Countermeasures and neutralization literature
Remember: This is just a sample from a fellow student. Your time is important. Let us write you an essay from scratch
Excerpt via ‘Literature Review’ chapter:
Countermeasures and Neutralization
In past ten years, the accessibility to information and capabilities has increased; thus, the technology of weapons of mass damage (WMD) has grown drastically. The defence division of many countries need to take activities in order to stop the chances of any attack (Graham, 2004).
During Cold conflict, the usage of indivisible weapons trigger massive devastation that was faced by the innocent people today belonging to the countries, that is why weapons of mass destruction are accepted as great risks. For the security of the persons and the environment, the massive growth of destructive weaponry should be stunted otherwise rapidly the individuals would get the opportunity to harm the entire nation. This kind of destructive power reside with nation says, which are politically, economically, industrially and socially very strong (Graham, 2004).
Terrorists on the other hand have got few possessions but they are generally ready to give away everything to get the success of their goals. These people as well do wonderful damage. Even the deterrence steps with respect to terrorists are also obscure till now. In order to handle with this matter, a full range of capable resources should be brought about, this will include preventing, interdicting, mitigating and recovering measures. This study as well focuses on this full variety (Ishmael, 2010).
Whether it is elemental, chemical, biological or radiological, the discussion regarding WMD can be taking place in single technique. The ongoing dialogues and actions that are occurring with regards to WMD are straining on limited aspects of one modality. This approach is known as segmented strategy, and such a way forbids responses from staying generated type an integrated program (Ishmael, 2010).
At last, a brand new approach with regards to WMD was adopted by Defence Technology Board. This approach manages the problems side by side and aspires in maintaining an equilibrium in between the allocation of resources and the requirements. The strategy that may be adopted at this time study is as follows (Ishmael, 2010):
1 . Take create step to stop the wrong people from acquiring the damaging weapons.
2 . The urgency of efforts ought to be increased to reduce the after effects of the problems and even recovery phase ought to be speedy.
a few. The perpetrators and their fellows should be identified and appropriate planning should be done to give an answer to the disorders.
However , eventually it was concluded by the research workers that one single approach can be not the answer of this difficulty. All the work do add but with constraints along with them. A few actions happen to be recommended by the researchers in six place to place in order to bring the countries in better positions. The advised actions happen to be as follows (Ishmael, 2010):
Bringing intelligence improvement
Weapon buy denial
Generate retaliation plans
Recovery capacities and mitigation measures by national level to be superior
Develop response plans to get catastrophes and establish DOD pilot courses
For management of the enterprise readiness metrics should be brought into use (Ishmael, 2010).
Improve Intelligence
Cleverness improvement is essential for introducing reduction in the vulnerability of WMD. This really is such a large challenge that one country or perhaps one firm alone are unable to deal with that. But still, DOD can assist in creating an integrated WMD intelligence community which in turn would completely focus on bettering strategic knowledge. This could be attained by bringing in ground breaking collections, undertaking refreshed analysis and by keeping in a conflict room like mentality so the problems could be tackled quickly (Jonathan, 2007).
A number of researchers believe that the recommendations from the 9/11 and WMD Commissions in the subsequent areas must be implemented by Under Secretary of Security and the Movie director of Nationwide Intelligence (Jonathan, 2007):
All financial ventures and transport means and nodes of key people and entities with WMD expertise who may have links with revolutionary groups and nations must be monitored, the two within and across the countrywide frontier.
Along with seeking technical enhancements and upgraded connection and info processing components, measures needs to be adopted pertaining to increasing fielding of profound penetration brains programs.
Advice from the prior Defense Technology Board regarding reliable money for the upgrading of surveillance services such as marking, tracking and locating functions should be integrated.
Collection of details is completed by analysts and users of intelligence and assisted by simply expert goal development.
Federated databases relating information throughout both home and overseas intelligence organizations regarding key individuals and their activities must be established.
A comprehension of the targets, motives and values of potential adversaries who might use WMD should be created through creating broadly-based regular mechanisms and relationships.
A mission supervisor who works with and co-ordinates domestic law enforcement with the cleverness community’s efforts in regard to terrorists pursuing WMD should be designated (Jonathan, 2007).
Deny Tool Acquisition
In order to avoid an attack is the most important duty of each nation. The international community should seek to implement broad measures that will make the adversary’s job difficult and imposible, as the well being of nations rely upon it. The cases of WMD, nuclear as well as biological are used simply by terrorist in the proliferators of nation. Therefore , to receive good results stocks of weaponry must be decreased and should end up being highly properly secured (Michael, 2007).
There are different forms of WMD like neurological, chemical and radiological nevertheless the terrorist are mostly involved in the fermage of weapons’ materials around the globe. However , this exploitation is easy in the created countries mainly because they already possess very advanced medical infrastructure which is easily available (Michael, 2007).
The task force suggests that the U. S. authorities
In order to improve and encourage non-proliferation, usa efforts are of making the treaties like Nunn-Lugar, Expansion Security Pursuits. These work should be broadened in other countries to advertise expertise and biological guns.
Easy convenience of these WMD materials exclusively chemical and radiological guns should be restricted. Thus, protection must be built stronger around the weapons facilities. These sites has to be made faraway from the household areas and human population and should use less toxic chemicals and other materials since substitutes (Michael, 2007).
Develop Credible Retaliation Policies
In the legislatures of developed countries, strict laws and regulations are present to punish those people who use these types of WMD resistant to the counties’ curiosity within or perhaps outside the termes conseillés. Researchers also highly recommend these kinds of security guidelines (Charles, 2004; DSB, 2007).
A highly technological system continues to be made in produced countries with the coordination of intelligence section and technical forensics help to make these procedures followed properly. Continuous attempts should be built to enhance the technological accuracy and speed from this context (Charles, 2004; DSB, 2007).
To help make the policies of preventions far better options must be taken to develop responses. These kinds of response activities include all of the military, monetary and diplomatic measures used by the government just before any predicted attack (Matthew and Harrell, 2012).
The effective way to prevent the disasters is always to take enough comprehensive actions before the assault rather than relying on the interim responses through the chaos (Matthew and Harrell, 2012).
According to research workers, in order to manage the foreign or internal episodes following measures must be taken prior to the worst situations (Matthew and Harrell, 2012):
Make clear and successful retaliation policies on standard basis.
To further improve the don, forensic features must be increased.
In order to stop and punish the assailants along with their followers and adjoint well prepared retaliation choices must be implemented on goal basis (Matthew and Harrell, 2012).
An advanced WMD retaliation procedure should be made to boost the military choices on national level through the use of all condition powers. This advance planning should include video gaming exercises, ruse, red teaming and also advertise the retaliation process (Matthew and Harrell, 2012).
Increase National Minimization and Recovery Capabilities
The national obligations also include recovery and minimization which involves regional, federal and state companies. However , various effective procedures have been used by the countries but still they can be not very highly prepared to get over the WMD attacks. This is observed as a result of uncertain syndication of obligations among national, local and regional firms, lack of urgency demands understanding, weak intending to deal with physical as well as internal impacts of such attacks (John, 2008).
A complete and inclusive strategy is needed for controlling the weaknesses of region to the WMD, which varies from the avoidance and cleverness to the recovery, response and mitigation. An obvious method should be adopted to minimise the difficulties face inside the harmonization among various tiers of required government and sector. Furthermore, with a larger collaboration and cooperation is required to involve non-public sector along with the recognition of public understanding and support as important part (John, 2008).
The researcher’s advice regarding nationwide recovery and mitigation will be as beneath (John, 2008):
Highest benefit mitigation and recovery efforts should be centered, whereas other important factors are:
– Interaction, exercise, control, command, and executable preparing (C3), and also a complete inter-operable information and communication program (John, 2008).
– A rise in the training