Professional Documents
Culture Documents
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats 1St Edition M Martellini Online Ebook Texxtbook Full Chapter PDF
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats 1St Edition M Martellini Online Ebook Texxtbook Full Chapter PDF
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats 1St Edition M Martellini Online Ebook Texxtbook Full Chapter PDF
https://ebookmeta.com/product/handbook-of-chemical-and-
biological-warfare-agents-volume-2-nonlethal-chemical-agents-and-
biological-warfare-agents-3rd-edition-d-hank-ellison/
https://ebookmeta.com/product/medical-aspects-of-biological-
warfare-2nd-edition-joel-bozue/
https://ebookmeta.com/product/dirty-war-rhodesia-and-chemical-
biological-warfare-1975-1980-glenn-cross/
https://ebookmeta.com/product/emerging-threats-to-human-rights-
resources-violence-and-deprivation-of-citizenship-1st-edition-
heather-smith-cannoy/
Getting Skilled with Java 1st Edition M Rashid Raza
https://ebookmeta.com/product/getting-skilled-with-java-1st-
edition-m-rashid-raza/
https://ebookmeta.com/product/getting-skilled-with-java-1st-
edition-m-rashid-raza-2/
https://ebookmeta.com/product/unit-731-laboratory-of-the-devil-
auschwitz-of-the-east-japanese-biological-warfare-in-
china-1933-45-1st-edition-yan-jun-yang/
https://ebookmeta.com/product/unit-731-laboratory-of-the-devil-
auschwitz-of-the-east-japanese-biological-warfare-in-
china-1933-45-1st-edition-yang-yan-jun/
https://ebookmeta.com/product/gaming-and-extremism-the-
radicalization-of-digital-playgrounds-1st-edition-linda-schlegel/
THE RISK OF SKILLED SCIENTIST RADICALIZATION
AND EMERGING BIOLOGICAL WARFARE THREATS
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
NATO Science for Peace and Security Series
This Series presents the results of scientific meetings supported under the NATO Programme:
Science for Peace and Security (SPS).
The NATO SPS Programme supports meetings in the following Key Priority areas: (1) Defence
Against Terrorism; (2) Countering other Threats to Security and (3) NATO, Partner and
Mediterranean Dialogue Country Priorities. The types of meeting supported are generally
“Advanced Study Institutes” and “Advanced Research Workshops”. The NATO SPS Series
collects together the results of these meetings. The meetings are co-organized by scientists from
NATO countries and scientists from NATO’s “Partner” or “Mediterranean Dialogue” countries.
The observations and recommendations made at the meetings, as well as the contents of the
volumes in the Series, reflect those of participants and contributors only; they should not
necessarily be regarded as reflecting NATO views or policy.
Advanced Study Institutes (ASI) are high-level tutorial courses to convey the latest
developments in a subject to an advanced-level audience.
Advanced Research Workshops (ARW) are expert meetings where an intense but informal
exchange of views at the frontiers of a subject aims at identifying directions for future action.
Following a transformation of the programme in 2006 the Series has been re-named and re-
organised. Recent volumes on topics not related to security, which result from meetings
supported under the programme earlier, may be found in the NATO Science Series.
The Series is published by IOS Press, Amsterdam, and Springer Science and Business Media,
Dordrecht, in cooperation with NATO Emerging Security Challenges Division.
Sub-Series
http://www.nato.int/science
http://www.springer.com
http://www.iospress.nl
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
The Risk of Skilled Scientist
Radicalization and Emerging
Biological Warfare Threats
Edited by
Maurizio Martellini
Secretary General, Landau Network Fondazione Volta, Como, Italy
and
Jason Rao
Advisory Chair, Health Security Partners, Washington DC, US
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
Proceedings of the NATO Advanced Research Workshop on The Risk of Skilled Scientist
Radicalization and Emerging Biological Warfare Threats
Como, Italy
29 November – 2 December 2016
All rights reserved. No part of this book may be reproduced, stored in a retrieval system,
or transmitted, in any form or by any means, without prior written permission from the publisher.
Publisher
IOS Press BV
Nieuwe Hemweg 6B
1013 BG Amsterdam
Netherlands
fax: +31 20 687 0019
e-mail: order@iospress.nl
LEGAL NOTICE
The author(s) of this publication is/are solely responsible for its content. This
publication does not reflect the opinion of the publisher. The publisher cannot be held
liable for any loss or damage that may occur because of this publication.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
v
Preface
Maurizio MARTELLINI, Ph.D. a,1 and Jason RAO, Ph.D. b
a
Landau Network Fondazione Volta (Como, Italy)
b
Health Security Partners (Washington, DC, USA)
Introduction
The main objective of this Advanced Research Workshop titled “The Risk of Skilled
Scientist Radicalization and Emerging Biological Warfare Threats” was to assess the
risk and ability for radical terrorist groups, such as the Islamic State, to recruit highly-
skilled scientists. Indeed, over the past years, it has become increasingly clear that the
Islamic State is both willing and capable of online recruitment of Westerners to their
cause. Through Facebook, Twitter, and other social media, the Islamic State has been
able to attract recruits previously thought unlikely to espouse jihad.
This workshop was one-of-a-kind in that it brought together unique perspectives
from the social science community and the scientific technical community to discuss
the risks of the radicalization of chemical, biological, radiological and nuclear (CBRN)
skilled scientists.
Preface
Skilled scientists are not immune to the appeal of terrorist groups. Indeed, terrorist
groups not only consist of combatants but also consist of leaders, financiers, ideologues,
military trainers, and scientists, all of whom are part of a complex eco-system. The split
between al-Qaeda (AQ) and the Islamic State (IS) can be thought of as an outcome of a
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
In drawing on lessons learned from past cases, A.Q. Khan is an important example
of scientist radicalization. His motives were rooted in nationalism. However, he was
1
Corresponding author. Landau Network Fondazione Volta, Como, Italy; E-mail: maurizio.martellini@
fondazionealessandrovolta.it.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
vi
not a frustrated young student, but rather an established scientist with familial, commu-
nity, and professional ties. Another example is Bruce Ivins, who was the alleged perpe-
trator of the Amerithrax attack against government and media officials post 9/11. Sci-
entists like A.Q. Khan and Bruce Ivins not only shed light on the challenges posed by
“lone wolf actors” but also highlight the potential consequences of a better executed
plan by an organized group.
If the objective is to undermine the Islamic State, then the physical and digital ca-
liphates must also be considered and combated simultaneously. Digital propaganda
facilitates a physical caliphate by attracting fighters to the Islamic State’s territory, and
the existence of a physical caliphate facilitates digital propaganda by allowing the Is-
lamic State (IS) to create and disseminate an organized narrative. While it is often mis-
taken that all IS propaganda is overwhelmingly violent and militaristic, much of their
produced visual media focuses on themes like governance, religion, commerce, regula-
tion, policing, and helping the poor. Through this narrative, the Islamic State is attract-
ing people to the caliphate with the promise of a new kind of society.
is increasing.
While the Biological Weapons Convention (BWC) addresses the risk of biological
proliferation by state actors, it is limited. The BWC needs to be strengthened to reduce
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
vii
the risk of non-state actors. Non-state actors may develop low level biological weap-
ons (BW) using commercially available and naturally-occurring zoonotic agents target-
ing animal health and the food supply. Scientists need to be involved in the policy dis-
cussion if biotechnology advances will make it easier for non-state actors to develop a
BW. The question is if the need for tacit knowledge will start to disappear as biotech-
nology moves forward.
On the chemical side, the Open Source Intelligence (OSINT) is an efficient tool
for the detection of alleged use of chemical weapons because it provides time sensitive
and actionable information. Evidence suggests that IS has attained crude chemical
weapon capability, in the form of sulfur mustard and chlorine, and has developed
homemade rockets for delivery. It also suggested that IS has the ability to conduct
chemical weapon attacks on a wide geographical area. However, their capability at pre-
sent is rather limited and the real danger is long term.
The issue of the WMD delivery systems, meaning not only CBRN materials, but
also CBRN devices, IEDs, etc., needs to be taken into account because there is no in-
ternational mechanism to deal with dual/multi-use items nor any chemical-biological
terrorism convention or non-proliferation treaty (the Biological and Chemical Weapons
Conventions are just disarmament treaties).
Strategic trade control systems’ main objective is to rule sensitive trade exchanges
between states, but not between states and non-state actors. This means that WMD pro-
liferation activities within a state by individuals or organisations not involving cross-
border movements are not under the scope of strategic trade control regimes or systems.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
A way ahead could be developing verifications systems especially for bio, defining
guidelines/MoU to counter/reduce the risk of license shopping, raising operators’
awareness, and increasing exchanges of information between state authorities on
WMD-related operators and activities. A reference entity in this framework is the
UN1540 Committee, which should be strengthened in order to counter IS’s activities.
In addition, a robust bio-surveillance system at the border should be set up in critical
areas, such as the Hindu Kush, Central Asia, Mesopotamia, etc.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
viii
ii. Strengthen values around culture of responsibility and safe/secure science for
peace, starting from the level of lower education institutions (not limited only
to the level of the academic and professional associations);
iii. Better intelligence sharing, especially between Europe and Arab countries,
since the returning fighters may end up as refugees in other counties or in any
place where they can seek refuge;
iv. Protect high risk bio and chemical facilities as they are easy targets;
v. Strengthen potentially vulnerable areas: capacity building in areas potentially
under threat, including detection capabilities & border security; and
vi. Develop a strategy to monitor disruptive technologies.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
ix
Contents
Preface v
Maurizio Martellini and Jason Rao
Francesco Marone
The Shifting Jihadist Galaxy 74
Andrea Plebani
Designing Systems for Terroristic Indicators Analysis Based on Visible, Social
and Dark Web Data Sources 82
John Soldatos
Educational Outreach to Combat Radicalisation of Scientists: A Study
of the Aum Shinrikyo Cult 94
Michael I. Thornton
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
This page intentionally left blank
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats 1
M. Martellini and J. Rao (Eds.)
IOS Press, 2017
© 2017 The authors and IOS Press. All rights reserved.
doi:10.3233/978-1-61499-802-0-1
Abstract. The efforts of preventing the spread of WMD expertise are often labeled
as “scientists’ redirection” are essential to redirect the scientists’ skills and exper-
tise to peaceful civilian activities. Such redirection efforts have historically boosts
these activities for securing WMD materials. Human expertise in WMD science
and technology poses as high a risk as acquires WMD materials. Thus, states
should strengthen their efforts on ensuring personnel reliability to prevent unau-
thorized access to WMD-related materials. Delays in securing WMD expertise can
be more alarming than comparable delays in securing WMD materials. In this pa-
per, the efforts of the Iraqi government to reduce the threat of proliferation of dual-
use expertise and materials have presented.
Introduction
Redirection and other engagement programs have difficulty without adequate political
support. This work does not yield the immediate, tangible “scorecard” accomplish-
ments that come from securing WMD materials. However, the materials for many bio-
logical weapons are so prevalent that controlling WMD expertise is the best hope of
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Iraq starts its biological program at the end of the 1970s. Many scientists and tech-
nicians have engaged in this program. In 1991, the program was destroyed according to
the Security Council Resolution 687 under the supervision of the UNSCOM [1]. After
2003, the environment was completely different. In addition to the unstable security
situation, the chaotic looting, destruction of the physical infrastructure for most of the
government institutions, along with much of the rest of the country’s economic infra-
structure. Equipment was stolen or vandalized beyond repair. Government research fa-
cilities, factories, and even university laboratories all met similar fates. Identifying
WMD experts was far more difficult in Iraq. Many of them left Iraq and the others are
unemployed.
1
Corresponding author. Iraqi National Monitoring Authority for nonproliferation, P.O. Box 2004, Bagh-
dad-Iraq; E-mail: AlsharaaMJH@consultant.com.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
2 M. al Sharaa and S. Muhi / Iraq Biological Dual-Use Knowledge
The Republic of Iraq Constitution, Article 9 (1E) has noted that “The Iraqi Govern-
ment shall respect and implement Iraq’s international obligations regarding the non-
proliferation, non-development, non-production and non-use of nuclear, chemical,
and biological weapons, and associated equipment, materials, technologies, and de-
livery” [2].
According to this article many of the related laws, regulations, instructions, poli-
cies and strategies have been adopted to prevent the proliferation of biological weapons
and their means of delivery:
A number of subordinate regulations, instructions and guidance have adopted for the
relevant ministries and institutions.
In May 2012, the Iraqi parliament approved the Iraqi National Monitoring Authori-
ty for non-proliferation (INMA) law No. (48) [3]. The law establishes the National Au-
thority to ensure non-exploitation of Iraqi territories for any prohibited activities. IN-
MA seeks to achieve its goals through the following means:
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
M. al Sharaa and S. Muhi / Iraq Biological Dual-Use Knowledge 3
Measures
The Iraqi government has taken a series of measures and practical steps to protect sen-
sitive biological materials, in particular pathogens and biological toxins, and prevent
their acquisition by terrorists. In addition, appropriate domestic controls over related
materials and effective border controls have been established to prevent their illicit traf-
ficking, which includes the following:
INMA drafted the National Biological Emergency Plan in 2013. The National Security
Council approved the plan in 2015. INMA is working with other ministries to review
and assess the gaps in the ministries resources. INMA successfully established the na-
tional policy CBRN team and the CBRN response teams within the ministry of interior
and the ministry of defense. CBRN response teams have responded to all the accidents
since 2015 both in the military and civilian attacks.
Iraq established the National Bio-risk Management Committee, which aims to enhance
biological safety and security measures, raise the level of national capacity for counter-
ing and mitigating biological threats, as well as preventing unauthorized persons from
accessing valuable biological material. The Committee was also tasked to develop a
legal framework that promotes an effective bio-risk management system in Iraq in ac-
cordance with international standards.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
4 M. al Sharaa and S. Muhi / Iraq Biological Dual-Use Knowledge
Many of the biological scientists with dual-use expertise left Iraq after 2003. The
remaining scientists with different backgrounds and from different institutions are en-
gaged in different research activities focusing on various fields, such as industrial, pub-
lic health, environmental, agricultural, universities, etc. There are some direct programs
and other indirect as follows:
The programs worked extensively with the Iraqi Ministry of Science and Technol-
ogy (MoST), which has absorbed numerous WMD personnel from the former Iraqi
Atomic Energy Commission and the Military Industrial Commission, both of which
played important roles in Iraq’s WMD programs.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
After 2012, INMA has worked to implement several programs for health, envi-
ronment, agriculture, higher education and science and technology ministries with the
support of various international programs. These programs concentrated on:
Challenges
There are many challenges to be drawn from controlling the biological dual-use exper-
tise and knowledge threats [4]. Biological weapons-related dual-use materials are im-
ported, produced, transported and handled under many different circumstances, posing
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
M. al Sharaa and S. Muhi / Iraq Biological Dual-Use Knowledge 5
a high risk to the community. An effective legislation, instructions, policies, and strate-
gies are essential to mitigate and reduce the possibility of using illegal activities. The
biological activity controls over related materials, knowledge, and technologies are a
complicated process. It requires long-term monitoring and verification. Attention
should be given to identify and understand the extent of the dual-use knowledge and
capabilities and their potential links to biological weapons proliferation. The financial
allocations are essential for the continuity and sustainability of the programs. New ap-
proaches should be developed to ensure nonproliferation of prohibited activities [5].
Securing WMD expertise is a strategic goal since it deals with the expertise with the
capability to produce WMD, so it needs to elaborate international strategy to set up
proposals and models for short-term and long-term projects [6].
Conclusion
The conclusions mentioned in this paragraph are based on the Iraqi experience. It may
be utilized to address the long-term challenges that come with controlling the biologi-
cal dual-use knowledge threats and redirection programs.
References
[1] United Nations Monitoring, Verification and Inspection Commission, Compendium of Iraq’s Proscribed
Weapons Programmes in the Chemical, Biological and Missile areas, June 2007.
[2] Constitution of Iraq, 2005.
[3] Iraqi Official Gazette Al Waqaa Number 4252, 2012.
[4] Arturo Casadevall, Susan A. Ehrlich, David R. Franz, Michael J. Imperiale, and Paul S. Keim, Biode-
fense Research: A Win-Win Challenge, Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and
Science, Volume 6, Number 4, 2008.
[5] Gigi Kwik Gronvall, Preventing the Development and Use of Biological Weapons, Biosecurity and Bio-
terrorism: Biodefense Strategy, Practice, and Science, Volume 7, Number 1, 2009.
[6] Meeting Report, Strategies for Managing Dual Use Research of Concern Progress at the National Level,
Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, Volume 7, Number 1, 2009.
The author(s) of this publication is/are solely responsible for its content. This
publication does not reflect the opinion of the publisher. The publisher cannot be held
liable for any loss or damage that may occur because of this publication.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
6 The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats
M. Martellini and J. Rao (Eds.)
IOS Press, 2017
© 2017 The authors and IOS Press. All rights reserved.
doi:10.3233/978-1-61499-802-0-6
Abstract. Men have always tried to improve their own lifestyle taking advantage
of and adapting natural resources to their needs. This happened also with living
organisms. Starting from farming and breeding, developments brought about the
ability of knowingly modifying the organisms’ DNA that contains the instructions
to grow and develop every living organism, arising genetic engineer, biotechnolo-
gy and synthetic biology. Synthetic biology, in particular, is a multidisciplinary ar-
ea that allows the creation of artificial living organisms starting from synthetically
produced DNA material. This ability could be used for good or malicious purposes,
rising dual use issues. This scenario has been complicated by the DoItYourself-
biology (DIY-Bio) movement’s birth, because this is spreading the use of biotech-
nology beyond the traditional academic and industrial institutions and into the lay
public, increasing concerns about biosafety, biosecurity and ethics, even though it
has been shown that working with living organisms, especially to create a biothreat,
is not that effortless. The continuous improvements of synthetic biology and DIY-
bio should be strictly monitored and regulated in order to guarantee a safe and se-
cure world.
Introduction
From the origin of human mankind, men have always tried to adapt and use natural
sources to improve and ease their own lives. This happened also with living organisms
as plants and animals, starting farming, agriculture, and domestication of livestock an-
imals. From these first steps to improve useful characteristics of living organisms,
technological advances have brought about the ability of wittingly modifying the DNA,
the molecule coding for all the information needed to growth and develop every living
organisms, giving rise to biotechnology, genetic engineering, and more recently, syn-
thetic biology. These strictly related disciplines allow modifying living organisms’
characteristics, making them useful in different fields, such as medicine, agriculture,
environment and energy.
Since these technologies are dealing with living organisms and pathogens, as well
as their uses/applications, it gave rise to some concerns about safety and security, based
1
Veronica Baldo, Insubria Center on International Security, via Natta 14, 22100 Como, Italy; E-mail:
veronica.baldo1977@gmail.com; veronica.baldo@uninsubria.it.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat 7
on the perceived risk of harmful organisms being released, either deliberately or acci-
dentally, into the environment. Moreover, the coming of synthetic biology, together
with internet dissemination of information on DNA and on how to manage living or-
ganisms, makes it possible to create new living organisms, even dangerous ones, or to
enhance existing pathogens to create more harmful ones creating a dual-use concern.
In the last two decades another actor has been added to this scenario that is Do-it-
yourself-biology (DIYbio), a global movement spreading the use of biotechnology be-
yond the traditional academic and industrial institutions and into the lay public.
Even though the weaponization of living organisms is really hard to obtain and, as
known right now, not yet realized, it cannot be ignored that future advances and devel-
opments will make it possible. Therefore, it is really important to constantly monitor
both research in the bioweaponization direction and in the creation of smaller, but not
less frightening and hazardous unintentional or malicious threats.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
The following summarizes the technological advances and the risks connected
with modern biotechnology and synthetic biology especially from a biosecurity point of
view.
Biotechnology Developments
Mankind has been modifying living organisms since around 12,000 B.C., when humans
first began to domesticate plants and animals through artificial selection. Selective
breeding, hybridization, and grafting have been used to improve and adapt plants and
animals to human needs. These processes are now known to change organism DNA
that is the molecule that carries the genetic instructions used in the growth, develop-
ment, functioning, and reproduction of all known living organisms.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
8 V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat
Only since 1973 has genetic engineering and DNA manipulation been applied to
modifying living organisms directly using specific biotechnology techniques. In fact, in
the latter part of the 20th century, artificial manipulation, modification, and recombina-
tion of DNA in order to modify an organism or population of organisms were made
through recombinant DNA technology (or gene cloning), in which DNA molecules
from two or more sources are combined either within cells or in vitro and are then in-
serted into host organisms in which they are able to propagate [1].
The use of genetic engineering gave rise to modern biotechnology, which is the
use of living systems and organisms to develop or make products, or “any technologi-
cal application that uses biological systems, living organisms, or derivatives thereof, to
make or modify products or process for specific use” [2]. In particular, these new tech-
nologies have been used to synthesize medically useful substances, such as human in-
sulin, human growth hormone, alpha interferon, and a hepatitis B vaccine. Furthermore,
genetic engineering has been used in agriculture for food production to increase the
shelf life of vegetables, to grow pesticide-producing and herbicide resistant crops and
to improve nutritional values of cereals, like rice.
