Countermeasures and Neutralization
In past ten years, the accessibility to information and capabilities has increased; thus, the technology of weapons of mass destruction (WMD) has increased drastically. The defence department of many countries need to take actions in order to prevent the chances of any attack (Graham, 2004).
During Cold war, the usage of nuclear weapons cause massive destruction that was faced by the innocent people of the countries, this is why weapons of mass destruction are taken as great threats. For the security of the people and the environment, the massive growth of destructive weapons should be slowed otherwise soon the individuals would get the opportunity to harm the entire nation. Such destructive powers reside with nation states, which are politically, economically, industrially and socially very strong (Graham, 2004).
Terrorists on the other hand have few assets but they are usually ready to give away everything for the achievement of their goals. These people also do great damage. Even the deterrence measures with respect to terrorists are also vague till now. In order to tackle with this problem, a full spectrum of capable resources needs to be brought about, this would include preventing, interdicting, mitigating and recovering measures. This study also focuses on this full spectrum (Ishmael, 2010).
Whether it is nuclear, chemical, biological or radiological, the discussion about WMD is taking place in single modality. The ongoing dialogues and activities that are taking place with regards to WMD are stressing on limited aspects of single modality. Such an approach is known as segmented approach, and such an approach forbids responses from being generated form an integrated system (Ishmael, 2010).
At last, a fresh approach with regards to WMD was adopted by Defence Science Board. Such an approach handles the problems sideways and aims in maintaining a balance in between the allocation of resources and the requirements. The strategy that is adopted by this study is as follows (Ishmael, 2010):
1. Take every possible step to stop the wrong people from acquiring the damaging weapons.
2. The urgency of efforts should be increased to lessen the after effects of the attacks and even recovery phase should be speedy.
3. The perpetrators and their fellows should be identified and proper planning should be done to give a response to the attacks.
However, in the end it was concluded by the researchers that one single approach is not the solution of this problem. All the efforts do contribute but with limitations along with them. A few actions are recommended by the researchers in six different areas in order to bring the countries in better positions. The recommended actions are as follows (Ishmael, 2010):
• Bringing intelligence improvement
• Weapon acquisition denial
• Make retaliation policies
• Recovery capabilities and mitigation measures at national level to be improved
• Develop response plans for catastrophes and even establish DOD pilot programs
• For management of the enterprise readiness metrics should be brought into use (Ishmael, 2010).
Improve Intelligence
Intelligence improvement is necessary for bringing about reduction in the vulnerability of WMD. This is such a big challenge that one country or one organization alone cannot deal with it. But still, DOD can assist in creating an integrated WMD intelligence community which would completely focus on improving strategic knowledge. This could be achieved by bringing in innovative collections, carrying out refreshed analysis and by keeping in a war room like mentality so that the problems can be tackled easily (Jonathan, 2007).
A number of researchers believe that the recommendations of the 9/11 and WMD Commissions in the following areas should be implemented by the Under Secretary of Defense and the Director of National Intelligence (Jonathan, 2007):
• All financial transactions and transport means and nodes of key individuals and entities with WMD expertise who have links with radical groups and nations should be monitored, both within and across the national frontier.
• Alongside seeking technical enhancements and upgraded communication and data processing mechanisms, measures should be adopted for increasing fielding of deep penetration intelligence programs.
• Recommendations from the prior Defense Science Board regarding reliable funding for the upgrading of surveillance facilities such as tagging, tracking and locating capabilities should be implemented.
• Collection of information is carried out by analysts and users of intelligence and assisted by expert target development.
• Federated databases linking information across both domestic and foreign intelligence agencies regarding key individuals and their activities should be established.
• An understanding of the objectives, motives and values of potential adversaries who might use WMD should be developed through creating broadly-based ongoing mechanisms and relationships.
• A mission manager who integrates and co-ordinates domestic law enforcement with the intelligence community's efforts in regard to terrorists pursuing WMD...
This when the Army must spread out its resources to engage threat WMDs and WMD networks. The concept applies to counterforce operations, sensors, protection, and training. Leveraging new technologies. Many of the required capabilities presented in the strategy will be possible only through applications of new technology. The Army must leverage these new technologies. Enhance training. Unit training is currently more flexible and quickly adaptive in comparison with institutional training. but,
Countermeasures and Neutralization of Weapons of Mass Destruction At this intricate turn of the 21st century, one of the most pertinent issues at hand is that of national and international security. Humanity has come a long way in augmenting the value of life through so many miraculous technologies, but unfortunately man has simultaneously developed certain instruments that are particularly questionable and hence a threat to the life we envision. Today the
Vehicle-Borne Improvised Explosive Devices Vehicle-born improvised explosive devices are intended to kill and nothing else. -- Chris Greenwood, 2008 Despite the investment of enormous amounts of national blood and treasure, the U.S.-led war in Afghanistan failed to prevent the resurgence of terrorist activity, and the Afghan government remains unable to cope with the growing threat. Some of the more effective tools that were used by insurgents in the asymmetric warfare in
509). Likewise, in a conventional military context, Davis and Shapiro describe anti-access and area denial as being "cost-imposing strategies," a description these authors suggest is particularly useful in the counterterrorism context. In addition, game theory can help avoid military confrontations altogether, thereby avoiding unnecessary friendly casualties. In this regard, Schofield (1999) emphasizes that, "The inevitability of armed conflict in the classical sense is not a foregone conclusion in a
Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions
This told investigators who was involved and it provided them with critical leads that lead directly to the perpetrator. These events are illustrating possible gaps in the research. This is because the methods of the terrorists are becoming more sophisticated. One of the most notable is the use of the disgruntled lone wolf to conduct these attacks. In the case of Faisal Shahzad, he was a lone wolf who was
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now