Answered You can hire a professional tutor to get the answer.
I will pay for the following essay (DNRC). The essay is to be 5 pages with three to five sources, with in-text citations and a reference page.The document contains information from collected reports f
I will pay for the following essay (DNRC). The essay is to be 5 pages with three to five sources, with in-text citations and a reference page.
The document contains information from collected reports from a wide range of government sections and agencies. The report contains evaluations of the associated severity of a big scope of primary accidents or natural occurrences (communally referred to as hazards) and attacks that are malicious in nature (threats). It also contains evaluations of the potential risks that are caused by public unrest, local extremists and organized crime. JTTF and Homeland Security Detectives have collected all sorts of information, and the following are the considered major hazards and threats that originate from five major sections.
Miami faces a continuous threat from terrorism because it is a favored destination for many local and foreign tourists. Beyond the conventional strategies of attack, terrorists may have the intentions of conducting cyber attacks or employ non-traditional methods such as chemical, radiological substances, nuclear and biological materials (Christopher, Frye & Reissman, 2010). Considered to be a high profile political event, the Democratic-Republican National Convention is expected to present an attractive target to terrorist groups and their sympathizers.
Without a shred of doubt, there will be a lot of movement of passengers during the course of the event. The historical information reveals that of the various malicious attacks regarded, traditional attempts at sabotaging the open transport structures such as the subway stations are likely to be tried (Shach-Pinsly & Ganor, 2014). Other related attacks of the same nature on maritime and air travel systems is less likely to be employed because of the heightened security screening within these systems.
Non-conventional attacks are regarded as attacks that use unusual materials such as nuclear materials, chemical and biological materials. The magnitude and effect of such an occurrence would be dependent on the material used to carry out the attack, and the location chosen to launch the attack. The