Tag Archives: em

Future Threats

Aside from hoax attacks, where credible threats occur based on purposeful counter-intelligence efforts of terrorists, I suspect large-scale events to be the modus operandi of terrorists in the next decade. According to LaFree, Yang, and Crenshaw (2009), anti-U.S. terrorists have ample intent on attacking the U.S. on our soil; however, this would be a huge and logistically complicated undertaking. For this reason, any future organized act of terror on U.S. soil will be designed to be significant, causing extreme loss of life or toppling a significant structure or both.

Biologic weapons would be the choice for terrorists who wished to inflict harm to the greatest amount of people, though releasing biologic material lacks the sudden impact usually sought, and weaponized biologics are not easily grown or economical (Levitin, 2005). Chemical weapons are typically easier and cheaper to manufacture, though they lack effectiveness and tend to merely create a scare of equivalent magnitude of a hoax (Levitin, 2005). Aside from basic explosives, this leaves the radiologic threat, a threat that I believe, coupled with a significant target, will cause devastating effects not unlike 9/11.

A dirty bomb is a conventional explosive used to disseminate radiologic materials over an area. I foresee a coordinated attack on the financial districts of the U.S. using dirty bombs. The bombs would, first, cause physical destruction to the buildings causing immediate disruption of the financial sector of the U.S. economy, along with a large death toll. Second, the radiation dispersed over the area would cause difficulty in cleaning up the area, inhibiting recovery and further impacting the financial markets.

A law enforcement response to such an attack would certainly be large in scale. The local police department would be first to respond, along with state police, then the WMD Coordinator at the local FBI field office would be apprised of the situation. As responders start arriving on scene, personal radiation detectors would start to tone indicating the release of radiologic material. This further information would prompt the WMD Dictorate in Washington, D.C., to order a full asset response by the FBI and other federal terrorism partners (e.g. the Joint Terrorism Task Force). The response to this type of incident should be trained on in cooperative exercises involving all levels of law enforcement. Additionally, personal radiation detectors (and other detectors) should, at a minimum, be placed in police vehicles for early warning of environments immediately dangerous to life and health. Adequate training, equipment, and preparation are the only ways in which to prepare for responding to large-scale terrorist attacks.

References

LaFree, G., Yang, S., & Crenshaw, M. (2009). Trajectories of terrorism: Attack patterns of foreign groups that have targeted the United States, 1970-2004. Criminology & Public Policy, 8(3), 445-473. doi:10.1111/j.1745-9133.2009.00570.x

Levitin, H. W. (2005). Debunking myths: How law enforcement can help diffuse the public’s fear. On the Beat. Retrieved from http://www.adl.org/learn/columns/Levitin.asp

Fear of Terrorism

As terrorism becomes more prevalent within a society, concerns about the psychological effects are brought to the forefront. The psychological effects of terrorism, in general, should have an impact on the ability of law enforcement and the public to interface appropriately. A recent study by Bleich, Gelkopf, and Solomon (2003) of the psychological effects of terrorism on the public in Israel showed surprisingly low levels of post-traumatic stress disorder symptoms despite high incidences of direct exposure to terror events. This study demonstrated that, although up to a third of the respondents acknowledged a “limited sense of safety and substantial distress [they] reported adapting to the situation without substantial mental health symptoms and impairment, and most sought various ways of coping with terrorism and its ongoing threats [, possibly linked to] processes of adaptation and accommodation” (p. 619). The study found that the most effective and widely used coping mechanism was checking on the well-being of friends and family. As people tend to cope well with trauma, attitudes towards protective measures seem to acquiesce for the common good, and this can be assistive to law enforcement.

One of the protective measures people tend to adopt that would help law enforcement is a sense of hypervigilance (Bleich, Gelkopf, & Solomon, 2003). Hypervigilance allows the people to be more attentive to things out of the ordinary (e.g. unattended packages, suspicious loitering, anxious mannerisms of others, et al.). This promotes a line of communication with law enforcement not only regarding terrorism but for other criminal activity, also.

Another protective measure, which goes towards acquiescence, is the ability of the people, in general, to accept an increased presence of law enforcement in their daily lives. When faced with a proximal event, the bulk of the citizenship contend that it is, indeed, a function of government to protect the masses from further harm, and these citizens tend to accept limits on personal liberty for perceived increases in security (Klein, 2007). This is a double-edged sword, however. People tend to want to return to a normal state of affairs (Bleich, Gelkopf, & Solomon, 2003). Though an increased police presence is initially welcomed and embraced, the people will eventually resent the loss of liberty and require law enforcement presence to recede. How this occurs will either enhance or detract from the ongoing relationship with law enforcement. An example of this is easy to see when considering both local law enforcement and the federal effort of the Transportation Security Administration (TSA). Local law enforcement seems to have decreased their presence, at least in my area, and are respectfully viewed as helpful, whereas the TSA, an agency that continues to irrationally impede on liberty, is viewed negatively by the traveling public.

