Explain the origins and evolution of long-term separatists and ethnic and nationalistic terrorism. Also, provide group names and their respective parts of the world.
Ethno- separatist/nationalist terrorism is not specifically a modern phenomenon. Historically, two Jewish movements in Judaea that desired to provoke the local population to rise against the Roman occupiers used ethno-racial terrorism. However, it was only in 60s and 70s that terrorism came to be associated with ethnic- separatist/nationalist movements (Conser, Paynich & Gingerich, 2013). During that time, terrorism was seen as paying off on the reasons for effective, aggressive campaigns launched and won. The Palestine Liberation Organization's terrorist movement between 1968 and 1980 confirmed to other nationalist groups that internationalizing their cause could be valuable. The variety of ethnic-national/separatist terrorist movements effective worldwide, therefore, increased from three in 1968 to 30 in 1978 (Cassara, 2006).
Psychologists argue that the formation of a large-group identity is recognized as a standard trend, usually evolving from specific conditions, such as traditional continuity, a myth, geography and other shared activities. Hence, how a particular team conceives of its ethnic identification is almost usually a practiced indifference from other groups. Mostly, one group's ethnic identification is strengthened by a trauma or the combination of a disaster that once affected the group's ancestors. As seen from the Serbs' 1389 victory over Kosovo (Fijnaut & Paoli, 2004) trauma can cause varied reactions to reverse the feelings of loss, humiliations, and revenge introduced such as ethnic rivalry against those considered accountable. More accurately, such an injury or severe dislocation can cause a psychological defense procedure that needs the development of an "enemy. It becomes the base of combined self-loathing, anger, and anxiety, resulting in ethnic assault. If a particular team seems depressed or anxious, it will combine with its ethnic identity, nationality or religion, the latter providing as guards from further problems.
Nowadays, Ethno- separatist/nationalist terrorism predominates over all other types of terrorist action. The number of global active terror groups increased from 1992 to 1995 (Sampson, Blakeman & Carkhuff, 2006). This period had the most serious terror attacks all sharing some connotations. By evaluation, ethnic-nationalist/separatist movements do not cause huge casualties on their targets and are more appropriate in selecting their targets than their modern counterparts. The goal of the former is keeping the level of assault bearable for the local inhabitants in order not to alienate worldwide opinion and create severe government countermeasures. The latter are much less involved with such requirements, their goals obviously being different. Ethnic-Nationalist/separatist movements are more long-term than other movements, which have the possibility of remaining effective as long as ten years. Ethno-nationalist/separatists have apparent objectives and can depend on their rivals for support. This is through appealing to a combined revolutionary tradition to maintain the group's existence and renew its positions. Neo-nationalist groups are active, but they are not for the most part using threats nor supporting violence in any way.
Explain why domestic terrorism is hard to define. List the factors that improve and inhibit our understanding of it. What steps has law enforcement undertaken to understand it, and what factors exist that have impeded our understanding of it?
Historians like Bruce Hoffman suggested that domestic terrorism is difficult to define mainly because the significance of the phrase has modified so regularly over previous times. Furthermore, Jenkins suggested that domestic terrorism should be described "by the nature of the act, not by the identity of the perpetrators or the nature of their cause." A few more factors make it hard to understand the depth of domestic terrorism in America. First, keeping track of the number of terrorist persecutions has been challenging in the post-9/11 era. Second, there may be some indecisiveness in the investigative procedure regarding precisely when illegal action becomes domestic terrorism. Third, the government seems to use the terms "terrorist" and "extremist" interchangeably when referring to domestic terrorism. It is uncertain why this is the situation. Lastly, and most significantly, which particular groups are and should be regarded domestic terrorist organizations? The federal government does not offer a public response to this question. Rather, it describes the problem in terms of "threats," not movements (Shanty & Mishra, 2007). In order to understand this, law enforcers have undertaken the following actions:
Counting Terrorism Cases
While legal and practical government descriptions are available for "domestic terrorism," there is little sense of the scope of the threat of domestic terrorism based on publicly available government information. It has been said that in much of the post-9/11 period, the legal courts can use different factors when organizing, keeping track of, and categorizing all kinds of terrorist prosecutions -- let alone domestic terrorism cases. A 2009 research discovered that the U.S. Federal Courts, National Security Department, and state prosecutors should depend on various procedures to figure out whether or not particular cases include terrorism at all.
Extremism vs. Terrorism
Another factor that dominates conversations of domestic terrorism is "extremism." The latter phrase is widely applied on native players, whether they are domestic terrorists or enthusiasts of ideologists submitted by international movements such as Al Qaeda. Jonathan Masters, a nationwide security professional, has recommended that law enforcers view "extremism" as mostly symbolic of "terrorism." He has also discovered that there is a "lack of consistency in the way domestic terrorist actions is prosecuted" in America. Using the phrase "extremist" allows prosecutors, investigators and policymakers the versatility to talk about terrorist-like action without branding it as "terrorism" and having to take legal action against it as such (Kessler & Bearden, 2007). This versatility is certainly a resource to prosecutors. They can change subjects of FBI domestic terrorism research under a broader range of laws and, consequently, not explain the subjects openly as terrorists. However, for policymakers this versatility makes it difficult to figure out the magnitude of the domestic terrorist threat. One cannot obtain a clear sense of magnitude if some people are charged and openly described as terrorists. It is even hard when others are mentioned as extremists, and still others get into the criminal record only as criminals implicated on offenses not associated with terrorism like tax fraud, arson, and trespassing.
Official Public List
The government should generate an official public list of domestic terrorists and terrorist organizations. The development of such a record may be precluded by civil rights concerns. However, a lack of formal lists or procedures to assign groups or people as domestic terrorists makes it difficult to assess domestic terrorism patterns and assess government initiatives to counter such risks.
Describe the intelligence process.
The intelligence process has five steps. These steps are planning and directing, collecting, processing and exploiting, analysis and production, and lastly dissemination and integration.
Planning and Direction: planning and directing includes managing the whole efforts from identification of the need for information to delivering the intelligence product to consumers. It entails the implementation of plans to fulfill the requirements imposed on the FBI and identifying collection specifications depending on the FBI needs. This phase is responsive to the end of the cycle because finished and current intelligence supporting decision-making produces new specifications.
Collection: this step involves gathering raw information depending on the specifications. Activities like surveillance, interviews, human source operations, liaison relationships, and searches leads to the collection of intelligence.
Processing and Exploitation: in this phase, analysts convert the collected information into usable forms. They achieve this via various methods like language translation, data reduction, and decryption. Processing involves keying in raw data into databases to be exploited in the analysis process.
Analysis and Production: this is where the raw information is converted into intelligence. In involves combining, analyzing and evaluating available data, and preparing intelligence products. The reliability, relevance, and validity of the information is evaluated and weighed. The information is integrate din terms of logic, put into context and used to generate intelligence. The intelligence product connects the dots by putting the collected information into context and generating conclusions regarding its implications.
Dissemination: the raw or finished intelligence is distributed to consumers whose needs led to the intelligence specifications. The FBI disseminates the product in three products: FBI Intelligence Bulletins, FBI Intelligence Information Reports, and FBI Intelligence Assessments (Simon, 2006). The customers make decisions based on the information. These decisions can lead to imposing more specifications; hence, the FBI intelligence cycle might continue.
What is the difference between national security and criminal intelligence? How does this difference relate to the efforts of those who combat terrorism and violent extremism?
National security is the need to maintain the survival of the country by using financial power, diplomacy, political power, and power projection. The idea emerged mostly in America after World War II. Initially concentrating on military power, now it involves a range of elements including the non-military or economic security of the country and the values espoused by the nation. Criminal intelligence has been described as the product of methodical collecting, assessment, and integration of raw information on individuals…