.

Thursday, April 4, 2019

High Yield Explosives (CBRNE) Analysis

High Yield Explosives (CBRNE) analytic thinkingChemical, Biological, Radiological, Nuclear, and High Yield Explosives (CBRNE) AnalysisThe terrorist group that has been chosen for this analysis paper is ISIS which is also known as ISIL. ISIS means the Islamic State of Iraq and Syria or Levante and was created in the class 2014. In the previous years, this terrorist group was an tie in of the Al-Queda terrorist group that was responsible for the infamous 9/11 attacks and warcrimes in Iraq and its neighboring nations such as Iran and Syria.The system was responsible for driving the Iraqi government military out of key cities in Iraq and has also been responsible for many attacks in Syria making it the most dangerous terrorist group currently. The base means of attack that is commonly used by ISIS is the decimation attack. In this form of attack, the terrorists plant explosives in strategic airs and detonate them in social confederation to inflict havoc.This form of attack has been the main form of attack being used by this terrorist nerve as many suicide bombers and mass shooters have been able to use this form of attack in not only Syria and Iraq, but also in the recent genus Paris attacks which took place in the year 2015. The organization is primarily against inasion by western nations such as the U.S. and the EU and retaliates by targeting the citizens of these nations, making them the primary quill targets. On the other hand, the citizens who get attacked in their domestoc nations are the secondary targets.This organization likes to publicize its attacks in pose to inflict terror. This method is very effective for the organization. Besides that, the organization is also very quick to occupy responsibility over many terrorist attacks winning place all over the world, which is a clear recitation that ISIS is very effective.Attack ModeEvidenceColor CodeFirearmsThis is one of the major atatck mode that is unremarkably used by ISIS as firearms are relatively easier and cheaper to acquire than explosives.November 13, 2015, separate attacks were launched victimisation assault weapons.Shootings took place in Brussels, leading to the dealth of three individuals on May 24th, 2014 (Lister, Sanchez, Bixler, OKey, Hogenmiller Tawfeeq, 2017).Shootings at Orlando, Florida led to the wipeout of 49 flock and the death of the attacker after the attcker shot a crown at a night club known as Pulse.IEDsThree suicide bomber attacked Atatruk International Airport in Instanbul, Turkey, killing 44 people on June, 28, 2016 according to (Lister, Sanchez, Bixler, OKey, Hogenmiller Tawfeeq, 2017).Explosions in Belgium at Brussels airport while a various explosion went off at a subway station leading to the death of 32 people.Paris attacks on Novermber 13, 2015 leading to the death osf 130 people.Biological given over the fact that the organization uses IEDs and firearms as its primary form of attack, this could be a threat if the organization gets rag to biological weapons in future.RadiologicalGiven the fact that the organization uses IEDs as its primary form of attack, this could be a threat if the organization gets access to radiological weapons in future.ChemicalGiven the fact that the organization uses IEDs as its primary form of attack, this could be a threat if the organization gets access to chemical weapons.Hostage TakingISIS has been known to use this tactical manoeuvre to intimidate its enemies. Common victims of these attacks are soldiers, journalists and foreigners. The following is a list of such attacks.Shootings at Orlando, Florida led to the death of 49 people and the death of the attacker after the attcker shot a crown at a night club known as Pulse. Although the attacker used a firearm, it was a hostage taking form of attack (Lister, Sanchez, Bixler, OKey, Hogenmiller Tawfeeq, 2017)..On January 9 2015, a lone attacker was killed in Paris after a botched hostage attempt at a grocery shop.Cyber Attac ksCoordination of the Paris attacks was coordinated and facilitated using encrypted communications.References

No comments:

Post a Comment