positive cor relation with alpha activity index. The absolute spectral power of beta, alpha and theta bands positively correlated with introversion. Increase in neuroticism featured a decrease in theta activity index and an increase in beta activ ity index along with decreased theta and delta band absolute spectral power. There is a deformation of personality in the group of ChNPP ACUW, evacuees from the 30 kilometer zone and ATO servicemen. Deformation of personality correlates with abnormal cerebral bioelectrical activity. K.M. Loganovsky, M.V. Gresko.

  14. A Mature Maritime Strategy for Africa to Meet National Security Goals

    DTIC Science & Technology

    2011-06-17

    by corrupt governments, poverty, piracy, poaching in territorial waters, terrorist cells, militant youth activities, environmental violations, illegal...regions with maritime distress that are, or have the potential to impact vital U.S. national interests. Good national strategy that informs combatant and...environmental violations and many other debilitating maritime activities get conveyed ashore and directly impact the security and well-being of the

  15. Hezbollah’s Passport: Religion, Culture, and the Lebanese Diaspora

    DTIC Science & Technology

    2015-05-23

    trafficking, weapons trading, money laundering , and forgery of products and intellectual property. 114 The porous tri-border region between Paraguay...raising money through criminal activities, and directly supporting other terrorist groups. All of its operations on the continent attempt to enhance...diaspora in West Africa, Hezbollah is involved in a multitude of criminal activities which also raise considerable sums of money for the organization

  16. Remote Sensing Laboratory - RSL

    ScienceCinema

    None

    2018-01-16

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  17. The challenge of improvised explosives

    DOE PAGES

    Maienschein, Jon L.

    2012-06-14

    Energetic materials have been developed for decades, and indeed centuries, with a common set of goals in mind. Performance (as a detonating explosive, a propellant, or a pyrotechnic) has always been key, equally important have been the attributes of safety, stability, and reproducibility. Research and development with those goals has led to the set of energetic materials commonly used today. In the past few decades, the adoption and use of improvised explosives in attacks by terrorists or third-world parties has led to many questions about these materials, e.g., how they may be made, what threat they pose to the intendedmore » target, how to handle them safely, and how to detect them. The unfortunate advent of improvised explosives has opened the door for research into these materials, and there are active programs in many countries. I will discuss issues and opportunities facing research into improvised explosives.« less

  18. Remote Sensing Laboratory - RSL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip,more » maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.« less

  19. Redefining Maritime Security Threats in the Eastern Indian Ocean Region.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Banerjee, Arjun

    This occasional paper analyzes the general security issues and trends relating to maritime trafficking of radiological and nuclear material using small vessels, minor ports, and unchecked areas of coastline existing in the Eastern Indian Ocean Region today. By the Eastern Indian Ocean Region is meant the area starting from the tip of the Indian peninsula in the west to the Straits of Malacca in the east. It lays focus on the potential sources of nuclear or radiological material that may be trafficked here. It further undertakes a study of the terrorist groups active in the region as well as themore » multinational or national interdiction organizations that have been created to counter maritime threats. It also seeks to discern the various technologies for detecting materials of concern available in the area. Finally, it ascertains possible methods and technologies to improve the maritime security system in the region.« less

  20. Sensitive But Unclassified Information and Other Controls: Policy and Options for Scientific and Technical Information

    DTIC Science & Technology

    2006-12-29

    access to scientific and technical information (S& T ) for legitimate uses while protecting it from potential terrorists poses difficult policy choices...September 11, 2001 terrorist attacks, controls increasingly have been placed on some unclassified research and S& T information, including that used to...identify SBU information, especially S& T information; how to keep it from terrorists, while allowing access for those who need to use it; and how to

  1. Aptitude for Destruction. Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups

    DTIC Science & Technology

    2005-01-01

    traditional military operations against opposing security forces with terrorist bombings or assassinations-we use "terrorism," "terrorist violence ," and...in the Israeli military. The IDF pres- sured Hizballah in a variety of ways, ranging from threats against its leadership to technological measures... violence . The group’s implementation of this strategy is articulated in The Green Book, a PIRA policy and training manual:2 1. A war of attrition against

  2. Update on the Global Campaign Against Terrorist Financing: Second Report of an Independent Task Force on Terrorist Financing

    DTIC Science & Technology

    2004-06-15

    therefore should be the subject of additional due diligence . Independent Task Force on Terrorist Financing 47 • Cooperate fully with any multilateral...unusually talented group who brought enthusiasm, diligence , and strong analytical skills to this project. We are especially appreciative of the hard...State Department’s latest Patterns of Global Terrorism report, continue to give praise where praise is due but too often go to lengths to avoid

  3. Waging and Fighting e Jihad

    DTIC Science & Technology

    2012-12-01

    across the internet, and terrorists have evolved to become more adept at covert communication. Web chat through on multiplayer online video games ...Tom Wells. “TERRORISTS are using online war games like Call of Duty to plot attacks, The Sun can reveal.” http://www.thesun.co.uk/sol/homepage/news...4205896/Terrorists-play- online - games -like-Call-of- Duty-to-plan-attacks.html#ixzz2E2lOCwjd 10 Daily News and Analysis. “Headley used ’electronic dead

  4. Jemaah Islamiyah: Reevaluating the Most Dangerous Terrorist Threat in Southeast Asia

    DTIC Science & Technology

    2010-12-01

    why some terrorist groups last longer than others, namely “ideological motivation , economic conditions, regime type, the size of groups, and/or the...States Air Force, RAND Corporation and Project Air Force (U.S.), The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a...in 2003 and 2004, then shifted tactics from car bombs to backpack bombs for their 2005 and 2009 attacks.58 Their operatives received safe haven and

  5. Globalization and U.S. Navy Forces

    DTIC Science & Technology

    2002-07-01

    terrorists from Carlos the Jackal to Osama bin Laden. Sudan has been far too eco- nomically destitute to cause international trouble, but now has oil. Sudan...Asia’s stability, and possibly even its future, the two governments enter into a new coop- erative relationship recalling the " golden moment" of Baker...nationality. But, unlike the 1970s, when there were European and Japanese terrorists (even a Venezuelan—Carlos the Jackal ), the global terrorists of note now

  6. Maritime Security: Potential Terrorist Attacks and Protection Priorities

    DTIC Science & Technology

    2007-01-09

    Liquefied Natural Gas: Siting and Safety .” Feb. 15, 2005. 108 U.S. Coast Guard. U.S. Coast Guard Captain of the Port Long Island Sound Waterways...Order Code RL33787 Maritime Security: Potential Terrorist Attacks and Protection Priorities January 9, 2007 Paul W. Parfomak and John Frittelli...Terrorist Attacks and Protection Priorities 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  7. Relative risk perception for terrorism: implications for preparedness and risk communication.

    PubMed

    Caponecchia, Carlo

    2012-09-01

    Terrorism presents a significant risk that is often approached at public policy, infrastructure, or emergency management level. Public perceptions of the likelihood of terrorist events, and how this may relate to individual preparedness, are not always extensively examined. The tendency to think that negative events are less likely to happen to oneself than to the average person is known as optimism bias. Optimism bias is relevant to perceptions of terrorism, because it is thought to be related to a reduction in precaution use. Using an online survey of 164 participants, this study aimed to determine whether Sydney residents thought they had a lower likelihood of experiencing terrorist events than other Australians. Significant optimism bias was observed for witnessing terrorist events, but not for personally experiencing terrorist events. In addition, Sydney residents tended to think that terrorist attacks were more likely to occur in Sydney than another major Australian city in the next five years. At the same time, household and workplace preparedness for terrorism was quite low, as was awareness of emergency strategies in the central business district. Perceptions of high likelihood of terrorism happening in one's own city, yet low preparedness present a challenge for risk communication and emergency management strategies. The diversity of possible terrorist targets, and the simple plans that can moderate the effects of a disaster may need to be emphasized in future anti-terrorism initiatives. © 2012 Society for Risk Analysis.

  8. Regional Spillover Effects of the Iraq War

    DTIC Science & Technology

    2008-12-01

    buildings in many cases have been looted, vandalized , or rendered uninhabitable.73 AL-QAEDA AND OTHER TERRORIST ACTIVITIES INSIDE IRAQ The actual and... Teens Trained to be bombers,” Bahrain Tribune, May 27, 2008, internet. 90. Rowan Scarborough, “U.S. Military’s Restraint Not al- Qaeda’s War Code

  9. Protecting surface transportation systems and patrons from terrorist activities : case studies of best security practices and a chronology of attacks

    DOT National Transportation Integrated Search

    1997-12-01

    This report documents the first phase of a continuing research effort carried out by the Norman Y. Mineta International Institute for Surface Transportation Policy Studies (IISTPS) on behalf of the U.S. Department of Transportation. It comprises a ch...

  10. Chemical Safety Information, Site Security and Fuels Regulatory Relief Act: Public Distribution of Off-Site Consequence Analysis Information Fact Sheet

    EPA Pesticide Factsheets

    Based on assessments of increased risk of terrorist/criminal activity, EPA and DOJ have issued a rule that allows public access to OCA information in ways that are designed to minimize likelihood of chemical accidents and public harm.

  11. 76 FR 54245 - Agency Information Collection Activities: Submission for OMB Review; Comment Request, Integrated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... Request, Integrated Public Alert and Warning Systems (IPAWS) Inventory AGENCY: Federal Emergency... system to alert and warn the American people in situations of war, terrorist attack, natural disaster, or... inventory of public alert and warning resources, capabilities, and the degree of integration at the Federal...

  12. Understanding Islam and Its Impact on Latin America

    DTIC Science & Technology

    2004-04-01

    30 Tri-Border Area ...in Islamic fundamentalism, and its impact to the area south of our border. v Abstract Islamic terrorism has become arguably one of the most...history of Islamic terrorist attacks in the region. Within certain lawless areas of Latin America known for illicit activities and Arab immigration

  13. Can Nuclear Terrorists be Deterred?

    NASA Astrophysics Data System (ADS)

    Ferguson, Charles

    2005-04-01

    Conventional thinking since September 11, 2001, posits that nuclear-armed terrorists cannot be deterred. However, not all terrorist groups are alike. For instance, those that are strongly affiliated with a national territory or a constituency that can be held hostage are more likely to be self-deterred against using or even acquiring nuclear weapons. In contrast, international terrorist organizations, such as al Qaeda, or apocalyptic groups, such as Aum Shinrikyo, may welcome retaliatory nuclear strikes because they embrace martyrdom. Such groups may be immune to traditional deterrence, which threatens direct punishment against the group in question or against territory or people the terrorists' value. Although deterring these groups may appear hopeless, nuclear forensic techniques could provide the means to establish deterrence through other means. In particular, as long as the source of the nuclear weapon or fissile material could be identified, the United States could threaten a retaliatory response against a nation that did not provide adequate security for its nuclear weapons or weapons-usable fissile material. This type of deterrent threat could be used to compel the nation with lax security to improve its security to meet rigorous standards.

  14. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    NASA Astrophysics Data System (ADS)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  15. INTERPOL's Surveillance Network in Curbing Transnational Terrorism

    PubMed Central

    Gardeazabal, Javier; Sandler, Todd

    2015-01-01

    Abstract This paper investigates the role that International Criminal Police Organization (INTERPOL) surveillance—the Mobile INTERPOL Network Database (MIND) and the Fixed INTERPOL Network Database (FIND)—played in the War on Terror since its inception in 2005. MIND/FIND surveillance allows countries to screen people and documents systematically at border crossings against INTERPOL databases on terrorists, fugitives, and stolen and lost travel documents. Such documents have been used in the past by terrorists to transit borders. By applying methods developed in the treatment‐effects literature, this paper establishes that countries adopting MIND/FIND experienced fewer transnational terrorist attacks than they would have had they not adopted MIND/FIND. Our estimates indicate that, on average, from 2008 to 2011, adopting and using MIND/FIND results in 0.5 fewer transnational terrorist incidents each year per 100 million people. Thus, a country like France with a population just above 64 million people in 2008 would have 0.32 fewer transnational terrorist incidents per year owing to its use of INTERPOL surveillance. This amounts to a sizeable average proportional reduction of about 30 percent.

  16. [Civilian massacre in Banija: Kraljevcani and Pecki, 14-16 March 1991].

    PubMed

    Kovacević, S; Judas, M; Marusić, A

    1991-01-01

    On 14 and 16 August 1991, Serbian terrorists attacked two villages near Petrinja in the Banija region. The village of Kraljevcani was attacked on 14 August, when the terrorists killed five older villagers, 3 women and 2 men who stayed in the village to watch the livestock and the houses. The women were killed by automatic rifle fire and grenades, and the bodies of the two men were blown up by a hand rocket-launcher projectiles. On 16 August 1991, Serbian terrorists captured four villagers from Pecki, who came to the deserted village to feed the livestock left after the inhabitants fled from the terrorists. The forensic medical expertise revealed that they were first wounded by rifle fire, then tortured and finally executed by hand axes and bayonets.

  17. West Europe Report

    DTIC Science & Technology

    1987-02-09

    it is not only the many "messages" to Washington’s political figures— active or inactive—by the Greek opposition that brought about a negative...34Outside, we are doing well," or at least better, since he remains the most popular among the active political leaders, on an equal ranking in first...who stated that he had no evidence of terrorist activities by Krystallis; That of EL.AS. Major General Stelios Tzanakis, who testified that he had no

  18. Empirical scaling law connecting persistence and severity of global terrorism

    NASA Astrophysics Data System (ADS)

    Gao, Jianbo; Fang, Peng; Liu, Feiyan

    2017-09-01

    Terrorism and counterterrorism have both been evolving rapidly. From time to time, there have been debates on whether the new terrorism is evolutionary or revolutionary. Such debate often becomes more heated after major terrorist activities, such as the terrorist attacks on September 11, 2001 and the November 13, 2015 coordinated Paris terror attack. Using country-wide terrorism data since 1970, we show that there exist scaling laws governing the continuity and persistence of world-wide terrorism, with the long-term scaling parameter for each country closely related to its yearly global terrorism index. This suggests that the new terrorism is more accurately considered evolutionary. It is further shown that the imbalance in the seesaw of terrorism and counterterrorism is not only responsible for the scaling behavior found here, but also provides new means of quantifying the severity of the global terrorism.

  19. Nuclear terrorism - Threat or not?

    NASA Astrophysics Data System (ADS)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  20. Laser photoacoustic spectroscopy helps fight terrorism: High sensitivity detection of chemical Warfare Agent and explosives

    NASA Astrophysics Data System (ADS)

    Patel, C. K. N.

