Each of the articles address warfare against counterterrorism and counterinsurgency in many different ways, and they each address a different part of the problem. The most general piece is that of Cronin’s, who argues that the counterterrorism and counterinsurgency strategies used for Al-Qaeda, particularly drones, will not work for ISIS because they are similar but not the same. I will discuss this piece first, as it can apply to the other pieces.
Although Al-Qaeda and ISIS are known to be terrorist organizations, the author strongly disagree that one of them is not a terrorist organization “at all” Cronin states that although ISIS uses terrorism as a tactic, it is not a terrorist group, but rather a “pseudo-state” because it owns territory
“The Homeland Security Act of 2002 established the federal United States Department of Homeland Security. Its stated mission is to secure the nation against terrorist attacks, to protect against and respond to threats and to ensure safe and secure borders” (Andrew, C., & Walter, F., 2013). “In addition to reducing the nation’s vulnerability to terrorism, the act was also created minimize the damage and facilitate recovery from any attacks that may occur” (Homeland Security, Department of, 2017). Many people want protection from dangerous situations, but what’s the cost of protection.
Counter Intelligence can be defined as the efforts by an intelligence organization to counter a hostile or enemy organization from successfully acquiring information or anything against them. The intelligence organizations are responsible for the general security of nations and their main responsibility is to keep checking what the enemy nations are doing or have in plan. Equipped with the knowledge, they are then able to give needed advice to the government. Programs have hence been created for this responsibility, and are known as National Intelligence Programs. These programs are highly vulnerable to attacks from the enemies and the intelligence cycle security has to keep check to protect the process.
Cronin’s work is laid out as comparative case study analyzing multiple terrorist organization in their final months of existence. Her research has identified six possible pathways that a terrorist campaign will end. In the first six chapters of the book, she examines these six pathways. In the final chapter, she attempts to figure out which lessons from the ending of previous terrorist campaigns can apply to a possible ending for the al-Qaeda terrorist campaign. Most of the book outlines specific case studies of terrorist groups from around the world. Each case study directly supports one of her six pathways for the end of a terrorist campaign. These case studies provide an overview of the demise of multiple terrorist organization and provide what she believes is a consistent interlocking pattern that can be utilized in dealing with current and future terrorist group threats and how they can be directed to an end. The six pathways or patterns that Cronin has identified are decapitation, negotiation, success, failure, repression, and reorientation (Cronin, p.8).
In today’s society domestic terrorism is one of the biggest threats to the United States. Some of these recent terrorist attacks include. Domestic Terrorism is when U.S. citizens carry out terrorist acts against other U.S. residents or groups.Many people think that the biggest threat of terrorism to the U.S. is from a foreign country, when in fact, the bigger threat is closer to home. Domestic terrorism is becoming a bigger threat to the U.S. than international terrorism and we need to find a way to prevent these attacks.
After the terrorist attack September 11, 2001, the United States government increased their investments in security. Many innocent lives were lost because of that incident, which worried the United States of America about self-defense or Homeland Security. Homeland Security was signed to become a law by the President George W. Bush in November 2002. Their main priority was to secure the country from the threats such as international terrorism. The Department of Homeland security had to focus on five goals such as prevent terrorism, enhance security, secure the borders, enforce immigration laws, safeguard, and cyberspace. In order to achieve these goals a lot of work was needed.
Security, however you may think of it the measures we take for it can never enough. It's like insurance you have it not because you want something to happen but because you know that things do happen. That is the United States Border Patrol and Customs they are our first line of defense to the war on drugs and the war on terrorism, for that they have the illegal immigration policy and the pros and cons (www.kyma.com/news/securing-america/646148044.).
Terrorists deny the authenticity of states, the rights of people , the unique importance of individual human beings and ultimately morality. Terrorists for one reason or another, loathe our freedom and our way of life. (Zupan, 2004)
They elucidate that terrorism is a “premeditated, politically motivated, violence perpetrated against noncombatant targets by subnational groups of clandestine agents, usually intended to influence an audience,” (National Institute of Justice).
The United States border stretches for thousands of miles of harsh desert and forest landscape, between two oceans, over lakes and rivers and deals with the highest amount of immigrant traffic in the world. The U.S. has one of the toughest jobs in dealing with border security and the other issues that arise from economic and political ramifications, to securing the land, sea and air borders from unwanted entry by illegals immigrants, terrorists and contraband. Due to all these aspects, these make it difficult for the Department of Homeland Security (DHS) to get a handle on securing our nations border. Securing the border from illegal entry falls under the jurisdiction of the Custom Border protection (CBP) and Border Patrol, which both agencies are under the large DHS umbrella. These agencies were both created to handle these types of problems and have increased its work force numbers after the 9/11 attacks. This is actually when the U.S. really started to look at borders and locking them down from unwanted entry. With the creation of the Department of Homeland Security in March of 2003, the increase in the amount of federal officers on the border has nearly doubled to the sum of over 17,000 (DHS.gov, 2017).
In America we have a lot of domestic terrorism. Domestic terrorism didn’t become a problem until the 9/11 terror attacks on September 11 2001 in New York City when planes were hijacked hit the buildings and killed over 3,000 people. Since then there have been over 10 major terror attacks in the United States. Five of which have been been the most effective to the United States the five are Pulse nightclub shooting, the two church shootings, Las Vegas massacre, San Bernardino California shooting. Domestic terrorism started in New York when a bomb exploded on Wall Street in the financial district in the 1950s and 1960s. The pros to domestic terrorism is that it makes our country stronger and knows what to
I would have completely supported the bill because it was needed after 9/11. We had to respond to a time that terrorism made itself real on our soil. I would make a major change of intelligence. Our police are required to do so much in the four steps of preparedness and yet they don’t get the full picture when it comes to a federal level. They should receive as much information that is absolutely necessary to make their jobs easier and safer. Obviously, there are some information that doesn't need to be given, but if it is a matter of national security and to them the local security they need to have all the facts to do their job
When the attacks happened on September 11th, 2001, our nation has an obsession with having there own security measures, and taking steps to be prepared just in case of another tragic incident. Through this has caused leaders of our country to create a system that will allow civilians in our nation safety. Which is called Homeland Security. However Homeland Security was made to serve many purposes. And they include: overall increased reddyness , preferably for state of emergengy situations ,Have better transportation security personell to help transport cargo and people more efficiently and securely , Highten interior enforcement and patrol security to recreate the immigration processes, Change the way information is shared with partners, Improve
As a direct consequence of September 11, a number of substantial challenges lie ahead in the area of counter-terrorism.. The most prominent of these is the changing nature of the terrorism phenomenon. In past years, when terrorism was largely the product of direct state sponsorship, policymakers were able to diminish prospects for the United States becoming a target using a combination of diplomatic and military instruments to deter potential state sponsors. Today, however, many terrorist organizations and individuals act independently from former and present state sponsors, shifting to other sources of support, including the development of transnational networks.
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.
In 1996, Duma adopted a Criminal Code, which specified the crime elements. Some of them are, “Encroachment on the Life of a Statesman or a Public Figure” in Article 277, “Terrorism” in Article 205, “Hostage-Taking” in Article 206 and “Hijacking of an Aircraft, a Seagoing Ship, or a Railway Train” in Article 211. (The Criminal Code Of The Russian Federation, 2000). Additionally 1998 the Federal Law On the Fight against Terrorism and 2006 On Counteraction to Terrorism are the main, legal basis for counterterrorism policies and operations. Russia’s experience with jihadist terrorism more than 20 years shaped its legislations and other ways of combating with terrorism.