Definition, Types, Goal, Tactics, Financing of Terrorism, Global Terrorism Index (GTI), Terrorism in India, Agencies dealing with terrorism in India, How to stop Terrorism?
Despite an ever-changing terrorism risk insurance market, businesses from every industry sector continue to purchase coverage—more than 60 percent of organizations surveyed by Marsh bought coverage in 2009.
Since the terrorist attacks of September 11, 2001 debate has circulated around the nature and success of counterterrorism policies. Considering after thirteen years, the world has not faced a major attack on the same scale as those witnessed in 2001; counterterrorism policies by some have been argued to be a phenomenal success. This article will focus on counterterrorism policies by the United States, positing the argument that the success of these policies cannot be determined by the mere lack of terrorist attacks, but by the effects of these policies
Intelligence as a set of permanent institutions dates back only to the second half of the nineteenth century. But as information and news - in the dictionary meaning used in English since the middle of the fifteenth century, of 'knowledge as to events, communicated by or obtained from another, especially military' - it has always been collected as part of warfare
For a military, it can mean knowledge of the enemy and can distinguish between to defeat and to lose because information means knowledge and knowledge are power. Analysts see it as a package of information pending for clarification, and policymakers consider they should be informed so that they can meet the needs, stated or understood.
Intelligence gathers under the same umbrella the informational component of national security, internal and external policies, as well as certain aspects of international security in the case of global cross-entities (states, organizations).
This presentation is built up by gathering information from different references (Book, Articles, and Newspapers) by the author.
Terrorism in International Law: The struggle to define terrorismAnthony Veluz
International Criminal Justice.
In our ICJ module we are required to do a presentation in each seminar on the week's topic area. Our presentation would usually consist of one of:
- literature review
- case review
- current issues
For our final seminar we had to give a presentation on one of the following topics:
- aggression
- terrorism
- torture
My presentation was on terrorism and I mainly looked at the literature on this area, with the odd case and current issues included. My primary focus was on the definition of terrorism as I couldn't find a universally accepted definition and looked at the problems this caused. The battle against terrorism is difficult enough, hampered by the absence of a definition. I examine the reasons as to why there isn't a definition, the difficulties in establishing one, the effect of establishing one, and therefore answering the question whether a definition of terrorism is actually needed.
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...paperpublications3
Abstract: The horror and measure of the synchronised suicide attacks on the United States homeland of 9/11 eclipsed anything ever experienced in terrorism. The operation was carried out with ambitious scope and dimensions; impressive coordination and determination of the 19 aircraft hijackers that killed themselves, the aircrews, the passengers on board, and the entire 3,000 persons at the World Trade Center and Pentagon. The episode was due to the America’s commanding position and its orchestrated unilateral and predominant control on the economic, political, monetary, technology and cultural levels. The paper therefore examines the 9/11 attacks by the on al-Qaeda US and the world view on the episode. The paper concluded that, US as a liberal democratic state, has not lived up to the expectations of maintaining international norms. Its unilateral use of force throws up the US into critical examination as a leading apostle of democratic principles in the international systems. Its committed and self-professed war against global terrorism needs to be embraced and recognized by others, as legitimate.
Definition, Types, Goal, Tactics, Financing of Terrorism, Global Terrorism Index (GTI), Terrorism in India, Agencies dealing with terrorism in India, How to stop Terrorism?
Despite an ever-changing terrorism risk insurance market, businesses from every industry sector continue to purchase coverage—more than 60 percent of organizations surveyed by Marsh bought coverage in 2009.
Since the terrorist attacks of September 11, 2001 debate has circulated around the nature and success of counterterrorism policies. Considering after thirteen years, the world has not faced a major attack on the same scale as those witnessed in 2001; counterterrorism policies by some have been argued to be a phenomenal success. This article will focus on counterterrorism policies by the United States, positing the argument that the success of these policies cannot be determined by the mere lack of terrorist attacks, but by the effects of these policies
Intelligence as a set of permanent institutions dates back only to the second half of the nineteenth century. But as information and news - in the dictionary meaning used in English since the middle of the fifteenth century, of 'knowledge as to events, communicated by or obtained from another, especially military' - it has always been collected as part of warfare
For a military, it can mean knowledge of the enemy and can distinguish between to defeat and to lose because information means knowledge and knowledge are power. Analysts see it as a package of information pending for clarification, and policymakers consider they should be informed so that they can meet the needs, stated or understood.
