Geoscience Reference
In-Depth Information
cellular organizational structure makes it difficult for an adversary to penetrate the
entire organization. Personnel within one cell are often unaware of the existence of
other cells and, therefore, cannot divulge sensitive information to infiltrators.
With the face of modern terrorism changing from an organized group with a
discernible leader to a more ideological approach undertaken by inspired followers,
so does the operational structure change. Although the hierarchical approach is still
in place today in a more fragmented fashion, the groups or individuals are using
more of a networked approach connected not so much in a linear way but in a less
tangible and indirect manner. There may still be a command cell or an individual
or group dictating actions of followers but the line of communication is not direct.
Very often current groups are self organized without any direction other than the
ideology itself. The structure may seem slightly different but the roles are still exact.
Instead of each cell function containing multiple players, there might only be one.
Some operators may even play dual roles. And in the case of a lone individual, he/
she plays planner, preparer, and executioner. The method is still the same and the
cycle of preparation is still composed of the necessary components.
The Terrorist Attack Cycle
The way in which a single terrorist or terrorist group plans for and executes an
attack is known as the “terrorist attack cycle.” The cycle is a predetermined group of
steps undertaken before, during, and possibly after the event that, if followed prop-
erly, can lead to a more successful operation. The necessity to understand and rec-
ognize the terrorist attack cycle is no longer limited to members of the intelligence
community (IC). Today, members of the emergency response community from all
disciplines need to know the way in which an attack is planned and executed in
order to better prepare and respond.
Contrary to popular belief, the execution of a terrorist attack is not random nor
is it solely dependent on a moment of opportunity. Rather, there is a process that
can be generically applied to all terrorist attacks, regardless of their scope. Attacks
are often meticulously planned with inception to delivery times ranging from six
months to years. The planning is often segmented and each phase is often carried
out by separate individuals allowing for maximum operational security. Overall,
operational planners of the attack look to exploit their adversary's weaknesses while
avoiding all their strengths often leading to the selection of “soft targets,” or those
areas, locations, or people, carrying a weak security profile.
On February 26, 1993, at midday, a truck bomb exploded on Level B-2 of
the World Trade Center (WTC) garage in New York City. The act, meant to
topple the Twin Towers, caused significant structural damage totaling over
 
Search WWH ::




Custom Search