StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Potential Exploitable Weakness in Terrorist Organizations - Term Paper Example

Cite this document
Summary
The report “Potential Exploitable Weakness in Terrorist Organizations” seeks to explore the domain of terrorism, which could be local, national or international, beyond the geographical boundaries. They travel to their destinations with a motive to bring catastrophe…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Potential Exploitable Weakness in Terrorist Organizations
Read Text Preview

Extract of sample "Potential Exploitable Weakness in Terrorist Organizations"

 Potential Exploitable Weakness in Terrorist Organizations. Introduction Terrorism is an act of oppression to create havoc and trauma amongst the inhabitants of a particular geographical area. Such an act possesses no legal binding or any follow-up of law. Terrorism is an act of violence with the intention to generate 'terror' for a political motive, to achieve spiritual dominance, or to accomplish an ideological goal. Terrorism is a purposeful attempt to disregard wellbeing of the people, an act practiced by criminal organizations to highlight their importance (“What is Terrorism?” n.d.). Terrorism is performed by individuals with disrupted psychology who believe in deceiving officials and their actions are directed towards generating threats, brutality incited through excessive independence, ethnocentrism, chauvinism and revolt. A feeling of accomplishment is observed when a terrorist perform any illegal act, however, such motivation could be due to the backing provided though political, spiritual or communal rationale. The domain of terrorism could be local, national or international, beyond the geographical boundaries. They travel to their destinations with a motive to bring catastrophe, with more advanced strategies and equipments keeping abreast with the advances in science and technology, terrorism is also becoming more complicated and aggressive. The terrorist organizations recognize the importance of unsavory reputation attributed to numerous assaults (“Exploiting Terrorist Vulnerabilities: A Law Enforcement Approach to Fighting Terrorist Organizations”, n.d.). However, terrorists could be impeded from spreading terror and causing adversity by preventing their travel. Such an act could be accomplished by disrupting terrorist travel. Restraining the travelling of terrorists has emerged as the most successful bludgeons in the War on Terror. By restricting the movements of terrorists out of their territory and domains to attack the United States, or allies, terrorist attacks are curtailed enormously. The present article highlights the impact of disrupting terrorist travel and correlates the success attained as a potential exploitable weakness in terrorist organizations. Such restriction is considered as an important component of counterterrorism program. The terrorist attack of 9/11 spotlighted the necessity to enhance the vigilance and alertness over all routes of travel system both national and international in order to refrain terrorist from gaining entry to accomplish their mal-intentions ("National Strategy To Combat Terrorist Travel", 2006). Disrupting Terrorist Travel One of the chief and efficient weapons to fight terrorism is to restrict the mobility of terrorists. If the mobility of the terrorists is constrained a reduction in terrorist attacks could be observed. The 9/11 terrorist attacks brought to focus that there is a need to strictly advance the surveillance and control the travel either through domestic routes or international travel systems as a way to restrain the mobility or terrorist. The strategy was strictly followed after 9/11 by the US Government and has provided considerable success in attaining the set objectives. This was done by performing strict screening of every visitor to United States. Further, the information bureau has improved the terms with foreign nations to enhance vigilance and security at the borders of the nations. These partner nations provide information about the terrorists to the United States in an appropriate and proficient manner. The terrorist adopt certain means to stay resolute, enduring, and adjustable, but the enhanced security has made the travel of the terrorist difficult. However, the illicit individuals or facilitators are always in search of formulating new strategies to understand the weakness and to deceive the security forces ("National Strategy To Combat Terrorist Travel", 2006). However, with the strict security, it is complicated for terrorists to implement their plans, but at the same time they try to seek any weakness in US security and foreign border control. In order to check the terrorist travel, it is essential that unrelenting mutual and polygonal global collaboration, as well as synchronized law enforcement, intelligence, and political inventiveness. The objective of the NSCTT is to disrupt terrorist travel across the world and to implement this the NSCTT formulated eight chief steps essential to attain the set objectives, they are- 1. Identification of the terrorist or the suspect. 2. Certification of data sharing between US Government and the associate nations. 3. Thorough screening of the travellers from all routes, air, sea and land before they reach to other parts of the US. 4. Work in collaboration with partner nations to bound and monitor terrorist travel. 5. Detection and apprehension of the terrorists who resist checking or whom the forces suspect to be the terrorist. 6. Infrastructures and set of connections facilitating travel of terrorists must be demolished. 7. When important document are being sent, care must be reinforced to protect them from getting into the hands of terrorist either by legal or through illegitimate means. 