Free Essay

Threats of Terrorism

In:

Submitted By jizsm12
Words 2431
Pages 10
Constant threat of terrorism

Constant threat of terrorism
The terrorist attacks of 11 September 2001 on the World Trade Center (WTC) in New York and the Pentagon in Washington, showed the power of a terrorist network.
International Network of Global Salafi Jihad and its department al-Qaeda unit al-Sulbah (Al-Qa'idah al-Sulbah) - the main organizers of large-scale terror attacks of the last fifteen years - are the most powerful terrorist and public organizations whose purpose is to establish a true Islamic government and the revival of Islam.
The emergence of organizations such as the Global Salafi Jihad (Salafist movement) and the international terrorist network al - Qaeda - the International Islamic Front for Jihad against Jews and Christians – is a consequence of a single trend prevailing in the contemporary Muslim world - namely, rise of radical and militant Islamism.
International terrorist organizations seek to acquire weapons of mass destruction and sabotage plans in the areas of oil and gas. In addition, according to some researchers, operating in Russia's North Caucasus militants are closely linked to the international terrorist network “Al Qaeda”.
“Al-Qaeda” has transformed into a movement that brings together independent terrorist cells in the world on an ideological basis. It has established strong contacts with regional extremist organizations in the Islamic Maghreb, in south-east Asia - with a "JI", in Russia - the “Caucasus Emirate” (Bergen, 2006).
In addition, the terrorist organization through contacts with pirate syndicates are planning to sabotage the sea lanes, coastal infrastructure in areas of hydrocarbon production. The priority areas they consider Gibraltar, Hormuz, Bab-el-Mandeb Straits and the Suez Canal.
Terrorists eager to facilities and technology of chemical and biological and bacteriological weapons, to the radioactive, toxic substances.
Terrorists are used by a variety of forces in their interests. Business and political establishment of the Islamic countries financially stimulate anti-Western and anti-American terrorist groups, trying to get a fundamentalist power from their countries to the outside. Islamic fundamentalist terrorist groups are seeking to impose their ideology (the struggle for a world Caliphate or Salafi state), direct terror against the enemies of radical Islam.
Changing political environment in recent years has led to the phenomenon of “Superterrorism” or “overterrorizm”, which “has a large financial, ideological and human resources”, which allows it, as acknowledged on the official level, to create a threat of “the use of nuclear, chemical and biological weapons” (Levi & Kelly, 2002).
The U.S. administration is considering distribution in the world of weapons of mass destruction among the major threats to national security. In this case, according to the White House, is a particularly dangerous desire to possess weapons of mass destruction or their components namely from the side of international terrorist organizations. This position is reflected in the doctrinal documents of American leadership as the “National Security Strategy”, “National Military Strategy”, “National Strategy for Combating Terrorism”, “A comprehensive review of the status and prospects of the development of the armed forces”.
The probability that at some point the U.S. will be under attack with weapons of mass destruction, is 100 percent - said Dr. Waheed Majeed, associate director of the Office for weapons of mass destruction of FBI.
Such an attack can take foreign terrorists, single terrorists, or even criminal groups, said Majeed. Most likely they will use chemical, biological, or radiological weapons rather than a nuclear device.
According to Majeed, American intelligence each year receives hundreds of reports that foreign terrorists are gaining access to weapons of mass destruction. When U.S. troops entered Afghanistan, they found that al-Qaeda was working on weapons of mass destruction, linking chemical and biological weapons.
In any case, so far, all reports of foreign terrorists obtaining weapons of mass destruction were not confirmed. However, the Department of the FBI, in which Majeed works, each year investigates in the United States more than a dozen cases of intent to use a weapon of mass destruction.
For example, in 2008 the FBI arrested Roger Bergendorff – in his house they found the ricin and anarchist literature. Ricin kills cells by inhibiting protein synthesis. Within days, the liver, spleen and kidneys of a man who swallowed or inhaled ricin stop working, resulting in death (Gaibulloev, Sandler & Santifort, 2011).
Islamic radicals are trying to create their own nuclear weapons at least since the early 1990s. In 1993 their prominent leader Salem issued a special memorandum to find materials to make a nuclear bomb. Terrorist underground has even developed an ideological concept that motivates the use of these weapons against the “infidels”. However, from conception to implementation there is big enough and complicated way.
In the world there are 22.4 thousand nuclear warheads, 95% of which are in Russia and the U.S..In the whole 9 states own nuclear weapons, 4 of them (Russia, Israel, India, Pakistan) are in their territory the most powerful and active terrorist network, the object of interest of which may be national nuclear arsenals. Other nuclear weapon states also not free from manifestations of political extremism (Gunarathna, 2002).
The failure to create or steal nuclear weapons designs forced the terrorists to find other ways - in particular, to try to use as a weapon radiation, invisible and because of it even more frightening for the mass consciousness.
It is a radiological or “dirty bombs” - explosive devices, where radioactive objects are used as the striking element. There are cases, when al-Qaeda militants were preparing terrorist acts with the use of such weapons in a number of Western countries (Gunarathna, 2002).
Creation of radioactive weapons is much easier, and access to sources of radiation is wider, as they are part of the mass devices, from X-ray equipment to various fire detectors.
The object of the terrorist threat is also a nuclear power, as any nuclear reactor can be used as a large “dirty bomb”. The experience of the Chernobyl accident shows that the undermining of the reactor is the release of significant mass of radioactive elements that are spread over long distances by wind and fall to the ground along with the sediment.
The process of the production of chemical and biological weapons is also technologically simpler than nuclear, and it does not require difficult access raw materials, like uranium or plutonium. This allows even affluent states or terrorist groups to get these types of weapons.
