Biosecurity Bioterrorism and the Modern Terrorist … · Biosecurity, Bioterrorism and the Modern...

21
© AT‐RISK International & Muir Analytics Biosecurity, Bioterrorism and the Modern Terrorist Mindset Presented by: Dr. Ryan Burnette Director, Biosecurity & Biosafety AT-RISK International Presented by: Dr. Jeff Moore, PhD CEO Muir Analytics September 13, 2016

Transcript of Biosecurity Bioterrorism and the Modern Terrorist … · Biosecurity, Bioterrorism and the Modern...

© AT‐RISK International & Muir Analytics

Biosecurity, Bioterrorism and the Modern Terrorist Mindset

Presented by:Dr. Ryan BurnetteDirector, Biosecurity & BiosafetyAT-RISK International

Presented by:Dr. Jeff Moore, PhDCEOMuir Analytics

September 13, 2016

© AT‐RISK International & Muir Analytics© AT‐RISK International & Muir Analytics

Agenda

• Sources (Muslim‐based texts, people, & organizations)

• Where ISIS, AQ, and other groups fit into, & break from, Islam

• Islamist Jihadist terrorism influencers

• Islamist war philosophers

• ISIS force structure

• ISIS: established & began running the Caliphate 2014

• ISIS end of days prophecy

• Motivation for ISIS securing & using CBRNE

© AT‐RISK International & Muir Analytics© AT‐RISK International & Muir Analytics

Sources: (Muslim-based texts, people, and organizations)Radical Ideologues:

The philosophy of Ibn Taymiyyah (widely available on the Internet)

Sayyid Qutb’s, Milestones

“The Manchester Document,” by al Qaeda

Ayman Zawahiri’s public pontifications, and an English summary of Knights Under the Prophet's Banner

Abu Bakr Naji’s, The Management of Savagery

Counter radical ideologues:

Ed Hussain’s, The Islamist: Why I Became an Islamic Fundamentalist, What I Saw Inside, and Why I Left

Tawfik Hamid’s, Inside Jihad: How Radical Islam Works, Why It Should Terrify Us, How to Defeat It

Public proclamations by Egyptian President Abdel el‐Sisi, King Abdullah II bin Al‐Hussein of Jordan, and Indonesian President Joko Widodo

Indonesia‐based Nahdlatul Ulama

Ahmadiyya Muslim Community’s “11 Points” at trueislam.com

© AT‐RISK International & Muir Analytics© AT‐RISK International & Muir Analytics

moderates conservatives Islamists jihadists*

The Ummah = global community of Muslims: Sunni, Shia, Sufi, etc.

*jihad’s general meaning = “utmost effort,” not war. Islamist jihadists have made it war, however.

tolerant, accepting orthodox Qutb, Milestones total war

Political Islam, minority, goals: caliphate, Islamist jihadist domination, total submission, overthrow

governments, no kufir or munafik, tools are takfir and takiya, total warfare is their concept, patience is virtue

Spiritual Islam, majority, goals: peace, follow national laws, American brothers, sisters, Allies, partners, soldiers, police, Vets, heroes, targeted

globally by Islamist jihadists, seen as traitors

Where ISIS, AQ, and other groups fit into, & break from, Islam

© AT‐RISK International & Muir Analytics

Where ISIS/al Qaeda (etc.) exist within the Ummah, according to Muslims

moderates

Islamist jihadist terrorism influencers** There are scores of others such as Abd al Wahhab, Abdul A’la Mawdudi, etc.

Ibn Taymiyyah, 1200s-1300s: “great grandfather of Islamist jihad,” strict sharia law must rule, Muslims must adhere or they’re not “real Muslims” (munafik, or hypocrites,) attack the unbelievers, force submission.

Sayyid Qutb, 1950s-60s, “godfather of modern Islamist jihad,” Western politics and lifestyles are “attacking Islam,” Islam “has to defend itself” via political subterfuge and violence.

Despite being rejected by the majority of Muslims, this ideology has become more widespread, and it drives international terrorism and insurgency…brief sample attacks (pre-9-11) include:

• Grand Mosque seizure, Mecca, Saudi Arabia, 1979

• Assassination of Egypt’s Anwar Sadat, 1981

• U.S. Embassy bombing, Beirut, Lebanon, 1983

• Buddhist Borobudur temple bombing, Java, Indonesia, 1985

• Tel Aviv-Jerusalem, Israel, bus 405 suicide attack (crash,) 1989

...then, in 1989, Afghanistan insurgent forces defeated the USSR...Islamist jihadists believe their philosophy caused this and thereafter exported it to the world via an Islamist jihadist global revolution...