Intelligence gathers under the same umbrella the informational component of national security, internal and external policies, as well as certain aspects of international security in the case of global cross-entities (states, organizations).
This presentation is built up by gathering information from different references (Book, Articles, and Newspapers) by the author.
Terrorism in International Law: The struggle to define terrorismAnthony Veluz
International Criminal Justice.
In our ICJ module we are required to do a presentation in each seminar on the week's topic area. Our presentation would usually consist of one of:
- literature review
- case review
- current issues
For our final seminar we had to give a presentation on one of the following topics:
- aggression
- terrorism
- torture
My presentation was on terrorism and I mainly looked at the literature on this area, with the odd case and current issues included. My primary focus was on the definition of terrorism as I couldn't find a universally accepted definition and looked at the problems this caused. The battle against terrorism is difficult enough, hampered by the absence of a definition. I examine the reasons as to why there isn't a definition, the difficulties in establishing one, the effect of establishing one, and therefore answering the question whether a definition of terrorism is actually needed.
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...paperpublications3
Abstract: The horror and measure of the synchronised suicide attacks on the United States homeland of 9/11 eclipsed anything ever experienced in terrorism. The operation was carried out with ambitious scope and dimensions; impressive coordination and determination of the 19 aircraft hijackers that killed themselves, the aircrews, the passengers on board, and the entire 3,000 persons at the World Trade Center and Pentagon. The episode was due to the America’s commanding position and its orchestrated unilateral and predominant control on the economic, political, monetary, technology and cultural levels. The paper therefore examines the 9/11 attacks by the on al-Qaeda US and the world view on the episode. The paper concluded that, US as a liberal democratic state, has not lived up to the expectations of maintaining international norms. Its unilateral use of force throws up the US into critical examination as a leading apostle of democratic principles in the international systems. Its committed and self-professed war against global terrorism needs to be embraced and recognized by others, as legitimate.
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxwilfredoa1
***RESPONE TO EACH POST 100 WORDS MIN EACH***
1. The Nuclear terrorist threat, even with today's countermeasures, is possible. Former United States president Barrack Obama in April 2009 warned that the terrorist threat using nuclear weaponry is real and that it is an immediate and extreme threat to global security. The Nuclear terrorist threat has different approaches or methods, such as bombs or an attack towards nuclear power plants or other nuclear installations, with the sole purpose of provoking a chain reaction that can result in a radioactive catastrophe. Furthermore, even when the United States Regulatory commission advertises that nuclear power plants can withstand even an aircraft crash, this could compromise the containment building's integrity. Also, radioactive waste stored in different portions of the mentioned powerplants can be targets of a terrorist groups unleashing up to five times radioactive waste as a reactor core. Moreover, Governmental studies reveal that highly organized terrorist groups could acquire Plutonium to create a crude nuclear bomb, a device built from stolen components or rich atomic material. The Nuclear threat is real, and even when strongly organized countries with nuclear weapon capabilities have prevention systems and countermeasures to prevent weapon proliferation, the danger is alarming. In 1993, the International Atomic Energy Agency reported more than 175 nuclear trafficking's 18 that involved highly enriched weapons with uranium or Plutonium. Furthermore, there is claims and report by the Russian general Alexander Lebed that 40 nuclear weapons are missing from the Russian Arsenal. However, a radioactive terrorist attack should not be only considered by the use of nuclear weaponry. An attempt at a nuclear installation is also a terrorist nuclear threat due to this can provoke the same or more damages than a bomb.
2. The threat of nuclear weapons acquired in the hands of terrorists is improbable, but still, the risk exist. According to the Department of Homeland Security, at a certain point, nuclear, radiological, biological, and chemical warfare represents a threat in terms of potentially harmful and fatal impacts on society and the economy (West, 2012). While at this time, there is no actual record of any terrorist organization ever acquiring nuclear weapons or materials, society still holds a fear of any terrorist organization having a position of said weapons. Terrorist organizations make unconfirmed claims of having nuclear weapons in place to disrupt a targeted society's peace of mind. According to the lesson, during the 20th century, nuclear weapons were a hot commodity on the black market (American Military University, 2020). However, they were nearly impossible to get a hold of, so radiological dispersal devices or dirty bombs were replacing them. The reasoning behind this would be the cost of purchasing, acquiring, and holding a nuclear device was too high for a well-funding terrori.
