29 Dec 2022

94

CBRNE and Cyber Terrorism

Format: APA

Academic level: College

Paper type: Assignment

Words: 875

Pages: 3

Downloads: 0

Heyer, R. J. (2006). Introduction to CBRNE Terrorism. An Awareness Primer and Preparedness Guide for Emergency Responders, 1-16. 

The article highlights the efforts being undertaken by democratic countries to uphold their founding principles of freedom, individual rights and civil liberties to eradicate future terrorists' attacks. The nations are expected to investigate and respond more to the attacks which are an act of balance towards pursuance of intelligence leads and adherence to the policies that protect the rights of individuals. According to the article, the local governments are expected to be the front liner law enforcers, thus in any democratic society, the level of authority and responsibility for public security is a delegation of a local government, more so to the agency of police. Therefore, the local governments' police will be the first agency to respond to any or all of the incidents (Heyer, 2006). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The activities come underway in response to the September 11th, 2001 terrorist attack that claimed lives of thousands of persons. The deaths occurred after flying the commercial passenger airliners into the World Trade Center's buildings situated in New York City. The attack destroyed the building and damaged the Pentagon as well as killing the personnel and passengers on an airliner that crashed closer Shanksville in Pennsylvania. 

The primary goal of democratic nations as highlighted in the article is to guarantee public safety. The article presents the materials which it discusses what each chief should be aware of regarding weapons of mass destruction that terrorists mostly use. Also, it chronologically outlines the sections that require attention at the three levels of the event which include before, during and after the occurrence. The article is a good one as it initiates developments in the criminal investigation, military actions against strongholds of terrorists. Further, it is crucial in developing new procedures, legislation as well as laws towards curbing terrorism. Cyber Attacks: The Contemporary Terrorist Threat. (2018). 

Cyber Attacks: The Contemporary Terrorist Threat. Retrieved January 30, 2018, from Cybercrime: http://www.policechiefmagazine.org/cyber-attacks-the-contemporary-terrorist-threat/ 

In this article, the author brings to our memory the terrorist attacks of Paris which were accompanied by loss of lives, senseless destruction, and attack on the Western lifestyle by those finding a Western way of life and values offensive hence, they target it for elimination. The author states that the slogan "terrorist attacks" raised only carnage visions, destruction, alongside weapons including bombs, suicide bombers, guns, and airplanes. In those visions, cyber activities and computers are not mentioned. However, in today world, cyber activity and computers are main tools in recent terrorist attacks, and certain cases, they act as weapons. Moreover, in consideration of the law enforcement agencies in their roles in homeland security strategies, the article enlightens that the remaining cognizant of both the need and risks of technology alongside cybersecurity will assist agencies to prepare better (Cyber Attacks: The Contemporary Terrorist Threat, 2018). The role of homeland security is to prevent terrorism, respond to and recover from natural catastrophes, perform customs enforcement and collect customs revenue. Also, homeland security administers legal immigration services, and provide for the safety as well as stewardship of the United States marine and waterways transportation system, and other legacy missions of different components of the United States Homeland Security department. My thoughts on the document are that it is a good move for the security strategies, and strategic plans to categorize computers and associated cyber security as terrorists. 

The Police Chief. (2018). Using Innovative Technology to Investigate Targeted Mass Violence: What the Future Holds. Retrieved January 30, 2018, from The Police Chief: http://www.policechiefmagazine.org/using-innovative-technology/ 

According to the article, when prevention and intervention determinations are thwarted, mass violence take place, and law enforcement efforts are turned towards securing the scene as well guaranteeing the safety of the public. Evidence collections are carried out by officers alongside other personnel, who track down the leads and investigate suspects. However, technology can be used to investigate mass violence in crime scenes. The technology is important in supporting crime scene documentation and investigation (The Police Chief, 2018). The technology uses a forensic imaging camera with the capacity to enhance objects and forensic evidence. The camera, which is hyper-spectral gathers and analyzes different light wavelengths such as infrared and ultraviolet fluorescence. The camera can detect evidence, including latent fingerprints, blood, bodily fluid, and chemical strains, in daylight conditions. According to the article, the technology is possible of increasing the effectiveness of crime scene processing and, reduces altercation of conceivable evidence. 

The advanced technology will then be employed as a triage device to lessen the activity used in discovering and ranking evidence from the crime scene which will later be presented for analysis to a forensic laboratory. The technology is important for identification of the most validating evidence for testing in the laboratory. The technology thus reduces the probability of backlogs of proof in case a huge quantity of proof is presented to a laboratory at the same time without clear clarification. 

The article highlights that, while reacting to an explosion, or establishing the weight, structure, including the epicenter of an blast is a top issue of forensic research. Thus, there is the development of a 3-D scanning tool for reconstruction and evaluation of non-structural and structural components of a building after an explosion. 

However, as development and tests of innovative tools are underway, agencies are forced to put into consideration their specific needs, the limitations of technology and costs, local policies and laws that are likely to affect the adoption of the technology. Also, the privacy and other issues the society could have prior to purchasing the tool. There is a high possibility for the current technological advances to assist law enforcement officials to respond to a mass casualty. Besides, scientific developments in other fields, for example, victims' identification, can as well be important to agencies of law enforcement after an incidence of mass casualty. 

References 

Cyber Attacks: The Contemporary Terrorist Threat. (2018). Cyber Attacks: The Contemporary Terrorist Threat. Retrieved January 30, 2018, from Cybercrime: http://www.policechiefmagazine.org/cyber-attacks-the-contemporary-terrorist-threat/ 

Heyer, R. J. (2006). Introduction to CBRNE Terrorism. An Awareness Primer and Preparedness Guide for Emergency Responders, 1-16. 

The Police Chief. (2018). Using Innovative Technology to Investigate Targeted Mass Violence: What the Future Holds. Retrieved January 30, 2018, from The Police Chief: http://www.policechiefmagazine.org/using-innovative-technology/ 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). CBRNE and Cyber Terrorism.
https://studybounty.com/cbrne-and-cyber-terrorism-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration