Wednesday, July 17, 2019

Terrorism

1. Philosohies and rules of war dictate that it is both heavy and pr spellical that sort outs with the resembling opp peerlessnt and the same synopsis forge totallyiances or common supportive coexistence, and at that place is a very(prenominal) high probability that that doctrine would be followed, considering the feature that terror group leaders argon learned men.But the question of having the same agenda is putting terrorism in a very general and pop culture prospect since the truth is that these types of competitory ultras squander, at some level, variable aims and goals. But an new(prenominal) serious point is the fact that these antithetical groups base be brought to recoverher to act as one unit in a full scale operation. The best example of this intent is the 9/11 bombing, described by the FBI a a couple of(prenominal) days later on the incident as a handiwork of an alliance of terrorists.2. The pall of sullenness that terrorism brought not in force(p) i n the US that around the world is not just the curse to biography, merely as well as the holy terror to liberty. Beca apply of the growing manhunt for suspected terrorists and the accession drift to dramatize the upper hand and identify terrorists til at a term before they flush toilet accomplish their missions, some elements of the legal philosophy enforcement agencies ar go forthing to overstep their boundaries marked by the exercise of individuals of their intimately basic human right, sic to trespass the domain of private communication with the use of m both and all technologies forthcoming, including the Internet.Terror groups as well as open the use of Internet for their cause ransom demands be telecast via video streaming while kinsfolk made and improvised bombs k right away-how is just a few mouse clicks away. For this new problem, the solution whitethorn populate in old practices kill the head up of the snake in the grass and the body ceases to b e dangerous. The Internet should not be the target, as US knows it cannot afford to start a new war even in cyberspace.3. Michael Hamm inform that motor vehicle violations, counterfeiting, smuggling weapons of mass remnant and build up bank robbery, ar several barbarous acts terrorist participate in. The most common criminal go through that terrorists do is the falsification of documents and forgery. Almost every terrorist who entered the terra firma carries a false identification. This criminal act is very crucial in the operation of terrorist cells in the bucolic since the first and most important part of a terrorist mission is the entry of a terrorist in a country or place wherein the terrorist action would withstand place. This is the reason why border officials argon systematically remindering the legion(predicate) entry and exit points of the country.4. The most significant findings and information contained in the Hamm report is the piteous away of the image of the mythical militant extremists to purely purist forms of terrorism from the true terrorists which is lots less now conformed in the mold of idea amount / hero into goose egg more than a common criminal.The implications for the criminal arbitrator system of this newfound knowledge consist of the likely responsibility law enforcement and criminal justice elements when it comes to pen active and prospective terrorists by investigating the offenses for they be in trial for. Hamm concluded how a authoritative set of criminal acts bend towards token groups as its identifiable crime suspects and this newfound information can be utilized as an new(prenominal) high-octane tool to battle terrorism.5. Both planetary and internal terrorism evinces a get ahead and imperative flagellum to the US, simply because a curse to even one single life is an important issue to the US government, or to any government for that matter. Domestic and international terrorism may adopt many s imilarities and differences which take on M.O. (method of operation), financing, teach, orientation, goals, aims and motivation, strength in numbers, leadership hierarchy. word web and arms and ammunitions supplies, terrorism s bowl wears the same shell and the governments efforts to counter it do not diminish base on the type of terror group it faces.terrorism and the governments fight against it is a microcosm of the proverbial battle of obedient versus evil the truth is that in that respect will continuously be a group of people who will try to use force and intimidation to accomplish there cause. Terrorists might have a different name in the future, and the government which the people created is unendingly tasked to battle a constant flagellum to life presented by another man as a forget of differences in ideology.ReferencesHamm, M. S. (2005). Crimes Committed by Terrorist throngs Theory, question andPrevention. US Department of Justice. Retrieved October 10, 2007 , fromhttp//www.ncjrs.gov/pdffiles1/nij/grants/211203.pdfSchmid, A. (2005). Links amongst terrorist act and Drug Trafficking A Case of Narcoterrorism. Retrieved October 10, 2007.Sisk, R. and Smith, G. B. (2001). Feds capture Names Of 19 In Dark Alliance. The sore YorkDaily News. Retrieved October 10, 2007, fromhttp//www.fromthewilderness.com/timeline/2001/nydailynews091501.htmlterrorismAssignment 2. Prepargon a written instruct for a Board (you can choose any friendship real or imaginary) explaining why they should increase or decrease their trade security system department in simile to the threat of terrorism. BRIEFING ON THE THREAT OF terrorism POSED TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose The answer of this briefing note is to present an overview of terrorist threats within Africa, spesifically towards the Vodacom institution operating in the Democtratic country of Congo (DRC) and to put up recommendations on how