The terrorism is developing its weapons permanently. The development of the science and the technology provides opportunities for the terrorists groups to update the new forms and the weapons of the terror. After the collapse of the USSR and the formation of a number of independent states a certain danger of spreading the nuclear materials appeared. The Russia Chechnya conflict and the close relations of Chechnya rebels with the international terrorists made it possible to spread the nuclear materials beyond Russia. If we study the terrorism we see some principles any terrorist activity is based on. First of all it is the financial support.
Terrorism needs the permanent modernization of the weapons. Such modernization attracts considerable finance. Secondly, the terrorists need the place to develop their bases and the training fields. As a rule such bases are located around the objects of the terror attacks. The terrorists need the external support. It is obviously they can not make all the preparations in the country their activity is aimed to. As we noted above the main weapon of the terrorists is the fear.
Their actions are useless if they are not publicized properly.1 The terrorism is the political struggle. The counter-terrorism should also include the political aspect. The political resistance to the terrorism is aimed to the isolation of it in order to eliminate it physically.2 The September attacks showed that the national security system of the United States needs some different approach. In July, 2002 President Bush presented the National Strategy for Homeland Security. The National Strategy for Homeland Security pointed out three main objectives for the homeland security. They are to prevent the terrorist attacks within the USA, to reduce Americas vulnerability to terrorism and minimize the damage and recover from attacks that do occur3.
The Term Paper on Connor Michael Terrorism Terrorists Terrorist
... property to further political or social objectives (The Vice President's Task Force on Combating Terrorism, pg. 17).' ; Terrorist can use ... a determined terrorist attack against a large store without persuading shoppers to accept permanent war-like security screening at ... international travel, and the development of weapons of mass destruction have helped terrorists move their causes from a local ...
The strategy focuses into three critical mission areas regarding the terrorism. They are intelligence and warning, border and transportation security and domestic counterterrorism 4. The terrorism depends on the suddenness. The terror act is effective if the object is not prepared for it. The intelligence and warning system should be able to prevent the terror act before it manifests itself 5. Comparing the modern counterterrorism and the cold war confrontation, it is worth mentioning that the counter terror warning system is much more complicated than that used for the strategic weapon. The terrorists may move freely within the democratic countries and their movement monitoring may violate the basic human rights.
The terrorists are normally provided with the appropriate ID documents and this raises the role of the intelligence and the border control. Another question is what should be done once the information on the potential terrorists is provided. The Strategy reflects the concept that the information and the intelligence activity is an integral part of the National Strategy. The FBI plays a key role in the counter terror activities. First of all the FBI should refocus its mission on preventing the terrorist attacks. The federal information sharing is the important part of the counter terrorism domestic procedures. The National Strategy for Homeland Security identifies five major initiatives in the federal information sharing and systems: Integrate information sharing across the federal government; Integrate information sharing across state and local governments, private industry and citizens; Adopt common meta-data standards for electronic information relevant to homeland security; Improve public safety emergency communications; Ensure reliable public health information.6.
The Essay on A Case Study on Formulation of the Information Strategy of Timberlodge
Information strategy is an integral part of a business plan to improve the computer/communications architectures, hardware, software, peripherals, and training. The mentioned changes are targeted at refining business operations (Betz, 396). Accordingly, Timberlodge has benefited from restructuring of the technical aspect specifically its software/hardware architectures. Information strategy (IS) ...