CJ469 SNHU Counter terrorism Techniques Security Efforts Presentation For Part II of the assessment, assume the proposal for investigative activities and o

CJ469 SNHU Counter terrorism Techniques Security Efforts Presentation For Part II of the assessment, assume the proposal for investigative activities and outreach that you submitted to the assistant special agent in charge (ASAC) or
supervisory special agent (SSA) for review in Part I of the assessment was approved. Your task now is to create a presentation with audio or a supporting
transcript that describes your task force’s responsibilities and solicits cooperation from another law enforcement agency with respect to the referred case data
provided below and your proposed activities in Part I. (Note that the referred case data is the same as what was provided in Part I.) Running Head: PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
Proposal for Investigative Activities and Outreach
Kyle Seth
SNH
1
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
2
Executive summary
It must be a common problem in the entire world having to focus more on the community
– level crimes and failing to place a recommendable amount of focus on the major criminal cases
involving terror attacks with weapons of mass destruction. The Department of Homeland
Security is not a special exception from the named problem where they have delved in what can
be termed as, wrong investigative strategies which not only deter the solving of cases but also
has no effect on the constantly rising crime rate in the United States of America. On the 15th
August 2014, a case from the Explosives and Weapons Bureau has shifted a criminal case to the
Homelands Security Department about an uncertain person with the possession of materials fit to
construct a large – scale weapon (550 gallons diesel fuel and ammonium nitrate). More
information from the suspect is that he has already designed and constructed a single weapon
which when detonated from his apartment is capable of killing and injuring a large population
amid the destruction of assets and buildings within a ten-city block perimeter. The suspect’s
apartment is reported to be in Minneapolis Minnesota. As evidence, on the January 15th, 2014,
the suspect has been recorded in the neighborhood surveillance cameras purchasing these
materials and storing them in his apartment. On top of that, there is an eye witness to this
incident from the local hardware store. The suspect is also an employee of ABC chemical plant
and has been bringing in some chemicals from his workplace to his apartment. This report is
filled in by Gabriel Malcolm, the task officer in charge of this case at the Department of
Homeland Security.
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
3
Introduction
The topic of terrorism either, international or domestic has been a rising concern for the
government of the United States of America and the entire world in particular (Gage 2011).
According to the case scenario offered in the executive summary, it would rather be a miss on
human rights were counter-terrorism officers to storm the residents of a suspect without relevant
evidence that they were indeed making weapons of mass destruction or without the necessary
legal consent as a green light for the operation. Generally, this paper analyzes the abovesummarized case of a terror suspect who has been recorded buying the ingredients of making a
bomb, the size of a mass destruction weapon and the necessary measures the federal government,
as well as, the federal counter-terrorism agencies could instigate in a successful counter of this
specific situation, as well as, in planned terror attacks in the United States of America.
Analysis
One aspect that cannot escape the spotlight is that the suspect is only recorded buying the
materials that are generally known to make an A – weapon for mass destruction. What the
evidence has failed in identify is the already made weapon of mass destruction. As such, an
abrupt attack on an American citizen would be a direct violation of their human rights. Legally,
for a law enforcement officer to invade the personal property of a suspect, the necessary
documentation has to be processed allowing a law enforcement officer the rights, warrant to
search in a person’s residents. At the moment, there haven’t been any leads to warrant for an
arrest and thus the necessity of grafting on the strategies and policies of making the most
significant investigations about the allegations mentioned herein.
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
4
Terrorist attacks have in the recent resent become a monumental menace in the society. A
successfully executed terror attacks leave behind a trail of devastation in a country, not only for
the public but on the government as well. Though domestic and international terrorists have
some underlying agendas behind their actions and use mass destruction only as an eye-catcher,
the effects they leave behind are always engulfed in a fog of shock, pain, grief, and loss for the
entire nation. As such, comes the need to rid the society from this catastrophic menace of the 20th
and the 21st century.
In order to lessen the society of the common criminal problem identified in this paper, a
proper and appropriate countermeasure of combating terrorism ought to be outlined. A problem
identified to limit the functionality of agency operations in the combating of terror crimes in the
United States of America is that the diverse counterterrorism criminal agencies fail to work
together with each counterterrorism criminal department struggling to claim all the credit in the
solving of crimes in the country (Long 1990). If only counter-terrorism agencies worked
together, shared quality and relevant information on terrorist cases, then better results in terror
cases would turn out easily achievable.
It is quite a cliché to assume that terror plots and planning to be conducted on foreign
grounds. The truth of the matter according to (Norman 2016) identified that some of the major
plots of terrorism are planned within the country. A good example of this proven hypothesis is
the case of such terror instances of this nature is the Oklahoma City Bombing where many
people were affected. On such light, it is quite important for the large sequence of counterterrorism agencies of the United States to focus on domestic terrorists such as the case of the
suspect discussed in this paper if it were to make a dent on the current threats posed by terrorists
on the wellbeing of the American citizens.
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
5
Practices and responsibilities of different agencies
Counterterrorism organizations
As the name depicts, counter-terrorism organizations are agencies whose main
objectivities are tackling the diverse occurrence or terrorism in a country. Such organizations use
diverse military techniques, strategies, and tactics. A good example of a counter-terrorism
agency in the United States of America is the Counter Terrorist Unit (CTU). The Counter
Terrorism Unit functions in preventing and investigating terrorist acts happening within the
borders of the United States of America.
Task forces
A task force is a limited group consisting of 4 to 12 persons who have diverse skills in the
accomplishing of short – term tasks. It is a sub-organization formed under the Navy of the
United States of America. For instance, a narcotics task force would investigate a certain suspect
scope for a given time. In this case, a terrorism task force would be a team necessary for solving
terrorism activities before and after they occur.
Interagency Operations on counter-terrorism coordination
One fact about this case is that there has to be an interagency collaboration between the
relevant agencies which deal in counter-terrorism. As such, these agencies work in line with
similar objectives in the coordination of programs and policies among the Inter-departmental
Group on Terrorism (IG/T) the following agencies would have to work together to accomplish
the mission set to secure the alleged weapon of mass destruction, as well as, the suspect behind
the weapon (Kaplan 2017).
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
6
Department of State
The Department of Justice has the mandate of disseminating and analysis of the available
intelligence on the case. It also would manage and implement the policies which are directly
connected to international terrorism. As such, this department would hold the main lead in this
case.
Department of Justice
The Department of Justice would serve a more significant objective of advising the
procedures according to the federal law of the United States of America. As such, it will be the
entity which would confirm the proposal made in this paper as is its main functionality,
coordinating legislative proposals.
Federal Bureau of Investigation
The Federal Bureau of Investigation will also have to play a part in the proposed
investigations since the suspect is a citizen of the United States of America. The main
objectivities to be held by this department would be to decipher the intelligence collected about
the case, as well as, making the necessary investigations.
Central Intelligence Agency (CIA)
The Central Intelligence Agency is a representative of all other agencies within the
intelligence community but without a direct play on the case. Their main objectivity, in this case,
would be to manage all the systems from which intelligence is collected. It would also
disseminate any leads found after a thorough investigation has been conducted on the leads of
the case at hand.
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
7
Department of Homeland Securities
The Homeland Securities Department of the United States has the mandate to a wide
range of duties. These duties accorded consist of but are not limited to; issues on border control,
the uprising Cybersecurity, emergency response on disaster strikes, as well as, aviation security.
In this case, the Homeland Security Department owns the main lead in this case.
Interpol
The Interpol (International Criminal Police Organization) is another organization
working with an international jurisdiction of criminal justice for 192 countries worldwide. The
main objectives of Interpol are; organized crime, counter-terrorism, and cybercrime. Since
Interpol has a lot of connections with foreign countries, it would prove a beneficial asset in the
gathering of information about the suspect in the terrorism case at hand.
Plan for investigative activities
Interagency coordination
Conducting criminal justice, especially for terrorist cases must be coupled with
interagency coordination of diverse agencies which would work together in the solving of the
terror pre – occurrence. The department of justice is to offer the necessary legal procedures and
advice on how the investigative procedure is to be carried out. By doing so, the task force
officers would know when to act and not to act.
The Central Intelligence Agency, the Interpol, as well as the Federal Bureau of
Investigations, would work together and pool all their findings on the suspect till substantial
evidence is attained on the topic suspect and his alleged weapon for mass destruction he is
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
8
making in his apartment. With enough evidence collected and analyzed, then, the task force
officers from the Department of Homeland Securities would make a raid in the alleged apartment
where the suspect lives.
Deploying undercover agents
Although the investigation may be short-lived for a proper investigation, given the
sensitivity of the case, it would be wise to deploy an undercover agent to infiltrate the life of the
subject and place in the necessary tracking devices that would give out the position and location
of the suspect without their knowledge.
Obtain a search warrant
According to the United States’ law, a search warrant is a legal document retrieved from
a State judge or State magistrate, which give law – enforcement officers the right to search for
evidence from the properties of a suspect. In the event that the search would yield positive
results, get enough evidence to the alleged claim, the law enforcement officer has the right to
confiscate the evidence in their own hands. In this case, the search warrant would have a noknock provision to disallow the suspect to detonate the weapon for mass destruction upon
realization of the presence of police on his doorsteps.
Obtain an arrest warrant
In the event that within the search, solid evidence is gathered on the suspect, an arrest
warrant should be ready to be employed. An arrest warrant, like the search warrant, is a State
legal document given by the State’s federal courts giving rights to law enforcement officers to
make any arrests and confiscation of evidence.
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
9
It is imperative to understand that, even in cases of alleged terrorism, human rights have
to be observed and thus the investigative procedures have to be properly documented and aligned
with the laws of the country. Internationally, the human rights article number 14 of the
International Covenant on Civil and Political Rights must be adhered to in all cases, terrorism or
any other crime against a nation (Williams 2010). In some rare cases, the need to make a search
without a search warrant may present itself if the counter-terror team on the ground has
quantifiable evidence that the terrorist has indeed or is in within the procedure of making a
weapon for mass destruction.
Forensic investigations
Forensic investigations are necessary to identify the evidence gathered from a crime
scene. These including the joining of clues into forming the realization and a visual plan of how
the crime was conducted. In this case, forensic investigations are to be done in the apartment of
the suspected terrorist to connect the suspect, the ammonium nitrate and the diesel bought with
the weapon of mass destruction alleged to be on the make by the suspected terrorist.
Tools needed
Records check
With terrorism, especially like in our case, dealing with domestic terrorism, conducting a
background check on the life of the suspect is quite imperative for the investigation. From such
procedures, it becomes easy to associate the suspect with demographics which might relate them
to having a terrorist mindset. As such, all data pertaining to a terror suspect is analyzed for any
relevant leads.
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
10
Surveillance footages
Surveillance cameras are also imperative tools to be used for the investigation. With the
already existing footages, these would give a direct assessment of what the suspect is doing and
has been doing from the earliest recording made. These would also give any connections to the
people the terrorist is working with or for. As such, surveillance cameras ought to be
strategically placed around the apartment and the nearby environs of the suspect.
Microphones, and tracking devices
Once the undercover agents have succeeded in placing the relevant tracking and
monitoring devices such as; microphones and tracking devices, tracking the movement of the
suspect would become easier as they would act normal, not knowing of the surveillance they are
in. as such, the terrorist would give away the other people he is working with or for. Other tools
necessary for this operation include the overt and covert intelligence activities which would
determine whether the suspect is working alone or part of something bigger than it looks.
The entire operation should be completed in less than two weeks disallowing the suspect
to complete on his terror project. While the analysis of evidence is deemed to consume much of
the time, a week, give or take a day or two, obtaining the necessary legal consent would take a
single day while investigations continue. In ten days, a legal crackdown on the suspect’s
apartment would be possible following the legal procedures.
