Saturday, July 27, 2019
Legal tools available at the local level to exploit terrorist Essay
Legal tools available at the local level to exploit terrorist activities - Essay Example All member states are collaboratively called for regionalized comprehensive and integrated regional implementation of counter-terrorism strategies (UN, 2012). As an implication, member states are expected to adopt the counter terrorism plan in for Central Asia and the development of institutional and technical capacities at their respective national territories (UN, 2012). This program includes capability-building to address the need for comprehensive analysis of needs for operational and administrative needs of institutions at the local level to help attain target goals. Margolis (2001) cited that one of the resources that can be exploited by terrorist organization is the media. He cited how Bin Laden optimized media for interviews to sow dissention and to articulate his causes against Iraq. Although his sentiments were not aired in American media but he leveraged by discussing his political position to Muslim-dominated communities to gain sympathy and to pour his political tirade against the United States and its allies. He was the first to laud and express satisfaction when the twin towers of New York fell into ruin.Moreover, Emerson (2011) have cited that terror groups have already produced its own publication to strategically attune itself in this information age and information technology advancement. Emerson (2011) also pointed that those who are info-technology savvy could launch hacking attacks to websites of their perceived enemies.With the advent of online social networking.... This program include capability-building to address the need for comprehensive analysis of needs for operational and administrative needs of institutions at the local level to help attain target goals. Margolis (2001) cited that one of the resources that can be exploited by terrorist organization is the media. He cited how Bin Laden optimized media for interviews to sow dissention and to articulate his causes against Iraq. Although his sentiments were not aired in American media but he leveraged by discussing his political position to Muslim-dominated communities to gain sympathy and to pour his political tirade against United States and its allies. He was the first to laud and express satisfaction when the twin towers of New York fell into ruin. Moreover, Emerson (2011) have cited that terror groups have already produced its own publication to strategically attune itself in this information age and information technology advancement. Emerson (2011) also pointed that those who are in fo-technology savvy could launch hacking attacks to websites of their perceived enemies. With the advent of online social networking, borderless communication and transnational access becomes possible. Department of Homeland Security (2010) pointed that in their study, terror groups can exploit alternative online media to spread propaganda, network operational guidelines, communicate with partners using online tools and chat rooms, and develop web-based database of information to sustain its ideological positions. DHS (2010) recorded that jihadist and mujahideen are increasingly utilizing facebook for propaganda, operational information, which include the distribution of menu about how to make improvised explosive device
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.