Skip to main content

2022 | OriginalPaper | Buchkapitel

CBRN Terrorism

verfasst von : M. A. Wilson

Erschienen in: CBRNE: Challenges in the 21st Century

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many papers on CBRN terrorism begin the same way. First, they quote leading politicians or security figures saying how likely it is that there will be a CBRN terrorist attack in the near future and highlighting the potentially devastating consequences. This is then contrasted with the very low numbers of terrorist attacks that have employed CBRN weapons in the past. This disparity between the fear of CBRN attacks and the infrequency of their occurrence has been central to many of the papers published in this area. The primary concern of this review is therefore to explore the variation in expert threat assessment and consider the factors that can be used to gauge the likelihood of terrorist actors turning to CBRN weapons.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jackson BA, Frelinger DR (2008) Rifling through the terrorists’ arsenal: exploring groups’ weapon choices and technology strategies. Studies Conflict Terrorism 31(7):583–604CrossRef Jackson BA, Frelinger DR (2008) Rifling through the terrorists’ arsenal: exploring groups’ weapon choices and technology strategies. Studies Conflict Terrorism 31(7):583–604CrossRef
2.
Zurück zum Zitat Ivanova K, Sandler T (2007) CBRN attack perpetrators: an empirical study. Foreign Policy Anal 3:273–294CrossRef Ivanova K, Sandler T (2007) CBRN attack perpetrators: an empirical study. Foreign Policy Anal 3:273–294CrossRef
3.
Zurück zum Zitat Ackerman GA (2018) Chemical, biological, radiological and nuclear (CBRN) Terrorism. Routledge handbook of terrorism and counterterrorism. Routledge, pp 240–252 Ackerman GA (2018) Chemical, biological, radiological and nuclear (CBRN) Terrorism. Routledge handbook of terrorism and counterterrorism. Routledge, pp 240–252
4.
Zurück zum Zitat Schmid A, Jongman A (1988) Political terrorism: a new guide to actors, authors, concepts, data bases, theories and literature. Transaction Books, New Brunswick, NJ Schmid A, Jongman A (1988) Political terrorism: a new guide to actors, authors, concepts, data bases, theories and literature. Transaction Books, New Brunswick, NJ
5.
Zurück zum Zitat Schmid AP (1993) Defining terrorism: the response problem as a definition problem. In: Schmid AP, Crelinsten RD (Eds) Western responses to Terrorism. Frank Cass, London Schmid AP (1993) Defining terrorism: the response problem as a definition problem. In: Schmid AP, Crelinsten RD (Eds) Western responses to Terrorism. Frank Cass, London
6.
Zurück zum Zitat Beck CJ, Miner E (2013) Who gets designated a terrorist and why? Soc Forces 9(13):837–872CrossRef Beck CJ, Miner E (2013) Who gets designated a terrorist and why? Soc Forces 9(13):837–872CrossRef
7.
Zurück zum Zitat Logan B (1993) Product tampering crime: a review. J Forensic Sci 38(4):918–927CrossRef Logan B (1993) Product tampering crime: a review. J Forensic Sci 38(4):918–927CrossRef
8.
Zurück zum Zitat Schmid AP (2000) Terrorism and the use of weapons of mass destruction: from where the risk? In: Taylor M, Horgan J (Eds) The future of terrorism. Frank Cass, London Schmid AP (2000) Terrorism and the use of weapons of mass destruction: from where the risk? In: Taylor M, Horgan J (Eds) The future of terrorism. Frank Cass, London
9.
Zurück zum Zitat Wilson MA, Lemanski L (2010) The forensic psychology of terrorism. In: Adler J, Gray J (eds) Forensic psychology; concepts, debates and practice. Willan Publishing, Second Edition, pp 245–263 Wilson MA, Lemanski L (2010) The forensic psychology of terrorism. In: Adler J, Gray J (eds) Forensic psychology; concepts, debates and practice. Willan Publishing, Second Edition, pp 245–263
10.
