Recent orders

Glucose and Insulin ELISA

Glucose and Insulin ELISA

Name

Institution

Course

Tutor

Date

Abstract

Glucose homeostasis is the process by which human bodies maintain ideal concentrations of blood glucose. The process is important in providing continuous supply of energy for proper body functions. Abnormal glucose homeostasis in diabetic subjects may result to long-term health problems and this may lead to severe damage of vital organs in the body. In the experiment, The Oral Glucose Tolerance Test (OGTT) is used to illustrate the changes in blood glucose after consumption of glucose after 12 hours fast.

Introduction

The paper analyses glucose homeostasis for a period of 2 hours after consumption of glucose. This is after 12 hours of fasting. The hormones responsible for the blood glucose and regulations are glucagon and insulin. In this case, the effects of glucose concentration increments on Insulin Enzyme-Linked Immunosorbent Assay (ELISA) were examined (Accorsi, 2009). The experiment helps to obtain the relation between dilution and optical density of glucose. In so doing, the experiment helps to calibrate Mercodia Mouse Insulin ELISA (a two-site enzyme immunoassay). It also helps in calibrating Mercodia Mouse Insulin ELISA and hence obtaining the relevant equation (Komatsu et al. 2006).

Data collection Methods (glucose level)

Before the experiment, fasting was observed for 12 hours (overnight). The fasting was to ensure that majority of the glucose in the body were used up. Though the glucose could not be reduced to zero (after fasting for 12 hours) but fasting ensured it was reduced to the lowest quantities. The high glucose levels in the body could not give a better reflection of the effects of consuming glucose on the blood sugar, mars bar and cereal bar.

In the practical 10 students’ blood were tested. Four students were tested for glucose solution. Three students were tested for Mars bar and other three students tested for cereal bar. The hands were washed and dried before the experiment (taking the blood samples). The goal of testing laboratory was to maintain the highest level of accuracy and precision in the end results and so the reason for drying the hands. Picking the students tested for a particular concentration was done randomly to minimize result biasness.

During the experiment, a control blood sample (about 100 μl – two large drops) was withdrawn by the help of the Glucoject Dual overleaf. The mean glucose level was obtained. Normally, measurement errors occur while collecting the measurements. The control group was essential in comparing the results. This might result from use of wrong equipment in measuring samples, poor calibration of the equipment and taking wrong readings. The equipment can be so used up such that the calibrations are not clear. The person taking the readings might thus end up recording the wrong reading resulting to an error in the final results. The use of Glucoject Dual overleaf ensured accurate results.

After taking the first sample, 75 g glucose was consumed in the form of glucose solution. The solution was given to all the ten equally and at the same time. They ate nothing thereafter.

One hour later (after glucose consumption), blood samples were taken after 1 hour and the next sample after two hours (from consumption time). In each sample, the blood glucose was measured and plasma collected. This was to target the peak of blood glucose which usually occurs between 30 minutes and 1 hour in normal cases. However, in diabetes cases, it occurs closer to 2 hours. No diabetic student’s blood was sampled.

The results are shown in the Appendix, table 1.0.

Data collection Methods (Insulin Enzyme-Linked Immunosorbent Assay (ELISA))

10 μl of each of your samples pipetted into well (2 wells used).

Into each of your 2 wells 100 μl of enzyme conjugate 1x solution was added.

On a plate shaker (700-900 rpm) enzyme was incubated for 2 hours at room temperature. The room temperature ensured good temperature for the action of enzymes.

The reaction volume was discarded by inverting wells over a sink. 350 μl wash buffer 1x solution was added each well. The wash solution was discarded by firmly tapping absorbent paper to remove excess liquid severally. This was repeated five times.

200 μl Substrate TMB was added to each well.

It was then incubated for 15 minutes at room temperature. The time was sufficient for the enzymes to react.

50μl Stop Solution was added to each well. The plate was then placed on the shaker for approximately 5 seconds to ensure mixing.

The optical density at 450nm was read. This was before 30 minutes elapsed.

The calibrated results were used to draw a standard curve useful in working the insulin concentration on samples. The curve helped in determining the relation between dilution and calibrators.

The graph on density against concentration was plotted to determine the equation connecting the two. The detection limit was ≤ 0.10 μg/l. The low level ensured high accuracy of the recorded data.

The results are shown in appendix table 1.2.

Discussions

The concentration of glucose is among the major factors determining the direction of its metabolism. Glucose concentration in the body is determined by various factors among its intake. The higher sugar intake leads to increased glucose level in the body and vice versa. Glucose concentration in the body is as well determined by the amount other related food intake and sugar concentration in the body is regulated by insulin. Consuming glucose leads to increased glucose level in the body as observed in the experiment.

