SlideShare a Scribd company logo
1 of 3
(Mt) – Catholic Distance University Principles of Terrorism Discussion
1 Potential Strategic-Level Terror Targets Indian Point Power Plant The lecture by Charles
S. Faddis (2011), which is part of the materials for this course, made me consider the
meltdown of a nuclear facility as a severe potential threat by terrorist groups. While nuclear
reactors in power plants are generally well-guarded with armed personnel and bulletproof
walls, their cooling systems are not secured enough to prevent a possible terrorist attack.
The cooling system control station of a nuclear power plant is in a different place than the
reactor, and it can be accessed easily by armed terrorists. If this cooling system is shut
down, there can be a meltdown similar to the meltdown of Fukushima, Japan, caused by the
earthquake and tsunami. The Indian Point nuclear reactor is located near New York City. If a
terror group caused a meltdown in this power plant, the whole metropolitan area would be
devastated, and potentially millions of people could die (Faddis, 2011). Al-Quaeda has been
perhaps the most aggressive terrorist enemy of the United States. I believe they would
potentially want to carry out an attack in the Indian Point nuclear power plant because it
would be completely devastating. Al-Qaeda would gain recognition from its allies by
showing how they can do such immense damage to the United States, and they would
terrorize the whole world with their lethality. The Pyramids of Giza Islamic State has been
known to target not only living persons but also archaeological treasures from the history of
humankind, destroying ancient statues and monuments. They have already done much
harm in this sense, but they could potentially target a more iconic archaeological site: The
Giza pyramids outside of Cairo in Egypt. Egyptian authorities have been on the lookout for
ISIS terrorism near their monuments, and that was the case when I traveled there in 2016.
They would search the cars approaching the pyramids to make sure there were no
explosives. However, there is a neighborhood next to the site that is called Al-Haram. This
place is dangerous, and there is a lot of crime and little surveillance. If Islamists wanted to
attack the pyramids, they could easily install a rocket launcher in a building in Al-Haram
and direct the weapon to one of the three main pyramids, causing irreparable harm.
Terrorists have already attacked tour buses near the site (Lewis, 2019), but they have not
touched the pyramids so far. Mosques, Synagogues and Black Churches National Action is an
extreme-right former political party that was declared a terrorist organization in the United
Kingdom because they have committed various violent attacks in order to influence the
country’s politics. This group believes it is fighting a race war of white people against other
races, and it has spread to the United States as the “Atomwaffen Division,” a group that has
murdered five people since its US establishment in 2015 (Macklin, 2019). This group is
small compared to Al-Qaeda and ISIS, and therefore its targets would probably not be
essential landmarks or large metropolitan areas. I believe they would want to target places
such as synagogues, mosques, and Black churches as part of their war against non-White
races. References Faddis, C. S. (2011, April). Lewis, A. (2019, May 20). Blast injures South
African tourists near Egypt’s Giza pyramids. Retrieved from
https://www.reuters.com/article/us-egypt-security/blast-injures-southafrican-tourists-
near-egypts-giza-pyramids-security-sources-idUSKCN1SP0E2. Macklin, G. (2019, January
21). The evolution of extreme-right terrorism and efforts to counter it in the United
Kingdom. Retrieved from https://ctc.usma.edu/evolution-extreme-rightterrorism-efforts-
counter-united-kingdom/. 2 SIS and al Qaeda continue to be considered the two most
credible threats to the United States (SU) (Homeland Security, 2019). I think David brings
up a very relevant point that the power struggle between these two groups is something we
will likely see grow in the near future. Over the last few years al Qaeda has focused on
expanding its resources, internal structure, and territory while ISIS has utilized the time for
public activities (Homeland Security, 2019). However, with the recent loss of leadership it is
probable that the competition David discussed between these two groups will increase,
with a high likelihood of targeted events in the United States. The relevance of the US as a
target is well explained by the RAND corporation (2007) by their coercion, damage, rally,
