Thursday, January 10, 2019
Terrorism
1. Philosohies and rules of war place that it is both sound and pr work outical that groups with the said(prenominal) opponent and the same schema formulate in alliances or green supportive coexistence, and thither is a truly high prospect that that dogma would be followed, considering the fact that flagellum group leaders argon lettered men.But the question of having the same agenda is putting act of terrorist act in a very(prenominal) general and pop nicety perspective since the truth is that these types of martial extremists demand, at some level, varying aims and goals. But some new(prenominal) regulartful point is the fact that these different groups gage be brought to hither to act as one unit in a full scale operation. The scoop example of this tendency is the 9/11 bombing, described by the FBI a fewer days aft(prenominal) the incident as a slewiwork of an alliance of terrorists.2. The mantlepiece of gloom that terrorist act brought non however i n the US just around the world is non unspoiled the threat to life, simply as well as the threat to liberty. Beca office of the growing manhunt for suspected terrorists and the change magnitude drive to analyze the upper hand and identify terrorists even before they can accomplish their missions, some elements of the law enforcement agencies ar willing to overstep their boundaries marked by the exercise of individuals of their most basic military man right, ready to trespass the domain of secluded communication with the use of m each and all technologies ready(prenominal), including the Internet. alarm groups in either case found the use of Internet for their cause change demands atomic number 18 telecast via video streaming spot home made and improvised bombs kat once-how is just a few mouse clicks remote. For this vernal problem, the solution whitethorn lie in old practices kill the head of the snake and the body ceases to be dangerous. The Internet should n ot be the tar conduct, as US k todays it cannot render to start a new war even in cyberspace.3. Michael Hamm reported that repel vehicle violations, counterfeiting, smuggling weapons of mass expiry and fortify bank robbery, atomic number 18 several(prenominal) criminal acts terrorist pcticipate in. The most common criminal action that terrorists do is the falsification of documents and forgery. Almost every terrorist who entered the fix of matter carries a false identification. This criminal act is very crucial in the operation of terrorist cells in the coun settle since the first and most classic detonate of a terrorist mission is the intromission of a terrorist in a country or place wherein the terrorist action would take place. This is the reason wherefore border officials be consistently monitor the m whatever entree and exit points of the country.4. The most significant findings and selective training contained in the Hamm report is the moving away of the imag e of the mythical activist extremists to stringently purist forms of act of terrorism from the true terrorists which is over frequently little now conformed in the mold of wishful thinker / hero into nothing more than a common criminal.The implications for the criminal umpire dodge of this newfound knowledge consist of the assertable responsibility law enforcement and criminal justice elements when it comes to profiling active and prospective terrorists by investigating the offenses for they are in ravel for. Hamm concluded how a certain passel of criminal acts bend towards particular groups as its identifiable crime suspects and this newfound information can be utilized as an other efficient tool to booking terrorism.5. Both inter subject area and domestic terrorism presents a make and urgent threat to the US, simply because a threat to even one single life is an important issue to the US establishment, or to any government for that matter. Domestic and inter issue te rrorism whitethorn prepare many similarities and differences which let in M.O. (method of operation), financing, training, orientation, goals, aims and motivation, strength in numbers, leadership hierarchy. science network and arms and ammunitions supplies, terrorism exempt wears the same face and the governments efforts to counter it do not diminish based on the type of terror group it faces. terrorist act and the governments fight against it is a microcosm of the proverbial strife of good versus evil the truth is that in that respect will always be a group of people who will try to use force and intimidation to come across there cause. frightists might puzzle a different name in the future, and the government which the people created is always tasked to battle a constant threat to life presented by another man as a solution of differences in ideology.ReferencesHamm, M. S. (2005). Crimes Committed by Terrorist Groups Theory, Research andPrevention. US Department of Justice . Retrieved October 10, 2007, fromhttp//www.ncjrs.gov/pdffiles1/nij/grants/211203.pdfSchmid, A. (2005). golf links between terrorist act and Drug Trafficking A Case of Narcoterrorism. Retrieved October 10, 2007.Sisk, R. and Smith, G. B. (2001). Feds Have call Of 19 In Dark Alliance. The forward- stomach a bun in the ovening YorkDaily News. Retrieved October 10, 2007, fromhttp//www.fromthewilderness.com/timeline/2001/nydailynews091501.html     act of terrorismAssignment 2. elevate a written briefing for a Board (you can choose any guild real or imaginary) explaining why they should increase or decrease their shelter in relation to the threat of terrorism. instruct ON THE THREAT OF TERRORISM represent TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose The conclude of this briefing note is to present an overview of terrorist threats inwardly Africa, spesifically towards the Vodacom organisation operating in the Democtratic body politic of Congo (DRC ) and to make recommendations on how to apologize the risk.Background terrorist act the linked Nations General fictionalization has condemned terrorist acts using the following policy- make commentary of terrorism Criminal acts intended or calculated to provoke a situate of terror in the general public, a group of persons or particular persons for semipolitical points are in any scope unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that whitethorn be invoked to justify them. http//en. wikipedia. org/wiki/Definitions_of_terrorism terrorist act has extend a global threat and is not just confined to the theatre of war, it is too not only targeted at nations multiform in those conflicts like the joined States (9/11) and wide Britain (the July 7 London Bombings) but also with any nation and organization that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT LINKE D TO THE Libyan CRISIS states obviously on the top of the keep down of likely targets for Colonel Gaddafi are the United earth and France, they are closely followed by the United States (an old and usual enemy of Libya but also by the Arab countries taking part in the coalition, every single national participating in the trading operations could be seen as a legitimate target. In stating this the point that I am do is, although Vodacom is a South African operation, we moldiness take into concideration that Vodafone, a British entity is our study(ip) hareholder and the building where our head office is located, twist Gulf Oil is an American institution. then it would be a grave faulting to make the assumption that the familiarity cannot be seen as a target of militant action and sensationalism. Current Situation strategic ENVIRONMENT Emerging Terrorist Networks As root word has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Pen insula have effect increasingly networked and adaptable in their recruiting, training, financing, and operations.Violent extremist organizations, insurgents, and criminal organizations are exploiting creaky governance and under-governed spaces, and remain determined to prostitute the United States, our partners and Allies, and innocent civilians. General Carter Ham, ground forces Commander, ground forces Africa Command in his treat to the Senate of Armed Services Committee, 2 butt against 2013(sic). Terrorist organisations are operating in legion(predicate) African countries now including but not limited to Country Active Terrorist Networks (only major(ip)(ip) mentioned)Cameroon Al Qaeda work for republic and Development (MDD) Chad Al Qaeda hunting expedition for commonwealth and Justice in Chad (MDJC) +2 Egypt Al Qaeda + 11 Eritrea Al Qaeda Eritrean Islamic jihad Movement (EIJH) Ethiopia Al Qaeda Ethiopian Islamic jehad Movement (EIJH) + 6 Kenya Al Qaeda Al Sha baab Libya Al Qaeda Libyan Islamic bit Group (LIFG) Morocco Al Qaeda Maroc Combatant Islamic Group (MCIG) Nigeria Al Qaeda Boko Haram Somalia Al Qaeda Al-Shabaab Sudan Al Qaeda Sudan People pocket soldiery (SPLA) Hezbollah Syria Al Qaeda Al Nusra Tanzania Al Qaeda People sac PartyZambia Riyadus-Salikhin Reconnaissance Al Nusra kickoff http//en. wikipedia. org/wiki/Terrorism and www. crimicweb. org The Horn of Africa is Africas connect to the Middle East. That fact explains much about(predicate) the complex interrelationships between differing Islamic cultures indoors Africa, from east to west. ( flush toilet Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World government p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to business operations but rather conventional bail threats as in fire, arson, bomb threats and fortify robbery to name but a few.Recommendations The risk management section recom mends that the company review all emergency chemical reaction, calamity recovery and business continuity protocols. Establishing possibility plans is suggested general training for all employees would essence in more efficient retort should an emergency overhaul and is highly recommended. It is lordly that all shelter measures are reevaluated and a gap analytic thinking be conducted. Recommended areas where improvements are needed * Access and egress wangle policies should be enforced for effective visitant guard and especially with vehicles entering set forth and deliveries of parcels. Do an assessment of all CCTV and supervise advantages and place surplus cameras where needed. * At the moment the local warrantor dish out provider is ill equipped, there are no personal body scanners in stock(predicate) at the building entrances. * There is no equipment available to search vehicles, i. e. stemmed mirrors and so on * Retraining of credential personnel, the pled ge officers have not been trained on what to prospect for and how to search vehicles and people properly. * General housekeeping, chip collection and building perimeters. ( warrantor perplexity bulletin no 6.Countermeasures of threats of terrorist action) Training for these officers should focalise on the following types of terrorist attack * Person borne IED (improvised volatile device) * Vehicle borne IED * Bombs directed against property and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised trench mortar attacks * Riots and civil disturbance * Kidnapping for ransom money and extortion * Armed robbery, fraud and credit plank fraud for financing purposes * Assassination of nominate figures certificate oversight publicise no 6. Countermeasures of threats of terrorist action) In a nutshell the tribute segment should do a threat abbreviation and identify areas where the terrorist would want to * Penetrate * repress * Exploit * Attack Jason A, 16 April 2013, capital of Massachusetts endurance contest Bombings, in his briefing afterward the bombings, also suggest that it should be historied that due to the recent attacks in capital of Massachusetts, that credential at airports across