help with a paper Based on the requirements in the Unit II assignment and your choice of one of the three following scenarios, you are required to complete

help with a paper Based on the requirements in the Unit II assignment and your choice of one of the three following scenarios, you are required to complete a research paper which must relate to how terrorism, genetic engineering, genocide operations, bio warfare, or cyber terrorism may affect our efforts to mitigate future attacks globally or internationally, how the evolution of technology can impact the delivery of a WMD for terrorism, and the moral and ethical implications of the use of such weapons of mass destruction (WMD) in a terrorist attack of this magnitude.

Additionally, the paper must address the capabilities and design of future attacks as well as the strategies we must develop to prevent or diminish the impact of such attacks. You are encouraged to truly think outside of the box instead of just repeating previous efforts from terrorist organizations.

From the reports of intelligence officers with the Central Region Command in Afghanistan, you can be assured that in addition to infrastructure attacks, terrorist organizations focus their attacks against educational and religious systems that they deem evil from their perspective. This includes attacks against students, teachers, schools, libraries, and any religious organization juxtaposed to the radical beliefs of the terrorist.

As a reminder, you are required to choose one of the following scenarios for this research paper:

Scenario One:

The election year is heating up with every new debate. You are the Police Chief of Atlanta. A debate has been scheduled in Chastain Park, which is the largest city park in Atlanta and consists of 268 acres of open terrain. The park is located near the northern edge of the city. The debate will be held at the Chastain Park Amphitheater, which has is designed to hold just under 7,000 people; not including the politicians and their personnel. You can search Google Maps ( for a map location of Chastain Park.

Your research must identify what federal and state agencies will be assisting you with the security for the event. You have been assigned the duty to provide a risk analysis of the physical facilities as well as provide your opinion of the probability of terrorist attacks against the politicians or the 7,000 participants within the amphitheater as well as those who will be in the park surrounding the amphitheater. You must ensure the safety of everyone attending the debate as well as those visiting the park. Your mitigation plan must address ingress and egress to and from the park and the amphitheater before, after, and during the event. Additionally, you must identify possible existing threats as well as the terrorist group responsible for those threats. You must identify all probable avenues of attack and develop a plan to prevent such attacks. Keep in mind, you must prepare for the worst-case scenario that can consist of any form of an attack including an attack from the ground or air, as well as long-distance attacks or pre-planted improvised explosive devices. Consider that thousands of people may die or be seriously injured if your plan fails to recognize all relevant scenarios or threats.

Scenario Two:

You are the head of a Homeland Security Investigative Task Force assigned to mitigate threats or possible terrorist attacks against the port area of San Diego. This includes numerous U.S. Navy vessels as well as a number of oceanic freighters, local fishing vessels, and pleasure yachts. You have received a threat from an unknown source stating that coordinated attacks are going to be launched against military and civilian targets in and around the San Diego area. The threat alludes to the use of nuclear missiles launched from vessels off the coast of San Diego. The source of the threats remains unknown, but intelligence points toward North Korea and Iran.

Your job is to identify the probable source of the threats as well as mitigate the numerous scenarios of attack that could stem from the Pacific Ocean, the Baja, the roadways entering San Diego from all directions, or from within San Diego. No specific terrorist group has given any notice of an attack.

You must identify all probable sources from which a nuclear missile could be launched. Since intelligence advises that neither North Korea nor Iran have long range capability, your search must be restricted to the immediate area. Additionally, all you know is that the attack is scheduled to occur sometime this month.

Identify all possible sources that could launch a nuclear missile and determine countermeasures that will empower your personnel to defeat the attack or attacks before they occur.

Your plan must include a worst-case scenario response plan to enable you to properly respond and deal with the blast effects from the attack should your personnel fail to stop the attack or attacks.

Scenario Three:

You are a senior officer in the U.S. Border Patrol and your intelligence group has received a warning that a terrorist cell is planning to launch an aerial biological attack across the southern borders of the United States, but the information you received does not identify a specific border area crossing point; therefore, you must create a plan to identify all probable entry points along the massive stretch of land that borders along Mexico and the United States. Additionally, you must plan to mitigate any attacks that could occur. Numerous scenarios can be identified, which include attacks by air, land, or by pre-planted improvised explosive devices, as well by other methods designed to release the biological hazard into the air or the local water supply system.

Your job is to identify all possible situations and provide a plan that will efficiently inspect and monitor each threatened area as well as possible sources of attack. Can you simply shut down all small plane traffic in the area? Could the biological hazard already be in place? Could the biological hazard be transported across the border through tunnels? What cities are probable targets for such attacks? What plans can you develop to ensure protection for all these cities? How far north can such attacks penetrate?

Your plan must include identification of all possible scenarios as well as your response plan based on the worst-case scenario providing proper response to the area or areas suffering from the attack as well as how you plan to protect first responders and healthcare facilities during and after the attack.

Research paper Instructions:

Please use the scenario you chose in the Unit II assignment that was approved by the instructor. Complete a research paper that must be a minimum of four pages in length, not including the title page and the reference page (title and reference pages do not count toward the total page requirement). The research paper must follow APA guidelines and contain the following components:

Title page: The title page must be in APA format, which includes the APA running head and the page number in the header.
Abstract: Provide a brief explanation of the purpose of your paper. This must be a minimum of 150 words. This should be similar to the topic description you submitted in the Unit II assignment.
Introduction: Provide a brief review of the scenario you have chosen that was submitted and approved by the instructor in Unit II.
Body: Headings help the reader transition from one subject to the next. This is the focus of your research and analysis on the scenario you have chosen, where you identify the risks and mitigation solutions that will provide the appropriate protection as well as provide reactive measures in case terrorists manage to complete an attack despite your preventive measures. The content must center on the three areas of concern identified above.
Conclusion: Provide a summary of your findings and solutions based on best practices.
Reference page: You must include the heading (References) centered above the reference list on a separate last page. You must include the three references selected in the Unit II assignment. You may include more but your initial three which were used to research and create the topic must be used. All references must be in APA format, and each reference must relate to at least one in-text citation.