8. Information related to the terrorist(s) must be collected and analyzed and then distributed to the people, to encourage public participation in combating terrorist travel ("National Strategy To Combat Terrorist Travel", 2006). The NSCTT deal with recommending the US Government to enhance or expand their potential to contract the issue of terrorist travel. In this context they have formulated two pillars, each supporting three premeditated purposes: Pillar I: Enhance US and Foreign Partner Capabilities to Constrain Terrorist Mobility Overseas Strategy 1: Restrain Terrorists’ Ability to Cross International Borders Strategy 2: Help Partner Nations Build Capacity to Limit Terrorist Travel Strategy 3: Deny Terrorists Access to Resources That Facilitate Travel ("National Strategy To Combat Terrorist Travel", 2006). These are some essential measures and should be implemented to disrupt terrorist travel across the geographical boundaries. Terrorist screening and information sharing is performed with the help of partners in collaboration with the US national security interests. Capacity building exploits State Department controlled law enforcement to combat terrorism in alliance with other nations. The mobility of terrorist is beyond the geographical boundaries and should be restricted with partner nations' collaboration. One such collaboration involves operation with Canada, the neighbouring nation to keep vigilance upon people who are frequently travelling. Collaboration with different countries is also essential to develop personality affirmation. Encouraging governments of other nations not to issue passports for lost passports, this could be efficiently facilitated with INTERPOL and to accept or reinforce strict laws for those who are forged or mistreat identity and travel documents. Motivating governments of other nations to meet International Civil Aviation Organization (ICAO) guidelines to implement on minimum security standards ("National Strategy To Combat Terrorist Travel", 2006). There are certain network agencies which are established to support terrorism and facilitate terrorist travel under "Executive Order 13224". The chief organizations performing such deeds are al-Qa'ida and Taliban as stated by United Nations Security Council's 1267 Sanctions Committee. Strict actions must be encouraged on individuals or organizations to deliberately conceal transport information or currency transfer information. Nations must be promoted to close down unfamiliar smuggling system. International ports and ships must have high security to cease the entry of terrorists ("National Strategy To Combat Terrorist Travel", 2006) Pillar II: Deny Terrorists the Ability to Enter, Exit, and Travel Within the United States Strategy 1: Inhibit Terrorists from Crossing US Borders Strategy 2: Enhance US Government Capabilities to Detect and Constrain Terrorist Travel Within the United States Strategy 3: Strengthen US Identity Verification Systems ("National Strategy To Combat Terrorist Travel", 2006). For Homeland Security Presidential Directive11, US-VISIT (US Visitor and Immigrant Status Indicator Technology) system must be implemented. Suitable security clearances to consular, CBP and USCIS must be implemented. Information Sharing Environment must be influenced for organizations engaged in providing information about the identities of terrorists. Appropriate connectivity is essential for the success of the strategy ("National Strategy To Combat Terrorist Travel", 2006). Implementation of US-VISIT system is imperative in border security and in immigration management enterprise. Advance Passenger Information System (APIS) is essential to enhance US Government's scrutinization procedure on air and sea route passengers. This is a step to identify the terrorist based on the watchlist sustained by the Federal Government, before the terrorist leaves the United States ("National Strategy To Combat Terrorist Travel", 2006). To combat terrorism, international registered traveller program must be executed and a close vigilance and monitoring must be performed on the travellers as well as the security must be enhanced for the traveller who are at higher risk. Absolute implementation of US Government sustaining strategies for the National Strategy for Maritime Security to guard and protect US coastlines from terrorists who are trying to gain entry into US by sea route. Regulations related to state motor vehicle and state bureau of vital statistics must be executed ("National Strategy To Combat Terrorist Travel", 2006). Immigration laws and policies related to the borders must be followed and enforced to combat terrorists attack. Suitable intelligence officials must be available to take the charge of US Intelligence Community. Analytical capabilities must be further enhanced to empower ICE (Immigration and Customs Enforcement) and FBI. Appropriate resources must be provided to enable HSTC (Human Smuggling and Trafficking Center) to accomplish accountabilities to perform terrorist analysis. Capitalization on curricula employed by CBP, the Federal Law Enforcement Training Center, ICE and US Secret Service to develop complete document in order to prevent fraud and risk management. Intelligence methods must be employed to disrupt terrorist travel in the nation ("National Strategy To Combat Terrorist Travel", 2006). In order to support the these strategies strict followup becomes essential to meet ongoing challenges at domestic and international front. All the strategies formulated by NSCTT, are carried out within the constraints of US law. Terrorist Adopt Numerous Tactics to Travel To implement their strategy, terrorist adopt various means to travel surreptitiously or secretly is attributed to the kind of plan they have formulated, the training provided, effective communication, inspection, logistics and initiation of attacks. Some of the means adopted by terrorists encompass- getting bogus or photo-substituted passport, or they have many passports with different names. With the advent of technological advances, numerous graphic software are available which enables the forgers to support successive immigration swindle. Thus, terrorists extended their visas, some of them studied in United States, travelled under pseudonym and thereby entered United States without passage check ("9/11 And Terrorist Travel- National Commission on Terrorist Attacks", n.d.). It is essential for the security forces to consider these aspects to keep a check on the terrorists and the tricks they execute to make their plans successful. Tracking When the terrorists who are involved in drug delivery and smuggling establish communication with their chiefs or customers, they are being caught, and their crew members