terrorist assault essay
Excerpt by Essay:
Efforts built to identify a terrorist group and techniques used to prevent an attack
Crime cases and terrorist attacks have already been on the rise in many parts of Atlanta State. Authorities have attempted to conduct research and patrol in the region, but little or no justifiable results are offered to explain the situation. The situation called for the brains department of police to conduct security and think of a report that explains the situation. The monitoring used intelligence techniques to identify the central problem in the neighborhood and the actions used to curb the situation.
The intelligence section utilized a mix of intelligence phases and police force to identify the source of the problems and prevent even more attacks coming from taking place from your area. Proper intelligence was to identify potential terrorist procedures and targets within the community. Strategic intelligence assisted in predicting where future operational terrorist works might take place. Obtaining the technical target which may prove advantageous to the terrorists was also through the strategic gathering info from local people and locations. The procedure utilized tactical cleverness through schooling personnel to observe cultural patterns and behavioral modifications with the local people. To be able to conduct the surveillance in the area, the police force was more efficient than using a armed service intelligence program. According to Jones Libicki (2008), as opposed to the army, police have got a permanent occurrence in cities, towns and villages. This provides them a better understanding of local groups and threats in the environment.
Through using brains techniques including identifying factors and cases that are remarkable, comments by interviews and reactions of folks that are shady, I was able to identify a terrorist group in the place. Through knowledge and knowledge of the area, My spouse and i identified the terrorist group by the brains procedure. Brains stages including tasking presented information about the terrorist group from citizens, businesses and companies in the place. Heavy tasking provided enough information to warrant the activities and operations in the suspected terrorist group. The collection of information was through observation and interviews. I completed a participative observation if you take a role in a variety of social activities of the world such as games and entertainment places. Finalizing of the obtained information happened by translation the transmission intelligence info, human intelligence reports and imagery intelligence information right into a usable form.
The prepared information visited another level of that is usually exploitation. The processed info goes through an analysis to determine the significance from the terrorist group and determining the way forward to curb the problem. The information at this level as well undergoes digesting in a more appropriate form best suited the local place. Dissemination of the exploited info to specific intelligence departments and other important organizations from your area resulted in the arrest of one person in the terrorist group. Doing an interrogative with the terrorist member needed the use of cleverness stages to be able to obtain and establish facts about the terrorist group. Choosing the best information from your group affiliate was not convenient due to insufficient enough proof and organization grounds to determine the case. Williams and Libicki (2008) support this debate by observing that, locating sensitive advice about the sources and methods used by the terrorist group could be challenging. This is particularly the case every time a terrorist have not yet perpetrated an strike.
The conflict technique caused the presentation of revendication information about the group activities and available data to the terrorist member. The suspect’s behaviours that may suggest the truth in the matter including fidgeting and licking of lips verifies the suspect’s participation in the terrorist activities. These show deception, which show the suspect is one of the terrorists. The next step was the development of a composition, which essential the suspects to explain the motives in back of participation in the group actions. By noting whether the suspect likes the theme and pays focus, the revendication proceeded with a low and soft tone to tranquillize, calm down, quiet, quieten the suspect into a fake sense of security. The interrogation reduced the suspect’s ability to reject because this may increase his confidence. If the theme previous developed captured the attention from the suspect, the interrogation picked a different option because the believe developed arguments grounds in the last theme. The interrogation presented two contrasting motives for the suspect’s participation in attacks you start with a minor purpose so that the believe could not experience