StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Global Terrorism Threat for the United States of America - Assignment Example

Cite this document
Summary
The paper "Global Terrorism Threat for the United States of America" discusses that biometric identification technologies will make it easier to find terrorists who disguise themselves as harmless civilians since iris and facial recognition will improve the efficiency of recognition of people…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Global Terrorism Threat for the United States of America
Read Text Preview

Extract of sample "Global Terrorism Threat for the United States of America"

Final essay Question one Global terrorism threat remains a great challenge for the United s of America. Although the US has made significant progress in degrading the capability of terrorism organizations since the September, 11 attacks, the current terrorism networks are dispersed and have shown great potential of inflicting catastrophic attacks against the US critical infrastructure (Collins & Baggett, 2009). The oil and energy infrastructure is highly vulnerable to attacks since attacks on the electricity grid will cause significant power blackout and affect critical operations in airports, hospitals, automated alarm systems and elevators. Furthermore, attacks on the oil and energy network may lead to significant damage on the missile and nuclear reactors thus causing a major disaster in the US (Forest, 2006). The water infrastructure such as dams, water plants and pipelines are attractive targets for terrorists due to the high fears that will be create among the American public and extent of deaths that will occur after contamination of the water system with poisonous bio-agents (Sullivant, 2007). The telecommunications and cyber space is vulnerable to terrorists’ exploitation. The information technology and telecommunication infrastructure is a possible target by terrorists who are eager to disrupt the computer-supported operations of the defense systems and compromise the confidentiality of critical and sensitive government information. Edwards (2014), outlines that cyber-terrorism skills are currently accessible through internet websites, magazines and bulletins and thus the US telecommunication infrastructure and cyber space is highly vulnerable to terrorism attacks. The public health system is vulnerable to attacks since most health facilities are freely accessible to the public and the structural designs of the buildings are not capable of controlling contamination due to lack of isolation rooms, controlled airflow systems and special surfaces to safeguard infectious biological agents (Caldwell & Williams, 2012). Global terrorists have access to biochemicals such as anthrax that can be distributed through the post and parcel systems in the US thus causing massive deaths. The US public health system is not adequately equipped to detect and eliminate threats posed by chemical and biological weapons such as poison gas attacks on subway trains. The public health has limited capacity in determining whether biological attacks have occurred and responding within the appropriate time (Edwards 2014). The public transport infrastructure is another vulnerable critical infrastructure since the US government has not undertaken enough measures in protecting the surface transport systems from explosive attacks despite millions of Americans using the systems on a daily basis (Johnstone, 2006). The high concentration of people in railways, seaports and urban roads is a threat that terrorists can use to kill people using explosives and escape easily. Johnstone (2006) claims that terrorist attacks on public transport systems will cause great panic and disruption of normal life. Question two Although the FDA and USDA has made several progress in securing the American food supply from natural contamination or terrorism attacks, several incidents of restricted additives in pet food, massive recalls of contaminated meat, cantaloupe contamination and spinach contamination have been reported. According to the Center for Disease Control (CDC), about 5,000 deaths occur annually due to contaminated food and deliberate contamination of the food is a real possibility and this would lead to national crisis. The current laws and regulations can be modified in order to secure American food supply. The FDA must implement laws that will require both domestic and international food manufacturers to put in place measures that mitigate the risks of terror attacks since the American food supply system is complex, interconnected and open thus making it potential target by terrorist attacks (Caldwell & Williams, 2012). This can be attained through ensuring importer accountability of food safety, requiring third party certification of the imported foods and refusal of food imports that have not been certified as safe for human consumption. The body must incorporate foreign supplier verification programs, certification of suppliers and audits of foreign suppliers in order to detect the high-risk foods that require additional monitoring (Sullivant, 2007). I believe FDA must enhance the partnership with other food safety agencies such as federal, state, local and territorial agencies that have the mandate of attaining public health goals in order to ensure faster recall of contaminated food and prevention of natural contamination (Forest, 2006). FDA should issue regulations to protect against the international adulteration of food and specify the appropriate science-based mitigation strategies that will safeguard against adulteration of food. Accordingly, it is essential to provide regulations that ensure safe bulk storage and safety of industrial facilities especially liquid ingredients that can be contaminated with toxics during manufacturing process. The manufacturers must maintain records of employees handling the manufacturing process in order to prevent strangers from introducing contaminants such as botulism, mercury and salmonella (Sullivant, 2007). FDA must strengthen food product tracing through well documented production in order to trace the food products along the distribution channels in case of contaminated food (Caldwell & Williams, 2012). Most of the food products are not properly documented thus establishing