Zurück zum Zitat Enders W, Sandler T, Parise GF (1992) An econometric analysis of the impact of terrorism on tourism. Kyklos 45(4):531–554CrossRef Enders W, Sandler T, Parise GF (1992) An econometric analysis of the impact of terrorism on tourism. Kyklos 45(4):531–554CrossRef
11.
Zurück zum Zitat Yuchtman-Yaar E, Hermann T (1998) The latitude of acceptance: Israeli attitudes toward political protest before and after the assassination of Yitzhak Rabin. J Conflict Resolut 42:721–743CrossRef Yuchtman-Yaar E, Hermann T (1998) The latitude of acceptance: Israeli attitudes toward political protest before and after the assassination of Yitzhak Rabin. J Conflict Resolut 42:721–743CrossRef
12.
Zurück zum Zitat Iqbal Z, Zorn C (2008) The political consequences of assassination. J Conflict Resolut 52(3):385–400CrossRef Iqbal Z, Zorn C (2008) The political consequences of assassination. J Conflict Resolut 52(3):385–400CrossRef
13.
Zurück zum Zitat Bruck T, Wickstrom B (2004) The economic consequences of terror: guest editors’ introduction. Eur J Polit Econ 20:293–300CrossRef Bruck T, Wickstrom B (2004) The economic consequences of terror: guest editors’ introduction. Eur J Polit Econ 20:293–300CrossRef
14.
Zurück zum Zitat Jones BF, Olken BA (2009) Hit or miss? The effect of assassinations on institutions and war. Am Econ J Macroecon 1(2):55–87CrossRef Jones BF, Olken BA (2009) Hit or miss? The effect of assassinations on institutions and war. Am Econ J Macroecon 1(2):55–87CrossRef
15.
Zurück zum Zitat Borum R (2004) Psychology of terrorism. University of South Florida, Tampa FL Borum R (2004) Psychology of terrorism. University of South Florida, Tampa FL
16.
Zurück zum Zitat Kearns E, Conlon B, Young J (2014) Lying about terrorism. Studies Conflict Terrorism 37(5):422–439CrossRef Kearns E, Conlon B, Young J (2014) Lying about terrorism. Studies Conflict Terrorism 37(5):422–439CrossRef
17.
Zurück zum Zitat Bradford E, Wilson MA (2013) When terrorists target schools: an exploratory analysis of attacks on educational institutions. J Police Criminal Psychol (Special Issue) Terrorism Psychol Theory Appl 28:127–138 Bradford E, Wilson MA (2013) When terrorists target schools: an exploratory analysis of attacks on educational institutions. J Police Criminal Psychol (Special Issue) Terrorism Psychol Theory Appl 28:127–138
18.
Zurück zum Zitat Bradford EJ, Wilson MA (2015) Tactical targeting: a theoretical perspective of terrorist attacks on schools. In: Stedmon A, Lawson G (Eds) Hostile intent and counterterrorism: human factors theory and application, pp 233–244 Bradford EJ, Wilson MA (2015) Tactical targeting: a theoretical perspective of terrorist attacks on schools. In: Stedmon A, Lawson G (Eds) Hostile intent and counterterrorism: human factors theory and application, pp 233–244
19.
Zurück zum Zitat Rapoport D (1997) To claim or not to claim; that is the question—always! Terrorism Political Violence 9(1):11–17CrossRef Rapoport D (1997) To claim or not to claim; that is the question—always! Terrorism Political Violence 9(1):11–17CrossRef
20.
Zurück zum Zitat Hoffman B (1997) Why terrorists don’t claim credit. Terrorism Political Violence 9(1):1–6CrossRef Hoffman B (1997) Why terrorists don’t claim credit. Terrorism Political Violence 9(1):1–6CrossRef
21.
Zurück zum Zitat Hoffman A (2010) Voice and silence: why groups take credit for acts of terror. J Peace Res 47(5):615–626CrossRef Hoffman A (2010) Voice and silence: why groups take credit for acts of terror. J Peace Res 47(5):615–626CrossRef
23.
