It is noteworthy to mention that this paper was produced within mere years of the attack upon the World Trade Center in September of 2001, which many regard as one of the most atrocious terrorist attacks upon the United States, and certainly within its borders, of all time. To that end, the author proposes a number of methods and devices to be employed to detect present and future instances of terrorism in a highly stratified manner that allows for rational, efficacious countermeasures to greatly reduce such threats before they become manifest.
It is important to note the degree of emphasis with which the author advocates the sharing and dissmenation of information between law enforcement agencies at a variety of levels, which are primarily evinced at the municipal, state, and federal levels. The author posits that one of the weaknesses exploited during the afromenetioned terrorist attacks of 2001 was that there was a lack of cooperation and implementation of intelligence gathered between disparate bureaus and agencies.
As a result, one of the primary foundations upon which Assessing and Managing the Terrorist Threat is based upon is the national model of intelligence gathering and sharing which many local and state law enforcement officials have adhered to known as the United States Department of Homeland Security, which “has expanded its computer-based counter-terrorism system to all 50 states, 5 territories, the District of Columbia, and 50 major urban areas to improve the flow of threat information” (1). In many ways, the compiling of intelligence related to terrorist threats is one of the essential methods required to actively assess potential disaster-related scenarios, whether related to terrorist.