Dustin K MacDonald

Menu
  • Home
  • About
  • Economic and Community Development
  • Nonprofit Management
    • Counselling and Service Delivery
    • Suicide Prevention / Crisis Intervention
  • Politics and Governance
  • Math and Statistics
  • Salesforce
Menu

Development Operations ICT2A04L

Posted on September 25, 2018November 23, 2019 by Dustin

Table of Contents

Introduction to Development Operations

The second module provides more information on the specifics of terrorist acts. They create short-term crises that exploit the routine activities of authorities. Terrorist threats develops quickly and with little warning. (Celmer, 1987) Terrorists operate both domestically and internationally.

Terrorism is separated into state-controlled and non-state controlled. Most of this information should be review for anyone who is not a newbie to the subject. Questions are suggested to examine terrorist targets:

  • What are they doing?
  • Why are they doing it?
  • To whom are they doing it?
  • What do they hope to accomplish?

They identify the need to separate the victims (e.g. civilians killed in a car bomb) from the influencers (the wider civilian population) from the decision-makers (e.g. the government.)

Terrorism Structure and Vulnerabilities

Terrorism is separated into two categories, those who perform direct, illegal terrorist activities, and those who provide support. This can be active support, such as individuals who fundraise for Hamas or passive support, like Pakistan allowing Bin Laden to live inside its borders. (Byman, 2004; CNN Wire, 2011) Support structures can act as a “force multiplier” making a terrorist group much more effective.

Exploiting support structures involves close monitoring of them and sourcing of informants. For an example, merchants may benefit from association with the terrorists by selling their goods and otherwise have no ideological connection with the group.

Terrorist cells are reviewed. They are small, have limited communication with other cells and larger leadership (e.g. terrorist cells had limited contact with the leaders of Al Qaeda). Knowledge is limited to protect security. Harris-Hogan (2013) explored a cell in Sydney that generally met this requirements, although they had significant operational support outside of the cell.

Vulnerabilities of the terrorist cell are noted. Some of these include:

  • Power struggles in the group which can compromise the ability to attack
  • Always existing as criminals, especially with fame which can end a terrorist’s career (e.g. Osama bin Laden)
  • Effective counterterrorism operations which destroys cells and disrupts activities
  • Difficulty in sourcing weaponry (depending on location)

Impact of Terrorism on Democracy

Terrorism disrupts democracy by convincing the general public that the government is not responding appropriately to terrorism. It can create real or appeared repression by the government, like Israel’s response to Palestine (Bejan & Parkin, 2015)

This is a complicated area because there is a constant battle between privacy protection advocates and intelligence officials who need data to perform their jobs effectively.

Terrorist Tactics

The final topic in this module is terrorist tactics, which lists a variety of techniques (bombings, kidnappings, assassinations, etc.) and moves on to discuss CBRN (Chemical, Biological, Radiological and Nuclear) threats and finally the goals of terrorism, which amount to a desire for power.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy Policy

See here for our privacy policy. This site uses affiliate links and Adsense ads to provide targeted advertising.

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth

Recommended Posts

  • Conducting Psychosocial Assessments
  • DCIB Model of Suicide Risk Assessment
  • ABC Model of Crisis Intervention
  • My Friend is Suicidal - What do I do?

Recent Posts

  • Salesforce formula that calculates age
  • Earning the Project Management Professional (PMP)
  • ITS831 Information Technology Importance in Strategic Planning
  • How I Got a Book Contract
  • University of the Cumberlands PhD in Information Technology

Archives

  • September 2023 (1)
  • August 2023 (1)
  • July 2023 (1)
  • May 2023 (1)
  • March 2023 (1)
  • February 2023 (2)
  • January 2023 (4)
  • December 2022 (2)
  • May 2022 (1)
  • April 2022 (2)
  • March 2022 (1)
  • February 2022 (1)
  • December 2021 (1)
  • October 2021 (1)
  • August 2021 (2)
  • May 2021 (3)
  • December 2020 (1)
  • November 2020 (4)
  • July 2020 (1)
  • June 2020 (1)
  • April 2020 (1)
  • March 2020 (4)
  • February 2020 (7)
  • January 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • January 2019 (1)
  • December 2018 (4)
  • November 2018 (3)
  • October 2018 (3)
  • September 2018 (19)
  • October 2017 (2)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (39)
  • May 2017 (3)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (4)
  • January 2017 (5)
  • December 2016 (4)
  • November 2016 (4)
  • October 2016 (5)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (5)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (2)
  • March 2016 (2)
  • February 2016 (2)
  • January 2016 (4)
  • December 2015 (2)
  • November 2015 (2)
  • October 2015 (2)
  • September 2015 (2)
  • August 2015 (1)
  • June 2015 (2)
  • May 2015 (5)
  • April 2015 (3)
  • March 2015 (8)
  • February 2015 (12)
  • January 2015 (28)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • Earning the Project Management Professional (PMP) - Dustin K MacDonald on University of the Cumberlands PhD in Information Technology
  • Dustin on How I Got a Book Contract
  • Ananth on How I Got a Book Contract
  • Aly on Improving Your Helpline Work
  • Dustin on REVIEW: Eastern University Master of Science in Data Science 2021

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth
© 2023 Dustin K MacDonald | Powered by Minimalist Blog WordPress Theme