StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Main Counter-Terrorism Strategies to Implement for Law Enforcement Agencies - Essay Example

Cite this document
Summary
"Main Counter-Terrorism Strategies to Implement for Law Enforcement Agencies" paper argues that while we must do all we can to protect the rights to privacy and the right to be left alone by the government, the security of the nation depends on security officers having the right information in time…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Main Counter-Terrorism Strategies to Implement for Law Enforcement Agencies
Read Text Preview

Extract of sample "Main Counter-Terrorism Strategies to Implement for Law Enforcement Agencies"

While there are several implications for counter-terrorism strategy which can be gathered from the training manual produced by Al Qaeda, three strategies seem the easiest to implement with high strategic returns for law enforcement agencies. First and most importantly, the manual can let security officers know of plans which have not been executed as of yet and it can let them know about targets that may be attacked by terrorist groups and terrorist cells in the future.

Second, the manual allows security personnel to see what methods are used by Al Qaeda to recruit and retain individuals within their cells and counter indoctrination methods can be devised to break individuals away from these cells. Finally, the manual shows that the war being waged by terrorist groups such as Al Qaeda is indeed an unconventional war that may require unconventional methods on the part of security officers to ensure victory. To better understand these implications it would be best to discuss them individually.

The first implication gives us a clear understanding that there are specific targets that are high-security risks for the western world, therefore, protection of these strategic points has to be improved. Of course, it would be impossible to make things completely secure without denying many individuals rightful access to high-security locations, but as we have found out from the attacks of 9/11, the methods used by terrorists may be unstoppable altogether. For example, if terrorists can use hijacked airplanes to attack buildings on the land, it is also possible for them to use small submarines to carry out an attack on a seaport or a capital ship of the navy.

A terrorist who is a suicide bomber is certainly indoctrinated to give up life for a misguided cause and that indoctrination would be difficult to counter without knowing something about the religious guidelines that can be misconstrued to push a person into the killing. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(CJ 450 Counter Terrorism Essay Example | Topics and Well Written Essays - 750 words, n.d.)
CJ 450 Counter Terrorism Essay Example | Topics and Well Written Essays - 750 words. https://studentshare.org/miscellaneous/1711033-cj-450-counter-terrorism
(CJ 450 Counter Terrorism Essay Example | Topics and Well Written Essays - 750 Words)
CJ 450 Counter Terrorism Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1711033-cj-450-counter-terrorism.
“CJ 450 Counter Terrorism Essay Example | Topics and Well Written Essays - 750 Words”. https://studentshare.org/miscellaneous/1711033-cj-450-counter-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF Main Counter-Terrorism Strategies to Implement for Law Enforcement Agencies

Anti-Terrorism bill 2000. A necessary evil

The critics feel that the various counter-terrorism strategies and policies implemented in UK, has created a lack of trust between the Muslims, and the UK law enforcement agencies.... Background history The history of terror and counter-terrorism strategies to repress the terror acts were started as early as 1790s, when the French revolution and the associated acts of violence and radicalism created a panic in.... The paper tells that the history of terror and counter-terrorism strategies to repress the terror acts were started as early as 1790s, when the French revolution and the associated acts of violence and radicalism created a panic in UK that such acts of ‘subversion' would take place in Britain, against the ruler classes....
37 Pages (9250 words) Dissertation

The War on Drugs and the War on Terrorism

he challenges facing these leaders including designing strategies, and implementing them, as well as enforcing them to advocate for drug and terrorism eradication from the society.... Terrorism and drug abuse are among the most significant social issues negatively affecting a nation and the universal society....
22 Pages (5500 words) Research Paper

Cost to Benefit Analysis of Counter-Terrorism Measures in the US

Counter Terrorism is a method used to prevent terrorist activities, by government or law enforcement agencies.... “The most common definition of counterterrorism (also spelled counter-terrorism) on the Internet is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt in response to terrorist threats and/or acts, both real and imputed” (Kolodkin, 2011)....
12 Pages (3000 words) Term Paper

FBI National Security Branch

The directorate cooperates with other law enforcement agencies to identify, and disrupt WMD operations (FBI, 2006).... The counterintelligence division employs intelligence and law enforcement procedures to carry out investigative operations such as spying activities (wordpress.... The terrorist screening database is accessible to government agencies such as departments of states, central intelligence agency, counterterrorism centre, department of defence, and the department of homeland security (FBI, 2006)....
3 Pages (750 words) Essay

The UK Fight against International Terrorism

UK law enforcement officials successfully thwarted the plot (BBC, July 7, 2009).... he UK currently has a specified national structure of coordination to deal with international terrorism, composed of veritable agencies such as the Home Office, the Cabinet Office, the Civil Contingencies Secretariat, the COBRA (the government emergency coordinating committee), the Ministerial Committee on Defence and Overseas Policy, the Ministerial Committee on Intelligence Services, the Joint Intelligence Committee, MI6, GCHQ, MI5, and the New Scotland Yard and many other elements....
6 Pages (1500 words) Essay

Homeland security preparedness

The domestic intelligence activities were largely concerned with gathering intelligence for the purposes of law enforcement.... fter September 11 attacks, the United… The main reason for this has been the success of the intelligence agencies in the aftermath of terrorist attacks of 9/11. ... he main objective behind Intelligence Reform and Terrorism Prevention Act (IRTPA), 2004 was to integrate the foreign, military and domestic...
12 Pages (3000 words) Essay

Counter-Terrorism Strategies & Plans of the USA

involved in counterterrorism efforts include diplomatic institutions, economic, financial, information propagation, military, intelligence agencies, homeland security, and law enforcement agencies.... From the paper "counter-terrorism strategies & Plans of the USA" it is clear that police and intelligence agencies have various roles to play including a collection of intelligence about feasible terrorist activities, ensuring the protection of susceptible targets, and promptness in response to attacks....
11 Pages (2750 words) Assignment

The Change in Federal Law Enforcement After 9/11

This paper "The Change in Federal law enforcement After 9/11" explores the federal law enforcement after the September 11 attacks with a focus on the Homeland Security Act, the United States of America Patriot Act of 2001 and the Homegrown Terrorism Prevention Act.... Each jurisdiction has its own set of criminal justice laws and agencies....
36 Pages (9000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us