Friday, April 5, 2019

Threat of Hezbollah to US

terror of al-Jihad to US release Cell Analysis al-Jihad a Threat to the joined States and its interests.Red Cell analysis al-JihadIn recent years, the threat alert within the f altogether in States increase drastically attri aloneed to the increase in the number of terrorist physical compositions within its borders. However, close to terrorist organizations not only target the get together States but to a fault co-ordinate in the altogether(prenominal) gusts that target other American interests in other countries. one and only(a) of the biggest organizations that argon a threat to the join States and its interest in other countries is the al-Jihad truthsuit, also cognise as the Party of God, which advocates for the rights of Moslems in about parts of the world through terrorism activities. The transaction comprises of Shia Islamists who advocate for violence as part of spreading their pass along of fighting western imperialism in Muslim controlled states most the world. accord to a report released by the Federal Bureau of Investigation (FBI), the Hezbollah trend plans their attacks from south-central America targeting Americans within the joined States and other parts of the world. In 1983, the driving force attacked a U.S. maritime camp and killed all over 250 Americans date also targeting the American embassies in the Arab piece (Broxmeyer 2004). In addition, the front also kidnaps American citizens and demands for ransom before securing their release. The movement employs surveillance methods before attacks whereby members of the movement observe the routine of divergent planned locations, which creates a crown picture of the most favorable location for an attack.The Hezbollah movement began in 1982 in Lebanon, attributed to the Iranian Revolution. It blamed the coupled States for most of the problems facing other countries around the world. It is necessary to bankers bill that since the inception of the movement, the leaders hip positions require religious clerics within Islam, who guide the members of the movement in terms of goals and objectives. The movement also supports the local population in the Arab region through annual donations gained through the attacks carried out around the world. Although the of import cell for the movement is in Lebanon, the movement plans and executes its cognitive operations and attacks from the fall in States. The U.S. Department of State include this movement in the foreign terrorist organization (FTO) list in October 1997 as part of controlling their activities in the get together States (Slogum 2013). The main ideology associated with this movement is enhancing Islam as a confident religion that promotes the achievement of umpire and human rights for every citizen. However, Hezbollah uses violence and terrorist activities in passing on their messages regarding their ideology, which portrays it as one of the most dangerous organizations around the world.Based o n the organizations ideology, the main objective of Hezbollah is to have a Muslim controlled territory especially in the Arab region. According to the movements spokesperson, the group results in committing acts associated with terrorism due to failure in other means of communication between the countries in the Arab region and other western countries. This shows the organizations commitment to struggleds the terrorist activities, which include self-annihilation bombing around the United States and other western countries. The FBI also associated Hezbollah with the 11th September 2001 attack carried out within the United States. This promoted initiatives from the U.S. presidency orchestrateed at stopping terrorism in the country and in the Middle East region, which is the main hub of the terrorism cells (Broxmeyer 2004). Secondly, Hezbollahs goals and objective within the United States is the moderation of national liberation for Muslim living within America. The group argues th at the U.S. brass discriminates against the Muslims in the country denying them the right to religion as tell within the constitution. This prompts the movement to advocate for liberation of the Muslim population through terrorism activities, which portray nominate messages regarding Islam.One of the strengths attributed to Hezbollah is the leadership whereby the leaders of diametric cells around the world meet in South America for the election of their leaders. The main leader of the movement is Sheikh Muhammed Hussein Fadlallah who also acts as the unearthly father for the movement, as well as, the chief Mujtahid by ensuring a clear on a lower floorstanding of the Islamic law by every member of the movement. Based on the goals and objectives of Hezbollah within the Arab region, Sheikh Muhammed ensures support from other organizations and movement, which is a key strength for the movement. This leader controls the organizations main cell in Lebanon but also helps in the co-or dination of other cells in other countries around the world especially in the United States. Sheikh Muhammed also helps in punishing offenders within the movement, which is a factor that enhances discipline among members of the movement towards the goals and objectives (Koak 2012). The other main leader of the movement is Hassan Nasrallah, who is the secretary general for the movement. After the assassination of Abbas Musawi by the U.S. government, the leaders of different cells unanimously elected Hassan Nasrallah as the new secretary general.Based on the leadership social system projected, it is clear that the movement operates in secretive environment with the main decision making organ being the ghostly leader and the secretary general. In addition, it is also clear that the movement draws towards its goals and objectives attributed to the election of the spiritual father in a leadership position within the organization. When focusing on the funding of the movement, it is clea r that it plays an important procedure in the operations, and attacks carried out by the movement. Most of the funding for the movement comes about from donations Shia Islamists who offer zakat afterwards prayers. This contributes to 50% of the total funding for the movement most of which is used in securing equipment and weapons used in attacks (Koak 2012). It is native to note that this funding comes from the Arab region considering that the United States does not al emit such(prenominal) collections towards terrorist activities. On the other hand, the movement also receives funding from the Islamic Republic of Iran through weapons and training sessions with the weapons transported to the United States through underground tunnels