Due in part to September 11th attacks the federal government established the taskforce “National Joint Terrorism Task Force” (NJTTF). NJTTF represents 41 government agencies, collocated at the national, which operates a Counterterrorism Center and Domestic Terrorism Operations Section. Its mission is to cooperatively communicate with the following communities: Defense, public safety, homeland security, and intelligence. They share information such as terrorism threats and intelligence, support the Counterterrorism Division and support and manage JTTF. JTTF is the origin NJTTF originated. This will allow for addressing issues concerning radicalization and recruitment of domestic terrorist in the United States prisons and jails.
The most significant implication of domestic radicalization is communication. Agencies lack
…show more content…
As the internet usage has increased, it also has become an element for radicalization, therefore, develop a national cybercrime unit model to analyze potential terrorist attacks, addressing virtual space and technology.
Institutions do not know the terrorist prisoner population in which it holds. Train detention officers to recognize early signs of radicalization. Development of an awareness training will encourage awareness of early signs of radicalization in prisons and jails. This program will allow institutions to be knowledgeable of radicalization. It will also identify collective values, changed behavior, and attempts to influence used to teach prisoners.
Increase public diplomacy to lessen Islamic deprivation and alienation state of mind. However, implement a prevention plan or act that will make domestic Islamic organizations stop supporting terrorism and violent extremists domestically or shut the organization down. Embrace engagements between local communities and authorities concerning radicalization. Promote more United States
Crimes are the result of individuals that do not follow established laws of the land. Criminals can either be individuals or they can be organized groups. The best way for law enforcement to handle the challenges of criminal element is to understand their strategies and then counter them. The purpose of this paper is to review domestic terrorism-related intelligence and how it is related to criminal intelligence. Using criminal intelligence is the first step in dealing with criminal elements. The data is compiled, analyzed, and then sent out in an
There has been a growing interest in de-radicalization programs from local communities, the Department of Homeland Security,
Homeland and counter-terrorism programs outlines the policies needed to improve U.S. and global security in the 21st century. The policies analyze how the U.S. and foreign allies will work together toward goals by combating terrorism and their organizations. According to Joint Publication 3-26 (2014), joining with other key partners and allies to develop strategies and theater campaigns plans, helps protect U.S. interest in a common security agenda. This approach not only strengthens the U.S. but it also expands the international multilateral counter-terrorism agenda. For instance, U.S. policies heighten conversation on homeland security and counter-terrorism because it aims to serve globally and nationally. After the twin towns were attack, the department of Homeland Security created a policy called Homeland Security ACT 2002. This act covers multiple areas that needed improvement but it also gave an understand what is expected for security and the future of the country going forward. Science & technology, immigration, emergency response, and bioterrorism, are some of the policies that were created under the Homeland
The Department of Homeland Security in the U.S. is mandated to deal with terrorism problem that has a long history in the U.S. Terrorism has been a threat to U.S. security since the 1800. Terrorists continue to use powerful secret communication strategies and unexpected tools to achieve their intention in the U.S. soil. For example, the 9/11 terrorism attack that killed the highest number of American citizens in history succeeded because terrorist used hijacked passenger planes to perform the attack (Lutz and Lutz, 2013). Although the most notorious terrorism activity in the U.S. soil was performed by Islamic extremist, several other groups among them black militancy, anti-liberal, anti-government, Jewish extremist, fascist extremists, and Palestinian militancy among others have been reportedly caused a terrorist activity in the U.S. in the past and their continued existence still remain a major threat to the U.S. security (Lutz and Lutz, 2013). The counter-terrorism policy administered through the Bureau of Counterterrorism aims at partnering with local security agents, multilateral organizations, non-state actors and foreign governments to defeat local and global terrorism. The policy employs high level of coordinated strategies in securing international partnership to document and monitor and act appropriately to Foreign Terrorist Organizations (FTO) and Specially Designated Global Terrorist (SDGT) as emerging organizations that coordinate international terrorist
“Terrorism is a criminal act that influences an audience beyond the immediate victim”. A lot of the time when someone commits an act of terrorism, it is because they are demonstrating faith and loyalty to their religious views and beliefs, political, or ideological and the persecutors aim to intimidate governments and put fear into the eyes of societies. In Australia this year, there are about 7 known terrorist groups spread around the country. These seven groups in Australia at the moment includes: "Ahmed Y" group, Benbrika group in Melbourne, Al-Shabaab, Syrian syndicate, Cheikho group in Sydney, Lashkar-e-Taiba, Mantiqi (Jemaah Islamiah). All around the world, terrorism is growing quickly and it is damaging countries, communities and families. Something needs to be done about the issue and some people are already acting on it today.
I am a leader in the NC Joint Terrorism Task Force. My team has identified an active terror cell operating in the jurisdiction. I have a few options in how to proceed with this case. The primary options that I have are prevention, prosecution, and military action. Prevention is a mixture of protective devices and persuasion (McCormick, 2007, p.35& 38-45). This depends on government information based on private persons that increases problems for due process and privacy concerns. Prevention can be very useful by providing information on who is planning this attack through analyzing data. It also requires the use of various devices so our homefront is protected. Second option is prosecution. This is where the civilians convict the person
Terrorism exists for centuries. Domestic terrorist groups and domestic terrorism are great problems. They have existed in the past and they will continue to exist in the future to spread fear and terror. Terrorism is the calculated use of violence, or the threat of violence, to intimidate, frighten, or coerce. Terrorism is a global problem affecting all social and economic classes. The fight against domestic terrorism is difficult as there have been many acts of domestic terrorism and many domestic terrorist groups operating in the United States. Terrorism can be executed or presented in a variety of forms. For example, bioterrorism, cyberterrorism, nuclear terrorism, domestic terrorism, etc. Domestic Terrorism has been the focus of attention since the events of September 11. The main and more significant mission of the Department of Homeland Security is to defend the United States from terrorism. Unfortunately, domestic terrorism is becoming increasingly common among
Radicalization have various sources, from reactionary hatred of the freedom world, involvement in antigovernment militia movements in the U.S, to even mental illnesses. The main focus in this paper is to focus on Jihad-based radicalization in the prison system because according the FBI these groups are the biggest potential threats to American security. It is important to recognize all of the factors of why Americans are radicalizing in the prison system. First off, in prison, individuals associate themselves with other individuals or groups to protect themselves. They also tend to associate with those that are similar to them; share background similarities, family, ethnicity, religion, etc. Ever since 911, the government has increased its economic spending to combat and prevent domestic terrorism. In October 2003, the U.S Senate Subcommittee on Terrorism, technology, and homeland security held a hearing, that warned the threats of Islamic radicalization in the U.S prisons. The subcommittee concluded that radicalization in prisons is a real threat and “prisons are producing a formidable enemy within. Eight years later, in June 2011, the U.S. House Committee on Homeland Security held another series of hearings on the issue. In his opening remarks, Committee Chairman Peter King claimed that prisons have created "an assembly line of radicalization," which poses a major threat to the safety and security of the
United nations have concluded that prison standards do have an impact on radicalisation. In resolution A/70/674 several factors is identified as trigger prisoners to joining radicalised groups. It mentions inhumane prison conditions and inhumane treatment of inmates as standards contributing to radicalisation. But also corrupt prison officers, gang activity, lack of security and decent facilities and overcrowding in prisons as powerful role in the recruitment process. It further demonstrates the importance to uphold good prison facilities for persons deprived of their liberty. This comes from the fact that prisoners are human beings and accordingly shall have access to Human rights as regular human but in a different extent. United Nations adopted the standard minimum rules for the treatment of prisoners while considering both the protection of human and humanization of criminal justice. This lead to UN adopting the guidelines called ‘Mandelarules’ ,
The appeal and spread of radical Islam within the United States is becoming a serious national security risk. In the past radical Islamic groups such as ISIS and Al-Qaeda placed cells in the United States for the purpose of taking down the American establishment through domestic terrorism. In order to counter and even stop this phenomenon, it is essential that law enforcing and the intelligence community understand what makes Radical Islam so appealing. Moreover, Once Officials figure out the appeal of radical Islam, only then can an effective strategy to combat radical Islam be made and implemented. Current methods for abolishing radical Islam are not working if anything it has made the situation worse. Therefore, a new strategy is
Domestic radicalized individuals are self-centered, impulsive, opportunistic individuals who seek opportunities to change the lives of individuals within society through acts of violence (Kamien, 2012). In the criminal justice lens, all levels of law enforcement agencies share an important role in national security. The idea of incorporating criminal justice departments from all levels of government offers a variety of counter-radicalization strategies to deter, prevent, and respond to acts of terrorism (Kamien, 2012). However, the increase in homegrown radicalization and terrorist attacks require all agencies to be more proactive than reactive in preventing and detecting acts of radicalization and terrorism. The goal for the criminal justice
“These incidents indicate that the Internet is being used as a “cyberplanning” tool for terrorists. It provides terrorists with anonymity, command and control resources, and a host of other measures to coordinate and integrate attack options” (Thomas, 2003). Thomas defines cyberplanning as a digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed. It provides terrorists with anonymity, command and control resources, and a host of other measures to coordinate and integrate attack options (Thomas, 2003). It is clear that through the many websites found by the government, that al Qaeda intent is to cause
Crime statistics are normally used when Law Enforcement and Public safety organizations are thinking about the rate of crime in their area, policy making, or connects to home grown terrorists or terrorist acts period. The public safety field can benefit from a wealth of information on this system, but this system, but in the realm of research studies, it is very limited. This is good news for researchers, because the “lack of research is intriguing, and we have an advantages of examining terrorism from a criminological perspective are numerous, especially since 9/11” (Deflem, 2004; LaFree & Dugan 2004). The mere fact that terrorism is being discussed can be troublesome, because of the wide range of the different labeling of the terrorist or terrorist act. For example, terrorists that are considered domestic far-right tend to be arraigned under common type offenses, because “there are reasons to believe that far-right terrorism and common crimes share similar qualities within public safety and law enforcement organization” (Deflem, 2004; LaFree & Dugan 2004).
Terrorist use the internet to display propaganda, recruit and train, gather funds, coordinate attacks, publicize their acts and enhance their image (Wright, 2008). The internet makes transactions fast and easy for terrorists to plot and execute their attacks. The number of terrorist websites have grown astronomically from around one hundred to more than five thousand with websites offering tutorials from creating explosives to video gaming where even young children can pretend to kill American soldiers. Extremists use the internet to spread rumors and misinformation as well as enlist
According to Furnell and Warren (1999), Evidence suggests that technology is growingly seen as a potential tool for terrorist organizations and the widespread use of information technology by terrorist groups and organizations has led to the birth of a new class of menace termed “Cyberterrorism”. Cyberterrorism could be used in many diverse ways. Sometimes, a country’s pivotal infrastructures could be shut down and harmed using computer network and tools. There have been impediments in trying to give a clear and concise definition to the term “cyberterrorism”. But Denning (2007) which supersedes Denning (2000) gives an unambiguous definition to cyberterrorism: