Were Brussels Terrorists Trying To Build 'dirty bomb'

Nuclear policy experts can seem like Cassandra, constantly prophesizing apocalyptic futures. In case you haven't noticed, we don't live in a Mad Max world devastated by nuclear war. Terrorists have not blown up New York with a makeshift nuclear bomb. We haven't bankrupted ourselves, despite the trillions of dollars spent on Cold War weapons.

Cassandra's curse, however, was not that she was wrong, but that no one believed her. I don't know a single nuclear expert who thinks that the threat of nuclear terrorism is shrinking. I don't know a single one who thinks that the actions taken by world leaders at this week's Nuclear Security Summit are enough. We are fearful. And you should be, too.

Chills went down a lot of experts' spines last month when we saw the news that the Brussels bombers, the ISIS terrorists who blew up the airport and attacked the metro, were secretly videotaping a Belgian nuclear official. This official worked at a facility that had radiological material that terrorists could use for a "dirty bomb." We do not know if they were filming him or his family, if there was a kidnap plot in motion, or what their exact plans were. But this is not some Hollywood fantasy. This is real. A nuclear terrorist event may be closer than you think.

What are the risks? First, that some terrorists could steal a complete nuclear weapon, like SPECTRE in the James Bond thriller, "Thunderball." This is hard, but not impossible. The key risk is that the outside terrorists get insider help: For example, a radical jihadist working at a Pakistan weapon storage site. Or the Belgian base just outside Brussels where we still stash a half-dozen nuclear weapons left over from Cold War deployments. Or the Incirlik air base in Turkey where we keep an estimated 50 weapons just 200 miles from the Syrian border.

Second, terrorists could steal the "stuff" of a bomb, highly enriched uranium or plutonium. They cannot make this themselves -- that requires huge, high-tech facilities that only nations can construct. But if they could get 50 or 100 pounds of uranium -- about the size of a bag of sugar -- they could construct a crude Hiroshima-style bomb. ISIS, with its money, territory and global networks, poses the greatest threat to do this that we have ever seen. Such a bomb brought by truck or ship or FedEx to an urban target could kill hundreds of thousands, destroy a city and put the world's economy and politics into shock.
            
Third, there is the possibility of a dirty bomb. Frankly, many of us are surprised this has not happened already. I spoke to Jon Stewart on his show 15 years ago about the danger. This is not a nuclear explosion unleashed by splitting atoms, but simply a conventional explosive, like dynamite, laced with radioactive material, like cesium or strontium. A 10-pound satchel of dynamite mixed with less than 2 ounces of cesium (about the size of a pencil eraser) could spew a radioactive cloud over tens of square blocks.

No one would die, unless they were right next to the explosion. But the material would stick to the buildings. Inhaling just a speck would greatly increase your risk of getting cancer. You could go into the buildings, but no one would. There would be mass panic and evacuations, and the bomb would render a port, financial district, or government complex unusable and uninhabitable for years until scrubbed clean. Economic losses could be in the trillions.

Fourth, terrorists could just attack a nuclear power reactor, fuel storage or other site to trigger a massive radioactive release that could contaminate hundreds or thousands of square miles, like Chernobyl or Fukushima. While nuclear reactors are hardened against outside attack, including by the intentional crash of a medium-sized jet plane, larger planes could destroy them. Or a series of suicide truck bombers. But it might not even take a physical explosion. This week, it was reported the United States and the United Kingdom are to simulate a cyberattack on a nuclear power plant.

Can we prevent these attacks? Yes, by eliminating, reducing and securing all supplies of nuclear materials so that terrorists would find it too difficult to get them. And by reducing and better protecting nuclear reactors and spent nuclear fuel.

Are we doing enough? No. "The capabilities of some terrorist groups, particularly the Islamic State, have grown dramatically," says Harvard scholar and former Bush Administration official William Tobey, "In a net calculation, the risk of nuclear terrorism is higher than it was two years ago."

The United States spends about $35 billion on nuclear weapons every year. This year, we will spend $1.8 billion on all our efforts to stop the spread these weapons and stop nuclear terrorism. You don't have to be a nuclear expert to know something is out of whack here.

It is time we put our money where our threats are.

Edition: http://cnn.it/20uy2ua

« Donald Trump Has A Plan for CyberWar
Women in Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.