[ Pobierz całość w formacie PDF ]
inspection of aircraft passengers; antiterrorism; technology; combating terrorism
Nielson, Eugene. "QuickMask: Respiratory Protective Escape Device," S.W.A.T., 16, No. 9, March 1998,
45-47, 49.
Ten percent of the first responders (135 individuals) to Aum Shinrikyo's sarin gas attack on the Tokyo
subway on March 20, 1995, were injured as a result of direct or indirect exposure to the nerve agent. Had
the sodium cyanide contained in the bomb that exploded in New York City's World Trade Center on
February 26, 1993, vaporized and not burned, the gas would have resulted in thousands of deaths. In any
chem/bio attack, the key to survival is immediate protection and rapid escape. A respiratory protective
device is necessary to protect eyes and breathing. The article provides a detailed discussion of the
Israeli-manufactured QuickMask, which is widely used by U.S. security agencies.
Keyword(s): technology; CBRNC; biological weapons of mass destruction; chemical weapons of mass
destruction; chemical terrorism; biological terrorism; biological attacks; chemical attacks;
chemical/biological attacks; biological agent detection; combating terrorism; antiterrorism
Noaker, Paula M. "Detecting Weapons of Terrorism," Laser Focus World [Optoelectronics World insert],
34, No. 11, November 1998, S17-S20.
Although the best weapons detectors at key facilities in the U.S. infrastructure remain members of the K-9
unit, their backup team increasingly includes an array of supersensitive optoelectronic detection devices.
The article specifies several counterterrorist devices that are far superior to the conventional metal
detectors currently in use. Three categories of detection devices are discussed.
Keyword(s): biological agent detection; CBRNC; chemical weapons of mass destruction; biological
terrorism; chemical terrorism; biological weapons of mass destruction; counterterrorism; chemical,
biological, nuclear agents; antiterrorism; combating terrorism; technology
Noaker, Paula M. "Optical Imaging Catches Bad Bugs," Laser Focus World [Optoelectronics World
insert], 34, No. 11, November 1998, S19.
Chemical and biological weapons detection is becoming big business. A large share of the research is
focusing on development of technologies to detect and characterize biological hazards in the field at the
point of contamination. Visual inspection of aerosol particles may serve as a first-cut screening leading to
other, even more sophisticated analytical methods. The Fourier transform is one of these methods
128
Library of Congress Federal Research Division Future Trends in Terrorism
discussed in some detail.
Keyword(s): biological agent detection; CBRNC; chemical weapons of mass destruction; biological
weapons of mass destruction; counterterrorism; biological decontamination; chemical decontamination;
combating terrorism; technology; antiterrorism
Nordwall, Bruce D. "Cyber Threats Place Infrastructure at Risk," Aviation Week and Space Technology,
146, June 30, 1997, 51.
Cyber threats are putting the U.S. infrastructure at risk. Potential sources of cyber threats include foreign
nations, disgruntled persons, organized crime, and terrorists--both domestic and international. According
to retired air force general Robert Marsh, head of the President's Commission on Critical Infrastructure
Protection, 80 percent of unauthorized intrusions up until now were by "trusted" insiders, generally as a
means to express their unhappiness. This type of person would be easy prey for a terrorist group or nation
to recruit. The president's commission, established by executive order in July 1997, aims to recommend a
strategy for protecting vital infrastructures, the incapacity or destruction of which would have a
weakening effect on the defense or economic security of America.
Keyword(s): technology; cyberterrorism; antiterrorism; combating terrorism
O'Connell, Tim. "Alleged Airport System Flaw Raises Tempers, Questions," Security, 35, No. 3, March
1998, 9-12.
A sometimes bitter fight among security designers, installers, and users broke out weeks ago when data
leaked to the news media suggested that some security systems at high security locations have a
weakness. The alleged flaw would reportedly leave the security of airports and banks exposed to
[ Pobierz całość w formacie PDF ]