If we have learned nothing else in recent years, we know that protecting the United States requires a multi-faceted approach to prevention, innovation, and response. In December of 2003, the President issued Homeland Security Directive (HSPD)-8 to establish a federal policy that aims to strengthen our preparedness against many types of emergencies, including terrorist response. Unfortunately, the approach taken by many departments in emergency response is to use examples based upon prior experience, but prior experience leans heavily on natural disasters rather than the unique characteristics of terrorist incidents. R. James Woolsey (foreign policy specialist and former Director of the Central Intelligence Agency) and other experts have called this problem a "failure of imagination". Examples of this are myriad: for instance, although Foreign Terrorist Organizations commonly use vehicles as explosive devices (IRA using car bombs in Derry; Hezbollah using truck bombs in Beirut), no one took that reality to the next logical level to imagine that an FTO might use an airplane on a larger target. Today's threats can come from small organizations that emerge quickly and disappear just as quickly; it no longer takes an entire army to threaten the United States and her assets. Because of this, new ways of predicting and approaching terrorist threats must be found. Adopting a standard methodology which pulls together a common understanding and course of action across all departments involved in emergency response will help shape the future of emergency services as it pertains to terrorist response.
It is a well-established fact that the American public believes it is the responsibility of our military to be the ...
... middle of paper ...
...perators responding instinctively” has been the norm (and a matter of survival in some cases) is a difficult concept to embrace. However, if we can remember that the spirit of emergency response is supposed to be about teamwork and coordination under extreme circumstances to achieve a successful outcome, then perhaps individual personality differences or lack of understanding can be muted for the cause of the common good. Bringing all non-military emergency services agencies together towards a common understanding and course of action will serve as the framework of future emergency response. In turn, collaboration and unified leadership amongst emergency response units will strengthen the public’s trust in them, and should lead to an overall decrease in duplication, wasted resources, and perhaps most importantly – an increase in first responder and civilian safety.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... So while the metal detectors we all step through can uncover guns, knives, and other metal weapons, they can 't find hidden explosives” (Should Full-Body Scanners be Used in U.S. Airports?). Also, by using full-body scanners they cannot profile any certain type of group. Security focuses on behavior and that is what is going to keep our airports safe. Next, we should have the power to detain any suspected acts of terrorism. Most of the Islamic people who come into the U.S. simply change their name to an American name so nobody can suspect they are a terrorist.... [tags: September 11 attacks, Osama bin Laden, Terrorism]
1031 words (2.9 pages)
- This assignment is requesting information on domestic counterterrorism, major errors that were made, my personal take on 9/11, and if there is anything we can do to prevent future attacks. Should the attacks of 9/11 have been prevented. My personal thought is no. Let me explain, to prevent the 9/11 attack we need to go back to 1998. Before 9/11 there “was no credible Anti-Terrorist Strategy until 9/11. This should have been in place after the first bombing of the World Trade Centre by Islamic radicals and the attacks on the U.S.... [tags: american history, attack, american soil]
1510 words (4.3 pages)
- ... With the Nessus tool from Tenable I would be able to discover specific vulnerabilities attackers would potentially violate to break security of a software product . This tool can do a variety of things such as “data gathering, Host identification, port scanning, plugin selection and reporting of data” (Course Technology, 2014) The Nessus scan tool works as a remote security scan tool which can scan computers with different operating systems. This would be ideal in this environment given the mix of Windows and Unix operating systems.... [tags: Operating system, Microsoft Windows, Security]
1202 words (3.4 pages)
- ... People need to know about the terrorism of ISIS so that they can prepare and find a solution to be rid of them. In addition the goals and tactics of ISIS are also very grisly and inhumane. The ISIS goal and tactics are gruesome and not many people fully understand this topic about ISIS. An article “Gruesome Executions,” by the Daily Mail says, "ISIS [has executed] 25 people by lowering them in a vat of nitric acid." Haaretz.com, which focuses on middle eastern terrorism and propaganda had a an article by Daniella Peled and it says, "The group deftly defends [their] power base with help from former Iraqi army officers, good tribal ties, and prudent tactical retreats.... [tags: Al-Qaeda, September 11 attacks, Islam]
1323 words (3.8 pages)
- Soil is composed of minerals, soil organic material (SOM), water, and air, according to the Montana State University’s soil scientists, Ann McCauley. The actual composition of these various components within soil has a big influence on the porosity; i.e., the composition affects the movement of water into and through the soil (McCauley, 2005), and the movement of water into and through soil is absolutely necessary for productive crops, and healthy ecosystems. The binding together of soil particles is called “aggregation” and when water passed into the soil aggregation, if it is healthy, will keep the porosity and water movement slow and productive, which “improves fertility and carbon seques... [tags: Soil Science, Soil, Plants]
640 words (1.8 pages)
- INDEX 1. Introduction 2. Type of Attack in ATM 3. Replay Attack in ATM 4. Counter Measures for Replay Attack :-RIPSEC Protocol 5. References Introduction In present era, with rapid growth of banking and financial system throughout the world.Currently there are more than 730 million Debit/Card circulating throughout the world. Evesdroppers or Cyber-thief comes with new measures/attack to perform fraudulent transactions. It has been very necessary to come up with the proper security measures in ATM transactions so that people and banks do not suffer the monetary effect of fraudulent transactions.... [tags: Replay Attacks]
967 words (2.8 pages)
- The acidity or alkalinity level is dictated by the pH, potential of hydrogen, scale. Soil pH or soil reaction is an implication of the acidity or alkalinity of soil and is measured in pH units. Soil pH is characterized as the negative logarithm of the hydrogen particle fixation. As the measure of hydrogen particles in the soil builds the soil pH diminishes along these lines getting to be more acidic. From pH 7 to 0 the soil is progressively more acidic and from pH 7 to 14 the soil is progressively more alkaline or basic.... [tags: plant development, alkalinity of soil]
997 words (2.8 pages)
- What is Soil Erosion. Erosion can be defined as the removal of soil particles by the motion of wind or water. Soil erosion is considered to be one of the major concerns of agriculture throughout the world today. The misuse of land, mismanagement of farm land, felling of trees, overgrazing, poor soil and water management are all practices that contribute to soil erosion. Erosion can cause a decline in soil fertility, water supply, and crop yields. Thus it affects the productivity of the land and decreases the production of food, feed, fiber, and fuel ("Soil erosion- causes," 1987).... [tags: Erosion, Soil Particles, Wind, Water]
1258 words (3.6 pages)
- Psychic attacks can have a tremendous impact on all aspects of our lives, a psychic attack can undermined our relationships by ripping and tearing apart the very foundation in which we have built our lives upon. I was contacted in March of this year by a young man whose life was gravely impacted and torn apart by a vicious psychic attack. This young man's ordeal started when he approached a psychic that set up shop at a local fair in his hometown, he had never had a psychic reading before and in fact he had often scoffed at the idea of a psychic reading, he probably would've been better off had he never approached this gypsy for a reading.... [tags: Psychic attacks, Psychics,]
2180 words (6.2 pages)
- Shark Attacks The serious attacks are mainly by four species. The Bull shark. the Tiger, the Great White and the Oceanic Whitetip shark. The Grey Nurse (Sand Tiger) and the Bronze Whaler have for many years been blamed for many attacks but it seems nearly all were mistaken identity. The Grey Nurse is now protected in most States in Australia. The Great White is the largest and has a high percentage of fatal attacks. The Bull shark is responsible for a lot of attacks on swimmers and people in shallow water.... [tags: Sharks Ocean Life Attacks Essays]
4150 words (11.9 pages)