Nobody downloaded yet

National Security - Case Study Example

Comments (0) Cite this document
On July, 7th ,2005, there were a series of bomb attacks in London in which fifty two people were killed and several hundreds others injured. These were four attacks which occurred in the morning hours in the London Underground system. The first one occurred on the Circle line which is located between Liverpool and Aldgate Street…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
National Security Case Study
Read TextPreview

Extract of sample "National Security"

Download file to see previous pages But could the security services in the country have done better in preventing these shocking attacks. According to the Guardian (2006), the reports on the cross party intelligence and security committee into the London terrorist's attacks of 7 July 2005 did not find any "evidence of an intelligence failure that could have prevented the bombings." It further says that it only identified "Intelligence gaps." The committee further states that the "comparatively small" capacity of the secret service to conduct conclusive investigations, had also to blame for the attacks. There have been attempts to protect the security forces from any blame or taking of responsibility of a possible failure on their part to prevent the bombings. However, serious questions arise.
The first question is could have the security services known about any planned attacks on the British soil. The MI5, which is Britain's domestic spy service, the agency responsible for gathering intelligence on any internal attacks, insists that it did not have any information about the intended bombings. This is supported by the Intelligence and Security Committee Report into the London Terrorist Attacks, which claim that the Secret service had no prior information on possible attacks in London. It however notes that, one of the attackers Siddequine Khan was known to the Security Service before the attacks. These claims have drawn world wide criticism from different individuals, groups and media houses claiming that to the contrary, the security services had prior information about the possibility of an attack from as early as in 2004 but did not only act appropriately.
According to WSWS 2007, there was also credible warning by the Saudi Arabian Intelligence about a plot to bomb the Britain. This warning was however dismissed by the security forces as irrelevant. The security forces and the government denied this, even though, The Guardian-2006 reports that there was even credible sources form the White House which confirmed the claim. It further claims that the information from the Saudi intelligence was so specific, that it even noted that the plot involved four Islamic extremists and that the target was London. This has since been confirmed by the Saudi Arabia's ambassador to the United Kingdom. (WSWS 2007). (WSWS 2007) further reports that the Israelis Secret Intelligence Service had also warned the British security services about possible terror attack in London just a few days before the attacks. The Morning star (2007) also reports that the Saudi and French governments had warned the MI5 about the attacks. It from all these claims, it is probable that the secret service, had information about the possibility of an attack in the United Kingdom (UK) and more specifically on the UK's rail network. It however did not treat these warnings with the proper attention they deserved. According to WSWS(2007) a statement from the then Prime minister, (Tony Blair), which was quoted in the parliamentary report, revealed that the services had been alerted on a possible attack by terrorists who were British Citizens. It also reports that in May 2005, in the same parliamentary report, it is noted that there was security information that attacks similar to the Madrid bombings would be carried out in the United Kingdom.
The Secret service has been criticized for having under surveillance two of the bombers and taking no serious actions to prevent the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“National Security Case Study Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from
(National Security Case Study Example | Topics and Well Written Essays - 2000 Words)
“National Security Case Study Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF National Security Case Study

Civil Right vs. National Security Case Study: Padilla/Hamdi vs. Rumsfeld

...? Civil Rights vs. National Security Case Study Padilla/ Hamdi vs. Rumsfeld [Full Registration Number] [Teacher’s [Date of Submission] Introduction Since the compromise of national security witnessed during the September 11 attacks on US soil, tough measures to counter terrorism continue to find their way in national security policies inside and outside the country. Several laws supporting security agencies to counter the threat posed by terrorism have been formulated, creating tremendous success against a backlash from civil rights activism. Whereas civil rights and freedoms appear to have a strong presence and provision...
15 Pages(3750 words)Case Study


...on teacher’s credentials were important operational imperatives that set them apart from the standard schools. Answer b Yes. KIPP schools should be replicated. In the increasing pluralistic society, the diversity of race, income and nationality has greatly contributed to the emerging social problems of conflicting ideologies, wide income disparity and lack of understanding. The children living in impoverished conditions in the neighbourhood colonies have become innocent victim of the time. KIPP schools provide them with facilitating environment that helps to exploit their academic competencies to improve and improvise the standard of living. Their inclusion into mainstream population is facilitated by their academic...
3 Pages(750 words)Case Study