Known as “political Islam,” rejected by spiritual Muslims

who do not believe politico-religious

philosophers can/should intercede

between man and God.

© AT‐RISK International & Muir Analytics

© AT‐RISK International & Muir Analytics

Where ISIS/al Qaeda (etc.) exist within the Ummah, according to Muslims

moderates

Islamist war philosophers

Ayman Zawahiri, 1990s-2000s, bin Laden's No. 2, now in charge of al Qaeda, wrote Knights Under the Prophet's Banner, preaches Islamist jihadist justification for war and revenge, planner, motivator.

Abu Bakr Naji (aka Muhammad Khalil al-Hakaymah) wrote “The Management of Savagery,” for al Qaeda in ‘04, adopted by ISIS as core strategic document, spread chaos by violence, disrupt world order, fill vacuum w/ISIS philosophy and leadership.

Messaging has flooded social

media/Internet with millions of postings,

tweets, etc., has recruited tens of

thousands into AQ and mostly ISIS, has added thousands to battlefields, caused

thousands of deaths.

Despite being rejected by the majority of Muslims, Islamist jihadi warfare has massively proliferated:

• More than 10,000 killed

• ISIS in more than 18 countries in Middle East, Americas, South Asia, Southeast Asia, Africa, Europe, etc.

• Co-opted over 45 insurgent/terror groups such as Boko Haram (Nigeria), Abu Sayaaf (Philippines), Anssar Bait al-Maqdis (Egypt), Jamaah Anshar Khilafah (Indonesia), Okba Ibn Nafaa Battalion (Tunisia), etc.

• Taken the war to not only Muslim countries but also the West: USA, Germany, Belgium, France, UK, Canada, Australia, Denmark, etc.

ISIS has lost ground in Iraq but expanded operations in the West plus Saudi, N Africa, S and SE Asia. ISIS is flexible and fully capable of copious distributed operations as its standing army shrinks.

© AT‐RISK International & Muir Analytics

© AT‐RISK International & Muir Analytics

War concepts/methods: from highly organized territory and war making to co-opting ongoing insurgencies, to infiltration attacks, to “leaderless revolution”

ISIS force structure(AQ has similar structure)

Standing armies in the field(like Syria, Iraq)

Coopted insurgencies(like Boko Haram)

Coopted terror groups(like Ansar Bayt al-Maqdis, Gaza

Strip)

Trained infiltration operatives(like some of the Paris attackers, Nov

‘15)

Individual self-activating agents

(erroneously called “lone wolves”)

(AQ has not had to any real

extent)

Influence operators(propagandize to shield Islamist

jihad)

(Muslim Brotherhood, various news

pundits, politicians)

(Not “lone” bc acting in

concert w/ISIS, AQ,

etc.)

© AT‐RISK International & Muir Analytics

© AT‐RISK International & Muir Analytics

Where ISIS/al Qaeda (etc.) exist within the Ummah, according to Muslims

ISIS = Established & began running the Caliphate, 29 June 2014 (origins go back many years prior)

End goal: rule all Muslims from the Caliphate

Methods:Co-opt local Muslim insurgencies around the globe

Subject all non-Muslims to Caliphate rule

Main propaganda theme = “the West is evil…ISIS is good, and righteous, and will cleanse the world for the better…”

Fight irregular wars (insurgency, terrorism) against Western and Arabic “apostate” governments to exhaust them, causing these countries collapse into chaos and “savagery”

Fill the vacuum of "savagery” with rule of ISIS, a force for good, purity, and “correct Islam”

Use horror, terror, and grotesque violence to shock and scare the enemy, infiltrate democracy and use it against the enemy, force or “sneak in” submission, bit by bit…

1

2

3

4

5

© AT‐RISK International & Muir Analytics

6

© AT‐RISK International & Muir Analytics

ISIS end of days prophecy (from the Hadith)

Major battle between ISIS and its enemies in Dabiq, Syria (near Turkish border)

“Great fire” and “redness in the sky”

ISIS army nearly loses, second coming of the prophet saves the day, Islam then conquers all enemies, final global caliphate established

Doomsday prophecy includes:Atrocities to goad the West or Arabic armies into combat in Dabiq

