Once again the Team Flying Dragon from Kansas State University has created a critical intelligence estimate, this time, looking at drone attacks. The team consists of John Boesen, Randy Mai, Carrie Padgette, TL Vincent Salerno with oversight and tutelage from Professor Randall K. Nichols. 210 slides of detailed information focused on hazardous waste in the US and the use of drones to cause harm. The full report is available upon request from Treadstone 71 at osint@treadstone71.com – Please provide your name, title, and corporate / university / government email address for access to the report. flydragons

The Agenda

  • Executive Summary
  • Targets: Defenseless Universities (soft targets)
  • Hazardous Material Handling: PPE, antidotes, transport, logistics
  • Substances Used: toxins, location, transport, doses
  • Scenario
  • Consequences: effects, aftermath
  • Recommended Actions
  • Conclusions

fluoroMotive of Terrorist Organization implementing drone attacks

  • Armed, capable of targeting individuals, autos, structures
  • Highly effective at targets, maximize targets
  • Lower cost, risk, no risk to user/pilot
  • Punish, deter, disrupt, degrade, dismantle, defeat
  • Influence mass audience
  • Exceptionally effective in undermining populations
  • Alternative means when other activity cannot be accomplished, as attacking US military

This presentation examines among other things ethical and legal dimensions of on-line behavior regarding cyber security and UAS. It is not intended to turn counterterrorism, information technology or forensics investigators professionals into lawyers. Many of the topics discussed will be concerned with the law and legal implications of certain behaviors.

Every effort is made to provide accurate and complete information. However, at no time during this presentation will legal advice be offered. Any student requiring legal advice should seek services of a lawyer authorized to practice in the appropriate jurisdiction.

ksu3.png

This presentation is not about pushing the envelope or hacking, or trying out any of the UAS/UAV/Drone counter-terrorism approaches in our Cases or A/D scenarios in the field.

If you wish to see the complete presentation, contact Treadstone 71 at osint@treadstone71.com