StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Legal tools available at the local level to exploit terrorist activities - Essay Example

Cite this document
Summary
The essay "Legal tools available at the local level to exploit terrorist activities" analyzes politically, violent groups that espoused rebellion, separatism and other ideological causes are the immediate suspects of any terror attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Legal tools available at the local level to exploit terrorist activities
Read Text Preview

Extract of sample "Legal tools available at the local level to exploit terrorist activities"

?Legal Tools Available at the Local Level to Exploit Terrorist Activities Terrorism is a violent act is defined as a politically premeditated violence done against non-combatant targeting subnational groups of clandestine agents. Anti-terror experts refer terrorist groups as an organization with subgroups that threatens public safety and national security in a country. The most prominent case of terrorism in this millennium was the 9/11 attack done against United States of America’s twin towers in New York that killed hundreds of people and damaged properties with the intention of sowing fear to paralyze the state and render its bureaucracy inutile to act. Politically, violent groups that espoused rebellion, separatism and other ideological causes are the immediate suspects of any terror attacks. This is because they use violence as mode of communicating their political agenda. But whatever political goal there is, terrorist accomplish their intended purposes by causing death, serious injury, conduct political hostages, property damages and other harmful attacks to coerce a government to succumb to their political demands. To carry these out, terror groups will develop their capabilities of making weapons of mass destruction (WMPD) and develop access to the creation of materials to materials the WMDs. But aside from the development of WMPs as tools for terror attacks, what else are the legal tools that can be used by terrorist groups to advance its agenda? In a Second Meeting of the Advisory Board of the United Nations Centre for Counter-Terrorism, in Jeddah, Saudi Arabia last June 3 this year, UN secretary Ban Ki Moon appreciated how they are able to develop the counter-terrorism practitioners tasked to implement the Counter-Terrorism Implementation Task Force at United Nations Headquarters programs to continuously suppress any furtherance of terroristic activities in the world (UN, 2012). All member states are collaboratively called for regionalized comprehensive and integrated regional implementation of counter-terrorism strategies (UN, 2012). As an implications, member states are expected to adopt the counter terrorism plan in for Central Asia and the development of institutional and technical capacities at their respective national territories (UN, 2012). This program include capability-building to address the need for comprehensive analysis of needs for operational and administrative needs of institutions at the local level to help attain target goals. Margolis (2001) cited that one of the resources that can be exploited by terrorist organization is the media. He cited how Bin Laden optimized media for interviews to sow dissention and to articulate his causes against Iraq. Although his sentiments were not aired in American media but he leveraged by discussing his political position to Muslim-dominated communities to gain sympathy and to pour his political tirade against United States and its allies. He was the first to laud and express satisfaction when the twin towers of New York fell into ruin. Moreover, Emerson (2011) have cited that terror groups have already produced its own publication to strategically attune itself in this information age and information technology advancement. Emerson (2011) also pointed that those who are info-technology savvy could launch hacking attacks to websites of their perceived enemies. With the advent of online social networking, borderless communication and transnational access becomes possible. Department of Homeland Security (2010) pointed that in their study, terror groups can exploit alternative online media to spread propaganda, network operational guidelines, communicate with partners using online tools and chat rooms, and develop web-based database of information to sustain its ideological positions. DHS (2010) recorded that jihadist and mujahideen are increasingly utilizing facebook for propaganda, operational information, which include the distribution of menu about how to make improvised explosive device (IEDs) which is translated into Arabic, English, Indonesian and Urdu. Like the rest of micro bloggers around the world, they too micro-blog political thoughts that are often articulated in radical position. DHS (2010) summarized there observation that jihadists used online tools as gateway to extremist position and for mujahedeen’s networking communication, including as means for remote reconnaissance for targeting purposes. The sale and disclosure about the use of AK47 are even made available online. The FB and other social