However, experience shows that it is not so simple. Attempts to use chemical and biological weapons in the attacks were made in the last century, but their effectiveness was limited. Montreal Institute of International Studies (Canada) recorded from 1900 to 1999, 126 such attacks. In 96% of the average number of victims was 3 people, 60% of all treated without human death (Sokolski, 2000).
The problem in many “traditional” for terrorism involving weapons of mass destruction: the production of biological weapons is associated with an even greater number of technical problems, from bacteria to ensure their dissemination. Experiment of the U.S. military on planning of homemade production of biological weapons of mass destruction, conducted in 1990, also failed, as all the projects proposed by the Army Research Institute graduate infectious diseases contain, in terms of their experts tested them, errors critical for implementation.
Unsuccessful is also the experience of well-trained terrorist groups. At the disposal of the sect Aum Shinrikyo was biological laboratory with the cost more than $ 1 million and a team of qualified specialists. However, a few years they were not able to create biological weapons of mass destruction. Testing biological weapons on the basis of anthrax spores (Bacillus anthracis) and botulinum toxin were conducted several times, but ended in failure (Sokolski, 2000).
Based on the above, we can conclude that the creation of biological and chemical weapons by terrorists is possible, but due to many problems and in most cases does not justify the cost. It is possible that in the future, with the development of military biochemistry, the role of these weapons of mass destruction in the world will change (Norris. & Kristensen, 2010), but now it is rather risky to offer to that process forecasts.
Threats of “Superterrorism” related to the use of WMD by extremists, can be divided into two groups: 1) of low probability or impracticable; 2) theoretically feasible, but difficult to quantify and having limited risk.
Among the unlikely we include terrorist use of nuclear weapons (stolen or home-made), and the undermining of the reactors of nuclear power plants. The difficulty of implementing these threats due to the fact that modern terrorist organizations cannot manipulate sufficient material, human and intellectual resources to overcome the security measures taken by the modern society.
It is not reasonable to completely exclude the possibility of such situations in the future, in case of a weakening of social control and increasing the resources of terrorist organizations. However, this process will inevitably be accompanied by a large-scale commission of terrorist actions using conventional weapons, the taking of governmental institutions and attacks using a significant amount of explosives.
Among the “theoretically feasible” “superattacks” are the use of “dirty bombs”, biological and chemical weapons of mass destruction. In all these cases, the main threat is not the actual number of victims, which is comparable to the attacks using “conventional” weapons, but panic that would be caused by the character of attacks. In the case of use of such weapons in a major city many people will be feared that they are victims of radiation exposure, infection or gas, which will cause panic and medical facilities overload, an example of which can serve the consequences of a gas attack in the Tokyo subway.
In such cases, the consequences of terrorist attacks using this type of WMD will largely be determined by the media, government information policy and the level of awareness of the real level of threat from the above types of WMD.
We emphasize that low threat assessment of“Superterrorism” threat, to which we are inclined to the basis of these facts, does not mean the absence of non-standard risk of terrorist attacks. Experience of the September 11 attacks showed that international terrorism does not have to use sophisticated and expensive technological solutions for making large-scale terrorist attacks with a significant number of victims. However, too much attention to the threats, the real level of which is low, to the detriment of other, simpler and feasible scenarios, would be a mistake.
According to the majority of foreign experts, in the short term, in the next two to three years most likely are conducting of terrorist attacks with the use of conventional explosives. However, in the coming ten-year period on the same forecast tit is expected the transition of terrorist to the use in their actions of WMD components. The most likely targets of attacks using weapons of mass destruction are the infrastructure of attacked countries, instead of towns and cities.
Officially, the U.S. has in total 77,069 potential targets of terrorist attacks.
For actions systematically and increasingly suicide bombers can be used, trained in specialized centers. To prevent and to reflect the majority of the suicide actions foreign experts recommended a sharp increase in the intelligence, especially towards the establishment of a reliable agents inside of dangerous movements and groups, as well as the expansion of the humanities on the political and psychological treatment of all members of the groups that are most likely to resort to the method of the use of suicide bombers. It is necessary to intensify the exploration and identification of training suicide bombers, support networks, and operational support of their actions in order to eliminate these systems (Zimmerman & Lewis, 2006).
As to the implementation of the terrorist attacks, they can generally be summarized in three main directions, different in identifying the priority of any possible object of attacks.
In accordance with the first method, the most likely target of attacks of terrorists will be choose in the first place a large commercial and corporate business objects, and instead or in addition to military and diplomatic facilities. Such an assessment is argued that business objects are more open and accessible to attack, less protected and guarded than military and diplomatic facilities.
The second method involves a priority for terrorists important civilian facilities with large populations. Such a choice is argued the importance and value of objects populated for terrorists now goes up as attacks on them leads to mass casualty of population, cause huge and desirable for international terrorist leaders social and political repercussions.
The third method is that the terrorists focus their attention on objects, symbols of the state, and not on those sites, attacks of which could lead to mass casualties. This choice is argued that terrorists will come from a desire to avoid a sharp reaction against their groups and leaders of military force by states.
All three methods are mainly deal with facilities in the U.S., Russia, Israel, the West in general.

