328
Views
0
CrossRef citations to date
0
Altmetric
Articles

A semi-stochastic algorithm approach to generating CBRNE terrorist attack plot scenarios

ORCID Icon, , &
Pages 266-283 | Received 06 May 2022, Accepted 14 Jun 2023, Published online: 24 Jul 2023
 

ABSTRACT

There are many different types of terrorist attacks, but some types of terrorist attacks are infrequent. One example of an infrequent attack type is one that employs chemical, biological, and radiological weapons. There are also types of attacks that have never happened, such as a nuclear terrorist attack. Given the lack of historical incidents, how can counterterrorism researchers, policymakers, and practitioners utilise a data-driven approach to analyse these types of attacks? To address this question, we introduce the Automated Adversary Template Generation (AATG) process to generate synthetic terrorist incidents that are realistic. The AATG process uses semi-stochastic sampling to simulate terrorist adversary behaviours and activities and produce thousands of CBRNE terrorist attack scenarios. Using these scenarios, individuals researching and working in counterterrorism can analyse possible on-the-horizon Weapons of Mass Destruction/Terror (WMD/WMT) attacks and explore these threat spaces with greater fidelity. In particular, this novel methodology is very useful for red teaming purposes conducted by researchers or counterterrorism practitioners.

Acknowledgements

The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the Defense Advanced Research Project Agency, Department of Defense, the United States Government, the University of Maryland, or START.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 These terms are defined in .

2 In this article, we use the term ‘adversary’ in the context of the AATG to refer to terrorist actors, and in the context of red teaming, to refer to the red cell. The definition of terrorism we use is derived from the Global Terrorism Database, and constitutes the ‘use of illegal force and violence by a nonstate actor to attain a political, economic, religious, or social goal through fear, coercion, or intimidation’ (GTD, Citation2021, p. 11).

3 In the case of some terrorist attacks, such as Islamist attacks that include suicide bombings, the individuals engaged in the attack will not reach the ‘Exploit’ stage of the cycle. In cases where a terrorist organisation has orchestrated the attack, this stage would be conducted by other members of the organisation.

4 These stages are separated because the difference in difficulty between acquiring chemical precursors and acquiring equipment can range from negligible to significant.

5 The co-authors of this paper calculated this average based on previous research projects in which they utilised the manual scenario generation process.

6 This is reported by the co-authors based on usage of the AATG for a previous research project.

Additional information

Funding

This research was supported by the Defense Advanced Research Projects Agency award number W911NF2010031.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 267.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.