Verified Document

Vulnerability Assessment The Terrorist Incident In New Research Paper

Vulnerability Assessment The terrorist incident in New York on September 11, 2001 woke many individuals and organizations to the realities of vulnerabilities within the airline industry. The particular problems seemed to be that crucial training for individuals who wished to work as commercial airline pilots had very little monitoring. Of course, security on flights was the most critical oversight as people within the industry believed that inflight incidents would not happen. Other transportation industries also realized the immediacy of the need for change, and have been implementing new protocols also. It may seem that the most vulnerable are those that travel in international waters or skies, but dangers exist within the United States because of a reliance on rail transportation of people and goods also. The United States could face significant problems if a major rail transportation system was interrupted due to terrorist infiltration. The research into this system proves that there remain major vulnerabilities in the U.S. rail system that could...

In Washington, D.C., the metro is used by approximately 800,000 people every day (Post, 2007). According to research all of the trips that occur throughout the system are controlled through a single master command structure (Brainard & Derrick-Mills, 2011). This system is well guarded and there are multiple fail-safes within the system, but a large detonation could be used to cause significant damage to the system. Another singular feature of the rail system is that it connects, and operates below, some of the seminal structures of United States government. Stops are located close to the Pentagon, Capitol Building and the White House. It would be possible for organizations to use these stops to cause a great deal of damage to seats of American government.
Many terrorist organizations in the world would be interested in gaining access to the Metro rail system in order to disrupt the…

Sources used in this document:
References

Brainard, l. A., & Derrick-Mills, T. (2011). Electronic commons, community policing, and communication: Online police-citizenship discussion groups in Washington, DC. Administrative Theory & Praxis, 33(3), 22-34.

Post, B. (2007). The great society subway: A History of the Washington, DC Metro. The Journal of Transport History, 28(2).
Cite this Document:
Copy Bibliography Citation

Related Documents

New Orleans Is a City
Words: 4990 Length: 16 Document Type: Research Proposal

" The U.S. Army Corps of Engineers is currently at work in the city on a project to increase the height of the levees and construct floodgates, at a cost of over $12 billion. This work will be able to protect from a "100-year" storm as they are called -- dangerous but not severe -- with a 1-in-100 chance of hitting in any given year. It is estimated it will take

Seaports Vulnerability to Submersible Vessels
Words: 3918 Length: 12 Document Type: Research Paper

Seaports Vulnerability to Submersible Vessels Criminology All countries of the world are struggling hard to provide peace to its residents and masses. After all the efforts and struggle, countries are still not completely safe from the dangerous attacks on the borders including dry ports and seaports. In America, it is a severe issue to understand how to secure and protect the seaports of the country. The topic of discussion is also related

Risk Assessment and Analysis
Words: 4889 Length: 15 Document Type: Term Paper

Risk Analysis and the Security Survey The following risk analysis and security survey report will be centered on the hospital as an organization. Vulnerabilities can be classified as crime opportunities, opportunities for breaking rules and regulations, opportunities for profiting and also for loss. By definition, vulnerability can be a gap or a weakness inside a security program that might be exploited by opponents to acquire unlawful access. Vulnerabilities include procedural, human,

Risk Assessment for Homeland Security Programs
Words: 1485 Length: 5 Document Type: Essay

Homeland Security Risk Management Risk Management in Homeland Security This paper provides a brief examination of the role of risk management within the homeland security operations. The discussion first addresses issues related to risk assessment, which is a necessary, prudent step for publicly funded activities, and particularly so given the national scope and the potential consumption of resources. The Strategic National Risk Assessment (SNRA) serves as a vehicle to link policy --

Narcoterrorism and the Future
Words: 18088 Length: 70 Document Type: Capstone Project

Mexico faces an array of drug-related problems ranging from production and transshipment of illicit drugs to corruption, violence, and increased internal drug abuse. Powerful and well-organized Mexican organizations control drug production and trafficking in and through Mexico, as well as the laundering of drug proceeds. These organizations also have made a concerted effort to corrupt and intimidate Mexican law enforcement and public officials. In addition, the geographic proximity of

Israel's Decision-Making Strategies
Words: 4127 Length: 10 Document Type: Research Paper

Decision Making Strategies Within any organization or process, there is the cognitive and purposeful role of decision making that is the result of taking in stimuli, choosing from alternatives, and making a final choice of an action, in action, or choice of action. This is true in the small business world, multinational corporations, individual life, and even with governments. It impacts Foreign Policy, trade, economics, and most certainly the idea of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now