StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Terrorist Activities & Community Members - Assignment Example

Cite this document
Summary
Terrorist Activities & Community Members Name School Abstract This paper provides a brief overview of how information gathering can assist law enforcement in obtaining information on potential terrorist activities that could occur in the near future. Gathering information from the community is a very valuable component of any law enforcement’s information tools which can then be incorporated into any of its database systems for further analyses…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Terrorist Activities & Community Members
Read Text Preview

Extract of sample "Terrorist Activities & Community Members"

Download file to see previous pages

However, the first major step is getting information from the community as this is the largest information gathering sector for law enforcement. Introduction Terrorist activities are planned crimes against the people in the form of bombings, fires, disruptions of services through electronic hacking, and in shootings of innocent people which cause injuries and death (EMD 2013). Other crimes may also be attached to terrorist activities in the form of robberies when terrorists commit these in order to build up financial funding for their endeavors.

It is essential when law enforcement departments are setting up programs on surveying potential terrorism activities, that community members are also included in the process of observing specific activities and people who act suspiciously and could indicate a potential for an upcoming terrorist act (EMD 2013; SARA 2013). Training may also be included so that people understand what it is they must look for so as to report it correctly to law enforcement members. 1. Some of the types of businesses that would be a hunting ground for terrorists are pawn shops that carry firearms for sale, old cell phones, huge amounts of hardware tools, nails, nuts and bolts, knapsacks and other cheap items; home improvement centers which carry everything listed above, new, but can be bought in huge quantities; libraries that have Internet access for information searches as an anonymous users, plus literature that can be reviewed for free without checking them out of the library (Smith 2008).

Terrorists may also visit their target areas, such as stadiums, airports, specific high-risk government buildings such as town halls, or capital buildings, large hotels with international clientele, and well-known businesses (EMD 2013). New York City and Washington, D.C. both have a large number of buildings that are high-risk for terrorist attacks, such as the Financial District in New York City, and the Capital Building in Washington (Smith 2008). Depending on the type of terrorist, national or international, other businesses at risk are newspapers, hospitals, colleges, utility and nuclear plants, abortion and Planned Parenthood clinics, train and railroad centers, and Internet provider businesses (EMD 2013). 2. Businesses can be monitored by agreement and in partnership with the owners, who agree to hand over information about people and events that occur that might preclude an eventual attack.

A pawn shop, for example, can inform the police if someone comes in and wants to purchase a large amount of old cell phones in the shop case. While some non-profit businesses do purchase these as part of a program for the elderly, the poor or for women who have been in abusive relationships and are being relocated elsewhere, normally, large purchases of these types would signal a potential for a terrorist who will use the phones as bomb detonators (EMD 2013). Internet connections can also be monitored, so long as a proper warrant has been approved through regular channels, not only for what businesses are doing but also to observe customers’ communications or even if there is tampering from the outside that indicates hacking from a terrorist organization (Menn 2013). 3. If business owners and community members become suspicious

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Terrorist Activities & Community Members Assignment”, n.d.)
Retrieved from https://studentshare.org/law/1482497-terrorist-activities-community-members
(Terrorist Activities & Community Members Assignment)
https://studentshare.org/law/1482497-terrorist-activities-community-members.
“Terrorist Activities & Community Members Assignment”, n.d. https://studentshare.org/law/1482497-terrorist-activities-community-members.
  • Cited: 0 times

CHECK THESE SAMPLES OF Terrorist Activities & Community Members

Terrorism and Political Violence

Given that terrorist have a very small and secretive organization; it leaves the opponents with no choice to defend against them.... The question one asks is, can an Unabomber doing a campaign for terrorism be termed as criminal, terrorist or a revolutionist?... Anyone is termed as a terrorist as long as that person has caused harm to innocent civilians only that military action is a form of terrorism with a different name (Fridell,2001).... Nowadays most terrorist continue to perform their acts in the name of revolution and fulfillment of religious duties....
12 Pages (3000 words) Essay

Local Law Enforcement Involvement in Joint Terrorism Task Forces

The essay below discusses these and the effects of terrorist activities in the local community.... Such networks are effectively coordinated; they continue to recruit their members from the society thereby building their network to facilitate their illegal activities in the country.... When recruiting members into the outfits, they target vulnerable members of the society whose faith is largely questionable.... The task force on security will therefore include the local community, lawmakers and the local law enforcement possibly the police force....
11 Pages (2750 words) Research Paper

Issues on Terrorism

The recruitment is not based on the number of recruits but the quality of the newly recruited members.... Additional new members of the group may be recruited from other jihad groups whose goal are limited only to their respective organization.... On the basis of the ideals to defend muslim community, expectedly, Muslim men from all over the world may join the militant jihad, particularly those who have implanted within themselves hatred and oversees that the influence of western countries as well as their allies pose threat to their areas of jurisdiction Norton and Company, 2004)....
4 Pages (1000 words) Essay

Terrorist Organization Peculiarities

Such terrorists are very careful in regulating the amount of violence and destruction caused by their attacks, whose purpose is to obtain benefits without antagonizing or losing the goodwill of its supporters in the international community.... Not surprisingly, these terrorists restrict their activities to kidnappings and destruction of monuments.... The strategy adopted by terrorists subscribing to the views of national terrorism is that they utilize terrorist attacks to carve out a separate country from the country in which they are resident....
7 Pages (1750 words) Essay

Preventing Terrorism: Understanding Radicalisation, Vulnerabilty and Improving Practice

The incarcerated prisoners can instruct the other group members to continue the terrorist attacks.... The government's prevent strategy stops radical terrorist attacks.... One of the radical terrorist groups is Osama bin Laden's Al Qa'ida (UK Crown, 2011).... Likewise, the serious radicals may convince the other prisoners to help the radical leader implement his or her terrorist plots (UK Crown, 2011)....
12 Pages (3000 words) Essay

International Financial Crime Law

nbsp;… Terrorists usually compromise with some of the community leaders in order for them to be allowed to live amongst the community members.... This has been the major cause of the proliferation of terrorist activities which have been a major security threat, especially for the United States.... nbsp; The supporters of terrorist activities are usually governments as well as wealthy business people.... The current paper highlights that terrorism is a highly organized form of crime that is conducted by individuals who are not satisfied with the policies of the international community an more so the policies of the United States and its allies....
14 Pages (3500 words) Research Paper

How Intelligence Community Exploitates Weaknesses in Terrorist Organizations

The paper "The Role of Intelligence community in the Exploitation of Weaknesses in Terrorist Organizations" discusses that terrorism is a “moral problem” with psychological rooting and the major concern in combating terrorism is dissuading younger people that unwittingly accept the moral philosophies of terrorist organizations.... Reliable information is a crucial instrument in combating the menace and, therefore, the intelligence community has a critical role to play in exploiting the weakness of terrorist organizations to determine the action toward them....
10 Pages (2500 words) Admission/Application Essay

Counterterrorism Efforts

In the paper “Counterterrorism Efforts” the author looks at the efforts that have disrupted the activities of the terrorist after the attacks on the United States of America on September 11.... The US still faces serious and continued threats by the terrorists that mostly come from Islamic terrorist groups.... Ensuring that terrorist and their tools of destruction have not entered the country makes it difficult for the terrorists to identify targets....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us