However, it should be emphasized that the specificity of globalization is a general openness and interaction, so international terrorist sooner or later may own modern technology. Traditional terrorism does not threaten society as such, did not affect its foundations. Modern high-tech terrorism can provoke a systemic crisis in the advanced information structure, and even the crisis of the world community. Unfortunately, if the situation in the world will not change drastically, the terrorist use of weapons of mass destruction is only a matter of time. This demonstrates once again: the fight against terrorism by force and technological methods can only restrict it, or change the time and place of attack. Deferred terrorist attack could be by an order more powerful of magnitude than prevented one. Eradication of terrorism is only possible in the ideological, social, spiritual measure.

References

Bergen, Peter (2006). The Osama bin Laden I Know. Free Press, P.283.
Gunarathna, Rohan (2002). Inside Al Qaeda, Global Network of Terror. Berkley Books, pp. 61-62.
Norris, R.S.& Kristensen, H.M. (2010). Global nuclear weapons inventories, 1945−2010. Bulletin of the Atomic Scientists, № 66, P. 77.
Zimmerman, P.D. & Lewis J.G. T(2006). The Bomb in the Backyard. Foreign Policy, October 10.
Levi, M.A. & Kelly, H.C. (2002). Weapons of Mass Disruption. Scientific American, November.
Sokolski, H. (2000). Rethinking Biochemical Dangers. Orbis, Volume 44, Issue 2, Spring. P. 186.
Gaibulloev Khusrav, Sandler Todd & Santifort Charlinda (2011). Assessing the Evolving Threat of Terrorism. Retrieved from <http://research.create.usc.edu/published_papers?utm_source=research.create.usc.edu%2Fpublished_papers%2F146&utm_medium=PDF&utm_campaign=PDFCoverPages>

