StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Defining the attack - Essay Example

Cite this document
Summary
Terrorism is a calculated use of violence employed against innocent civilians by a person or group of persons to communicate their ideology and other intentions by sowing magnitude of violence to purposively sow fear on people and effect government’s operation paralysis…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Defining the attack
Read Text Preview

Extract of sample "Defining the attack"

Topic: Terrorism is a calculated use of violence employed against innocent civilians by a person or group of persons to communicate their ideology and other intentions by sowing magnitude of violence to purposively sow fear on people and effect government’s operation paralysis (Smith, 2010). By this definition, this researcher asserts that the incident in Floola, where a suicide bomber drove a van filled of explosives into a community near to the residential zone of U.S. Military Base and have instantly killed hundreds of innocent men, women and children-- is an act of terrorism.

Experts defined that there is act of terrorism when the following characteristics are present: (a) the act of destruction is done by person or groups not acting in behalf of the government; (b) violence is used as tool to redress real or imaginary injustice; and (c) act is aimed at directly and indirectly to government perceived to be the cause of injustice (Ali, 2001, p. 2). The use of terror here is aimed at coercing the government to make decisions to break relations with US government and its military forces, the latter being politically considered by this kind of group as its world’s greatest political enemy.

Although Floola is reflected as a peaceful Muslim nation in South East Asia with secular government that sustains friendly ties with United States but we reserve ambivalence to some religious personalities who preached religious extremism to persuade some believers to wage war against the state and its western partners. In circumspect, Islam has been considered as a religion of peace but is tainted by believers who perceived that doing massive murder and violence will compel state actors to submit to their demands and make them martyrs of Allah (Houben, 2003).

Compared to other southeast nations however, Muslim in this region are pluralists albeit effects of cultural influences which modify their practices (Houben, 2003). As a member of the United States Joint Task Force on Terrorism, a team of expert analysts and investigators, the crime scene will be subjected to investigations by forensic experts to gather essential evidences to identify the terrorist and his possible group affiliation. Such will be undertaken while victims of the bombing incident are subjected into autopsies and medical actions.

Coordination with the local government will also be severed as the incident happened within the US Bases facility. Such attack demonstrates grave intention to attack the US military facility, if only feasible at that incident, but have instead hit the civilian populace within the military facility’s confines. When material evidences from crime scene are gathered, all data and information about the family, friends, associations, identities and political affiliation of the bomber will be subjected to an inquest to clarify motivations of such heinous attack.

Database will also be used as sources in tracking information. To appease public panic and fears, authorities will assume control on information and provide the public of all information to mitigate the impact of the incident. Local police forces will likewise also be coordinated to provide visibility in the area and to demonstrate that situation is totally under control. Review of security management assessment will immediately commence in partnership with all security stakeholders and leaders of the nation to enable coordinated planning to resolve this security problem.

The meeting will welcome discussion about the anti-US sentiments of the people to also gauge right remedial measures to bring the US government near to the heart Floopa people. In this war against terrorism, the most essential part is not just to get an advantageous position of the terrain but quintessentially winning favourable sentiment of the civilian populace. All information in this security conference will be coordinated with the Federal Bureau of Investigation (FBI) to insure that accurate information are articulated to the team.

Meanwhile, legal action will be launched too to drumbeat the need of legislating anti-terror policy so that the law will command officials to strategize its sanctions against terrorist groups’s leaders, members, collaborators, apparatus, and supporters. Operatives will be tasked to undergo surveillance activities and ensure that victims will be accorded with justice. But while this is the policy side, which are by the way stringent, civic programs of US should be popularized too to demonstrate how they have assisted in improving Floopa’s economic performance, of democratizing its system, of providing infrastructure, of extoling diversity (Houben, 2003) and developmental intervention for depressed areas of the nation.

As terrorism is also largely linked to economic aspects, the government must also be motivated to appraise and reform its economic and political programs to mitigate expression of discontent through violence and religious extremism (Burgoon, 2006). Many sociologists opined that poverty, hunger and depression motivate a person to join with violent groups that can readily shock the world. The government address social discontent and inequities to reduce its vulnerabilities from internal violence (Burgoon, 2006).

Reference Ali, S. (2002). Truth, Honesty, and Justice: The Alternative to Wars, Terrorism and Politics. http://www.truth-and-justice.info/defterror.html Retrieved: September 1, 2012. Burgoon, B. (2006). On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism. The Journal of Conflict Resolution, Vol. 50, No. 2, pp. 176-203. Cronin, A.K. and Ludes, J.M, (2004). Attacking Terrorism:Elements of a Grand Strategy Georgetown University, Washington DC. Houben,V J. H (2003).

Southeast Asia and Islam. Annals of the American Academy of Political and Social Science and Sage Publication, Vol. 588, Islam: Enduring Myths and Changing Realities (Jul., 2003), pp. 149-170. Smith, P. J. (2010). Terrorism in Southeast Asia: A Strategic Assessment, Regional Outlook, Institute of Southeast Asian Studies. pp. 12-16.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Defining the attack Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Defining the attack Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/military/1456364-defining-the-attack
(Defining the Attack Essay Example | Topics and Well Written Essays - 750 Words)
Defining the Attack Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/military/1456364-defining-the-attack.
“Defining the Attack Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/military/1456364-defining-the-attack.
  • Cited: 0 times

CHECK THESE SAMPLES OF Defining the attack

Web Server Application Attacks

In case the attack is successful, IDS components are shifted from the attacked host to functional host, where they counter with the attack successfully.... Basic motivation behind the attack on the Justice Department, as hackers themselves stated, was that they wanted to “release government data” (Zabarenko, 2013, para.... In this type of web application attack, malicious SQL queries execute unexpected actions through web applications, and disturb the back-end of the web application....
3 Pages (750 words) Assignment

Week 4 discussion

a very important consideration is defining the entities to make up the competition; generally, competitions on cyber security have two sides i.... Question 2 In order to protect any web application from vulnerabilities and threats of attack, a comprehensive understanding of every communication by the application is required.... Any exercise must have certain objectives to be met and as such defining objectives is important in designing cyber competitions....
2 Pages (500 words) Assignment

The Issue and Nature of Computer Crimes

Within a distinctive attack, the hacker removes some pages or some contents on the page; hacker afterwards uploads new altered pages over the internet with the old file name, so that the hacker monitors and controls the message transmitted over the site (Parker, 2002) and (Standler, 2002).... This type of attack happens as soon as an Internet server is swamped with an almost constant stream of fake requests for web pages, thus denying valid users a chance to download a web page over the internet and too perhaps deafening or crashing the webserver....
8 Pages (2000 words) Essay

Analysis of Hacking Attacks

Hacking is not just carried out, but the attack is thoroughly planned with smaller details (Goldstein, 1997).... This shows that the hackers are normally aware of committing the act and they select well the system to be hacked prior to the attack (Howard, 1997).... The paper "Analysis of Hacking Attacks" states that Stuxnet has been proved to be able to control communication between PLC and Siemens programming station....
24 Pages (6000 words) Coursework

Stack and Buffer Attacks in Operating Systems

hellip; A buffer attack is a programming error that attempts to store data beyond the required maximum storage of a fixed-size buffer.... Buffer overflow vulnerability gives an attacker the option to generate and run a code; the code then attacks the vulnerable application allowing the user to define the term of bias on the application giving an attacker the option to control a system (Crispin Cowan 1999)The first buffer attack was widely used by the Morris Worm in the year 1988....
5 Pages (1250 words) Essay

Partially Intuition-Based Attack Scenario

the attack reactions reflect accordingly as they bring several physical and psychological trauma, stress, and death.... the attack seems to come from a well-deliberated plan, I which several elements of intelligence gathering and analysis are key in facilitating the prevention of the attack, or minimization of the casualties and loss thereof from the attack.... ccording to intelligence gathered from an intercepted message, the attack is imminent....
8 Pages (2000 words) Essay

Web Application Security

On the other hand, it is also important to note that the attack not only causes harm to the website but it also renders the information stored on the website useless.... It may take a long period of time before the attack is managed and hence inconveniencing the website users (Hu, et al, 2010).... How the intruder can exploit it The vulnerability of the website is what exposes it to the attack by the intruder.... It is also possible to display the information on the website differently and hence the attack....
6 Pages (1500 words) Term Paper

9/11 Attacks - Defining Moment in Intelligence History

the attack was an act of war and retaliation by terrorist groups against the United States of America and its close allies.... the attack was an act of war and retaliation by terrorist groups against the United States of America and its close allies.... On September 11, 2001, there was a terrorist attack in the United States of America.... On September 11, 2001, there was a terrorist attack in the United States of America....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us