Verified Document

Terrorism And Surveillance Research Paper

Terrorist Surveillance Critical overview of the reading

Just as national governments possess information-gathering capacities, so do terrorists and members of other types of criminal organizations. The United States has the CIA and similarly every terrorist organization has a branch of its operations solely devoted to gathering information (Nance 2008:188). However, unlike governments, any member of the terrorist or criminal organization can be a potential observer, even children. This is why it is especially vital that suspicious actions of potential terrorists are monitored because it may not be immediately obvious who is amassing intelligence that could be used in a potential attack against the U.S. The fact that surveillance of renegade groups is so potentially far-reaching in its implications and character, yet so amorphous in nature, means that detecting it is both necessary and extremely difficult.

Intelligence operatives in the U.S. must be mindful of the risk that they may be watched. They should carefully study the history of potentially dangerous groups to detect surveillance patterns and patterns of attack. Coordination with other law enforcement agencies is essential to have an ongoing free flow of information. Regardless of whether terrorist observation is overt...

While surveillance by actual government groups tends to be quite sophisticated, terrorist surveillance tends not to be particularly professional in nature. If it escapes notice, it is not because of its finesse, but because of the simple fact that it is not expected at that particular place, at that point in time. Terrorist observation may also be fixed in nature (focused on a single observational point) or mobile (free-floating and deployed by moving operatives). The latter is often harder to detect unless a number of 'hits' of the same observing person are detected over a short period of time (Nance 2008:190). Auditory surveillance is also a risk in the form of 'bugging.'
Terrorists may use still or moving photography to conduct visual surveillance: simple observation can be very revealing from the perspective of a terrorist. Even 'open source' photographs not strictly designed to provide intelligence information can be unintentionally revealing. Also, there is a great deal of technology available to terrorists online (both legitimate and illegitimate) to make spying easier than ever before (Nance 2008:192). Once again, the greater ease with…

Sources used in this document:
References

Nance. M. (2008). Terrorist recognition handbook. 2nd Ed. CRC Press.
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorism Tech Technological Innovation As
Words: 4295 Length: 15 Document Type: Thesis

The foolishness of this reversal of priorities would be clearly demonstrated in the contrast between the results of intelligence efforts on 9/11 and those just two years prior. After the resignation of Tenet, who submitted as his official reason for departure the desire to spend more time with his family, his spokesman noted that "no one in the U.S. government was more aggressive in calling attention to and dealing with

Terrorism Refers to Threats, Violence, Bombings, Etc.
Words: 1366 Length: 5 Document Type: Essay

Terrorism refers to threats, violence, bombings, etc. Terrorism is known to have a long history, but even today, the reason behind this terror by the super powers and the government remains explicit. The acts of terror are very common these days and could be found in current political and social environment. A part of terror is still confused when it is applied in the actual present world (Robb, 2007). Where the

Terrorism What Is Involved in
Words: 1034 Length: 3 Document Type: Essay

In modern terminology, and for foreign policy, political science and international law, crimes against humanity are any atrocious act committed on a large scale. They can be prosecuted in most any Federal Court System, depending on where they occurred and which population was part of the criminal activity. The implication for international law is that crimes against humanity are subject to universal jurisdiction, which means that States can exercise their

Terrorism Organizations What Is Terrorism Legacy in
Words: 1768 Length: 6 Document Type: Research Paper

Terrorism Organizations What is Terrorism? Legacy in the 21st century Based Terrorist Organizations Aryan Nation Ku Klux Klan Counterterrorism and Prevention Definitions and Structures Homeland Security Patriot Act The very nature of terrorism, of course, is to engender fear and panic into the population base. Thus, targets are so numerous that complete protection of all is impossible. Targets could include any of the governmental buildings in Washington, D.C., courthouses or public buildings in major cities, malls, churches, and transportation centers

Terrorism in Western Europe That Terrorism, Be
Words: 946 Length: 3 Document Type: Essay

Terrorism in Western Europe That terrorism, be it transnational or domestic, impacts negatively on the overall well-being of economies is a well-known fact. With that in mind, governments have overtime embraced numerous counterterrorism measures in an attempt to mitigate the adverse effects of terrorist activities. In this text, I concern myself with terrorism in Western Europe. In so doing, I will limit my discussion to two countries in Western Europe where

Terrorism Global Terrorism Preslar, D.B.
Words: 377 Length: 1 Document Type: Term Paper

The food supply is extremely vulnerable, and that makes all of us vulnerable, as well. The author also maintains that inspection at borders and inspection stations have kept most pathogens and problems from entering the country, but we have to wonder, how long will that last? This applies to this course because it is a true threat of terrorism that could occur here or anywhere around the world. It

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now