際際滷

際際滷Share a Scribd company logo
Jonathan R. White


     www.cengage.com/cj/white




       Chapter 17:
Security, Terrorism, and the
           Future

                  Rosemary Arway
                  Hodges University
Emerging Issues in
      Anti-Terrorist Security Policy
 Congress requires a Quadrennial
  Homeland Security Review (QHSR)
  similar to that required of the Department
  of Defense.
 The first QHSR was conducted in 2009.
Multi-level Communication and Sharing

 All federal agencies need to develop
  procedures to ensure that their activities
  complement one another.
 Agencies need to develop methods for
  encouraging communications.
 It is necessary to share information.
The Private Industry Problem
 Private industries are becoming involved
  in homeland security, replacing defense
  activities traditionally performed by the
  government.
 The boundaries between government
  and private functions are difficult to
  determine.
 Rothe and Ross believe that private
  companies are circumventing constraints
  on government power.
Homeland Security and Foreign Policy
  Homeland Security will be increasingly
   determined by foreign policy.
  Homeland Security will, according to
   Robert Gates, rely increasingly on
   partner capacity; that is the ability of
   nations to defend themselves. This
   requires a flexible foreign policy with
   sound congressional oversight and a
   clear national emphasis on consistent
   long-term behavior.
Israeli-Palestinian Conflict
 Malley and Harling (2010) argue that the U.S.
  must take a more pragmatic approach in the
  Israeli-Palestinian Conflict. This should
  include recognizing differences between
  militant groups, engaging all countries in the
  region, and encouraging Israeli peace efforts
  with other state actors in the region.
 Daniel Byman argues that Mideast peace
  talks must include Hamas.
 Stephen Kinser argues that the U.S. must
  strengthen relations with Turkey and begin to
  include Iran in discussions.
Absorbing an Attack
 Given that the best anti-terrorism efforts
  will fail in the future, the U.S. must take
  measures to assure that the country can
  recover socially, psychologically and
  militarily.
 The U.S. needs to develop the ability to
  absorb a major attack on one of its cities
  or critical aspect of its infrastructure.
 The involvement of nonstate actors (e.g.
  al Qaeda) affect military response to
  attacks.
Other Critical Issues
 Other critical issues include: education
  and training; settling the debate about
  the nature of terrorism; and managing
  both prosecution of terrorists and
  intelligence gathering.
 Education and training must include not
  only broad preparation in critical
  thinking, but also training in the specific
  complexities of terrorism.
Other Critical Issues
 Terrorism is treated as both a criminal
  justice and a military issue, leading to
  confusion in policy and action.
 Bryan Jenkins believes that, going
  beyond a focus on criminal prosecution,
  Joint Terrorism Task Forces can play a
  greater role in intelligence gathering.
Future Tactics
 While the basic tactics of terrorism
  remain relatively constant, terrorist
  groups develop innovative
  implementations. Recent events suggest
  growing importance of the following
  tactics:
  o Swarming and Multiple Attacks were used
    effectively in Mumbai in 2008 and later in an
    attack on the Sri Lankan cricket team in
    Lahore, Pakistan.
Future Tactics
o Blending Criminal and Terrorist Networks,
  especially in financial operations, will continue,
  but the two types of organizations have
  different significant differences in motivation
  for action and concerns for publicity.
o Other tactical trends include use of
  cyberattacks, focus on smaller attacks, and
  (on the other hand) development of the
  capacity to use weapons of mass destruction.
Overcoming Barriers to Sharing
 Agencies, although encouraged to share
  information, may resist doing so for good
  reasons: leaked information may
  endanger operations and personnel.
  o The Nationwide Suspicious Activity
    Reporting System Initiative (NSI) is an
    attempt to deal with this problem.
  o Only agencies with an established National
    Criminal Intelligence Sharing Plan can
    participate in such a system.
Total Criminal Intelligence
 Intelligence Led Policing (ILP) involves
  collection of information on social
  problems, potential sources of crime,
  and offenders in order to deploy police
  forces effectively.
  o Expanding community involvement is also
    essential. Citizens who note unusual
    patterns of behavior (e.g. purchasing
    chemicals in large quantities) can provide
    important early warning to law enforcement.
Probable Strategic Directions

