Wednesday, June 5, 2019

High Yield Explosives (CBRNE) Analysis

High Yield Explosives (CBRNE) AnalysisChemical, biological, Radiological, Nuclear, and High Yield Explosives (CBRNE) AnalysisThe terrorist group that has been chosen for this analysis paper is ISIS which is also known as ISIL. ISIS means the Islamic State of Iraq and Syria or Levante and was created in the year 2014. In the previous years, this terrorist group was an affiliate of the Al-Queda terrorist group that was creditworthy for the infamous 9/11 attacks and warcrimes in Iraq and its neighboring nations such as Iran and Syria.The organisation was responsible for driving the Iraqi government military out of key cities in Iraq and has also been responsible for many attacks in Syria making it the most dangerous terrorist group currently. The primary(a) means of attack that is normally used by ISIS is the decimation attack. In this form of attack, the terrorists mark explosives in strategic places and detonate them in order to inflict havoc.This form of attack has been the main f orm of attack being used by this terrorist organization as many suicide submarine sandwichs and mass shooters have been able to use this form of attack in not only Syria and Iraq, but also in the recent Paris attacks which took place in the year 2015. The organization is primarily against inasion by western nations such as the U.S. and the EU and retaliates by targeting the citizens of these nations, making them the primary targets. On the other hand, the citizens who get attacked in their domestoc nations are the secondary targets.This organization likes to publicize its attacks in order to inflict terror. This method is very effective for the organization. withal that, the organization is also very quick to claim responsibility over many terrorist attacks fetching place all over the world, which is a clear trace that ISIS is very effective.Attack ModeEvidenceColor CodeFirearmsThis is one of the major atatck mode that is normally used by ISIS as firearms are relatively easier and cheaper to acquire than explosives.November 13, 2015, separate attacks were launched using assault weapons.Shootings took place in Brussels, leading to the dealth of three individuals on May 24th, 2014 (Lister, Sanchez, Bixler, OKey, Hogenmiller Tawfeeq, 2017).Shootings at Orlando, Florida led to the death of 49 slew and the death of the attacker afterward the attcker shot a crown at a night club known as Pulse.IEDsThree suicide bomber attacked Atatruk International Airport in Instanbul, Turkey, killing 44 people on June, 28, 2016 according to (Lister, Sanchez, Bixler, OKey, Hogenmiller Tawfeeq, 2017).Explosions in Belgium at Brussels airport while a contrastive explosion went off at a subway station leading to the death of 32 people.Paris attacks on Novermber 13, 2015 leading to the death osf 130 people.Biological habituated the item that the organization uses IEDs and firearms as its primary form of attack, this could be a threat if the organization gets access to biolog ical weapons in future.RadiologicalGiven the fact that the organization uses IEDs as its primary form of attack, this could be a threat if the organization gets access to radiological weapons in future.ChemicalGiven the fact that the organization uses IEDs as its primary form of attack, this could be a threat if the organization gets access to chemical weapons.Hostage TakingISIS has been known to use this tactical manoeuvre to intimidate its enemies. Common victims of these attacks are soldiers, journalists and foreigners. The following is a list of such attacks.Shootings at Orlando, Florida led to the death of 49 people and the death of the attacker after the attcker shot a crown at a night club known as Pulse. Although the attacker used a firearm, it was a hostage taking form of attack (Lister, Sanchez, Bixler, OKey, Hogenmiller Tawfeeq, 2017)..On January 9 2015, a lone attacker was killed in Paris after a botched hostage attempt at a grocery shop.Cyber AttacksCoordination of th e Paris attacks was coordinated and facilitated using encrypted communications.References

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.