Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
There are various terrorist organizations and types of terrorism. Suicide bombing and assassination are two among them. Cyberterrorism is one of the most recent variations of this crime as a result of the development of technology (Anonymous, 2010). It involves using the internet to commit terrorist attacks. This essay’s analysis of domestic security will place a strong emphasis on cyber terrorism. In order to achieve this, the author will examine how the US armed forces uphold domestic law as well as the function of several federal agencies in preventing this kind of crime. Finally, the author will provide a commentary on a recent example of cyber terrorism.
According to Merutka (2013), “The armed forces have always engaged in domestic law enforcement” (p. 23). The armed forces, such as the military, support civil law enforcement agencies, such as the police, in combating acts of terrorism in the country. There are recent examples where the military has been called upon to help investigate and deal with cases of terrorism against American targets. A case in point is the bombing during the Boston Marathon on 15th April, 2013 (Federal Bureau of Investigation, n.d.). Two bombings were reported during the event. The explosions led to the death of 3 persons. In addition, more than 180 persons taking part in the marathon were injured. The armed forces were called in to help the local police deal with this scenario, especially considering that the event was attended by people from different parts of the world.
Another case where the armed forces were involved in domestic law enforcement as far as terrorism is concerned is the pipe bombing on 17th September, 2016 (Federal Bureau of Investigation, n.d.). The pipe bomb exploded at site where a Marine Corps’ Benefit Run was to take place. The authorities treated the event as a terrorist attack, especially considering that several other unexploded devices were discovered from dustbins around the site (Department of Homeland Security, n.d.). There were no injuries reported in this case. The reason is that the organizers of the race had delayed start of the 5 kilometers event. Considering that several members of the country’s Marine Corps were to take part in the event, the authorities could only assume that they were the target of the terrorist attack. Consequently, the armed forces were called upon to investigate the matter.
The FBI is perhaps one of the agencies featuring prominently in the fight against terrorism in the US. To this end, the federal agency has a department that is specifically charged with the responsibility of investigating and dealing with threats of terrorism in the country. The Counterterrorism Division (CTD) is charged with the responsibility of collecting intelligence on terrorist threats within the borders of the country (Federal Bureau of Investigation, n.d.). The department also collects intelligence on terrorist groups within and outside the US. The significance of this division came to the fore after the 9/11 attack against America (Hughes, 2011).
Biological and chemical terrorism are a major threat to the security of the United States. The Centers for Disease Control and Prevention (CDC) has been charged with the responsibility of coming up with policies touching on emergency preparedness and response in case of a biological or chemical attack against the country (Hughes, 2011). A case in point is the 2000 CDC Strategic Plan for Preparedness and Response.
According to Haddal (2010), the Border Patrol agency is charged with the responsibility of ensuring that terrorists and weapons that can be used in terrorist acts do not find their way into American soil. To this end, the agency controls all major entry points to screen visitors and cargo in order to safeguard the welfare of the American public (McNeal, 2008).
The Ferizi Case is one of the most recent instances of cyber terrorism in the US (Federal Bureau of Investigation, n.d.). Ardit Ferizi, a Malaysian resident born in Kosovo, was charged in late 2015 for the offenses of terrorism and hacking. The Justice Department argued that the man hacked into government databases and stole data on US service members. He passed the same information to the ISIS group. The aim was to help the terrorist group organize attacks against American targets.
Operationally, the government has made efforts to address cyber terrorism by training its employees and the public on the importance of protecting their personal data. Legislatively, a number of laws have been passed to address the threat of cyber terrorism (Hughes, 2011). A case in point is the Cyber Security Act of 2012.
Terrorism has become a major security concern in the US and other countries around the world. Terrorist groups captured the attention of world governments especially after the attack on American soil on 9/11. The aim of the groups is to attain political, religious, and ideological goals. They carry out different forms of terrorist acts, including cyber terrorism.
Anonymous. (2010). Cyberterrorism: The invisible threat stealth cyber predators in a climate of escalating risk. Foreign Affairs, 89(6), 1-7.
Department of Homeland Security. (n.d.). Active shooter preparedness. Retrieved from https://www.dhs.gov/active-shooter-preparedness
Federal Bureau of Investigation. (n.d.). Active shooter resources. Retrieved from https://www.fbi.gov/about/partnerships/office-of-partner-engagement/active-shooter-resources
Haddal, C. (2010). Border security: The role of the U.S Border Patrol. Retrieved from http://www.fas.org/sgp/crs/homesec/RL32562.pdf
Hughes, G. (2011). The military’s role in counterterrorism: Examples and implications for liberal democracies. New York: U.S Army War College.
McNeal, G. (2008). Cyber embargo: Countering the internet jihad. Journal of International Law, 39(3), 789-826.
Merutka, C. (2013). Use of the armed forces for domestic law enforcement. The United States Army War College.
Hire one of our experts to create a completely original paper even in 3 hours!