Wednesday, August 14, 2019
Approaches to Combating Terrorism
Approaches to Combating Terrorism Discuss intelligence approaches to combating terrorism? In 2011, DOJ and FBI operate 104 Joint Terrorism Task Force (JTTF) in the United States of America. Both the agencies includes 4,000 law interpreting officers and agents whose duty is to inquire the terrorism related events taking place in USA. To investigate terrorist plots their operations are highly tactual and focused on the investigation. Through investigation intelligence got constituted to restrict and defeat terrorist acts. JTTFs develop an important system to share intelligence news with FBI who further conveys it to other agencies to overpower terrorism. The other major work of these task forces is to develop harmony between low interpreting sources and the state with United States of America on intelligence related matters. The threat of homegrown jihadists occurred and the several top most security clearance issued to local police working with JTTF. A significant dilemma for law enforcement and intelligence offi cials who straddle the public realm of ideas and the secretive realm of terrorist operations is how to sift the law-abiding, nonviolent radical attracted to jihadist rhetoric from the would-be terrorist who merits targeting. The vast amount of terrorist-related material available on the Internet in a relatively anonymous setting attracts homegrown individuals open to radicalization. Many of these individuals may show great interest in radical content, engage in radical discourse, but not become terrorists. A growing pool of those who view jihadist as ââ¬Å"coolâ⬠and engage in online ââ¬Å"talkâ⬠may make it harder for police to identify actual terrorists. After 9/11 attacks law interpreting got more focused and prioritized factor of intelligence got highlighted in the inquiry process. Deputy Attorney General, Paul McNulty, while working described the law abiding sector focused, proactive and intelligence attitude towards terrorist acts and to prevent it for the security of the nation. Intelligence gathering is one of the basics in inquiring and get rid of any other emergence of terrorist attack in future. Investigations require some level of factual predication, while an assessment does not.206 However; assessments are to follow a specifically articulated purpose. The guidelines have established six authorized purposes: Check leads on individuals or activities, Check leads on groups or organizations, Collect information to analyze potential threats and vulnerabilities, Gather information for intelligence analysis or planning, Vet and manage the agencyââ¬â¢s confidential human sources (informants), and Collect foreign intelligence. The American Civil Liberties Union (ACLU) has criticized the FBIââ¬â¢s amassing of racial and ethnic data based on the new guidelines. It allows for the collection of information about ethnic or racial communities and justifies the gathering of such information for proactive purposes. The guidelines s tate that it should be done if it ââ¬Å"will reasonably aid the analysis of potential threats and vulnerabilities, and, overall, assist domain awareness for the purpose of performing intelligence analysis. One ACLU official has described this as racial profiling of entire communities. Discuss the role of state and local law enforcement? Terrorist attacks take place in United States of America, whether from foreign or homegrown terrorists. The local and homegrown terrorist attacks and their propagation like weapons explosives and participants all take place in local territories. The whole plan of terrorist attack got prepared locally so, to prevent from these kind of attacks responsibility not only lies on central government it also the part of local and tribal government take action against it. On daily basis up to 17,000 officials gather investigation report suspicious individuals and incidents which as crime connect with any possible terrorism activity. The case of Oklahoma C ity bomber Timothy McVeigh. He was arrested after a traffic stop when Oklahoma State Trooper Charles J. Hanger noticed that McVeighââ¬â¢s yellow 1977 Mercury Marquis had no license plate.233 Using his home state as an example, a former U.S. Attorney maintains that ââ¬Å"evidence of a potential terrorist threat or organized criminal enterprise is far more likely to be found in the incidental contact with the 10,000 police officers in the state of Washington than by the less than 150 FBI agents assigned to the Seattle Field Division. The role of state tribal and local both are very important because any kind of intriguing act take place locally security agencies should be high alert to take action against it as soon as it occurs because it may be connected to any kind of terrorism activity which will harm the nation on high extent further to check and balance locally will help to detect brutal terrorists. The Nationwide Suspicious Activity Report Initiative (NSI) is a program to p ush terrorism-related information generated locally between and among federal, state, local, and tribal levels. Specifically, it is a framework to support the reporting of suspicious activityââ¬âfrom the point of initial observation to the point where the information is available in the information sharing environment.245 It is a standardized, integrated approach to gathering, documenting, processing, analyzing, and sharing information about suspicious activity that is potentially terrorism-related while protecting the privacy and civil liberties of Americans. The intent is for this locally generated suspicious activity reporting to be combined in a systematic way with other sources of intelligence at the federal level to uncover criminal activity, including terrorism.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.