8 Signs of Terrorism | by James (Jim) McCoy

8 Signs of Terrorism

by James (Jim) McCoy


We, as citizens, have a duty to help protect our communities. We can help provide safety and security by remaining vigilant and reporting unusual behavior or events immediately.

Listed below are eight signs of terrorism that may help detect potential terrorist acts. Indicators of a potential event may occur weeks, months or even years apart. Documenting details of events or behaviors witnessed is important, no matter how small or insignificant they may seem.

1. Surveillance

Terrorists will likely observe a chosen target during the planning phase of an operation. They do this to determine the strengths, weaknesses and number of emergency personnel that may respond to an incident. Suspicious actions during this phase may include someone recording or monitoring activities, drawing diagrams or making notes on maps, using vision-enhancing devices, or having possession of floor plans or blue prints of places such as high-tech firms, financial institutions, or government facilities, including military installations. Routes to and from the target are also usually established during the surveillance phase.

2. Inquiries

A second sign, inquiries, entails attempting to gain information about a place, person, or operation pertaining to the target. Terrorists may attempt to elicit information about a critical infrastructure such as a power plant, water reservoir, maritime port, military base, bridge or tunnel by making unusual inquiries. They may inquire about usage and operations. Additionally, they may attempt to place people in legitimate employment at key locations to monitor day-to-day activities and gather detailed knowledge in order to make their mission or scheme more effective.

3. Tests of Security

Terrorists may also test a target’s security to gather data. To do this, they may drive by the target, moving into sensitive areas and observing security or law enforcement response. They are likely assessing how long before personnel respond to a security breech or the routes responders take to a specific location. Terrorists may also attempt to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.

4. Fundraising

Although this is a tough sign to pick up on, it is one of the most important. Without funding, terrorist activity will come to a dramatic halt. Terrorists are very creative in raising, transferring, and spending money they come in contact with. Some scenarios to look for include: (1) credit card fraud, (2) defrauding the elderly, (3) people asking for donations to legitimate organizations but in peculiar ways, and (4) very large amounts of cash used in business transactions.

5. Acquiring Supplies

Terrorists may purchase or steal explosives, weapons, ammunition, or attempt to store harmful chemical equipment. In order to gain easier entrance to a secured area, they may also try to acquire uniforms, equipment or identification of first responders, including military personnel. Other items they may try to obtain include flight passes, flight manuals, passports or other pieces of identification. If they are unable to steal these types of things, they may attempt to create counterfeit copies.

6. Suspicious/Out-Of-Place Behavior

Profiling individuals is wrong, however, profiling behaviors may indicate suspicious behavior. Sometimes suspicious people just “don’t belong” or a behavior seems out of place. This may include a person in a workplace, building, neighborhood or business establishment that does not fit in because of demeanor, language usage or unusual questions they ask.

7. Dry Runs

Before executing the final operation or plan, terrorists may engage in a practice session, or “dry run,” to work out flaws or unanticipated problems. Although they normal conduct multiple practice sessions at or near the target area, a “dry run” may be the heart of the planning stage of a terrorist act. During a “dry run,” terrorists may monitor police radio frequencies and record emergency response times.

8. Deploying Assets/Getting Into Position

The deploying of assets or getting into position is an individual’s last chance to alert authorities before the terrorist act occurs.

 

 

 

 

 

 


About the Author:

James  (Jim) McCoy, Jr - I have been living and teaching in China for nine years. Originally hired to teach a course on Globalization with a focus on the global financial crisis of 2008, I went on to teach American Government, Political Science, American History, and other courses. My previous experience as a Systems Analyst brought an opportunity to teach a semester of AP Computer Science using JAVA. I have a BA in International Business and earned an MA in Intentional Relations during my time as a Teacher. My interests in terrorism grew out of my MA studies and the partial PhD studies that pursued in Homeland Security. Technology has always had a place in my heart and I found a way to combine my interests in technology and terrorism. I am currently studying Cybersecurity, Ethical Hacking, and Cyberforensics. As I continue to teach, I am developing an online business that includes writing and consulting. I publish a blog at www.thisismychina.com. I currently reside in Tianjin, China with my partner Claire and our two daughters YoYo and Li Li (age 2 ½ and 5).


The article was originally published at: http://www.thisismychina.com/2021/08/22/8-signs-of-terrorism/

November 22, 2021
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

CYBER MONDAY IS ON!⚠️
Check our Special Deals
x