Describe the terrorist attack you identified. How did the terrorist or terrorist organization use the WMD during the attack? What damage was caused as a result of the WMD?
What are the implications of WMDs in a digital age? What unique challenges might the digitization of WMDs pose to criminal justice agencies in the aftermath of an attack?
Divaa Jackson
38 minutes ago
Martin, G. (2022). Essentials of terrorism: Concepts and controversies (6th ed.). SAGE Publications.
Chapter 11, “Homeland Security” (pp. 268–299)
U.S. Department of Homeland Security. (n.d.-a). Fusion centers and joint terrorism task forces.Links to an external site. Retrieved April 29, 2019, from https://www.dhs.gov/fusion-centers-and-joint-terrorism-task-forces
U.S. Department of Homeland Security. (2018). Security of soft targets and crowded places—Resource guide.Links to an external site. Retrieved from https://www.dhs.gov/sites/default/files/publications/Soft_Targets_Crowded%20Places_Resource_Guide_042018_508.pdf
U.S. Department of Homeland Security. (n.d.-b). State and major urban area fusion centers. Links to an external site.Retrieved from https://www.dhs.gov/sites/default/files/publications/Fusion%20Centers%20Handout_0.pdf
Federal Bureau of Investigation. (n.d.-a). Joint terrorism task forcesLinks to an external site.. Retrieved April 30, 2019, from https://www.fbi.gov/investigate/terrorism/joint-terrorism-task-forces
Joint Counterterrorism Assessment Team. (2018). Planning and preparedness can promote an effective response to a terrorist attack at open-access eventsLinks to an external site.. Retrieved from https://www.dni.gov/files/NCTC/documents/jcat/firstresponderstoolbox/First-Responders-Toolbox—Planning-Promotes-Effective-Response-to-Open-Access-Events.pdf
National Consortium for the Study of Terrorism and Responses to Terrorism. (n.d.). Global terrorism databaseLinks to an external site.. Retrieved April 1, 2019, from https://www.start.umd.edu/gtd/
Office of the Director of National Intelligence. (n.d.). How the IC worksLinks to an external site.. Retrieved from https://www.intelligence.gov/how-the-ic-works
Strom, K. J., Hollywood, J. S., & Pope, M. (2015). Terrorist plots against the United StatesLinks to an external site.. Retrieved from https://www.rand.org/pubs/working_papers/WR1113.html