The chapter Terrorists Surveillance Techniques deals with how terrorists approach their surveillance. In terrorism, the attack is not the only most important subject; surveillance on the potential target is another important issue. Before terrorists attack their target, they normally conduct research and thorough surveillance on the target. The surveillance conducted by the terrorists is important because it provides information on whether the target deserves the attack or not. The analysis on the chapter is correct and on point. Most terrorist organizations are organized groups with potential manpower. The people are educated and possess enough skills to carry out their operations. For instance, it is alleged that ISIS has many professionals such as engineers, doctors, computer programmers, among other professionals. These skilled personnel have knowledge of the modern technology so that they can monitor their target both in the internet and physically. All the terrorist organizations have an intelligence cell. The members of these cells are qualified intelligence officers who are sent to the ground to select potential targets. The chapter provides a brief explanation on how surveillance is conducted. However, it does not provide a detailed description of how intelligence is conducted by the terrorists. The book has left out important technical and communication surveillance and information on law enforcement counter-surveillance efforts. According to Nance, there are two types of surveillance. They are overt and discreet surveillance. The overt scrutiny is a surveillance that is done in an unconcealed way. On the other hand, discreet surveillance occurs when the watcher doesn’t want to be spotted or seen. This could be a person observing from a balcony where they cannot be easily spotted. In terrorists’ organizations today, a potential target can be followed and observed for a period of time before the attack happens.
In the chapter Detecting Infiltration and Special Mission Techniques, Nance explores that means used by terrorists to infiltrate borders and to secure potential targets. In order to penetrate a state, the terrorists will make all efforts to maintain little contact with the law-enforcement officers or any other administration authority. These operators normally act in a manner that does not raise suspicion from the locals. It means, therefore, that these terrorists are required to study and employ a number of cultural endurance skills. When they infiltrate into a country, terrorists maintain a low profile so that their presence is not noticed. According to Nance, terrorists are sometimes forced to adapt to the principles and actions of the country and society that they plan to attack. For instance, the 9/11 masterminds were spotted in a strip bar days before they attacked. This technique of adapting to the society is referred as plausibility in community. In addition, before an attack, terrorists should be in a position to fit in the scene of the target. Sometimes these terrorists, in their quest to infiltrate a country, are helped by citizens, embassies, or immigrants. Upon infiltration, these personnel end up becoming energetic terrorists, factions of terrorism, or members of the sleeper cell who wait to be activated and to strike a target. Terrorists have a large network of personnel in almost every country. They do so that they may have adequate intelligence and help when needed. Lately, a lot of people have been radicalized and joined these groups. Upon radicalization, people return to their countries and become agents of terrorisms. Agents are people who have executive contact to a target and provide admission and intelligence to terrorists. For instance, Jose Padilla who is an alleged associate of the al-Qaeda was an American citizen. He was radicalized and helped the group to infiltrate into America.
In chapter 5 of the book: Understanding the Law of Terrorism, McCormack explores the type of interrogation and torture that suspects are subject to. It also raises the issue of legal matters that are raised by the use of these tortures and the extra ordinary rendition in the war against terror. Suspected criminals are normally interrogated in order to provide information on the terrorists’ networks. Sometimes, the information they provide is helpful to the law-enforcement agencies because they can use it to stop other attacks. On the other hand, these suspects are sometimes subjected to torture and agony so that they may release information. Terrorists, in most cases, undertake an oath that they will not release any information in case they are captured. The state agencies, like the CIA resort to using torture to make them speak. However, the torture is sometimes inhuman and cruel because they make these people surfer. For instance, the suspects are forced to go days without sleep. Mohamed Rahim, a terrorist suspect, was diapered, shackled and deprived from sleeping for 138 hours. The mastermind of the 9/11 attack was made to go without sleep for over a week. The interrogation of some suspects is harsh to a point that they develop psychological issues such as hallucination, insomnia, and paranoia. Although they are supposed to be interrogated for intelligence and information, they should not be subjected to the inhuman acts and torture. If they are found culpable, they have a right to a fare hearing and ruling other than anguishing them. Lately, the CIA has adapted the “enhanced interrogation techniques. This is a program where suspects are systematically tortured in order to release information. According to McCormack, these interrogation techniques should be stopped.
Reaction Paper {type) To Use As A Writing Model
Type of paper: Essay
Topic: Terrorism, Terrorists, Cyber Crimes, Surveillance, Target, Information, Victimology, Law
Pages: 3
Words: 900
Published: 03/08/2023
Cite this page
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA