Terrorist Attack Essay

Total Length: 1487 words ( 5 double-spaced pages)

Total Sources: 1+

Page 1 of 5

Terrorist Attack

Efforts made to identify a terrorist group and techniques used to prevent an attack

Crime incidences and terrorist attacks have been on the rise in many parts of Georgia State. Police have tried to conduct investigations and patrol in the area, but minimal or no justifiable results are available to explain the situation. The situation called for the intelligence department of police to conduct surveillance and come up with a report that explains the situation. The surveillance used intelligence techniques to identify the central problem in the local area and the measures used to curb the situation.

The intelligence department utilized a combination of intelligence stages and law enforcement to identify the source of the attacks and prevent further attacks from taking place in the local area. Strategic intelligence was to identify potential terrorist operations and targets within the community. Strategic intelligence assisted in predicting where future operational terrorist acts might occur. Obtaining the tactical target that may prove advantageous to the terrorists was also through the strategic gathering of information from local people and places. The procedure used tactical intelligence through training personnel to observe cultural patterns and behavioral modifications of the local people. In order to conduct the surveillance in the area, the use of the police force was more efficient than using a military intelligence system. According to Jones & Libicki (2008), unlike the military, police have a permanent presence in cities, towns and villages. This gives them a better understanding of local groups and threats in the environment.

Through using intelligence techniques such as identifying factors and scenarios that are out of the ordinary, comments from interviews and reactions of people who are suspicious, I was able to identify a terrorist group in the area. Through experience and understanding of the area, I identified the terrorist group by the intelligence procedure. Intelligence stages such as tasking provided information about the terrorist group from citizens, businesses and organizations in the area. Heavy tasking provided enough information to justify the activities and operations of the suspected terrorist group. The collection of information was through observation and interviews. I carried out a participative observation by taking a role in various social activities of the society such as games and entertainment places.
Processing of the gathered information took place by translating the signal intelligence information, human intelligence reports and imagery intelligence information into a usable form.

The processed information went to another stage of that is exploitation. The processed information goes through an analysis to determine the significance of the terrorist group and deciding the way forward to curb the situation. The information at this level also undergoes processing in a more suitable form that fits the local area. Dissemination of the exploited information to specific intelligence departments and other key organizations in the local area led to the arrest of one member of the terrorist group. Conducting an interrogation with the terrorist member required the use of intelligence stages in order to obtain and establish facts about the terrorist group. Finding the right information from the group member was not easy due to lack of enough evidence and firm grounds to establish the case. Jones and Libicki (2008) support this argument by noting that, finding sensitive information about the sources and methods used by the terrorist group can be challenging. This is especially the case when a terrorist has not yet perpetrated an attack.

The confrontation technique facilitated the presentation of interrogation information about the group activities and available evidence to the terrorist member. The suspect's behaviors that may indicate the truth of the matter such as fidgeting and licking of lips confirms the suspect's participation in the terrorist activities. These indicate deception, which show the suspect is one of the terrorists. The next step was the development of a theme, which required the suspects to explain the motives behind participation in the group activities. By noting whether the suspect likes the theme and pays attention, the interrogation proceeded with a low and soft voice to lull the suspect into a false sense of security. The interrogation reduced the suspect's ability to deny because this could increase his confidence. When the theme earlier developed caught the attention of the suspect, the interrogation picked a different alternative because the suspect developed objections grounds in the earlier theme. The interrogation offered two contrasting motives for the suspect's participation in attacks beginning with a minor motive so that the suspect could not feel….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Technologies Used by ISIS The Terrorist Organizations

Terrorists use social media for recruitment, propaganda sharing, psychological warfare, mobilization, information gathering, data mining etc. (InfoSec, 2018). Most terrorist attacks are choreographed meticulously for the purpose of attracting electronic media and international press. The objective of terrorism is to target the population watching and using media resources and not just the killing of victims. The strategists of ISIS employ social media as an important resource for mobilization. ISIS has managed to mobilize approx. 40,000 foreigners from around the world with enticing messages encouraging them to join them (Ward, 2018). Increased access to the internet in the Middle East and Africa has given ISIS a broader pool of support… Continue Reading...

