Post on 25-Jun-2018
© AT‐RISK International & Muir Analytics
Biosecurity, Bioterrorism and the Modern Terrorist Mindset
Presented by:Dr. Ryan BurnetteDirector, Biosecurity & BiosafetyAT-RISK International
Presented by:Dr. Jeff Moore, PhDCEOMuir Analytics
September 13, 2016
© AT‐RISK International & Muir Analytics© AT‐RISK International & Muir Analytics
Agenda
• Sources (Muslim‐based texts, people, & organizations)
• Where ISIS, AQ, and other groups fit into, & break from, Islam
• Islamist Jihadist terrorism influencers
• Islamist war philosophers
• ISIS force structure
• ISIS: established & began running the Caliphate 2014
• ISIS end of days prophecy
• Motivation for ISIS securing & using CBRNE
© AT‐RISK International & Muir Analytics© AT‐RISK International & Muir Analytics
Sources: (Muslim-based texts, people, and organizations)Radical Ideologues:
The philosophy of Ibn Taymiyyah (widely available on the Internet)
Sayyid Qutb’s, Milestones
“The Manchester Document,” by al Qaeda
Ayman Zawahiri’s public pontifications, and an English summary of Knights Under the Prophet's Banner
Abu Bakr Naji’s, The Management of Savagery
Counter radical ideologues:
Ed Hussain’s, The Islamist: Why I Became an Islamic Fundamentalist, What I Saw Inside, and Why I Left
Tawfik Hamid’s, Inside Jihad: How Radical Islam Works, Why It Should Terrify Us, How to Defeat It
Public proclamations by Egyptian President Abdel el‐Sisi, King Abdullah II bin Al‐Hussein of Jordan, and Indonesian President Joko Widodo
Indonesia‐based Nahdlatul Ulama
Ahmadiyya Muslim Community’s “11 Points” at trueislam.com
© AT‐RISK International & Muir Analytics© AT‐RISK International & Muir Analytics
moderates conservatives Islamists jihadists*
The Ummah = global community of Muslims: Sunni, Shia, Sufi, etc.
*jihad’s general meaning = “utmost effort,” not war. Islamist jihadists have made it war, however.
tolerant, accepting orthodox Qutb, Milestones total war
Political Islam, minority, goals: caliphate, Islamist jihadist domination, total submission, overthrow
governments, no kufir or munafik, tools are takfir and takiya, total warfare is their concept, patience is virtue
Spiritual Islam, majority, goals: peace, follow national laws, American brothers, sisters, Allies, partners, soldiers, police, Vets, heroes, targeted
globally by Islamist jihadists, seen as traitors
Where ISIS, AQ, and other groups fit into, & break from, Islam
© AT‐RISK International & Muir Analytics
Where ISIS/al Qaeda (etc.) exist within the Ummah, according to Muslims
moderates
Islamist jihadist terrorism influencers** There are scores of others such as Abd al Wahhab, Abdul A’la Mawdudi, etc.
Ibn Taymiyyah, 1200s-1300s: “great grandfather of Islamist jihad,” strict sharia law must rule, Muslims must adhere or they’re not “real Muslims” (munafik, or hypocrites,) attack the unbelievers, force submission.
Sayyid Qutb, 1950s-60s, “godfather of modern Islamist jihad,” Western politics and lifestyles are “attacking Islam,” Islam “has to defend itself” via political subterfuge and violence.
Despite being rejected by the majority of Muslims, this ideology has become more widespread, and it drives international terrorism and insurgency…brief sample attacks (pre-9-11) include:
• Grand Mosque seizure, Mecca, Saudi Arabia, 1979
• Assassination of Egypt’s Anwar Sadat, 1981
• U.S. Embassy bombing, Beirut, Lebanon, 1983
• Buddhist Borobudur temple bombing, Java, Indonesia, 1985
• Tel Aviv-Jerusalem, Israel, bus 405 suicide attack (crash,) 1989
...then, in 1989, Afghanistan insurgent forces defeated the USSR...Islamist jihadists believe their philosophy caused this and thereafter exported it to the world via an Islamist jihadist global revolution...
Known as “political Islam,” rejected by spiritual Muslims
who do not believe politico-religious
philosophers can/should intercede
between man and God.
© AT‐RISK International & Muir Analytics
© AT‐RISK International & Muir Analytics
Where ISIS/al Qaeda (etc.) exist within the Ummah, according to Muslims
moderates
Islamist war philosophers
Ayman Zawahiri, 1990s-2000s, bin Laden's No. 2, now in charge of al Qaeda, wrote Knights Under the Prophet's Banner, preaches Islamist jihadist justification for war and revenge, planner, motivator.
Abu Bakr Naji (aka Muhammad Khalil al-Hakaymah) wrote “The Management of Savagery,” for al Qaeda in ‘04, adopted by ISIS as core strategic document, spread chaos by violence, disrupt world order, fill vacuum w/ISIS philosophy and leadership.
Messaging has flooded social
media/Internet with millions of postings,
tweets, etc., has recruited tens of
thousands into AQ and mostly ISIS, has added thousands to battlefields, caused
thousands of deaths.
Despite being rejected by the majority of Muslims, Islamist jihadi warfare has massively proliferated:
• More than 10,000 killed
• ISIS in more than 18 countries in Middle East, Americas, South Asia, Southeast Asia, Africa, Europe, etc.
• Co-opted over 45 insurgent/terror groups such as Boko Haram (Nigeria), Abu Sayaaf (Philippines), Anssar Bait al-Maqdis (Egypt), Jamaah Anshar Khilafah (Indonesia), Okba Ibn Nafaa Battalion (Tunisia), etc.
• Taken the war to not only Muslim countries but also the West: USA, Germany, Belgium, France, UK, Canada, Australia, Denmark, etc.
ISIS has lost ground in Iraq but expanded operations in the West plus Saudi, N Africa, S and SE Asia. ISIS is flexible and fully capable of copious distributed operations as its standing army shrinks.
© AT‐RISK International & Muir Analytics
© AT‐RISK International & Muir Analytics
War concepts/methods: from highly organized territory and war making to co-opting ongoing insurgencies, to infiltration attacks, to “leaderless revolution”
ISIS force structure(AQ has similar structure)
Standing armies in the field(like Syria, Iraq)
Coopted insurgencies(like Boko Haram)
Coopted terror groups(like Ansar Bayt al-Maqdis, Gaza
Strip)
Trained infiltration operatives(like some of the Paris attackers, Nov
‘15)
Individual self-activating agents
(erroneously called “lone wolves”)
(AQ has not had to any real
extent)
Influence operators(propagandize to shield Islamist
jihad)
(Muslim Brotherhood, various news
pundits, politicians)
(Not “lone” bc acting in
concert w/ISIS, AQ,
etc.)
© AT‐RISK International & Muir Analytics
© AT‐RISK International & Muir Analytics
Where ISIS/al Qaeda (etc.) exist within the Ummah, according to Muslims
ISIS = Established & began running the Caliphate, 29 June 2014 (origins go back many years prior)
End goal: rule all Muslims from the Caliphate
Methods:Co-opt local Muslim insurgencies around the globe
Subject all non-Muslims to Caliphate rule
Main propaganda theme = “the West is evil…ISIS is good, and righteous, and will cleanse the world for the better…”
Fight irregular wars (insurgency, terrorism) against Western and Arabic “apostate” governments to exhaust them, causing these countries collapse into chaos and “savagery”
Fill the vacuum of "savagery” with rule of ISIS, a force for good, purity, and “correct Islam”
Use horror, terror, and grotesque violence to shock and scare the enemy, infiltrate democracy and use it against the enemy, force or “sneak in” submission, bit by bit…
1
2
3
4
5
© AT‐RISK International & Muir Analytics
6
✔
© AT‐RISK International & Muir Analytics
ISIS end of days prophecy (from the Hadith)
Major battle between ISIS and its enemies in Dabiq, Syria (near Turkish border)
“Great fire” and “redness in the sky”
ISIS army nearly loses, second coming of the prophet saves the day, Islam then conquers all enemies, final global caliphate established
Doomsday prophecy includes:Atrocities to goad the West or Arabic armies into combat in Dabiq
A final battle accompanied by a massive explosive event
1
2
3
4
5© AT‐RISK International & Muir Analytics
© AT‐RISK International & Muir Analytics
Motivation for ISIS securing & using CBRNE
The West and apostate Arabic governments are evil, they must be toppled, “corrected,” “purified,” and “made holy”
Western lifestyle and governing institutions are “attacking” Islam and must be stopped – the two cannot live side by side
Revenge for “subjugating” Muslims for decades
God “orders” that the Caliphate must rule the world
The “end of days battle” and the second coming require a “great fire” and “red skies”...some kind of cataclysmic event
Ω
Ω
Ω
Ω
Ω© AT‐RISK International & Muir Analytics
© AT‐RISK International & Muir Analytics
ISIS intent provides greater biosecurity threats
© AT‐RISK International & Muir Analytics
Islamist Jihadists and sympathizers/supporters positioned to gain access to laboratories
Presents potential Insider and Outsider Threats
U.S. and international laboratories, healthcare, and industrial areas at risk
1
2
3
© AT‐RISK International & Muir Analytics
Insiders and outsiders exploit program vulnerabilities
© AT‐RISK International & Muir Analytics
1
2
3
Poor access controls
Incompetent employees
Geographic location
Unsecure data network
Poor management and training practices
4
5
© AT‐RISK International & Muir Analytics
What makes biosecurity unique from traditional security?
© AT‐RISK International & Muir Analytics
1
2
The assets themselves (e.g., pathogen, Valuable Biological Material [VBM])
• Difficult to detect• Can be amplified from small quantities
Biosecurity MUST interface with Biosafety/Science‐based risk assessment
• Countering threats means we need to understand the agent/VBM itself ‐ what is the risk?
© AT‐RISK International & Muir Analytics
Biosecurity is threat management
© AT‐RISK International & Muir Analytics
1
2
Threat management = implementation of control measures to minimize, mitigate and manage threats and hazardsBiosecurity = implementation of control measures necessary to minimize threats, and safeguard, biological agents/VBM
© AT‐RISK International & Muir Analytics
How to prepare for ISIS threats to your institutions
© AT‐RISK International & Muir Analytics
1
2
Conduct review of institutional Biosecurity/Biosafety programs
Get outside help, if necessary
Build or augment a Biosecurity Program Plan
Implement the plan, adjust as needed
3
4
© AT‐RISK International & Muir Analytics
How to implement biosecurity - 1
© AT‐RISK International & Muir Analytics
• Multidisciplinary Biosecurity Assessment Team
• Administrative, security force, IT support, technical supervisory, and senior technical personnel
• Evaluate and design threat management approach• Quantify VBM value ($) and cost of replacement ($, equipment, time, reputation) to understand ROI
• Identify human and physical resources needed to implement
• Develop and secure a budget
© AT‐RISK International & Muir Analytics
How to implement biosecurity - 2
© AT‐RISK International & Muir Analytics
• Multidisciplinary Implementation Team• Supervisory and security staff• IT supervisory and technical staff• Line worker and support personnel
• Review current system and fill critical gaps: lock down current system
• Develop a “to‐be” process map• How will information flow (IT or manual)? • Chain of custody (who? what? when? why? how?)• Accountability and audit• Response to deviations (missing or extra material, incidents)• Quality assessment and improvement
© AT‐RISK International & Muir Analytics
How to implement biosecurity - 3
© AT‐RISK International & Muir Analytics
• Review existing documents and systems (e.g., IT solutions)
• Identify gaps• Revise or create/write new ones• Include reporting forms
• Develop training materials• Policies, procedures, drills• Develop trainers• Roll out training
© AT‐RISK International & Muir Analytics
Biosecurity implementation - “The Bottom Line”
© AT‐RISK International & Muir Analytics
• What You Need to Succeed:• The right, willing people• Thorough knowledge of your assets• Detailed awareness and appreciation of your institution’s gaps, vulnerabilities, threats
• How to prioritize assets and gaps• Strategic plan to work collaboratively to address• Knowing when to get outside help• Open, honest communication. Call it like it is.