Civil dimension of security



Download 121.71 Kb.
Page2/4
Date28.05.2018
Size121.71 Kb.
#50812
1   2   3   4

INTRODUCTION

1. In the past various terrorist groups have employed or threatened to employ chemical, biological, radiological or nuclear (CBRN) agents. However, despite widespread publicity about the threat, there have been few actual attempts by terrorists to cause mass civilian casualties using CBRN agents. Exceptions have been the salmonella poisoning of 751 people (no fatal cases) by the Rajneesh sect in Oregon, USA in 1984; and the various attempts by the Aum Shinri Kyo in Japan to use both chemical and biological agents, the most “successful” of which resulted in June 2004 in seven dead and 200 hospitalised in Matsumoto, and 12 dead and 1,000 hospitalised in Tokyo. Unsubstantiated threats have been far more common, hoaxes or relatively low-level incidents causing few, if any, casualties.


2. There have also been a small number of attacks on nuclear power facilities worldwide; numerous unsubstantiated threats to trigger nuclear explosive devices; and at least one reported case of radiological materials being used by terrorists to a very limited degree when Chechen rebels planted a cesium capsule in a park in Moscow.
3. However, as information and capabilities become progressively more widespread via the Internet etc, it is becoming increasingly difficult for the authorities to distinguish between a mere hoax and the real thing. This raises a number of difficult questions about the appropriate responses to such threats, which not only have the potential to be extremely disruptive to normal, day-to-day activities, but also may provide individual terrorists and terrorist groups with a potent instrument against society, even in the absence of a real capability or willingness to carry out an actual attack. In any event, an attack using unconventional weapons would certainly cause serious economic and social disruption. According to a recent study by the Organisation of Economic Co‑operation and Development (OECD), the cost of a single attack could range between $50 billion and $250 billion.
4. Governments and the general public alike view the potential threat of CBRN weapons being in the hands of terrorists with growing concern. In the autumn of 2001, the anthrax attacks in the US started the warning bells ringing. Recent terrorist attacks directed at public transportation in Madrid or in London brought the threat to Europe and signalled the need to prepare for an even worse scenario in Europe too. At the end of August, information regarding plans by an Al-Qaeda cell to carry out a sarin gas attack on the British House of Commons, and an incident in May 2004, when condoms full of purple flour were thrown at Prime Minister Tony Blair during a Question and Answer session in the House, highlighted the vulnerability and lack of preparedness of national parliaments.
5. All these incidents crudely demonstrate the crucial need to understand the extent of the threat and to adopt adequate measures. The question is, how easy would it be for an individual terrorist or terrorist group to manufacture or to obtain such weapons, and yet more importantly: how easy would it be for such weapons to be delivered, dispersed or used?
6. At all levels governments have been prompted to reconsider their readiness, resources, and capabilities to mitigate the impact of those threats to society. Several international initiatives adopted in recent years have also contributed towards a global awareness of potential threats. At the Kananaskis Summit in Canada in June 2002, G8 countries adopted a “Global Partnership Against the Spread of Weapons of Mass Destruction”, committing themselves to spending up to $20 billion over 10 years on preventing terrorists, or those who harbour them, from acquiring or developing CBRN weapons, missiles, equipment, technology and related materials.
7. The 2003 report on “Civil Protection: a general overview” by Ms Wohlleben (Germany) assessed general threats and policy approaches, and as a follow-up to this, this year Rapporteur Lord Jopling (United Kingdom) decided to focus upon the means available to detect potential CBRN threats. Despite the fact that recent events, such as the tsunami in Asia, hurricane Katrina in the US and the avian flu pandemic have focused public attention upon natural disasters and emergencies, your Rapporteur strongly believes that these events should not divert efforts away from the equally serious threat of CBRN terrorism, especially as improved CBRN detection mechanisms could enhance civil protection capabilities in general, and further protect us from natural disasters.
8. A Committee visit to the US in September 2005 provided valuable insights for this report and your Rapporteur would also like to thank the British and American delegations for their valuable input to this report.
9. After general considerations of the detection of CBRN terrorism, this report will review the technology currently available for detection of each kind of weapon, as well as the general orientation of related Research and Development.