A drop in the glucose content is accompanied by gluconeogenesis activation, as a rise in glucose concentration boosts glycolysis (the process through which glucose is broken down). In other words, the glucose level in the body is maintained by a type of negative feedback. In general, metabolic activities are regulated by changing the activities of some enzymes of the pathway. The one hour time was significant as it ensured that the glucose had been digested and absorbed into the blood stream. Glucose digestion takes a very short time since it I in its simplest form and does not require further breakdown.

Glycolysis is under hormonal (insulin) and allosteric control. Insulin activates glycolysis by stimulating key glycolytic enzymes and this is responsible for reducing the amount of glucose concentration in the body. The other method of reducing glucose in the body is fasting. During fasting the glucose in the body is consumed and when there is no consumption, the level reduces. Food taken (carbohydrates) enter the human body in complex forms like disaccharides, glycogen and polymer starch but this is not the case with glucose. The first metabolic step is the breaking down of bigger polymers to simpler, soluble forms that can be transported through wall so the intestines and delivered to the tissues. Glucose however, is in its simplest form (monosaccharide) and enters the glycolysis stages directly. This is the reason as to why the level when glucose is consumed, the blood sugar level increases shortly. The consumption of glucose in the solution form ensured and increased the level of glucose into the body.

The results of glucose concentrations show that the glucose levels, after consumption of glucose reduced after fasting but increased one hour after its consumption. The consumption increased the amount of glucose in the body resulting to increased glucose concentration but after glycolysis, the level is expected to reduce. The mean before glucose consumption was 5.45, then moved to 7.95 one hour after consumption and then reduced to 7.13 two hours later after consumption. Glycolysis that takes place soon after glucose consumption is the splitting of complex sugars to simple and soluble sugars. In the process glucose is broken down into two molecules each containing three-carbon sugar. Glycolysis produces two ATP molecules, two pyruvic acid molecules and two molecules of NADH. The process can take place with or without the presence of oxygen.

Glycolysis occurs in steps. The first step entails enzyme hexokinase phosphorylates which adds phosphate group to glucose in cytoplasm. The process leads to the production of glucose 6-phosphate. The chemical process is shown below.

Glucose (C6H12O6) + hexokinase + ATP → ADP + Glucose 6-phosphate (C6H11O6P1) and then glucose 6-phosphate is converted into isomer fructose 6-phosphate by phosphoglucoisomerase (enzyme). Isomers have similar molecular formula with the difference in arrangements of atoms. The chemical process is shown below.

Glucose 6-phosphate (C6H11O6P1) + Phosphoglucoisomerase → Fructose 6-phosphate (C6H11O6P1)

Another ATP molecule is uses by the enzyme to transfer phosphate group to fructose 6-phosphate to form fructose 1, 6-bisphosphate.

Fructose 6-phosphate (C6H11O6P1) + phosphofructokinase + ATP → ADP + Fructose 1, 6-bisphosphate (C6H10O6P2),

Fructose and 6-bisphosphate are further split to form isomers of each other. In short, one glucose molecule in Glycolysis gives about two molecules of pyruvic acid, two ATP molecules, two NADH molecules and two water molecules. The end equation is Glucose (C6H12O6) + 2 [NAD]+ + 2[ADP (Adenosine Diphosphate)] + 2 [P]i —> 2 [C3H3O3]-(Pyruvate) + 2 [NADH] (Reduced Nicotinamide Adenine Dinucleotide) + 2H+ + 2 [ATP] (Adenosine Triphosphate) + 2 H2O (Odensten et al. 2007). The energy and water lost gradually reduced the glucose level and hence low concentration levels finally. During the first one hour, insulin level remained low due to decreased blood sugar level. The glucose level in the blood was low and hence insulin level remained low. One hour after consumption, insulin level increased to decrease the raised blood sugar level and then decreased later. The glucose level rose in the body after one hour and so the need for increased glycolysis. This resulted to increased insulin production to speed up glycolysis.

Glucose, Mars bar and Cereal bar

The results of students Glucose, Mars bar and Cereal bar before and after fasting are recorded in table 1.0 (Appendix). The amount of glucose, mars bar and cereal bar different from one student to the other and so it was important to get the average. This was affected by various health conditions and the types of food eaten 12 hours before the fasting was observed. The average assumed a general characteristic of the blood samples taken. The mean of glucose was 0.15 at the start of the practical and 1.19 after one hour (after consumption of glucose). Mars bar had an average of 0.18 before and 0.59 after consumption of glucose. On the other hand, the students had a mean of 0.11 for cereal bars before and recorded 0.62 after glucose consumption. After consumption, in all the three variables, glucose, mars bar and cereal bar, their levels increased due to increase in the blood sugar. The mean of mars bar was the highest followed by glucose and then Cereal bar (before the consumption of glucose). After consumption, mean of glucose recorded the highest then cereal bar and Mars bar recorded the least. Consumption of glucose raised blood sugar and this increased the glucose in the body. The glucose increased to the highest followed by cereal and then mars bar after one hour. Glucose, being a monosaccharide was directly absorbed into the blood quickly increasing the glucose level to 1.19 as recorded. Mars bar and Cereal bar be obtained after the digestion of glucose and so their quantities did not increase as much as glucose. This is also observed before the consumption that the level of mars bar was the highest. They are obtained after process that took place slowly after the consumption and so the slow increase in their masses. All the sample students had glucose but some lacked mars bar and others did not have Cereal bar. This means that the amounts of glucose in the blood exceed the amount of Cereal and mars bar in the blood. The practical does not show any direct relations among the three.

