Terrorist Attack Essay

Terrorist Attack Efforts made to identify a terrorist group and techniques used to prevent an attack

Crime incidences and terrorist attacks have been on the rise in many parts of Georgia State. Police have tried to conduct investigations and patrol in the area, but minimal or no justifiable results are available to explain the situation. The situation called for the intelligence department of police to conduct surveillance and come up with a report that explains the situation. The surveillance used intelligence techniques to identify the central problem in the local area and the measures used to curb the situation.

The intelligence department utilized a combination of intelligence stages and law enforcement to identify the source of the attacks and prevent further attacks from taking place in the local area. Strategic intelligence was to identify potential terrorist operations and targets within the community. Strategic intelligence assisted in predicting where future operational terrorist acts might occur. Obtaining the tactical target that may prove advantageous to the terrorists was also through the strategic gathering of information from local people and places. The procedure used tactical intelligence through training personnel to observe cultural patterns and behavioral modifications of the local people. In order to conduct the surveillance in the area, the use of the police force was more efficient than using a military intelligence system. According to Jones & Libicki (2008), unlike the military, police have a permanent presence in cities, towns and villages. This gives them a better understanding of local groups and threats in the environment.

Through using intelligence techniques such as identifying factors and scenarios that are out of the ordinary, comments from interviews and reactions of people who are suspicious, I was able to identify a terrorist group in the area. Through experience and understanding of the area, I identified the terrorist group by the intelligence procedure. Intelligence stages such as tasking provided information about the terrorist group from citizens, businesses and organizations in the area. Heavy tasking provided enough information to justify the activities and operations of the suspected terrorist group. The collection of information was through observation and interviews. I carried out a participative observation by taking a role in various social activities of the society such as games and entertainment...

...

Processing of the gathered information took place by translating the signal intelligence information, human intelligence reports and imagery intelligence information into a usable form.
The processed information went to another stage of that is exploitation. The processed information goes through an analysis to determine the significance of the terrorist group and deciding the way forward to curb the situation. The information at this level also undergoes processing in a more suitable form that fits the local area. Dissemination of the exploited information to specific intelligence departments and other key organizations in the local area led to the arrest of one member of the terrorist group. Conducting an interrogation with the terrorist member required the use of intelligence stages in order to obtain and establish facts about the terrorist group. Finding the right information from the group member was not easy due to lack of enough evidence and firm grounds to establish the case. Jones and Libicki (2008) support this argument by noting that, finding sensitive information about the sources and methods used by the terrorist group can be challenging. This is especially the case when a terrorist has not yet perpetrated an attack.

The confrontation technique facilitated the presentation of interrogation information about the group activities and available evidence to the terrorist member. The suspect's behaviors that may indicate the truth of the matter such as fidgeting and licking of lips confirms the suspect's participation in the terrorist activities. These indicate deception, which show the suspect is one of the terrorists. The next step was the development of a theme, which required the suspects to explain the motives behind participation in the group activities. By noting whether the suspect likes the theme and pays attention, the interrogation proceeded with a low and soft voice to lull the suspect into a false sense of security. The interrogation reduced the suspect's ability to deny because this could increase his confidence. When the theme earlier developed caught the attention of the suspect, the interrogation picked a different alternative because the suspect developed objections grounds in the earlier theme. The interrogation offered two contrasting motives for the suspect's participation in attacks beginning with a minor motive so that the suspect could not feel threatened. Contrasting motives included suggesting whether…

Sources Used in Documents:

References

Gross, E. (2006). The struggle of democracy against terrorism: Lessons from the United States,

the United Kingdom, and Israel. Charlottesville: University of Virginia Press.

Jones, G.S., & Libicki, C.M. (2008). How terrorist Groups End: Lesson for Countering Al Q

a'ida. Arlington: RAND Corporation.


Cite this Document:

"Terrorist Attack" (2013, August 21) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/terrorist-attack-94933

"Terrorist Attack" 21 August 2013. Web.26 April. 2024. <
https://www.paperdue.com/essay/terrorist-attack-94933>

"Terrorist Attack", 21 August 2013, Accessed.26 April. 2024,
https://www.paperdue.com/essay/terrorist-attack-94933

Related Documents

Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize

Terrorist Attack on the U.S.
PAGES 21 WORDS 5892

The House rejected an effort to require the withdrawal of the Marines by early 1984, on November 2nd, 1983. And, Senate "Democrats were unable to force a vote on a proposal, introduced on Oct. 26 as SRes253, to replace the Marines with a United Nations, or some other "neutral," force." The primary short-term threat was that Marines had become targets in Lebanon. They were no longer the neutral forces that had

Terrorist Attack On September 11, 2001, 19 Al Qaeda terrorists hijacked four United States commercial airliners travelling from the east coast to California. The hijackers forcibly took control of four planes. Two planes were purposefully crashed into the World Trade Center (WTC) in New York City. The third aircraft was flown into the Pentagon building in Washington DC. The fourth plane landed in a Pennsylvania field. All of the people on

A LOIC is software tool that aims a massive flood of traffic at a targeted site. This "weapon" disrupts communication or access, which renders the website useless (Moore, 2005). Your own analysis and feedback about the attack? The attack by Anonymous highlights the growing threat of cybercrime and the need to subsequently defend against it. Fortunately this attack didn't compromise private consumer information and files. However, as technology continues it rapid

terrorist attacks of 9/11, the security of the United States of America has been transformed into the utmost priority of the presidential administration. Aside from the political rules however, more and more individuals place an increased emphasis on issues of security, especially the prevention of terrorist attacks. And in this setting of increasing focus on terrorist attack prevention, the literature in the field has also expended. Numerous books have been

Terrorist Attacks of the World Trade Center and Failures of the U.S. Government to Combat Terrorism The 9/11 terrorist attacks on the World Trade Center in New York took by surprise the United States intelligence community and shocked the American people. Prior to this remarkable event, the American population perceived they were immune from terrorist attacks in the homeland. This paper will demonstrate many of the primary causes of the