23 May 2022

460

Countering the ISIS/ISIL Threat

Format: APA

Academic level: College

Paper type: Annotated Bibliography

Words: 882

Pages: 3

Downloads: 0

Terrorism has existed across the world for quite a while and the United States has prepared itself well to defend against it. The September, 11th attack is one of the attacks that got the United States unexpected because terrorists used different tactics to strike. Since the attack, the United States has completely changed its national security systems. As the United States tried to fight the terrorist group responsible for the attack, other terrorist groups spawned such as the Islamic State of Iraq and the Levant (ISIL). To counter terrorism, the United States has to understand how terrorism works and how these specific groups operate. Therefore, this paper seeks to propose an appropriate counterterrorism and intelligence system that can be used and easily accessed by intelligence organizations. 

Understanding the threat

To defeat enemies, it is important to understand them. When America targeted al-Qaeda, the Islamic State of Iraq and al-Sham (ISIS) stepped up. The main goal of ISIS was to build an Islamic caliphate in the region that spans from Lebanon, Syria, Lebanon, and Jordan territories. Once it had secured these regions, it aimed to expound its control over all Islamic territories. ISIS also considers the US as a threat because of its influence in the Middle East. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Intelligence capability and assets

After reforming the Department of Homeland Security (DHS), the department has been better tailored to offer better defense for the security of the country. Currently, the United States has three intelligence agencies that generate actionable intelligence against terrorist groups. These agencies include the Federal Bureau of investigations (FBI), the National Security Agency (NSA), and the Central Intelligence Agency (CIA). The CIA conducts reconnaissance or operations in the field instead of using internet-based intelligence-gathering methods. It collects intelligence using Human Intelligence, engages in development and research. 

The NSA agency obtains important information used by the country and further channels it to other departments to use it. It relies on imagery intelligence and signals intelligence to offer a significant window for the nation to advance its activities and capabilities in foreign countries. Lastly, the FBI concentrates more on domestic terrorism as compared to international terrorism. The agency collects intelligence from other agencies and tracks any terrorist event or terrorist. It uses the FISINT and Communications Intelligence (COMINT)

Developing a Request for Intelligence (RFI)

Since terrorism has increased its recruitment through social media, it is important to form an advisory to inform responders on the appropriate recommendations to use to help them win the war on terrorism. The developed RFI will answer questions such as; Is ISIS staging any operations within the US? Or are there known ISIS members living in the US? 

Recommendations of DHS to the Law Enforcement Agencies

The recommendations of DHS should be obtained from current reports. The information distributed to law enforcement should be for official use and accurate. The Homeland Security Information Network (HSIN) has a communicative network that offers law enforcement officials to securely collaborate with other stakeholders across jurisdictional or geographical boundaries. For instance, most law enforcement agencies utilize HSIN in their operations to focus on narcotics smuggling, weapon smuggling, and mitigating gangs. 

Annotated bibliography of five academic references

ABC News. (2015, February 23) ISIS: Trail of terror. Retrieved from:  http://abcnews.go.com/WN/fullpage/isis-trail-terror-isis-threat-us-25053190 on 1st July 2021

This article offers comprehensive detail on ISIS. It examines the history of the group and their beliefs as well as their agenda. The article also touches on potential ISIS threats to the US and the attacks and deaths they have caused. It is a significant source for the assignment because its information comprehensively covers the most significant areas of the militant group.

Archick, K., Belkin, P., Blanchard, C., Humud C., & Mix, D. (2015, April 27). European fighters in Syria and Iraq: Assessments, responses, and issues for the United States (Links to an external site attached below.). Congressional Research Service, Washington D.C. Retrieved from:  http://www.fas.org/sgp/crs/row/R44003.pdf  on June 1, 2021

Archick et al. (2015) provide an overview of the US and European citizens that travel to Iraq and Syria to terrorist groups. It also examines the security measures and prevention measures to address foreign fighter threats. The article has also indicated steps to better combat possible threats on internal borders. This article is useful because it provides significant information that can be used in this paper. 

Blanchard, C., Humud C., Katzman K., & Weed, M. (2015, June 11). The Islamic State: Crisis and U.S. Policy. Congressional Research Service, Washington D.C. Retrieved from:  http://fas.org/sgp/crs/mideast/R43612.pdf on 1st June 2021

The article also explores the Islamic State background and the purpose as well as the intent of the ISIS militant group. It also elaborates on the political strives and influences that the group enforces to takeover. The article is insightful because it provides extensive perspectives on ISIS in politics and problems the US is having with the group. 

CNBC News. (2016). Obama to Send up to 260 more U.S troops to Syria. Reuters. Retrieved from  http://www.cnbc.com/2016/04/24/obama-to-send-up-to-250-more-us-troops-tosyria-to-fight-isis.html on 1st June 2021

The article is helpful because it creates an assessment of how the United States government is prepared to fight ISIS. The article also discusses the ISIS influence, its actions on horrific murders, and how the government combat terrorism.

Humud, C., Pirog, R., & Rosen, L. (2015, April 10).Islamic State Financing and U.S. Policy Approaches. Congressional Research Service, Washington D.C. Retrieved from:  https://www.fas.org/sgp/crs/terror/R43980.pdf on 1st June 2021

This article describes the background of ISIS and the things they do across the world. The article majorly covers the financial aspect of the ISIS group. It also explores the struggles of the group and the people that fund them. This article is a great source of information because it makes the reader know the other side of the issue and what the US government can do to weaken such groups. 

References

ABC News. (2015, February 23) ISIS: Trail of terror. Retrieved from: http://abcnews.go.com/WN/fullpage/isis-trail-terror-isis-threat-us-25053190 on 1st July 2021

Archick, K., Belkin, P., Blanchard, C., Humud C., & Mix, D. (2015, April 27). European fighters in Syria and Iraq: Assessments, responses, and issues for the United States (Links to an external site attached below.). Congressional Research Service, Washington D.C. Retrieved from: http://www.fas.org/sgp/crs/row/R44003.pdf on June 1, 2021

Blanchard, C., Humud C., Katzman K., & Weed, M. (2015, June 11). The Islamic State: Crisis and U.S. Policy. Congressional Research Service, Washington D.C. Retrieved from: http://fas.org/sgp/crs/mideast/R43612.pdf on 1st June 2021

CNBC News. (2016). Obama to Send up to 260 more U.S troops to Syria. Reuters. Retrieved from http://www.cnbc.com/2016/04/24/obama-to-send-up-to-250-more-us-troops-tosyria-to-fight-isis.html on 1st June 2021

Humud, C., Pirog, R., & Rosen, L. (2015, April 10).Islamic State Financing and U.S. Policy Approaches. Congressional Research Service, Washington D.C. Retrieved from: https://www.fas.org/sgp/crs/terror/R43980.pdf on 1st June 2021

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Countering the ISIS/ISIL Threat.
https://studybounty.com/250565-countering-the-isis-isil-threat-annotated-bibliography

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 142

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 62

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration