Tag: Terrorism

Islamic State of Iraq and the Levant and United States Containment Policy


The Islamic State of Iraq and the Levant, which is as well popularly christened the IS or Islamic State of Iraq and the Levant, is presently an international Sunni Islamist terrorist, as well as insurgent, group. Presently, it is in firm control of considerably large Syrian and Iraqi territories. As well, it has considerably pockets of adherents spread across other nation-states (Prados, 2015). It remains rather keen on disrupting global, as well as regional, security and peace with violent, terrorist acts. The terrorist acts associated with the ISIS in recent times especially in Iraq, as well as Syria, have demonstrated its continued capability for jeopardizing and threatening the security of human populations in the US, Europe, Africa, and the Middle East (Bailey & Immerman, 2015). The US is threatened by the ISIS regardless of its capable and sophisticated security forces along with intelligence agencies. The US has put forth various policy proposals regarding how to eliminate the threat posed by the ISIS. In recent times, it appears that the US has adopted a containment policy, or strategy, to decimate the threat. Principally, this paper explores various facets of the ISIS and the effectiveness of the policy in dealing with the threat.

Read also Yemeni Civil War – Why Should Other Actors Intervene in Another State?

The Islamic State of Iraq and the Levant

Islamic State of Iraq and the Levant’s Ideology

The ISIL’s ideology is an exceptionally hard-hitting version of violent jihadist Islamism, Salafism. Its adherents are enthusiastic about employing violence in establishing with they conceptualize as a model, or ideal, Islamic community worldwide. Their understanding of Islam is hinged on a particular appreciation of Prophet Mohammed’s life, the life led by the prophet’s followers as well as particular historically significant Islamic events (Glint, 2014). Consequently, the ISIL beliefs are especially activist, violent, and uncompromising of wider ideological persuasions that have promoted the conflict and extremism that have by and large typified the world of Sunni Islam in recent times. Although supporters of the ISIL may express some peaceful Salafist Sunni views, the adherents of the Islamic State of Iraq and the Levant are distinct from them on two principal aspects: their preferred approach and their views on the attributes of the model Islamic faith. Leading ISIL figures characterize the organization as a direct successor of the approach adopted by the prophet. Notably, many Sunni Muslims disagree with that characterization (Prados, 2015).


The religious minorities, Shiite Muslims, Christians, and Jews, inhabiting areas predominated by Sunni Muslims are frequently expelled from the areas by the ISIL. The ISIL not only expels them but also seizes or destroys their possessions to force them to adopt the violent ISIL ideology. At times, ISIL adherents kidnap, assault, and murder religious minorities or force them into sexual slavery. The ISIL as well targets various ethnic populations. It systematically and deliberately suppresses the populations with an aim of expelling, cleansing or destroying them.

By and large, the religious, as well as ethnic, populations targeted by the ISIL are viewed by its adherents as being in breach of indeterminate accords with the model Muslim, which would necessitate the defense that they call for in respected Islamic texts such as the Quran. As well, the ISIL threatens the US and her allies, most of who are seen as representing Christendom (Bailey & Immerman, 2015). The ISIL has made various partners of the US in Europe, as well as the Middle East, as unfriendly, or hostile, targets. The partners, including Saudi Arabia, Egypt, and Jordan, are projected as agents that partake in a conspiracy led by the US against the interests of Sunni Muslims.


The Islamic State of Iraq and the Levant’s principal tactic and strategy are transnational terrorism. It has executed many terrorist attacks, which have occasioned thousands of deaths, in many nation-states, including Iraq along with Syria. ISIL leaders have since 2012 threatened the US with such attacks. The leaders common typify the US and its allies that are predominated by non-Muslim populations as crusaders (Glint, 2014). The leaders encourage ISIL adherents to execute the attacks against specific interests, facilities, and persons within the US or areas superintended by the US or any of the Notably, the organization characterizes such an engagement as a forerunner of the apocalyptic wars predicated by specific Islamic literature. The ISIL frequently issues goading statements that come off as meant to provoke such an engagement (Bailey & Immerman, 2015).

It appears that the terrorist attacks blamed on the Islamic State of Iraq and the Levant may be a significant tactic, or strategy, in a wide-ranging calculated effort aimed at drawing adversaries into a direct and extensive military conflict. That view is particularly bolstered by the actuality that the organization has in recent times developed and continually strengthened a peripheral operations agenda, which it implements with lethal consequences (Spark, 2014). It appears that organization is motivated to continue employ transnational terrorism as its lead strategy by its keenness on signaling persistent momentum regardless of the battlefield losses and limited progress it continues to suffer especially in Iraq as well as Syria.


(Glint, 2014). Clearly, the organization is principally dependent on the weapons it captured from the deposed Iraqi government under Saddam Hussein. As well, it captured stockpiles of weapons from the forces that engaged in the Syrian Civil War. The weapons include military aircraft, surface to air missiles, guns as well as armor.

(Prados, 2015).

Overall Goals

For close to a decade, the principal goal of the ISIL has been to establish a caliphate, or state, ran on Sunni Islamic ideals. Particularly, the organization seeks to have the caliphate ruled by Sunni Islamic religious leaders under a caliph, al-Baghdadi, who is to be taken as the prophet’s successor from his lineage (Prados, 2015; United States, 2015). Al-Baghdadi demands the loyalty of every committed Muslim globally in line with Islamic law or jurisprudence (Spark, 2014).

The organization projects itself as keen on ensuring that the world is full of Islamic justice and truth and ending the tyranny and falsehood that it associates with ignorance. ISIL fighters are keen on conquering the world by eliminating every religion that supports democratic ideals. The fighters are indoctrinated to think of other religions as have marked enthusiasm to kills persons in masses. By and large, the organization seeks to establish military, political, as well as religious, authority or control over every Muslim.

Read also Comparison of Criminal Justice Systems – United States, Canada and Saudi Arabia

Analysis of Islamic State of Iraq and the Levant Attacks

The attacks launched by the ISIL are aimed at terrorizing, polarizing, and mobilizing targeted populations and compel enemy governments to take actions that they would otherwise restrain themselves from taking promptly (Glint, 2014). The attacks are meant to mobilize the organization’s supporters by being spectacularly deadly. They are aimed at driving a growing wedge between Muslims and their civilian leaders, or governments, making the ISIL caliphate more and more appealing to the Muslims (Bailey & Immerman, 2015).

The ISIL has been keen on diversifying and widening its terrorist attacks against what it considers Zionist enemies and crusader enemies internationally to ensure that the enemies do not form credible alliances against it, thus draining the enemies to the greatest degree possible. Especially, the organization has been keen on attacking soft targets on its enemies’ soils to weaken them.

Commonly, the ISIL publicizes the mass civilian killings and executions it does to instill in own adherents worldviews that are sublime and sacred and to scare its enemies and those doubtful about joining it. The publicizing is as well aimed at breaking its subjects and captives psychologically to guarantee their unquestioning allegiance via intimidation and fear.

Statements and Propaganda

The ISIL views Islam, Islamic traditions, and Islamic texts as authentic if they are ahistorical. The propaganda materials and statements that it issues project its views and actions as being in line with traditional Islamic practices founded in Islamic literature along with jurisprudence. Frequently, the organization’s leaders refer to varied forceful Sunni views on the intricate past of Islamic practice and faith. The views especially include those expressed by Taqi Addin Ahmed Ibn Taymiyyah, a renowned 14th-century polemicist and scholar, and Mohammed ibn Abd al Wahhab. Al Wahhab was a Salafist revivalist and leader in the 18th century (Prados, 2015).

The organization’s propaganda projects all its adherents and fighters as deeply dedicated to the ideology of the group. Even then, it is clear that it is not possibly to have all its adherents and fighters as deeply subscribe to the same ideology given that it is a combination of local and overseas forces in its ranks. Some supporters habiting the areas under the organization’s control pledge fealty to the organization merely to survive or settle neighborhood rows with those averse to the rise of the organization. The organization projects the US, her allies in the Middle East, and her allies elsewhere as the greatest enemies of the model Islamic community (Glint, 2014).

The US Containment Policy Against the Islamic State of Iraq and the Levant

Introduction and Explanation of the Containment Policy

The US has in recent times led an alliance, or coalition, of nations keen on degrading and ultimately destroying the ISAL via the gradual decimation of its political and geographic space, fighters, and resource bases (Spark, 2014). The US has several strategies and policies that are relevant to the question of decimating the space. The strategies include partnering with specific Arab and European nation-states, containing the ISIL militarily, supporting the ground forces of Syria along with Iraq, gathering along with sharing relevant intelligence, constraining the flow of foreigners to join ISIL fighter ranks, and disruption the organization’s flow of finances (Glint, 2014). This paper focuses on the containment strategy, or policy, of the US, which is aimed at decimating the space.

Notably, containment, which is a military approach, or strategy, is geared towards stopping enemies’ expansion or growth (Spark, 2014). The US and own allies used the approach widely during the Cold War era to forestall the extension of communism overseas. During the era, the US and the allies employed the approach and the related policy in responding to the Soviet Union’s successive moves aimed at expanding communism into Vietnam, Africa, Korea, China, and much of Europe (Bailey & Immerman, 2015). A containment policy represents a compromise between rollback and détente. Parties or states that adopt the policy let their enemies elect the time and venue of confrontations between them (Prados, 2015).

The containment policy of the US regarding the ISIL is especially geared towards walling the organization into a more and more limited geographical space or territory and then leaving it to fail independently; owing to internal discord, economic challenges, and mismanagement as opposed to external forces. The overall thinking that has informed the policy is that the organization benefits from the vast resources that it finds in the territories its gains control over and thus should be held back from any new conquests to starve it of the resources it requires.

Originally, the ISIL executed atrocious murders of hostages from the West to provoke American and own allies to react in ways that may trigger an apocalyptic military conflict or war. Even then, the organization has been struggling to force such an outcome owing to containment. The organization is devoid of hostages from the West, whom it would have helped it in exploiting the West, including the US (United States, 2015). There is a common argument that so far, the containment approach has been effective since it has helped shift the focus of the organization to war-zone attacks. As well, the containment approach has been effective owing to the continuing fear-mongering regarding refugees from Syria along with all Muslims by the media and some Republic Party figures in the US (Spark, 2014; United States, 2015).

