StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Organised Crime and Terrorism - Essay Example

Cite this document
Summary
This has widely been referred to as the information age but there is sufficient evidence to suggest that it could be the age of terrorism too. Since, September 11, there has been a continuation of what the former American President George Bush referred to as the ‘war on terror’. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Organised Crime and Terrorism
Read Text Preview

Extract of sample "Organised Crime and Terrorism"

? Organized Crime and Terrorism: This has widely been referred to as the information age but there is sufficient evidence to suggest that it could be the age of terrorism too. Since, September 11, there has been a continuation of what the former American President George Bush referred to as the ‘war on terror’. With this declaration, there has always been a heightened awareness on the security front especially in the Western nations. Even the smallest safety scares have made it to the news courtesy of a paranoia that has been created on issues relating to security. The terrorists have improved their tactics too. It was not long ago that airliners were not allowing people on board who carried toothpaste with them because of the fear that some explosive elements might be contained therein. The same case applies to other ordinary things like clothing. Today there are mandatory strip searches at airports to sniff out even the most hidden explosive or weapon before it gets into the plane. Even shoes and other ordinary things, considering the Reid case, have been used in an attempt to cause terror. Of course in this case it was a shoe bomb. As the terrorists have become adept with their clandestine activities, so have countries and especially security agencies. They have introduced sweeping measures like surveillance on suspicious targets, wiretapping of mobile phones belonging to suspects among other measures. In general, the focus of governments has moved from its previous reactive state to a more pro-active state where the gathering of intelligence is the new battleground between these two foes. These and many others shall be the focus of this paper. There shall be a special focus on the U.K and the legislative options that have been introduced to sniff out this new threat (Campbell 2013). There has been wide ranging legislation that has been introduced in the United kingdom to curb terrorism and organized crime, both of which are very much evolving situations. The rate at which such legislation has been introduced, not only tells of the severity of these crimes but also the extent to which the government is ready to go to ensure that the citizens are safe. Since the Blair premiership the laws that have been introduced include the Anti-terrorism, Crime and Security Act 2001, the Prevention of Terrorism Act 2005, the Terrorism Act 2006 and the Counter- Terrorism Act 2008. This flood of legislation is a reflection of the speed at which this threat is evolving (Hanman 2013). Governments have had to put in place, at times controversial measures to ensure that no terrorist slips through the dragnet. One of these controversial measures is wiretapping. Basically, the police are allowed to listen in on conversations of people that they suspect to have intentions of causing terror or any other harm on great scale (Barrett 2013). There has been an assessment of the role and effectiveness of wiretapping in the wake of several terror related activities. This form of intelligence gathering has been found to be very effective. There are several ‘wanna-be’ terrorists in the U.K. Most of them are Muslims of Pakistani origin. Several of them make multiple trips to their native countries to receive training mostly offered by Al-Qaeda, the Taliban among other groups. The credentials of wiretapping therefore are not what is under debate here. There are much more serious issues (The Guardian 19th march 2009). As a case officer, I would recommend wiretapping so as to obtain even more information about these terrorist sympathizers and their intentions. We already have the mobile number (07097911156) of Hector from the from Tinkers mobile phone. Wiretapping is allowed under the anti-terrorism laws as a last ditch measure to ensure national security. The only grey area as pertains its use is the fact that until very recently, information obtained thus was not admissible in court (The Guardian 6th February 2008). By listening in on conversations by Hector there is a great likelihood that we shall get even more information about the larger network in which they belong and therefore can get several other local and foreign targets which can also be followed up. This wiretapping can be done clandestinely from the abandoned and defunct business premises that Hector used to operate. This effort is also likely to bear forth invaluable information concerning the MPC and its operations. All this information is very necessary because, as it has come to be realized, terrorists work in groups, they are rarely ‘lone wolfs’ (Martin 2010). However, as wiretapping has been in the past however, it has from time to time been faced with legal challenges. It is certainly permissible in the case of terror suspects but where should one draw the line? There has been a large outcry from the public who feel that this effort to contain terrorism would instead be interfering with the individual freedoms as citizens. If such a system is misused, rogue officers would listen in on conversations of people other than terrorists, something along the lines of what happened recently with Murdoch’s News of the World (Wilkinson 2006). There is the other issue of surveillance. This is a time tested and proven method of gathering intelligence. The basic mode of operation is that there are a few officers who are assigned to such suspects who then follow them around and seek to find out about their intentions from the activities that they engage in. A discreet way of doing this is attaching cameras or other recording equipment in the residences of such people so as to watch them or listen in on them. This is different from wiretapping since it does not happen on the phone (). Surveillance of both suspects would work very well. There is an opportunity in the case of Hector to do the surveillance from the unused building under his flat. This is after all an individual who seems to operate under the radar. Very few records about him exist, except the gas and electricity accounts that are under his name. The only known detail about him must therefore be used for maximum benefit (Russo 2013). Surveillance is also allowed in such cases. This is a case of national security and everything possible must be done to ensure that it is not in jeopardy. There are several cases in which surveillance has worked very well. There is the case of the terrorists who were caught after purchasing dangerous levels of a fertilizer which was to be used to build a fertilizer bomb. They ended up buying what they thought was fertilizer from a secret agent. They were then arrested just as they planned to carry out their murderous act. This is proof enough that surveillance does work. There have been several other threats that have been thwarted owing solely to surveillance (Langan 2004). Surveillance however, by itself cannot be the panacea to this huge challenge. The suspects might be followed around but since they already are aware, from Tinkers detention at the airport that they might be under surveillance, they might cease their activities for a while until the waters are clear again. They might disappear altogether as has happened severally (Peachey 2013). Surveillance faces the same challenges that wiretapping faces in any democratic society. The citizens feel that this might be an infringement on their personal space. Therefore, surveillance must be used strictly for the purposes for which it is intended in this case. Police and agents in this case must put suspects under surveillance as a last resort and not merely at the slightest suspicion (Welch 2012). Penetrating terrorist cells is the final arena that I shall seek to cover in this essay. This is a very important step because it seeks to thwart the plans even before they are created. Organized crime today uses big business as a cover up and also as a source of financing. The reasons are simple. These attacks have to be planned meticulously and no cost is spared to ensure that their cover is not blown up. For instance, after terrorists realized that it was no longer feasible to use Pakistanis to carry out their acts, they moved on to using naturalized British citizens of Pakistani origin. Not to arouse the suspicion of the authorities, they have to be flown around circuitously through several countries before they arrive in Pakistan for weapons and bomb making training. This costs a lot of money (Albanese 2009). The first step in uncovering any possible money laundering syndicate is to trace Hectors account at Northern Gas, which is a/c 2209a1. Then an effort has to be made to find out which means he uses to settle his bills. It is likely that the money trail will reveal contributions to the MPC. After this has been established, there shall be an opportunity to track several other people who make contributions to this organization and identify them as persons of interest too. The other important step is to raid the flat of Hector immediately since after realizing that he cannot access Tinker through the usual channels, mail and telephone, his suspicion will be aroused and he might decide to start covering up his tracks before the police appear. It is possible that some information of interest shall be obtained from his residence. If his place of residence appears to be unknown, Northern Gas can provide the locality of the account registered under his name (Mallory 2011). Tinker was arrested at Heathrow meaning he was travelling. There is no power on the part of British agencies to act in foreign lands. Therefore, the state must explore the option of liaising with authorities in his destination country and seek to have their co-operation in this case. This is an important cog in this ever-turning wheel because most of the time harmless people leave the country and return indoctrinated and dangerous. Re-opening an investigation into the operations of Molody Communications and closing the company up altogether should also be on the table (Grabosky 2010). By and large, it is clear that the terrorist threat is one which Britain and several other countries are yet to contain properly. The main reason is because, in many ways, this form of crime and terrorism caught the authorities by surprise. There have been efforts by both authorities and governments to stay on top of this threat and they finally seem to be bearing some fruit. Initially, the focus was on arresting terrorist plans before they were carried out. Now there is much further reaching intention. This is to weed out extremist intention itself. To this end, several methods have been employed to provide the necessary intelligence. The ones discussed above are surveillance, wiretapping and penetration of terror cells. All these are legislatively enabled. The success they have brought to the war on terror is unprecedented. However, focus now needs to shift to other forms of terrorism that are evolving today, most notably cyber crime and hacking. References Martin, G. (2010) Understanding Terrorism, London: SAGE Publications. Slann, M. and Combs, C. (2009) Encyclopedia of Terrorism, New York: Infobase Publishing. Campbell, L. (2013) Organized crime and the law, United Kingdom: Hart Publishing. Grabosky, P. (2010) Crime and terrorism, California: SAGE Publications Ltd. Mallory, S. (2011) Understanding Organized Crime, New York: Jones & Bartlett Publishers. Hanman, N, “Explainer: Terrorism Legislation” , The Guardian, 23rd January, viewed 15th March 2013, http://www.guardian.co.uk/commentisfree/libertycentral/2009/jan/22/explainer-terrorism-legislation Barrett, D, “Anti-terror laws face new human rights challenge at European court”, The Telegraph, 3rd November 2012, viewed on 15th April 2013, http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9653175/Anti-terror-laws-face-new-human-rights-challenge-at-European-court.html U.K government website ‘Protecting the U.K against Terrorism’, 26 March 2013, viewed on 15th March 2013, https://www.gov.uk/government/policies/protecting-the-uk-against-terrorism Article ‘British activists being detained in UK airports under anti-terrorism legislation on return home from Palestine’, International Solidarity Movement and Corporate Watch, 28th Feb 2013, viewed on 15 April 2013, Article ‘Anti-terrorism, Crime and Security Act 2001’, The Guardian, 19 March 2009, viewed on 15th April 2013, http://www.guardian.co.uk/commentisfree/libertycentral/2009/jan/13/anti-terrorism-act Holmes, L. (2010) Terrorism, Organized Crime and corruption: Networks and linkages, London: Edward Elgar Publishing. Potter, G. and Lyman, M. (1997) Organized Crime, London: Prentice Hall. Article ‘Prevention of Terrorism Act 2005’, 19th January 2009, viewed 15th April 2013, http://www.guardian.co.uk/commentisfree/libertycentral/2009/jan/13/prevention-terrorism-act Article ‘Terrorism Act 2006’, 19th January 2009, viewed on 15th April 2013, http://www.guardian.co.uk/commentisfree/libertycentral/2009/jan/19/terrorism-act-2006 Article ‘Counter- Terrorism Act 2008’, 19th January 20o9, viewed on 15th April 2013, http://www.guardian.co.uk/commentisfree/libertycentral/2009/jan/19/counter-terrorism-act Peachey, P, ‘Terror suspect goes on run while under police surveillance’, The Independent, 1st January 2013, viewed on 15th April 2013, http://www.independent.co.uk/news/uk/crime/terror-suspect-goes-on-run-while-under-police-surveillance-8434274.html Russo, S, ‘Effectiveness of CCTV surveillance as counter-terrorism’, Generation Archives, viewed on 15th April 2013, http://thebreakthrough.org/generation_archive/effectiveness_of_cctv_surveill Dodd, V, ‘Government anti-terrorism strategy 'spies' on innocent’, The Guardian, 16th October 2009, viewed on 15th April 2013,http://www.guardian.co.uk/uk/2009/oct/16/anti-terrorism-strategy-spies-innocents Hittin, A, ‘UK anti-terrorism police hold four linked to Syria’, Al Hittin, 11th January 2013, viewed on 15th April 2013, http://alhittin.com/2013/01/11/uk-anti-terrorism-police-hold-four-linked-to-syria/ Article ‘Leading article: Abu Qatada's hard case is making for good law’, The Independent, 18th April 2012, viewed on 15th April 2013, http://www.independent.co.uk/voices/editorials/leading-article-abu-qatadas-hard-case-is-making-for-good-law-7654713.html Doyle, J, ‘Deport Qatada and we'll bomb UK, warn militants: Fanatics in Somalia send a chilling warning to the Government’, The Daily Mail, 20th April 2012, viewed on 15th April 2013, http://www.dailymail.co.uk/news/article-2132638/Abu-Qatada-deportation-case-Al-Qaeda-warns-UK-terror-attacks.html Symonds, T, ‘How will the proposed surveillance laws work?’, BBC News, 14th June 2012, viewed on 15th June 2013, http://bbc.co.uk/news/uk-18434232 Metcalfe, E, ‘Britain deserves better surveillance laws’, The Guardian, 4th November 2011, viewed on 15th June 2013, http://www.guardian.co.uk/commentisfree/libertycentral/2011/nov/04/surveillance-laws-ripa Welch, J, ‘What are my legal rights if I am under covert surveillance’, The Guardian, 10th march 2012, viewed on 15th march 2013, http://www.guardian.co.uk/commentisfree/libertycentral/2010/mar/10/police-surveillance-legal-rights Article ‘Brown approves use of wiretap evidence’, The Guardian, 6th February 2008, viewed on 15th April 2013, http://guardiannews.com/politics/2008/feb/06/uk.ukcrime Langan, H, ‘U.K arrests 8 Terrorism Suspects, Seizes Fertilizer’, Bloomberg, 30th march 2004, viewed on 15th April 2013, http://www.bloomberg.com/apps/news?pid=newsarchives&sid=a7qTyCWskPqE Albanese, Jay. (2009) Organized Crime in our Times, London: Prentice Hall. Wilkinson, P. (2006) Terrorism vs. Democracy, New York : Routledge. Encyclopedia of Terrorism,(2003) SAGE Publications Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Organised Crime and Terrorism Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/law/1473585-organised-crime-and-terrorism
(Organised Crime and Terrorism Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/law/1473585-organised-crime-and-terrorism.
“Organised Crime and Terrorism Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/law/1473585-organised-crime-and-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF Organised Crime and Terrorism

Can Terrorism Be Described as Organized Crime

The last decades of XX and the beginning of XXI centuries are marked in the majority of the world countries by the increasing wave of acts of terrorism and the transnational organized crime.... In any forms of their representation all of them threaten safety of citizens from many states, entail essential negative political, economic and moral consequences, render strong psychological influence on the large number of people, and take away the lives of the increasing number of innocent peace citizens. … Difficulties in struggle both with terrorism and the transnational organized crime in many respects are determined by their variety of forms....
16 Pages (4000 words) Essay

Acts of Terrorism

The similarities between war and terrorism are obvious.... The paper 'Acts of terrorism' focuses on terrorism and other forms of violent conflict which typically involve both property and personal damages.... What distinguishes acts of terrorism from other forms of violent conflict is the intention and motives of the primary actors.... hellip; terrorism is specifically designed to create a public crisis with the intent that public confidence in political and economic structures are lost....
8 Pages (2000 words) Term Paper

The Threat from Terrorism and the Threat from Organized Crime

Though the world is familiar enough with terror and violence, the recent catastrophes revealed the latest development of organized crime and terrorism.... Yet recent incidents have proven the active involvement of the terrorists in the organized crime and vice versa.... The paper "The Threat from terrorism and the Threat from Organized Crime" states that the world is at high alert to face the threats from terrorist attacks.... The terms terrorism and organized crime have been generally considered to be of activities having different objectives and features....
9 Pages (2250 words) Coursework

Terrorism and Organized Crime

terrorism is defined as the illegal utilization of force by a person or group against other people or their property with the aim of intimidating or forcing a given government to perpetuate particular social or political aims, and it can either be domestic or international.... hellip; ized crime is defined as a group of individuals characterized by the international or national organizations with centralized operations of unlawful activity and with a higher need to make pecuniary profit (Federal Bureau of Investigation, 2014). terrorism and organized crime terrorism and Organized Crime Lecturer terrorism and Organized Crime terrorism is defined as the illegal utilization of force by a person or group against other people or their property with the aim of intimidating or forcing a given government to perpetuate particular social or political aims, and it can either be domestic or international....
1 Pages (250 words) Essay

Comparing Terrorism Groups to TOC Groups

Transnational Organised Crime and Terrorism: different peas, same pod?... This explains the need for multiple countries to form counter-terrorism units and anti-crime departments to curb both menaces.... However, the terrorist groups and transnational organized crime groups are both illegal and unconstitutional groups that do not attract open support from any country or state in the world.... Global crime, 15(3-4), 213-218....
1 Pages (250 words) Essay

Benefits, Deficiencies and Human Rights

In this essay, the author has evaluated the Act's benefits and potential drawbacks.... nbsp;Autor studied how other nations have addressed the question of national identity, considered alternative methods of achieving the intended goals and the validity of the opposing views.... hellip; Author's conclusion is that, whilst for security purposes a national method of citizen identity is advantageous, the UK Identity Cards Act now in force is an intrusion into the rights of the individual and, furthermore, there is the potential for additional security risks resulting from the methods of implementation....
23 Pages (5750 words) Essay

Terrorist Activity in Bosnia

nbsp;… The threat of terrorism in Bosnia in the next five years may not be as dire as in Africa or the Middle East, but with the convergence of terrorism and organized crime, and mainstream political parties and religious extremists, the country remains a serious threat to the security of Europe in terms of its position as a transit point for terrorists.... Bosnia, as a result, became a magnet for foreign Islamic jihadists during and after the war and is today having to grapple with a home-grown terrorism threat, especially by extremists attracted to the idea of a caliphate stretching from Iraq to Eastern Europe to protect all Muslims....
10 Pages (2500 words) Coursework

The Saudi Arabian Governments Efforts to Counteract Security Threats

It is clear from the discussion "The Saudi Arabian Governments Efforts to Counteract Security Threats" that the Saudi Arabian government is keenly aware of the past episodes of violence and, as a result, it has endeavored to put various measures into place to ensure the safety of the pilgrims.... hellip; During Hajj, millions of pilgrims from around the world visit Saudi Arabia for Islam's annual pilgrimage....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us