StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Terrorist Group Profile and Homeland Security Policy - Term Paper Example

Cite this document
Summary
This research paper provides a comprehensive account of a well-known terrorist group that goes by the name of Al-Qaeda. Discussion will focus primarily on the modus operandi of the said terrorist group and how they became notoriously known worldwide after the 9/11 incident. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Terrorist Group Profile and Homeland Security Policy
Read Text Preview

Extract of sample "Terrorist Group Profile and Homeland Security Policy"

?Running Head: Terrorist Group Profile and Homeland Security Policy Terrorist Group Profile and Homeland Security Policy Sulman Danyal Syed Introduction to Homeland Security, HMLS 302 Professor Mark Landahl April 01, 2011 Abstract This research paper provides a comprehensive account of a well-known terrorist group that goes by the name of Al-Qaeda. Discussion will focus primarily on the modus operandi of the said terrorist group and how they became notoriously known worldwide after the 9/11 incident. The data presented is based on the researches and studies made by experts in the field of terrorism. And this will be followed by policies established by the United States National Homeland Security regarding terrorism. The policies that will be discussed here are solely based on the written directives and guidelines built by the National Homeland Security Department, which will serve as the basis on how the United States will make means and ways to counter potential terrorist attacks to keep the nation safe. The first part of this paper will talk about the terrorist group Al-Qaeda. The discussion will give enlightenment as to how the group evolved after the Afghan War. The group’s ideology, tactics, targets and capability will likewise be pointed out. The second part of the paper will talk about the National Homeland Security policies in relation to terrorism. The policies will initially be introduced and will be evaluated against the data or information gathered about Al-Qaeda in the conclusion. Suggestions or recommendations may be stated, if the policies are deemed to need improvement. Terrorist Group Profile The Al-Qaeda Al-Qaeda is an extremist Islamic group which was originally based in Sudan during the 1990s. The founder of the group is Osama bin Laden who is originally from Saudi Arabia and a family member of the Bin Laden Group of Companies. The members of the Al-Qaeda were recruited from various Islamic countries and were trained to fight alongside their Muslim counterparts in Afghanistan during the Afghan War against the invading Soviets (Encyclopedia Britannica, 2011). After the war with the Soviets, Al-Qaeda established its base in Afghanistan. This was made possible by the Taliban who at that time were the feared militia of the said country. Following the September 11, 2001 attacks on the United States World Trade Center and the Pentagon, the United States under the Bush Administration launched an attack on the stronghold of the Taliban Militia in Afghanistan because they were harboring the Al-Qaeda who were found to have been the mastermind of the terrorist attacks that occurred on American soil in September 11, 2001 (Encyclopedia Britannica, 2011). The United State’s invasion of Afghanistan in 2001 led to the defeat of the Taliban forces; and Al-Qaeda lost its primary training camps for would be terrorists. The destruction of the Al-Qaeda’s main training ground however did not prevent the group from making other numerous attacks against the United States, its personnel (civilian and military), and its allies from different parts of the world. The reason behind this is that Al-Qaeda has other cells or hidden bases in other countries that its members can use to communicate with the leaders of the group. Aside from this, it has forged alliances with other extremist groups in the world, hence establishing its roots locally without the need for the leaders like Osama gin Laden to be personally present within a given place or country that is targeted for an attack (Encyclopedia Britannica, 2011). Al-Qaeda’s Ideology The ideology of the Al-Qaeda group in the beginning is mainly based in the performance of the jihad, where all Muslims are called forth to destroy and kill American servicemen and civilians including their allies who are located in Muslim countries especially Saudi Arabia. Since Al-Qaeda considers the United States and its allies evil, it is their belief that they must find ways and means to make “jihad” or perform a struggles against the so called evil forces of the West though the destruction of western infrastructures and the indiscriminate killing of civilians in order to accomplish their goals and make everybody see their point (Gunaratna, 2005). While this ideology remained after sometime, Al-Qaeda under the tutelage of Ayman al-Zawahiri carried the Al-Qaeda ideology of jihad was carried a step farther. The new ideology of the group now carries mandatory rules like making a sacrifice of one’s life for the noble cause of Islam. Meaning that the struggle to defeat the enemies of Islam requires being a martyr, whose duty is to give up one’s life without any hesitation (Gunaratna, 2005). This account for many suicide bombings that explain why Al-Qaeda members are willing to go to any length for their cause. As such the Al-Qaeda’s basic ideology at present requires taking up total war against the enemies of Islam through violent struggle that must be carried out by their members who come from different societal levels in the community (Gunaratna, 2005). The total war encouraged by al-Zawahiri is in line with Osama bin-Laden’s belief in “jihadism” or the readiness to kill or be killed in line with the cause one is fighting for in order to purify and defend the Islamic faith. His call encourages all Muslims to take up arms and wage the holy war against the Americans, which also uses force as a means to accomplish the goal of making all Muslim countries as one united Islamic nation (Hayes et al, n.d.). Al-Qaeda’s Tactics Al-Qaeda’s method of terrorist attacks mainly comprise of bombings (car bombings, suicide bombings); and seizing and controlling of intended targets by use of high powered military weapons. Generally, Al-Qaeda’s tactics are performed simultaneously in order to create bigger casualties and increase the fear of their victims including the whole society who bear witness to the disaster and mayhem they have created (Anti-Defamation League, 2011). To further make their cause known, Al-Qaeda makes use of the media to reach a wider range of audience where they can state their messages via pre-recorded videos and tapes. Such moves made them notoriously popular since their activities and statements are being shown on national and international television network channels; making governments and people aware of their presence and their ability to create a disaster (Anti-Defamation League. 2011). Al-Qaeda’s Targets Unlike any other terrorist groups, Al-Qaeda has a well-thought out structure of its intended targets. While many reports perceive that the targets are done randomly, a closer evaluation of its attacks defy the said observation because the attacks are mainly directed at foreigners, especially the Americans and Jews. The other casualties involved, if any, are considered to be sacrifices for the noble cause of their struggle. The group’s main targets are properly categorized in three (3) main classifications which are: 1) faith targets, 2) economic targets and 3) human targets (IntelCenter, 2004). Faith targets mainly include foreign missionary workers who try to convert Muslims to Christianity. Missionaries in Muslim countries who distribute the Bible will likely be assassinated or killed by Al-Qaeda members because their principle is that all non-Muslim individuals who do not practice Islamic faith are evil and followers of Satan (IntelCenter, 2004). Religious worshipping places are also targets since they have some connection to the kind of faith being practice by those who enter such houses. Al-Qaeda considers other religions as a mockery of the Islam faith, and will go to any extent to terminate those who profess such beliefs especially Americans and Jews (IntelCenter, 2004). The second main target of Al-Qaeda attacks are the economic targets which mainly consist of foreign owned businesses and investments that happened to be established or are in Muslim countries. The group believes that foreign business men are stealing and exploiting the national treasures of Muslim countries in the form of oil extraction. For this reason they blow-up oil wells and oil pipelines that are funded by foreign businessmen in an attempt to destabilize the economy and make it hard for those affected to recover financial loss easily (IntelCenter, 2004). The sabotages that are done also have the purpose of making unrest eminent so that foreign investment will be withdrawn and foreigners who desecrate the land of Muslims will leave. When bombings of infrastructures owned by foreign nationals do not get enough attention, the group will go to the extent of funding and fueling political unrest like staging of employee boycotts in multinational firms to disturb operations; and the assassination of foreign businessmen who may have been warned to leave but did not took the threat lightly (IntelCenter, 2004). The third main target of the Al-Qaeda radicals is the human targets who are mostly Christians and Jews who have an important position in Muslim countries since they are considered to be the enemy of God and the prophet of Islam. The motive for killing such people is to plant fear in them so that they will leave Muslim countries and not settle there. The group believes that foreign businessmen exploited Muslim countries by making it an experimental ground for weapons; and for digging out the most treasured possession of the said countries in the form of oil (IntelCenter, 2004). In addition to this is the group’s aim to instill fear within the foreigners especially Americans and their allies and prevent them from further benefiting from Muslim countries. And since the main belief of Al-Qaeda is to use the jihad as a form of “struggle” to purify Muslim soil – they want to impart that their cause is for the struggle and enhancement of the morale of all Muslims by destroying the morale and confidence of others who are not of Islamic faith (IntelCenter, 2004). Al-Qaeda’s Capability Al-Qaeda is deemed as a radical group which practices Sunni Islamic views that does not have any permanent resident in any country (Freebase, n.d.). But while it does not hold down any permanent base after its training camp in Afghanistan was destroyed by United States forces due to the September 11 attacks, the group continues to survive and have an increase in members worldwide (Freebase, n.d.). In relation to this, Zalman et al (n.d.) “compares Al-Qaeda to the Hydra, the many-headed serpent of Greek mythology.” The comparison is made because Al-Qaeda has sufficiently established many cells globally through alliances with other radical groups with the same beliefs. And if one cell is found and destroyed, the group lives on because the destroyed cell is just a small part of its whole being that can be replaced overtime. Just like the Hydra, which according to the myths cannot be destroyed merely by chopping one head off because the body and other heads still live; and another head grows in place of the chopped one (Zalman, n.d.). This is illustrated in the group’s ability to launch attacks, like suicide bombings simultaneously from different locations or places. While no direct funding may come from its original leaders abroad, the locally established cells have financial means to successfully implement their destructive attacks. One way is to have local jihadists and Al-Qaeda sympathizers distribute messages from Osama bin-Laden and other Al-Qaeda leaders by using computer technology to proliferate propaganda. This demonstrates the groups’ ability to reach out to far-flung members by utilizing the technology developed by their enemy – the Americans and its western and Muslim country allies (Fattah, 2006). Such accomplishment aim to achieve the fact that the Al-Qaeda organization can keep abreast with the modern technology of its western and affluent enemies through the media (Fattah, 2006). Based on such observation, it is predicted that the Al-Qaeda will, and is still capable of initiating terrorist attacks on Western countries and Muslim countries who support western foreigners. It has been known that the group initiates attacks on well-populated places and at times when more people are expected to be congregated in one location. It is likewise expected that suicide bombings and other forms of bombings will be the method of attacks. Although future attacks may not be in the same form or mode, Al-Qaeda by all means is expected to continue its insurgent activities to fuel the morale of its mujahideens and gain popular support in order to have finances to back their radical activities (IntelCenter, 2005). The Department of Homeland Security Policies Strengthening the General Aviation Security (GA) to further minimize the vulnerability of GA aircraft flights being used to deliver illicit materials, transport dangerous individuals or employ aircraft as a weapon. The first policy that will be discussed is the policy of “strengthening the general aviation security (GA) to further minimize the vulnerability of GA aircraft flights being used to deliver illicit materials, transport dangerous individuals or employ aircraft as a weapon (DHS, 2009).” The policy involves the prior identification and inspection of a commercial or private aircraft with international and national flight plans that are both bound and departing for and from the United States territory (DHS, 2009). This requires having a reliable manifest or lists of passengers and crew members that need to be meticulously and adequately scrutinized as a form of security procedure (DHS, 2009). Together with the manifests of the passengers and crew members of a commercial airline, the TSA or Transport Security Administration aims to develop a special kind of web or data base program which can be used to gather personal information about those onboard. Pre-clearance forms will be utilized to derive such information which will be double checked against the records that will be stored in the electronic databases (DHS, 2009). Private aircrafts are also required to provide information that details the identification number of the aircraft, the time of departure and time of arrival along with the complete list of passengers and flight crew. The prior submission of pre-clearance forms along with the manifests of passengers and crew allows officials to make an assessment of all individuals inside a particular airplane. This regulation ensures that the people onboard are legitimate in who they claim to be; and avoids situations where terrorists disguise as a normal passengers will have the chance to hijack the plane and use it to create disaster. The only loophole maybe will come in the form of passengers who come from countries that do not have any electronic data information about their citizens. It is then important that in order to achieve efficient results in terms of this policy that all potential passengers from countries that do not have any bank data on their respective citizens, have to submit clearance papers given by appropriate security agencies from their countries of origin. The clearance papers must be required for submission weeks before taking the flight to rule out any kind of foul play on identification cover-ups. In addition to this is the timeframe of any personal history provided by an individual. The safest time frame that must be included in the information submitted for the databanks must be at least for the last fifteen to twenty years back, so that any loopholes or gaps in the given data can be properly examined. Risk is also present in countries that have databank information on the identities of its citizens. The potential threat here is that the information given may not have been properly verified and updated at regular intervals. It is best that regular updating is done on personal information which are encoded and preserved within the required computer system. Since cyber hacking is quite common these days, it is suggested that all databanks stored within computer banks must have security encryptions to prevent hackers from deliberately accessing and using the personal information of others. This policy also covers radiation and nuclear scanning of international general aviation aircraft upon arrival at any United States Airport by using handheld Radiation Isotope Identification Devices (RIID) (DHS 2009). The scanning procedures that are currently being implemented by the proper federal agencies are employed to prevent the entry of materials containing nuclear and radioactive properties, using the aircraft as a carrier. Any materials that contain radioactive and nuclear elements are not only a threat to the country’s environment but to the safety of all the people as well, because these can be used to create man-made disasters that can put the lives of many at stake. DHS Policy for Internal Information Exchange and Sharing: In order to promote a united, Department-wide information-sharing environment, it is critical that each DHS component gives the highest priority to the sharing of potential terrorism, homeland security, law enforcement, and related information. The second policy that will be discussed is the DHS policy for internal information exchange and sharing (DHS, 2007). This particular regulation puts emphasis on the proper communication of all agencies from the local, state and federal levels that allow all concerned and authorized government units and personnel to have access to needed information or data. The said directive or policy puts every concerned personnel on the same footing because they all have the same information