US Intelligence to Prevent Terrorist Attacks Coursework

Exclusively available on Available only on IvyPanda® Made by Human No AI

Terrorism is one of the major challenges of the contemporary globalized world. Developed countries (especially the USA) are often primary targets of terroristic attacks. Apart from international terrorism, the USA faces various issues related to home-grown terrorism. The US officials pay much attention to the terrorism-related issues, and the use of intelligence is often seen as one of the major ways to prevent it or mitigate its threats and outcomes (Woocher 49).

Terroristic attacks are associated with a heavy toll and significant destruction. Importantly, terrorism often achieves its major aims and intimidates Americans. Prevention of terroristic attacks is essential, and the focus on home-grown terrorism is essential as the increase of extremism in American society can have a detrimental impact on the development of the nation. American society consists of diverse groups that may have different cultural and ethnic roots but can share major democratic principles.

One of the consumers of intelligence can be the Homeland Security Advisory Council (HSAC) that focuses on various issues including home-grown terrorism. This consumer will utilize intelligence to detect malicious activities and prevent terroristic attacks. The agency launches various programs that involve the community, which translates into various successful operations concerning the prevention of terroristic attacks. For instance, cautions undertaken in Fort Dix (New Jersey) helped identify a network of terrorists who planned to attack US military personnel (Carter and Carter 147). Apart from detection and prevention, the consumer can also use intelligence to come up with effective strategies and changes in the corresponding policies. This outcome is as important as prevention since it affects the way the issue is approached on a nationwide scale.

The use of intelligence can be divided into six basic steps: planning and direction, data collection, data processing and collation, data analysis, dissemination and reevaluation (Carter and Carter 141). The first stage is planning and direction that defines the methodology and major paradigms of the entire process. This stage involves the analysis of existing methods and the ways to incorporate new tools and strategies. For instance, the strategy involving the use of Suspicious Activity Reports (SAR) is a bright example of the process. First, the program of the reporting was developed. Data were collected (reports from the community and local law enforcement agencies).

The information obtained was then analyzed and disseminated. The successful operation that resulted in the identification of a terroristic network and prevention of the terroristic attack was one of the outcomes of the new program. These successes, as well as failures (if any), are analyzed and reevaluated. An effective policy us often a result of this effort.

Finally, it is possible to note that the issue in question (home-grown terrorism) represents an application of intelligence. Moreover, this issue can be regarded as one of the most vivid illustrations of the use of intelligence. A network of agents who can be anyone provides valuable information concerning a variety of issues. Importantly, the community is involved, which enables law enforcement agencies to obtain a vast pool of data. One of the major difficulties associated with intelligence as regards this issue is the overwhelming amount of data to be analyzed. At the same time, the effort invested is important as it results in the detection of terroristic groups or individuals and often prevents terroristic attacks that could have a detrimental impact on the development of the US society.

Works Cited

Carter, Jeremy G., and David L. Carter. “Law Enforcement Intelligence: Implications for Self-Radicalized Terrorism.” Police Practice and Research 13.2 (2012): 138-154. Print.

Woocher, Lawrence. “A Smart Use of Intelligence: Preventing Genocide and Mass Killing.” Georgetown Journal of International Affairs 11.2 (2010): 43-50. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 13). US Intelligence to Prevent Terrorist Attacks. https://ivypanda.com/essays/us-intelligence-to-prevent-terrorist-attacks/

Work Cited

"US Intelligence to Prevent Terrorist Attacks." IvyPanda, 13 July 2020, ivypanda.com/essays/us-intelligence-to-prevent-terrorist-attacks/.

References

IvyPanda. (2020) 'US Intelligence to Prevent Terrorist Attacks'. 13 July.

References

IvyPanda. 2020. "US Intelligence to Prevent Terrorist Attacks." July 13, 2020. https://ivypanda.com/essays/us-intelligence-to-prevent-terrorist-attacks/.

1. IvyPanda. "US Intelligence to Prevent Terrorist Attacks." July 13, 2020. https://ivypanda.com/essays/us-intelligence-to-prevent-terrorist-attacks/.


Bibliography


IvyPanda. "US Intelligence to Prevent Terrorist Attacks." July 13, 2020. https://ivypanda.com/essays/us-intelligence-to-prevent-terrorist-attacks/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1