Edudorm Facebook

Combating the ISIS terrorist organization

Following the various lethal ISIS terrorist’s attacks in the United States, terrorism concerns have surged with a large proportion of the government’s rating becoming more and more plummeted. A recent survey by the Pew Research Center shown that people who have positively commented on the performance of the government against terrorism has dropped from 72% to 46% (Byman, 2016). The ISIS terrorist organization has therefore changed the public’s agenda after having been ranked as the leading international danger for the United States. The presidency of Barrack Obama has been outweighed by the fact that he has not handled ISIS organization with the seriousness or urgency it disserves. From a speech delivered by Lister, it is evident that ISIS is a determined enemy. As much as the government plans to destroy them, they get more armed to capture and cause damage to materials of its adversaries. This calls for the government’s full support of anti-terrorist programs, strategies and all it takes to combat this organization (Byman, 2016).

Among the many data collection programs that exists in the united states, NSA and PRISM (surveillance program) could perform the research more efficiently. NSA’s made a bulk and enormous data collection which conducted a successful and more efficient survey. NSA did a survey on phone numbers that are suspected to be held by terrorists which has been a 14 years course. It provided a detailed report of the owners of the Verizon phone company though this was done secretly. From a recent speech of January 2014 by president Barrack Obama, the NSA data collection program has had no evidence of abuse which meant that the program should improve its intelligence. The program can have a fruitful data collection research if more support and intelligence can be improved. The PRISM surveillance program can also be utilized in collecting important information about the ISIS terrorist group. This program could work very well with the NSA program by providing it with any relevant internet information and communications that are done online. The program was launched in 2007 and soon has shown its capacity to gather internet information concerning the terrorist groups. From the security and investigative documents, PRISM has been regarded as the top most and reliable source of raw intelligence that are used in the analysis done by the NSA. With the help of the Verizon communication company, the PRISM program is able to cooperate as many as 100 United States companies for a long time. The program is also specialized in bulk internet communications in such a targeted way (Byman, 2016). The advantage of working with this program is that it is able to cordinated most of the other data collection bodies such the Data Intercept Technology Unit and the NSA among others. The united state’s government executive branch has given the PRISm data collection program the authority that it may need to ensure that data is available to all the concerned programs that aim at combating the ISIS terrorist organization (Byman, 2016). From the recommendation of the red cell unit, the right members who should run the IC are the specialists in various fields of security program. The Military occupational specialists, who are the national defense for the United States, should be incorporated in the investigative programs. Militant officers would best work in their respective areas of specialization to uphold efficiency in the operations. The other important group would be crytopologists and linguistics who are adequately equipped with the these would work perfectly well with the human intelligence program to collect important information through expertise methodology. This includes assimilation, conducting interviews and spying over the ISIS territories. The IC members should have the top most specialized skills to allow quality and promising outcome on the human intelligence proceedings. Computer analysts, operational managers and communication analysts should be in the front line in making sure that the plans put in place are well run. Other personnel required would the planning, organizing and technical teams that handle each aspect with the intelligence it deserves.

The data collection group and the members of the IC should seek to adapt very

effective strategies of intelligence. This strategies should all aim at ensuring that the

finest information got about the terrorists is submitted to the right authorities, and

ensure that information about any security measures taken is concealed from them.

One of this strategies is ensuring physical security of their own people by rereading

crime-prevention checkups. These can also be done providing the pictures of the

known terrorists to the relevant people and ensuring that the pictures are well

displayed to the public areas to ensure that people view them. This will be very

effective in that incase the faces are seen anywhere people can be alarmed and an

immediate action taken.

Under the same measure physical security survey should be reviewed, these surveys

acclaims for action as a result of an area’s inspection of installations like

communication barriers transportation barriers and others like the intrusion detective

system barriers are protected from sabotage and any possible destruction (Pollack, 2016). Threat assessment should also be put into consideration as one of the strategies to ensure

physical security. This strategy of corporal security must ensure balancing its

coordination with equivalent emphasis on thwarting both felonious acts and above all

the acts of the terrorists. There should be updates on the plan based on threat

assessment continually to ensure the fin nest detail upcoming is captured. This

measure effectively help the intellectuals to get that which is necessary for them to

combat any illegal action either from criminals or the terrorists.

The other strategy that can be applied is ensuring operational security, where

protecting information is the main source of success against the ISIS terrorists. This

strategy demands for coordination in all action needed to ensure that the enemy or

terrorist does not learn about any plans or operations. Whenever plans are being made

they must ensure inclusion of measures to any potential terrorist from getting access to

the information. These are information in areas like the human intelligence where they

use people to get information about military abilities (Harman, 2015). This danger can be countered by using countersurveillance activities and also countering the intelligence ability.

The other area where the enemy can adventure is to the signal intelligence which involves

the signal emanation gear and systems of communication (Pollack, 2016). The problem here is that the enemy might affect the day to day communication activities of certain target areas

for easy attacking. The only way to counter this by installing communication and

information security. They can also can exploit is the operational array which the

terrorists get to understand when there is an operation and when none exists. This can

be solved by ensuring that there is no operation arrangement followed or rather mask

the well-known by deception. This will help security operations to be effective

whenever they are conducted against the ISIS terrorists (Harman, 2015).

There is yet the personal security strategy which is operative in contesting terrorism. In

this case it is clear that every person is vulnerable to terrorism threat for no one is

immune to it. This is where terrorist make government’s representatives of the U.S, the

big companies and assets in the country their bombing or sabotage targets. This can

only be curbed by restricting the key personnel’s history data for it can of use to the

terrorists to get to their homes and access their families. Sensitive areas can be denied

direct access and ensure proper equipping of their entrances (Harman, 2015). This will help ensure security to the country’s property and key personnel that highly count in its support.

The analysis process also incorporates various strategies that should be analyzed in order to combat terrorism attacks from the ISIS organization. For the fruitfulness of the work done by the skilled team of personnel, the team is supposed to identify its weak points for it to strengthen itself. On the other hand, the team should be having full account of the ISIS including their plans, their background information as well as their secrets. This can perfectly be done well by the trained specialists in the intelligence collection through various tactics. The data collection programs are the most important teams of this move because they are expected to provide primary data to the analysis team (Harman, 2015). The other analysis strategy would involve require the U.S government to embrace trans-governmental networks. These networks can allow the United States’ government to work directly with other countries who are their counterparts. This would reduce the risk of over relying on the internal political which is of high level (Pollack, 2016). For instance, the United States immigration and Customs enforcement body should pair with its foreign counterparts to inhibit and track the movements of the terrorists. This is a strategy that is ought to be adopted by other bodies like the U.S. military, the treasury department, the FBI, NSA as well as the CIA investigators.     References   Byman, D. (2016). ISIS Goes Global. Foreign Affairs, 95(2), 76-85. Harman, J. (2015). Disrupting the Intelligence Community. Foreign Affairs, 94(2), 99-107. Pollack, K. M. (2016). Fight or Flight. Foreign Affairs, 95(2), 62-75.
1532 Words  5 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...