Similar Documents

Premium Essay

Threats of Nuclear War and Terrorism

...Threats of Nuclear War and Terrorism Living in the United States of America can be a great opportunity for people all over the world. However, there are many historical and current events that people need to be aware of. The United States has been considered one of the greatest places to live however is not well liked by some countries. There are many countries in the world who want to conquer the United States for power and for wars that have happened in the past. The United States is currently a very big nuclear threat in the world even though other countries have nuclear weapon capability. In reality, only two nuclear weapons have ever been used in the course of warfare, both were by the United States near the end of World War II. On August 6, 1945, a uranium device that was code named “Little Boy” was detonated over the Japanese city of Hiroshima. Three days after on August 9th a plutonium device named “Fat Man” exploded over Nagasaki, Japan (How Americans Lived. Aug. 2013). The popular consensus was that these bombs helped win World War II. The situation changed when the soviets acquired atomic bomb capabilities in 1949. With this new threat brought the Cold War and the age of Civil Defense, and Nuclear Fallout. (How Americans Lived. Aug. 2013). During this time Americans lived in fear of an atomic bomb striking the United States since they had seen the destruction it was capable of. The entire nation put emphasis on training citizens on what to do in the event of an...

Words: 422 - Pages: 2

Premium Essay

Terrorism as a True Threat to National Security in the United States

...Terrorism as a true threat to national security in the United States Terrorism as a true threat to national security in the United States Terrorism is a true threat to national security. It brings human distress and goes beyond the direct suffering by causing fear in the population as a result of its cruel and unsystematic nature. It can be defined as the use of violence by a group or an individual to create tremendous worry and panic within a target population. The group undertakes the violent actions with the aim of compelling the target population into agreeing with their demands. It does this by targeting symbolic buildings and/or places (Ervine, 2010). It is extremely difficult to argue that terrorism is not a threat to the state and that the US has overly focused on it. The threat is true and has become more evident due to the increasing attacks that have claimed a lot of lives. It is covered extensively in the media and every US citizen lives with fear. It is a threat to innocent residents conducting their daily routines as the terrorist activities are aimed at them and not necessarily at the government (Wilson, 2010). Terrorism influences and is influenced by the political arena. It is linked to the government and has a wider scope of effects that reach beyond the targeted individuals. It mainly depends on the fear of the state’s general public and tries to achieve precise goals such as the freedom of political prisoners. A small group of individuals can...

Words: 718 - Pages: 3

Premium Essay

Terrorism: Relationship Between Australia And Terrorism

...Australia and Terrorism Terrorism is not a new term and can be defined as “the unofficial or unauthorized use of violence and intimidation in the pursuit of political aims” (Dictionary, 2014). The emergence of terrorism was significant in history, and in more recent times, has become a threat to Australian Borders. The effectiveness of the law in preventing and reducing levels of terrorism is highlighted through the use of case studies and evaluation. The Hilton bombings The relationship between Australia and Terrorism is specifically highlighted in the Sydney Hilton Bombings on the 13th February 1978. This was the first experience of Terrorism in Australia and created the need for better security and the implementation of effective protection...

Words: 958 - Pages: 4

Premium Essay

New Terrorism

...New Terrorism? Predicting the Future of Terrorism Introduction/ Purpose Terrorism is an often controversial subject. “One man’s freedom fighter is another man’s terrorist.” This is a well known quote that is often used to allude to the complexity of terrorism. Terrorism, the word itself is a word that has possessed over a hundred definitions and a concept that has changed as the societies of the world have progressed. The use of the terms terrorism and terrorist are politically weighted, and are often used for a polarizing effect, where 'terrorism' becomes simply a relativist term for the violence committed by an enemy, from the point of view of the attacked. Because of the political nature of some struggles, 'terrorism' can become identified as simply any violence committed against established institutions. A terrorist is, strictly speaking, one who is personally involved in an act of terrorism. The term "terrorism" comes from the French 18th century word terrorisme (under their government's Reign of Terror), based on the Latin language verbs terrere (to tremble) and deterrere (to frighten from). The use of the term "terrorist" has had broader applications however, ranging in application from disgruntled citizens to common political dissidents. It is important to understand terrorism in our modern arena and under stand its effects on society. ‘Terrorism’, as a unified political and ideological motif did not arise spontaneously in response to particular instances...

