Discuss about the Threats of Terrorism for Problems and Promises in Subordinate States.
The Patriot Act has been passed by the Congress for the purpose to showing response towards the terrorist attacks which took place on 11th September, 2001. From the very beginning, the objective of the Act was to strengthen the nature of the domestic security and at the same time widen the powers of the agencies of law enforcement in order to reduce the acts of terrorism (“Introduction to Security (8th Edition), 2008). It is evident that, the Act has been allowing the officials of federal government greater authority in tracking and intercepting communications as well. As a result of this, the Secretary of the Treasury has been entrusted with regulatory powers in order to combat corruptions of the financial institutions of US involved in the process of money laundering (Sheppard, 2008). In this regard, it is important to categorize the purposes of the Patriot Act for the purpose of deterring and reducing terrorism in the United States and all around the world. The purposes of the Patriot Act can be summarized as-
In spite of several attempts on the part of the Patriot Act, it faced various criticisms. Firstly, the Act was declared to be unconstitutional and unethical by many critics. As a result of it, the implementations on the part of the federal government did not receive assistance from the major cities (Halibozek, Jones & Kovacich, 2018). Secondly, criticism was faced regarding the fact that, the power of the executive was unfairly expanded by the Act which in turn has created discrepancies in the process of crucial checks and balances (Theissen & Phil, 2017). Thirdly, the most vital criticism faced by the Patriot Act was in regard to the provisions of Section 215 of the Act. The right to privacy and freedom as a result of unreasonable investigation and seizures caused infringement. This is due to the reason that most of the seizures were conducted without notification. Fourthly, the Act faced major criticism in regard to the presence of controversial provisions concerning electronic surveillance of the individuals threatening the natural security of the country to the large extent (Halibozek, Jones & Kovacich, 2018). However, it is noteworthy to mention here that, such practice was not initiated by the Act because surveillance methods and practices have been established by the Foreign Surveillance Act (FISA).
The validity of the abovementioned criticisms can be measured in this regard. It is worthwhile to refer here that, the Patriot Act from the very beginning emphasized on the investigation of potential terrorists other than spying upon the innocent people of America (Welch, 2015). However, the nature of the Patriot Act was such that it never paid attention on reducing the activities of potential terrorists (FEMA.gov”, 2018). It is worth noting that, the controversial provisions depicted in the Act were considered to be the same expansions of the law enforcement authorities which has been sought by the officials of the State and the federal government after the Waco siege and the Oklahoma City (Howard et al., 2016). In this context, arguments can be raised on the part that from the very beginning most of the Democratic and Republican critics were of the opinion that, the nature of the surveillance powers of the Act was such that it could be utilized for the investigation of other political offences rather than that the activities of terrorism (Ombres, 2015). It is evident that the criticisms made in regard to the Patriot Act can be easily addressed by the amendments that created limitations to the extraordinary surveillance powers of terrorism rather than emphasizing upon the criminal investigations (Griffith, 2015). The criticisms in regard to the provisions of Section 215 of the Act have been considered to be most valid because it has permitted the government to seize any tangible object without warrant.
It is evident that the Georgetown National Security Critical Issue Task Force (NSCITF) has undertaken a study on the Lone Wolf Terrorism in the United States. In regard to this, the valuable findings and the recommendations, it is important emphasize on the part that, whether the nature of the recommendations are such that it would efficiently address the threat to the Lone Wolf Terrorism (Wilner, 2017). It is worthwhile to mention here that, the (NSCITF) has articulated eight findings for the purpose of informing the collective understanding of the Lone Wolf Terrorism. The findings can be categorized below-
It is noteworthy to mention here that, various recommendations were made in the research conducted by the (NSCITF) which has rightly addressed the threat of the Lone Wolf Terrorism. These recommendations can be categorized as-
It is worth noting that the natures of the recommendations are such that it would prove to be beneficial for the USG in streamlining the responses of future policy. In this regard, these recommendations can improve the coordination of the government at federal, state and local level for the purpose of preventing future attacks on LWT (McCauley & Moskalenko, 2014). It can be observed that, since time immemorial, from the beginning of the rise of the Lone Wolf Terrorism, it has introduced new challenges towards the enforcement of law and the efforts regarding counter terrorism. Mention can be made of the part that, the issues regarding lone wolf terrorism is not a new threat; the nature of the threat is such that it is old and re-emerging (Moskalenko & McCauley, 2017). It is known to all that the activities of the Lone Wolf Terrorist is such that it has made it difficult for the authorities to detect and at the same time prevent the attributes on the part of Lone Wolf Terrorists and as a result of this, it made counterterrorism and intelligence gathering much more difficult.
References:
FEMA 452 – Risk Assessment: A How-To Guide to Mitigate Potential Terrorist Attacks Against Buildings | FEMA.gov. (2018). Retrieved from https://www.fema.gov/fema-452-risk-assessment-how-guide-mitigate-potential-terrorist-attacks-against-buildings.
Griffith, I. L. (2015). The Quest for Security in the Caribbean: Problems and Promises in Subordinate States: Problems and Promises in Subordinate States. Routledge.
Halibozek, Jones, Kovacich, E. (2018). The Corporate Security Professional’s Handbook on Terrorism – 1st Edition. Retrieved from https://www.elsevier.com/books/the-corporate-security-professionals-handbook-on-terrorism/halibozek/978-0-7506-8257-2.
Howard, P. N., Shorey, S., Woolley, S. C., & Guo, M. (2016). Creativity and critique: Gap analysis of support for critical research on big data.
Introduction to Security (8th Edition). (2008). Retrieved from https://www.amazon.com/Introduction-Security-Eighth-Robert-Fischer/dp/0750684321.
McCauley, C., & Moskalenko, S. (2014). Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action. Terrorism and Political Violence, 26(1), 69-85.
Moskalenko, S., & McCauley, C. (2017). Toward a Profile of Lone Wolf Terrorists: What Moves an Individual From Radical Opinion to Radical Action. In Lone Wolf and Autonomous Cell Terrorism (pp. 79-95). Routledge.
Ombres, D. (2015). NSA Domestic Surveillance from the Patriot Act to the Freedom Act: The Underlying History, Constitutional Basis, and the Efforts at Reform. Seton Hall Legis. J., 39, 27.
Sheppard, B. (2008). The psychology of strategic terrorism: Public and government responses to attack. Routledge.
Theissen, M. N., & Phil, M. (2017). The PATRIOT Act–A closer look on Sec. 213 and Sec. 215. GSTF Journal of Law and Social Sciences (JLSS), 1(2).
Welch, K. (2015). The Patriot Act and Crisis Legislation: The Unintended Consequences of Disaster Lawmaking. Cap. UL Rev., 43, 481.
Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309-318.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download