March 4, 2014March 4, 2014 Surveillance Detection Terrorist attacks follow a distinct process referred to as the Terrorist Attack Cycle. The terrorist attack cycle includes: Target selection, planning, deployment, […]