Law enforcement is a service-based industry where the public is the customer. Police need to understand both the rights and the fears of the people in order to maintain the appropriate level of service, which waxes and wanes.

References

Bleich, A., Gelkopf, M, & Solomon, Z. (2003). Exposure to terrorism, stress-related mental health symptoms, and coping behaviors among a nationally representative sample in Israel. Journal of the American Medical Association, 290(5), 612-620.

Klein, L. (2007). Civil liberties and national security in the post 9-11 era: State power and the impact of the USA Patriot Act. Conference Papers – American Sociological Association, 1-8.

WMD Coordinator

According to the Federal Bureau of Investigation (FBI; 2007) and the U.S. Department of Justice (2009), the WMD Coordinator, a designated Special Agent within each field office, is responsible for initiating the federal response to any possible WMD event. “The Attorney General has lead authority to investigate federal crimes, which includes the use or attempted use of a WMD. 28 U.S.C. § 533 (2008) and 18 U.S.C. § 2332(a) (2008). The Attorney General has delegated much of this investigative authority to the FBI” (U.S. Department of Justice, 2009, p. 1). The WMD Coordinator helps to fulfill this mandate by being the point of contact for local and state officials when an event involving an WMD is suspected to have occurred.

In the Mattapan scenario, the initial response by the Boston Police Department and the Massachusetts Bay Transit Authority Police Department unveil a possible attempt to utilize an explosive to disseminate a chemical or biologic material in a public place. As soon as this plot is uncovered, an emergency response plan should be initiated, which involves notifying the Boston FBI field office of the suspected WMD event. The WMD Coordinator of the Boston field office would be the person receiving this notification. The Massachusetts State Police would also be notified to respond as they are able to provide their own subject matter experts and resources.

As a WMD subject matter expert, once notified of the circumstances, according to the FBI (2007), the WMD Coordinator responds to the scene and assists local and state law enforcement in determining the threat. Once it is established that an WMD is involved, whether by direct investigation at the scene or based on reports from law enforcement, the WMD Coordinator would immediately notify the WMD Directorate at FBI Headquarters. This notification would activate a team of WMD experts who would participate in a conference call with the WMD Coordinator to further identify the threat and, also, identify the additional federal resources needed to respond to the event. The additional resources could be individual experts, federal response teams from other departments or bureaus (e.g. the Joint Terrorism Task Force, the Bureau of Alcohol, Tobacco, Firearms, and Explosives), or the special teams of the FBI, including the Chemical and Biological Sciences unit (to identify the particular payload material), photo operations personnel, an explosives team (based on the dispersal mechanism being explosives), the disaster squad (to identify any potential victims), and the national level Hazardous Material Response Unit and the local Hazardous Material Response Team to collect evidence from the scene. The WMD Coordinator would, then, be responsible for leading the investigation.

The WMD Coordinator would most likely fulfill his role within the unified incident command structure as Law Enforcement Command. This position would allow him or her to delegate the responsibilities of the response, including the need to provide information to the public. Public Information Officers provide a critical role in major response efforts. They provide enough information to the public to allay any unfounded fears, provide direction and instructions when needed, and filter sensitive information so that it does not become public knowledge. It is important for the public to be apprised of the situation in a calm and authoritative manner to assure them that everything necessary is being done. It is also important for the public to understand the risks of the situation in a realistic manner to prevent a mass overreaction.

The WMD Coordinator position is a valuable tool of the FBI and the federal government. Though the value of this position has been criticized for the lack of readiness and training, preparations are being undertaken to ensure a quality approach to responding to WMD events in the future (McDonald, 2009; U.S. Department of Justice, 2009).

References

Federal Bureau of Investigation. (2007, March 5). WMD threats: How we respond. Retrieved from http://www2.fbi.gov/page2/march07/wmd030507.htm

McDonald, J. (2009, October 8). FBI WMD Coordinator program needs improvement [Web log]. The OC Sheriff Blog. Retrieved from http://blog.ocsd.org/post/2009/10/08/Audit-of-FBI-Weapons-of-Mass-Destruction-Coordinator-Program-Recommends-Improvements.aspx

U.S. Department of Justice. (2009, September). The Federal Bureau of Investigation’s Weapons Of Mass Destruction Coordinator program (Audit Report #09-36). Retrieved from http://www.justice.gov/oig/reports/FBI/a0936.pdf

The Role of Federal Law Enforcement

The role of federal law enforcement has changed with the inception of the National Response Framework (NRF; U.S. Department of Homeland Security, 2008). In the past, according to the obsolete National Response Plan (NRP; U.S. Department of Homeland Security, 2004), the effort of the federal government was to support local efforts and only take charge if necessary or requested to do so by the responsible jurisdiction. The NRF furthers this goal. However, according to a recent U.S. Department of Justice (2010) report, federal law enforcement is ill-prepared to provide a robust and organized response to an act of terrorism on U.S. soil, save for the Federal Bureau of Investigation (FBI).

