The essential resources that are vital in the United States and are mostly targeted by terrorists such as computer networks, oil factories and airport facilities entail critical infrastructure. Attacks on the critical infrastructure disrupt the functioning of both the government and the private sector. Chemical and communication sectors are examples of the critical infrastructures that are strictly guarded by security personnel in American society (Fay, 2011). Homeland security and the CIA are examples of the security departments that aid in solving terrorism cases in the United States of America. Communication sectors provide data and voice services to people in a nation. It also secures the private and public data of every department in a country such as the United States. It is a sensitive sector since the leakage in data can lead to a collapse in an economy. The chemical sector takes in the automation of a country. It functions in manufacturing and other industrial operations. The president directs that the federal government must perform vital security measures to realize the security of the critical infrastructure. The state and local governments must maintain order through security forces such as the CIA (Purpura, 2013). The criminal infrastructure protection also aids in the analysis of the threats on such infrastructure and maintaining the highest security against terrorism. Mathew 5:39-39 states that “You have heard that it was said, ‘An eye for an eye and a tooth for a tooth.’ But I say to you, Do not resist the one who is evil. But if anyone slaps you on the right cheek, turn to him the other also. The biblical presentation in these perspectives warns people about revenge. Since the terrorist attack of the critical infrastructure of a country mainly depends on revenge, it is biblically wrong. The crime intelligence agencies must, therefore, cooperate with homeland security and every security department in the United States of America to stop the attack on critical infrastructure.
References
Fay. J. J. (2011), in Contemporary Security Management (Third Edition) .
Purpura. P. P. (2013). Security and Loss Prevention (Sixth Edition) .
Delegate your assignment to our experts and they will do the rest.