Introduction
There are many ways I could attack the United States of America if I were a terrorist. It includes the use of things like suicide bombers, or even by use of weapons in shooting people aimlessly in the streets among many others. The primary method employed in attacking America is the release of a bioweapon in American society. A bioweapon is a laboratory-created pathogen to kill human beings (Williams & Sizemore, 2020).
There are various reasons for selecting this mode of attack. Firstly, the United States of America and the world, in general, are not ready to handle an outbreak of a disease caused by a pathogen. It has been evident, as the United States of America, was not adequately prepared in dealing with the COVID-19 pandemic (Kestler-D'Amours, 2020). Their ill-preparedness response in this sector shows how vulnerable the United States of America is in the coronavirus face. Thus the best way to attack America is by use of a bioweapon.
Stop Killing American Spies
Americans who are found guilty of spying should not be put to death. There are various reasons for this statement. Firstly, all the international conventions and treaties state that a person is guaranteed the right to life. For instance, article six of the international convention on political and civil rights states that everyone is born with the right to life, and it should not be violated in any way ("UN HRC ICCPR Article 6", 2018).
Furthermore, spies must not be killed since it is against international norms and practices. Secondly, spies should not be killed as they perform critical roles in society (Roberts, 2002). For instance, spies help in the squashing of terror attacks before they happen by gathering information, which may not be easily accessible by any other means.
Insider Threats
An insider threat is a risk which emanates from the corporation itself (Le & Zincir-Heywood, 2020). For instance, an organization's employees can become a security risk if they use the organization's data to its benefits. Insider threats are usually performed by various actors and not solely employees. Thus these threats can originate from various places like the consultants to the organization, directors of the organization, and even a business partner themselves.
It should be noted that there are various types of insider threats (Le & Zincir-Heywood, 2020). The first one is called turncloaks. A turn cloak insider threat originates from a person who malevolently steals information, which is usually a contractor or an employee. These persons are exploiting their position in the workplace for personal gains, or even for fun.
The second type of insider threat is known as pawns. A pawn insider threat is a security risk that emanates from an innocent employee who is used by another agent to get data. A pawn insider threat can result from a lost laptop or mobile phone, whereby a person innocently picks up the items being an unintentional participant in the pawn. There are two ways an insider threat can be easily detected in an organization (Le & Zincir-Heywood, 2020).
The first way is through the use of digital indicators. For instance, an employee downloading a tremendous amount of data is a sign of insider threat. Also, an employee using unauthorized storage tools may be an indicator of insider threat. The second way of detecting an insider threat is by use of behavioral indicators. For instance, if there are several attempts of an employee trying to bypass the security, or even an employee coming to the office during off-hours are clear signs of insider threat.
References
Kestler-D'Amours, J. (2020). Coronavirus: How prepared is the United States? Not very.. Aljazeera.com. Retrieved 9 June 2020, from https://www.aljazeera.com/news/2020/03/coronavirus-prepared-united-states-200305202354735.html.
Le, D., & Zincir-Heywood, N. (2020). Exploring anomalous behaviour detection and classification for insider threat identification. International Journal Of Network Management, e2109. https://doi.org/10.1002/nem.2109
Roberts, S. (2002). War of Secrets; Spy History 101: America's Intelligence Quotient. Nytimes.com. Retrieved 9 June 2020, from https://www.nytimes.com/2002/09/08/weekinreview/war-of-secrets-spy-history-101-america-s-intelligence-quotient.html.
UN HRC ICCPR Article 6. Adfinternational.org. (2018). Retrieved 9 June 2020, from https://adfinternational.org/legal/un-hrc-iccpr-article-6/.
Williams, M., & Sizemore, D. (2020). Biologic, Chemical, and Radiation Terrorism Review. Ncbi.nlm.nih.gov. Retrieved 9 June 2020, from https://www.ncbi.nlm.nih.gov/books/NBK493217/.
Cite this page
Terrorism in USA: Bioweapon Attack as Primary Method - Essay Sample. (2023, Aug 28). Retrieved from https://proessays.net/essays/terrorism-in-usa-bioweapon-attack-as-primary-method-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- The Speech - Prevention of Child Abuse
- Women Finally Speak: Oprah's Speech Analysis
- Research Paper on Contemporary Crisis of Refugees
- Stop Human Trafficking: Modern-Day Slavery and Exploitation - Research Paper
- Essay Example on Fighting Terrorism and Cybersecurity: An Analysis of US Measures
- Essay Example on Ruby Bridges: Religion & Civil Rights Movement
- Paper Example on Understanding Addicts: Educate Yourself to Help a Loved One