The attacks on Washington D.C and New York are the most shocking terror attacks that the states have experienced in history. The ability of Al Qaeda to establish terrorist cells and achieve the outcome depended on their intelligence and knowledge about the states. They made major preparations that allowed them to gain more realistic and accurate information about the environments. This article aims to examine how the Al Qaeda group used various means to establish cells.
Fundamentals and Ethics of Homeland Security
The major element that facilitated Al Qaeda’s operations was the use of intelligence that influenced various operations. The group is majorly supported by two major components; the core and the franchise. The core is mainly formed and it’s responsible for the many major attacks in history. Its size has been fluctuating over time and most of the members find sanctuary in remote areas of Pakistan and Afghanistan. Al Qaeda aims to form a brand new Islamic state that will be operated and ruled upon the Sharia laws covering from Western Europe to Southeast Asia. The group has employed very violent attacks that have left many citizens dead and massive property destruction. The leader, Osama Bin Laden, once declared that the US is the largest mischief and trouble maker, rogue and greatest terrorists in the world and therefore, the challenges toads the authority will be important for Islam to keep its stand.
The attacks on the US have been facilitated by various entities and this is why the group has been able to carry them out without being detected. It has developed over time and has completely embraced the new and advanced technologies that have facilitated its operations. Bin Laden already detected some of the entities that were weak and would use them for the destruction. Even though modernization, globalization, and advances in technology have brought growth and made many states proper, they have also opened doors and helped the terrorist groups in carrying out more advanced attacked by the use of new weaponry and tactics. Most tactics that the groups have used include hijacking, bombing, kidnapping, suicide attacks, and shootings. In most cases, Al Qaeda has used suicide attacks since it is one of the most aggressive and undetectable forms of terrorism. Even if terrorism happens in the context of open warfare, the perpetrators shelter behind the local population where they carry out their plans until they are ready to be executed. In the US, many terrorists have been known to harbor hidden shelters that usually discovered once the attack has taken place. The camouflage among the public makes it hard for the evil-doers to be detected. Furthermore, they receive funding either legally or illegally either from charitable organizations, NGOs, or front groups. Without legal funding, the terrorist has relied on organized crimes like robbery, kidnapping, and drug trafficking to fund them.
The communication within the group has drastically improved with the advances. The organizations contemplate global strategies through emails, websites, cell phones or even satellite phones. All these devices are undetectable by authority. However, for instance, when Bin Laden found out that the conversations from his satellite phone were intercepted, he stopped using the phones to communicate with his mean. Therefore, the devices have left the group vulnerable. The connectivity of devices and people with the Internet has created a platform for the attacks and this has extended across all states and the world at large. Therefore, cyberspace is seen as the most active ground and domain that has encouraged terrorists and has posed a threat to the world. Cybercriminals and other kinds of terrorists use malicious and sophisticated tactics to threaten the nations and engage in espionage. The physical acts of terrorism and violent criminal activities are local and aim at various places like stadiums, malls, schools, and theaters. The terrorist has aimed at destroying the critical infrastructure that forms the backbone of economic and national security. The infrastructure is significant for upholding the well-being and health of all Americans. Therefore, the threats on the infrastructure form a significant risk and threaten economic prosperity, public safety, and national security. Al Qaeda as benefited from espionage to spy various entities and organizations that may counteract their operations.
The Main Goals of Homeland Security in Curbing the Crimes
As such, the Department of Homeland Security has insisted and come up with strategies for securing cyberspace and critical infrastructure. It has done this using several goals including combating cybercrime, assessing cybersecurity dangers, securing civilian and federal networks and strengthening the security of the critical infrastructure. Cyberspace has created a platform form terrorists to employ illicit activities that have threatened the homeland security. This element has enabled the Al Qaeda terrorist group to commit various computer-enabled criminal activities without having to enter the United States. Therefore, Homeland Security is striving at coming up with defensive techniques that will combat this threat. Particularly, the DHS is trying to expand agreements with other nations outside the US to cooperate in mitigating this problem. There are many operators of the critical infrastructure that support the communities and the economy in general. These operators support various functions that are critical to the nations. Therefore, their dysfunction or disruption could bring devastating effects on the nations’ economy, security, and public safety and health. Therefore, the DHS prevents such instances by sharing information and intelligence to the operators. They strive at cooperating with these operators to improve the security and pliability of the infrastructure against the threats. The Department of Homeland Security has also collaborated with other partners to help in coming up with a common technique of combating cyber threats by empowering the critical infrastructure operators, private sector defenders and government entities to increase resilience and the integrity of the critical functions.
The DHS maintains critical information on American citizens, information on national security and other crucial national information, in their database. This information is shared within the DHS and federal civilian sectors and other agencies. This is why the malicious attacks target the systems to retrieve the information that will facilitate the attacks. Therefore, the DHS must come up with various capacities that prioritize security measures and any remedying of systems that can create a loophole that could compromise national security. It also collaborates with other partners to deploy measures to counteract unauthorized access and detect any intrusion.
The attacks by Al Qaeda are evidence that the group has enough capacity of intelligence that lead to the outcomes. They have vital operational tools that have helped Al Qaeda to evaluate its environments and come up with plans that have brought devastating consequences to the states. The plans are carefully rooted in comprehending the target; knowledge that has been acquired through various men. The intelligence that has been gathered has provided familiarity with targets that have confirmed the anticipated situations. Before they carry out the attacks, the members survey the place and ensure they have gathered every important detail that will facilitate the implementation.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more