Saturday, March 9, 2019
Security organizations and counterterrorism
It is explicitly decl atomic make sense 18d in the manual that Muslim spiritual goals and quests can non be attained except by mightiness though bombings, assassinations, as soundly as wanton slaughter of human beings beings. Anti-threat professionals atomic number 18 thus warned that it is almost futile to movement to eng succession much(prenominal)(prenominal)(prenominal)(prenominal) extremists in any from of dialogue since it has been implanted into their conscious selves that only describe and aggression can yield fruits. Counterterrorism efforts should thus not have banter as integrity of the ways to manage terrorism since the militias argon not responsive to dialogue.The manual declares that Muslims can only resist the alleged delay of unawareness by being united and conforming to Muslim religious ideals. Counterterrorist experts are thus informed to be vigilant and wary of Islamic groupings since such are the ideal places where Islamic militias congregate, st rategize, and share ideas. The terrorism guidebook offers three key principles necessary for establishing Islamic armed services validations, which include organization advisory committee and commander s over-the-hilliers and a clearly-defined plan.This informs counterterrorism experts that Islamic terrorists are well-organized groups with a clear hierarchical power struc6ture. It is thus prudent to carry pop a systematic dismantling of such organizations for effective handling of terrorism. such(prenominal) measures would include firsts identifying the actual persons involved in terror activities, from planners to implementers, and then forthwith dealing with individual persons (Terrorist Training Manual, 2000).Several requirements for the Islamic array organizations are listed including forgery money and fake documents apartments plus hiding quarters means of dialogue means of transport ammunition and arms information and transport. This implies that such Islamists are well prepared and hence counterterrorism force play ought to have superior readying and planning in order to effectively tackle terrorism. Among the missions of Islamic military organizations is to kidnap enemy documents, personnel, arms, and secrets.Counterterrorism experts are thus required to be vigilant in securing such entities at all times, particularly those belonging to nations which are ideological enemies with Islamic regimes. The assassination of overseas tourists and enemy personnel is another(prenominal) mission of Islamic militias. Counterterrorism should therefore seek to ensure the safety of tourists foreign by either offering guidelines on safe places to visit or come onlet travel advisories if there is reason to fear for the safety of tourists charm overseas.Another mission of Muslim jihadists is the spreading of rumors as well as issuing statements that incite the masses against he perceived enemy. Counterterrorism should thus aim to try to prevent the publicatio n of such inciting statements, intercept and destroy them before they touch their target audience or destroy the places where they are produced. The jihadists as well have the mission of bombing and obliterating embassies plus attacking important financial centers.This calls for heightened and vigilant surveillance on the overseas facilities such as embassies and blood line premises owned by regimes which the Muslim jihadists consider as enemies. The jihadists too aim to blow up bridges linking cities with neighboring areas as one of their missions. It is lively for counterterrorism personnel to be on the lookout station and secure vital bridges to avert any possible strikes. Recruits into the jihadist movement ought to be Muslims. This implies that counterterrorism personnel ought to concentrate on Muslim characters when managing terrorism.Members as well should be mature, that is of the age of majority. Counterterrorism should thus focus on mature Muslim persons when invest igating terror activities. One requirement for membership is the ability and commitment top appreciation secrets even from the closest persons. Counterterrorism experts ought o be therefore aware that it is sullen to extract information from such terrorists and hence devise efficient methods of acquiring such information (Terrorist Training Manual, 2000).Regarding operational moneys, it is stated that they are to be split into 2 parts, with one segment going into schemes that provide pecuniary returns, while the other is kept to be spent only in the course of operations. This informs counterterrorism experts that the jihadists operate decoy projects which they use to earn cash for justing their military objectives. Therefore, any enterprises having Muslim connections ought to be fully askd to establish their owners, financiers and beneficiaries.The jihadists photos on locomotion documents ought not to have a beard according to the manual. This should inform counterterrorism expe rts that the old notion that Muslims and jihadists always wear beards should be discarded so as to be able to effectively investigate the activities of suspect Muslims. Agreements are to be rent4ed preferably on ground floors to permit easy escape as well as digging ditches. Counterterrorism experts should thus be on the lookout particularly for suspects who live on ground floors when investigating terrorism activities.Apartments are to be rented preferably within newly- develop localities because people in such areas primarily do not receipt each other and hence strangers are not as easily identifiable as in honest-to-god neighborhoods. Counterterrorism experts therefore should particularly carry out surveillance in such neighborhoods for any suspicious characters. Organization members are instructed to offer information that is determine to mis deuce-ace surety agencies when they discover that their telephone conversations are being tapped into.This further complicates the w ork of counterterrorism agencies since they ought to be wary of volunteer information that is purported to implicate militants. curb vetting and scrutiny of any informer-derived information is important to make sure that security agencies do not fall into the tricks of the jihadists and hence end up unnecessarily wasting time and possible resources (Terrorist Training Manual, 2000). The guidebook states that training venues for Islamic military organizations ought t to be located far away from areas with may people.Counterterrorism agencies therefore have got to conduct searches for such training sites away from major cities and towns preferably in the countryside where there are few people residing therein. The Islamic organization generally avoids overcrowded place such as, train stations, cafes, and recreation places. certification and counterterrorism agencies ought to specifically target less crowded places when carrying out anti-terrorism activities. Members of the organiz ation carrying out strike operations are instructed not to appear Muslim-like and if possible, to completely block out themselves.This is a challenge for security and counter-terror agencies since it appears like it is pointless to target and investigate overt Muslims regarding terrorism. Priority should be placed on members of the public who do not have outward Muslim appearances. Fighters in the Muslim military organization are taught beforehand about the answers to provide to security forces in the event that they are intercepted. Security agencies thus ought to be a molybdenum more creative and flexible regarding the questions they field to suspects during questions.Routine, standard, and typical questions ought to be avoided. Questions should be asked depending on the environment so as to gather useful facts and move the Islamists into disclosing valuable information. The guidebook contains instructions to the effect that surveillance vehicle number plates and make should b e similar to those of target vehicles. This should appropriately inform security agencies to be cautious when trailing or attacking suspicious vehicles as innocent persons, with cars matching the terrorists vehicle, may be involved.The Islamic organization is plainly using ciphers according to the guidebook. Security organizations and counterterrorism personnel ought to be well cozy with the various systems of cipher text currently employed so as to accurately and speedily interpret information when it is intercepted to facilitate quick and appropriate action (Terrorist Training Manual, 2000). Members of the Islamic organization are instructed not to concede of their involvement with the jihadist movement if they get arrested and are brought to trial.Security agencies should be aware that such characters will not provide any useful information that could lead to the dismantling of the terrorist cells. Other methods of obtaining information, other than interrogation and questionin g ought to be developed to ensure effective handling of the terrorists and their activities. Members are as well instructed to be observant, alert, and watchful of the places they are interrogated at, which mostly are security facilities, so as to relay information to the jihadist movement regarding the physical set up of such buildings.This should ring a bell in security circles and appropriate places of interrogation should be created to avoid letting the Islamic militia get to know the set up of government facilities in case they plan future day attacks on the same. Reference Terrorist Training Manual (May 2000). Provided courtesy of the Behavioral abstract Program, Operational Training Unit, Counterintelligence Division, FBI Headquarters.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment