Description
your own research explain data collection techniques for investigating terrorism pre-and or post event. What tools are available and should be used to enhance investigations? What tools and or techniques are available to help in identifying and understanding missing pieces of the puzzle.
here is my fist peer to respond back to John Data Collection Techniques The data collection process for investigating terrorism before and after a terrorist event is vital to the United States national security. Ronczkowski (2018) describes that the data collection process consists of different pieces, including Homeland security and terrorism analysis, crime analysis, and intelligence analysis. According to him, one of the primary data collection techniques is computer-aided dispatch (CAD), which collects information like the names and addresses of suspected terrorists for analysis. The Department of Homeland Strategic Framework for Countering Terrorism and Targeted Violence (2019) provides within its position to address collecting data on terrorists is leveraging computer technology and collaboration with domestic and international partners. In addition, the FBI (2008), according to an audit report, uses the Guarding Threat Tracking System to identify, assess, and track terrorist threats and suspected incidents. Data collection using surveillance tools, drones, and computer technology provides support in pre- and post-terrorist incidents. Tools to Enhance Investigations After 9/11, the United States implemented the USA Patriot Act to increase surveillance capabilities for intelligence agencies; however, these tools and ways of working came under scrutiny challenging the civil liberties of individuals (Taylor & Swanson, 2019). However, as Ronczkowski (2018) shares, CAD has become highly useful in investigations by leveraging the Internet and tools like Pem-Link, I2, and GuideSTAR. In addition, the evolution of technology and increased social media use has enhanced the investigation of international and domestic terrorism. The United States has also improved its capabilities of identifying terrorism by publishing counterterrorism guides and indicator information that enhances investigations by establishing guidelines and critical aspects relating to terrorist activities (DNI, 2022). The establishment of a National Strategy for Countering Domestic Terrorism (2021) expands the concepts of enhancing international and focus domestic terrorism investigation through technology, understanding terrorists have the same technologies, collaborating with allies, improving vetting processes, addressing terrorist recruitment processes, and improving information to local law enforcement agencies. (House, 2021). Tools for Missing Puzzle Pieces Investigating and gathering intelligence for investigation may sometimes not provide all the needed information or, in essence, missing puzzle pieces. Ronczkowski (2018) shares the analytical forms of temporal and tempo are used to understand and analyze past events, methods used, and choice of targets to anticipate future terrorist attacks. Various analytical tools are used, aligning with temporal and tempo forms and analyzing previous terrorist attacks to recent attacks to discover what was missing from the last analysis. For example, Genesis 44:12 states that the cup was found when searching for the oldest and ending with the youngest. As we continue to grow, the standard approach is analyzing our past, so we can learn not to make the same mistakes in the future. Is it always successful? No, but we continue to learn to improve to protect ourselves for the future. ReferencesDHS. (2019, September). DEPARTMENT OF HOMELAND SECURITY STRATEGIC FRAMEWORK FOR COUNTERING TERRORISM AND TARGETED VIOLENCE. R
MarkThe collection of data is perhaps the most critical step in the investigation of terrorist operations and in gathering sufficient intelligence to devise effective counterterrorism policies. A plethora of tools are available to counter terrorist intelligence analysts and operators. The critical pieces of information often sought include the identities of individual terrorists and their associations with other members of the terrorist network as well as individuals who may support or sympathize with the terrorist organization’s agenda (Ronczkowski, 2018). Computer aided dispatch (CAD) systems are used by law enforcement agencies to process calls for service and use databasing protocols to organize information such as individual identities, vehicles, and geographic locations. Other tools include field contact reports in which law enforcement officers document identifying information about individuals whom they have encountered during their investigative duties. Oftentimes, field contact cards or field information reports are the result of proactive policing rather than the result of dispatched calls for service. Various computer software packages include I2, Pen-Link and Raptor. As described by Ronczkowski (2018), these software packages aid analysts in identifying connections between individuals, communications made between specific phone numbers or e-mail addresses, and other means of showing patterns of movement, communications, or behaviors among suspected terrorists or other criminals. Identifying patterns of behavior is essential to effective counterterrorism methodologies as pre attack indicators are likely to match certain behavioral patterns. Additionally, both before and after terrorist events, communications are likely to reveal critical information that will aid in the investigation, prosecution, and dismantling of terrorist organizations.Calendars and understanding the dates of terrorism significance are another tool which can be used by counterterrorism professionals to identify potential dates on which attacks may be perpetrated. Significant dates may be represented by or correlated with weather patterns, religious celebrations or holidays, dates of previous terrorist attacks, or dates on which the terrorists or individuals they sympathize with were perceived as the victims of some attack or persecution. Five specific key components analysts should look for when identifying terrorist activity are outlined in the model known as SKRAM (Ronczkowski, 2018). In this model, the acronym represents skill, knowledge, resource, accessibility, and motive. Using this model, behavioral patterns dependent upon the associated skills, knowledge, resource, accessibility, or motive can be identified thus enabling counterterrorism professionals to identify attacks before they occur while aiding them in identifying responsible offenders after an attack has taking place. Using sound intelligence practices and techniques is important in the fight against radicalization and terrorism. The tools and techniques that can be used by counterterrorism professionals are limitless but should always include the critical mind of the analyst. Software programs are designed to aid the analyst in highlighting trends and patterns extrapolated from data sets. However, it is the role of the analyst to critically assess and investigate potential leads and connections. Christian teachings include lessons on remaining vigilant and observant to effectively anticipate threats and counter them before they have an opportunity to cause harm. Scripture states, “Be sober minded; Be watchful. Your adversary the devil prowls around like a roaring lion, seeking someone to devour.” (English Standard Version, 2001/2016, 1 Peter 5:8).ReferencesEnglish Standard Bible.