U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

ATTRIBUTES OF POTENTIAL ADVERSARIES TO U.S. (UNITED STATES) NUCLEAR PROGRAMS (FROM THE ROLE OF BEHAVIORAL SCIENCE IN PHYSICAL SECURITY - PROCEEDINGS OF THE SECOND ANNUAL SYMPOSIUM, 1978, BY JOEL J KRAMER - SEE NCJ-49301)

NCJ Number
62716
Author(s)
A M FINE
Date Published
1978
Length
7 pages
Annotation
DATA USED BY THE RAND CORPORATION AND SANDIA LABORATORIES IN INVESTIGATING POTENTIAL THREATS TO NUCLEAR FACILITIES ARE PRESENTED WITH A LISTING OF ADVERSARY ATTRIBUTES DERIVED FROM A HISTORICAL-INCIDENT DATA BASE.
Abstract
INCLUSION OF DATA ON THE ASSAULTS ON FOREIGN NUCLEAR FACILITIES, SUCH AS SABOTAGE OF FRENCH REACTORS, YIELDS INSIGHTS INTO THE MODI OPERANDI OF PERPETRATORS OF NUCLEAR TERRORISM AND THEREBY POINTS OUT NEEDED AMERICAN SECURITY REQUIREMENTS. EVENTS USED AS ANALOGS TO NUCLEAR TERRORISM INCLUDE ROBBERIES BY SOPHISTICATED GANGS OF PROTECTED TARGETS, SYMBOLIC BOMBINGS BY POLITICAL GANGS, TERRORIST SEIZURES OF FACILITIES, AND WARTIME INCIDENTS INVOLVING DEDICATED GROUPS ATTACKING DEFENDED AREAS. FOR EACH OF THE INCIDENTS, A PROFILE OF TYPICAL ATTRIBUTES HAS BEEN COMPILED AND A GENERAL PROFILE HAS BEEN DERIVED. THESE PROFILES REVEAL THAT, ALTHOUGH ALMOST ALL OF THE PROFESSIONAL ROBBERIES HAVE BEEN SUCCESSFUL, CAREER CRIMINALS WILL ABANDON A ROBBERY ATTEMPT RATHER THAN RISK ARREST. TERRORIST ASSAULTS USUALLY OCCUR AGAINST UNPROTECTED TARGETS, AND THEIR PERPETRATORS ARE DETERRED BY THE PRESENCE OF ARMED PROTECTION. SIMILARLY, BOMBINGS IN THE UNITED STATES DURING 1965 TO 1976 WERE MAINLY AGAINST TARGETS WHICH LACKED SECURITY SYSTEMS. COMPOSITE ATTRIBUTES FROM ANALOG INCIDENTS INDICATES THE LOW LIKELIHOOD OF A TERRORIST GROUP POSSESSING BOTH HIGH DEDICATION AND HIGH TECHNICAL SKILLS. NEVERTHELESS, SUCH A GROUP COULD EXIST AND COULD BE VERY WELL ARMED. ADEQUATE SECURITY SYSTEMS SHOULD POSE DANGER AND RISK TO ADVERSARIES. TABULAR DATA ARE PROVIDED. (TWK)