Essay: Terrorist Attack Efforts

Pages: 5 (1487 words)  ·  Bibliography Sources: 1+  ·  Level: College Junior  ·  Topic: Terrorism  ·  Buy This Paper


[. . .] Contrasting motives included suggesting whether the group participates in attacks for money or political motives.

Contrasting motives lead the suspect to choose one motive in which the interrogation could proceed. Choosing one motive between the two offered confirms the suspect's participation in the group terrorist activities. The interrogation did not involve any torture or coercion to obtain the required information from the suspects. Some research also shows that coercion can help obtain information about terrorist activities and eliminate the occurrence of future events. According to Gross (2006), there are circumstances in which a suspect may refuse to provide information and the only alternative is to torture the suspect in order to prevent the occurrence of more events.

From the information obtained from the interrogated suspect, the intelligence department established a surveillance plan in the area. The reason why surveillance was necessary is the little information provided by the group member. There was also a need to establish and attain a stronger ground for the facts obtained through interrogation. The necessity to obtain key information about the movements of the group and plans required the conducting of surveillance. This information could help to track the group before a more injurious event could take place. Surveillance could further provide clarification about the group leaders and the motives behind the terrorist activities. Roadblocks to inspect vehicles in all major roads of the state are a surveillance measure that helped to obtain information about suspicious people in the local area. This surveillance ensures the type of materials transported in and out of the state. The aim of this surveillance was to countercheck transportation of materials used by terrorist. Intelligence information from this surveillance was critical in determining the paths used by terrorist to escape after the attacks. Jones & Libicki (2008) notes that, intelligence is the principle source of information on terrorists and their activities.

Another surveillance to obtain intelligence information was through controlling, monitoring and recording of information in communication channels. This is information from telephone conversations, e-mails, fax and any other form of communication that terrorist may use. This required government intervention to allow the installation of 'wire tap' to capture the content of phone or internet communications. Installation of 'pen register' and a 'trap and trace device' to capture routing information is also necessary in order to indicate whom one person communicates with and the time. This form of surveillance also took into account the use of a hidden microphone popularly known as 'bug' to eavesdrop on a person-to-person communications.

Intelligence information obtained from the two forms of surveillance provided a base for designing security measure that could target the terrorist group. Communication surveillance provided crucial information about the movement and plans of the terrorist group. All their plans and targets were now clear to the investigation department. A strategic plan to bring the terrorist into control was to set-up an unexpected security system in their next terror target. From the communication intelligence obtained through communication surveillance, it was easy to know the group's next target. All target measures were in place to arrest the situation before a disaster and to have the terrorist in control. Communication surveillance provided information that the next target of the group was the State's business park. Although the intelligence had the necessary information about the event, my actions failed to put the terrorist group in control. A disastrous event took place, and the terrorist managed to escape the hands of the law.

Establishment of the crime-scene was strategically, but poor response from the police and intelligence department led to a failure in controlling the situation. Slow decision-making and poor orders from the State's police commander led to another terrorist attack in my local area. The mission failed due to a weak strategy adopted by police in responding to major emergencies such as the terrorist attack at the State's business park. The police and the government have failed to protect its people from terrorist attacks. Political unwillingness and lack of understanding between different organs of the government may be a cause of reduced response to criminal activities. Gross (2006) suggests that, a state must refrain from participating in any activities that may cause harm or suffering to the general population.


Gross, E. (2006). The struggle of democracy against terrorism: Lessons from the United States,

the United Kingdom, and Israel. Charlottesville: University of Virginia Press.

Jones, G.S., & Libicki, C.M. (2008). How terrorist Groups End: Lesson for Countering Al… [END OF PREVIEW]

Four Different Ordering Options:

Which Option Should I Choose?

1.  Buy the full, 5-page paper:  $28.88


2.  Buy + remove from all search engines
(Google, Yahoo, Bing) for 30 days:  $38.88


3.  Access all 175,000+ papers:  $41.97/mo

(Already a member?  Click to download the paper!)


4.  Let us write a NEW paper for you!

Ask Us to Write a New Paper
Most popular!

Terrorist Attack on the U.S. Marine Compound in Beirut Airport in 1983 Term Paper

Terrorist Attacks Term Paper

Terrorist Attack on September 11th of 2001 Thesis

Attack in 2001 Term Paper

Disrupting Terror Group Finances to Exploit Weaknesses in Terrorist Organizations Research Paper

View 911 other related papers  >>

Cite This Essay:

APA Format

Terrorist Attack Efforts.  (2013, August 21).  Retrieved July 18, 2019, from

MLA Format

"Terrorist Attack Efforts."  21 August 2013.  Web.  18 July 2019. <>.

Chicago Format

"Terrorist Attack Efforts."  August 21, 2013.  Accessed July 18, 2019.