Wednesday, July 17, 2019

Counter-terrorism

What is counter sham of terrorist act? Why is it important to represent the pauperisms dirty dog terrorism efforts? What kind of general motives readiness you find among terrorists in this country and afield? return key-terrorism is a combination of pr bearices, strategies, techniques and pr sufficeices that the various establishments, jurisprudence departments and the array service units practise to return terrorism acts with several(prenominal)(prenominal) the response to faultless acts and the detection of potential terror acts include in counter-terrorism.The techniques and practices utilise in counter-terrorism necessitate at preventing or stopping original terrorism acts, with the strategies commonly offensive in achievement. atomic number 53 major reason wherefore the motivations behind terrorism efforts need to be understood is its abundant role in the suppuration and implementation of effective counter-terrorism strategies. Since counter-terrorism measures estimate on the constitution of the terrorism act be mitigated, it is resilient to identify how and why verit up to(p) terrorism act is under taken in order to in any case combat it successfully.Understanding the motivation behind terrorism efforts forms the base for the growth of an effective countering proceeding where lack of a clear taste of all the publishs meet a terror act, rushs the conjecture of hold back the act straight-lacedly and effectively or so im realizable (Bolz. F et al. 2001). In addition, mind the motive behind terrorism efforts allows the enamour government giving medications to select amongst the m all, an effective action to counter a terrorism act that seems like an isolated event.This kind of regarding erects good intelligence which forms a rattling(prenominal) vital component of preparing an effective counter-terrorism strategy. more or less radical(prenominal) reason why identification of terrorist motives is vital is the huge role it plays in hunt club consume hardcore terrorist. It is by means of proper know guidege of a terrorists motives, that a government goat isolate the hard-core terrorists and cut them off from external supplies. This makes it attainable for the terrorists to be referred to as criminals, making it belatedly to hunt terrorists according to the police and with touristy upkeep.When a government or an cheek plans and implements a counter-terrorism strategy, in that respect is need to understand how terrorism efforts fuck up the human rights. This in turn enables the governments to develop effective measures that promise that dangerous and appropriate actions atomic number 18 taken against the terrorists who ar viewed as human rights violators, a situation that may repel others from active in terrorists activities.Counter-terrorism experts are able to pull off any terrorist organization if they correctly and accurately understand the terrorists motives, where one is able to understand the terrorists thoughts so that one bum seek their next move correctly to stop it on time. In the USA and other countries, terrorists motives are many and they veer (Crank, J. et al.. 2005). In the USA, Some of the general motives that cleverness be found in terrorists include, semipolitical motives, fight for the injustice of a deliberaten base of tribe, economic superiority as well as the creation of forethought and a sense of in earnest in the American citizens.When they view themselves as the underserved underdogs on a mission, the terrorists practice the strategy of victimization the weak to weaken the strong and to fortify the weak. head 2 Is counterterrorism a manoeuvre of war or criminal offence- combat? What role does ascribable parade play in both(prenominal) context? What are the implications when terrorists can be characterized as the rival rather than clear criminals? Counterterrorism can be utilise as both a warfa re simulated military operation or as a crime fighting tactic. However, in the join States counterterrorism is usually dropd as a crime- fighting tactic.For instance, the computer and the Internet are phthisisd to undertake warfare actions with the cyber space. Counter terrorism as a warfare tactic is then physical exertiond and can be apply to stop quite a little from using terrorism tactics against a given nation or organization. In such a case, comprehensive tools can be apply to deal with possible terrorist incidents and can further be used to repulse attacks that sop up been directed against a nation. As a crime fighting tactic, counter terrorism is used by the rectitude enforcement politics to hunt pop up terrorists who pay been labeled as criminals.The regime normally cut off hard-core terrorists from external sources of supply so as to label terrorists as criminals, and then use the law to easily hunt the terrorists ware (Combs. 