Terrorist Tactic:
Terrorism has emerged as one of the major security threats across the globe in the past several years. The severity of this global threat has been evident through the various terrorist attacks that have occurred in the past few decades, especially the 9/11 attacks. Actually, the aftermath of the 9/11 attacks was characterized with increased fears that terrorist groups like al-Qaeda will attempt to carry out other large attacks against the United States. One of the major reasons for the increase in terrorism is the use of various tactics by these individuals or groups. As the world continues to experience tremendous changes, terrorists and terror groups continue to develop new, sophisticated means and tactics of carry out their activities. While some of these activities may be carried out for similar reasons, they tactics employed in achieving these goals vary from time to time.
Recent Terrorists Tactics:
As previously mentioned, terrorist tactics continue to vary and become sophisticated from time to time because of rapid technological advances that have characterized the contemporary world. Since the 9/11 attacks several terror acts have been carried out successfully while others have been foiled. The death of Osama bin Laden is 2011 increased fears that the United States would experience another large terror attack in attempts to revenge. However, at least nine of Islamist-inspired terror plots have been foiled since then, which has brought the number of foiled terror plots to at least 50 since the 9/11 attacks (Carafano, Bucci & Zuckerman, 2012, p.1). Most of the foiled plots have been planned by visitors who have been radicalized in the country, American citizens, and legal permanent residents. These individuals and groups have attempted to carry out these attacks through the use of various tactics that shift from time to time based on societal changes and attempts to make it difficult for law enforcement agencies to foil the plots.
The shift in terrorist tactics is also fueled by attempts to exploit vulnerabilities and avoid effective counter-terrorism measures. Notably,...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now