the origin making it difficult for the food safety standards enforcement authorities. There must be appropriate and sanitary method of transporting human and animal food in order to prevent natural contamination during transportation since instances of contaminated milk and meat during transport are high across the US. Question three American citizens are not adequately prepared to be first responders although they are the first in natural disaster situations such as Hurricane Sandy and man-made disasters such as Knife attack at the Franklin Regional High School neat Pittsburg. The American citizens can be more effective in being First Responders to disasters through offering education on how to use the emergency communication systems such as 911 public safety answering points, the emergency alert system and radio communication systems in order to notify the emergency departments and the police about the occurrence of the disaster (Kingsbury, 2009). According to Pinkowski (2008), the US citizens must understand the importance of remaining calm in order to avoid more disasters during the panic such as road accidents and must evacuate to a safe place after hearing the alarms. The First Responders must activate the alarm systems and must avoid hazardous situations such as radiation, chemical or biological exposure that may lead to death or personal injuries (Pinkowski, 2008). As First responders, the US citizens must direct the ambulance services to the injured people and must close doors or windows in order to prevent fire from spreading to the next building after ensuring all people trapped inside have been evacuated (Kingsbury, 2009). The First Responders should make distinguishable traits of the offender in case of assaults, robbery or terrorist attacks, try to notice the movement of the attackers and record the license plate number in order to assist the law enforcement agencies with information (Pinkowski 2008). Question four The US needs new technology to protect Critical Infrastructure/key resources from terrorist attacks or natural incidents. Research and technology development will enable the US to improve the capacity to conduct various tests on potential radiological, chemical and biological contaminants that threaten food, water and agriculture. The US must leverage technology research and development in order to protect the food and water critical infrastructures through enhanced information sharing and issue of warnings. Research and technology will facilitate technical surveillance and detection capabilities of intruders across the critical infrastructure such as water pipelines and detect any residues in critical infrastructure such as chemical, radiological and biological residues (Cogwell, 2003). For instance, emerging technologies have proved the potential of monitoring the water distribution system through sensor placement optimization and Canary event detection software that operates contaminated water warning systems and water sample concentrator software that detects the hazardous biological contaminants. For instance, the Project Bio Watch that was undertaken by the joint efforts of Department of Homeland security, Environmental Protection Agency and Centers for Disease control and Prevention Laboratory response network provides early warning against bio-threats. The US must enhance the capacity of laboratory professionals to detect animal disease outbreaks and possible food contamination through increased use of technology in detecting at border points and ports and also additional food analysis across the country (Flammini, 2012). The technology improvements must enhance interoperable communications that will enhance emergency response during terror disasters through ensuring communication networks during disasters are safe. The National Telecommunications and Information Administration has developed standards of ensuring interoperable communication across homeland security agencies and authentication methods such as biometric identifiers and SMART cards in order to ensure the security of the disaster communication system (Sullivant, 2007). Accordingly, biometric identification technologies will make it easier to find terrorists who disguise themselves as harmless civilians since iris and facial recognition will improve the efficiency and consistency of recognition of people entering the Critical infrastructures (Flammini, 2012). References: Caldwell, D & Williams, R.E. (2012). Seeking security in an insecure world. Lanham: Rowman & Littlefield Publishers. Cogwell, M.T. (2003). Critical infrastructures. New York: Nova Science publishers. Collins, P.A & Baggett, R.K. (2009). Homeland security and critical infrastructure protection. Westport, CT: Praeger Security International. Edwards, M. (2014). Critical infrastructure protection. Amsterdam: IOS Press. Flammini, F. (2012). Critical infrastructure security: assessment, prevention, detection and response. Southampton: WIT Press. Forest, J.F. (2006). Critical infrastructure. Westport, CT: Praeger Security International. Johnstone, R.W. (2006). 9/11 and the future of transportation security. Westport, CT: Praeger Security International. Kingsbury, N.R. (2009). Homeland security: first responders’ ability to detect and model hazardous releases in urban areas significantly limited. New York: Diane Publishing. Pinkowski, J. (2008). Disaster management handbook. New York: CRC Press. Sullivant, J. (2007). Strategies for protecting national critical infrastructure assets: a focus on problem-solving. Hoboken, New Jersey: Wiley-Interscience. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Final Essay Assignment Example | Topics and Well Written Essays - 1500 words - 5, n.d.)
Final Essay Assignment Example | Topics and Well Written Essays - 1500 words - 5. https://studentshare.org/technology/1836211-final-essay
(Final Essay Assignment Example | Topics and Well Written Essays - 1500 Words - 5)
Final Essay Assignment Example | Topics and Well Written Essays - 1500 Words - 5. https://studentshare.org/technology/1836211-final-essay.
“Final Essay Assignment Example | Topics and Well Written Essays - 1500 Words - 5”. https://studentshare.org/technology/1836211-final-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Global Terrorism Threat for the United States of America

The Business of War and Terrorism

Although increased military expenditures on rebel and terror groups have been evident since historical times, the emergence of the current trends of rising military expenditures in anti-terrorism crusades could be traced to the 9/11/2001 terror attacks on the united states of america's Twin Towers.... For instance, for the united states along, there was a reported 53% increase in terrorism-related military expenditures in the five years preceding the 9/11 attacks by Al-Qaeda (Ranstorp, 2009, P....
11 Pages (2750 words) Coursework

War on Terror

This paper argues that the real intentions of america's foreign policy changes during the Bush regime was not for destroying terrorists, but for spreading American imperialism.... Was the foreign policy of the Bush administration driven by fears of global terrorism?... However, many people believe that most of the changes made in the foreign policies by President Bush were motivated by imperialism rather than patriotism or fears of global terrorism....
12 Pages (3000 words) Essay

The Government or Mass Disruption of the Peace

the united states has been attacked by many threats from Muslim nations.... hellip; united states has been a fatality victim of terrorism over the past two decades where US citizens on foreign soil and in the USA have been terrorized by the enemies of the country.... describe the nature and source of the threat, and evaluate where the threat ranks against the current threat of terrorism.... The term asymmetrical threat refers to a threat where the group causing the terror is widely spread and operates within a shadowy network....
6 Pages (1500 words) Research Paper

Policy recommendations in counter-terrorism

Third, the united states can and does apply considerable political, economic, and military pressure on the states that are known to be supporting terrorism (Global Focus 2010).... Third, the united states works hard to force the states that sponsor terrorists to change their attitudes and behaviors (Global Focus 2010).... These are not the only problems facing the united states in its fight against terrorism.... Third, the united states works hard to force the states that sponsor terrorists to change their attitudes and behaviors (Global Focus 2010)....
4 Pages (1000 words) Essay

Investigating Terrorism: Political Surveillance

For instance, the infamous 9/11 bombing of the Twins Tower of the World Trade Center in New York, the united states of america was due to policy differences between USA and Al-Qaida.... In addition, terrorism activities committed against Kenya and Tanzania in 1998 were due to political competitions and policy differences between united states of america and its allies on one side and Al-Qaida and its sectarian state sponsors on the other (ADL.... The paper will discuss the challenges encountered by security intelligence organizations in their attempt to use the concept of political surveillance in detecting and preventing terrorism as well as indentifying potential terrorists....
4 Pages (1000 words) Essay

Terrorism Causes, Motivations and Reccomendations

hellip; The attack could be associated with the cordial relationship of Floola with the united states of america, religious extremism and wayward individual beliefs.... Therefore, the attack in Floola can be squarely associated with existing cordial relationship of Floola with united states of america as well as wayward individual beliefs and religious extremism.... The emergence of modern terrorist attacks can historically be likened to the emergence of liberal states....
5 Pages (1250 words) Essay

Terrorism as the Greatest Threat to American Development

Policy analysis Name: Institution: Issue The 9/11 terrorist attack in the united states of america presented the country with serious security threats thereby compelling the government to act with the view of improving the country security.... the united states of america is the global super power with the best economy and the strongest military apparatus in the world.... The president of the united states of america is an international figure of both power and authority....
4 Pages (1000 words) Essay

The threat posed to the United States by nuclear terrorism from Al Qaeda

hellip; In Paul Wilkinson's article called Terrorism and the Rule of Law terrorism is defined like "the systematic use of murder, injury and destruction or threat of the same to create a climate of terror, to publicize a cause and to intimidate a wider target into conceding to the terrorists' aims" (12).... It has been reorganized preparing newcomers with the help of new means and methods, posing again a threat on the USA as well as its allies (Gunaratna 23)....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us