The birth of this new biotechnology was due to the innovative tools to cut specific
DNA sequences (Hamilton Smiths), separate and paste fragments (Berg, Boyer and
Cohen). Moreover, in 1977 Frederick Sangers developed a method for sequencing
DNA, greatly increasing the genetic information available to researchers. Then, Poly-
merase Chain Reactions (PCR), developed by Kary Mullis in 1983, allowed small sec-
tions of DNA to be amplified and aided identification and isolation of genetic material.
In the meanwhile, the techniques to insert the manipulated DNA into organisms
and organisms’ genome have also been developed and since the genetic code can be
translated and expressed in every existing living organism, it is possible to produce or-
ganism proteins in the host that are naturally synthesized in others. In other words, by
incorporating foreign DNA from a mammalian gene, for example, into a bacterium, re-
searchers can obtain an almost limitless number of copies of the inserted gene. Fur-
thermore, if the inserted gene is operative/functional (i.e., if it directs protein synthesis),
the modified bacterium will produce the protein coded by foreign DNA [1]. For exam-
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
ple, the human protein insulin, used by diabetic patients, is produced using the tech-
nique of recombinant DNA by bacteria or yeast and easily purified to make it available
for medical purposes.
Biotechnology is evolving so fast that new techniques are available and DNA ma-
nipulation is becoming easier and, thanks to faster, simpler, and cheaper DNA amplifi-
cations and synthesis, is improving synthetic biology applications and achievements. In
the early 21st century, innovative genetic engineering techniques emerged that centered
on gene editing for higher eukaryotes (such as mammals). Gene editing, based on the
technology of the so called CRISPR-Cas9, allows researchers to customize a living or-
ganism’s genetic sequence by making very specific changes to its DNA [1]. Further-
more, DNA synthesis allows the direct construction of genetic material starting from
information and raw chemicals [3], enhancing biotechnological evolution and giving
rise to the so-called synthetic biology.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat 9
Synthetic Biology
Synthetic biology is, by definition, the design and construction of new biological parts,
devices, and systems, and the re-design of existing, natural biological systems for use-
ful purposes [4]. Synthetic biology, combining elements of engineering, chemistry,
computer science, and molecular biology, seeks to assemble the biological tools neces-
sary to redesign the living world. This is different from genetic engineering that is the
simple addition or modification of a single gene using conventional genetic engineering
techniques. On the contrary, adding a whole suite of genes or creating an entirely new
genetic code that does not exist in nature is synthetic biology, as well as using syntheti-
cally-created nucleic acids, parts, and devices [5–7].
Different approaches, not mutually exclusive, could be used to create new parts or
entire living organisms, such as:
1. Health and medicines: new drugs synthesis (Artemisinin project to treat malar-
ia), program cells to precisely detect and kill cancer cells, innovative diagnos-
tic kits;
2. Agriculture and food: higher nutritive vegetables, food created in laboratories
more efficiently than growing in the land;
3. Energy and environment: biofuels production, creation of new organisms able
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
In 2002 synthetic biology gained its first considerable achievement. Cello et al. [8]
showed that it is possible to obtain a completely functional poliovirus, starting from a
chemically synthesized DNA in the absence of a natural template and using a cell-free
extract to express the virus genome and develop the virus itself. Eight years later, Craig
Venter’s laboratory created a bacteria (Mycoplasma mycoides) from a chemically syn-
thesized genome, capable of continuous self-replication [9], and in 2014 a fully func-
tional eukaryotic chromosome was designed and expressed in yeast [10].
Synthetic biologists are convinced that, with enough knowledge, they will be able
to write programs to control the genetic components, programs that would let them not
only alter nature but guide evolution as well [7].
Moreover, the tools evolved, thanks to genetic engineering and synthetic biology,
are everyday becoming cheaper to get and easier to use. For example, there is a “con-
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
10 V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat
tinuously growing collection of genetic parts that can be mixed and matched to build
synthetic biology devices and systems” (BioBricks) and the equipment required to
work with DNA and living organisms can be easily bought on line, even on common e-
commerce platforms (Amazon, eBay…). In addition, with the growth of the internet
and the standardization of many biotechnological procedures, the tools for doing syn-
thetic biology are increasingly becoming more accessible.
Last but not least, synthetic organisms could be specifically created for malevolent
purposes, raising concerns about biosecurity. In fact, several pathogenic viruses, in-
cluding 1918 influenza virus [12] and the infectious poliovirus as previously mentioned,
can be synthesized using only published DNA sequence information and mail-ordered
raw materials [8]. Such developments have led to the concerns that ‘biohackers’ could
create/recreate known pathogens and perhaps make them even more virulent. Faster
and cheaper DNA synthesis is one of the key points of synthetic biology. Furthermore,
the availability of DNA sequence data and explanations of molecular biology tech-
niques online, combined with the ease of getting a DNA sequence synthesized by a
specialized company, means that these technologies are becoming available to an in-
creasingly wide range of people. For example, the iGEM (International Genetic Engi-
neer Machine) competition is dedicated to undergraduate students and brings together
students from across a range of disciplines to work collaboratively to design and build
biological systems. This kind of experiment is demonstrating the accessibility of the
technology to undergraduates and not experienced students across the world [11].
DIY(DoItYourself)-Bio
The easy access to increasingly powerful biotechnological tools promotes the devel-
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
opment of the so called DoItYourself-bio that is a global movement spreading the use
of biotechnology beyond the traditional academic and industrial institutions and into
the lay public. The idea for a popular movement of amateur biotechnologists began
around 2000, after a working draft of the human genome was completed by the Human
Genome Project [13]. In 2005, Rob Carlson described how he built a molecular biology
laboratory in his garage buying all the equipment required easily on-line [14]. At the
same time the DIYbio.org was launched on the web, organizing events and perfor-
mances with simple biological experiments. Carlson and people working at the origin
of DIY-bio were experts in the field of synthetic biology, but in just a few years, DIY-
bio has become a community of hobbyists that has become organized and set up dedi-
cated laboratories in commercial spaces, giving rise to the so called “community labs”.
These labs usually sustain themselves on volunteers, membership donations, and paid
classes [13]. Most of the DIYers do their work within shared labs, and, even when they
work in their home exclusively they share and discuss their work online, keeping other
community members informed about their research.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat 11
Lately, DIYers have also attracted private capital and contributed to biotechnology
development as technical and scientific achievements, new business achievements, and
contribution to public awareness and education, promoting DIYbio from being a spon-
taneous movement of hobbyists to a movement of valuable stakeholders in biotechnol-
ogy and synthetic biology.
Moreover, all the equipment and reagents can be readily available in laboratories,
such as the ones where the DIY-bio community is working: community labs, hack-
erspaces, academic lab and corporate/government laboratories. Therefore, all the raw
materials and equipment required to handle living organisms for both good and malev-
olent purposes, and to manipulate, enhance and create new pathogens or toxins, are re-
ally simple to source.
Know-How Expertise
Having access to technological devices/equipment and biological material is not
enough to manipulate living organisms. In fact, even though synthetic biology is de-
skilling DNA manipulation, making processes more systematic and more reproducible,
it is still hard to reproduce biological experiments and re-create simple living organ-
isms and personal skills do not become irrelevant [15]. In fact, expertise and trainings
are also needed.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
In particular, what is called tacit knowledge is essential and it refers to the typical
trial and error problem solving and the master apprentice style relationship. Usually
this is a long process that happens working shoulder to shoulder with expert scientists
and provides tricks and tools not easily available without expertise.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
12 V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat
All these passages are tricky and pose really hard challenges and, even though syn-
thetic biology is de-skilling DNA manipulation and biotechnology in general, there are
not standardized procedures for every single passage and especially tricky ones require
really specific skills and knowledge. Therefore, some biological techniques are not
necessarily becoming easier, as demonstrated by the fact that a lot of experiments
should be repeated many times before getting a valuable result.
These skills and knowledge are usually used for good purposes, as described above
(second paragraph), but these technologies are considered dual-use. In fact, if malevo-
lent people manage them, synthetic biology could be used to create new patho-
gens/toxins or enhance the virulence and toxicity of existing ones. Moreover, new
technologies could bring to spread pathogens as a weapon to infect high number of
people, or to attack crops or livestock, as will be discussed below.
Lastly, there could be the risk of nefarious actors seeking to do harm with the tools
available in the community labs or in their own home/garage laboratory. Working in a
community lab is controlled by strict rules about access, suspicious activities, danger-
ous pathogens, that can put at risk the entire lab [13].
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
“Synthetic biology strives to make the engineering of biology easier and more predict-
able.” [11]
One of the main fears about synthetic biology is that this discipline is de-skilling
biology, biotechnology and DNA manipulation. These phenomena could give rise to
pathogen/toxins enhancement or creation if managed by wrong, malicious hands and
used by terrorists to produce biological weapons. Moreover, the continuous growth of
DIY-bio offers more and more accessibility to tools, equipment, and dual-use
knowledge to bioterrorist seeking to do harm. DNA synthesis is becoming cheaper and
can be outsourced, easily ordered by mail and delivered wherever you need it, to make
it easier also for biohackers to get it synthesized and used to radically redesign new
pathogens/toxins. Terrorists pursuing biological weapons for high consequence, mass
casualty attacks able to incapacitate people, livestock and crops, could use these new
pathogens/toxins or the enhancement of already existing ones. But, even though it
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat 13
looks easy to get raw materials and a bit harder to gain knowledge to modify properly
and consciously living organisms, how is it to weaponize biological material?
Bio-Weaponization Issues
1. Physical decoupling of the design of engineered genetic material from the ac-
tual construction and resulting use of the material (DNA can be readily de-
signed in one location, constructed in a second place and delivered to a third);
and
2. Effective alternative route to those who would seek to obtain specific patho-
gens for the purpose of doing harm.
could be used to obtain the genetic material encoding these pathogens. As previously
mentioned, additional expertise is required to obtain pathogens from DNA sequences,
but this work might not be subject to any review or oversight through existing safety
framework [3].
Once pathogens or toxins are obtained by malevolent hands, the last step to make
pathogens or any biological agents dangerous for people, animals or crops, is the
weaponization of biological material, in order to spread it and/or harm the largest num-
ber of people as possible.
This last step involves, first of all, the scale-up and storage of the agent in a stable
manner, and developing a suitable mechanism to disperse the product properly [16]. In
order to be successful without destroying the pathogens, or person undertaking these
activities, each of these individual steps are likely to require specific information, ex-
pertise and ‘know-how’ in varying degrees.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
14 V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat
Bioweapon programs in the US and USSR lasted many years and were very well
funded; however, they were not successful in achieving their goals of producing a
working weapon. The Soviet program was successful in its early stages, where they de-
veloped bombs and spray tanks working with classical agents, but their work on devel-
oping weapons based on new pathogens that did not exist in nature only reached the
research and development stage. Moreover, they failed in producing bioweapons-
specific ballistic or cruise missiles. On the other hand, the US program was also able to
weaponize classical agents and produce a few bombs and spray tanks, but none of the
weapons developed met military requirements. One explanation for these failures is
that unlike nuclear and chemical weapons, which use materials that are quite stable and
have predictable behavior, biological weapons rely on microorganisms that are living,
can mutate, and are sensitive to their environment and to the way in which they are
handled [23].
Another example of biological weapon program was Aum Shinrikyo. Aum Shin-
rikyo started as a peaceful cult that provided a livelihood to its founder, Chizuo
Matsumoto, while purporting to help followers to achieve enlightenment. After years of
yoga classes and meditation, this movement, established to save the world, turned into
an apocalyptic cult and started both biological and chemical programs to pursue its
plans of destruction. Aum strove for both biological and chemical weapon programs
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
and different attacks were performed with both types of newly-created weapons. It
found a successful path for developing chemical weapons causing 13 deaths and about
6,000 injuries during a sarin attack at the Tokyo subway in 1995. Aum also tried to in-
duce harm using biological agents, such as the botulinum toxin produced by Clostridi-
um botulinum and anthrax from Bacillus anthracis, but it did not develop effective bio-
logical weapons, maybe because chemical weapons capabilities are more accessible
than biological capabilities as a means of killing substantial numbers of people. As al-
ready mentioned, biological weapons require more tacit knowledge, while chemists
may be adequately positioned to develop weapons after consulting relevant documenta-
tion [18].
These experiences show how hard the creation of massive weapon using biological
material is and, especially, how difficult the weaponization process and the successful
spread of pathogens and toxins are to cause massive death are.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat 15
Conclusion
1. Prevention is one of the first steps: trying, for example to identify unauthor-
ized possession, loss, theft, misuse or diversion of biological hazardous
agents;
2. Screening of customers by DNA synthesis companies;
3. Oversight of new biotechnologies, DNA synthesis technology and its com-
mercialization;
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Among the risks mentioned above, it is crucial to recall that since synthetic organ-
isms could be radically different from those known today when released into the envi-
ronment (accidentally or on purpose), they could have unintended detrimental effects
on the environmental or on human health. Such (micro)organisms might have unpre-
dictable and emergent properties when released in the environment, even though right
now it is easier for synthetic organisms to survive in an artificial environment than in a
natural environment.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
16 V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat
Therefore, law enforcement personnel must work closely with public health agen-
cies to prevent, identify and investigate potential biological threats; ultimately, it is the
specific responsibility of law enforcement authorities to protect individuals and com-
munities against threats that may arise through the misuse of this promising technolo-
gy [3].
It will be really important, among other things, to monitor developments and ad-
vances in detection technologies, because they could contribute to the process of inves-
tigating alleged violations, thus reinforcing the norm, or could be used for identifying
potential threats in a rapid and effective manner.
In support of all these considerations, it highlights the crucial role of the Biological
and Toxin Weapons Convention as reported by Revill and Jefferson (2013) [21], in
particular under Article XII of the BWC, as it has become an established practice to
conduct a quinquennial review of the Convention which takes “into account any new
scientific and technological development relevant to the Convention”. In particular,
science and development potential uses contrary to the provisions of the Convention
should be surveyed. Moreover, measures for strengthening national biological risk
management, voluntary codes of conduct and other measures to encourage responsible
conduct by scientists academia and industry should be promoted, as well as education
and awareness-raising about risks and benefits of life sciences and biotechnology. Last-
ly, science and technology-related developments relevant to the activities of multilat-
eral organizations such as the World Health Organization and the World Organization
for Animal Health (OIE) should be put in the scenario as well.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
In this complicated arena, it is important to consider also DIYers that come from
all walks of life, that may lack formal education, and are not overseen by institutional
reviewer boards; the policy and science communities fear that they may be more likely
to cross ethical boundaries, even though the DIYbio community is trying to spread a
culture of responsibility (DIYbio Code of Ethics). Moreover, biosafety and environ-
mental concerns arose about DIYbio, because hazardous living organisms could be ac-
cidentally released in the environment and harm DIYers, people or the environment. In
contrast to this, it is important to specify that DIY-bio community is not an anonymous
threat to public biosafety and biosecurity. Rather the movement provides a new channel
for public science engagement and education and a broad opportunity for economic and
scientific innovation. The community is already actively engaged in developing codes
of conduct, safety protocols, and discussing the various regulations that may affect it.
To harness this community’s potential to provide biotech innovation, education, and
awareness, policymakers should treat the community as a valued stakeholder within the
larger biotech community and include it in the future discussions [13].
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat 17
Even if it is really hard to build a bioweapon, but not impossible, and a biological
weapon was disseminated successfully, the outcome of an attack would be affected by
factors like the health of the people who are exposed and the speed and manner with
which public health authorities and medical professionals detect and respond to the re-
sulting outbreak. A prompt response with effective medical countermeasures, such as
antibodies and vaccination, can significantly blunt the impact of an attack [25]. (Jeffer-
son. the myth and realities of synthetic bioweapons).
Therefore, monitoring to prevent also smaller, but not less frightening and hazard-
ous, unintentional or malicious biological threats and getting prepared in case of bio-
logical threat, natural or not, are two of the most important steps to pursue in order to
protect men and environment.
References
[1] https://www.britannica.com/science/genetic-engineering.
[2] UN Convention on Biological Diversity, Art. 2.
[3] Bügl H., Danner J.P., Molinari R.J., Mulligan J.T., Park H.O., Reichert B., Roth D.A., Wagner R.,
Budowle B., Scripp R.M., Smith J.A., Steele S.J., Church G., Endy D., DNA synthesis and biological
security, Nature Biotechnology, 25 (2007), 627–629.
[4] http://syntheticbiology.org/.
[5] Gillum D., Synthetic Biology: Considerations for Biosafety Professionals, https://absaconference.org/,
2015.
[6] Locke S., How scientists are creating synthetic life from scratch, Vox, 2014.
[7] Specter M., A Life of Its Own, Annals of Science (The New Yorkers), 2009/02/28.
[8] Cello J., Paul A.V., Wimmer E., Chemical synthesis of poliovirus cDNA: generation of infectious virus
in the absence of natural template, Science, 297 (2002), 1016–1018.
[9] Gibson D.G., Glass J.I., Lartigue C., Noskov V.N., Chuang R.Y., Algire M.A., Benders G.A., Monta-
gue M.G., Ma L., Moodie M.M., Merryman C., Vashee S., Krishnakumar R., Assad-Garcia N., An-
drews-Pfannkoch C., Denisova E.A., Young L., Qi Z.Q., Segall-Shapiro T.H., Calvey C.H., Par-
mar P.P., Hutchison C.A. 3rd, Smith H.O., Venter J.C., Creation of a Bacterial Cell Controlled by a
Chemically Synthesized Genome, Science, 329 (2010), 52–56.
[10] Annaluru N.1, Muller H., Mitchell L.A., Ramalingam S., Stracquadanio G., Richardson S.M., Dy-
mond J.S., Kuang Z., Scheifele L.Z., Cooper E.M., Cai Y., Zeller K., Agmon N., Han J.S., Hadjithom-
as M., Tullman J., Caravelli K., Cirelli K., Guo Z., London V., Yeluru A., Murugan S., Kandavelou K.,
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Agier N., Fischer G., Yang K., Martin J.A., Bilgel M., Bohutski P., Boulier K.M., Capaldo B.J.,
Chang J., Charoen K., Choi W.J., Deng P., DiCarlo J.E., Doong J., Dunn J., Feinberg J.I., Fernandez C.,
Floria C.E., Gladowski D., Hadidi P., Ishizuka I., Jabbari J., Lau C.Y., Lee P.A., Li S., Lin D.,
Linder M.E., Ling J., Liu J., Liu J., London M., Ma H., Mao J., McDade J.E., McMillan A.,
Moore A.M., Oh W.C., Ouyang Y., Patel R., Paul M., Paulsen L.C., Qiu J., Rhee A., Rubashkin M.G.,
Soh I.Y., Sotuyo N.E., Srinivas V., Suarez A., Wong A., Wong R., Xie W.R., Xu Y., Yu A.T.,
Koszul R., Bader J.S., Boeke J.D., Chandrasegaran S., Total Synthesis of a Functional Designer Eukar-
yotic Chromosome, Science, 344 (2014), 55–58.
[11] The Royal Academy of Engineering, Synthetic Biology: Scope, applications and implications, London,
2009.
[12] Tumpey T.M., Basler C.F., Aguilar P.V., Zeng H., Solórzano A., Swayne D.E., Cox N.J., Katz J.M.,
Taubenberger J.K., Palese P., García-Sastre A., Characterization of the reconstructed 1918 Spanish in-
fluenza pandemic virus, Science, 310 (2005), 77–80.
[13] Grushkin D., Kuiken T., Millet P., Seven Mith & Realities about Do-It-Yourself Biology, Wilson Center,
Washington DC, 2013.
[14] Carlson R. Splice it yourself, Wired 05/01/05 (2005).
[15] Jefferson C., Lentzos F., Marris C., Synthetic biology and biosecurity: challenging the “myths”, Fron-
tiers in Public Health, 2 (2014), 115.
[16] Leitenberg M., The Problem of Biological Weapons, Department of Security and Strategic Studies,
Swedish National Defence College, Stockholm, 2004.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
18 V. Baldo / Synthetic Biology, Microbiology, DIY Bio, . . . : How Easy It Is to Create a Bio Threat
[17] Wheelis M., Sugishima M., Dando M., Wheelis M., Rozsa L., Terrorist use of biological weapons,
Deadly Cultures (2006), Cambridge MA Harvard University, 284–304.
[18] Danzig R., Sageman M., Leighton T., Hough L., Yuki H. et al., Aum Shinrikyo Insights into How Ter-
rorists Develop Biological and Chemical Weapons, Washington, DC, Center for a New American Se-
curity, 2011.
[19] Tucker J.B., Toxic Terror: Assessing Terrorist Use of Chemical and Biological Weapons, Cambridge,
MAMIT Press, 2000.
[20] Vogel K.M., Bioweapons proliferation: Where science studies and public policy collide, Social Studies
of Science, 36 (2006), 659–690.
[21] Revill J., Jefferson C., Tacit knowledge and the biological weapons regime, Science and Public Policy,
41 (2014), 597–610.
[22] Ilchmann K., Revill J., When push comes to shove, Science and Engineering Ethics, 2013, October
2013. http://link.springer.com/article/10.1007/s11948-013-9479.
