Combatting Future Terrorism Term Paper

Pages: 8 (2703 words)  ·  Bibliography Sources: 6  ·  Level: College Senior  ·  Topic: Terrorism

SAMPLE EXCERPT:

[. . .] He therefore notes that the prison departments have a noble duty of promoting positive influence with a lot of zeal as well as facilitating the transition of prisoners back to the mainstream society with great innovation. These correctional facilities within the country can act as a special and effective venue for ensuring that the convicted terrorists are de-radicalized and also the spreading of the network of the terrorists is stopped.

The use of airplanes as weapons of terror has been the latest trend and indeed was the tool that was used by the terrorists in the fatal 9/11 attack on the U.S.A. Indeed even before the attack using the planes, Rodney Stitch who was a specialist in air travel safety suggested that the cockpit doors for all passenger planes should be secured and be made impregnable by use of guns or hard tools (Defrauding America, 2014). He also suggested that each plane should have an air marshal on board or arming the pilots with basic weapons. If these measures were taken, it could be possible that the 9/11 incident could have been averted and lives saved on that particular day. There is need hence to ensure that all passenger planes are equipped with cockpit doors that are well secured and strong enough to keep out any possible terrorist from accessing the pilot and taking control of the plane. This must be followed by at least one marshal on the plane that is trained in handling terrorism and controlling the situation midair. These measures will reduce the target of the plane by the terrorists as a weapon of terror and make future terrorism attempts lesser as compared to the current times.

Baring that terrorism at home is propagated by terror activities and plans abroad, there is need to have a strong engagement of the U.S. government and security operatives abroad. This is in light of the fact that the planning and even training grounds of the terrorists activities takes place in foreign land especially in the Middle East and Somalia plus several other countries in the Northern deserts of Africa. The security surveillance needs to be intensified in these regions to ensure there is valuable information on the activities of the terror groups and the cells that they form in different regions. The U.S. government also needs to have continued observation of the activities of some foreign governments like the Iranian government in line with the enrichment of the Uranium that could possibly be used in making weapons of mass destruction. There is also need to keep tab on the ability of Iran to destabilize the region and the countries around it for its own political mileage that could open up room for the terrorists to be used to achieve these goals. If such an activity is allowed, it will give room for the interruption of the American interests abroad and also terror activities that could possibly target Americans living in the region because the U.S. stands for the democratization of the region and the extensive Middle East in general. According to WGBH Educational Foundation (2002), the support that Israel enjoys from the U.S.A. is pegged on a few factors; it is a form of commitment to the few democratic states in the Middle East region as most states here are autocratic. It is based on a sense of shred Judeo-Christian religious sharing and traditions. The support is also based on the fact that Israel can still act as a market for the products of the defense industry in the U.S. This relationship must be solidified as it acts as a measure against expansion of terrorism activities and breaking down of the terror networks that are bound to expand in the region.

The other deterrent measure to terrorism is the use of electronic surveillance in all main areas that could be susceptible to terror attacks like the high profile buildings, office blocks, airport, train stations and even the sports grounds. These electronic surveillance records will provide very objective evidence when the need arises and evidence that can help deter a possible terror activity that could be was under planning stages, it enables law enforcement to learn about the crime before it is executed through real time observation of the footages and also daily reviews of these footages. There can also be carrying out of undercover operations which go hand in hand with electronic surveillance. Confidential informants are also important when it comes to combating organized crime. These are individuals who are willing to give information on condition that they do not testify (Ohr, 2004).

The fight against terrorism within the country and across the globe cannot be a preserve of the government and the security branches but calls in the effort of each individual in reporting the activities of the suspected terrorist however small in magnitude the intended activity could be. There is need for implementation of the community watch and community policing where each person plays a very significant role in ensuring that the country is safe from the terrorists and secure from the infiltration by the radical groups that propagate terror within the country.

References

Adam Szpiro et.al., (2007). Health Surveillance and Diagnosis for Mitigatinga Bio-terror Attack.

