StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Partially Intuition-Based Attack Scenario - Essay Example

Cite this document
Summary
The "Partially Intuition-Based Attack Scenario" paper states that the people need to join the intelligence unit in supporting their community established movements and organization that cater for the challenges in the market region at home or at work. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Partially Intuition-Based Attack Scenario
Read Text Preview

Extract of sample "Partially Intuition-Based Attack Scenario"

Partially intuition-based attack scenario The of terrorism and development of weapons of mass destruction continue to reflect in the discussions regarding the world security, from all countries, irrespective of their stature in development. The focus on the various terror groups and their means of operation remains a core factor of discussion in this war against terror and terror related activities. The discussions feature the need to incorporate reliable and effective intelligence gathering techniques, analyzing the intelligence gathered and instituting the recommendations for action to avert the imminent attacks. The US learnt the essence of acting on intelligence in the wake of the September eleven terror attack1. Since the occurrence of this unfortunate event, the course of managing the security of the country changed remarkably. The government instituted the federal bureau of investigation and the central intelligence agency as they faced the responsibility for the failures leading to the attacks. Today, we face the threat of terror and the utilization of weapons of mass destruction upon our country from all corners of the world. Despite the increased and heightened surveillance systems, the threat of terror remains key as the attackers use intelligent means to transmit their messages2. The intelligence recently intercepted a given message on transit, which gives the warning for an eminent and coming attack in the near future3. The attack seems to came from a well deliberated plan, I which several elements of intelligence gathering and analysis is key in facilitating the prevention of the attack, or minimization of the casualties and loss thereof from the attack. According to intelligence gathered from an intercepted message, the attack is eminent. The attack schedule from the message is unclear, but falls within a period of three to six months. The message also implies that the coming attack is from afghan based Islam jihadists, who are five brothers. The attackers will come into the country through cunning means, presenting themselves as Lebanese citizens using Christian names. They will travel through various destinations before getting in the country and receding to a safe house in Brooklyn, where they will gather their utilities and complete the plan for the attack4. Additionally, the plan entails faking a heart attack case in which they will make the case, conduct the attack and eventually leave using the deception of a moving ambulance. He ambulance possibly mentioned is their transport means for conducting or escaping after the attack. Additionally, the planners of the attack already established their entry and escape routes, which present a clearly well identified plan of action. The attackers are set to appear as martyrs from the eyes of their supporters and colleagues. Thus, they have the complete support and motivation from their leader in planning the cause of this attack5. The problem in the course of the attack as this message facilitates intelligence is that the American police or security will spoil their plan. Thus, they are preparing a secondary means of addressing the case incase their first option of the planned attack fails. The terrorists in their execution of the plan and success in conducting an act of terror will remain their perception from their homes. They will become honorable people or have to die proving themselves. Thus, terror is a mechanism reflecting deprivation of the thinking capacity to the success of the terror group. From deciphering this intelligence message, it is essential for us to take the necessary measures and address the course of the security of this country. The intelligence interception was from a reliable network, as it is from the national services of surveillance, which are a core component of the national security system. The surveillance system conducts the processes of managing the information interchange, conducting all investigation and tracking of messages transmitted that pose threat to the security of the country. Notably, the surveillance and intelligence systems that facilitate the study into the works and ways of the terrorist groups reflect some remarkably interesting elements. For instance, in understanding the psychology of the terrorists, the experts describe them as remarkably suicidal when fixed in a corner6. They fear death as much as the casualties of the terror attack also fears death. Therefore, observing from this message, it is notable the terrorists want to commit their atrocity and hope to leave unharmed. Notably, the terror group network travels across the world using their fake passports, which they illegally obtain from the immigration departments. For instance, the intercepted message indicates that attackers as indicated in the surveillance message they will use the Lebanese passports since they already have them at their position. The attackers plan to use these fake passports to enter the country, hence, the need to incorporate the immigration department actively in addressing the subject of terror. As the intelligence gathering team, it is essential to factor in as many abnormalities earliest. The security of this country is paramount and each security and intelligence service has a responsibility to guide the processes leading towards protection of the innocent and hardworking citizens. The report also indicates several loopholes through which the attackers can easily explore their options regarding the weapons they will carry. The core aspects identified include the use of bombs, handheld grenades, guns and bombs. The attack as the facilitation of the intercepted message reflects also incorporates the destruction of a vast majority of the population7. Notably, terror and weapons of mass destruction are disastrous when executed accordingly. The country in this attack will look to handle over the capacity of casualties the hospital can take a time as they seek to be responsible, facilitate their first aid through the techniques available. The attack as the plan features could result in over one hundred casualties in addition to several accounts of injured people. Therefore, the intelligence needs to reflect accordingly to facilitate the preservation of the eminent attack. The coming attack also features the use of unorthodox and unexpected means such as having being sick, the conducting internal investigation before acting the action of war. Thus, it is essential to incorporate all to anticipate in divulging the eminent attack from happening. Notably, from previous reports and research into the psychology and physical execution of the terror attacks, the group conducting the attack features an increased tension and attention to details as they fear failing.8 The study into terror groups indicates that these books and articles reflect a historical recording