The strategy has helped the US avoid the losses that it would have suffered possibly if it has a ground force fighting the ISIL. The aversion to going for an all-out military assault against the ISIL is informed by the actuality that it would lead to freeing up, or disengagement, of thousands of ISIL fighters who police the model Islamic nation-state and run its checkpoints. The fighters would become rather available to partake in terrorism attacks (Prados, 2015).

The US’ military actions against the ISIL should be appreciated in the light of the containment policy. In recent times, the US-led alliance, or coalition, has struck ISIL’s Syrian along with Iraqi targets using armed unmanned-aerial vehicles, and combat aircraft along with sea-launched cruise missiles. The targets have been hit to forestall the advancing of ISAL fighters and decimate the related threats to the alliance’s personnel as well as Iraqi religious minorities (Prados, 2015). In recent times, the alliance has struck the targets in support of the Kurdish and Iraqi forces’ offensive, as well as defensive, military acts to compromise the organization’s capability of supporting own operations from own Syrian strongholds.

As well, in recent times, the alliance has been striking ISIL personnel directly outside Iraqi along with Syria. By and large, the alliance’s military engagements against the organization come off as aimed at maintaining, as well as expanding, territorial superintendence lines within Syria along with Iraq (Glint, 2014). The engagements are a reflection of the US’ containment, as well as the fractional reversal, of the organization’s advances in specific areas or territories.

Analysis of the Strength of the Information Gathered on Islamic State of Iraq and the Levant

As noted earlier, the overall thinking that has informed the policy is that the ISIL benefits from the vast resources that it finds in the territories its gains control over and thus should be held back from any new conquests to starve it of the resources it requires. Clearly, the organization cannot be held back from new territories indefinitely. It is expected that the continued holding back of the organization will end when it gets to a tipping point, where it is expected to collapse promptly (Spark, 2014). Unfortunately, the US and other nations fighting the organization are devoid of information, or intelligence, on how long it may take before the containment occasions the organization’s collapse.

The information that the US intelligence teams gather on the ISIL is seen as erroneous at times (Glint, 2014). (Bailey & Immerman, 2015). Even then, it is clear that the organization continues to execute extensive attacks even outside Syria as well as Iraq. Presently, the organization cannot be appreciated as contained but rather as rampant.

The intelligence that informs the overall American approach to the ISIL question is seen as rather insufficient to deal with the question promptly. For instance, at one point, on the strength of the information, the US send only 50 special troops to support rebel groups fighting the organization in Syria (United States, 2015). The troops were too few to offer adequate support to the rebel groups. The troops were too few to make a significant impact on the question. There have been suggestions that the US should invest in gathering intelligence on how to contain the organization rapidly by stabilizing Libya, Sinai, Syria, Afghanistan, Iraq, and Pakistan (Prados, 2015).

Despite these failings, the intelligence, and information available to the US has been effective in helping the alliance cut off most of the ISIL’s revenue streams. The alliance has considerably succeeded in disrupting the streams. The alliance has significantly constrained the organization’s access to official fiscal systems. It has imposed rather effective sanctions on those who facilitate the group financially.

Is the Containment Policy Sufficient?

By and large, the US containment policy for dealing with the ISIL has proved effective, or sufficient. Even then, the defeating of the organization (Bailey & Immerman, 2015).

Any other approach apart from the containment strategy would most likely breed resistance among local populations, offering a fertile ground for the emergence of terrorist groups in the mold of ISIL and al Qaeda, or the strengthening of the extant terrorist groups. Presently, there are indications the containment approach continues to bear fruit. The organization has had marked difficulties in gaining additional territories and its grip on the territories it seats on has been weakening over time. Its ability to exploit resources in the territories has been compromised severely as at now (United States, 2015).

Specific Recommendations for Policy Changes

  • The containment approach should be strengthened by gathering intelligence on how long it may take before the containment occasions the organization’s collapse. As noted earlier, the organization cannot be held back from new territories indefinitely.
  • The containment approach should be strengthened by ensuring that the accuracy of the intelligence which informs the approach is established before being used.
  • The US should invest in gathering intelligence on how to contain the organization rapidly by stabilizing Libya, Sinai, Syria, Afghanistan, Iraq, and Pakistan.


The Islamic State of Iraq and the Levant, which is as well popularly christened the IS or ISIS, is presently an international Sunni Islamist terrorist, as well as insurgent, group. The ISIL’s ideology is an exceptionally hard-hitting version of violent jihadist Islamism, Salafism. The ISIL’s principal tactic and strategy is transnational terrorism. By and large, the US containment policy for dealing with the ISIL has proved effective, or sufficient. The containment policy of the US regarding the ISIL is especially geared towards walling the organization into a more and more limited geographical space or territory and then leaving it to fail independently; owing to internal discord, economic challenges, and mismanagement as opposed to external forces. There are indications that the continued conflict between the ISIL and the US and other nations may be challenging, violent, expensive, and protracted. The organization’s violent fanatics and transnational appeal are likely to persist in compelling American policymakers to deal with intricate issues regarding the containment approach, utilization of military resources, civil and privacy liberties, identity, national strategic priorities, diplomatic negotiations, religious liberties, immigration, and intelligence sharing.

Captain Phillips Movie Analysis and How Terrorism is Portrayed


Directed by Paul Greengrass, Captain Phillips is a portrayal of a real-life hijacking that occurred in 2009 when four armed Somali terrorists took control of the cargo ship Maersk Alabama. At the time of its hijacking, the cargo ship was being manned by a crew of just 20 sailors that were in the process of hauling tons of cargo including food from the United Nations World Food Program that was designated for a number of African countries. In the movie, the critically acclaimed American Actor Tom Hanks gives the performance of a lifetime in his role as the eponymous Phillips who is a hard-working sea captain that pilots ships through treacherous waters off the Somali coast. This paper will provide an analysis of the movie Captain Phillip as well as the portrayal of terrorism within the movie.

Read also Literary Analysis of a Movie – In America

The movie opens with what is a postcard-perfect shot of a white house in Vermont inside of which Captain Phillips is shown to be packing and checking up on his route. Philips and his wife, Andrea are soon other way to the airport and talk about their kids, the future and the challenges that their children will face in a fast-changing world. The scene portrays intimacy and has the effect of humanizing Phillips. In directing the movie, Paul Greengrass is observed to employ the use of quick camera work as is depicted by the fact that while in one minute Phillips is shown hugging his wife at the airport, in the next he is walking down the decks of his ship the Maersk Alabama, testing its various unlocked security gates and directing his crew to run through an anti-piracy security safety drill. Almost immediately after the crew finish up on their safety drill, they are confronted by a real-world threat in the form of two rapidly approaching skiffs full of Somali terrorists. Phillips and his crew manage to dodge and evade the skiffs by increasing their speed and shifting courses so as to churn up a series of destabilizing waves that damage the engine on one of the terrorist’s skiffs while the second skiff withdraws after Phillips makes a false call to a U.S. Navy ship. The next day, one of the terrorist ships returns with four heavily armed terrorists that are able to board the Maersk Alabama and start a distressing siege. The crew of the cargo ship go into hiding when the ship is boarded and the terrorists only manage to capture three hostages.

Read also HRM 310 – Organizational Development In Lean On Me Movie Analysis

The leader of the Somali terrorists Muse (Barkhad Abdi) delivers an outstanding performance in the movie despite the fact that he had no previous acting experience and his skinny bravado is quite memorable. In one of the movies most memorable scenes, Captain Phillips offers the terrorists $30,000 from the ship’s safe but Muse refuses the money and rhetorically asks the captain “30,000 dollars, am I a beggar?” This is soon followed by a cat and mouse game between the ship’s crew members and the four terrorists that end with the crew forcing the terrorists off the ship and the terrorists making off with Captain Phillips and taking him hostage abroad a covered lifeboat.

Read also Mostly Martha (2001) and No Reservations (2007) – Film Analysis

The thunderous naval firepower and swirling helicopters that characterize the movie’s final act cause it to be broadly characterized as an action movie. Replete with night vision navy seal deployments, nerve wrecking claustrophobic lifeboat scenes and cross-hair-tension where big boats become giant, captivating characters, the movie is able to successfully cause its audience to suspend its disbelief. In the movie’s final scene, Tom Hanks, who has been delivering a tremendous performance throughout delivers a new career performance when the captain develops post-traumatic stress. The life-like portrayal of Phillip’s post-traumatic stress has the effect of raising the standards on what an action thriller based on a true-story can do. In this movie, Greengrass is able to successfully demonstrate that it is actually possible for mainstream cinema to not only be intelligent and visceral, but also successfully captivate its audience’s attention.

Read also Role of Terrorism in the Creation of Israel

The depiction of terrorism in Captain Phillips draw the audience to the reality that there is a form of 21-century piracy that has nothing to do with football, illegal downloads or the character of Captain Jack Sparrow played by Johnny Depp swashbuckling through the scenes of a Disney franchise movie. The existential realities of modern-day Somali piracy are an interesting, but unexpected theme in the movie. In a conversation between the Pirate-terrorist Captain Muse and Captain Phillips, Muse reveals that one of the reasons that drove him and his colleagues into piracy is the illegal fishing that has been going on off the Somali coast that has had the effect of reducing the volume of fish the local Somali fishermen are able to catch, and the revenues that they are able to generate from this activity. Ever since the collapse of the Somali government in 1991, the warring clans, warlords and different factions have been unable to reunite the country (Meredith, 2011). This has resulted in the development of a situation where the country’s maritime regions have been left exposed to the ravages of illegal fishing as there is no government force to help in patrolling and protecting this region (Hansen, 2011).

Read also Film Analysis: The Seven Samurai

At first, exasperated Somali fishermen took to attacking foreign trawler to extract heavy fines from fishermen at knifepoint. This eventually developed into the full-blown terrorism practice of hostage-taking and extortion. Not to be left behind, the local terrorist organizations eventually entered into the piracy business and began to target ships that were not connected to the initial grievances of the fishermen in the busy shipping lanes of the Gulf of Aden (Menkhaus, 2009). This caused the piracy that had been rampant along the Somali coast to evolve into terrorism.

Read also Ideology Film Analysis – Pretty Woman

The maritime terrorism in the Captain Phillips movie is a duplication of the basic strategy of Somali terrorist attacks over the years although the weapons and equipment that are used by these terrorists have been progressively upgraded and the tactics have been developed that allow for these terrorists to strike even those vessels that are far away from the Somali coast (Mineau, 2010). In a similar manner to the movie, Somali terrorists operating in the Gulf of Aden tend to attack ships from small, open and highly powered fishing boats that are known as skiffs. While one or two skiffs provide fire cover, the attacking skiff races across the ocean and catches up with the target ship. The terrorists on the attack skiff then enter the ship using ladders (Pham, 2010). Once the terrorists are onboard, they quickly subdue the crew, hold the crew members hostage and command them to steer the ship towards the Somali coast (Percy and Shortland, 2013). In the movie, Muse and his fellow terrorists were unable to fully execute this tactic as the crew members were able to hid themselves in the engine room from where they were able to disable the ship and prevent the terrorists from steering it to the Somali coast.

A variant of this this strategy takes place when fishing vessels are hijacked for the purpose of being used as a mother ship. This is seen to be the case in the movie where the U.S. Navy identifies the mother ship as a fishing boat that had previously been captured by the Somali terrorists. In the movie, the mother ship tows the skiffs until they are able to identify a suitable target. The Skiffs only deploy once they identify a suitable target which is in this case the Maersk Alabama. In real-world situations, terrorists often hijack fishing vessels and use them to move around the shipping lanes without their being recognized as terrorists by naval forces. In addition to this, these fishing vessels are used to cover long journeys across the Indian Ocean. The motherships are usually abandoned once they are no longer required or the naval forces start becoming suspicious of their operations.

In the movie, the terrorists remove the captain from the ship with the objective of holding him hostage so as to extort a ransom from the ship’s owners and discourage any potential attack on the terrorists as they escape to the Somali mainland. The terrorists in the movie appear to operate with a strict code of conduct that compels them to try and keep their hostages alive and in a reasonable condition. This is shown by Muse’s efforts to try and protect Captain Phillips from being abuse by his fellow terrorists.

Muse and his fellow terrorists are shown to be merely the footmen of the warlord Garaad who is ultimately the person in charge of the region where Maersk Alabama was captured as it sailed across. The terrorists operating along the Somali operate in zones that are controlled by different warlords. These warlords are ultimately responsible for all of the terrorist activities that take place in their regions and pocket the lion’s share of any ransom that is received for the return of captured ships. This aspect is illustrated in the movie in a conversation that takes place between Captain Phillips and Muse where Muse boasts of having captured a Greek ship in the previous year that was able to net the terrorists 6 million dollars in ransom money. However, when Captain Phillips asks Muse why he was still engaging in pirate-terrorism despite his having netted such as huge amount of money within the previous year, Muse appears to get annoyed at the Captain and orders him to keep quiet. The central role that is played by the warlords in the terrorist activities is also illustrated by the fact that it is these warlords that order Muse and the other terrorists to get on board their skiffs and go and earn them some money by capturing ships.

The conversation between Muse and Captain Phillips provides a brief snapshot of the extent and the impact of the terrorist activities that are conducted off the Somali coast. While these activities have experienced a considerable decline in recent years, they were at their height responsible for considerable costs not only in increased operating expenses for the global shipping industry, but also in the number of lives that were lost (Bellish, 2012). The potential economic impact of the terrorism conducted by terrorists such as Muse is illustrated by taking into consideration the fact that well over 90% of the goods traded across the world are transported by sea and that about 40% of these good are transported through the Gulf of Aden (Dutton, 2015). It is estimated that in 2011 alone, the terrorism activities conducted by Somali terrorists were responsible for costing the global economy between 6.6 and 6.9 billion US dollars (Bane, 2013). Over 80% of this cost was borne by the global shipping industry that was forced to spend about 2.7 billion dollars in that year alone to reroute ships or cause these ships to increase their speed so as to avoid terrorist attacks. Forcing ships to increase their speeds in a bid to avoid terrorist attacks not only leads to increased fuel consumption by these ships, but also has the effect of causing a considerable degree of wear and tear to the ship engines that are expensive to repair. In a bid to minimize the losses that they incurred as a direct result of the terrorism activities that took place along the Somali coastline in 2011, the shipping industry is observed to have paid about $635 million in special insurance premiums. These special insurance premiums allowed for ships to obtain special kidnapping, war and ransom insurance policies that helped to indemnify them from any potential losses that they might face as a result of terrorist hijacking. The record number of ship hijackings that took place in 2011 resulted in the shipping industry transferring $160 million in ransom payments that was delivered to terrorists to release ships that had been captured in successful hijackings. The money that was paid in ransom to terrorists operating as terrorists was re-routed into Somalia’s pirate economy and helped to provide additional resources that were used to fund additional piracy operations (Bowden and Basnet, 2012).

While it is the human cost of the pirate-terrorism phenomenon that tends to capture media attention, of great concern is that not all pirate-terrorism incidents are eventually resolved in a successful manner. While the hijacking of the Maersk Alabama in 2009 ended in a successful hostage rescue that was undertaken by US Navy Seals, there are however other incidents such s the hijacking of the civilian yacht, Quest in 2011 that are not as successful and left four American hostages dead as a result of a failed rescue attempt. In addition to this, most piracy incidents tend to go completely unnoticed such as the 35 hostages that were killed in 2011 during the course of the various pirate-terrorism-related incidents that took place during that year (Hurlburt, 2013).

Another observation that can be made pertaining to the terrorists in Captain Phillips is that although they had a form of the hierarchical power structure, this structure was rudimentary and ineffective at best as is demonstrated by the friction that exists between Muse and Asad who is the Captain of the second skiff. Asad keeps on referring to Muse as skinny and when Muse commands one of the terrorists to work on an engine in one of the skiffs, some tension develops when Asad countermands Muse’s orders and assigns the terrorist another task. The conflict between the two terrorists eventually escalates when after the unsuccessful capture of the ship on the first day and their return to the mothership, Muse mocks Asad by referring to him as a coward. Asad pulls out a gun and holds it to Muse’s head while threatening to kill Muse but Muse discreetly picks up a wrench and knocks Asad on the head and kills him instantly. He then proceeds to take the engine from Asad’s skiff and adds to his own skiff. The combined power of having two engines in one skiff allows for Muse to be able to successfully capture the Maersk Alabama when he chases it down the following day. Further conflict and friction in the terrorist’s hierarchy are demonstrated by the friction that exists between Muse and Elmi. Throughout the movie, Muse is shown to experience considerable difficulties in trying to tame down Elmi and get him to obey his commands. Elmi is often openly defiant of Muse and questions all of the decisions that Muse makes. In one of the final scenes in the movie, Elmi physically assaults Captain Phillips despite Muse’s command that nobody should harm the captain.

Reflective Evaluation of Counterintelligence Support to Counterterrorism Operations with Reference To the 2001 Pentagon Attack


The September 2001 attacks on the US showed the threats posed on the country by terrorists graphically. The attacks, and other previous ones, led to the loss of the lives of persons working for the US Department of Defense (DoD). The terrorist attacks against the Beirut-located Marine Barracks, the Saudi Arabian-located Khobar Towers, and the Yemen-located USS Cole demonstrate the terrorism-related risks that DoD employees face worldwide. The capability to gather, as well as process, intelligence related to force protection is essential to the DoD’s capability to keep civilian staff, military staff, and own families safe.

Read also Is the Current State of Counterintelligence in the Intelligence Community Adequate?

The DoD has made considerable efforts to enhance its capabilities related to force protection. Even then, threats from terrorists persist in posing considerable dangers. Certainly, the DoD can further bolster own antiterrorism plans by enhancing counterintelligence (CI) hold up, or support, towards force protection. This paper is a reflective appraisal of the CI support related to counterterrorism operations, with a focus on the 2011 Pentagon attack case history. As well, the paper demonstrates the support’s role using various CI activities, operations, and functions from both threat and friendly viewpoints of the attack.

Read also US Counterintelligence Vs Britain Counterintelligence



The term terrorism refers to all acts aimed at occasioning terror. In spite of the name terrorism, some actions deemed terrible or terrifying are not characterized as terrorist acts. Still, there has not emerged a universally accepted characterization, or definition, of terrorism. Even then, it is by and large appreciated as featuring political aims. The pursuit for the aims may be fueled by differences in social class, ideological, religious, ethnic or nationalist politics or persuasions. The definition adopted for terrorism throughout the paper is that it refers to violent acts or the related threats, which are geared towards creating terror, or fear, owing to particular nationalistic, socioeconomic or religious interests.

Read also Counterintelligence in American History


Generally, counterterrorism refers to the responses that state actors formulate and actualize against terrorist acts or planned terrorist acts. Given that that the acts are indications of struggles with nationalistic, socioeconomic or religious motivations, the responses against them are as commonly shaped by class, beliefs or ethnicity. Besides, given that attitudes to societal statuses, religion, and nationalism tend to change over time, terrorist acts and terrorists are commonly criminalized or legitimized based on the extant political interests or perspectives.

Read also The Intelligence Reform and Terrorism Prevention Act Written Analysis


CI is the information collected, as well as the activities executed, to safeguard particular interests or installations against sabotage, espionage, or other intelligence engagements executed for foreign entities or global terrorist acts. Collective CI is the gathering of information regarding the intelligence gathering potential of enemy parties. Defensive CI refers to the efforts aimed at thwarting the efforts made by enemy intelligence services to go through a given intelligence service. Offensive CI refers to the manipulation of enemy intelligence services’ efforts by affording them sham information that they convey back home or taking up their agents for duplicitous roles.

Numerous nation-states organize CI agencies distinct, as well as separate, from own intelligence gathering services for dedicated purposes. In many nation-states, CI missions are shared among several agencies. Even then, one agency commonly predominate the others. In contemporary practice, multiple missions are linked to CI from diverse levels. The missions include Defensive Analysis, CFSO (Counterintelligence Force Protection Source Operations), and Offensive Counterespionage.

Read also The Role Of Fusion Centers In Counterterrorism Strategies

CFSO refers to the human source-level operations executed in foreign lands to bridge existing gaps in the domestic-level coverage of given forces or field stations from espionage as well as terrorism. In the US, CI is essentially an element of the country’s ICS (Intelligence Cycle Security), which, sequentially, is an element of the country’s ICM (Intelligence Cycle Management). Various security-related disciplines as well fall under complement CI and ICM. They include operations security, security classification as well as communications security. Others include physical security, information system security as well as personnel security.