and stored in most of the control locations especially in South America.Hezbollah places authoritative importance on more or less of the major capabilities that contribute to the success of the attacks carried out by the organization. Based on the ba n by the U.S. government on the movement, Hezbollah moved most of the tangible bases from the western countries in the Arab region with most countries backing the movement. However, the cells within the United States also act as support locations whereby members of the movement seek help in case of need. Hezbollah portrays an image of participating in Jihad, which is a Holy war within the Muslims, which has helped in the attraction of more people towards the movement (Goll 2011). This is clear from the number of personnel in the cell in the United States containing over 30,000 people, most of whom act as Jihadists for the Islam religion. As mentioned earlier, the main decision body the movement is the spiritual leader and the secretary general, who control the training programs for the movement. During the recruitment of new members of the movement, the leaders move to the physical bases where the training programs occur as a way of ensuring total commitment in the part of the rec ruits.According to a report released by the United Nations, Hezbollah receives donations of over $200 million annually and spends over $50 million in the acquisition of new communication technologies. However, the communication methods used during attacks depends on the precedence of the attacks with the movement using complex communication methods in some of the high priority attack such as the 11th September 2001 attack against the United States. The complexities of the communication methods create a significant mischief for the U.S. government in terms of preventing the planned attacks. It is important to point out that most of the attacks carried out by the group target highly popu recentd beas and military bases, which creates tension among people living within the United States (Goll 2011). Based on the training carried out in the physical bases, the U.S. Department of State argues that the movement uses suicide bombing in carrying out terrorist activities in the countries, which makes it hard for the prevention. Hezbollah also employs the use of gun attacks whereby members of the movement, attack different planned venues and shoot innocent victims, as part of the mission towards passing on the message of liberation.Terror groups operations are mainly dependent on minimizing dangers with the aim of achieving the greatest success. Terrorists evade a challengers strong point and focus on their weaknesses and their stress on exploiting security measure. This primarily means the involvement of the smallest possible number of attackers to complete the operation with the most rough-and-ready weapons at their disposal. The Hezbollah movement practices a detailed scheduling which can be adjusted depending on the operations requirements. For instance, the last of the potential targets can continue for years before the operation is carried out. Some targets whitethorn be unprotected enough to warrant shorter periods of observation. However, the information and data collection must(prenominal) be strong. Similarly, depending on the nature of the operation, operations in progress may be improved, deferred or annulled so that the operation does not fail. Under the Hezbollah movements planning and data collection strategies, tactical missions interlink so that operable objectives and strategical goals are realized.A detailed understanding of the target population is studied through psychological measures where informants are sent to the target site with the aim of getting the experiences of the populace. In case the targeted location involves experts, field agents are recruited and develop to work with companies and organizations operating from that target site. This helps the terrorist agents to be acquainted with the environment and identify the weak points, forgo times and surveillance of security measures employed by the firms in the target area. In this light, the most sound data collection programs include physical surveillan ce, involvement of professionals working in the target areas, hacking into data storages of the government through agents in such agencies, practice/ routines/ procedures, not to mention transportation and route travel study.For a mission to be winningly completed and executed by the Hezbollah movement, collected data must be evaluated and studied by a group of strategists in the movement. This group includes professionals in various palm such as security, programming, finance and accounting management, logistics experts, and analysts. The process of data collection is entirely left to the low ranking recruits who, however, must be supervised by a senior ranking member. In most cases, the supervisor is only known by a few recruits for security reasons. The Hezbollah movement has recruited all over and in all fields. The movements target young workers in organizations and government agencies. The main reason for this pickaxe is that such workers are desperate to earn extra money f or their leisure activities, and the fact that they are booming to manipulate and blackmail. Given the fact that data collection does not require much experience or expertise, low ranking and new recruits are the most suitable candidates to collect data and information regarding the operation. In most cases, the recruits are not aware of the real deal of the operation, they will innocently collect and monger the information. In addition, where surveillance can be done through observation, for instance information regarding logistics and transportation routes and schedules, the organization may use more experienced informants since they are able to survey without leaving a tether or being noticed. Lastly, the pre-attack surveillance and data gathering should be collected by highly trained scholarship and surveillance personnel or members supportive of the terrorist cell. The pre-attack phase involves gathering information relating to the targets current patterns whereby the attac king team approves information self-possessed from previous surveillance activities. This is very important as it helps in the identification of presumed and probable vulnerabilities. The Hezbollah movement practices a hierarchical decision making structure with the leader being the highest. Presently, the leader of the movement is Sheikh Muhammed Hussein Fadlallah, who is not only a leader, but also the spiritual father of the movement. Under this structure, major decisions are made from one end while the day to