Zurück zum Zitat Wilson MA, Kilbane S (2016) Criminal poisoning and product tampering: toward an operational definition of malicious contamination. Deviant Behav 38(10):1141–1159CrossRef Wilson MA, Kilbane S (2016) Criminal poisoning and product tampering: toward an operational definition of malicious contamination. Deviant Behav 38(10):1141–1159CrossRef
24.
Zurück zum Zitat Ackerman G, Snyder L (2002) Would they if they could? Bull Atomic Scientists Ackerman G, Snyder L (2002) Would they if they could? Bull Atomic Scientists
25.
Zurück zum Zitat Danzig R, Sageman M, Leighton, T et al (2012) Aum Shinrikyo: insights into how terrorists develop biological and chemical weapons. Center for a New American Security Danzig R, Sageman M, Leighton, T et al (2012) Aum Shinrikyo: insights into how terrorists develop biological and chemical weapons. Center for a New American Security
26.
Zurück zum Zitat Boddie C, Watson M, Ackerman G, Gronvall GK (2015) Assessing the bioweapons threat. ScienceCrossRef Boddie C, Watson M, Ackerman G, Gronvall GK (2015) Assessing the bioweapons threat. ScienceCrossRef
27.
Zurück zum Zitat Koblentz GD (2011) Predicting peril or the peril of prediction? Assessing the risk of CBRN terrorism. Terrorism Political Violence 23(4):501–520CrossRef Koblentz GD (2011) Predicting peril or the peril of prediction? Assessing the risk of CBRN terrorism. Terrorism Political Violence 23(4):501–520CrossRef
28.
Zurück zum Zitat Tversky A, Kahneman D (1974) Judgement under uncertainty: heuristics and biases. Science 125:1124–1131CrossRef Tversky A, Kahneman D (1974) Judgement under uncertainty: heuristics and biases. Science 125:1124–1131CrossRef
29.
Zurück zum Zitat Martin P (2019) The rules of security: staying safe in a risky world. Oxford University Press, Oxford Martin P (2019) The rules of security: staying safe in a risky world. Oxford University Press, Oxford
30.
Zurück zum Zitat Koehler D, Popella P (2020) Mapping Far-right chemical, biological, radiological, and nuclear (CBRN) terrorism efforts in the west: characteristics of plots and perpetrators for future threat assessment. Terrorism Political Violence 32(8):1666–1690CrossRef Koehler D, Popella P (2020) Mapping Far-right chemical, biological, radiological, and nuclear (CBRN) terrorism efforts in the west: characteristics of plots and perpetrators for future threat assessment. Terrorism Political Violence 32(8):1666–1690CrossRef
31.
Zurück zum Zitat Stenersen A (2009) Al-Qaida’s quest for weapons of mass destruction: the history behind the hype. VDM Verlag, Saarbrücken Stenersen A (2009) Al-Qaida’s quest for weapons of mass destruction: the history behind the hype. VDM Verlag, Saarbrücken
32.
Zurück zum Zitat Asal VH, Ackerman GA, Rethemeyer RK (2012) Connections can be toxic: terrorist organizational factors and the pursuit of CBRN weapons. Studies Conflict Terrorism 35(3):229–254CrossRef Asal VH, Ackerman GA, Rethemeyer RK (2012) Connections can be toxic: terrorist organizational factors and the pursuit of CBRN weapons. Studies Conflict Terrorism 35(3):229–254CrossRef
34.
Zurück zum Zitat Wilson MA, Lemanski L (2010) Key dimensions in understanding terrorist bomb attacks. Final report to DHS. START Wilson MA, Lemanski L (2010) Key dimensions in understanding terrorist bomb attacks. Final report to DHS. START
35.
