Verified Document

Terrorist Attacks An Assessment Of Term Paper

Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize the damage that could be caused to the infrastructure of a country. This target could be an important energy or communications system that would affect large parts of the country. The choice of such a target would also have the effect of maximizing damage and striking a blow at the psychological morale of the country as a whole.

There are also other advantages to a choice of target that is not a city or large residential area. The first is that highly populated areas would be more secure and highly monitored and therefore less accessible to the terrorist. Secondly, by reducing the number of civilian deaths, but yet striking a severe blow to the country, the terrorist might gain some moral high ground and this could in turn attract recruits to their cause who might otherwise be dissuaded from joining on human and ethical grounds.

Taking these factors into account a perfect target for a terrorist with a smaller nuclear device would be a power or energy source such as a dam or system of dams. A hydroelectric plant would possibly be the ideal target in this scenario; for example, the Conowingo Dam and Hydroelectric Power Plant. It should be noted that this is only an example and merely intended to show the type of target that may be seen to be feasible from the point-of-view of the terrorist.

This target would be ideal for a number or reasons. In the first instance it is in close relationship to the Peach Blossom Nuclear Plant. "In addition to serving Exelon's Conowingo Hydroelectric Project, the pool is also a source of water for Exelon's Muddy Run Pumped Storage Hydroelectric Project, Lancaster County, Pa. And Exelon's Peach Bottom Nuclear Power Plant, York County, Pa." As can be seen from this reference, the dam also serves and is related to many other parts of the complex power creation and distribution network; making it a relevant and important target for the terrorist.

Another important factor is that the dam is also a recreational resort, which would also serve the terrorists ends in terms of civilian casualties. Furthermore, the dam is an important ecological area and the fallout or radiation from the "dirty bomb" would have a devastating effect on the ecological system of the region; which would have a knock - on effect for the future of the regions, not only in terms of the power supply but also on agriculture, tourisms and other factors.

Essentially in a scenario like this the main objective would be to destroy or impair the power supply, with the main aim of creating chaos. It would also be seen as an attack on one of the symbols of prestige and achievement of the nation - which would also serve the terrorist from a propaganda point-of-view.

In the final analysis, the effect of such an attack on the electricity supply would be devastating. The following citation is quoted at length as it clearly outlines the consequences of an attack on a target of this nature.

The electric power industry is one of the most crucial national infrastructure sectors. It encompasses sensitive potential targets and underlies the smooth operation of all other infrastructures. Despite widespread backup and continuity of operations resources and procedures, if the electric power sector were to suffer sustained outages, communication systems could be seriously disrupted, trains could stop running, planes could be grounded, and the economy could grind to a halt. Unlike other energy sources, electricity cannot be stockpiled, so power disruptions would have almost immediate effects.

Furthermore, due to the ease of access to online information about the area and the hydroelectric plant, including technical details, the terrorist could plan and strategize according to information that is obtainable on the Web. For example, there are many public Websites that provide extensive details about the dam and divulge the fact that Conowingo is one of the largest national dams; which would be an enticing bit of news for any terrorist interested in causing havoc on the infrastructure of...

The results of such an attack would on the surface be comparatively slight and less outwardly dramatic, in comparison to an attack with a WMD on a major city. However, the effect of an attack on a power supply or hydroelectric plant would have consequences that would have a real and long-term affect on the economy and the psyche of the country.
As stated, the security that surrounds dams and other sources of energy sources is often not as stringent as those that exist in mains centers. In the light of this it would be a relatively easy, or a least less difficult, for a terrorist to find a way to plant and detonate a bomb in this area. The bomb need only be powerful enough to destroy the computer system and the control of the hydroelectric plant and the dissemination of radiation would add to the devastation.

However, it must also be noted that since the events of 9/11 areas like these where important power sources reside have been subject to more strict security. The realization of the vulnerability of these power sources have been seen as a "soft" areas in the security system. The following is from a report on the water infrastructure by U.S. Rep. Don Young, Chairman:

On September 11, 2001, our concept of what constitutes a credible threat to the security of our nation's critical infrastructure changed. Threats that previously had been considered low-risk are now being examined and incorporated into emergency plans and procedures. Ongoing efforts to upgrade infrastructure security have taken on a far greater importance and urgency.

Nevertheless an attack on a structure of this nature would be devastating and the use of a "dirty bomb" would not only destroy the functionality of the plant but also contaminate the water system and radically disturb the balance of the ecosystem for years to come.

