Dustin K MacDonald

Menu
  • Home
  • About
  • Economic and Community Development
    • Notary in Sigourney Iowa
  • Nonprofit Management
    • Counselling and Service Delivery
    • Suicide Prevention / Crisis Intervention
  • Politics and Governance
  • Math and Statistics
Menu

Development Operations ICT2A04L

Posted on September 25, 2018November 23, 2019 by Dustin

Table of Contents

  • Introduction to Development Operations
  • Terrorism Structure and Vulnerabilities
  • Impact of Terrorism on Democracy
  • Terrorist Tactics

Introduction to Development Operations

The second module provides more information on the specifics of terrorist acts. They create short-term crises that exploit the routine activities of authorities. Terrorist threats develops quickly and with little warning. (Celmer, 1987) Terrorists operate both domestically and internationally.

Terrorism is separated into state-controlled and non-state controlled. Most of this information should be review for anyone who is not a newbie to the subject. Questions are suggested to examine terrorist targets:

  • What are they doing?
  • Why are they doing it?
  • To whom are they doing it?
  • What do they hope to accomplish?

They identify the need to separate the victims (e.g. civilians killed in a car bomb) from the influencers (the wider civilian population) from the decision-makers (e.g. the government.)

Terrorism Structure and Vulnerabilities

Terrorism is separated into two categories, those who perform direct, illegal terrorist activities, and those who provide support. This can be active support, such as individuals who fundraise for Hamas or passive support, like Pakistan allowing Bin Laden to live inside its borders. (Byman, 2004; CNN Wire, 2011) Support structures can act as a “force multiplier” making a terrorist group much more effective.

Exploiting support structures involves close monitoring of them and sourcing of informants. For an example, merchants may benefit from association with the terrorists by selling their goods and otherwise have no ideological connection with the group.

Terrorist cells are reviewed. They are small, have limited communication with other cells and larger leadership (e.g. terrorist cells had limited contact with the leaders of Al Qaeda). Knowledge is limited to protect security. Harris-Hogan (2013) explored a cell in Sydney that generally met this requirements, although they had significant operational support outside of the cell.

Vulnerabilities of the terrorist cell are noted. Some of these include:

  • Power struggles in the group which can compromise the ability to attack
  • Always existing as criminals, especially with fame which can end a terrorist’s career (e.g. Osama bin Laden)
  • Effective counterterrorism operations which destroys cells and disrupts activities
  • Difficulty in sourcing weaponry (depending on location)

Impact of Terrorism on Democracy

Terrorism disrupts democracy by convincing the general public that the government is not responding appropriately to terrorism. It can create real or appeared repression by the government, like Israel’s response to Palestine (Bejan & Parkin, 2015)

This is a complicated area because there is a constant battle between privacy protection advocates and intelligence officials who need data to perform their jobs effectively.

Terrorist Tactics

The final topic in this module is terrorist tactics, which lists a variety of techniques (bombings, kidnappings, assassinations, etc.) and moves on to discuss CBRN (Chemical, Biological, Radiological and Nuclear) threats and finally the goals of terrorism, which amount to a desire for power.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy Policy

See here for our privacy policy. This site uses affiliate links and Adsense ads to provide targeted advertising.

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention economic development empathy evaluation forecasting fundraising governance humint inpatient intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning sexual violence sigourney social media statistics suicide suicide assessment suicide myths suicide risk assessment technology terrorism training violence violence risk assessment youth

Recommended Posts

  • Conducting Psychosocial Assessments
  • DCIB Model of Suicide Risk Assessment
  • ABC Model of Crisis Intervention
  • My Friend is Suicidal - What do I do?

Recent Posts

  • Jarad Klein ignores the science on COVID-19
  • Certificate for the Study of Capitalism
  • Review of UpLevel Data Science 2020
  • Quantic Master of Business Administration (MBA)
  • 2020 Election Results, Keokuk County Iowa

Archives

  • January 2021 (1)
  • December 2020 (1)
  • November 2020 (4)
  • July 2020 (1)
  • June 2020 (1)
  • April 2020 (1)
  • March 2020 (4)
  • February 2020 (7)
  • January 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • January 2019 (1)
  • December 2018 (4)
  • November 2018 (3)
  • October 2018 (3)
  • September 2018 (19)
  • October 2017 (2)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (39)
  • May 2017 (3)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (4)
  • January 2017 (5)
  • December 2016 (4)
  • November 2016 (4)
  • October 2016 (5)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (5)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (2)
  • March 2016 (2)
  • February 2016 (2)
  • January 2016 (4)
  • December 2015 (2)
  • November 2015 (2)
  • October 2015 (2)
  • September 2015 (2)
  • August 2015 (1)
  • June 2015 (2)
  • May 2015 (5)
  • April 2015 (3)
  • March 2015 (8)
  • February 2015 (12)
  • January 2015 (28)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • Dustin on Ultimate Guide to Starting a Crisis Line
  • Jarin on Ultimate Guide to Starting a Crisis Line
  • Dustin on Quantic Master of Business Administration (MBA)
  • Dustin on Certificate for the Study of Capitalism
  • Tricia Fox on Quantic Master of Business Administration (MBA)

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention economic development empathy evaluation forecasting fundraising governance humint inpatient intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning sexual violence sigourney social media statistics suicide suicide assessment suicide myths suicide risk assessment technology terrorism training violence violence risk assessment youth
© 2021 Dustin K MacDonald | Powered by Minimalist Blog WordPress Theme