Zurück zum Zitat Crenshaw M, Dahl E, Wilson M (2017) Comparing failed, foiled, completed and successful terrorist attacks: final report year 5. Report to the office of university programs, science and technology directorate, U.S. Department of Homeland Security. College Park, MD: START Crenshaw M, Dahl E, Wilson M (2017) Comparing failed, foiled, completed and successful terrorist attacks: final report year 5. Report to the office of university programs, science and technology directorate, U.S. Department of Homeland Security. College Park, MD: START
36.
Zurück zum Zitat Wilson MA, Scholes A (in review) The role of organization in political assassinations Wilson MA, Scholes A (in review) The role of organization in political assassinations
37.
Zurück zum Zitat Kilbane S, Wilson MA (2021) A definitional framework of poisoning crimes. In: Conyers A, Calhoun TC (Eds) Deviance today, 2nd edn, Abingdon: Routledge Kilbane S, Wilson MA (2021) A definitional framework of poisoning crimes. In: Conyers A, Calhoun TC (Eds) Deviance today, 2nd edn, Abingdon: Routledge
38.
Zurück zum Zitat Kilbane SC (2018) Agent Selection and threat actualization in contamination cases: predicting action from perpetrator behaviour. J Threat Assess Manag 5(3):173–187CrossRef Kilbane SC (2018) Agent Selection and threat actualization in contamination cases: predicting action from perpetrator behaviour. J Threat Assess Manag 5(3):173–187CrossRef
39.
Zurück zum Zitat Bunn M, Roth N, Tobey WH (2019) Combating complacency about nuclear terrorism. Policy briefing: harvard Kennedy school, Belfer Center for Science and International Affairs Bunn M, Roth N, Tobey WH (2019) Combating complacency about nuclear terrorism. Policy briefing: harvard Kennedy school, Belfer Center for Science and International Affairs
40.
Zurück zum Zitat Chen S, Demachi K (2019) Proposal of an insider sabotage detection method for nuclear security using deep learning. J Nucl Sci Technol 56(7):599–607CrossRef Chen S, Demachi K (2019) Proposal of an insider sabotage detection method for nuclear security using deep learning. J Nucl Sci Technol 56(7):599–607CrossRef
41.
Zurück zum Zitat Bunn M, Bunn N (2001) Nuclear theft & sabotage priorities for reducing new threats reducing the threat of nuclear theft & sabotage. Paper presented at the IAEA international symposium on safeguards Bunn M, Bunn N (2001) Nuclear theft & sabotage priorities for reducing new threats reducing the threat of nuclear theft & sabotage. Paper presented at the IAEA international symposium on safeguards
42.
Zurück zum Zitat Greenberg MD, Chalk P, Willis HH (2006) Maritime terrorism: risk & liability. RAND: Santa Monica, Arlington, Pittsburgh Greenberg MD, Chalk P, Willis HH (2006) Maritime terrorism: risk & liability. RAND: Santa Monica, Arlington, Pittsburgh
44.
Zurück zum Zitat McCauley C, Moskalenko S (2008) Mechanisms of political radicalization: pathways toward terrorism. Terrorism Political Violence 20:405–433CrossRef McCauley C, Moskalenko S (2008) Mechanisms of political radicalization: pathways toward terrorism. Terrorism Political Violence 20:405–433CrossRef
45.
Zurück zum Zitat McCauley C, Moskalenko S (2017) Understanding political radicalization: the two-pyramids model. Am Psychol 72(3):205–216CrossRef McCauley C, Moskalenko S (2017) Understanding political radicalization: the two-pyramids model. Am Psychol 72(3):205–216CrossRef
46.
Zurück zum Zitat Early B, Furhmann M, Li Q (2013) Atoms for terror? nuclear programs and non-catastrophic nuclear and radiological terrorism. British J Political Sci 43(4):915–936CrossRef Early B, Furhmann M, Li Q (2013) Atoms for terror? nuclear programs and non-catastrophic nuclear and radiological terrorism. British J Political Sci 43(4):915–936CrossRef
47.
