• Home
  • /
  • Topic
  • /
  • Crimes
  • /
  • Espionage
  • /
  • Is Predicting Terrorism a Beneficial Proposition for Intelligence for Counter-Terrorism Stakeholders  A-Level Coursework
Verified Document

Is Predicting Terrorism A Beneficial Proposition For Intelligence For Counter-Terrorism Stakeholders  A-Level Coursework

Counterintelligence and Predicting Terrorism Sovereign states have always had a vested interest in accurately predicting the course of future events, from the ancient espionage of medieval courts to the advanced intelligence agencies used today, but the process of anticipating and neutralizing threats on a preemptive basis has proven to be exceedingly difficult in the age of modern terrorism. Western powers explicitly targeted by Al-Qaeda and other jihadist organizations, including the United States, Great Britain, and other industrialized nations, have been forced to exist in a state of perpetual tension, knowing that the next spectacularly-scaled attack is inevitable but lacking the specific foresight needed to prevent its occurrence. With billions of dollars being invested annually to fund counterterrorism intelligence operations, and scant evidence that these efforts have constituted an efficient and effective use of valuable resources, many governments have begun to reassess this philosophy of preventative vigilance. The incredible complexity of geopolitical relations dictates that "we cannot the outcomes of events in an open system with multiple independent variables," and this observation is especially disconcerting when one considers that "the international system in which the state and its intelligence agencies must operate is such a system" (Quiggin, 2006). As such, the merits of pursuing a dubiously founded "War on Terror" largely through counterintelligence operations have been subject to an increasingly rancorous debate, pitting holdovers from the Cold War era, who favor wiretapping, espionage and other techniques predicated on preventing threats, against modern intelligence operatives...

By conducting a thorough review of the current research and literature on the subject of counterterrorism intelligence practices, it is possible to objectively determine the efficacy of this approach.
In the wake of the devastating terrorist attacks launched against the World Trade Center and the Pentagon on September 11th, 2001, the American government was thrust into the unenviable position of taking the lead in terms of worldwide counterterrorism. After more than 3,000 citizens were murdered instantaneously, and enduring symbols of national strength were reduced to smoldering scenes of catastrophic destruction, the Bush administration immediately adopted its controversial doctrine of preemption. According to the "Bush doctrine," the only effective means to secure America's national security interest were based on predicting terrorist activity before it occurs and striking potential threats before they are come to fruition. Leaving aside one's privately held political affiliations, more than a decade after this approach to counterterrorism was implemented it has become clear that its fundamental premise was fatally flawed. One of the most acrimonious aspects of the "Bush doctrine," and the Department of Homeland Security created to actualize its theoretical foundations, was "a White House determination that if the risk of a terrorist attack in the U.S. was even 1%, it would be treated as if it were a 100% certainty," because "critics of Administration policy argue that that 1% possibility was never properly balanced against the 100% certainty of the tens of thousands of casualties that would accompany a war" (Kluger,…

Sources used in this document:
References

Kluger, Jeffrey. "Why We Worry About The Things We Shouldn't And Ignore The Things

We Should." TIME Magazine, November 26, 2006, http://ksuweb.kennesaw.edu/~shagin/080923risk.pdf (accessed February 16, 2013).

McNeill, Jenna B., James J. Carafano and Jessica Zuckerman. "30 Terrorist Plots Foiled: How

the System Worked." The Heritage Foundation Backgrounder # 2405, 11-19, http://www.heritage.org/research/reports/2010/04/30-terrorist-plots-foiled-how-the-system-worked (accessed February 15, 2013).
Cite this Document:
Copy Bibliography Citation

Related Documents

Espionage Study Guide
Words: 9330 Length: 34 Document Type: Essay

Espionage Burds, Chapter 19 Golden Age of Soviet "Illegals" Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross These five were all discovered to be spying for the Soviets. Cairncross was never caught. He supplied Stalin with secrets that helped the Soviets stay ahead of British Intelligence, especially at the Battle of Kursk Cairncross also informed Stalin of ULTRA, when Churchill was hiding ULTRA from Stalin Cairncross supplied a total of 5832 documents to the Soviets Cairncros had been

History of Espionage
Words: 3730 Length: 12 Document Type: Term Paper

Espionage has largely been a part of the way in which foreign affairs and foreign policy was conducted especially during the Cold War period. The double agents as well as intelligence spies were regarded as some of the smartest and at the same time dangerous people in history. The topic of this research is Alger Hiss, one of the most representative figures of American intelligence that would ultimately be accused

Intellectual Property and Corporate Espionage Corporate Espionage
Words: 1944 Length: 6 Document Type: Essay

Intellectual Property and Corporate Espionage Corporate espionage is an illegal activity though it is on rise in industrial settings. Organizations consider it as one of the techniques to increase their market share and beat the competitor. Various laws have been approved to combat these practices on domestic and international levels. Violation of these acts can result is heavy fines and suspension from business sector. The advent of information technology has revolutionized the

History Evolution Espionage. Pay Attention Spies Reasoning
Words: 1152 Length: 4 Document Type: Essay

history evolution espionage. Pay attention spies reasoning willingness assume role. This paper cite assigned readings incorporate thoughts deemed relevant forum discussion. Questions discussed forum class participation: Is spying ? Should a spy/source considered a traitor country? How mitigate risks engaging types individuals? If refer books "The Moral Dilemmas Spying" Why Spy? Espionage Age Uncertainty." Espionage While espionage involves a complex system in the present and while it has come to be

Corporate Espionage Is and Interesting Topic and
Words: 665 Length: 2 Document Type: Essay

Corporate espionage is and interesting topic and it mirrors espionage that is conducted by governments except for the fact that the activities are directed at commercial purposes as opposed to national security or other related items. Corporate espionage, also called industrial or economic espionage, encompasses a wide range of different activities that involve the illegal acquisition of trade secrets or other corporate information that can be used for financial gain

Cyber Espionage As an Emerging Threat
Words: 2349 Length: 8 Document Type: Term Paper

Cyber Espionage Over the last several years, cyber espionage has become a major problem that is impacting a variety of organizations. This is because hackers and other groups are actively seeking to exploit vulnerabilities in security networks. Evidence of this can be seen by looking no further than the below tables (which are illustrating the motivations and targets of attacks). Motivations behind Attacks on Computer Networks Percentage Cyber Crime Hactivism Cyber Warfare / Espionage ("Cyber Attack Statistics,"

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now