and franchise hypothesis. Attacking US targets for the reason of coercion is based on the
idea that terrorist organizations wish to cause casualties and trauma in an effort to frighten
the US, pushing policy in the favor of the Islamic world (RAND, 2007). The damage
hypothesis recognizes the relevance of the goal of harming the US economy in an effort to
limit the country’s ability to be active in the Islamic world (RAND, 2007). The rally
hypothesis comes into play with the goal of recruiting supporters, which is likely to be
bolstered by a successful attack carried out on US soil which will highlight an organizations
strength and legitimacy (RAND, 2007). While the franchise hypothesis also explains the
value of US targets for homegrown jihadist terrorists as it allows for public and significant
events on a local level with support from hardcore organizations (RAND, 2007). With
advancements in technology the capabilities of such groups have grown significantly with
organizations such as ISIS utilizing consumer drones for activities such as surveillance of
targets and the dropping of explosive devices, and even employing airborne video
technology to record propaganda segments (Homeland Security, 2019). These types of
technological capabilities drastically expand the potential for types of attacks resource rich
organizations possess. There are three potential types of targets that I believe would create
high levels of societal fear and outrage, significant economic damage, and have the
potentially to entice sizable support for the perpetrating organization. The first would be an
attack on the healthcare industry. Physically or technologically crippling either the 9-1-1
system or healthcare facilities (or both) would create societal chaos inciting fear and a
resource deficit that could cripple the nation. Another type of target that organizations such
as al Qaeda or ISIS could carry out in the US to work towards their goal, is an attack on the
media. While terrorist organizations rely on the media and most way the cost-benefit of
causing them harm, an attack that targets this group could in actuality inflate media
coverage as the industry would likely intensify its coverage in support of its own. A
decimation attack that is either physically destructive and harms media staff and properties,
or a cyber based attack that debilitates their broadcasting capabilities, could rally a great
deal of support for a terrorist group. This type of attack would not only show the strength of
an organization but also their religious extremist views of attacking Western world
mentalities of freedom of speech. The third type of target is one based on the retail industry
and could greatly affect the US from an economical standpoint. A physical attack on the
shopping industry, an American daily activity, would likely create fear and panic amongst
the general public leading to decreased consumer spending. Consider the example of an
organization such as al Qaeda detonating an explosive device in the iconic retail facility such
as the Bloomingdales flagship store in New York. I recently used the following scenario in a
tabletop exercise I conducted with emergency department nurses in an effort to help them
plan for mass casualty events. Scenario: Four synchronized explosive devices were
detonated at 1:33pm at the Bloomingdale’s flagship store on 59th street and Lexington
avenue. The strategically placed devices have caused a structural collapse of the building
and responders are still searching through the rubble to locate victims. Law enforcement
reports indicate the explosives were hidden inside suitcases and handbags amongst the
department store’s displays and merchandise, preventing suspicious activity or packages to
be recognized prior to the detonation. The timed explosions occurred during the busy lunch
hour with all three restaurants in the store packed with local shoppers and tourists. It is
estimated that as many as 1,000 people were inside at the time of the explosions. It is true
that our imagination is the only limit to the types of attacks and targets that a terrorist
organization may conduct. However, it is soft targets such as hospitals, media broadcasting
studios, and shopping centers which are ideal locations for large scale successful events
within the United States. Homeland Security. (2019, September). Department of Homeland
Security Strategic Framework for Countering Terrorism and Targeted Violence. Retrieved
from:
https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategicframework-
countering-terrorism-targeted-violence.pdf RAND. (2007). Getting Inside the Terrorist
Mind. Retrieved from: https://www.rand.org/pubs/research_briefs/RB9258/index1.html

