Transitional Organized Groups and Terrorism
Comparing Terrorism Groups to TOC Groups
Transitional organized crimes and terrorism are a global menace. Many countries in the world from the United States, Britain, and Kenya amongst others have suffered from terrorism or acts of terror. There is less consensus in defining terrorism but in simple terms, it is the systematic or threatened use of violence or acts of violence to intimidate people and governments. Transitional organized crime on the other hand is illegal self-perpetuating affiliations of individuals operating with the purpose of gaining influence, monetary gains and power (Stewart, 2002). There are some notable similarities and outright differences between them. Areas of intersectionare that first, both operate in the same circle outside the law and often require same resources to operate. Secondly, both pose as a threat to any country that opposes their ideas and other “friendly” states or nations. Third, both tend to defy the rule of law and the state in general unless there is some state sponsorship to such groups. Fourth, both groups tend to be extremely innovatory, adaptive and resilient in nature. Fifth, both have members recruited on regular basis and swear allegiance to their leader and an attempt by an individual to leave the group is rare and oftentimes fatal. Sixth, both have next in line leaders. If the overall leader is killed, captured or otherwise, there is always a person who is second in command.Another similarity is that both employ uttermost violence or threats of violence such as assassinations, kidnappings and extortion. In addition, both tend to operate in secrecy unless they are in a friendly region that supports their agendas (Thomas, 2004). However, there are some areas of divergence between them. For instance, terrorist groups seek regime disruptions and political recognition while organized groups pursue favorable environments to operate. Secondly, politically and practically, terrorist groups often seek media attention unlike organized groups that try as much as possible not to attractmedia coverage. In addition, terrorist groups often claim responsibility of carrying out certain actions unlike organized groups, which at most times do not claim any responsibility. While terrorist groups are mainly inclined towards religious and ideological beliefs, organized groups operate independent of such (Thomas, 2004).Terrorism therefore is of more concern as it remains the number one enemy to many countries. It spares nobody irrespective of nationality, race, ideology, religion amongst others.
. Financing of these groups involve soliciting of funds with an intention of supporting acts of terror or violence. Financial support for terrorism mainly comes from the state, multi-national companies, financial institutions amongst others. For instance, charities are attractive to terrorists as they are cash incentive and some operate globally with international money transfer systems able to fund terrorists. Secondly, legitimate businesses that do not require much paperwork may finance terrorists.
“Intelligence and Counterterrorism”
An official in a high rank in a federal agency that is involved with activities related to intelligence and counterterrorism activities would be required to observe independence in the roles played. Some of the roles that such organization play include investigating on suspected terrorists. They use intelligent means to reach them, thus are able to curb their terrorist acts. They also finance those sub agencies that help them access information about terrorists and TOC groups. These roles were known to me concerning the agency However, terrorists use their proceeds to propagate harm and cause death as opposed to those of organized groups meant to ensure that a certain status quo prevails. Both have different financial practices as organized groups seek profits unlike terrorist groups whose main aim is to harm people (William, 2012). The importance of intelligence and counterintelligence in fighting terrorists is that the agencies are able to be successful in reaching them, thus no wastage of resources, where much would be invested without any success. This helps in economic growth of countries as their security is free and not under any threat.
“Weapons of Mass Destruction”
The biggest concern in regard to nuclear weapons is the harmful and dreadful effects they have on the future generations. These weapons, when used, leave marks that are visible for years. They destroy body tissues and thus some of the genes that carry certain traits are eliminated. When a person affected by these weapons reproduces, they give birth to children without the respective traits as well as body parts and tissues. Biological weapons also are harmful to the body and damage body cells. Chemical weapons on the other hand, have harmful rays in them that lead to damage to the body tissues. Such rays include the gamma rays, which are so destructive to the cells. Information sharing and technological advancements has expanded significantly in all levels of government with an aim of responding to acts of terror. In the United States for instance, information sharing cuts across business and all levels of government as relevant data captured regularly is availed to authorized personnel at any time. State-of-the-art technology has made it possible for information exchange with other relevant partners easily accessible. Crime statistics, secure communications, automated fingerprints, gun purchase background amongst others are readily available. Therefore, regional information sharing, national data exchange, crime information center among others helps in the fight against these groups (William, 2012).