networking devices have been considered by mujahedeen as strategy for broader network and communication. Since policing the content of facebook becomes impossible with its millions of users, the best measure to do for authorities is to monitor potential threats that are disseminated online (DHS, 2010). In conflict affected areas, there is a developing dialogue for peace-building and interreligious discourse. Peoples or civil societies in these areas constantly meet map, discuss, deliberate, and find alternatives to resolve problems, including issues on terrorism and domestic wars (UN, 2012). These avenues could also be a potential mechanism where collaboration and cooperation can be undertaken to develop a network of peace advocates who can partner with local authorities for peace-building initiatives (UN, 2012). This network can involve leaders and organizations from the academe, religious groups, non-government organizations, people’s organizations, community-based associations, and local leaders (UN, 2012). The culture of peace, which respect diversity and pluralism, include condemnation of terroristic activities to promote the dignity and sanctity of life as well as the human rights of all innocent civilians that are often victims of violence. The UN (2012) emphasized the importance of protecting human rights but wishes that this should be upheld concretely coupled with the rule of law (UN, 2012). They can also declare peace zones, makes declarations of peace, and develop a community-based network of counter-terrorism collaborations. This domestic network can interlink and be in solidarity with international associations of peace advocates (UN, 2012). The United Nations Counter-Terrorism Centre also has great potential to solidify international action on highlighting and supporting the plight of victims of terrorism (The White House, 2007).  Victims and their families are among the most powerful voices in the fight against terrorism, and I urge the United Nations Counter-Terrorism Centre to support their efforts (The White House, 2007).   Your deliberations here today will help chart a course of activities for the months ahead.  I am confident that the Centre’s work will contribute to Counter-Terrorism Implementation Task Force activities, which have expanded greatly and now cover numerous thematic topics with the support of 31 United Nations agencies and international partners (The White House, 2007).   Another legal tool that can optimize for the suppression of terrorism is the bureaucracy of the national governments itself. It is a recognized fact that states with poor governance produce weak economies, cultural /ethic/religious tensions; and weak political system which could be easily become a fertile avenue as breeding ground of terrorist groups (Central Intelligence Agency, 2012). But as we consider the fact that there are government leaderships that has become instrumental in inspiring dissidents to rebel and be violent against the institution, it is also equally important that government should be also working to reform its system by democratizing its processes to develop an avenue where all stakeholders of the community can publicly raise their complaints and grievances against the government for positive action. This is to understand the historic fact that rebellion, which often use violent means of subjugating the government, rooted its despair and distrust to government when its officials failed to represent its peoples interests. A government, which sourced its revenues from its taxpayers, should maximize its fund for the public welfare and for social services, instead of corrupting its public funds at the detriment of its own constituents. To reckon, violence becomes a mode of communication when its people are repressed to exercise their rights to dissent against undemocratic regimes. Democracy is therefore vital for governance and in nurturing better relation with its people. Aside from criminalizing terroristic acts for the violence and threat of national security, the entire bureaucracy of the government should be optimized for heightening intelligence gathering and eventually make moves that will suppress terroristic acts (Central Intelligence Agency, 2012). A collaborative structure of police, military, and local governments, could be considered as essential for strengthening the bureaucracy’s apparatus against terror organizations (Central Intelligence Agency, 2012). To attain this, governments must be always consultative, acting on what is legally appropriate, must be transparent, cleanse its system from corruption and inspire dialogical discourse for better politics. It must deliberately act at all fronts, bearing in mind public interest as the epicentre of actions and programs (Central Intelligence Agency, 2012). Laws are another tool to repress terrorism. Aside from the passage of laws that will strengthen the government’s anti-terrorism program, the government must reinforce its disarmament campaign to suppress the proliferation of illegal firearms (US Department of Justice, 2006). Tracking of possible movements of materials that can used in the making of weapons of mass destruction