about their preparation and execution of plan to the success of the attack. The attackers have the expected funding from the parent terror group as well as their own means of conducting the attack. This eminent attack features an increased fear that the casualties suffered will be high from the vastness of the attack and weapons used. The group intends to use the bombs and guns, as they are the easily accessible and easy to set means; however, these weapons are extremely dangerous9. The flow of the attackers plan is also another area of success that needs redress before the attack happens10. The entrance into the region selected for possible attack in the coming days is key to establishing the development of intelligence. In order to facilitate the support for the terror group, the leader of the terrorists commissions the attackers to undertake the fight. In their guide, the terror groups receive treatment, which they apply accordingly in distracting the public for the attack to dawn11. Thus, understanding these aspects of the eminent attack, the report identified as containing the message of attack is key in facilitating the war against terror. Any attack using the weapons of mass destruction can prove remarkably difficult and dangerous. The attack reactions reflect accordingly as they bring several physical and psychological trauma, stress and death. The reaction expected in the immediate attack is acute panic and outbreak of psychological and emotional challenges. Thus, these are elements for analyzing the course of this eminent attack. Terror leaves scars and wounds in the hearts of people. Notably, in the wake of this attack, the intelligence gathered is already massive and the case will receive more attention as we seek to establish the effect of the act of terror on the people. Therefore, to prevent the action of many, it is useful to address the symptoms as they arise to the sake of learning to act on message that is suspicious, as this case of terror attack presents12. Therefore, employing the techniques of gathering the intelligence is key for the war against terror. For instance, it is observable that the attackers as proposed in this case will have a safe house in Brooklyn in where they will group and conduct the final attack. Therefore, it is essential that the intelligence group take the necessary measures to address the subject of increased and rising threats to the world security. The attackers envision the place as a target from its initial scanty distribution and working of the nearest police station among others. Therefore, these elements qualify the proposed attack. Today, the strength of the US in managing its security accordingly from the threat of war is in the systems and institutions set forth to handle issues of terror. The country enjoys the strength established through the up to seventeen organizations and entities that cater for my business. Thus, I retired to understanding the role of each of these organizations in addressing the core elements to anticipate in this attack. The intelligence community has the various agencies operating at their real and own directive but still is loyal to the dedicated defense of the country and its security13. The resource management and sharing is a key element for the success in combating the oncoming terror attack. The fight in the entities of security can significantly impair the chances of the team in addressing the issue of concern. The bureau of intelligence and research will continue facilitating the core information in integrating the means of addressing the emergent case as its period is remarkably minimal. An attack given in three to six months will be quite challenging to handle. However, with the proper cooperation of the intelligence and security units, the process of engaging the fight against terror and weapons of mass destructions will prove successful. The anticipated attack is eminent and it is essential to incorporate the responsible agencies accordingly to the success of the security of the community. The people need to join the intelligence unit in supporting their community established movements and organization that cater for the challenges in the market region at home or at work14. Therefore, let us continue enhancing the security of the country accordingly, leaving mo loophole for the war against terror. Bibliography Ackerman, Gary, and Jeremy Tamsett. Jihadists and Weapons of Mass Destruction. Boca Raton: CRC Press, 2009. Cordesman, Anthony H. Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction: Defending the U.S. Homeland. Westport, Conn: Praeger, 2012. Crail, Peter. 2011. UN examines U.S. WMD controls. Arms Control Today 41, no. 8: 43, http://search.proquest.com/docview/903555708?accountid=458. Cusimano, Maryann K. Beyond Sovereignty: Issues for a Global Agenda. Boston, NY: Wadsworth, 2009. Griffith, Brittany. 2008. Panel formed on WMD, terrorism. Arms Control Today 38, no. 5: 41, http://search.proquest.com/docview/211271679?accountid=458. Gurr, Nadine, and Benjamin Cole. The New Face of Terrorism: Threats from Weapons of Mass Destruction. London [u.a.]: Tauris, 2012. Howard, Russell D., and James J. F. Forest. Weapons of Mass Destruction and Terrorism. Dubuque, IA: McGraw Hill, 2008. Katona, Peter, John Sullivan, and Michael D. Intriligator. Countering Terrorism and WMD Creating a Global Counter-Terrorism Network. Hoboken: Taylor & Francis, 2007. . Kerr, Paul. 2005. Commission slams WMD intelligence. Arms Control Today 35, no. 4: 27-29, http://search.proquest.com/docview/211279071?accountid=458. Kar, H. K. Silent Warfare: Managing Nuclear, Chemical, Biological (WMD) Disasters. New Delhi, India: Manas Publications, 2005. Laqueur, Walter. The New Terrorism: Fanaticism and the Arms of Mass Destruction. Oxford: Oxford University Press, 2010. Maurer, Stephen M. WMD Terrorism: Science and Policy Choices. Cambridge, Mass: MIT Press, 2009. NATO Advanced Research Workshop on Technology for Combating WMD Terrorism, Peter J. Stopa, and Zvonko Orahovec. Technology for Combating WMD Terrorism. Dordrecht: Kluwer Academic, 2004. Strabala, William. WMD, Nukes and Nuns: A Sequel to Prophets Without Honor: a Requiem for Moral Patriotism. New York: Algora Pub, 2006. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Partially Intuition-Based Attack Scenario Essay Example | Topics and Well Written Essays - 2000 words, n.d.)
Partially Intuition-Based Attack Scenario Essay Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/military/1842806-the-paper-concerns-the-creationforecast-of-a-partially-intuition-based-attack-scenario-based-on-scant-intelligence-or-dots-in-the-form-of-a-theoretical-intelligence-intercept-below
(Partially Intuition-Based Attack Scenario Essay Example | Topics and Well Written Essays - 2000 Words)
Partially Intuition-Based Attack Scenario Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/military/1842806-the-paper-concerns-the-creationforecast-of-a-partially-intuition-based-attack-scenario-based-on-scant-intelligence-or-dots-in-the-form-of-a-theoretical-intelligence-intercept-below.
“Partially Intuition-Based Attack Scenario Essay Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/military/1842806-the-paper-concerns-the-creationforecast-of-a-partially-intuition-based-attack-scenario-based-on-scant-intelligence-or-dots-in-the-form-of-a-theoretical-intelligence-intercept-below.
  • Cited: 0 times

CHECK THESE SAMPLES OF Partially Intuition-Based Attack Scenario

Critical Evaluation of the Paper

In fact, the author makes no effort to state the key tenets of theory with regard to scenario planning.... In other words, we do not know whether the insights gained from these two companies are sufficient to provide an all-encompassing answer with regard to scenario planning.... In fact, the author makes no effort to state the key tenets of theory with regard to scenario planning.... In other words, we do not know whether the insights gained from these two companies are sufficient to provide an all-encompassing answer with regard to scenario planning....
6 Pages (1500 words) Case Study

Mind over Machine: the Power of Human Intuition

Professor Name English 12 October 2011 Intuition As a rule, people do not pay much attention to their intuition.... However, it is worth doing this.... If there were an opportunity to use intuition in a proper way and see how other people think, there would be fewer problems and we would understand the world around us better....
4 Pages (1000 words) Essay

The Use of the Intuition

Professor Name English 30 October 2011 Intuition It is necessary to stress that every person has intuition.... This feeling frequently helps people to make various decisions when they lack knowledge in some particular situation.... Sometimes the use of this important feeling that all of us possess remind the process of answering a multiple choice test questions....
4 Pages (1000 words) Essay

Social Engineering: Examining the Latest Scams

In scenario of computer security, social engineering is a paradigm that illustrates a non-technical type of interruption that depends significantly on human interaction as well as frequently engages scamming other people to break standard security measures.... In this scenario this research is aimed to assess some of the main web based scams those make security much harder to manage in proficient manner....
17 Pages (4250 words) Essay

Project Management Development

This paper tells that rapid results initiatives base their project implementation of sub-projects.... The whole project normally divided into mini projects aimed at achieving the overall goal of the project.... Partial solutions and new technology development help to achieve rapid results.... hellip; This paper gives information that this is contrary to many beliefs of waiting for the overall solution, instead of solving small issues as they arise....
8 Pages (2000 words) Essay

Who Is Responsible for the Actions of the Weak-Minded, Hypnotized, or Paranoid

A was apprehensive that they were going to attack him.... A believed that he was being attacked and kicked the second youth-inducing a heart attack.... The youths had not intended to attack A but had been walking through the park to retrieve a broken bicycle....
16 Pages (4000 words) Case Study

Security Issues for Cloud Computing Systems

The above-mentioned scenario was defined to make clear that cloud computing evolution is a principal element in the history of information technology (IT).... This research paper "Security Issues for Cloud Computing Systems" is aimed at presenting a detailed analysis of security issues in the cloud computing environment....
15 Pages (3750 words) Research Paper

The Main Security Issues and Aspects in Cloud Computing Based Technology Arrangement

The paper "The Main Security Issues and Aspects in Cloud Computing Based Technology Arrangement" analyzes security-related aspects and highlights them with a view of current technology-based hindrances in the way of successful application of new technology-based cloud computing arrangements.... hellip; The modeling area has diverse activities that need more analysis with ongoing conceptions as of the SOA technology-based period that should be taken into account....
14 Pages (3500 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us