Read also Intelligence Gathering And Informational Sharing Within Al Qaeda

In the US, the OICI (Office of Investigations and Counterintelligence) is charged with conducting robust CI programs. The programs are aimed at deterring, detecting, as well as neutralizing foreign intelligence agencies’ efforts aimed at the Department of State’s diplomatic missions globally, facilities, and personnel. Notably, the OICI has a dedicated CI division, which executes aggressive CI inquiries, as well as counterespionage investigations, jointly with other federal government agencies. As well, the division trains government personnel on security and CI awareness, especially the personnel accessing sensitive information and facilities under the Department of State. The training helps build the personnel’s appreciation of espionage and foreign intelligence risks and the related countermeasures. The personnel gain an increased understanding of alien, or foreign, intelligence environments.

The OICI is populated with security engineers who help it in deterring, detecting, as well as neutralizing, foreign intelligence agencies’ efforts aimed at penetrating domestic residences and office buildings technically. Each of the engineers has specific CI roles. For instance some of the engineers may be assigned the role of making out listening devices fixed on walls. Others may be assigned to counter intricate digital eavesdropping systems or devices.

September 2011 Pentagon Attack and Counterintelligence

The 9/11 terrorist attacks comprised of four, highly-coordinated attacks on the several US’ landmarks by al-Qaeda. Nineteen al-Qaeda operatives hijacked passenger airliners after leaving various airports along the country’s eastern coast. The airliners were headed to California. The 19 terrorists flew the airliners into USA’s landmark buildings. Two of the airliners were flown into the then complex referred to as the World Trade Center. Another airliner crashed in Pennsylvania while probably being flown into a landmark building within Washington. Another airliner was flown into the Virginia-located Pentagon, a landmark DoD facility.

Immediately following the attacks, the al-Qaeda was highly suspected of executing the attacks. The US reacted to the attacks through efforts aimed at deposing the Afghanistan-based Taliban, which was then thought to be harboring al-Qaeda. As well, the country launched a wide-ranging WAT (War against Terror) program. The airliner flown into the Pentagon building approached it from the west and hit part of its first floor façade, exploding on impact. The part of the building hit comprised of largely unoccupied but newly renovated offices. Owing to the attack on the building, 125 Pentagon-based DoD employees lost their lives.

Read Also – Role of International Non-Governmental Organizations in Combating Terrorism-Sample Research Paper

Following the 9/11 attacks, including the Pentagon attack, the CIA (Central Intelligence Agency) Inspector General facilitated an in-house appraisal of the CIA’s performance just prior to the attacks. He markedly blamed senior CIA officers of not acting satisfactorily to address terrorism. He particularly condemned their inability to stop two of the terrorists who executed the attacks from entering the US. As well, he condemned their failure to give the FBI the information that they held regarding the terrorists in a timely way. Overall, the US Senate judged the CIA and the FBI as having showed marked ineptitude as regards stopping the attacks before they happened.

The CI agencies in the US had considerable information regarding the attacks well before they happened. For instance, in the first quarter of 2001, the US ONCE (Office of the National Counterintelligence Executive) sent out warnings regarding persons presenting themselves as art students from Israel trying to circumvent set security checks. The persons were attempting to enter various federal facilities along with senior federal officer residences’ illegally.

Read also U.S Invasion of Afghanistan was not Based on the 9/11 Attacks

From the end of 2000 to mid-2011, the ONCE had intelligence that there were terrorists of Arab origin who had set up terror cells particularly in Miami, Hollywood, and Phoenix. The Arab cells had been set up near Israeli espionage cells according to ONCE reports. As well, the office was aware that Mossad spies were gathering intelligence regarding two leaders of the teams that executed the 9/11 attacks; Marwan al-Shehi along with Mohammed Atta.

In mid-2002, a number of officials dismissed information about the existence of a spy ring that made CI efforts ineffective in stopping the attacks. In the wake of the attacks, the FBI took up a counterterrorism role, which is markedly comparable to CI and espionage in addition to its policing roles. Over the years, the FBI has had challenges in transforming itself to effectively discharge CI-related roles since own counterterrorism roles have expanded under the recently formulated homeland security laws. Notably, counterterrorism and CI share numerous operational aspects, a marked frustration factor, and a feeling of urgency. Such challenges are likely to persuade un-procedural practices.

Probable Reasons Why Counterintelligence Did Not Stop the Pentagon Attack


In 2001, the FBI’s CI capabilities were too low to be of help in stopping attacks of the scale of the 9/11 attacks. That is because it got CI from limited foreign spy agency decrypts, which were deemed ultra-secrets. Even when it was able to arrest enemy spies, it did not since it required to cover up own sources. Notably, much of the FBI’s predicament was not related to the compromising of sources deemed sensitive but the disclosure of incriminating data, or information, which could not keep going cases in court owing to its illegal acquisition.

Read also Domestic Pre-9/11 And Post-9/11 Terrorist Events Research Paper

As well, FBI is poor in CI work owing to its political manipulation to serve particular domestic interests rather than focusing on CI and espionage in general. That means that it does not adequately concentrate on foreigners spying for their mother countries. Most enemy spies uncovered by the FBI long after ceasing their covert work, making their arrests acts of vanity. The FBI can have its CI effectiveness bolstered significantly to stem the recurrence of events comparable to those of 9/11 by shielding its operations from political or sectarian interests.

Read also Improving Emergency Management from Disasters – Hurricanes Sandy And Katrina And 9/11

Pentagon Field Commanders’ Control of Counterintelligence

Possibly, the Pentagon attack and the other 9/11 attacks came about owing to the actuality that the Pentagon’s field commanders did not exercise control of CI. Had they had the control prior to the attacks, they could have considerably helped the DoD in coping with the persistent efforts by al-Qaeda operatives to access the sensitive information, which helped them execute the attacks. It is only after the attack that the commanders were allowed the control.

That has allowed the DoD more force protection capacity since, now, groups like Special Operations Command along with Central Command can opt to execute their CI work within own organizations. Presently, the DoD has better CI capabilities for protecting facilities like the Pentagon since different combat commands are allowed to either depend on the DoD or formulate organic CI abilities. The commands are no longer obligated, or legally compelled, to rely on MDCIOs (Military Defense Counterintelligence Organizations) for own CI work.

Overseeing DoD Counterintelligence Enterprise

Possibly, the Pentagon attack and the other 9/11 attacks came about because then, the DoD did not have an agency charged with effectively, as well as efficiently, managing along with overseeing the DoD’s CI enterprise. There was no agency mandated to synchronize CI across the DoD, jointly with other federal intelligence units. As well, there was no specific agency charged with managing priority CI projects and plans to satisfy combatant commander, departmental or national requirements. Consequently, the enterprise was run poorly, there was no synchronization of CI across the DoD, and CI projects and plans were not managed satisfactorily to satisfy combatant commander, departmental or national requirements.

To forestall the happening of events like those of 9/11, the Counterintelligence Field Activity (CIFA) was created in 2002. It could contribute greatly to the force protection CI programs of the DoD. Specifically, the CIFA was charged with efficiently, managing along with overseeing the DoD’s CI enterprise, synchronizing CI across the DoD, and managing priority CI projects and plans to satisfy combatant commander, departmental or national requirements. When the CIFA was shut down in 2008, all its mandates were conferred on the DIA (Defense Intelligence Agency). To ensure that the agencies charged with effectively, as well as efficiently, managing along with overseeing the DoD’s CI enterprise are effective in their mandates,  they should be allowed to choose, as well as develop, specific CI operational support strengths and increasing their accessibility to the larger intelligence community. As well, they should be allowed to make out, develop, as well as deploy advanced CI field technologies.

Counterintelligence Doctrine

Possibly, a review of the DoD’s CI doctrine would have stemmed the happening of the 9/11 events. Notably, ensuring that field commanders exercise control of CI can heighten the utility of the CI by allowing them control over it. The DoD’s CI doctrine should be made increasingly comprehensive to increasingly help it in coping with the persistent efforts by al-Qaeda operatives to access the sensitive information, getting precise, opportune, and applicable knowledge concerning the adversary (or potential adversary) and the neighboring environment. The commanders should be supported to protect friendly forces via CI active, as well as passive measures.

The DoD’s CI doctrine should be reformulated to make certain that CI affords field commanders decisive intelligence aid in executing their force protection programs. The CI should help the commanders make possible threat potentials and threats along with considered intentions to operations considered friendly. Concurrently, CI should assist the commanders deceive adversaries regarding friendly intentions, vulnerabilities, and capabilities.

Pentagon Police

Had the PFPA (Pentagon Force Protection Agency) had CI mandates before the attacks, possibly it would have prevented the occurrence of the Pentagon attack. Indeed, the agency was only formed in mid-2002. It is essentially charged with securing and enforcing elementary law on behalf of the Pentagon. Presently, its mandates include handling administrative and information technology issues, antiterrorism, consequence management, building surveillance, operations security, protection of DoD personnel and facilities, crisis prevention, handling explosives and CI.


The Pentagon attack showed the threats posed on the US by terrorists graphically. The attack led to the death of 125 persons working for the DoD. Since then, the DoD has made considerable efforts to enhance its capabilities related to force protection, including reforming its CI regime. Notably, CI is the information collected, as well as the activities executed, to safeguard particular interests or installations against sabotage, espionage, or other intelligence engagements executed for foreign entities or global terrorist acts. The CI agencies in the US had considerable information regarding the attack well before it happened. Even then, they were unable to stop it owing to various probable reasons.  

First, possibly, the FBI’s CI capabilities were too low to be of help in stopping attacks of the scale of the 9/11 attacks. Secondly, possibly, the attack came about since the Pentagon’s field commanders did not exercise control of CI. Third, possibly, the Pentagon attack and the other 9/11 attacks came about because then, the DoD did not have an agency charged with effectively, as well as efficiently, managing along with overseeing the DoD’s CI enterprise. Fourth, the attack happened possibly the PFPA was not in existence. Lastly, possibly, a review of the DoD’s CI doctrine would have stemmed the happening of the 9/11 events.

