Is An ISIS Nuclear Attack In Europe Really A Threat?

The threat of a terrorist attack using nuclear material is the highest since the end of the Cold War, with ISIS actively trying to acquire weapons of mass destruction, according to a leading international think-tank on proliferation. 

"ISIS has already carried out numerous chemical weapons attacks in Syria; we know it wants to go further by carrying out a nuclear attack in the heart of Europe. This, combined with poor levels of security at a host of nuclear research centres in the former Soviet Union mean the threat of a possible 'dirty-bomb' attack on a Western capital is high," said Moshe Kantor, the president of the International Luxembourg Forum

The warning from the organisation, whose members include former government ministers and senior officials from Russia and the West, comes amid deep apprehension that jihadists will attempt to carry out atrocities during the current Euro 2016 football championship in France. The forum is not suggesting that a terrorist nuclear attack is likely to take place during the tournament, but Dr Kantor pointed out that the Islamist cell which carried out the Brussels attacks two months ago were believed to be monitoring workers and security arrangements at a Belgian nuclear facility. 

"Their previous documented attempts to gain access to a nuclear power station in Belgium are evidence of their intent," he stated at an international conference in Amsterdam. "The terrorists don't necessarily have to use a 'dirty bomb'. We are not just talking about stolen nuclear material, using conventional explosives in a nuclear plant, such as smuggling in a bomb, would have catastrophic consequences." 

Former British defence secretary Des Browne, a member of the forum and vice-chairman of the Nuclear Threat Initiative (NTI), said the threat of nuclear terrorism was a highly significant and complex issue which needed a unified international response. "It shouldn't be a surprise that if terrorists get hold of nuclear material they will try to use it, we also know that they are seeking such material, there were reports, for example, of ISIS getting hold of uranium when they captured Mosul," he said. 

"It isn't that hard to build a 'dirty bomb'. They may not kill that many people with such a bomb, but the effect on the environment, the infrastructure and the psychological impact on people would be devastating. They can also use cyber warfare to target a nuclear facility." 

The meeting in Amsterdam marks the 30th anniversary of the Reykjavik summit between US President Ronald Regan and Soviet leader Mikhail Gorbachev which paved the way for a historic missile treaty between the US and the Soviet Union. It comes after a nuclear conference hosted by President Barack Obama in Washington earlier this year which focused on the threat of a terrorist attack using nuclear material by ISIS and other extremist groups following the Paris and Brussels attacks. 

The President's deputy national security adviser, Ben Rhodes, said: "We know that terrorist organisations have the desire to get access to these raw materials and to have a nuclear device." 

Around 2,000 metric tons of highly enriched uranium and separated plutonium, that is being used internationally in civilian and military programmes, could be turned into a nuclear bomb if stolen or diverted, said the White House. But fewer than half of the 50 countries attending the summit had even agreed to secure their sources of radiological material. 

President Vladimir Putin refused to attend the Washington meeting with the Kremlin claiming it was an American attempt to take over the system of securing radioactive material. It was revealed last autumn that four attempts by Russian-linked gangs in Moldova, a former Soviet state, to sell nuclear material to terrorists, including ISIS, has been foiled. Evidence laid before the courts by Moldovan authorities showed that the smugglers had tried to exploit a breakdown in cooperation between Russia and the West on security issues. 

Pakistani President Nawaz Sharif also cancelled his Washington visit after an Islamist terrorist bombing killed 72 people. His country, which has a nuclear arsenal, and figures in the military and security establishment that may be sympathetic to jihadists, is viewed by analyst as a prime source for a terrorist device.

President Obama had repeatedly stressed the danger of nuclear terrorism and his emphasis on nuclear disarmament was an important factor in him winning the Nobel peace prize. Months into his presidency, he said in a much publicised speech in Prague that nuclear weapons were "the most dangerous legacy of the Cold War".

But in Amsterdam recently, Dr Kantor held that the current impasse on nuclear arms control was due to the stance of Washington. "The United States' refusal to discuss limits for its missile defence programme is a bottleneck for talks, which impedes the entire process of controlling nuclear weapons and heightens the threat of a nuclear incident. If we take the matter seriously, there should be no 'sacred cows' either among defensive or offensive weapons," he argued.

In a video message to the conference, Mr. Gorbachev, said: "We cannot be satisfied with the current situation, the window to a nuclear-free world first opened in Reykjavik, is being shut and locked before our eyes...The danger of nuclear weapons proliferation has grown to a large extent for this reason."

Ein News

 

« Attacks On Industrial Control System At An All-Time High
Email Scams: Criminals Try To Steal $3bn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

Dell Technologies

Dell Technologies

Dell Technologies Consulting Services enables a highly resilient business amidst the proliferation of cloud-based IT services and constant threats to your most critical information.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Apexanalytix

Apexanalytix

Apexanalytix is a leading provider of supplier onboarding, risk management and recovery solutions.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.

M7 Services

M7 Services

M7 Services are a comprehensive Managed Services Provider (MSP) with a focus on delivering cutting-edge information technology solutions and unparalleled customer service.