Biological warfare

Biological warfare (BW)—also known as germ warfare—is the use of biological toxins or infectious agents such as bacteria, viruses, and fungi with intent to kill or incapacitate humans, animals or plants as an act of war. Biological weapons (often termed “bio-weapons”, “biological threat agents”, or “bio-agents”) are living organisms or replicating entities (viruses, which are not universally considered “alive”) that reproduce or replicate within their host victims. Entomological (insect) warfare is also considered a type of biological weapon. Biological weapons may be employed in various ways to gain a strategic or tactical advantage over an adversary, either by threats or by actual deployments. 
Like some of the chemical weapons, biological weapons may also be useful as area denial weapons. These agents may be lethal or non-lethal, and may be targeted against a single individual, a group of people, or even an entire population. They may be developed, acquired, stockpiled or deployed by nation states or by non-national groups. In the latter case, or if a nation-state uses it clandestinely, it may also be considered bioterrorism.[1]There is an overlap between BW and chemical warfare, as the use of toxins produced by living organisms is considered under the provisions of both the Biological Weapons Convention and the Chemical Weapons Convention. Toxins and Psychochemical weapons are often referred to as midspectrum agents. Unlike bioweapons, these midspectrum agents do not reproduce in their host and are typically characterized by shorter incubation periods

Overview

Offensive biological warfare, including mass production, stockpiling and use of biological weapons, was outlawed by the 1972 Biological Weapons Convention (BWC). The rationale behind this treaty, which has been ratified or acceded to by 165 countries as of 2011, is to prevent a biological attack which could conceivably result in large numbers of civilian fatalities and cause severe disruption to economic and societal infrastructure.[citation needed] Many countries, including signatories of the BWC, currently pursue research into the defense or protection against BW, which is not prohibited by the BWC. A nation or group that can pose a credible threat of mass casualty has the ability to alter the terms on which other nations or groups interact with it. Biological weapons allow for the potential to create a level of destruction and loss of life far in excess of nuclear, chemical or conventional weapons, relative to their mass and cost of development and storage. Therefore, biological agents may be useful as strategic deterrents in addition to their utility as offensive weapons on the battlefield.[3][4]
As a tactical weapon for military use, a significant problem with a BW attack is that it would take days to be effective, and therefore might not immediately stop an opposing force. Some biological agents (smallpox, pneumonic plague) have the capability of person-to-person transmission via aerosolized respiratory droplets. This feature can be undesirable, as the agent(s) may be transmitted by this mechanism to unintended populations, including neutral or even friendly forces. While containment of BW is less of a concern for certain criminal or terrorist organizations, it remains a significant concern for the military and civilian populations of virtually all nations.Ideal characteristics of a biological agent to be used as a weapon against humans are high infectivity, high virulence, non-availability of vaccines, and availability of an effective and efficient delivery system. Stability of the weaponized agent (ability of the agent to retain its infectivity and virulence after a prolonged period of storage) may also be desirable, particularly for military applications, and the ease of creating one is often considered. Control of the spread of the agent may be another desired characteristic.
The primary difficulty is not the production of the biological agent, as many biological agents used in weapons can often be manufactured relatively quickly, cheaply and easily. Rather, it is the weaponization, storage and delivery in an effective vehicle to a vulnerable target that pose significant problems. For example, Bacillus anthracis is considered an effective agent for several reasons. First, it forms hardy spores, perfect for dispersal aerosols. Second, this organism is not considered transmissible from person to person, and thus rarely if ever causes secondary infections. A pulmonary anthrax infection starts with ordinary influenza-like symptoms and progresses to a lethal hemorrhagic mediastinitis within 3–7 days, with a fatality rate that is 90% or higher in untreated patients.[19] Finally, friendly personnel can be protected with suitable antibiotics.
A large-scale attack using anthrax would require the creation of aerosol particles of 1.5 to 5 µm: larger particles would not reach the lower respiratory tract, while smaller particles would be exhaled back out into the atmosphere. At this size, conductive powders tend to aggregate because of electrostatic charges, hindering dispersion. So the material must be treated to insulate and neutralize the charges. The weaponized agent must be resistant to degradation by rain and ultraviolet radiation from sunlight, while retaining the ability to efficiently infect the human lung. There are other technological difficulties as well, chiefly relating to storage of the weaponized agent.
Agents considered for weaponization, or known to be weaponized, include bacteria such as Bacillus anthracis, Brucella spp., Burkholderia mallei, Burkholderia pseudomallei, Chlamydophila psittaci, Coxiella burnetii, Francisella tularensis, some of the Rickettsiaceae (especially Rickettsia prowazekii and Rickettsia rickettsii), Shigella spp., Vibrio cholerae, and Yersinia pestis. Many viral agents have been studied and/or weaponized, including some of the Bunyaviridae (especially Rift Valley fever virus), Ebolavirus, many of the Flaviviridae (especially Japanese encephalitis virus), Machupo virus, Marburg virus, Variola virus, and Yellow fever virus. Fungal agents that have been studied include Coccidioides spp..[20][21]
Toxins that can be used as weapons include ricin, staphylococcal enterotoxin B, botulinum toxin, saxitoxin, and many mycotoxins. These toxins and the organisms that produce them are sometimes referred to as select agents. In the United States, their possession, use, and transfer are regulated by the Centers for Disease Control and Prevention’s Select Agent Program. The former US biological warfare program categorized its weaponized anti-personnel bio-agents as either Lethal Agents (Bacillus anthracis, Francisella tularensis, Botulinum toxin) or Incapacitating Agents (Brucella suis, Coxiella burnetii, Venezuelan equine encephalitis virus, Staphylococcal enterotoxin B).