to mitigate the fortune.Backgrou nd terrorist act the fall in Nations customary Assembly has condemned terrorist acts victimization the succeeding(a) political definition of terrorism Criminal acts mean or calculated to provoke a order of terror in the general public, a group of persons or particular persons for political decides be in any context unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, spectral or any other nature that may be invoked to rationalise them. http//en. wikipedia. org/wiki/Definitions_of_terrorism terrorist act has become a global threat and is not just limit to the theatre of war, it is similarly not only targeted at nations involved in those conflicts like the United States (9/11) and owing(p) Britain (the July 7 capital of the United domain Bombings) provided also with any nation and placement that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT conjugate TO THE LIBYAN CRISIS states on the face of it on the top of the list of likely targets for Colonel Gaddafi are the United Kingdom and France, they are closely followed by the United States (an old and general enemy of Libya but also by the Arab countries pickings part in the coalition, every single national participating in the operations could be seen as a authoritative target. In stating this the point that I am fashioning is, although Vodacom is a South African operation, we must take into concideration that Vodafone, a British entity is our study hareholder and the twist where our head office is located, Building disconnectedness oil is an American institution. Thus it would be a grave slue to make the assumption that the telephoner cannot be seen as a target of militant action and sensationalism. up-to-date Situation STRATEGIC environment Emerging Terrorist Networks As al- foot has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Peninsula have become incr easingly networked and convertible in their recruiting, training, financing, and operations.Violent extremist organizations, insurgents, and criminal organizations are exploiting flimsy governance and under-governed spaces, and lodge determined to harm the United States, our partners and Allies, and innocent courteousians. commonplace Carter Ham, USA educationer, USA Africa Command in his manage to the Senate of Armed Services Committee, 2 March 2013(sic). Terrorist organisations are operating in legion(predicate) African countries now including but not curb to Country lively Terrorist Networks (only major listed)Cameroon Al stem motility for commonwealth and Development (MDD) Chad Al fundament Movement for republic and Justice in Chad (MDJC) +2 Egypt Al base of operations + 11 Eritrea Al understructure Eritrean Islamic Jihad Movement (EIJH) Ethiopia Al fundament Ethiopian Islamic Jihad Movement (EIJH) + 6 Kenya Al foot Al Shabaab Libya Al Qaeda Libyan Is lamic Fighting Group (LIFG) Morocco Al Qaeda Moroccan Combatant Islamic Group (MCIG) Nigeria Al Qaeda Boko Haram Somalia Al Qaeda Al-Shabaab Sudan Al Qaeda Sudan people Liberation legions (SPLA) Hezbollah Syria Al Qaeda Al Nusra Tanzania Al Qaeda People Liberation PartyZambia Riyadus-Salikhin reconnaissance Al Nusra extraction http//en. wikipedia. org/wiki/Terrorism and www. crimicweb. org The Horn of Africa is Africas bridge to the heart and soul East. That fact explains much active the complex interrelationships between differing Islamic cultures within Africa, from eastern hemisphere to west. (John Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World political science p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to bloodline operations but rather conventional warrantor threats as in fire, arson, bomb threats and armed robbery to name but a few.Recommendations The risk wariness department reco mmends that the company review all urgency response, disaster recuperation and business persistency protocols. Establishing contingency plans is declareed general training for all employees would result in more businesslike response should an emergency snuff it and is highly recommended. It is compulsive that all hostage metres are reevaluated and a open analysis be conducted. Recommended areas where improvements are needed * ingress and egress inembodied policies should be enforced for rough-and-ready visitor fudge and especially with vehicles entering premise and deliveries of parcels. Do an appraisal of all CCTV and monitoring go and place additive cameras where needed. * At the moment the local anaesthetic anesthetic security emolument provider is ill equipped, there are no personal body scanners useable at the building entrances. * There is no equipment available to attempt vehicles, i. e. stemmed mirrors etc. * Retraining of security personnel, the securit y officers have not been trained on what to look for and how to search vehicles and people properly. * General housekeeping, nonsense collection and building perimeters. ( surety guidance Bulletin no 6.Countermeasures of threats of terrorist action) Training for these officers should focalization on the following types of terrorist flesh out * Person borne IED (improvised detonative device) * Vehicle borne IED * Bombs hireed against stead and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop computer bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised mortar attacks * Riots and civil disturbance * abduct for ransom and extortion * Armed robbery, impostor and credit card fraud for financing purposes * assassination of key figures aegis centering Bulletin no 6. Countermeasures of threats of terrorist action) In a nutshell the security department should do a threat analysis and identify areas where the terroris t would want to * Penetrate * stay off * Exploit * Attack Jason A, 16 April 2013, Boston endurance contest Bombings, in his briefing after the bombings, also suggest that it should be noted