More Related Content

More from write12

Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxwrite12
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docxwrite12
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxwrite12
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docxwrite12
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxwrite12
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxwrite12
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxwrite12
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docxwrite12
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxwrite12
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxwrite12
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docxwrite12
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docxwrite12
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxwrite12
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docxwrite12
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docxwrite12
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docxwrite12
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docxwrite12
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxwrite12
 
social media.docx
social media.docxsocial media.docx
social media.docxwrite12
 
Social Profession.docx
Social Profession.docxSocial Profession.docx
Social Profession.docxwrite12
 

More from write12 (20)

Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docx
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docx
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docx
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docx
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docx
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docx
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docx
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docx
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docx
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docx
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docx
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
 
social media.docx
social media.docxsocial media.docx
social media.docx
 
Social Profession.docx
Social Profession.docxSocial Profession.docx
Social Profession.docx
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Catholic Distance University Principles of Terrorism Discussion.docx

  • 1. (Mt) – Catholic Distance University Principles of Terrorism Discussion 1 Potential Strategic-Level Terror Targets Indian Point Power Plant The lecture by Charles S. Faddis (2011), which is part of the materials for this course, made me consider the meltdown of a nuclear facility as a severe potential threat by terrorist groups. While nuclear reactors in power plants are generally well-guarded with armed personnel and bulletproof walls, their cooling systems are not secured enough to prevent a possible terrorist attack. The cooling system control station of a nuclear power plant is in a different place than the reactor, and it can be accessed easily by armed terrorists. If this cooling system is shut down, there can be a meltdown similar to the meltdown of Fukushima, Japan, caused by the earthquake and tsunami. The Indian Point nuclear reactor is located near New York City. If a terror group caused a meltdown in this power plant, the whole metropolitan area would be devastated, and potentially millions of people could die (Faddis, 2011). Al-Quaeda has been perhaps the most aggressive terrorist enemy of the United States. I believe they would potentially want to carry out an attack in the Indian Point nuclear power plant because it would be completely devastating. Al-Qaeda would gain recognition from its allies by showing how they can do such immense damage to the United States, and they would terrorize the whole world with their lethality. The Pyramids of Giza Islamic State has been known to target not only living persons but also archaeological treasures from the history of humankind, destroying ancient statues and monuments. They have already done much harm in this sense, but they could potentially target a more iconic archaeological site: The Giza pyramids outside of Cairo in Egypt. Egyptian authorities have been on the lookout for ISIS terrorism near their monuments, and that was the case when I traveled there in 2016. They would search the cars approaching the pyramids to make sure there were no explosives. However, there is a neighborhood next to the site that is called Al-Haram. This place is dangerous, and there is a lot of crime and little surveillance. If Islamists wanted to attack the pyramids, they could easily install a rocket launcher in a building in Al-Haram and direct the weapon to one of the three main pyramids, causing irreparable harm. Terrorists have already attacked tour buses near the site (Lewis, 2019), but they have not touched the pyramids so far. Mosques, Synagogues and Black Churches National Action is an extreme-right former political party that was declared a terrorist organization in the United Kingdom because they have committed various violent attacks in order to influence the country’s politics. This group believes it is fighting a race war of white people against other races, and it has spread to the United States as the “Atomwaffen Division,” a group that has murdered five people since its US establishment in 2015 (Macklin, 2019). This group is