Intelligence Gathering And Informational Sharing Within Al Qaeda

Intelligence Gathering

Al-Qaeda, a global terrorist network, was founded by Osama bin Laden more than ten years ago. This terrorist network remains a major threat across the United States, Middle East, and Africa. Al-Qaeda’s leaders understand that they are being targeted by the United States government. For this reason, they often use every means possible to share information and gather intelligence in order to make necessary preparations on how to fight their enemies whenever they strike (O’Neil and Gray, 2011). Traditionally, Al-Qaeda largely relied on the local population to gather intelligence. In addition, the terrorist network used basic communication strategies such as face-to-face communication to share information (Global Security, 2015).

Read also Al-Qaeda – Annotated Bibliography

However, with technological advancements in the contemporary world, Al-Qaeda now uses technology to share information and to gather intelligence. Moreover, Al-Qaeda currently implements various technological concepts similar to those employed by the United States such as, communication networks, fusion centers, information sharing environment (ISE), detection tools, and surveillance capabilities. Al-Qaeda is unconcerned about ethics and it unethically employs technology in its attempt to attack the United States and its allies. The United States has powers to employ technology in similar ways as a strategy towards defeating Al-Qaeda (Global Security, 2015).

Read also Assessing Potential Risk of Earthquakes, Volcanoes, And Tsunamis

The five main technological tools used by Al-Qaeda with regard to information sharing and intelligence gathering include mobile phones, Skype, emails, various websites on the Internet, and different forms of media such as television, radio, and newspapers. According to Theohary and Rollins (2011), Al-Qaeda largely uses mobile phones, emails, Skype, and the media to spread terrorism-related information and to gather intelligence from their sympathizers distributed in different countries globally. In addition, various websites on the internet provide very good platforms where Al-Qaeda delivers threats that are meant to instill fear among the United States citizens and their allies.

Al-Qeada also uses videotapes to disseminate horrific images of their actions and attacks to members of the public to render them helpless. Moreover, Al-Qaeda leaders spend their time examining national websites in order to gather intelligence that can assist them to stay safe from attacks planned by the United States. Since counterterrorism plans are sometimes documented in various forms of media, Al-Qaeda currently find the radio, newspapers, and television to be very good sources of intelligence gathering (Theohary and Rollins, 2011).

Read also An Analysis of September 11 2001 Terrorist Attacks

In order to Al-Qaeda to be successful in implementing their attack plans on America, they have to maintain a status quo which is only possible through rigorous recruiting, resource acquisition, training, surveillance, targeting, communication, attack, and spread of propaganda (O’Neil and Gray, 2011). The most important component on the list is communication. As the United States used network technologies to facilitate effective communication in order to counter terrorism, Al-Qaeda employs the same strategy including mass media and the internet to spread messages of attack. The group has a strong multi-national network that involves Islamic militant in Kosovo, Afghanistan, Eritrea, Germany, Somalia, and Algeria, just to mention but a few (Global Security, 2015).

Read also Genealogy of Terrorism and Counter-Terrorism Efforts within the United Kingdom

The United States Department of Homeland security has established fusion centers where information sharing about terrorism occurs, as an important step towards identification of defense strategies. Al-Qaeda’s version of fusion centers are the mosques and Islamist centers located in different countries globally. When identifying the best places to use as information sharing centers, Al-Qaeda takes advantage of those nations or regions where Muslims form a larger percentage of the population (Global Security, 2015).  Information Security Environment, (ISE), is a platform where analysts, operators, and investigators find relevant information on how they can synthesize terrorism, destruct weapons used by terrorists, and general security information that can be used to enhance national security and keep citizens safe. Al-Qaeda’s version of Information Sharing environment comprises of terrorist sponsors, their sympathizers, and terrorists themselves. These people provide Al-Qaeda with relevant information that they need to synthesize the United States security system, as well as to protect their weapon from destruction. Their main role is to assist Al-Qaeda to obtain its objective of attacking huge populations as a way of purification (Global Security, 2015).

Read also Compare And Contrast The Capabilities Of Foreign Intelligence Organizations – Chinese, Iranian, and Russian

The United States currently used portable devices to detect explosives and other bioterrorism agents that have been planted by terrorist to cause harm to the target population. Similarly, terrorists have developed portable devices that they use to detect the presence of security officers and weapons within their immediate environments. The United State military system uses advanced surveillance capabilities to trace terrorists even in very remote places. For instance, the country makes use of aerial surveillance which provides full-motion video of terrorisms. Surprisingly, Al-Qaeda also uses highly advanced surveillance capabilities to locate security officers who might be trying to follow them (Olson, 2012).

Read also Tactical And Strategic Intelligence Collection Plans

Al-Qaeda is unconcerned with ethics and this explains why it uses very cruel strategies to attempt to attack people and to defeat the United States and its allies. Ethics concerns the rightfulness or wrongfulness of an action, and an act is automatically immoral if it violates human rights (O’Neil and Gray, 2011). The three unethical ways that Al-Qaeda uses technology to attempt to defeat the United States and its allies include bombing, suicide attacks, and cyber terrorism. Technological advancements have given Al-Qaeda an opportunity to prepare bombs, agents for suicide attacks, and to execute cyber terrorism. According to Utilitarianism ethical theory, an action is considered ethical if it generates maximum happiness to the largest group of people. Unfortunately, the technology applied by Al-Qaeda to defeat the United States and its allies make people sad rather than happy, and are therefore considered immoral (Global Security, 2015).

Read also Provisions Of Foreign Intelligence and Surveillance Act And The Patriot Act

Al-Qaeada’s sponsors use technology in a very unethical manner to harm their nation’s own population (O’Neil and Gray, 2011). The three unethical ways through which Al-Qaeda’s sponsors use technology to harm their own population include, assisting Al-Qaeda to obtain modern weapons for killing people, ensuring the Al-Qaeda gets access to the most effective biological agents to harm the health of the population, and by assisting Al-Qaeda to use modern technology to destruct property in the United States. The main motives of Al-Qaeda and their sponsors are often to purify the ranks of Islam from depravity, and to attain martyrdom in the cause of God. If Al-Qaeda continues to attack the United States and its allies through cruel means, the United States is justified to employ similar methods to attack this terrorism network, because killing them is the best way through which they can be eliminated (Global Security, 2015).

Read also Laws and Ethics within the Intelligence Field

Genealogy of Terrorism and Counter-Terrorism Efforts within the United Kingdom

Today, modern-day terrorism is principally looked at as a serious global threat that warrants immediate attention. Its extensive scope, dynamic nature, and the number of nation-states impacted negatively by associated aftermaths has now forced many to resort to formulating elaborate counter-terrorism strategies to remain one step ahead of their adversaries. The United Kingdom is among a growing list of countries that have grappled with terrorism as a contemporary reality. Under UK law, terrorism is defined as using threats and intimidation with the main aim of influencing government. This is primarily done to advance a particular religious or political ideology (Great Britain. Home Office 2009).. Although the UK had previously been subjected to a number of terrorist attacks linked to the political unrest in Northern Ireland, it was only during the turn of the 21st century that the inaugural Terrorism Act of 2000 was formally implemented.

Read also Terrorism is The War of the Poor, and War is the Terrorism of the Rich

Major Events that shaped the Creation of the Terrorism Act 2000

            The Terrorism Act of 2000 is officially recognized as the chief legislation dealing with terrorism-related matters in the UK. Its implementation was an attempt to implement legislation that focused generally on terrorism, as opposed to focusing exclusively on the situation in Northern Ireland.  The 7 July 2005 London bombings were a major factor that prompted the implementation of this particular Act. The 7/7 bombings, as they are commonly referred to, were a series of synchronized attacks targeting London’s underground railway commuter system. This marked a turning point in the UK’S approach to terrorism, especially since the attack resulted in the deaths of close to 60 individuals and hundreds more were injured (Tembo 2015). Additional coordinated attacks were also slated for the days following the bombings, but were largely ineffective due poor organization. The four suicide bombers were later identified as British nationals Mohammed Sidique Khan, Germaine Lindsay, Shehzad Tanweer, and Hasib Hussain linked to jihadist terrorist cells (Staniforth & Fraser Sampson 2014).

Read also The Correlation between the Concept of Globalization and International Terrorism

Proscribed Terrorist Groups under Terrorism Act 2000

            One of the most significant aims of the Terrorism Act of 2000 was a succinct classification of terrorist groups under the new legislation. The Act currently identifies Islamic extremism, far-right ultra-nationalist movements, and radical anarchist groups in Northern Ireland as major areas of focus when seeking to address immediate concerns related to terrorism. Individuals who identify as members of such organizations, those who don associated regalia, and those suspected to support them may be charged with a terrorist offence. This act also extend prosecution to persons who knowing or unknowingly join groups with links to local and international terrorist groups.

Read also Role of International Non-Governmental Organizations in Combating Terrorism – Sample Research Paper

Definition of Terrorism Prior to the adoption of the Terrorism Act 2000

            Before the 7/7 bombings and the subsequent enactment of the Terrorism Act of 2000, terrorism was synonymous with the activities of the Irish Revolutionary Army (IRA).  This had previously resulted in the implementation of the Northern Ireland Emergency Act of 1996 to aid in stemming the threat posed by the IRA (Richards 2012).  It offered a clear definition of terrorism while emboldening the police with new investigatory powers to effectively confronted suspected cases.

Read also Impact of Terrorism on Children

Counter-terrorism Efforts in the United Kingdom

            The primary objective of implementing counter-terrorism strategies in the UK is to develop the most suitable response to imminent terrorist threats. These efforts have mainly focused on the implementation of specified measures to prevent individuals from joining or supporting terrorist organizations (Great Britain. Home Office 2009). Additionally, they also aim to thwart terrorist attacks by gathering sufficient and some of the most reliable intelligence. Counter-terrorism strategies in the UK also intend to utilize appropriate infrastructure to protect citizens against potential terrorist attacks. It also guarantees a high level of preparedness to mitigate negative consequences often associated with terrorist attacks. Target groups include Islamic extremism, far-right ultra-nationalist movements, and radical anarchist groups in Northern Ireland.