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
WMD Proliferation, Globalization, and International Security:
Whither the Nexus and National Security?
Strategic Insights, Volume V, Issue 6 (July 2006)
by James A. Russell
Strategic Insights is a bi-monthly electronic journal produced by the Center for Contemporary
Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are
those of the author(s) and do not necessarily represent the views of NPS, the Department of
Defense, or the U.S. Government.
For a PDF version of this article, click here.
Introduction
Throughout the 1990s, the United States national security establishment gradually espoused the
idea of a growing threat posed by the proliferation of a variety weapons and weapons
technologies that could cause mass casualties to combatants and noncombatants alike. Nuclear
weapons had long occupied the rhetorical space used by policy makers to describe weapons that
could kill on a mass scale, but gradually the result was that the term “weapons of mass
destruction” was reinvigorated and quickly became an accepted term in the lexicon of national
security policy. The term is believed to have surfaced in the media in the aftermath of the German
bombing of Guernica, the Basque seat of power, in April 1937. It reappeared periodically during
World War II in reference to the indiscriminate killing of civilians by aircraft.[1] Today, the term is
defined in U.S. Code Title 50 as “any weapon or device that is intended, or has the capability, to
cause death or serious bodily injury to a significant number of people through the release,
dissemination, or impact of toxic or poisonous chemicals or their precursors; a disease organism;
radiation or radioactivity."[2] For the purposes of this analysis, the term is defined as weapons
that can inflict mass casualties on combatants and noncombatants using nuclear and radiological
devices, long range missiles, and lethal chemical- and biological agents.[3]
Arguably, the kick-off to the more recent formal shift in emphasis in the U.S. national security
bureaucracy came in September 1993 when President Clinton told the United Nations General
Assembly:
One of our most urgent priorities must be attacking the proliferation of weapons of mass
destruction, whether they are nuclear, chemical or biological; and the ballistic missiles
that can rain them down on populations hundreds of miles away… If we do not stem the
proliferation of the world’s deadliest weapons, no democracy can feel secure.[4]
Following the speech, President Clinton signed Presidential Directive 18, which ordered the
Department of Defense to develop a new approach in addressing the proliferation of weapons of
mass destruction. At the time of the initiative, the United States was particularly concerned with
the prospect of thousands of unsecured nuclear warheads in the former Soviet republics—the
problem of “loose nukes.”
In late 1993, Secretary of Defense Les Aspi.
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docxSHIVA101531
**ANSWER EACH QUESTION 100 WORDS MIN EACH**
1. The terrorist organizations are more likely to obtain and use a biological weapons (BW) than a nuclear weapon. Col Alfred F. Abramson III stated that both civilian and military sources foresee that over the next decade the threat from proliferation of BW will increase significantly (2012). In my opinion, BW are more dangerous than nuclear weapons because they can persist and spread through a population. BW are easy to hide and difficult to detect such as plague and anthrax. Biological weapons include any microorganism that can cause illness or death. These agents include viruses, bacteria, fungi, and toxins cultured from living organisms. They are invisible, odorless, tasteless, and can be spread silently likely go unnoticed (Abramson, 2012). Person may not experience symptoms immediately after being exposed to the agents and each agent has a different exposure period before infection. When use by terrorists it can be disseminate through a variety of means such as aerosol sprays or put into food or water. The devastating consequences of our current covid-19 pandemic for individuals, families, countries as whole offers vivid proof that microorganism could be just as destructive and terrifying; more so than the nuclear weapons. The threat of nuclear weapons by non-state actors remains low, it demands a considerable amount of time, skill sets, funding and specialized equipment or tools to handle these complex weapons (Abramson, 2012). BW possession by hostile states and terrorist groups represent one of the greatest security challenges facing the U.S. Homeland Security Enterprise (HSE). My prediction is that the modern BW can be so deadly that our immune system may response to them. From our current pandemic, developing a much more global governance of biosafety than exists at present is an urgent need for not just the U.S. government but for the international community.
2. The last major bioterrorism attack against the United States occurred in the chaotic weeks following 9/11; envelopes containing spores of Anthrax were sent around the country, killing five and sending more than a dozen into serious illness (Funk, 2018). While this was the last major attack of this kind, it certainly will not be the last, nor was it the first; the history of weaponizing biological agents stretches back to medieval times. There are four key factors in determining the effectiveness of a response to a biological attack. The first, speed of detection, deals with the government's ability to recognize an attack as such, and that it is not simply a natural outbreak of disease. The second, accuracy of identification, simply measures the accuracy with which investigators can identify what pathogen is in play. The third factor is the effectiveness of containing the contamination, while the fourth is neutralizing the effects of the pathogen (Abramson, 2012). In evaluating the possibility of terrorists using a biologic.