  • 2. small compared to Al-Qaeda and ISIS, and therefore its targets would probably not be essential landmarks or large metropolitan areas. I believe they would want to target places such as synagogues, mosques, and Black churches as part of their war against non-White races. References Faddis, C. S. (2011, April). Lewis, A. (2019, May 20). Blast injures South African tourists near Egypt’s Giza pyramids. Retrieved from https://www.reuters.com/article/us-egypt-security/blast-injures-southafrican-tourists- near-egypts-giza-pyramids-security-sources-idUSKCN1SP0E2. Macklin, G. (2019, January 21). The evolution of extreme-right terrorism and efforts to counter it in the United Kingdom. Retrieved from https://ctc.usma.edu/evolution-extreme-rightterrorism-efforts- counter-united-kingdom/. 2 SIS and al Qaeda continue to be considered the two most credible threats to the United States (SU) (Homeland Security, 2019). I think David brings up a very relevant point that the power struggle between these two groups is something we will likely see grow in the near future. Over the last few years al Qaeda has focused on expanding its resources, internal structure, and territory while ISIS has utilized the time for public activities (Homeland Security, 2019). However, with the recent loss of leadership it is probable that the competition David discussed between these two groups will increase, with a high likelihood of targeted events in the United States. The relevance of the US as a target is well explained by the RAND corporation (2007) by their coercion, damage, rally, and franchise hypothesis. Attacking US targets for the reason of coercion is based on the idea that terrorist organizations wish to cause casualties and trauma in an effort to frighten the US, pushing policy in the favor of the Islamic world (RAND, 2007). The damage hypothesis recognizes the relevance of the goal of harming the US economy in an effort to limit the country’s ability to be active in the Islamic world (RAND, 2007). The rally hypothesis comes into play with the goal of recruiting supporters, which is likely to be bolstered by a successful attack carried out on US soil which will highlight an organizations strength and legitimacy (RAND, 2007). While the franchise hypothesis also explains the value of US targets for homegrown jihadist terrorists as it allows for public and significant events on a local level with support from hardcore organizations (RAND, 2007). With advancements in technology the capabilities of such groups have grown significantly with organizations such as ISIS utilizing consumer drones for activities such as surveillance of targets and the dropping of explosive devices, and even employing airborne video technology to record propaganda segments (Homeland Security, 2019). These types of technological capabilities drastically expand the potential for types of attacks resource rich organizations possess. There are three potential types of targets that I believe would create high levels of societal fear and outrage, significant economic damage, and have the potentially to entice sizable support for the perpetrating organization. The first would be an attack on the healthcare industry. Physically or technologically crippling either the 9-1-1 system or healthcare facilities (or both) would create societal chaos inciting fear and a resource deficit that could cripple the nation. Another type of target that organizations such as al Qaeda or ISIS could carry out in the US to work towards their goal, is an attack on the media. While terrorist organizations rely on the media and most way the cost-benefit of causing them harm, an attack that targets this group could in actuality inflate media coverage as the industry would likely intensify its coverage in support of its own. A
  • 3. decimation attack that is either physically destructive and harms media staff and properties, or a cyber based attack that debilitates their broadcasting capabilities, could rally a great deal of support for a terrorist group. This type of attack would not only show the strength of an organization but also their religious extremist views of attacking Western world mentalities of freedom of speech. The third type of target is one based on the retail industry and could greatly affect the US from an economical standpoint. A physical attack on the shopping industry, an American daily activity, would likely create fear and panic amongst the general public leading to decreased consumer spending. Consider the example of an organization such as al Qaeda detonating an explosive device in the iconic retail facility such as the Bloomingdales flagship store in New York. I recently used the following scenario in a tabletop exercise I conducted with emergency department nurses in an effort to help them plan for mass casualty events. Scenario: Four synchronized explosive devices were detonated at 1:33pm at the Bloomingdale’s flagship store on 59th street and Lexington avenue. The strategically placed devices have caused a structural collapse of the building and responders are still searching through the rubble to locate victims. Law enforcement reports indicate the explosives were hidden inside suitcases and handbags amongst the department store’s displays and merchandise, preventing suspicious activity or packages to be recognized prior to the detonation. The timed explosions occurred during the busy lunch hour with all three restaurants in the store packed with local shoppers and tourists. It is estimated that as many as 1,000 people were inside at the time of the explosions. It is true that our imagination is the only limit to the types of attacks and targets that a terrorist organization may conduct. However, it is soft targets such as hospitals, media broadcasting studios, and shopping centers which are ideal locations for large scale successful events within the United States. Homeland Security. (2019, September). Department of Homeland Security Strategic Framework for Countering Terrorism and Targeted Violence. Retrieved from: https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategicframework- countering-terrorism-targeted-violence.pdf RAND. (2007). Getting Inside the Terrorist Mind. Retrieved from: https://www.rand.org/pubs/research_briefs/RB9258/index1.html