Tuesday, July 23, 2019
Legal Aspects Related to the Exploitation of Weaknesses in Terrorist Research Paper
Legal Aspects Related to the Exploitation of Weaknesses in Terrorist Organizations - Research Paper Example The September 11 bombing, popularly known as the 9/11 bombing in 2001 was only the worst terrorist attack in the United States homeland. It was a wake-up call for the American people as thousands of innocents were killed in a conflict they knew nothing about and on which they had no involvement. Suddenly, it occurred to the American people that they are vulnerable to attacks not only abroad but also in their homeland where they are supposed to be safe. Nobody among the American people is safe. The terrorists blend themselves incognito among civilians and the innocents. A purely military or conventional police approach will not fully work as terrorists blend themselves deep among office workers, employees, workers, business people, mothers, commuters, pedestrians, and in all walks of life. America has to confront the threat of terrorism comprehensively. America must face the threat of terrorism at home and confront terrorism whenever it tries to displays its ugly head. However, to defeat terrorism, America must do more. Terrorism is like any of the deadly mosquitoes of the world. It must be stopped or neutralized on sight but America must also destroy its breeding places, its network, its organization, and its personnel. Thus, America must be proactive. It must do what it can to proactively destroy terrorism----its organization, network, supply and logistic lines, and personnel. America must search for the terrorist breeding areas and destroy its network in-situ or on-site. The obligation of America to combat terrorism is an obligation not only to her citizen but also to the international community as well (Carillo-Salcedo, 2009, p. 13). In destroying terrorism at their breeding places, destroying their organizations including the ideological foundation that provides the reason for their (wrong) existence is an important route. Terrorist
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.