CJ 469 SNHU Counterterriosm Techniques Proposal for Investigative Activities and Outreach Paper

CJ 469 Final Project Guidelines and RubricOverview
The final project for this course is the creation of a proposal for investigative activities and outreach and a visual presentation with audio or supporting
transcript.
Threats to public safety can come from a number of sources. While many criminal justice professionals spend their careers addressing community-level crimes,
incidents such as September 11 and the Oklahoma City bombing highlight the threat posed by domestic and international terrorist groups and the need to
counteract and prevent their activities.
Throughout this course, we have discussed the various roles and responsibilities (supporting roles, operators, managers, intelligence, etc.) and tools and
techniques used by law enforcement, military, and criminal justice professionals to counteract terrorist activity. We have also discussed challenges
counterterrorism agencies face—from outreach and effective partnering with other agencies to addressing missing information and connecting the dots—in
addition to the laws and acts governing counterterrorism activities.
For the final assessment in the course, you will imagine that you are a counterterrorism task force member working in a federal law enforcement agency. You
have been charged with formulating a plan for investigative activities and outreach as a follow-up to a referred case. Intelligence from the referred case is
provided in the prompts below. According to agency policy, your plan must be approved in writing by an assistant special agent in charge (ASAC) or supervisory
special agent (SSA) prior to implementation. This person will also review project progress after 60 or 90 days, noting whether the case is open, pending, or
closed.
The assessment will consist of two parts. Part I is a written proposal for investigative activities and outreach to be submitted to your task force supervisor for
approval prior to commencing activities. The proposal should cover the scope of the operation, collaboration with outside agencies and their roles in the
operation, the administrative and tactical tools to be used, projected resources needed, legal considerations, and project timelines. Part II of the assessment is a
visual presentation with audio or a supporting transcript that explains and describes the task force, its role, and proposed avenues for collaboration to an outside
agency with the goal of building collaboration. In both parts, you will need to communicate clearly and effectively with your intended audience in order to secure
their support.
The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Two, Three, and Four. The final submission for Part I will occur in Module Six, and the final
submission for Part II will occur in Module Seven.
This two-part assessment addresses the following course outcomes:





Analyze the responsibilities and practices of counterterrorist organizations, task forces, and operational entities in responding to terrorist activities
Propose strategies for interagency collaboration on counterterrorist activities that address potential operational barriers and build environments
conducive to information sharing
Determine appropriate responses for situations that a counterterrorism professional may encounter using the tools available to the field
Assess the legal parameters set by existing criminal laws, standard operating procedures, and counterterrorism acts for their implications in investigating
and responding to specific counterterrorism scenarios
Communicate effectively with varying levels of organizational leadership and audiences in carrying out counterterrorism operational responsibilities
Final Project Part I Prompt: Proposal for Investigative Activities and Outreach
Imagine that you are a member of a counterterrorism task force, and your group has just received the following intelligence from a referred case:
Referred Case Data
Transferring Agency: Bureau of Explosives and Weapons (State Agency)
Date of Transfer: 08/15/2014
Background Information:
The suspect has the necessary materials to construct a weapon of mass destruction (WMD) and through intelligence gathering, we know the suspect has
constructed a WMD, and intends on using it within his apartment complex, which is located in downtown Minneapolis, MN. It is believed that the suspect has
approximately ten 55-gallon drums of ammonium nitrate and diesel fuel oil (ANFO) in his residence, capable of releasing enough energy to destroy ten city
blocks. The suspect has the means to detonate the WMD.
Technical Data:
Starting on 01/15/2014 and over the course of three months, the suspect was observed purchasing explosive materials via CCTV footage and confirmed
eyewitness interviews from a local hardware store. Beginning on or about 02/16/2014 over the course of four months, the suspect has also acquired chemicals
from ABC chemical plant, where the suspect is employed.
Starting on 04/15/2014, the suspect has been observed moving 55-gallon drums into his residence between the hours of 0100 and 0300 for over five months by
undercover field operatives.
Utilizing the given intelligence data, formulate a proposal for investigative activities, including any outreach to other agencies, for assistant special agent in charge
(ASAC) or supervisory special agent (SSA) review and approval prior to commencing activities. Note that, as in real life, the data in the intelligence report may be
imperfect. In those cases, you should indicate the key information that is missing, and clarify any assumptions that you are making in formulating your proposal.
Specifically, your proposal for investigative activities and outreach should address the following critical elements:
I.
Executive Summary: In this section, you should provide a highly condensed version of the case from inception through current date using language
appropriate for high-level supervisory review. Be sure to:
A. Accurately summarize how far the transfer agency got in the investigation before it was referred. What agency referred the case and what
evidence and leads have they collected? Is there any additional information provided that would help the task force? Based on the referred
information, how imminent is the threat?
B. Assess whether there is sufficient evidence to proceed against the suspect based on relevant criminal codes, counter-terrorism treaties, and acts.
What crimes may have been committed? Are all the components of the crime present to move forward with charges? Be sure to justify your
assessment with information from the referred intelligence, citing appropriate laws, treaties, or acts.
C. Clear communication is key in justifying activities and securing approval. Remember that the executive summary should present information in
chronological order from the initiation date to the present. Ensure your analysis in this section is condensed, complete, and accurate based on
the referring agency’s intelligence data.
II. Operational Plan. In this section, you should lay out your proposed next steps in detail, including activities to be carried out, tools to be used, resources
needed, cooperation with outside agencies, and any legal considerations needing prior approval. Be sure to address:
A. Actions and timeframe. Based on your assessment of the existing information, briefly summarize your proposed next steps in addressing the
threat. Specifically, you should:
1. Specify any intelligence gathering activities needed. For example, are we sure the adversary is working alone? Could there be multiple
attacks on different targets? What critical information is missing? List each activity separately and specify how long it will last. Justify your
proposed activities using the provided intelligence.