Genesis of suicide attacks in Pakistani society.
A suicide attack is an attack on a military or civilian target, in which an attacker intends to kill others, and knows that they will either certainly or most likely die in the process.
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docxaryan532920
MHS 5201, Weapons of Mass Destruction 1
Course Learning Outcomes for Unit I
Upon completion of this unit, students should be able to:
1. Evaluate the evolution of terrorism from the Cold War Era through today.
1.1 Identify the seminal events that shaped domestic terrorism legislation both before and after the
terrorist attacks of September 11, 2001.
1.2 Evaluate the key factors leading to the growing danger of chemical and biological terrorism.
2. Relate modern-day terrorism to complex terrorism and social networks.
2.1 Define terrorism and the concept of new terrorism.
6. Consider the political, philosophical, and religious perspectives of the various actors in the war on
terror.
6.1 Explain the opportunities and limitations for weapons of mass destruction (WMD) terrorism
globally.
Course/Unit
Learning Outcomes
Learning Activity
1.1 Chapter 1.1, Article Review
1.2 Chapter 1.2, Article Review
2.1 Article Review
6.1 Article Review
Reading Assignment
Unit I: Introduction, pp. 1-4
Chapter 1.1: Definitions, Trends, and the Concept of “New Terrorism”, pp. 5-37
Chapter 1.2: The Nature of the Post-09/11 WMD Terrorism Threat, pp. 38-70, 73-83
Unit Lesson
One of the most acute threats to the United States is a terrorist attack using weapons of mass destruction
(WMD). Nonstate facilitators have emerged as a growing WMD proliferation threat in recent years. There are
large quantities of these weapons spread throughout the world in Europe, Asia, Africa, South America, and
the Middle East. Since the disintegration of the Soviet Union in the 1980s, the increased risks of terrorism
have been brought to other nations due to the unknown whereabouts regarding chemical, biological, and
radiological weaponry. Terrorist groups throughout the world have been attempting to acquire WMD in an
effort to cause loss of life, chaos, and disrupt governments in the free world. Terrorist attacks have become
more frequent and are likely to continue due to the funding provided by other communist or terror-related
groups. The rise of new terrorism occurred with the death of Osama Bin Laden and the increase of smaller
cells with acquired weapons, monies, and travel ability. The new form of terrorism is transnational, has very
limited borders, and appears to be more violent than older forms of terrorism under Osama Bin Laden.
UNIT I STUDY GUIDE
Conceptual Frameworks
MHS 5201, Weapons of Mass Destruction 2
UNIT x STUDY GUIDE
Title
In 2003, the United States and its international partners succeeded in interdicting a shipment of WMD-
related material destined for Libya’s nuclear program. As facts emerged regarding this shipment and its origin,
the U.S. government gained insight into an emerging WMD terrorism risk. Pakistani Nuclear Scientist A. Q.
Khan developed a transnational nuclear proliferation network reaching from Southeast Asia to Europe and
making sensitive technology and WMD- ...
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...OECDregions
Preliminary findings from OECD field visits for the project: Enhancing EU Mining Regional Ecosystems to Support the Green Transition and Secure Mineral Raw Materials Supply.
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOChristina Parmionova
The 2024 World Health Statistics edition reviews more than 50 health-related indicators from the Sustainable Development Goals and WHO’s Thirteenth General Programme of Work. It also highlights the findings from the Global health estimates 2021, notably the impact of the COVID-19 pandemic on life expectancy and healthy life expectancy.
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
2. Learning Objectives
After reading this chapter the reader should be able to:
1. Differentiate the bio-agents obtainable by terrorists and list the
ways biological agents may be used as weapons of mass destruction.
2. Explain the manner in which terrorist groups might exploit
chemical and radiological weapons.
3. Compare the lethality of viruses and bacteriological infections.
4. Summarize what cyber terrorism and cyber security mean and
debate the issue.
5. Describe the intelligence reform spawned by the 9/11
Commission.
