Defense Organization for Communities
(C-DOC), by David A. Nuttle
1. Self-Sufficiency: each community organizes itself to meet all basic needs for its citizens, during and after terrorist attacks of any and all types.
2. Terrorist Target Map(s): Use a map room to plot every possible target that might be attacked by terrorists. List prior methods terrorists have used to attack any of these targets.
3. Rumor and Incident Map: Provide an overlay, to the above map, using two means to show rumors of attack as well as actual attack(s) against any one type of terrorist target.
4. Intelligence Map Overlay: Use a second classified map overlay to record all intelligence reports related to any of the possible targets. Dedicate creative and experienced personnel to the study of possible terrorist attack options.
5. Block & Target Committees: Train and organize local citizen volunteers for special assignments to help defend.
6. Citizen Informants: Educate the general public, and citizen volunteers, in the unique traits and features that will help to identify suspect terrorists---and then create communication systems for these citizens to discuss suspicions with law enforcement personnel fully trained in such traits and features.
7. Counterfear Tactics: Terrorists seek to achieve victory by sustaining a high level of fear. Thus, methods must be soon developed to eliminate existing or potential fear associated with any one type of terrorist attack; e.g., biological attack by mail followed by irradiation of mail to kill the terrorists’s bacteria.
8. Political Action Needs: Some special interests often “work” to defeat homeland security/counterterror measures that they find expensive or inconvenient. The public must therefore be organized to counter any adverse actions or lobby activities by such special interests.
9. Mission Programs: communities that operate C-DOC programs will generally act to improve performance by exchanging ideas with “sister communities” in other states and nations overseas.
10. Hunter Teams: each community will select its best qualified law enforcement officers (personnel), and provide them with special training and equipment---and then dedicate these personnel to seek suspect terrorists in their community.
11. Intelligence Ops: Once terrorists are identified, efforts must be undertaken to terminate their capability to initiate any type of terrorist attack. However, the long-term objective is to recruit a few “key” terrorists as intelligence agents---and target them to identify other terrorist operatives and plans.
12. Deception Ops: while terrorists are in their target area(s), planning an attack, there should be effective deception activity to make terrorists uncertain about the reality of what they see and hear.
13. Agit-Prop: When the terrorists are in a target zone, they are your “audience.” Thus, agitation and propaganda operations may be undertaken to cause terrorists to doubt their own leaders and cause---and to doubt that their sacrifice would make a real difference.
14. Personnel Security: at various times, terrorists will attempt to eliminate the “key” leaders that direct the efforts against them. All necessary security measures should be taken to fully protect those who must direct counterterror efforts.
15. Innovation: Necessity is the “mother of invention, and most terrorists seek unique or new methods of attack to circumvent your defenses. Seek to be equally innovative. N.B.
1) The above C-DOC systems have been tested and well-proven as part of successful homeland security and counterterror efforts by the author.
2) C-DOC efforts must be supplemented by state and national programs designed to provide security for our borders, ports, transportation, utilities, communication, water, and food ---while also preventing all possible attack(s).