The FBI and the Department of Homeland Security are among the government agencies that strive to safeguard the United States. Domestic terrorism is one of the greatest challenges that these agencies have focused their efforts on. The FBI has particularly revamped its efforts and systems to ensure that home-grown terrorists are not successful in their attempts to compromise the national security. The American military also plays a vital role in keeping the country safe. The military may be invited to support the other security agencies in tackling terrorism and other security threats.
Role of the military
Timothy Thurston explores the role of the military in combating domestic terrorism. He argues that the military should never take center stage. Instead, it should play a supportive role. It should help civilian police agencies in their counter-terrorism efforts (Thurston, 2007). He argues further that the military should only be deployed when their participation is absolutely required. He encourages governments to empower civilian security agencies to tackle domestic terrorism. Thurston adds that the military lacks the training needed to effectively respond to domestic terrorism (Thurston, 2007). This hinders its effectiveness. The argument that Thurston raises is indeed sound. While the military is important, its involvement in security operations should be limited to defense operations. Civilian police should spearhead counter-terrorism operations because this boosts their capacity to contain domestic terrorism. Police officers are best placed to tackle domestic terrorism as they have received training and this function is squarely in their docket.
Delegate your assignment to our experts and they will do the rest.
Counterterrorism responsibilities of FBI, CDC and US Border Patrol
The FBI, Centers for Disease Control and Prevention (CDC) and US Border Patrol are among the agencies that are involved in counter-terrorism. Investigating attacks after they have occurred is one of the responsibilities of the FBI (Laub, 2017). The investigations enable the FBI to obtain insights that are used to prevent attacks. Pre-empting attacks is yet another role of the FBI (Laub, 2017). The agency routinely monitors terrorists and suspects to ensure that they do not carry out attacks. Intelligence gathering and training agents are the other roles that the FBI performs as it participates in counter-terrorism efforts (“The FBI’s Counterterrorism”, n.d). Unlike the FBI which plays an active role in counter-terrorism, the CDC’s mandate mainly involves providing medical assistance after an attack has occurred. The CDC seeks to safeguard the health of the American people through partnerships with local, state and federal agencies. Should the US suffer a terrorist attack involving a nuclear or radioactive agent, the CDC is prepared to minimize harm and deliver medical services (CDC, 2016). US Border Patrol is another agency whose role in keeping the US safe cannot be overstated. In relation to counterterrorism, this agency is primarily involved in screening people entering the United States through such entry points as airports and ports (DHS, 2015). As it does this, the agency guarantees that no individual who poses a threat to the US enters the country. The US Border Patrol also works with other security agencies to combat terrorism (DHS, 2015). Thanks to these partnerships, the agency is able to pass on intelligence to its partners.
Cyberterrorism
The origins of cyberterrorism can be traced back to the 1990s when remarkable advances were made in the development of the Internet and computer technology (Littleton, 1995). Malicious software was developed and used to infect computers. This is what cyberterrorism means in its basic form. With time, the definition of cyberterrorism has been broadened to accommodate other acts. Today, cyberterrorism refers to acts committed in cyberspace that are intended to disrupt how the cyberspace functions. While cyberterrorism targets the cyberspace, its effects can be felt in the real world. For example, recently a ransomware attack was launched against computer systems across the globe. This attack interrupted operations and caused businesses to suffer losses. The world is united in its resolve to tackle cyberterrorism. Such countries as the United States have developed laws and operations aimed at tackling cyberterrorism. For example, the US Congress enacted the Cybersecurity Act in 2012 (Kain, 2012). This Act seeks to protect Americans and companies from the threat of cybercrime. The US has also developed operations whose primary purpose is to tackle cyber-terrorism. For example, the Department of Defense is engaged in capacity building and providing support to other agencies with the goal of securing the country against cyber threats (DOD, 2015). Since the US has enacted laws and set up operations, it is clear that the country considers cyber-terrorism to be a serious threat.
Internet and global Jihadist ideology
The Internet is emerging as a tool that Jihadist groups are using to promote their ideology. One of the applications of the internet is in fundraising (McNeal, 2008). These groups are relying on the internet to raise the funds they need to finance their operations. The internet is also being used to distribute information and to issue directives to members who subscribe to the Jihadist ideology (McNeal, 2008). Furthermore, Jihadist terrorists are using the internet to conduct recruitment. Proselytizing is another purpose that the terrorists use the internet for (McNeal, 2008). Overall, the internet has provided the terrorist groups with a new and effective platform for advancing their agenda.
In conclusion, cyberterrorism will continue to pose a challenge to security agencies in the US and across the world. The fresh nature of this threat makes it even more difficult to contain. Such agencies as FBI are committed to ensuring that this threat does not compromise American security. To guarantee national safety, the US needs to do more to tackle cyberterrorism. Agencies like the CDC should become more involved and proactive.
References
Centers for Disease Control and Prevention (CDC). (2016). Emergency Preparedness and
Response. Retrieved 23 rd July 2017 from https://emergency.cdc.gov/radiation/cdcrole.asp
Department of Homeland Security (DHS). (2015). CBP Border Security Report . Retrieved 23 rd
July 2017 from https://www.dhs.gov/sites/default/files/publications/CBP%20FY15%20Border%20Security%20Report_12-21_0.pdf
Kain, E. (2012). Does the Cybersecurity Act of 2012 Mark the Beginning of the War on
Cyber-terrorism? Retrieved 23 rd July 2017 from https://www.forbes.com/sites/erikkain/2012/02/22/does-the-cybersecurity-act-of-2012-mark-the-beginning-of-the-war-on-cyber-terrorism/#1b527cce7ddd
Laub, Z. (2017). The FBI’s Role in National Security. Retrieved 23 rd July 2017 from
https://www.cfr.org/backgrounder/fbis-role-national-security
Littleton, M. J. (1995). Information Age Terrorism: Toward Cyberterror. Retrieved 23 rd July
2017 from https://fas.org/irp/threat/cyber/docs/npgs/terror.htm
McNeal, G. S. (2008). Cyber Embargo: Countering the Internet Jihad. Case Western Review
Journal of International Law, 39 (3), 789-826.
The FBI’s Counterterrorism Program. Since September 2001. (n.d). Retrieved 23 rd July
2017 from http://govinfo.library.unt.edu/911/hearings/hearing10/mueller_fbi_report.pdf
Thurston, T. W. (2007). The Military’s Role in Domestic Terrorism . Retrieved 23 rd July 2017
From http://calhoun.nps.edu/bitstream/handle/10945/3019/07Dec_Thurston.pdf?sequence=1&isAllowed=y
US Department of Defense (DOD). (2015). The DOD Cyber Strategy. Retrieved 23 rd July 2017
From https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf