Counter terrorism surveillance techniques pdf

This is the period when spies are at their most vulnerable and can be detected, and you can take measures to feed them false information and draw their attention away from you. In the ongoing controversy over civil rights and mass surveillance an important aspect of police work to combat terrorism is overlooked. With the evolution of wireless and microchip technologies, surveillance devices have become smaller, cheaper and better than ever before. Counter surveillance tactics course green eye tactical. September 11 also marked the beginning of a setback in peoples rights and freedoms. Ostensibly to fight terrorism, extraordinary and particularly repressive legislation was adopted in a large number. Communications surveillance vital to counter terrorism, say uk agencies this article is more than 6 years old security services claim intercepting communications helps foil. Surveillance, surveillance detection and counter surveillance.

Before the computer age, counter surveillance entailed evading. Department of homeland securitys training course counter surveillance for critical infrastructure and key resources tells us that security. As we noted last week, terrorist attacks do not materialize out of thin air. Concepts and practices for fraud, security and crime investigation page 1 surveillance is, quite simply, observations conducted to gain information. Material support encompasses an exceptionally broad range of assistance, and would appear on its face clearly to include grants, microfinance services and many types of technical assistance if the recipient engages in terrorist acts or is a foreign terrorist organization. Counter terrorism also spelled counterterrorism, also known as antiterrorism, incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcement, business, and intelligence agencies use to combat or prevent terrorism. Almost any criminal act, from a pursesnatching to a terrorist bombing, involves some degree of preoperational surveillance. In february 2018, for example, the treasury department froze the assets of six people known to conduct business with hezbollah, an islamic organization the u. The documents below provide guidance on sound surveillance methods that can foster consistency in practice and can result in data that are more accurate and comparable.

National strategy for combating terrorism focuses on identifying and defusing threats before they reach our borders. Osce, countering terrorism, protecting human rights, a manual 2007. History has taught us that certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high profile or sensitive sites, places where high profile individuals reside or work, or where large numbers of people gather like government buildings, military installations, bus or train. Nonprofits and grantmakers need to know a plainlanguage guide to executive order 224, the patriot act, embargoes and sanctions, irs rules, treasury department voluntary guidelines, and usaid requirements. Consequently, this new electronic surveillance technique is. The third category to consider introduces the use of military counter terrorism techniques outside of the conceptualisation of terrorism as crime miller, 2009, pp. Practical guidance paper on counter terrorism and human rights. Ostensibly to fight terrorism, extraordinary and particularly repressive legislation was adopted.

Employ your countermoves to try to detect the surveillance, but unless youre coming under attack, crashing your car or getting a citation isnt worth it. Apr 17, 2015 this might sound like it goes without saying, but from my experience, as soon as terms like surveillance, surveillance detection and counter surveillance get thrown around, simple fundamentals like goals, parameters, measurements of success and costbenefit ratios tend to take an undeserving backseat. It is focussed on prevention as a first line of defence against terrorism. Physical surveillance can be broken down into two categories. Building on the national security strategy and the administrations progress to date, the national. Countersurveillance refers to measures undertaken to prevent surveillance, including covert surveillance. Communications surveillance vital to counter terrorism. This might sound like it goes without saying, but from my experience, as soon as terms like surveillance, surveillance detection and counter surveillance get thrown around, simple fundamentals like.

