Hazard Vulnerability Analysis and Terrorism Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Hazard vulnerability analysis is seen as a way of focusing attention to those hazards that have higher probabilities of occurring and likely to have significant impacts surrounding community (Klein 2010). This document undergoes a review annually and thus, the HVA document serves as an assessment for the emergency management program. The 9-11 attack on America proved that the probabilities stated in a Hazard and Vulnerability Analysis are not reliable.

The fact that united states have never experienced such a disaster in their history proves this. Most preceding major attack was the Pearl-Harbor attack but it was by a major power in contrast with the 9-11 attack, which was by an insignificant group of people. The Al Qaeda in Afghanistan had been of concern to the United States’ government but the CIA was not able to tame their terrorism activities that concerned people worldwide. Therefore, the aim became to capture the leader of the group Osama Bin Laden (Summer 2009).

The capture of Osama bin Laden however was after the 9-11 attacks. The attacks left the United States in a devastated condition (Summer 2009). The 1998 bombings had however indicated of a possible second attack but the calculations of the defence system did not predict that the attacks would be that soon. The 1998 embassy bombings provided a chance for the total examination of national security threat that Osama had posed.

Apparently, no major policy agencies of the government ever met the threat as the attack caught the government unawares. Al Qaeda and the terrorism issue were just but another priority added to the already packed agendas with countries such as Saudi Arabia. The 9-11attack changed this perception as it came as a wake up call to the defence department (Bill 2010).

Several factors may have pre-empted the occurrence of the 9-11disaster (Bill 2010). Before the 9-11 attacks, the defence department never had the mandate to end the sanctuary of the Al Qaeda in Afghanistan. This would have been a major step in obstructing their terrorism activities. Indeed it was unimaginable for the US government to see themselves invade Afghanistan before the New York and Washington terror attacks. Formal interagency deliberation as well, would have helped to obstruct the 9-11 attack.

In addition, less significant forms of intervention would have been of consideration. Per se, the government should have considered deployment of the U.S military personnel or any other special strike forces to Afghanistan. This would mean that the U.S Government no longer had to be dependent on gathering actionable intelligence. However, this meant that it had to secure a foundation and support from the neighbouring countries (Synder 2011).

Washington Military Department’s Emergency Management Division (EMD) aims to minimize the impact of emergencies and disasters on people, environment, economy, as well as property of Washington State (Synder 2011). It provides research and information on the hazards to which the state is vulnerable. This movement initially came into existence to help the state respond and recover from the impacts of disasters such as the 9-11 attack.

Before the 9- 11 attacks, the movement had prepared the state for such and assessed what the effects of terrorism would have on the economy, environment, people, and property of the city. It had also devised procedures to help the city recover from the impacts of such. This was no different in New York and even before the attack, the city already had defined procedure to help recover from terrorism disasters. Other than terrorism, large cities such as New York and Washington D.C normally have prior established plans to help recover from floods, fires, landslides and other forms of disasters (Klein 2010).

References

Bill, M. (2010). Report Assesses Trade Center’s Collapse. London: Cengage learning.

Klein, N. (2010). The Shock Doctrine: The Rise of Disaster Capitalism. California: California University.

Summer, S. (2009). World Trade Center (Freedom Tower). London: Cengage learning.

Synder, D. (2011). Families Hear Flight 93’s Final Moment. Michigan: Michigan University.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, November 27). Hazard Vulnerability Analysis and Terrorism. https://ivypanda.com/essays/hazard-vulnerability-analysis-and-terrorism/

Work Cited

"Hazard Vulnerability Analysis and Terrorism." IvyPanda, 27 Nov. 2020, ivypanda.com/essays/hazard-vulnerability-analysis-and-terrorism/.

References

IvyPanda. (2020) 'Hazard Vulnerability Analysis and Terrorism'. 27 November.

References

IvyPanda. 2020. "Hazard Vulnerability Analysis and Terrorism." November 27, 2020. https://ivypanda.com/essays/hazard-vulnerability-analysis-and-terrorism/.

1. IvyPanda. "Hazard Vulnerability Analysis and Terrorism." November 27, 2020. https://ivypanda.com/essays/hazard-vulnerability-analysis-and-terrorism/.


Bibliography


IvyPanda. "Hazard Vulnerability Analysis and Terrorism." November 27, 2020. https://ivypanda.com/essays/hazard-vulnerability-analysis-and-terrorism/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1