Asymmetric Threats Essay

1823 words - 7 pages

Currently there are several definitions of asymmetric threats listed throughout the internet as well as other literature. The definition that best sums up the meaning in my view is leveraging unconventional tactics against a superior opponent with the goal of disrupting the willingness to achieve the operational objectives. The most common and current example of this would be the insurgency tactics used in Iraq and Afghanistan. The United States must not assume those tactics and strategies will only be used abroad. The same asymmetric threats our country’s security initiative is facing are the same challenges are seaports are facing. Some examples of the potential asymmetric threats the United States seaport faces are nuclear weapons, chemical weapons, biological weapons, and terrorism.
Nuclear Weapons are one the key components for countries/states to be considered as a world superpower. Just the possession of a nuclear weapon guarantees a country a position of negations with other world powers. Countries like the United States and United Kingdom have an invested interest on who has those capabilities to avoid such negotiations. The ever going crisis with North Korea is a perfect example of the United States diligence to avoid an unaccountability of nuclear weapons potential threat. The employment of a nuclear weapons on a seaport would greatly slow or deter the deployment process for operating military functions. The injuries, casualties and infrastructure damage would be significant, therefore any successful attempt would cripple any military or commercial cargo operation.
In comparison to nuclear weapons, chemical weapons are less damaging, but are easier to acquire. Both threats could be delivered in a container and once in the vicinity of a seaport easily detonated. The overall effect of a chemical weapon is to slow the progress and operations at a seaport due to chemical garments being required to operate in that environment. The impact of a chemical environment would also lessen the dominance of a United States military operation. The United States military is commonly known to operate both deployment and re-deployment operations at specific ports of embarkation and debarkation; making targeting for a chemical attack fairly simple.
Like chemical weapons, biological weapons are easy to obtain, but the area covered by such an attack is fairly small and limited. The most effective area to use a chemical weapon on a seaport would be the operation center of that port due to the limited damage it will cause to the infrastructure. The psychological effect of VX or Sarin would devastate any port operation and to trace the origin of the agents would prove to be very difficult.
The most common vulnerabilities to seaports exist due to the geographical location and the amount of activity surrounding most seaports. Highways, railways, and joining waterways create many security issues and make larger seaports terrorist strategic...

Find Another Essay On Asymmetric Threats

An Asymmetric Annihilation of American Warfare

1112 words - 4 pages the U.S. Headon force-on-force. It is more likely challengers of American policies or presence will resort to indirect or asymmetric means. America’s adversaries know small wars are the only kind it has ever lost. This form of warfare also defeated the French in Vietnam and Algeria and the Soviet Union in Afghanistan. It continues to exhaust Russia in Chechnya and the U.S. in Iraq and Afghanistan. These successes against major powers by much

Critical and Creative Thinking, a Means to an End

1018 words - 5 pages doctrine centered on fighting Soviet tactics and understanding their capabilities; we trained to attack and defend against their threats. Our doctrine went so far as having metrics to calculate our chance of success. But in the counter insurgent operations this last decade at war confirmed there is no metric for success. As each day unfolds we realize there is no steady state, plans require constant adjustments based on our analysis. Asymmetric

Security Breaches in Comunication and Data Systems

4082 words - 17 pages approach a cyber-defense strategy that can be implemented in national and organizational levels. Just a few of the objectives are; Understand what cyber security is not, understand unique threats and know how vulnerable that you are. What is a cyber-warrior? They are military specialists, law enforcement officials, computer forensics experts and civil engineers who defend national and economic security assets. The first level of cyber warriors are

Network Security Concepts

1772 words - 7 pages company's own workers. Symmetric and asymmetric encryption differ from each other in that with symmetric encryption, the same key is used for both the encryption and decryption process. With asymmetric encryption, the keys are in pairs but are not the same, and one is used for encryption and another for decryption (Matuszek, 1999). Symmetric encryption is simple and faster than asymmetric encryption, with the security of the key being directly

THEORIST CRITIQUE

1580 words - 7 pages , and Opportunities The author describes a number of threats that will be prevalent in the next fifty years some of which are Economic Disparities, Terrorism, Rogue States and Leaders, and Asymmetric threats. The war in Afghanistan is a good precursor to the threats related in the article. The under development of the nation allowed for the establishment of the Taliban and provided a base of operations for Al-Qaida. This shows that allowing