[23] Jefferson C., Lentzos F., Marris C., WORKSHOP REPORT Synthetic Biology and Biosecurity: How
Scared Should We Be? Department of Social Science, Health & Medicine King’s College London,
2014.
[24] https://www.cdc.gov/anthrax/bioterrorism/threat.html.
[25] Lentzos F., Jefferson C., Marris C., The myths (and realities) of synthetic bioweapons, Bulletin of The
Atomic Scientists, 18 September 2014.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
The author(s) of this publication is/are solely responsible for its content. This
publication does not reflect the opinion of the publisher. The publisher cannot be held
liable for any loss or damage that may occur because of this publication.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats 19
M. Martellini and J. Rao (Eds.)
IOS Press, 2017
© 2017 The authors and IOS Press. All rights reserved.
doi:10.3233/978-1-61499-802-0-19
Abstract. This chapter explores mutually reinforcing steps that governments in the
United States and Europe have taken to counter the Islamic State (IS) on- and of-
fline. It argues that while operations since 2014 have significantly reduced the
group’s attractive power and military capacity, additional measures against the
digital and physical caliphates can and should be taken. The chapter outlines strat-
egies that would build on recent successes against IS, recognizing that the group’s
ultimate demise will be a long-term project requiring measures beyond what West-
ern states can or should do alone.
Introduction
The Islamic State (IS) has distinguished itself from otherwise analogous groups by
dominating both physical and digital territory.2 Since at least 2014, IS has acted more
like a proto-state than a typical terrorist organization, taking territory, establishing a
formal army, and governing millions of people.3 Meanwhile, the group has become the
undisputed heavyweight champion of online jihad, producing and disseminating pro-
fessional-grade media products to a global audience at an unprecedented rate. This has
led to the emergence of what analysts have variously called the digital or virtual cali-
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
phate.4
1
Politics Department, Washington and Lee University, Lexington, VA. USA; E-mail: canteys@wlu.edu.
2
Cohen, Jared. “Digital Counterinsurgency: How to Marginalize the Islamic State Online.” Foreign Affairs,
Vol. 94, No. 6. 2015.
3
Cronin, Audrey Kurth. “ISIS Is Not a Terrorist Group.” Foreign Affairs, Vol. 94, No. 2. 2015.
4
Atwan, Abdel Bari. Islamic State: The Digital Caliphate. University of California Press. 2015; Seamus
Hughes, “Countering the Virtual Caliphate.” Written testimony before the US House of Representatives For-
eign Affairs Committee. 2016; Harleen Gambhir, “The Virtual Caliphate: ISIS’S Information Warfare.” In-
stitute for the Study of War. 2016.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
20 S. Cantey / Strategies for Undermining the Digital and Physical Caliphates
The logic that applies to the virus, however, applies to the remedy. Just as early
success online contributed to early success on the battlefield, and vice-versa, more re-
cently policies that have undermined the physical caliphate have undermined the digital
one. Consequently, in recent years the stream of foreign fighters and other supporters to
Iraq and Syria has receded, diminishing the capacity and morale of IS, as well as the
attractiveness of the idea for which it fights.
This chapter elaborates upon these observations in two principal ways. First, it ex-
plains the importance of physical territory to IS identity and the challenges that losing
territory creates for the group on- and offline. This section evaluates policies currently
underway to attack the nexus of the digital and physical caliphates. Second, the chapter
identifies strategies that would build on recent success. This section engages difficult
questions about the ongoing fights in Syria and Iraq, and it proposes further refining
existing approaches to counter-narratives. The chapter concludes by putting the
measures addressed throughout into broader strategic context, arguing that defeating IS
will ultimately depend on more than what Western states can or should do alone.
From the declaration of the caliphate in June 2014 until May 2016, IS asserted le-
gitimacy on the basis of its control and governance of physical space.5 In the first issue
of the English-language magazine Dabiq, published in July 2014, the group called for
Muslims around the world to emigrate to IS-held territory in the Middle East. “Rush O
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Muslims to your state…The land is for the Muslims… hijrah to the land of Islam is ob-
ligatory.”6 This emphasis on physical geography and the auto-translocation of believers
has been central to the group’s messaging online.
Focus on territorial governance has also been constant. Though violence is perhaps
the most recognizable characteristic of IS propaganda, a study of more than 9,000 visu-
al media products from January 2015 to July 2016 found that non-violent images were
even more common. 7 A majority of images focused on religious practice, policing,
helping the poor, regulating commerce, and other quotidian affairs of state. Because IS
believes that governance generates legitimacy, it has sought to attract families, not just
fighters. For some the message has been “Come and fight and die for God;” for others
it has been “Come and live under the caliphate.”
5
Gambhir, Harleen. “The Virtual Caliphate: ISIS’S Information Warfare.” Institute for the Study of War.
2016.
6
Dabiq, Issue 1, p. 11.
7
Milton, Daniel. “Communication Breakdown: Unraveling the Islamic State’s Media Efforts.” Combating
Terrorism Center at West Point. 2016.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Cantey / Strategies for Undermining the Digital and Physical Caliphates 21
Responding to IS advances across northern Syria and Iraq, and recognizing the im-
portance of physical territory to the group’s attractive power, in 2014 the United States
launched Operation Inherent Resolve. Over the next three years, coalition partners
dropped tens of thousands of bombs on IS-held territory; supplied local partners with
intelligence, logistical support, and weaponry; and committed special operations forces
and limited ground troops to roll back IS-held physical space.
These kinetic measures inflicted heavy losses on the group. By the end of 2016, of-
ficials claimed that up to 50,000 IS fighters had been killed in action, numbers that they
called conservative.8 According to Defense Department statistics, by the same time IS
had lost more than 60% of the territory it once held in Iraq and 28% of the territory it
once held in Syria.9 Military pressure has continued into 2017. As this volume goes to
press, the Iraqi-led campaign to liberate Mosul has made significant progress, and Iraqi
officials claim that IS now controls just 7% of Iraq. Preparations for the campaign to
liberate Raqqa are underway.
As battlefield losses piled up for IS in late 2015 and 2016, the narrative of success
that the group continued to convey online became increasingly disconnected from facts
on the ground. Claims of expansion became less credible as both the amount of territo-
ry that the group controlled and its ability to broadcast its message receded. IS visual
media output peaked in August 2015 with more than 700 products. By August 2016,
production had fallen to under 200.10
The world noticed. What was once a flood of foreign fighters to the caliphate,
peaking at some two thousand recruits per month in 2015, has since become a slow-
moving stream.11 Recent estimates suggest that IS is attracting as few as 50 recruits per
month to Iraq and Syria, far from the number needed to replace battlefield casualties.
This reduced inflow of foreign fighters has exacerbated a range of problems – none
more important than military capacity – in what has become a dwindling physical cali-
phate.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
For certain fighters, none of this will matter. Some fraction of the men and women
fighting for IS actively seek martyrdom, where death in the service of God is the pri-
mary goal. But this is not the only reason for which people fight. Interviews with for-
mer IS members reveal that many were inspired by the group’s early momentum and
wanted to play an active role in history. Others sought brotherhood or a sense of com-
munity, or they believed that life under sharīʿah would be utopian.12 For these people,
military losses can be and often have been demoralizing.
8
Starr, Barbara. “Military: 50,000 ISIS fighters killed.” CNN Politics. December 9, 2016.
9
https://www.defense.gov/Portals/1/features/2014/0814_iraq/docs/20161209_ISIL%20Areas%20of%20
Influence_August%202014%20through%20November%202016_Map.pdf?ver=2017-01-06-094734-253.
10
Milton, Daniel. “Communication Breakdown: Unraveling the Islamic State’s Media Efforts.” Combating
Terrorism Center at West Point. 2016.
11
Witte, Griff, Sudarsan Raghavan, and James McAuley. “Flow of Foreign Fighters Plummets as Islamic
State Loses Its Edge.” The Washington Post. September 9, 2016.
12
Neumann, Peter. “Victims, Perpetrators, Assets: The Narratives of Islamic State Defectors.” The Interna-
tional Center for the Study of Radicalization and Political Violence. 2015.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
22 S. Cantey / Strategies for Undermining the Digital and Physical Caliphates
Beyond attacking military positions and rank-and-file soldiers, the United States
and coalition partners have targeted key individuals at the nexus of the digital and
physical caliphates. Counterterrorism measures, including but not limited to drone
strikes, have eliminated more than a dozen high-ranking IS media specialists from the
physical – and therefore also from the digital – battlefield. These include individuals
that followers of IS developments will recognize, like IS spokesman Abu Muhammad
al-Adnani and Abu Muhammad al-Furqan, as well as lesser-known but still influential
virtual combatants like Junaid Hussain, Neil Prakash, and Reyaad Khan. 13 Though
these individuals have been replaced in the IS hierarchy, their talents have not. Reports
suggest that officials “have been surprised that the Islamic State has failed to replace
[such individuals] with hackers of comparable ability.”
Beyond the physical world, the United States and coalition partners have targeted IS
online. Reductive strategies have sought to reduce the amount of extremist material
available to potential sympathizers by removing content from the web. Additive strate-
gies have sought to promote online alternatives to extremist messaging, drawing on a
range of voices and techniques.
Reductive strategies have generally taken two forms: the removal of entire content
distribution platforms and the removal of specific content. Analysts familiar with IS
websites know that these are as ephemeral as they are prolific, always subject to attack
by governments, private-sector actors, and activist hackers. Other content distribution
platforms, such as the short-lived IS smartphone app “Dawn of Glad Tidings” (or simp-
ly “Dawn”) have also been subject to fast removal from the web.
The most successful online campaign against IS has involved Twitter. In 2014 and
2015, the group and its sympathizers used the popular microblog to great effect, hijack-
ing hashtags and posting up to 200,000 tweets per day.14 In response, Twitter partnered
with governments and private-sector entities, drawing on dedicated human capital and
data analytics to disrupt IS use of the platform. Technology used by companies like
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Despite much success, reductive strategies will not cripple the digital caliphate: IS
is likely to remain strong online for the foreseeable future. Indeed, in recent years the
group has adapted, spreading its presence far and wide across social media platforms.
IS now has an active online presence on Facebook, Google+, Instagram, justpaste.it,
13
Goldman, Adam and Eric Schmitt. “One by One, ISIS Social Media Experts Are Killed as Result of
F.B.I. Program. The New York Times. November 24, 2016.
14
Greenberg, Jon. “Does the Islamic State Post 90,000 social media messages each day?” Politifact.com.
February 19, 2015.