Zurück zum Zitat Rogers MB, Amlôt R, Rubin GJ et al (2007) Mediating the social and psychological impacts of terrorist attacks: the role of risk perception and risk communication. Int Rev Psychiatry 19(3):279–288CrossRef Rogers MB, Amlôt R, Rubin GJ et al (2007) Mediating the social and psychological impacts of terrorist attacks: the role of risk perception and risk communication. Int Rev Psychiatry 19(3):279–288CrossRef
48.
Zurück zum Zitat Rubin GJ, Chowdhury AK, Amlôt R (2012) How to communicate with the public about chemical. Biological, radiological or nuclear terrorism: a systematic review of the literature, biosecurity and bioterrorism: biodefense strategy. Practice Sci 10(4):383–395 Rubin GJ, Chowdhury AK, Amlôt R (2012) How to communicate with the public about chemical. Biological, radiological or nuclear terrorism: a systematic review of the literature, biosecurity and bioterrorism: biodefense strategy. Practice Sci 10(4):383–395
49.
Zurück zum Zitat Jenkins BM (1987) The future course of international terrorism. In: Wilkinson P, Stewart AM (Eds) Contemporary research on terrorism. Aberdeen University Press, Aberdeen Jenkins BM (1987) The future course of international terrorism. In: Wilkinson P, Stewart AM (Eds) Contemporary research on terrorism. Aberdeen University Press, Aberdeen
50.
Zurück zum Zitat Asal V, Blum A (2005) Holy terror and mass killings? Reexamining the motivations and methods of mass casualty terrorists. Int Studies Rev 7(1):153–155 Asal V, Blum A (2005) Holy terror and mass killings? Reexamining the motivations and methods of mass casualty terrorists. Int Studies Rev 7(1):153–155
51.
Zurück zum Zitat Crenshaw M (2006) Have motivations for terrorism changed? In Victoroff J (Ed) Tangled roots: social and psychological factors in the genesis of terrorism. IOS Press, Oxford Crenshaw M (2006) Have motivations for terrorism changed? In Victoroff J (Ed) Tangled roots: social and psychological factors in the genesis of terrorism. IOS Press, Oxford
52.
Zurück zum Zitat Wilson MA (in press) Terrorism research: current issues and debates. In: Brown J, Horvath M (Eds) The cambridge handbook of forensic psychology. 2nd Edn. Cambridge University Press Wilson MA (in press) Terrorism research: current issues and debates. In: Brown J, Horvath M (Eds) The cambridge handbook of forensic psychology. 2nd Edn. Cambridge University Press
53.
Zurück zum Zitat Ackerman G, Asal V (2011) Understanding and combating mass casualty terrorism. University of Maryland, USA, National Consortium for the Study of Terrorism and Responses to Terrorism Ackerman G, Asal V (2011) Understanding and combating mass casualty terrorism. University of Maryland, USA, National Consortium for the Study of Terrorism and Responses to Terrorism
54.
Zurück zum Zitat Cronin AK (2007) Chapter one: the strategies of terrorism. Adelphi Papers 47(394):11–22CrossRef Cronin AK (2007) Chapter one: the strategies of terrorism. Adelphi Papers 47(394):11–22CrossRef
55.
Zurück zum Zitat Kydd AH, Walter BF (2006) The strategies of terrorism. Int Secur 31(1):49–79CrossRef Kydd AH, Walter BF (2006) The strategies of terrorism. Int Secur 31(1):49–79CrossRef
56.
Zurück zum Zitat McCauley C (2006) Jujitsu politics: terrorism and response to terrorism. In: Kimmel PR, Stout CE (eds) Collateral damage: the psychological consequences of America’s war on terrorism. Praeger, Westport, CT, pp 45–65 McCauley C (2006) Jujitsu politics: terrorism and response to terrorism. In: Kimmel PR, Stout CE (eds) Collateral damage: the psychological consequences of America’s war on terrorism. Praeger, Westport, CT, pp 45–65
Metadaten
Titel
CBRN Terrorism
verfasst von
M. A. Wilson
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-031-17374-5_7