ISIS Attacks in America Essay

terrorist attack carried out by someone claiming to be working on behalf of ISIS was actually directed by ISIS.  Therefore, for the purposes of this essay, we are working on the assumption that attacks by people who appear to be radicalized Muslims and claim a personal affiliation with ISIS are, indeed, ISIS attacks.  This essay will give some background information on ISIS and explain how it is structured.  It will discuss how ISIS is effectively using terrorist attacks outside of the United States and its plans to translate that strategy… Continue Reading...

Apple Vs Federal Government

that one of the masterminds of the December 2015 San Bernardino terrorist attack owned an iPhone 5C (Stavridis). Unable to unlock the device due to Apple's strong encryption software, the Federal Bureau of Investigations (FBI) sought the intervention of the courts to compel Apple, under the premise of All Writs of 1789, to assist in gaining access to the device. Apple strongly defied the order, reiterating its commitment to protecting customer data. This paper looks at both sides of the debate, i.e. Apple's concerns over privacy versus the government's concerns over national security. For Apple, privacy is integral. Indeed, the right… Continue Reading...

Security at Bay Street Shopping Mall

Street mall, it is impossible for it to diminish the prospective speed of incoming vehicles. According to studies, statistics indicate that more often than not terrorist attacks in malls have taken place through explosive. The mall lacks static bollards which facilitate the prevention of such instances. In particular, an area that is safeguarded using bollards offers a blast stand-off distance just in case an explosion takes place beside the complex and hinders vehicles from lashing into the buildings structure. The downside to this is that it is presently possible for a car coming to the perimeter in high speed to get into the building and if in case it has explosives can easily injure and… Continue Reading...

Islamic Terrorism Essay

passengers on the plane thwarted them. The day remains the largest terrorist attack on American soil and ushered in the second Iraq war and an era of abrogated civil rights under the umbrella of The Patriot Act, a government attempt to heighten monitoring of potential terrorists and prevent another 9-11 style attack (United States Department of Justice, 2016). It also brought attention to a new type of threat; jihad, as these terrorists styled themselves as holy warriors. What is Jihad? While members of Al Qaeda and subsequent terrorist groups have called themselves mujahideen, jihadists, and jihadi and have proclaimed that their… Continue Reading...

Torture and Interrogation Essay

use of torture is justified given the potential for future terrorist attacks on the scale of those of September 11, 2001 and the need to protect the country’s interests at home and abroad. For example, former Vice President Dick Cheney acknowledged in an exit interview that he was directly responsible for authorizing the CIA’s use of torture. When questioned concerning the CIA’s treatment of Khalid Sheikh Mohammed, a terrorist suspect incarcerated in a clandestine CIA prison who was waterboarded more than 100 times, Cheney conceded that he was not only aware of the program, he had authorized the use of… Continue Reading...

Working for International Peace

the means to battle the largely Christian government via conventional warfare. Therefore, they have resorted to terrorist attacks to cause residents to flee and to attempt to gain territory in such a manner. The principle means of intervening in this activity is to aid the Christian government of Nigeria with forces that are opposed to terrorism. This aid will include those marshaled and containing troops from the United States, Western Europe, and the United Nations in general. It is critical to supply the Nigerian government with the supplies and manpower to counteract the terrorist efforts of Boko Haram. These resources will include increasing surveillance of public… Continue Reading...

Boko Haram and Diffusion of Innovation

spread of the group's ideas and squelch its ability to successfully carry out terrorist attacks, or to emphasize the ways Boko Haram's activities have disrupted the Nigerian economy. Research Design The methodology used for this study will be quantitative and quasi-experimental. A regression discontinuity design or a propensity score matching method are both quasi-experimental design methods that can be used for this research because the research design may require the use of retrospective data related to the Nigerian economy (White & Sabarwal, 2014). A quasi-experimental design can also be used to examine the diffusion of information, ideology, technology, and terrorist techniques throughout the… Continue Reading...