are also exposed. In attempt to be pertinent with the latest technology, terrorists have to learn new skills, and they travel to the sources, such acts make them vulnerable, as latest skills are known to a few members whom intelligence officials could easily trace. On the contrary, some of the terrorist organizations may use obsolete technologies, which are not of much use to others but convey messages. After the incidence of 9/11, 2001, the government of the United States has changed its strategy from passive to proactive. Over the years, numerous terrorist organizations appeared; some of the nations have terrorist organizations confined to their own places, and they try to generate horror and fear in the minds of innocent people. The approach may be different for these terrorist organizations but the motive is the same – to generate fear in the masses by means of destruction. Though the same strategy of exploiting the weakness of terrorist organisations can be employed for all of them, their environment must also be taken into consideration (“Terrorist Motivations and Behaviours”, n.d.). Conclusion Terrorist organizations are motivated and directed to spread terror in a particular geographical area at a particular time. They always keep making plans for their next attacks. In the process of formulating the plan or during the execution of the plan, they need to travel. Officials keep a constant watch on the terrorists, and once they understand the weaknesses associated with the terrorist organization, they wait for the appropriate time to kill the terrorists. A proper strategy is required as in the case of Osama bin Laden, an accused of 9/11, which provided a grand success to the America's Black Cat Commandos. This could be accomplished by gathering information, understanding weaknesses, gradually formulating the strategies to attack the terrorists. A constant vigilance is required by the officials to catch hold of the terrorists and to ensure the safety of the innocent people. A significant progress has been accomplished since 9/11 in distinguishing, identifying and clutching terrorists across the world. Besides all these efforts only a handful of them were caught and work is still underway to eradicate terrorism from the world. Major success is attributed by disrupting terrorists travel and refraining them from exploiting the intercontinental and US travel systems to implement their plans successfully. By employing widespread arsenal of equipments to eliminate terrorist travel in USA and the partner nations the mobility of the terrorists could be prevented ("9/11 And Terrorist Travel- National Commission on Terrorist Attacks", n.d.). The noteworthy endeavors of the US Government to leverage the terrorist mobility has enhanced the security of the nation and its people. Americans are safe and this peace of mind is attributed to the continuous endeavors taken by the US Government officials, intelligence, the US force and the laws. All the plans of terrorists, could not gain success because of the preparedness of officials to combat the mal-intentions of the terrorist. Disruption of terrorist travel therefore served as a contrivance to eradicate terrorist attacks. At home the US Government is working in co-ordination with the state and local governments and law enforcement agencies to thwart terrorists entry in the nation and committing assails in the country. Not only the United States is to be protected but the partner nations should also combat terrorism and to secure international boundaries ("National Strategy To Combat Terrorist Travel", 2006). Disrupting terrorists travel is one such method which the officials found to be highly beneficial after 9/11 tragedy. Terrorists travel to United States with mal-intentions to abolish buildings and bring disaster. By disrupting their entry in the nation such incidence could be prevented. It is commendable job and authorities are doing their best to keep the United States safe and secure for its inhabitants. Officials are alert and equipped with modern amenities to sense the move of terrorist or any suspect. They are vigilant and disrupt every move of terrorist. Thus, the disruption of terrorist travel is the best method to combat terrorist attack, by retraining terrorist travel and by implementing strict security measures mentioned in the article, terrorist attack could be prevented. According to 9/11 Commission Report (2004)- Targeting travel is at least as powerful a weapon against terrorists as targeting their money. The United States should combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility ("National Strategy to Combat Terrorist Travel", 2006). References Byman, D. (2008). The five front war: The better way to fight global jihad. Hoboken, New Jersey: John Wiley & Sons, Inc. Exploiting terrorist vulnerabilities: A law enforcement approach to fighting terrorist organizations. (n.d.). Retrieved from www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA505009 National Strategy to Combat Terrorist Travel. (2006). Retrieved from www.nctc.gov/docs/u_terrorist_travel_book_may2_2006.pdf. 9/11 And Terrorist Travel- National Commission on Terrorist Attacks. (n.d.) Retrieved from www.9-11commission.gov/staff.../911_TerrTrav_Monograph.pdf. Terrorist motivations and behaviours. (n.d.). Retrieved from www.au.af.mil/au/awc/awcgate/army/guidterr/ch02.pdf What is terrorism? (n.d.). Retrieved from http://www.terrorism-research.com/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Potential Exploitable Weakness in Terrorist Organizations Term Paper, n.d.)
Potential Exploitable Weakness in Terrorist Organizations Term Paper. Retrieved from https://studentshare.org/social-science/1781591-disrupting-terrorist-travel-to-exploit-weaknesses-in-terrorist-organizations
(Potential Exploitable Weakness in Terrorist Organizations Term Paper)
Potential Exploitable Weakness in Terrorist Organizations Term Paper. https://studentshare.org/social-science/1781591-disrupting-terrorist-travel-to-exploit-weaknesses-in-terrorist-organizations.
“Potential Exploitable Weakness in Terrorist Organizations Term Paper”, n.d. https://studentshare.org/social-science/1781591-disrupting-terrorist-travel-to-exploit-weaknesses-in-terrorist-organizations.
  • Cited: 0 times

CHECK THESE SAMPLES OF Potential Exploitable Weakness in Terrorist Organizations

Reasons for Terrorism in Northern Ireland: A Cultural Perspective

While eventually the moderates would prevail, elements of radicalism were preserved through the Irish Republican Army which is responsible for a number of terrorist attacks over several decades.... Although there has been considerable peace in Northern Ireland since the 1990s especially after political power-sharing agreements between the Protestants and the Catholics, terrorist attacks in 2009 at the Massereene army base in Antrim indicate the volatility that still pervades (Coll)....
11 Pages (2750 words) Research Paper

Disrupting the Recruitment Process to Exploit Weaknesses in Terrorist Organizations

A comprehensive response to counter terrorism requires disrupting of existent terrorist networks as well as preventing fresh recruitments into terrorist organizations.... A comprehensive response to counter terrorism requires disrupting of existent terrorist networks as well as preventing fresh recruitments into terrorist organizations.... There are four distinct levels of commitment within terrorist organizations.... Although all play a critical part in the running of the terrorist organizations, the cadre can be singled out to be the level that has a phenomenal influence in the recruitment process....
10 Pages (2500 words) Research Paper

Assessment of Marxist Theories of Fascism

The concept of fascism is a tricky one, for it is a form of government that not many scholars have been able to adequately define (Umland, 2005, p.... 34).... Moreover, scholars have debated as to what regimes belong under the fascist rubric.... Some scholars converge upon a generic definition of fascism, while others reject that there can be such a thing as a generic model of fascism....
14 Pages (3500 words) Essay

Foreign Terrorist Organizations

Foreign terrorist organizations.... Foreign Terrorists organizations (FTOs) are the ones which are claimed to have violated the rules of American Department of State and are alleged to have involved in the terrorist activities (U.... Mainly the list includes those groups or organizations… The organization that I have picked is a group which is named as Lashkar-e-Tayyiba, a Kashmir based freedom fighting group.... Historically, Kashmir has been classified as the disputed territory according to Foreign Terrorists organizations Foreign Terrorists organizations (FTOs) are the ones which are claimed to have violated the rules of American Department of State and are alleged to have involved in the terrorist activities (U....
1 Pages (250 words) Essay

Exploitable Weaknesses of Terrorist Groups

The biggest challenge presently is a metamorphosis of these groups into virtual organizations that integrate into society and operate globally.... According to Jones & Libicki (2008), there are several reasons why terrorist groups seize to exist, but the primary ones are turning to political processes and assassination or arrest of their leaders by intelligence organizations or police.... The paper "Exploitable Weaknesses of terrorist Groups" states that exploiting the inherent weaknesses within terrorist groups is vital for putting in place strategies that are effective in bringing them down since different strategies work in different contexts (Cronin, 2006)....
1 Pages (250 words) Essay

Funding Sources for Terrorist Organizations

The goal of the current writing "Funding Sources for terrorist organizations" is to shed the light on the methods of extorting funds by the terrorist organization from various types of financial activities.... hellip; terrorist organizations, like any other organization, require funds to run its operations.... Funding Sources for Terrorist OrganizationsTerrorist organizations, like any other organization require funds to run its operations....
1 Pages (250 words) Essay

A Marketing Plan for the Budgens

The paper “A Marketing Plan for the Budgens” deals with development plan tailored to the company's SWOT and PESTLE analysis.... The first reflects its strengths, weaknesses, opportunities, and threats, the latter studies political, economic, technological, legal, and other influencing factors....
23 Pages (5750 words) Research Proposal

Types of Hacking

Members of these groups could apply their skills to identifying and suggesting ways to improve existing systems and help to close any weaknesses or exploitable holes.... The paper "Types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions....
24 Pages (6000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us