My WebLink
|
Help
|
About
|
Sign Out
Home
Agenda - Council - 12/10/2019
Ramsey
>
Public
>
Agendas
>
Council
>
2019
>
Agenda - Council - 12/10/2019
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/17/2025 2:36:50 PM
Creation date
1/10/2020 9:08:16 AM
Metadata
Fields
Template:
Meetings
Meeting Document Type
Agenda
Meeting Type
Council
Document Date
12/10/2019
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
893
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Anoka County <br />MINNESOTA <br />Respectful, Innovative, Fiscally Responsible <br />Anoka County 2019 <br />Multi -Jurisdictional <br />All Hazards Mitigation Plan <br />• Blister agents are intended to incapacitate, rather than kill. These agents were <br />used extensively during World War I. Their use by a terrorist group largely <br />depends on the group's objectives and moral views. If the intent of an attack <br />were to injure numerous people and overload the area's medical facilities without <br />causing many deaths, then a blister agent would be the best choice. <br />• Choking agents were the agents most used during WW I. With the advent of <br />nerve agents, they have lost much of their usefulness. These substances are <br />intended to cause death and are convenient and readily available to terrorists. <br />• Blood agents are cyanide -based compounds. Unsuited for use on multitudes of <br />people, the primary use would be the assassination of targeted individuals. <br />• Nerve agents are the most recently developed chemical weapons. Originally <br />developed by German scientists 1930's as insecticides, nerve agents were used <br />as chemical weapons by the Nazi military. Hundreds of times more lethal than <br />blister, choking, or blood agents, nerve agents have been stockpiled as the <br />primary chemical weapon. These chemicals are the most useful to terrorists due <br />to the small quantity needed to inflict a substantial amount of damage. <br />Fortunately, these chemicals are more difficult to obtain. <br />Several nations have developed biological agents to use in warfare. Such agents are selected <br />or adapted from bacteria, fungi, viruses, or toxins that cause various diseases in humans, <br />animals, or food crops. Currently, the development of biological agents as weapons has kept <br />pace with our ever -evolving day-to-day technology. Despite the widespread ban, international <br />diplomatic efforts have not been entirely effective in preventing the enhancement and <br />proliferation of offensive biological warfare programs. <br />Cyber-Terrorism: The U.S. interest in promoting cyber-security extends well beyond its borders. <br />Critical domestic information infrastructures are directly linked with Canada, Mexico, Europe, <br />Asia, and South America. The nation's economy and security depend on far-flung U.S. <br />corporations, military forces and foreign trading partners that require secure and reliable global <br />information networks to function. The vast majority of cyber-attacks originates or passes through <br />systems abroad, crosses several borders, and requires international cooperation to stop. <br />In 1998, the United States received a wake-up call to the <br />national security dimensions of the threat. Eventually <br />dubbed "Solar Sunrise," this incident found U.S. military <br />systems under electronic assault, with computer systems in <br />the United Arab Emirates the apparent source. <br />Unclassified logistics, administrative, and accounting <br />systems essential to the management and deployment of <br />military forces were penetrated at a time that military action <br />was being considered against Iraq. The timing of the attacks <br />raised U.S. suspicion that this was the first wave of a major <br />cyber-attack by a hostile nation. <br />It was eventually learned that two California teenagers under the guidance and direction of a <br />sophisticated Israeli hacker, himself a teenager, had orchestrated the attacks using hacker tools <br />readily available on the Internet. <br />87 <br />
The URL can be used to link to this page
Your browser does not support the video tag.