StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

General Motives Among Terrorists - Assignment Example

Cite this document
Summary
The author of this paper states that counterterrorism is the tactics and strategies adopted by the government and related agencies to counter the threat of terrorist attacks on government agencies and endangering civilian rights and properties…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
General Motives Among Terrorists
Read Text Preview

Extract of sample "General Motives Among Terrorists"

What is counterterrorism motivations behind terrorism when engaged in counterterrorism efforts? What kind of general motives might you find among terrorists in this country and abroad? Counterterrorism are the tactics and strategies adopted by the government and related agencies to counter the threat of terrorist attack on government agencies and endangering civilian rights and properties. It is “choice of the forms of action available and potentially effective in meeting the challenge of international terrorism on a global scale” (Baregu). It is very important to understand the motivations behind the terrorism when engaged in counterterrorism efforts, mainly because today the terrorism has become high tech and spread globally, infiltrating the society to the extent that if not handled with cautious and premeditated techniques and strategies, involving the in-depth analysis of the socio-psychological background of the terrorist, it would be extremely difficult to take effective steps to countermand their intended actions, targeting the innocents and holding them to ransom. The general motives of the terrorists in this country and abroad involve coercive tactics and unlawful intimidation of the government bodies to force the government to accede to their vested interest regarding political, ideological or religious demands. Is counterterrorism a tactic of warfare or crime-fighting? What role does due process play in either context? What are the implications when terrorists can be characterized as the "enemy" rather than mere criminals? Counterterrorism is neither a tactic of warfare or crime-fighting but it an amalgamation of both, depending on the motives of the state or the people carrying out the deliberate act of aggression against the innocents. Tactics of warfare is normally adapted when the terrorism is sponsored by the state and counterterrorism needs to be spread over a large area involving sophisticated use of resources in order to protect the lives and property of the civilians and the innocents. Terrorists are people or individuals who commit intended violence against the innocents with the sole intention of harming the public and destroying the property in order to make them meet their vested political goals and religious fanatics’ demands. “For our terrorist enemies, violence is not only justified, it is necessary and even glorified..” (internet). When the objectives of the violence perpetrated against a large number of people, exceeds the individual vested interests of the perpetrators, to include the collective demands of certain political or religious ideology, the violence and the nefarious intentions represent the acts of enemies or terrorists and not of mere criminal who defy the state laws for their individual interests. How has surveillance changed from the "traditional" to "new surveillance"? Are these changes potentially problematic for civil liberties in any way in the United States? Should law enforcement be permitted to use all technological resources available to accomplish its mission, including in the fight against terror? Are there limits? Counterterrorism has been taken up in a multifaceted way, one of which is that of ‘surveillance’ of the ‘suspected terrorist’ and important government and public places which may be targeted by the thems. Apart from the surveillance of the government and public places, the ‘traditional’ way of surveillance has been replaced with the new high tech electronic surveillance. The new high tech surveillance involves the electronic surveillance with the use of sophisticated gadgets that are used to keep track of the mobility and financial transactions of the suspects who may be directly or indirectly involved in the terrorism. “The Terrorism Surveillance Program (TSP) is the surveillance program, authorized and described by the President which involves the targeted interception by the National Security Agency (NSA) of communications, in which one party is outside the United States and there are reasonable grounds to believe that at least one party to the communication, is a member or agent of al Qaeda or an al Qaeda affiliated terrorist organization” (white paper). The latest technologies may sometime infringe on the civil liberties of the public but in the larger interests of the public, the government needs to use these measures so as to anticipate the moves of the terrorists and help prevent any major catastrophe. The technological advancements have not only benefited the general public but they are now being used by the terrorist outfits to carry out acts of terrorism in the far flung areas to create terror and instability among the masses and general public. It is therefore, necessary for the law enforcement to use the latest technology and resources so that proper tabs can be maintained against all terrorists’ organizations and suspects and destruction and