What roles are played by each of the following in combatting terrorism:
What will be an ideal response?
a. Drones. (Although no specific answer is directly given in this chapter, the chapter does reference Chapter 14 for the use of drones for terrorism prevention): drones are tailor-made for seeking out and surveilling persons who are planning or involved in terroristic activities. However, this use of drones has become controversial, as evidenced by the debate over whether the CIA should be able to target American citizens whose behavior conforms to a particular. Congressional hearings in early 2013 indicate that politicians and Americans are very suspicious of such uses of drones in this country as we have used them in Pakistan and other countries.
b. Local police. Local police agencies should have plans in place for addressing a terrorist threat. They might also: create a counterterrorism unit; reassign officers to assess and protect the kinds of critical infrastructure described earlier; send officers to receive training in new skills relating to terrorism; shift personnel from lower priority programs, such as DARE or foot patrols; and attempt to obtain federal grants to help cover these additional tasks.
c. Community policing. This approach helps to build trust between the community and police, which allows officers to develop knowledge of the community and resident activity and can provide vital intelligence relating to potential terrorist actions. Problem-solving models typically used in community policing are well suited for preventing and responding to possible terrorist activity. Using existing data sources, agencies can conduct target vulnerability assessments and develop risk- management and crisis plans.
d. Social media. Agencies can engage and communicate with residents through social media. Agencies can post questions and encourage comments as a way to solicit tips and feedback and engage in dialogue with community members.
You might also like to view...
Give an example of how engineering and urban design can harden potential critical infrastructure targets.
What will be an ideal response?
_______________ is the theorist who is primarily credited with making significant revisions and advancements to differential association theory (e.g., including how learning takes place)
Fill in the blank(s) with the appropriate word(s).
Which of the following amendments protects individuals against unreasonable searches and seizures?
a. Fourth Amendment b. Fifth Amendment c. Sixth Amendment d. Eighth Amendment
At the mall, a woman reported to private security officers that her eight year old daughter was missing. A search of the mall by security officers failed to locate the missing girl and police were summoned to the scene
After interviewing the mother and security officers, what should the officer do next? A. Issue an Amber Alert. B. Verify that the child is in fact missing. C. Ask the mother to wait another hour to see if the daughter turns u