Counterterrorism Activities Term Paper

PAGES
8
WORDS
2703
Cite
Related Topics:

Combatting Future Terrorism Fighting future terrorism

Over the years, the U.S.A. government and the entire world has been battling with the issue of terrorism. This is because the act of terrorism has diverse faces, from the rebel terrorists, the insurgents, bioterrorism to the religious sect terrorism. The U.S.A. has in particular been busy figuring out the various ways to not only stop the terrorism act before it happens, but more significantly to hinder the development of the terror groups from developing into fully fledged organizations. The U.S. is not alone in this and many nations have invested heavily in the same and some of the internationally known counterterrorism forces are S.A.S. (Special Air Service), the GSG-9, The Navy SEAL Team 6, SFOD-D (Delta Force), and CIA Special Activities Division (SAD). The SAS belongs to the British Military and the GSG-9 Germany. The Navy SEAL, Delta Force, and SAD are United States specialized counterterrorism forces.There have also been a lot of investments in terms of time and money into finding the best ways to respond to the terrorism once it happens. This paper will look at the various acts of terrorism in their diverse forms and how a country like the U.S. can avoid falling victim to such acts in the future. It will also discuss the measures that have been taken in the past and the gaps that were realized and how these can be used as learning steps to form a stop strategy for the future. The paper will take, in most of the cases, effect and solution for the future approach in highlighting the measures that different players within the security docket and from outside can take in combating the threat of terrorism within the U.S.A. And even abroad.

Causes, effect and measures against terrorism

The illegal migration is and has been one of the biggest concern for the government since it has been attributed to numerous forms of crimes raging from prostitution, gun trade, identity theft, drug trafficking, gang violence and even terrorism. The September 11 terrorist attack was strongly attached to illegal immigrants like Mohammed Atta who even at the time of the attack had expired Visas. According to Krinkorian Mark, in his statement while testifying before the House of Representatives, he indicated that of all the 48 Al Qaeda affiliated terrorists that have taken part in the acts of terror within the U.S.A. between the years 1993 to 2001, 12 of them were found to be illegal immigrants, 7 were found to be those who have overstayed beyond the stipulated time on their visa (U.S. Department of Homeland Security, 2013:Pp 39). This is a shocking statistics that calls for reforms and continue evaluation and vigilance at the borders and our immigration offices and systems. One way of combating this predisposition to terror through illegal immigrants is to strictly apply the immigration laws so that those who are legally allowed within the country stay, that way it would help weed out the terrorists. The other measure would be to fine the businesses that employ, hence sustain the illegal immigrants. This will ensure there is no source of sustenance for the terrorist hence they will not consider coming into the country. There should also be the use of latest technology at the porous borders like that between the U.S. And Mexico, the kind of technology to be deployed in such areas will help make identification of illegal immigrants and effectively potential terrorists and apprehend them to face the law and/or get deported to their countries of origin.

Terrorists have always targeted places that are vulnerable and have a large number of people. This has made office blocks and train stations as well as the sports areas some of their prime targets. Homeland security department through the OSHA -Occupational Safety and Health Administration -- have over the years ensured that they have developed and explained a matrix that gives the employers guide at the places of work. Adherence to the guidelines and matrixes to safety form terrorism will significantly reduce vulnerability of work places to terrorism in the future (Counter Terrorism, 2011).

Bioterrorism is yet another kind of terrorism that is both real and feared by many since it leaves the victims, intended and unintended, very vulnerable as the biological weapons act indiscriminately as long as one breathes the air. Biological weapon are any kind of organism that can potentially be used to kill the people exposed to the organism. These organisms include viruses, fungi or the bacteria that exist naturally or can be cultured in a laboratory....

...