2. Specify any other relevant counterterrorist activities needed. For example, what if anything needs to be done to protect public safety at
the targeted venue? Assuming we have sufficient evidence, when and how will the target be apprehended? What activities should the
task force take to counter the threat? Be sure to list each activity separately and specify how long it will last. Justify your proposals using
the provided intelligence information.
B. Tools. Select the administrative and tactical tools needed to complete the counterterrorism activities you propose above. You may select from
any of the tools discussed during the course (for example, financial tools, covert and overt intelligence, deterrence, misinformation, Social
Identity Theory, etc.) or other counterterrorism tools you may have researched. Justify your selection using the intelligence provided and the pros
and cons of each tool suggested for this case.
C. Resources. Provide a preliminary estimate of the resources needed for the operation. You should prepare a basic spreadsheet or table showing
the type and quantity of resources needed for each activity and for the operation as a whole.
D. Collaboration. Counterterrorism activities almost always involve some form of cross-agency collaboration. Specify what activities the task force
should undertake in order to incorporate assistance from outside agencies within the scope of the operation. In particular, you should:
1. Analyze the type of assistance the task force needs from outside agencies for this operation. For example, does the operation require
emergency support—such as an evacuation plan in the event a weapon is deployed? Tactical support in locating or apprehending
suspect(s)? Intelligence support in observing suspect(s) or sharing information? Additional manpower or a loan of equipment? Note that
these examples are only illustrative, and the actual collaboration needed will depend on the activities you proposed.
2. Compare and contrast the roles and responsibilities of different counterterrorism agencies in responding to this particular case. Based on
your analysis, which agencies are best situated to provide the type of assistance needed?
3. Will any special agreements be needed to clarify the roles and responsibilities of the task force and outside agencies? For example, will
memoranda of understanding needed to work with multi-agency groups like the joint terrorism task force or to secure foreign
cooperation? Will agreements be needed with local law enforcement? Who will be responsible for securing these agreements and how?
E. Legal considerations. In this section, lay out any legal issues relevant to the proposed activities:
1. Because at least some information in the case may have come or may eventually come from a confidential informant, assess the legal
and procedural issues surrounding the use of these sources and how these affect the parameters of the operation. What procedures are
required to protect confidential informants’ identity during the operation and in legal proceedings? What factors impact the reliability of
their information (for example, false data, non-compliance, etc.)? How might these factors affect the prosecution of the case? Support
your answer citing appropriate laws and research.
2. Assess the legal parameters surrounding any other tools and activities proposed. How do these affect the proposed parameters of the
operation? Support your answer by citing the appropriate laws and legal research and explaining how they apply. For example, if
activities involve undercover agents, what procedures are required to protect their identity and utilize the information they collect? Do
any activities require special warrants, a judge’s approval, or other legal sign off? Are activities constrained by whether or not the suspect
is a United States citizen? Note that these examples are only illustrative, and the actual legal parameters you discuss will depend on the
activities you proposed.
Milestones
Milestone One: Draft of Executive Summary (Part I, Section I)
In Module Two, you will submit a two- to three-page draft of an executive summary of the referred case data. Using language appropriate for high-level
supervisory review, summarize the investigation to date based on the data from the referring agency. Determine how imminent the threat is and whether action
is warranted at this time based on your assessment of the evidence from the referring agency, relevant criminal codes, and counterterrorism treaties. This
milestone is graded with the Milestone One Rubric.
Milestone Two: Draft of Operational Plan (Part I, Section II)
In Module Three, you will submit a three- to four-page proposal for investigative activities, including a balance sheet for required resources for consideration by
your superiors. Use the executive summary, referred case data, and additional research to determine the next step in addressing the threat. Specify any
intelligence gathering activities that need to be carried out before proceeding. You should prepare a basic spreadsheet or table showing the type and quantity of
resources needed for each activity and for the operation as a whole. In addition, explain any legal and procedural issues that may have an impact on the activities
you propose. Cite appropriate laws and research. This milestone is graded with the Milestone Two Rubric.
Milestone Three: Draft Proposal for Cross-Agency Collaboration
In Module Four, you will submit a two- to three-page proposal for cross-agency collaboration. Based on the investigative activities proposed, determine what
type of assistance the task force will require from outside agencies for this operation. Compare and contrast roles and responsibilities of different
counterterrorism and law enforcement agencies in responding to this particular case. Based on your analysis, which agencies are best situated to provide the type
of assistance required and why? Explain what type of agreement will be needed to clarify the roles and responsibilities of the task force and the outside agencies
selected. This milestone is graded with the Milestone Three Rubric.
Final Project Part I Submission: Proposal for Investigative Activities and Outreach
In Module Six, you will submit a proposal for investigative activities and outreach. It should be a complete, polished artifact containing all of the critical elements
for Part I of the final project. It should reflect the incorporation of feedback gained in the supporting milestones. This will be graded using the Final Project Part I
Rubric.
Final Project Part II Submission: Visual Presentation with Audio or Supporting Transcript
In Module Seven, you will submit a visual presentation that describes your task force’s responsibilities and solicits cooperation from another law enforcement
agency with respect to the referred case data. Use your proposal for investigative activities and outreach (Part I) and all of the critical elements for Part II to
create your visual presentation with audio or supporting transcript. The effectiveness of collaborative activities and the eventual success of the mission will
depend in part upon your ability to communicate clearly with the outside agency who has little experience with counterterrorism activities. Provide the audience
with a summarized background of the investigation to date including existing intelligence and how you intend to proceed. Include key points of the operation and
specific roles and responsibilities of the agencies involved in carrying out the activities without going into as much detail as your proposal. This will be graded
using the Final Project Part II Rubric.
