ABSTRACT

In personal and professional settings, people got past the shock, fear, and denial stages of terrorism; reached a level of acceptance; and “bought into it” emotionally and intellectually to do something about it. Everyone went through the “forming, storming, norming, and performing”1 stages of team dynamics to collectively establish effective security and preparedness measures to ensure all operations would run smoothly. This was just one of the many great models learned over time and adopted as an effective training tool. Terrorism is managed and controlled smartly in this perfect world, so that even my grandmother knows what to do if she were to stumble upon something that remotely smelled terroristic. Members of all communities were properly trained to recognize and report suspicious behaviors in a timely manner to the right ofce — from recognizing a person who is seeking employment in an organization for the purposes of collecting information needed to plan an attack to an ill-intentioned culprit studying a facility’s security practices to see if there is a way to exploit vulnerabilities for personal gain. Suspicious reports are received, managed, properly tagged, tracked, and acted on. They do not disappear into an abyss of backlog in an obscure basement, nor are they relegated into binary data trapped in some virtual bin.