    2008-01-01

    Tunable laser photoacoustic spectroscopy is maturing rapidly in its applications to real world problems. One of the burning problems of the current turbulent times is the threat of terrorist acts against civilian population. This threat appears in two distinct forms. The first is the potential release of chemical warfare agents (CWA), such as the nerve agents, in a crowded environment. An example of this is the release of Sarin by Aum Shinrikyo sect in a crowded Tokyo subway in 1995. An example of the second terrorist threat is the ever-present possible suicide bomber in crowded environment such as airports, markets and large buildings. Minimizing the impact of both of these threats requires early detection of the presence of the CWAs and explosives. Photoacoustic spectroscopy is an exquisitely sensitive technique for the detection of trace gaseous species, a property that Pranalytica has extensively exploited in its CO2 laser based commercial instrumentation for the sub-ppb level detection of a number of industrially important gases including ammonia, ethylene, acrolein, sulfur hexafluoride, phosphine, arsine, boron trichloride and boron trifluoride. In this presentation, I will focus, however, on our recent use of broadly tunable single frequency high power room temperature quantum cascade lasers (QCL) for the detection of the CWAs and explosives. Using external grating cavity geometry, we have developed room temperature QCLs that produce continuously tunable single frequency CW power output in excess of 300 mW at wavelengths covering 5 μm to 12 μm. I will present data that show a CWA detection capability at ppb levels with false alarm rates below 1:108. I will also show the capability of detecting a variety of explosives at a ppb level, again with very low false alarm rates. Among the explosives, we have demonstrated the capability of detecting homemade explosives such as triacetone triperoxide and its liquid precursor, acetone which is a common household liquid. This capability, deployed at airports and other public places, will go a long way towards increasing public safety and minimizing inconveniences faced in airline travel.

  1. Detection of Nuclear Weapons and Materials: Science, Technologies, Observations

    DTIC Science & Technology

    2008-11-06

    Nonproliferation Studies , 2004; Michael Levi, On Nuclear Terrorism, Cambridge, MA, Harvard University Press, 2007; and Carson Mark et al., “Can Terrorists Build...radiation and types of shielding. A DMOA study of real-world data found that the spectra from cargo differed between spring-summer and fall-winter; the study ...Algorithm and Resolution Studies ,” LLNL-TR-401531, December 31, 2007, by Padmini Sokkappa et al., pp. 21-22 This source is a report marked by Lawrence

  2. Homeland Security Research Improves the Nation's Ability to ...

    EPA Pesticide Factsheets

    Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.

  3. Causal Models and Exploratory Analysis in Heterogeneous Information Fusion for Detecting Potential Terrorists

    DTIC Science & Technology

    2015-11-01

    issues and made some of the same distinctions (Walker, Lempert, and Kwakkel ; Bankes, Lempert, and Popper, 2005), but it did appear that we had more than...Statistics,” British Journal of Mathematical Statistics and Pscyhology, 66, pp. 8-38. Jaynes, Edwin T., and G . Larry Bretthorst (ed.) (2003) , Probability...Giroux. Lempert, Robert J., David G . Groves, Steven W. Popper, and Steven C. Bankes (2006), “A General Analytic Method for Generating Robust

  4. Autonomous robot for detecting subsurface voids and tunnels using microgravity

    NASA Astrophysics Data System (ADS)

    Wilson, Stacy S.; Crawford, Nicholas C.; Croft, Leigh Ann; Howard, Michael; Miller, Stephen; Rippy, Thomas

    2006-05-01

    Tunnels have been used to evade security of defensive positions both during times of war and peace for hundreds of years. Tunnels are presently being built under the Mexican Border by drug smugglers and possibly terrorists. Several have been discovered at the border crossing at Nogales near Tucson, Arizona, along with others at other border towns. During this war on terror, tunnels under the Mexican Border pose a significant threat for the security of the United States. It is also possible that terrorists will attempt to tunnel under strategic buildings and possibly discharge explosives. The Center for Cave and Karst Study (CCKS) at Western Kentucky University has a long and successful history of determining the location of caves and subsurface voids using microgravity technology. Currently, the CCKS is developing a remotely controlled robot which will be used to locate voids underground. The robot will be a remotely controlled vehicle that will use microgravity and GPS to accurately detect and measure voids below the surface. It is hoped that this robot will also be used in military applications to locate other types of voids underground such as tunnels and bunkers. It is anticipated that the robot will be able to function up to a mile from the operator. This paper will describe the construction of the robot and the use of microgravity technology to locate subsurface voids with the robot.

  5. Biological and chemical terrorism scenarios and implications for detection systems needs

    NASA Astrophysics Data System (ADS)

    Gordon, Susanna P.; Chumfong, Isabelle; Edwards, Donna M.; Gleason, Nathaniel J.; West, Todd; Yang, Lynn

    2007-04-01

    Terrorists intent on causing many deaths and severe disruption to our society could, in theory, cause hundreds to tens of thousands of deaths and significant contamination of key urban facilities by using chemical or biological (CB) agents. The attacks that have occurred to date, such as the 1995 Aum Shinrikyo CB attacks and the 2001 anthrax letters, have been very small on the scale of what is possible. In order to defend against and mitigate the impacts of large-scale terrorist attacks, defensive systems for protection of urban areas and high-value facilities from biological and chemical threats have been deployed. This paper reviews analyses of such scenarios and of the efficacy of potential response options, discusses defensive systems that have been deployed and detectors that are being developed, and finally outlines the detection systems that will be needed for improved CB defense in the future. Sandia's collaboration with San Francisco International Airport on CB defense will also be briefly reviewed, including an overview of airport facility defense guidelines produced in collaboration with Lawrence Berkeley National Laboratory. The analyses that will be discussed were conducted by Sandia National Laboratories' Systems Studies Department in support of the U.S. Department of Homeland Security (DHS) Science and Technology Directorate, and include quantitative analyses utilizing simulation models developed through close collaboration with subject matter experts, such as public health officials in urban areas and biological defense experts.

  6. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    NASA Astrophysics Data System (ADS)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to generate links pointing towards the sites of research institutes and independent media organisations than sites sympathetic to Northern Irish terrorist organisations. The chapter argues that Northern Irish terrorists are only visible on search engines if net users select the correct search terms.

  7. Reliable identification and quantification of trichothecenes and other mycotoxins by electron impact and chemical ionization-gas chromatography-mass spectrometry, using an ion-trap system in the multiple mass spectrometry mode. Candidate reference method for complex matrices.

    PubMed

    Melchert, H U; Pabel, E

    2004-11-12

    Highly toxic mycotoxins like the trichothecenes can be found as contaminants from the metabolism of fungi in food and food preparations. They can be identified and quantified with great accuracy by GC/MS-measurements. Reliable analytical methods are urgently needed because such mycotoxins are not only toxic substances occurring in nature but also are in the list of biological weapons (e.g. T2-toxin, HT-2-toxin) and have some potential for terroristic attacks. By using GC/MS in the EI- and NCI- or PCI-mode and MS(n)-measurements with a 30 m Rtx 5MS fused-silica capillary column it is possible to identify and quantify all relevant mycotoxins either as underivatized substances or as their TMS-derivatives in extracts from food, food preparations or beverages with very complex matrix-derived background. This method can also be used to determine free ricinine as a biological marker for ricine in terroristic attacks. So laborious and time-consuming steps of sample-preparation can often be diminished. The LOD is in the range of 10-50 pg and the LOQ with linear calibration curves is in the range of 50-5000 pg. The high specificity of these methods helps not only to detect the existence of intentional terroristic or natural food contamination but also to avoid faulty alarm with unnecessary panic in the public. Furthermore, these methods have a high potential in ameliorating the safety of basic food and food products.

  8. Who can I trust? Extended fear during and after the Utøya terrorist attack.

    PubMed

    Filkuková, Petra; Hafstad, Gertrud Sofie; Jensen, Tine K

    2016-07-01

    The aim of the study was to investigate specific peritraumatic reactions among adolescent and young adult survivors of the 2011 terrorist attack on Utøya Island, Norway. The authors focused specifically on a phenomenon that has so far not been thoroughly investigated: fear of nondangerous stimuli ("extended fear") during and immediately after the traumatic event. In total, 325 survivors of the shooting on Utøya Island were interviewed 4-5 months after the attack and provided a free narrative of the event. Posttraumatic stress symptoms were assessed using the UCLA PTSD Reaction Index; depression and anxiety were assessed using HSCL-8. For the purpose of the current study, the authors chose participants who were under the age of 26 at the time of the terrorist attack (M = 18.4 years), which constituted the vast majority of the total sample (93%). The authors found that 54% of the sample felt threatened during and immediately after the attack, not only by the perpetrator himself, but by other people as well; in most cases by people who came to help them (medical personnel, policemen, volunteers). The participants who mentioned experiencing extended fear in their trauma narratives had significantly higher scores of posttraumatic stress symptoms, anxiety, and depression 5 months after the attack than participants who did not peritraumatically experience extended fear. Early detection of extended fear can help in identifying individuals who will later develop symptomatology. In addition, knowledge of the phenomenon could help policemen and medical personnel understand survivors' seemingly irrational reactions. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  9. Fiber-optic hydrophone array for acoustic surveillance in the littoral

    NASA Astrophysics Data System (ADS)

    Hill, David; Nash, Phillip

    2005-05-01

    We describe a fibre-optic hydrophone array system architecture that can be tailored to meet the underwater acoustic surveillance requirements of the military, counter terrorist and customs authorities in protecting ports and harbours, offshore production facilities or coastal approaches. Physically the fibre-optic hydrophone array is in the form of a lightweight cable, enabling rapid deployment from a small vessel. Based upon an optical architecture of time and wavelength multiplexed interferometric hydrophones, the array is comprised of a series of hydrophone sub-arrays. Using multiple sub-arrays, extended perimeters many tens of kilometres in length can be monitored. Interrogated via a long (~50km) optical fibre data link, the acoustic date is processed using the latest open architecture sonar processing platform, ensuring that acoustic targets below, on and above the surface are detected, tracked and classified. Results obtained from an at sea trial of a 96-channel hydrophone array are given, showing the passive detection and tracking of a diver, small surface craft and big ocean going ships beyond the horizon. Furthermore, we describe how the OptaMarine fibre-optic hydrophone array fits into an integrated multi-layered approach to port and harbour security consisting of active sonar for diver detection and hull imaging, as well as thermal imaging and CCTV for surface monitoring. Finally, we briefly describe a complimentary land perimeter intruder detection system consisting of an array of fibre optic accelerometers.

  10. Bridging the health security divide: department of defense support for the global health security agenda.

    PubMed

    Moudy, Robin M; Ingerson-Mahar, Michael; Kanter, Jordan; Grant, Ashley M; Fisher, Dara R; Jones, Franca R

    2014-01-01

    In 2011, President Obama addressed the United Nations General Assembly and urged the global community to come together to prevent, detect, and fight every kind of biological danger, whether a pandemic, terrorist threat, or treatable disease. Over the past decade, the United States and key international partners have addressed these dangers through a variety of programs and strategies aimed at developing and enhancing countries' capacity to rapidly detect, assess, report, and respond to acute biological threats. Despite our collective efforts, however, an increasingly interconnected world presents heightened opportunities for human, animal, and zoonotic diseases to emerge and spread globally. Further, the technical capabilities required to develop biological agents into a weapon are relatively low. The launch of the Global Health Security Agenda (GHSA) provides an opportunity for the international community to enhance the linkages between the health and security sectors, accelerating global efforts to prevent avoidable epidemics and bioterrorism, detect threats early, and respond rapidly and effectively to biological threats. The US Department of Defense (DoD) plays a key role in achieving GHSA objectives through its force health protection, threat reduction, and biodefense efforts at home and abroad. This article focuses on GHSA activities conducted in the DoD Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense.

  11. Alarm inhalation dosemeter for long living radioactive dust due to an uncontrolled release

    NASA Astrophysics Data System (ADS)

    Streil, T.; Oeser, V.; Rambousky, R.; Buchholz, F. W.

    2008-08-01

    MyRIAM is the acronym for My Radioactivity In Air Monitor and points out that the device was designed for personal use to detect any radioactivity in the air at the place and at the moment of danger. The active air sampling process enables a detection limit several orders of magnitude below that of Gamma detectors. Therefore, it is the unique way to detect dangerous exposures in time. Individual protection against inhalation of long living radioactive dust (LLRD) saves human life and health. LLRD may occur in natural environment as well as in case of nuclear accidence or military and terrorist attacks. But in any case, the immediate warning of the population is of great importance. Keep in mind: it is very easy to avoid LLRD inhalation—but you have to recognize the imminent danger. The second requirement of gap-less documentation and reliable assessment of any derived LLRD exposure is building the link to Dosimetry applications. The paper demonstrates the possibility to design small and low cost air samplers, which can be used as personal alarm dosimeters and fulfil the requirements mentioned above. Several test measurements taken by a mobile phone sized MyRIAM, shall be used to demonstrate the correctness of this statement.

  12. The terrorist mind: I. A psychological and political analysis.

    PubMed

    Miller, Laurence

    2006-04-01

    Part I of this two-part article describes the major forms of domestic and foreign terrorism, the motivations of the perpetrators, and the psychological, social, and political forces that contribute to this most particular expression of violence. The article addresses the question of whether all terrorists are sick or evil and considers the possibility that some forms of terrorism, however odious their result, can be a rational response to a situation of perceived intolerable injustice. The article examines what motivates people to join terrorist groups and what may later move them to leave the terrorist lifestyle. Special consideration is given to the psychological and religious dynamics of suicide terrorism and what might motivate some people to give their lives for their cause. Finally, the article offers recommendations for a multipronged approach to dealing with this modern yet ageless scourge.

  13. Memories of the terrorist attacks of September 11, 2001: a study of the consistency and phenomenal characteristics of flashbulb memories.

    PubMed

    Ferré Romeu, Pilar

    2006-05-01

    In this study, I investigated students' memories of the terrorist attacks of September 11, 2001, carried out by Al Qaeda terrorists against the World Trade Center in New York and the Pentagon in Washington. Participants completed on two occasions (2 weeks and 8 months after the events took place) a memory questionnaire that included an assessment of the phenomenal richness of their memories. The results showed that the participants remembered very well the circumstances in which they first heard about the terrorist attacks, that they were very confident about this information, and that these memories were characterized by a high phenomenal richness. Over time, there was a decrease in all of these variables, but people's ratings of phenomenology and confidence were still very high.

  14. Understanding public confidence in government to prevent terrorist attacks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered tomore » small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.« less

  15. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    PubMed

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  16. Previous exposure to the World Trade Center terrorist attack and posttraumatic symptoms among older adults following Hurricane Sandy.