Words: 3197 - Pages: 13

Free Essay

Board Briefing on Security

... Introduction 3 Terrorism in Commercial Organizations 3 Terrorism in Airlines 4 Current Threats to Aviation 5 Insider Threats 5 Automation Adds Efficiency 6 Improving Total Operations 6 Increased Threats from Advanced Explosives 6 Threat against Airline Services and Airports 7 Necessary Steps to Improve Aviation Security 7 References 9 Introduction Terrorism is the systematic use of terror. It does not have a legal binding or definition in criminal law. Commonly, it is referred to creation of fear through violence (Townshend, 2002). Terrorism is usually defined and assumed as a group phenomenon (Hofmann, 2012). Terrorism has spread across the globe with its many forms and indicators. The emotional and diplomatic use of the word terrorism has resulted in a difficulty to provide an appropriate definition of terroorism (Raman, 2008). Researches have figured out more than hundred definitions of the word. The notion of terrorism is arguable due to two main reasons. Firstly, it is often used by government and other ruling bodies to delegitimize political or other rivals, secondly, to possibly legitimize the use of equipped force against enemies. A steadfast and unique characteristic of terrorism is the undifferentiating use of strength counter to noncombatants for the aim of attainment of publicity for a group, root, or individual. The representation of terrorism can influence human fear to help attain these goals. The problem of terrorism needs to be handled...

Words: 2069 - Pages: 9

Premium Essay

Security Studies

...Security study was in the past regarded as a sub-discipline of international relations underpinned in Anglo-American thinking. Until early 1990s, security studies were considered as a strategic studies focusing on a strong military focus. This traditional view of security involved the protection of the state and a scientific agenda to secure the state from definable threats and maintain the status quo. This is a positivist approach which was based on rationalism and realism. The Copenhagen School presented an alternative view of security studies by responding to the traditional approach of forming a clear sense of ‘what is security’. This approach is defined in three mechanisms: development of sectors approach to security, developing a regional focus on security and critically engendering a social constructivist theory of security through securitization studies. This theory will be the main focus of this discussion. To achieve a critical discussion of what securitization really entails, this paper will use the case study of USA’s war on terrorism in Afghanistan. The approach used by the US government to fight against terrorism in Afghanistan and Iraq can be considered as a securitization approach which has led to a resulted in security problems in the two countries rather than solving the issue. Securitization of USA’s war on Afghanistan can be viewed in three perspectives: securitization by the president and the government, securitization by the media and securitization by the society...

Words: 3288 - Pages: 14

Free Essay

Cyber Terrorism: the American Response

...Cyber Terrorism: The American Response Mutale Chisanga School of Computer Science 03-60-305 Professor Kristina Verner March 6, 2016 Cyber terrorism: The American Response United States (U.S.) critical infrastructure faces a growing cyber terrorism threats due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed prior to adoption. The increasing automation of U.S. critical infrastructures provides more cyber access points for adversaries to exploit. Industrial control systems, which operate the physical processes of the U.S. pipelines, railroads, and other critical infrastructures, are at elevated risk of cyber exploitation. The growth of malicious techniques that could degrade, disrupt, or destroy critical infrastructure is a huge concern for the U.S. government. It is also likely the cyber threats will surpass the terrorism threat to U.S. in the years to come (MLI, 2012). Even though only advanced threat actors are currently capable of employing these high level malicious techniques, these capabilities will eventually be within reach of all threat actors. Discussion The potential economic consequences of cyber terrorism attacks are severe. The severity of cyber terrorism are not felt equally across the board. A small company may not be able to survive even one significant cyber-attack. On the other hand, large companies may take a long time...

