Laserfiche WebLink
Anoka County <br />MINNESOTA <br />Respectful, Innovative, Fiscally Responsible <br />Anoka County 2019 <br />Multi -Jurisdictional <br />All Hazards Mitigation Plan <br />• Blister agents are intended to incapacitate, rather than kill. These agents were <br />used extensively during World War I. Their use by a terrorist group largely <br />depends on the group's objectives and moral views. If the intent of an attack <br />were to injure numerous people and overload the area's medical facilities without <br />causing many deaths, then a blister agent would be the best choice. <br />• Choking agents were the agents most used during WW I. With the advent of <br />nerve agents, they have lost much of their usefulness. These substances are <br />intended to cause death and are convenient and readily available to terrorists. <br />• Blood agents are cyanide -based compounds. Unsuited for use on multitudes of <br />people, the primary use would be the assassination of targeted individuals. <br />• Nerve agents are the most recently developed chemical weapons. Originally <br />developed by German scientists 1930's as insecticides, nerve agents were used <br />as chemical weapons by the Nazi military. Hundreds of times more lethal than <br />blister, choking, or blood agents, nerve agents have been stockpiled as the <br />primary chemical weapon. These chemicals are the most useful to terrorists due <br />to the small quantity needed to inflict a substantial amount of damage. <br />Fortunately, these chemicals are more difficult to obtain. <br />Several nations have developed biological agents to use in warfare. Such agents are selected <br />or adapted from bacteria, fungi, viruses, or toxins that cause various diseases in humans, <br />animals, or food crops. Currently, the development of biological agents as weapons has kept <br />pace with our ever -evolving day-to-day technology. Despite the widespread ban, international <br />diplomatic efforts have not been entirely effective in preventing the enhancement and <br />proliferation of offensive biological warfare programs. <br />Cyber-Terrorism: The U.S. interest in promoting cyber-security extends well beyond its borders. <br />Critical domestic information infrastructures are directly linked with Canada, Mexico, Europe, <br />Asia, and South America. The nation's economy and security depend on far-flung U.S. <br />corporations, military forces and foreign trading partners that require secure and reliable global <br />information networks to function. The vast majority of cyber-attacks originates or passes through <br />systems abroad, crosses several borders, and requires international cooperation to stop. <br />In 1998, the United States received a wake-up call to the <br />national security dimensions of the threat. Eventually <br />dubbed "Solar Sunrise," this incident found U.S. military <br />systems under electronic assault, with computer systems in <br />the United Arab Emirates the apparent source. <br />Unclassified logistics, administrative, and accounting <br />systems essential to the management and deployment of <br />military forces were penetrated at a time that military action <br />was being considered against Iraq. The timing of the attacks <br />raised U.S. suspicion that this was the first wave of a major <br />cyber-attack by a hostile nation. <br />It was eventually learned that two California teenagers under the guidance and direction of a <br />sophisticated Israeli hacker, himself a teenager, had orchestrated the attacks using hacker tools <br />readily available on the Internet. <br />87 <br />