Milestone
Deliverable
Deliverables
Module Due
Grading
Two
Graded separately; Milestone One Rubric
1
Draft of Executive Summary (Part I, Section I)
2
Draft of Operational Plan (Part I, Section II)
Three
Graded separately; Milestone Two Rubric
3
Draft Proposal for Cross-Agency Collaboration
(Section II D)
Final Project Part I Submission: Proposal for
Investigative Activities and Outreach
Final Project Part II Submission: Visual Presentation
With Audio or Supporting Transcript
Four
Graded separately; Milestone Three Rubric
Six
Graded separately; Final Project Part I Rubric
Seven
Graded separately; Final Project Part II Rubric
Final Project Part I Rubric
Guidelines for Submission: Your proposal must be approximately seven to nine pages in length (plus a cover page and references) and must be written in APA
format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Begin your proposal with a fictitious header that includes the name of the
agency you are imagining you work for, the name(s) of the suspect(s), assigned agency case number, dates of investigation so far, date of the report, and your
name as the agent making the proposal. You should also attach a copy of the referred case data as an appendix to your proposal. Although as a task force
member you already have access to the report (and this is not a graded component of the assessment), including it in the appendix provides assistant special
agent in charge (ASAC) or supervisory special agent (SSA) with important supporting documentation for the proposal. Include at least five references cited in APA
format.
Critical Elements
Exemplary (100%)
Executive
Meets “Proficient” criteria and
Summary:
summary models real world
Investigation
language and style
Proficient (85%)
Accurately summarizes how far the
transfer agency got in the
investigation before it was referred,
including evidence, leads,
additional information that might
help the task force, and imminence
of threat
Executive
Meets “Proficient” criteria and
Assesses whether there is sufficient
Summary:
justification explicitly addresses the evidence to proceed against the
Evidence
suspect’s or suspects’ intent,
suspect(s) based on relevant
means, and capability
criminal codes, counterterrorism
treaties, and acts and justifies
assessment with information from
the referred intelligence, citing
appropriate law(s) or act(s)
Executive
Meets “Proficient” criteria and
Presents information based on
Summary: Clear executive summary expertly
referring agency’s intelligence data
Communication balances necessary detail with
in chronological order starting with
brevity
date of inception and analysis is
complete, accurate, and clear
Meets “Proficient” criteria and
Specifies intelligence gathering
Operational
Plan: Actions and intelligence activities suggested are activities needed, listing each
particularly well aligned with
activity and how long it will last and
Timeframe:
specific needs of the scenario and justifies the proposed activities
Intelligence
real world constraints
using the provided intelligence
information
Needs Improvement (55%)
Summarizes how far the transfer
agency got in the investigation, but
summary is inaccurate or missing
key details
Not Evident (0%)
Does not summarize how far the
transfer agency got in the
investigation before it was referred
Value
6
Assesses whether there is sufficient Does not assess whether there is
evidence to proceed against the
sufficient evidence to proceed
suspect(s), but does not justify
against the suspect(s)
assessment with information from
the referred intelligence, citing
appropriate laws, treaties, or acts
8
Presents information based on the
referring agency’s intelligence data,
but summary is not in chronological
order or is incomplete, inaccurate,
or unclear
Specifies intelligence gathering
activities needed, but does not
justify the proposed activities using
provided intelligence
Does not present information based
on the referring agency’s
intelligence data
8
Does not specify intelligence
gathering activities needed
8
Operational
Plan: Actions and
Timeframe:
Other
Specifies other relevant
counterterrorist activities needed,
listing each activity and how long it
will last, and justifies the proposed
activities using the provided
intelligence information
Operational
Meets “Proficient” criteria and
Selects the administrative and
Plan: Tools
tools suggested are particularly well tactical tools needed to complete
aligned with the specific activities
the counterterrorism activities
proposed and real world constraints proposed, and justifies the
selections using provided
intelligence and the pros and cons
of each tool
Operational
Meets “Proficient” criteria and
Prepares a preliminary estimate of
Plan: Resources estimate is particularly detailed and type and quantity of resources
well aligned with the activities
needed for each activity and the
proposed
operation as a whole, using a table
or spreadsheet
Operational
Meets “Proficient” criteria and
Analyzes the type of assistance the
Plan:
analysis addresses a broad
task force needs from outside
Collaboration: spectrum of tactical, support, and
agencies for this operation
Type
intelligence needs
Operational
Plan:
Collaboration:
Responsibilities
Operational
Plan:
Collaboration:
Special
Agreements
Meets “Proficient” criteria and
other activities suggested are
particularly well aligned with
specific needs of the scenario and
real world constraints
Meets “Proficient” criteria and
response encompasses the wide
variety of organizations involved in
counterterrorism activities and the
complexity of their interactions
Analyzes the roles and
responsibilities of different
counterterrorism agencies in
responding to this particular case
and determines which agencies are
best situated to provide the type of
assistance needed
Determines whether any special
Meets “Proficient” criteria and
response demonstrates keen insight agreements are needed to clarify
the roles and responsibilities of the
into the procedural requirements
task force and outside agencies and
for cooperation among multiple
specifies who will be responsible
agencies
for securing these agreements and
how
Specifies other relevant
counterterrorist activities needed,
but does not justify the proposed
activities using provided
intelligence
Does not specify other relevant
counterterrorist activities needed,
listing each activity and how long it
will last
8
Selects the administrative and
tactical tools needed, but does not
justify the selections using provided
intelligence and the pros and cons
of tools
Does not select the administrative
and tactical tools needed to
complete the counterterrorism
activities proposed
8
Prepares a preliminary estimate of
the type and quantity of resources
needed, using a table or
spreadsheet, but does not break
these down by activity
Analyzes the type of assistance
needed from outside agencies, but
analysis is not relevant to the needs
of this operation
Does not prepare a preliminary
estimate of the type and quantity
of resources needed, using a table
or spreadsheet
8
Does not analyze the type of
assistance needed from outside
agencies
8
Analyzes the roles and
responsibilities of different
counterterrorism agencies in
responding to this case, but does
not determine which agencies are
best situated to provide assistance
Does not analyze the roles and
responsibilities of different
counterterrorism agencies in
responding to this case
8
Determines whether special
agreements are needed to clarify
the roles and responsibilities, but
does not specify who will be
