Verified Document

Development Of Counterterrorism Plans Essay

Terrorism is one of the greatest concerns troubling governments from across the world, including ours. As a matter of fact, terrorism has become a global threat with terror formations like Al-Qaeda, the ISIS, and Al-Shabaab visiting terror on innocents, all in an attempt to advance selfish and misguided interests. For this reason, the relevance of developing sound counter-terrorism plans cannot be overstated. It is important to note, from the onset, that the development of counterterrorism plans is largely a multiagency affair. It mainly involves the assessment of threats, interagency cooperation and coordination, and action plan formulation. When it comes to threat assessment, this remains a critical role due to the need to assess emerging (as opposed to past or pre-existing) terrorist threats, while at the same time mapping out the most appropriate strategies to address the said threats. On this front, two sources of threats are taken into consideration, i.e. external and domestic threats. While external threats emanate from elements seeking to bring about or effect widespread political changes, internal threats emanate from extremists keen on bringing about specific political or social changes. Currently, the U.S. faces an international breed of terrorists who operate from both within and outside the country's borders. The need to assess this threat is therefore a key issue in the development of counterterrorism plans. In the transport sector, for instance, threat assessment involves the recognition of the potential security incidents (The U.S. Department of Transportation, 2003).

There is also the interagency aspect of the planning process that has to be fostered. In this case, all the agencies, departments, as well as centers must come together and organize periodic engagements. This is critical for purposes of ensuring that all the relevant stakeholders not only contribute, but are also kept fully informed about counter-terrorist plans.

It is...

It is important to note that when preventive measures are properly employed as well as resourced, vulnerability to terrorist attacks reduces significantly. Response could, in this case, assume various formats: i.e. elimination of established patterns, coordination of physical security measures, etc.
The development of counterterrorism plans involves many players. To begin with, there is the law enforcement community with the key players on this front falling under the Justice Department. These include the FBI, the CIA and the U.S. Marshals Service. According to the 9/11 Commission Report, "for countering terrorism, the dominant agency under Justice is the Federal Bureau of Investigations" (The National Commission on Terrorist Attacks, 2005, p. 74). It is important to note that as the authors of this document further point out, the bureau does not possess a general grand of authority when it comes to the formulation or development of counterterrorism plans. Instead, its mandate is largely determined by the relevant statutory authorizations. There is also the U.S. Marshal Service that has special fugitive tracking capabilities (The National Commission on Terrorist Attacks, 2005).

Other key players in the formulation of counterterrorism plans include The White House and Congress. The Department of Defense is also critical when it comes to the formulation of counterterrorism plans. Some of the intelligence agencies falling under the Department of Defense are the National Security Agency, the National Geospatial-Intelligence Agency, and the National Reconnaissance Office. There is also the State Department and the U.S. Department of Transportation. According to U.S. Department of Transportation (2003), FBI threat assessments indicate that public transportation remains one of the top risk areas as far as terrorist attacks are concerned and it is for this reason…

Sources used in this document:
References

Hulnick, A. (2004). Keeping U.S. Safe -- Secret Intelligence and Homeland Security. Westport, CT: Greenwood Publishing Group.

Jones, R.W., Kowalk, M.A. & Miller, P.P. (2000). Critical Incident Protocol -- A Public and Private Partnership. Retrieved from http://www.cip.msu.edu/cip.pdf

The U.S. Department of Transportation. (2003). The Public Transportation System Security and Emergency Preparedness Planning Guide. Retrieved from http://www.transit-safety.volpe.dot.gov/publications/security/planningguide.pdf

The National Commission on Terrorist Attacks. (2005). The 9/11 Commission Report. Retrieved from http://govinfo.library.unt.edu/911/report/911Report.pdf Upon the United States, 2005
Cite this Document:
Copy Bibliography Citation

Related Documents

Counterterrorism the Future of Counterterrorism
Words: 4165 Length: 14 Document Type: Literature Review

Each level of the counter-terrorism strategy present in the United States has its own flaws and its own weaknesses. Law enforcement cannot be left behind in the pursuit for more professional counter-terrorist elite units. The New York Police Department sets the bar for what municipal police can put together in terms of counter-terrorism, NYPD Shield, as its known, has conducted several successful operations since its inception in the aftermath of

Counterterrorism & Research Traditions Research
Words: 783 Length: 3 Document Type: Essay

Phenomenology, meanwhile, takes into account lived experiences as basis for analysis and interpretation of an event or phenomenon. It takes these experiences in a collective manner, and determines the nature and dynamics of the phenomenon through these collective experiences. Grounded theory is theory development based on different stages of analysis, starting from the identification of data points which will become codes for the researcher. Codes will then be developed into

Counterterrorism Training Program
Words: 2611 Length: 9 Document Type: Term Paper

Counterterrorism Training Program Terrorism is a fact of modern life. On one level, it cannot be understood; it is difficult to empathize with those who have no empathy of their own and cause enormous suffering in the name of their own beliefs. On another level, however, there are components of terrorism that can be understood -- their tactics and methods, their choice of targets and more. Because terrorism is aimed at

Counterterrorism - Postmodernism Validity of
Words: 873 Length: 3 Document Type: Essay

Both beliefs of the terrorists and counter-terrorists are validated by the critical theory. It can be said, then, that even in the 21st century, specific principles of the critical theory still holds true and are still reflected in the current political events and movements in the world. Even the school of thought that sprung after the modernist period, postmodernism, is considered valid when discussing the study and issue of counter-terrorism.

Development and Education of Security Management
Words: 765 Length: 3 Document Type: Essay

Security Management 1. While some people may be better leaders than others, all people can lead and all people can learn to lead better. Discuss some ideas of how leadership skills may be improved. Development and education Leaders need to develop in their position. Owing to managerial tasks’ knowledge-based nature, the word “development” has been used to describe the continuous growth in skills and cognition of executives and managers. Managerial development is promoted

Counterterrorism Activities
Words: 2703 Length: 8 Document Type: Term Paper

Combatting Future Terrorism Fighting future terrorism Over the years, the U.S.A. government and the entire world has been battling with the issue of terrorism. This is because the act of terrorism has diverse faces, from the rebel terrorists, the insurgents, bioterrorism to the religious sect terrorism. The U.S.A. has in particular been busy figuring out the various ways to not only stop the terrorism act before it happens, but more significantly to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now