Implications of Potential Chinese Strategic Missile Defense

Report 3 Downloads 42 Views
Anatomizing the Behavior of Chemical and Biological Non-State Adversaries Gary Ackerman Director, Unconventional Weapons Technology Division, START

Markus Binder Project Manager, START PASCC Semi-Annual Workshop on Strategic Stability and WMD December 5, 2014

Any opinions, findings, conclusions or recommendations presented here are solely those of the authors and are not representative of START, DHS or the United States government.

National Consortium for the Study of Terrorism and Responses to Terrorism

Anatomizing the Behavior of Chemical and Biological Non-State Adversaries • Project objective was to better characterize CB perpetrators and potential perpetrators: 1. To determine the most likely future CB perpetrators and develop means of proactively identifying them; 2. To develop a deeper understanding of CB adversary behavior and decision making

National Consortium for the Study of Terrorism and Responses to Terrorism

Project Parameters • Time Period: Present to 2022. • Nature of Adversaries: Non-state CB end-users (i.e. actual • • •



perpetrators) Specification of Adversaries: Where possible, explicitly identify (e.g. Hizballah). Otherwise, generic adversaries permitted Scope of Attack: CB event that causes >50 non-psychogenic injuries or widespread (at least regional) and sustained social disruption. Geographical Scope: Threats to the U.S. homeland and U.S. overseas territories (e.g. Puerto Rico; Guam); ALSO threats to U.S. facilities abroad Type of Materials: The use of ANY harmful chemical or biological materials, as well as attacks on facilities that involve the immediate release of CB materials.

National Consortium for the Study of Terrorism and Responses to Terrorism

Why? • Significant attention devoted to violent non-state actors (VNSAs) employing CB agents as mass-casualty or mass-disruption weapons. • Valuable research into several aspects: proliferation of materials; vulnerabilities of facilities; technical capabilities required to construct CB weapons; prophylaxis, detection and consequence management • Less attention has been paid to the adversaries themselves: Who are they? What attracts them to CB? Do they display common salient characteristics that can serve as early-warning indicators? How do they make tactical and strategic CB weapons acquisition and deployment decisions? • More detailed specification of the threat component will enable defense practitioners to prioritize risk mitigation investments and increase the capability to interdict CB attacks further ‘left of boom’ (or ‘left of pfffftt’).

National Consortium for the Study of Terrorism and Responses to Terrorism

Methodology • The research team adopted a multi-disciplinary analytical approach featuring a combination of qualitative and quantitative approaches: – A qualitative analysis based on a combination of: the application of a series of literatureand theory-derived indicators to a set of extant VNSAs and examining past CB perpetrators, using data from the Chemical and Biological Non-State Adversaries Database (CABNSAD). – A quantitative analysis employing a set of statistical models to identify salient characteristics of past CB adversaries particularly with regard to the organizational determinants of their pursuit and effective use of CB weapons. – An analysis using the results of a semi-structured and probabilistic elicitation of leading outside subject matter experts in the CB terrorism and related domains.

• Applying three methodologies more or less independently to the same problem space increased confidence in the results. This derives from the position that, especially with respect to prospective analyses with high levels of uncertainty, each methodological approach carries both strengths and weaknesses, the effect of which can be balanced.

National Consortium for the Study of Terrorism and Responses to Terrorism

LITERATURE REVIEW

DATA SOURCES

BIG ALLIED AND DANGEROUS

CABNSAD

SMES

STATISTICAL MODELING MOTIVATON

CAPABILITY SEMI-STRUCTURED ELICITATION

ANALYSIS

SYNTHESIS OF QUALITATIVE DATA

CB ADVERSARY THREAT RANKINGS

INITIAL OUTPUTS

PROBABILISTIC ELICITATION

INDICATORS OF CB THREATS

VISUAL GRAPHICAL DATA OVERVIEW

PHASE 1 OUTPUTS

KEY ASSUMPTIONS CHECK

QUALITY CONTROL

DEVIL’S ADVOCACY

EXTERNAL REVIEW

CASE SELECTION DATA COLLECTION

CONCEPTS OF ADVERSARY BEHAVIOR

ANALYSIS VNSA PROFILE ATTACK SCENARIOS

PHASE 2 OUTPUTS

FUNCTIONAL SUBSET OF CONCEPTS

PROTOTYPE BAYES NET

PHASE 3: COMPUTATIONAL THREAT MODEL

National Consortium for the Study of Terrorism and Responses to Terrorism

Multi-method Analysis

National Consortium for the Study of Terrorism and Responses to Terrorism

CHARACTERISTICS OF ANALYSIS Qualitative Analysis Based on review of literature, adversary profiles and analyst expertise.

Strengths •Incorporates past, extant and future threats. •All non-state actors. •Combination of analysis by project researchers.

Limitations •Not rigorously systematic. •Potential for analyst bias.

Quantitative Modeling Based on historical data (BAAD2; POICN, etc.).

Strengths •Allows for exploring variation in dependent variable. •Takes into account every actor in dataset (including null cases). •Statistical tests of significance and sensitivity possible. •Results / models are reproducible.

Limitations •Limited time-scale of data (1998-2007). •Only includes terrorist/insurgent organizations (no criminal groups; lone actors, etc.). •Cannot make out-of-sample forecasts (i.e., limited to groups in dataset).

Elicitation Combines the judgment of multiple domain experts.

Strengths •Specifically oriented towards future threats. •Heterogeneous expertise (operational; technical; policy; futurist). •All non-state actors.

Limitations •Potential for expert bias. •Relatively non-reproducible. •Lack of specific knowledge of potential listed non-state adversaries.

National Consortium for the Study of Terrorism and Responses to Terrorism

Key Findings • Threat of non-state chemical or biological weapons pursuit and use continues to lie heavily with jihadists. • Additional significant threat sources – Lone actors (esp. insiders – technical personnel) – Apocalyptic Millenarian Groups – Domestic Right-Wing Extremists – Criminals

National Consortium for the Study of Terrorism and Responses to Terrorism

Non-State Adversary Threat Rankings Chemical Non-State Adversary Threat Rankings Qualitative Analysis

Quantitative Modeling

Elicitation

1

Disgruntled Scientist(s) / Technician(s)

1

Al-Qa’ida Central

1

Al-Qa’ida Central

2

Al-Nusrah Front

2

Taliban

2

Hizballah

3

Al-Qa’ida Central

3

Islamic State of Iraq and the Levant (ISIS)

3

Al-Qa'ida in the Arabian Peninsula (AQAP)

4

Hizballah

4

Revolutionary Armed Forces of Colombia (Las FARC)

4

Apocalyptic Millenarian Cult (Domestic)

5

Islamic State of Iraq and the Levant (ISIS)

5

Al-Qa`ida in the Islamic Maghreb (AQIM)

5

Right-wing Extremist Group (Domestic)

6

Apocalyptic Millenarian Cult

6

Al-Qa`ida in the Arabian Peninsula (AQAP)

6

Criminal Organization (Domestic)

7

AQAP

7

HAMAS (Islamic Resistance Movement) 7

Lone Actor with a Personal Grudge or Idiosyncratic Motive (Domestic)

8

Al-Qa'ida in the Islamic Maghreb (AQIM)

8

Palestinian Islamic Jihad (PIJ)

8

Unaffiliated cell of Sunni Jihadists (Domestic)

9

Revolutionary Armed Forces of 9 Colombia (Las FARC)

Caucasus Emirate

9

Unspecified Sunni Jihadist Group (Foreign)

10

Lashkar-e-Janghvi (LeJ)

Lashkar-e-Janghvi (LeJ)

10

Left-Wing Group (Domestic)

10

National Consortium for the Study of Terrorism and Responses to Terrorism

Non-State Adversary Threat Rankings Biological Non-State Adversary Threat Rankings Qualitative Analysis

Quantitative Modeling

Elicitation

1

Disgruntled Scientist(s) / Technician(s)

1

Islamic State of Iraq and the Levant (ISIS)

1

Disgruntled Scientist(s) / Technician(s) (Foreign)

2

Hizballah

2

Al-Qa’ida Central

2

Disgruntled Scientist(s) / Technician(s) (Domestic)

3

Al-Qa’ida in the Arabian Peninsula (AQAP)

3

Taliban

3

Al-Qa'ida Central

4

Apocalyptic Millenarian Cult

4

Caucasus Emirate

4

Al-Qa’ida in the Arabian Peninsula (AQAP)

5

Al-Nusrah Front

5

Al-Qa`ida in the Islamic Maghreb (AQIM)

5

Al-Qa`ida in the Islamic Maghreb (AQIM)

6

Lashkar-e-Taiba (LeT)

6

Jemaah Islamiyah (JI)

6

Unaffiliated Cell of Sunni Jihadists (Domestic)

7

Environmental Liberation Front 7 (ELF)/Animal Liberation Front (ALF)

Al-Qa’ida in the Arabian Peninsula (AQAP)

7

Apocalyptic Millenarian Cult (Domestic)

8

Al-Qa'ida in the Islamic Maghreb (AQIM)

Revolutionary Armed Forces of Colombia (Las FARC)

8

Unspecified Environmentalist/Animal Rights Group (Domestic)

9

Islamic State of Iraq and the Levant 9 (ISIS)

Lashkar-e-Taiba (LeT)

9

Unaffiliated cell of Sunni Jihadists (Foreign)

10

Al-Qa’ida Central

HAMAS (Islamic Resistance Movement)

10

Unaffiliated Cell of UFO and Related Activists (Domestic)

8

10

National Consortium for the Study of Terrorism and Responses to Terrorism

Additional Outputs • A concise yet relatively comprehensive review of the literature related to non-state CB perpetrators that can be utilized as an introduction for training purposes • The most comprehensive open-source database of CB perpetrators ever compiled (CABNSAD), which can continue to be mined for insights by researchers and analysts in a variety of applications, from social network analysis to machine learning. – Includes perpetrators with criminal motivations.

