¶ … United States to Respond to a WMD Attack Within Our Borders?
The objective of this study is to answer how prepared the United States is to respond to a WMD attack within its borders and to answer whether there is enough capability to effectively respond to such an attack. This study will further answer as to whether the response plan and command control structure clearly understandable and whether everyone has a role or if there are gaps or redundancies. Finally, this study will answer as to how intelligence supports this response with restrictions imposed upon intelligence operations within our borders.
The challenges to an effective response to a WMD attack within U.S. borders are diverse in nature. Some of the challenges are technology related while others relate to communication among agencies and operation teams. In addition, there is presently funding issues relating to effective management of homeland security initiatives making efficient methods of security more important than ever before in history as more countries gain access to weapons of mass destruction and accompanying technological advances resulting in a larger capacity for launching WMD attacks within U.S. borders.
I. Preparedness
In terms of technology, it is related that CBRNE equipment standards are required for ensuring that threats are reliably evaluated and that effective response strategies are implemented. Towards this end, it is critical that the technological curve be kept in view in the establishment...
http://www.strategypage.com/htmw/htchem/articles/20060324.aspx Anthrax When we think of warfare and terrorist attacks, we tend to think of large destructive pieces of machinery -- nuclear missiles and/or bombs, improvised explosive devices (IEDs), and even the still-too-recent memory of massive airplanes being turned from passenger vehicles into weapons. Not all forces of mass death and destruction come in large packages, however. In the years following the terrorist attacks of September 11, 2001, several small, standard
Academic Simulation Describes potential WMD threat from Andean Religious Fighters Two-Step Operations Plan Prevent the attack Threat is nebulous Threat is well organized Response to the attack Response follows the adage that no battle plan survives the first shot Response is predictable based on known lethality of agent Threat is real and represents a legitimate threat to national security Threat demands immediate and stepped-up response Pursue step one more aggressively Coordinate step two with local first responders in the interim TOP SECRET Office
large terrorist WMD attack might be conducted. I have also indicated the most probable type of materials that could be used and the potential targets and probable forms of attack. It is rather difficult for the policymakers to weigh up the likelihood of a mass-casualty terrorist attack in their nation states. On the other hand, the consequences of such a prospect call for the governments worldwide to give serious attention
Weapons of Mass Destruction 1 An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a
WMD Annotated Annotated Webography: Weapons of Mass Destruction (WMD) With the attacks on September 11th, 2001, the United States came face-to-face with the reality that our security strategy is far from impenetrable. To the contrary, the terrorist attacks on the World Trade Center and the Pentagon, and more recently, the Boston Marathon bombing, proved that we are quite vulnerable to mass casualty events. Perhaps most worrisome is the concern that such an
Al Qaeda's Next Major Domestic Attack On The United States The fact that the United States has not experienced a major domestic attack since the terrorist attacks of September 11, 2001 is firm testament to the relentless work by the Western intelligence community in identifying potential threats and preventing them from reaching fruition. In fact, a number of such attempts have been detected and eliminated in recent years, some of which
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now