Words: 1741 - Pages: 7

Premium Essay

The Rise In Domestic Terrorism

...The term terrorism invokes a wide range of concepts in that it also entails numerous definitions that are randomly applied given the type of terrorist attack, the intended target, and the overall goals of the terrorist group. This generalization also allows for the term terrorism to be associated with a number of political and civil rights movements that are inconsistent with the social norms or political goals of the government bodies. Such associations can frequently cause confusion between progression and terrorism. This is especially true in cases of domestic terrorism as these occurrences continue to rise and the media spins various connections between the actions and the message that the attacker is attempting to send or promote. This...

Words: 1263 - Pages: 6

Premium Essay

Compare and Contrast the Pre and Post 9/11 Law Enforcement Response to Terrorism. What Strategies Could Be Implemented to Increase Future Law Enforcement Capability in Countering Terrorism?

...Compare and contrast the pre and post 9/11 law enforcement response to terrorism. What strategies could be implemented to increase future law enforcement capability in countering terrorism? Andrew McAdam Student Number: Word Count: “Things will never be the same.” (Miller, Stone & Mitchell, 2002, p. 3) Law enforcement has undergone dramatic changes as a result of the devastating events in the United States on 11 September 2001 (9/11). This essay will examine how law enforcement, specifically within Australia, has shifted its policies and strategies to fight the post-9/11 terrorist threat. An analysis of police actions towards terrorist related incidents since 9/11, displays how law enforcement agencies have demonstrated their ability to respond to the various threats of terrorism as they arise. “Since 2001, numerous terrorist attacks have been thwarted in Australia. Thirty-eight people have been prosecuted as a result of counter-terrorism operations and 20 people have been convicted of terrorism offences under the Criminal Code.” (Counter-Terrorism White Paper, 2010, p. ii) Australia’s State and Federal policing agencies have ‘a long tradition of reactive patrol’ (White, 2012, p. 487) However, uniformed policing plays an important role in counter-terrorism operations. Due to their knowledge and close working relationships within the local community, police are in the best position to detect and prevent terrorist actions from occurring. “So far, terrorist attempts in...

Words: 2434 - Pages: 10

Premium Essay

The United Kingdom’s Strategy for Countering Terrorism

...CONTEST: The United Kingdom’s Strategy for Countering Terrorism July 2011 3 Introduction 1.01. This is the third published version of the United Kingdom’s counter-terrorism strategy, CONTEST. This new strategy reflects the changing terrorist threat and incorporates new Government policies on counter-terrorism. 1.02. The aim of CONTEST is to reduce the risk to the UK and its interests overseas from terrorism, so that people can go about their lives freely and with confidence. 4 CONTEST: The United Kingdom’s Strategy for Countering Terrorism Strategic context 1.03. Last year, over 10,000 people were killed by terrorists around the world. But international law enforcement and military collaboration are changing the threats we face. 1.04. The leadership group of Al Qa’ida is now weaker than at any time since 9/11. It has played no role in recent political change in North Africa and the Middle East. Its ideology has been widely discredited and it has failed in all its objectives. Continued international pressure can further reduce its capability. But Al Qa’ida continues to pose a threat to our own security; and groups affiliated to Al Qa’ida – notably in Yemen and Somalia – have emerged over the past two years to be a substantial threat in their own right. 1.05. Al Qa’ida is responsible for only a small fraction of terrorist attacks. Other groups, independent from Al Qa’ida but broadly sympathetic to its aims, continue to emerge and to conduct attacks around...

Words: 4235 - Pages: 17

Premium Essay

Violence, Terrorism and Security Dimension in South Asia: Bangladesh Perspective”

...1. Introduction Terrorism, Religious and Ethnic Intolerance are constantly affecting more or less every country of the world in the 21st century. These unexpected phenomena are all-pervading the stable economic and social, cultural and political aspects of the peace loving people. Therefore, these issues become the prime concerns for whole world especially after unexpected happening in 9\11, while after starting of war on terror by the United States of America and her allies. It is a method of employing violence in the quest of an ideology. The people of South Asia are constantly threatened by the varieties of terrorist activity. The convergence of limited institutional capacities in governments and law-enforcement agencies with grievances about widespread corruption, underdevelopment, socioeconomic marginalization, and the sometimes problematic role of the state, make South Asia an attractive operating base for terrorist groups. The recent horrific acts of terrorism, such as the November 2008 attacks in Mumbai, underscore the regional nature of the terrorist threat in South Asia, and they highlight the need for greater cooperation within the region to address it. There are no quick-fix solutions when it comes to combating terrorism. The aim of the paper to place the nature of terrorism in South Asia from Bangladesh perspective by analyzing the ways to counter terrorism and how can the threat of the phenomenon be reduced. 2. Terrorism in South Asia Every nation in South Asia...

Words: 3874 - Pages: 16

Premium Essay

National Security Threat

...National Security Terrorism can be looked at from many different points of view. The definition of terrorism is the use of violence and intimidation in the pursuit of political aims. That doesn’t put a target on foreign countries alone. Terrorism can happen between Americans as well. Though the most fatal attacks such as 9/11, Pearl Harbor, and Boston Marathon Bombings were done by groups such as the al-Qaeda, Imperial Japanese Navy and as little as two foreign Soviet brothers who immigrated, became citizens, then attacked. Many things can be done to protect Americans at home. Records could be kept of every action someone makes. Surveillance of the internet sites accessed, text messages and phone calls made, and financial transactions. Being able to access and monitor these records will allow National Security to prevent attacks before they happen. A system could be made where they don’t monitor 24/7 but there would be red zones or red flags, which would alert National Security to investigate or watch over whatever is happening. This shouldn’t be a problem to many Americans if they claim they’re not doing anything wrong. This is a similar scenario as the National Terrorism Advisory System. It alerts to communicate information about terrorist threats by providing timely, detailed information to the public, government agencies, first responders, public sector organizations, airports and other transportation hubs. Using available information, the alerts will provide a concise...

Words: 1017 - Pages: 5

Premium Essay

Terrorism

...TERRORISM Prof Nerove SEC 300 May 28, 2012 On the next couple of pages, I will be discussing terrorism as a threat to people and infrastructure. My discussion will include how individuals in private and public security can attribute to the prevention of terrorism within the U.S. terrorism is a threat that does not recognize borders and may affect states and peoples irrespective of their geographical location. Individuals and groups who believe that they can advance their political aims by using terror pose a serious threat to the democratic values of our societies and to the rights and freedoms of our citizens, especially by indiscriminately targeting innocent people. Acts of terrorism are criminal and unjustifiable, and must be treated as such under all circumstances (Hoffman, 1988). Terrorism as a threat to people and infrastructure is considered to be very critical. Much of the United States critical infrastructure is potentially vulnerable to cyber attack. Industrial control computer systems involved in this infrastructure are specific points of vulnerability, as cyber security for these systems has not been perceived as a high priority. Industries potent ally affected by a cyber attack on industrial control systems include the electrical, telephone, water, chemical and energy sectors (Naumann, 2008). Terrorism is considered to be one of the oldest forms of human conflict. Although, the FBI and the U.S customs service have made terrorism their top priority, they...

Words: 662 - Pages: 3

Free Essay

Biggest International Threat

...Greatest Threat to International System Although there are many relevant situations that are taking place in our world today, I think that on of the greatest threats to our international system is terrorism. It is apparent that this topic is in the radar of many countries who hold power and may feel threatened by terrorists. However, terrorism is also affecting many underdeveloped nations. The idea of terrorism isn’t solely one problem to fix or deter and then move on with our lives. Terrorism is the central problem to many other situations that are taking place in society today, especially immigration. Therefore, the idea of terrorism affects us world wide, regardless of where it is taking place. For example, if the root of terrorism is beginning to take place in Europe, although Europe is far from the United States, it still affects us on the International Spectrum because it is a problem that perpetuates more conflict across the world. I think that Terrorism is one of the greatest threats to the international system because of the ability that it has to involve so many different actors across the world at one time, with one specific situation. For example, the most recent accounts of terrorism that have taken place all have to do with the situation that originated in Syria. Not only did that act of terrorism kill many innocent people. It has also caused many of native people to flee from there home countries and seek refugee in more stable countries in Europe. The overpopulation...

Words: 332 - Pages: 2

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. Skeptics...

Words: 3494 - Pages: 14