The graph shows the increase in the three variables after and before glucose consumption.

Before glucose consumption After Glucose consumption

Glucose solution 0.15 1.19

Mars bar 0.18 0.59

Cereal bar 0.11 1.25

Elisa

Mercodia Mouse Insulin ELISA is a solid phase two-site enzyme immunoassay. It is based on the direct sandwich technique in which two monoclonal antibodies are directed against separate antigenic determinants on the insulin molecule. At the time of incubation, insulin in the sample reacts with peroxidise-conjugated anti-insulin antibodies and anti-insulin antibodies bound to microplate wells. A simple washing step removes unbound enzyme-labelled antibody. The bound conjugate is detected by reaction with 3, 3’, 5, 5’-tetramethylbenzidine. The reaction was stopped by adding acid to give a colorimetric endpoint that is read spectrophotometrically.

Consumption of glucose leads to increased glycolysis. Insulin helps in the reduction of glucose levels in the body through glycolysis. At the incubation time, insulin samples reacted with eroxidise-conjugated anti-insulin antibodies and anti-insulin antibodies bound to microplate wells. The washing machine helped remove unbound enzyme-labelled antibody. The reaction of conjugate with 3,3’,5,5’-tetramethylbenzidine was stopped by adding acid.

The graph of ELISA is a straight line indicating dilution and optical density are directly proportional with a given constant. Due to measurement errors and inaccuracies, a straight line would not be obtained but this can be obtained considering the line of best fit. The line of best fit cuts the x-axis on the positive side 9and hence the constant 0.0197.

Graph of Calibrators against dilution

Letting optical density to be y and Dilution to be y, we have y = 0.3687x +0.0197 where y= mean of conditions and x = the unknown as evident in table 1.2 appendix. The constant is 0.0197. The detection limit was ≤ 0.10 μg/l and this enhanced accuracy. The practical hence is successful in determining the equation relating optical density and dilution.

Assumptions in generating the equation

It was assumed that all the students observed a fasting of 12 hours before the experiment. If the fasting was not observed, the test results are fault as they are unscientific. The entire participants were further assumed to have good health and none diabetic or any other related diseases. The equipment used was assumed to record data of the highest accuracy. Error in sampling can result from the equipment used, biased sampling as well as the materials used.

Conclusion

In conclusion, it was recorded that the levels of all the three variables increased one hour after glucose consumption. The practical assumes that the students never took any food 12 hours before the experiment and were of good health. None was diabetic or had conditions related to diabetes. Consuming glucose increases the blood sugar and so increase in the three; Glucose, Mars bar and Cereal bar. The variables that are obtained after glucose digestion increased slow as glucose had to undergo a process before they were formed. One hour after consumption gave enough time for glucose to be absorbed into the body and formation of Mars bar and Cereal bar. All the concentrations were measured form the blood samples. The glucose consumption lead to increased glycolysis as there resulted a need to control the blood sugar. Glycolysis had to increase to deal with the increased blood sugar. Major decisions are made based on these results and any form of error not only affects the laboratory, but also other sectors that apply that data. The line of best fit could not accurately determine the relation between dilution and Calibrators.

References

Accorsi, P., Govoni N., Gaiani R, Pezzi, C., Seren E., (2005). Insulin and Metabolic Parameters Throughout the Dry Period and Lactation in Dairy Cows. Reprod Dom Anim 40:217-223.

Komatsu, T., Kushibiki, S., Hodate, K., (2006). Effects of ghrelin injection on plasma

Concentrations of glucose. Comp Biochem Physiol 143:97-102

Odensten, M., Berglund, B., Waller, P., (2007). Metabolism and udder health at

dry-off in cows of different breeds and production levels. J Dairy Sci 90:1417-1428

Appendix

Results

Table 1.0: Glucose results

Conditions Fasting Mean Fasting After 1 hour Mean after 1 hour After 2 hours Mean after 2 hours

Glucose Solution 1 5.6 5.45 10.0 7.95 8.4 7.13

Glucose Solution 2 5.9 9.2 7.1 Glucose Solution 3 5.1 6.3 7.2 Glucose Solution 4 5.2 6.3 5.8 Mars bars 1 6.1 6.2 6.9 6.73 4.9 5.8

Mars bars 2 6.6 6.6 6.1 Mars bars 3 5.9 6.7 6.4 Cereal bars 1 6.7 6.27 5.3 7.2 5.4 6.07

Cereal bars 2 6.1 8.0 6.5 Cereal bars 3 6.0 8.3 6.3 Table 1.2: Results for Insulin ELISA

Dilution Calibrators

.2 µg/L 0.174

.5 µg/L 0.195

1.5 µg/L 0.437

3.0 µg/L 1.190

6.5 µg/L 2.416

Time Glucose Solution Mean The unknown

0 0.15 0.13 0.15 0.16 0.15 0.14 0.15 0.15 0.34

1 0.32 0.28 0.45 0.35 2.32 2.39 1.62 1.78 1.19 3.16

Mars bar Mean 0 0.12 0.17 0.29 0.16 0.17 0.18 0.44

1 0.16 0.61 0.49 0.88 0.81 0.59 1.54

Cereal bar Mean 0 0.11 0.12 0.11 0.11 0.11 0.11 0.11 0.25

1 0.14 0.15 0.42 0.49 0.16 0.14 0.25 0.62

1536704705350Table 1.3 Glucose solution

6864351181100

Globank The banking industry

GloBank

Name

Institution

Globank

The banking industry is increasingly becoming competitive, as the demand for banking services also increase. It is because of this increasing prominence of and demand for banking services that has led me to settle on an imaginary bank called GloBank. GloBank is representatibve of a modern day bank offering numerous services ranging from deposits, withdrawals, bill payments, ATM withdrawals, and bank transfers. Because of these numerous services and a growing customer base, GloBank requires a strong customer service, key to which is technology such as the Automated Attendant (AA), the Automatic Call Distribution System (ACD) and Computer Telephony Integration. Computer Telephony Integration would allow for the telephone network within the bank to be easily secured, linked and offer cheaper connection rates. The automated attendant would allow for higher effectiveness of the customer service by ensuring that the caller is linked directly to the service they require simply at the touch of a button. By offering calling customers a direct line to the services they require, the company would ensure less time is spent by patients waiting to access services. Considering the huge number of services offered to customers and huge number of customers, operating through an operator would be highly impractical and inconveniencing, by ensuring the automated attendant spells out the options available to clients upfront, clients requiring customer care in areas that have less traffic are bound to be served faster. After a call has gone through the automated attendant, the call would be routed through an Automatic Call Distribution System, which would ensure that available agents are fully utilized, while at the same time reducing the waiting time of customers waiting to be served. Incorporation of these technologies will enhance the ability of the bank to offer customer service over 24 hours.

Globally Destructive Technologies Will Lead To Greater International Cooperation

Globally Destructive Technologies Will Lead To Greater International Cooperation

Name:

Course:

Professor:

Institution:

City and State:

Date:

Table of Contents

TOC o “1-3” h z u HYPERLINK l “_Toc376871225” 1.Introduction PAGEREF _Toc376871225 h 3

HYPERLINK l “_Toc376871226” 2.Weapons of mass destruction PAGEREF _Toc376871226 h 3

HYPERLINK l “_Toc376871227” 2.1 Counter-proliferation activities PAGEREF _Toc376871227 h 3

HYPERLINK l “_Toc376871228” 2.2 Non-proliferation activities PAGEREF _Toc376871228 h 4

HYPERLINK l “_Toc376871229” 2.3 United Nations Security Council Resolution 1540 PAGEREF _Toc376871229 h 6

HYPERLINK l “_Toc376871230” 2.4 Combating nuclear terrorism PAGEREF _Toc376871230 h 6

HYPERLINK l “_Toc376871231” 3.Bombings and terrorism PAGEREF _Toc376871231 h 8

HYPERLINK l “_Toc376871232” 3.1 Improvised explosive devices PAGEREF _Toc376871232 h 9

HYPERLINK l “_Toc376871233” 3.2 Use of internet in bombings reduction PAGEREF _Toc376871233 h 10

HYPERLINK l “_Toc376871234” 3.3 International cooperation PAGEREF _Toc376871234 h 11

HYPERLINK l “_Toc376871235” 3.3.1 Establishment of universal instruments related to cyber-crime PAGEREF _Toc376871235 h 13

HYPERLINK l “_Toc376871236” 3.3.2 Sharing of data PAGEREF _Toc376871236 h 14

HYPERLINK l “_Toc376871237” 4.Global climate PAGEREF _Toc376871237 h 14

HYPERLINK l “_Toc376871238” 4.1 Nuclear weapons PAGEREF _Toc376871238 h 15

HYPERLINK l “_Toc376871239” 4.2 Chemical and heat-producing weapons PAGEREF _Toc376871239 h 16

HYPERLINK l “_Toc376871240” 5.Conclusion PAGEREF _Toc376871240 h 17

Introduction

In the article titled, de-territorialized threats and global politics: geopolitics and risk society, Tuathail (1998) suggests that with globalization, more cooperation is needed among member states to deal with various security and environmental issues. Aware of the transnational dangers resulting from the quidity of borders, nations have been forced to adopt a common front towards curbing terrorism, environmental degradation, ethnic nationalism, and other security challenges. This paper examines ways in which destructive technologies will lead to greater international cooperation.

Weapons of mass destructionIn the past few decades, the possibility for the proliferation of weapons of mass destruction has become a reality. The term weapons of mass destruction have become a common security discourse and it has been existence since 1940s (Nash, 1975). The term was heavily used during the clod war era and later on during the 2003 Iraq invasion. It is used to describe the atomic explosive, radioactive, biological and chemical weapons, which have a destructive effect.

2.1 Counter-proliferation activities

It requires international partnerships to prevent proliferation of destructive weapons to hostile states. One of counter-proliferation components being used by the major actors is the deterrence through deployment of military forces and declaratory policies. In addition, the main actors have enhanced their intelligence, surveillance and domestic law enforcement capabilities to enhance detection of the Weapons of Mass Destruction (WMD). The proliferation of the WMD is also being prevented through coalitions. The purpose of these coalitions is to prevent the transfer and transportation of the WMD-related goods (Pitt, 2002). Another major approach being used is the implementation of the export controls to ensure hostile countries do not acquire WMD.

The cooperation between various countries has led to the establishment of the Proliferation Security Initiative. More than 80 countries are committed to the initiative, and so far it has proved successful in the interdiction of equipment related to missile and nuclear activities (Bentley, 2013). However, the implementation of the initiative requires greater cooperation from all countries and more commitment to enforce the national and international laws. International cooperation will also be required in the expansion of the initiative for interdiction of the financial payments between the proliferators and the suppliers. Indeed, according to Bentley (2013) disruption of the financial flows between the proliferators and the supplier countries is one of the strategies that have proved effective. However, to achieve this objective there is need for more coordination between security and financial agencies in a global level. Some of the measures that could be used to disrupt the financial flow include travel bans and freezing of the proliferators’ assets. Another strategy being used is the use of sanctions. Sanctions are already being applied in Iran, to prevent the country from possessing nuclear weapons. The sanctions have affected business and other economic sectors in the country, and have been effective in forcing the Tehran regime to cease the nuclear program. However, for the sanctions to work, international cooperation will play a key role, not only in Iran but other hostile states.

2.2 Non-proliferation activities

The main actors are committed to using diplomatic approach to achieve their non-proliferation goals. In this regard, there is a growing consensus to prevent the proliferation of the weapons of mass destruction by inducing the proliferant states to end their WMD programs. To prevent acquisition of WMD by hostile countries, a number of treaties have also been formed including the Non-proliferation of the Nuclear Weapons treaty. The aim of the treaty is to reverse the spread of the military nuclear capabilities and impede the possession of nuclear weapons outsides the NPT. Multilateral regimes such as the International Atomic Energy Agency have also been formed to regulate the acquisition of the WMD and monitor nuclear-related activities. However, for the agency to operate as intended, cooperation between member states is required. The efforts against the spread of the WMD have also led to the formation of the Biological Weapons Convention and the Chemical Weapons Conventions (Graebner, Dean, and Siracusa, 2008). International cooperation is required to ensure that the provisions of these treaties are observed by the state parties and for the enforcement of the punitive measures incase of the breach of the law.

The multilateralist approach which has been adopted by various countries has already proved useful in maintaining international order. At the same time, diplomatic preventive measures have proved helpful in curbing the spread of the WMDs. So far, diplomatic efforts have been used in the North Korea and Iran to pressure the proliferators to abandon their programs. In the Iranian case, political dialogue was widely adopted to force the government to stop the enrichment programs. The negotiations with the Iranian government are still ongoing, and it is expected the international countries could use to force if the diplomatic strategy fails. To further prevent the spread of the WMD international cooperation will be required. In addition, () observes that greater cooperation will be needed in universalizing laws related to the biological and chemical weapons. Most importantly, enforcement of the existing laws and treaties will required the cooperation will require the input of all the countries including the developing ones.

2.3 United Nations Security Council Resolution 1540Under this resolution, countries are empowered to develop and implement measures aimed at preventing the spread of the WMD. However, as expected, some of the countries especially those in the developing world, lack the capacity to implement the resolution. As a result, the developed countries are mandated to help such nations with the necessary resources to ensure they submit their reports. According to the resolution, countries are required to show their capabilities in regard to the implementation of the border, export and transshipment, and financial controls. It is expected that with time, the resolution will become a legitimate legal and political standard, which brings all the countries together in the prevention of WMD proliferation. This strategy of threat reduction is already being used in Russia through the Nunn-Lunar program. The program seeks to reduce the large quantity of the soviet’s WMD and missile-related materials. In future, more countries will enroll in global partnerships to secure WMD-related materials, reduce fissile materials and minimize the use of highly-enriched uranium. Greater cooperation will also be required in helping countries to develop recycle and fuel treatment technologies that are more proliferation-resistant.