the United States and undischarged Britain has change magnitude substantially. Business travelers are sure to allow extra time to get to the ticket counters and to their gates.There are long queues at the check-in counter and the duration of the warranter process has change magnitude due to additional random bag searches. Hotel pledge has increased as well travelers are assured to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United state for the purpose of tour Vodacoms parent company or any other business travel, it is certified to monitor local media for addition al security measures. This will also apply to the other countries mentioned where known terrorist cells are operating. ConclusionA school of image that postulates as major possibilitys never turn over at a time or in a manner that may be anticipated, pre-catastrophe planning is futile is a gross abdication of reponsibilty and cannot be supported. ( tribute Management bulletin 5. Disaster Planning) Vodacom Congo has force out ties with the United Kingdom due to alliances and shareholding agreements, Vodacoms offices are located in a building owned by an American entity and the building is shared by band Oil which is an American owned company, it would thusly be foolish not to secernate the direct threat to the company, its employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existance. ( protective cover management Bulletin 5. Disaster Planning) It is then supreme that urgent security focal point is placed on the threat that terrorism poses to the company and its operations, large walk in customer care areas are anthesis targets where lots of people gather. A vestibular sense of security measure are very important to maintain a lynx-eyed level of protection without creating too much discomfort to the employees, visitors, business partners and customers.References Martin Gill, The Handbook of gage. 2006 The warranter Institute. Security Management Bulletin 5. requirement Procedures Major Disasters. Rachel Briggs, R. and Edwards, C. The business of resilience. DEMOS 2006 The Security Institute. Security Management Bulletin No 6. Countermeasures to threats of terrorist action. arse Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World governing p7 humans Rights Watch In the name of security, www. hrw. org Wikipedia Website http//en. ikipedia. org/wiki/Terrorism Michael Burleigh Al-Qaeda and a Decade of Terror Andre Burstin Euro pean Strategic word of honor and Security Center (ESISC), Boko Haram and the Risk of Terrorism in Northern Cameroon 01 April 2012 Claude Moniquet, European Strategic science and Security Center (ESISC), The Terrorist Threat associate to the Libyan Crisis. 2011 Jason A Boston marathon Bombing, Aon Crisis Management Consulting/ Global Risk Consulting. p4 lector Journal, 16 April 2013TerrorismAssignment 2. set a written briefing for a Board (you can choose any company real or imaginary) explaining why they should increase or decrease their security in relation to the threat of terrorism. brief ON THE THREAT OF TERRORISM constitute TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose The purpose of this briefing note is to present an overview of terrorist threats in spite of appearance Africa, spesifically towards the Vodacom organisation operating in the Democtratic state of Congo (DRC) and to make recommendations on how to mitigate the risk.Background Terrorism the Uni ted Nations General fabrication has condemned terrorist acts using the following political explanation of terrorism Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any setting unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them. http//en. wikipedia. org/wiki/Definitions_of_terrorism Terrorism has become a global threat and is not just confined to the theatre of war, it is also not only targeted at nations relate in those conflicts like the United States (9/11) and wide Britain (the July 7 London Bombings) but also with any nation and organization that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT LINKED TO THE Libyan CRISIS states obviously on the top of the list of likely targets for Colonel Gaddafi are the United Kingdom an d France, they are closely followed by the United States (an old and usual enemy of Libya but also by the Arab countries taking part in the coalition, every single national participating in the operations could be seen as a legitimate target. In stating this the point that I am making is, although Vodacom is a South African operation, we essential take into concideration that Vodafone, a British entity is our major hareholder and the building where our head office is located, edifice Gulf Oil is an American institution. then it would be a grave wrongdoing to make the assumption that the company cannot be seen as a target of militant action and sensationalism. Current Situation strategic ENVIRONMENT Emerging Terrorist Networks As infrastructure has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Peninsula have become increasingly networked and adaptable in their recruiting, training, financing, and operations.Violent extremist organi zations, insurgents, and criminal organizations are exploiting enervated governance and under-governed spaces, and remain determined to injury the United States, our partners and Allies, and innocent civilians. General Carter Ham, USA Commander, USA Africa Command in his make out to the Senate of Armed Services Committee, 2 environ 2013(sic). Terrorist organisations are operating in numerous African countries now including but not limited to Country Active Terrorist Networks (only major listed)Cameroon Al Qaeda Movement for Democracy and Development (MDD) Chad Al Qaeda Movement for Democracy and Justice in Chad (MDJC) +2 Egypt Al Qaeda + 11 Eritrea Al Qaeda Eritrean Islamic Jihad Movement (EIJH) Ethiopia Al Qaeda Ethiopian Islamic Jihad Movement (EIJH) + 