• A Bayesian Tool that can provide updated risk assessments • Operational products that can be used by intelligence and law enforcement agencies to proactively interdict the threat by – A set of indicators that can be applied to emerging actors to detect shifts in CB threat potential and to assist in the establishment of investigative priorities. – In-depth behavioral profiles of high-priority intelligence targets, including likely TTPs.

National Consortium for the Study of Terrorism and Responses to Terrorism

Chemical and Biological Non-State Adversary Database (CABNSAD) • Open-source, perpetrator-level dataset (rather than event-level). • Ideologically and criminally motivated perpetrators. – Generally excludes cases of simple spousal violence

• Includes organizations, unaffiliated cells and lone actors • Quantitative and qualitative variables – 43 perpetrator level variables, includes organizational characteristics, pursuit/use logistics and results – 23 individual level variables, includes education, vocation and explosives knowledge – Additional variables to assess uncertainties of CB pursuit/use based on open sources

National Consortium for the Study of Terrorism and Responses to Terrorism

CABNSAD Data Ideologies and Motives of Perpetrators for Employing Chemical/Biological Material

National Consortium for the Study of Terrorism and Responses to Terrorism

CABNSAD Data Methods of Acquisition Employed or Intended by Chemical/Biological Perpetrators Intended Acquisition Method

Chemical/Biological All HighPerpetrators Certainty (N=228) Perpetrators (N=172)

Chemical Biological All HighAll HighPerpetrators Certainty Perpetrators Certainty (N=187) Perpetrators (N=68) Perpetrators (N=134) (N=47)

Gift from State Terrorist Group Criminal Organization Other Purchase from State Terrorist Group Criminal Organization Other Theft from State Terrorist Group Criminal Organization Other Miscellaneous Production Serendipity Barter Bribery/Coercion Unknown

2% 2% 0% 1%

1% 2% 1% 1%

2% 2% 1% 1%

1% 2% 1% 1%

3% 1% 0% 0%

0% 2% 0% 0%

0% 1% 0% 14%

0% 0% 0% 16%

1% 1% 0% 15%

0% 0% 0% 18%

1% 1% 0% 9%

0% 0% 0% 13%

1% 0% 0% 7%

1% 0% 0% 9%

1% 0% 0% 7%

1% 0% 0% 10%

1% 0% 0% 6%

2% 0% 0% 9%

16% 1% 0% 0% 54%

17% 2% 0% 0% 50%

11% 1% 0% 0% 59%

10% 1% 0% 0% 54%

40% 3% 0% 0% 34%

45% 4% 0% 0% 26%

National Consortium for the Study of Terrorism and Responses to Terrorism

CABNSAD Data Education Level of Chemical/Biological Perpetrators, All Perpetrators

National Consortium for the Study of Terrorism and Responses to Terrorism

Sample Indicators 1

National Consortium for the Study of Terrorism and Responses to Terrorism

Sample Indicators 2

National Consortium for the Study of Terrorism and Responses to Terrorism

Bayesian Tool

National Consortium for the Study of Terrorism and Responses to Terrorism

Adversary Behavioral Profiles • Conducted on: – – – – – –

Al Qa’ida Hizb’allah Tehrik‐e Taliban Pakistan Generic Disgruntled Scientist Generic Apocalyptic Millenarian Group Generic Right-wing Organization

• Profiles include: historical overview; specific indicators; general behavioral influences; preferred operational methods • Key outputs: likely CB acquisition, transport, C2I and attack modes

National Consortium for the Study of Terrorism and Responses to Terrorism

Ongoing Activities • POICN (Profiles of Incidents of CBRN-Use by Non-state actors) – A relational, open-source database including information on terrorist plots, acquisitions, and attacks relating to chemical, biological, radiological, and nuclear (CBRN) agents.

• Countering the radicalization of bio-scientists – Reviewing existing government counter-radicalization programs in light of the latest field-specific research to ascertain factors unique to the bio-scientist community and re-tailor programs appropriately.

• Consensus Framework for Informing Decision-Making in the Biological Threat Characterization Program – Identifying a particular pathogen as a potential threat agent and devoting resources towards studying it can have counter-productive effects by drawing attention to that agent’s potential as a weapon. – Developing a framework intended to inform the decisions about funding experimental work to characterize biological threats.

National Consortium for the Study of Terrorism and Responses to Terrorism

Contact Gary Ackerman [email protected] (301) 405-6656

Markus Binder [email protected] (301) 405-9870

www.start.umd.edu