    PubMed

    Shrira, Amit; Palgi, Yuval; Hamama-Raz, Yaira; Goodwin, Robin; Ben-Ezra, Menachem

    2014-01-01

    The present study tested the maturation and inoculation hypotheses by examining whether age and previous exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1,000 participants from affected states completed self-report questionnaires one month after Hurricane Sandy hit the East Coast. Participants reported their degree of exposure to the WTC terrorist attack and to Hurricane Sandy, and their posttraumatic stress disorder (PTSD) symptoms following Hurricane Sandy. The positive relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms was weaker among older adults. An additional significant three-way interaction suggested that both age and previous exposure to the WTC terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms. Previous high degree of exposure to the WTC terrorist attack was related to a weaker effect of current exposure to Hurricane Sandy on PTSD symptoms among older adults. However, among younger adults, previous high degree of exposure to the WTC terrorist attack was related to a stronger effect of current exposure on PTSD symptoms. When confronted by a natural disaster, American older adults are generally resilient. Supporting the inoculation hypothesis, resilience of older adults may be partly related to the strength successfully extracted from previous exposure to adverse events.

  17. Response of the REWARD detection system to the presence of a Radiological Dispersal Device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luis, R.; Baptista, M.; Barros, S.

    2015-07-01

    In recent years an increased international concern has emerged about the radiological and nuclear (RN) threats associated with the illicit trafficking of nuclear and radioactive materials that could be potentially used for terrorist attacks. The objective of the REWARD (Real Time Wide Area Radiation Surveillance System) project, co-funded by the European Union 7. Framework Programme Security, consisted in building a mobile system for real time, wide area radiation surveillance, using a CdZnTe detector for gamma radiation and a neutron detector based on novel silicon technologies. The sensing unit includes a GPS system and a wireless communication interface to send themore » data remotely to a monitoring base station, where it will be analyzed in real time and correlated with historical data from the tag location, in order to generate an alarm when an abnormal situation is detected. Due to its portability and accuracy, the system will be extremely useful in many different scenarios such as nuclear terrorism, lost radioactive sources, radioactive contamination or nuclear accidents. This paper shortly introduces the REWARD detection system, depicts some terrorist threat scenarios involving radioactive sources and special nuclear materials and summarizes the simulation work undertaken during the past three years in the framework of the REWARD project. The main objective consisted in making predictions regarding the behavior of the REWARD system in the presence of a Radiological Dispersion Device (RDD), one of the reference scenarios foreseen for REWARD, using the Monte Carlo simulation program MCNP6. The reference scenario is characterized in detail, from the i) radiological protection, ii) radiation detection requirements and iii) communications points of view. Experimental tests were performed at the Fire Brigades Facilities in Rome and at the Naples Fire Brigades, and the results, which validate the simulation work, are presented and analyzed. The response of the REWARD detection system to the presence of an RDD is predicted and discussed. (authors)« less

  18. High-sensitivity detection of triacetone triperoxide (TATP) and its precursor acetone

    NASA Astrophysics Data System (ADS)

    Dunayevskiy, Ilya; Tsekoun, Alexei; Prasanna, Manu; Go, Rowel; Patel, C. Kumar N.

    2007-09-01

    Triacetone triperoxide (C9H18O6, molecular mass of 222.24 g/mol) (TATP) is a powerful explosive that is easy to synthesize using commonly available household chemicals, acetone, and hydrogen peroxide 1 2. Because of the simplicity of its synthesis, TATP is often the explosive of choice for terrorists, including suicide bombers. For providing safety to the population, early detection of TATP and isolation of such individuals are essential. We report unambiguous, high-sensitivity detection of TATP and its precursor, acetone, using room-temperature quantum cascade laser photoacoustic spectroscopy (QCL-PAS). The available sensitivity is such that TATP, carried on a person (at a nominal body temperature of 37 °C), should be detectable at some distance. The combination of demonstrated detection of TATP and acetone should be ideal for screening at airports and other public places for providing increased public safety.

  19. Sub-parts-per-billion level detection of dimethyl methyl phosphonate (DMMP) by quantum cascade laser photoacoustic spectroscopy.

    PubMed

    Mukherjee, Anadi; Dunayevskiy, Ilya; Prasanna, Manu; Go, Rowel; Tsekoun, Alexei; Wang, Xiaojun; Fan, Jenyu; Patel, C Kumar N

    2008-04-01

    The need for the detection of chemical warfare agents (CWAs) is no longer confined to battlefield environments because of at least one confirmed terrorist attack, the Tokyo Subway [Emerg. Infect. Dis. 5, 513 (1999)] in 1995, and a suspected, i.e., a false-alarm of a CWA in the Russell Senate Office Building [Washington Post, 9 February 2006, p. B01]. Therefore, detection of CWAs with high sensitivity and low false-alarm rates is considered an important priority for ensuring public safety. We report a minimum detection level for a CWA simulant, dimethyl methyl phosphonate (DMMP), of <0.5 ppb (parts in 10(9)) by use of a widely tunable external grating cavity quantum cascade laser and photoacoustic spectroscopy. With interferents present in Santa Monica, California street air, we demonstrate a false-alarm rate of 1:10(6) at a detection threshold of 1.6 ppb.

  20. Application of comprehensive NMR-based analysis strategy in annotation, isolation and structure elucidation of low molecular weight metabolites of Ricinus communis seeds.

    PubMed

    Vučković, Ivan; Rapinoja, Marja-Leena; Vaismaa, Matti; Vanninen, Paula; Koskela, Harri

    2016-01-01

    Powder-like extract of Ricinus communis seeds contain a toxic protein, ricin, which has a history of military, criminal and terroristic use. As the detection of ricin in this "terrorist powder" is difficult and time-consuming, related low mass metabolites have been suggested to be useful for screening as biomarkers of ricin. To apply a comprehensive NMR-based analysis strategy for annotation, isolation and structure elucidation of low molecular weight plant metabolites of Ricinus communis seeds. The seed extract was prepared with a well-known acetone extraction approach. The common metabolites were annotated from seed extract dissolved in acidic solution using (1)H NMR spectroscopy with spectrum library comparison and standard addition, whereas unconfirmed metabolites were identified using multi-step off-line HPLC-DAD-NMR approach. In addition to the common plant metabolites, two previously unreported compounds, 1,3-digalactoinositol and ricinyl-alanine, were identified with support of MS analyses. The applied comprehensive NMR-based analysis strategy provided identification of the prominent low molecular weight metabolites with high confidence. Copyright © 2015 John Wiley & Sons, Ltd.

  1. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    PubMed

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  2. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks.

    PubMed

    Zhang, Laobing; Reniers, Genserik

    2016-12-01

    The New York City 9/11 terrorist attacks urged people from academia as well as from industry to pay more attention to operational security research. The required focus in this type of research is human intention. Unlike safety-related accidents, security-related accidents have a deliberate nature, and one has to face intelligent adversaries with characteristics that traditional probabilistic risk assessment techniques are not capable of dealing with. In recent years, the mathematical tool of game theory, being capable to handle intelligent players, has been used in a variety of ways in terrorism risk assessment. In this article, we analyze the general intrusion detection system in process plants, and propose a game-theoretical model for security management in such plants. Players in our model are assumed to be rational and they play the game with complete information. Both the pure strategy and the mixed strategy solutions are explored and explained. We illustrate our model by an illustrative case, and find that in our case, no pure strategy but, instead, a mixed strategy Nash equilibrium exists. © 2016 Society for Risk Analysis.

  3. Agroterrorism: the risks to the United States food supply and national security.

    PubMed

    Gill, Kevin M

    2015-01-01

    Agroterrorism is a collective term that describes an intentional criminal attack against crops or mankind using viral, bacterial, fungal, or insect-borne agents. Agroterrorism also includes attacks against animals using infectious pathogens such as Burkholderia mallei (glanders), Bacillus anthracis (anthrax), viral avian influenza, foot and mouth disease, and several equine encephalitis viruses. Agents that could be used against crops include the causative agents of wheat blast, rice blast, rice brown spot disease, and wheat stem rust. The primary goal of terrorists using agroterrorism is to spread fear and cause massive economic loss. Subsequent goals include causing disease and death to humans and animals. The use of bioterrorism agents is a much more practical approach than using explosives, for example, to achieve those results since many of these biological agents are commonly found naturally in the environment and are difficult to detect with modern technology. The effective use of biological warfare dates back centuries and can still can be employed by terrorist groups, lone wolves, and political and religious groups to cause death and mayhem on a grand scale.

  4. Terrorism as a Social and Legal Phenomenon

    ERIC Educational Resources Information Center

    Serebrennikova, Anna; Mashkova, Yekaterina

    2017-01-01

    This article examines the concept of terrorism as a social and legal phenomenon, its international legal and criminal-legal characteristics. Highlighted are the main aspects of cooperation of the states and the international community to counter terrorist activities. Terrorism as a social phenomenon is determined by paragraph 1 of article 3 of the…

  5. ASSESSMENT OF DIOXIN INHALATION EXPOSURES AND POTENTIAL HEALTH IMPACTS FOLLOWING THE COLLAPSE OF THE WORLD TRADE CENTER TOWERS

    EPA Science Inventory

    In the days following the September 11, 2001, terrorist attack on New York City's World Trade Center (WTC) towers, EPA, other federal agencies, and New York City and New York State public health and environmental authorities initiated numerous air monitoring activities to better ...

  6. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    ERIC Educational Resources Information Center

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  7. Childhood Reactions to Terrorism-Induced Trauma: A Review of the Past 10 Years

    ERIC Educational Resources Information Center

    Fremont, Wanda P.

    2004-01-01

    Objective: To summarize the literature about the clinical presentation and treatment interventions of childhood reactions to terrorism-induced trauma. Method: The literature on children's responses to terrorist activities was reviewed. Results: Over the past 10 years, more research has emerged on the subject of terrorism in children. Many of the…

  8. American hospitals react to terrorist attacks with determination.

    PubMed

    Rees, T

    2001-01-01

    In this timely special section, editor Tom Rees recounts some of the swift, supportive actions health care providers took in response to the Sept. 11 terrorist attacks on the World Trade Center and the Pentagon.

  9. Aviation security : terrorist acts illustrate severe weaknesses in aviation security

    DOT National Transportation Integrated Search

    2001-09-20

    This is the statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues before the Subcommittee on Transportation, Senate and House Committees on Appropriations regarding vulnerabilities to terrorist attacks of the nation's aviation s...

  10. Brief psychotic disorder in a middle aged Nigerian following the terrorist attacks in America-case report.

    PubMed

    Omigbodun, O O; Okunade, T A

    2002-01-01

    This case report illustrates the sudden onset, brief course and remission of a psychotic illness in a middle-aged Nigerian starting soon after she heard about the terrorist attacks in America. Vulnerability factors including personality traits and other concurrent life events were identified in the patients. Common mental disorder associated with terrorist attacks, disasters and armed robbery, and the need for health workers to be sensitised to these disorders are discussed in light of the ongoing violence in parts of Nigeria.

  11. PATTERN OF INJURIES SEEN IN MASS CASUALTIES IN TERRORIST ATTACKS IN BALUCHISTAN, PAKISTAN--A THREE YEARS EXPERIENCE.

    PubMed

    Maqsood, Rasikh; Rasikh, Alia; Abbasi, Tariq; Shukr, Irfan

    2015-01-01

    As a front line state in war against terror, Pakistan has been a victim of terrorism, for the last many years & Baluchistan has been the hub of all such terror activities. The objective of this study was to determine the incidence and type of injuries in mass casualties in terrorist activities in Baluchistan. The study was done by the review of the record of all patients of terrorist attacks who were admitted in Combined Military Hospital (CMH) Quetta from 27th Aug 2012 to 31st Jul 2015. The final injuries sustained by the victims were documented in the patient charts after repeated examination. The data was collected from these patient charts. Data was analysed using SPSS-21. Frequency & percentages of different injuries was calculated to determine the injury pattern. A total of 3034 patients reported to the hospital (n-3034), 2228 were admitted (73.4%). Out of the injured, 1720 (56.69%) were patients of multi system trauma, whereas 1314 (43.3%) had a single site injury. Out of these 537 patients had fractures of long bones (17.6%), those with head & spinal injuries with neurological deficit were 455 (14.9%), 266 had abdominal injuries requiring surgical intervention (8.7%), 75 (2.47%) had thoracic injuries were whereas 25 (0.82%) were vascular injuries, requiring emergent limb saving surgeries. Sex ratio was M/F=5.7: 1 Mean hospital stay was 6.31 days. Majority of the injured had multisystem injuries; therefore the hospital should have a well-trained multi-disciplinary team of surgeons. In addition to general surgery, the subspecialties' should include orthopaedics, vascular, thoracic and neurosurgery.

  12. Chemical warfare agents

    PubMed Central

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  13. Change of Detection: To Find the Terrorist within the Identification of the U.S. Army’s Insider Threat

    DTIC Science & Technology

    2012-06-08

    Management, usually used in conjunction with the word System TRADOC Training and Doctrine Command UCMJ Uniform Code of Military Justice U.S. United...information system , whether a military member, a DOD civilian employee, or employee of another Federal agency or the private sector. Some...recommendations, however, address the broader scope of “ system components” or “computer software code” inside a system and intended to carry out a malicious

  14. Detection of bottled liquid explosives by near infrared

    NASA Astrophysics Data System (ADS)

    Itozaki, Hide; Miyamura, Ryu; Sato-Akaba, Hideo

    2012-10-01

    Bottled liquids are limited to be brought in the airplane, because liquid explosives have been used in some terrorist attaches recently. A bottled liquid scanner is expected to be developed. Liquid scanner using near infrared technologies is being developed by us. Many spectrum of liquids have been collected and analyzed by chemometorics in order to separate safe beverage to explosive and dangerous liquids. This bottled liquid scanner had feasibility tests in some international airport in Japan and obtained good review from security people in the airport.

  15. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    PubMed

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  16. A Brinkmanship Game Theory Model of Terrorism

    NASA Astrophysics Data System (ADS)

    Melese, Francois

    This study reveals conditions under which a world leader might credibly issue a brinkmanship threat of preemptive action to deter sovereign states or transnational terrorist organizations from acquiring weapons of mass destruction (WMD). The model consists of two players: the United Nations (UN) “Principal,” and a terrorist organization “Agent.” The challenge in issuing a brinkmanship threat is that it needs to be sufficiently unpleasant to deter terrorists from acquiring WMD, while not being so repugnant to those that must carry it out that they would refuse to do so. Two “credibility constraints” are derived. The first relates to the unknown terrorist type (Hard or Soft), and the second to acceptable risks (“blowback”) to the World community. Graphing the incentive-compatible Nash equilibrium solutions reveals when a brinkmanship threat is credible, and when it is not - either too weak to be effective, or unacceptably dangerous to the World community.

  17. Naval Officer Attitude Toward the Don’t Ask, Don’t Tell Policy

    DTIC Science & Technology

    2009-03-01

    debate preceded enactment of DADT, and the debate has never really diminished. Indeed, many of the same arguments and issues that led to the policy...terrorist threats, assault, theft, arson, and use of drugs other than marijuana .13 In 2007, 511 moral waivers for felony convictions were issued to...status, whether respondent has children, activities of interest (such as sports, outdoor or indoor activities), and other background factors that

  18. Zebrafish Models for Human Acute Organophosphorus Poisoning.

    PubMed

    Faria, Melissa; Garcia-Reyero, Natàlia; Padrós, Francesc; Babin, Patrick J; Sebastián, David; Cachot, Jérôme; Prats, Eva; Arick Ii, Mark; Rial, Eduardo; Knoll-Gellida, Anja; Mathieu, Guilaine; Le Bihanic, Florane; Escalon, B Lynn; Zorzano, Antonio; Soares, Amadeu M V M; Raldúa, Demetrio

    2015-10-22

    Terrorist use of organophosphorus-based nerve agents and toxic industrial chemicals against civilian populations constitutes a real threat, as demonstrated by the terrorist attacks in Japan in the 1990 s or, even more recently, in the Syrian civil war. Thus, development of more effective countermeasures against acute organophosphorus poisoning is urgently needed. Here, we have generated and validated zebrafish models for mild, moderate and severe acute organophosphorus poisoning by exposing zebrafish larvae to different concentrations of the prototypic organophosphorus compound chlorpyrifos-oxon. Our results show that zebrafish models mimic most of the pathophysiological mechanisms behind this toxidrome in humans, including acetylcholinesterase inhibition, N-methyl-D-aspartate receptor activation, and calcium dysregulation as well as inflammatory and immune responses. The suitability of the zebrafish larvae to in vivo high-throughput screenings of small molecule libraries makes these models a valuable tool for identifying new drugs for multifunctional drug therapy against acute organophosphorus poisoning.

  19. What Good Are Positive Emotions in Crises? A Prospective Study of Resilience and Emotions Following the Terrorist Attacks on the United States on September 11th, 2001

    PubMed Central

    Fredrickson, Barbara L.; Tugade, Michele M.; Waugh, Christian E.; Larkin, Gregory R.

    2009-01-01

    Extrapolating from B. L. Fredrickson's (1998, 2001) broaden-and-build theory of positive emotions, the authors hypothesized that positive emotions are active ingredients within trait resilience. U.S. college students (18 men and 28 women) were tested in early 2001 and again in the weeks following the September 11th terrorist attacks. Mediational analyses showed that positive emotions experienced in the wake of the attacks— gratitude, interest, love, and so forth—fully accounted for the relations between (a) precrisis resilience and later development of depressive symptoms and (b) precrisis resilience and postcrisis growth in psychological resources. Findings suggest that positive emotions in the aftermath of crises buffer resilient people against depression and fuel thriving, consistent with the broaden-and-build theory. Discussion touches on implications for coping. PMID:12585810

  20. Detection of Alkylating Agents using Electrical and Mechanical Means

    NASA Astrophysics Data System (ADS)

    Gerchikov, Yulia; Borzin, Elena; Gannot, Yair; Shemesh, Ariel; Meltzman, Shai; Hertzog-Ronen, Carmit; Tal, Shay; Stolyarova, Sara; Nemirovsky, Yael; Tessler, Nir; Eichen, Yoav

    2011-08-01

    Alkylating agents are reactive molecules having at least one polar bond between a carbon atom and a good leaving group. These often simple molecules are frequently used in organic synthesis, as sterilizing agents in agriculture and even as anticancer agents in medicine. Unfortunately, for over a century, some of the highly reactive alkylating agents are also being used as blister chemical warfare agents. Being relatively simple to make, the risk is that these will be applied by terrorists as poor people warfare agents. The detection and identification of such alkylating agents is not a simple task because of their high reactivity and simple structure of the reactive site. Here we report on new approaches to the detection and identification of such alkylating agents using electrical (organic field effect transistors) and mechanical (microcantilevers) means.

  1. Detection of bottled explosives by near infrared

    NASA Astrophysics Data System (ADS)

    Itozaki, Hideo; Sato-Akaba, Hideo

    2013-10-01

    Bottled liquids are not allowed through the security gate in the airport, because liquid explosives have been used by the terrorists. However, passengers have a lot of trouble if they cannot bring their own bottles. For example, a mother would like to carry her own milk in the airplane for her baby. Therefore the detection technology of liquid explosives should be developed as soon as possible. This paper shows that near infrared spectroscopy can detect bottled explosives quickly. The transmission method cannot deal with milk in the sense of liquid inspection. Here we examined the reflection method to the test of milk. The inspection method with light cannot make test for the metal can. We also use ultrasonic method to check metal can simultaneously in order to expand test targets.

  2. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001.

    PubMed

    Endara, Skye M; Ryan, Margaret A K; Sevick, Carter J; Conlin, Ava Marie S; Macera, Caroline A; Smith, Tyler C

    2009-07-20

    Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002). We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes.

  3. Pathology and toxicology findings for search-and-rescue dogs deployed to the September 11, 2001, terrorist attack sites: initial five-year surveillance.

    PubMed

    Fitzgerald, Scott D; Rumbeiha, Wilson K; Emmett Braselton, W; Downend, Amanda B; Otto, Cynthia M

    2008-07-01

    A long-term surveillance study was conducted on 95 search-and-rescue (S&R) dogs deployed to the September 11, 2001, terrorist attack sites; an additional 55 nondeployed S&R dogs served as controls. After 5 years of surveillance, 32% of the deployed dogs have died and 24% of the nondeployed dogs. The mean age at the time of death in these 2 groups of dogs is not significantly different. Causes of death in both groups of dogs include inflammatory, degenerative, and proliferative conditions. No primary pulmonary tumors have been identified to date nor has any significant level of toxicant been found in the tissues from these dogs using assays for general organic compounds and metals or, specifically, for polychlorinated biphenyls. However, significant numbers of both deployed and nondeployed dogs have evidence of inhaled matter as demonstrated by the presence of anthracotic pigments or refractile particulate matter in pulmonary tissue. Although S&R activities in response to the 9/11 terrorist attacks exposed dogs to a wide variety of potentially toxic compounds, to date, these dogs do not appear to suffer from higher mortality or increased pulmonary disease compared with nondeployed dogs. To the authors' knowledge, the current survey represents the first long-term and large-scale survey of the pathology and toxicology of S&R dogs deployed to a major disaster site.

  4. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olama, Mohammed M; Allgood, Glenn O; Davenport, Kristen M

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) asmore » well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.« less

  5. Baseline for Monitoring Water Resources Along Kabul and Indus Rivers of Pakistan for Potential Terrorist Contamination

    NASA Astrophysics Data System (ADS)

    Hamidullah, S.; Tariq, S.; Shah, M. T.; Bishop, M. P.; Kamp, U.; Olsenholler, J.

    2002-05-01

    Baseline for Monitoring Water Resources Along Kabul and Indus Rivers of Pakistan for Potential Terrorist Contamination Terrorism has temporarily constrained the dynamism of the world it was enjoying before September 11, 2001, but also has opened avenues for people of all ethnicities, creeds, and professions to join hands in combating it. Scientific efforts to combat terrorism are likely to lead to better use of existing scientific knowledge as well as to discoveries that will increase world organization, interconnectivity, and peace promotion. Afghanistan and surrounding regions are major focal points for current anti-terrorist activities of the USA and its allies, including Pakistan. The United States, Pakistan, and Afghanistan have shared many similar political objectives, as well as differences, in cold war and post-cold-war eras, reflected by variable provisions of material aid. It is well recognized that understanding Afghanistan requires comprehension of the Pakistan situation as well, especially for common resources. Water is paramount because it is absolutely vital, but can be contaminated by internal or cross-border terrorism. The Kabul and Indus rivers originate in the Hindu Kush - Himalaya ranges. The Kabul River flows from Afghanistan into Pakistan, and after irrigating Peshawar basin, joins the Indus. The Indus, after its origin in Tibet and flow through the Indian Himalaya, enters Pakistan and flows south as the irrigation lifeblood of the country. Any terroristic addition of radioactive nuclides or contaminants to either river could dramatically impact the dependent riverine ecologies. Monitoring cells thus need to be established at locations in Afghanistan and Pakistan to assess base-line river variances for possible future contamination by terrorists. This paper presents a general view and the physical and chemical parameters of parts of the two rivers, and of the surrounding underground water in Peshawar Basin, including pH, conductivity, total dissolved solids, major elements, trace elements, heavy metals and oxygen isotopes. Data are mostly within allowed limits of US-EPA for surface and underground water. Oxygen isotopes confirm the dangers of contamination from the Kabul River to underground water. Heavy metals were determined through spectrophotometery, however, modern geophysical methods are cheaper and quicker and can be applied at monitoring stations. With Kabul river and its surroundings as examples, similar theory and practice can be applied to rivers within the United States and other parts of the world.

  6. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  7. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  8. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  9. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  10. History and perspectives of bioanalytical methods for chemical warfare agent detection.

    PubMed

    Black, Robin M

    2010-05-15

    This paper provides a short historical overview of the development of bioanalytical methods for chemical warfare (CW) agents and their biological markers of exposure, with a more detailed overview of methods for organophosphorus nerve agents. Bioanalytical methods for unchanged CW agents are used primarily for toxicokinetic/toxicodynamic studies. An important aspect of nerve agent toxicokinetics is the different biological activity and detoxification pathways for enantiomers. CW agents have a relatively short lifetime in the human body, and are hydrolysed, metabolised, or adducted to nucleophilic sites on macromolecules such as proteins and DNA. These provide biological markers of exposure. In the past two decades, metabolites, protein adducts of nerve agents, vesicants and phosgene, and DNA adducts of sulfur and nitrogen mustards, have been identified and characterized. Sensitive analytical methods have been developed for their detection, based mainly on mass spectrometry combined with gas or liquid chromatography. Biological markers for sarin, VX and sulfur mustard have been validated in cases of accidental and deliberate human exposures. The concern for terrorist use of CW agents has stimulated the development of higher throughput analytical methods in support of homeland security. Copyright (c) 2010. Published by Elsevier B.V.

  11. An ethernet/IP security review with intrusion detection applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less

  12. Homeland Security and Defense Applications

    ScienceCinema

    None

    2018-01-16

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environmentmore » after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.« less

  14. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    PubMed

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  15. Biosurveillance: A Review and Update

    PubMed Central

    Kman, Nicholas E.; Bachmann, Daniel J.

    2012-01-01

    Since the terrorist attacks and anthrax release in 2001, almost $32 billion has been allocated to biodefense and biosurveillance in the USA alone. Surveillance in health care refers to the continual systematic collection, analysis, interpretation, and dissemination of data. When attempting to detect agents of bioterrorism, surveillance can occur in several ways. Syndromic surveillance occurs by monitoring clinical manifestations of certain illnesses. Laboratory surveillance occurs by looking for certain markers or laboratory data, and environmental surveillance is the process by which the ambient air or environment is continually sampled for the presence of biological agents. This paper focuses on the ways by which we detect bioterrorism agents and the effectiveness of these systems. PMID:22242207

  16. Aptitude for Destruction. Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism

    DTIC Science & Technology

    2005-01-01

    jihad in Af- ghanistan. Over its history, the group has had active cells in several different coun- tries, including Indonesia, Malaysia , the...and South Armagh, London, UK: Coronet Books, LIR, 2000. Hedberg, Bo, "How Organizations Learn and Unlearn?" in Paul C. Nystrim and William H. Starbuck

  17. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  18. The Financial War on Terrorism: Grading U.S. Strategy for Combating the Financing of Terrorism

    DTIC Science & Technology

    2006-04-15

    15 April 2006 Signature______________________________ Thesis Advisor: CAPTAIN Dave Jerabek, US Navy Report Documentation...activities to combat terrorist financing, this thesis proposes how DoD can use threat finance exploitation to meaningfully support the overall...of Terrorism FORMAT: Thesis DATE: 14 April 2006 PAGES: 94 CLASSIFICATION: Unclassified Following the September 11, 2001, attacks

  19. Aftermath of a Crisis: How Colleges Respond to Prospective Students

    ERIC Educational Resources Information Center

    Kelsay, Lisa S.

    2007-01-01

    Throughout the country and through the years, several colleges and universities have been the focal point of violence and tragedy. These tragedies include the brutal beating and murder of a gay student; a campus bonfire that killed 12 students and alumni; a residence hall fire that claimed the lives of three students; terrorist activities in two…

  20. Advanced traveler information system capabilities : human factors research needs : summary report

    DOT National Transportation Integrated Search

    2003-09-01

    The number and intensity of domestic and international terrorist events, along with the September 11, 2001, attacks, change the way Americans think and live. Terrorists attack targets where human casualties and economic consequences are likely to be ...

  1. Intelligence Constraints on Terrorist Network Plots

    NASA Astrophysics Data System (ADS)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  2. A false dichotomy? Mental illness and lone-actor terrorism.

    PubMed

    Corner, Emily; Gill, Paul

    2015-02-01

    We test whether significant differences in mental illness exist in a matched sample of lone- and group-based terrorists. We then test whether there are distinct behavioral differences between lone-actor terrorists with and without mental illness. We then stratify our sample across a range of diagnoses and again test whether significant differences exist. We conduct a series of bivariate, multivariate, and multinomial statistical tests using a unique dataset of 119 lone-actor terrorists and a matched sample of group-based terrorists. The odds of a lone-actor terrorist having a mental illness is 13.49 times higher than the odds of a group actor having a mental illness. Lone actors who were mentally ill were 18.07 times more likely to have a spouse or partner who was involved in a wider movement than those without a history of mental illness. Those with a mental illness were more likely to have a proximate upcoming life change, more likely to have been a recent victim of prejudice, and experienced proximate and chronic stress. The results identify behaviors and traits that security agencies can utilize to monitor and prevent lone-actor terrorism events. The correlated behaviors provide an image of how risk can crystalize within the individual offender and that our understanding of lone-actor terrorism should be multivariate in nature.

  3. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Abhayaratne, P; Bale, J

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less

  4. Sensitive detection of capsaicinoids using a surface plasmon resonance sensor with anti-homovanillic Acid polyclonal antibodies.

