You are on page 1of 2

UNIPOL NEWSLETTER

SECURITY COUNTERMEASURES
www.drgonzo.org UNIPOL - Security Countermeasures January-1 2011

Terrorism as an Expression of Criminal Hedonistic What is the intent of terrorist violence? On simplistic level it is
Tendencies: the attained possession of psychic pleasure for self-indulgent and
selfish reasons. Sexuality becomes weaponized. To this mix of
Criminality reflects willful premeditated intentions to commit a
weapons, we can also include various configurations of nuclear
crime for an objectified personal gain. The pathological inference
weapons, biological and chemical devices that have the potential
here is prurient instigation of individualized desires, wants and
and imagined potency for significant levels of damage to people
wishes translated via internal thinking processes that seek to
and property and other belief systems. As in other forms of
achieve an amative release for heightened self-gratification.
interpersonal abuse, domestic violence, murder, rape and robbery,
That’s what lurks below the surface. None the less, there are
fear is an import factor in the perceived ideated impotence of the
many cover stories on the surface that deceive the reality.
perpetrator. Violence renders pleasure.
Gangs, dangerous cults, collusive criminal enterprises and
First responders to acts of terrorism are generally local law
terrorism share this commonality. Bio-sexual essence of the
enforcement officers. The seemingly unpredictable nature of
human being or the group’s collectivism seeks to perpetrate their
terrorism requires constant vigilance on the part of all law
sensate dysfunctions by way of ideological oppression
enforcement personnel. The collection and analysis of frontline
subsequently vented through unlawful means as expressed in their
intelligence is important to the mission of providing public safety
seduction to criminality. The arsenal of terrorists has adapted to
and security. Surveillance, intelligence gathering, patrol
the innovations in technology and reflects the mirrored ideation of
strategies and associated tactics and techniques must be
the psycho-dynamic conflict within the individual and the group.
effectively employed in order to confront terrorist activities.
The current era of “weapons of mass destruction” (aka WMD)
None of this, of course, is easy. But, ongoing training, education
include an array of weaponized instruments of widespread death
and proactive efforts are necessary to the public safety mission
and injury potential. They provide the real world imagery for the
Terrorist tactics, techniques and technology should foster a
pleasure received from violent acts. From poison gas to
response by law enforcement that is both proactive and
radioactivity, the lethal nature of terrorism has dramatically
innovative. Since terrorism is criminal activity, countermeasures
escalated in an increasingly smaller global community.
should include the use of enhanced training methodologies,
From a purely generic and narrow definition, “weapons of advanced education, covert operations, tactical and strategic
mass destruction” tend to encompass any explosive device or planning, aggressive surveillance, electronic countermeasures,
other materials that potentially cause widespread death, injury and innovative problem solving tactics, multi-agency initiatives in
damage for personal gain. But, the inclusion of such implements planning, training and practical application, as well as other
also refers to incendiary and poison gas devices, as well as variety related aspects. As a criminal enterprise for “profit”, terrorism
of bio-hazardous agents. Things such as bombs, grenades, tends to be adaptive, and the law enforcement response must be
missiles, land mines, and so forth fall within this broad category well prepared to deal with their tactics. (1)
of destructive devices. These are highly symbolic, yet very real
threats, regarding the degree of repressed bio-sexuality. (1) The forgoing material is based on the training publication: Law
Enforcement Tactics in Response to Terrorism, by Randy Gonzalez.

Newsletter 1
Terrorists generally prefer to strike with surprise that is An effective threat analysis system, which includes
preceded by careful planning and training. Like the rapist, efficient intelligence gathering, could be a potentially
and no doubt a cowardly act to begin with, power, control potent weapon against terrorism. Yet, analysis and
and domination are factors in the distorted cerebral interpretation are susceptible to subjective validation. That
manifestations of the criminal. The primary weapon is the is, if used properly, with logical applications of deductive
“fear factor”. If people are scarred and intimidated, then reasoning, absent as much as possible the allure of
the terrorist act has been a success. cognitive bias, negative political interference and sound
judgment, capabilities can enhance tactics and strategies.
Fear is an essential component of terrorist actions.
Information analysis is an aspect of the crime and
There is a desire to make the public feel vulnerable and
criminal behavior analysis process, which could support
unsafe. Such anxiety on the part of the public puts pressure
preventive measures to interdict and otherwise terminate
on law enforcement services to act. Terrorism is an attack
terrorist activities. Information receipt is crucial in terms of
on noncombatants in that civilians are targeted. The
police and community interactions.
political and economic goals of terrorism are accomplished
As such, the most important part of intelligence
through the degree of propaganda that is obtained. Terrorist
gathering begins at the law enforcement patrol level.
groups tend to be cohesive, loyal, trained, educated,
Patrol, which represents the striking power of the law
financed and armed just like other kinds of organized
enforcement agency, is in the appropriate position to
crime, as well as gangs, hate groups and certain cults.
initiate the information development process. Not to forget
Emanating from a distorted ideological worldview,
of course, private security forces that play an important role
terrorism employs whatever criminal activity suits its
in public safety processes. Interaction is vital.
needs. From blackmail, to intimidation and suicidal
The information gathering process is an integral part of
bombings, terrorists promote a political agenda of death
overall threat analysis and problem solving. With respect
and destruction. Violence is used as a mechanism of
to the line operations, officers on patrol have occasions to
persuasion and satiation in the sociopathic world of the
receive information relative to signs of tension, unrest,
terrorist. Targets of opportunity are selected on the basis of
conspiracies, suspicious activities, and so forth, in their
propaganda value and profit by use of unprovoked attacks.
respective areas of assignment. The acquisition of
In most cases, criminal acts or perpetrated with minimum
intelligence information should be processed and analyzed
risk to the key terrorist players, and maximum exposure
to the degree necessary to keep command level staff well
and publicity in the media. The media are often more than
advised as to situations within the community. Information
willing to sensationalize to every extent possible the “scope
and threat analysis processes should be established within
and nature” of the terrorist incident. Publicity is an
in every law enforcement organization. Police executives
important ingredient to the terrorist. And, terrorist
must be informed on a regular basis through an effective
incidents will be portrayed in graphic detail with great
intelligence briefing process and ensure the leadership
obsession by various media outlets.
capacity to be bold, creative and imaginative.

Sex lies at the root of life, and we can never learn to reverence life until
we know how to understand sex…..Havelock Ellis

Newsletter 2

You might also like