2.4 Combating nuclear terrorismFrom the graph below it is apparent that incidences involving theft of nuclear and radioactive materials have been reported.

Adopted from Hanley (2005)

In future, global initiatives will be necessary in helping countries to develop capacities to combat the theft of nuclear materials. Already, the cooperation between various countries has led to the establishment of the legal frameworks such as the Suppression of Acts of Nuclear Terrorism and the Convention on the Physical Protection of Nuclear Material and Nuclear Facilities. These frameworks are geared towards improving physical protection of nuclear and radioactive materials, securing the civilian nuclear facilities, development of the necessary laws and regulations, and for information-sharing. The Global Initiative to combating nuclear terrorism not only requires the participation of the individual countries but also the private sector. According to Bentley (2013) the private sector will play an important role of securing the transit points and protecting the civilian nuclear facilities. Already the initiative has proved successful in removing weapons-usable material from vulnerable areas and reducing the stockpile of old missiles.

Bombings and terrorism

One of the common tools used by the terrorists is bombs which are delivered by the suicide bombers or are planted at strategic places to inflict maximum harm to the victims. Terrorists mainly target civilian travelling by air and road (see the graph below).

Adopted from Sanders (2005)

In the UK bombings have been quite common and a perfect example is the Clerkenswell bombing which led to the death of 12 people while injuring a hundred others. Likewise, in 1919 the Ireland Republican Army denoted 59 bombs within London. Between 1988 and 2001, the number of the bombings targeting commercial centers, political figures and military bases intensified (Hewitt, 2003). Within time, the IRA attacks have become bigger and more destructive as evidenced by the bombing that took place in 1990 leading to the evacuation of the entire trading floor (Miller, 2005). Another such attack happened in 1993 at the Bishop’s Gate in the City of London (Hamm, 2002). Bombings are not limited to the UK, but have occurred in many other places including the United States. For instance, multiple bombings at Al-Adnaniyah and Al-Qataniyah led to 520 deaths while 1500 persons were injured (Kellner, 2007).

3.1 Improvised explosive devicesExplosive devices refer to bombs and destructive tools that have the capacity to incapacitate and injure a great number of victims. They are used by the terrorist and insurgents and they come in many forms including small pipe bombs. They are delivered by vehicles and are made of explosive chemicals such as ammonium nitrate and urea nitrate. An example of the terrorist IED attack occurred on April 19th in 1999 at Oklahoma. A truck carrying a truck bomb exploded near the federal building (Kellner, 2007). The IED device which was made of ammonium nitrate fertilizer and nitromethane led to the death of 169 victims. Another serious attack occurred on the London transportation system on July 7th, 2005 (Kellner, 2007). The IED attack led to 52 deaths while hundreds were injured. A more serious attack occurred on March 11th 2004 in Madrid (Kellner, 2007). The IEDs were made from bags stuffed with explosives and metal fragments and the event led to the death of 191 people while 1,800 others were injured (Kellner, 2007). The IED attacks not injure innocent victims but also inflict extensive damage to building and public infrastructure. For instance, the IED attacks may lead to the disruption of the power and water systems hence inconveniencing the local businesses.

Terrorist bombings and attacks have negative effect on the affected economies. Just to illustrate further, the September 11th attacks led to huge economic effects resulting from the loss of revenue, business relocation and fall in property values. In addition, the government spent huge resources in rehabilitating the public infrastructure including the damaged underground system. The negative effects of the attack were also felt in the tourism where 25,000 jobs and $13 billion were lost (Kellner, 2007).

3.2 Use of internet in bombings reduction.The internet has had major impact on the global business and is constantly used for communicational over the world. While internet can be used to coordinate business activities, it is also being increasingly used by the terrorists to plan bomb attacks in many parts of the world. According to Stern (2000) terrorists used various tools such as chats, e-mail and message boards to communicate with each and share vital ifnromation. Terrorists have also launched websites which serve as the virtual training grounds and offer the members information related to bomb making. The websites also contain host messages and propaganda videos to motivate the members and to extend the recruitment and fundraising networks. One such network is the As-sahad, the Al-Qaeda’s media arm, which uses the internet and the technology to post footages of roadside bombings. The importance of the internet is well captured by Stern (2000) who observes that it provides the terrorists with a wide audience. At the same time, terrorists have developed sophisticated encryption tools and creative techniques to communicate information in cell groups while offering them a secure means of correspondence. A common technique, used by the terrorists is steganography, which entails using hidden messages in graphic files and email drafts. For communication purposes, some of the terrorist groups are using encryption programs which are then released on the websites. A perfect example is the Mujahedeen Secrets 2 which has encryption capabilities and is deigned to protect the identities and the locations of the terrorists. While internet is used by the terrorist to coordinate bomb attacks, it also provides countries with a perfect opportunity to fight crime. In particular, countries can use the internet facilities to track terrorist activities and come up with innovative strategies of tackling the vice.

3.3 International cooperation

In response to the international terrorism, nations have committed funds towards closing down terrorist sites. At the same time, governments have established agencies to track terrorist groups and individual members. In the UK, the government has increased the funding following the Woolwich attack. Likewise, in the US, the government is committed towards reducing terrorist attacks and apprehending terrorists living the in the country and abroad. As earlier indicated, terrorists use various tools to plan and coordinate terrorist activities. Aware of these facts, countries around the globe have increased their efforts towards collecting data for counter-terrorism purposes. Law enforcement and intelligence agencies all over the world are already cooperating towards developing tools to proactively detect and prevent terrorist activities.

One perfect way in which countries are cooperating to combat terrorism is by establishing online discussions to counter propaganda videos released by the terrorists. The counter-narratives are offered through technology and aims to highlight alternatives to violent activities, while urging the members from enlisting in cell groups. Another example of a global initiative is the Center for Strategic Counterterrorism Communications whose purpose is to reduce radicalization and extremist violence by countering propaganda. Using a wide range of communication technologies, the Center has succeeded in countering advertisements promoting extremist violence in the Arabian Peninsula. The counter-narrative campaign has been expanded to include international agencies and commitment from the governments.

In response to the increasing terrorist activities, countries all over the world have dedicated their efforts towards eradicating the vice. The fight against terrorism has taken an international dimension, whereby countries have pledged to commit resources in fight against the vice. Indeed, as the US president Barrack Obama indicated, the global fight against terrorism is no longer a bounder-less war, instead it will require the cooperation of all countries. Global cooperation against terrorism is already a reality as evidenced by the initiation of the international military campaign. The campaign was initiated following the 11th September, 2001 terrorist attacks. The US government under the leadership of the U.S. president George Bush and in cooperation with the UK and NATO countries developed a plan to diminish the underlying conditions that promote terrorists. These partners also initiated a global strategy to identify, locate and demolish terrorists and deny them the necessary funds required to sustain their terrorist activities.

Despite these efforts, the internet provides the terrorists with many benefits. For instance, the speed, global reach and the anonymity associated with the internet use, ensures that the terrorists are able to quickly preach their propaganda to as many people as possible. Individual countries may also find it hard tracking individual terrorists, hence the need for global cooperation towards eliminating the vice. The global cooperation towards combating terrorism is being promoted in the following fronts.

3.3.1 Establishment of universal instruments related to cyber-crimeCountries are increasing their combined efforts by providing extradition and mutual legal assistance in cases related to terrorism. One of the major legal frameworks being used by countries is the United Nations Convention against Transnational Organized Crime which requires the cooperation of the individual member states in combating terrorism and other transnational organized crimes. The union requires the member countries to establish compatible legal mechanisms and universal counter-terrorism instruments. Another such international union, is the Council of Europe Convention on Cybercrime which encourages cooperation through police and other agencies. The parties in this convention are mandated to share information related to cyber-terrorism and given the dangers associated with terrorism it is expected that the countries will continue to embrace this initiative.

To improve global cooperation, the UK had increased its police and judicial cooperation with the United States. Through agreement the two countries are committed towards sharing strategic information and personal information related to terrorism. In addition, the two states have established treaties to provide extradition and legal assistance. According to Pastor (2009) this treaty helps the two countries to effectively combat cyber-terrorism by simplifying the extradition process, promoting information sharing and enhancing prosecutorial cooperation. Another important step in the fight against cyber-terrorism is the tracking and suppressing the terrorist financing. As indicated earlier, terrorists used technological tools such as the internet to collect funds from the sympathizers all over the world. In a bid to track and prevent terrorist financing, member countries are improving their cooperation through international agreements. For instance, countries have formed jointed efforts to improving international financial investigative tools. Through enhanced collaboration, member countries have worked together towards designating terrorist individuals and groups. According to the existing legal framework, for an individual or a terrorist group to be removed from the list, there must be a unanimous agreement among all the member countries. As a result of the increasing partnership between countries some of the terrorists groups such as the Kurdistan Worker’s Party and the Revolutionary Armed Forces of Colombia have been added to the terrorist list. However, to ensure these groups do not access the required financing, global cooperation is required.

3.3.2 Sharing of dataThe internet has made it possible for the terrorist to clandestinely perform terrorist activities, an event which calls for greater partnership. Aware of this fact, the US and the EU countries have recognized the importance of sharing information by establishing the necessary agreements. At the same time, governments are improving the investigative capabilities of their security agencies. Just to illustrate, with the cooperation from other intelligence agencies, the U.S. National Security Agency has initiated surveillance activities. However, there have been privacy concerns about the PRISM programs and unless such concerns are addressed, the international counter-terrorism activities are likely to continue.

