Skip to main content

Terrorism Indicators

“We calculated in advance the number of casualties from the enemy who would be killed based on the position of the tower. We calculated that the floors that would be hit would be three or four floors. I was the most optimistic of them all… due to my experience in this field, I was thinking that the fire from the gas in the plane would melt the iron structure of the building and collapse the area where the plane hit and all the floors above it only. This is all that we had hoped for. 
-Osama bin Laden, December 2001

The United States led War on Terror will be a long and demanding fight. A critical resource in this fight is an educated and alert citizenry. Maryland officials ask for your assistance by remaining alert and attentive to your surroundings as you continue to work and live your daily lives. Oftentimes, it is the private citizen that reports suspicious activity and provides law enforcement the first clue to  potential threat. You could be that person.

Maryland's homeland security community is working to protect our citizens, facilities, and resources. Since September 11, 2001, federal, state, and local officials have developed a thorough and coordinated response to terrorist or other security related attacks. The threat of terrorism demands education and coordination at every level of government and society. If you witness any of these indicators, report your observations to your local law enforcement agency or the MCAC. Remain vigilant. The importance of this fight is best captured in the words of Martin Treptow, a U.S. soldier killed in action during World War I, who wrote, "America must win this war. Therefore, I will work, I will sacrifice, I will endure, I will fight cheerfully and do my utmost, as if the issue of the whole struggle depended on me alone."

Terrorism is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion or ransom, or to influence government policy. Terrorists often use threats to create fear among the public, to try to convince citizens that their government is powerless to prevent terrorism, and to get immediate publicity for their causes.
Most terrorist incidents involve small compartmented extremists. Terrorist cells can meld into a community and remain dormant for extended periods of time. Local, state and federal law enforcement officials work together to prevent or protect against potential attacks but face the difficult challenge of identifying these small radical cells.

A terrorist attack can take several forms, depending on the resources available to the cell, the nature of the political issue motivating the attack, and the points of weakness of the terrorist's target. In the following paragraphs, you will find pre-incident indicators that can alert law enforcement to a potential terrorist attack, if properly reported. Understand, the presence of one or two indicators does not presume terrorist activity, but the presence of several indicators should be reported immediately to your local law enforcement agency or the Maryland Coordination and Analysis Center (MCAC). Do not conduct your own investigation or dismiss indicators as unimportant. Allow law enforcement to do their job.

Pre-operational Planning
Pre-operational planning always takes place prior to an attack. A few indicators of pre-operational planning include:
  • Surveillance activity, e.g. note-taking, use of binoculars, cameras or maps that appear out of context.
  • Theft of uniforms, official vehicles, access badges, or other resources that can be used to gain entry to restricted or protected areas.
  • Stockpiling/storage of weapons or explosives or explosive making materials, e.g. volatile chemicals, fertilizer, propane tanks.
  • Attempts to test physical security.
  • Presence of individuals who loiter or do not appear to belong in an area for an extended time and/or change or hide their behavior in the presence of law enforcement/security personnel.
 Vehicle-borne Improvised Explosive Devices (VBIED)
  • Vehicle bombs are a common terrorist method of attack. A few potential indicators of VBIEDs include:
  • Rental, delivery, utility, limos, and other vehicles parked in unusual locations.
  • Drivers who operate the vehicle in an overly cautious manner, attempt to abandon the vehicle or act nervously.
  • Vehicle drivers who display noncompliant behavior, such as insisting on parking close to a building or crowded area.
  • Excessive vehicle weight or unusually uneven weight distribution; e.g. the vehicle appears overloaded.
  • Smoke, strong chemical, or fuel odors emanating from a vehicle.
Suicide Bombers
Individual suicide bombing attacks are a common tactic used in other parts of the world. Although the US has not experienced this type of threat, we must consider suicide bombing as a possible future tactic. Some suicide bomber indicators include individuals:
  • Wearing inappropriate attire such as heavy or bulky clothing inconsistent with weather conditions.
  • Protruding bulges or exposed wires under clothing.
  • Strange chemical odors associated with the individual.
  • Individuals display excessive sweating, mumbling to oneself, or displaying an unusually calm or detached demeanor.
 
Threat of Secondary Explosive Devices
In the event of a successful terrorist attack, anyone assisting the injured should be aware terrorists have used secondary explosives to target first responders. So, first responders will search the response area for any suspicious items, such as unclaimed bags or abandoned vehicles, that could be used to hide a secondary explosive device. If you discover any suspicious items, leave the area and notify the onsite law enforcement personnel immediately

http://www.mcac.maryland.gov/how_to_help/TerrorismIndicators.html

Comments

Popular posts from this blog

Terrorism in Africa

According to state.gov, ISIS was defeated a few years ago. However, the organization's presence and existence remain conspicuous in Africa. Ongoing conflicts in Somalia, Ethiopia, Mozambique, Nigeria, and Burkina Faso demonstrate that ISIS has shifted its focus away from Iraq and Syria. Although ISIS lacks a clear hierarchy like Al-Qaeda, its followers and supporters wholeheartedly believe in its strong ideology. In 2014, the United States led the formation of a broad international coalition known as 'The Global Coalition to Defeat ISIS' to combat the organization during the height of the Syrian and Iraqi conflict. The primary objectives of this 83-member coalition are to degrade and defeat ISIS, which poses a threat to international peace and security. ISIS has brought thousands of foreign fighters from around the world to combat zones like Syria and Iraq, and it has used technology to promote its violent extremist ideology and instigate terrorist attacks. For example, t

Sedition Act 1948 should have been repealed a long time ago. But why?

THE Sedition Act 1948 is a legislative measure that was enacted in Malaysia during the colonial era, designed to curb any form of speech or expression that was deemed to be seditious in nature with the aim of maintaining public order and security. The Sedition Act has been subject to much debate and criticism, with some arguing that it is a violation of freedom of speech and expression. Despite this, the Act remains in force in Malaysia to this day, albeit with some amendments made over the years. Although I concur with the abolition of this Act, it is imperative that a comparable new legislation be enacted to address the escalating prevalence of racially and religiously bigoted remarks that have been unsettling our distinctive multicultural and multi-religious society as of late. An instance that exemplifies the prudent decision-making of the governing body is the substitution of the Internal Security Act of 1960 with the Security Offences (Special Measures) Act 2012 (SOSMA). This rep

THE HISTORY OF TERRORISM: MORE THAN 200 YEARS OF DEVELOPMENT

The history of terrorism dates back at least 1500 years when Jewish resistance groups (66 - 72 A.D.) known as Zealots killed Roman soldiers and destroyed Roman property. The term assassin comes from a Shi'ite Muslim sect (Nizari Isma'ilis - also known as hashashins "hashish-eaters") fighting Sunni Muslims (1090 - 1275) and during Medieval Christendom resisting occupation during the Crusades (1095-1291). The hashashins were known to spread terror in the form of murder, including women and children. The brotherhood of Assassins committed terror so as to gain paradise and seventy-two virgins if killed and to receive unlimited hashish while on earth. The modern development of terrorism began during the French Revolution's Reign of Terror (1793 - 1794). During this period the term terrorism was first coined. Through the past two hundred years, terrorism has been used to achieve political ends and has developed as a tool for liberation, oppression, and i