This week’s reading and notes demonstrate the complexity involved with determining whether or not a terrorist group is likely to obtain and employ a CBRN weapon and where it would most likely be used if it was procured. The prospects for a group such as Al-Qaeda or other non-state actor to obtain and use a CBRN weapon are relatively low both within the United States and abroad, however the threat is not non-existent. As noted by Sinai (2007), there are four major security issues including the terrorist groups themselves, weapon proliferation/acquisition by these groups, safe havens in weak, failed, and/or failing states, and permissive conditions in strong nations (Para 8). If one is to look at conditions in countries such as Yemen and others like it, the failed/failing state lacks any legitimate government which not only creates a power vacuum that unsavory actors seek to fill, but also lacks the capacity to effectively deter terror activities. Compounding the problem with permissive conditions for …show more content…
In one of the classes I teach to our military personnel, threat assessment is one of the topics and in the simplest terms it boils down to three considerations: first, what does the enemy want to do to us? Second, what can the enemy do to us? This is distinctly different from the first consideration as intent and capability are often vastly different. The last factor is where is the action most likely to be taken against us? If we compile these three items into one coherent product, a reasonably accurate threat assessment can be produced. After a threat assessment is done, we should consider the consequences of a successful CBRN attack and train not always for the worst case, but for the most likely scenario that will play out (Mauroni, 2010, p

You May Also Find These Documents Helpful

  • Powerful Essays

    Planning and Threat Assessment I. Universal Protection Agency Universal Protection Agency is a 20 person firm specializing in providing safety and security. Only 8 of the 20 employees will be working on Mr. Smith’s protection plan due to other clientele requiring the services of the other employees. Our staff consists of individuals with various skills and/or talents. Each of our employees have received Masters Degrees in their areas of expertise and have years of experience in providing protection…

    • 1852 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Risk and Threat Assessment

    • 2543 Words
    • 11 Pages

    Risk and Threat Assessment Risk and Threat Assessment There is strengths and weaknesses; threats and vulnerabilities of every organization’s security system. These issues tend to be those of the same at national and global levels; crime and criminology tend to have an impact on it. Denny’s is a worldwide corporation that has franchises that have rented their names to continue to run the establishments as well as acquiring three different corporate level restaurants located in South…

    • 2543 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    gangs like the Cartel are organized and use violence to control territory and make more of illegal money. This would include robbery, drug and weapons trafficking, fraud, extortion, and prostitution rings. What was reported in 2011 National Gang Threat Assessment report, gang are responsible average 48 percent of violent crimes in most…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Anytime you assess threats against the United States, it will become overwhelming, and the first thoughts are to impose a defensive measure. We must first learn how to separate and prioritize each threat. To do this we need to understand the risk assessment formula. 1. What is a standard risk assessment formula? Define the variables in the formula. To understand what a risk assessment formula is, how it is employed and the variables that contribute to its composition we need to understand the concept…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Threat Assessment of Ping Sweeps and Port Scans Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently…

    • 631 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Threats: Friedman described this globalization system as a characteristic of integration. One of the threats seen in Friedman’s writings is of international power of markets, finance, technology, and communications. Who exactly is in control and has the ability to control financial markets, trade, network infrastructure, satellite systems, and more. When you think of this type of threat, Friedman refers to three balances of power globalization is built around… balance of power between states…

    • 621 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Terrorism Threat

    • 3684 Words
    • 15 Pages

    The African continent has suffered from various forms of threats to its peace and stability. These involve environmental degradation, poverty, diseases, hunger, drought and wars. Terrorism however, is emerging as a serious threat to African peace. Salvatore Freni (2010) points out that terrorism has undergone a number of changes and mutations. Salvatore went on to explain that “new” terrorism elements are rooted in globalization and are characterized by structure of terrorist groups which has evolved…

    • 3684 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Stereotype Threat

    • 564 Words
    • 2 Pages

    Supplemental Reading: Stereotype Threat In the article “A Threat in the Air: How Stereotypes Shape Intellectual Identity and Performance,” Claude Steele discusses the empirical methods used to test a psychological theory called stereotype threat. Stereotype threat offers a new method for interpreting “group differences in standardized test scores,” particularly for African-Americans taking standardized verbal tests and for women taking standardized math tests (p. 613). It states that if someone is…

    • 564 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Opportunity and Threat

    • 1180 Words
    • 5 Pages

    India International Environment Analysis Report 1.0 Environmental Analysis 1.1 Trade Agreement India: Malaysia’ largest trading partner Malaysia signed a free trade agreement (FTA) between India for strengthen economic ties purpose and double bilateral trade up to $15billion. This agreement is to complement existing free trade deal between India and Association of South-East-Asian-Nations (ASEAN). Under this agreement, two countries are fully allowing foreign shareholding over 80 sectors including…

    • 1180 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    Topic: Insider Threat Detection and Management ABSTRACT Insider threats are considered as one of the most serious security problems in many studies and have received considerable attention among organizations over the world. This report will present the term “insider” and “insider threats” in cyber security, motives and effects of insider threats, underlying issues and causes of insider threats, prevention and detection of insider threats and management of insider threats within the organizations…

    • 4039 Words
    • 17 Pages
    Best Essays