Identify strategies used in counterterrorism


Discussion:

Funding Terrorism Worksheet

Watch the "Counterfeits: Funding Terrorism" video located on the student website.

Complete the table by including the following:

• Left column: Identify 2 or 3 funding strategies used by terrorists or terrorist organizations to fund their activities.

• Middle column: Identify the threat the funding strategy poses to homeland security and to legitimate businesses.

• Right column: Identify strategies used in counterterrorism to combat the funding strategy.

Funding Strategy

Threat

Counterterrorism Strategy

 

Cigarettes

Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.

Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.

 

Watches

Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.

Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.

 

Shoes

Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.

Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.

Create a 350- to 700-word summary, in the space below, about the funding and counterterrorism strategies listed in the table. Include the following in your summary:

• Identify the threats that funding strategies pose to legitimate businesses.

• Describe counterterrorism actions taken that affect the terrorist funding strategy.

Request for Solution File

Ask an Expert for Answer!!
Strategic Management: Identify strategies used in counterterrorism
Reference No:- TGS01879381

Expected delivery within 24 Hours