Terrorists: Tech+Brutal Force=High Fatalities - Essay Sample

Paper Type:  Essay
Pages:  7
Wordcount:  1785 Words
Date:  2023-07-19

Introduction

Terrorists combine advancements in technology and brutal force as a way of ensuring a considerable amount of fatalities. Previously terror attacks used the approach on divide and conquered exemplifying similarities to the terror attacks on Mumbai, India, in 2008 (Gaines & Kappeler, 2019). Terrorists will hence ensure to perform surveillance whereby they have the means to exploit security and safety measures implemented by security agencies. As much as western governments have been quoted to say that the United States government doesn't negotiate with terrorists, terrorism is still a significant threat to homeland security (Gaines & Kappeler, 2019). Terrorism is being fueled further with technological advancements that are rapidly changing today's society. Among these technological advancements in the use of Unmanned Ariel Vehicles (UAVs), that allows the terrorist to continue their infliction of fear globally (Gaines & Kappeler, 2019).

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

In other countries, the ministry of internal security is equal to Homeland security in the United States. The primary role of the department of homeland security is to ensure the protection of the citizens within the United States and inhabitants of the United States from any threat to security within its borders (Oliver et al., 2019). It differs from the defense department in that the defense department works more with civilians and also offers protection to the matters of security in regards to the country abroad. Homeland security department protects the country from external terrorism threats. It also has a role in the preparation of the country's citizens from calamities regarding nature (Gaines & Kappeler, 2019). For full success in its operations, the homeland security department works together with other departments and agencies such as the secret service department, customs, and protection border protection, federal protection services, coast guard, Federal Protective Services as well as the Citizenship and Immigration Services and national Emergency Management Agency. Lewis, 2019 noted that the department of law enforcement is one of the essential parts of Homeland Security; this can be attributed to the fact that its role is in the implementation of order and law (Gaines & Kappeler, 2019). The officials of the Homeland Security department have a role to play in the continuity of evaluation and analysis of the ever-growing technology trends to mitigate, respond, recover and prepare adequately against all forms of terrorist attacks in the future.

An excellent example of the essential need of agencies in law enforcement within the homeland security can be noted after the September 11, 2001 terror attack (9/11 incident) (Gaines & Kappeler, 2019). After the September 11 terror attack on the United States, law enforcement agencies were left with no other option other than to identify their specific roles concerning what it would cost for them to combat acts of terrorism, and that caused severe challenges during that difficult period (Gaines & Kappeler, 2019). Although such tasks were not new to local policing practices, homeland security, at the local level, called for a shift in the roles of the law enforcement department in a bid to ensure the safety and overall welfare of all its residents, some critics do not believe that community policing can fit into the overall national strategy for homeland security. Minimal research has been done that mainly points towards the procedure for policing within the community with a lot of respect to how direct application is made to the national strategy in regards to security at homeland (Kenney, 2019). The main goal of terror attacks is to prevent, which appears to be parallel to the policies of law enforcement currently policies as well as criminal issues that are local. According to the Community Policing as the Primary Prevention Strategy for Homeland Security at the Local Law Enforcement Level, Because of these similar outlooks the neighborhood, individual as well as crime prevention strategies within the community must work together with enforcement of law authorities in the terrorism fight.

National Preparedness Reports (NPR) is supplemented by the NPG, handed out yearly to look into current programs to enhance preparation for disasters and any incidents occurring in the future. The NPG and NPRs ensure a critical evaluation means in regards to development and planning for significant events (Kenney, 2019). The Homeland Security Department (HSD) and Federal Emergency Management Agency (FEMA) compiles this report which ensures analysis of policies implementation, comes up with ways to provide support to all government levels together with the private sector and citizens as we strive to become better prepared for all forms of disasters and hazards and takes a clear look into the national plan in response to disasters (Gaines & Kappeler, 2019).

Homeland security department officials, for this reason, need to come up with a set of standard preparedness objectives in preparation of possible acts of terrorism, they must provide advanced and adequate training for the involved parties with much emphasis on the expected first responders, implementation of practices in regards to mitigation, and in continuity look into the technological advancement and its effect on the nature of the threats (Gaines & Kappeler, 2019). Multiple agencies have been put in place that is concerned with threat analysis preparedness, training, and mitigation. These agencies need to use the many frameworks and guidelines to stay uniform in inappropriate response and implementation. The need to develop and implement a variety of safety plans is crucial to homeland security officials as there is potential for terror attacks (Kenney, 2019). Homeland security in a new policing model dubbed homeland policing needs to necessarily recognize the change that was considered to be the norm among agencies of law enforcement, such as creation and involvement of engagement within the community and external partnerships. These attempts have been designed in a bid to solve problems and provide transformation within the organization. According to Segrave & Ratcliff, 2017, this model looks into the fact that community policing serves as a robust framework towards the development of effective prevention strategies for homeland security by local agencies of law enforcement.

