Verified Document

U.S. Foreign Policy On Terrorism Essay

International Terrorism Discussion Questions on International Terrorism

Explain the origins and evolution of long-term separatists and ethnic and nationalistic terrorism. Also, provide group names and their respective parts of the world.

Ethno- separatist/nationalist terrorism is not specifically a modern phenomenon. Historically, two Jewish movements in Judaea that desired to provoke the local population to rise against the Roman occupiers used ethno-racial terrorism. However, it was only in 60s and 70s that terrorism came to be associated with ethnic- separatist/nationalist movements (Conser, Paynich & Gingerich, 2013). During that time, terrorism was seen as paying off on the reasons for effective, aggressive campaigns launched and won. The Palestine Liberation Organization's terrorist movement between 1968 and 1980 confirmed to other nationalist groups that internationalizing their cause could be valuable. The variety of ethnic-national/separatist terrorist movements effective worldwide, therefore, increased from three in 1968 to 30 in 1978 (Cassara, 2006).

Psychologists argue that the formation of a large-group identity is recognized as a standard trend, usually evolving from specific conditions, such as traditional continuity, a myth, geography and other shared activities. Hence, how a particular team conceives of its ethnic identification is almost usually a practiced indifference from other groups. Mostly, one group's ethnic identification is strengthened by a trauma or the combination of a disaster that once affected the group's ancestors. As seen from the Serbs' 1389 victory over Kosovo (Fijnaut & Paoli, 2004) trauma can cause varied reactions to reverse the feelings of loss, humiliations, and revenge introduced such as ethnic rivalry against those considered accountable. More accurately, such an injury or severe dislocation can cause a psychological defense procedure that needs the development of an "enemy. It becomes the base of combined self-loathing, anger, and anxiety, resulting in ethnic assault. If a particular team seems depressed or anxious, it will combine with its ethnic identity, nationality or religion, the latter providing as guards from further problems.

Nowadays, Ethno- separatist/nationalist terrorism predominates over all other types of terrorist action. The number of global active terror groups increased from 1992 to 1995 (Sampson, Blakeman & Carkhuff, 2006). This period had the most serious terror attacks all sharing some connotations. By evaluation, ethnic-nationalist/separatist movements do not cause huge casualties on their targets and are more appropriate in selecting their targets than their modern counterparts. The goal of the former is keeping the level of assault bearable for the local inhabitants in order not to alienate worldwide opinion and create severe government countermeasures. The latter are much less involved with such requirements, their goals obviously being different. Ethnic-Nationalist/separatist movements are more long-term than other movements, which have the possibility of remaining effective as long as ten years. Ethno-nationalist/separatists have apparent objectives and can depend on their rivals for support. This is through appealing to a combined revolutionary tradition to maintain the group's existence and renew its positions. Neo-nationalist groups are active, but they are not for the most part using threats nor supporting violence in any way.

Question 2

Explain why domestic terrorism is hard to define. List the factors that improve and inhibit our understanding of it. What steps has law enforcement undertaken to understand it, and what factors exist that have impeded our understanding of it?

Historians like Bruce Hoffman suggested that domestic terrorism is difficult to define mainly because the significance of the phrase has modified so regularly over previous times. Furthermore, Jenkins suggested that domestic terrorism should be described "by the nature of the act, not by the identity of the perpetrators or the nature of their cause." A few more factors make it hard to understand the depth of domestic terrorism in America. First, keeping track of the number of terrorist persecutions has been challenging in the post-9/11 era. Second, there may be some indecisiveness in the investigative procedure regarding precisely when illegal action becomes domestic terrorism. Third, the government seems to use the terms "terrorist" and "extremist" interchangeably when referring to domestic terrorism. It is uncertain why this is the situation. Lastly, and most significantly, which particular groups are and should be regarded domestic terrorist organizations? The federal government does not offer a public response to this question. Rather, it describes the problem in terms of "threats," not movements (Shanty & Mishra, 2007). In order to understand this, law enforcers have undertaken the following actions:

Counting Terrorism Cases

While legal and practical government descriptions are available for "domestic terrorism," there is little sense of the scope of the threat of domestic terrorism based on publicly available government information. It has been said that in much of the post-9/11 period, the legal courts can use different factors when organizing, keeping track...

A 2009 research discovered that the U.S. Federal Courts, National Security Department, and state prosecutors should depend on various procedures to figure out whether or not particular cases include terrorism at all.
Extremism vs. Terrorism

Another factor that dominates conversations of domestic terrorism is "extremism." The latter phrase is widely applied on native players, whether they are domestic terrorists or enthusiasts of ideologists submitted by international movements such as Al Qaeda. Jonathan Masters, a nationwide security professional, has recommended that law enforcers view "extremism" as mostly symbolic of "terrorism." He has also discovered that there is a "lack of consistency in the way domestic terrorist actions is prosecuted" in America. Using the phrase "extremist" allows prosecutors, investigators and policymakers the versatility to talk about terrorist-like action without branding it as "terrorism" and having to take legal action against it as such (Kessler & Bearden, 2007). This versatility is certainly a resource to prosecutors. They can change subjects of FBI domestic terrorism research under a broader range of laws and, consequently, not explain the subjects openly as terrorists. However, for policymakers this versatility makes it difficult to figure out the magnitude of the domestic terrorist threat. One cannot obtain a clear sense of magnitude if some people are charged and openly described as terrorists. It is even hard when others are mentioned as extremists, and still others get into the criminal record only as criminals implicated on offenses not associated with terrorism like tax fraud, arson, and trespassing.

