Terrorist attacks are executed through the use of Improvised Explosive Devices

Analyze the reports concerning the transfer of nuclear weapons-grade materials and/or tactical nuclear weapons to Al Qaeda and other terrorist organizations. What security strategies can be used to mitigate the threat?

Since the terrorist attacks on September 11, 2001, intentional acts of terrorism have significantly changed. Terrorism has evolved into a serious and complex problem. Through the use of terrorist networks and globalization, terrorist networks inspired by religious beliefs and political ideologies have gained prominence. The terrorist attacks on September 11, 2001, demonstrated the gravity of the terrorist threat along with the need for our nation to prepare in an effort to meet our nation’s constant terrorist challenge. After September 11, 2001, the United States Department of Homeland Security (DHS) was faced with strengthening our defenses, including the use of Weapons of Mass Destruction.

A Weapon of Mass Destruction is a nuclear, radiological, chemical, biological or other improvised explosive device created to harm a large number of people. These weapons have the capability to inflict death and destroy people on a massive scale.

According to Aguiar (2010), a review of the literature on Weapons of Mass Destruction (WMD) have revealed the following:

The preferred terrorism Weapons of Mass Destruction commonly found in the literature and peer-reviews are; Improvised Explosion Devices (IED), chemical agents, biological agents, and radiological/nuclear matter. The acquisition of nuclear weapons by Iraq and Pakistan, Osama bin Laden and the unaccounted-for nuclear materials in the post-Soviet States posed a global threat. Protecting the United States’ critical infrastructure and preventing terrorists’ efforts from acquiring chemical, biological, radiological or nuclear weapons are of concern and have become critical issues of interest immediate in the aftermath of the September 11, 2001, attacks.

Of concern, are the potential terrorist attacks facilitated through the use of improvised nuclear devices, chemical or biological weapons, or outbreaks of pandemic disease, currently pose increasing serious national security risks. Further, authorities in the United States are capable of scanning only 6 percent of our import containers. As a result, limited cargo inspections can be used as vessels for transmitting hazards and weapons into the United States.

The evolving terrorist threat appears to benefit from the exponential growth of globalization, which facilitates the movement of people and information across international borders. Technology such as the Internet enables terrorists to communicate readily and obtain the necessary expertise to develop and plan bioterrorist attacks, along with nuclear weaponry. In addition, other disasters include natural, mechanical (airplanes), automobiles, storage chemicals fires, and nuclear plant accidents.

In a study conducted by Aguiar (2010), approximately half of the respondents surveyed reported to have sufficiently prepared to address explosives in their business continuity plans. Furthermore, approximately one third indicated they are sufficiently prepared for chemical, biological, or radiological/nuclear incidents. The findings of the study have indicated the existence of a profound gap between private-business terrorism preparedness and the private sector to mitigate on against the use of weapons of mass destruction, despite the recommendation from the Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, which has urged the U.S. government to enhance the security posture to safeguard the country against a likely weapon of mass destruction attack in the near future. Unfortunately, the United States is profoundly unprepared to assess, mitigate and respond to the threats of weapons of Mass Destruction posed to our county.

In conclusion, while most terrorist attacks are executed through the use of Improvised Explosive Devices (IEDs), the fear of Weapons of Mass Destruction intensified once Osama Bin Laden threatened the use of Weapons of Mass Destruction against the United States. The threat coupled with intelligence information caused grave concern in the United States. The evolving terrorist threat appears to benefit from the rapid rise of globalization, along with the facilitation of people across international borders. Our world-wide web is now capable of enabling terrorist recruitment, terrorist communication and the ability to develop the necessary expertise to develop bioterrorist and nuclear weaponry. Therefore, our newest infrastructure, Cyberspace security should be our immediate priority.

Dealing with the heightened concern about homegrown terrorism

 

 

 

How should the United States government deal with the heightened concern about homegrown terrorism and the growing concern for preservation of civil liberties? What should be done in order to guard from the massive and expansive powers that accrues to the executive branch during crisis, such as terrorist attacks? What are the political and constitutional consequences of counter-terrorism?

 

 

 

 

National Strategy for Counterterrorism (NSCT)

 

 

 

The U.S. Government published the most recent National Strategy for Counterterrorism (NSCT) in October 2018. For this second topic you are to develop a framework for a brand-new National Strategy for Counter Terrorism of the United States. Address both domestic (homeland) components and offensive overseas elements. Make sure to address how you will balance domestic security with civil liberties at home and how you will be effective in dealing with terrorists abroad without creating even more terrorists in the process. Make sure your framework employs all elements of national power (diplomatic, informational, military, economic, intelligence, law enforcement, financial). Also describe the importance of gathering all sources of domestic and overseas intelligence for effective counter terrorism efforts. You do not need to write an entire strategy, just the outline or framework for a new NSCT; an executive summary or details of your pillars or plan of action for a comprehensive strategy.

Training on organized crime and cyber terrorism

 

 

 

As a recent Criminal Justice graduate, you have been hired by Criminal Justice Training Group to present an important training on organized crime and cyber terrorism to criminal justice administrators and policymakers. Your discussion here will help inform your research for this training.

Given the significant impact that organized crime, cybercrime, and terrorism have on individuals and society as a whole, should local, state, and federal governments be given extensive powers in their efforts to combat these crimes, even if that means curbing the individual constitutional rights of the accused?

 

Dealing with the heightened concern about homegrown terrorism

 

 

How should the United States government deal with the heightened concern about homegrown terrorism and the growing concern for preservation of civil liberties? What should be done in order to guard from the massive and expansive powers that accrues to the executive branch during crisis, such as terrorist attacks? What are the political and constitutional consequences of counter-terrorism?

 

World War I

 

 

a) World War I,

b) World War II,

c) Vietnam War,

d) Gulf War,

e) War in Afghanistan,

f) or Iraq War.

You must perform a Web quest to locate various technology resources and websites that Ms. Herstory could embrace to teach an effective history lesson. Keep in mind that she has a limited budget at her disposal, so you must choose wisely. Any resource that you suggest must either have a free option or cost no more than $50. (Remember, she is a first-time public school teacher, and she has already spent the district-allotted funds for the year.)

Your suggestions for Ms. Herstory should contain the selection of a minimum of two resources. You must use the (ATTACHED) template provided, and complete the requirements for each section. Click here to access the template.

Terrorism is caused by poverty

 

Throughout the history of modern terrorism, government officials, counterterrorism professionals, and academic scholars have sought to understand the root motives and ideological causes, mechanisms, and processes related to terrorism. Unfortunately, many of their theories were not rooted in fact and are essentially untested assumptions. The problem is that some of these assumptions, biases, and mindsets have become the basis of American counterterrorism policy. If they are false, then our counterterrorism policy is flawed and will more than likely fail. In this module’s discussion, you will examine some of these assumptions and biases to understand if they are supported by facts or flawed ideas that should be challenged. Choose one of the assumptions below. Take a stance on whether the assumption is true or false, and build a case supporting your stance. Make sure to incorporate scholarly facts and resources.

Terrorism is caused by poverty
Terrorists are crazy
Terrorism is increasingly lethal
Terrorism is predominantly anti-Western
Terrorism is a successful tactic

 

Terrorist Typologies

Terrorist Typologies

What is a typology, what do they do, and why are they important? What are the two most useful terrorists’ typologies? List each and describe the elements for that typology. Defend your choices.

 

(https://www.hsdl.org/?view&did=3801) <– Use the book as one of the references.