2005). When terrorists are ref erred to as rival kinda of criminal, it encourages more terrorists attacks or strengthen of terrorist organizations. For example, it leads to the recruitment of more followers in the terrorist organizations because those who are recruited turn out developed prominent desire to become fighters against their enemy.The labeling of terrorists as an enemy serves as a motivation for every(prenominal) group to strengthen itself to attack a nonher(prenominal) group they view as enemy. It further encourages terrorism behavior of solidarity, subjection and self protection even when the group faces strong times. The members get convinced that they need to protect themselves from a group that views them as an enemy. Finally, referring to terrorists as enemy sooner of criminals makes it very hard for the relate organization or government to hunt knock off the terrorist according to the law.In addition, the organization lacks the popular support to hunt down the terrorists (Crank. J et al.. 2005) because they are seen as just revenging against other heap with an unjustified reason. The terrorists cannot be tracked down in pursuit of justice which makes it difficult to use force against hard-core terrorists with the use of brutal force generating more terrorism and terrorists. Question 3 How has direction qualifyingd from the conventional to youthful direction? Are these changes potentially problematic for civil liberties in any way in the joined States?Should law enforcement be countenanceted to use all technical resources available to accomplish its mission including in the fight against terror? Are there limits? Traditionally, counterterrorism strategies and techniques against terror acts were hugely the business of the military force, and the level of supervision not as intensive as it is in the advanced strategies of surveillance. The major reason for this is that in the past, terrorism acts were not as many as they are in the modern world.Traditiona l institutions O.K. surveillance only when it was seriously necessity to do so, as compared to bare-ass surveillance which has been blamed for overstepping the bounders. The ever increasing terrorist attacks against original states in the world have takeed the development of many and effect counter terrorism measures through and through surveillance, in comparison to the tralatitious surveillance. In new surveillance, building of the counterterrorism plans has corporate all the segments of the society or government agencies (Mahan, S and Griset, P. 2007).New surveillance has seen the development of counterterrorism strategies that have growthd both the standard of the patrol as well as house servantated intelligence. While traditional surveillance twisting the interception of chat and tracing of the fly-by-night terrorists, new surveillance has spread out its ways of operation due to the advancement in technology. For instance, new surveillance has managed to expand th e range of both the law and the military enforcement operations. The direction of domestic intelligence at specific groups that is ground on origin and religion is a feature of the new surveillance.Mass surveillance is excessively done in new surveillance where an entire population is investigated. In the United States, changes in the surveillance have raise concerns based on the civil liberties. sensation good example is the mass surveillance which involves the surveillance of an entire population, an issue that has been objected since it is considered to harbor civil freedom of the citizens (http//www. usatoday. com/news/ majuscule/2006-05-10-nsa-x. htm). The surveillance defies the citizens liberty in that mass surveillance is done whether or not there is the consent of those being surveyed.Furthermore, surveillance is done whether it serves or it does not serve the citizens interest. For instance, use of a network of mystery police informers is considered a new surveillan ce misuse. In the United States, the government has been accused of iniquitously cooperating with the matter security department Agency to monitor the US citizens phone records. Further allegations that the government has go oned electronic surveillances of domestic phone calls without warrants are an issue that has been said to go against the civil liberty.However, the law enforcement organizations should not be fully allowed to use technological resources to fight terror. This is because uncontrolled use consequently may result to severe negative effects. For instance, there have been some instances where technological measures against terror have resulted to the ill-use and violation of the human rights. The return and extradition of heap within countries and restriction of freedom of citizens are some of the examples that violate human rights during the process of counterterrorism.Invasion of masss snobbish lives through technology-advanced tools need to be stopped by l imiting how far the law enforcement bodies should go to fight terror. Lack of a limit within which technology can be used poses a great risk, where the governance may undertake counterterrorism practices while they violate the human rights at the same time. Question 4 What is the FISA administration of justice? Explain how it works. What authorities can it grant law enforcement? How is it antithetic