Emergency Planning and Methodology Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Handling Suspected Terrorism

The roles of local law enforcement agents in cases of terror attacks involve notifying the relevant authorities to carry out investigations on the attack scenes, controlling crowds, and securing the areas under threat.

They maintain communication with the citizens to reassure and inform them about the progress of the investigation and security.

The San Francisco local law enforcers take roles in coordinating with the terrorism early warning groups (TEWG) through production and dissemination of intellectual outcomes (San Francisco Bay Area Regional Emergency Coordination Plan, 2008).

They provide information to TEWG and other state government institutions in order to allow proper connections of the available ideas. They establish policing initiatives that aim at improving security and prevention given the potential loss of life that can arise from a terrorist attack.

As a result, the local security should be increased during main events same as raising security patrols in major entries such as ports, airports, bridges, and such important infrastructures as buildings holding huge numbers of people or housing government offices.

Furthermore, it administers trained personnel involved in ensuring public safety and organization as well as to monitor and report suspicious events.

Conducting security surveys may also be required to identify problems, give advices, and take measures securing possible target sites while ensuring that the officers undertake proper training before handling these activities.

Finally, the enforcers facilitate the implementation of a communication system termed as Roam Secure Alert Network (RSAN) that facilitates the delivery of threat reports (San Francisco Bay Area Regional Emergency Coordination Plan, 2008).

Moreover, the San Francisco officer may utilize community policing officers to promote communication with residents and local business owners as they are likely to notice changes. The enforcement upholds the regulation of the command and emergency reaction prior to and after a threat.

They can know the newcomers as well as leaders of immigrant communities and ask for their help in monitoring suspicious behavior. The law enforcer is required to share relevant information with the pertinent authorities hence upgrading of the information system or employing a properly trained analyst.

Gathering information from the private sector can also facilitate handling the threat of a terrorist attack. These include banks and cash-transfer stations which can inform about suspicious financial transactions. Others are car rental agencies, motels, and private security practitioners who can provide information about distrustful activities.

Disaster prevention requires the officer to work closely with other city agencies such as the fire department, hospitals and schools. Establishing a partnership with the media is also vital as it can help to ease public anxiety through reporting how the threat is being handled.

Furthermore, it is essential for the law enforcement officers to ensure coordination of all these sectors, which falls under their responsibility. Observation of the above protocols gives the officer and other involved authorities a high chance of eliminating the threat.

Terrorism Liaison Officer (TLO)

In San Francisco, the TLO has a primary role to assist the line staff in spotting incidents associated to terror events as well as sharing the knowledge.

They are contacted by the higher organizations to avail the information obtainable on the predicted attacks (San Francisco Bay Area Regional Emergency Coordination Plan, 2008). The officers are not allowed to participate in the investigations unless stated otherwise.

Their duties also include developing a working association with the local agencies to boost the compilation and understanding of the terror information.

Under the federal Information Sharing Environment (ISE) instituted in 2004, the department is expected to share information internally and with the state police, FBI, Fusion Centers, and other local agencies.

The department might need to upgrade the information system, employ a trained analyst, or assign a TLO to collect and transfer information to the appropriate agencies within the ISE (Newman & Clarke, 2008, p.13).

In addition, the TLO serves as a link in matters related to terrorism information in the public-safety agency by helping identify terrorism-related situations and sharing intelligence related to terrorist activity.

He/She attends meetings and receives training and information from entities engaged in a terrorism investigation which is used to educate members of his department. They alert public-safety officers about terrorists’ way of operating and warn them on unreported terrorism indicators.

They are contacted when suspicious activities are witnessed and forward the information available to authorities involved in public safety. The TLOs improve the degree of their communities through upgrading the reporting system that facilitates an efficient fight against threats formulated by terrorists.

Federal Bureau of Investigation (FBI)

Bjelopera (2013) stated that the FBI was the lead agency investigating the federal crime of terrorism defined as a felony targeted to manipulate and affect the behaviors of the authorities or government through threats and coercion or to strike back against government actions.

In San Francisco, the FBI collects intelligence for preventive policing which involves tracking legal activities in anticipation of an attack.

Information about terrorism threats or suspicious incidences are brought to the attention of the FBI by the public, other government agencies, state, or such local law enforcement as in San Francisco (Bjelopera, 2013). Subsequently, the FBI carries out investigation from reliable sources using various analysis techniques.

In San Francisco, their investigations expand from earlier crimes retrieved from TLOs and the local law enforcers, connecting with other federal personnel, or international complements with linking information being selected and passed to the FBI via intelligence fusion sites (Bjelopera, 2013).

Individuals associated with terrorism on lesser offenses such as immigration violations are apprehended for further questioning while suspects are befriended via government undercover operations and offered assistance in their activities.

Once they fall into this trap, their plans are explored and exposed until the individuals are arrested and prosecuted.

References

Bjelopera, J. (2013). . Web.

Newman, G. and Clarke, R. (2008). Policing terrorism: An executive’s guide. U.S. Department of Justice. Web.

Richards, E., Rathbun, K., Brito, C. & Luna, A. (2006). . Web.

San Francisco Bay Area Regional Emergency Coordination Plan. (2008). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 25). Emergency Planning and Methodology. https://ivypanda.com/essays/emergency-planning-and-methodology/

Work Cited

"Emergency Planning and Methodology." IvyPanda, 25 June 2019, ivypanda.com/essays/emergency-planning-and-methodology/.

References

IvyPanda. (2019) 'Emergency Planning and Methodology'. 25 June.

References

IvyPanda. 2019. "Emergency Planning and Methodology." June 25, 2019. https://ivypanda.com/essays/emergency-planning-and-methodology/.

1. IvyPanda. "Emergency Planning and Methodology." June 25, 2019. https://ivypanda.com/essays/emergency-planning-and-methodology/.


Bibliography


IvyPanda. "Emergency Planning and Methodology." June 25, 2019. https://ivypanda.com/essays/emergency-planning-and-methodology/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1