responsible for securing
agreements and how
Does not determine whether
special agreements are needed to
clarify roles and responsibilities
8
Operational
Plan: Legal:
Confidential
Informant
Meets “Proficient” criteria and
assessment is detailed and clear
Operational
Meets “Proficient” criteria and
Plan: Legal: Tools analysis encompasses relevant
and Activities nuances in the laws or acts cited
Articulation of
Response
Submission is free of errors related
to citations, grammar, spelling,
syntax, and organization and is
presented in a professional and
easy to read format
Accurately assesses the legal and
procedural issues surrounding the
use of confidential informants and
how they affect the parameters of
the operation, citing appropriate
laws and research
Assesses the legal parameters
surrounding the tools and activities
proposed and supports answer
citing the appropriate laws and
legal research and explaining how
they apply
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Accurately assesses legal and
procedural issues surrounding use
of confidential informants, but does
not discuss how they affect the
parameters of the operation or cite
appropriate laws and research
Examines legal considerations
surrounding tools and activities
proposed, but does not support by
citing appropriate laws and legal
research and explaining how they
apply
Submission has major errors related
to citations, grammar, spelling,
syntax, or organization that
negatively impact readability and
articulation of main ideas
Does not accurately assess the legal
and procedural issues surrounding
the use of confidential informants
8
Does not examine legal
considerations surrounding tools
and activities proposed
8
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of ideas
6
Earned Total
100%
Final Project Part II Prompt: Visual Presentation With Audio or Supporting Transcript for Outside Agency
For Part II of the assessment, assume the proposal for investigative activities and outreach that you submitted to the assistant special agent in charge (ASAC) or
supervisory special agent (SSA) for review in Part I of the assessment was approved. Your task now is to create a presentation with audio or a supporting
transcript that describes your task force’s responsibilities and solicits cooperation from another law enforcement agency with respect to the referred case data
provided below and your proposed activities in Part I. (Note that the referred case data is the same as what was provided in Part I.)
Referred Case Data
Transferring Agency: Bureau of Explosives and Weapons (State Agency)
Date of Transfer: 08/15/2014
Background Information:
The suspect has the necessary materials to construct a weapon of mass destruction (WMD) and through intelligence gathering, we know the suspect has
constructed a WMD, and intends on using it within his apartment complex, which is located in downtown Minneapolis, MN. It is believed that the suspect has
approximately ten 55-gallon drums of ammonium nitrate and diesel fuel oil (ANFO) in his residence, capable of releasing enough energy to destroy ten city
blocks. The suspect has the means to detonate the WMD.
Technical Data:
Starting on 01/15/2014, the suspect was observed purchasing explosive materials via CCTV footage and confirmed eyewitness interviews from a local hardware
store, over the course of three months. Beginning on or about 02/16/2014 and over the course of four months, the suspect has also acquired chemicals from
ABC chemical plant, where the suspect is employed.
Starting on 04/15/2014, the suspect has been observed moving 55-gallon drums into his residence between the hours of 0100 and 0300 for over five months by
undercover field operatives.
For your presentation, you should imagine your audience is the leadership of a collaborating law enforcement agency. The agency has minimal experience with
counterterrorism issues but will be a critical support piece in your operation. The goal of the presentation is to provide the collaborating agency with a synopsis
of the work to be completed and to set clear expectations for the roles of the task force and collaborating agency to alleviate any potential confusion. Your
presentation should provide an operational overview and not a detailed tactical presentation of when the operation is going to start, how many people are going
to be on the teams, the kinds of weapons being used, and so on. Because clear communication is important in interagency collaboration designed to combat
terrorism, you will need to narrate your presentation (with audio or a supporting transcript), as well as prepare visual slides.
Specifically, your visual presentation with audio or supporting transcript should address the following critical elements:
I.
II.
III.
IV.
V.
VI.
Background. This section should provide the audience with a snapshot of the investigation to this point. The snapshot should:
A. Accurately summarize the main points of the investigation to date based on the data from the referring agency provided above. Be sure to
include how the investigation started, what agency referred it, and what evidence has been collected. Remember, information should be
presented in chronological order from inception to most recent.
B. Synthesize existing intelligence to identify the suspect(s), their apparent motivation, imminence of the threat, and evidence of criminal activity.
Why is action warranted at this time? Support your answer with information from the referring agency’s intelligence and any relevant laws,
treaties, or acts.
Justification. The presentation in this section should explain why cooperation from the outside agency is being requested. What do you hope to achieve
and how can the outside organization help with that mission? Your answer should address the importance of interagency collaboration in responding
to terrorist activities and how different agencies’ roles contribute to success.
General Overview of Operation. This section of the presentation should briefly explain the principal activities to be carried out. The goal is to provide a
broad non-technical overview, ensuring that the audience is familiar with key points of the operation, without the more detailed look given in your
proposal from Part I. Be sure to clearly distinguish the roles and responsibilities of the agencies involved (i.e., your task force and the outside agency)
in carrying out the activities.
Potential Operational Complications. Anticipate areas of potential operational complication between the two groups and propose ways to mitigate
them. For example, what happens if the suspect decides to put his/her plan in motion early? What if, during efforts to apprehend the subject(s), they
barricade themselves in, take hostages, or flee to an area that is not covered or the team cannot traverse? What if suspect has an accomplice that
interjects his or herself into the operation?
Questions and Answers. Your presentation should leave space for questions and answers with the outside agency’s leadership. Although you will not be
giving your presentation to a live audience during the assessment, you should anticipate likely questions and suggest ideas for improving
collaboration, processes, and information sharing. If you wish, you may have a friend or classmate pretend to be a member of the audience and pose
your “anticipated questions” in the audio, or you may simply start off a discussion by posing leading questions designed to address strategies for
collaboration and information-sharing.
