Is An ISIS Nuclear Attack In Europe Really A Threat?

The threat of a terrorist attack using nuclear material is the highest since the end of the Cold War, with ISIS actively trying to acquire weapons of mass destruction, according to a leading international think-tank on proliferation. 

"ISIS has already carried out numerous chemical weapons attacks in Syria; we know it wants to go further by carrying out a nuclear attack in the heart of Europe. This, combined with poor levels of security at a host of nuclear research centres in the former Soviet Union mean the threat of a possible 'dirty-bomb' attack on a Western capital is high," said Moshe Kantor, the president of the International Luxembourg Forum

The warning from the organisation, whose members include former government ministers and senior officials from Russia and the West, comes amid deep apprehension that jihadists will attempt to carry out atrocities during the current Euro 2016 football championship in France. The forum is not suggesting that a terrorist nuclear attack is likely to take place during the tournament, but Dr Kantor pointed out that the Islamist cell which carried out the Brussels attacks two months ago were believed to be monitoring workers and security arrangements at a Belgian nuclear facility. 

"Their previous documented attempts to gain access to a nuclear power station in Belgium are evidence of their intent," he stated at an international conference in Amsterdam. "The terrorists don't necessarily have to use a 'dirty bomb'. We are not just talking about stolen nuclear material, using conventional explosives in a nuclear plant, such as smuggling in a bomb, would have catastrophic consequences." 

Former British defence secretary Des Browne, a member of the forum and vice-chairman of the Nuclear Threat Initiative (NTI), said the threat of nuclear terrorism was a highly significant and complex issue which needed a unified international response. "It shouldn't be a surprise that if terrorists get hold of nuclear material they will try to use it, we also know that they are seeking such material, there were reports, for example, of ISIS getting hold of uranium when they captured Mosul," he said. 

"It isn't that hard to build a 'dirty bomb'. They may not kill that many people with such a bomb, but the effect on the environment, the infrastructure and the psychological impact on people would be devastating. They can also use cyber warfare to target a nuclear facility." 

The meeting in Amsterdam marks the 30th anniversary of the Reykjavik summit between US President Ronald Regan and Soviet leader Mikhail Gorbachev which paved the way for a historic missile treaty between the US and the Soviet Union. It comes after a nuclear conference hosted by President Barack Obama in Washington earlier this year which focused on the threat of a terrorist attack using nuclear material by ISIS and other extremist groups following the Paris and Brussels attacks. 

The President's deputy national security adviser, Ben Rhodes, said: "We know that terrorist organisations have the desire to get access to these raw materials and to have a nuclear device." 

Around 2,000 metric tons of highly enriched uranium and separated plutonium, that is being used internationally in civilian and military programmes, could be turned into a nuclear bomb if stolen or diverted, said the White House. But fewer than half of the 50 countries attending the summit had even agreed to secure their sources of radiological material. 

President Vladimir Putin refused to attend the Washington meeting with the Kremlin claiming it was an American attempt to take over the system of securing radioactive material. It was revealed last autumn that four attempts by Russian-linked gangs in Moldova, a former Soviet state, to sell nuclear material to terrorists, including ISIS, has been foiled. Evidence laid before the courts by Moldovan authorities showed that the smugglers had tried to exploit a breakdown in cooperation between Russia and the West on security issues. 

Pakistani President Nawaz Sharif also cancelled his Washington visit after an Islamist terrorist bombing killed 72 people. His country, which has a nuclear arsenal, and figures in the military and security establishment that may be sympathetic to jihadists, is viewed by analyst as a prime source for a terrorist device.

President Obama had repeatedly stressed the danger of nuclear terrorism and his emphasis on nuclear disarmament was an important factor in him winning the Nobel peace prize. Months into his presidency, he said in a much publicised speech in Prague that nuclear weapons were "the most dangerous legacy of the Cold War".

But in Amsterdam recently, Dr Kantor held that the current impasse on nuclear arms control was due to the stance of Washington. "The United States' refusal to discuss limits for its missile defence programme is a bottleneck for talks, which impedes the entire process of controlling nuclear weapons and heightens the threat of a nuclear incident. If we take the matter seriously, there should be no 'sacred cows' either among defensive or offensive weapons," he argued.

In a video message to the conference, Mr. Gorbachev, said: "We cannot be satisfied with the current situation, the window to a nuclear-free world first opened in Reykjavik, is being shut and locked before our eyes...The danger of nuclear weapons proliferation has grown to a large extent for this reason."

Ein News

 

« Attacks On Industrial Control System At An All-Time High
Email Scams: Criminals Try To Steal $3bn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

SafeCipher

SafeCipher

SafeCypher are crypto specialists with a very specialized knowledge of Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Quantum Resistant Cryptography and Crypto-Agility.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.