15
Woolf, Nicky. “Twitter suspends 235,000 accounts in six months for promoting terrorism.” The Guardi-
an. August 18, 2016.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Cantey / Strategies for Undermining the Digital and Physical Caliphates 23
Kik, last.fm, Silent Circle, Snapchat, surespot, Telegram, Threema, Tublr, Twitter,
WhatsApp, WordPress, Quora, Zello, and other platforms. All of this is in addition to
its presence on the dark web. The group’s most prominent social media presence today
is on Telegram, an encrypted app that allows for the creation of private message groups
of up to 5,000 and broadcasting to unlimited audiences. IS could abandon Telegram in
favor of another tomorrow.
In the United States, the recently-formed Global Engagement Center (GEC) is the
best example of an entity pursuing an additive approach to counter IS online. Formed
in March 2016, the GEC describes itself as “an interagency [organization]…charged
with coordinating U.S. counterterrorism messaging to foreign audiences.” 16 For the
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
GEC, this involves work in four core areas: partnerships, data analytics, content, and
interagency engagement. Drawing from the GEC website, partnerships seek to em-
power “positive messengers … to deliver messages that resonate with at-risk popula-
tions. [Partners] including NGOs, schools, young people, social and civil society lead-
ers, religious leaders, governments, and others.” Reliance on data analytics seeks to
guide and inform messaging efforts, including by measuring their effectiveness. In
terms of content, the GEC is pursuing collaborative, thematic campaigns with counter-
IS coalition nations and others, where “direct engagement with violent extremists has
been reduced in favor of partner-driven messaging and enhancing [partner] content ca-
pabilities.” Finally, interagency engagement refers to the GEC’s coordination of opera-
tions across various United States national security agencies.
16
https://www.state.gov/r/gec/.
17
http://vortex.univie.ac.at/news/.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
24 S. Cantey / Strategies for Undermining the Digital and Physical Caliphates
researchers at the University of Vienna who monitor and analyze Arabic-language ex-
tremist content online. VORTEX has done important work in a number of areas, in-
cluding by partnering with organizations and governments abroad. For example, in re-
cent years the group partnered with the Nahdlatul Ulama (NU), an Indonesian Muslim
organization claiming more than 50 million members, to produce and promote theolog-
ically rigorous alternatives to IS narratives across Southeast Asia. More recently, the
group has produced professional-grade media products with the look and feel of IS
productions, but that convey very different messages. Some of these have drawn on the
experiences of former extremists, including those who have traveled to the physical ca-
liphate.
For all of the recent success in battling IS on- and offline, formidable challenges re-
main. Recent history has proven that military gains against insurgencies, even dramatic
gains, can be fleeting. The existence of IS, which rose from its own ashes in 2011, is
testament to this fact. Moreover, regardless of how long dismantling the physical cali-
phate takes, the digital caliphate appears set to endure.
This means that the coalition fighting IS must constantly reevaluate its on- and of-
fline strategies. To that end, this section identifies key questions and tradeoffs that poli-
cymakers must consider going forward. In doing so, it proposes policy refinements that
would build on recent success.
One of the key obstacles to articulating end-game scenarios for the conflicts in Syria
and Iraq has been identifying the role that an important ethnic minority – the Kurds –
will play in regional politics when (or even before) violence in the region subsides.
This unresolved question is complicated by the fact that Kurdish armed groups have
been exceedingly important to the fight. In Iraq, the Peshmerga have been essential to
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
rolling back IS-held territory, especially in and around Mosul. In Syria, the Kurdish
People’s Protection Units (YPG) are the United States’ preferred force to dislodge IS
from Raqqa.
Tensions also exist between the Kurds and the governments in Syria and Iraq. In
addition to fighting IS, the YPG has battled the Assad government since the war in Syr-
ia began in 2011. Though Iraqi Kurdistan and Baghdad recognized each other after the
fall of Saddam Hussein in 2003, disagreements over oil rights and revenue sharing
flared in 2011 and 2012. The unequal distribution of Iraqi oil, and its disproportionate
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Cantey / Strategies for Undermining the Digital and Physical Caliphates 25
share in Iraqi Kurdistan, mean that Baghdad is unlikely to be receptive to Kurdish in-
dependence.
In this context, the Western-led anti-IS coalition faces important questions. First,
should the YPG lead the fight to dislodge IS from Raqqa? Second, to what extent are
YPG operations in Syria and Peshmerga operations in Iraq likely to exacerbate ethnic
tensions? Third, should the United States support an independent Kurdish state in re-
turn for Kurdish efforts during the war? These questions are interrelated and involve
tensions between short- and long-term objectives.
Because the United States and its international partners have resisted sending large
numbers of ground forces into Syria, and unless that reality changes under President
Trump, the Western-led anti-IS coalition will have few options to combat IS on the
ground. This contrasts with the situation in Iraq, where the United States has more than
a minimal troop presence and coordinates military operations with the Iraqi army. If
ever military coordination with the Assad regime were considered, despite its war
crimes, those prospects have waned or disappeared entirely since American airstrikes
against the Shayrat airbase in April 2017.
In a military-strategic environment without any good options, the entity best posi-
tioned to combat IS in Raqqa is the Syrian Democratic Forces (SDF), a YPG-led coali-
tion that formed in 2015. While this 80,000-plus-member force has shown promise, in-
cluding through battlefield success, its ethnic composition complicates prospects for
clearing – and especially holding – territory. Residents of Raqqa, an overwhelmingly
Sunni Arab city, have reason to be skeptical of Kurdish territorial ambitions, as well as
the character of YPG, and thus SDF, military operations. They like others in the region
recognize that Kurdish military operations are not altruistic. Kurdish generals and polit-
ical officials have indicated intent to hold territory that they clear in the anti-IS cam-
paign.18
To mitigate this problem, several steps should be taken. First, policymakers and
regional partners should push for the continued integration of Arab, especially Sunni
Arab, forces into the SDF. Ideally these would be Syrian nationals, but even the tempo-
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
rary integration of conventional forces from regional Sunni Arab armies would be
worthwhile. Such continued integration would enhance the ratio of Arabs to non-Arabs
in the SDF, reducing the (correct) sense among most Syrians that the SDF is Kurdish-
led. This could make local populations, especially in Raqqa, more receptive to SDF
clear-and-hold operations.
Second, the United States and others should provide increasingly lethal weaponry
to the SDF, despite objections from Turkey. This is not a policy decision that should be
taken lightly, especially given YPG ties to the PKK. The step would undoubtedly com-
plicate diplomatic relations with Turkey, which over the long term are a strategic pri-
ority for the United States and other Western powers. Though unlikely, it could lead to
the expulsion of United States military personnel and even the closing of United States
military bases in the country. That said, unless the United States and others change
course and send ground forces to Syria, alternative approaches seem infeasible. Though
18
George, Susannah and Qassim Abdul-Zahra. “Mosul Fight is Already Redrawing the Map of Northern
Iraq”. Associated Press. August 27, 2016.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
26 S. Cantey / Strategies for Undermining the Digital and Physical Caliphates
repairing relations with Turkey would take time, diplomatic, economic, and other tools
are available for this purpose. As the symbolic capital of the caliphate, and the principal
city from which IS plots attacks against Western cities and interests, Raqqa must be
cleared.
Ethnic tensions similar to those that complicate politics and military operations in
Syria also play in Iraq, though tensions on that side of the border have flared more be-
tween Kurds and Shia than between Kurds and Sunnis. The Peshmerga have earned a
deserved reputation for being excellent fighters, though often at the expense of Shia
militias in addition to IS. What is clear to many analysts of the broader fight in Iraq is
not necessarily clear to Kurdish commanders on the ground. The anti-IS coalition will
be most effective if the Kurds play a support role to the Iraqi army and Sunni Arab
forces. This is especially true in the battle for Mosul, a city estimated to be around 60%
Sunni. As in Raqqa, Kurds will play a key role in clearing the city. Attempts to hold
non-Kurdish areas would be counterproductive.
Refining Counter-Narratives
As outlined above, recent years have seen improvements both in the crafting of mes-
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
sages designed to undermine IS narratives and their on- and offline delivery. Increased
focus on local languages, especially Arabic, and partnerships with organizations and
individuals familiar with relevant populations have been especially important. Never-
theless, policy refinements involving target audiences, messages, and messengers could
further improve this aspect of the struggle against IS.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Cantey / Strategies for Undermining the Digital and Physical Caliphates 27
least be informed. Though some will misuse information, on balance society will bene-
fit. This analogy can be drawn out further to the distribution of birth control. Students
may have more sex if schools pass out condoms, but passing out condoms is good poli-
cy because it raises awareness of the risks of unsafe sex.
Though well-intentioned, this analogy falls apart in the present case. The differ-
ence is that while nearly all students will eventually be exposed to sex, only a small
minority of people will be exposed to IS narratives. Some will protest that IS has dom-
inated headlines in recent years, but this rebuttal misses the point. Exposure to the news
is not exposure to the narrative, which in most cases requires seeking IS content online.
The risk of proactively pushing back against IS arguments, then, especially in popula-
tions unlikely to be exposed to them in the first place, is that doing so can generate cu-
riosity that may never have been piqued. This can generate a search for explanations
that may otherwise never have been sought.
To be sure, likely exposure to IS narratives will vary by time and place, where
proximity to IS-held territory may be the best predictor. Though presenting counter-
narratives to people living under IS control is next to impossible, focusing efforts on
cities and towns recently liberated from IS control is essential. In some ways, it may be
useful to think about geographic counter-messaging in terms of concentric circles ema-
nating from IS-held population centers. Physical proximity to the group likely corre-
lates with exposure to its message. After all, IS indoctrination in its most potent form
happens offline. IS dominates what people living under its control see, read, watch, and
hear.
low).
Pushing back against IS theological claims is right and proper. The group is theo-
logically rigorous in its own publications and media products, and it would be a mis-
take to cede this territory or let it go unaddressed. At the same time, the content of me-
dia products that seek to counter IS narratives can and should be expanded. Content
need not focus exclusively or even primarily on theology: a range of alternatives is
available. Footage of coalition military advances (especially by Sunni Arab groups),
testimonials from people who have escaped the caliphate, and confessions of former IS
fighters represent just a few ways that IS can be accurately, if unflatteringly, portrayed.
Real-life depictions of life under the caliphate would likely go further to dissuade po-
tential sympathizers than religious counter-narratives would alone.
Finally, as alluded to above, the messenger matters. The key here is that assump-
tions about which messengers matter in which contexts should be revisited. Organiza-
tions like VORTEX have acted on observations that by now seem intuitive: engage-
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
28 S. Cantey / Strategies for Undermining the Digital and Physical Caliphates
ment by Western governments and others who are not Muslim and do not speak Arabic
will be less effective than local alternatives with local credibility. Consequently, VOR-
TEX and others have partnered with scholars of Islam who are fluent in Arabic, from
the Middle East and elsewhere, to directly rebut specific IS claims regarding religious
doctrine and the group’s claim to religious authority generally. This has unequivocally
been an improvement over past approaches involving direct engagement with extremist
claims by Western governments.
