Question

1. Conduct qualitative research to assess prior threats. How were the threats carried out in your...

1. Conduct qualitative research to assess prior threats. How were the threats carried out in your environment? For example, how the shooting at Columbine was carried out. (250-350 words)

2. Determine possible threats to specific assets in the (your) environment. (100-150 words)

3. Analyze the modus operandi of past threats on assets in your specific environment. Break down and outline the MO. Was it spontaneous, or was it planned? Delineate how the individual or group carried out the threat. (250-300 words)

4. Identify a threat on an asset that is new to your environment. For example, if a politician comes in the building, how do we assess the threat of assassination? What is the connection between threats? (such as assassination, throwing a shoe, verbal assault, or kidnaping.)- (150-200 words) References

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Assessing threats involves the practice of being able to determine the credibility as well as seriousness of a potential threat topped up with the probability that the threat may turn out to be a reality. In order to understand the threat possibilities, it consists of a process that goes through various phases which starts from, identifying the threats, then categorizing the threats, evaluating its severeness or risks and understanding how to control it. The threats are carried out by mainly terrorists using the tactics of terrorism. The terrorist groups utilize different tactics which are simple and the same time extremely complex. The ways in which the threats were carried out include, tactics such as kidnappings, shooting hijacking bombings and suicide attacks all which were intended at sending a warning to the government.

The possible threats to specific assets comprise of Vehicle based attacks where terrorists specifically use vehicles to attack other vehicles and also aircraft attacks and hijackings. There is also a threat of chemical and biochemical weapons which involves releasing of bacteria or other germs to cause illness or even death to people, animals and plants by the evil people. In addition, there can be a case of agro-terrorism. This consists of introduction of plant or animal disease deliberately to purposely generate fear, undermining social stability or causing economic losses.

The past threats on the assets included Bioterrorism and agro-terrorism. In particularly Bioterrorism for example, was made up of Viruses and bacteria which were intentionally released to cause illnesses and death of plants and animals. This involved biological agents being changed in order to increase their ability to being able to cause disease and increase their ability to spread into the environment. Terrorists used them to pause serious threats to the states' security due to the fact that they can easily be spread through the air, water and food. These agents becomes dangerous because of being difficult to be detected and in most cases they do not cause illnesses for a number of hours or days. A good example of bioterrorist attack specifically in United States is the anthrax attack in September 2001. On the other hand, agro- terrorism involved intentional introduction of animal and plant disease to basically cause fear and economic losses. The terrorists aim with was killing of livestock, plants as well as contaminating food to cause economic crisis in the agricultural industries as well as loss of confidence in the government. All of these were planned cases involving extensive training on how they were to be administered and spread.

The threat that is new is, Cyber terrorism. This is because we live in era of developing information technology. The states including United States are vulnerable to the cyber-attacks because of the ability of the terrorist groups being able of executing the cyber-attacks. Cyber-attacks can also be executed thousands of miles away from the target and they are difficult to trace back to the perpetrator. Cyber terrorism can be so severely destructive capable of even of even killing politicians and their followers in the rally because it can be done in such a way that a bomb is planted and the perpetrator detonates it while they are far away electronically or with the use of technological gadgets.

Explanation:

1. Show how threats are assessed

Assessing threats involves the practice of being able to determine the credibility as well as seriousness of a potential threat topped up with the probability that the threat may turn out to be a reality. In order to understand the threat possibilities, it consists of a process that goes through various phases which starts from, identifying the threats, then categorizing the threats, evaluating its severeness or risks and understanding how to control it. The threats are carried out by mainly terrorists using the tactics of terrorism. The terrorist groups utilize different tactics which are simple and the same time extremely complex. The ways in which the threats were carried out include, tactics such as kidnappings, shooting hijacking bombings and suicide attacks all which were intended at sending a warning to the government.

2. Identify the possible threats to specific assets

The possible threats to specific assets comprise of Vehicle based attacks where terrorists specifically use vehicles to attack other vehicles and also aircraft attacks and hijackings. There is also a threat of chemical and biochemical weapons which involves releasing of bacteria or other germs to cause illness or even death to people, animals and plants by the evil people. In addition, there can be a case of agro-terrorism. This consists of introduction of plant or animal disease deliberately to purposely generate fear, undermining social stability or causing economic losses.

3. Provide a brief analysis of modus operandi

The past threats on the assets included Bioterrorism and agro-terrorism. In particularly Bioterrorism for example, was made up of Viruses and bacteria which were intentionally released to cause illnesses and death of plants and animals. This involved biological agents being changed in order to increase their ability to being able to cause disease and increase their ability to spread into the environment. Terrorists used them to pause serious threats to the states' security due to the fact that they can easily be spread through the air, water and food. These agents becomes dangerous because of being difficult to be detected and in most cases they do not cause illnesses for a number of hours or days. A good example of bioterrorist attack specifically in United States is the anthrax attack in September 2001. On the other hand, agro- terrorism involved intentional introduction of animal and plant disease to basically cause fear and economic losses. The terrorists aim with was killing of livestock, plants as well as contaminating food to cause economic crisis in the agricultural industries as well as loss of confidence in the government. All of these were planned cases involving extensive training on how they were to be administered and spread.

4. Show the threat that is new

The threat that is new is, Cyber terrorism. This is because we live in era of developing information technology. The states including United States are vulnerable to the cyber-attacks because of the ability of the terrorist groups being able of executing the cyber-attacks. Cyber-attacks can also be executed thousands of miles away from the target and they are difficult to trace back to the perpetrator. Cyber terrorism can be so severely destructive capable of even of even killing politicians and their followers in the rally because it can be done in such a way that a bomb is planted and the perpetrator detonates it while they are far away electronically or with the use of technological gadgets.

KINDLY RATE THE ANSWER AS THUMBS UP. THANKS A LOT

Add a comment
Know the answer?
Add Answer to:
1. Conduct qualitative research to assess prior threats. How were the threats carried out in your...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • STEP 1: In your own words define problem employees and the categories they may fall into....

    STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...

  • 1. Analyze the major challanges USB faced in the last 5 years, in your opinion, what were the cru...

    1. Analyze the major challanges USB faced in the last 5 years, in your opinion, what were the crucial factors in the banks downturn? 2. what are the main triggers to change the banks approach to communication and what is different today regarding the dealings and relationship to its share-and stakeholders? 3. How would you evaluate the constant replacement of the banks chairman and CEO? 4. in view of the future strategy of USB, what are your suggestions in order...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT