Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
In the first instance an attack of this nature usually serves a symbolic purpose from the terrorist's point-of-view in that he or she is seen to be attacking the bastion of global Western commerce. Secondly, many business concerns are more vulnerable to attack as they are usually not as heavily secured as military or energy installations. There is also the factor that American financial institutions are invariably identified with the international polices and political stances of the U.S. government, making them a prime target for terrorists and radical groups. (Kirkpatrick, 1983, p. 94)
American multinational Corporations (MNCs) in particular are an increasing focus of terrorist attention. As Harvey (1993) states, "If the trends of the past are any indication of the future strategies of terrorists, United States MNCs will continue to be their primary targets" (Harvey, 1993 p. 465). In this regard studies have found that financial and commercial institutions are extremely sensitive to perceptions and misinformation. Even a token terrorist intrusion or attack on these institutions can have a ripple effect and result in a loss of confidence in the economy of the country.
Terrorists therefore can also attack commercial entities by sowing doubt and false information on the Internet - which illustrates the vulnerability of commerce to terrorist intrusion. Bayles (2001) states that, "...the prices on a stock exchange and the values of the underlying currency fluctuate with confidence in the currency and banking system. This sensitivity makes a financial system an ideal target for attacks to undermine that confidence" (Bayles, 2001, p. 44). Furthermore a loss of confidence can reduce the value of a currency and can result in inflation and unemployment.
Computer systems and cyber attack
Commercial and business concerns are also heavily dependent on computers and the Internet in the contemporary environment. Brenner (2007) defines cyber terrorism as the process of "...using computer technology to engage in terrorist activity" (Brenner, 2007. p 379). Computers have been known to be a very vulnerable target to hackers, and are also extremely vulnerable to attack by terrorists with the aim of disrupting and even destroying normal commercial and intelligence activities. As Bayles (2001) states, "Financial Targets Like military command and control computers, computer networks that run a nation's economy present tempting targets for a well-developed cyber attack" (Bayles, 2001, p. 44).
Many studies of terrorist groups such as al Qaeda show that they have a predilection for using the Internet. As Timothy L. Thomas (2003) states in Al Qaeda and the Internet: The Danger of "Cyberplanning"; "We can say with some certainty, al Qaeda loves the Internet" (Thomas, 2003, p. 112). In other words there is an increase in the use made of the Internet by terrorists to attack vulnerable targets in cyberspace. Something of the importance of cyber terrorism is captured in the following quotation.
Cyber-terrorism has been described as the crime of the future involving the usage of crime and computers. It threatens the safety of millions of people across the globe; especially the vulnerability of military computer networks to casual hackers. Indeed, this form of terrorism could be more devastating than biological or chemical warfare. (Thackrah, 2004, p. 61)
In the light of this view therefore computer systems and networks are an extremely vulnerable and inviting target for the contemporary and technologically savvy terrorist.
Computers are vulnerable in a number of different ways that can be used by the terrorist. Viruses may be introduced into the computer system which can destroy essential data, which in turn can impact the maintenance of infrastructure and other essential factors. Furthermore, cyber-terrorist can remotely access the processing control systems of any business.
Computerised bombs can be placed on an industrial complex especially a chemical or petroleum site.
Banks, international financial transactions and stock exchanges can be targeted resulting in a loss of confidence in the economic system.
Transport control systems can be attacked causing accidents to occur. Gas and electricity supplies can be disrupted. Our day-to-day existence can be disrupted by such terrorists.
(Thackrah, 2004, p. 27)
2.5 Chemical plants
While chemical plants should be categorized under business and industry, they merit special mention as they are one of the most vulnerable and dangerous of terrorist targets. This can be seen by the fact that the Department of Homeland Security has issued warnings of potential attacks on chemical facilities. (Beebe, 2006. p. 239) This has been followed by a statement which underlines the importance and vulnerability of these plants.
A the risk of terrorists attempting in the foreseeable future to cause an industrial chemical release is both real and credible" (Beebe, 2006. p. 239).
