Challenges for US Counter-terrorism Efforts
As a direct consequence of September 11, a number of substantial challenges lie ahead in the area of counter-terrorism.. The most prominent of these is the changing nature of the terrorism phenomenon. In past years, when terrorism was largely the product of direct state sponsorship, policymakers were able to diminish prospects for the United States becoming a target using a combination of diplomatic and military instruments to deter potential state sponsors. Today, however, many terrorist organizations and individuals act independently from former and present state sponsors, shifting to other sources of support, including the development of transnational networks.
Many
…show more content…
Vital to this are on-going threat assessments. Effective threat assessment is the need for abundant, timely and useable intelligence, about potential terrorist sponsors, perpetrators, activities and targets, as well as intelligence to guide our prevention and preparation activities and programs. Despite the transnational nature of many terrorist groups, challenges to integrating foreign intelligence with domestic law enforcement information remains.
Central to threat assessment is intelligence to help develop our own targets to deter or punish state sponsors. In this regard, the development of long-term human source intelligence [HUMINT] is often cited as a vital component in building our ability to preempt attacks. Critical to threat assessment is the need to get smarter, not just in protecting against the threat from outsiders, but smarter about the threat posed by people with legitimate access. This includes acts of carelessness by insiders. A chain is only as strong as its weakest link. We need to continue our efforts to enhance our vigilance to minimize any potential threats posed by third country nationals- for example, threats posed by outsiders working at U.S. embassies and military installations overseas.
Critical to threat assessment is a better understanding of the countries and
Homeland Security is characterized by crime control being the primary police function. It is best achieved through a collective effort by all law enforcement agencies. One of the strategies being used is Intelligence Led Policing. This strategy is not new, it can be traced back to the British is the 1990’s (Bailey, 2011). Intelligence Led Policing is an approach to crime that deals with all crimes and threats including terrorism. This approach is unique because it is threat driven instead of incident driven. It also is a long term approach and focuses on causes and conditions that add to crime through a collection of data.
As we have seen throughout the entire history of warfare, ancient world terrorism, political intrigue and elitist terrorism of the middle ages, and into modern terrorism, intelligence is of vital importance on both sides. Armed forces have always used intelligence of some form be it sneaking up a hill and scouting what is on the other side to the use of modern platforms such as
The 9/11 attacks opened the avenue for a scrutiny of the performance and ability of the intelligence community to detect any threats to the safety of the United States. The media, politicians, reformists and other interested parties would not comprehend how such an attack would happen without the knowledge of the intelligence community. However, it is important to consider the fact that the attack was one of its kind and could not be approached with the resources and expertise used in other initiative such as the cold war. Therefore, the need to restructure the intelligence community arose from the view that it was still operating in the mindset and spirit of the cold war even in the modern era that had seen a revolutionary change of warfare
Compare and contrast the pre and post 9/11 law enforcement response to terrorism. What strategies could be implemented to increase future law enforcement capability in countering terrorism?
Good evening to all. I hope all is well this week. As many of you have stated, I thought I had a descent grasp of the United States Intelligence oversight. However, to my surprise I found that I actually did not have as good of an understanding as I thought. My shortcoming was in understanding just how convoluted the system is. The system has evolved over the years just as many things do. However, the system still has a long way to go before it’s as effective as it could be. Former Under Secretary Charles Allen noted that “virtually any terrorist attack on the homeland that one can imagine must exploit a border crossing, a port of entry, a critical infrastructure, or one of the other domains that the department has an obligation to
Crimes are the result of individuals that do not follow established laws of the land. Criminals can either be individuals or they can be organized groups. The best way for law enforcement to handle the challenges of criminal element is to understand their strategies and then counter them. The purpose of this paper is to review domestic terrorism-related intelligence and how it is related to criminal intelligence. Using criminal intelligence is the first step in dealing with criminal elements. The data is compiled, analyzed, and then sent out in an
The attack on the World Trade Center was not the first attack and was not the first time the US Intelligence Community had heard of Al-Qaeda or Osama Bin Laden. The role of counterintelligence from both sides the US and Al-Qaeda, lent to the information flow not only form the attackers but also to the ones who would ultimately respond. The FBI, the CIA, the DIA, have integral parts in these series of events from the information collection to the information flow. In a time where it was realized that Counterintelligence and Counterterrorism have a similar need, as well as information sharing across agencies, have led to the CI and IC we see today.
When the September 11, 2001 attacks occurred the United States responded in a manner which was seen as a traditional reaction to such an attack; it used its overwhelming superior military to invade the nation of Afghanistan. As Afghanistan was the operating base of the terrorist group responsible for the attacks, Al Qaeda, the invasion all but destroyed the group's operating capacity. But in response to the United States' apparent victory the terrorists have re-organized themselves into a looser confederation and turned to alternative methods of finance and operation. One could say that the success of the American military's answer to the September 11th attacks have created a new environment in which terrorists currently operate. This includes the use of the internet, unconventional alliances with international criminal organizations, as well the inception of the "lone wolf" terrorist. Faced with these new type of threats, the United States and its allies must find a way to identify and deal with them.
Canada should assist in ensuring that at risk states have the intelligence capacity necessary to prevent terrorism and to conduct meaningful risk assessments. It is also important not to rule out all source intelligence when available. The cumulative intelligence gathered by all sources can help develop a holistic picture of complicated threats such as terrorism. Each source of collection provides information about the threat and about the capabilities and intelligence of the terrorist.
Terrorism has become a main threat to the peace and development in the U.S and the world as a whole. Past experiences of terrorism such as the September 11th attack in the United States has a created the need to have a functioning counters intelligence which will effectively deal with terrorism. However, for the counter intelligence to be effective, other basic functions have to be played out. The basic functions are collection and analysis. The other function is the execution of covert actions and the major role is the counterintelligence. The Intelligence agents combine all roles and place them under the umbrella of intelligence.
The United States Intelligence community draws on advanced technology and analytical techniques. An intelligence process that sets objectives, collects, analyzes, and report findings, with feedback loops integrated throughout. Explicitly, the intelligence community advantages technology and tradecraft within a proscribed process. However, estimation of threats and decision-making are outcomes of human thinking. Analysts and policymakers create mental models, or short cuts to manage complex, changing environments. In other words, to make sense of ambiguous or uncertain situations, humans form cognitive biases. Informed because of personal experience, education, and specifically applied to intelligence analysis, Davis
This counter terrorism strategy also helped to create the counter terrorism task force which promotes the coordination and coherence within the united nation’s system on counter terrorism and to provide assistance to other members. The security council of the UN is also there to help prevent and respond to terrorist acts. The Terrorist threat should continue to be the highest priority in our country because the attacks are often unexpected and they leave the country in turmoil. The threat of terrorism Creates the most serious challenges for the U.S. Intelligence Community as well as on the global level. ISIL is ruthless in its pursuits to terrorize individuals globally, but the united states will continue to combat its efforts. The united states
Counterintelligence (CI) involves actions aimed at protecting the United States against foreign intelligence operations and espionage from penetration and disruption by hostile nations or their intelligence services (Lowenthal, 2014). Three main components of Counterintelligence include collection, defensive and offensive. The collection is the ability to gather intelligence information about rivalry capabilities against own nation; defensive part of CI involves measures to prevent and thwart other nations ' attempts to penetrate into own nation 's intelligence system; while an offensive aspect deal with running double agents to penetrate, manipulate, exploit, and control targeted adversaries. CI is said to be the most essential aspect of the intelligence disciplines, in the sense that it helps in collecting vast quantities of secret information and produce an excellent analysis of intelligence, although, ineffective counterintelligence measures may diminish confidence in the final results (Van Cleave, 2013).
The fight against terrorism is an ongoing and relentless battle. As part of their effort to combat terrorism, the United States has developed a counterterrorism strategy, which includes eight goals. The first is to “Protect the American People, Homeland, and American Interests” (Forest & Howard, 2013, p. 796). America is The Land of Liberty, a place where all people come to be safe and free. At the heart of counterterrorism is the overarching desire to protect innocent lives. The second goal is “Disrupt, Degrade, Dismantle, and Defeat al-Qa’ida and Its Affiliate and Adherents” (Forest & Howard, 2013, p. 796). Al-Qa’ida, the terrorist organization responsible for the attacks of 9/11, presents a particularly relevant threat to the United States
Despite spending billions of dollars to fight endless wars, global terrorism rose 43% in 2013. As a result, terrorism has been brought to the fore of not only the American mentality, but the international mentality as well. Consequently, we must do a few things in order to maintain our sanity, dignity, power, and security.