This paper focuses on what intelligence officials in the u. Dec 20, 2018 with the evolution of wireless and microchip technologies, surveillance devices have become smaller, cheaper and better than ever before. Hsin le, em, ct hsinintel rissnet riss atix law enforcement on line leo arizona department of health services, disease surveillance national alert system. Introduction to international terrorism developed under unodcs education for justice e4j initiative, a component of the global programme for the implementation of the doha declaration, this module forms part of the e4j university module series on counter terrorism and is accompanied by a teaching guide. In other instances, surveillance techniques were discussed in terms of. Countersurveillance may include electronic methods such as technical surveillance counter measures, the process of detecting surveillance devices, including covert listening devices, visual surveillance devices as well as countersurveillance software to thwart unwanted cybercrime, including. Assassination, when used as a terrorist tactic, is the targeted killing of a countrys public officials or individuals who represent the political, economic, military, security, social, religious, media, or cultural. Techniques for surveillance and countersurveillance tactics. Mar 07, 2012 as noted above, surveillance is an integral part of the terrorist planning process for almost any type of attack, although there are a few exceptions to this rule, like letterbomb attacks. Espionage and intelligencegathering activities do not violate civil liberties granting intelligence agencies increased powers to fight terrorism does not threaten civil liberties by viet d. Counterterrorism module 1 united nations office on. Offensive counterterrorism measures can range from surveillance and sting operations to arrests and criminal prosecutions to seizing financial assets and military action. Those planning terrorist attacks follow a discernable process referred to as the terrorist attack cycle we also discussed last week how terrorism planners are vulnerable to detection at specific points during their attack cycle and how their poor.

Techniques for surveillance and countersurveillance. Assassination is a tactic used by nearly all terrorist groups, although far less frequently than other types of armed attacks. Of course there are highly sophisticated methods available to. Jun 06, 2007 the behaviors necessary to master surveillance tradecraft are not intuitive, and in fact frequently run counter to human nature. The use of new artificial intelligence technologies enables government officials to learn a great deal from metadata. At the same time, using the right counter surveillance tactics and techniques, you can elude most forms of physical and electronic eavesdropping. The united kingdoms strategy for countering terrorism. It provides ttp for the development of intelligence to support counterreconnaissance cr operations. Nsas balance of security, privacy in surveillance sucks three surveille teams of eufunded experts studied nsa mass surveillance techniques for the purpose of a counter terrorism.

The full range of e4j materials includes university modules on integrity and ethics, crime prevention and criminal justice, anticorruption, organized crime, trafficking in persons smuggling of migrants, firearms, cybercrime, and wildlife, forest and fisheries crime, as well as counterterrorism. Counter surveillance measures refer to all those actions that are taken to combat any type of surveillance. D 1doctor of philosophy in diplomacy and international relations of masinde muliro university of science and technology. Mar 18, 2010 surveillance detection briefing for commercial infrastructure operators march 18, 2010 presenter police officer glenn neuman homeland security and counter terrorism bureau nassau county police department u. They are arranged by the general categories for conducting surveillance, evaluating programs or surveillance systems, and standardizing data. Causing unimaginable trauma and deep division in the world geopolitical order, september 11, 2001 woke the world up to the horror of terrorism and the importance of fighting against this plague. Surveillance of terrorist suspects terrorism method. Arizona counter terrorism information center briefing. Other counterparts are european and international organizations, working together to find solutions to counter this consequential and global threat. A key skill for security and counter terrorism professionals. Our actions are informed by thorough analysis and assessments of violent extremism here and abroad. Counterintelligence surveillance training criminal counter terrorism orc the perfect tool for any unit that conducts surveillance.

Australias counterterrorism strategy australias counterterrorism strategy is based on partnerships between all levels of government, communities and the private sector. Surveillance detection briefing for commercial infrastructure operators march 18, 2010 presenter police officer glenn neuman homeland security and counter terrorism bureau nassau county police department u. Assassination, when used as a terrorist tactic, is the targeted killing of a countrys public officials or individuals who represent the political, economic, military, security, social, religious, media, or cultural establishments. Human rights in counterterrorism investigations osce. While we appreciate the nature of the difficult challenge before us, our strategy is based on the belief that sometimes the most difficult tasks are accomplished by the most direct means. Effectiveness of border surveillance strategies in the management of transnational terrorism in kenya and somalia 1christopher chumba, 2prof. Its going to be impossible to tell an officer you thought you were being followed so you were going 30 over unless you actually were and called 911 to report it. The contradiction of the surveillance state in liberal democracies the relationship between communities, authorities and by the extension the. Terrorism, surveillance and human rights international.