Official Public List

The government should generate an official public list of domestic terrorists and terrorist organizations. The development of such a record may be precluded by civil rights concerns. However, a lack of formal lists or procedures to assign groups or people as domestic terrorists makes it difficult to assess domestic terrorism patterns and assess government initiatives to counter such risks.

Question 3

Describe the intelligence process.

The intelligence process has five steps. These steps are planning and directing, collecting, processing and exploiting, analysis and production, and lastly dissemination and integration.

Planning and Direction: planning and directing includes managing the whole efforts from identification of the need for information to delivering the intelligence product to consumers. It entails the implementation of plans to fulfill the requirements imposed on the FBI and identifying collection specifications depending on the FBI needs. This phase is responsive to the end of the cycle because finished and current intelligence supporting decision-making produces new specifications.

Collection: this step involves gathering raw information depending on the specifications. Activities like surveillance, interviews, human source operations, liaison relationships, and searches leads to the collection of intelligence.

Processing and Exploitation: in this phase, analysts convert the collected information into usable forms. They achieve this via various methods like language translation, data reduction, and decryption. Processing involves keying in raw data into databases to be exploited in the analysis process.

Analysis and Production: this is where the raw information is converted into intelligence. In involves combining, analyzing and evaluating available data, and preparing intelligence products. The reliability, relevance, and validity of the information is evaluated and weighed. The information is integrate din terms of logic, put into context and used to generate intelligence. The intelligence product connects the dots by putting the collected information into context and generating conclusions regarding its implications.

Dissemination: the raw or finished intelligence is distributed to consumers whose needs led to the intelligence specifications. The FBI disseminates the product in three products: FBI Intelligence Bulletins, FBI Intelligence Information Reports, and FBI Intelligence Assessments (Simon, 2006). The customers make decisions based on the information. These decisions can lead to imposing more specifications; hence, the FBI intelligence cycle might continue.

What is the difference between national security and criminal intelligence? How does this difference relate to the efforts of those who combat terrorism and violent extremism?

National security is the need to maintain the survival of the country by using financial power, diplomacy, political power, and power projection. The idea emerged mostly in America after World War II. Initially concentrating on military power, now it involves a range of elements including the non-military or economic security of the country and the values espoused by the nation. Criminal intelligence has been described as the product of methodical collecting, assessment, and integration of raw information on individuals or actions alleged of being, or known to be, criminal in nature. The objective of the criminal intelligence is to enhance the understanding of…

Sources used in this document:
References

Conser, J.A., Paynich, R., & Gingerich, T. (2013). Law enforcement in the United States. Burlington, Mass: Jones & Bartlett Learning.

Cassara, J.A. (2006). Hide and seek: Intelligence, law enforcement, and the stalled war on terrorist finance. Washington, DC: Potomac Books.

Dintino, J.J., & Martens, F.T. (2003). Police intelligence systems in crime control: Maintaining a delicate balance in a liberal democracy. Springfield, Ill: C.C. Thomas.

Fijnaut, C., & Paoli, L. (2004). Organized crime in Europe: Concepts, patterns, and control policies in the European Union and beyond. The Netherlands: Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

U.S. Foreign Policy and the
Words: 956 Length: 3 Document Type: Term Paper

8 billion. The Occupation authorities also helped the Japanese government overcome postwar economic chaos, especially rampant inflation, by balancing the government budget, raising taxes and imposing price and wage freezes, and resuming limited foreign trade" (Kesselman et al., 203). The U.S. aid not only helped to rebuild the country, but also ensured that Japan was stable enough so that renegade seedlings of Communism or comparable institutions didn't suddenly flourish. The

U.S. Foreign Policy US Middle
Words: 2218 Length: 8 Document Type: Thesis

The international community can obviously respond by seeking to marginalize the Taliban and similar movements as extremists. However, it has become clear following the terrorist attacks on the World Trade Center and the Pentagon that western governments have not been effective in infiltrating terrorist networks and pre-empting attacks. It has also become clear that there will be no shortage of people in the Islamic world who are willing to

U.S. Foreign Policy and the
Words: 852 Length: 3 Document Type: Essay

However, the suggested equivalence of the (rightful) criticism of those relationships and support for Israel are fundamentally flawed and invalid. Specifically, the phrase "at the expense of the Palestinians" (p796) ignores the reality of how the Palestinian became "refugees" in the first place, the degree to which Israel tried to negotiate a fair settlement during the Clinton administration, and the degree to which corrupt Palestinian leaders undermined those efforts

U.S. Foreign Policy in the
Words: 3807 Length: 10 Document Type: Term Paper

Weapons of mass destruction are just an excuse. But is known that "President George W Bush and Vice-President Dick Cheney were both oil company executives before entering politics, as was half the present US administration," which means that not only do you have friends in the oil business but that they dictate your policy (Vesely 2002). Having such deceptive and underhanded policies and engaging an entire nation in a war that not only kills Amerians,

U.S Foreign Policy the Issue
Words: 1164 Length: 3 Document Type: Term Paper

However, the prerogatives of the presidential office give him this possibility. In this sense, his quality as commander in chef of the armed forces enables him to wage war without the approval of the Congress. Also, the first war in Iraq represented a good precedent for the authority of the President to go to war. Finally, another element that were used as justification for the intervention in Iraq without

U.S. Foreign Policy and the
Words: 3110 Length: 9 Document Type: Term Paper

They however fail to see the strategic linkage in the U.S. foreign policy. Israel is the most trusted ally of United States in the region. It has the same strategic interest as the United States and has a firm foundation of democratic support. The Arab governments on the other hand are unpopular, non-democratic and are in power due to the western interest in maintaining the status quo. Overthrow of the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now