For instance, assume that a small group of terrorists detonate a bomb, otherwise known as a ‘suitcase bomb’, designed to shower radiologic material over an area approximately 9 city blocks in downtown Los Angeles. What chain reaction, in regards to a law enforcement response, would this event trigger?

First, calls to 9-1-1 reporting a large explosion would trigger a local response by both the Los Angeles Police Department and the Los Angeles County Sheriff’s Office, along with other emergency services. As local assets begin arriving, hopefully they determine the large and possibly catastrophic nature of the event and advise their communications center to make the appropriate notifications. These notifications would be contingent on the preplanned incident action plans of each agency, which would, hopefully, open emergency operations centers (EOCs) for the City of Los Angeles, Los Angeles County, and the State of California. These EOCs would be responsible for making further notifications and coordinating the response with mutual aid agencies as well as state and federal assets. Common to most all preplans in the event of a suspected terrorist attack is the notification to the FBI’s Joint Terrorism Task Force, which is responsible, according to the Department of Justice (2010) report and the NRF, for coordinating all law enforcement and investigative activities of federal agencies (U.S. Department of Homeland Security, 2008).

A suitcase bomb is significant as it involves the spread of radiological materials that are harmful to humans. According to the Department of Justice (2010) report, the only federal law enforcement agency prepared to deal with such an event is the FBI. Thus, the FBI would be expected to offer expertise and specialized teams to the Los Angeles Police Department in a cooperative effort to begin law enforcement and investigative procedures as soon as possible.

References

U.S. Department of Homeland Security. (2004). National response plan. Retrieved from http://www.au.af.mil/au/awc/awcgate/nrp/nrp.pdf

U.S. Department of Homeland Security. (2008). National response framework. Retrieved from http://www.fema.gov/pdf/emergency/nrf/nrf-core.pdf

U.S. Department of Justice. (2010, May). Review of the department’s preparation to respond to a WMD incident (OIG Report# I-2010-004). Retrieved from http://www.justice.gov/oig/reports/plus/e1004.pdf

Planning a Terrorist Attack

Planning a clandestine attack using a weapon of mass destruction (WMD) is not simple. First, in order to promote an attack, the target needs to be viewed to have violated some ideology, policy, or other deeply held belief (“Terrorism, definition and history of,” 2002). Usually, a symbol of the offense will be chosen as either a specific target, such as the case of the World Trade Center, or as a vehicle or vector for the attack, as in the case of the U.S. Postal Service anthrax attacks (“Biological terrorism,” 2002; Marshall, 2002; “Weapons of mass destruction,” 2002). The dollar is an international symbol of capitalism and the might of the United States. In the current climate, especially with the declining U.S. economy, I would expect the money supply, itself, to be a viable vector for disseminating some sort of substance capable of causing terror. A dollar bill has a circulating life of 42 months and changes hands, on average, twice a day, and by impregnating paper money with a chosen substance, a single dollar bill could potentially harm more than 2,500 people during its circulation (U.S. Department of the Treasury, Bureau of Engraving, n.d.).

Almost as important as the vehicle is the impregnating substance. Chemical and radiological substances would be too easy to eventually detect, and the amount dispersed on each dollar bill might not be enough to cause harm. A live biological agent suspended in an aqueous nutrient solution could easily coat a dollar bill without detection and easily transfer to hands, surfaces, and other bills. According to Winfield and Groisman (2003), Salmonella enterica might prove to be a hardy pathogen capable of existing in such a solution for months. S. enterica is responsible for typhoid fever in humans. Escherichia coli, though a highly pathenogenic mycobacterium, does not have the same persistance outside of a living host. Both S. enterica and E. coli have detrimental health effects, especially for those with deficient immune systems.

Delivery and dispersion of the weapon would be the next consideration. This would have to be accomplished using a number of distribution points, geographically distant, that transfer small denomination bills easily both in and out, such as gasoline stations, convenience stores, fast food restaurants, and liquor stores. Using a website designed to track dollar bills (http://www.wheresgeorge.com), a single bill has been tracked in about two and a half years, as follows: Florida, Georgia, Florida, Indiana, Arizona, Oregon, New York, Tennessee, and South Carolina. Another has been documented as travelling from Ohio to Michigan via Kentucky, Tennessee, Florida, Texas, Louisiana, Texas, and Utah in a mere 212 days. This is evidence that general dispersion techniques will work well if initially geographically distributed.

