Terrorist Attack Essay

Download this Essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Essay:

Terrorist Attack

Efforts made to identify a terrorist group and techniques used to prevent an attack

Crime incidences and terrorist attacks have been on the rise in many parts of Georgia State. Police have tried to conduct investigations and patrol in the area, but minimal or no justifiable results are available to explain the situation. The situation called for the intelligence department of police to conduct surveillance and come up with a report that explains the situation. The surveillance used intelligence techniques to identify the central problem in the local area and the measures used to curb the situation.

The intelligence department utilized a combination of intelligence stages and law enforcement to identify the source of the attacks and prevent further attacks from taking place in the local area. Strategic intelligence was to identify potential terrorist operations and targets within the community. Strategic intelligence assisted in predicting where future operational terrorist acts might occur. Obtaining the tactical target that may prove advantageous to the terrorists was also through the strategic gathering of information from local people and places. The procedure used tactical intelligence through training personnel to observe cultural patterns and behavioral modifications of the local people. In order to conduct the surveillance in the area, the use of the police force was more efficient than using a military intelligence system. According to Jones & Libicki (2008), unlike the military, police have a permanent presence in cities, towns and villages. This gives them a better understanding of local groups and threats in the environment.

Through using intelligence techniques such as identifying factors and scenarios that are out of the ordinary, comments from interviews and reactions of people who are suspicious, I was able to identify a terrorist group in the area. Through experience and understanding of the area, I identified the terrorist group by the intelligence procedure. Intelligence stages such as tasking provided information about the terrorist group from citizens, businesses and organizations in the area. Heavy tasking provided enough information to justify the activities and operations of the suspected terrorist group. The collection of information was through observation and interviews. I carried out a participative observation by taking a role in various social activities of the society such as games and entertainment places. Processing of the gathered information took place by translating the signal intelligence information, human intelligence reports and imagery intelligence information into a usable form.

The processed information went to another stage of that is exploitation. The processed information goes through an analysis to determine the significance of the terrorist group and deciding the way forward to curb the situation. The information at this level also undergoes processing in a more suitable form that fits the local area. Dissemination of the exploited information to specific intelligence departments and other key organizations in the local area led to the arrest of one member of the terrorist group. Conducting an interrogation with the terrorist member required the use of intelligence stages in order to obtain and establish facts about the terrorist group. Finding the right information from the group member was not easy due to lack of enough evidence and firm grounds to establish the case. Jones and Libicki (2008) support this argument by noting that, finding sensitive information about the sources and methods used by the terrorist group can be challenging. This is especially the case when a terrorist has not yet perpetrated an attack.

The confrontation technique facilitated the presentation of interrogation information about the group activities and available evidence to the terrorist member. The suspect's behaviors that may indicate the truth of the matter such as fidgeting and licking of lips confirms the suspect's participation in the terrorist activities. These indicate deception, which show the suspect is one of the terrorists. The next step was the development of a theme, which required the suspects to explain the motives behind participation in the group activities. By noting whether the suspect likes the theme and pays attention, the interrogation proceeded with a low and soft voice to lull the suspect into a false sense of security. The interrogation reduced the suspect's ability to deny because this could increase his confidence. When the theme earlier developed caught the attention of the suspect, the interrogation picked a different alternative because the suspect developed objections grounds in the earlier theme. The interrogation offered two contrasting motives for the suspect's participation in attacks beginning with a minor motive so that the suspect could not feel…[continue]

Cite This Essay:

"Terrorist Attack" (2013, August 21) Retrieved December 9, 2016, from http://www.paperdue.com/essay/terrorist-attack-94933

"Terrorist Attack" 21 August 2013. Web.9 December. 2016. <http://www.paperdue.com/essay/terrorist-attack-94933>

"Terrorist Attack", 21 August 2013, Accessed.9 December. 2016, http://www.paperdue.com/essay/terrorist-attack-94933

Other Documents Pertaining To This Topic

  • Terrorist Attack on September 11 2001 19

    Terrorist Attack On September 11, 2001, 19 Al Qaeda terrorists hijacked four United States commercial airliners travelling from the east coast to California. The hijackers forcibly took control of four planes. Two planes were purposefully crashed into the World Trade Center (WTC) in New York City. The third aircraft was flown into the Pentagon building in Washington DC. The fourth plane landed in a Pennsylvania field. All of the people on

  • Terrorist Attacks an Assessment of

    Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize

  • Terrorist Attack on the U S

    The House rejected an effort to require the withdrawal of the Marines by early 1984, on November 2nd, 1983. And, Senate "Democrats were unable to force a vote on a proposal, introduced on Oct. 26 as SRes253, to replace the Marines with a United Nations, or some other "neutral," force." The primary short-term threat was that Marines had become targets in Lebanon. They were no longer the neutral forces that had

  • Terrorist Attack What Type of

    A LOIC is software tool that aims a massive flood of traffic at a targeted site. This "weapon" disrupts communication or access, which renders the website useless (Moore, 2005). Your own analysis and feedback about the attack? The attack by Anonymous highlights the growing threat of cybercrime and the need to subsequently defend against it. Fortunately this attack didn't compromise private consumer information and files. However, as technology continues it rapid

  • Terrorist Attacks of 9 11 the Security of

    terrorist attacks of 9/11, the security of the United States of America has been transformed into the utmost priority of the presidential administration. Aside from the political rules however, more and more individuals place an increased emphasis on issues of security, especially the prevention of terrorist attacks. And in this setting of increasing focus on terrorist attack prevention, the literature in the field has also expended. Numerous books have been

  • Terrorist Attacks Changed the World and the

    terrorist attacks changed the world, and the way America looks at the world, but they also changed the way the world looks at us. Causes of September 11 Earlier attacks, including Tokyo nerve gas, Iran barracks, Cole attack Muslim hatred of United States and call to "jihad" LAX security at airports and U.S. entry points Lack of reliable security and intelligence information Effects of September 11 Death toll and destruction "War on terrorism" Homeland security Emotional issues World outlook and

  • Terrorist Attacks of the World Trade Center

    Terrorist Attacks of the World Trade Center and Failures of the U.S. Government to Combat Terrorism The 9/11 terrorist attacks on the World Trade Center in New York took by surprise the United States intelligence community and shocked the American people. Prior to this remarkable event, the American population perceived they were immune from terrorist attacks in the homeland. This paper will demonstrate many of the primary causes of the

Read Full Essay
Copyright 2016 . All Rights Reserved