Anti-agriculture

The United States developed an anti-crop capability during the Cold War that used plant diseases (bioherbicides, or mycoherbicides) for destroying enemy agriculture. Biological weapons also target fisheries as well as water-based vegetation. It was believed that destruction of enemy agriculture on a strategic scale could thwart Sino-Soviet aggression in a general war. Diseases such as wheat blast and rice blast were weaponized in aerial spray tanks and cluster bombs for delivery to enemy watersheds in agricultural regions to initiate epiphytotics (epidemics among plants). When the United States renounced its offensive biological warfare program in 1969 and 1970, the vast majority of its biological arsenal was composed of these plant diseases.[citation needed] Enterotoxins and Mycotoxins were not affected by Nixon’s order.
Though herbicides are chemicals, they are often grouped with biological warfare and chemical warfare because they may work in a similar manner as biotoxins or bioregulators. The Army Biological Laboratory tested each agent and the Army’s Technical Escort Unit was responsible for transport of all chemical, biological, radiological (nuclear) materials. Scorched earth tactics or destroying livestock and farmland were carried out in the Vietnam war (cf. Agent Orange)[22] and Eelam War in Sri Lanka.[citation needed]Biological warfare can also specifically target plants to destroy crops or defoliate vegetation. The United States and Britain discovered plant growth regulators (i.e., herbicides) during the Second World War, and initiated a herbicidal warfare program that was eventually used in Malaya and Vietnam in counterinsurgency operations.
Anti-livestock
In 1980s Soviet Ministry of Agriculture had successfully developed variants of foot-and-mouth disease, and rinderpest against cows, African swine fever for pigs, and psittacosis to kill chicken. These agents were prepared to spray them down from tanks attached to airplanes over hundreds of miles. The secret program was code-named “Ecology”.[20]Attacking animals is another area of biological warfare intended to eliminate animal resources for transportation and food. In the First World War, German agents were arrested attempting to inoculate draft animals with anthrax, and they were believed to be responsible for outbreaks of glanders in horses and mules. The British tainted small feed cakes with anthrax in the Second World War as a potential means of attacking German cattle for food denial, but never employed the weapon. In the 1950s, the United States had a field trial with hog cholera.[citation needed] During the Mau Mau Uprising in 1952, the poisonous latex of the African milk bush was used to kill cattle.[23]Unconnected with inter-human wars, humans have deliberately introduced the rabbit disease Myxomatosis, originating in South America, to Australia and Europe, with the intention of reducing the rabbit population – which had devastating but temporary results, with wild rabbit populations reduced to a fraction of their former size but survivors developing immunity and increasing again.