An example of the 2028 Olympic Games which would be a target for acts of terror. The Olympic Games would include all government levels in planning for security and, in essence, put into use the NPG to build a common security picture (Kenney, 2019). The government will most assuredly declare the 2028 Olympic Games a National Security Special Event (NSSE), further recognizing the essence of the main objective of the creation of unified preparation among all involved entities. The Homeland Security secretary has the role of the designation of the work as an NSSE. The designation factors used to determine if an event fits the specifications of being considered as an NSSE include the expectation of attendance by U.S. officials as well as foreign dignitaries, the significance of the game, and the total size of the event (Kenney, 2019).

The Olympics would, therefore, bring about millions of spectators, inclusive of all levels of officials from governments globally (Kenney, 2019). According to Reese, 2019, with that declaration made, the Secret Service of the United States (SSUS) takes the role of leadership in the federal agency in exercising, implementing, and developing security operations. The declaration allows the SSUS to take the lead of the numerous involved agencies. This is a critical component of the command and control structure for these security events (Kenney, 2019). Having a clear command structure is a vital aspect of homeland security, which was realized during many after-action reports and analyses of past terrorist attacks as well as natural disaster response.

Methods and Materials

According to the QHSR, 2010, As with any other National Security Special Event (NSSE), planned or unplanned critical incident, or daily operations, homeland security is about effectively managing risks to the Nations security, in the long run, thus according to the DHS, 2011 the Risk Assessment Methodology via the formula Risk = Threat x (Vulnerability x Consequence) is of use in the prioritization of the main threats of prevalence and guide planning and response (Lewis, 2019). While there is an imperfection in risk management, the modern-day environment of security is so complicated that it is a necessary practice to balance and effectively manage threats from the routine to the unique. Other than the threats identified, NSSE's pose a significant challenge to all levels of the discipline as there is an inherently raised risk level given the elevated consequence of a crowded, publicized, or VIP event.

Taking a look into the Mumbai Terror attacks of 2008, lessons that are quite applicable can be learned to pertain to the efforts of mitigation directed towards the coming together of small group terror and modern technology are clearly evidenced. On November 26, 2008, Mumbai, India, was held under siege for almost sixty hours by ten attackers of the Lashkar-e-Taibe (LeT) terrorist group and by the end approximately 170 people were left dead with many more injured (Rabasa et al., 2009). Armed with only assorted small arms, these ten men were able to prolong the event and, ultimately, the carnage through the use of technology, organization, and tactics. An important takeaway from the after-action report determined that LeT elements conducted physical surveillance ahead of the attacks. Sketches, photographs, and Google Map analysis allowed the attackers to position themselves, plan movements, and evade responders given their prior knowledge (Lewis, 2019).

The resources available in the vicinity of the proposed scenario are immense and would be utilized. Medical assets relating to any medical care for wounded would be shared throughout the community. The surge of ambulances needed to transport the critically injured would be hampered by the initial attack at the pier, which would cause the medical leaders at the stadium for the opening ceremony to hold more patients. However, hospitals in the vicinity would have already allotted for that potentiality and set up temporary care facilities close to the stadium (Lewis, 2019). The triage director would be already in place at the stadium in the event of a disaster and would take charge and begin to filter the critically wounded to whatever facilities are available and suitable to accept them. Department of Defense (DoD) medical treatment teams could be utilized as they are more versed in field environment operations than their civilian counterparts (Lewis, 2019).

This example shows the potential threat associated with many national and international events. These threats are especially essential to analyze, mitigate, and prepare for as technological advances continue to make the potential dangers a reality (Lewis, 2019). The combination of technology and fanaticism can be deadly. The above scenario was designed by Group 2 in the spring 2020 Semester of HLS 594 at Pennsylvania State University (Lewis, 2019).

It is critical to note that, although the Federal Aviation Administration investigates reports of any aircrafts inclusive of drones that are coming too close together based on the information available. Because announcements involving UAVs do not often contain sufficient information to enable the FAA to conduct and follow up investigations, the FAA is generally not able to decide on the validity of the UAV reports t...

Cite this page

Terrorists: Tech+Brutal Force=High Fatalities - Essay Sample. (2023, Jul 19). Retrieved from https://proessays.net/essays/terrorists-techbrutal-forcehigh-fatalities-essay-sample

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism