Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By Dr. Bob Uda, Ph.D., CM, CHSP, ILO (Reporter)
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Combating Terrorists in the USA

% of readers think this story is Fact. Add your two cents.


We had better prepare ourselves for the coming attacks. We must educate American citizens and prepare them to combat terrorists in the United States of America (USA). If we are prepared, we have no need to fear. We must not bury our collective heads in the sand. We must eradicate the enemy within. We must be forever vigilant. Uda (2009) published a book by the same title above that provides information on protecting the continental United States (CONUS) from terrorists.

National Strategies

Strategy provides a plan for action to combat a threat. The United States must possess a strategy that effectively counters unconventional or asymmetrical warfare. The Countering Violent Extremism (CVE) vice Overseas Contingency Operations (OCO) vice Global War on Terrorism (GWOT) is both a battle of arms and a battle of ideas. The battle of ideas helps to define the strategic intent of our National Strategy for Combating Terrorism. The National Security Strategy of the United States of America, National Strategy for Combating Terrorism, and National Strategy for Homeland Security work in unison, in coordination, and in correlation among each other. Because of that synergism and since the September 11, 2001, attacks, America is now safer but not yet safe.

Intelligence Policies and Strategies

We analyzed the United States homeland security intelligence strategy and compared it to published homeland security strategy documents. We also discussed United States national and homeland security intelligence policies. All of the national and homeland security intelligence documents and policies coordinate and correlate well with the national security and homeland security documents, which is an amazing accomplishment.

Doctrine of Preemption

For effective democracies, freedom is indivisible. Those democracies provide the long-term antidote to the ideology of today’s terrorism. This, then, becomes a battle of ideas and winning the hearts and minds of people. We know that laws alone will not stop terrorism. Preventive intelligence-gathering and defense measures comprise the most important weapons in the fight against extremism and terrorism. Few, if any, wars against groups using terrorist-type tactics have been won purely by defensive operations. Hence, the US anti-terrorism strategy relies heavily on the doctrine of preemption. The United States has employed that doctrine in Iraq. Further, in CVE, the man with the money is as dangerous as the man with the gun. Thus, the successful interdiction of funds can derail terrorist operations.

Most Serious National Security Threat

Former President George W. Bush made it clear that terrorists seeking to acquire and use weapons of mass destruction (WMD) are our most serious national security threat. To counter an elusive and adaptive adversary, we must transform ourselves and our partnerships to deter, detect, and defeat this growing threat to our country and to the peace and security of the international community.

An Evil Enemy That Must Be Defeated

Al-Qaeda is driven by an undiminished strategic intent to attack our homeland. We cannot permit the world’s most dangerous terrorists and their regime sponsors to threaten us with the world’s most destructive weapons. Hostile states and terrorists that possess WMDs represent one of the greatest security challenges facing the United States. No country has been subjected to more relentless terrorism than Israel. However, Israel considers itself at war with only the perpetrators of terrorism, not with the Palestinian people. Yet the Palestinian terrorists’ goal is to kill the maximum number of Israeli civilians. We are dealing with an evil enemy that must be defeated.

General Aviation

The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to coordinate effectively varied aspects of security protocols between agencies and general aviation (GA) components have not been adequately addressed. Overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation’s smaller airports. For perspective, the term “general aviation” is generally accepted to include all flying except for military and scheduled airline operations. General aviation makes up more than $150 billion or 1 percent of the US Gross Domestic Product (GDP) and supports almost 1.3 million high-skilled jobs in professional services and manufacturing and, hence, is an important component of the aviation industry.

Maritime Piracy

Maritime piracy grew dramatically. The number of attacks and level of violence increased steadily over the years. The world community is concerned as to what strategy it should develop to counter and disrupt maritime piracy. Also, the world community is concerned about the threat to the international maritime supply chain and how to increase its security. We are aware of some creative ideas and analysis of such strategies for countering and disrupting the piracy threat to the international maritime supply chain.

Raffaele (2007) reported that Captain Noel Choong, a former master mariner in Singapore and current head of the Piracy Reporting Center in Kuala Lumpur, said, “We’ll never see the end of piracy, just as we’ll never see the end of robbery on land. But we’re doing everything we can.” Yes, piracy may never be entirely eradicated; however, it can be severely curtailed to a manageable level. Consequently, controlling piracy and transnational crime protects our homeland, enhances global stability, and secures freedom of navigation for the benefit of all nations.

Critical Infrastructure

United States critical infrastructures (CIs) must be proactively maintained and consistently updated. Vast advances through technology combined with loosely affiliated terrorists place many pressures on the nation to remain consistent with its policies, tactics, and procedures for avoiding destructive attacks. Merely defining the ramifications of critical infrastructure weaknesses or asymmetrical threats is not sufficient enough for effectively securing the nation. Moreover, formulating this foundation is vital for leading individuals into a solid direction of safety. Therefore, future analysis should assess various recommendations to integrate successfully local citizens’ ideals with federal government policies and plans.

Information Security

We must be concerned with some basic tenets of information security, security management, cyber-terrorism, cyber-attacks, network security, and user security. This is only a brief review of some basic principles of information security. Develop a greater understanding of the principles of information security and how they relate to the security of the organization by reviewing additional, comprehensive information security resources.

Terrorist Profiling

Terrorists and terror groups constitute the enemy in the current CVE (vice OCO vice GWOT) that the United States finds itself engaged in today. Despite the vast number of research and investigative studies that have been conducted, terrorists’ personalities and behaviors still remain discombobulated data sets. In addition to the difficulty in analyzing secretive, conspiratorial groups and individuals, the variety of motivations, ideologies, and behaviors involved remain extremely diverse. Common characteristics or clearly defined traits may be apparent and simplistic; however, significant differences are more the norm.

Israel Stronger Than Ever

Given Israel’s location and being surrounded by its vicious enemies, it is a miracle that they are still there and holding strong. In addition, to my knowledge, there is no race or group of people that have suffered such persecution and attempted genocide than the Jewish people. Yet, they exist stronger than ever and remain a peaceful, democratic nation.

Christians Not Like Muslim Terrorists

Although violence is often inflicted by Muslim terrorists and is approved of by the Koran, any such violence inflicted upon others by Christians is and never will be sanctioned by the New Testament teachings. Jesus Christ commanded His apostle Peter, “Put your sword in its place. For all who take the sword will perish by the sword” (Matthew 26:52).

Islamic Terrorists

Islamic terrorists are not courageous warriors that many commentators (particularly the ones who lean towards the left) claim them to be. They sacrifice their own lives for their own selfish gain. This behavior is relative to the profile of the common criminal (which many would disagree). They are brainwashed into thinking that if they die for the Islamic movement, they will inherit eternal life and riches in heaven along with 72 spiritual wives. This comprises the spoils of their heinous criminal activity, and they do not care who or how many innocent people they kill in the process. Again, this behavior is much like the common violent criminal who couldn’t care less who he injures or kills as long as he obtains some form of monetary gain.

Abortion Clinics

Today’s society is numb to the idea of taking violent action against practices and certain ethical values whether it be the medical procedure of killing unborn human beings or the bombing and murder of those who provide these services. History shows that notable and extreme responses to issues disagreeable to some may cause society to take note, conceptualize, and re-evaluate previously held positions on issues such as the pro-abortion vs. pro-life movements.

Ku Klux Klan

The Klan in the United States has evolved significantly since its birth after the Civil War. It began as a secret social club. However, it rapidly grew into a violent and racist secret society that its six founding fathers would probably not have wanted. The Ku Klux Klan is now responsible for terrorizing blacks and other racial and social minorities during its 140-year existence. The Klan still uses intimidation as its main factor when organizing marches and protests. The crosses still continue to burn, but with different connotation. However, it does not in any way promote the safety and well-being of ethnic and social minorities. Although the Klan’s beliefs and ideals are resented for the most part in the United States, they are still allowed to exist and operate. American law forbids hate crimes and any sort of criminal activity; however, it defends the rights of those who lawfully organize and rally. Opinions and beliefs of those affiliated with any racist organization, no matter how disturbing they may be, will always enjoy the protections of American law.

Al-Qaeda

Al-Qaeda represents the emergence of religious-inspired terrorist groups that possess fewer constraints about killing large numbers of people. Al-Qaeda’s goals pose a significant global threat as they believe killing non-believers or infidels result in their being rewarded in the afterlife. Osama bin Laden and al-Qaeda’s main purpose is to drive the United States and Western influence out of the Middle East.

Naval Militias

Naval militias present a viable alternative to cutting corners in America’s waterside, Homeland Security, and anti-terrorism programs. As with any change in established organizations or programs, there are hurdles to straddle. For example, considerable analysis and restructuring are necessary to minimize overlap and duplication of service. Additionally, we must consider complex funding streams and chains of command.

The proactive approach of developing new and innovative programs to provide America with a protective shield should continue unabatedly. That approach needs to be combined with promoting programs that already exist and develop/maintain the capability to provide proven partnerships in the CVE (vice OCO vice GWOT). The naval militias possess the history, energy, and potential to expand through more than just two states. It should be an integral part of our American homeland defense.

Piracy and Maritime Security

At the end of the day, it really boils down to the drive and will-power of the international community and the maritime community to address this threat on maritime security. The seas and oceans of the world are dangerous. It is inexcusable for the maritime industry to allow these acts of piracy to continue. If this crime occurred on land, society would be up in arms. However, because it takes place at sea where no witnesses are present, people overlook or, worse still, ignore piracy.

Conclusion

In conclusion, Combating Terrorists in the USA provides thoughts and ideas for protecting the CONUS from Islamo-fascist terrorists. We must educate ourselves and know our enemies. We must develop, understand, and be prepared to use all of the counterterrorism strategies, tactics, plans, and weapons against all terrorists bent on destroying the USA. We will be fighting a good cause, which is to protect our families, religions, homes, and American way of life. As long as we are fighting for what is right and good, we will never go wrong and be defeated. To this end, will God our Heavenly Father and Jesus Christ protect us always against the formidable Islamo-fascist enemy? If we remain righteous as a people, the answer is “yes.”

 

Reference

Raffaele, P. (2007, August). The pirate hunter. Smithsonian magazine. Retrieved from LINK`http`www.printthis.clickability.com/pt/cpt?action=cpt&title=The+Pirate+Hunters+|+People+&+Places+|+Smithsonian+Magazine&expire=&urlID=24211033&fb=Y&url=www.smithsonianmag.com/people-places/pirate_main.html&partnerID=253162`www.printthis.clickability.com/pt/cpt?action=cpt&title=The+Pirate+Hunters+|+People+&+Places+|+Smithsonian+Magazine&expire=&urlID=24211033&fb=Y&url=LINK.

Uda, R. T. (2009). Combating terrorists in the USA: Protecting the CONUS from terrorists. Bloomington, IN: iUniverse.

###



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 2 comments
    • Anonymous

      Bob Uda is a FLAMING COWARD …. “terrified” of his own shadow.

    • Dr. Bob Uda, Ph.D., CM, CHSP, ILO

      Reveal yourself, Anonymous, so we can see how brave you are. I want to meet you on the battlefield of ideas.

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.