#Biological Attack
    Let’s face it, biological attacks are the things nightmares are made of. Hollywood has been having a field day coming out with movies based on this vulnerability, ranging from campy zombie movies to the much more scientifically accurate Contagion. Biological attacks are the intentional release of bacteria, viruses, or toxins to disrupt society or kill people. The scale of an attack can range from a single person to putting virtually everyone in the world at risk. Biological weapons are...
    بواسطة Editor Outhematrix 2024-02-28 20:36:20 0 594
    #Radiation Emitting Device (RED/RDD)
    RDDs and REDs are similar enough to categorize together, but are very different threats. RDD stands for Radiological Dispersal Device. These are usually a “dirty bomb”, or a conventional explosive combined with radioactive material. They are a shock and awe type weapon with lasting repercussions and damage. The perpetrators would usually claim responsibility for an RDD “dirty bomb”. RED stands for Radiological Emitting Device. These are usually unshielded...
    بواسطة Editor Outhematrix 2024-02-28 20:26:09 0 635
    #Chemical Attack
    Though rare, chemical attacks can be deadly and target large areas. There are many different types of chemical weapons, ranging from common riot control tear gas to the deadly nerve agent Vx. All of these are prohibited for use in warfare due to the Chemical Weapons Convention (CWC) that the majority of countries in the world have ratified. Many countries that sponsor terrorist states have not ratified this treaty, however. Chemical weapons can be broken down into several...
    بواسطة Editor Outhematrix 2024-02-28 20:22:17 0 611
    #Conventional Attack
    A conventional attack, for our risk analysis purposes, is considered a state-sponsored attack on the American homefront. In most cases this would be a declaration of war using conventional weapons (instead of a nuclear war). Obviously we have had this occur in the past many times, with the last being Pearl Harbor in World War II. We also factored in the popular conspiracy theory of the government turning on its people and attacking them. While highly unlikely in any event, it...
    بواسطة Editor Outhematrix 2024-02-28 20:19:22 0 606
    #Nuclear Attack
    Two nuclear attacks have ever occurred throughout history, and both were bombs dropped by the U.S. to end World War II. While these weapons of mass destruction have been depicted as the ultimate world destroyers in fiction novels and movies, the apparent risk is not as high as it may seem at first. Severity of a Nuclear Attack A nuclear attack does have a range of severity it could fall within- but all of them are pretty severe. Isolated nuclear attacks would be highly...
    بواسطة Editor Outhematrix 2024-02-28 20:14:54 0 641
    #Electromagnetic Pulse (EMP)
    An electromagnetic pulse is a surge of electromagnetic energy that can disrupt and permanently damage electronics. For the purposes of conducting our risk analysis, we separated the causes of electromagnetic pulses into two categories, and focus on one in this section. The cause we do not cover in this section is the Coronal Mass Ejection (CME), which we cover under our TrueRisk evaluation for space weather. We will be focusing on nuclear-caused EMPs, also known as NEMPs (Nuclear...
    بواسطة Editor Outhematrix 2024-02-28 20:09:48 0 623
    #Bombing / Active Shooter
    Bombings and mass shootings have quickly become a terrorist favorite, and it is easy to see why. The seemingly unpredictable acts are on the front page of every news section and covered extensively by the media. Graphic depictions of violence are prevalent in our internet-connected age, and these atrocities are burned into our collective memories. Live video feeds and social media have only amplified the message the shooters and bombers are trying to send. These events strike fear into...
    بواسطة Editor Outhematrix 2024-02-28 20:01:52 0 588
    #Cyber Attack
    Whether it is simple online credit card fraud or a DDOS attack taking down a government system, cyber-attacks are quietly gaining in frequency and impact. The power of the keyboard is only growing as we store more and more private data in computer databases. Our interconnected society is allowing criminals next door or across the world to steal your identity and steal from unsuspecting victims. Even large businesses are not above this risk, with several high-profile hackings, and many...
    بواسطة Editor Outhematrix 2024-02-28 19:54:47 0 606
    #Home Invasion
    Being a victim of a home invasion can be one of the worst experiences of your life. It will likely leave you rattled, questioning your priorities and the safety of yourself and your family. Many victims often have trust issues, relationship problems, and often seek counseling after a break-in. While it is easy to learn lessons after an incident, this is the one area where prevention does not really take that much time, money, or know-how. Fortifying your home, being able to protect...
    بواسطة Editor Outhematrix 2024-02-28 19:51:07 0 639
المزيد من المقالات
إعلان مُمول
إقرأ المزيد
#THE RULE OF THREE’S
Many survival lessons can be condensed down to acronyms and mnemonic that serve to simplify a...
بواسطة Moderator Outhematrix 2024-02-29 19:55:19 0 513
#Power Outage
Power outages are becoming more and more frequent as the power grid in the US ages. While...
بواسطة Editor Outhematrix 2024-02-28 19:38:32 0 623
#Hericium coralloides (lion's mane)
Lion’s mane (Hericeum erinaceus) has been a time-tested mainstay in Traditional Chinese...
بواسطة Yizhar Cohen Tzedek 2024-03-03 00:20:47 0 527
#Strengthening Lung Health and the Immune System
Supporting lung health is a big focus as of late, but we are also getting close to allergy...
بواسطة Moderator Outhematrix 2024-03-04 19:23:53 0 621
#Nuclear Attack
Two nuclear attacks have ever occurred throughout history, and both were bombs dropped by the...
بواسطة Editor Outhematrix 2024-02-28 20:14:54 0 641