Network security fundamentals, security threats, and issues

...?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic design is intrinsically insecure and...
4 Pages(1000 words)Case Study


...? INFORMATION TECHNOLOGY SECURITY (Computer Sciences) of (affiliation) of Submission: Estimated word count: 1,937 Introduction The human experience today continues to be benefited and expanding at a very fast rate because of computer-related technologies which contribute greatly to modern conveniences. In the daily experience, people expect their lives to be safer, smoother, and easier due to computer technologies which if considered in the context of history, are a fairly recent phenomenon. It has contributed to the rapid expansion of data sets, new information, great incredible knowledge acquisition and hopefully, the enhancement of human wisdom. Computers had literally made the task of computing very fast and ultra...
6 Pages(1500 words)Case Study

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor security management, incorrect implementation, and malicious...
3 Pages(750 words)Case Study

Middle East changing demographics and its effect on us national security

...MIDDLE EAST CHANGING DEMOGRAPHICS AND ITS EFFECT ON US NATIONAL SECURITY Being the economic giant and the only superpower of the world, the USA playsmost dominant role in world politics. It not only leads the entire globe in the strategic and financial fields, but also supports the third world countries in respect of obtaining internal stability as well as protection from the external threats. But the entire efforts made by the USA are not mere on charity basis. Rather, she is eager to sustain her domination over all the economies of the world, and implement her own political and economic order on all independent states. Consequently, some of the racial and religious groups started a revolt against the US policies, which resulted... in a...
13 Pages(3250 words)Case Study

National culture

...Introduction National culture brings to light the pertinent topics with regards to organizational norms and behaviours which it hasto adopt whilst being an active member of the said society, the related community and the region in essence. The organizations worldwide face a number of challenges when they decide to go global. This is a common problem that they face since they do not have any prior knowledge or understanding of the new territory that they will do their business from. However what best they can do is to find out and research the strengths and weaknesses of this area and hence upon getting the much needed knowledge, base ...
16 Pages(4000 words)Case Study


...simple words with numbers to make the passwords more secure. This will make it easier for them to key in the passwords into the system. Increasing the number of password attempts will also go along way in reducing the number of times that the system locks itself. Also finding other means to reboot the system when it locks itself will go along way in reducing the time that is spent looking for the manager to reboot the system. About the time spent rebooting the system, it would be better to upgrade the systems processors and virtual memory to enable it rebuilt in a matter of seconds. To avoid all these problems with passwords, it will be a good idea to incorporate a proximity key card and its reader to the system (refer...
5 Pages(1250 words)Case Study

Homeland Security

.... Others Include the Federal Emergency Management Agency, the United States National Guard, among other departments adding up to one hundred and eighty-seven companies. The functions of the Homeland security are a major responsibility of the state (Berman & Flint, 2003). Homeland Security Issues There have been several issues that affect the United States of America and that the Department Of Homeland Security has been grappling to deal with over years and presently. These issues include terror attack threats, immigration, capabilities, resource allocation, civil liberties, incident response, transportation security, intelligence, biotechnology, cyber...
5 Pages(1250 words)Case Study

Information Security and the National Infrastructure

...Case Study 2: Information Security and the National Infrastructure The United States energy infrastructure strengths the international financial system of the twenty first century. In fact, in the absence of a secure energy supply, welfare and health sectors are under danger and the United States financial system is not able to work properly. Additionally, more than 80% of the nation’s energy infrastructure is possessed by the nation’s private sector (IDAHO, 2010). In the past few years, the security issues and vulnerabilities regarding digital systems and networks have increased exponentially, as the public responsiveness has not kept up by those innovative dangers and vulnerabilities in the Internet based cyberspace. However... , these...
2 Pages(500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic National Security Case Study for FREE!

Contact Us