StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Terrorists Use of Nuclear Bombs - Essay Example

Cite this document
Summary
This paper will examine the possibility of terrorists using nuclear weapons and measures that countries can initiate to deter this menace from happening. Terrorist activities can take place mostly on the surface where terrorists use heavy trucks in fulfilling their mission and underwater through the use of boats…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Terrorists Use of Nuclear Bombs
Read Text Preview

Extract of sample "Terrorists Use of Nuclear Bombs"

Terrorists Use of Nuclear Bombs Introduction In carrying out their criminal activities, terrorists use various weapons that pose a significant threat to the security of the international community. These weapons include biological, chemical and nuclear, commonly referred to weapons of mass destruction especially those made out of nuclear materials. Terrorist activities can take place mostly on the surface where terrorists use heavy trucks in fulfilling their mission and underwater through use of boats. It is less likely for terrorist activities to take place in the air and subways. In case they occur, they use private planes and jets in hitting their targets. Terrorist activities are least likely to take place in high altitude areas since in most cases; these are areas that are always heavily militarized. Nuclear weapons are known to be the most dangerous of all weapons manufactured and utilized for military purposes (O’Neil, 2003). Terrorists are known to be using various weapons ranging from chemical to biological in carrying out their activities. Though they have not been using nuclear weapons, there has been a major concern over the use of nuclear tactic by terrorists in carrying out their activities. This paper will examine the possibility of terrorists using nuclear weapons and measures that countries can initiate to deter this menace from happening. Currently, countries cannot afford to ignore the rise of a new type of terrorism operating cross different countries and boundaries. These terrorist activities have their main aim as inflicting mass casualties and destruction. This move was illustrated by bombing of America’s pentagon House that took place on 11th September, 2001. Many people died, others sustained serious injuries and properties worth billions of dollars were destroyed. This is a clear indication that terrorist attacks using extremely dangerous weapons will remain a realistic prospect now and even in the future (O’Neil, 2003). The prospect of terror groups acquiring nuclear weapons has haunted the world at large for quite a long time now. Nuclear weapons could be made to yield a magnitude and effect of many kilotons and those weapons can be made small enough to increase their portability. There are various ways through which terrorist organizations can acquire nuclear weapons. They are the most powerful of all weapons used by terrorists in terms of their destruction. How easy are nuclear weapons to acquire? This is one question that one should have in mind. Nuclear weapons are attractive to terrorists due to their effects of fusion and fission that take quite a long time to subsidize. With emergence of internet that is available to most people, terrorism has had an upsurge. Terrorists can access nuclear weapons through building them up. Knowledge to build these weapons can be accessed from the internet. For instance there was documentation on Russia’s nuclear system in 1990s (Levi, 2008). The document explained how materials used for the manufacture of nuclear weapons had leaked to the black market, hence increasing Russia’s vulnerability to nuclear attacks. However, nuclear weapons are quite difficult to acquire compared to biological and chemical weapons. The difficulty to acquire nuclear weapons is attributed to the fact that the core ingredient-grade fissile mainly made up of plutonium and uranium are scarce and quite expensive to produce in quantities enough to manufacture nuclear devices. In addition since 1980, stringent measures have been put in place for those countries that are able to produce and sell nuclear materials. Although terrorist organization can have access to nuclear materials, they may lack a secure storage place for their devices and also experience challenges in establishing effective delivery. They live in risk of being discovered while transporting their nuclear weapons to areas of target. Difficulties in acquiring nuclear weapons have pushed terrorist groups into using other optional weapons such as radiological weapons since their materials are readily available. Radiological weapons are explosives made out of radioactive materials and have ability of causing destruction over a large area. Radioactive materials are readily available as they are used in the manufacture medical imaging equipment (Levi, 2008). Other weapons such as biological and chemical can also be used in place of nuclear weapons since their manufacturing components are readily available. These components can be found in chemical and biotechnological industries in most countries. Moreover, there are no stringent measures on both individuals and states in acquiring materials to manufacture chemical and biological agents. Given difficulties associated with manufacturing and sale of nuclear weapons, terrorist organizations can resort to stealing those devices from states and countries such as Russia. Terrorists can opt to stealing complete or partial devices since there does not exist a sophisticated detection system for tracking all categories of destructive weapons. However, this is not to mean that all destructive attacks can only originate from terrorist organizations. For instance, in 2001, there was anthrax attack in the US. It was established that the material originated from the US defense forces (Cirincione, Wolfsthal & Rajkumar 2002, 181-184). Nuclear weapons can also be supplied to terrorists by countries and states sympathetic to motives and missions of terrorist organizations. This move was evident when President Bush of the USA linked international terrorist organizations to countries such as Iraq, Iran and North Korea among others (The Economist, 2002). Given the prevalence of possibility of terrorists using nuclear weapons, stringent measures should be put in place to combat terrorist activities. This was a step that was taken by the United Nations in its meeting held on 31st October, 2001. The organization noted the urgent need to seize the use of nuclear weapons and other weapons of mass destruction. The organization urged all countries around the globe to control and overcome the use of these weapons. The organization introduced a revised draft of resolutions that was sponsored by the Russian Federation. The federation would deal with putting in place security of information to be dispatched in the internet. There was need to prevent illegal use of information technologies and resources (The UN Information Service). The illegal use comprised of using information available for criminal and terror purposes. The organization also urged the member states to come up with policies that would ensure inter- country transfer of products and technologies for military purposes. This resolution was to deal with application of science and technological development for military purposes. This was to be discussed because it emerged that some terror activities can emerge from security defense forces such as the anthrax attack that happened in USA. There is need to note that any successful nuclear attack can be fatal and this has led to search for significant measures to be put in place by various countries and states. The US can fight and destroy all terrorist organizations that have intentions of using nuclear weapons. Come of these terror groups include Al Qaeda and Aum Shinrikyo among other religion based organizations (O’Neil, 2003). The US can also seal its borders and lock up all the existing nuclear weapons and materials. This can be done through putting up tight inspection at all states borders. For instance, it can install sophisticated systems within the borders to detect weapons of all sorts that might be sneaked in and out of the country. Other measures include controlling nuclear technology, materials and manipulating the black market where nuclear manufacturing materials are sold. However, these measures may not always work since terrorists will always devise counter actions (Levi, 2008). The search for perfect strategies to counter terrorism may end up into frustration. Rather, specialists should utilize available tools and strategies to counter activities from terrorist organizations. For instance, to stop a nuclear attack, defense agents need to establish where these nuclear bombs are set, move to those areas and unlock them. There is also need to build an integrated system of defense that draws attention on security of borders and intelligence operations. For defense forces to come up with suitable response efforts to emergencies, defense personnel needs to develop a realistic image of terrorism from nuclear weapons and draw a clear understanding of how terrorist organizations work (Levi, 2008). Conclusion Nuclear terrorism can be fatal if executed successfully. The aim of terror groups is usually to cause massive destruction as possible. Holding to this fact, they cannot hesitate using nuclear weapons as they are the most dangerous of all weapons. Terror organizations can acquire these weapons through buying or even make them. They can also acquire them through stealing either parts are complete weapons from those states that have nuclear weapons and materials in their possession. However, there are some constraints that have led to terror groups not using nuclear weapons. The major constraint is unavailability of fissile material in quantities large enough to manufacture nuclear explosives. References Cirincione, J., J. Wolfsthal, and M. Rajkumar, (2002). Deadly Arsenals: Tracking Weapons of Mass Destruction (Washington DC: Carnegie Endowment for International Peace). Levi, M. (2008). Stopping Nuclear Terrorism. N.d. 24th November, 2012. http://www.foreignaffairs.com/articles/63055/michael-levi/stopping-nuclear-terrorism O’Neil, A. (2003). Terrorist use of weapons of mass destruction: how serious is the threat? Australian Journal of International Affairs, 57(1). Australia: Carfax Publishing. The Economist, (2002). ‘George Bush and the Axis of Evil’, 2 February: 13–14. The UN Information Service. Terrorist Use of Nuclear Weapons, Biological Weapons Convention Review among Issues Addressed by 14 Texts Introduced in First Committee. 31st October, 2001. 24th November, 2012. http://www.unis.unvienna.org/unis/pressrels/2001/gadis3212.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Terrorists Use of Nuclear Bombs Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Terrorists Use of Nuclear Bombs Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/social-science/1609416-terrorist-use-of-nuclear-weapons
(Terrorists Use of Nuclear Bombs Essay Example | Topics and Well Written Essays - 1250 Words)
Terrorists Use of Nuclear Bombs Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/social-science/1609416-terrorist-use-of-nuclear-weapons.
“Terrorists Use of Nuclear Bombs Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/social-science/1609416-terrorist-use-of-nuclear-weapons.
  • Cited: 0 times

CHECK THESE SAMPLES OF Terrorists Use of Nuclear Bombs

How Should the Challenges Posed by International Terrorism Best be Met in the Course of the Next Decade

This is done through the use of weapons of mass destruction.... These include bombs, grenades, chemical weapons such as lethal gases, biological weapons among others.... HOW THE CHALLENGES POSED BY INTERNATIONAL TERRORISM CAN BEST BE MET IN THE COURSE OF THE NEXT DECADE Name: Institution: Course: Date: Introduction Terrorism is the sum of all unlawful activities which are carried out with the aim of destroying masses of people and property so as to settle scores with an enemy country....
9 Pages (2250 words) Essay

International Terrorism (FALN)

In March of 1980, FALN terrorists seized the Dominican Republic's embassy in Bogot Columbia and issued a statement threatening to attack nuclear power plants within the US (Sater, 1981, p.... In the paper “International Terrorism” the author analyzes highly organized group that has advocated independence – the Puerto Rican Armed Forces of National Liberation....
8 Pages (2000 words) Essay

The Terrorist Among Us

In most cases, most terrorists use letter bombs as a way for them to spread fear and gain some form of publicity.... The letter bombs always targets individuals Additionally, the bomb mails are usually marked as private.... There are various indicators, which may act as a red flag to mail bombs.... Some of the common aspects, which may indicate mail bombs, include excessive weight, attributed to the parcel of package, excessive postage, excessive postage material, unusual odors on the package and excessive securing the material such as tape....
2 Pages (500 words) Research Paper

Security and terrorism

It is difficult for terrorist groups to make nuclear bombs because such weapons require laboratories with sophisticated equipment.... Such actions could ignite widespread panic because of insufficient vaccines or treatments capable of How Ebola threatens international security al affiliation How Ebola threatens international security When one thinks of terrorism, events involving the use of conventional weapons often come to mind.... For the case of West Africa, the WHO authorized the use of untested drugs to treat patients because the virus had spread uncontrollably (BBC, 2014)....
2 Pages (500 words) Admission/Application Essay

Chemical Biological Radiological Nuclear Weapons

The thesis statement for this paper is that ‘there is a continuous threat of the use of nuclear weapons by Al-Qaeda (non-state actor) and Iran (state actor) against the forces of the United States; hence, a well-planned strategy should be followed to mitigate the potential threat'.... Pakistan is also one of those states that have not signed the Non-Proliferation Treaty (NPT) that ensures the peaceful use of nuclear energy.... nuclear bombs have been the most deadly weapon of mass destruction since their development....
10 Pages (2500 words) Essay

Vulnerability of North Anna Nuclear Generating Station in Virginia

In the paper “Vulnerability of North Anna Nuclear Generating Station in Virginia” the author analyzes the susceptibility of nuclear plants to terrorism.... owever the Iran nuclear program that makes use of embargoed Siemens apparatus secretly procured had been infected by Stuxnet.... He states that the vulnerabilities of US nuclear plants are known to American officials and there is sufficient time for preventive action to be taken.... hellip; This report seeks to assess the vulnerability of the North Anna nuclear Generating Station in Virginia and identify the various threats it faces, calculated risk and existing countermeasures....
6 Pages (1500 words) Essay

Airport Bomb Detection Technologies

hellip; Planting of bombs in airports is an easy task for terrorists even though many sophisticated bomb detection technologies are currently in place in many airports.... The advanced airport bomb detection technologies are currently in place which succeeded up to a certain extent in preventing the terrorists from entering the airports with bombs.... Same way X-rays can be used in detecting bombs in airports as bombs are usually made of hard metallic objects....
5 Pages (1250 words) Essay

Ways in Which Censorship is applied by the United States Government

This paper ''Ways in Which Censorship is applied by the United States Government'' tells that There have been security lapses and information compromise in the U.... .... in the recent past.... They have given the terror groups like ISIS and Al-Qaeda an advantage over the United States military and other state security agencies like CIA and FBI....
8 Pages (2000 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us