There are eight indicators of terrorism according to Bennett (2007). This discussion gives an overview of the eight indicators of a terror attack. Which two can be easily monitored and exposed by law enforcement investigations?
Eight indicators of Terror Attacks.
1. Surveillance- Terrorist will watch a selected target to determine the strengths, weaknesses, and number of emergency personnel that may respond to an incident. Terrorists are looking for weaknesses and possible opportunities to attack the facility (Bennett, 2007, pg. 208-209).
2. Information- Terrorist will gain as much intelligence as possible about a target. The terrorist may request intelligence on security, blueprints of a facility, and possible points of ingress/egress (Bennett, 2007, pg. 208-209).
3. Testing- Terrorist will test how much time passes before law enforcement officers respond to a security threat, and the directions responders take to a specific location. Terrorist can use methods to create a rise in false alarms to understand how security responds. (Bennett, 2007, pg. 208-209).
4. Intrusion- Terrorist will attempt to gains actual access to an area around the expected target. Terrorist will send an unauthorized individual into a restricted area to gathering intelligence. Terrorist will look for any way to gain intelligence. Terrorist can get inside access from no physical intrusion. Intel can be gained through penetrating computer systems (Bennett, 2007, pg. 208-209).
Eight indicators of Terror Attacks.
1. Surveillance- Terrorist will watch a selected target to determine the strengths, weaknesses, and number of emergency personnel that may respond to an incident. Terrorists are looking for weaknesses and possible opportunities to attack the facility (Bennett, 2007, pg. 208-209).
2. Information- Terrorist will gain as much intelligence as possible about a target. The terrorist may request intelligence on security, blueprints of a facility, and possible points of ingress/egress (Bennett, 2007, pg. 208-209).
3. Testing- Terrorist will test how much time passes before law enforcement officers respond to a security threat, and the directions responders take to a specific location. Terrorist can use methods to create a rise in false alarms to understand how security responds. (Bennett, 2007, pg. 208-209).
4. Intrusion- Terrorist will attempt to gains actual access to an area around the expected target. Terrorist will send an unauthorized individual into a restricted area to gathering intelligence. Terrorist will look for any way to gain intelligence. Terrorist can get inside access from no physical intrusion. Intel can be gained through penetrating computer systems (Bennett, 2007, pg. 208-209).