Still, refinements can and should be made, and those crafting counter-narratives
may have something to learn from IS in this regard. A recent study by West Point
found that fewer than 1% of IS media products involved leadership-level figures. 19 Ac-
cording to the report, “Islamic state releases contain lots of “average” fighters convey-
ing the group’s message. They may be Iraqi and Syrian locals speaking in Arabic or
recently arrived foreigners from abroad… This gives the whole Islamic State enterprise
an aura of inclusiveness and breadth.” Expanding the range of counter-narrative mes-
sengers to include normal Muslims without special training or unique claims to credi-
bility may also prove fruitful.
Conclusion
This chapter has addressed strategies for undermining the digital and physical cali-
phates, arguing that policymakers must be aware of how these are connected to effec-
tively counter IS. The measures addressed throughout have been increasingly effective
over time and should be continued in current or refined form, as outlined above. As
governments continue to adapt, building on the momentum of recent successes, there is
reason to believe that the physical caliphate can be dismantled in the short to medium
term. This does not mean that all territory in Iraq or Syria will be cleared of IS mem-
bers or sympathizers; that will be a long-term objective. It does mean, however, that
claims to legitimacy based on territorial governance will not be credible. In that con-
text, attracting individuals to specific territory will be a tough sell.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Going forward, policymakers must recognize that gains against IS cannot be en-
during in the absence of broader changes unrelated to kinetic or online operations. Dis-
lodging IS from cities, even strategic cities like Mosul and Raqqa, will not be the most
difficult part of defeating the group. In this sense, the strategies discussed here have
been tactical. While important for reducing IS momentum and liberating millions from
the group’s brutal reign, they have not touched on the underlying grievances and condi-
tions that enabled IS to take root and flourish. The related challenges of poor govern-
ance, impunity, weak states, corruption, and sectarianism, among others, will require
long-term commitments. The United States will have a role to play, as will other states
outside the region, but primary responsibility for addressing these problems must lie
with the governments and peoples that they most affect. Rolling back IS can create
space for the development and implementation of broader solutions. It will not be a
panacea.
19
Milton, Daniel. “Communication Breakdown: Unraveling the Islamic State’s Media Efforts.” Combating
Terrorism Center at West Point. 2016.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Cantey / Strategies for Undermining the Digital and Physical Caliphates 29
References
A.B. Atwan. Islamic State: The Digital Caliphate. University of California Press. 2015.
J. Cohen. Digital Counterinsurgency: How to Marginalize the Islamic State Online. Foreign Affairs 94, 6
(2015).
A.K. Cronin. ISIS Is Not a Terrorist Group. Foreign Affairs 94, 2 (2015).
H. Gambhir. The Virtual Caliphate: ISIS’s Information Warfare. Institute for the Study of War. 2016.
S. Hughes. Countering the Virtual Caliphate. Written testimony before the US House of Representatives For-
eign Affairs Committee. 2016.
D. Milton. Communications Breakdown: Unraveling the Islamic State’s Media Efforts. Combating Terrorism
Center at West Point. 2016.
P. Neumann. Victims, Perpetrators, Assets: The Narratives of Islamic State Defectors. The International Cen-
ter for the Study of Radicalization and Political Violence. 2015.
S. George and Q. Abdul-Zahra. Mosul Fight is Already Redrawing the Map of Norther Iraq. Associated Press.
August 27, 2016.
A. Goldman and E. Schmitt. One by One, ISIS Social Media Experts Are Killed as Result of F.B.I. Program.
The New York Times. November 24, 2016.
J. Greenberg. Does the Islamic State Post 90,000 Social Media Messages Each Day? Politifact.com. February
19, 2015.
G. Witte, S. Raghavan, and J. McAuley. Flow of Foreign Fighters Plummets as Islamic State Loses Its Edge.
The Washington Post. September 9, 2016.
N. Woolf. Twitter Suspends 235,000 Accounts in Six Months for Promoting Terrorism. The Guardian. Au-
gust 18, 2016.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
The author(s) of this publication is/are solely responsible for its content. This
publication does not reflect the opinion of the publisher. The publisher cannot be held
liable for any loss or damage that may occur because of this publication.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
30 The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats
M. Martellini and J. Rao (Eds.)
IOS Press, 2017
© 2017 The authors and IOS Press. All rights reserved.
doi:10.3233/978-1-61499-802-0-30
Introduction
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
The threat of chemical, biological, radiological and nuclear (CBRN) terrorism originat-
ing from non-state groups, particularly extremist jihadi organisations, is a major con-
cern for global peace and security. The international community, and specifically the
Security Council of the United Nations, has reacted to this danger by enacting Resolu-
tion 1540, which obliges states to draft, implement and enforce legislation to prevent
the spread of weapons of mass destruction (WMD) to terrorist networks. However, the
resolution by itself has not been able to prevent the spread of WMD as shown by recent
allegations that the Islamic State of Iraq and Levant (ISIL) developed rudimentary
chemical weapon capabilities. Namely, John Brennan, the former head of the CIA, has
stated that ISIL fighters have developed the capacity to produce small amounts of chlo-
rine and mustard agent [1]. Moreover, the former Director of National Intelligence,
James Clapper, told the Senate Armed Services in Capitol Hill that extremists have
used toxic chemicals as means of warfare on the territory of Syria and Iraq [2].
1
Simoen Dukic, Jane Sandanski 19/1–14, Skopje 1000, Macedonia; E-mail: simeon.dukic@gmail.com.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Dukić / Islamic State’s Weapons of Mass Destruction Capability: An OSINT Approach 31
2014 [3]. To substantiate its findings IHS Conflict Monitor used open source infor-
mation from social media, local news reports, and IS propaganda. This paper examines
the value of open source intelligence (OSINT) in uncovering and verifying alleged ISIL
chemical weapons capability in Iraq and Syria. It argues that OSINT is an important
tool for identifying likely uses of chemical weapons. Due to a large amount of chemical
weapon incidents in the Middle East the use of open sources can be instrumental for
relevant organisations and institutions to discern cases where there is a higher probabil-
ity that chemical agents were utilized.
In order to achieve its goal the paper first defines open source intelligence and
briefly introduces its use and (increased) relevance in recent history. Second, the article
confirms the intentions of ISIL to obtain WMDs from open sources. Specifically, it
presents the so called “Laptop of Doom” and the statements made by a Muslim Dutch
fighter on social media. Third, it introduces allegations and facts about extremist
group’s WMD capability. Fourth, the paper analyses case studies where open source
information has been crucial in presenting a strong probability that chemical weapons
have been developed and used by ISIL in Syria and Iraq. Additionally, the paper exam-
ines challenges and limitations of open source intelligence when conducting online re-
search on the WMD capabilities of the jihadi organisation.
Traditionally, intelligence has been viewed as an activity which is derived from confi-
dential sources and through covert methods. However, with the recent technological
developments and proliferation of mobile devices there has been an increased debate on
the value of open source intelligence. Richard A. Best Jr. and Alfred Cumming argue
that the current ability to quickly process vast amounts of data, and the simplicity asso-
ciated with its sharing have increased the utility of open source information compared
to secret data, making it the core component of intelligence analysis [4]. Furthermore,
Allen Dulles, a former prominent Director of Central Intelligence, has stated that dur-
ing peacetime around 80% of the information supplied to intelligence agencies comes
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
from open sources and through overt means [5]. However, what is open source intelli-
gence, and what is its added value in intelligence collection and processing?
Definition
US Intelligence Community Directive No. 301 defines open source information as any
publically available information that anyone can lawfully obtain by request, purchase,
or observation. Moreover, it adds that open source intelligence is the insight produced
from publically available information that is collected, exploited and disseminated in a
timely manner and addressed to a specific audience dealing with a particular intelli-
gence requirement [6]. This information can be found in print and digital form includ-
ing (social) media, public data (such as official government reports, statements etc.),
academic literature, commercial imagery, human experts, grey literature, niche com-
mercial sites and leaked documents [7]. However, there presence of information in the
public domain does not mean that this data is readily available to everyone due to legal,
monetary and other practical restrictions associated with its collection [8].
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
32 S. Dukić / Islamic State’s Weapons of Mass Destruction Capability: An OSINT Approach
Value
The value of open source intelligence has been widely disputed by intelligence officers
and experts. The general perception on the value of open source intelligence during the
Cold War within the US intelligence community has been marginal. It was regarded
that information in the public domain has little use, and that secret and covertly collect-
ed data have exclusive benefit to the decision making processes of intelligence agencies.
Moreover the term “open source intelligence” was regarded as an oxymoron by practi-
tioners because only confidential information was regarded as real intelligence.
To be able to assess the value of open source intelligence, one needs to examine
the purpose of intelligence. According to Stevyn Gibson there are generally two agreed
functions: (1) providing actionable data to support decision making, and (2) minimiz-
ing ambiguity in a timely manner [9]. In order to achieve these goals intelligence offic-
ers needs different sources of information and various collection methods to acquire
information that answer specific questions. Hence, as long as open source data can pro-
vide relevant and actionable data to answer specific intelligence questions in a timely
manner, then it should be regarded as an important source of information.
There are five specific areas where OSINT provides value to the intelligence pro-
cess. First, open source data is crucial for giving context to (already) acquired infor-
mation. This is important because looking at pieces of information in isolation could
lead to misguided conclusions. Second, OSINT supplies data that could be used for
corroborating, verifying and challenging gathered data. Third, open source information
could be used to uncover new actionable data that fulfil a particular intelligence re-
quirement. Fourth, collecting OSINT compared to secret information is generally
cheaper and faster. Finally, OSINT is constantly available in large volumes [10].
These benefits have not gone unnoticed by policy makers within US institutions.
Mainly the utility of OSINT was emphasized in the reports of the 9/11 and WMD
Commissions, which were set up to examine the intelligence failures associated with
the terrorist attacks on September 11, 2001 and the Iraqi weapons of mass destruction
programme, respectively. Their work advocated for the development of a system that
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
systematically exploits open source data [11]. Based on their recommendations the
Open Source Directorate was opened within the Central Intelligence Agency (CIA) in
2005 that would use modern information processing tools to collect open source infor-
mation [12]. This suggests that OSINT is becoming an integral part of the intelligence
cycle which aims to provide insight for decision makers to address specific policy
questions.