The Trump Travel Ban

this perception is flawed. There has been a decrease in terrorist attacks, with an increase only in severity (Foley) If the United States under President Trump wishes to protect itself and its people by limiting who can come into the country, this may not be the best route. The thing that is important to understand is that the banning of these countries is nothing new. Going back more than a century, the Chinese Exclusion Act kept Chinese immigrants from moving to the United States and those that were in the United States, from gaining citizenship. “Chinese Exclusion Act stops immigration… Continue Reading...

Persuasive Speech

1: Link between immigration and terrorism. i. Illegal immigrants in the nation have been a part of just about every major terrorist attack on America. ii. These terrorists have entered the nations by exploiting the weaknesses and flaws in just about every part of the United States system of immigration. b. Main Point 2: Link between immigration and adverse economic effects i. Undocumented workers and illegal immigrants have undercut the wages and taken up employment opportunities that would otherwise be handed to Americans. ii. Americans end up having to settle for lower wages. iii. Immigrants make use of social programs, for instance, schools and hospitals, which are costly to the American… Continue Reading...

Guantanamo Bay Essay

suspected terrorists, an issue that has assumed enormous importance since the terrorist attacks of September 11, 2001 and the Persian Gulf wars. An analysis of the issues that are involved in keeping Guantanamo Bay open is provided below. Analysis of Issue Since 2002, the U.S. government has detained alleged enemy combatants in the War on Terror at Guantanamo Bay Naval Base (Guantanamo) in Cuba (Constitutional Law - Guantanamo Habeas - D.C. Circuit Holds That Petitioner Was Properly Detained as ‘Part Of’ Enemy Force, 2014, p. 2138). Today, despite more than half of the prisoners at Guantanamo Bay having been recommended for… Continue Reading...

International Law on Overt and Covert Interventions

Al Qaeda in 2001 was supported and has been considered as a principle of self-defense based on the imminent terrorist attacks, thus, it was critical to carrying out the military action against Taliban to prevent an imminent attack from the Taliban organization. Indeed, Section 1373(2001) and 1368(2001) of the Security Council resolutions view the military intervention against Taliban as a self-defense to prevent large-scale terrorist attacks such as an attack on Trade Center on September 2001. The principle of international law also allows the nation states to use the overt intervention to protect their sovereignties. Stratton, (2009) states that the right of a state includes sovereignty, equality and political… Continue Reading...

Strategies to Improve Collaboration and Cooperation Between the Homeland Security Agencies

these three goals i.e. First goal is protecting and resisting any terrorist attacks: In this, the DHS prevents illegal acquisition, movement, importation, or application of biological, chemical, nuclear and radiological materials and such capabilities inside the U.S (DHS, 2018). The second goal is to reduce key resource and critical infrastructure vulnerability, prevent terrorist attacks on major events, essential leadership and other such like hazards. DHS secretary, Napolitano initiated and guided the worldwide initiative for enhancing the international systems of aviation through collaboration and partnerships with industry and governments, new technology investment, and strengthened targeting initiatives (DHS, 2018). The secretary also started… Continue Reading...

The Character of the Oklahomans

support farming. In 1995, tragedy struck once more as a homegrown terrorist attack on the Alfred P. Murrah Federal Building killed more than 150 people, and Oklahomans again had to show their grit and tenacity in facing disaster. This paper will show how the character of the Oklahomans has been through a lot in the last 100 years—and why, as Helen Keller points out, “Character cannot be developed in ease and quiet. Only through experience of trial and suffering can the soul be strengthened, ambition inspired, and success achieved.” Oklahomans have faced several trails. From the early days when they were… Continue Reading...