Communication. The effectiveness of future information sharing and collaborative activities, and the eventual success of the mission, will depend in part
upon your ability to communicate clearly with the outside agency. Consequently, throughout your visual presentation you should:
A. Consistently tailor visual elements, such as slides and messages to the target audience for this presentation, using appropriate language and
terms. Remember that your audience has little experience with counterterrorism activities, so jargon and extensive use of acronyms are likely to
hinder understanding.
B. Whether you use audio or a supporting transcript, be sure to narrate your presentation using clear, appropriate language. Keep in mind that the
most effective presenters use slides as a prompt rather than simply reading from them.
Final Project Part II Rubric
Guidelines for Submission: The visual presentation with audio or supporting transcript should be 8 to 10 minutes long. You should include an introductory visual
element with the operation name, your name, the task force or agency you are imagining you work for, and the date. Your submission should include the visual
display and audio of you giving the presentation or a supporting transcript.
Critical Elements
Exemplary (100%)
Background:
Meets “Proficient” criteria and
Investigation
summary expertly balances
necessary detail with brevity and
clarity
Background:
Intelligence
Justification
General
Overview of
Operation
Proficient (85%)
Accurately summarizes main points
of the investigation to date in
chronological order from inception
to present based on the data from
the referring agency, including how
the investigation started, what
agency referred it, and what
evidence has been collected
Meets “Proficient” criteria and
Synthesizes existing intelligence to
summary expertly balances
identify the suspect(s), their
necessary detail with brevity and
apparent motivation, imminence of
clarity
the threat, and evidence of criminal
activity, supporting synthesis with
information from the referring
agency’s intelligence and relevant
laws, treaties, or acts
Meets “Proficient” criteria and
Explains reason for requesting
reasons are particularly appropriate cooperation from the outside
for building a collaborative
agency, addressing the importance
environment
of interagency collaboration in
responding to terrorist activities
and how different agencies’ roles
contribute to success
Meets “Proficient” criteria and
Provides a broad, non-technical
overview of activities and roles
overview of activities to be carried
expertly balances necessary detail
out, and clearly distinguishes the
with brevity and clarity
roles and responsibilities of the
agencies involved
Needs Improvement (55%)
Summarizes main points of the
investigation to date, but summary
is out of order, inaccurate, or
incomplete
Not Evident (0%)
Does not summarize main points of
the investigation to date
Value
4.5
Synthesizes existing intelligence, but
does not identify suspects, motive,
imminence of threat, or evidence of
criminal activity supported with
information from the referring
agency’s intelligence and relevant
laws, treaties, or acts
Does not synthesize existing
intelligence to identify the
suspect(s), their apparent
motivation, and the imminence of
the threat
13
Explains reason for requesting
cooperation, but does not address
importance of interagency
collaboration and how different
agencies’ roles contribute to
success
Does not explain reason for
requesting cooperation
13
Provides a broad, non-technical
Does not provide a broad, nonoverview of activities to be carried technical overview of activities to
out, but does not clearly distinguish be carried out
the roles and responsibilities of the
agencies involved
13
Potential
Operational
Complications
Meets “Proficient” criteria and
anticipation of potential
complications and suggestions for
mitigating them are realistic given
the scenario or intelligence data
being considered
Questions and Meets “Proficient” criteria and
Answers
suggestions for improving
collaboration are particularly
realistic and well aligned to the
needs of the operation
Communication: Meets “Proficient” criteria and
Tailor
visual elements and messages
model real world language and style
Anticipates areas of potential
operational complications between
the two groups and proposes ways
to mitigate them
Anticipates areas of potential
Does not anticipate areas of
operational complications between potential operational complications
the two groups, but does not
between the two groups
propose ways to mitigate them
13
Anticipates likely questions related
to the proposed collaboration and
suggests ideas for improving
collaboration, processes, and
information sharing
Tailors visual elements and
messages to the target audience for
the presentation using appropriate
language and terms
Communication: Meets “Proficient” criteria and uses Narrates presentation through
Audio or A
visual presentation materials as a
audio or supporting transcript,
Supporting
prompt in delivering a fluid
using clear and appropriate
Transcript
presentation
language
Anticipates likely questions, but
Does not anticipate likely questions
does not suggest ideas for
improving collaboration, processes,
and information sharing
13
Tailors visual elements and
messages to target audience, but
language and terms used are
inappropriate to the audience
Narrates presentation through
audio or supporting transcript, but
does not use clear, appropriate
language
Does not tailor visual elements and
messages to target audience
13
Does not narrate presentation
through audio or supporting
transcript
13
Submission has major errors related
to citations, grammar, spelling,
syntax, or organization that
negatively impact readability and
articulation of main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization that
prevent understanding of ideas
4.5
Articulation of
Response
Submission is free of errors related Submission has no major errors
to citations, grammar, spelling,
related to citations, grammar,
syntax, and organization and is
spelling, syntax, or organization
presented in a professional and easy
to read format
Earned Total
100%
Running head: COUNTERTERRORISM SECURITY EFFORTS
Counterterrorism Security Efforts
Kyle Seth
SNHU
1
COUNTERTERRORISM SECURITY EFFORTS
2
Counterterrorism Security Efforts
Executive Summary
One of the primary roles of any government has always been the protection of the people
it governs. Before any other activity, any government has a responsibility to ensure that the
public in the country is secure enough from any forms of threat that could otherwise cause
anxiety in society. Consequently, any cases of insecurity receive significant attention from the
federal government, because insecurity implies that the government has been ineffective in
meeting its core mandate to the people. Incidents such as the September eleventh attacks in New
York caused radical changes to the government’s security structure, since the government, in
addition to having a responsibility to protect its people, could not afford to show the public that it
was as shaken as the rest of the country was. Ultimately, these cases highlight the importance of
activities of departments such as the Department of Homeland Security (DHS) to the country.
Security takes many forms, with one of the most prominent security issues in
contemporary society being the protection from possible cases of terrorism. In particular, the
government undertakes different measures that include deterrence and gathering of evidence for
use in the prosecution of people arrested in connection with cases of terrorism, or potential ties to
terrorism (Norman, 2016). While most people would like to believe that terrorists develop ideas
outside the national borders, there have been cases in which terror activities were developed and
implemented in the country. The Oklahoma City Bombing was one incidence in which a plot
was hatched within the country, and executed much to the detriment of the welfare of American
citizens. Therefore, solutions to address terrorism should also focus on the country’s interior as
well as the external environment, on persons of interest to the country.
COUNTERTERRORISM SECURITY EFFORTS
3
In the presented case, the Bureau of Explosives and Weapons transferred a case to the
Department of Homeland security, having observed the suspect to have engaged in suspicious
purchases of ingredients that could ultimately be important in making a weapon of mass
destruction (WMD). The Bureau has so far gathered the information that points to the suspect
had made not only purchases of materials for about four months, but also his gradual acquisition
of the chemicals necessary in constructing a bomb with enough energy to destroy ten city blocks.
Therefore, the transferring agency has made significant developments in acquiring information,
including purchase data derived from CCTV cameras and witness accounts of the suspect’s
purchasing activities and behavior. Ultimately, these findings have led the agency to believe that
he plans to make the weapon at his house, and even detonate it there to achieve maximum energy
output and affect a significantly populated area. Based on the available information, the suspect
has all the necessary ingredients, which makes the threat significantly imminent.
In particular, the case begins on the 15th of January 2014, when the suspect is observed to
have made extensive purchases of explosive materials through a CCTV camera. The camera has
time available on the file footage, which further makes it easy to note the dates of the purchases
for evidence purposes. He continues to purchase the material over the next three months, to
avoid raising any suspicion. However, the team at the hardware store, aware of the potential uses
of the purchased material raises the alarm with the local security team, leading to the eventual
efforts to investigate his activities. Consequently, the investigators gather evidence from
different individuals that witnessed him make the purchases to understand whether he may have
made comments that could have indicated what he intended to achieve with the purchase of
explosive products.
COUNTERTERRORISM SECURITY EFFORTS
4
About a month after making the first purchase at the hardware store, there were reports of
missing chemicals at ABC Chemical Plant, where the suspect works. Investigations pointed to
the suspect had been the one who took away the chemicals, to use them to achieve his ultimate
objective of making the WMD. However, much this information may prove to be helpful to the
prosecution; it would be important to seek further evidence, in the form of determining where the
suspect took the products upon purchase. This would serve as the ultimate evidence that makes it
clear that he intended to create carnage in society by detonating the final bomb product following
the assembly. Otherwise, the technical information on the investigation process by the Bureau
provides significant insight into the activities that led to the case being presented to the
investigating team.
Based on the information available relating to the issue, it would be possible to pursue the
case and seek a conviction against the suspect for crimes against the state. In particular,
eyewitness accounts and evidence from the CCTV footage place him at the stores making the
purchases. However, it would be important for the team to acquire some form of evidence that
proves beyond doubt that the suspect indeed intended to engage in terrorist activities by making
a WMD using the acquired material. Therefore, the prosecution team has a case that could end in
a conviction, which makes it sound to go through with the case and proceed to have the suspect
tried.
COUNTERTERRORISM SECURITY EFFORTS
References
Norman, T. L. (2016). Risk analysis and security countermeasure selection. Boca Raton, FL:
CRC Press.
5
Running head: COLLABORATION
1
Collaboration: Milestone Three
Kyle Seth
SNHU
COLLABORATION: MILESTONE THREE
2
Collaboration: Milestone Three
Primarily, the activities in this project include gathering of evidence related to the
extensive purchase of raw materials that could eventually be used in making a weapon of mass
destruction. The evidence gathered would be critical to making the final intervention to deter a
terrorist activity in the country, or even reduce the scatter the entire terror organization in the
event that the suspect is part of a larger group. However, the successful deterrence or activity to
reduce the extent of damage caused by the threat would be highly dependent on collaboration
with other agencies, which will provide the necessary services to conduct the operation
successfully.
Firstly, it is important to have a contingency plan, which will take effect in the event that
the team is unsuccessful in gathering the evidence and stopping the attack before it happens.
Therefore, working with the local emergency response team to develop a contingency plan that
could include emergency response if the explosives went off would be important (Appleton,
2014). Consequently, teams such as the local law enforcement and the fire department will be
critical to the development of this contingency plan. With such a plan in motion, the task force
can operate with full confidence that the chances of a high casualty level in the event that the
suspect had advanced significantly in his plans would be highly limited.
Secondly, tactical assistance will be important to the successful apprehension of all the
suspect, particularly based on the assumption that the suspect was part of a larger group. Where
such a large organization is involved, the terror group often commits part of the income to
gathering as much information from the public as possible, which it could then use to take action
in line with its objectives (Norman, 2016), Understanding that the terror group does not work
without some form of intelligence gathering program would help the task force understand that
COLLABORATION: MILESTONE THREE
3
the potential suspects may not be willing to cooperate, hence the need for some tactical support
for the task force herein. Although the team may have obtained a warrant to search the suspect’s
house, there is no guarantee that he will be willing to cooperate with the search warrant’s
provisions. Therefore, the tactical assistance will be integral to achieving the objectives of the
task force in place.
