Confinement of Insult-Development requires open communications on terrorism

Web |  + posts

Alexander Research & Consulting

Abstract: The interest in this paper concerns the clinical cause for a specialized developmental change in vulnerable populations, leading to premeditating fatalities incurred by organized violence, as current in the opening years of the twenty-first century. Through specialized developmental change or Insult-Development, learners have received an oppressive form of education. Containing the distribution of this architecture in order to save lives and reduce property loss requires community involvement and training.

Vocabulary: constructivism – a learning approach used by potential facilitators to assist in reinforcing Insult-Development through experience training, attempting to guarantee equivalent responses, consequences and results; defect density – here, the number of “defects” or transmissions confirmed when adversaries operate software/applications during a specific period while under threat, caused by a radio direction finder; Insult-Development – the application of an insult, to cause a specific physical or mental injury, by harsh, eclectic, authoritarian control in the learning process and development of human individuals, from an hyper-sourced entity; libertarian – a learning approach that seeks cooperative responsibility in the teacher-student relationship, adapting domain processes to new conditions and limitations; Neo-separatist – as dominate Muslim sects, Sunni and Shi’ite, continue to divide the Muslim character with threats and acts of violence, based on non-current secular and religious disputes; personal electronic devices (PED) – an electronic machine that uses computer applications and can transmit voice, and/or messages, photographs and videos; Salafi jihadism – ultra-sectarian rivalry towards other religious and political groups, sometimes with sheer violence; terrorist learning experience (TLE) – the inclusion of objects and materials portraying and employing violence and killing in the instruction of at-risk youth

Methodology – A specialized developmental change, or Insult-Development, defines as the application of a harsh, eclectic, authoritarian control of the learning process and development of human individuals, from an hyper-sourced entity. Prototypically, a human or robotic entity, employs key mechanisms that influence stimulus-response behaviors, in order to distract individuals, more often children, late adolescents and mid-twenties, from their community responsibilities and cultural similarities. These external mechanisms internalize symbolic values. Whether concrete or abstract, and often triggered during play, these objects represent the pathways to internalize Insult-Development (ID), establishing the gateway for a terrorist learning experience (TLE).

When the individual’s profile indicates an elevated capacity to receive altered knowledge and beliefs, while deploying adapted skills and abilities, the organization’s goals aim to prevent recidivism and thus prevent transference of ID behavior to positive growth patterns. Thus, ID training must focus on the impact of technological interventions when learners, and, often, foreign fighters, leave conflict zones and re-emerge into more social, ambient settings.

In order to reinforce altered knowledge and facilitate training, that the impact of information fades within months of its origination, the purveyors of ID and its cohort, TLEs, must employ and manage the communications and the organization’s constructivist social media framework.

At the start of the 2000s, “Neo-separatist Salafi-jihadists” (Ns-Sj) deployed to conflict zones. The commanders operated personal electronic devices (PEDs). Also, the choice to empower troops with connectivity obviously had a gain, since their products and context can propagandize larger communities.

Getting wired into a digital environment has provided the resources for an uncountable and uncontrollable open source of online material, using text messaging, photo applications and blogs. Now, with counter-communication tools and airborne drones, enemy leadership has reduced its electronic footprint, depending once again on short-distance carriers and more flexible human partners, often residing in the home country. RAdversarial groups have now redistributed their carrier resources, reducing defect density and scrambling digital signals away from a surveilled installation or area of operations (AO).

Text messaging and uploading photos and videos while using a PED gave opponents multiple platforms to send their messages outside of the conflict zone. On the other hand, the continued utilization of PEDs signals a weighted defect due to monitored radio frequencies. The potential of impaired privacy has subverted, specifically, the Al-Qaeda and Islamic State organizations’ security networks.

Environmental cues – Quickly, successful nations advance in a peaceful community when their leaders propose mitigation policies, tactics, and procedures, always with popular support and cooperation. Stake owners will uncover and observe authoritarian structures which (1) exploit youth’s inattention and hyperactivity; (2) manipulate populations to believe in particularistic aspects of Muslim dogma and other destructive concepts, (3) abandon the population to stage a return to legitimacy.

Recognizing the fact that others direct adolescents through ID, the combination of ID and constructivist methods leverage sociopathic choices by reframing experiences, often based on actual, or magnified, dehumanizing incidents. When a situation develops, who controls that situation and how the situation gets resolved, either by small arms, improvised explosive devices or with a suicided, “martyr’s” response, affects national interests.

