Discussion Responses: Effective Counterterrorism Strategies Analysis

Verified

Added on  2023/06/03

|4
|696
|187
Discussion Board Post
AI Summary
This assignment presents two discussion responses analyzing counterterrorism strategies. The first discussion explores various approaches to combat criminal groups such as al-Qaeda, Hezbollah, and Hamas, emphasizing the importance of strengthening the United Nations, suppressing financial support, monitoring the internet, creating job opportunities, and employing dialogue mechanisms. The second discussion delves into the effectiveness of human versus technological intelligence techniques, arguing for the importance of both. The author supports their claims with references to scholarly resources and emphasizes the need for a combined approach to counterterrorism efforts, highlighting the limitations of solely relying on either human or technological methods. The analysis covers different strategies for combating specific groups and the rationale behind them.
Document Page
Running head: DISCUSION RESPONSES
Counter terrorism
Name
ID
Course
Unit
Lecturer
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
DISCUSION RESPONSES
Discussion 1
In recent years, the number of criminal groups has increased across the continent. Some
of the groups include al-Qaeda, Hezbollah, and Hamas. However, as an analyst, there are
different useful ways of responding to criminal groups to curb their abusive actions around the
world. The first approach is to strengthen the work and the capability of the United Nations in
their mission of dealing with the world criminal groups. The assistance the United Nations need
is latest technological skills to their army, cooperation among the member states and financing
the union according to Argomaniz, Bures & Kaunert, (2015). The second strategy suppresses
people who fund criminal gangs such as al-Qaeda. Without financial support, the groups will not
be useful in the fights, they will not have the money to purchase powerful weapons, and
therefore the world armies can fight them effectively. Another strategy is to continuously
monitor the use of the internet where the terrorists may be making use. For instance, the gang
groups are making use of the internet to lure many youths to join them; the intelligence should
implement a mechanism to monitor the internet and take action to the wrongdoers. Apart from
the above approaches, the countries can opt-in creating jobs for the youths to prevent the gang
groups from luring them in criminal activities. The last option is to employ a dialogue
mechanism by use of private sectors to prevent the groups from harming innocent citizens in
reference to Burke, (2017). It is also important to that all the strategies may not apply to all the
groups because of experience, the location and the population of the army. However,
conventional approaches are like monitoring the internet because it is a shared resource for all
groups.
Discussion 2
Document Page
3
DISCUSION RESPONSES
Kaplan, (2017) argues that human sources have proved to be away am an essential way of
collecting intelligence information. However, technology is also a meaningful way to obtain
security information. The intelligence techniques that depend on human beings include using
diplomats to gather information and the deployment of military attaches. All human sources are
called human intelligence. There exist intelligence techniques that depend mainly on technology.
For example, signal intelligence. In this method, the intelligence team makes use electronic
machines such as the satellite signals to collect information concerning the criminal activities.
The available technological techniques include the use of the imagery signals. The intelligence
groups mainly use the method during civil wars whereby the armed forces make use of balloons
to gather information.
On the other hand, the idea of doing away with human intelligence is inappropriate. One
of the reasons for inappropriateness is because the technological approaches are prone to fail and
the human techniques will effectively take the position according to Shaffer, (2015). Apart from
that, the intelligence community can only get the best outcome if they combine the two
techniques in doing an investigation. It is not right to remove the human methods; the terrorist
may find loopholes and cause severe attacks than in the earlier days. The best thing to do is to
improve the techniques to assist human employ fewer efforts.
Document Page
4
DISCUSION RESPONSES
References
Argomaniz, J., Bures, O., & Kaunert, C. (2015). A decade of EU counter-terrorism and
intelligence: A critical assessment.
Burke, R. A. (2017). Counter-terrorism for emergency responders. CRC Press.
Kaplan, A. (2017). The counter-terrorism puzzle: A guide for decision makers. Routledge.
Shaffer, R. (2015). Counter-terrorism intelligence, policy and theory since 9/11. Terrorism and
Political Violence, 27(2), 368-375.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]