|By Business Wire||
|February 4, 2014 09:37 AM EST||
The upcoming XXII Olympic Winter Games in Sochi, Russia, are at the highest risk for a terrorist attack of any sporting event that has taken place since the Sept. 11, 2001 attacks, according to Dr. Gordon Woo, terrorism expert at RMS, the world's leading catastrophe modeling firm. Based on 10 years of research of terrorist threats at previous summer and winter Olympic events, Dr. Woo says that public transportation is particularly at risk and that terrorists will likely act alone or in very small groups, making them hard to intercept.
The threat to next month’s XXII Olympic Winter Games is relatively high because of Sochi’s proximity to the Caucasus Emirate, a self-proclaimed, virtual-state entity in Russia whose leaders have already made threats against the event. Designated by both the Russian Federation and the U.S. as a terrorist organization, the Caucasus Emirate’s ‘black widow’ terrorists work alone and are therefore difficult to identify and monitor.
“Because of the history between the Russians and the Chechen people who splintered to form the Caucasus Emirate, Sochi is a prime target for terrorism,” said Dr. Woo. “President Vladimir Putin’s decision to hold the games in Sochi makes it a prime target because a strike against Sochi is seen as a strike against President Putin. It’s a huge target for Caucasus Emirate black widow terrorists.”
Dr. Woo contends that the focus of any attack would be on Russians and Russia, with a primary aim of disrupting the games. This could include attacks outside of the security cordon or even in regions just outside of Sochi. The cost of hosting the Sochi games is estimated to be approximately $50 billion, so there is a monetary incentive for disruption as well.
“Visitors should get to Sochi as early as possible,” said Dr. Woo. “The threat to transportation will be at its highest right before and right after the events, so if you arrive a few days early, you won’t be exposed to the highest-level threat.”
As an acknowledged, international expert on catastrophes, Dr. Woo has 30 years of experience in all branches of catastrophe science, covering both natural and man-made hazards. He is the author of two acclaimed books: “The Mathematics of Natural Catastrophes” (1999) and “Calculating Catastrophe” (2011). Dr. Woo is the chief architect of the RMS terrorism risk model and was recently named by Treasury & Risk magazine as one of the 100 most influential people in finance. He has also lectured on terrorism at the NATO Center of Excellence for the Defense against Terrorism and testified before the U.S. Congress on terrorism-risk modeling.
Dr. Gordon Woo is available for interviews by contacting [email protected].
RMS is the world's leading provider of software, services, and expertise for the quantification and management of catastrophe risk. More than 400 leading insurers, reinsurers, trading companies, and other financial institutions rely on RMS solutions to quantify, manage, and transfer risk. Founded at Stanford University in 1988, RMS serves clients today from offices in the U.S., Bermuda, the U.K., Switzerland, India, China, and Japan. For more information, visit www.rms.com and follow us @RMS_News.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Sep. 2, 2015 06:00 AM EDT Reads: 803
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Sep. 2, 2015 05:45 AM EDT Reads: 398
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
Sep. 2, 2015 05:15 AM EDT Reads: 546
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
Sep. 2, 2015 04:00 AM EDT Reads: 244
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Sep. 2, 2015 04:00 AM EDT Reads: 481
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Sep. 2, 2015 03:45 AM EDT Reads: 425
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Sep. 2, 2015 03:30 AM EDT Reads: 606
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
Sep. 2, 2015 03:00 AM EDT Reads: 522
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Sep. 2, 2015 02:30 AM EDT Reads: 449
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
Sep. 2, 2015 02:00 AM EDT Reads: 697
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Sep. 2, 2015 01:45 AM EDT Reads: 483
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Sep. 1, 2015 11:45 PM EDT Reads: 399
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
Sep. 1, 2015 11:00 PM EDT Reads: 512
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Sep. 1, 2015 07:00 PM EDT Reads: 277
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
Sep. 1, 2015 04:00 PM EDT Reads: 201