History of terrorist attacks to critical infrastructures involving hazardous materials

Author(s):  
Gabriele Landucci ◽  
Nima Khakzad ◽  
Genserik Reniers
2010 ◽  
Vol 4 (1-2) ◽  
pp. 37-73
Author(s):  
Paul R. Powers

The ideas of an “Islamic Reformation” and a “Muslim Luther” have been much discussed, especially since the terrorist attacks of September 11, 2001. This “Reformation” rhetoric, however, displays little consistency, encompassing moderate, liberalizing trends as well as their putative opposite, Islamist “fundamentalism.” The rhetoric and the diverse phenomena to which it refers have provoked both enthusiastic endorsement and vigorous rejection. After briefly surveying the history of “Islamic Reformation” rhetoric, the present article argues for a four-part typology to account for most recent instances of such rhetoric. The analysis reveals that few who employ the terminology of an “Islamic Reformation” consider the specific details of its implicit analogy to the Protestant Reformation, but rather use this language to add emotional weight to various prescriptive agendas. However, some examples demonstrate the potential power of the analogy to illuminate important aspects of religious, social, and political change in the modern Islamic world.


Author(s):  
Michał SILARSKI

The ever-increasing risk of terrorist attacks is a stimulus for seeking new, more effective danger detection methods. The article describes new methods of detecting hazardous materials based on the interaction between neutrons and matter. The status of the design of the device for detecting hazardous materials in water environments based on these methods, currently in development at the Jagiellonian University (Kraków, Poland), will be presented as well.


2014 ◽  
Vol 4 (3) ◽  
pp. 11-26
Author(s):  
John S. Hurley ◽  
H. Mark McGibbon ◽  
Roxanne Everetts

Many of the systems that control the critical infrastructure were not originally designed with security in mind. This has left us vulnerable to unwanted attacks in many of the environments. It has become essential that the authors determine if their infrastructures are better prepared for existing and future threats. In this study, the authors will examine the impact of attacks, including terrorist attacks on critical infrastructures, in particular, the Energy sector. The results show that in spite of the warnings of the threats carried out in various sectors and organizations around the world, they have still remain extremely vulnerable because of a number of critical security issues that hamper their ability to better serve and protect our vital information assets. The authors examine some of the most prominent models being used today and how they may be modified to better serve the needs of their user communities and key stakeholders.


2011 ◽  
Vol 90-93 ◽  
pp. 3206-3213 ◽  
Author(s):  
Bo Hu ◽  
Guo Qiang Li ◽  
Su Wen Chen ◽  
Wen Long Shi

Perimeter protection is an important physical protection approach for buildings and infrastructures, which is also regarded as the first line of protection. Vehicle borne improvised explosive devices (VBIED) have been recognized as a major design threat by many government agencies for years, since they have been so extensively used in past terrorist attacks against critical buildings and infrastructures. Preventing unauthorized vehicles from approaching a protected area with vehicle barriers installed in perimeter of the buildings and infrastructures would consequently reduce blast and debris threats. The history of test certification standard for vehicle barriers is briefly reviewed. The research achievements on anti-ram bollards, one type of vehicle barriers, in the fields of crash test, numerical simulation, and design theory are presented. The remaining problems and deficiencies of the research are pointed out and the corresponding proposals are put forward. Finally, some further research works on anti-ram bollards are proposed.


2004 ◽  
Vol 38 (3) ◽  
pp. 36-43 ◽  
Author(s):  
John A. Lindsay ◽  
Robert Aguirre

Underwater dumpsites or hazardous material sites lie in every ocean on the earth. A geographic information system (GIS) project documents the locations and associated data of Global Offshore Hazardous Materials Sites (GOHMS) potentially posing threats to human health, safety, navigation, commercial fishing, and the environment. Nearly 350 sites are currently in the project. This paper discusses some of the history of hazardous materials disposal and loss at sea, primarily off the United States coast between 1945 and 1970 when few guidelines existed to geographically document an underwater site. Although not publicly distributed at present, the GOHMS GIS project is intended to add value to existing historical information by providing site investigators and responders easy access to waste stream locations and other spatial data through NOAA's Office of Response and Restoration and the National Marine Sanctuaries Program.


Subject The militancy phenomenon. Significance The Sahel is often discussed in Western and international policy circles as a region with notable problems of porous borders, smuggling, trafficking and militant Islamists. In recent years, the Sahel has seen several high-profile terrorist attacks and violent incidents, and there is a history of Westerners being kidnapped in the Sahara. The political crisis in Mali in 2012-13 triggered military intervention by France and the deployment of a UN peacekeeping mission. Impacts High-profile terrorist attacks may recur in the Sahel but will remain rare. Regional security cooperation will grow only slowly. Militant groups will not form significant links across the region or outside it.


2013 ◽  
pp. 311-343
Author(s):  
Chris W. Johnson

Previous studies have proposed new methodologies for the protection of national critical infrastructures without grounding their proposals in a detailed analysis of previous contingencies. This chapter provides the background for subsequent parts of this book by summarising previous telecom-related incidents. In particular, it considers the causes and consequences of natural disasters, of blackouts across power distribution networks, of terrorist attacks, and of ICT infrastructure failures.


2002 ◽  
Vol 89 (1) ◽  
pp. 29-40 ◽  
Author(s):  
C.V. Shorten ◽  
J. Galloway ◽  
J.G. Krebs ◽  
R.S. Fleming

ORBIT ◽  
2020 ◽  
pp. 1-27
Author(s):  
Laurence J. Alison ◽  
Neil D. Shortland ◽  
Frances Surmon-Böhr ◽  
Emily K. Alison

This chapter outlines the history of “harsh” interrogation methods based on coercion and torture. This includes discussion of the US “Enhanced Interrogation” Program and the British military’s development and use of the “Five Techniques,” along with real-world examples, including the interrogation of two detainees thought to be associated with the 2001 9/11 terrorist attacks on the United States. The chapter discusses the underlying theory behind the use of torture and coercion and explains why these interrogation methods are ineffective at obtaining reliable information from detainees. It also describes the reasons why torture continues to be used. Such reasons relate to revenge, dehumanization, and hatred.


2017 ◽  
Vol 41 (S1) ◽  
pp. S17-S17
Author(s):  
N. Verbeeck

Role of detention in the process of radicalization and opinions about detention regime and approach for the prevention of radicalization in jail.Following the terrorist attacks in Paris and Brussels, more attention is being paid to the factors, which play a role in the radicalization process of some Western youth. It was found that a large number of radicalized youth have a history of detention and that often this period of detention played a key role in radicalization. As a psychiatrist working in a prison with a high security department where many suspects of terrorism are incarcerated stay, I was asked to advise on the detention regime and on the way of dealing with difficult inmates. In this presentation I would like to elaborate on the elements during detention which determine the process of radicalization of certain prisoners, based on the current knowledge about the radicalization process and on the knowledge about the background of radicalized individuals in combination with own observations and findings about the detention regime in prisons.Disclosure of interestNils [email protected]@fracarita.orgProposal EPA 2017.


Sign in / Sign up

Export Citation Format

Share Document