Profiling Domestic Terrorists
BY Herschel Smith11 years, 5 months ago
In July 2012 the Small Wars Journal published Full Spectrum Operations in the Homeland: A Vision of the Future. It was a touchstone marking their descent into weird collectivism and illegal military operations by the armed forces of the U.S.
The specific scenario was stupid beyond belief, where “extremist militia” takes over the government of Darlington, South Carolina. My son and I got a good laugh out of that one. The only insurrection against the local government of Darlington might occur as a result of losing the one remaining NASCAR cup race, but as an aficionado of South Carolina, I can vouch that federal troops won’t be the savior of Darlington. They might be the target, but the local Sheriff is just as likely to side with the militia.
But laugh as we might, this is serious business, and marks a dark moment in the history of our military. They are now willing to say out loud what wouldn’t have even been thought a hundred years ago.
Small Wars Journal continues its theme with Political Violence Prevention: Profiling Domestic Terrorists. The paradigm the author seeks to build is right up front.
… the process of becoming a violent extremist is a series of steps that leave footprints we should be able to track”. A national standard from which to identify individuals who have left these footprints and are on the path to becoming violent would be invaluable to law enforcement, especially at the local level. Without a set standard each local law enforcement agency interprets who may or may not be a threat and what is worth reporting or investigating differently as they have different experiences and expectations about domestic terrorists and terrorism. Domestic terrorists can be identified prior to committing any terrorist attacks through a profiling systems based upon identifying factors that influence committing acts of terrorism.
The entire effort is worthy of funding and support, according to the author.
The area in which profiling could be useful is in identifying Lone Wolf terrorist attacks as they are executed nearly twice as often as other attacks. This is under the assumption that Love Wolf attacks are more successful because the clues that alert the general public and law enforcement are less apparent or non-existent. It would also involve an intelligence agency to track the individual over an extended period of time. An agency that is not concerned with arresting or detaining would be free from the pressures of cased based intelligence enabling them instead to pursue preemptive intelligence where the profiling may be useful (Chalk & Rosenau 2004).
In order to prevent domestic terrorist attacks resources should be allocated into improving existing efforts that have proven to be effective as well as into the development and implication of concepts that improve weak areas of domestic terrorist threat detection such as a profiling system.
Make no mistake about it. If you believe that the second amendment exists to keep government tyranny in check, you make the grade. The “thinkers” are figuring out ways to watch you and profile you before you become “violent.”
On June 11, 2013 at 10:58 am, Dave F said:
Interesting how profiling ‘may be useful’ against backward, racist, gun toting, bible clutching, red-necks who have not broken the law, but is verbotten in all other cases.
On June 11, 2013 at 2:46 pm, Mark Matis said:
You missed “veterans” and “who believe in the Constitution”, Dave F, but other than that fairly well covered all the bases…
On June 11, 2013 at 3:10 pm, Archer said:
“An agency that is not concerned with arresting or detaining would be free from the pressures of cased based intelligence enabling them instead to pursue preemptive intelligence where the profiling may be useful (Chalk & Rosenau 2004).
That says it all. The NSA (for example) can monitor anything and everything and can circumvent the 4th Amendment at will – as long as they don’t arrest/detain folks. They can then drop an “anonymous” tip with the FBI or other agencies that do, who can get a warrant for “probable cause”, and gain access to whatever information the NSA illegally obtained.
All you have to do is fall under suspicion, and anything you’ve ever said/done (which is all recorded) becomes potential evidence to be used against you.
On June 11, 2013 at 5:22 pm, Daniel K Day said:
“anything you’ve ever said/done (which is all recorded) becomes potential evidence to be used against you”
Yes, or to be more precise, anything which a record on any government-managed computer anywhere indicates that you’ve ever said/done. But as long as we trust the integrity of the overseers for their computer records, we’re golden, eh?
On June 11, 2013 at 9:22 pm, bikermailman said:
We have dozens of Sudden Jihad Syndrome attacks since 9/11/01, yet who do they focus on? Who do they protect? Oughta tell you all you need to know.
On June 12, 2013 at 8:08 am, B Woodman said:
I need to expand this thought further on a proper computer, not a tablet:
That Teh Gubbment is creating the very “terrorists” it is looking for.
Any of ya’all out there are free to grab and run with this as well. No copyright.
On June 12, 2013 at 11:50 pm, xkn said:
It is remarkable that .gov is paranoid about the militia, even imagining militia columns marching onto the Washinton DC to hang them from the lampposts, but they fail to realize that the purpose of militia is really
defensive first and foremost. The real threat to .gov is the monster they created thinking that they will be able to control it and the rest of populace with it: a Free S*** Army. The FSA will do the hanging before any militiamen gets his provisions packed. The purpose of militia is to defend their TO from the FSA, once
they are done with DC.