    PubMed

    Nakamura, Shingo; Yatabe, Rui; Onodera, Takeshi; Toko, Kiyoshi

    2013-11-13

    Recently, highly functional biosensors have been developed in preparation for possible large-scale terrorist attacks using chemical warfare agents. Practically applicable sensors are required to have various abilities, such as high portability and operability, the capability of performing rapid and continuous measurement, as well as high sensitivity and selectivity. We developed the detection method of capsaicinoids, the main component of some lachrymators, using a surface plasmon resonance (SPR) immunosensor as an on-site detection sensor. Homovanillic acid, which has a vanillyl group similar to capsaicinoids such as capsaicin and dihydrocapsaicin, was bound to Concholepas concholepas hemocyanin (CCH) for use as an immunogen to generate polyclonal antibodies. An indirect competitive assay was carried out to detect capsaicinoids using SPR sensor chips on which different capsaicin analogues were immobilized. For the sensor chip on which 4-hydroxy-3-methoxybenzylamine hydrochloride was immobilized, a detection limit of 150 ppb was achieved. We found that the incubation time was not required and the detection can be completed in five minutes.

  5. Eye-safe UV Raman spectroscopy for remote detection of explosives and their precursors in fingerprint concentration

    NASA Astrophysics Data System (ADS)

    Almaviva, S.; Angelini, F.; Chirico, R.; Palucci, A.; Nuvoli, M.; Schnuerer, F.; Schweikert, W.; Romolo, F. S.

    2014-10-01

    We report the results of Raman investigation performed at stand-off distance between 6-10 m with a new apparatus, capable to detect traces of explosives with surface concentrations similar to those of a single fingerprint. The device was developed as part of the RADEX prototype (RAman Detection of EXplosives) and is capable of detecting the Raman signal with a single laser shot of few ns (10-9 s) in the UV range (wavelength 266 nm), in conditions of safety for the human eye. This is because the maximum permissible exposure (MPE) for the human eye is established to be 3 mJ/cm2 in this wavelength region and pulse duration. Samples of explosives (PETN, TNT, Urea Nitrate, Ammonium Nitrate) were prepared starting from solutions deposited on samples of common fabrics or clothing materials such as blue jeans, leather, polyester or polyamide. The deposition process takes place via a piezoelectric-controlled plotter device, capable of producing drops of welldefined volume, down to nanoliters, on a surface of several cm2, in order to carefully control the amount of explosive released to the tissue and thus simulate a slight stain on a garment of a potential terrorist. Depending on the type of explosive sampled, the detected density ranges from 0.1 to 1 mg/cm2 and is comparable to the density measured in a spot on a dress or a bag due to the contact with hands contaminated with explosives, as it could happen in the preparation of an improvised explosive device (IED) by a terrorist. To our knowledge the developed device is at the highest detection limits nowadays achievable in the field of eyesafe, stand-off Raman instruments. The signals obtained show some vibrational bands of the Raman spectra of our samples with high signal-to-noise ratio (SNR), allowing us to identify with high sensitivity (high number of True Positives) and selectivity (low number of False Positives) the explosives, so that the instrument could represent the basis for an automated and remote monitoring device.

  6. The bioscience revolution & the biological weapons threat: levers & interventions

    PubMed Central

    D'Agostino, Mark; Martin, Greg

    2009-01-01

    In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level. PMID:19220910

  7. [Physicians and terror: the historical perspective].

    PubMed

    Ohry, Avi; Kugel, Chen

    2005-02-01

    The topic of physicians who committed crimes or were involved in terrorists' activities, is not well known. This article does not present the well known horrific stories of the atrocities of the Nazi German physicians. The authors describe a number of doctors who were active during the French revolution, some murderous physicians-leaders, and present a few historical anecdotes. These examples might only emphasize the fact that, like other human beings, doctors, too, may suffer from bad character.

  8. Applying Intermediate Microeconomics to Terrorism

    ERIC Educational Resources Information Center

    Anderton, Charles H.; Carter, John R.

    2006-01-01

    The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, and basic game theory helps characterize the strategic interdependencies among terrorists and governments.…

  9. The Guardian. Volume 11, Issue 2, Fall 2009

    DTIC Science & Technology

    2009-01-01

    control, and communications; material support; and finances .” It denies state sponsorship and sanctuary and forces terrorists “to disperse and then...disavowed Algerian Groupe Islamique Armé (GIA) terrorist acts against Muslim civilians.42 Later, he sponsored similar operations in Iraq, while

  10. Combatting Commercial Terrorists: The PKK Case

    DTIC Science & Technology

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  11. 76 FR 40114 - Semiannual Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ... abuses of terrorist financing, money laundering, and other financial crime. The proposed changes are... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN... Money Services Businesses to include stored value or prepaid access. In this proposed rulemaking, we are...

  12. MINIMIZING THE VULNERABILITY OF WATER SUPPLIES TO NATURAL AND TERRORIST THREATS

    EPA Science Inventory

    There is increasing concern that drinking water utilities may be vulnerable to attacks by terrorists. In the US the President's Commission on Critical Infrastructure Protection has concluded the US drinking water utilities are vulnerable to physical, cyber and biological terroris...

  13. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  14. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    DTIC Science & Technology

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  15. The challenge of protecting transit and passenger rail : understanding how security works against terrorism.

    DOT National Transportation Integrated Search

    2017-02-01

    Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can c...

  16. Carnage interrupted : an analysis of fifteen terrorist plots against public surface transportation.

    DOT National Transportation Integrated Search

    2012-04-01

    This report examines 13 terrorist plots against public surface transportation that were uncovered and foiled by authorities between 1997 and 2010 and two failed attempts to carry out attacks. Certainly, this is not the total universe of foiled or fai...

  17. Protecting the Privacy of Individuals in Terrorist Tracking Applications

    DTIC Science & Technology

    2005-04-01

    THE PRIVACY OF INDIVIDUALS IN TERRORIST TRACKING APPLICATIONS 6. AUTHOR(S) Teresa Lunt, Paul Aoki, Dirk Balfanz , Glenn Durfee, Philippe Golle...in Data Mining and Knowledge Discovery. 3) Brent Waters, Dirk Balfanz , Glenn Durfee, and Diana Smetters. Building an encrypted and searchable audit

  18. Give Deterrence a Chance: A Strategy Against Al Qaeda

    DTIC Science & Technology

    2007-03-28

    Al Qaeda Terrorists have been described as sociopaths , narcissists, fanatics, extremists, zealots, true-believers, jihadists or demented criminals...If terrorists are sociopaths or other deviants (and it is probable that some are), then it is unlikely that deterrence with its reliance on rational

  19. Foreign Terrorist Threat to Singapore: An Assessment

    DTIC Science & Technology

    2001-04-01

    mystical power, he impressed potential believers with the help of the yoga technique of momentary levitation. 40 Gullible followers quickly multiplied...flat rented to Ramzi Ahmed Yousef – a freelance terrorist with links to the radical Egyptian group Al-Gama’at al- Islamiyya and indicted for

  20. Exploitation of Free Markets and Globalization to Finance Terrorists

    DTIC Science & Technology

    2008-09-01

    familiar with the monitoring and 24 Patrick Hardouin and Reiner Weichhardt. “Terrorist fund raising...present status and its war against drugs and terrorism is the period from 1946 to 1958 known as “La Violencia ” which is said to have claimed hundreds

  1. How Terrorism Affects Attitudes toward Democracy: Tunisia in 2015.

    PubMed

    Andersen, Robert; Brym, Robert

    2017-11-01

    Tunisia is the only country that emerged from the Arab Spring as a democracy. However, Tunisian democracy is threatened by political divisions, economic problems, and the threat of terrorist attacks. We shed light on Tunisia's democratic prospects by examining (1) the degree to which major terrorist attacks in 2015 influenced Tunisian public opinion on democracy and (2) the extent to which preference for a democratic system affected opinions on the prospects for democracy in Tunisia. We use data from three waves of a nationwide survey conducted just before and just after Tunisia's first major terrorist attack, and just after the country's second major terrorist attack. We demonstrate that after the attacks the Tunisian public became less favourable toward democracy and less optimistic that Tunisia would soon be ready for it. Such scepticism was widespread, affecting people who preferred democracy as much as those who did not. We conclude that the prospects for Tunisian democracy are more precarious than is sometimes assumed. © 2017 Canadian Sociological Association/La Société canadienne de sociologie.

  2. Analysis of world terror networks from the reduced Google matrix of Wikipedia

    NASA Astrophysics Data System (ADS)

    El Zant, Samer; Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2018-01-01

    We apply the reduced Google matrix method to analyze interactions between 95 terrorist groups and determine their relationships and influence on 64 world countries. This is done on the basis of the Google matrix of the English Wikipedia (2017) composed of 5 416 537 articles which accumulate a great part of global human knowledge. The reduced Google matrix takes into account the direct and hidden links between a selection of 159 nodes (articles) appearing due to all paths of a random surfer moving over the whole network. As a result we obtain the network structure of terrorist groups and their relations with selected countries including hidden indirect links. Using the sensitivity of PageRank to a weight variation of specific links we determine the geopolitical sensitivity and influence of specific terrorist groups on world countries. The world maps of the sensitivity of various countries to influence of specific terrorist groups are obtained. We argue that this approach can find useful application for more extensive and detailed data bases analysis.

  3. Terrorism and right-wing extremism: the changing face of terrorism and political violence in the 21st century: the virtual community of hatred.

    PubMed

    Post, Jerrold M

    2015-04-01

    There are no psychological characteristics or psychopathology that separates terrorists from the general population. Rather it is group dynamics, with a particular emphasis on collective identity that helps explain terrorist psychology. Just as there is a diverse spectrum of terrorisms, so too is there a spectrum of terrorist psychologies. Four waves of terrorism can be distinguished: the Anarchist wave, associated with labor violence in the United States in the late 19th century; the Anti-Colonial wave (nationalist-separatist), with minority groups seeking to be liberated from their colonial masters or from the majority in their country; the New Left wave (social revolutionary); and now the Religious wave. With the communications revolution, a new phenomenon is emerging which may presage a fifth wave: lone wolf terrorists who through the Internet are radicalized and feel they belong to the virtual community of hatred. A typology of lone wolf terrorism is proposed.

  4. Who Did It? Using International Forensics to Detect and Deter Nuclear Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dunlop, W H; Smith, H P

    On February 2, the ''New York Times'' reported that the Pentagon has formed a nuclear forensics team tasked with identifying the terrorist attackers should the United States be hit with a nuclear bomb. Adapting nuclear technology to the forensics of exploded nuclear weapons is an old but rapidly evolving field. It dates back to at least 1949, when analysis of airborne debris, retrieved at high altitude off the coast of China, convinced President Harry Truman that the Soviet Union had exploded a nuclear device on the steppes of central Asia. The technology is neither new nor has it been particularlymore » secret, but the formation of a national nuclear forensics team was newsworthy and a useful development. An international team, however, would be even better. Although Washington has naturally focused on preventing a nuclear terrorism attack in the United States, a U.S. city is not necessarily the most likely target for nuclear terrorists. It is doubtful that a terrorist organization would be able to acquire a U.S. nuclear device and even more doubtful that it would acquire one on U.S. soil. Accordingly, if a terrorist organization does get its hands on a fission device, it is likely that it will do so on foreign territory. At that point, the terrorists will have an enormously valuable political weapon in their hands and will be loath to risk losing that asset. Given the risks associated with getting the device into the United States, the rational choice would be to deploy the device abroad against much softer targets. For Islamist terrorists, a major ''Christian'' capital such as London, Rome, or Moscow might offer a more suitable target. Among these, Moscow perhaps presents the most compelling case for international cooperation on post-detonation nuclear forensics. Russia has the largest stockpile of poorly secured nuclear devices in the world. It also has porous borders and poor internal security, and it continues to be a potential source of contraband nuclear material and weapons, despite the best efforts of the Cooperative Threat Reduction (CTR) program. If terrorists obtained the nuclear material in Russia and set Moscow as their target, they would not have to risk transporting the weapon, stolen or makeshift, across international borders. Attacks by Chechen terrorists in Beslan and the Dubrovka Theater in Moscow offer ample proof that a willingness to commit mass murder for fanatical reasons rests within Russian borders, and a foreign source of operatives, particularly from the neighboring Islamic states to the south, is by no means inconceivable. Moscow is also a predominantly Christian city where local authorities routinely discriminate against Muslim minorities. Furthermore, extremists might conclude that a nuclear blast in Moscow could inflict damage well beyond those directly stemming from the attack. The Soviet generation that came to power during the Cold War retained a memory of the United States as an ally in the Great Patriotic War. The present Russian generation has no such remembrance but seems to have retained the animosities and suspicions that were a part of the nuclear standoff. Hence, nuclear terrorists may well believe that they could cause another East-West cold war or even encourage Russia to retaliate against the United States. After all, the sinking of the Kursk was believed by some influential Russians to be the result of American action. How much more likely would be such a view if the Kremlin were destroyed? As long as the world is filled with suspicion and conflict, such reactions are to be expected and, more importantly, anticipated. One has only to remember the early reactions and suspicions in the United States following the 1996 TWA Flight 800 airline disaster. Because the United States is the technological leader in nuclear forensics, its capability will certainly be offered and probably demanded no matter what foreign city is subjected to the devastation of a nuclear explosion. The entire world, not just Americans, will live in fear of a second or third nuclear explosion, and forensics could play a vital role in removing or at least narrowing that fear. Because of such worldwide dread, there will be an international aspect to nuclear forensics regardless of where the explosion takes place. It would be better to be prepared in advance for such contingencies than to delve into the arcane world of nuclear weapons and radiochemistry on the fly.« less

  5. Raman and photothermal spectroscopies for explosive detection

    NASA Astrophysics Data System (ADS)

    Finot, Eric; Brulé, Thibault; Rai, Padmnabh; Griffart, Aurélien; Bouhélier, Alexandre; Thundat, Thomas

    2013-06-01

    Detection of explosive residues using portable devices for locating landmine and terrorist weapons must sat- isfy the application criteria of high reproducibility, specificity, sensitivity and fast response time. Vibrational spectroscopies such as Raman and infrared spectroscopies have demonstrated their potential to distinguish the members of the chemical family of more than 30 explosive materials. The characteristic chemical fingerprints in the spectra of these explosives stem from the unique bond structure of each compound. However, these spectroscopies, developed in the early sixties, suffer from a poor sensitivity. On the contrary, MEMS-based chemical sensors have shown to have very high sensitivity lowering the detection limit down to less than 1 picogram, (namely 10 part per trillion) using sensor platforms based on microcantilevers, plasmonics, or surface acoustic waves. The minimum amount of molecules that can be detected depends actually on the transducer size. The selectivity in MEMS sensors is usually realized using chemical modification of the active surface. However, the lack of sufficiently selective receptors that can be immobilized on MEMS sensors remains one of the most critical issues. Microcantilever based sensors offer an excellent opportunity to combine both the infrared photothermal spectroscopy in their static mode and the unique mass sensitivity in their dynamic mode. Optical sensors based on localized plasmon resonance can also take up the challenge of addressing the selectivity by monitoring the Surface Enhanced Raman spectrum down to few molecules. The operating conditions of these promising localized spectroscopies will be discussed in terms of reliability, compactness, data analysis and potential for mass deployment.

  6. Networks model of the East Turkistan terrorism

    NASA Astrophysics Data System (ADS)

    Li, Ben-xian; Zhu, Jun-fang; Wang, Shun-guo

    2015-02-01

    The presence of the East Turkistan terrorist network in China can be traced back to the rebellions on the BAREN region in Xinjiang in April 1990. This article intends to research the East Turkistan networks in China and offer a panoramic view. The events, terrorists and their relationship are described using matrices. Then social network analysis is adopted to reveal the network type and the network structure characteristics. We also find the crucial terrorist leader. Ultimately, some results show that the East Turkistan network has big hub nodes and small shortest path, and that the network follows a pattern of small world network with hierarchical structure.

  7. Terrorism and Other Threats to Civilization

    NASA Astrophysics Data System (ADS)

    Garwin, Richard L.

    2014-07-01

    In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...

  8. Deaths in World Trade Center terrorist attacks--New York City, 2001.

    PubMed

    2002-09-11

    On September 11, 2001, terrorists flew two hijacked airplanes into the World Trade Center (WTC) in lower Manhattan in New York City (NYC), destroying both towers of the WTC. This report presents preliminary vital statistics on the deaths caused by the terrorist attacks and describes the procedures developed by the New York City Department of Health and Mental Hygiene (NYCDOHMH) to issue death certificates in response to the attacks. These data underscore the need for legal mechanisms to expedite the issuance of death certificates in the absence of human remains and the need for vital registration systems that can be relocated in case of emergency.

  9. Surface-enhanced Raman for monitoring toxins in water

    NASA Astrophysics Data System (ADS)

    Spencer, Kevin M.; Sylvia, James M.; Clauson, Susan L.; Bertone, Jane F.; Christesen, Steven D.

    2004-02-01

    Protection of the drinking water supply from a terrorist attack is of critical importance. Since the water supply is vast, contamination prevention is difficult. Therefore, rapid detection of contaminants, whether a military chemical/biological threat, a hazardous chemical spill, naturally occurring toxins, or bacterial build-up is a priority. The development of rapid environmentally portable and stable monitors that allow continuous monitoring of the water supply is ideal. EIC Laboratories has been developing Surface-Enhanced Raman Spectroscopy (SERS) to detect chemical agents, toxic industrial chemicals (TICs), viruses, cyanotoxins and bacterial agents. SERS is an ideal technique for the Joint Service Agent Water Monitor (JSAWM). SERS uses the enhanced Raman signals observed when an analyte adsorbs to a roughened metal substrate to enable trace detection. Proper development of the metal substrate will optimize the sensitivity and selectivity towards the analytes of interest.

  10. Liquids and homemade explosive detection

    NASA Astrophysics Data System (ADS)

    Ellenbogen, Michael; Bijjani, Richard

    2009-05-01

    Excerpt from the US Transportation Security Agency website: "The ban on liquids, aerosols and gels was implemented on August 10 after a terrorist plot was foiled. Since then, experts from around the government, including the FBI and our national labs have analyzed the information we now have and have conducted extensive explosives testing to get a better understanding of this specific threat." In order to lift the ban and ease the burden on the flying public, Reveal began an extensive effort in close collaboration with the US and several other governments to help identify these threats. This effort resulted in the successful development and testing of an automated explosive detection system capable of resolving these threats with a high probability of detection and a low false alarm rate. We will present here some of the methodology and approach we took to address this problem.

  11. What Constitutes Terrorist Network Resiliency?

    DTIC Science & Technology

    2011-05-31

    organizations like al Qaeda. One of the main deficiencies with international law is with the Financial Action Task Force ( FATF ) which had been...2005). The FATF identified 40 recommendations to be implemented to counter money laundering activities. However, no formal binding convention or...treaty was created therefore consistent implementation of the FATF recommendations did not occur thus leaving loop holes in international law for

  12. Support Services for Victims of Political Violence and Their Families: A Comparison between Israelis and Palestinians

    ERIC Educational Resources Information Center

    Abbott, Douglas A.

    2010-01-01

    This report summarizes interviews with five social workers who helped families that experienced political violence, and with 16 families that lost a family member due to terrorist activity in Israel and Palestine from 2000 to 2005. Results revealed a great disparity between the Israelis and the Palestinians on the types of and extent of benefits…

  13. Turkey: Background and U.S. Relations

    DTIC Science & Technology

    2016-08-26

    of $24B in foreign investment,” Anadolu Agency, August 11, 2016. 75 See, e.g., World Bank, Turkey’s Transitions: Integration, Inclusion ...security assistance programs for Turkey are designed to cultivate closeness in relationships and practices between Turkish military officers and...security officials and their U.S. counterparts. These programs also seek to counter terrorist and criminal networks that are active in the region

  14. Quadrennial Defense Review 2014

    DTIC Science & Technology

    2014-01-01

    stressors abroad such as poverty, environmental degradation, political instability, and social tensions – conditions that can enable terrorist activity...environment amid the challenges of climate change and environmental damage. We have increased our preparedness for the consequences of environmental ...sonar with the help of Colombian divers during Navy Dive-Southern Partnership Station 2012, off the coast of Colombia. (U.S. Navy photo by Petty

  15. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    DTIC Science & Technology

    2017-06-01

    laws to safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit...safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit activities...34 1. Combating Financing Terrorist Organizations ............... 34 2. Combating Money Laundering by

  16. British Muslim University Students' Perceptions of Prevent and Its Impact on Their Sense of Identity

    ERIC Educational Resources Information Center

    Kyriacou, Chris; Szczepek Reed, Beatrice; Said, Fatma; Davies, Ian

    2017-01-01

    The Prevent strategy at UK universities is designed to reduce the possibility of university students becoming radicalised and so working against them supporting or directly engaging in terrorist activities. In this study, we were concerned to reflect on our reading of some relevant literature by exploring the views of a sample of British Muslim…

  17. 77 FR 21107 - Agency Information Collection Activities: Proposed Collection; Comments Requested: September 11th...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-09

    ... result of the terrorist-related aircraft crashes of September 11, 2001. The information collected from... related to: participation in lawsuits related to September 11, 2001; presence at a 9/11 crash site between September 11, 2001 and May 30, 2002; and physical harm suffered as a result of the air crashes and/or debris...

  18. 77 FR 5056 - Agency Information Collection Activities: Proposed Collection; Comments Requested: September 11th...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-01

    ... result of the terrorist-related aircraft crashes of September 11, 2001. The information collected from... related to: participation in lawsuits related to September 11, 2001; presence at a 9/11 crash site between September 11, 2001 and May 30, 2002; and physical harm suffered as a result of the air crashes and/or debris...

  19. The new drugs and the sea: The phenomenon of narco-terrorism.

    PubMed

    Santacroce, Rita; Bosio, Elisabetta; Scioneri, Valentina; Mignone, Mara

    2018-01-01

    Use of psychoactive substances and drug trafficking for funding purposes is a well-known practice acted by terrorist groups. Europe appears to be more and more involved in this mechanism, as both an active and passive element, and increased attention should be payed to this phenomenon by potentially interested actors. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  1. Army War College Review: Student Publications. Volume 2, Issue 1

    DTIC Science & Technology

    2016-02-01

    2011 (called the Jasmine Revolution), Obama employed carrots and sticks in a year-long effort to promote a relatively fair and free election... essence , serves to justify terrorist executions for both terrorists and their supporters. Denying even the possibility of negotiation not only serves

  2. Sheltering the Genie: The LIC Threat to Nuclear Systems

    DTIC Science & Technology

    1990-08-01

    Conflict", or LIC. War has punctuated the entire historical process and is relatively well understood. Low intensity conflict is a comtemporary phenomenon...often a tool of the terrorist. Mere recognition is insufficient, however, the major networks must pledge not to compete for terrorist business . Reporters

  3. Communicating about the Risks of Terrorism (or Anything Else)

    ERIC Educational Resources Information Center

    Fischhoff, Baruch

    2011-01-01

    Communication is essential to preventing terrorists from achieving their objectives. Effective communication can reduce terrorists' chances of mounting successful operations, creating threats that disrupt everyday life, and undermining the legitimacy of the societies that they attack. Psychological research has essential roles to play in that…

  4. Carnage interrupted : an analysis of fifteen terrorist plots against public surface transportation [research brief].

    DOT National Transportation Integrated Search

    2012-04-01

    Since 1997, terrorists have focused much attention on public surface transportation as a target for attacks. Many of the plots have failed or been foiled, but those that have succeeded have resulted in large numbers of casualties and caused widesprea...

  5. Suggestions for Adults: Talking and Thinking with Children about the Terrorist Attacks.

    ERIC Educational Resources Information Center

    Communication Disorders Quarterly, 2002

    2002-01-01

    Fifteen suggestions for adults talking with children about the terrorist attacks include taking the time to listen, separating fact from fiction, stressing the senselessness of violence, recognizing the impact of their own reactions on children, and addressing religious and moral concerns. (DB)

  6. Good Things in Small Packages: Micro Worlds and Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David I Gertman

    2013-11-01

    Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

  7. To deny admission to the United States to any representative to the United Nations who has engaged in espionage activities against the United States, poses a threat to United States national security interests, or has engaged in a terrorist activity against the United States.

    THOMAS, 113th Congress

    Rep. Lamborn, Doug [R-CO-5

    2014-04-01

    House - 04/16/2014 Referred to the Subcommittee on Immigration and Border Security. (All Actions) Notes: For further action, see S.2195, which became Public Law 113-100 on 4/18/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Flexible Wing Base Micro Aerial Vehicles: Micro Air Vehicles (MAVs) for Surveillance and Remote Sensor Delivery

    NASA Technical Reports Server (NTRS)

    Ifju, Peter

    2002-01-01

    Micro Air Vehicles (MAVs) will be developed for tracking individuals, locating terrorist threats, and delivering remote sensors, for surveillance and chemical/biological agent detection. The tasks are: (1) Develop robust MAV platform capable of carrying sensor payload. (2) Develop fully autonomous capabilities for delivery of sensors to remote and distant locations. The current capabilities and accomplishments are: (1) Operational electric (inaudible) 6-inch MAVs with novel flexible wing, providing superior aerodynamic efficiency and control. (2) Vision-based flight stability and control (from on-board cameras).

  9. Scanning of vehicles for nuclear materials

    NASA Astrophysics Data System (ADS)

    Katz, J. I.

    2014-05-01

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.

  10. Scanning of vehicles for nuclear materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Katz, J. I.

    2014-05-09

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost andmore » disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.« less

  11. Advances in chemical sensing technologies for VOCs in breath for security/threat assessment, illicit drug detection, and human trafficking activity.

    PubMed

    Giannoukos, S; Agapiou, A; Taylor, S

    2018-01-17

    On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.

  12. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001

    PubMed Central

    Endara, Skye M; Ryan, Margaret AK; Sevick, Carter J; Conlin, Ava Marie S; Macera, Caroline A; Smith, Tyler C

    2009-01-01

    Background Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Methods Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002). We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. Results No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. Conclusion The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes. PMID:19619310

  13. Terrorism in Turkey.

    PubMed

    Rodoplu, Ulkumen; Arnold, Jeffrey; Ersoy, Gurkan

    2003-01-01

    Over the past two decades, terrorism has exacted an enormous toll on the Republic of Turkey, a secular democracy with a 99.8% Muslim population. From 1984 to 2000, an estimated 30,000 to 35,000 Turkish citizens were killed by a nearly continuous stream of terrorism-related events. During this period, the Partiya Karekerren Kurdistan (PKK), a Kurdish separatist group (re-named KADEK in 2002), was responsible for the vast majority of terrorism-related events (and casualties), which disproportionately affected the eastern and southeastern regions of Turkey, in which the PKK has focused its activities. Most terrorist attacks over the past two decades have been bombings or shootings that produced < 10 casualties per event. From 1984 to 2003, 15 terrorist attacks produced > or = 30 casualties (eight shootings, five bombings, and two arsons). The maximum number of casualties produced by any of these events was 93 in the Hotel Madimak arson attack by the Turkish Islamic Movement in 1993. This pattern suggests that terrorist attacks in Turkey rarely required more than local systems of emergency medical response, except in rural areas where Emergency Medical Services (EMS) are routinely provided by regional military resources. The last decade has seen the development of several key systems of local emergency response in Turkey, including the establishment of the medical specialty of Emergency Medicine, the establishment of training programs for EMS providers, the spread of a generic, Turkish hospital emergency plan based on the Hospital Emergency Incident Command System, and the spread of advanced training in trauma care modeled after Advanced Trauma Life Support.

  14. Terrorist Innovations in Weapons of Mass Effect, Phase 2

    DTIC Science & Technology

    2012-01-01

    Beirut, Lebanon to Ankara, Turkey.1 They demanded the release of the three surviving Munich terrorists. The hijacked airplane was flown to Zagreb ...Yugoslavia. The West German government complied immediately and the three were flown to Zagreb , where they boarded the hijacked plane. The plane then was

  15. 78 FR 56579 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ...--Continuation of the National Emergency With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 78 , No. 177 / Thursday, September 12, 2013 / Presidential Documents#0;#0; #0; #0;Title 3-- #0;The President [[Page 56581

  16. 75 FR 65556 - Designation of Two Individuals Pursuant to Executive Order 13224

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC... Order, the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001, terrorist attacks in New York...

  17. 76 FR 37891 - Designation of Four Individuals Pursuant to Executive Order 13224

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-28

    ... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by the Director of... Order, the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001 terrorist attacks in New York...

  18. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    PubMed Central

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01

    Chlorine gas represents a hazardous material threat from industrial accidents and as a terrorist weapon. This review will summarize recent events involving chlorine disasters and its use by terrorists, discuss pre-hospital considerations and suggest strategies for the initial management for acute chlorine exposure events. PMID:20823965

  19. 31 CFR 595.408 - Charitable contributions to specially designated terrorists.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... charitable contribution or donation of funds, goods, services,or technology to relieve human suffering, such as food, clothing or medicine, may be made to or for the benefit of a specially designated terrorist... contribute funds, goods, services or technology without knowledge or reason to know that the donation or...

  20. 31 CFR 595.408 - Charitable contributions to specially designated terrorists.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... charitable contribution or donation of funds, goods, services,or technology to relieve human suffering, such as food, clothing or medicine, may be made to or for the benefit of a specially designated terrorist... contribute funds, goods, services or technology without knowledge or reason to know that the donation or...

  1. 31 CFR 595.408 - Charitable contributions to specially designated terrorists.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... charitable contribution or donation of funds, goods, services,or technology to relieve human suffering, such as food, clothing or medicine, may be made to or for the benefit of a specially designated terrorist... contribute funds, goods, services or technology without knowledge or reason to know that the donation or...