6. Elaborate on the need to share information.
3. SUBTOPICS
INTRODUCTION
THE AVAILABILITY OF VARIOUS FORMS OF CHEMICAL,
BIOLOGICAL, AND NUCLEAR MATERIALS IS
FRIGHTENING. EVEN MORE FRIGHTENING IS THE LACK
OF EFFORTS TO CONTROL THEIR PROLIFERATION AND
TO PREVENT THE USE OF THEM. AS THE POTENTIAL
THREAT OF CHEMICAL, BIOLOGICAL, AND OTHER
UNCONVENTIONAL WEAPONS GROWS AT THE LOCAL,
STATE, AND FEDERAL LEVELS, PREPARATION FOR
SUCH AN EVENT IS RAPIDLY BECOMING A SIGNIFICANT
ISSUE TO THE PRIVATE SECTOR.
4. BIOTERRORISM
THE USE OF BIOLOGICALAGENTS IN WAR IS NOTHING NEW AND
HAS EXISTED SINCE THE 6TH CENTURY. CONTROLLING AND
CONTAINING A BIOTERRORISM ATTACK WILL REQUIRE
INCREDIBLE EFFORT AND COOPERATION ACROSS
INTERNATIONAL BOUNDARIES. MODERN MAN HAS SHOWN TO
BE JUST AS RUTHLESS AS HISTORICALARMIES AND
GOVERNMENTS. THE 20TH CENTURY'S FIRST USE OF
BIOWEAPONS OCCURRED DURING WORLD WAR I WHEN A
GERMAN UNDERCOVER AGENT SUPPOSEDLY INFECTED THE
FRENCH FOOD SUPPLY. BIOLOGICAL AGENTS OF SPECIFIC
CONCERN FOR HUMAN HEALTH INCLUDE VIRUSES, BACTERIA,
AND TOXINS SUCH AS THOSE CAUSING SMALLPOX, ANTHRAX,
PLAGUE, TULAREMIA, BOTULISM TOXIN, AND VIRAL
HEMORRHAGIC FEVERS (FOR EXAMPLE, EBOLA VIRUS).
http://emergency.cdc.gov/agent/agentlist.asp
5. THE POTENTIAL CHEMICAL THREATS WHICH MAY BE ENCOUNTERED BY
EMERGENCY PROFESSIONALS INCLUDE BOTH CHEMICAL WARFARE
AGENTS AND TOXIC INDUSTRIAL CHEMICALS. CHEMICAL WARFARE
AGENTS ARE USED TO KILL, SERIOUSLY INJURE, OR INCAPACITATE
PEOPLE THROUGH PHYSIOLOGICAL EFFECTS. THERE ARE TWO
CATEGORIES OF CHEMICAL AGENTS: NERVE AGENTS AND BLISTER
AGENTS. NERVE AGENTS INCLUDE SARIN, TABUN, SOMAN, AND GF OR
VX. THESE ARE COMPOUNDS THAT ATTACK THE CENTRAL NERVOUS
SYSTEM AND ARE ABSORBABLE THROUGH THE SKIN, RESPIRATORY, AND
ORAL ENTRY POINTS. THEY ARE EASILY DISPERSED AND HIGHLY TOXIC,
WITH SPEEDY EFFECTS. EXPOSURE TO THESE AGENTS THROUGH
RESPIRATORY MEANS CAN RESULT IN RAPID DEATH. EXPOSURE
THROUGH THE SKIN CAN CAUSE SYMPTOMS WITHIN 30 MINUTES AND
EVENTUAL DEATH AS WELL. ORAL EXPOSURE CAN OCCUR BY EATING
CONTAMINATED FOOD FROM AN AREA WHERE THE AGENT HAS BEEN
DISPERSED. BLISTER AGENTS SUCH AS MUSTARD GAS BURN OR BLISTER
THE SKIN, EYES OR LUNGS. THE SYMPTOMS MAY NOT APPEAR
IMMEDIATELY, POSSIBLY BEING DELAYED FOR TWO TO 24 HOURS AFTER
EXPOSURE. LARGE QUANTITIES OF THESE AGENTS ARE ACTUALLY
STORED IN THE UNITED STATES AND POSE TANTALIZING TARGETS FOR
TERRORISTS.