that has been disseminated via proper channels. While it is vital for any operation to have the same amount of information or data, it is likewise essential that the information or data given is updated and relevant to the current needs of the situation. Information or data from a year ago needs to be updated since changes might have already occurred after some months have passed. At the same time, it is important that past information critically related to a certain issue or circumstance must be kept in an archived. The importance of keeping such data is that the information may provide leading details on the current information gathered about a particular situation/issue or person of interest. All collated records must be labeled properly to make a search easier and faster. This is in relation to having an established standard mode of research for all security personnel, whether they are from the local, state or federal level. In cases where a particular computer software is required to do or make the search for needed information, the government must provide the necessary know-how in terms of training and seminars to make them aware of the process. The DHS policy for internal information exchange and sharing (DHS, 2007) also stated that all issues of concern must be addressed to the Assistant Secretary of Intelligence and Analysis who is likewise advised to coordinate all efforts with other department or agency heads in matters related to information regarding national security. The purpose of this particular clause is to have a smooth flow of communication between the various parties involved in a certain procedure or operation. Having a unified command system takes away the confusion of having to take directives from a lot of supervisors and heads, which at times may result to the erroneous handling of important data. Being under a single and unified form of command also takes away the burden of making big decisions especially for the rank and file who will have to take the responsibility or consequence should anything go wrong. While having a standard procedure and a unified command can take away the hassles of dealing with too much red tape, the policy likewise implies that the development of a standard procedure in accessing needed information must also provide knowledge on the terms or language which will be used by all agencies and their respective personnel. Having a standard form of terms to be used makes it easier for all to communicate simply and efficiently, preventing any form of trivial misunderstanding that may lead to dire and irreparable consequences. Conclusion Compared to other terrorist groups, Al-Qaeda fares better in terms of member support that does not only stem from the countries of each leaders and strategists. It is a well-footed radical organization, which proved to be able to render massive destruction that does not only cripple the economy of a country but puts fear in the heart of its citizens. Although Al-Qaeda is currently considered to be quite unbreakable due in part to its cells in other countries worldwide, the implementation of the Department of Homeland Security’s policy on general aviation security and the policy on proper information sharing can hinder the repeat of the September 11, 2001 attacks in the United States. While there may be need for additional improvements on the policy of security for general aviation in terms of acquiring reliable updated information, the fact is that the government is well-aware of the presence of the Al-Qaeda extremists. And any major erroneous pitfalls in terms of security and information regarding proper communication channels can be rectified; this makes the concerned government agencies more vigilant and alert not only to the big picture but also to the small details which somehow will prevent any major insurgent disasters. References Anti-Defamation League. (2011). Terrorism. Retrieved from http://www.adl.org/terrorism/profiles/al_qaeda.asp Department of Homeland Security. (28 April 2009). General Aviation. Retrieved from http://www.dhs.gov/files/programs/gc_1240515540198.shtm DHS. (09 February 2007). DHS Policy for Internal Information Exchange and Sharing. Retrieved from http://www.dhs.gov/xabout/laws/gc_1171048715234.shtm Encyclopedia Britannica. (2011). al-Qaeda. Retrieved from http://www.britannica.com/EBchecked/topic/734613/al-Qaeda Fattah, H. (2006). Al Qaeda Increasingly Reliant on Media. Retrieved from http://www.nytimes.com/2006/09/30/world/30jordan.html?pagewanted=2&ei=5088&en=fb3721e1c7902aae&ex=1317268800&partner=rssnyt&emc=rss Freebase. (n.d.). al-Qaeda. Retrieved from http://www.freebase.com/view/en/al-qaeda Gunaratna, R. (2005). Current Trends in Islamist Ideology vol. 1. Retrieved from http://www.currenttrends.org/research/detail/al-qaedas-ideology IntelCenter. (2004). Al-Qaeda Targeting Guidance, v1.0. Retrieved from http://www.currenttrends.org/research/detail/al-qaedas-ideology Hayes, L., Brunner, B. and Rowen, B. (n.d.). Al-Qaeda: Osama bin Laden's Network of Terror. Retrieved from http://www.infoplease.com/spot/al-qaeda-terrorism.html IntelCenter. (2005). Standing Assessment Brief on Most Likely Future Baseline Level Jihadi Attack Activity. Retrieved from http://www.intelcenter.com/qaeda-charts.html Zalman, A. (n.d.). Al-Qaeda –Profile of Al-Qaeda. Retrieved from http://terrorism.about.com/od/groupsleader1/p/AlQaeda.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Terrorist Group Profile and Homeland Security Policy Term Paper”, n.d.)
Retrieved from https://studentshare.org/military/1410058-terrorist-group-profile-and-homeland-security-policy
(Terrorist Group Profile and Homeland Security Policy Term Paper)
https://studentshare.org/military/1410058-terrorist-group-profile-and-homeland-security-policy.
“Terrorist Group Profile and Homeland Security Policy Term Paper”, n.d. https://studentshare.org/military/1410058-terrorist-group-profile-and-homeland-security-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Terrorist Group Profile and Homeland Security Policy

State-Sponsored Terrorism

However, nation's internal security forces sometime use terror for repressing disagreements, and military or intelligence organizations carry out actions of terror intended to further a nation's diplomatic or policy efforts abroad (Hoffman 234).... After assumingsupremacy, Nazi policy aimed at destructing the state's enemies and the consequential intimidation among the rest of the country's population.... Name Institution Course Instructor Submission Date State Sponsored Terrorism Introduction State-sponsored terrorism is governmental acts that support terrorist organizations and actions despite ensuring there is tight security in countries....
9 Pages (2250 words) Research Paper

The Responsibilities of Department of Homeland Security

The Department of homeland security manages the activities of many federal agencies, and White suggests inclusion of state and local law enforcement in this security effort makes sense, but several factors work against change.... the Department of homeland security was created and has been challenged in terms of finding ways to strengthen its local and state security against terrorism.... Although the suggestion made by White may sound asonable at first, promoting the need for inclusion of the state and local law enforcement may not always work effectively in terms of enabling the Department of homeland security to manage and prevent the untoward incidence of terrorist attacks....
4 Pages (1000 words) Essay

Good Intelligence Is Critical to a Successful Counter-Terrorism Strategy

Intelligence lets a country understand the situation of every conflict; thus, policy makers would know the best action to do.... The purpose of the existence of these countries is to oppose any threat against the peace and harmony in the world hence there is an importance to look for the balance between security and order.... This is the guiding principle for almost all democratic states around the world which aim to oppose the continuing growth of both states and non-state groups that endanger the people; and because terrorist groups also have the blessings of technological advancement, it is necessary for all the nations around the world especially United States of America to improve....
14 Pages (3500 words) Essay

Case Study - Homeland Security Issue

The United States Home Security Agency must implement defense and counter… Statement of the Purpose. The purpose of the research is to determine the relationship of the homeland security policy and the terrorist group responsible The suspected terrorist group is Al-Qaeda.... The research veers on the importance of United States homeland security policies.... The problem includes the responsibility of the United States' homeland security Agency to thwart future terrorist attacks, especially the biological weapon attacks....
11 Pages (2750 words) Essay

PA Mod 2 New Homeland Security Challenges

This is particularly so because the new approach itself is based on the concept of collaboration between… The post 9/11 homeland security demands that the local law enforcement agencies should work closely with communities through “campaigns” such as voluntary interviews, even if the individuals For example, following the rail system bombings in both London and Madrid, a number of suspected terrorists were arrested in Florida, Britain and Canada with the help of the cooperation between the locals and law enforcement agencies....
5 Pages (1250 words) Assignment

Miranda Rights & the US Terrorism Policy

Coupled with the creation of the Department of homeland security, a unit dedicated to the surveillance and interception of suspected terrorists, the government has successfully improved the security of the country ensuring that every American is currently safer they than they were before the 9/11.... From the paper "Miranda Rights & the US Terrorism policy" it is clear that law enforcers must operate cautiously and handle suspects based on the amount of evidence they have against them in order to prevent the violation of the rights of innocent Americans....
9 Pages (2250 words) Case Study

Al-Nusrah Front Terrorist Group Profile

In the analysis, the paper The paper will also analyze the American policies on homeland security, and relate the aspects of the policies to the design and structure of the Al-Nusrah Front.... It is for the escalation of terrorist activities targeted at America that the US government strengthened policies on homeland security.... Analysis of the Al-Nusrah alongside US security policies is important in determining the efficiencies of the homeland security programs in tackling any threats from the group....
12 Pages (3000 words) Thesis

Counterterrorism and Intelligence

nbsp;… Department of homeland security (DHS): A cabinet department of the US federal government, created only in 2003 after the 11/9 terrorist attacks mainly to secure the US from terrorist attacks and natural disasters.... A joint initiative is proposed to promote smooth collaboration between DHS, DoD, FBI, CIA and other federal departments/agencies to enable trusted and secure exchange of terrorism-related information for effective detection, deterrence, prevention and response to homeland security threats....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us