Additionally, as the Salmonella bills are being dispersed, I would encourage a technological attack on various credit card networks. If the hacking results in increased network downtime, the American citizenry would be encouraged to use paper money more often, potentiating the transfer of the Salmonella bills. As a final coup de grace, when the American populace finally begin to realize that the money supply, itself, is tainted, I would encourage conventional attacks on banking institutions to include random bombings, shootings, and threats of the same. This would further drive the message against the U.S. money supply and could crash the economy.

This plan was developed in about twenty minutes. The terrorists of the day have had decades to consider such plans, and I for one am glad that they tend to be grandiose. When the terrorists realize the simplicity required of causing terror in the U.S., we need to be very wary.

References

Biological terrorism. (2002). Encyclopedia of terrorism. Retrieved from http://sage-ereference.com.ezp.waldenulibrary.org/view/terrorism/n76.xml

Marshall, P. (2002, February 22). Policing the borders. CQ Researcher, 12, 145-168. Retrieved from http://library.cqpress.com.ezp.waldenulibrary.org/cqresearcher/

Terrorism, definition and history of. (2002). Encyclopedia of terrorism. Retrieved from http://sage-ereference.com.ezp.waldenulibrary.org/view/terrorism/n415.xml

U.S. Department of the Treasury, Bureau of Engraving. (n.d.). FAQ library. Retrieved from http://www.moneyfactory.gov/faqlibrary.html

Weapons of mass destruction. (2002). Encyclopedia of terrorism. Retrieved from http://sage-ereference.com.ezp.waldenulibrary.org/view/terrorism/n453.xml

Winfield, M. D. & Groisman, E. A. (2003). Role of Nonhost Environments in the Lifestyles of Salmonella and Escherichia coli. Applied Environmental Microbiology, 69(7), 3687-3694. doi:10.1128/AEM.69.7.3687-3694.2003

Revisiting My Goals

When I applied to Walden University, there were some choices that I needed make in regards to which program I would enroll in. I relied on my past experience and some of my current goals to direct me to the Bachelor of Science degree in Computer Information Systems (BSCIS) with a concentration in Information Systems Security (ISS), a process which truly motivates me. Revisiting my goals and lending them power to help navigate the world of academia, I needed to ensure that these goals still held true. The first assignment in the Introduction to Information Systems class afforded me the opportunity to do just that, while this assignment will allow me to review my goals once again.

My affinity towards positive social change (Schadone, 2009) is unwaivering, as is my desire to achieve a position in the field of disaster management. I do feel, however, that my chosen degree program is ill-prescribed to prepare me for such ambitions. Though there has been a great incentive to involve the engineering sciences into public policy administration (Connolly, 2009), my experience with the BSCIS degree, even with the ISS concentration, leads me to believe that the curriculum does not satisfy my current needs or goals. I do believe that a career in Information Systems Security would provide an opportunity to reach many of my goals, but other academic directions would provide a more solid foundation for me to build upon.

As of this writing, I have decided to research other avenues of academia which might be better suited to providing the core educational opportunities that would benefit me the most. I have decided that the B.S. in Health Studies with a concentration in Health Administration would be a better fit at this time. I hope to use this degree to propel me forward into an opportunity to earn an MPH with a concentration in Emergency Management and, ultimately, a Ph. D. in the same.

As the H1N1 influenza virus reminds us all about the 1918 “Spanish Flu,” there is an undertone of personal responsibility and preparedness in the event of a pandemic (Bornstein & Trapp, 2009), of which conditions are favorable. I plan to take personal responsibility in this and other potential disasters to position myself as an expert in the field helping to promote plans and policies to mitigate and respond effectively to such incidences. Though, I am versed in the computer sciences, I feel that my position as a health official would be better utilized in these times of crisis. Perhaps one day in the future I will return my focus on computing, but until then, my social conscience and sense of community seem to be my only defining factors.

References

Bornstein, J., & Trapp, J. (2009, June). Pandemic Preparedness: Ensuring Our Best Are Ready to Respond. IAEM Bulletin, 26(6), pp. 6, 14. Retrieved August 22, 2009, from http://www.iaem.com

Connolly, J. (2008, September). Bridging the gap between engineering and public policy: A closer look at the WISE program. Mechanical Advantage, 19. Retrieved August 22, 2009, from http://www.asme.org

Schadone, M. F. (2009). Information Systems and Me: My Professional and Career Goals. Minneapolis, MN: Walden University.