from traditional judicial systemrooms? What concerns exist near expanding the use of FISA?A FISA coquette refers to a secret act in the USA that has the responsibility of approving the wiretaps that target the terrorists. It was established and has been functional since 1979 to ensure that terrorists and foreign agents are monitored. The FISA coquet was established under the 1978 US inter discipline discussion Surveillance proceed. The judicatory has canonic domestic wiretaps and has continued to handle very sensitive domestic wiretaps in the US national pledge investiga tions (media filter. org/CAQ/cqq53. court. html). The FISA court operates through a process that is based on presumable cause.An application to a FISA court judge is normally do by the FBI ( national official Bureau of Investigation) if it believes that it can show presumable cause that the target of the surveillance is all a suspected terrorist or a foreign agent. The application should contain 4 documents a request for a wiretap, FBI directors or executive branch officials certification that information cannot be acquired through the normal investigative tactics, and an FBI supervisory ban with a statement of fact about the target of surveillance.This is then followed by the ingress of the documents to the Justice incision for the Justice department attorneys review. The application is then forwarded to the FISA court and presented to a national judge. There are 10 federal judges in the FISA court who sit on the court on a rotating basis. The FISA court grants sanction to the law enforcement authorities based on the probable cause presented to them. It gives warrant to the authorities to cope surveillance on a suspected target, if enough induction is provided in the court to justify why a suspect should be surveyed.It receives an application if the FBI director certifies that there is need to obtain information in a higher place the normal investigative tactics. Clear meter reading of facts about the target of surveillance is also demanded by the FISA court before they give the authority and the judges often demand for more details about the targeted communication to authorize or delight in a wiretap. It maintains a high rate of screen where a judge can make an ultimate decision to approve a wiretap (FISA orders 1979-2004)The FISA court is different from the traditional court in its secret nature of operation where the court makes approval of the applications in secret. Furthermore, the FISA court is considered to have acquired expanded aut hority than a traditional court to approve surveillance applications make, after Presidents Clinton signing of the Executive Order 12949. contradictory in the traditional courts, the FISA court evidence can be used in criminal trials after the 1995 magnification as compared to the traditional courts where the evidence could only be collected and stockpiled only for intelligence purposes.The FISA court has expanded powers and it has the authority to allow both the electronic and physical seees due to its expanded powers. The expansion of using the FISA court in the USA has raised great concern. One concern of the FISA court expansion is the possibility of governments extreme attack into peoples private lives. Because the court operates secretly, government measures that may intrude into people lives unnecessarily may result. Another great concern is the fact that, it promotes surveillance that defies people of their liberty.For instance, the expansion of the FISA court has made i t able to give legal authority to approve black-bag operations, that authorize the Department of Justice to conduct both electronic and physical searches without an establish court warrant. Furthermore, the subjects are not notified and an stemma of seized items not provided. Sometimes the surveillance allowed by the FISA court is considered to be unconstitutional. The Civil liberty lawyers in the United States have verbalise that some searches that have been conducted are unconstitutional.It is a great worry that under the FISA court cover of secrecy, the court is likely to extend its own broad legal mandate. The expansion of the court has been argued to have been motivated by the governments need to conduct searches they would not have been allowed to undertake under the nations national preparednesss. For instance, the US government may attempt and fail under the traditional constitutional argument to secure a search warrant, but it would go to FISA court and secure approval for a search by converting the case into a national trade protection investigation. Question 5 How has zephyr protective cover changed since 9111?What were the provision of the line and theodolite Act? Did this Act change aura security in a melodramatic way? What role does racial and apparitional compose play in securing the breeze industry and its consumers? What role should it play? in advance the 9/11 terrorist attack, the air power security in the USA was the responsibility of the Federal strain nerve within the Department of transportation. However after the 9/11 attack there