Intentions
Before addressing ISIL’s WMD capability, the paper first briefly examines their inten-
tions to use such weapons by examining open source information. ISIL’s extreme retal-
iatory violence is a significant characteristic of the jihadi group. It has been constantly
expressed with brutal acts such as the beheading of dozens of Syrian and Kurdish sol-
diers, journalists, and other hostages, the burning of a Jordanian pilot, and massacring
various groups on the territory it gained control. In light of this brutalism would the ex-
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Dukić / Islamic State’s Weapons of Mass Destruction Capability: An OSINT Approach 33
tremist group hesitate to develop and use of weapons of mass destruction to further
spread its goals? This section examines the findings of the so called “laptop of doom”
and the statements made by ISIL fighter Omar Yilmaz to show ISIL’s intent to use un-
conventional weapons.
In August 2014, journalists Harald Doornbos and Jenan Moussa reported on a sto-
ry about a laptop given to them by a commander of a Syrian rebel group, which they
had seized from ISIL militants in the north of Syria. According to the documents on the
laptop it belonged to a Tunisian fighter Muhammed S. who studied chemistry and
physics in his home country [13]. The laptop contained around 146 gigabytes of docu-
ments, pictures and video in French, English and Arabic. Among the files was a 19-
page guide to safely weaponize bubonic plague from infected animals and a video
guide on the steps to obtain and produce ricin, a deadly toxin, from castor beans [14].
In addition to this guide the laptop contained a 26-page fatwa issued by Saudi jihadi
cleric Nasir al-Fahr, which approves the use of weapons of mass destructions as a last
resort if Muslims cannot defeat the unbelievers. Most of the files found on this comput-
er had been downloaded from open sources on the internet, which emphasizes the easi-
ness with which one could acquire material that contains practical and ideological in-
structions for conducting unconventional terrorist attacks. The laptop of doom, as the
journalists have named it, is an important indication of the radical group’s intent to re-
cruit semi-skilled people to acquire WMDs and wage jihad.
The intent to acquire and use WMDs can also be inferred from the information
presented on the social media accounts of ISIL fighters. One former Dutch soldier
turned jihadi militant, Omar Yilmaz, pointed out on his Tumblr profile, a micro-
blogging platform, that the group has come in the possession of chemical weapons
agents that were produced by the Assad regime [15]. Moreover, in another post he stat-
ed that the militants were prepared to use them because the Syrian government has al-
ready conducted chemical weapons attacks [16]. At the time of this writing Yilmaz’s
profile has been deactivated from Tumblr, but using archiving websites one could still
access the posts mentioned above [17]. The confessions of this infamous militant show
that the group does not shy away from using internationally prohibited weapons.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Allegations on Capabilities
After confirming ISIL’s intentions to use weapons of mass destruction to terrify, inca-
pacitate, and deter its enemies, it is necessary to analyse their capabilities to do so.
Many prominent politicians, policy makers and experts have stated that the group has
already acquired and used chemical weapons in the territory they control. Hamish de
Bretton-Gordon, a former British Army colonel with expertise in CBRN terrorism, has
warned that ISIL has started producing its own mustard gas and has gained access to
some of Assad’s undeclared stockpile [18]. Moreover, former French Prime Minister
Manuel Valls has warned that the group has plans to smuggle these weapons in Europe
and plan an attack [19]. The section analyses some allegations made in relation to the
group’s possession and use of unconventional weapons on the territory of Syria and
Iraq.
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
34 S. Dukić / Islamic State’s Weapons of Mass Destruction Capability: An OSINT Approach
Possession
One of the most serious and widely discussed allegations was ISIL’s theft of around
40 kg of lowly enriched uranium compounds from the University of Mosul in Iraq [20].
This was confirmed by the Iraqi UN Ambassador Mohamed Ali Alhakim in a letter ad-
dressed to former UN Secretary General Ban Ki-Moon. The Ambassador wrote that the
extremists have seized control of nuclear material that could be used in the manufactur-
ing of weapons of mass destruction [21]. Nevertheless, it is questionable whether this
amount poses any danger of being converted into a nuclear explosive device. The low-
grade uranium was used for research purposes at the university; hence, ISIL fighters
and/or scientists need to have substantial knowledge, raw material, technology and fi-
nancial resources to enrich the uranium, weaponize it, and attach it to a delivery mech-
anism for it to be converted into a nuclear bomb [22]. Lacking these qualities, it is
highly unlikely that the jihadi group would be able to produce a nuclear explosive that
inflicts serious physical harm. However, there are risks associated with this theft;
namely, ISIL militants could use it create a simple radiological device called a “dirty
bomb” where explosives are combined with the radioactive material. Nevertheless, the
radioactivity released in this manner is relatively small and has limited negative health
effects [23].
Other allegations suggest that ISIL fighters have captured chemical weapons from
the former Iraqi and Syrian programmes. The Islamic State controlled a part of Iraq’s
territory where Al-Muthanna, the site where the former Iraqi chemical weapons pro-
gramme, was located. It has been reported that the bunkers contained nearly 2000 emp-
ty shells contaminated with mustard gas and around 600 one-tonne mustard contain-
ers [24]. Nonetheless, it is highly unlikely that ISIL was able to get any of this material
because the United Nations Special Commission and the United Nations Monitoring,
Verification, and Inspection Commission inspectors reported twenty years ago that the
material at Al Muthanna had been degraded. Additionally, the bunkers where the UN
Special Commission destroyed the agent are sealed, which means that getting access to
them would be extremely difficult and dangerous [25]. Thus, it is highly unlikely that
ISIL acquired any chemical weapons from this compound.
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
In Syria there are testimonies that Nusra Front fighters, a rebel group with close
ties to al-Qaeda, captured a base controlled by Syrian Army named Regiment 111 in
December, 2012 [26]. Nevertheless, when the group split, fighters that joined ISIL
were in possession of the unconventional weapons. At that time Syria was not a party
to Chemical Weapons Convention and it had a significant stockpile of chemical agents.
According to a former ISIL fighter the base contained swaths of ammunition and ar-
mament including a cache of chemical weapons. Specifically, there were barrels with
chlorine, sarin, and mustard gas. Three months later the same operative suspects that
ISIL fighters used the agents in the first reported chemical attack during the Syrian war
near the town of Aleppo [27]. However, it is difficult to claim with certainty based on
these allegations that ISIL has under its possession chemical weapons because even its
operative testifying on this matter did not have material evidence that the chemical
weapons stolen at Regiment 111 landed in the hands of the jihadi group.
Finally, it has been reported that ISIL has developed crude chemical weapons ca-
pabilities and home-made delivery systems. This allegation is substantiated by the
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
S. Dukić / Islamic State’s Weapons of Mass Destruction Capability: An OSINT Approach 35
claim that among the thousands of fighters that have been arriving to Syria and Iraq are
also skilled scientists with degrees in physics, chemistry and biology that can produce
deadly weapons [28]. One of the most infamous scientists that joined ISIL was Abu
Malik, who also participated in Saddam Hussein’s chemical weapons programme.
CBRN experts believe that these individuals could manufacture chemical weapons be-
cause material is relatively easy to acquire, and producing the lethal chemicals is not
complicated [29]. The theory that ISIL is producing its own chemical weapons has also
been supported by an investigation at the Organisation for the Prohibition of Chemical
Weapons (OPWC). After an analysis of a sample of mustard gas taken from the territo-
ry of Syria and Iraq the head of the organisation, Ambassador Uzumcu, stated that the
results showed that the substance was of a poor quality likely to have been produced by
ISIL scientists [30]. The availability of skilled individuals and the relative simplicity to
attain and produce chemical material make allegations of ISIL produced chemical ca-
pability serious. Additionally, the confirmation of rudimentary capabilities by the head
of the OPCW and US intelligence officials has made CBRN terrorism threat a high
possibility.
Attacks
ISIL has allegedly targeted different groups with its chemical arsenal including
Copyright © 2017. IOS Press, Incorporated. All rights reserved.
Peshmega, Syrian and Iraqi government forces, rebel groups, and civilians. Nonethe-
less, at the time of this writing there has been one official finding by an international
body that chemical agents were used by the terrorist group. Namely, the Joint Investi-
gative Mechanism (JIM) set up by the UN and the OPCW with a mandate to identify to
the greatest extent possible individuals, entities and groups who organised, sponsored,
or were otherwise involved in the use of chemical weapons, concluded in its third re-
port that chemical toxins were used on three occasions on the territory of Syria [33].
The JIM investigated 29 out of 116 incidents where chemical weapons were allegedly
employed from which only nine of the most severe events for which forensically verifi-
able data was available were further examined. Based on the evidence collected and
processed the leadership panel of the investigatory body found that ISIL used sulphur
mustard on August 21st 2015 in Marea, a city 35 km north-east of Aleppo [34]. The
fact-finding mission stated that there had been around 50 artillery projectiles filled with
different payloads fired at the city from the east, or north-east, which are areas con-
trolled by ISIL. The Mechanism reported that artillery shells were filled with a dark
viscous liquid, which is believed to be sulphur mustard [35]. One should note that alt-
hough the agent is often referred to as mustard gas, it comes in a liquid form. Moreover,
The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats, IOS Press, Incorporated, 2017. ProQuest
Another random document with
no related content on Scribd:
EXPLANATION OF THE PLATES TO VOL. I.
PLATE I.
Fig. 1. The Saw used by carpenters. (Taken from
Chirurgia è Græco in Latinum conversa, Vido Vidio
interprete Lutetiæ Parisiorum, p. 115.)
2. A small Saw. (Ibid.)
3. The Modiolus, or ancient Trephine. (Ibid.)
4. The Terebra, or Trepan, called Abaptiston. (Ibid. p.
116.)
5. The Auger used by carpenters. (Ibid. p. 116.)
6. The Terebra, or Trepan, which is turned round by a
thong bound tight about its middle. (Ibid. p. 117.)
7. The Auger, or Trepan, which is turned round by a
bow. (Ibid. p. 118.)
8. A Terebra, or Trepan, which is turned round by a
thong on a cross-beam. (Ibid. p. 119.)
9. A Terebra, or Trepan, which has a ball in its upper
end, by which it is turned round. (Ibid. p. 120.)
10. A Terebra, or Trepan, which is turned round by a
cross piece of wood, or handle, on its upper end. (Ibid. p.
120.)
PLATE II.
Fig. 1. A Terebra, or Trepan, turned round
by a handle in its middle. (Ibid. p. 122.) It
resembles the centre-bit of modern artisans.
1. A hole into which the iron head is fixed.
2. Upright part, three inches long.
3. Cross part, one inch long.
4. The part which is grasped in turning
the instrument.
5. Cross part, an inch long.
6. Upright part.
7. A ball fixed to the top.
a. b. c. Different forms of the iron head
fixed in the hole 1.