A leader in a terrorist organization faces some deterrents in using mass weapons for destruction. For instance, the organization may face some financial challenges in making of these weapons and thus not able to have the weapons at their disposal for their use. Another factor is inappropriate skills to make and handle the weapons. Most of the terrorists are young people who are trained and in the training, there might be a mistake somewhere thus would involve the terrorists following the wrong directions. They make end up taking a wrong direction in both handling and making the weapons. These are the principal deterrents because they are the factors that determine whether attacks organized by the organizations will succeed or not.
“Containment and IR Strategies
It is important for a business to have processes and strategies to manage potential risks. This is because it will ensure that once a risk occurs, the business will continue to be in operation and will not close. This is because the management would have been prepared for the risk and mitigation plans enacted. It also ensures that employee are not laid down and thus their confidence is evolved thus good yields are realized. The business will be able to plan for future occurrences and thus will include on its costs ascertainment the risks, thus able to estimate profitability levels. In addition, there is need for governments to focus on organized groups, as they are “home-grown” terrorists. Terrorism remains the number one priority but groups that can take arms against a society needs to be watched. Such groups evolve and may change to major terrorist groups that can cause widespread harm to people across the divide.
Lack of planning is a pitfall for any strategy because it will not be possible to identify the risks that could occur to an organization. It is through planning that a business owner is able to assess risks and thus mitigation measures into consideration. Levels of risks are thus identified. With the levels known to them, they will be able to use some strategies that could raise the profitability in future, which would not vary too much. Without planning, the organization would not be able to determine the necessary procedures to handle the risks. The organization is thus point at risk and not able to prepare for any risks that could occur.
“SIEM and Incident Response”
SIEM solutions are important in combating terrorism. Information sharing and technological advancements has expanded significantly in all levels of government with an aim of responding to acts of terror. In the United States for instance, information sharing cuts across business and all levels of government as relevant data captured regularly is availed to authorized personnel at any time. State-of-the-art technology has made it possible for information exchange with other relevant partners easily accessible.
Two of the tools to be used is the use of the golden hour that involves responding to a problem at the time it occurs. With this tool, an organization is required to be always prepared for any risk that could result. Use of disaster recovery is another tool. This involves laying strategies to help an organization recover after it has been affected by a certain problem or risk. In a market setting, the use of the disaster recovery would be the most preferred tool. This is because there are many businesses that are involved and thus, recovering would be the most important issue t consider to ensure that the business does not collapse.
“Encryption in Investigations”
Crime statistics, secure communications, automated fingerprints, gun purchase background amongst others are readily available. Regional information sharing, national data exchange, crime information center among others helps in the fight against these groups. The golden hour is not an appropriate tool because a certain terrorist activity may befall a country when she is in a financial crisis, so there is a need for a pre-plan approach towards terrorism.
“e-Discovery in Action”
Countries and agencies may not be prepared for terrorists acts and other risks because of insufficient funds to support any planning that is essential. In addition to this, they may lack the technology required in effective preparing for the risks. The reason why this may happen is that most countries may not be cooperative to combat terrorism and thus some countries hide details of terrorists that could be inhabiting them. This probes some problems for the willing country to prepare for such risks, as they are unable to have enough details about the risk. Organizations and agencies may also lack finances thus not able to prepare well for risks.
Among the seven recommendations, disaster recovery is the best, as it will help a country set some funds aside for any risk that may arise. This is because it will a business lay means that it will use to ensure that it continues to operate in the market. This is important because the tool will ensure that the business owner continues to receive some income thus, earning of revenue will not stop. In short the business will not collapse, thus the owner will not concentrate on the ways to uplift the business.
“DR…What Is It Good for?”