or improvised explosive devises should be of paramount agenda of the government forces (US Department of Justice, 2006). Disarmaments must be made effective and enforceable at the national and local level. It should be reckon that in the quest to attain international and domestic public security and law and order is a state policy (US Department of Justice, 2006). Disarmaments and demobilization can also be undertaken by government who are currently undertaking negotiation with rebels to thwart their power and control on armaments (US Department of Justice, 2006). The simplest tool that will contribute in the tracking of terror organization is documentation of the personalities that are enlisted as terrorists. Experts contend that documentation of these personalities and their allies will contribute to multi-pronged approach and legal inquisition of these personalities (US Department of Justice, 2006). It will also enhance the international security standards using biometrics, passports and visas because this will make it difficult to counterfeit their personal documents. Authorities can use ten fingerprints through technology to enable an advanced multi-modal biometric determination capabilities for future use (US Department of Justice, 2006). Through biometrics, the face and iris can contribute in fast tracking and identification of their personal information. To strengthen this, domestic governments and agencies can legislate laws criminalizing the counterfeiting, alteration, misuse and falsification of documents of homegrown terrorists (US Department of Justice, 2006). Their biometrics are also database of researched information of these homegrown terrorists. The latter share many similarities with transnational terrorists doing international terrorism. Experts likewise expounded that improving the screening of visa applicants also help monitor and track their travels and port entries. It will also hasten the coordination of anti-terror groups if watch list are complete with accurate, reliable and complete biometrics of these people (US Department of Justice, 2006). Another concrete examples of this is Student and Exchange Visitor Information System (SEVIS) and that United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program that will electronically document the entry and exit system of foreign travellers’ through biometrics. These tools are similar to other designs developed by the security experts working for the business sectors such as the development of screening technology adopted by the Container Security Initiative (CSI) which pre-screen and evaluate maritime containers prior to the shipment of these containers to other foreign ports. Akin to this is the Customs-Trade Partnership Against Terrorism (C-TPAT) ]’s U.S. Customs and Border Protection program wherein those engaged in businesses undergo security procedures as security measures on shipping goods. Megaports Initiative of US Department of Energy that is working with foreign trade has the current capability to scan cargo for nuclear and other radiological materials (US Department of Justice, 2006). This can be adopted too by other countries to secure ports to deny the scale of terror that can be used by transnational terrorists that wishes to operate and abuse open and diverse society. Sustained education is also another legal tool to understand about the multifarious ways on how terrorists operate. This can also help in deepening the understanding about how terrorists’ psychology works. Law enforcers must sustain to improve their knowledge about the environments they are operating – the people, place, and the dynamics daily unfolding events (White House, 2007). If people’s practical norms and social culture deviate and deliver anomalous activities, then this might indicate unusual and suspicious activities. Those who’d do terroristic acts and similar criminal nature can easily be identified. Stakeholders of peace could hastily determine who among of its constituents which could be considered as threats to the community. Sufficient resources should be poured to support in capability-building measures as support information in assessing strategically the threats to the society (White House, 2007). Other experts call this intelligence-led policing (ILP) management aimed at supporting resources to law enforcement using intelligence information for law enforcement and analysis. ILP is defined as collaborative approach of intelligence operations and community-based law enforcement against terrorism (White House, 2007). This could also assist in identifying information gaps, evaluating critical information, and meeting data requirement for collaborative security management (White House, 2007). Promoting sports and wellness is another tool to suppress terrorism because this can enjoin youths to participate in sports activities instead of investing their hours in the radicalization of their psyches. Engaging the youths, especially those coming from indigenous and marginalized groups, to sports fest can veer them from perceiving of social discrimination and alienation. Many youths that are introduced to concepts of inequalities and