Terrorist Surveillance Critical overview of the reading Just as national governments possess information-gathering capacities, so do terrorists and members of other types of criminal organizations. The United States has the CIA and similarly every terrorist organization has a branch of its operations solely devoted to gathering information (Nance 2008:188)....
Terrorist Surveillance Critical overview of the reading Just as national governments possess information-gathering capacities, so do terrorists and members of other types of criminal organizations. The United States has the CIA and similarly every terrorist organization has a branch of its operations solely devoted to gathering information (Nance 2008:188). However, unlike governments, any member of the terrorist or criminal organization can be a potential observer, even children.
This is why it is especially vital that suspicious actions of potential terrorists are monitored because it may not be immediately obvious who is amassing intelligence that could be used in a potential attack against the U.S. The fact that surveillance of renegade groups is so potentially far-reaching in its implications and character, yet so amorphous in nature, means that detecting it is both necessary and extremely difficult. Intelligence operatives in the U.S. must be mindful of the risk that they may be watched.
They should carefully study the history of potentially dangerous groups to detect surveillance patterns and patterns of attack. Coordination with other law enforcement agencies is essential to have an ongoing free flow of information. Regardless of whether terrorist observation is overt or discrete, it can have deadly consequences if not monitored and effective monitoring must be a mutually-coordinated effort (Nance 2008:190). While surveillance by actual government groups tends to be quite sophisticated, terrorist surveillance tends not to be particularly professional in nature.
If it escapes notice, it is not because of its finesse, but because of the simple fact that it is not expected at that particular place, at that point in time. Terrorist observation may also be fixed in nature (focused on a single observational point) or mobile (free-floating and deployed by moving operatives). The latter is often harder to detect unless a number of 'hits' of the same observing person are detected over a short period of time (Nance 2008:190).
Auditory surveillance is also a risk in the form of 'bugging.' Terrorists may use still or moving photography to conduct visual surveillance: simple observation can be very revealing from the perspective of a terrorist. Even 'open source' photographs not strictly designed to provide intelligence information can be unintentionally revealing. Also, there is a great deal of technology available to terrorists online (both legitimate and illegitimate) to make spying easier than ever before (Nance 2008:192).
Once again, the greater ease with which terrorist surveillance can be conducted is an argument in favor of greater care in discerning patterns of behavior amongst terrorist groups. Significant facts Just as it is often stressed in the literature that 'everyone' can be a potential terrorist, any terrorist can also be a potential spy conducting surveillance. Suspicious activities in public places must be noted, but particularly in areas that have been identified by various intelligence agencies as likely targets of terrorists.
Law enforcement must be cognizant of the fact that groups have a wide variety of tools to conduct surveillance, spanning from simple, on-the-ground observations to more sophisticated use of cameras and wiretapping devices purchased at 'spy shops.' Even apparently innocent evidence like public photographs or schedules of when the building is open that are available online can be potentially leveraged by terrorists for information. However, as overwhelming as all this evidence may seem, it is important to remember that terrorists are usually not sophisticated in their surveillance techniques.
Engaging in such obvious behaviors as ordering food at a cafe and leaving before consuming it; shadowing well-trafficked areas in suspicious clothing; and looking obviously out-of-place because of inappropriate bodily movements and attire are not atypical, versus the type of sophisticated surveillance carried out by foreign nations (Nance 2008: 190-192). Conclusions A final concern to keep in mind about spotting terrorism, however, is that law enforcement.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.