The five concerns about disaster recovery in this context would be the issue of taking an insurance cover for the business owner as this will help in reducing the loss suffered if the risk occurred again. The other concern is the mitigation of the risk by the business owner, which would include seeking professional advice from other business people who have been in the field and have succeeded. The third one would be expanding the market for the products sold probably by opening other businesses in other places, to maximize sales to recover the lost finances. The fourth concern would be the planning approaches the owner intends to use to assess any risks that could affects the business. This would ensure that he or she has used to right approaches to prepare for the risks. The last concern would be about the sources of finances that the owner intends to use for the new business. This would ensure that appropriate means are used; means that would allow him or her to accumulate enough funds to repay, now that the previous businesses is gone.
The main points that would be used to convince the Board of Directors on the necessity and importance of a plan would be the elements of cots that would be saved. The plan would help in reducing costs of mitigating risks as only the material risks would be outlined. The rest of the risks would be ignored because of their immaterial characteristic. The plan would also act as a training basis on the staff to mitigate the identified risks. This would improve yields in the organization such as high profitability.
“Preparing for Different Disasters”
Different disasters would be prepared for by organizations in different ways. For instance, loss incurred from earthquakes would require disaster recovery planning different from loss from floods. However, the two risks could be insured against and are accepted by various insurance companies. An organization would recover from loss from a flood by shifting to another location that is floods free but it would not be definite to change location to avoid earthquakes. Therefore, earthquakes recovery disaster would involve technical approaches such as fixing lightening arresters to carious buildings where businesses are situated.
The report structure and the organization would help achieve the goals for overall efforts in a disaster. This s because in the report, costs to be incurred would be outlined. In return this would be a strategy to determine the sources of finances to handle the disaster. Outsourcing therefore would be considered and thus, good results in managing the disaster would be realized.
“Cybercrime and Terrorism”
The most important goal for protecting the national security interests is to protect the economy of a country. Once hard hit by terrorist attacks, a country is forced to close most of its industries, which tend to be the main target by terrorists. The standard of living hikes, making things worse, follows this. In addition to this, a country is forced to fix heavy deficit budgets by borrowing to recover. This takes long periods and thus less development. Internet would be used to track terrorists in that it could be used to access any information from various groups that they post on various websites.
As a leader in a terrorist organization, I would use the internet to view information about various countries that the organization would be targeting. The kind of information that I would expect to find would include the strategies that they would be planning to attack terrorists and would use it to find out how the organization would escape their attacks. One of the uses that would be catastrophic include using the information about how they would prepare nuclear and chemical weapons to attack the countries themselves.
Terrorists get their funding in a different manner. For instance, they use kidnapping, hijackings and extortion as means of soliciting for funds. In addition, majority of them deal in illegal activities in order to raise funds. Terrorists also channel the money they get to other businesses better known as money laundering. As postulated, funding is what keeps such groups in operation. However, terrorists use their proceeds to propagate harm and cause death as opposed to those of organized groups meant to ensure that a certain status quo prevails. Both have different financial practices as organized groups seek profits unlike terrorist groups whose main aim is to harm people.
Money collected in these kinds of businesses could find its way to the hands of terrorists as it becomes difficult to verify sales reported and actual sales made. Self-funding is another source that provides money to terrorists. Internal sources such as family, friends, relatives and other non-criminal sources funds terrorism. In addition, funds from criminal proceeds such as insurance fraud and credit card fraud amongst others may fund terrorists. However, organized groups get their funding differently. For instance, they use kidnapping, hijackings and extortion as means of soliciting for funds. In addition, majority of them deal in illegal activities such as drug trafficking to raise funds. Some organized groups also channel the money they get to other businesses better known as money laundering. As postulated, funding is what keeps such groups in operation. Organized groups mainly get their funds internally as opposed to terrorist groups.
Stewart, G. B. (2002). Terrorism. San Diego, Calif: Kidhaven Press.
Thomas, M. (2004).Transitional terror and organized crime: blurring the lines.New York: Longman.
William, F. (2012).Combating transitional organized crimes.Washington: Washington U.P.