You are on page 1of 4

*Switched the order of the counter terrorism methods to prevent an attack on a Nuclear Power Plant.

A. If employee is being uncooperative or if the threat is valid, contact DHS immediately and notify of situation. The threat has been confirmed. DHS/FBI agents should take the employee into custody for interrogation. Due to the threat status confirmed valid, all resources and acts consistent with the Patriot Act should be granted by warrant by a sitting judge on the basis of an imminent Weapon of Mass Destruction (WMD) attack, or the materials needed to create a WMD are expected be stolen or removed from a secure location on U.S. soil by a terrorist or hostile force (Patriot Act vs. Constitution).

B. Conduct an extensive interview/interrogation into the purpose of the plans to determine level of threat if any. By any means necessary or methods deemed fit by the interrogators, all relevant information should be pried from the employee (i.e. any information regarding contact with any member of the hostile responsible for planning this attack). One must assume that because the information was found on a secure network inside this specific complex that this complex is the target from which the materials will be stolen, and as a precaution, any other complex which mirrors the characteristics of this complex. Upon conducting an extensive background into what the employee states as true or false regarding who they are working with or for, the interrogators should assume a worst case scenario that it is a hardened terrorist force with clear motive and means,

or any international government military force with the means and capabilities to pull off such a raid (Adams, Nordhaus, & Shellenberger, 2011).

C. Deploy forces on ground in anticipation of attack and response. Immediately, an emergency notification of deployment should be sent to any and all security personnel working on the complex(s) regarding the expected attack to strengthen the security of the complex. As well, security personnel should be outfitted with equipment and weapons designed to repel any hostile ground force attack. Support forces with the capabilities to strengthen defensive positions on the compound(s) should be dispatched to all locations immediately. The FAA should be notified to establish no-fly zones for fixed and rotary wing aircraft (except friendly security and military forces) in a radius of 50 miles (extending the current radius of defense from 10 miles) regarding all anticipated target locations (Holt & Andrews, 2012). To prevent hijacked civilian airliners being used as weapons, or incase the hostile force is determined to be of overwhelming size, U.S. military fixed and rotary winged aircraft and emergency response battalions should be notified, and ordered on stand-by for emergency deployment to repel attack or assist defenses of target locations (IS-75: Military Resources in Emergency Management, 2011).

D. Gather and track down all actionable intelligence to determine possible targets and most probable targets to be exploited, as well as known or possible terrorists operating the attack. Upon the strengthening of security at all perceived target locations, the agencies responsible for tracking down the leads derived from the employee interrogation and background check and search, the DHS, FBI, CIA, NSA, DIA (Department of Defense, DoD) and all law enforcement counter terrorism agents should go on the hunt for the suspected terrorist or hostile force, with the intent to capture, but incapacitate if necessary as a last resort. The network of the hostile force should be exposed and securely broadcast to all international government agencies or heads of state with interests of combating terrorism to keep them informed of the situation. The fact is this, a verified attack is planned on at least one nuclear power plant located within the United States, and the assumption is that nuclear material is the intended target of the hostile force to achieve. However, no assumption can be made yet that the hostile force plans to create a weapon from the nuclear weapon and use it directly on U.S. soil. Hence, the assumption should be the hostile force could obtain the nuclear material, create a weapon, and use it on any countrys soil (Winning the War on Terrorism, 2003).

Works Cited
Adams, N., Nordhaus, T., & Shellenberger, M. (2011). Counterterrorism Since 9/11: Evaluating the Efficacy of Controversial Tactics. Breakthrough Institute. Holt, M., & Andrews, A. (2012). Nuclear Power Plant Security and Vulnerabilities. Congressional Research Service. IS-75: Military Resources in Emergency Management. (2011). FEMA Emergency Management Institute. Patriot Act vs. Constitution. (n.d.). Retrieved from CCAPA: Concerned Citizens Against the Patriot Act: http://www.scn.org/ccapa/pa-vs-const.html Winning the War on Terrorism. (2003, February). Retrieved from Almanac of Policy Issues (archive): http://www.policyalmanac.org/world/archive/war_on_terrorism.shtml

You might also like