Explore BrainMass

Explore BrainMass

    Homeland Security and Emergency Management.

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    Those responsible for the Mumbai terrorist attacks of November, 2008 used readily available technologies. The terrorists in this case were committed to carrying out a horrific plan and found the simplest, most effective method was through equipment found in any mall.
    •Using the Web resources, library, or textbook, research the events that comprised the attacks in Mumbai, India.
    •In light of the available capabilities in modern technologies, such as cell phones, handheld devices, and the Internet, was the Mumbai event considered an unexpected event? Why or why not? ◦Be sure to use your research to support your arguments.

    •What are 2-3 other historical accounts of technologies or inventions used for terrorist acts? ◦Summarize each of the selected events, and explain why they were significant uses of technology.

    •Be sure to reference all sources using APA format.

    © BrainMass Inc. brainmass.com June 2, 2020, 1:44 am ad1c9bdddf

    Solution Preview


    •Using the Web resources, library, or textbook, research the events that comprised the attacks in Mumbai, India.

    In reference to the 2008 Mumbai, India terrorist attacks, these attacks were planned for over 3 years with the Pakistani military's militant wing of it's intelligence service ISI and the Lashkar-e Taiba (LET). It must be understood that Pakistan and India have been involved in a longstanding dispute over Kashmir, and have almost gone to war 3 times with nuclear weaponry involved in one of the most dangerous "cold" conflicts on earth. Under this context, (you) can develop an understanding about the group who carried out these attacks, which were sophisticated yet simplistic in comparison to the 9/11 attacks in New York. The attackers chose soft targets, operated in small groups, and were able to paralyze an entire city and nation for several days with only a dozen attackers. The attacks were coordinated through the use of cell phones, and the leaders from Pakistan were in contact throughout the entire attack. As I previously stated, the attacks had the support and leadership of the Pakistan intelligence service and top senior ...

    Solution Summary

    Homeland Security and Emergency Management are examined.