SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Chapter 20

Terrorism and Homeland Security




                           Hess 20-1
Introduction
• The Justice Department’s top priority is to support law
  enforcement and intelligence agencies in the fight
  against terrorism
• After 9/11, our country entered a new era of policing
• For cops, crime fighting and counterterrorism go hand
  in hand




                                              Hess 20-2
Terrorism: An Overview
TERRORISM DEFINED
• Systematic physical violence
• Actual or threatened
• Against noncombatants
• Create a climate of fear
• Cause some religious,
political or social change


                                   Hess 20-3
Terrorism: An Overview
MOTIVATIONS FOR TERRORISM
• Dissatisfaction
    
        Religious, political or social system or policy
• Inability to effect change through acceptable,
  nonviolent means




                                                          Hess 20-4
Classification of Terrorist Acts
DOMESTIC TERRORISM
•   Based and operating entirely within the United States
•   Without foreign direction
•   Committed against persons or property
•   To intimidate or coerce a government
•   Civilian population or any segment thereof



                                                Hess 20-5
International Terrorism
ISLAMIC TERRORIST GROUPS
•   Hezbollah
•   HAMAS
•   Palestinian Islamic Jihad (PIJ)
•   The al-Aqsa Martyrs’ Brigades
•   al-Qaeda



                                      Hess 20-6
Terrorist Groups in the United States
LEFT AND RIGHT
•    White and Black supremacists
•    Militia groups
•    Other right-wing extremists
•    Left-wing extremists
•    Pro-life extremists
•    Animal rights and environmental extremists


                                                  Hess 20-7
Terrorists as Criminals
NONTRADITIONAL
•   Different motivations
•   Different objectives
•   Much deadlier weapons
•   Seek to cause wide-scale damage
•   Inflict fear



                                      Hess 20-8
Methods Used by Terrorists
OVERVIEW
• Weapons of mass destruction
    
        Biological, chemical or
        nuclear agents
•   Explosives and bombs
•   Armed attack
•   Arson
•   Technology

                                  Hess 20-9
Methods Used by Terrorists
EXPLOSIVES AND BOMBS
•   Suspicious packages
•   Vehicle bombs
•   Suicide bombers
•   Police Executive Research Forum (PERF)
    
        Patrol-level response




                                             Hess 20-10
Methods Used by Terrorists
WEAPONS OF MASS DESTRUCTION (WMDs)
• Biological agents
•   Chemical agents
•   Nuclear terrorism
•   Detecting radiation and other bioterrorism agents
•   WMD team




                                                   Hess 20-11
Methods Used by Terrorists
TECHNOLOGICAL TERRORISM
•   Attacks on our technology
•   Attacks by technology
•   Energy drives our technology
•   Cyberterrorism




                                   Hess 20-12
Funding Terrorism
FINANCING
• Narcoterrorism
• Wealthy sympathizers
MONEY LAUNDERING
• Hawala
• No tax record or paper trail



                                  Hess 20-13
Federal Response to Terrorism
OVERVIEW
• Department of Homeland Security
• FBI
   
       Lead agency responding to acts of domestic terrorism
• FEMA
   
       Lead agency for consequence management (after an
       attack)


                                                 Hess 20-14
Federal Response to Terrorism
USA PATRIOT ACT
•   Uses the tools already available
•   Facilitates information sharing
•   Updates the law
•   Reflects new technologies and new threats
•   Increases the penalties for those who commit or
    support terrorist crimes


                                              Hess 20-15
Federal Response to Terrorism
NATIONAL INFRASTRUCTURE PROTECTION PLAN
• Comprehensive risk management framework
FUSION CENTERS
• Collaborative effort
• Two or more agencies
• Exchange of critical information



                                       Hess 20-16
Hometown Security and Homeland Security
 FIVE KEY PRINCIPLES
  •   All terrorism is local
  •   Prevention is paramount
  •   Hometown security is homeland security
  •   Coordinate strategies nationally, not federally
  •   Bottom-up engineering is important
          State, tribal and local public safety communities


                                                       Hess 20-17
Investigating Possible Terrorist Activities
TYPICAL STAGES IN A TERRORIST ATTACK
• Three-tiered model of al-Qaeda attacks by sleeper
  cells
       Attacking in conjunction with the group’s leaders
       Attacking on their own
    
        Individuals attacking with support from small cells




                                                    Hess 20-18
Information Gathering and Intelligence Sharing
   INTELLIGENCE CYCLE
    •   Intelligence requirements
    •   Planning and direction
    •   Collecting raw information
    •   Processing and exploiting
    •   Analysis and production
    •   Dissemination


                                     Hess 20-19
Crucial Collaborations and Partnerships
KEYS
• Number-one priority is communication
• Collaboration among local, state and federal law
  enforcement agencies
• Key to combating terrorism lies with the local police
• Regional Information Sharing Systems (RISS) program



                                             Hess 20-20
Initiatives to Assist in the
           Fight against Terrorism
INITIATIVES
• Community Protection Act
    
        Off-duty and retired police officers
    
        Right to carry concealed firearms
• Increased border security
• National Memorial Institute for the Prevention of
  Terrorism

                                               Hess 20-21
Initiatives to Assist in the
           Fight against Terrorism
INITIATIVES
• National Center for Food Protection and Defense
• National Incident Management System (NIMS)
    
        Standardized incident response
• Joint Terrorism Task Forces




                                            Hess 20-22
Role of the Media in the War on Terrorism
 SYMBIOTIC RELATIONSHIP
 • Terrorism is futile without publicity
 • Media generates much publicity
 • Contagion effect
     
         Coverage of terrorism inspires more terrorism
     
         Contagious




                                                   Hess 20-23
Concerns Related to the War on Terrorism
 OVERVIEW
 •   Civil liberties
 •   Discrimination
 •   Victims of hate crimes
 •   Guiding principle of DHS
     
         Protect civil rights and
     civil liberties


                                    Hess 20-24
Concerns Related to the War on Terrorism
 CONCERN FOR CIVIL RIGHTS
 • Enhance security
 • Maintain freedom
 RETALIATION OR
   DISCRIMINATION
 • Lack of cultural awareness
 • Language barriers

                                Hess 20-25
Community Policing and Homeland Security
 GUIDELINES
  •   Establish a liaison with DHS
  •   Formulate a policy statement
  •   Educate community members
  •   Emphasize the importance of reporting information
  •   Do not make assumptions about guilt



                                               Hess 20-26
Summary
• Threat of terrorism has become a reality in America
• FBI classifies terrorist acts as either domestic or
  international
• DHS was established as a result of 9/11
• USA PATRIOT Act significantly improves the nation’s
  counterterrorism efforts
• A difficult challenge is finding balance between
  enhancing security and the need to maintain freedom

                                           Hess 20-27

Weitere ähnliche Inhalte

Was ist angesagt?

White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17difordham
 
The FBI's War On Terror
The FBI's War On TerrorThe FBI's War On Terror
The FBI's War On TerrorOrion White
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.ravitaurus
 
Counter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug InterdictionCounter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug Interdictionmariaidga
 
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and typeCarlos Oliveira
 
Terrorism- An International Problem
Terrorism- An International ProblemTerrorism- An International Problem
Terrorism- An International ProblemKeshav Choudhary
 
Military-Support-to-Peacebuilding_FINAL_24Feb14
Military-Support-to-Peacebuilding_FINAL_24Feb14Military-Support-to-Peacebuilding_FINAL_24Feb14
Military-Support-to-Peacebuilding_FINAL_24Feb14Jeff Hoffmann
 
Heritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendHeritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendGiuliano Tavaroli
 
263presentation
263presentation263presentation
263presentationeminaker
 
Framework for security architecture in a sub region in transition - challenge...
Framework for security architecture in a sub region in transition - challenge...Framework for security architecture in a sub region in transition - challenge...
Framework for security architecture in a sub region in transition - challenge...Kayode Fayemi
 

Was ist angesagt? (19)

White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17
 
Terrorism
TerrorismTerrorism
Terrorism
 
The FBI's War On Terror
The FBI's War On TerrorThe FBI's War On Terror
The FBI's War On Terror
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.
 
