Skip to main content

A Conceptual Model of Counterterrorist Operations

  • Conference paper
  • 4016 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Abstract

This paper describes the development of the Conceptual Model of Counter Terrorist Operations or the CMCTO. The CMCTO is a top down decomposition of the functions that are performed in the Counter Terrorist Domain. The models first decomposes the domain into Functions directed toward terrorists; Functions directed toward victims; and, Functions of support. Each of these functions is further decomposed to varying levels. The paper also includes a comprehensive review of the literature and of the process used.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brannan, D.W., Esler, P.F., Anders Strindberg, N.T.: Talking to “terrorists”: Towards an independent analytical framework for the study of violent substate activism. Studies in Conflict & Terrorism 24, 3–24 (2001)

    Article  Google Scholar 

  2. Clawson, P.: US options for combating terrorism. In: Rubin, B. (ed.) The politics of counter-terrorism: The ordeal of democratic states, pp. 3–29. The Johns Hopkins Foreign Policy Institute, Washington (1990)

    Google Scholar 

  3. Clinton, W.J.: Presidential decision directive 39, US policy on counterterrorism (1995), Universal resource link located at www.fas.org/irp/offdocs/pdd39.htm (accessed February, 2 2003)

  4. Crenshaw, M.: Counterterrorism policy and the political process. Studies in Conflict & Terrorism 24, 329–337 (2001)

    Article  Google Scholar 

  5. De Taillon, B., Paul, J.: The evolution of special forces in counter-terrorism: The British and American experiences. Praeger, Westport (2001)

    Google Scholar 

  6. Falkenrath, R.: Analytic models and policy prescription: Understanding recent innovation in U.S. counterterrorism. Studies in Conflict & Terrorism 24, 159–181 (2001)

    Article  Google Scholar 

  7. Hills, A.: Responding to catastrophic terrorism. Studies in Conflict & Terrorism 25, 245–261 (2002)

    Article  Google Scholar 

  8. Hoffman, B.: Rethinking terrorism and counterterrorism since 9/11. Studies in Conflict & Terrorism 25, 303–316 (2002)

    Article  Google Scholar 

  9. Leeman, R.W.: The rhetoric of terrorism and counterterrorism. Greenwood Press, New York (1991)

    Google Scholar 

  10. Merriam-Webster: The Merriam-Webster dictionary. Springfield: Merriam-Webster. National Interagency Civil-Military Institute, n.d. Preparing for and managing the consequences of terrorism: Resource guide (2002), Universal resource link located at www.nici.org/publications/publications/01%20%20PMC%20Resource%20Guide.pdf (accessed February 13, 2003)

  11. Office of Homeland Security. National strategy for homeland security (2002), Universal resource link located at www.whitehouse.gov/homeland/book/nat_strat_hls.pdf (accessed February 2, 2003)

  12. US General Accounting Office. Combating terrorism: Selected challenges and related recommendations (2001), Universal resource link located at www.ciaonet.org/cbr/cbr00/video/cbr_ctd/cbr_ctd_19a.pdf (accessed February 12, 2003)

  13. US Government. National strategy for combating terrorism (2003), Universal resource link located at www.whitehouse.gov/news/releases/2003/02/counter_terrorism/counter_terrorism_strategy.pdf (accessed April 12, 2003)

  14. US Government Interagency domestic terrorism concept of operations plan (2001), Universal resource link located at http://www.fas.org/irp/threat/conplan.pdf (accessed February 2, 2003)

  15. Van de Linde, E., O’Brien, K., Lindstrom, G., de Spiegeleire, S., Vayrynen, M., de Vries, H.: Quick scan of post 9/11 national counter-terrorism policymaking and implementation in selected European countries: Research project for the Netherlands Ministry of Justice. RAND, Santa Monica (2002)

    Google Scholar 

  16. Veness, D.: Terrorism and counterterrorism: An international perspective. Studies in Conflict & Terrorism 24, 407–416 (2001)

    Article  Google Scholar 

  17. Wardlaw, G.: Political terrorism: Theory, tactics, and counter-measures, 2nd edn. Cambridge University Press, Cambridge (1989)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Davis, D., Frendak-Blume, A., Wheeler, J., Woodcock, A.E.R., Worrell, C. (2005). A Conceptual Model of Counterterrorist Operations. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_25

Download citation

  • DOI: https://doi.org/10.1007/11427995_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics