.

Wednesday, June 12, 2019

Aviation Security and al Qaeda in Yemen Case Study

Aviation Security and al Qaeda in Yemen - Case Study ExampleThis pragmatic and preventive practice had been discontinued. An illustration of this change was the mischance to interrogate the Christmas Day bomber. This individual had been provided with a lawyer and informed that he was entitled to remain silent (Thiessen, 2011, p. 133). Aggressive interrogation of terrorists is essential for obtaining information closely future terrorist attacks. Consequently, the Obama Administrations reluctance to engage in such interrogation has rendered the nation vulnerable to terrorist attacks.There is a major lacuna in the strategy of the US. It relies upon Yemen to assist it in identifying and neutralizing al Qaeda terrorists. However, the Yemeni government employs, harbors and relies upon these terrorists for political support and perhaps even its very existence. There is a mark reluctance among the Yemeni authorities to wage a serious war against the al Qaeda terrorists, who reside in thei r country (Rollins, 2010, p. 12).It was discovered by the subject Commission on Terrorists Attacks Upon the United States that the weaknesses inherent in the aviation security system had been used by the al Qaeda terrorists to conduct the September 11 attacks. Some of the weaknesses identified by this commission were first, a preliminary cover version process that concentrated upon identifying likely aircraft bombers (Elias, 2004). However, this process had ignored potential hijackers.Second, slipshod screening at checkpoints and the prevalence of permissive rules with regard to small knives. Third, the absence of in-flight security measures, such as the presence of air marshals and reinforced cockpit doors. Fourth, the adoption of a non confrontational strategy, across the industry, while addressing hijackers. Fifth, the absence of capabilities and protocols for executing a synchronized Federal Aviation Administration and military response to suicidal hijackers and multiple hija ckings (Elias, 2004).

No comments:

Post a Comment