Ultimately, these forms of assistance bring the task force closer to achieving the ultimate
objective of its formation. The Bureau of Explosives and Weapons may have played its part in
providing all the information they had gathered relating to the suspect, but further investigation
by the task force may prompt a response from the suspect if he got the impression that he was
being investigated. The dependence on human intelligence in some stages of the investigation
exposes the taskforce to risks of one of the sources of information telling the suspect of his or her
interaction with a team that was interested in his activities. Therefore, having contingency plans
that source assistance from parties with much more skill in some of the necessary areas of the
task force’s activities is critical to its success in addressing the threat.
Notably, different agencies will be responsible for the provision of assistance on the
different issues of concern. For instance, the fire department may not be extensively equipped
with dealing with counter terrorism activities, but it is extensively well equipped in responding to
emergency cases. Therefore, the department will provide critical assistance in case of the need
for an emergency response. Knowledge of the emergency response plans marks one of the
primary strengths of working with the local fire department, while the lack of knowledge on how
to deal with cases of terrorism presents a disadvantage to working with this team. Therefore, it
would be important to disclose the need for cooperation with the fire department in later stages
of the operation to avoid cases of possible panic in the department.
COLLABORATION: MILESTONE THREE
4
Secondly, the local SWAT team will provide tactical assistance to the task force, and
would complement the skills of the members of the task force where necessary. Although the
team is often used in extreme cases, it would be important to consider any potential interaction
with the suspect as a high risk situation. Hence, working with a team of professionals with some
of the highest skills in the law enforcement in relation to dealing with weapons would be an
advantage for the task force. This presents one of the primary advantages of contracting the
SWAT whenever there is need for confrontation with the suspect, or with the group he is
working with if one exists.
Most importantly, it would be important to determine the parameters of working with the
external agencies where it is necessary. Understanding the extent of the threat to the welfare of
the local population will mark the first step towards an extensive intervention. However, where
the roles and expectations of each of the agencies are unclear, then there are always chances that
the interaction between the teams will not be as effective as it needs to be. Hence, a
memorandum of understanding between the various agencies involved will help guarantee that
each team understands its responsibilities to ensure that the investigation and eventual
apprehension of the suspect experience no complications.
COLLABORATION: MILESTONE THREE
References
Appleton, C. (2014). Lone wolf terrorism in Norway. The International Journal of Human
Rights, 18(2), 127-142.
Norman, T. L. (2016). Risk analysis and security countermeasure selection. Boca Raton, FL:
CRC Press.
5
Running head: TASK FORCE OPERATIONAL PLAN
Task Force Operational Plan
Kyle Seth
SNHU
1
TASK FORCE OPERATIONAL PLAN
2
Task Force Operational Plan
Action and Timeframe
The information available provides sketchy information related to the suspect’s
purchases, which points to the possibility that he could be making a weapon of mass destruction
at his house. From a speculative perspective, there are chances that he could be planning to
detonate the weapon from his house. However, this is not sufficient information to act upon and
proceed to make an arrest. In any case, it would be important to determine whether he could be
working alone or with some accomplices. This would be critical in ensuring that the authorities
do not close this case, to the extent of even incarcerating the suspect, only to later find out that he
was only part of a larger group, and was distributing or training others on how they could launch
an attack against the country. Therefore, an extensive research and intelligence gathering activity
is important.
In particular, the activities necessary in intelligence gathering would help determine
whether he was working alone, is influenced by another entity, or is collaborating with other
individuals to destabilize the country. The first activity will include collection of evidence and
the information available at the surface relating to the suspect’s purchase activities. This would
take about a week or two, since there are different individuals who witnessed the purchases, in
addition to the CCTV footage from the hardware store, which would collaborate that he indeed
made the purchases.
Once this is complete, the next activity will extensively include gathering of intelligence
to determine whether he was working alone, or with a group. This information will be critical to
determining the security status in the country based on the level of threat herein. Notably, this
TASK FORCE OPERATIONAL PLAN
3
activity could take about a month to complete with absolute surety. It will signify an end to the
investigation part of dealing with the case.
For as long as the threat remains, it will be important to invest in measures that could
provide appropriate response services to the public, to ensure the minimal levels of anxiety
possible in the event that the suspect is successful. One of the most notable aspects about threats
is that they are often based on an individual’s capability to cause harm to society (Norman,
2016). As long as information related to the threat remains unclear, then the most effective way
through which to prevent, or at least reduce, casualties would be to prepare for a worst case
scenario. In this case, working with local police departments to ensure that the security personnel
remains as alert as possible would provide an efficient contingency plan. These contingency
activities need to proceed for as long as the case is open, as the task force analyzes the threat
level.
Tools
Based on the identified activities, some of the most essential tools for the investigation
process will include the covert and overt intelligence activities. In this case, the intelligence
activities will guarantee access to the necessary information that could ultimately determine the
possibility of the suspect acting alone or with others in the terror activities. The covert activities
will follow the information gathering process, in which case the task force will collect all the
information gathered by the Bureau of Explosives and Weapons and use it as basis for further
investigation. For instance, the Bureau already gathered that witnesses had observed the suspect
make the purchases. Further covert investigations by the task force will include following up
with the sources of such information to determine credibility and gain further insight that could
ultimately be helpful with the case.
TASK FORCE OPERATIONAL PLAN
4
Alternatively, the overt activities will include efforts to get the suspect to give
information about the purchases, the potential weapon of mass destruction, and the possibility of
providing the team with another suspect involved in the case. Notably, this activity would
include the potential turning of the suspect into an informant. Such success could help the team
to not only solve the case at hand, but also the potential for access to other terrorism cells in the
country. Nonetheless, the challenges associated with trusting information provided by the
informant would open a whole new case, which would not only include data gathering efforts,
but also an effort to confirm the provided information in relation to the case at hand. After all,
the credibility of the information provided by the potential informant would be the basis of its
application in court or conducting further investigations and apprehension of suspects.
