Verified Document

Terrorist Attack Essay

Terrorist Attack Efforts made to identify a terrorist group and techniques used to prevent an attack

Crime incidences and terrorist attacks have been on the rise in many parts of Georgia State. Police have tried to conduct investigations and patrol in the area, but minimal or no justifiable results are available to explain the situation. The situation called for the intelligence department of police to conduct surveillance and come up with a report that explains the situation. The surveillance used intelligence techniques to identify the central problem in the local area and the measures used to curb the situation.

The intelligence department utilized a combination of intelligence stages and law enforcement to identify the source of the attacks and prevent further attacks from taking place in the local area. Strategic intelligence was to identify potential terrorist operations and targets within the community. Strategic intelligence assisted in predicting where future operational terrorist acts might occur. Obtaining the tactical target that may prove advantageous to the terrorists was also through the strategic gathering of information from local people and places. The procedure used tactical intelligence through training personnel to observe cultural patterns and behavioral modifications of the local people. In order to conduct the surveillance in the area, the use of the police force was more efficient than using a military intelligence system. According to Jones & Libicki (2008), unlike the military, police have a permanent presence in cities, towns and villages. This gives them a better understanding of local groups and threats in the environment.

Through using intelligence techniques such as identifying factors and scenarios that are out of the ordinary, comments from interviews and reactions of people who are suspicious, I was able to identify a terrorist group in the area. Through experience and understanding of the area, I identified the terrorist group by the intelligence procedure. Intelligence stages such as tasking provided information about the terrorist group from citizens, businesses and organizations in the area. Heavy tasking provided enough information to justify the activities and operations of the suspected terrorist group. The collection of information was through observation and interviews. I carried out a participative observation by taking a role in various social activities of the society such as games and entertainment...

Processing of the gathered information took place by translating the signal intelligence information, human intelligence reports and imagery intelligence information into a usable form.
The processed information went to another stage of that is exploitation. The processed information goes through an analysis to determine the significance of the terrorist group and deciding the way forward to curb the situation. The information at this level also undergoes processing in a more suitable form that fits the local area. Dissemination of the exploited information to specific intelligence departments and other key organizations in the local area led to the arrest of one member of the terrorist group. Conducting an interrogation with the terrorist member required the use of intelligence stages in order to obtain and establish facts about the terrorist group. Finding the right information from the group member was not easy due to lack of enough evidence and firm grounds to establish the case. Jones and Libicki (2008) support this argument by noting that, finding sensitive information about the sources and methods used by the terrorist group can be challenging. This is especially the case when a terrorist has not yet perpetrated an attack.

The confrontation technique facilitated the presentation of interrogation information about the group activities and available evidence to the terrorist member. The suspect's behaviors that may indicate the truth of the matter such as fidgeting and licking of lips confirms the suspect's participation in the terrorist activities. These indicate deception, which show the suspect is one of the terrorists. The next step was the development of a theme, which required the suspects to explain the motives behind participation in the group activities. By noting whether the suspect likes the theme and pays attention, the interrogation proceeded with a low and soft voice to lull the suspect into a false sense of security. The interrogation reduced the suspect's ability to deny because this could increase his confidence. When the theme earlier developed caught the attention of the suspect, the interrogation picked a different alternative because the suspect developed objections grounds in the earlier theme. The interrogation offered two contrasting motives for the suspect's participation in attacks beginning with a minor motive so that the suspect could not feel threatened. Contrasting motives included suggesting whether…

Sources used in this document:
References

Gross, E. (2006). The struggle of democracy against terrorism: Lessons from the United States,

the United Kingdom, and Israel. Charlottesville: University of Virginia Press.

Jones, G.S., & Libicki, C.M. (2008). How terrorist Groups End: Lesson for Countering Al Q

a'ida. Arlington: RAND Corporation.
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorist Attack on the U.S.
Words: 5892 Length: 21 Document Type: Term Paper

The House rejected an effort to require the withdrawal of the Marines by early 1984, on November 2nd, 1983. And, Senate "Democrats were unable to force a vote on a proposal, introduced on Oct. 26 as SRes253, to replace the Marines with a United Nations, or some other "neutral," force." The primary short-term threat was that Marines had become targets in Lebanon. They were no longer the neutral forces that had

Terrorist Attack on September 11, 2001, 19
Words: 1396 Length: 4 Document Type: Essay

Terrorist Attack On September 11, 2001, 19 Al Qaeda terrorists hijacked four United States commercial airliners travelling from the east coast to California. The hijackers forcibly took control of four planes. Two planes were purposefully crashed into the World Trade Center (WTC) in New York City. The third aircraft was flown into the Pentagon building in Washington DC. The fourth plane landed in a Pennsylvania field. All of the people on

Terrorist Attack What Type of
Words: 776 Length: 2 Document Type: Term Paper

A LOIC is software tool that aims a massive flood of traffic at a targeted site. This "weapon" disrupts communication or access, which renders the website useless (Moore, 2005). Your own analysis and feedback about the attack? The attack by Anonymous highlights the growing threat of cybercrime and the need to subsequently defend against it. Fortunately this attack didn't compromise private consumer information and files. However, as technology continues it rapid

Terrorist Attack on September 11th
Words: 3019 Length: 12 Document Type: Thesis

He was paraded at the front of the news media, knowing very well that he will not be able to say anything critical about his captors. When he was put to speak, he passed message by blinking his eyes in Morse code which spelled out T-O-R-T-U-R-E. In computers, images are array of numbers representing light intensities at various pixels or points. Digital pictures have either 8 bit or 24 bit

Corporate Risk Management: Terrorist Attack
Words: 617 Length: 2 Document Type: Term Paper

By examining existing occurrences of terrorist attacks, some of the unknown factor can be removed from the threat. Furthermore, the exact nature of terrorism can be quantified in terms of definitions and key terms. This also mitigates much of the uncertainty surrounding the issue. Terrorism can for example be understood by the definition of threat and/or violence in order to achieve an end. Terrorists generally want to force the

Fictional Terrorist Attack Terrorist Attack on Edinburgh
Words: 557 Length: 2 Document Type: Essay

Fictional Terrorist Attack Terrorist Attack on Edinburgh The FEMA CONPLAN is a publically available document that details the nation's priorities and strategies for a terrorist attack. The document list the protocols, mitigation strategies, and also the acknowledged considerations of what is typically defined as a terrorist attack There are many notable differences in the assumptions made for a terrorist attack, including that the attack will be large scale and intended to take

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now