Lately, a large number of countries are obsessed with the possession of the biological weapons, making concerns to rise over the possibility of terrorists using these weapons for terror purposes (Daniel J. Dire, 2011). There is need to have a very controlled access to laboratories where these organisms could be cultured for research purposes. The government needs to let people know and run rigorous campaigns on the signs of biological weapon use and how citizens can detect when one is illegally culturing these organisms. One of the central surveillance measures that should be implemented fully is the proper funding for the automation and utilization of the high-throughput laboratory where Dr. Scott Layne has focused a lot of his efforts in ensuring that the capability of this facility for infectious disease is effective. This is a laboratory that can play a significant role in the surveillance of possible bioterrorism agents as it is possible to carry out more than 10,000 tests per day. With such a facility, we will be sure to be able to get results from the laboratory within the shortest possible time. There needs to be preemptive measures taken especially in line with prevention of bioterrorism and this can be well, done through effective surveillance of infections and diseases that could be used as bioweapons. One such preemptive surveillance measure is the early detection and rapid response to any threat that may be insinuated. Early surveillance or detection can be made possible by the use of syndromic surveillance, which is the monitoring of the patterns that nonspecific symptoms may portray so as to detect any possibility of an epidemic induced by the bioterrorism agents. This continuous surveillance is important as the initial symptoms are usually nonspecific. For instance, when one person displays symptoms of anthrax attack, that may not be considered as a case of bioterrorism, but when the surveillance detects a sudden increase in the cases, then this would attract their attention. Syndromic surveillance alert uses the nonspecific data throughout the population and is not only based on the positive identification of symptoms (Adam Szpiro et.al., 2007).
The other surveillance method that has the potential to do well and give a fast and accurate data is the surveillance using the cell phones. This is an improvement from the traditionally used syndromic surveillance that uses zip codes to indicate the areas under attack or that are affected. The cell phone will alleviate the dilemma of geographical location since it will indicated the exact location where the person reporting a possible attack is and the movements hence the data on the possible bioterrorism can be collected and an effective tracking be done. This method will need volunteers from various parts of the country who will be reporting on their daily health and a pattern change in their health can be monitored and incase there are symptoms that are similar and conform to a possible bioterrorism, then their history of convergence will be traced via the GPS system and a possible source identified (Debbie A. Tavers et.al., 2003). This is a much easier method in tracing the sources of the bioterrorism that syndromic surveillance that will only come up with and indication of n area under bioterrorism but not the source.

The issue of radicalization is a matter that worries the correction department since it has been a trend that the suspected terrorists who are put in confinement do actually propagate their activities into these cells. The correction department handles the terrorists awaiting trial as well as the sentenced terrorists. It is also within the correction facilities that potential terrorism activities can be planned. This makes the correction department not longer the traditional holding facility and correction duty and mandate but also the investigative duty has to be included within the ranks (Jess Maghan & Robert J. Kelly, 1989). This means hence that the correction facilities must be equipped with specialists in the field of interrogation, those who know how to read the behaviors of criminals so as to act as a facilitation to the FBI in the process of gathering information that is important in the fight against terror. It is important to remember that it is within the incarcerations that the hardcore criminal and terrorists are held hence the capability of the correction department to handle them different from the other criminals must be provided. As Peter R. Neumann (2010) notes, the terrorists are not ordinary offenders, but are offenders who will spend their time in…

Sources Used in Documents:

References

Adam Szpiro et.al., (2007). Health Surveillance and Diagnosis for Mitigatinga Bio-terror Attack.

Lincoln Laboratory Journal. Vol.17 No.1. Retrieved March 7, 2014 from http://www.ll.mit.edu/publications/journal/pdf/vol17_no1/17_1_5Szpiro.pdf

Counter Terrorism, (2011). Community Preparedness. Retrieved March 7, 2014 from http://www.counterterrorismtraining.gov/comm/index.html