Resources
Resource
Cost
Intelligence hardware
$2000
Intelligence personnel upkeep for the case
$1500
Transport
$1000
Legal Considerations
One of the primary legal issues of consideration in this case is the due process clause of
the Fourteenth Amendment. The clause prevents the government from any form of malicious
treatment of a case or suspect, irrespective of how glaring the evidence could appear to fall
against him (Williams, 2010). For instance, it could be necessary for the task force to conduct a
search inside the suspect’s residence, and gather evidence that could ultimately tie him to the
potential involvement in terror activities. However, without a search warrant to access the house,
TASK FORCE OPERATIONAL PLAN
5
then the task force could not use any evidence that it could potentially gather without having a
warrant for the said search. Therefore, it would be integral for the task force to be thorough
enough in its covert intelligence activities, to ensure that the team can convince a judge to sign a
search warrant for such property as his area of residence, or storage unit, just in case the suspect
owns one.
On the other hand, in the event that the intelligence gathering team determines there to be
a potential confidential informant, who could provide information that could help improve the
case, then it would be critical to present the informant with the privileges associated with such a
high profile suit. For instance, it could be that exposing his or her identity could ultimately put
his life in danger from the suspect’s acquaintances. Therefore, having a clear security framework
that ensures the informant is well protected during the entire duration of the case could be critical
to its success. As such, preparation of the necessary documents by the court to ensure that the
informant is safe enough would be necessary prior to the prosecution process.
With these legal concerns and issues well addressed, then the team would be ready to
take the case to court and have the suspect charged. Having followed the due process in all the
stages of investigation and gathering of evidence would guarantee limited chances of the suspect
arguing on the basis of violation of his constitutional rights. Ultimately, this increases the
chances that the task force would not only have made the country safer by eliminating the source
of threat to the citizen’s welfare through the WMD, but it would also have provided the suspect
with an opportunity for reform once inside the correctional facility.
TASK FORCE OPERATIONAL PLAN
6
References
Norman, T. L. (2016). Risk analysis and security countermeasure selection. Boca Raton, FL:
CRC Press.
Williams, R. C. (2010). The one and only substantive due process clause. The Yale Law Journal,
120(3), 408-512.
Feedback for 3-2 Final Project Milestone Two: Draft of Operational Plan
Submission Feedback
Kyle,
Nice job on your milestone 2 submission. The following is your feedback for the individual graded areas.
Operational Plan: Actions & Timeframe Intelligence: You did a great job of explaining intelligence gathering activities needed for the operation. You listed
each activity and identified how long it might last as well as justified the proposed activities using the provided intelligence. Proficient in this area.
Operational Plan: Actions & Timeframe Other: You presented other relevant counterterrorist activities that might be needed, as well as listing each activity
and how long it might last. Additionally, you justified the proposed activities using the provided intelligence. Proficient in this area.
Operational Plan: Tools: You selected the administrative and tactical tools needed to complete the counterterrorism activities proposed, and justified the
selections using the provided intelligence and pros and cons of each tool. Proficient in this area.
Operational Plan: Resources: You submitted a preliminary estimate of the type & quantity of resources needed for each activity and the operation. Proficient
for this area
Operational Plan: Legal: Confidential Informant: You accurately assessed the legal & procedural issues surrounding the use of informants and how they
might affect the parameters of the operation, citing appropriate laws & research. Proficient for this area
Operational Plan: Legal: Tools & Activities: You assessed the legal parameters surrounding the tools & activities proposed and supported your assessment
citing the appropriate leas and legal research and explained how they apply. Proficient for the area
Articulation of response:
Your submission was free from errors spelling, grammar & syntax. You did provide references within the submission (in text citations) to support your
position. Proficient for this area.
Dr. P
Feedback for 2-2 Final Project Milestone One: Draft of Executive Summary
Submission Feedback
Kyle,
Good job on this assignment. The submission was well written. You were able to meet most of the requirements of this assignment. Below is breakdown of
each area required for this week’s milestone.
Executive Summary: Investigation: You provided an accurate summary of how far the transfer agency got in the investigation before it was referred to
include evidence, leads, imminence of the threat and any additional information that might prove to be useful to the task force. Proficient for description.
Executive Summary: Evidence: You assessed whether there was sufficient evidence to proceed against the suspect(s) but did not base this on relevant
criminal codes, counter-terrorism treaties, and acts and justified the assessment with information from the referred intelligence citing appropriate law(s)
and/or act(s). Needs improvementfor this area.
Executive summary: Communication: You presented information based on the referring agency’s intelligence data in chronological order starting with the
date of inception and analysis was complete, accurate and clear. Proficient for this area.
Articulation of response: Your submission was free from errors spelling, grammar & syntax. You did provide references within the submission (in text
citations) to support your position. Proficient for this area.
Dr. P
Feedback for 4-2 Final Project Milestone Three: Draft Proposal for Cross-Agency
Collaboration
Submission Feedback
Kyle,
Good job on this assignment. The submission was well written. You were able to meet most of the requirements of this assignment. Below is breakdown of
each area required for this week’s milestone.
Operational Plan: Collaboration: Type You provided an accurate analysis of the type of assistance needed from outside agencies and the recommended
assistance was relevant to the needs of the operation. Proficient for description.
Operational Plan: Collaboration: Responsibilities: You analyzed the roles and responsibilities of the different CT agencies responding the case and
determined which agencies were best situated to provide the type of assistance needed. Proficient for this area.
Operational Plan: Collaboration: Special Agreements: You determined whether special agreements were needed to clarify the roles and responsibilities
and specified who will be responsible for securing these agreements and how. Proficient for this area.
Justification: YOU did a good job explaining the reason for requesting cooperation from outside agencies, addressed the importance of interagency
collaboration and how different agencies roles contribute to mission success. Proficient for this area.
Articulation of response: Your submission was free from errors spelling, grammar & syntax. You did provide references within the submission (in text
citations) to support your position. Proficient for this area.
Dr. P

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER