Terrorism and Surveillance: are you being Watched?

Check out more papers on Crime Government National Security
Running Head: TERRORISM: SURVEILLANCE 1 Are You Being Watched? Valuable Information TERRORISM: SURVEILLANCE 2 Abstract My Reaction Paper in Module 5 discusses the many different methods of conducting surveillance. It will also introduce the three (3) different types moving surveillance, fixed (also known as stationary and picket) and combination surveillance. What’s more, surveillance is in some ways it is an expression of power. It is like being watch in all aspects of life. Having a stranger watching can make a person uncomfortable and evidentially become hostile. There are several different methods the FBI uses in surveying a suspect or suspects, their criminal activity, and their patterns. It is often done in secret, and surveillance is often done secretly and at the request of the authority. TERRORISM: SURVEILLANCE 3 Valuable Information Terrorists that are planning attacks usually follow a distinct process. Since 9/11, the terrorist was apparently working in vengeance for the United State’s support of Israel and its participation in the Persian War as well as its continued military presence in the Middle East. While some terrorists lived in the United States and had taken flying lessons, other terrorist had illegally come into the United States smuggling with knives and other weapons through security at the airport. They chose airlines that were bound for long journeys; thus the airplanes had to be full of fuel. So, one of the terrorists was able to walk through security without anyone stopping him and asking to see his identity. Due to the sufficient increase in counterterrorism, many terrorist attacks have been prevented. The effects after 9/11 should lessen the threats by continuing the conduct concentrated attempts before they are completed. One of the best weapons in the war on terrorist attacks is the ongoing and continued surveillance combined with successful investigations. With surveillance, there are three (3) types moving, fixed (also known as stationary and picket) and combination. Moving is beneficial because it “follow the subject wherever he or she goes.” (Dyson, 2012, p. 132) The investigator follows the subject until he/she stops and resumes when they do. Prior to the surveillance, the goal for the investigator should be to know already the subject in case he/she eludes them. However, the fixed surveillance (also known as stationary and picket) is surveillance in which “investigators assume stationary positions along what they believe TERRORISM: SURVEILLANCE 4 will be the subject’s logical route.” (Dyson, 2012, p. 134) The investigators will note his/her activities as they move. Those investigators stay at their station while doing so. The third and final type of surveillance is the combination surveillance. Just like its name, the combination is combined with both moving and fixed surveillance. “it is intended to limit some of the risks involved – reducing the number of personnel required in the fixed.” (Dyson, 2012, p. 134) It can also be used when the subject’s destination is unknown. It is especially effective because since it is partly a fixed coverage when the subject moves, the investigator does not. Not all surveillances should be the same with different subjects. There are six (6) methods in the conduction of surveillances. They all can be done with the three (3) types of surveillance’s mentioned above. One of those methods is called Around-the- Clock Coverage. It is just that, surveillance around the clock for 24-hour. This surveillance should not be done if the subject is confined to a small space with little movement and places to go. The second method for surveillance is Limited Hour Coverage. Although it would make sense to surveillance a subject when he/she is at work, home, etc. Limited Hour is coverage when the subject is expected to commit a crime. It is possible they will commit the offence anywhere, but it is highly unlikely they will at home or their employment. The third method is called the Specific Coverage. This method is the furtherance of the criminal activity the subject will commit from information that was received. It is only through the intelligence from other agencies that make this method useful. TERRORISM: SURVEILLANCE 5 The fourth method is Capsule Coverage. This method is used when the investigator has no idea if the subject will commit an illegal activity. If an investigator uses this method, “subject’s life is divided into segments, and coverage is provided for each segment for a given period to develop a pattern of behavior.” (Dyson, 2012, p. 136) This method is best used to learn of the subject’s daily activities. There are several parts of this process. One part is the investigator creates capsules based on the days of the week while it is staged at least 24 hours on Monday’s for a month time, Tuesday the following month and forth. If the weekend is needed, Saturday surveillance could be done during a month as well. Because there are numerous surveillances at different months, this coverage works well when the investigator wishes to learn the daily activities of the subject. The Event Coverage is to watch the subject at a particular event. Because this particular type is that terrorist usually attack on days where there is an important significance. If there is not a particular reason to watch the subject, this method can be a tremendous waste of time, resources and energy. And finally there is the Spot Check Coverage. This method is used to do occasionally spot checks on subjects. This is the most regularly used method. Like many things, there are those spot checks that are occasionally done with very little though. TERRORISM: SURVEILLANCE 6 As you can see, there are numerous methods for doing surveillances. Depending on the subject/terrorists actions and their groups, an investigator/s can find out whatever they want just through surveillances. In conclusion, there have been many changes since 9/11. One change has been at the airports. Now anyone traveling must check in with their baggage at least two (2) hours before their flight. With this come restrictions on what an individual can bring on board such as carrying liquids and toiletries in clear bottles. TERRORISM: SURVEILLANCE 7 References 1. Dyson, W. E. (2015). Terrorism: An Investigator's Handbook (4th ed.). New York: Anderson Publishing.
Did you like this example?

Cite this page

Terrorism and Surveillance: Are You Being Watched?. (2017, Jun 26). Retrieved April 24, 2024 , from
https://studydriver.com/terrorism-and-surveillance-are-you-being-watched/

Save time with Studydriver!

Get in touch with our top writers for a non-plagiarized essays written to satisfy your needs

Get custom essay

Stuck on ideas? Struggling with a concept?

A professional writer will make a clear, mistake-free paper for you!

Get help with your assignment
Leave your email and we will send a sample to you.
Stop wasting your time searching for samples!
You can find a skilled professional who can write any paper for you.
Get unique paper

Hi!
I'm Amy :)

I can help you save hours on your homework. Let's start by finding a writer.

Find Writer