 Proteus USA is an international think
  tank designed to consider future
  strategic problems.
 Democratic accountability requires
  management of the security structure
  being developed and the need for new
  legal protections for privacy.
Domestic and International Terrorism
 Domestic and international terrorism
  each remain important issues.
   o While some analysts believe jihadist
     ideology is ultimately self-defeating,
     international groups still have the capacity
     to launch devastating strikes.
   o Right wing domestic terrorism may be
     fueled by the election of an African
     American president and a weak economy.
Ad

Recommended

The FBI's War On Terror
The FBI's War On Terror
Orion White
Confrance presntstation
Confrance presntstation
Technical Advisor at Iraqi Government
R41674
R41674
KROTOASA FOUNDATION
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
Mansoor Faridi, CISA
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
GiulianoBo45
White7e ppt ch14
White7e ppt ch14
difordham
Transnational crimes and terrorism
Transnational crimes and terrorism
Al Rajiv Carim
Lecture 10 defeating terrorism
Lecture 10 defeating terrorism
James Feldkamp
Chapter14
Chapter14
SUNY Ulster
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
Elsevier
Terrorism In India.
Terrorism In India.
FarhinSiddiqui
White7e ppt ch13revised
White7e ppt ch13revised
difordham
Terrorism
Terrorism
Mohit Saraswat
Chapter 10 oversight and accountability 1
Chapter 10 oversight and accountability 1
Doing What I Do
Political research paper
Political research paper
Jabir Ali Siddique
The face of terrorism 2013
The face of terrorism 2013
Martin Brown
Impact Of Terrorism
Impact Of Terrorism
spclife
Instruments counter terrorism
Instruments counter terrorism
Petko
Strategic informer spring 2012
Strategic informer spring 2012
IBCworld
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
Belayneh Zelelew
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type
Carlos Oliveira
Terrorism in India
Terrorism in India
Rajan Jothymani
Terrorism
Terrorism
Avinash Rajput
Terrorism
Terrorism
shweta3108
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on Terrorism
Amjad Ali
250 words agree or disagree油In the last several decades, peo.docx
250 words agree or disagree油In the last several decades, peo.docx
vickeryr87
Question 1What is state-sponsored terrorism as understood in thi.docx
Question 1What is state-sponsored terrorism as understood in thi.docx
makdul
Running head ISOL 534 Application Security 1Running head.docx
Running head ISOL 534 Application Security 1Running head.docx
wlynn1

More Related Content

What's hot (19)

Chapter14
Chapter14
SUNY Ulster
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
Elsevier
Terrorism In India.
Terrorism In India.
FarhinSiddiqui
White7e ppt ch13revised
White7e ppt ch13revised
difordham
Terrorism
Terrorism
Mohit Saraswat
Chapter 10 oversight and accountability 1
Chapter 10 oversight and accountability 1
Doing What I Do
Political research paper
Political research paper
Jabir Ali Siddique
The face of terrorism 2013
The face of terrorism 2013
Martin Brown
Impact Of Terrorism
Impact Of Terrorism
spclife
Instruments counter terrorism
Instruments counter terrorism
Petko
Strategic informer spring 2012
Strategic informer spring 2012
IBCworld
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
Belayneh Zelelew
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type
Carlos Oliveira
Terrorism in India
Terrorism in India
Rajan Jothymani
Terrorism
Terrorism
Avinash Rajput
Terrorism
Terrorism
shweta3108
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on Terrorism
Amjad Ali
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
Elsevier
Terrorism In India.
Terrorism In India.
FarhinSiddiqui
White7e ppt ch13revised
White7e ppt ch13revised
difordham
Chapter 10 oversight and accountability 1
Chapter 10 oversight and accountability 1
Doing What I Do
The face of terrorism 2013
The face of terrorism 2013
Martin Brown
Impact Of Terrorism
Impact Of Terrorism
spclife
Instruments counter terrorism
Instruments counter terrorism
Petko
Strategic informer spring 2012
Strategic informer spring 2012
IBCworld
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
Belayneh Zelelew
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type
Carlos Oliveira
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on Terrorism
Amjad Ali

Similar to White7e ppt ch17 (12)