violence against humanity can be averted. The only limits that must be imposed by the law enforcements should be the necessary safeguard for the innocent civilians who may get trapped in false identification. What is the FISA Court? Explain how it works. What authorities can it grant law enforcement? How is it different from traditional courts? What concerns exist about expanding the use of FISA? Foreign Intelligence Surveillance Act or FISA is a government act that legitimizes the collection of information regarding foreigners by the state intelligence to protect the state against espionage, terrorism, sabotage, assassination, hijacking or any other such activities that may be conducted by the foreign agency or state or such elements. FISA court is a special court with 11 federal court judges who are appointed by the Chief Justice. Each of the judges individually reviews the applications of the Attorney General for authorization of the electronic surveillance for foreign intelligence information and “Requests are adjudicated by a special eleven member court called the Foreign Intelligence Surveillance Court” (internet). It allows the law enforcement authorities to use electronic surveillance like wire tapping, eavesdropping, permits physical entries for investigation and any other such activities to gain information from agents regarding foreign intelligence that may be against the interest of the state. It is different from the ordinary court in the sense that its proceedings are non adversarial and the information gained may not be revealed, even to the person suspected of being ‘foreign agent’. FISA powers are wide ranging and vague and the secrecy of the proceedings is liable to be misused and abused. How has aviation security changed since 9/11? What were the provisions of the Aviation and Transportation Act? Did this act changed aviation security in a dramatic way? What role does racial or religious profiling play in securing the aviation industry and its consumers? What role should it play? The aviation security has changed drastically since 9/11. The vulnerability in the screening of the passengers and the luggage to detect the presence of explosives and arms and other dangerous items, as well as the weak security in air control rooms and the access to secure areas at the airport and other sensitive places, have all been addressed. “Aviation and transportation Security Act was enacted on 19 November 2001, which created Transportation Security Administration (TSA) with its primary responsibility of ensuring security in aviation and other modes of transportation” (internet). TSA has deployed more trained marshals and better screening facilities for the passengers and the luggage as well as for air cargo. Use of advanced technology and thorough checking of the credentials of the airport staff, including biometric indicators, are incorporated to ensure enhanced security. After the act, the aviation security has changed dramatically. More intense and thorough screening by the trained staff coupled with more sophisticated and high tech gadgets have facilitated better screening. The use of CAPPS II (computer assisted passengers prescreening system) using finger printing and biometric indicators, have been made compulsory. CAPPS II also uses national security and commercial databases to assess risk and identify passengers for extra screening raising concern about privacy rights and civil liberties. The post 9/11 scenario has seen a marked paradigm shift in the outlook of the racial and religious background of the passengers. The use of CAPPS in the screening has been especially traumatic for people of different race and religion specially that of Moslem origin and Asians. The biased outlook is especially frustrating for the innocent passengers who are harassed for just being of that race and religion. The TSA should be a neutral agency that should execute its functions in an impartial manner giving same respect to all passengers irrespective of their race, religion and color. Reference Baregu, Mwesiga. Terrorism and Counterterrorism: Dialogue or Confrontation? Available: < http://www.un-globalsecurity.org/pdf/baregu.pdf> [13 November, 2007]. Department of Justice, USA. 22 June, 2006. Counterterrorism White paper. Available: [13 November, 2007]. [13 November, 2007]. Foreign Intelligence Surveillance Act. Available: [13 November, 2007]. Today’s Terrorist enemy. White House. Available: [13 November, 2007]. Transport Security: Post September 11th Initiatives and Long Term Challenges. Available: [13 November,? Why is it important to understand the 2007]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(General Motives Among Terrorists Assignment Example | Topics and Well Written Essays - 1446 words, n.d.)
General Motives Among Terrorists Assignment Example | Topics and Well Written Essays - 1446 words. https://studentshare.org/military/1710060-counter-terrorism
(General Motives Among Terrorists Assignment Example | Topics and Well Written Essays - 1446 Words)
General Motives Among Terrorists Assignment Example | Topics and Well Written Essays - 1446 Words. https://studentshare.org/military/1710060-counter-terrorism.
“General Motives Among Terrorists Assignment Example | Topics and Well Written Essays - 1446 Words”. https://studentshare.org/military/1710060-counter-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF General Motives Among Terrorists