Please think outside the box in this assignment. Base your target choices on true targets of choice that radical Muslim groups like Al-Qaeda are prone to choose. For example, typical non-military and non-government targets in Afghanistan were religious groups that fell outside the radical beliefs of the Al-Qaeda or Taliban as well as any function or person related to education, including students, schools, teachers, or libraries. Do those relate to targets in the U.S.? What moral implications arise from such attacks? How will technology influence your delivery or detonation of the WMD? What kind of countermeasures should you consider as you plan your attack?

The CSU Success Center has an excellent tutorial for writing a research paper. Click on the link for this tutorial: You may also contact a Success Center Writing specialist for additional assistance.

Please contact your professor if you have any questions or concerns. The choice you make may truly serve to be the risk analysis of a future Al-Qaeda attack against the United States.


The following resource(s) may help you with this assignment.

Citation Guide
CSU Online Library Research Guide
Submit Writing Center Request

i uploaded my paper i started for this and the scenario is included in it. Running Head: BIOHAZARD MITIGATION PLAN
Ronnie Slate
Biohazard Mitigation Plan
Columbia southern
December 25 2018
A biological or chemical attack will either feature the use of a plant toxin which will
be quite lethal or bacterial pathogens. The mitigation plan will feature the possible biological
and chemical agents which can be used for the attack in the specified regions. Furthermore,
the mitigation will also consider different scenarios which will revolve around the release of
the biological or chemical agents, that is, how the lethal agent will be released in the specified
areas which have been identified by my intelligence group and the U.S. Border Patrol
(Ackleson, (2005).
The implementation of this mitigation plan will highly revolve around the biological
attack which will be launch by one of the terrorist cells. The mitigation plan will also highly
focus on the areas which have been provided by the intelligence regarding where the attack
shall take place. The mitigation plan will also consider the likely entry points which may be
attacked by the terrorists. The entry points will lie along the borders of the United States of
America and Mexico. Some scenarios will be discussed in-depth in this mitigation plan.
Research Paper Topic
Based on the information which has been gathered by my intelligence group, the
possible places which will likely be probable places where the attack can occur will include
the city of Lukeville, Naco, Nogales, Columbus, Tornillo, El Paso and Zapata. The areas
mentioned above have U.S. Customs and Border Protection offices to prevent the entry of
illegal narcotics and to prevent the entry of toxic biological or chemical agents which may
lead to the deaths of the civilians living in the region (Kindt, 2009).
One of the first scenarios which ought to be considered in this mitigation and response
plan will revolve around the monitoring of the mentioned areas which are also under the
threat of an attack. The release of the toxic biological agent will be done through the air. The
shutting down of the small plane traffic may affect air transportation in the mentioned
regions. However, the shut down may also prevent the use of illicit drones which may be
used to detect the vulnerabilities in the threatened areas and may also prohibit the use of the
illegal drones which may be used to release the hazardous biological or chemical agent in the
regions (Post, 2009).
One other scenario which will also have to be considered will be whether the
biological hazard will already be in place in the mentioned areas. The data gained by my
intelligence group show that the attack will highly focus on an aerial attack which will deliver
the hazardous agents in the regions. The possibility of whether the toxic biological or
chemical agent already existing in the area will rely on the new technology which will be
deployed to identify hazardous agents as well as narcotics. The technology will be able to
show whether or not the dangerous agents are in the mentioned regions. The toxic biological
agents can be transported across the border through tunnels. One of the cities, Nogales, is
quite vulnerable since a tunnel was found in the region which had been used for drug
trafficking. Other underground routes may also exist in the area. Possible lethal biological
agents which can be used by the terrorist cell will include ricin, botulinum as well as other
dangerous toxins (Walters, 2009).
The response plan when a bioterrorism attack has occurred will focus on the public
health officials and their response. The first people who will respond if a bioterrorism attack
has occurred will be the health care workers and the public health officials. The first response
team will be partners under the U.S. security team. The health workers and officials will have
to be trained to handle the attack with the inclusion of detecting which agent has been used
for the attack (Walters, 2009). For the protection of the cities mentioned, technology will be
deployed to determine whether there has been the release of the harmful biological agent or
not and to also determine the routes which can be used to transport the lethal toxin across the
border. Healthcare facilities will have to provide various medications which will counter the
effects of any deadly biological agent which will be released by the terrorist cell. The attacks
in this region can affect some of the nearby cities but will not penetrate further in the North
due to the deployment of the technology that can identify the lethal biological toxins.
Ackleson, J. (2005). Border security in risk society. Journal of Borderlands Studies, 20(1), 122.
Schneider, B., Post, J., & Kindt, M. (Eds.). (2009). The world’s most threatening terrorist
networks and criminal gangs. Springer.
Walters, W. (2009). Secure borders, safe haven, domopolitics. In Securitizations of
Citizenship (pp. 46-70). Routledge.

Purchase answer to see full

"Order a similar paper and get 100% plagiarism free, professional written paper now!"

Order Now