250 words agree or disagree油In the last several decades, peo.docx
250 words agree or disagree油In the last several decades, peo.docx
vickeryr87
Question 1What is state-sponsored terrorism as understood in thi.docx
Question 1What is state-sponsored terrorism as understood in thi.docx
makdul
Running head ISOL 534 Application Security 1Running head.docx
Running head ISOL 534 Application Security 1Running head.docx
wlynn1
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
joellemurphey
Strategic Informer Spring 2012
Strategic Informer Spring 2012
Matt Pedersen
ANALYZING INSECURITY PROBLEMS IN NORTHEAST NIGERIA A SYSTEM DYNAMICS MODEL AP...
ANALYZING INSECURITY PROBLEMS IN NORTHEAST NIGERIA A SYSTEM DYNAMICS MODEL AP...
eexcellency11
Written Assignment Week 13Does the death penalty deter murder油 .docx
Written Assignment Week 13Does the death penalty deter murder油 .docx
bernadettexrb
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING .docx
wlynn1
White7e ppt ch15
White7e ppt ch15
difordham
Online Assignment
Online Assignment
Arun Murali
R41674
R41674
KROTOASA FOUNDATION
The_Guardian_Antiterrorism_Journal_Spring_2008
The_Guardian_Antiterrorism_Journal_Spring_2008
Jason Strickland
250 words agree or disagree油In the last several decades, peo.docx
250 words agree or disagree油In the last several decades, peo.docx
vickeryr87
Question 1What is state-sponsored terrorism as understood in thi.docx
Question 1What is state-sponsored terrorism as understood in thi.docx
makdul
Running head ISOL 534 Application Security 1Running head.docx
Running head ISOL 534 Application Security 1Running head.docx
wlynn1
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
joellemurphey
Strategic Informer Spring 2012
Strategic Informer Spring 2012
Matt Pedersen
ANALYZING INSECURITY PROBLEMS IN NORTHEAST NIGERIA A SYSTEM DYNAMICS MODEL AP...
ANALYZING INSECURITY PROBLEMS IN NORTHEAST NIGERIA A SYSTEM DYNAMICS MODEL AP...
eexcellency11
Written Assignment Week 13Does the death penalty deter murder油 .docx
Written Assignment Week 13Does the death penalty deter murder油 .docx
bernadettexrb
Running Head INTELLIGENCE GATHERING .docx
Running Head INTELLIGENCE GATHERING .docx
wlynn1
White7e ppt ch15
White7e ppt ch15
difordham
Online Assignment
Online Assignment
Arun Murali
The_Guardian_Antiterrorism_Journal_Spring_2008
The_Guardian_Antiterrorism_Journal_Spring_2008
Jason Strickland
Ad

More from difordham (20)

Schm5e ppt ch17
Schm5e ppt ch17
difordham
Ppt chapter 14
Ppt chapter 14
difordham
Ppt chapter 7
Ppt chapter 7
difordham
Ppt chapter 16
Ppt chapter 16
difordham
Ppt chapter 15
Ppt chapter 15
difordham
Ppt chapter 13
Ppt chapter 13
difordham
Ppt chapter 12
Ppt chapter 12
difordham
Ppt chapter 11
Ppt chapter 11
difordham
Ppt chapter 10
Ppt chapter 10
difordham
Ppt chapter 9
Ppt chapter 9
difordham
Ppt chapter 8
Ppt chapter 8
difordham
Ppt chapter 6
Ppt chapter 6
difordham
Ppt chapter 5
Ppt chapter 5
difordham
Ppt chapter 4
Ppt chapter 4
difordham
Ppt chapter 3
Ppt chapter 3
difordham
Ppt chapter 2
Ppt chapter 2
difordham
Ppt chapter 1
Ppt chapter 1
difordham
Ch 12 separation agreements 2ed
Ch 12 separation agreements 2ed
difordham
Ch 14 adoption 2ed
Ch 14 adoption 2ed
difordham
Ch 13 family violence
Ch 13 family violence
difordham
Schm5e ppt ch17
Schm5e ppt ch17
difordham
Ppt chapter 14
Ppt chapter 14
difordham
Ppt chapter 7
Ppt chapter 7
difordham
Ppt chapter 16
Ppt chapter 16
difordham
Ppt chapter 15
Ppt chapter 15
difordham
Ppt chapter 13
Ppt chapter 13
difordham
Ppt chapter 12
Ppt chapter 12
difordham
Ppt chapter 11
Ppt chapter 11
difordham
Ppt chapter 10
Ppt chapter 10
difordham
Ppt chapter 9
Ppt chapter 9
difordham
Ppt chapter 8
Ppt chapter 8
difordham
Ppt chapter 6
Ppt chapter 6
difordham
Ppt chapter 5
Ppt chapter 5
difordham
Ppt chapter 4
Ppt chapter 4
difordham
Ppt chapter 3
Ppt chapter 3
difordham
Ppt chapter 2
Ppt chapter 2
difordham
Ppt chapter 1
Ppt chapter 1
difordham
Ch 12 separation agreements 2ed
Ch 12 separation agreements 2ed
difordham
Ch 14 adoption 2ed
Ch 14 adoption 2ed
difordham
Ch 13 family violence
Ch 13 family violence
difordham
Ad

White7e ppt ch17

  • 1. Jonathan R. White www.cengage.com/cj/white Chapter 17: Security, Terrorism, and the Future Rosemary Arway Hodges University
  • 2. Emerging Issues in Anti-Terrorist Security Policy Congress requires a Quadrennial Homeland Security Review (QHSR) similar to that required of the Department of Defense. The first QHSR was conducted in 2009.
  • 3. Multi-level Communication and Sharing All federal agencies need to develop procedures to ensure that their activities complement one another. Agencies need to develop methods for encouraging communications. It is necessary to share information.
  • 4. The Private Industry Problem Private industries are becoming involved in homeland security, replacing defense activities traditionally performed by the government. The boundaries between government and private functions are difficult to determine. Rothe and Ross believe that private companies are circumventing constraints on government power.
  • 5. Homeland Security and Foreign Policy Homeland Security will be increasingly determined by foreign policy. Homeland Security will, according to Robert Gates, rely increasingly on partner capacity; that is the ability of nations to defend themselves. This requires a flexible foreign policy with sound congressional oversight and a clear national emphasis on consistent long-term behavior.
  • 6. Israeli-Palestinian Conflict Malley and Harling (2010) argue that the U.S. must take a more pragmatic approach in the Israeli-Palestinian Conflict. This should include recognizing differences between militant groups, engaging all countries in the region, and encouraging Israeli peace efforts with other state actors in the region. Daniel Byman argues that Mideast peace talks must include Hamas. Stephen Kinser argues that the U.S. must strengthen relations with Turkey and begin to include Iran in discussions.
  • 7. Absorbing an Attack Given that the best anti-terrorism efforts will fail in the future, the U.S. must take measures to assure that the country can recover socially, psychologically and militarily. The U.S. needs to develop the ability to absorb a major attack on one of its cities or critical aspect of its infrastructure. The involvement of nonstate actors (e.g. al Qaeda) affect military response to attacks.
  • 8. Other Critical Issues Other critical issues include: education and training; settling the debate about the nature of terrorism; and managing both prosecution of terrorists and intelligence gathering. Education and training must include not only broad preparation in critical thinking, but also training in the specific complexities of terrorism.
  • 9. Other Critical Issues Terrorism is treated as both a criminal justice and a military issue, leading to confusion in policy and action. Bryan Jenkins believes that, going beyond a focus on criminal prosecution, Joint Terrorism Task Forces can play a greater role in intelligence gathering.
  • 10. Future Tactics While the basic tactics of terrorism remain relatively constant, terrorist groups develop innovative implementations. Recent events suggest growing importance of the following tactics: o Swarming and Multiple Attacks were used effectively in Mumbai in 2008 and later in an attack on the Sri Lankan cricket team in Lahore, Pakistan.
  • 11. Future Tactics o Blending Criminal and Terrorist Networks, especially in financial operations, will continue, but the two types of organizations have different significant differences in motivation for action and concerns for publicity. o Other tactical trends include use of cyberattacks, focus on smaller attacks, and (on the other hand) development of the capacity to use weapons of mass destruction.
  • 12. Overcoming Barriers to Sharing Agencies, although encouraged to share information, may resist doing so for good reasons: leaked information may endanger operations and personnel. o The Nationwide Suspicious Activity Reporting System Initiative (NSI) is an attempt to deal with this problem. o Only agencies with an established National Criminal Intelligence Sharing Plan can participate in such a system.
  • 13. Total Criminal Intelligence Intelligence Led Policing (ILP) involves collection of information on social problems, potential sources of crime, and offenders in order to deploy police forces effectively. o Expanding community involvement is also essential. Citizens who note unusual patterns of behavior (e.g. purchasing chemicals in large quantities) can provide important early warning to law enforcement.
  • 14. Probable Strategic Directions Proteus USA is an international think tank designed to consider future strategic problems. Democratic accountability requires management of the security structure being developed and the need for new legal protections for privacy.
  • 15. Domestic and International Terrorism Domestic and international terrorism each remain important issues. o While some analysts believe jihadist ideology is ultimately self-defeating, international groups still have the capacity to launch devastating strikes. o Right wing domestic terrorism may be fueled by the election of an African American president and a weak economy.