4. Conclusion and summation

The above discussion has been an attempt to assess how a terrorist attack might be conducted using weapons of mass destruction. The conventional scenario is that such a weapon would be used against a highly visible and vulernabe target such as a city or crowded residential area. This is certainly a prime target for the terrorist and the weapon of choice in this regard would be the use of a "dirty nuke." The reason for this choice of weapon is largely due to its accessibly and the relative lack of intensive technological knowledge that would be needed in the construction of a conventional nuclear device. As noted in this discussion, the use of a "dirty bomb" would be less effective than a conventional nuclear device but would nevertheless succeed in taking lives, contaminating the area with radiation and causing psychological and physical social disruption. The fear of radiation would also sow panic among the public.

However, there are less obvious targets that the terrorist might consider. While cities are obvious targets is this very fact that makes them more security aware and consequently more difficult for the terrorist to operate in.

Other targets that may be even more accessible and also just as attractive to the terrorist are power structures and hydroelectric plants. If these targets are chosen the terrorist may avoid the intense security in the more populated areas. This choice of target could also hold other advantages for the terrorist. While WMD is usually associated with the loss of human life, a double purpose could be attained by using WMD to destroy sensitive energy sources which are also a source of ecological balance. Not only would this disrupt the power supply but such an attack would also lead to long-term environmental poisoning and agriculture contamination. Furthermore it would be a harsh blow to the morale and psychological integrity of a nation. The implementation of such as nefarious action would also be relatively less complex than attempting to detonate a bomb a city where there might be more there would be more obstacles to the terrorist action.

Therefore, while a large metropolitan area is the common assumption of a terrorist target among many observers; it is worthwhile to assess the possible use of weapons of mass destruction on less likely targets. However, while the target may differ the general results…

Sources used in this document:
Bibliography

Are You Ready? [essay online]; available at http://www.whitehouse.gov/news/releases/2003/02/20030207-10.html;Internet: accessed 11 June 2007.

American Militant Extremists: United States radicals. [essay online]; available from Council on Foreign Relations http://www.godiva.com:80/resources/history.html;Internet: accessed 17 June 2007.

Axtman K. The terror threat at home often overlooked [essay online]; available at http://www.csmonitor.com/2003/1229/p02s01-usju.html;Internet: accessed 17 June 2007.

Barnaby Frank, "A Terrorist Weapon Waiting to Be Made: At the Very Least You Get Mayhem, at Most Armageddon," New Statesman, 29 September 2003, xxx [database online]; available from Questia, http://www.questia.com/PM.qst?a=o&d=5002034277;Internet; accessed 19 June 2007.
Betts, Richard K. "How to Think about Terrorism: Will Better Intelligence and Technology Allow the United States to Anticipate Future Terrorist Attacks?. History Does Not Offer Much Reason for Optimism, but There Are Steps We Can Take Now." The Wilson Quarterly, Wntr 2006 [database online]; available from Questia, http://www.questia.com/PM.qst?a=o&d=5015009766;Internet; accessed 19 June 2007.
CYBER SECURITY of the ELECTRIC POWER INDUSTRY [essay online]; available at http://www.ists.dartmouth.edu/analysis/cselectric.pdf;Internet: accessed 17 June 2007.
NUCLEAR [essay online]; available at http://nucnews.net/nucnews/2004nn/0401nn/040113nn.htm;Internet: accessed 17 June 2007.
Susquehanna River Basin Commission "THE CONOWINGO POOL" [essay online]; available at http://66.102.11.104/search?q=cache:Hw4y2v0MpkgJ:www.srbc.net/docs/ConowingoPool.pdf+Conowingo+dam&hl=en&ie=UTF-8;Internet: accessed 17 June 2007.
Weapons of Mass Destruction? [essay online]; available at http://www.cato.org/pubs/pas/pa387.pdf;Internet: accessed 17 June 2007.
Threats to Water Supplies [essay online]; available at http://www.sccgov.org/portal/site/scc/menuitem.2c9f27538b48f388dfe093102830a429?path=%2Fv7%2FSCC%20Public%20Portal%2FHandling%20Emergencies%2FCombating%20Terrorism%2FThreats%20to%20Water%20Supplies;Internet: accessed 17 June 2007.
Richard K. Betts, "How to Think about Terrorism: Will Better Intelligence and Technology Allow the United States to Anticipate Future Terrorist Attacks?. History Does Not Offer Much Reason for Optimism, but There Are Steps We Can Take Now." The Wilson Quarterly, Wntr 2006 [database online]; available from Questia, http://www.questia.com/PM.qst?a=o&d=5015009766;Internet; accessed 19 June 2007.
Weapons of Mass Destruction? [essay online]; available at http://www.cato.org/pubs/pas/pa387.pdf;Internet: accessed 17 June 2007.
American Militant Extremists: United States radicals. [essay online]; available from Council on Foreign Relations http://www.godiva.com:80/resources/history.html;Internet: accessed 17 June 2007.
Axtman K. The terror threat at home often overlooked [essay online]; available at http://www.csmonitor.com/2003/1229/p02s01-usju.html;Internet: accessed 17 June 2007.
Are You Ready? [essay online]; available at http://www.whitehouse.gov/news/releases/2003/02/20030207-10.html;Internet: accessed 11 June 2007.
Frank, Barnaby "A Terrorist Weapon Waiting to Be Made: At the Very Least You Get Mayhem, at Most Armageddon," New Statesman, 29 September 2003, xxx [database online]; available from Questia, http://www.questia.com/PM.qst?a=o&d=5002034277;Internet; accessed 19 June 2007.
NUCLEAR [essay online]; available at http://nucnews.net/nucnews/2004nn/0401nn/040113nn.htm;Internet: accessed 17 June 2007.
Susquehanna River Basin Commission "THE CONOWINGO POOL" essay online]; available at http://66.102.11.104/search?q=cache:Hw4y2v0MpkgJ:www.srbc.net/docs/ConowingoPool.pdf+Conowingo+dam&hl=en&ie=UTF-8;Internet: accessed 17 June 2007.
CYBER SECURITY of the ELECTRIC POWER INDUSTRY [essay online]; available at http://www.ists.dartmouth.edu/analysis/cselectric.pdf;Internet: accessed 17 June 2007.
Threats to Water Supplies [essay online]; available at http://www.sccgov.org/portal/site/scc/menuitem.2c9f27538b48f388dfe093102830a429?path=%2Fv7%2FSCC%20Public%20Portal%2FHandling%20Emergencies%2FCombating%20Terrorism%2FThreats%20to%20Water%20Supplies;Internet: accessed 17 June 2007.
Richard K. Betts, "How to Think about Terrorism: Will Better Intelligence and Technology Allow the United States to Anticipate Future Terrorist Attacks?. History Does Not Offer Much Reason for Optimism, but There Are Steps We Can Take Now." The Wilson Quarterly, Wntr 2006 [database online]; available from Questia, http://www.questia.com/PM.qst?a=o&d=5015009766;Internet; accessed 19 June 2007.
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorist Attacks of 911 and
Words: 1182 Length: 4 Document Type: Term Paper

Specifically, the actions of the FBI, CIA, and the American government may have played a role in America's lack of preparedness for surge and terrorist actions (Posner). Interstate At the interstate level, international relationships are viewed through the interactions of states with each other. In this level of analysis, policy can be understood through the often that reciprocal relationships between individual countries (Goldstein). At this level of analysis, the terrorist attacks can

Terrorist Attacks Changed the World, and the
Words: 2126 Length: 6 Document Type: Term Paper

terrorist attacks changed the world, and the way America looks at the world, but they also changed the way the world looks at us. Causes of September 11 Earlier attacks, including Tokyo nerve gas, Iran barracks, Cole attack Muslim hatred of United States and call to "jihad" LAX security at airports and U.S. entry points Lack of reliable security and intelligence information Effects of September 11 Death toll and destruction "War on terrorism" Homeland security Emotional issues World outlook and

Corporate Risk Management: Terrorist Attack
Words: 617 Length: 2 Document Type: Term Paper

By examining existing occurrences of terrorist attacks, some of the unknown factor can be removed from the threat. Furthermore, the exact nature of terrorism can be quantified in terms of definitions and key terms. This also mitigates much of the uncertainty surrounding the issue. Terrorism can for example be understood by the definition of threat and/or violence in order to achieve an end. Terrorists generally want to force the

Homeland Security Terrorist Attacks Involving
Words: 727 Length: 2 Document Type: A-Level Coursework

They have also provided intelligent analysis to state, federal and local law enforcers promoting competency and improved support missions in and out of the United States. Navy and marine corps have participated in multi- service working groups to ensure to update and produce multi- service CBRNE defense. CBRNE is also incorporated into air command, where the training is incorporated into courses; the instruction in the course includes instructions addressing the

911 Terrorist Attacks Changed the
Words: 900 Length: 2 Document Type: Term Paper

The Home Office Minister pointed out in one of his addresses that "the most significant terrorist threat to the UK and to UK interests abroad comes from Al Qaida and associated networks. Senior AQ members, including its leader Osama bin Laden, have stated publicly that the UK and UK interests are a priority target for them. There have been a number of attacks specifically targeting UK interests based overseas.

Corporate Risk Management: Terrorist Attack
Words: 727 Length: 2 Document Type: Term Paper

When the risk is significant, this should be quantified against the risk of not entering the specific country in terms of expansion. When the risk is acceptable, stringent measures, including organizational arrangements, engineering control, and research and development, need to be taken. Research and development are particularly important, as mitigation measures can then be implemented that are particularly targeted towards the measure of possible terrorist attack for the country

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now