Abstract
This paper describes the development of the Conceptual Model of Counter Terrorist Operations or the CMCTO. The CMCTO is a top down decomposition of the functions that are performed in the Counter Terrorist Domain. The models first decomposes the domain into Functions directed toward terrorists; Functions directed toward victims; and, Functions of support. Each of these functions is further decomposed to varying levels. The paper also includes a comprehensive review of the literature and of the process used.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brannan, D.W., Esler, P.F., Anders Strindberg, N.T.: Talking to “terrorists”: Towards an independent analytical framework for the study of violent substate activism. Studies in Conflict & Terrorism 24, 3–24 (2001)
Clawson, P.: US options for combating terrorism. In: Rubin, B. (ed.) The politics of counter-terrorism: The ordeal of democratic states, pp. 3–29. The Johns Hopkins Foreign Policy Institute, Washington (1990)
Clinton, W.J.: Presidential decision directive 39, US policy on counterterrorism (1995), Universal resource link located at www.fas.org/irp/offdocs/pdd39.htm (accessed February, 2 2003)
Crenshaw, M.: Counterterrorism policy and the political process. Studies in Conflict & Terrorism 24, 329–337 (2001)
De Taillon, B., Paul, J.: The evolution of special forces in counter-terrorism: The British and American experiences. Praeger, Westport (2001)
Falkenrath, R.: Analytic models and policy prescription: Understanding recent innovation in U.S. counterterrorism. Studies in Conflict & Terrorism 24, 159–181 (2001)
Hills, A.: Responding to catastrophic terrorism. Studies in Conflict & Terrorism 25, 245–261 (2002)
Hoffman, B.: Rethinking terrorism and counterterrorism since 9/11. Studies in Conflict & Terrorism 25, 303–316 (2002)
Leeman, R.W.: The rhetoric of terrorism and counterterrorism. Greenwood Press, New York (1991)
Merriam-Webster: The Merriam-Webster dictionary. Springfield: Merriam-Webster. National Interagency Civil-Military Institute, n.d. Preparing for and managing the consequences of terrorism: Resource guide (2002), Universal resource link located at www.nici.org/publications/publications/01%20%20PMC%20Resource%20Guide.pdf (accessed February 13, 2003)
Office of Homeland Security. National strategy for homeland security (2002), Universal resource link located at www.whitehouse.gov/homeland/book/nat_strat_hls.pdf (accessed February 2, 2003)
US General Accounting Office. Combating terrorism: Selected challenges and related recommendations (2001), Universal resource link located at www.ciaonet.org/cbr/cbr00/video/cbr_ctd/cbr_ctd_19a.pdf (accessed February 12, 2003)
US Government. National strategy for combating terrorism (2003), Universal resource link located at www.whitehouse.gov/news/releases/2003/02/counter_terrorism/counter_terrorism_strategy.pdf (accessed April 12, 2003)
US Government Interagency domestic terrorism concept of operations plan (2001), Universal resource link located at http://www.fas.org/irp/threat/conplan.pdf (accessed February 2, 2003)
Van de Linde, E., O’Brien, K., Lindstrom, G., de Spiegeleire, S., Vayrynen, M., de Vries, H.: Quick scan of post 9/11 national counter-terrorism policymaking and implementation in selected European countries: Research project for the Netherlands Ministry of Justice. RAND, Santa Monica (2002)
Veness, D.: Terrorism and counterterrorism: An international perspective. Studies in Conflict & Terrorism 24, 407–416 (2001)
Wardlaw, G.: Political terrorism: Theory, tactics, and counter-measures, 2nd edn. Cambridge University Press, Cambridge (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Davis, D., Frendak-Blume, A., Wheeler, J., Woodcock, A.E.R., Worrell, C. (2005). A Conceptual Model of Counterterrorist Operations. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_25
Download citation
DOI: https://doi.org/10.1007/11427995_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)