About Maritime Terrorism

The violent acts committed by nefarious individuals who operate on the sea are defined as maritime terrorism and piracy. The threat of unlawful violence prepared by sub-state actors with the intention of attaining political goals is the definition of terrorism in and of itself. It is a method that is utilized specifically for strategic goals and is far from violent. Terrorism can also be seen as a form of coercive diplomacy that uses psychological warfare (Kharim, 2016). As a result, when terrorists plot an assault, they deprive their targets of resources, destroy life, stability, and societies that uphold the law. In the last decade, there has been a growing concern for the global security services in regards to providing adequate protection to all the modes of transportation from potential terrorist attacks because of the explicit incidents of the train, ferry, and aircraft bombings. There also have been concerns in 2001 when terrorists attacked the United States. The American leaders lamented the attack due to the failure of prediction from the intelligence community and so having the most devastating attack in the U.S history. Subsequently, the National Commission on Terrorist investigated and discovered that numerous intelligence failures planted an opportunity for the terrorist who disrupted the motion of the national security.
Government officials, in this case, got under a lot of pressure determining the sequence of attack, the methodology and the measures that can be placed to prevent future attacks. In some instances, actionable intelligence is seen to yield results as its prior to the execution and found more reliable and on time solutions. However, other alternative methods could access future trends of terrorism and the contextual shape of terrorism (Smith, 2008). Still, the government may imply the strategic board of forecasting terrorism for the purpose of adopting more preventive and proactive measures. The debate for strategic focusing also poses a question of the equipment's the terrorists use, the channel of communication as well as the exploring groups.
The terrorist organizations are always at will to use violence from the way they target and the selected area to be attacked through the use of specific terrorist groups. They are also the overall determinants of the weapons the will use, and mode of technology which will access the threat assessment. Different forms of technology have enabled the terrorists to have a full spectrum of how their activities will be carried out. The internet and communications technology have opened leeways for the exchange of communication both externally and internally (Jackson & Frelinger, 2008). Terrorist groups, in this case, are known as clandestine organizations because the groups can only see the data they use and their decision underlie the choice of frequently invisible technology.
In the history of examining how individual terrorist groups use technology, their interest in pursuing the attack is based on the use of novel technologies which varies from group to group. For instance, groups like the Provision Irish Republican have conquered one or two attacks by use of a variety of techniques over an extended period of time. The group concept pursues new technologies in different forms and then maintains its use and finally applies to pursuit their goal. The use of technology has also enabled the terrorists to have specific weapon technologies through the terrorism database that contains over 22,000 terrorist attack operations. Initially, they used the RAND-MIPT database that involves a combination of historical international database and domestic terrorism (Smith, 2008). Contemporary to that, they tactically employed their weapons through the data that primarily focused on recent activities and modern terrorist threats. The specific weapons that were gained were used for different purposes. For instance, various incidents paved the way for more accurate attack characteristics. Contrary to the attack, there has been a debate on how to arrest the situation of security through the strategy of winning the war. The democracy approached the long-term effect on winning the war to gain freedom and human dignity. Effective democracy maintains order and practices effective sovereignty within their own borders, impartial systems of justice, resist of corruption and embracing of the rule of law. To wage the ideas of battling war, there were pros and cons the effective democracy must recognize and what it does to the rise of terrorism (Galleti, 2012).
Cons of Long-term solutions
Terrorism is not the by-product of poverty. This means that the majority of 2001 attackers were the middle-class population because some like Bin Laden were from privileged upbringings. This meant that it takes a long time for an attack to be planned
The result of terrorism is not from hostility to the U.S policy in Iraq. This means that the attack of September 11th was before the Saddam Hussein regime. Moreover, most countries did not participate in the Iraq coalition efforts because they were also attacked.
The Al-Qaida plotting was a plot that was organized from the 1990s which were during the peace process period.
Terrorism was not a response to the government's response of preventing terror attacks. Long before the U.S targeted the Al-Qaida, United States were already targeted because the terrorist had embodied the countries weakness. They ended up recruiting because they realized that the U.S were easily intimidated, decadent, and would retreat if attacked.
Short term solutions
It is the obligation of the government to protect the livelihoods and lives of its citizens because hardcore terrorists are not easily deterred or reformed. When short-term policies are applied for the purpose of preventing terrorism, then their network will be cut off from institutions, individuals and other sources that supply them with systems in order to facilitate their activities. A wide range of tools is used when the U.S government agrees to work with committed partners across the globe. This will hinder the movement of terrorists across international borders as well as denying them access to the entry of United States (Galleti, 2012). Also, they will establish protective measures which further reduce the vulnerability of being attacked. The pros of short term solutions so as to neutralize the terrorist enemies depends on;
Foot soldiers, which include facilitators, operatives, and trainers who trail the terrorist network. Globalization and technology have enabled the terrorist to recruit foot soldiers. The short term plan through the partnership will be able to capture and kill the foot soldiers. Despite the fact that the solution may be unable to influx the recruiters, they will ultimately manage to cease the operation of the foot soldiers.
Funds- The provision of financial support will provide fungible easy transport as a means of security so as to support the countries troops in operation and survival in case there are any terrorist organizations. Because the enemies raise their funds through soliciting contributions, NGO'S, charitable fronts and operational businesses, both the partners and democracy will manage to disrupt their funding sources through connected networks. This in return will make the terrorist to luck funds for the necessary materials they require to make an attack.
Conclusion
Maritime terrorism is therefore seen as plans to disrupt the networks of terrorism. It looks like terrorists use long term intends to cause an attack and that's why they have always remained invisible to the government's security agencies. It is, therefore, the organization of the government and the supporting partners to develop strategies which are seen to have both long term and short term solution. The short term solution serves best to prevent small attacks as well as the future plans of the terrorists.









References
FRELINGER, B. A. (2008). Rifling Through the Terrorists' Arsenal: Exploring. VA, USA: RAND Corporation Arlington ( Routledge).
Galletti, S. C. (2012). Piracy and Maritime Terrorism: Logistics, Strategies, Scenarios. IOS Press.
Karim, M. S. (2016). Maritime Terrorism and the Role of Judicial Institutions in the International Legal Order. BRILL PUBLISHERS.
Smith, P. J. (2008). Terrorism in the year 2020: Examining the ideational, functional and. Newport, RI, USA: NSDM Department, US Naval War College.



Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price