  1. GENERAL CONSIDERATIONS ABOUT THE DETECTION OF CBRN THREATS:

10. Detection mechanisms are a fundamental aspect of any successful CBRN civil protection policy. Generally speaking, detection aims at establishing the release or presence of a CBRN agent in a given area/location. Detection is usually associated with prevention. In reality, detection mechanisms are needed at the three stages of a CBRN incident, i.e. before, during and after. Before an incident occurs, CBRN detectors allow for continuous monitoring to either prevent a CBRN incident or to allow for early warning in the event of its happening. These two options are sometimes referred to as detect‑to‑protect and detect-to-treat. During the incident, detectors are required on the spot in order to allow first responders to identify the precise nature and extent of the release and to organise the response accordingly. Lastly, once the incident has occurred, detectors are indispensable in order to confirm the results of early identification, collect evidence and confirm that the area has been decontaminated. Monitoring, warning, identifying and consequence assessment are thus all core functions of detection. In other words, detection contributes to at least four of the main objectives of civil protection, i.e. prevention, protection, response and recovery.


11. However, detection does not provide a comprehensive and perfect solution in any of these cases. Efficient civil protection requires a holistic approach, of which detection is only one component, along other policies and actions. The difficulty is that in most countries, there is no one overarching and supervising institution in charge of civil protection. The US, with their Department of Homeland Security, is in that sense rather an exception.

12. Co‑ordination and integrated efforts and policies are thus among the central challenges to effective adaptation of civil protection policies. They are also crucial in terms of detection. As mentioned above, detection is required at all different stages of an emergency. Detectors also tend to employ “dual-use technologies” that can be useful medical and industrial tools as well as in the field of homeland security. Finally, and maybe most importantly, co-ordination is needed because detection mobilises multiple other policies (intelligence, R&D, health, energy, foreign policy, etc.) and stakeholders (government departments, local administrations, first responders, academic community, industry, international organisations, etc.).


13. Therefore detection should not merely be considered a technological issue. It is also political and involves priority setting, assessment of needs, threats and capabilities and a balancing of competing objectives. It is fundamental to find a balance between both security needs and budgetary constraints, and security and the protection of human rights and individual freedom. For example freedom of trade is affected when detectors are installed at departure ports or entry ports and slow down the free flow of trade. Privacy is also reduced when technology such as video-surveillance or biometrics are used for counter-terrorism purposes.
14. A genuine detection policy would entail guidelines regarding the development, deployment, use, assessment and adaptation of detectors.
15. Regarding the development of detectors, governments need to define: 1) what detectors are needed for, i.e. the threat they should detect and their objective; i.e. should they aim to detect the threat in time to prevent an attack (detect-to-protect) or should they only allow for early warning once the threat is real (detect-to-treat); 2) who will use the detectors: civilian or military personnel; experts - lab technicians - or novice users - first responders; 3) who will develop them and with which financial resources, i.e. public programmes / public funding, public-private partnerships, civilian-military partnerships.
16. A detection policy also needs to define guidelines for the deployment of detectors. Critical infrastructure must be identified and monitored for the presence of CBRN agents (government buildings, public transportation facilities, postal sorting offices, water supplies, chemical and nuclear plants, etc.). The policy must be applied nationwide, especially in the case of environmental monitors.
17. Furthermore, a concept of use of the detectors also needs to be developed, i.e. the detectors’ properties and the ways in which generated data will be interpreted and used in decision-making. In particular, this means that a proper chain of command and control must be clearly identified to decide upon the information generated by detectors.
18. Finally, policies should be adopted to allow for the validation of detectors, the assessment of their performance and their adaptation. Validation means an official authority would ensure that privately produced detectors meet all specifications. As the Committee learned during its visit to the Port Authority of New York New Jersey (PANYNJ), such controls are fundamental, as tests conducted by the Department of Homeland Security’s Office of Systems Engineering and Development in partnership with the PANYNJ have demonstrated that only a limited fraction of the broad range of commercially available detection devices meet manufacturer’s advertised claims.
19. Adaptation of detectors is also a critical challenge. Most existing technology is flawed and no one country can claim full territorial or infrastructural coverage. The risk is that partial deployment of imperfect technology would create a false sense of security. Nevertheless, the recent and growing focus on CBRN threats has led to technological advances in all categories of detectors and new technology is constantly being developed and tested.
20. Detectors currently on the market differ according to the agent they are intended to identify. The objective of having an all-purpose detector is still a fairly unrealistic prospect. Detectors also differ in their mode of operation; the main distinctions are between standoff and point detection, and between fixed and hand-held detectors. Today’s detection devices include various combinations of these characteristics. Stand-off detectors are stationary systems or mobile units designed to monitor large areas remotely. Point detection refers to hand-held devices which can be pointed at a suspect area or be a point source for detection. Fixed detectors are installed, automatic instruments designed to be used at checkpoints or critical facilities to monitor a continuous flow of persons, vehicles, luggage, cargo, or air samples. Hand-held devices are lightweight instruments, which can be used to detect, locate and sometimes identify a CBRN agent.
21. The choice between these different types of detectors is usually dictated by considerations regarding the purpose of the detector. In other words, detectors must be adapted to their intended purpose. Fixed detectors are ideal when nodal points or critical infrastructures can be identified as they are most highly sensitive. Hand-held instruments are particularly useful in widely dispersed areas such as airports or seaports, or in targeted search situations.
22. Detectors also differ as to their key function: simple warning when the presence of an agent is detected; identification of the agent (this is a more complex function, which sometimes requires scientific reach back, for example laboratory analysis); mapping/localisation/assessment of the contamination (a capacity some hand-held detectors have). The current drive is towards the development of new, cheaper, easier-to-use, hand-held, highly sensitive detectors, combining different types of technology to both detect and identify CBRN agents, whilst routinely covering large areas.
23. However, as mentioned above, one important question is how affordable these technologies are and what budget governments can and will dedicate to the detection of CBRN terrorism. Although it is sometimes difficult to obtain precise figures, some indicators indicate current spending trends in two leading countries in this field. The United States’ effort is certainly the greatest. According to a recent New York Times article, since 9/11 the US has spent more than $4.5 billion on screening devices to monitor the nation’s ports, borders, airports, mail and search for guns, explosives, nuclear and biological weapons. The US President requested an overall budget for homeland security of $47.4 billion in fiscal year (FY) 2005. In comparison, the UK’s overall spending on counter-terrorism and resilience has increased from £950 million (US$1,6 billion) in 2001, to £1.5 billion (US$2.6 billion) in 2004 and by 2007-2008 this is expected to become £2.1 billion (US$3.6 billion). The research and development (R&D) budget is also a good spending indicator. In the US, the Department of Homeland Security’s R&D budget for anti-terror technology should amount to $1 billion in FY 2005. In the UK, the Home Office’s CBRN Science and Technology Programme is financing R&D projects to improve terrorism preparedness capabilities. It launched a bid for projects in January 2005 and will finance short-listed projects of an approximated value of £10 million (US$17 million), part of which will finance the development of new detection technology. The bidding process will be repeated every year.
24. These general considerations need to be kept in mind while presenting and assessing CBRN detection technology in use at present. Confronted with a changing threat, our societies must adapt their efforts constantly. Detection mechanisms should also be adapted. How this is done will depend upon the priorities set by each individual society and consequently upon their capabilities. The overview of CBRN detection technology provided in this report is intended to assess efforts made to date. Your Rapporteur also hopes it will foster knowledge of and promote dialogue on how, to which extent and with which limitations, detection technologies can help ensure that our societies are prepared for the worst.




  1. Download 121.71 Kb.

    Share with your friends:
1   2   3   4




The database is protected by copyright ©ininet.org 2024
send message

    Main page