Counterterrorism and American Presence Overseas


The United States government has no more prominent obligation than securing the American citizens. However, its commitments don't end at its boundaries. The government has grasped its obligations regarding guaranteeing global security to serve its interests, maintain the responsibilities to associates and accomplices, and location of dangers that are genuinely worldwide. Satisfying the administration obligations relies on upon a reliable protection and secure country. It additionally requires a worldwide security stance in which special abilities are utilised inside assorted global coalitions and in the backing of nearby accomplices. The following analysis aims to explore various strategies, tactics, and tools used by the security agencies to deal with counterterrorism inside and outside the United States of America.

Strategy Available to Perform Counterterrorism Operation Within the United States

Strengthening the national defence. The military has always been perceived to be the bedrock of any country's security. To continue protecting its citizens against terrorist groups such as Al-Qaeda, its adherents, and the affiliate groups, the government has embarked on vigorous reforms within its military. Some of the reforms include investing in the armed forces by providing the soldiers with adequate and modern tools to counter terrorism. Additionally, as part of the changes, the U.S. government has provided support with both financial and material assistance to families of the soldiers. (The White House, 2015). All these reforms are aimed to form a formidable military able to handle all sets contingencies in every domain.

Reinforcing the Homeland Security. Although our country has enjoyed peace in recent years. There is the need to enhance the Homeland Security due to the continuous evolution of hazards and threats. (The White House, 2015). Reinforcement has been contributed by faster growth in technology which has enabled faster sharing of information. Examples of support strategies include the formation of community-based law enforcement programs aimed at countering various homegrown extremism and promote peace.

Combating persistence threat of terrorism. In the past period, we have noticed a reduction in the number of catastrophic attacks in the country. But still, there has been an array of threats which have been focused towards promoting instability in our nation. Due to this, the government has devised a new way of dealing with terrorist groups through cost-effective approach. Under this plan, the government aims at disrupting the flow of terror gangs from their specific conflict zones. Tactics For Dealing With Counterterrorism Within the United States

Screening of passengers. As a component of efforts to establish safety to control terrorism, the legislature through its security workforce has occupied with the exhaustive screening of aircraft travellers before getting into the planes. Screening is intended to identify any metallic protests such bombs and guns which terrorists can undoubtedly get in with while on the aircraft and cause havoc.

Provision of resources. The tactical target of the U.S. government is to frustrate and defeat terrorists, make their operations more confused and perilous and lessen their alternatives. All the above has been accomplished by pumping in of more resources. Much the same as the way strategy requires will; tactics need assets. Assets have been given to different security forces to upgrade their operations.

Tools for Combating Counterterrorism Within the U.S.

Criminal law. The indictment of individual terrorists in criminal courts has been a standout amongst the most vigorously depended upon counterterrorism tools. The United States has put precise accentuation on it, with the conveying of terrorists to equity for their violations being a longstanding principle of U.S. counterterrorism approach. Utilisation of the criminal equity framework can diminish terrorism in various ways. Detaining a terrorist forever clearly keeps him from directing more assaults.

Controlling the finances. The financial support that apparently made it possible for the culprits of the attacks in September to prepare and go as they arranged for their operation has highlighted endeavours to check on terrorist cash. The United States utilises two sorts of money-related controls to battle terrorism: the permanently closing of benefits belonging to individual terrorists, terrorist gangs, and sponsors and the forbiddance of material backing to terrorists. All these is aimed at containing the criminals in the country.

Use of military force. Current and accuracy guided weapons have made the military a not so much limit but rather more valuable counterterrorism instrument, yet one whose utilisation is still suitably uncommon. A few nations United States being among them have utilised military power with shifting degrees of progress in the course of the most recent three decades to protect prisoners. (Joint Chiefs of Staff, 2015). All the more as of late the military instrument has been utilised to counter against terrorist assaults. The United States has employed its military for striking back after terrorist crimes inflicted by Iraq in 1993, Libya in 1986, and Osama bin Laden in 1998.