The Significance of Technical Escort Units in a Post 9-11 WMD Domain

1563 words - 7 pages technical CBRN advice, sampling, detection and monitoring, packaging, and presumptive analysis (Army, 2007, pp. 1-1, 1-2). Previously, this aspect of the chemical field was generally spoken of in hushed tones of admiration and not universally recognized. Today, due to unique threats and a changing national defense landscape, the importance of TE and what it means to our CBRN capabilities has become increasingly significant. The U.S. Army created

NATO and Global Security

1241 words - 5 pages order to portrait the necessity of collaboration and security of social communities one must consider the fact that the human, as a social being has developed a series of social structures. This vision details quite readily what has become a major preoccupation with security threats in the world today: challenges to statehood itself, rather than challenges from interstate rivalry are “asymmetric” threats, nuclear proliferation, transnational

Cyberspace: The Asymmetric Battlefield of the Future

2164 words - 9 pages of the U.S., such as China and Russia, can exploit the same argument to cover their own cyber-attacks against the U.S. This paradigm has enabled adversaries of the U.S. to sidestep the military supremacy of the U.S and conduct asymmetric cyber-attacks against the less secured private sector of America. Adopting this approach nullifies the ability of the U.S. to respond militarily as there is no definitive redline that an adversary cannot cross

New and Old Wars

2081 words - 9 pages Warfare. Middle East Quarterly, 15 (2), pp. 37-44. Nicolson, A. 2005. Men of Honor: Trafalgar and the making of the English Hero. New York: HarperCollins. Thornton, R. 2007. Asymmetric Warfare: Threat and Response in the 21st Century. New York: Wiley. Tomes, R., Natter, W., and Brister, P. 2011. Hybrid Warfare and Transnational Threats: Perspectives for an Era of Persistent Conflict. New York: CENSA. van Creveld, M. 2002. The Transformation of War Revisited. Small Wars and Insurgencies, 13 (2), pp. 3-15. William, C. 2011. New Battlefields, Old Laws: Critical Debates on Asymmetric Warfare. Washington DC: Columbia University Press.

The European Economic Community and the Euro Dollar

3502 words - 14 pages the macroeconomic environment of a country or region that disrupts the careful balance of production, consumption, investment, government spending, and trade." The most threatening type of economic shock for the single currency area is known as an asymmetric shock, so called because such shocks affect countries unequally. They can be caused by sharp declines or increases in demand for the primary goods and services of a specific country

Network Sercurity Industry

1005 words - 5 pages also have secure access on the go, and promotes productivity while at home. Strong security allows employees to connect from home without introducing any viruses or threats. There is less time wasted on spam and junk files. The Fire wall was created for many reasons by many people. Nir Zuk says he developed the technology used in all fire walls today. David Pensak claims that he built the first commercially used fire wall. But

Similar Essays

Cryptography And Basic Security Goals Essay

950 words - 4 pages : private key or secret key (also known as symmetric) cryptography and public key (also known as asymmetric) cryptography. Symmetric key cryptography uses the same key for encryption and decryption. Another type of encryption method, asymmetric or public key cryptography uses different keys to encrypt and decrypt. On one hand, asymmetric key cryptography requires more computation resources than symmetric key cryptography does, on the other hand

Memorandum To The President Essay

2029 words - 9 pages of American citizens “are more bound than ever to events beyond our border” (Obama, 2010, p. 7). The advances and advantages that have come with globalization have also ushered in new threats. Addressing these threats produced in such an interdependent environment requires a holistic approach and synergistic response. This challenge will require “all the instruments of national power, including diplomatic, information, military, economic, and

Department Of Defense Strategy For Operating In Cyberspace

2042 words - 8 pages This paradigm has enabled adversaries of the U.S. to sidestep the military supremacy of the U.S and conduct asymmetric cyber-attacks against the less secured private sector of America. Adopting this approach nullifies the ability of the U.S. to respond militarily as there is no definitive redline that an adversary cannot cross in which military action would be warranted. As a result of this nexus, the private and public networked sectors have

What Is An Insider Threat? Essay

1692 words - 7 pages What is an insider threat? Insider threat has been defined as a malicious hacker who is an employee of office of a business, institution or agency. There can also be outsider threats by a person who poses as an officer or employee by gaining access to false credentials. An insider threat can also go by the term of a cracker or a black hat. Insider threats have damaged the United States for a long time. Today the threat is much easier to pull