Daniel J. Dire, (2011). Biological Warfare. Retrieved March 7, 2014 from http://www.emedicinehealth.com/biological_warfare/article_em.htm
Electronic Data Availability, Timeliness, Sources and Standards. Retrieved March 7, 2014 from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1479948/
Agent Rodney Stich. Retrieved March 7, 2014 from http://www.defraudingamerica.com/stich_bio.html
Retrieved March 7, 2014 from http://www.jmfcc.com/Incarcerated%20Radical.pdf
Justice Processes. Retrieved March 7, 2014 from http://www.unafei.or.jp/english/pdf/PDF_rms/no58/58-05.pdf (pg40-57)
Countries. Retrieved March 7, 2014 from http://icsr.info/publications/papers/1277699166PrisonsandTerrorismRadicalisationandDeradicalisationin15Countries.pdf
US Department of Homeland Security, (2013). Citizenship, Naturalization Regulation and Procedures Handbook: Practical Information and Contacts. International Business Publication: Washington DC. Retrieved March 7, 2014 from http://books.google.co.ke/books?id=GcYCAQAAQBAJ&pg=PA39&dq=out+of+the+48+al-Qaeda+operatives+who+committed+crimes+here+between+1993+and+2001,+12+of+them+were+illegal+aliens&hl=en&sa=X&ei=wRwnU5bVMuHoywPV9IGYAw&ved=0CCwQ6AEwAA#v=onepage&q=out%20of%20the%2048%20al-Qaeda%20operatives%20who%20committed%20crimes%20here%20between%201993%20and%202001%2C%2012%20of%20them%20were%20illegal%20aliens&f=false
Policies and Actions in the Middle East? Retrieved March 7, 2014 from http://www.pbs.org/wgbh/globalconnections/mideast/questions/uspolicy/


Cite this Document:

"Counterterrorism Activities" (2014, March 18) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/counterterrorism-activities-185367

"Counterterrorism Activities" 18 March 2014. Web.24 April. 2024. <
https://www.paperdue.com/essay/counterterrorism-activities-185367>

"Counterterrorism Activities", 18 March 2014, Accessed.24 April. 2024,
https://www.paperdue.com/essay/counterterrorism-activities-185367

Related Documents

Each level of the counter-terrorism strategy present in the United States has its own flaws and its own weaknesses. Law enforcement cannot be left behind in the pursuit for more professional counter-terrorist elite units. The New York Police Department sets the bar for what municipal police can put together in terms of counter-terrorism, NYPD Shield, as its known, has conducted several successful operations since its inception in the aftermath of

Counterterrorism and Intelligence Framework Terrorism has been the greatest threat to American soil since the end of the Cold War, and the country has responded to these threats by creating an elaborate counterterrorism and intelligence framework. This counterterrorism strategy must use every possible tool in America's arsenal, and must meet the highest standards in excellence for the duty it is tasked to perform. The nature of terrorist threats in America in

Therefore, in understanding how counterterrorism works, you will come to understand this as a force which is concertedly interested in obstructing the financial avenues that have helped terrorists to perpetrate their grimmest successes. Even in these though, evidence has emerged to suggest that there is much value in the strategy of disrupting financial flow. According to the Feiler (2007) text, "execution of terrorist activities requires a reliable cash stream.

Counterterrorism Counter-Terrorism Counter-Terrorism Framework The author of this report is asked to answer to a number of questions relating to counter-terrorism frameworks. First, the author is asked to provide a revised framework for the national terrorism prevention and response agencies in the United States. Per the parameters of the assignment, there are to be at least three agencies involved in the revised framework. Subsequent to that, the author is asked to answer to

Counterterrorism In the contemporary world, terrorists are groups or individuals who use covert warfare to press for political, social, or cultural reform. Rather than using the political process though, they believe that violence is the only way they can prove to the world that their cause is just -- and the psychological terror engendered will engage the world, if not in sympathy, then at least in acknowledgement and fear that their

Counterterrorism Training Program Terrorism is a fact of modern life. On one level, it cannot be understood; it is difficult to empathize with those who have no empathy of their own and cause enormous suffering in the name of their own beliefs. On another level, however, there are components of terrorism that can be understood -- their tactics and methods, their choice of targets and more. Because terrorism is aimed at