Posts

Showing posts from July, 2017

YOU ASKED: CAN REALLY A LIBERAL DEMOCRACY DESIGN A ROBUST COUNTER TERRORISM POLICY THAT REMAINS ETHICAL AND RESPECTS THE BASIC MORAL GUIDELINES?

Image
Introduction The basic premise of counter terrorism and guide to success is to kill or apprehend as many terrorists as possible, without creating more. Although, admittedly, the concept is quite straightforward, in a liberal democracy this requires the guarantee of efficiency and/or security and a certain level of public acceptance/approval. Generally speaking, when developing a counter terrorism strategy, different policy aims should be prioritized –depending on the contextual determinants- at different times. Increasing political pressure may occasionally lead to spasmodic decisions, so it is vital to take sufficient time to create a comprehensive action plan, that ensures not only accountability and efficacy but also achieves security and sociopolitical balance. Short term gains, however, should never adumbrate long-term goals. Subsequently, a course of action must be strategically chosen for the realization of both proximate and ultimate goals (Holmes, 2007). In order to cra

ARE COUNTER TERRORISM MEASURES REALLY EFFECTIVE? IS THERE A WAY TO MEASURE THEIR EFFECTIVENESS?

Image
Introduction Looking back on the past 15 years, there is little doubt that the 9/11 attacks profoundly altered the landscape of international security. Over the last decade and a half, there has been a tremendous multiplication of counter terrorism measures, laws, policies at regional, national and international levels. The events of 9/11 and -more recently- the phenomena of ISIS, “homegrown terrorism” and “foreign fighters”, set states and international bodies on an accelerated path of law making and institution-building, (Kaunert & Leonard, 2012). Domestic and international counter terrorism initiatives include specific provisions to permit, require and fund technologically innovative measures to counter terrorism; thus smart borders, (smart) surveillance, data retention/collection and sharing, passenger name record exchange etc., feature heavily in the hyper technologized operational continuum of contemporary counter terrorism, “where the production, retention, processing,