Al Qaida

Read Complete Research Material



Al Qaida

Al Qaida

Introduction

Fight against terrorism in global community has brought in new challenges for the whole world and the American intelligence community. The security of information regarding area, structure, capacities, desires and plans of assemblies of terrorist has been a colossal challenge for the knowledge bureaus. A number of major tests have been focused that the American intelligence community has been experiencing for the support of counter terrorism. In this paper, we have discussed the organization of Al-Qaida and the ways to use the strategies for tracking their basic actions. Moreover, this paper discusses the strategies of identification of the system of Al-Qaida that is used for the establishment of its roots in the global community. World has been transforming thus their strategies have been transforming as well.

Discussion

The organizations of terrorists like Al-Qaida and other related institute may look for funds from several legislative sources like profits from firms, personal charity or donations by criminal sources like smuggling of arms, drug trafficking, fraud, extortion or kidnapping and other similar products. While the fight against terrorism has been headed by United States, this war is approaching its 12th year. It is still the significant part of strategy of United States to dismantle the financial networks of the terrorist organizations. Several accounts of organizations of Terrorist exceeding $140 million have been seized all over the world, however according to experts these terrorist groups have turned out to be highly skilled in evading the detection via using cash, sophisticated laundering of money or organizations with lawful facades. Practices of cultures like charity donations and informal money transfer centers have been exacerbating the complexity for tracking the financial links of terrorist organizations. The attempts of law enforcing agencies have been constantly marred by the reality that terrorist are capable of conducting a disturbing attack at relatively lower cost.

Terrorists use same methods as they use for laundering or money in order to avert the attraction of attention by authorities and for the protection of the identity of the sponsors. Moreover they protect the identity of their beneficiaries of funds raised. On the other hand, unlike the laundering of money, financial transactions associated to the financing of the terrorist are usually done on the basis of small amount of cash transactions. Thus when the organizations of terrorism raise their funds from the legal resources, the detection and tracking of these funds gets more complicated for the intelligence agencies.

In the sections of counterterrorism, insight offices perform their duties closely with legislative requirements organization that adopt highly distinctive methods for the assembling of evidences, advancement of leads and support of restorable database. Statutes and strategies are normally developed for the adjustments to support a closer link between the two organizations of intelligence; on the other hand, close participations have been raising the demanding investigations with the use of brainpower organizations. The operations of military against terrorism has been strengthening the needs for collecting and transferring the intelligence to the administrators or leaders of military with the help ...
Related Ads