Geoscience Reference
In-Depth Information
Phase II—Operational Planning and Preparation
After the selection of the target is completed, the operation and method of the
attack becomes the next issue. Terrorist attacks often require meticulous planning
and preparation. Historically, this is done by a separate cell member(s) but as of late,
given that many of the potential attacks domestically have come from radicalized,
homegrown extremists, the function of planning may originate from those that
conducted the original surveillance and selection.
During the selection process, through the use of on-site or remote surveillance,
operatives have not only found a suitable target but also the possible “Achilles heel”
of the said target. By pinpointing possible weak areas in security or even the physi-
cal façade itself allows the planners to then formulate an attack plan and decide
upon an effective method. The planning process involves multiple steps including
Conducting additional surveillance on the target location
Selection of an attack method selection and possible weapon to use
Careful consideration of funding issues and personnel needed
Gathering of materials and weapons and possibly building the device
Selection and formation of an attack team
Rehearsals, or dry runs, of the attack to finalize the decided-upon method
Depending on the quality of the initial target selection process, the planning phase
can be done more secretly and oftentimes more remotely. The amount of work
needed is entirely dependent on how well the target information was collected
and processed. If the information is vague, incorrect, or incomplete, the planning
team has no choice but to revisit the scene and begin the collection process again.
Planning and preparation can take months to years to complete. All depends on
the size of the operation and the skill of the planners. Something of the mag-
nitude of the September 11, 2001, attacks or the coordinated, armed assaults in
Mumbai, India, in 2008 were elaborate, requiring various skill sets of the attack
team members as well as an abundance of resources. Other smaller planned attacks
may involve less people, less sophisticated skill sets, and minimal resources, allow-
ing for a faster turnaround time from selection to planning completion.
Phase III—Plan Implementation
After carefully selecting the target and deciding upon the best method of attack,
the third and most imminent part of the cycle is the Implementation Phase, or the
actual deployment of attack members and the attack itself.
The last chance for interdiction by any member of the law enforcement com-
munity is during the implementation phase. During this phase, attack team mem-
bers are mobilized from their respective safe houses and deployed to the attack
area. Members are asked to collect any necessary resources and construct any needed
Search WWH ::




Custom Search