ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How Effective is the US Counterterrorism Strategy?

Updated on January 26, 2022
Nyamweya profile image

Nyamweya is a Kenyan scholar who has done many years of research on a diversity of topics.

Introduction

The United States indisputably criminalizes all manner of violence including those that are ideological, religiously or politically motivated. For the department of Homeland Security and all other security organs in the country, counterterrorism and intelligence to dismantle terrorist plots is a continuous endeavor. The short-term goal is to defeat terrorist organizations internationally using direct or indirect diplomatic, economic, military, intelligence, and, law enforcement power instruments. The long-term goal is to take a direct military action against target terrorists and undertake asymmetric actions that have indirect influences on making regional and global environments unfriendly to terrorism.

Strengths and Weaknesses of the Counterterrorism Strategy

The strategy facilitates multi-agency participation, such as the government and international agencies, to deter and respond to terrorist activities. It also enhances co-ordination between intelligence operatives and police officers nationally and internationally to counter terrorism. However, among the weaknesses of this approach is the strategy does not target encumbering domestic and international radicalization to thwart violent extremism from CIRA (Continuity Irish Republican Army) affiliates in the U.S. and globally. The strategy also appears to have failed to take consideration of the current rate of technological advancements globally, including the use of social media by CIRA. Currently, radicalization has become a vital terrorist threat in the United States, as the Internet is a vital source of terrorist ideology and recruitment of operatives. What is more, the defensive aspects of the strategy appear to be static and recommend protecting target areas and likely terrorist targets, and preparing on how to respond and recover from a terror attack effectively, yet does not focus on early identification of terrorists.

Effectiveness of the U.S Counterterrorism in Mitigating Terrorism

The counterterrorism strategy has effectively enabled the U.S. government to guard its homeland against terrorist and defeat terrorist abroad, yet failed to prevent the reemergence of CIRA extremists abroad and domestically. Further, the capability to identify linkages to other terrorist networks in the U.S. and internationally will lead to greater cooperation and transparency with the regional partners, such as the United Kingdom, in detecting and apprehending terrorists.

The suggested changes will drive a positive narrative regarding the U.S. war on terror, which will counter the CIRA resurgent radicalism messages that have inspired high levels of scheming against the U.S. It is expected that this will have a socializing effect, as it will create a greater understanding of the U.S. goals on and transparency with the U.S. global allies and partners. In effect, it will necessitate greater cooperation from the U.K. government.

b) Assessment

In specific, the benchmark that will be applied in determining the effectiveness of the Community-State Partnership on counterterrorism measures will be as follows:

a) The level of intelligence on terrorism, radicalization, and plots

b) Emergency Preparedness and Response on terrorism by members of the public

c). Strategic Communication

d) Risk analysis

e) Defending against threats

Recommendation

In order to enhance its effectiveness, the strategy should be integrated with an offensive element of a domestic counterterrorism strategy in the U.S. soil and offensive operations regionally and internationally. In addition, the U.S. domestic intelligence gathering methods should contain strategic elements that enable early identification of linkages to CIRA networks in the U.S. and internationally, and to come up with an inclusive evidential case that can lead to early arrests without contributing to in the community, which may have terrorist cells. It should ensure that local communities are prepared and able to identify terrorists, respond fast and recover from terror attacks.

What the regional fusion center will need, in terms of tools, resources, and training, to implement these changes

There are various things that will be needed in the fusion center in order to deal effectively with terrorism activities. Among these include training of the first responders: The first responders, in this case, the local communities, require training on how to identify terrorists as well as and information on how to respond or alert the law enforcement agencies. There is also need for extensive investments in border security capabilities and technology, and information sharing technologies with the local communities. Furthermore, training on anti-CIRA messages to counter pro-radicalism narratives would be paramount. Finally, the center requires massive investment in surveillance technologies in the homeland.


The media will be used to counter CIRA ideology so as to prevent the spread of radicalism, which the terrorist groups propagate through the media. The media will be used to disseminate information to the local communities on how to identify suspected terrorists and to alert the law enforcement agencies. The media will be used to improve communication with local communities in the domestic market regarding the new terrorist tactics and how they can frustrate those tactics.


working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)