6. NUCLEAR THREATS
WITH THE END OF THE COLD WAR, THE WEST HAD STARTED TO
STOP REFERRING TO SUCH TERMS AS NUCLEAR DETERRENCE,
MASSIVE ASSURED DESTRUCTION, AND NUCLEAR
RETALIATION. HOWEVER, TERRORISM HAS RENEWED THE
THREAT FROM SUCH WEAPONS. THE CONCEPT OF NUCLEAR
TERROR RELIES ALMOST ENTIRELY ON ITS ASSUMPTION THAT
ROGUE STATES COULD PROVIDE NUCLEAR WEAPONS
"SECRETLY" TO TERRORISTS. THE GOVERNMENT THEN
REASONED THAT SHOULD THESE SECRET LINKS BE EXPOSED,
DETERRENCE COULD LARGELY BE RESTORED BECAUSE THE
UNITED STATES WOULD THREATEN UNACCEPTABLE
RETALIATION. ROGUE STATES WOULD HAVE TO CONSIDER THE
GRIM REALITY OF MASSIVE RETALIATION. IT IS UNCLEAR
WHETHER SUCH NATION STATES AS IRAN HAVE EVEN
CONSIDERED RETALIATION AS A REALISTIC RESPONSE FROM
THE WEST. IN ADDITION, IT MUST ALSO BE RECOGNIZED THAT
DIRTY BOMBS, ALTHOUGH NOWHERE NEAR AS DEVASTATING
AS NUCLEAR BOMBS, CAN STILL CAUSE MASSIVE DAMAGE,
MAJOR HEALTH PROBLEMS, AND INTENSE PSYCHOLOGICAL
HARM.
7. CYBER TERRORISM AND COMPUTER SECURITY
COMPUTER CRIME IS DEFINED GENERALLY DEFINED
AS THOSE CRIMES WHICH INVOLVE ACCESSING A
COMPUTER’S DATABASE WITHOUT AUTHORIZATION
OR EXCEEDING AUTHORIZATION FOR THE PURPOSE
OF SABOTAGE OR FRAUD. IT ALSO COMPRISES THEFT
OR DESTRUCTION OF SOFTWARE AND HARDWARE.
COMPUTER SECURITY, THEREFORE, IS THE
PROTECTION OF ALL ASSETS, ESPECIALLY
INFORMATIONAL, FROM BOTH HUMAN MADE AND
NATURAL DISASTERS. COMPUTER SECURITY
INCLUDES PROTECTING DATA,
TELECOMMUNICATIONS, PERSONNEL, AND THE
PHYSICAL ENVIRONMENT.
8. COMPUTER SECURITY INCIDENT RESPONSE TEAM
(CSIRT)
SOON AFTER 9/11, THE ADMINISTRATION SOUGHT TO
IMPLEMENT THE PRESIDENT’S NATIONAL STRATEGY
TO SECURE CYBERSPACE. THE RESULTS INCLUDED
THE FORMULATION OF A STANDARDIZED INCIDENT
HANDLING PROCEDURE FOR CYBER SECURITY
INCIDENTS AND THE FUTURE CONSOLIDATION OF
CYBER WATCH CENTERS. THE NATIONAL COMPUTER
EMERGENCY RESPONSE TEAM (US-CERT) TOGETHER
WITH CARNEGIE MELLON’S CERT/COORDINATION
CENTER IS MEANT TO BE A COORDINATION CENTRAL
POINT FOR ADDRESSING CYBER ATTACKS.
9. INTELLIGENCE AGENCY CAPABILITIES
INTELLIGENCE IS THE ART OF LEARNING WHAT YOUR ENEMY, OR
POTENTIAL ENEMY, IS DOING, THINKING, PLANNING, OR
PLOTTING. THERE ARE TWO BASIC FORMS OF INTELLIGENCE:
HUMAN INTELLIGENCE (HUMINT) AND TECHNICAL
INTELLIGENCE (TECHINT). IN 1949, THE CIA CREATED THE OFFICE
OF SCIENTIFIC INTELLIGENCE. SINCE THEN, THE AGENCY’S
SCIENCE AND TECHNOLOGY EFFORT HAS HAD A DRAMATIC
IMPACT ON THE COLLECTION AND ANALYSIS OF INTELLIGENCE.
AT THE BEGINNING OF THE COLD WAR, BOTH HUMINT AND
TECHINT GENERALLY UNDERTOOK COLLABORATIVE EFFORTS,
DUE LARGELY IN PART TO A COMMON OBJECTIVE OF DEFEATING
THE SOVIET THREAT. AT THE HEIGHT OF THE COLD WAR,
HOWEVER, THE RELIANCE ON TECHNOLOGY HAD REACHED A
DISPROPORTIONATE LEVEL WITH HUMAN INTELLIGENCE
GATHERING MECHANISMS. REORIENTING HUMINT COLLECTION
TO GIVE SIGNIFICANTLY GREATER ATTENTION TO TERRORIST OR
POTENTIALLY TERRORIST GROUPS WOULD HAVE IMPORTANT
AND HOPEFULLY POSITIVE IMPLICATIONS FOR THE
INTELLIGENCE COLLECTION PROCESS.
10. TERRORISM, AND ESPECIALLY TERRORIST
ACTS ASSOCIATED WITH BIOLOGICAL,
CHEMICAL, OR NUCLEAR WEAPONS IS AN
EXTREMELY DEMANDING ISSUE. THE
INTELLIGENCE COMMUNITY BEARS THE
BURDEN OF ACQUIRING INFORMATION
SUFFICIENTLY ACCURATE TO PREVENT SUCH
ATTACKS. WHETHER THE GOVERNMENT IS
SUCCESSFUL IN COMBATING TERRORISM
WILL BE JUDGED NOT ONLY ON ITS EFFORTS
TO CIRCUMVENT AN ATTACK, BUT ON HOW IT
REACTS TO A WEAPON OF MASS
DESTRUCTION ATTACK.
11. CASE STUDY: HEMORRHAGIC FEVERS ARE
CAUSED BY VIRUSES. DISCUSS THE ETHICS
OF SHOOTING DOWN AN AIRCRAFT WHERE
THE VIRUS HAS SPREAD THROUGHOUT THE
CREW AND PASSENGERS.
13. EPILOGUE- “BUYING DUCT TAPE BY THE MILE
AND HAVING ELDERLY WOMEN REMOVE THEIR
SHOES AT AIRPORTS DO ABSOLUTELY NOTHING
TO INCREASE HOMELAND SECURITY.” MARCUS
RAMEN, THE MYTH OF HOMELAND SECURITY.
14. LEARNING OBJECTIVES
AFTER READING THIS CHAPTER THE READER
SHOULD BE ABLE TO:
1. DEBATE INTELLIGENTLY THE MAJOR
ISSUES FACING TRANSPORTATION SECURITY
IN THE FUTURE.
2. REASON THE NEXT BEST STEPS TO TAKE
IN THE WAR ON TERRORISM.
15. DISCUSSION QUESTIONS AND EXERCISES- CONTROVERSIAL ISSUES WHICH CAN
BE DEBATED
1. DOES TORTURE WORK? IS IT JUSTIFIABLE IN A DOOMSDAY SCENARIO?
2. INDIVIDUALS WHO PARTICIPATED WITH OR ASSISTED AL Q’AEDA ARE
CHARGED WITH OFFENSES AGAINST THE LAWS OF WAR. YET THE BUSH
ADMINISTRATION HAS DENIED THAT THEY REPRESENT A “MILITARY FORCE” OR
HAVE POW STATUS. NORMALLY, THE UNIFORM CODE OF MILITARY JUSTICE
WOULD APPLY. OR, IS THERE A CONCURRENT POWER THAT CAN BE USED TO
IMPLEMENT BY PRESIDENTIAL ORDER?
3. ARE THE AIR AND SEA MARSHAL PROGRAMS COST EFFECTIVE?
4. IS THE WEST PREPARED FOR A WEAPON OF MASS DESTRUCTION
ATTACK?
5. SHOULD TERRORISM BE FOUGHT VIA LAW ENFORCEMENT MEANS OR
MILITARY?
6. HAS THE PATRIOT ACT STRIPPED AWAY CRITICAL INDIVIDUAL RIGHTS IN
VIOLATION OF THE U.S. CONSTITUTION?
7. HAS THE CREATION OF THE DEPARTMENT OF HOMELAND SECURITY
ESTABLISHED JUST ANOTHER BUREAUCRACY?
8. HAS THE TRANSPORTATION SECURITY ADMINISTRATION BEEN
EFFECTIVE?
9. WHAT ARE THE ROOTS OF TERRORISM IN THE MIDDLE EAST AND HOW
DO CONTROL IT?
10. IS A DECLARATION OF WAR NECESSARY IN THE “WAR ON TERRORISM?”