Constructivist ideas assist ID, attempting to guarantee equivalent responses and consequences. The system of authoritarian control has illustrated atheism, mythology, and elitism.

Within the capabilities of transforming perceptions, or problems that appear as organic criteria, into concrete solutions, specific libertarian methods of communication demand implementation. An extensive needs assessment plan (NAP), that includes continued analysis and evaluation of pertinent cognitive markers of specific learners and threatened populations will advance detection of and action on cues within this complex situation.

This means that audiences can’t wait until the next general election to interest themselves to online messaging and internet content that probably has streamed over their own internet service provider’s network.

Inquiry and Participation – In order to expedite data information pathways (DIPs) between units within the public safety community, the public/private sector, citizenry and the United States Government, it is required that communities participate in protecting human lives, resources and support terrorism awareness training.

In getting intelligence, units operate in an Incident-Contingency Crises Action Planning (ICCAP) mode: initiation of alerts, brainstorming data and evaluation of information to improve capabilities. When brainstorming, communities, public groups and businesses must join with the government to block and disrupt terrorist activities by remembering several indicators associated with criminal and ID behaviors.

When processing a high number of variables that can lead to intercepting the movements of a potential hyper-sourced entity, a distribution chart can aid in monitoring installations, training areas, and educational centers. Trusted data will bend intelligence toward greater capacity and dependability.

How individuals respond to unknown circumstances depends on knowing that a new motive requires new thinking modes. Reacting to the excitement of emerging threats may allow populations to forget past behaviors, but this reaction does not lead to purposeful planning. New circumstances require new thinking.

Training by engaging the fundamental skills of product collection connects the dots while detecting deception and corroborating the facts has two results: a. validated human intelligence sources and b. validated societal information and assessments. These two formats indicate specific types of collection management and requirements.

Field Intelligence – Collecting and gathering information sometimes happens without prior planning. Throughout any community, sometimes a person sees and recognizes activities that may indicate a nefarious act or potential threat. In the field, several types of collection methods can assist public groups and families.

Human Intelligence (HUMINT) works in the area of products,  and people. “Collecting relevant, accurate, and validated information…” will deliver the required factors necessary to understand the effects of detection and deterrence. Having casual and recruited sources assists in multiplying the opportunities for infrastructure, thus adding to situational awareness.

Equally, open-source intelligence (OSINT) serves as a key input in gaining a correct analysis of adversarial behavior and strategies. OSINT today differs from any other type of intelligence gathering due to the increasing number of published materials, either in electronic format or hard copy, paper format. Archived materials from libraries and other venues, such as universities and libraries, also have reportable documents.

OSINT also includes various radio, television and cinematic sources that open valuable information and operational information. Add the number of home language broadcasts with broadcasts presented in a foreign language, which is why casual and recruited linguistic expertise gives support for required translations.

Military Intelligence fixes on this same set of activities. Yet, and for reasons left untold, intelligence management in the armed forces elaborates its mission as to explain and clarify different stages of data gathering. Management includes planning and direction; collection; processing and exploitation; analysis and production; dissemination and integration; and evaluation and feedback.

In the United States, a fusion center, such as a Joint Regional Intelligence Center (JRIC), located in specified states, major cities and population centers, facilitates and coordinates the activities of analysts and intelligence products. To prevent terrorists and crime-directed behavior, the fusion centers process relevant information to create a common operational picture (COP).

These facilities, as stated by the Department of Homeland Security, “serve as focal points within the state and local environment for the receipt, analysis, gathering, and sharing of threat-related information between the federal government and state, local, tribal, territorial (SLTT) and private sector partners.”

It indicates the Federal Government’s shared responsibility to assist state authorities in maintaining fusion centers and prioritizes funding for the continued assignment of federal personnel and others. This operational tempo supports the examination of ongoing threat assessments, both nationally and internationally.

Persons who have a knowledge of terrorist indicators and who participate in the reporting of relevant and reasonably articulable information can follow and support communication so as to prevent and confine the different forms of Insult-Development, taught openly in “schools” or delivered over the Internet. Knowing about our youth and how they learn will protect them from exploitation in case that attack originates in our homeland or abroad.

by
R. Alexander Ph.D.