  2. The Counter Terrorist Classroom: Religion, Education, and Security

    ERIC Educational Resources Information Center

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  3. 15 CFR 744.12 - Restrictions on exports and reexports to persons designated in or pursuant to Executive Order...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT...

  4. The FBI Vs. Domestic Terrorism.

    ERIC Educational Resources Information Center

    Webster, William H.

    1984-01-01

    Describes the efforts of the FBI to combat terrorism. Contingency plans have been established in each FBI field office, and agents are receiving special training in hostage rescue. Psycholinguistics is being used to deduce information about unknown terrorists. In 1982 the FBI arrested 95 terrorist suspects and obtained 84 convictions. (CS)

  5. Islam, Terrorism, and the Strategy of Enlightened Moderation

    DTIC Science & Technology

    2005-06-17

    The Terrorist Next Door: The Militia Movement and the Radical Right (New York:Thomas Dunne Books, 2002); quoted by Matthew J. Morgan. 58Jessica...Accessed 12 January 2005. 95 Levitas, Daniel. The Terrorist Next Door: The Militia Movement and the Radical Right . New York: Thomas Dunne Books, 2002

  6. When Terrorists Strike: What School Counselors Can Do. ERIC Digest.

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    Terrorist attacks in New York City and Washington, DC, and the continued threats of terrorism have the potential to engender negative psychological effects upon school age children and their families. School counselors and mental health professionals working with children need to be knowledgeable regarding interventions which allow students to…

  7. 31 CFR 103.16 - Reports by insurance companies of suspicious transactions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., such as terrorist financing or ongoing money laundering schemes, the insurance company shall... fraudulent submission relates to money laundering or terrorist financing. (e) Retention of records. An... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by insurance companies of...

  8. Exploiting Terrorist Vulnerabilities: A Law Enforcement Approach to Fighting Terrorist Organizations

    DTIC Science & Technology

    2009-05-01

    assassination led to a crackdown by the Egyptian Government. This crackdown led to an alliance with Gamal Abdel Nasser. Nasser promised a return to......He believed that the Western powers were bleeding Egyptian resources dry. He was firmly against capitalism and formed a social welfare network

  9. Terrorism and Schools. Fact Sheet

    ERIC Educational Resources Information Center

    Arkansas Safe Schools Initiative Division, 2003

    2003-01-01

    Since September 11, 2001, Americans have experienced a heightened sense of awareness and consciousness over the threat of terrorism against the United States. Terrorism experts agree that a terrorist attack on a school is a viable option for Al Qaeda and other terrorist organizations. In response to this threat, the National Association of School…

  10. Wrestling the Hydra: Exploiting Organizational Evolution in Terrorist Groups

    DTIC Science & Technology

    2013-05-02

    Nimrod Raphaeli, “Understanding Muqtada al-Sadr,” Middle East Quarterly, Volume XI: Number 4, Fall 2004. 33- 42, http://www.meforum.org/655/understanding...Post, Jerrold M. The Mind of the Terrorist. (New York: Palgrave McMillan 2007). Raphaeli, Nimrod . “Understanding Muqtada al-Sadr.” Middle East

  11. 76 FR 59488 - Designation of Three Individuals Pursuant to Executive Order 13224

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by the Director of... Order, the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001 terrorist attacks in New York...

  12. 75 FR 44312 - Designation of Three Individuals Pursuant to Executive Order 13224

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-28

    ... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC..., the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001, terrorist attacks in New York...

  13. The Rhetoric of Terrorism and Media Response to the "Crisis in Iran."

    ERIC Educational Resources Information Center

    Palmerton, Patricia R.

    1988-01-01

    Examines television news coverage of the first days of the 1979 Iranian hostage crisis. Discovers patterns that reinforce terrorist strategy by focusing causation for the crisis on institutional targets and suggesting that military intervention would reestablish control. Suggests that media portrayals of terrorist events support the rhetorical…

  14. Spectrofluorimetric determination of 1,3,5-trinitro-1,3,5-triazacyclohexane (hexogen, RDX) as a nitramine type explosive.

    PubMed

    Lapat, A; Székelyhidi, L; Hornyák, I

    1997-01-01

    RDX is one of the most important military explosives. It is a component of some plastic explosives which are frequently used in terrorist attacks. Two fluorimetric methods have been described for the quantitative determination of RDX which are based on the detection of nitrite ions. After a basic decomposition of RDX the nitrite ion can be detected by reaction with 4-aminofluorescein and by reactions forming a lumogallion-gallium(III) complex. These fluorimetric methods have been compared to a photometric reaction (Griess reaction) for determination of nitrite ions. It has been found that the fluorimetric methods have a higher sensitivity than the photometric method and they have been used in a wider concentration range.

  15. A colorimetric sensor array for detection of triacetone triperoxide vapor.

    PubMed

    Lin, Hengwei; Suslick, Kenneth S

    2010-11-10

    Triacetone triperoxide (TATP), one of the most dangerous primary explosives, has emerged as an explosive of choice for terrorists in recent years. Owing to the lack of UV absorbance, fluorescence, or facile ionization, TATP is extremely difficult to detect directly. Techniques that are able to detect generally require expensive instrumentation, need extensive sample preparation, or cannot detect TATP in the gas phase. Here we report a simple and highly sensitive colorimetric sensor for the detection of TATP vapor with semiquantitative analysis from 50 ppb to 10 ppm. By using a solid acid catalyst to pretreat a gas stream, we have discovered that a colorimetric sensor array of redox sensitive dyes can detect even very low levels of TATP vapor from its acid decomposition products (e.g., H(2)O(2)) with limits of detection (LOD) below 2 ppb (i.e., <0.02% of its saturation vapor pressure). Common potential interferences (e.g., humidity, personal hygiene products, perfume, laundry supplies, volatile organic compounds, etc.) do not generate an array response, and the array can also differentiate TATP from other chemical oxidants (e.g., hydrogen peroxide, bleach, tert-butylhydroperoxide, peracetic acid).

  16. The support system of the firefighter's activity by detecting objects in smoke space

    NASA Astrophysics Data System (ADS)

    Sakai, Masaki; Aoki, Yoshimitsu; Takagi, Mikio

    2005-12-01

    In recent years, crisis management's response to terrorist attacks and natural disasters, as well as accelerating rescue operations has become an important issue. We aim to make a support system for firefighters using the application of various engineering techniques such as information technology and radar technology. In rescue operations, one of the biggest problems is that the view of firefighters is obstructed by dense smoke. One of the current measures against this condition is the use of search sticks, like a blind man walking in town. The most important task for firefighters is to understand inside situation of a space with dense smoke. Therefore, our system supports firefighters' activity by visualizing the space with dense smoke. First, we scan target space with dense smoke by using millimeter-wave radar combined with a gyro sensor. Then multiple directional scan data can be obtained, and we construct a 3D map from high-reflection point dataset using 3D image processing technologies (3D grouping and labeling processing). In this paper, we introduce our system and report the results of the experiment in the real smoke space situation and practical achievements.

  17. Characterization of chemical warfare G-agent hydrolysis products by surface-enhanced Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Inscore, Frank E.; Gift, Alan D.; Maksymiuk, Paul; Farquharson, Stuart

    2004-12-01

    The United States and its allies have been increasingly challenged by terrorism, and since the September 11, 2001 attacks and the war in Afghanistan and Iraq, homeland security has become a national priority. The simplicity in manufacturing chemical warfare agents, the relatively low cost, and previous deployment raises public concern that they may also be used by terrorists or rogue nations. We have been investigating the ability of surface-enhanced Raman spectroscopy (SERS) to detect extremely low concentrations (e.g. part-per-billion) of chemical agents, as might be found in poisoned water. Since trace quantities of nerve agents can be hydrolyzed in the presence of water, we have expanded our studies to include such degradation products. Our SERS-active medium consists of silver or gold nanoparticles incorporated into a sol-gel matrix, which is immobilized in a glass capillary. The choice of sol-gel precursor allows controlling hydrophobicity, while the porous silica network offers a unique environment for stabilizing the SERS-active metals. Here we present the use of these metal-doped sol-gels to selectively enhance the Raman signal of the hydrolyzed products of the G-series nerve agents.

  18. The impact of terrorism on children and adolescents: terror in the skies, terror on television.

    PubMed

    Fremont, Wanda P; Pataki, Caroly; Beresin, Eugene V

    2005-07-01

    Terrorist attacks and their aftermath have had a powerful impact on children and their families. Media and television exposure of terrorist events throughout the world has increased during the past few years. There is increasing concern about the effects of this exposure on children who witness these violent images. To develop a proactive and strategic response to reactions of fear, clinicians, educators, and policy makers must understand the psychologic effects of media coverage of terrorism on children. Previous research has focused on media coverage of criminal violence and war. Recent studies have examined the effect of remote exposure of terrorist attacks and have shown a significant clinical impact on children and families.

  19. Actions Speak Louder than Words: A Behavioral Analysis of 183 Individuals Convicted for Terrorist Offenses in the United States from 1995 to 2012.

    PubMed

    Horgan, John; Shortland, Neil; Abbasciano, Suzzette; Walsh, Shaun

    2016-09-01

    Involvement in terrorism has traditionally been discussed in relatively simplistic ways with little effort spent on developing a deeper understanding of what involvement actually entails, and how it differs from person to person. In this paper, we present the results of a three-year project focused on 183 individuals associated with the global jihadist movement who were convicted in the United States, for terrorist offenses, between 1995 and 2012. These data were developed by a large-scale, open-source data collection activity that involved a coding dictionary of more than 120 variables. We identify and explore the diversity of behaviors that constitute involvement in terrorism. We also compare lone actors and those who acted as part of a group, finding that lone actors differed from group-based actors in key demographic attributes and were more likely to be involved in attack execution behaviors. Implications for counterterrorism are then discussed. © 2016 American Academy of Forensic Sciences.

  20. Elimination of bioweapons agents from forensic samples during extraction of human DNA.

    PubMed

    Timbers, Jason; Wilkinson, Della; Hause, Christine C; Smith, Myron L; Zaidi, Mohsin A; Laframboise, Denis; Wright, Kathryn E

    2014-11-01

    Collection of DNA for genetic profiling is a powerful means for the identification of individuals responsible for crimes and terrorist acts. Biologic hazards, such as bacteria, endospores, toxins, and viruses, could contaminate sites of terrorist activities and thus could be present in samples collected for profiling. The fate of these hazards during DNA isolation has not been thoroughly examined. Our goals were to determine whether the DNA extraction process used by the Royal Canadian Mounted Police eliminates or neutralizes these agents and if not, to establish methods that render samples safe without compromising the human DNA. Our results show that bacteria, viruses, and toxins were reduced to undetectable levels during DNA extraction, but endospores remained viable. Filtration of samples after DNA isolation eliminated viable spores from the samples but left DNA intact. We also demonstrated that contamination of samples with some bacteria, endospores, and toxins for longer than 1 h compromised the ability to complete genetic profiling. © 2014 American Academy of Forensic Sciences.

  1. Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States Since September 11, 2001

    DTIC Science & Technology

    2010-01-01

    NEFA Foundation (2009). 8 Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States be strong, but the means are not at...Radicalization: Pathways Toward Terrorism,” Terrorism and Political Violence, Vol. 20, 2008. The NEFA Foundation, Anwar al Awlaki: Pro Al-Qaida

  2. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    ERIC Educational Resources Information Center

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  3. 15 CFR 744.12 - Restrictions on exports and reexports to persons designated in or pursuant to Executive Order...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...

  4. 15 CFR 744.12 - Restrictions on exports and reexports to persons designated in or pursuant to Executive Order...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...

  5. 15 CFR 744.12 - Restrictions on exports and reexports to persons designated in or pursuant to Executive Order...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...

  6. 15 CFR 744.12 - Restrictions on exports and reexports to persons designated in or pursuant to Executive Order...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...

  7. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...

  8. Fears of American Children Following Terrorism

    ERIC Educational Resources Information Center

    Burnham, Joy J.; Hooper, Lisa M.

    2008-01-01

    Two months after 9/11, the fears of children and adolescents in Grades 2-12 were examined utilizing the American Fear Survey Schedule for Children and Adolescents (FSSC-AM). Fear intensity scores and age and gender differences are reported. Terrorist-related content on the FSSC-AM (e.g., terrorist attacks, our country being invading by enemies)…

  9. The Theater of Terror: Effects of Press Coverage.

    ERIC Educational Resources Information Center

    Weimann, Gabriel

    1983-01-01

    Compared attitudes before and after students read press clippings describing two separate terrorist incidents. Found that students exposed to press coverage tended to consider the event more noteworthy and to call for a solution. Concluded that press attention enhances the status of the people, problem, or cause behind a terrorist event. (PD)

  10. 75 FR 55659 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-13

    ...), I am continuing for 1 year the national emergency previously declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and... national emergency declared on September 14, 2001, and the powers and authorities adopted to deal with that...

  11. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    DTIC Science & Technology

    2004-04-01

    Franchising ” .............................................60 iv Shifting Tactics...its size, wealth and global reach. Eurasian organized crime is associated with Russia, Eastern and Central European countries, and the independent ...operation. Not only is that faulty logic, the cost of doing business may be rising for terrorists; similar to a business that expands into franchises

  12. The Rhetorical Genre of Terrorism: Identification and Policy Implications.

    ERIC Educational Resources Information Center

    Dowling, Ralph E.

    Rhetorical critics must examine terrorism to determine what contributions they can make to the understanding of rhetoric and to the evaluation of proposed responses to the terrorist threat. Not only must the rhetorical acts of crusader terrorists be viewed as rhetoric, but they must also be considered a rhetorical genre. This genre, with the…

  13. Toward a psychology of humiliation in asymmetric conflict.

    PubMed

    McCauley, Clark

    2017-04-01

    Humiliation is often cited in attempts to understand the origins of asymmetric conflicts, especially conflicts involving terrorism. This article reviews common usage, expert opinion, and experiences in interpersonal and intergroup conflicts to suggest a construct definition of humiliation as a combination of anger and shame. Following appraisal theory, this definition distinguishes between the situational appraisals associated with humiliation (insult and injury; failure to retaliate) and the emotional experience of humiliation (in which the combination of anger and shame may be more synergism than summation). Research on humiliation has barely begun and focuses on interpersonal relations; a crucial issue is whether interpersonal humiliation is the same experience as the intergroup humiliation salient in accounts of terrorism and terrorists. Also important is the prediction that the targets of terrorist attack will experience humiliation if the terrorists are unknown or unreachable; thus failure to retaliate may humiliate the strong as well as the weak in asymmetric conflict. Better understanding of humiliation may be useful for understanding both terrorist violence and government reactions to this violence. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Medical consequences of terrorist bombs containing spherical metal pellets: analysis of a suicide terrorism event.

    PubMed

    Kluger, Yoram; Mayo, Ami; Hiss, Jehuda; Ashkenazi, Eitamar; Bendahan, Jose; Blumenfeld, Amir; Michaelson, Moshe; Stein, Michael; Simon, Daniel; Schwartz, Ivan; Alfici, Ricardo

    2005-02-01

    Various metal objects added to explosives increase and diversify the wounding from bombing; especially favoured are spherical missiles for their special injuring characteristics. Our objective was to study the medical consequences and ballistic effects on human tissue of spherical metal pellets used in terrorist bombings. The clinical and forensic data of all bodily injured casualties of a suicide terrorist bombing in a crowded hotel dining room were analysed retrospectively. Of the 250 people at the scene, 164 were injured, with 91 (55.5%) suffering bodily injuries; 30 of them died. The immediately deceased had disseminated tissue damage and their bodies were saturated with steel spheres. Thirty-two immediate survivors sustained severe injuries (Injury Severity Score > or =16), and all suffered tissue penetration by the pellets. Twenty-three (32%) underwent surgery and 15 (21%) required intensive care. Metal pellets propelled by the explosion enhanced the secondary pattern of injury and injured even patients remote from the origin. Tissue destruction and specific organ injuries among survivors were limited. To evaluate and manage victims of terrorist bombings properly, medical teams should become familiar with these severe injuries.

  15. Recruitment and selection in violent extremist organizations: Exploring what industrial and organizational psychology might contribute.

    PubMed

    Hunter, Samuel T; Shortland, Neil D; Crayne, Matthew P; Ligon, Gina S

    2017-04-01

    For many terrorist organizations, also known as violent extremist organizations (VEOs), their ability to perpetuate violence is often contingent upon successful recruitment and selection of organizational members. Although academic work on terrorist recruitment and selection has improved in recent years, researchers have generally focused more heavily on aspects of radicalization rather than organization attraction and entry. Moreover, a number of terrorism scholars have lamented the lack of conceptual frameworks with which to interpret and extend findings linked to recruitment and selection, specifically. In light of these difficulties, we propose that considering literature bases outside of terrorism may be useful in extending lines of inquiry and offering alternative ways of thinking about how terrorist organizations operate. Specifically, we draw on Industrial and Organizational Psychology, Human Resource Management, and Organizational Behavior literature bases to offer alternative and extended modes of thought on terrorist recruitment and selection. In doing so, we believe both terrorism and more traditional organizational scholars can make substantive and novel contributions to future investigations of increasingly pressing issues surrounding violent extremism. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. The Threat Among Us: Insiders Intensify Aviation Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krull, Katie E.

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less

  17. Tactical Firefighter Teams: Pivoting Toward the Fire Service’s Evolving Homeland Security Mission

    DTIC Science & Technology

    2016-09-01

    critical response command C-TECC Committee on Tactical Emergency Casualty Care EMS emergency medical services EMT emergency medical technician ESU...Interagency Tactical Response Model: Integrating Fire and EMS with Law Enforcement to Mitigate Mumbai-Style Terrorist Attacks (New York: FDNY Center...the assailants, several traditional fire and EMS activities must often occur simultaneously to successfully mitigate the threat. Although rare

  18. Consequences of Decapitation Policies

    DTIC Science & Technology

    2013-04-04

    must not execute the targeted killing. • The targeted killing must not be conducted with “ poison , expanding bullets, or other prohibited weapons” under...responded with a never-ending string of poisonings , bombings, kidnappings, and shootings. Chechen militants continue to replace lost leaders. Over the...34 Aaron Mannes, “Testing the Snake Head Strategy: Does Killing or Capturing Its Leaders Reduce a Terrorist Group’s Activity?” Journal of

  19. Russian Political, Economic, and Security Issues and U.S. Interests

    DTIC Science & Technology

    2014-03-05

    tourism , health resorts, energy and mining, and light industry. It also calls for encouraging ethnic Russians to resettle in the area. The strategy... tourism industry, terrorist designations, and preparations for the Sochi Olympics. Additional BPC activity in counter- terrorism included several joint...recognize Kosovo’s independence; cut off or reduced energy supplies in disputes with Ukraine and Belarus; boosted ties with Cuba and Venezuela; and

  20. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  1. An Overview of NCRP Report No. 138 on Terrorist Activities

    NASA Astrophysics Data System (ADS)

    Poston, John, Sr.

    2005-04-01

    In late 1998, the National Council on Radiation Protection and Measurements (NCRP) convened Scientific Committee 46-14 to prepare a report on the radiological safety aspects of terrorist activities involving radioactivity. The work of this committee was funded through a contract with the Planning and Preparedness Division of the Office of Emergency Management of the Department of Energy. The committee was composed of a diverse group of individuals with expertise in many areas in addition to radiation safety and emergency response. These areas included law (both federal and state), public communications, and psychosocial aspects of such incidents. The statement of work focused the work of the committee, and the resulting report did not necessarily address all issues of such activities. One of the charges of the committee was to provide guidance as to necessary research and make recommendations regarding the present infrastructure with the responsibility for responding to such incidents. This presentation will provide an overview of NCRP Report No. 138 and focus on some of the critical issues raised in the report. These issues include recognition of the event, the interface between federal, state, and local authorities, exposure limits for the first-responders, clean-up criteria, training and resources, the psychosocial aspects of such events, and communications with the media and the public. This report represented the ``beginning'' of such considerations. It pointed the way for additional studies and research in this very important area.

  2. A Bayesian sequential processor approach to spectroscopic portal system decisions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sale, K; Candy, J; Breitfeller, E

    The development of faster more reliable techniques to detect radioactive contraband in a portal type scenario is an extremely important problem especially in this era of constant terrorist threats. Towards this goal the development of a model-based, Bayesian sequential data processor for the detection problem is discussed. In the sequential processor each datum (detector energy deposit and pulse arrival time) is used to update the posterior probability distribution over the space of model parameters. The nature of the sequential processor approach is that a detection is produced as soon as it is statistically justified by the data rather than waitingmore » for a fixed counting interval before any analysis is performed. In this paper the Bayesian model-based approach, physics and signal processing models and decision functions are discussed along with the first results of our research.« less

  3. Sensitive Detection of Capsaicinoids Using a Surface Plasmon Resonance Sensor with Anti-Homovanillic Acid Polyclonal Antibodies

    PubMed Central

    Nakamura, Shingo; Yatabe, Rui; Onodera, Takeshi; Toko, Kiyoshi

    2013-01-01

    Recently, highly functional biosensors have been developed in preparation for possible large-scale terrorist attacks using chemical warfare agents. Practically applicable sensors are required to have various abilities, such as high portability and operability, the capability of performing rapid and continuous measurement, as well as high sensitivity and selectivity. We developed the detection method of capsaicinoids, the main component of some lachrymators, using a surface plasmon resonance (SPR) immunosensor as an on-site detection sensor. Homovanillic acid, which has a vanillyl group similar to capsaicinoids such as capsaicin and dihydrocapsaicin, was bound to Concholepas concholepas hemocyanin (CCH) for use as an immunogen to generate polyclonal antibodies. An indirect competitive assay was carried out to detect capsaicinoids using SPR sensor chips on which different capsaicin analogues were immobilized. For the sensor chip on which 4-hydroxy-3-methoxybenzylamine hydrochloride was immobilized, a detection limit of 150 ppb was achieved. We found that the incubation time was not required and the detection can be completed in five minutes. PMID:25586413

  4. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    ERIC Educational Resources Information Center

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  5. COMPARISON OF TIME-OF-FLIGHT AND DOUBLE FOCUSING MASS SPECTROMETRY FOR REACHING TENTATIVE IDENTIFICATIONS FOR UNANTICIPATED COMPOUNDS ADDED TO DRINKING WATER BY TERRORISTS

    EPA Science Inventory

    Local monitoring of post-treatment drinking water using bench-top mass spectrometers could identify target compounds in a mass spectral library. However, a terrorist might seek to incite greater hysteria by injecting or infusing a mixture of unanticipated compounds of unknown tox...

  6. Probabilistic Ontology Architecture for a Terrorist Identification Decision Support System

    DTIC Science & Technology

    2014-06-01

    in real-world problems requires probabilistic ontologies, which integrate the inferential reasoning power of probabilistic representations with the... inferential reasoning power of probabilistic representations with the first-order expressivity of ontologies. The Reference Architecture for...ontology, terrorism, inferential reasoning, architecture I. INTRODUCTION A. Background Whether by nature or design, the personas of terrorists are

  7. Military Review. March-April 2004

    DTIC Science & Technology

    2004-04-01

    sophisticated organized crime syndicates are all becoming more capable and more dangerous. Satisfactorily offsetting the hazards of each, individu­...that range from rising regional powers to terrorist move­ ments and irresponsible regimes unbounded by ac­ cepted restraints governing international...terrorists, and even sophisticated organized crime syndicates are all becoming more capable and more dangerous. Satisfactorily offsetting the hazards

  8. The Ultra-Marathoners of Human Smuggling: Defending Forward Against Dark Networks That Can Transport Terrorists Across American Land Borders

    DTIC Science & Technology

    2015-09-01

    higher-risk immigrants known as special interest aliens (SIAs) from some 35 countries of interest in the Middle East, North Africa, and Asia where...terrorist organizations operate. Yet ineffectiveness and episodic targeting are indicated, in part by continued migration from those countries to the U.S

  9. Targeting Terrorist Leaders: A Case Study

    DTIC Science & Technology

    2011-03-01

    PRESSURE .................................38 IV. STATISTICAL ANALYSIS ON ISRAELI LEADERSHIP TARGETING ...43 V. CONCLUSION: HAVE ISRAELI ATTEMPTS TO...organization. D. POTENTIAL WEAKNESSES The use of one case to evaluate the efficacy of the terrorist-leadership targeting model is problematic...times who was in charge. In addition, the literature on Hamas is widely split on the role that inspirational leaders had on operational matters

  10. Terrorist Group Profiles

    DTIC Science & Technology

    1988-11-01

    Formed 1975. Estimated Membership Unknown. Headquarters Unknown. Area of Operations Worldwide. Leadership ASALA-RM: Monte Melkonian. ASALA-M: Hagop...release. Black Sea are. Stan ulSOVIEIT UNION ®ANKARA ~ Ararat TURKEY Moditerroneen Sea LES- BEIRUT ’ . Historic area claimed by Armenian terrorists...Lima, Peru. - Leadership Ernesto Montes Aliaga (AKA Raul Perez). Other Names Movimiento Revolucionario Tupac Amaru (original language). Armed members of

  11. Bringing the Meaning Back In: Exploring Existentially Motivated Terrorism

    DTIC Science & Technology

    2016-06-01

    approaches, radicalization theory examines terrorists with a multidisciplinary integration of psychology and rational choice along pathways and processes...Individual psychological traits or abnormalities combine with upbringing and environment to lead an individual down a path toward violence. It is...profiles of individual terrorists finds but one commonality— their essential normalness.56 Explaining terrorism though abnormal psychology is

  12. Western Radicalization: Rethinking the Psychology of Terrorism

    DTIC Science & Technology

    2017-03-01

    individual is susceptible to radicalization. As Clark McCauley describes, “The psychology behind terrorist violence is normal psychology , abnormal ...behind terrorist violence is normal psychology , abnormal only in the intensity of the group dynamics that link cause with comrades.”65 Nevertheless... psychology , abnormal only in the intensity of the group dynamics that link 249 Anne Manne, The Life

  13. 78 FR 45011 - Designation of Bulut Yayla, AKA: Samet Ince as a Specially Designated Global Terrorist Pursuant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-25

    ... DEPARTMENT OF STATE [Public Notice 8390] Designation of Bulut Yayla, AKA: Samet Ince as a Specially Designated Global Terrorist Pursuant to Section 1(b) of Executive Order 13224, as Amended Acting under the authority of and in accordance with section 1(b) of Executive Order 13224 of September 23...

  14. Terrorist Financing: The 9/11 Commission Recommendation

    DTIC Science & Technology

    2005-02-25

    thing we didn’t do effectively is follow the money . That’s what we have to do.”6 While the goals of freezing terrorist funds and tracking them for...under President Bill Clinton, “There is a big ideological divide right now between the asset freezers and the people who want to follow the money as it

  15. The effects of terrorism on teens' perceptions of dying: the new world is riskier than ever.

    PubMed

    Halpern-Felsher, Bonnie L; Millstein, Susan G

    2002-05-01

    Adolescents assessed after the September 11, 2001 terrorist attacks perceived the risk of dying from general causes, a tornado, and an earthquake as dramatically higher than did adolescents assessed years before the attacks. Adolescents' heightened perceptions of vulnerability to death extended beyond the terrorist acts, and generalized to unrelated risks.

  16. The Terrorist War against Islam: Clarifying Academic Confusions

    ERIC Educational Resources Information Center

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  17. Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks

    ERIC Educational Resources Information Center

    Prichard, Janet J.; MacDonald, Laurie E.

    2004-01-01

    On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…

  18. Parents' Emotion-Related Beliefs and Behaviours in Relation to Children's Coping with the 11 September 2001 Terrorist Attacks

    ERIC Educational Resources Information Center

    Halberstadt, Amy G.; Thompson, Julie A.; Parker, Alison E.; Dunsmore, Julie C.

    2008-01-01

    To assess relationships between parental socialization of emotion and children's coping following an intensely emotional event, parents' beliefs and behaviours regarding emotion and children's coping strategies were investigated after a set of terrorist attacks. Parents (n = 51) filled out the Parents' Beliefs about Negative Emotions questionnaire…

  19. "We Are Not Terrorists," but More Likely Transnationals: Reframing Understandings about Immigrants in Light of the Boston Marathon Bombings

    ERIC Educational Resources Information Center

    Kasun, G. Sue

    2013-01-01

    The Boston Marathon bombings in April 2013 created a new kind of discomfort in the United States about "self-radicalized" terrorists, particularly related to Muslim immigrants. The two suspected bombers, brothers with Chechen backgrounds, had attended U.S. public schools. News media portrayed the brothers as "immigrants" and…

  20. The Role of Simultaneous Counternarcotics and Counterterrorism Operations in the Afghan Coin Model

    DTIC Science & Technology

    2014-05-22

    COIN model, which was developed through Plan Colombia and the security policies of Alvaro Uribe to target terrorists and narco-traffickers...theory by examining the Colombian COIN model, which was developed through Plan Colombia and the security policies of Alvaro Uribe to target terrorists...28 Plan Colombia and Alvaro Uribe .............................................................................................. 32

Top