Terrorism, mass surveillance and civil rights dr reinhard kreissl reinhard. This requires a significant support structure of instructors, facilities, money and material, as well as a welldeveloped network of communications to link the operatives together. Countersurveillance may include electronic methods such as technical surveillance countermeasures, the process of detecting surveillance devices, including covert listening devices, visual surveillance devices as well as countersurveillance software to thwart. Espionage and intelligence gathering university of warwick. Counterterrorism strategy is a governments plan to use the instruments of national power to neutralize. Whenever you consider adding a layer of field intelligence to your preventative security efforts, its important to ask what goals youre actually looking to achieve. Countering terrorism, protecting human rights 7 chapter 8 how rights work. It also covers the governments counterterrorism plans, including central and local crisis response, how the government communicates with the public and. Surveillance and countersurveillance for human rights defenders and their organisations.

A key skill for security and counterterrorism professionals. Perhaps the most pertinent examples in recent discourse are the conflicts in afghanistan, iraq and syria. Terrorism, mass surveillance and civil rights cepol. Sampling techniques used included cluster sampling, and purposive sampling to determine. Military counter terrorism techniques and strategies. Nsas balance of security, privacy in surveillance sucks three surveille teams of eufunded experts studied nsa mass surveillance techniques.

In fact, one common denominator of all the different potential threats whether from lone wolves, militant groups, common criminals or the mentally disturbed is that those planning an operation all monitor their target in advance. Arizona counter terrorism information center actic interconnectivity includes. The use of covert techniques by law enforcement agencies are a vital part of protecting the public both from terrorism and crime, but they need to be closely supervised and constantly reassessed to ensure that what is being done is justified. Intelligence, proactive methods of investigation and special. Counterterrorism also spelled counterterrorism, also known as antiterrorism, incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcement, business, and intelligence agencies use to combat or prevent terrorism. The contradiction of the surveillance state in liberal democracies the relationship between communities, authorities and by.

In the ongoing controversy over civil rights and mass surveillance an important. This course is designed to provide skills that will enable anyone from the international traveller to the prepper for societal collapse, to operate in a. Department of homeland securitys training course counter surveillance for critical infrastructure and key resources tells us that security measures can be defeated, and stresses. Surveillance ops counterintelligence surveillance training. It is also the practice of avoiding or making surveillance more difficult. Terrorism poses a direct threat to the security of the citizens of nato countries and. Fiction, we chronicled the steady growth of technologies that facilitate the covert operation of many. The counter surveillance and threat detection course is designed to teach the principles and techniques necessary to detect surveillance, threats, and communicate undetected in urban areas. Hsin le, em, ct hsinintel rissnet riss atix law enforcement on line leo arizona department of health services, disease surveillance national alert system interpol arizona criminal intelligence system. Pdf camera surveillance as a measure of counterterrorism. This simple definition includes a plethora of techniques and methods that can be considered a form of surveillance. Since the last edition of this volume was published, additional atrocities have occurred and new threats have surfaced.

Covert surveillance and covert human intelligence sources. Jul 10, 2019 offensive counterterrorism measures can range from surveillance and sting operations to arrests and criminal prosecutions to seizing financial assets and military action. Working against role players and given the information collected throughout the duration of the course, detect and accurately report surveillance activities related to a designated facility. At the same time, using the right countersurveillance tactics and techniques, you can. Before the computer age, countersurveillance entailed evading. Counter surveillance techniques at your driveway show the assailant you are suspicious.

The primary objective of surveillance is to assess a potential target for value, security measures and vulnerabilities. We have developed a unique hybrid counterintelligence surveillance program for criminal investigators, organized retail crime orc investigators and intelligence professionals. A primary counter surveillance technique is called bug sweeping, where a certain area, such as a room, is checked for surveillance devices, which may be covert listening devices andor visual surveillance devices. For the purposes of this paper, antiterrorism reflects more passive measures such as education, surveillance, liaison training and advising. The surveillance process may take several weeks or even months. Oct 12, 2010 employ your countermoves to try to detect the surveillance, but unless youre coming under attack, crashing your car or getting a citation isnt worth it. Effectiveness of border surveillance strategies in the.