Utilisation of intelligence. The gathering and investigation of intelligence information is the minimum unmistakable however in some ways the most important counterterrorist device and is properly considered as the "principal line of resistance" against terrorism. The United States has utilised various insight officers who are very much outfitted with cutting edge devices for gathering intelligence information. The Intelligence report is then sent to authorised powers, for example, the CIA for rapid examination.

Strategies Used to Perform Counterterrorism Operations Outside U.S.

Controlling the spread and utilisation of weapons of mass destruction. No risk represents a threat to our security and prosperity as the potential use of atomic weapons and materials by unreliable states or terrorists. Because of this, the U.S. government has always been looking for peace and security of a world without atomic weapons. For whatever length of time that atomic weapons exist, the United States must is prepared to contribute the resources necessary to secure viable atomic obstacle to promoting world stability.

Confrontation of climate change. Environmental change is a pressing and developing danger to our national security, adding to expanded common catastrophes such as the influx of refugees, and clashes over essential resources like food and water. America is driving endeavours at home and with the universal group to go up against this test. The U.S. and the People's Republic of China have achieved a historical point consent to make critical move to lessen carbon contamination. Moreover, the nation is joining forces with African business people to dispatch clean energy projects.

Securing the shared spaces. The world is highly integrated with shared spaces—digital, space, air, and seas that empower the free flow of individuals, products, administrations, and thoughts. They are the veins of the worldwide economy and traditional society, and access is in danger because of expanded rivalry and provocative practices. Along these lines, this has provoked America to keep advancing guidelines for dependable conduct while ensuring we have the abilities to guarantee access to these mutual spaces.

Tactics Used to Perform Counterterrorism Operations Outside U.S.

Tighter security at the U.S. embassies. Nowadays, the government has deployed more military officers such as the FBI to almost all the countries which have strategic interests with the U.S. This is meant to secure all its citizens and interests.

Developing the details of the "watch lists". This refers to the list of various members belonging to various extremists groups. This is meant to furnish the military of all the countries about the criminals so as to prevent them from entering into the countries and cause havoc.

Tools Used to Deal With Counterterrorism Outside U.S.

Use of diplomacy. Diplomacy has been outlined as the core tool for dealing with global terrorism, which, in many regards, knows no limits. Terror groups have progressively spread their stretch the world over. Battling a terrorist system like the one that incorporates Osama bin Laden's al-Qaida group requires the helpful endeavours of numerous nations because the system works in multiple countries. Successful counterterrorism diplomacy is the paste expected to hold these efforts into a reasonable entire instead of being just incoherent parts.

Use of intelligence. Intelligence likewise is another apparatus which is utilized by the United States to gather data in different nations about the operations of Al-Qaeda and other dread gatherings.


Combating terrorism in America and its allies require the deployment of various strategies example including strengthening the military, equipping the Homeland security, controlling the use shared spaces, and monitoring the use of weapons of mass destruction. Apart from putting in place the strategies, the government has also come up with some tactics such as thorough screening of passengers before getting into the planes and tightening the security at the U.S. embassies worldwide. All these measures are aimed at keeping safe the citizens of America who are located in various parts of the world. Additionally, the government has introduced various tools to counter terrorism. Examples include the use of diplomacy and criminal law to prosecute the perpetrators.


Joint Chief of Staff. (2015). The United States Military’s Contribution To National Security. Web. 6 August 2016. page 7-15

The White House (2015). 2015 National Security Strategy. Web. 6 August 2016. page 7.

The White House (2015). Fact Sheet: The 2015 National Security Strategy. Web. 6 August 2016. par. 3

FileDescriptionFile size
Download this file (counterterrorism_and_american_presence_overseas.pdf)Counterterrorism and American Presence OverseasCounterterrorism and American Presence Overseas243 kB