One of the most useful sections of the Al Qaeda document is how the terrorist organization inconspicuously communicates and establishes cells. If counterterrorism specialists decide to use surveillance on a suspected cell, they should keep in mind the ways suspects cloak their conversations using code, secret signals, and other communication cloaks. The section on invisible inks should remind counterterrorism specialists to carefully examine each and every piece of correspondence issued by a potential suspect for hidden messages. Messages delivered verbally are similarly cloaked. The counterterrorism department must hire specialists in analyzing communications, because patterns of speech may reveal messages hidden beneath the superficial content of a phone call or taped conversation.
The manual does not mention the use of the Internet for gathering information about their "enemies."...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now