was great extremity in securing the US nations entire transportation systems. The federal agencies concerned with transport security were transferred to the Department of fatherland security (www.encyclopedia. com/doc/iG2-34033000149. html). The need to increase melodic line security after the 9/11 led to the enactment of the Aviation and theodolite Act on Nov 19, 2001. This cut the cre ation of the TSA (Transportation Security Administration) within the acid (Department of Transportation). The Act permits the existing authorities to permit the TSA to flexibly manage and deploy the custody to carry out important security work where the national security is concerned. The act mandates the increase in the number of federal air marshals and has placed the US airport security screeners under federal control.All the screeners were involve to be US citizens, though the provision was later changed by American Civil Liberties Union. It was the Acts provision that all the bags in the airports to be get-go screened and then matched to the passengers. Another provision of the Act was the $1. 5 billion award to the airports and private contractors so that the direct costs of confluence new security requirements were met. Checks for baggage in the airports was made obligatory with coating recommended by use of explosive detection machinery or manual methods.The Act allowe d the Transportation escritoire to authorize airports to use all the necessary equipment for the chemical and biological weapons detection. The Act did change the aviation security dramatically. For instance, before the 9/11 attack, the civil aviation security was handled by the Federal Aviation Administration (FAA). later on the creation of the Act, the civil aviation security was put under the Transportation Security Administration (TSA). There were also changes in the federal statutes that covered aviation security (contained in title 49 of the Code of Federal Regulations Chapter XII).The provisions that were made by the Act changed security practices in the airports with the airports implementing changes in the checking and screening procedures, where tight security procedures were and are still being developed. The musical arrangement of the airport security screeners under federal control made changes when all screeners were required to be US citizens and the matching of ba gs to passengers was made necessary with new security requirements select in airports. Racial and religious compose in the US Aviation Security practices has been seen by some as illegal and inconsistent with American values (travelsecurity.blogspot. com/2007/09lantos-warns-tsa-against-religious. html). Furthermore, this profiling is detrimental to the national security. Civil liberties of some religious groups have claimed that TSA employees conduct substitute(prenominal) screening for passengers wearing religious clothing. For instance, TSA employees have discriminated the Sikh by ordering Sikh Americans to remove their turbans, which defies their faith. There have been an estimated 50 incidents of religious discrimination since the institution of the new policy. Racial and religious profiling has led to discrimination and necrosis of people including the indifferent Americans.The practice leads to stereotyping of some citizens as terrorists and provokes a sense of fear again st innocent citizens. The racial and religious profiling should kinda promote changes that will prevent discrimination and humiliation of travelers. The profiling should not be used as a means of abuse but instead should be used with respect for the civilians. Exposing people to extra screening procedures simply because they belong to a certain race or religion should be done away with, but instead everyone subjected to the procedures to promote equality. References Bolz, F. , Dudonis, K. and Schulz, D.(2001). The Counterterrorism Handbook Tactics, Procedures and Techniques. Second Edition. CRC Publishers Crank, J. P. , & Gregor, P. E. 2005. Counter-Terrorism After 9/11 Justice, Security and morals Reconsidered. Cincinatti Anderson Publishing Colangelo, P. The secret FISA court preventive Stamping on Rights. Covert Action Quarterly. Online at media filter. org/CAQ/cqq53. court. html. Retrieved on June 26, 2008 Combs, (2005). Terrorism in the twenty-first Century, 4th Edition. Pre ntice Hall. FISA orders 1979-2004 Judson, K. Civil Aviation Security United States. Encyclopedia of Espionage, Intelligence andSecurity. 2004. Available at www. encyclopedia. com/doc/iG2-34033000149. html. Retrieved on June 26, 2008 Lantos, T. US representative from California. Lantons Warns TSA Against Religious compose Insensitivity Sept 7, 2007. Online at travelsecurity. blogspot. com/2007/09lantos-warns-tsa-against-religious. html. Retrieved on June 26, 2008 Mahan, S and Griset, P. 2007. Terrorism in Perspective. discerning Publications, Inc USA TODAY Com NSA has Massive database of Americans phone calls http//www. usatoday. com/news/ uppercase/2006-05-10-nsa-x. htm. Retrieved on June 26, 2008

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.