Entomological warfare 

Entomological warfare (EW) is a type of biological warfare that uses insects to attack the enemy. The concept has existed for centuries and research and development have continued into the modern era. EW has been used in battle by Japan and several other nations have developed and been accused of using an entomological warfare program. EW may employ insects in a direct attack or as vectors to deliver a biological agent, such as plague. Essentially, EW exists in three varieties. One type of EW involves infecting insects with a pathogen and then dispersing the insects over target areas.[24] The insects then act as a vector, infecting any person or animal they might bite. Another type of EW is a direct insect attack against crops; the insect may not be infected with any pathogen but instead represents a threat to agriculture. The final method uses uninfected insects, such as bees, wasps, etc., to directly attack the enemy.[25]
Enhanced by Zemanta

Cyber Attacks

Cyber Attacks, also referred as cyberwarfare or cyberterrorism in specific situations, is a type of offensive maneuver employed by both individuals and whole organizations that targets computer information systems, infrastructures, computer networks, and/ or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system. Cyberwarfare or cyberterrorism can be as harmless as installing spyware on a PC or as grand as destroying the infrastructure of entire nations. In the 21st century as the world becomes more technologically advanced and reliant upon computer systems, cyber attacks have become more sophisticated, dangerous, and the preferred method of attacks against large groups by “attackers.”

Cyberwarfare and cyberterrorism

Cyberwarfare utilizes techniques of defending and attacking information and computer networks that inhabit cyberspace. It denies an opponent’s ability to do the same, while employing technological instruments of war to attack an opponent’s critical computer systems. Paralleling this idea of cyberwarfare, cyberterrorism is “the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.”[1] That means the end result of both cyberwarfare and cyberterrorism is the same, to damage critical infrastructures and computer systems linked together within the confines of cyberspace.

Factors for cyber-attacks

In cyberwarfare we must understand the basics as to why cyber-attacks are launched against a state or an individual. There are three factors that contribute to this reasoning, the fear factor, spectacular factor, and the vulnerability factor.

Fear factor

The most common, fear factor, a cyberterrorist will create fear amongst individuals, groups, or societies. The bombing of a Bali nightclub in 2002 created fear amongst the foreign tourists who frequently visited the venue. Once the bomb went off and casualties ensued, the influx of tourists to Bali significantly reduced due to fear of death.

Spectacular factor

With spectacular factors, it is the actual damage of the attack, meaning the attacks created direct losses and gained negative publicity. In 1999, a denial of service attack rendered Amazon.com unusable. Amazon experienced losses because of suspended trading and it was publicized worldwide.

Vulnerability factor

Vulnerability factor exploits how easy an organization or government establishment is vulnerable to cyber-attacks. An organization can easily be vulnerable to a denial of service attack or a government establishment can be defaced on a web page. A computer network attack disrupts the integrity or authenticity of data, usually through malicious code that alters program logic that controls data, leading to errors in output.[2]

Professional hackers to cyberterrorists

Professional hackers either working on their own or employed by the government or military service can find computer systems with vulnerabilities lacking the appropriate security software. Once found, they can infect systems with malicious code and then remotely control the system or computer by sending commands to view content or to disrupt other computers. There needs to be a pre-existing system flaw within the computer such as no antivirus protection or faulty system configuration for the viral code to work. Many professional hackers will promote themselves to cyberterrorists where a new set of rules govern their actions. Cyberterrorists have premeditated plans and their attacks are not born of rage. They need to develop their plans step-by-step and acquire the appropriate software to carry out an attack. They usually have political agendas, targeting political structures. Cyber terrorists are hackers with a political motivation, their attacks can impact political structure through this corruption and destruction.[3] They also target civilians, civilian interests and civilian installations. As previously stated cyberterrorists attack persons or property and cause enough harm to generate fear.

Syntactic attacks and semantic attacks

In detail, there are a number of techniques to utilize in cyber-attacks and a variety of ways to administer them to individuals or establishments on a broader scale. Attacks are broken down into two categories, Syntactic attacks and Semantic attacks. Syntactic attacks are straight forward; it is considered malicious software which includes viruses, worms, and Trojan horses.

Viruses

Viruses are a self-replicating program that can attach itself to another program or file in order to reproduce. The virus can hide in unlikely locations in the memory of a computer system and attach itself to whatever file it sees fit to execute its code. It can also change its digital footprint each time it reproduces making it even harder to track down in the computer.

Worms

Worms do not need another file or program to copy itself; it is a self-sustaining running program. Worms replicate over a network using protocols. The latest incarnation of worms make use of known vulnerabilities in systems to penetrate, execute their code, and replicate to other systems such as the Code Red II worm that infected more than 259 000 systems in less than 14 hours.[4] On a much larger scale, worms can be designed for industrial espionage to monitor and collect server and traffic activities then transmit it back to its creator.

Trojan horses

A Trojan horse is designed to perform legitimate tasks but it also performs unknown and unwanted activity. It can be the basis of many viruses and worms installing onto the computer as keyboard loggers and backdoor software. In a commercial sense, Trojans can be imbedded in trial versions of software and can gather additional intelligence about the target without the person even knowing it happening. All three of these are likely to attack an individual and establishment through emails, web browsers, chat clients, remote software, and updates.
Semantic attack is the modification and dissemination of correct and incorrect information. Information modified could have been done without the use computers even though new opportunities can be found by using them. To set someone into the wrong direction or to cover your tracks, the dissemination of incorrect information can be utilized.

Israel and Palestine

In the Israel-Palestine conflict cyber attacks were conducted in October 2000 when Israeli hackers launched DOS attacks on computers owned by Palestinian resistance organizations (Hamas) and Lebanese resistance organizations (Hezbullah). Anti-Israel hackers responded by crashing several Israeli web sites by flooding them with bogus traffic.[3]

India and Pakistan

There were two such instances between India and Pakistan that involved cyberspace conflicts, started in 1990s. Earlier cyber attacks came to known as early as in 1999.[3] Since then, India and Pakistan were engaged in a long-term dispute over Kashmir which moved into cyberspace. Historical accounts indicated that each country’s hackers have been repeatedly involved in attacking each other’s computing database system. The number of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by the end of August 2001.[3] In 2010, Indian hackers laid a cyber attack at least 36 government database websites going by the name “Indian Cyber Army”.[5] In 2013, Indian hackers hacked the official website of Election Commission of Pakistan in an attempt to retrieve sensitive database information.[6] In retaliation, Pakistani hackers, calling themselves “True Cyber Army” hacked and defaced ~1,059 websites of Indian election bodies.[6]According to the media, Pakistan’s has been working on effective cyber security system, in a program called the “Cyber Secure Pakistan” (CSP).[7] The program was launched in April 2013 by Pakistan Information Security Association and the program as expanded to country’s universities.

China, United States and others

Within cyberwarfare, the individual must recognize the state actors involved in committing these cyber-attacks against one another. The two predominant players that will be discussed is the age-old comparison of East versus West, China’s cyber capabilities compared to United States’ capabilities. There are many other state and non-state actors involved in cyberwarfare, such as Russia, Iran, Iraq, and Al Qaeda; since China and the U.S. are leading the foreground in cyberwarfare capabilities, they will be the only two state actors discussed. But in Q2 2013, Akamai Technologies reported that Indonesia toppled China with portion 38 percent of cyber attack, a high increase from 21 percent portion in previous quarter. China set 33 percent and US set at 6.9 percent. 79 percent of attack came from Asia Pacific region. Indonesia dominated the attacking to ports 80 and 443 by about 90 percent.[8]
Enhanced by Zemanta

Miseries of Philistine

Palestinian woman being thrown out of her house and property.  A home she and her family have had for thousands of years.  Israeli invading immigrant army use  Americans money to ethnic cleanse Palestinians and steal their home.  Rape, torture, theft, mutilation, and murder is all Israeli war criminals look forward to everyday.
 
Miseries of Philistine
Enhanced by Zemanta

improvised explosive device (IED) Main Casue of Civilain Deahts in Afghanistan

An improvised explosive device (IED) is a homemade bomb constructed and deployed in ways other than in conventional military action. It may be constructed of conventional military explosives, such as an artillery round, attached to a detonating mechanism. Roadside bombs are a common use of IEDs.
IEDs may be used in terrorist actions or in unconventional warfare by guerrillas or commando forces in a theater of operations. In the second Iraq War, IEDs were used extensively against US-led Coalition forces and by the end of 2007 they had become responsible for approximately 63% of Coalition deaths in Iraq.[1] They are also used in Afghanistan by insurgent groups, and have caused over 66% of the Coalition casualties in the 2001–present Afghanistan War.[2]
IEDs were also used extensively by cadres of the rebel Tamil Tiger (LTTE) organization against military targets in Sri Lanka.[3][4]
Enhanced by Zemanta

A war crime

War Crimes (film)
War Crimes 

war crime is a serious violation of the laws applicable in armed conflict (also known as international humanitarian law) giving rise to individual criminal responsibility. Examples of war crimes include “murder, the ill-treatment or deportation of civilian residents of an occupied territory to slavelabor camps,” “the murder or ill-treatment of prisoners of war,” the killing of prisoners, “the wanton destruction of cities, towns and villages, and any devastation not justified by military, or civilian necessity.”[1]
Similar concepts, such as perfidy, have existed for many centuries as customs between civilized countries, but these customs were first codified as international law in the Hague Conventions of 1899 and 1907. The modern concept of a war crime was further developed under the auspices of theNuremberg Trials based on the definition in the London Charter that was published on August 8, 1945. (Also see Nuremberg Principles.) Along with war crimes the charter also defined crimes against peace and crimes against humanity, which are often committed during wars and in concert with war crimes.
Article 22 of The Hague IV (“Laws of War: Laws and Customs of War on Land (Hague IV); October 18, 1907”) states that “The right of belligerents to adopt means of injuring the enemy is not unlimited”[2] and over the last century many other treaties have introduced positive laws that place constraints on belligerents (see International treaties on the laws of war). Some of the provisions, such as those in The Hague, the Geneva, and Genocide Conventions, are considered to be part of customary international law, and are binding on all.[3][4] Others are only binding on individuals if the belligerent power to which they belong is a party to the treaty which introduced the constraint.

History  

Early example

The trial of Peter von Hagenbach by an ad hoc tribunal of the Holy Roman Empire in 1474, was the first “international” war crimes trial, and also of command responsibility.[6][7] He was convicted and beheaded for crimes that “he as a knight was deemed to have a duty to prevent”, although he had argued that he was only “following orders”.  

Hague Conventions

The Hague Conventions were international treaties negotiated at the First and Second Peace Conferences at The Hague, Netherlands in 1899 and 1907, respectively, and were, along with the First and Second Geneva Conventions (1864 and 1909), among the first formal statements of the laws of war and war crimes in the nascent body of secular international law.

Geneva Conventions

The Geneva Conventions are four related treaties adopted and continuously expanded from 1864 to 1949 that represent a legal basis and framework for the conduct of war under international law. Every single member state of the United Nations has currently ratified the conventions, which are universally accepted as customary international law, applicable to every situation of armed conflict in the world. However, the Additional Protocols to the Geneva Conventions adopted in 1977 containing the most pertinent, detailed and virulent protections of international humanitarian law for persons and objects in modern warfare are still not ratified by a number of States continuously engaged in armed conflicts, namely the United States, Israel, India, Pakistan, Iraq, Iran, and others. Accordingly, states retain different codes and values with regard to wartime conduct. Some signatories have routinely violated the Geneva Conventions in a way which either uses the ambiguities of law or political maneuvering to sidestep the laws’ formalities and principles.
Enhanced by Zemanta

Preventing cyber war

New wave of cyber attacks around the world on sensitive installations prove that cyber threat has become reality in these days. Despite growing cyber attacks world community is doing nothing to prevent this threat. It seems true that big powers are preparing for possible cyber war, hiring hackers and enhancing their cyber capabilities. After increasing cyber attacks battle of words is still going on between US, China, Russia and Iran everyone accuses each other of cyber attacks but no one want to face realties. 

After popularity of social media extremist organizations are widely using internet these days to enhance their agenda. They also launched several cyber attacks against their rivals and threat is growing. Financial and economic effects are more disastrous and Cyber war is more harmful than normal war and we can easily imagine its harmful effects. Although some countries have introduced tough laws against cyber crimes but at the time when poverty is growing in third world countries and Europe is facing worse financial crises most of countries are not able to allocate extra funds to prevent cyber threats. Only tough laws against cyber crimes and interest of big powers can improve further deterioration in the situation.

KHAWAJA UMER FAROOQ
Jeddah, Saudi Arabia

Enhanced by Zemanta

Turmoil in Nigeria


Things are going from bad to worse in Nigeria. Because of the government’s weak position, extremist elements are gaining ground in several areas. More than 200 people have lost their lives in the past three months. Now, the country is facing a Yemen– and Somalia-like situation. The government is not doing much to control it. Extremist elements like Boko Haram are furthering their agenda of controlling young minds according to their skewed interpretations of the Shariah. The number of suicide attacks has increased dramatically in the last few months. Boko Haram openly claimed responsibility for these attacks, but no one was brought to justice. Several churches have also been attacked and several people have lost their lives in revenge attacks. Due to this tense situation, there is a widening gap between the different sections of society and the poor people are the worst affected. The country has enough oil resources, but the government is unable to change the fortunes of its people as more than half of its population is below the poverty line. — Khawaja Umer Farooq, by e-mail

Enhanced by Zemanta