Homeland Defense Terrorism Domestic Counter Research Paper

Total Length: 1160 words ( 4 double-spaced pages)

Total Sources: 18

Page 1 of 4

These teams are called in to deal with highly dangerous and threatening situations, including terrorist attacks. Some of the "special operations" tactics that may be employed to deal with active shooters, barricades, and hostage situations include: three or four man entries using shields, power flooding for "large structure clearing," mobile hostage rescues, "linear entry techniques," and vehicle takedowns (Navy Seals, 2010).

Weapons of Mass Destruction

Weapons of mass destruction (WMD) include any weapons that can cause catastrophic damage or destruction to a large number of people, structures, organizations, or the environment. Examples include bombs, nuclear, chemical, radiological, or biological weapons. Due to the catastrophic threats posed by WMD, in 2006 the FBI launched the Weapons of Mass Destruction Directorate (WMDD) to further integrate agency efforts for better prevention against WMD attack.

Terrorism group, (International or Domestic)

Terrorists most often operate from within radical groups with political motivations. Within the United States, there have not been any official groups identified as such, but examples include right-wing militants such as Timothy McVeigh and Eric Rudolph, as well as various rogues from the animal rights movement (Schuster, 2005). Animal rights activists also operate on an international level under the Animal Liberation Front (ALF), but most international terrorist groups are concerned with issues such as Islamic extremism, religion, or overthrowing imperialist or dictatorial governments.

Cyber terrorism

With America's increasing dependence upon the Internet for storage and retrieval of critical information, and the use of computers to direct and make critical decisions, terrorists have more and more opportunities to hack or otherwise sabotage the Internet and cost human lives (as well as lots of money) as a result.

Stuck Writing Your "Homeland Defense Terrorism Domestic Counter" Research Paper?

While many people believe the threat of lost lives from a cyber attack is minimal, experts warn that the danger must be taken seriously, because "servers in the United States are the most aggressively targeted information systems in the world, with attacks increasing in severity, frequency, and sophistication each year" (CDI, 2011). Malicious computer users are becoming more skilled day-to-day, so defensive measures against these attacks must increase in strength and remain vigilant at all times. Cyber-terrorism threats can involve banks, hospitals, and government agencies; motivations include profit, general harm, or even assassination. While the U.S. has only experienced minor attacks, other countries such as the Ukraine and Estonia have suffered more massive attacks (CDI, 2011).

Bin Laden and Al Qaeda

Osama Bin Laden established his terrorist group, Al Qaeda, in 1988; it's "goals were the advancement of Islamic revolutions throughout the Muslim world and repelling foreign intervention in the Middle East" (ADL, 2011). Bin Laden's efforts began with fights against the Russian invasion of Afghanistan, and he always had access to large sums of money as the son of a Saudi Arabian billionaire. After the Gulf Wars began, Al Qaeda became involved in terrorist activities against U.S. involvement in the Middle East, particularly the presence of American troops in Islamic holy lands (ADL, 2011). Bin Laden began to align with other terrorist groups, and in 1996 moved back to Afghanistan and joined forces with the Taliban (ADL, 2011). Attacks continued over the years since then, until the culmination of Al Qaeda's efforts in the 9/11 terrorist attacks -- in which nearly 3,000 innocent people lost.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Homeland Defense Terrorism Domestic Counter" (2011, February 26) Retrieved May 16, 2024, from
https://www.aceyourpaper.com/essays/homeland-defense-terrorism-domestic-counter-11292

Latest MLA Format (8th edition)

Copy Reference
"Homeland Defense Terrorism Domestic Counter" 26 February 2011. Web.16 May. 2024. <
https://www.aceyourpaper.com/essays/homeland-defense-terrorism-domestic-counter-11292>

Latest Chicago Format (16th edition)

Copy Reference
"Homeland Defense Terrorism Domestic Counter", 26 February 2011, Accessed.16 May. 2024,
https://www.aceyourpaper.com/essays/homeland-defense-terrorism-domestic-counter-11292