Read also The Role Of Fusion Centers In Counterterrorism Strategies

Counter-terrorism strategies in the UK now include provisions that allow members of law enforcement agencies to arrest suspects even without a warrant. This provision affords them a great deal of latitude in arresting and detaining individuals with suspected links to proscribed terrorist organizations. It has been hailed by security experts as a positive development and a shift from ordinary criminal law that hindered extensive investigation of suspects. Stop and search provisions have also become a part of counter-terrorism efforts in the UK in the wake of threats posed by terrorist attacks. Under Section 44 of the Terrorism Act of 2002, stop and search devoid of any reasonable suspicion to aid in seizing material intended for terrorist-related activities (Chatterjee 2012). Police officers were also allowed to make specific authorizations in the event they suspected of participating in acts of terrorism. Furthermore, the UK currently implements stringent measures which criminalize the collection of information to be used to plot terrorist attacks. Under section 58, suspects will be liable for to serve nearly a decade in prison for this particular offence. Bilal Zaher Ahmad was among the first individuals to be charged as a direct consequence of this counter-terrorism strategy for collecting extremist material distributed by al-Qaeda (Elshimi 2018).           

Read also Cyber Terrorism : The America Response  

Perhaps the most controversial counter-terrorism strategy employed in the UK is the stop and search provision under Section 44 of the Terrorism Act of 2000. This is mainly due to the fact that it can be applied by the police even without any reasonable suspicion. Law enforcement officers can now choose to arbitrarily implement this particular provision; searching individuals and cars, even though the suspects might be innocent. One of the main criticisms of this approach surrounds the low numbers of individuals incarcerated for terrorist offences after routine stop and search events. The European Court of Human Rights has even gone as far as publicly criticizing the stop-and-search provisions granted and also asserted that it was in direct contravention of Article 8 of its Convention on Human Rights (Elshimi 2018). This has resulted in repeated calls to have this section repealed to protect the individual dignity of UK nationals. The most immediate impact of these efforts has been a sudden drive towards the prevention of terrorist attacks and an unintended consequence in the rise in islamophobia. Nevertheless, counter-terrorism strategies have largely remained static, which is worrying given the changing face of terrorism.

Impact of Terrorism on Children

As expected, the onus is customarily on Psychiatric Mental Health Nurse Practitioners (PMHNPs) to act responsively and apply empathy during the evaluation of sensitive issues that threaten children and adolescents.  Acts of terrorism have recently emerged as the archetypal representation of a special issue and with the potential to impart long-lasting trauma on children.  According to Browne (2019), exposure to trauma, both directly or indirectly, may vary in its impact on individual juveniles but still considered a major risk factor in the development of various forms of psychopathology in children and adolescents (p. 190). An evaluation of possible psychological issues, assessment measures applied within this section of society, treatment options for children and an analysis of cultural influences on treatment are, therefore, warranted when aspiring to gain an in-depth comprehension of the impact of acts of terrorism on children.

Read also The Greatest Motivator of Terrorism

Psychological Issues Among Children Caused By Terrorism

 Acts of terror cause a great deal of psychological stress among children. This is habitually the result of direct or indirect exposure to trauma or knowledge of someone close to them having been involved is such fateful incidences. Children below the age of 19 years, are normally still in the developmental stages in risk assessment, psychological coping mechanism, and cognitive abilities and are likely to be affected significantly by trauma (De Young & Scheeringa, 2018). Post-Traumatic Stress Disorder (PTSD) is one of the main geneses of psychological issues witnessed among children and adolescents.

Read also Empirically Supported Treatments For Post-Traumatic Stress Disorder

 The 5th edition of the Diagnostic Statistical Manual of Mental Disorders (DSM-5) classifies PTSD for children and adolescents under Trauma-and-Stress-Related Disorders. This diagnostic criterion relies upon exposure to a psychologically stressful event, prominent dissociative symptoms, and distorted sense of reality as major signs of PTSD in children above the age of six (American Psychiatric Association, 2013).  PTSD among children causes psychological issues with sweeping outcomes. PTSD is associated with the emergence of neurodevelopmental disorders, schizophrenia spectrum disorders, depressive disorders, obsessive-compulsive related disorders, and bipolar disorder as major psychological issues (Rothbaum & Rauch, 2020). Furthermore, PTSD among children may also present with frequent suicidal ideations, frequent anxiety, emotional numbness, and sleep disturbances. PMHNPs are among an integral class of professionals providing crucial mental health services to children and adolescents as part of health promotion.

Read also Post-Traumatic Stress Disorder (PTSD) Among Women – Final Pilot Study Report

Assessment Measures

Identifying cases of PTSD among children is one of the most challenging practices today. DSM-5 is a leading assessment measure used in categorizing childhood PTSD in individuals above 6 years of age. The diagnostic criteria subsequently identifies direct or indirect exposure to a traumatic event, witnessing a traumatic event, and learning of its impacted on a close family member are major factors to consider during the initial assessment (American Psychiatric Association, 2013). Furthermore, recurrent flashbacks can be intrusive, and accompanied by an overall repression of memories associated with the event, the presence of frequent nightmares, a high level of psychological distress, and avoiding stimuli associated with the event.

Read also DSM-5 Category Summaries Introductions

The preliminary assessment of juvenile patients in alleged cases of PTSD normally evaluates subjects for any overt evidence of changes in cognition and mood, devoid of an organic basis (Loeb et al., 2018). Children and adolescents living in war zones such as Syria or in low-income inner-city environments in the U.S. with a relatively high per-capita homicide rate such as neighborhood zones and housing project blocks in Chicago, Illinois are highly likely to be exposed to trauma-and-stress related trauma (Rothbaum & Rauch, 2020). Children and adolescents exposed to a considerable degree of trauma feel secluded, have noticeable memory issues, and experience excessive self-blame, especially after surviving a terrorist onslaught (Garro, 2016). An additional assessment measure involves identifying signs of hyperarousal, hypervigilance, frequent sleep disturbances, irritability, and concentration problems. Symptoms should have persisted for at least a month and directly linked to a traumatic event (Kerig et al., 2018, p. 165). The condition should also interfere considerably with normal functioning and not as a consequence if illness or substance abuse.

 Treatment Options

Although numerous treatments for PTSD have arisen in recent years, a suitable intervention would be to essentially to combine pharmacological options and psychotherapeutic practices. However, the U.S. Food and Drug Administration (FDA) is yet to approve any selective serotonin reuptake inhibitor (SSRI) antidepressant to treat PTSD among minors (Espinel & Shaw, 2018). A viable alternative option relies on cognitive behavioral therapy (CBT), trauma-focused therapy and exposure to stimuli as a viable treatment options in successful managing PTSD in minors. Furthermore, such efforts are further buttressed by prescribing Alpha-1 adrenergic antagonist to manage sleep disturbances, nightly awakenings, and sleep disturbances (Haag et al., 2019).

Cultural Influences on Treatment

            Cultural competence is vital when treating various psychiatric conditions due to variations in perception about mental health issues amongst different cultures. These differences are also present in notions regarding the most appropriate intervention to implement in the management of a psychiatric disorder (Rothbaum & Rauch, 2020). For instance, mental health disorders are shrouded in superstition within the Puerto Rican folk belief system where a psychiatric patient is routinely thought to have gone “loco” (crazy), signifying their exposure to evil spirits (Carlos, 2017, p. 297). Other cultures may assume the child is bewitched and propose mystical interventions by inviting a spiritual medium or exorcist. However, ethical practice dictates that PMHNPs should participate in health promotion initiatives by guiding parents or legal guardians through some of the most suitable treatment options and, demystifying myths surrounding mental health conditions.

Read also Ways That Cultural Expressions Influence Our Daily Life


Acts of terrorism present a constant threat to children and their overall wellbeing. Exposure to trauma may cause PTSD and the emergence of associated psychological issues such as neurodevelopmental disorders, schizophrenia spectrum disorders, depressive disorders, obsessive-compulsive related disorders, and bipolar disorder.  Assessment measures rely on major gauges identified in DSM-5s diagnostic criterion for PTSD. Cognitive behavioral therapy (CBT), trauma-focused therapy, and exposure therapy are the only treatment options currently recommended for children with PTSD. PMHNPs must, therefore, implement learnt cultural competence skills during initial assessments; dispelling cultural misconceptions and guiding the parent or guardian in choosing the most feasible treatment option available.

The Greatest Motivator of Terrorism

The terrorists are the main enemies in the war against terrorism. Terrorism has seen a recent growth and much attention towards the subject, which has led to many researches done on the major causes of the now global threat to security. According to (Miller, 2007), terrorism has been defined as system of battle, where typical casualties become the targets of violence. The behaviors and nature of terrorists shows a range of set of data. Ideology and motivation has been found to have an influence on the objectives of terrorist activities, especially the rates of casualties.

Read also The Correlation between the Concept of Globalization and International Terrorism

The major objective of terrorism as outlined in (Greaves, 1981) is target immobilization while keeping the end goal in delivery of confusion. To achieve these goals, the perpetrators of terrorism are often motivated by certain aspects, which become their main driving force. The observations of the nature of humans and the group dynamics under anxiety, stress and extremist values, provides insightful causes of the particular observed behaviors. In general, terrorism has many motivating factors, which depends on the interests of cells or individuals. For example, terrorist groups with secular and non-religious ideologies will employ highly selective and discriminative forms of violence to achieve their political goals. Accordingly, (Miller, 2007) has identified the main motivators behind terrorism as political, religious, social, cultural and economic goals.

Read also The Intelligence Reform and Terrorism Prevention Act Written Analysis

            The global terrorism index (GTI) ranks religious extremism as the greatest motivator of terrorism over the past decade (Statista, 2017). According to their 2014 report, the author points that about 70% of the terrorist attacks in the world are instigated by religion. Ranked according to their perpetrator category, Islamic extremists had the highest number of fatalities more than secular/political anarchist, neo-Nazi/fascist/white supremacist and others, combined. Religious motivations play a role in terrorism by providing the terror group’s identity and through provision of self-justifications of the terror actions. The famous religious terror groups with huge influence include the Taliban, Boko Haram, ISIS and Al-Qaida.

Read also Weapons of Mass Destruction Terrorism from the Perspective of Invasive Species, Biological Threats, and Logic Behind Suicide Terrorism

            The religious form of extremist is the most dangerous and common form of terrorism owing to the belief in martyrdom (shahadah) and self-sacrifice that motivates the perpetrators. The doctrine informs the perpetrators that although suicide is illegal under the Islam law, the element of self-sacrifice is justified if done in the will of God. Moreover, the widespread use and effectiveness of religious beliefs demonstrate the power of religion as a motivator of terrorism. This form of terrorism is not selective but is motivated by the will to spill blood and sacrifice to achieve their goals. According to (Fink, Marvasti, & Haroun, 2005) the millenarian and religiously oriented groups attempt to inflict as many casualties as they can. They believe that the best way to inflict fear and achieve influence is through mass fatalities.

Read also An Analysis of the Civil War in Yemen – Law and Terrorism Final Paper

The apocalyptic frame of reference that is common with religious form of terrorism makes the loss of life irrelevant and the more casualties they achieve the better their goals achievement (Fink, Marvasti, & Haroun, 2005).  The fatalities suffered by their co-religionists are of little concern because they consider them as the beneficiaries of afterlife. Likewise when the targeted non-believers suffer casualties, whether intended or as collateral damage, are considered as deserving as it is deemed a moral duty to be killed. These beliefs make religious terrorism not only the most dangerous form of terrorism, but provide the greatest source of motivation behind their attacks.

Read also Role of International Non-Governmental Organizations in Combating Terrorism – Sample Research Paper

            The religious terror groups have also adopted the suicide bombing as a strategic attack too owing to its effectiveness. The use of human beings makes it hard to detect and counter; besides providing maximum impact and damage compared to other secular groups. For example, the Nairobi attack on the U.S embassy led to deaths of many U.S citizens and injuries to over 5000 Kenyan civilians, yet the bombers who died were incomparable to the fatalities among the targets. The use of human suicide bombers has been shown to create the greatest fear among the targets since it is often hard to know the bombers. The religious form of terrorism under the motivation of their apocalyptic frame of references has since become the most effective strategic tools for advancement of extremist ideologies.      

Read also Cyber Terrorism : The America Response

            Religion as the greatest motivator of terrorism is further reinforced with the fact that the beliefs by religious terror groups are intertwined with the teachings in the Bible. These relationships between the religious terror group’s beliefs have created a huge loophole which facilitates innocent and naïve individuals into joining these religious extremist groups. The achievement of terrorist intent cannot be fulfilled if there is no essential environment to operate (Amir, 2006). However, religion provides an effective motivator for the creation of good cultural conditions for terrorist activities.

Read also State Secrets, The USA Patriot Act And The War On Terrorism

According to (Amir, 2006) the use of religion as a motivator in creation of essential cultural conditions for terrorist attacks are best demonstrated by Yasser Arafat. According to the author, Arafat, during his reign as the leader of Palestine was not a religious leader. However, he reiterated the importance of creation of appropriate cultural conditions in which the Palestinians would use to further their struggle for their rights. He used religious rhetoric and terminology in his public speeches made in Arabic to reiterate that the dead Palestinian children (whom he referred to as “shahids”) were a testimony to the world.

Read also Ways of Preventing Terrorists and Terrorism Acts in United States

According to (Rausch, 2015) most of the religious extremists have been caused by political and cultural intrusions into their territories. Most of the organized groups such as the Taliban fight to safeguard and advance their influence which is perceived to be under threat from the incumbent political and external occupations. Therefore it is recommended that giving such groups a political and religious freedom is critical to their suppression. The use of military action can only serve to exasperate such groups and offer less viable solutions. In contrast, they need to be accommodated and allowed to have equal political and religious autonomy.

Read also The Future of Digital Crimes and Digital Terrorism

However, the greatest impediment to this course of action remains the political unwillingness to adopt diplomacy as the strategy to fight religious extremism. Most incumbent political office holders hold the religious groups in bad views. Such groups are deemed as terrorists whose main goal is to kill. Those in power fail to recognize the legitimate intentions of such groups in fighting for their rights (Rausch, 2015). This has resulted in continued use of military in retaliation to such group which further reinforces their fight for their course. Religious groups will continue to fight to attain autonomy over the cultural intrusions and legitimate control of their economic wellbeing. Unless these major causes of the extremist violence are understood these groups will never relent and their influence will expand. Allowing such groups their cultural and political freedom remains key in combating religious extremism in the foreseeable future.

The Correlation between the Concept of Globalization and International Terrorism

The end of twentieth and throughout the 21st century has witnessed an increase in terrorism over the world. The phenomenon of terrorism has now spread across many countries including the Middle East and North African (Lutz & Lutz, 2015).  The increase in international terrorism has coincided with globalization, suggesting a correlation between terrorism and globalization.

Read also The Future of Security – Industry Trends, Challenges Faced and Impact of Globalization

            Globalization has been blamed to a number of difficulties that are being experienced in many countries. According to (Lutz & Lutz, 2015), globalization is defined as the process through which international connectedness deepens, widens and speeds up. The phenomenon goes beyond the increase in economic interactions to include social, political and cultural interactions among the different nations of the world. According to the author, modern globalization has been linked to global terrorism.            

The movement of ideas and materials, a result of globalization, is likely to bring socially dissimilar groups closer to one another leading to conflict (Lutz & Lutz, 2015). Increased economic interactions with the outside world create anxiety about the cultural and social changes that result from economic adaptations.  Moreover, globalization has been associated with some form of inequality in the societies, thus creating and increasing tensions. The author cites the case of foreign direct investment, which has caused inequalities in the affected societies. The culturally and economically disadvantaged groups oppose the groups or political systems that associated with such changes. When satisfaction cannot be attained through peaceful means the groups resort to violent forms, which often leads to a vicious cycle of violence.

The Intelligence Reform and Terrorism Prevention Act Written Analysis

Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) was considered as the most dramatic and fundamental changes brought to U.S. intelligence community since the creation of the Central Intelligence Agency (CIA) in 1947. The key objective of the IRTPA was to ensure intelligence information was shared effectively among the intelligence community something that was missing prior to 9/11 attack (Jacobson, 2004). As a result, IRTPA mandated the creation of director of national intelligence office and National Counterterrorism Center. Analysis indicated that IRTPA brought significant improvement to the Justice Department and FBI by enhancing their powers in combating international terrorism in various ways. However, IRTPA have most controversial changes which include the amendment of Foreign Intelligence Surveillance Act of 1978 (FISA). This amendment permits FBI to conduct secret searches and wiretap the conversation of individual suspected terrorist who has no tangible connection with the foreign power.

Read also Role of International Non-Governmental Organizations in Combating Terrorism – Sample Research Paper

            Some of these changes were been pushed by many members of the Congress upon realization that FBI were unable to wiretap conspirator Zacarias Mousaoui before the 9/11 attack because his lawyer argued that FISA did not provide a provision that allowed FBI to wiretap communication of the terrorist suspects that had insufficient information to link them with foreign powers. In order to convince the Congress to support the changes, FBI officials reiterated the increasing danger associated with lone actors who are sympathizers of a formal terrorist groups and are capable of carrying out an attack with no or little connection to the international terrorist groups (Civic Impluse, 2017). The critics of this amendment have argued that IRTPA violates Fourth Amendment that protect individuals from unreasonable search and seizure. This will affect Justice Department from prosecuting the case, but the defendant is likely to have hard time challenging the legality of the FISA warrant if the FBI agent relied on ‘lone wolf’ provision while conducting the searches.

Read also Reflective Evaluation of Counterintelligence Support to Counterterrorism Operations with Reference To the 2001 Pentagon Attack

            Another major change that IRTPA brought to Antiterrorism and Effective Death Penalty Act of 1996 was the inclusion of ‘material support’ statute in Title 18 Section 2339. The included provision states that it is a crime for an individual or organization to provide material resource or support to an individual, organization or groups to be used in connection with terrorist act. Section 2339B went further to prohibit ‘knowingly’ providing material support or resources to organizations designated as ‘foreign terrorist organizations’ (Hastedt, 2006). The statute defined materials resources to include physical assets, safe houses, communication equipment, training, financial assets and other facilities. The USA PATRIOT Act changed the statute to include ‘expert advice and assistance’.

Read also SEC 310 USA Patriot Act – Battle Looms Over the Patriot Act Case Study

            IRTPA make it explicitly clear that it is criminal offense to ‘knowingly receive’ military-type training from the designated terrorist organization. It was not possible to prosecute someone in the past if he/she confessed to have knowingly attended an al-Qaeda training camp since it was not an illegal act (Hastedt, 2006). Considering that U.S. intelligence have approximated 10,000 – 20,000 individuals to have undergone training at al-Qaeda camp between 1996 and 2001 in Afghanistan.            

Read also History of Terrorism – Aurora Theater Shooting Research Paper

In conclusion, IRTPA has enhance counterterrorism by clearly defining the terms that were considered as questionable in courts such as ‘training’, ‘knowingly provided’ and ‘expert advice or assistance’. These gaps had been identified by FBI official but it required the support from the Senate and Congress in order to become a law.

Read also State Secrets, The USA Patriot Act And The War On Terrorism

Weapons of Mass Destruction Terrorism from the Perspective of Invasive Species, Biological Threats, and Logic Behind Suicide Terrorism

Weapons of mass destruction (WMDs) represent a group of weaponry that has the potential to kill a multitude of people within a very short time. Also, WMDs are known to have catastrophic effects that last for many years after an attack. WMDs include biological, chemical and nuclear weapons. Biological weapons include bacteria, fungi, viruses, and other contaminants that are deliberately manufactured to cause death or induce diseases to plants, animals or humans (Curley, 2012). Chemical weapons are lethal chemicals whose effects are capable of causing death, permanent or temporary injuries to animals and people. Such chemicals include nerve and tear gas. Subsequently, nuclear weapons represent explosives such as bombs and missiles that rely on nuclear energy to cause death or destruction to the targeted people or place. All these weapons have been used in the past and it has become apparent to the whole world that they pose a great threat to both living and non-living things (Curley, 2012). While WMDs are used as part of security measures by various countries, it could be detrimental and disastrous if the same weapons land on the hands of terrorists or states that are allied to terrorist organizations. In the wake of rising terrorism and animosity between various countries, there have been concerns about the likelihood of the usage of WMDs to launch attacks against perceived enemies which may cause great harm to innocent civilians. This paper explores WMDs terrorism from the perspective of invasive species, biological threats, and the logic behind suicide terrorism.

Read also Argument For And Against The Use Of Nuclear Weapons

Invasive species are categorized under biological weapons. WMDs terrorism associated with biological weapons is referred to as bioterrorism. This form of terrorism ranges from strategic and tactical military acts or state-supported terrorism to isolated acts by individuals against individuals such as rogue scientists to inflict mass casualties to humans, plants or animals (Chomel & Sun, 2010). Invasive species involves the introduction of exotic organisms such as animals or plants to foreign ecosystems to destroy the biotic or abiotic factors within such an ecosystem (Curley, 2012). When used as a bioweapon, the motive might be to sabotage staple foods of a certain region or a country to cause starvation or kill an important source of income within an economy. Also, invasive species such as Anthrax or tularemia poses a great danger to animals leading mass deaths if not contained. Although acts of bioterrorism are rare, their potential to cause devastating repercussions remains a matter of great concern.

Read also Aum Shinrikyo on the Transportation System in Japan – Terrorists Group Activity Analysis

The use of invasive species in bioterrorism can lead to an epidemic. The probability of an epidemic arises from the fact that most pathogenic organisms that are likely to be used by bioterrorists can spread easily through direct contact, flying insects, or aerosol (Chomel & Sun, 2010). From past occurrences, two viruses have been manifested their potential to cause enormous harm to livestock and human beings. These viruses are Foot and mouth disease (FMD) as well as Rift Valley fever (RVF) (Chomel & Sun, 2010). FMD has been reported to be one of the most contagious viruses on earth and if introduced on livestock, it can lead to millions of deaths. For instance, the United Kingdom experienced an FMD outbreak in 2001 which claimed the lives of 11 million livestock causing huge financial losses to those who depended on livestock farming. This outbreak was attributed to the illegal importation of meat. Furthermore, RVF can be introduced to a place through the dispersion of the virus to a major breeding ground for ruminants where such vectors as mosquitoes are plentiful. Mosquito carriers can spread the virus far and wide infecting multitudes of livestock. The major health impact of the virus is that it can end up in humans through the consumption of infected livestock. Bioterrorists can use such pathogenic organisms to undermine food security in an area of interest intending to cause hunger and great suffering to the occupants of such an area.

Invasive species can be one of the most effective bioweapons because in many cases, it is difficult to trace the perpetrator. This difficulty results from the general assumption that invasive species originates from natural disasters (Chomel & Sun, 2010). Besides, most investigations that have been conducted in the past concerning incidences of biological invasions have failed to come up with evidence suggesting the likelihood of deliberate human intervention. Preventive measures do not prioritize stopping future acts of bioterrorism but only focus on eradicating the species giving the perpetrators a chance to attack again and again. Thus, invasive species pose a serious threat if used by terrorists to advance their agendas.

Read also CJ451 – Suicide Bomber Justification – Criminology

Biological threats from WMDs terrorism can be highly disastrous to plants, animals and human beings with both immediate and long-term effects. WMDs mostly associated with biological threats are chemical and biological weapons although nuclear weapons cannot be excluded from the list (Curley, 2012). The use of chemical weapons is characterized by various chemical agents such as blood, blister and, nerve agents. Chemical agents are linked to numerous short-term health risks such as skin blisters, respiratory problems, paralysis, convulsions, and dyspnea amongst many others (Gosden & Gardener, 2005). Long-term health impacts include cancers, damage to reproductive and immune systems as well as blindness. On the other hand, bioweapons are used in form invasive species that may carry bacteria, toxins, or viruses (Gosden & Gardener, 2005). Such biological agents are catastrophic as they are highly infectious and can spread over a large area leaving a trail of casualties and deaths. The risks are grave in the absence of effective treatments or vaccines.

Read also An Analysis of the Civil War in Yemen – Law and Terrorism Final Paper

Still, on biological threats, WMDs can lead to the destruction of basic resources leading to devastating epidemiological impacts on numerous living organisms. The major primary natural resources that are prone to biological threats are air, water, and food (Gosden & Gardener, 2005). Air can be contaminated through various germs that are mostly used in bioweapons. For instance, the air that is contaminated with fungi can lead to widespread infections of healthy plants leading to numerous harms or permanent extinction of targeted plants. Subsequently, water is can be contaminated with various lethal agents which can cause serious injuries to aquatic life and humans. For example, water contaminated with a gram of the poisonous Clostridium tetani is capable of killing an estimated 8 million individuals within 6 hours. Furthermore, food represents one of the most effective techniques that can be used in WMDs terrorism especially in biowarfare. Various lethal food contaminants such as lead and aflatoxins can kill millions of people and animals within a few hours after consumption. Thus, biological threats of WMDs terrorism cannot be underestimated due to their life-threatening impacts through the destruction of fundamental resources.

Read also Role of International Non-Governmental Organizations in Combating Terrorism – Sample Research Paper

Past attacks have proven beyond a reasonable doubt that WMDs terrorism poses far-reaching biological threats to humans and their surroundings. For example, the Iraqi government once attacked its deviant civilians in Halabja with a mixture of nerve agents and mustard gas which left 5000 civilians dead and scores others with long-term bodily defects and diseases such as hematological malignancies, infertility, and tumors of the head and neck (Gosden & Gardener, 2005). Besides, some chemical agents such as nerve agents have been linked with lifetime health conditions such as cardiac arrhythmias, psychiatric and neurological disorders. Also, WMDs have been linked with blood cancers such as leukemia. It is documented that the victims of the Hiroshima atomic bomb attack in Japan have reported high leukemia cases after the attack (Gosden & Gardener, 2005). With the advancement of technology, there is a higher risk that terrorists might develop WMDs that can cause major biological threats to both living and non-living things. Besides, WMDs have proven the potential of wiping an entire population if used for malicious purposes, especially on non-armed civilians.

Read also Was United States Justified in Dropping the Second Atomic Bomb on Nagasaki?

Suicide terrorism is so far the most effective and lethal technique that has been used and tested by terrorists. From the definition of WMDs, the weapons are connected to either of two major consequences; mass deaths or multiple casualties. Thus, suicide terrorism fits the definition of WMDs due to its potential to cause many deaths and casualties at the same time. In other words, a suicide terrorist is equal to a WMD only that one is a living thing and the other is a non-living thing. Experts argue that suicide terrorism is by far the worst weapon used by terrorists because it is hard to detect a suicide terrorist than it is to detect an improvised explosive device (IED) (Horowitz, 2015). Suicide terrorism has been used in the past by terrorist and the consequences have been fatal. One of the most infamous acts of suicide terrorism happened in the U.S during the 9/11 attack that left more 2000 people dead and hundreds of others injured due to both direct and indirect impacts of the attack (Horowitz, 2015). From an inner perspective of WMDs terrorism, there is a high likelihood that suicide terrorists can advance to more lethal techniques such as injecting themselves with bioweapons such as highly contagious viruses and traveling to targeted to cause a pandemic.

Read also CJ451 – Female Suicide Bombers Discussion

To get a better understanding of suicide terrorism, there is a need to first investigate the logic behind suicide terrorism. The main reason for trying to get into the mind of a suicide terrorist is to know the underlying factors that motivate such individuals to sacrifice their lives. Various explanations have been developed to explain the motives behind suicide terrorism but the world is yet to come up with a standard explanation. While it is true that suicide attackers might be motivated by religious reasons, psychologists and experts provided a variety of arguments about the matter. Horowitz (2015) argues that suicide terrorism originated from the Liberation Tigers of Tamil Eelam (LTTE), a rebel group that fought for Sri Lanka’s independence between 1980 and 2001. During this time, suicide attacks amounted to 75 which is so far the highest number of attacks of a similar nature conducted by a single group. The motive of the LTTE attackers can be attributed to fighting for freedom because all the attacks were directed towards military targets unlike in Islamic group suicide attacks which are targeted to both government forces and unarmed civilians.

Some suicide bombings have been connected to economic motives. Psychologists believe that some terrorist organizations lure people into suicide terrorism on grounds that once they commit the offense, they shall be paid a lumpsum amount that will go to their next of kin. Potential candidates have been identified to be poor, uneducated, unemployed, or college/university graduates who have lost hope of getting a job (Horowitz, 2015). These groups of people are likely to be highly desperate to do anything that can ensure that their families are provided with basic requirements. Economic motives are used to refute the notion that suicide terrorism is perpetrated by Islamic believers. In essence, the main aim of the argument is indicating suicide terrorists come from a range of cultural and spiritual teachings provided that they are desperate enough to sacrifice themselves to better the lives of their next of kin.

While many explanations have been used to demystify suicide terrorism, it is quite essential to note that modern terrorism applies coercive logic. Crucially, it is a strategy meant to send a message to the target that there is no turning back until the demands of the terrorist are met (Horowitz, 2015). The first aim is to cause as many deaths as possible especially to innocent civilians to cause panic and fear among citizens and push the target government to heed to the requirements of the terrorist organization responsible for such attacks. Secondly, terrorist groups use suicide attackers to coerce the target based on the accuracy and fatality of the attack. A suicide terrorist is a reliable weapon because someone ready to die is likely to achieve a mission and cause the greatest damage possible (Horowitz, 2015). Moreover, suicide attackers can reach guarded targets as they do not require an escape plan. Thus, the main logic behind suicide terrorism appears to be coercive to intimidate the target to surrender.

In summary, WMDs have been proven to have catastrophic impacts when used against innocent or un-armed civilians. The weapons become even dangerous when they are used by terrorists or states that are allied to terrorists. Terrorists can go to the extent of introducing invasive species as bioweapons against the target. This weapon can be effective because it can cause great damage to its origin going undetected. Besides, WMDs terrorism is capable of causing biological threats that are disastrous to both living and non-living things. Moreover, suicide terrorism has the potential of advancing from the use of explosives to the use of WMDs. This possibility is evidenced by the coercive logic behind terrorism whose desire is to cause maximum harm to the target. Thus, there is a need to ensure that WMDs do not end up in the hands of terrorists and people of such caliber as it can be disastrous to the world.

Get Up 50% Discount on Your First OrderUp To 50% Off Your First Order Due in Less Than 48 Hours

Grab this first time Discount, and save up to 50% on your first Order Due in Less Than 48 Hours.