Note, while delving in the investigation, proving whether the terrorist was working alone
is quite imperative. Reasons being, it would be quite pointless in arresting one out of a large and
organized group of individuals with the intents of causing terror. Also, it is imperative to plan on
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
11
the projected reaction of the public if the weapon was to be detonated. As such, there should be
measures placed on how to evacuate the public from the proposed target location of the
detonation. This is a very sensitive operation since it has to be conducted without the knowledge
of the suspect.
After the arrest has been made following the findings of the making of a weapon of mass
destruction, then a case is then prepared for the suspect where he is to undergo a fair trial as is
the law on criminal justice in the United States. All the evidence collected in the field and the
crime scene is then to be presented in court for the sentencing of the suspect.
Conclusion
In conclusion, this paper has clearly outlined the procedures and the fundamentals that
are crucial for the proceeding of the proceedings of the case presented in the executive summary.
As such, this paper has looked into the legal formalities needed to proceed with investigations as
well as the legal fundamentals that terrorist cases entail regarding interagency coordination and
the aspect of human rights in federal investigations.
PROPOSAL FOR INVESTIGATIVE ACTIVITIES AND OUTREACH
12
References
Gage, B. (2011). Terrorism and the American experience: A state of the field. The Journal of
American History, 98(1), 73-94.
Kaplan, A. (2017). The counter-terrorism puzzle: A guide for decision makers. Routledge.
Long, D. E. (1990). The anatomy of terrorism (p. 5). New York: Free Press.
Norman, T. L. (2016). Risk analysis and security countermeasure selection. Boca Raton, FL:
CRC Press.
Williams, R. C. (2010). The one and only substantive due process clause. The Yale Law Journal,
120(3), 408-512.
CJ 469 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of a proposal for investigative activities and outreach and a visual presentation with audio or supporting
transcript.
Threats to public safety can come from a number of sources. While many criminal justice professionals spend their careers addressing community-level crimes,
incidents such as September 11 and the Oklahoma City bombing highlight the threat posed by domestic and international terrorist groups and the need to
counteract and prevent their activities.
Throughout this course, we have discussed the various roles and responsibilities (supporting roles, operators, managers, intelligence, etc.) and tools and
techniques used by law enforcement, military, and criminal justice professionals to counteract terrorist activity. We have also discussed challenges
counterterrorism agencies face—from outreach and effective partnering with other agencies to addressing missing information and connecting the dots—in
addition to the laws and acts governing counterterrorism activities.
For the final assessment in the course, you will imagine that you are a counterterrorism task force member working in a federal law enforcement agency. You
have been charged with formulating a plan for investigative activities and outreach as a follow-up to a referred case. Intelligence from the referred case is
provided in the prompts below. According to agency policy, your plan must be approved in writing by an assistant special agent in charge (ASAC) or supervisory
special agent (SSA) prior to implementation. This person will also review project progress after 60 or 90 days, noting whether the case is open, pending, or
closed.
The assessment will consist of two parts. Part I is a written proposal for investigative activities and outreach to be submitted to your task force supervisor for
approval prior to commencing activities. The proposal should cover the scope of the operation, collaboration with outside agencies and their roles in the
operation, the administrative and tactical tools to be used, projected resources needed, legal considerations, and project timelines. Part II of the assessment is a
visual presentation with audio or a supporting transcript that explains and describes the task force, its role, and proposed avenues for collaboration to an outside
agency with the goal of building collaboration. In both parts, you will need to communicate clearly and effectively with your intended audience in order to secure
their support.
The project is divided into three milestones, which will be submitted at various points th…
Purchase answer to see full
attachment

Don't use plagiarized sources. Get Your Custom Essay on
CJ469 SNHU Counter terrorism Techniques Security Efforts Presentation For Part II of the assessment, assume the proposal for investigative activities and o
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay
Quick Homework Essays
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.