There are two main areas of concern with regard to these plants. The first is that there may be a physical attack on the plants. The second is that terrorists may gain access to the chemicals, which can then be used for further and more devastating purposes.
If such an attack took place the consequences could be horrendous. In a 1998 report it was estimated that "....41 million Americans live in "vulnerable zones" or geographic areas that could be seriously affected by the worst possible accident at a chemical production or storage facility..." (Beebe, 2006, p. 239). It is also of concern that many toxic chemicals have a wide ranging effect, which can extend to more than twenty miles beyond the center of the attack.
The assessment and identification of vulnerable terrorist targets within the United States has to take into account the methods and the intention of modern terrorism. The literature on this subject tends to indicate that there has been a shift in contemporary terrorism towards the targeting of more sensitive sectors of a society than would have been the case in the past. This has meant that the identification of vulnerabilities has tended towards "softer" targets, such as schools and public places. Some pundits predict that future terrorist attacks will focus on the "easy" targets that will result in media exposure and publicity for the terrorist cause.
A central aspect of modern terrorism that has to be taken into account is the increased technological sophistication. This aspect has provided the modern terrorist with new capabilities and access to more targets. This in turn has meant that computer and cyber terrorism has become a new frontline in the battle against terrorism. The vulnerabilities that exist in all computer systems and networks can be exploited by the terrorist remotely and can have devastatingly negative impact on a society and its infrastructure.
In the final analysis, the increase in potential "soft targets' means that extreme vigilance and information gathering has to be maintained in order to prevent any such attack. Part of the solution to the problems that terrorism pose is an awareness of the threat and an understanding of the potential targets that may be the focus of any terrorist attack.
Bayles, W.J. (2001). The Ethics of Computer Network Attack. Parameters, 31(1), 44. http://www.questia.com/PM.qst?a=o&d=5000729437
Beard, J.M. (2002). America's New War on Terror: The Case for Self-Defense under International Law. Harvard Journal of Law & Public Policy, 25(2), 559+. http://www.questia.com/PM.qst?a=o&d=5017424066
Beebe, J.L. (2006). Inherently Safer Technology: The Cure for Chemical Plants Which Are Dangerous by Design. Houston Journal of International Law, 28(1), 239+. http://www.questia.com/PM.qst?a=o&d=5021769883
Brenner, S.W. (2007). "At Light Speed": Attribution and Response to Cybercrime/terrorism/warfare. Journal of Criminal Law and Criminology, 97(2), 379+. http://www.questia.com/PM.qst?a=o&d=5001770072
Chalk, P. (2000). Grave New World. Forum for Applied Research and Public Policy, 15(1), 13.
Forest J. (ed) (2006). Homeland security; protecting America's targets. Praeger security international advisory board http://www.questia.com/PM.qst?a=o&d=102561902
Gareau, F.H. (2004). State Terrorism and the United States: From Counterinsurgency to the War on Terrorism / . Atlanta: Clarity Press.
Harvey, M.G. (1993). A Survey of Corporate Programs for Managing Terrorist Threats. Journal of International Business Studies, 24(3), 465+. http://www.questia.com/PM.qst?a=o&d=5009163722
Higgie, D. (2005). Combatting Terrorism: Dell Higgie Surveys the International Counter-Terrorism Scene. New Zealand International Review, 30(1), 2+. http://www.questia.com/PM.qst?a=o&d=5006534142
Kemp, R.L. (2004, May). Homeland Security: Suggestions from the Best Practices in America. Contemporary Review, 284, 257+.
Kirkpatrick E. (Ed.) (1983) Terrorism: a National Issues Seminar the Brookings Institution Advanced Study Seminar. World Affairs, 146(1), 79-113. http://www.questia.com/PM.qst?a=o&d=5007598429
Laqueur, W. (2004). The Terrorism to Come. Policy Review, (126), 49+. http://www.questia.com/PM.qst?a=o&d=5020676459
Leibert, R.A. (2007). The War on Energy: Why the United States and the International Community Need Cohesive Energy Infrastructure Security Policy. Houston Journal of International Law, 29(2), 453+. http://www.questia.com/PM.qst?a=o&d=5000823878
Maier, T.W. (2002, September 9). Schools Vulnerable to Terrorist Attack: Some Security Experts Say U.S. Schools Offer Soft Targets for Terrorists and Warn That Efforts to Improve Safety Are Being Hampered by Denial and by Concern about Image. Insight on the News, 18, 18+. http://www.questia.com/PM.qst?a=o&d=5001240412
Mclean, D. (1999). The United States at a Turning Point. New Zealand International Review, 24(2), 17. http://www.questia.com/PM.qst?a=o&d=5002581172
Morgan, M.J. (2004). The Origins of the New Terrorism. Parameters, 34(1), 29+. http://www.questia.com/PM.qst?a=o&d=5017167946
O'Brien, T. (2006). 9/11 Five Years on: Terence O'Brien Reviews the Impact of the 2001 Attacks on the United States.…[continue]
"Terrorism And Domestic Soft Targets " (2007, September 04) Retrieved October 24, 2016, from http://www.paperdue.com/essay/terrorism-and-domestic-soft-targets-35975
"Terrorism And Domestic Soft Targets " 04 September 2007. Web.24 October. 2016. <http://www.paperdue.com/essay/terrorism-and-domestic-soft-targets-35975>
"Terrorism And Domestic Soft Targets ", 04 September 2007, Accessed.24 October. 2016, http://www.paperdue.com/essay/terrorism-and-domestic-soft-targets-35975
They are assured to acquire attention of the media, provided right ascription of the support of the occurrence. Further, a good protection against these dangers is very hard and costly; it will continue to be as such. A lot of the know-how linked with the buildup of the CBRN weapons-particularly chemical and biological agents possess genuine use in civilians and are categorized as twofold use. The widespread reach of
DOMESTIC VS INTERNATIONAL TERRORISM: WHICH IS THE GREATER THREAT? While many Americans today remember the events of September 11, 2001 when international terrorists flew aircraft into the World Trade Center and the Pentagon and killed thousands, fewer will likely remember the largest domestic terrorism event in the nation's history which took place just a few years earlier when Timothy McVeigh bombed the Alfred P. Murrah Building in Oklahoma City on April
The left wing will considered the beggar to be at par with others on moral grounds, and will therefore demand the access of the beggar towards loans and welfare scheme. The right wing will condemn the free access of the beggar towards economic reforms, and will doubt that if access to these economic provisions will further involve the participation of the beggar into bad social habits. According to left
This is to note that "Trinidad and Tobago alone account for 80% (1st quarter 2004) of all U.S. LNG imports, up from 68% in 2002. Therefore, any incident involving an LNG tanker along the Caribbean routes could harm not only U.S. energy security but also the economies of the Caribbean islands, affecting tourism and other industries." (Kelshell, 1) Such a trajectory has all the markings of an Al-Qaeda styled
The background checks can take months and months, so they're walking around with a card in the meantime & #8230;That's why so many of these airport employees are arrested so long after the fact, and are continuing to be arrested in sweeps by the Justice Department. When the information finally does come back, they see they've got somebody out there that has a felony and lied on his application, or
Policy Efficacy: Terrorist Activity since 9/ Terrorism The terrorist attacks on September 11, 2001 changed the world forever. This one of the most successful and large-scale attacks in the history of transnational terrorism. These attacks sent effects and shockwaves into the everyday lives of Americans and New Yorkers for over a decade. This paper asks how the counterterrorist policies measure up? Are they working? How do we know if they are
By federal law, all passenger airliners now feature cockpit doors that are locked by the pilots from inside the cockpit. Likewise, pilot training now includes the specific instructions not to open the door in response to any occurrence or emergency in the passenger cabin; instead, pilots are under instructions to land the aircraft immediately in response to any perceived emergency that would have previously been cause to investigate beyond