immersed in discontent can be easily persuaded to join activism and make them vulnerable to extremists. Authorities recognized that the Muslim faithful and coming from families that have suffered injustices too, can be exploited by terrorists to become homegrown violent Islamic extremists (Hinkkainen, 2012). Youths, as primary target for political radicalization for extremism, should be moulded to activities that can make them better persons and good contributor for community development (Hinkkainen, 2012). Elders should responsibly strengthen grassroots dialogues and communication for to ascertain the preservation of religious diversity, multiculturalism, and peaceful living. These will inspire valuing of ‘citizenship, democracy, integration, religious tolerance, and the protection of civil rights, as well as increase cooperation among Tribal, State, and Federal prison officials and Muslim communities to counter radicalization in prisons (WhiteHouse, 2007, p. 1). Indeed, the international community is yet called to sustain counter terrorism drive and prevent their unnecessary occurrence. Authorities are in a continuing effort to understand the root-causes of terrorism and development of processes. Aside from the tools identified in the preceding paragraphs, all governments must do the following (WhiteHouse, 2007, p. 1): institutionalize anti-terrorism activities (WhiteHouse, 2007, p. 1); sustain capability building to detect, deter and prevent terrorism (WhiteHouse, 2007, p. 1); hone the intelligence capability of forces and networks for counter-terrorism as part of the peace-building initiatives with the support of Department of Justice (DoJ) (WhiteHouse, 2007, p. 1); mitigate threats and intensify remote monitoring of potential threats using information technology to tract potential threats (WhiteHouse, 2007, p. 1); Coordinate with federal, state, and local government bureaucracy for a comprehensive effort to develop and maintain adequate domestic preparedness (WhiteHouse, 2007, p. 1); Network with broader coalition of people and civil society organization to support peace-building and multiculturalism dialogues and initiatives at the grassroots level (WhiteHouse, 2007, p. 1). Information technology should be utilized for bridging relations and dialogues. It should also be optimized to develop security management for banking and finance as hacking has been the common trend in ruining systems (Emerson, 2011). When banking and finance will become more vulnerable to hacking by terrorists’ institutions, all depositors and the national economy will be entirely affected if technology will be utilized as instrument to weaken any government and its people because financial hacking will rip every citizen of their purchasing power and their macro or micro-economic activities. In this regard, vigorous efforts should be undertaken to prevent any plans and attempt to ruin the communication and financial institutions (Emerson, 2011). All legal tools to exploit terrorism at the domestic or regional level should be exhausted within the spectrum of political, economic, social and relational level should be undertaken holistically in both conventional and non-conventional measures. References Emerson, S. (2011). Jihad in the Digital Age, IPT News & Global Security News. Web. < http://global-security-news.com/2011/06/08/jihad-in-the-digital-age/> Accessed: 3 Dec. 2012. Hinkkainen, K. (2012). Homegrown terrorism; the known unknown. NEPS Working Papers 1/2012, Network of European Peace Scientists, London, UK. Department of Homeland Security (2010). DHS Terrorist Use of Social Networking: Facebook Case Study. Public Intelligence Online, http://publicintelligence.net/ufouoles-dhs-terrorist-use-of-social-networking-facebook-case-study/ > Accessed: 2 December 2012. Margolis, E. (2001). The use of media as weapon, Sound Vision Foundation, IL, USA. Central Intelligence Agency (2011). Terrorism FAQs. US Government, Washington, US. The White House (2007). Prevent and Disrupt Terrorist Attacks. US Archives, US. http://georgewbush-whitehouse.archives.gov/infocus/homeland/nshs/2007/sectionV.html Accessed: 3 Dec. 2012. US Department of Justice. (2012). 2006 Strategic Plan. . http://www.justice.gov/archive/mps/strategic2001-2006/goal1.htm. Accessed: 3 Dec. 2012. United Nations (2012). United Nations Counter-Terrorism Centre is Key Tool To Better Tackle, Suppress Terrorism Threat, UN Department of Public Information, New York, New York. Accessed: 3 December 2012. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Legal tools available at the local level to exploit terrorist Essay”, n.d.)
Legal tools available at the local level to exploit terrorist Essay. Retrieved from https://studentshare.org/law/1402837-legal-tools-available-at-the-local-level-to
(Legal Tools Available at the Local Level to Exploit Terrorist Essay)
Legal Tools Available at the Local Level to Exploit Terrorist Essay. https://studentshare.org/law/1402837-legal-tools-available-at-the-local-level-to.
“Legal Tools Available at the Local Level to Exploit Terrorist Essay”, n.d. https://studentshare.org/law/1402837-legal-tools-available-at-the-local-level-to.
  • Cited: 0 times

CHECK THESE SAMPLES OF Legal tools available at the local level to exploit terrorist activities

Money generated from illegal activities

This dissertation "Money generated from illegal activities" explores illegal sources of money.... It is money generated from illegal activities that processed into the banking sector as legally acquired funds.... person who sells drugs or a person who runs a human trafficking ring which leads to prostitution might want to find ways of injecting funds legally into the economy to appear legal.... The two variables are legal systems and cooperation and it is very difficult to attain convergence....
171 Pages (42750 words) Dissertation

Terrorism and International Response

He argues over the fact that if the attack on the twin towers can be regarded as terrorism, then why the bombing in a Kabul's hospital can't be considered as one According to a truism, it is believed that, terrorist, in the eyes of one, is a freedom fighter in the eyes of another.... From a particular group, 'a terrorist takes birth when he senses unfairness or discrimination perceived by the very group he belongs to, therefore he becomes the hero for that entire group, be it a small anarchist cell, or a whole tribe, or class, nation, religion etc....
12 Pages (3000 words) Essay

The United States Patriot Act that was Enacted After September 11 of 2001

According to the Justice Department, the PATRIOT Act gives support to and encourages enhanced sharing of information among various law enforcement agencies at the local, state and federal levels.... The Act allows law enforcement officials more latitude when attempting to intercept transmissions of suspected terrorist's discussions via electronic surveillance (Ward, 2002).... The PATRIOT Act was enacted to protect US citizens by augmenting the tools by which law enforcement agencies fight crime and improve communication capabilities between these government agencies....
8 Pages (2000 words) Case Study

Money Laundering and Terrorism in the Middle East

Such experience is expected to highlight how money laundering is utilized in terrorist activities considering the amount of available literature on the subject.... Specifically, this will be undertaken in the context of money laundering as previously defined - the act of converting money that is sourced from illegal activities so that it could be spent or consumed.... 9 and that since then it has become widely accepted as a term of art at both the international and domestic level....
17 Pages (4250 words) Research Paper

The World and the Sociological Imagination

 Social imagination can be applied to various forms of terrorist activities to analyze their general and specific causes, instruments, and consequences from a wider perspective.... It is important that people know how to associate their experiences encountered in daily lives to the local, national and international issues that directly or obliquely affect them so that they modify their lifestyles and themselves accordingly for the better (Josh Maher's Blog 2007)....
12 Pages (3000 words) Term Paper

Political and Criminal Objective

For instance, in Iraq, the insurgent attacks on the allied forces were treated as guerrilla attacks and not as terrorist activities (Lutz and Lutz 2008: 11).... The motivation behind terrorist acts is to achieve some political or religious aim.... Furthermore, terrorist organizations often declare in public that they had perpetrated the violence.... Thus, guerilla attacks are not to be considered as terrorist attacks.... owever, in certain situations, guerrilla attacks transform into terrorist attacks....
14 Pages (3500 words) Term Paper

Counterterrorism Tracking Terrorist Assets

errorists utilize monetary resources in training, motivating, and indoctrinating individuals meant to carry out terrorist activities.... The most outstanding means by which money is utilized in financing terrorist activities include facilitating the movement of men, messages, and components and materials essential in accomplishing terrorist attacks.... The tracking of terrorist assets and subsequent freezing of the assets are directed at denying terrorists vital resource input essential to the planning and undertaking of their activities....
9 Pages (2250 words) Coursework

Why Is There More Terrorism Today: An Examination of Old Versus New Terrorism

The most widely accepted legal definition of terrorist activities include using violent tactics to achieve specific political goals and creating a sense of fear within a community or region being targeted for this violence (Merari 1993).... New terrorism is recognized as having a more lethal implication to society than that of traditional terrorist activities (Hoffman 1998).... Terrorists also work to de-legitimize certain political ideologies that violent perpetrators maintain disagreement with, thereby using force against opponents to coerce a society or government to accept and recognize the self-perceived legitimacy of a terrorist's specific ideology....
38 Pages (9500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us