Terrorism
TerrorismTerrorism
Terrorism
 
Counter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug InterdictionCounter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug Interdiction
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
What role for soldiers?
What role for soldiers?What role for soldiers?
What role for soldiers?
 
Drone Paper Summary PPT
Drone Paper Summary PPTDrone Paper Summary PPT
Drone Paper Summary PPT
 
Terrorism
TerrorismTerrorism
Terrorism
 
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type
 
Turning point
Turning pointTurning point
Turning point
 
Terrorism- An International Problem
Terrorism- An International ProblemTerrorism- An International Problem
Terrorism- An International Problem
 
Military-Support-to-Peacebuilding_FINAL_24Feb14
Military-Support-to-Peacebuilding_FINAL_24Feb14Military-Support-to-Peacebuilding_FINAL_24Feb14
Military-Support-to-Peacebuilding_FINAL_24Feb14
 
The Cyber Pearl Harbor
The Cyber Pearl HarborThe Cyber Pearl Harbor
The Cyber Pearl Harbor
 
Heritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendHeritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trend
 
263presentation
263presentation263presentation
263presentation
 
Framework for security architecture in a sub region in transition - challenge...
Framework for security architecture in a sub region in transition - challenge...Framework for security architecture in a sub region in transition - challenge...
Framework for security architecture in a sub region in transition - challenge...
 

Andere mochten auch

Andere mochten auch (7)

Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 

Ähnlich wie Chapter 20

Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...Juval Aviv
 
Radicalization in the Workplace
Radicalization in the WorkplaceRadicalization in the Workplace
Radicalization in the WorkplaceHillard Heintze
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & TerrorismFizza Rizvi
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issuerandima Dulanjani
 
Chapter 15What NextThe Future of TerrorismIntroduction .docx
Chapter 15What NextThe Future of TerrorismIntroduction .docxChapter 15What NextThe Future of TerrorismIntroduction .docx
Chapter 15What NextThe Future of TerrorismIntroduction .docxzebadiahsummers
 
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChanges on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChandana Wickramasinghe
 
Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...
Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...
Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...Elena Gryzunova
 
Lecture 10 defeating terrorism
Lecture 10   defeating terrorismLecture 10   defeating terrorism
Lecture 10 defeating terrorismJames Feldkamp
 
Bush and the Global war on Terror
Bush and the Global war on Terror Bush and the Global war on Terror
Bush and the Global war on Terror Boutkhil Guemide
 
Terrorism investigation
Terrorism investigationTerrorism investigation
Terrorism investigationrosikinemo
 
Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP Hillard Heintze
 
White7e ppt ch13revised
White7e ppt ch13revisedWhite7e ppt ch13revised
White7e ppt ch13reviseddifordham
 

Ähnlich wie Chapter 20 (20)

Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16
 
Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16
 
Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...Terrorist incidents and attacks against Jews and Israelis in the United State...
Terrorist incidents and attacks against Jews and Israelis in the United State...
 
40 years of terror trend
40 years of terror trend40 years of terror trend
40 years of terror trend
 
Radicalization in the Workplace
Radicalization in the WorkplaceRadicalization in the Workplace
Radicalization in the Workplace
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & Terrorism
 
TERRORISM_PPT.pptx
TERRORISM_PPT.pptxTERRORISM_PPT.pptx
TERRORISM_PPT.pptx
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
 
Chapter 15What NextThe Future of TerrorismIntroduction .docx
Chapter 15What NextThe Future of TerrorismIntroduction .docxChapter 15What NextThe Future of TerrorismIntroduction .docx
Chapter 15What NextThe Future of TerrorismIntroduction .docx
 
Terrorismo 12
Terrorismo 12Terrorismo 12
Terrorismo 12
 
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChanges on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Hate Crimes in America
Hate Crimes in AmericaHate Crimes in America
Hate Crimes in America
 
Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...
Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...
Crisis Communication under Terrorist Threat: a Case Study of Counterterrorist...
 
PH International P/CVE Conference
PH International P/CVE ConferencePH International P/CVE Conference
PH International P/CVE Conference
 
Lecture 10 defeating terrorism
Lecture 10   defeating terrorismLecture 10   defeating terrorism
Lecture 10 defeating terrorism
 
Bush and the Global war on Terror
Bush and the Global war on Terror Bush and the Global war on Terror
Bush and the Global war on Terror
 
Terrorism investigation
Terrorism investigationTerrorism investigation
Terrorism investigation
 
Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP
 
White7e ppt ch13revised
White7e ppt ch13revisedWhite7e ppt ch13revised
White7e ppt ch13revised
 

Mehr von SUNY Ulster

2020 microbiology viruses final
2020 microbiology viruses final2020 microbiology viruses final
2020 microbiology viruses finalSUNY Ulster
 
Anesthetic equipment
Anesthetic equipmentAnesthetic equipment
Anesthetic equipmentSUNY Ulster
 
Canine and feline anesthesia
Canine and feline anesthesiaCanine and feline anesthesia
Canine and feline anesthesiaSUNY Ulster
 
Anesthetic agents and adjuncts
Anesthetic agents and adjunctsAnesthetic agents and adjuncts
Anesthetic agents and adjunctsSUNY Ulster
 
Veterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementVeterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementSUNY Ulster
 
Patient preparation
Patient preparationPatient preparation
Patient preparationSUNY Ulster
 
Introduction to Anesthesia
Introduction to AnesthesiaIntroduction to Anesthesia
Introduction to AnesthesiaSUNY Ulster
 
Session 8 renal cancer cds
Session 8 renal cancer cds Session 8 renal cancer cds
Session 8 renal cancer cds SUNY Ulster
 
Session 7 gi lutd liver spring
Session 7 gi lutd liver spring Session 7 gi lutd liver spring
Session 7 gi lutd liver spring SUNY Ulster
 
Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 SUNY Ulster
 
Session 5 therapeutic nutrition obesity diabetes
Session 5  therapeutic nutrition obesity diabetes Session 5  therapeutic nutrition obesity diabetes
Session 5 therapeutic nutrition obesity diabetes SUNY Ulster
 
Session 2 basic nutrients
Session 2 basic nutrientsSession 2 basic nutrients
Session 2 basic nutrientsSUNY Ulster
 
Nutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseNutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseSUNY Ulster
 
Small animal nutrition dogs and cats
Small animal nutrition dogs and catsSmall animal nutrition dogs and cats
Small animal nutrition dogs and catsSUNY Ulster
 
Veterinary Instruments
Veterinary InstrumentsVeterinary Instruments
Veterinary InstrumentsSUNY Ulster
 
Session 1 intro and digestive systems 2018(1)
Session 1  intro and digestive systems 2018(1)Session 1  intro and digestive systems 2018(1)
Session 1 intro and digestive systems 2018(1)SUNY Ulster
 
213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014SUNY Ulster
 
"Refashioned" Art212
"Refashioned" Art212"Refashioned" Art212
"Refashioned" Art212SUNY Ulster
 

Mehr von SUNY Ulster (20)

2020 microbiology viruses final
2020 microbiology viruses final2020 microbiology viruses final
2020 microbiology viruses final
 
Analgesia
AnalgesiaAnalgesia
Analgesia
 
Anesthetic equipment
Anesthetic equipmentAnesthetic equipment
Anesthetic equipment
 
Canine and feline anesthesia
Canine and feline anesthesiaCanine and feline anesthesia
Canine and feline anesthesia
 
Anesthetic agents and adjuncts
Anesthetic agents and adjunctsAnesthetic agents and adjuncts
Anesthetic agents and adjuncts
 
Veterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementVeterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy management
 
Patient preparation
Patient preparationPatient preparation
Patient preparation
 
Introduction to Anesthesia
Introduction to AnesthesiaIntroduction to Anesthesia
Introduction to Anesthesia
 
Session 8 renal cancer cds
Session 8 renal cancer cds Session 8 renal cancer cds
Session 8 renal cancer cds
 
Session 7 gi lutd liver spring
Session 7 gi lutd liver spring Session 7 gi lutd liver spring
Session 7 gi lutd liver spring
 
Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9
 
Session 5 therapeutic nutrition obesity diabetes
Session 5  therapeutic nutrition obesity diabetes Session 5  therapeutic nutrition obesity diabetes
Session 5 therapeutic nutrition obesity diabetes
 
Session 2 basic nutrients
Session 2 basic nutrientsSession 2 basic nutrients
Session 2 basic nutrients
 
Nutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseNutrition for patients with cardiac disease
Nutrition for patients with cardiac disease
 
Small animal nutrition dogs and cats
Small animal nutrition dogs and catsSmall animal nutrition dogs and cats
Small animal nutrition dogs and cats
 
Veterinary Instruments
Veterinary InstrumentsVeterinary Instruments
Veterinary Instruments
 
Sutures
SuturesSutures
Sutures
 
Session 1 intro and digestive systems 2018(1)
Session 1  intro and digestive systems 2018(1)Session 1  intro and digestive systems 2018(1)
Session 1 intro and digestive systems 2018(1)
 
213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014
 
"Refashioned" Art212
"Refashioned" Art212"Refashioned" Art212
"Refashioned" Art212
 

Chapter 20

  • 1. Chapter 20 Terrorism and Homeland Security Hess 20-1
  • 2. Introduction • The Justice Department’s top priority is to support law enforcement and intelligence agencies in the fight against terrorism • After 9/11, our country entered a new era of policing • For cops, crime fighting and counterterrorism go hand in hand Hess 20-2
  • 3. Terrorism: An Overview TERRORISM DEFINED • Systematic physical violence • Actual or threatened • Against noncombatants • Create a climate of fear • Cause some religious, political or social change Hess 20-3
  • 4. Terrorism: An Overview MOTIVATIONS FOR TERRORISM • Dissatisfaction  Religious, political or social system or policy • Inability to effect change through acceptable, nonviolent means Hess 20-4
  • 5. Classification of Terrorist Acts DOMESTIC TERRORISM • Based and operating entirely within the United States • Without foreign direction • Committed against persons or property • To intimidate or coerce a government • Civilian population or any segment thereof Hess 20-5
  • 6. International Terrorism ISLAMIC TERRORIST GROUPS • Hezbollah • HAMAS • Palestinian Islamic Jihad (PIJ) • The al-Aqsa Martyrs’ Brigades • al-Qaeda Hess 20-6
  • 7. Terrorist Groups in the United States LEFT AND RIGHT • White and Black supremacists • Militia groups • Other right-wing extremists • Left-wing extremists • Pro-life extremists • Animal rights and environmental extremists Hess 20-7
  • 8. Terrorists as Criminals NONTRADITIONAL • Different motivations • Different objectives • Much deadlier weapons • Seek to cause wide-scale damage • Inflict fear Hess 20-8
  • 9. Methods Used by Terrorists OVERVIEW • Weapons of mass destruction  Biological, chemical or nuclear agents • Explosives and bombs • Armed attack • Arson • Technology Hess 20-9
  • 10. Methods Used by Terrorists EXPLOSIVES AND BOMBS • Suspicious packages • Vehicle bombs • Suicide bombers • Police Executive Research Forum (PERF)  Patrol-level response Hess 20-10
  • 11. Methods Used by Terrorists WEAPONS OF MASS DESTRUCTION (WMDs) • Biological agents • Chemical agents • Nuclear terrorism • Detecting radiation and other bioterrorism agents • WMD team Hess 20-11
  • 12. Methods Used by Terrorists TECHNOLOGICAL TERRORISM • Attacks on our technology • Attacks by technology • Energy drives our technology • Cyberterrorism Hess 20-12
  • 13. Funding Terrorism FINANCING • Narcoterrorism • Wealthy sympathizers MONEY LAUNDERING • Hawala • No tax record or paper trail Hess 20-13
  • 14. Federal Response to Terrorism OVERVIEW • Department of Homeland Security • FBI  Lead agency responding to acts of domestic terrorism • FEMA  Lead agency for consequence management (after an attack) Hess 20-14
  • 15. Federal Response to Terrorism USA PATRIOT ACT • Uses the tools already available • Facilitates information sharing • Updates the law • Reflects new technologies and new threats • Increases the penalties for those who commit or support terrorist crimes Hess 20-15
  • 16. Federal Response to Terrorism NATIONAL INFRASTRUCTURE PROTECTION PLAN • Comprehensive risk management framework FUSION CENTERS • Collaborative effort • Two or more agencies • Exchange of critical information Hess 20-16
  • 17. Hometown Security and Homeland Security FIVE KEY PRINCIPLES • All terrorism is local • Prevention is paramount • Hometown security is homeland security • Coordinate strategies nationally, not federally • Bottom-up engineering is important  State, tribal and local public safety communities Hess 20-17
  • 18. Investigating Possible Terrorist Activities TYPICAL STAGES IN A TERRORIST ATTACK • Three-tiered model of al-Qaeda attacks by sleeper cells  Attacking in conjunction with the group’s leaders  Attacking on their own  Individuals attacking with support from small cells Hess 20-18
  • 19. Information Gathering and Intelligence Sharing INTELLIGENCE CYCLE • Intelligence requirements • Planning and direction • Collecting raw information • Processing and exploiting • Analysis and production • Dissemination Hess 20-19
  • 20. Crucial Collaborations and Partnerships KEYS • Number-one priority is communication • Collaboration among local, state and federal law enforcement agencies • Key to combating terrorism lies with the local police • Regional Information Sharing Systems (RISS) program Hess 20-20
  • 21. Initiatives to Assist in the Fight against Terrorism INITIATIVES • Community Protection Act  Off-duty and retired police officers  Right to carry concealed firearms • Increased border security • National Memorial Institute for the Prevention of Terrorism Hess 20-21
  • 22. Initiatives to Assist in the Fight against Terrorism INITIATIVES • National Center for Food Protection and Defense • National Incident Management System (NIMS)  Standardized incident response • Joint Terrorism Task Forces Hess 20-22
  • 23. Role of the Media in the War on Terrorism SYMBIOTIC RELATIONSHIP • Terrorism is futile without publicity • Media generates much publicity • Contagion effect  Coverage of terrorism inspires more terrorism  Contagious Hess 20-23
  • 24. Concerns Related to the War on Terrorism OVERVIEW • Civil liberties • Discrimination • Victims of hate crimes • Guiding principle of DHS  Protect civil rights and civil liberties Hess 20-24
  • 25. Concerns Related to the War on Terrorism CONCERN FOR CIVIL RIGHTS • Enhance security • Maintain freedom RETALIATION OR DISCRIMINATION • Lack of cultural awareness • Language barriers Hess 20-25
  • 26. Community Policing and Homeland Security GUIDELINES • Establish a liaison with DHS • Formulate a policy statement • Educate community members • Emphasize the importance of reporting information • Do not make assumptions about guilt Hess 20-26
  • 27. Summary • Threat of terrorism has become a reality in America • FBI classifies terrorist acts as either domestic or international • DHS was established as a result of 9/11 • USA PATRIOT Act significantly improves the nation’s counterterrorism efforts • A difficult challenge is finding balance between enhancing security and the need to maintain freedom Hess 20-27