StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The ICS System on the World Trade Center Attacks - Essay Example

Cite this document
Summary
This research is being carried out to evaluate and present performance of the Incident Command System and the Emergency Operations Center during the crucial first few moments of the twin attacks on the World Trade Center back on September 11, 2001…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
The ICS System on the World Trade Center Attacks
Read Text Preview

Extract of sample "The ICS System on the World Trade Center Attacks"

Download file to see previous pages

This research tells that bravery in the face of unseen dangers is usually fatal and this was what happened to the firefighters who immediately went inside the burning towers in order to do their sworn duties although they can hardly be blamed for doing so. With the benefits of a 202/20 vision from hindsight, the ICS and the EOC failed in their task to manage the disaster by not ascertaining the dangers presented to the emergency rescue personnel with first responders sacrificing their lives due to these mistakes committed by their own commanders.

The terrorist attack on the twin towers of the World Trade Center was truly a remarkable event for two reasons: for its audacity and for its uniqueness. It was audacious in the sense that a small group of extremely dedicated terrorists were very much willing to die for their actions and it was unique because no one in their wildest imagination had thought of crashing an airliner into those two tall towers on purpose. Osama bin Laden and his chief lieutenant who had suggested the idea first had gotten the concept of slamming passenger airplanes full of highly-combustible jet fuel into these symbols of American power and capitalism from the Japanese kamikaze pilots of World War II as an act of desperation.

It is also difficult to control the airplanes once terrorists on board had taken over command of the plane from their pilots and with civilians on-board, the task of intercepting these airplanes was equally very problematic already indeed. The planes can only be stopped with a quick decision to sacrifice the people on-board in a very short time frame.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The ICS System on the World Trade Center Attacks Essay”, n.d.)
Retrieved from https://studentshare.org/sociology/1424198-right-and-wrong-decisions-made-in-regards-to-the
(The ICS System on the World Trade Center Attacks Essay)
https://studentshare.org/sociology/1424198-right-and-wrong-decisions-made-in-regards-to-the.
“The ICS System on the World Trade Center Attacks Essay”, n.d. https://studentshare.org/sociology/1424198-right-and-wrong-decisions-made-in-regards-to-the.
  • Cited: 0 times

CHECK THESE SAMPLES OF The ICS System on the World Trade Center Attacks

Components of Cyber-Terrorism

Today, almost every organization in the world has expanded its domain into the realm of cyberspace.... Following are some of the reasons for the recent growth in cybercrime and cyber attacks- All terrorist organizations on the web are now using it as a means to broadcast their philosophies and messages across the world, and thereby misguiding and misinforming people from many nations.... It encompasses all unlawful threats and attacks against electronic equipment and data with the objective to intimidate a nation's population or its government… The major components which together constitute a nation's infrastructure are the sectors of food, agriculture, telecommunications, public utilities, banking and finance, defense, emergency services, transportation, trade, and postal services....
8 Pages (2000 words) Essay

MHE503 Survey of Emergency and Disaster Mgt Module 5 SLP

Lately, during the world trade center attacks by Al Qaeda terrorists on September 11, 2001, more than 30,000 people perished as the whole world watched in abject horror via their televisions (Craighead,2009,p.... This paper deals with an overview of ICS, describes its key features, provides specific methods of implementation of ICS in the scenario of Philippine emergency responses to typhoon disasters and describes the objectives that the ics would thresh out as part of its incident action plan in that scenario. … Disasters emanating from both force majeure and from man-made destruction and devastation had been with us since time immemorial so much so that they have been considered part of humanity's destiny....
3 Pages (750 words) Essay

Immigration and Customs Enforcement

The US Department of Homeland Security bears this responsibility and more, thus within the organization are branches to where specific missions are… The Immigration and Customs Enforcement (ICE) is best known for its presence in domestic and international airports, vigilant of possible threats to peace and order, and suspicious acts of terrorism....
12 Pages (3000 words) Research Paper

Digital Terrorism Risk Currently Facing Australia

his paper will put light on the term 'cyberterrorism' and compare its risks to those of other forms of terrorisms such as bomb attacks, suicide attacks, street crime, and many others.... This research "Digital Terrorism Risk Currently Facing Australia" will describe how does the risk of cyberterrorism compare to other forms of terrorism in terms of potential damage....
10 Pages (2500 words) Research Paper

Preparedness Homeland Security

The paper "Preparedness Homeland Security" describes that the need for a National Incident Management System ( NIMS ) became even more apparent after the September 11 attacks on the twin towers of world trade centr and other targets of strategic importance ( W.... The flexibility in the NIMS framework comes from the adjustable and very flexible national framework within which government agencies at the federal level and state level can work together to manage calamities and terrorist attacks....
7 Pages (1750 words) Assignment

Targets for Cyberterrorism

the world was changed instantaneously, moving at a pace where there is little room for reflection.... Such force has been integrated by powerful factions around the world for increased competitiveness across industries.... Hence, the term cyberterrorism has been born, and has become an instant sensation, a new thread that is becoming a major concern not only for developed countries but also for the rest of the world.... It pertains to premeditated, politically motivated assaults carried out by subnational groups or clandestine agents which in turn intend to cause chaos and conflict by carrying out a series of attacks to institutions, computer programs, computer systems, and data....
42 Pages (10500 words) Research Paper

Hacking in the US

This paper, Hacking in the US, stresses that the advancement in the technology and its widespread use has caused certain serious problems to many countries of the world, especially to technically advanced countries such as the United States.... It uses the vast network of TCP/ IP protocols and packet switching spread throughout the world for communication.... nbsp;… This discussion outlines this cyber attacks through electronic devices have threatened the many political parties and have emerged as a headache for them....
14 Pages (3500 words) Research Paper

1995 Oklahoma City Bombing

169 people lost their lives in the attack, nineteen of whom were children attending the Murrah Building day care center.... This research will begin with the statement that the nineteenth of April, 1995 would certainly remain indelible in the minds of Americans, more so those from Oklahoma, following the deadly terrorists' attack that occurred in their city....
4 Pages (1000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us