John Brown: Terrorist or Prophetic Hero

In comparison to modern day terrorism, it is evident that most terrorists engage in causes that achieve little if any significance since their reasons for engaging in battle are based on hate, and not on issues that affect people.... On the other day, it is evident that a majority of terrorists in the contemporary society engage in terrorism activity in order to achieve heroic status without using a basis such as freeing people from slavery as a basis for engaging in their activities....
3 Pages (750 words) Essay

The Muslim as a Terrorist: A Societal Misconception of the Realities of the Current World

This essay will analyze some of the main reasons why Muslims cannot and should not all be considered as terrorists.... hellip; One of the most unfair and disheartening typifications and stereotypes that pervade American society is with regards to the belief that somehow all individuals that practice the Muslim faith are ultimately terrorists.... However, the fact of the matter is that when one views the data and analyzes the problem an incidence of terrorism within the United States, one instantly comments to the clear and profound understanding that of all of the incidents which have taken place, only 6% can be attributed to radical Islamic terrorists....
5 Pages (1250 words) Essay

Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements

"Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements" paper purposes actions that include: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing the sustainability of basic technology.... hellip; Thomas Kean, co-chairman of the 9/11 Commission, the First Response Coalition illustrates that the call for action is the same now as it was several years ago: “On September 11, people died because police officers couldn't talk to firemen....
7 Pages (1750 words) Coursework

Can terrorism ever be morally justified

Some studies suggest that poverty and one's perception of unfairness and moral debauchery of Western capitalism play an integral part in forming these terrorists.... They don't delve into the root cause and what the ultimate objectives are behind these motives, but rather focus on what is done.... These definitions however, form more of a general perspective to this whole idea, are simply unsatisfactory....
5 Pages (1250 words) Research Paper

The Muslim as a Terrorist: A Societal Misconception of the Realities of the Current World

One of the most unfair and disheartening typifications and stereotypes that pervade American society is with regards to the belief that somehow all individuals that practice the Muslim faith are ultimately terrorists (Juergensmeyer, 2013).... As a function of this understanding, this particular analysis will analyze some of the main reasons for why Muslims cannot and should not all be considered as terrorists....
7 Pages (1750 words) Essay

The Dangers of Cyber-Terrorism

Even though the motives keep on being the identical, United States is now confronted with cutting edge and unusual tools.... In the paper “The Dangers of Cyber-Terrorism” the author discusses cyber terrorism, which entails two major aspects: cyberspace and terrorism, allowing it to be considered as the usage of information technology by terrorist organizations....
5 Pages (1250 words) Research Paper

The Relationship between the Media and Terror Organizations in the Context of Helds Claim

Firstly, I will extrapolate on… Thereafter, I will describe the interaction between the two showing how the media at times promotes the agenda terrorists and attempt to prescribe alternative methods they Ultimately, I will conclude that the primary reason many media organizations may find themselves “aiding” terrorist is not out of the inevitability of an incidental connection, but a money-oriented strategy.... She bases her argument on the claim that the media cannot be relied on to play its moral role in the war against terror since it is predominantly driven by profit motives....
6 Pages (1500 words) Essay

Role of Intelligence Agencies in Keeping the World Safe

SIGNIT Intelligence: - This type of intelligence is used to communicate sensitive information among the ranks and people associated with secret services.... This research effort will be analyzing and evaluating the roles of different departments and agencies that fundamentally constitute US intelligence network that is interactively learning and working in order to minimize both domestic and foreign national security threats....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us