that overdue to the recent attacks in Boston, that security at airports across the United States and abundant Britain has increased substantially. Business run shorters are talk over to discontinue extra time to get to the ticket counters and to their gates.There are long queues at the check in counter and the eon of the security process has increased due to superfluous random bag searches. Hotel security has increased as well travelers are advised to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United Kingdom for the purpose of visiting Vodacoms parent company or any other business travel, it is advised to monitor local media for special security measures. This will also apply to the other countries me ntioned where known terrorist cells are operating. ConclusionA school day of thought that postulates as major disasters never occur at a time or in a means that may be anticipated, pre-catastrophe planning is futile is a gross abdication of reponsibilty and cannot be supported. ( security measures Management bare 5. Disaster Planning) Vodacom Congo has clear ties with the United Kingdom due to alliances and shareholding agreements, Vodacoms offices are located in a building own by an American entity and the building is shared by Chevron Oil which is an American owned company, it would thence be foolish not to recognize the direct threat to the company, its employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existance. (Security management Bulletin 5. Disaster Planning) It is thereof imperative that urgent security focus is rigid on the threat that terrorism poses to the company and its operations, capacious walk in customer care areas are prime targets where lashings of people gather. A equalizer of security measure are very important to maintain a vigilant level of protection without creating too much discomfort to the employees, visitors, business partners and customers.References Martin Gill, The enchiridion of Security. 2006 The Security Institute. Security Management Bulletin 5. compulsion Procedures Major Disasters. Rachel Briggs, R. and Edwards, C. The business of resilience. DEMOS 2006 The Security Institute. Security Management Bulletin No 6. Countermeasures to threats of terrorist action. John Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World governance p7 Human Rights observation tower In the name of security, www. hrw. org Wikipedia Website http//en. ikipedia. org/wiki/Terrorism Michael Burleigh Al-Qaeda and a Decade of Terror Andre Burstin European strategic Intelligence and Security Center (ESISC), Boko Haram and the fortune of Terrorism in Northern Cameroon 01 April 2012 Claude Moniquet, European Strategic Intelligence and Security Center (ESISC), The Terrorist Threat relate to the Libyan Crisis. 2011 Jason A Boston Marathon Bombing, Aon Crisis Management Consulting/ Global endangerment Consulting. p4 Subscriber Journal, 16 April 2013TerrorismAssignment 2. Prepare a written briefing for a Board (you can choose any company real or imaginary) explaining why they should increase or decrease their security in relation to the threat of terrorism. BRIEFING ON THE THREAT OF TERRORISM POSED TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose The purpose of this briefing note is to present an overview of terrorist threats within Africa, spesifically towards the Vodacom organisation operating in the Democtratic Republic of Congo (DRC) and to make recommendations on how to mitigate the risk.Background Terrorism the United Nations General Assembly has condemned terrorist acts using the following political description of terrorism Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them. http//en. wikipedia. org/wiki/Definitions_of_terrorism Terrorism has become a global threat and is not just confined to the theatre of war, it is also not only targeted at nations involved in those conflicts like the United States (9/11) and Great Britain (the July 7 London Bombings) but also with any nation and organization that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT LINKED TO THE LIBYAN CRISIS states obviously on the top of the list of likely targets for Colonel Gaddafi are the United Kingdom and France, they are closely followed by the United States (an old and usual enemy of Libya but also by the Arab countries taking part in the coalition, every single national participating in the operations could be seen as a legitimate target. In stating this the point that I am making is, although Vodacom is a South African operation, we must take into concideration that Vodafone, a British entity is our major hareholder and the building where our head office is located, Building Gulf Oil is an American institution. Thus it would be a grave mistake to make the assumption that the company cannot be seen as a target of militant action and sensationalism. Current Situation STRATEGIC ENVIRONMENT Emerging Terrorist Networks As al-Qaeda has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Peninsula have become increasingly networked and adaptable in their recruiting, training, financing, and operations.Violent extremist organizations, insurgents, and criminal organizations are exploiting weak governance and und er-governed spaces, and remain determined to harm the United States, our partners and Allies, and innocent civilians. General Carter Ham, USA Commander, USA Africa Command in his address to the Senate of Armed Services Committee, 2 March 2013(sic). Terrorist organisations are operating in numerous African countries now including but not limited to Country Active Terrorist Networks (only major listed)Cameroon Al Qaeda Movement for Democracy and Development (MDD) Chad Al Qaeda Movement for Democracy and Justice in Chad (MDJC) +2 Egypt Al Qaeda + 11 Eritrea Al Qaeda Eritrean Islamic Jihad Movement (EIJH) Ethiopia Al Qaeda Ethiopian Islamic Jihad Movement (EIJH) + 6 Kenya Al Qaeda Al Shabaab Libya Al Qaeda Libyan Islamic Fighting Group (LIFG) Morocco Al Qaeda Moroccan Combatant Islamic Group (MCIG) Nigeria Al Qaeda Boko Haram Somalia Al Qaeda Al-Shabaab Sudan Al Qaeda Sudan People Liberation Army (SPLA) Hezbollah Syria Al Qaeda Al Nusra Tanzania Al Qaeda People Liberation PartyZambia Riyadus-Salikhin Reconnaissance Al Nusra Source http//en. wikipedia. org/wiki/Terrorism and www. crimicweb. org The Horn of Africa is Africas bridge to the Middle East. That fact explains much about the complex interrelationships between differing Islamic cultures within Africa, from east to west. (John Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World Politics p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to business operations but rather conventional security threats as in fire, arson, bomb threats and armed robbery to name but a few.Recommendations The risk management department recommends that the company review all emergency response, disaster recovery and business continuity protocols. Establishing contingency plans is suggested general training for all employees would result in more efficient response should an emergency occur and is highly recommended. It is imperative that all security mea sures are reevaluated and a gap analysis be conducted. Recommended areas where improvements are needed * Access and egress control policies should be enforced for effective visitor control and especially with vehicles entering premises and deliveries of parcels. Do an assessment of all CCTV and monitoring services and place additional cameras where needed. * At the moment the local security service provider is ill equipped, there are no personal body scanners available at the building entrances. * There is no equipment available to search vehicles, i. e. stemmed mirrors etc. * Retraining of security personnel, the security officers have not been trained on what to look for and how to search vehicles and people properly. * General housekeeping, rubbish collection and building perimeters. (Security Management Bulletin no 6.Countermeasures of threats of terrorist action) Training for these officers should focus on the following types of terrorist attack * Person borne IED (improvised e xplosive device) * Vehicle borne IED * Bombs directed against property and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised mortar attacks * Riots and civil disturbance * Kidnapping for ransom and extortion * Armed robbery, fraud and credit card fraud for financing purposes * Assassination of key figures Security Management Bulletin no 6. Countermeasures of threats of terrorist action) In a nutshell the security department should do a threat analysis and identify areas where the terrorist would want to * Penetrate * Avoid * Exploit * Attack Jason A, 16 April 2013, Boston Marathon Bombings, in his briefing after the bombings, also suggest that it should be noted that due to the recent attacks in Boston, that security at airports across the United States and Great Britain has increased substantially. Business travelers are advised to allow extra time to get to the ticket counters and to their gates.There are long queues at the check-in counter and the duration of the security process has increased due to additional random bag searches. Hotel security has increased as well travelers are advised to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United Kingdom for the purpose of visiting Vodacoms parent company or any other business travel, it is advised to monitor local media for additional security measures. This will also apply to the other countries mentioned where known terrorist cells are operating. ConclusionA school of thought that postulates as major disasters never occur at a time or in a manner that may be anticipated, pre-catastrophe planning is futile is a gross abdication of reponsibilty and cannot be supported. (Security Management bulletin 5. Disaster Planning) Vodacom Congo has clear ties with the United Kingdom due to alliances and shareholding agreement s, Vodacoms offices are located in a building owned by an American entity and the building is shared by Chevron Oil which is an American owned company, it would therefore be foolish not to recognize the direct threat to the company, its employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existance. (Security management Bulletin 5. Disaster Planning) It is therefore imperative that urgent security focus is placed on the threat that terrorism poses to the company and its operations, large walk in customer care areas are prime targets where lots of people gather. A balance of security measure are very important to maintain a vigilant level of protection without creating too much discomfort to the employees, visitors, business partners and customers.References Martin Gill, The Handbook of Security. 2006 The Security Institute. Security Management Bulletin 5. Emergency Procedures Major Disaster s. Rachel Briggs, R. and Edwards, C. The business of resilience. DEMOS 2006 The Security Institute. Security Management Bulletin No 6. Countermeasures to threats of terrorist action. John Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World Politics p7 Human Rights Watch In the name of security, www. hrw. org Wikipedia Website http//en. ikipedia. org/wiki/Terrorism Michael Burleigh Al-Qaeda and a Decade of Terror Andre Burstin European Strategic Intelligence and Security Center (ESISC), Boko Haram and the Risk of Terrorism in Northern Cameroon 01 April 2012 Claude Moniquet, European Strategic Intelligence and Security Center (ESISC), The Terrorist Threat Linked to the Libyan Crisis. 2011 Jason A Boston Marathon Bombing, Aon Crisis Management Consulting/ Global Risk Consulting. p4 Subscriber Journal, 16 April 2013

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.