A final battle accompanied by a massive explosive event

1

2

3

4

5© AT‐RISK International & Muir Analytics

© AT‐RISK International & Muir Analytics

Motivation for ISIS securing & using CBRNE

The West and apostate Arabic governments are evil, they must be toppled, “corrected,” “purified,” and “made holy”

Western lifestyle and governing institutions are “attacking” Islam and must be stopped – the two cannot live side by side

Revenge for “subjugating” Muslims for decades

God “orders” that the Caliphate must rule the world

The “end of days battle” and the second coming require a “great fire” and “red skies”...some kind of cataclysmic event

Ω

Ω

Ω

Ω

Ω© AT‐RISK International & Muir Analytics

© AT‐RISK International & Muir Analytics

ISIS intent provides greater biosecurity threats

© AT‐RISK International & Muir Analytics

Islamist Jihadists and sympathizers/supporters positioned to gain access to laboratories

Presents potential Insider and Outsider Threats

U.S. and international laboratories, healthcare, and industrial areas at risk

1

2

3

© AT‐RISK International & Muir Analytics

Insiders and outsiders exploit program vulnerabilities

© AT‐RISK International & Muir Analytics

1

2

3

Poor access controls

Incompetent employees

Geographic location

Unsecure data network

Poor management and training practices

4

5

© AT‐RISK International & Muir Analytics

What makes biosecurity unique from traditional security?

© AT‐RISK International & Muir Analytics

1

2

The assets themselves (e.g., pathogen, Valuable Biological Material [VBM])

• Difficult to detect• Can be amplified from small quantities

Biosecurity MUST interface with Biosafety/Science‐based risk assessment

• Countering threats means we need to understand the agent/VBM itself ‐ what is the risk?

© AT‐RISK International & Muir Analytics

Biosecurity is threat management

© AT‐RISK International & Muir Analytics

1

2

Threat management = implementation of control measures to minimize, mitigate and manage threats and hazardsBiosecurity = implementation of control measures necessary to minimize threats, and safeguard, biological agents/VBM

© AT‐RISK International & Muir Analytics

How to prepare for ISIS threats to your institutions

© AT‐RISK International & Muir Analytics

1

2

Conduct review of institutional Biosecurity/Biosafety programs

Get outside help, if necessary

Build or augment a Biosecurity Program Plan

Implement the plan, adjust as needed

3

4

© AT‐RISK International & Muir Analytics

How to implement biosecurity - 1

© AT‐RISK International & Muir Analytics

• Multidisciplinary Biosecurity Assessment Team

• Administrative, security force, IT support, technical supervisory, and senior technical personnel

• Evaluate and design threat management approach• Quantify VBM value ($) and cost of replacement ($, equipment, time, reputation) to understand ROI

• Identify human and physical resources needed to implement

• Develop and secure a budget

© AT‐RISK International & Muir Analytics

How to implement biosecurity - 2

© AT‐RISK International & Muir Analytics

• Multidisciplinary Implementation Team• Supervisory and security staff• IT supervisory and technical staff• Line worker and support personnel

• Review current system and fill critical gaps: lock down current system

• Develop a “to‐be” process map• How will information flow (IT or manual)? • Chain of custody (who? what? when? why? how?)• Accountability and audit• Response to deviations (missing or extra material, incidents)• Quality assessment and improvement

© AT‐RISK International & Muir Analytics

How to implement biosecurity - 3

© AT‐RISK International & Muir Analytics

• Review existing documents and systems (e.g., IT solutions)

• Identify gaps• Revise or create/write new ones• Include reporting forms 

• Develop training materials• Policies, procedures, drills• Develop trainers• Roll out training

© AT‐RISK International & Muir Analytics

Biosecurity implementation - “The Bottom Line”

© AT‐RISK International & Muir Analytics

• What You Need to Succeed:• The right, willing people• Thorough knowledge of your assets• Detailed awareness and appreciation of your institution’s gaps, vulnerabilities, threats

• How to prioritize assets and gaps• Strategic plan to work collaboratively to address• Knowing when to get outside help• Open, honest communication. Call it like it is.

© AT‐RISK International & Muir Analytics

Ask Us a Question

© AT‐RISK International & Muir Analytics

© AT‐RISK International & Muir Analytics

Thank you for

attending and interacting.

For additional questions and resources, connect with us:

Ryan Burnette, PhD, [email protected] M. Moore, PhD, [email protected]

© AT‐RISK International & Muir Analytics