Global climateScientists suggest that the planetary ecosystem is changing as result of accumulation of greenhouse gases. One of the common sources of the greenhouse gases are the industries and it is for this reason that countries have committed to cutting down industrial emissions and reduce carbon foot print. According to Ruddiman (2005) the increase in the GHG emissions is associated with the industrial revolution which started in Britain in 1700s. Factory facilities and machinery has also led to the depletion of natural resources, leaving the environment permanently damaged. Another likely cause of the greenhouse gases emissions is the nuclear weapons.

4.1 Nuclear weaponsAccording to Weart (2012) a major nuclear exchange could negatively affect the climate change. Weart (2012) uses the example of the nuclear exchange between Pakistan and India which led to a rise in temperature around the Asian Monsoon regions. The intense heat generated by the nuclear weapons and the smoke resulting from burning of building would drift into the stratosphere. Air pollution also occurs during the development and testing of all aspects related to military weapons. The nuclear weapon testing has the most adverse effects by releasing smoke and heat into the planet’s systems. However as indicated on the graph below, nuclear testing activities have decreased tremendously. Testing of the artillery shells, bombs and chemicals also affects the quality of the air.

Adopted from Weart (2013)

4.2 Chemical and heat-producing weaponsChemical weapons were used extensively during the WW2 and most recently in the Iraq-Iran war. The chemical weapons not only pollute the air but also cause deaths and injuries. Use of incendiary bombs has been found to produce firestorms which lead to air pollution. The available literature has also shows that during the World War I, World War II, the Spanish civil war, and the war of Ethiopia, temperatures increased dramatically due to the extensive use of ballistic missiles, flying bombs and atomic bombs. International cooperation will also be necessary in the development of environmentally friendly technology and:

Regulating the use of destructive technologies

Development and deployment of new technologies (Victor et al, 2005)

ConclusionThe international security is threatened by the proliferation of WMDs in the hostile states. In response, the international community has adopted counter-proliferation strategies whose successful implementation requires the participation of all countries. International cooperation will particularly be important in putting pressure on non-compliant states and putting into place effective monitoring mechanisms. The available literature has also established that international peace and order is under threat from bombs and explosive devices. To combat the vice, countries have adopted a common approach by establishing the necessary anti-terrorist laws and by establishing legally binging pacts. International cooperation will remain vital in tracking and profiling terrorists and cell groups and prevention of terrorist activities. In addition, the global climate is threatened by heat producing weapons and nuclear testing activities.

Reference list

Bentley, M., 2013. War and/of Worlds: Constructing WMD in U.S. Foreign Policy. Security Studies, 22, 68–97.

Graebner, N. A., Dean, B. and Siracusa, M., 2008. Reagan, Bush, Gorbachev: Revisiting the End of the Cold War. Princeton, N.J: Princeton University

Hamm, M., 2002. In Bad Company: America’s Terrorist Underground. Boston: Northeastern University Press

Hanley, C., 2005. Nuclear security is up, smuggling’s down, but terrorism’s ultimate nightmare lingers on. San Diego, CA: Associated press

Hewitt, C., 2003. Understanding Terrorism in America: From the Klan to Al Qaeda. London; New York: Routledge

Kellner, D., 2007. Guys and Guns Amok: Domestic Terrorism and School Shootings from the Oklahoma City Bombing to the Virginia Tech Massacre. Boulder, CO: Paradigm Publishers

Miller, R., 2005. Writing at the End of the World. New York: University of Pittsburgh Press

Nash, T., 1975. Nuclear Weapons and International Behaviour. Kluwer Academic Publishers

Pastor, J. F., 2009. Terrorism & Public Safety Policing: Implications of the Obama Presidency. New York, NY: Taylor & Francis.

Pitt, W.R., 2002. War On Iraq: What Team Bush Doesn’t Want You to Know? New York: Context Books

Ruddiman, W. F., 2005. Plows, plagues, and petroleum: how humans took control of climate. Princeton, N.J: Princeton University

Sanders, K. 2005. After Oklahoma City: A Grieving Grandmother Uncovers Shocking Truths about the bombing and Herself. Arlington, TX: Master Strategies.

Stern, J., 2000. The Ultimate Terrorists. Cambridge, Mass.: Harvard University Press

Tuathail, G., (1998) De‐Territorialized threats and global dangers: Geopolitics and risk society. Geopolitics, 3:1, 17-31

Victor, D. G. et al., 2005. A Madisonian Approach to Climate Policy. Science 309: 1820–1821.

Weart, S., 2013. The Rise of Nuclear Fear. Cambridge, MA: Harvard University Press, 2012