Verified Document

Critical Infrastructure And Power Essay

Related Topics:

Intelligence Practical Exercise Geospatial Intelligence Analysis

GEOINT which means Geospatial Intelligence is a system which is used to analyse an environment for intelligence and operational purposes. (GEOINT Analysis, 2017).

Describe the Environment: Collect key data that defines the precise destination for the planned mission. Geographical, government and cultural limitations must be established. In most cases, the gathered data could consist of vectors, heights, natural landmarks such as rivers, mountains etc., longitude and latitude locations and several others. All these are the basic requirements of the GEOINT invention.

Outline the Effects of The Environment: Elaborate thoroughly on the mission location identified in the previous step. Locate and define its natural state, any existing structures and its cultural atmosphere. Account for all possible factors that might have an effect on a mission in the location such as roads, people, buildings, plants, climate, language, government, cultural divides or social factors. Add this new information to the basics inputted in Step 1.

iii. Examines Possible Dangers: Also input intelligence and possible dangers, identified by the various surveillance sources, to the previous information steps above. These new data could be: strength of enemy or danger, fighting style, severity of possible threats, history, ability, resourcefulness and determination of the location's hostiles etc. It is crucial for work together with fellow national security officials in this step.

iv. Make Analytic Inferences: Combine and analyse all the gathered information from Steps 1-3. Derive conclusions from your analysis with focus on creating near-accurate predictions. In this step, it is normal for the analyst to develop models to help predict the next move of the identified threats, just how severe these actions could be and the efficiency of the safeguards in place against them.

1. What parts of the D.C. Metro track are high-probability targets and what are the reasons for this?

The National Mall houses, the Smithsonian station and this metro line has one of its destinations as the White House, America's seat of power. Due to this, it is safe to say this station, out of all the locations and structures housed by the National Mall, is a high probability target for terrorists. The estimated position of this station is 38.89' N, 77.03' W.

A previous instance where a metro station was attacked is the Belgium's Maalbeek station incident which occurred on the 22nd March, 2016. These acts of terror which targeted the Brussels airport and a popular metro indicated an alarming safety problem for Asians and Westerners alike. More specifically, the dangers posed by radical jihad groups and the concurrent increase in religious extremist activities, has become a huge problem for the world's leaders. This challenge is even more pronounced in European nations as well as North America as these two regions have recently witnessed a steep rise in the rate of radicalisation of their Islamic residents (Ali Rathore, 2016).

2. How best should we consider the D.C. power station problems and what are the reasons for this?

A very effective move should include an in-depth consideration of the capability of an enemy in acquiring the blueprints of a public infrastructure and analyse this to locate the less guarded areas in its training documents clearly states: "By exploiting free information sources without any illegal input, over 80% knowledge about the enemy can be gotten." We can say this in our own words as: "There is a high possibility of compiling over 80% of the knowledge we need to put into action an extremely violent attack on a public infrastructure from common free sources." People who have gone through basic courses on discrete optimizations can immediately identify the crucial flaw in this mentality (Brown, Carlyle, Salmeron, & Wood, 2005). After identifying the problems in the normal military actions, we have discovered that the problems faced by civilians are quite different.
i. Just about every non-military American agent is a soft target for monitoring and violence and is therefore in danger;

ii. Notwithstanding the severity of the suffered harm, it's only a matter of time before we regain our strength and re-build iii. Military personnel can better predict the possibility of an attack while homeland-security officials might not be.

Therefore, it is important to focus on what is actually likely, instead of considering the opinions gotten from prejudiced analyses.

a. Possible Attack on the North Power Plant

We can deduce from the information we gathered that the power plant is sited on the shoreline of the Anacostia River. It is also clear from the Police maps studied, that this particular water body marks the boundary between the districts 5 & 6. Thus, if an attack should be launched from the river, there might be a period of uncertainty as to which district's police force is in charge of the emergency notwithstanding if an appropriate alarm is made or not. As this confusion could go on for around 2 -- 3 minutes, jihadists have all the time they need to unleash all the mayhem they planned to.

The situation favours the aggressors as this problem goes against most military laws and theories due to the irregular conditions this battle possesses i.e. the defenders have to shield a large and diverse number of targets while the aggressors simply needs to locate a small location where their actions would exert maximum harm (Brown, Carlyle, Salmeron, & Wood, 2005). If the aggressors succeed in carrying out an attack, emergency personnel might be faced with a novel set of challenges. Quick actions must be taken by the engineer present to reduce the harmful effects of the attack. Other responses could be the assignment of military forces by the government to help take out the hostiles thus forestalling more destruction and preventing the on-site emergency personnel from harm. It is equally important that these responses are well organized (International Nuclear Safety Group, 2010).

b. Possible Attack on the South Power Plant

The South Power Plant is also sited close to the Anacostia River's shoreline just like the North Power Plant. Similarly, police districts 1 and 7 are also separated by the river. Furthermore, these sites have areas that could serve as easy hiding places for the extremists. For instance, the Conley Bottom Park is situated right within the Buzzard Point area while a fishing port is located at a very small distance from the power plant. These two locations are very convenient and safe refuges for the aggressors.

Suggestions for Safety on the Power Plants

The executives in charge of the operating company are fully responsible for welfare and protection (International Nuclear Safety Group, 2010).

i. Welfare and protection should be an important issue right from the initial development phases such as structure location, layout, management and decommissioning. Every inbuilt process and mechanisms should be built with adequate emphasis on welfare and protection in order to maximize all aspects of the process. Furthermore, a well-defined process should be implemented so that any form of design, location or process modification must be well analysed so that they do not cause welfare or protection problems.

ii. The management processes should analyse the standard security and welfare conditions and make sure they are all met. These standards should be monitored by efficient collaboration between the welfare and security officials and both teams should be constantly reminded of their aim, which is,…

Sources used in this document:
References

Ali Rathore, S. (2016). Brussels Attack - Lessons Learned. A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH.

Brown, G., Carlyle, M., Salmeron, J., & Wood, K. (2005). Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses. Tutorials inOperations Research, 102 - 123.

GEOINT Analysis. (2017). Retrieved from National Geospatial Intelligence Agency: https://www.nga.mil/ProductsServices/GEOINTAnalysis/Pages/default.aspx

International Nuclear Safety Group. (2010). The Interface Between Safety and Security at Nuclear Power Plants. Vienna: International Atomic Energy Agency.
Cite this Document:
Copy Bibliography Citation

Related Documents

Critical Infrastructure Protection Using Computers in Modern Society...
Words: 693 Length: 2 Document Type: Essay

Critical Infrastructure Protection Nowadays, computers have become very ubiquitous in the American society. Computers and related technologies are used at every level of government in the United States. Computer technologies are also used by all sorts of professionals, and private citizens to access information, store information, communicate, and/ or transform acquired information. Right now, there are also computer-dependent technologies that are used to monitor and control, critical transportation systems, water treatment

Critical Infrastructures and Cybersecurity
Words: 699 Length: 2 Document Type: Chapter

Cyber Terrorism Cybersecurity has emerged as one of the important components of modern security initiatives because of rapid advancements of technology and the Internet. Ensuring cybersecurity has become important because of the vulnerabilities of critical infrastructures to cyber attacks in the aftermath of the 9/11 terror attacks. As part of efforts to enhance cybersecurity, federal and state governments in the United States have enacted laws that define the role of various

Key Resources Critical Infrastructure
Words: 1088 Length: 3 Document Type: Essay

Critical Infrastructure and Key Resources NIPP (National Infrastructure Protection Plan) offers the necessary structure for coordination, synchronization and integration of activities originating from different pertinent statutes, presidential directives and national strategies for the creation of a combined countrywide approach for the implementation of the protection mission of CIKR (Moteff & Parfomak, 2004). The continuity and protection of CIKR is fundamental for national security, safety, vitality, lifestyle and public health. Critical infrastructure

What is Critical Infrastructure
Words: 709 Length: 2 Document Type: Essay

Infrastructure is effectively what makes a nation run. It encompasses the people, places, and things necessary to deliver critical services and goods. The US Department of Homeland Security often abbreviates critical infrastructure as CIKR (Critical Infrastructure and Key Resources) and defines CIKR as consisting of, “the assets of the United States essential to the nation's security, public health and safety, economic vitality, and way of life,” including “power grids and

Infrastructure Protection in Homeland Security
Words: 1645 Length: 5 Document Type: Term Paper

S. To cope with any disaster or unforeseeable eventual attack on the critical infrastructure, to avoid the 9/11 mayhem and lack of organization. Respond; where disaster responsiveness and action at the time of the attack and shortly after is looked into, there is a well laid out proposed plan of how to handle any uneventful eventuality on any of the critical 'node' of the U.S. infrastructure. Lastly recover; which lays out

Infrastructure Protection
Words: 1015 Length: 3 Document Type: Assessment

Infrastructure Protection Utilities such as water, natural gas, and electricity are considered lifelines for the United States and its economy. Are they vulnerable to terrorist attacks or natural disasters? How can they be protected and secured? Importance of Infrastructure Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. They support and maintain the economic operation and activities of our communities

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now