Emirates Airlines PESTLE AND SWOT Analysis

impacted the operations of Emirates Airlines. According to Wills (2018), in the past year, Europe experienced 205 terror attacks. The number of jihadist terrorist attacks grew in the past year and this resulted in fears of a perceived Islamisation of society. The effect of these attacks led to a decline in individuals traveling to the Middle East owing to such negative perceptions and therefore a decline in the demand for air tickets. It is recommended that Emirates Airlines should try and advance its brand name and image in a positive manner to ensure that consumers still use the airline for transportation means irrespective of the negative outlook of the Middle East. Economic Factor… Continue Reading...

Florida's Plan for Responding to Terrorism

are: “1) Identifying the event as a known, suspected, or threatened terrorist or cyber terrorist attack; and, 2) Assuring notifications to agencies are made” (p. 3-1). According to the Federal Emergency Management Agency (FEMA, 2002), these two-step procedure sets up the motions for adequate response to be set in motion, as there are many facets to efficient response to terrorism. Identifying the event and alerting the responsible agencies of the event are crucial. This paper will discuss Florida’s Terrorism Incident Response Annex and show why it is appropriate and adequate. According to FEMA (2002), state and local planner should display the following characteristics in… Continue Reading...

Developing an Annex for an Emergency

two-step process for identifying whether a terror event has occurred: “1) Identifying the event as a known, suspected, or threatened terrorist or cyber terrorist attack; and, 2) Assuring notifications to agencies are made” (p. 3-1). The Incident Commander will be responsible, moreover, for following these steps: 1. Size-up the situation. 2. Conduct hazard analysis. 3. Assess the Risk. 4. Identify Strategic Goals (Objectives) 5. Implement Tactics and Strategies 6. Debriefing (Henle Hazmat Training & Consulting, 2016). Relevant Partners Jurisdictional Lead Agencies For Level 1 Incident: Local Fire Department—the FD will take jurisdiction lead as Incident Commander and establish chain of command with local police. Public Works—will report up the chain of command through… Continue Reading...

National Infrastructure Protection Plan NIPP

protection efforts, strategies, and resources towards reducing risk by minimizing vulnerabilities, preventing threats, and lessening the damages caused by terrorist attacks plus natural disasters. The National Infrastructure Protection Plan comes with a risk management framework which identified and built on both private and public sector programs and strategies for CIP in order to ensure the efficient deployment of important resources to protect infrastructure. According to the Department of Homeland Security (2009), protection entails all measures meant to minimize the threats or risks to critical infrastructure systems, assets, resources, functions, networks, and the links in between. Specifically, the protection may include measures taken to prevent threats, measure meant to remove… Continue Reading...

Nursing Shortage Essay

health crises. Natural disasters, terrorist attacks, and disease outbreaks all require massive numbers of qualified healthcare professionals. Nurses work on the front lines to help people. Therefore, eliminating the nursing shortage is a pressing public policy issue. References Allen, L. (2008). The nursing shortage continues as faculty shortage grows. Nursing Economics 26(1): 35-40. Haddad, L.M. & Toney-Butler, T.J. (2019). Nursing shortage. StatPearls. https://www.ncbi.nlm.nih.gov/books/NBK493175/ Laschinger, H.K.S. & Finegan, J. (2005). Using empowerment to build trust and respect in the workplace. Nursing Economics 23(1): 6-13. Oulton, J.A. (2006). The global nursing shortage.… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Terrorist Attack" (2013, August 21) Retrieved April 27, 2024, from
https://www.aceyourpaper.com/essays/terrorist-attack-94933

Latest MLA Format (8th edition)

Copy Reference
"Terrorist Attack" 21 August 2013. Web.27 April. 2024. <
https://www.aceyourpaper.com/essays/terrorist-attack-94933>

Latest Chicago Format (16th edition)

Copy Reference
"Terrorist Attack", 21 August 2013, Accessed.27 April. 2024,
https://www.aceyourpaper.com/essays/terrorist-attack-94933