Lincoln Laboratory Journal. Vol.17 No.1. Retrieved March 7, 2014 from http://www.ll.mit.edu/publications/journal/pdf/vol17_no1/17_1_5Szpiro.pdf

Counter Terrorism, (2011). Community Preparedness. Retrieved March 7, 2014 from http://www.counterterrorismtraining.gov/comm/index.html

Daniel J. Dire, (2011). Biological Warfare. Retrieved March 7, 2014 from http://www.emedicinehealth.com/biological_warfare/article_em.htm

Debbie A. Tavers et.al., (2003). Emergency Department Data for Bioterrorism Surveillance:

Electronic Data Availability, Timeliness, Sources and Standards. Retrieved March 7, 2014 from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1479948/

Defrauding America, 2014). Decades of Corruption-Enabling Tragedies Uncovered by Federal

Agent Rodney Stich. Retrieved March 7, 2014 from http://www.defraudingamerica.com/stich_bio.html

Jess Maghan & Robert J. Kelly, (1989).Terrorism and Corrections: The Incarcerated Radical.

Retrieved March 7, 2014 from http://www.jmfcc.com/Incarcerated%20Radical.pdf

Ohr, G.B. (2004). Effective methods to combat transnational Organized crime in Criminal

Justice Processes. Retrieved March 7, 2014 from http://www.unafei.or.jp/english/pdf/PDF_rms/no58/58-05.pdf (pg40-57)

Peter R. Neumann, (2010). Prisons and Terrorism Radicalisation and De-radicalisation in 15

Countries. Retrieved March 7, 2014 from http://icsr.info/publications/papers/1277699166PrisonsandTerrorismRadicalisationandDeradicalisationin15Countries.pdf

US Department of Homeland Security, (2013). Citizenship, Naturalization Regulation and Procedures Handbook: Practical Information and Contacts. International Business Publication: Washington DC. Retrieved March 7, 2014 from http://books.google.co.ke/books?id=GcYCAQAAQBAJ&pg=PA39&dq=out+of+the+48+al-Qaeda+operatives+who+committed+crimes+here+between+1993+and+2001,+12+of+them+were+illegal+aliens&hl=en&sa=X&ei=wRwnU5bVMuHoywPV9IGYAw&ved=0CCwQ6AEwAA#v=onepage&q=out%20of%20the%2048%20al-Qaeda%20operatives%20who%20committed%20crimes%20here%20between%201993%20and%202001%2C%2012%20of%20them%20were%20illegal%20aliens&f=false

WGBH Educational Foundation, (2002).What have been the Role and Effect of U.S. foreign

Policies and Actions in the Middle East? Retrieved March 7, 2014 from http://www.pbs.org/wgbh/globalconnections/mideast/questions/uspolicy/ [END OF PREVIEW]

Four Different Ordering Options:

?

Compare the Four Ordering Options

  1. 1.Buy this paper with your credit card or cash balance at PayPal.  Within 10 hours, we'll send the Microsoft Word file to the email address on your PayPal account.
  2. 2.Same as #1, but we will also remove the paper from our site for 30 days!
  3. 3.Need this paper immediately?  Want to individually download any of our 175,000+ exclusive, private, non-plagiarized papers for 30 days?  It takes only 2 minutes to subscribe and get instant access!
  4. 4.One of our highly experienced experts will write a brand new, 100% unique paper matching the exact specifications and topic that you provide!  You'll be the only person on the planet to receive the one-of-a-kind paper that we write for you!  Use code "Save10" to save 10% on your 1st order!

1.  Buy the full, 8-page paper:  $24.68

or

2.  Buy & remove for 30 days:  $38.47

or

3.  Monthly access to 175,000 papers

After paying, this link will download any paper(s).

or

4.  Let us write a NEW paper for you!

Ask Us to Write a New Paper
Most popular!

Terrorism Technological Innovation as a Weapon Thesis


Terrorism Is Not a New Concept Case Study


Counterterrorism the Future of Counterterrorism Policies: Examining Literature Review Chapter


Global Terrorism's Impact on International Business Term Paper


American Terrorism for Many People Research Paper


View 348 other related papers  >>

Cite This Term Paper:

APA Format

Combatting Future Terrorism.  (2014, March 18).  Retrieved December 17, 2018, from https://www.essaytown.com/subjects/paper/combatting-future-terrorism/8870855

MLA Format

"Combatting Future Terrorism."  18 March 2014.  Web.  17 December 2018. <https://www.essaytown.com/subjects/paper/combatting-future-terrorism/8870855>.

Chicago Format

"Combatting Future Terrorism."  Essaytown.com.  March 18, 2014.  Accessed December 17, 2018.
https://www.essaytown.com/subjects/paper/combatting-future-terrorism/8870855.