Abu Sayyaf is still a big threat to the United States, it has roughly 200-500 members based out of the southern Philippines. Here in the United States the FBI is still tracking 3 of the main organizers of the Abu Sayyaf organization and the organization has made comments that have stated they want to fight the United States and it is strongly believed that given the opportunity although they are a small organization they will in fact take a huge leap at harming American citizens by means of bombing, extortion, assassinations, beheadings and what they are notorious for the most is kidnappings.
A spokesperson for the organization has stated, that “We have been trying hard to get America because they may think we’re afraid of them.” He added “We want to fight American people”. With that one statement I can foresee the Abu Sayyaf Group (ASG) as a threat to the United States especially since they’ve been known to have ties with the Al-Qaeda organization and as history has shown the Al-Qaeda network is very well structured, organized and resourceful. The United States Department of State has added the ASG to the list of Foreign Terrorist organizations. In 2002, while fighting in Operation Enduring Freedom (Afghanistan) we started fighting the Abu Sayyaf group along with other terrorist organizations in part by the U.S. War on Terror. The FBI is currently looking for Raddulan Sahiron and has put a reward of up to $1 million for information leading to his arrest. As of November 2012 he is believed to be the leader of the ASG and is currently living in the area of Patikul Jolo, Sulu, Philippines. The FBI is also looking for Isnilon Totoni Hapilon and offering upwards to $5 million directly leading to his apprehension or conviction. He all...
... middle of paper ...
...e/magazine/article/0,9171,501040830-686107,00.html (accessed FEb 14, 2014).
FBI. FBI Most Wanted Terrorists. n.d. http://www.fbi.gov/wanted/wanted_terrorists (accessed Feb 16, 2014).
NEWS, BBC. Fresh fighting in S Philippines. Sept 7, 2006. http://news.bbc.co.uk/2/hi/asia-pacific/5322680.stm (accessed Feb 15, 2014).
Program, Intelligence Resource. Abu Sayyaf Group (ASG). n.d. http://www.fas.org/irp/world/para/asg.htm (accessed Feb 16, 2014).
Relations, Council on Foreign. Abu Sayyaf Group (Philippines, Islamist separatists). May 27, 2009. http://www.cfr.org/philippines/abu-sayyaf-group-philippines-islamist-separatists/p9235 (accessed Feb 17, 2014).
Terrorism, MIPT. "Abu Sayyaf (ASG)." Sept 20, 2006. (accessed Feb 15, 2014).
University, Stanford. Abu Sayyaf. n.d. http://www.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/152 (accessed Feb 18, 2014).
In that alert, the FBI warned law enforcement agencies and the public to be on the lookout for 18 suspected al Qaeda operatives, most from Yemen, who are planning an attack against U.S. interests. Al-Hada's name was not on the terror alert.
Chapter 1-3 showed the beginnings of homeland security and the expansion and growth of Homeland Security. Chapter 4 shows the actions of homeland security, and the steps they take toward a problem to access it. The DHS above all needs to realized and understand how to address an attack quickly and efficiently, and have counter measure put into place beforehand. The DHS must be able to access the risks of any situation, and must decipher the potential hazard the situation could cause. When looking at the many functions of the DHS, nothing could be more important than the ability to understand or hinder or stop an attack man made or not. First Homeland Security studies the nature of the risk; this means that they study what is likely to happen in a certain situation. The texted explains risk as what can go wrong. A cigarette smoker takes a risk every time he lights up, and everyone take a risk when getting into a car. The DHS takes what they know from prior circumstances to determine the reality of the risk; the department must also anticipate any attack even without prior knowledge to the circumstance. The main questions of risk assessment are easy to understand, questions like will people be injured or harmed. But when looking at chapter 1 which asks the reader to look further into why terrorist commit terrorism, that’s when its easier to see the DHS skill at risk assessment. For example if you understand that a terrorist attack could be coming from radical Islamist terrorist; then you would understand a risk by understanding their motive behind the attack like their religious holidays. The DHS uses a three-fold method for risk assessment and they are threat, vulnerability and consequence. The Rand organization uses th...
The general topic for this literature review will be an examination of the Department of Defense and the National Guard in terms of Homeland Security. The areas of Homeland Defense and Civil Support will be primary subsections of Homeland Security which will be reviewed. For purposes of defining a time period none of the literature reviewed will be prior to September 11, 2001. The reasoning for this being to examine Homeland Defense using literature pertaining to 9/11 and the Boston Marathon Bombing, and Civil Support using literature pertaining to Hurricane Katrina.
In The National Security Strategy of the United States of America, George W. Bush begins by introducing the change in the United States government’s strategy from deterring terrorism and rogue states to a preemptive strategy by acting early before the national security of the United States or its allies is under immediate threat. Through making a reference to the conflict between liberty and totalitarianism in the twentieth century and how it ended in the victory of the forces of freedom, Bush emphasizes that the twenty-first century is a time where human rights and political and economic freedoms are the basis to guarantee future prosperity in countries that share the same principles of liberty. Bush also points out that the Unites States
The terrorist threat posed to United States (U.S.) interests within the Horn of Africa (HOA) is represented by one terrorist organization in particular, al-Shabaab. Areas of concern towards key strategic interests for the U.S. consist of armed conflicts, violent extremism, global trade, and maritime security in which al-Shabaab possess an influential capacity to disrupt, which effects political, economic, and social stability throughout region. As countries within the HOA continue to gain strategic importance to U.S. interest and policy makers, al-Shabaab and the various entities they collaborate with affect the stability of the region and remain a prevalent threat.
...spread cells, and gaining support, and constantly evolving employment of technology, it continues to thrive. Friendly forces continue to gain knowledge about the Al Qaeda in efforts to bring the organization down and prevent further implementation of chemical or biological warfare.
The integrated threat theory model consists of four types of threats that can lead to prejudice. These threats are: realistic threats, symbolic threats, intergroup anxiety, and negative stereotypes. Realistic threats are posed by the outgroup and have several types of consequence and impact. They can either be threats of war, threats to political and/or economic power of the ingroup, and threats to physical and/or material well-being of the ingroup and its members. Symbolic threats is usually based on perceived group differences in morals, values, standards, beliefs, and attitudes. Symbolic threats are also threats to the ingroup’s worldview and these threats arise because the ingroup believes that its system of values are morally correct.
...as the actions of the United States government goes unnoticed, they will continue to infiltrate, disrupt, and terrorize any organization, or person that pose a threat to them.
...itely evolved into a feared organization. The fear that Al Qaeda causes today, is exactly what bin Laden had wanted. America as a nation should stand up to terrorists and show them that we will not consent to their needs.
In the post Osama bin Laden era al-Qaedist ideology is flourishing across the Arab world. A significant development has been the rise of al-Qaeda offshoots in the Middle East. The Abdallah Azzam Brigades franchise has increasingly become a noteworthy actor in terrorism. On May 8th, 2012 Thomas Nides, Deputy Secretary of State designated Abdallah Azzam Brigades as a foreign terrorist organization (Nides, T.R. , 2012). Abdullah Azzam Brigades may have only recently been added as a foreign terrorist group; nevertheless the organization has deep roots, lethal capacity, and is capable of contributing to supplementary instability in the Middle East.
On Sep 11, 2001, al Qaeda threatened the United States (U.S.) national security, and we are still combating terrorism. Since that time, al Qaeda and other extremist groups have also been endangering some of the U.S. allies. Realizing the magnitude of this international fight, the U.S. needs help from its partners to counter violence worldwide.
In Threat Vector, by Tom Clancy and Mark Greaney, Campus operatives, which include the main protagonist Jack Ryan Jr., are assigned to assassinate different targets to each individual. However, all four of the operatives, Jack Ryan Jr., Dominic Caruso, Sam Driscoll and Domingo Chaves, have been identified, and Jack seeks to destroy the trace by destroying the hard drive in the computer. In China, President Wei Zhen Lin is suffering from an economic recession. He was close to suicide from his arrest, but Chairman Su Ke Qiang prevented him from being arrested. Su’s “savior” status was only the beginning to the plan of China taking back Macau, Hong Kong and Taiwan. With the help of Dr. Tong Kwok Kwan, the head of Chinese cyberespionage and cyberwarfare, they would be able to take those main
Terrorism is not a new concept and although the treat has been highlighted by the events of September 11th, there has been a history of terrorism in America leading as far back as the establishment of the country. Although the proverb of “one mans terrorist is another mans freedom fighter” can be true on certain accounts, there is a distinction. The CIA uses a definition outlined by Title 22 Section 2656f(d) of the US Code, which states, "terrorism means premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents ” (2013). This definition has two important aspects, politically motivated violence and the targeting noncombatants. These two aspects address the motive and methods of a terrorist organization. Through the understanding of this definition it becomes clear that organizations like Al-Qaeda are ...
Within the world today, there are many organizations with varying opinions about specific ideals. But some of the organizations will take things to the extreme, and will do almost anything to prove that their view is the right one. This extreme act to further an objective is known as terrorism, but what exactly is a formal definition of terrorism? Frank Schmalleger defines it as “[a] violent act or an act dangerous to human life, in violation of the criminal laws of the United States or of any state, that is committed to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives” (Criminal Justice Today, 2013 p.560). The American way of life and other aspects such as policy and the criminal justice system have been impacted by terrorism in many ways over the course of the twenty first century.
National security in the United States is extremely important and requires extensive risk management measures including strategic, exercise, operational and capability-based planning, research, development, and making resource decisions in order to address real-world events, maintain safety, security and resilience (Department of Homeland Security [DHS], 2011). The national security and threat assessment process consists of identifying the risk and establishing an objective, analyzing the relative risks and environment, exploring alternatives and devising a plan of action for risk management, decision making and continued monitoring and surveillance (DHS, 2011). Identifying risks entails establishing a context to define the risk, considering related risks and varying scenarios, including the unlikely ones, which then leads to the analysis phase; gathering data and utilizing various methodologies and analysis data software systems to survey incidence rates, relative risks, prevalence rates, likelihood and probable outcomes (DHS, 2011). These two key phases lay the foundation to explore alternatives and devise action plans. Threats, vulnerabilities and consequences (TCV) are also a key component of many national security risk management assessments because it directly relates to safety and operation capabilities, but the text stress that it should not be included in the framework of every assessment because it is not always applicable (DHS, 2011).