Verified Document

Vulnerability Assessment The Terrorist Incident In New Research Paper

Vulnerability Assessment The terrorist incident in New York on September 11, 2001 woke many individuals and organizations to the realities of vulnerabilities within the airline industry. The particular problems seemed to be that crucial training for individuals who wished to work as commercial airline pilots had very little monitoring. Of course, security on flights was the most critical oversight as people within the industry believed that inflight incidents would not happen. Other transportation industries also realized the immediacy of the need for change, and have been implementing new protocols also. It may seem that the most vulnerable are those that travel in international waters or skies, but dangers exist within the United States because of a reliance on rail transportation of people and goods also. The United States could face significant problems if a major rail transportation system was interrupted due to terrorist infiltration. The research into this system proves that there remain major vulnerabilities in the U.S. rail system that could...

In Washington, D.C., the metro is used by approximately 800,000 people every day (Post, 2007). According to research all of the trips that occur throughout the system are controlled through a single master command structure (Brainard & Derrick-Mills, 2011). This system is well guarded and there are multiple fail-safes within the system, but a large detonation could be used to cause significant damage to the system. Another singular feature of the rail system is that it connects, and operates below, some of the seminal structures of United States government. Stops are located close to the Pentagon, Capitol Building and the White House. It would be possible for organizations to use these stops to cause a great deal of damage to seats of American government.
Many terrorist organizations in the world would be interested in gaining access to the Metro rail system in order to disrupt the…

Sources used in this document:
References

Brainard, l. A., & Derrick-Mills, T. (2011). Electronic commons, community policing, and communication: Online police-citizenship discussion groups in Washington, DC. Administrative Theory & Praxis, 33(3), 22-34.

Post, B. (2007). The great society subway: A History of the Washington, DC Metro. The Journal of Transport History, 28(2).
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorist Groups Use of Cloud Technology
Words: 4606 Length: 15 Document Type: Dissertation or Thesis complete

Terrorist Group's Use Of Cloud Technology After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of

Terrorist Attacks an Assessment of
Words: 3907 Length: 10 Document Type: Term Paper

Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize

New Orleans Is a City
Words: 4990 Length: 16 Document Type: Research Proposal

" The U.S. Army Corps of Engineers is currently at work in the city on a project to increase the height of the levees and construct floodgates, at a cost of over $12 billion. This work will be able to protect from a "100-year" storm as they are called -- dangerous but not severe -- with a 1-in-100 chance of hitting in any given year. It is estimated it will take

Terrorists, Politicians, Social Reformers, Paramilitary,
Words: 9563 Length: 33 Document Type: Dissertation

Hezbollah has committed itself to the betterment of societal Lebanon not just in the context of Muslim families and organizations but all those who stand for an independent Lebanon. They have also provided a great deal of assistance when conflict has rendered regions without electricity or water (International Crisis Group, 2005). It was Hezbollah who provided not only medical supplies and food to Beirut during the 2006 conflict, but

Seaports Vulnerability to Submersible Vessels
Words: 3918 Length: 12 Document Type: Research Paper

Seaports Vulnerability to Submersible Vessels Criminology All countries of the world are struggling hard to provide peace to its residents and masses. After all the efforts and struggle, countries are still not completely safe from the dangerous attacks on the borders including dry ports and seaports. In America, it is a severe issue to understand how to secure and protect the seaports of the country. The topic of discussion is also related

Soon After 911 Terrorist Attack,
Words: 2862 Length: 10 Document Type: Term Paper

Therefore the consequences of such restrictions and regulations have further complicated the case, the research activities have been either shunned or go unreported to avoid any confrontation with the investigation agencies, 'the climate of fear created by the Butler case is even threatening the ability of the United States government to detect bioterrorist activity, the labs in one state are no longer reporting routine incidents of animals poisoned with

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now