6 Kenya Al Qaeda Al Shabaab Libya Al Qaeda Libyan Islamic competitiveness Group (LIFG) Morocco Al Qaeda Moroccan Combatant Islamic Group (MCIG) Nigeria Al Qaeda Boko Haram Somalia Al Qaeda Al-Shabaab Sudan Al Qaeda Sudan People Liberation force (SPLA) Hezbollah Syria Al Qaeda Al Nusra Tanzania Al Qaeda People Liberation PartyZambia Riyadus-Salikhin Reconnaissance Al Nusra starting time http//en. wikipedia. org/wiki/Terrorism and www. crimicweb. org The Horn of Africa is Africas straddle to the Middle East. That fact explains much about the complex interrelationships between differing Islamic cultures indoors Africa, from east to west. (John Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World Politics p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to business operations but rather conventional security threats as in fire, arson, bomb threats and armed robbery to name but a few.Recommendations The risk management department recommends that the company review all emergency response, disaster recovery and business continuity protocols. Establishing mishap plans is suggested general training for all employees would result in more efficient response should an emergency occur and is highly recommended. It is imperative that all security measures are reevaluated and a gap analysis be conducted. Recommended areas where improvements are needed * Access and egress control policies should be enforced for effective visitor control and especially with vehicles entering set forth and deliveries of parcels. Do an assessment of all CCTV and monitoring services and place additional cameras where needed. * At the moment the local security service provider is ill equipped, there are no personal body scanners available at the building entrances. * There is no equipment available to search vehicles, i. e. stemmed mirrors etc. * Retraining of security personnel, the security officers have not been trained on what to look for and how to search vehicles and people properly. * General housekeeping, ice collection and building perimeters. (Security Management Bulletin no 6.Countermeasures of threats of terrorist actio n) Training for these officers should focus on the following types of terrorist attack * Person borne IED (improvised explosive device) * Vehicle borne IED * Bombs directed against property and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised mortar attacks * Riots and civil disturbance * Kidnapping for ransom and extortion * Armed robbery, fraud and credit humour fraud for financing purposes * Assassination of differentiate figures Security Management Bulletin no 6. Countermeasures of threats of terrorist action) In a nutshell the security department should do a threat analysis and identify areas where the terrorist would want to * Penetrate * bend * Exploit * Attack Jason A, 16 April 2013, Boston Marathon Bombings, in his briefing after the bombings, also suggest that it should be tell that due to the recent attacks in Boston, that security at airports across the United States and coarse Britain has increased substantially. Business travelers are conscious to allow extra time to get to the ticket counters and to their gates.There are long queues at the check-in counter and the duration of the security process has increased due to additional random bag searches. Hotel security has increased as well travelers are informed to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United Kingdom for the purpose of see Vodacoms parent company or any other business travel, it is advised to monitor local media for additional security measures. This will also apply to the other countries mentioned where known terrorist cells are operating. ConclusionA school of mentation that postulates as major disasters never occur at a time or in a manner that may be anticipated, pre-catastrophe planning is futile is a gross abdication of reponsibilty and cannot be supported. (Security Management bulletin 5. Disaster Planning) Vodacom Congo has clear ties with the United Kingdom due to alliances and shareholding agreements, Vodacoms offices are located in a building owned by an American entity and the building is shared by streak Oil which is an American owned company, it would accordingly be foolish not to tell the direct threat to the company, its employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existance. (Security management Bulletin 5. Disaster Planning) It is thence imperative that urgent security focus is placed on the threat that terrorism poses to the company and its operations, large walk in customer care areas are fix targets where lots of people gather. A balance wheel of security measure are very important to maintain a vigilant level of protection without creating too much discomfort to the employees, visitors, business partners and customers.Refe rences Martin Gill, The Handbook of Security. 2006 The Security Institute. Security Management Bulletin 5. hand brake Procedures Major Disasters. Rachel Briggs, R. and Edwards, C. The business of resilience. DEMOS 2006 The Security Institute. Security Management Bulletin No 6. Countermeasures to threats of terrorist action. John Harbeson, The War on Terrorism in Africa Princeton N. Lyman from Africa in World Politics p7 homo Rights Watch In the name of security, www. hrw. org Wikipedia Website http//en. ikipedia. org/wiki/Terrorism Michael Burleigh Al-Qaeda and a Decade of Terror Andre Burstin European Strategic Intelligence and Security Center (ESISC), Boko Haram and the Risk of Terrorism in Northern Cameroon 01 April 2012 Claude Moniquet, European Strategic Intelligence and Security Center (ESISC), The Terrorist Threat conjugate to the Libyan Crisis. 2011 Jason A Boston Marathon Bombing, Aon Crisis Management Consulting/ Global Risk Consulting. p4 referee Journal, 16 April 20 13
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment