Verified Document

Counterterrorism In The Contemporary World, Terrorists Are Thesis

Counterterrorism In the contemporary world, terrorists are groups or individuals who use covert warfare to press for political, social, or cultural reform. Rather than using the political process though, they believe that violence is the only way they can prove to the world that their cause is just -- and the psychological terror engendered will engage the world, if not in sympathy, then at least in acknowledgement and fear that their cause is just. For example, in the modern state of Israel, there is some type of incident almost every week. Palestinian terrorists often send suicide bombers into mass transit, restaurants, and schools; all in the name of making the game so violent that Israel will back down simply to stop the terror. This idea that violence will change political and social events often stems from a particular reading of Karl Marx -- in that terror will create and prolong a revolution, which will spring from violence, and like a set of dominoes, eventually take form for drastic social and political change. Thus, for terrorists, the utilitarian approach (the ends or the results justify the means) requires that some will die so that society, in the long-term, changes for the better (Booth, 2002; Kegley, 2002). The history of the millennium has been, quite frankly, a failure in terms of counterterrorism: the large States set up colonies, then dictatorial client states, then forced democracies -- all to no avail. As pessimistic as it sounds, "there is no national authority that can be effective against terrorism" (Lemann, 2010). Accounting for and understanding the impact of these restraints and disincentives to terrorist use of WMD will likely serve as a tool in any counterterrorism campaigns (Parachini, 2003).

Briefly, counterterrorism is the tactic, practice, techniques, and strategies that are used to mitigate terrorist incursions. Terrorism may...

One seminal fact that we have learned from 9/11 and Hurricane Katrina, to name but two, is the need to harness technology to link multiple agencies to information in both strategic and tactical ways that will help ensure a better, more robust and positive response to any terrorist activity. In addition, linking this data to the operations and management sides allows for a greater integration of both strategic and tactical planning; saving money and providing greater control and ultimately positive outcomes. The solution, of course, is harnessing the power of the Internet and electronic communication to make the process of interagency communication seamless. There are numerous formats for this, but the key element is the structure and nature of using the communication system to provide the needed information on a time sensitive basis (Kiras, 2007, Chapter 7).
Perhaps the most proactive organizational template for a counterterrorism program would consist of three interconnected parts; each feeding into the other, designed to form the basis of intelligence gathering, analysis and planning, and then tactical operations.

Intelligence -- Intelligence is based on the complexities of human security and is non-military in its design. This is a broad level department that requires access to information to the nth level. Since terrorism can include anything from poisoning of the food or water supply to actual weapons of mass destruction, there must be electronic surveillance combined with human intelligence and analysis that occurs to help spot and mitigate trends. The use of computer systems are vital, and the only agency that seems to have the…

Sources used in this document:
WORKS CITED

Bamford, J. (2003). Body Of Secrets: Anatomy of the Ultra-Secret National Security Agency. New York: Random House.

Bolz, F.; Dudonis, K.; Schultz, D. (2005) The Counterterrorism Handbook: Tactics, Procedures, and Techniques. Boca Raton, FL: Taylor and Francis.

Booth, K. And T. Dunne, eds. (2002). Worlds in Collision: Terror and the Future of Global Order.

Palgrave.Kiras, C. (2007). The Critical Role of Interagency Cooperation. In J.Forest, ed. Countering Terrorism and Insurgency in the 21st Century. Westport, CT: Praeger.
http://www.newyorker.com/arts/critics/books/2010/04/26/100426crbo_books_lemann
Cite this Document:
Copy Bibliography Citation

Related Documents

Counterterrorism Course the Central Reason
Words: 330 Length: 1 Document Type: Term Paper

I am also aware of the way that disinformation and false data can be a terrorist tactic and I have been very cautious about accepting information at face value - especially sources obtained from the Internet. An aspect of this subject that is fascinating is the causes of terrorism and the way that these causative factors can be used in strategies to combat terrorism. In other words, terrorism arises from

Community Outreach and Counterterrorism With Efforts Towards
Words: 2487 Length: 8 Document Type: Research Paper

Community outreach and counterterrorism with efforts towards exploitable weaknesses. Community Outreach and Terrorism International and domestic terrorism have reached levels previously believed to be impossible. Whether fueled by profits they get from trafficking drugs or whether they are fueled by religious ideologies, a series of communities express particular interest in wanting to get actively involved in performing activities characteristic to terrorist organizations. Many governments have the tendency to focus on fighting them

Movement of Military Air Freight Post 9 11 World
Words: 3329 Length: 11 Document Type: Term Paper

How Military Air Freight Moves in Post-9/11 WorldIntroductionThe American armed forces seemingly dictate state-on-state war. Its last true challenger in the military arena was the disbanded Soviet Union. The latest conflicts like Iraqi Freedom, Panama, Desert Storm (Iraq), Libya, Kosovo, Bosnia, and Afghanistan demonstrate that the American military has succeeded in accomplishing its classic military goals against other nations’ armies in various circumstances. Accomplishing military goals of political significance against

Transportation - Security Contemporary Transportation
Words: 6826 Length: 25 Document Type: Research Proposal

By federal law, all passenger airliners now feature cockpit doors that are locked by the pilots from inside the cockpit. Likewise, pilot training now includes the specific instructions not to open the door in response to any occurrence or emergency in the passenger cabin; instead, pilots are under instructions to land the aircraft immediately in response to any perceived emergency that would have previously been cause to investigate beyond

Israel Internal Security Case Study
Words: 3974 Length: 15 Document Type: Case Study

What are the recognized threats Recognized threats on a national and international level include, expansion of international terrorism, as a result of universal fundamentalist Arab calls for violence against those who oppress Arabs. Israel is at the center of this conflict as the most regionally active, non-Arab state and as a result of historical actions taken by it to maintain itself and its territories, both recognized and occupied. Short contemporary history of

Counter Terrorism You Are a
Words: 1939 Length: 6 Document Type: Term Paper

Therefore, regardless of their system of manifestation, they are considered by the law suspicious of any possible acts of violence. The government is the highest authority to impose rules and regulations. Despite the fact that there are local governments as well, at the level of the federal one, action needs to be taken. For instance in schools, the government may offer free access to the internet. Possible programs that would

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now