SLEEPER CELLS IN AMERICA
"...Most likely a nuclear terrorist attack in a major U.S. city would come just as 9-11 came – unannounced and unanticipated. A sleeper cell like the 19 terrorists who destroyed the World Trade Center and hit the Pentagon may be living with us right now, unseen, below the surface, ready to strike when the order is given. It is frightening to think that people who are living among us now as apparently ordinary citizens are secretly planning when, where and how to explode a nuclear weapon in one of our major cities."
"...In 2004 the FBI suggested that al-Qaida sleeper cells were believed to be operating in 40 states, awaiting orders and funding for new attacks on U.S. soil. The bureau believed that these agents were being funded “by millions of dollars solicited by an extensive network of bogus charities and foundations,” with the cells using “Muslim communities as cover and places to raise cash and recruit sympathizers.” U.S. law-enforcement authorities claimed to have satellite photos and communications intercepts that documented between 60 and 70 camps in Pakistan-occupied Kashmir and in Pakistan. Still, finding sleeper-cell terrorists is very difficult, especially with the presumption of innocence and extensive legal rights and civil liberties granted suspects under U.S. law."
"...On Dec. 21, 2004, just four days before Christmas, the United States elevated the terror threat level to orange, and Department of Energy scientists were dispatched to Washington, New York, Las Vegas, Los Angeles and Baltimore in response to credible intelligence reports that al-Qaida was planning to launch a dirty-bomb attack in one of those cities. On the same day, the Department of Homeland Security sent out large fixed radiation detectors and hundreds of paper-size radiation detectors to police departments across the nation, including the cities of Washington, New York, Los Angeles, Las Vegas, Chicago, Houston, San Diego, San Francisco, Seattle and Detroit.
Many sources are available to obtain the radioactive material needed to construct a dirty bomb. One good candidate is cesium-137, a highly radioactive substance that is commonly used in heavy industry. While uranium is at the top of the list of radioactive materials available in illicit trafficking, “cesium-137 is the second-most common with 53 seizures between 1993 and 1998, which contributed to 22.6 percent of all radioactive material seizures.” Authorities estimate that there are more than 8,000 sources of industrial radiation available today in America, involving a wide range of different chemicals and an equally wide range of applications from medical technology to food irradiation.
An analysis of half-life and radioactivity, as well as a realistic evaluation of how portable and dispersible a radioactive substance really is, leads to a conclusion that “only a small fraction of the existing millions of sources pose a high security risk.” Still, the challenge of protecting radioactive materials is huge, simply because there are tens of thousands of sites worldwide from which terrorists could steal or buy the radioactive materials they would need to make a dirty bomb.
Detonating radioactive material would cause fallout and contamination that would cause radiation sickness in many of those exposed. Serious illness, even death, could result, depending upon the amount and intensity of the radioactive material released and the health or susceptibility to radiation poisoning of those persons exposed to the hazard. Physical areas impacted by the dirty bomb would need to be quarantined and detoxified before they could be used again. The cleanup process could be long and expensive; some structures might be so toxic that destroying them might be the only solution.
A terrorist attack using a RED would produce chaos and fear; however, the number of actual casualties might be relatively small. We can imagine a coordinated attack where a group of terrorists planned simultaneous or near-simultaneous dirty-bomb explosions within one city, with the aim of shutting down the city, at least temporarily, and intensifying the shock-and-fear value of the attack by successfully pulling off multiple coordinated attacks.
Read more at WND.com
See also:
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.