Natural Disasters whether
or not caused by climate change, notwithstanding, the world is on an emotional
edge and high alert, mainly against manmade intrusions from opposing lifestyles,
wealth disparities, discrimination, gender imbalance, etc. general security
breaches; which must now form the starting point in every strategic development
plan. There are so many avenues for mass destruction on a global, regional,
national, corporate and personal scale. These dangers and solutions must be
publicly addressed and connected in order to sustain and improve standards of
living.
Water and Sewerage
are the most vulnerable because any attack can easily be made to look natural.
Waterways and treatment plants are soft targets for biochemical attacks,
poisonings of humans, animals and crops. Waste untreated, solid and liquid, is
also an easy way to transmit laboratory created disease through insects, contact,
airborne and the food supply. The solution most applied is to locate army base
security forces around treatment plants with training exercises and patrols
along the supplying waterways and to implement waste recycle technology to
limit and secure toxic byproducts.
Electricity Networks
are also very susceptible to sabotage, at generation, storage and distribution
points. Generation facilities, inclusive of its fuel; Natural Gas, Diesel, etc,
supply network and storage is fairly easy to compromise; easier than
geothermal, wind or solar, and must be physically protected and inspected with
offsite operational instruments monitoring performance. Distribution grids and substations
are vulnerabilities requiring monitoring, numerous redundancies and unscheduled
surprise inspections, noting that wide area outages are normally the first step
in a more elaborate attack.
Transportation of
Passengers and Cargo via Air, Sea and Land is the most difficult to protect and
secure, as evident by attacks on passenger terminals, cargo trade routes and
vehicles; made more treacherous when passing within the reach of impoverish
communities. Such neighborhoods breed pirates, kidnappers, and other criminal
gang activities as the only method of survival, making the solution an
investment in a mix of social reforms; religious, sport and cultural based
activities with comparative economic rewards as oppose to an illicit lifestyle,
transforming crime hot spots into legitimate opportunity driven locations.
All types of
security breaches, even lone wolf actions, leading to mass disruptions damage
and death, start with a plan discussed among displease persons. Identifying and
reducing such levels of distress must be the first step in any security
strategy, followed closely by learning details of the plan and employing
preventative measures around the final target. Not letting news of demise;
caused by poisoned water, disease spread, invasions or suicide bombings, ignite
and provoke terror throughout the society motivating others disgruntle persons to
join, seeking answers in much the same way.
The law demands proof
of expressed thoughts and achieved tasks to convict and condemn, whereas
security requires vetting and access; the state of mind of persons with access
to keys. Data breaches which can alter; Information software, firewalls, identification,
bio-metrics passports and passwords, Communication hardware, infrastructure,
satellites, lines and routers, or influents assigned persons, granting access,
more so remote access, to target any utility facility, transportation,
communication and financial system, must not be ignored, engaging every
intelligence agency in the world, via a court order to follow the money, not
based on an amount but on its intended use.
Rationale
T.A.J & Associates Company Limited uses this occasion to comment on topics that have been covered, both academically and by the mainstream media, to add its opinion and point out investment opportunity, not to invoke any social action.