Were Brussels Terrorists Trying To Build 'dirty bomb'

Nuclear policy experts can seem like Cassandra, constantly prophesizing apocalyptic futures. In case you haven't noticed, we don't live in a Mad Max world devastated by nuclear war. Terrorists have not blown up New York with a makeshift nuclear bomb. We haven't bankrupted ourselves, despite the trillions of dollars spent on Cold War weapons.

Cassandra's curse, however, was not that she was wrong, but that no one believed her. I don't know a single nuclear expert who thinks that the threat of nuclear terrorism is shrinking. I don't know a single one who thinks that the actions taken by world leaders at this week's Nuclear Security Summit are enough. We are fearful. And you should be, too.

Chills went down a lot of experts' spines last month when we saw the news that the Brussels bombers, the ISIS terrorists who blew up the airport and attacked the metro, were secretly videotaping a Belgian nuclear official. This official worked at a facility that had radiological material that terrorists could use for a "dirty bomb." We do not know if they were filming him or his family, if there was a kidnap plot in motion, or what their exact plans were. But this is not some Hollywood fantasy. This is real. A nuclear terrorist event may be closer than you think.

What are the risks? First, that some terrorists could steal a complete nuclear weapon, like SPECTRE in the James Bond thriller, "Thunderball." This is hard, but not impossible. The key risk is that the outside terrorists get insider help: For example, a radical jihadist working at a Pakistan weapon storage site. Or the Belgian base just outside Brussels where we still stash a half-dozen nuclear weapons left over from Cold War deployments. Or the Incirlik air base in Turkey where we keep an estimated 50 weapons just 200 miles from the Syrian border.

Second, terrorists could steal the "stuff" of a bomb, highly enriched uranium or plutonium. They cannot make this themselves -- that requires huge, high-tech facilities that only nations can construct. But if they could get 50 or 100 pounds of uranium -- about the size of a bag of sugar -- they could construct a crude Hiroshima-style bomb. ISIS, with its money, territory and global networks, poses the greatest threat to do this that we have ever seen. Such a bomb brought by truck or ship or FedEx to an urban target could kill hundreds of thousands, destroy a city and put the world's economy and politics into shock.
            
Third, there is the possibility of a dirty bomb. Frankly, many of us are surprised this has not happened already. I spoke to Jon Stewart on his show 15 years ago about the danger. This is not a nuclear explosion unleashed by splitting atoms, but simply a conventional explosive, like dynamite, laced with radioactive material, like cesium or strontium. A 10-pound satchel of dynamite mixed with less than 2 ounces of cesium (about the size of a pencil eraser) could spew a radioactive cloud over tens of square blocks.

No one would die, unless they were right next to the explosion. But the material would stick to the buildings. Inhaling just a speck would greatly increase your risk of getting cancer. You could go into the buildings, but no one would. There would be mass panic and evacuations, and the bomb would render a port, financial district, or government complex unusable and uninhabitable for years until scrubbed clean. Economic losses could be in the trillions.

Fourth, terrorists could just attack a nuclear power reactor, fuel storage or other site to trigger a massive radioactive release that could contaminate hundreds or thousands of square miles, like Chernobyl or Fukushima. While nuclear reactors are hardened against outside attack, including by the intentional crash of a medium-sized jet plane, larger planes could destroy them. Or a series of suicide truck bombers. But it might not even take a physical explosion. This week, it was reported the United States and the United Kingdom are to simulate a cyberattack on a nuclear power plant.

Can we prevent these attacks? Yes, by eliminating, reducing and securing all supplies of nuclear materials so that terrorists would find it too difficult to get them. And by reducing and better protecting nuclear reactors and spent nuclear fuel.

Are we doing enough? No. "The capabilities of some terrorist groups, particularly the Islamic State, have grown dramatically," says Harvard scholar and former Bush Administration official William Tobey, "In a net calculation, the risk of nuclear terrorism is higher than it was two years ago."

The United States spends about $35 billion on nuclear weapons every year. This year, we will spend $1.8 billion on all our efforts to stop the spread these weapons and stop nuclear terrorism. You don't have to be a nuclear expert to know something is out of whack here.

It is time we put our money where our threats are.

Edition: http://cnn.it/20uy2ua

« Donald Trump Has A Plan for CyberWar
Women in Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Lightpath

Lightpath

Lightpath is revolutionizing how organizations connect to their digital destinations by combining our next-generation network with our next-generation customer service.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

Neptune Shield

Neptune Shield

Neptune Shield's mission is to deliver cutting edge Maritime focused Cyber Security & Threat Protection through our Hampton Roads based Tech & Cyber Security Hub.