day running of operations is carried from the other end. At one end of this internal denture of accountabilities, execution of operational tasks is clearly the role assigned to terror cells and operation groups. The other extreme consists of the administrator group that has the primary responsibility for the development of the movements strategies and counselor proclamations that map the overall direction of the movement. The executive group plays an essential part of t he process of developing and appraising the movements policies and strategies in the continuing provision of updated knowledge and forecasting of future operation.The strategic intelligence applied by the Hezbollah movement is a very specific application of principles, and its main role is to assist the movement with operational decision making as well as strategizing on operations requirements. The main role of strategic intelligence in the Hezbollah movement is the need for support to understand and be able to proceeds the challenges and barriers enacted by various government agencies. Other strategies are helping in the realization and development of successful operations, development of goals, objectives and operation matrices, the provision of open-sources as well as intelligence collection support and analysis. The movement has a wide network of intelligence analyst fetched from all probable professions. This makes the organization very effective when analyzing any operation not only for security but also for finance, logistics, and human power management. The team of experts also helps in the planning of emergency and fallback plans in case the operation fails when being executed.In conclusion, the collection of data and information by the Hezbollah movement is a very organized operation that is very secretive and well organized. This task is mainly conducted by low ranking personnel, but under the watch of experienced and trained experts. Once the primary data is collected a group of experts organizes it with the aim of identifying the strengths and weaknesses of their target. Once this is done, the movement rehearses the operation and at times this may be done on convertible locations and target sites with the objective of further identifying any enforceable weak points in the operation. Prior to the operation, strategic intelligence surveillance is also practiced where a team of experts evaluates the plan in relation to the available information. T his may lead to approval, delay or termination of the operation depending on the existing facts about the intelligence gathered about the operation. Lastly, the group practices the hierarchical management structure, where information is handled through the top-bottom flow. This structure plays a very significant role in enhancing security and protection of sensitive information.The recommendation for a policy maker is for the United States ideal objective in Lebanon should be to help them enhance and set up a unloose media that is reluctant to work with terrorists, facilities able to provide the primary needs for its people, and an audio financial system screen from Hezbollahs fraudulent taxation.Secondly, they should determine a plan to help Lebanon develop a powerful financial system and discuss with Israel to reduce any stress. If array skirmishes do no quit, the risk of terrorism and financial growth will be unproductive to a flourishing Lebanese upcoming.Lastly, it is valid to know that Hezbollah has started growing in the Southern United States and is economically cheering itself nearer to United States boundaries.Our plan creators need to be eager to the fact that Hezbollah is growing and getting its feet nearer to the United States boundary. Improving boundary protection is going to be a necessary countermeasure that stops enemy from locomote though known factors of entries.The U.S. needs to be cautious to not to straight take part in an issue with Hezbollah. The last factor the U. S. Declares should do is worsening Hezbollah into a retaliatory condition. Instead the U.S. should ultimately use Southern United States and Center Southern nations to battle them for us.Additionally, for military performance enhancement and improvement, Hezbollah handled their community assistance and authenticity through the use of non-military indicates, with the supply of social services and governmental parting probably playing an important role Hezbollahs huge st rategy. Most significantly for Hezbollah, the new approach led the Party of God out of their difficult ideal position in the late 1980s. The result of these connections between enhanced army and non-military indicates was an ideal success for Hezbollah. Israeli community assistance for the war decreased, eventually resulting in the Israeli drawback from Southeast Lebanon.BibliographyBroxmeyer, Eric. The Problems of Security and Freedom Procedural Due Process and the style of Foreign Terrorist Organizations Under the Anti-Terrorism and Effective Death Penalty Act. Berkeley Journal of International Law 22, no. 3 (2004) 439-488.Dr. Habash, George . Terrorist Planning Cycle. A Military Guide to Terrorism in the Twenty-First Century. August 15, 2007. http//www.au.af.mil/au/awc/awcgate/army/guidterr/app_a.pdf (accessed inch 15, 2014).Goll, Irene. Environmental Jolts, Clocks, and Strategic Change in the U.S. Airline Industry The Effects of Deregulation and the 9/11/2001 Terrorist Attacks . Business Politics 13, no. 4 (2011) 1-37.Kang, Youn-ah , and John Stasko . Characterizing the Intelligence Analysis Process communicate Visual Analytics Design through a Longitudinal Field Study . IEEE Symposium on Visual Analytics cognizance and Technology. October 28, 2011. http//users.soe.ucsc.edu/pang/visweek/2011/vast/papers/kang.pdf (accessed March 15, 2014).Koak, Murat. Threat assessment of terrorist organizations the application of Q methodology. Journal of jeopardy Research 15, no. 1 (2012) 85-105.Slogum, Louisa. OFAC, the Department Of State, and the Terrorist Designation Process A Comparative Analysis of situation Discretion. Administrative Law Review 65, no. 2 (2013) 387-425.Sheehan, Ivan Sascha. Assessing and Comparing Data Sources for Terrorism Research. Springer serial publication on Evidence-Based Crime Policy 3, DOI 10.1007/978-1-4614-0953-3_2, 2012 13-35.Straus , Susan G., Andrew M. Parker, James B. Bruce , And Jacob W. Dembosky. The assort Matters A Review of the Effects of Group Interaction on Processes and Outcomes in Analytic Teams. National Security Research Division. April 2009. http//www.rand.org/content/dam/rand/pubs/working_papers/2009/RAND_WR580.pdf (accessed March 15, 2014).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.