CBRN Attack Perpetrators: An Empirical Study