2. Purpose
The purpose of this presentation is to address the
multiple areas of concern for terrorist related
hazards, and programs designed to combat these
specific possible threats.
3. Threat #1 – Biological Threats
Biological warfare is a
major area of concern as
the introduction of an
infectious disease would
create mass hysteria and
a wide range of possible
outcomes…to include
multiple fatalities.
4. Biological Threat Continued
Required needs of intended Possible contamination
terrorist organization methods
This type of threat Terroristic organizations
requires a small biology may contaminate one of
lab, with little funding. themselves or another
The more funding person, animal or material
available to an object. Contamination
organization, the greater could occur strictly through
the contamination could contact.
be.
“Dirty” bomb, loaded with
Funding – low microbes. Detonation
Needs – low would cause initial
Potential damage - High exposure.
5. Programs Designed to Combat Biological Threats
CAMRA ZADD
The Center for Advancing The Center of Excellence
Microbial Risk Assessment for Zoonatic and Animal
(CAMRA), led by Michigan Disease Defense (ZADD),
State University and Drexel led by Texas A&M
University. This program is University and Kansas
designed to fill critical gaps State University. This
in risk assessments of program is designed to
microbial hazards. research and safeguard
Bioterrorism was the chief the nations agriculture
cause for this programs and animals from disease
creation. plus biological threats,
natural or man-made.
6. Programs Designed to Protect Against Biological
Threats Continued
ZADD NCFPD
The National Center for Food
ZADD also aids in Protection and Defense, led
combating against food by University of Minnesota.
This program is designed to
contamination via defend the safety and security
meat or produce. of the American food system,
through standards,
accountability and screening
of food items. This protects
the public from biological or
chemical contamination of
food.
7. Threat #2 - Explosives
Current usage of suicide
bombers, remote
detonated bombs, and
multiple explosive
methods have created
this threat to be not just
perceived but achieved.
Terrorist organizations
are capable of utilizing
multiple methods to
achieve a specific
explosive result.
8. Explosions Continued
Possible methods of
Necessities detonation
Multiple means create a Suicide bomber
violent explosion, and Planted explosive
thus no limited list can
be created for Remote detonation
identification. Use of mass
Financing – Low transportation device
Necessities – Dependent as improvised
upon desired effect explosive, as seen on 9-
Possible threat - High 11 of 2001 in New York.
9. Programs Designed to Combat the use of
Explosive Devices
ALERT NTSCOE
The Center of Excellence The National
for Awareness and Transportation Security
Location of Explosives- Center of Excellence,
Related Threats, led by established in
Northeastern University accordance with HR1.
and University of Rhode Designed to develop new
Island. Designed to technologies, tools and
develop new means and advanced methods to
methods to protect defend, protect and
America from explosives increase the resilience of
related threats. the nation’s multimodal
transportation.
10. Threat #3 – Chemical Hazards
Chemical warfare is the
use of bioengineered
chemicals, which causes
a physical or neurological
reaction within animals,
to result in a specific
outcome…usually death.
11. Chemical Hazards continued
The necessary cost to
create and produce a
chemical weapon is
considerable. However,
stockpiled weapons may
be obtained and utilized
by insurgent groups. The
probable risk is low, but
possibility is present.
12. Chemical Hazard Protection
Currently, no specific The Geneva Protocol of
program is implemented 1925 requires inspection
to deal exclusively with of all chemical weapon
Chemical weapons, or factories, while the
their possible usage. Chemical Weapons
Convention, 1997,
requires the destruction
and prohibition of all
chemical weapons.
Unfortunately, to date,
no terrorist organization
is party to this
convention.
13. Threat #4 - Recruitment
Terrorist organizations are recruiting members
through personal reference, internet or any other
method. Religious background is not a portion of
their criteria, rather a mutual hatred toward their
primary target.
14. Recruitment Continued
The key to any gang, or
criminal organization is
numbers. In essence, the
more people committed
to a cause, the stronger
the organization, (Battin-
Pearson et al, 1998).
15. Program to Combat Recruitment - START
The National Consortium for the Study of Terrorism
and Responses to Terrorism (START), is led by the
University of Maryland.
Designed to disrupt terrorists and terrorist groups
through grounded findings on the human element of
the terrorist threat.
This program takes information on a global scale and
then compiles the information for evaluation and
decision, (US Department of Homeland Security).
16. Preventive Measures
This office has
established a key
program to aid in
preventing terrorist
attacks prior to any
major attack
materializing.
“An ounce of prevention
is worth more than a
pound of cure” – Henry
de Bracton
17. Preventive Programs – C2I
The Center of Excellence in Command, Control and
Interoperability (C2I), is led by Purdue University
and Rutgers University. This program is designed to
create the scientific basis and specific technologies
needed to analyze massive amounts of information,
in order to detect security threats quickly.
18. Response
Response to any event is
crucial in obtaining
information, ensuring
maximum safety after
the fact, and restoring
order efficiently.
19. Response Programs
PACER CHC
The National Center for The Coastal Hazards Center of
Excellence, led by the University
the Study of of North Carolina and Jackson
Preparedness and State University. This program
Catastrophic Event performs research and develops
Response (PACER), is educational programs to enhance
the nations ability to protect
led by Johns Hopkins populations, properties, and
University. This program economies from natural
is designed to optimize disasters. Although the CHC is
designed for natural disasters
our nations preparedness and response, their information
in the event of a high and training cross references to
consequence disaster. terroristic acts as well.
20. Response Programs Continued - CREATE
The Center for Risk and Economic Analysis of
Terrorism Events (CREATE), is led by the University
of Southern California. This program is designed to
develop tools to evaluate the risks, costs and
consequences of terrorism.
21. Conclusion
In closing, the many programs specific to combating
terrorism within the United States of America, is
growing. Already a vast web of areas are covered and
demonstrate the concern toward terroristic acts.
September 11th was a realization for the American
people, the Department of Homeland Security is the
answer of that realization.
Department of Homeland Security – “Preserving our
Freedoms, Protecting America”
22. References
Battin-Pearson, S. R., Thornberry, T. P., Hawkins, J. D.,
and Krohn, M. D. 1998. Gang Membership, Delinquent
Peers, and Delinquent Behavior. Bulletin. Youth Gang
Series. Washington, DC: U.S. Department of Justice,
Office of Juvenile Justice and Delinquency Prevention.
Web search on February 25, 2012 of http://DHS.gov
Chalk, Peter 2006, West European Terrorism and
Counter-Terrorism, New York: St. Martin's Press
Higgins, Rosalyn, 2007, "The General International Law
of Terrorism." Terrorism and International Law. Edited
by Rosalyn Higgins and Maurice Flory. New York:
Routledge,. Pages 13–29.