This website uses cookies to ensure you have the best experience. Learn more

Terrorism, Surveillance, And Radio Transmitters Essay

1822 words - 8 pages

Terrorism, Surveillance, and Radio-Transmitters

    ABSTRACT: This paper is an introduction into the discussion of different types of surveillance equipment. The paper centers on different intelligence agencies worldwide that use surveillance equipment, the types of information they need, and how they go about gathering the information. There is also a discussion on the most common type of surveillance equipment used by intelligence agencies, the radio transmitter. The transmitter is described in detail and its myriad of uses in surveillance are illustrated. Finally the ethical question of using surveillance devices that infringe upon the privacy of the individual is discussed.

...view middle of the document...

national interests from foreign security threats by any legal means necessary."[2] Consequently, collection of intelligence information is of prime importance for nations to subsiste.


The sources of this intelligence information come from two broad categories: public and covert. When most people think of intelligence organizations they automatically think of James Bond movies and other clandestine spy missions, however over 80% of the information that these intelligence organizations collect comes from public sources like newspapers, media, government documents, embassies, and diplomats. Only about 20% of the information comes from covert sources, but this 20% of the information often turns out to be the most valuable. . These covert sources are divided into three sections: human intelligence, signals intelligence, and photographic intelligence.[3] Human intelligence is the gathering of information by agents working undercover in the field. Human intelligence provides less volume of data but is important in helping to understand the thinking of the adversary. Signals intelligence is the monitoring and interception of electronic communications and other emissions. Often the information that has been intercepted must then be decoded. The third type of covert intelligence is photographic intelligence. This information is usually gathered by airplanes that use advanced radar and thermography to gain information about adversaries. This type of intelligence is very important when trying to monitor the movements of military troops or to spot military facilities during wartime.


Intelligence organizations using covert and public sources generally try to gain four basic types of information: Political, Military, Economic, and Technological.[4] Political intelligence is the most sought after of all the information, but ironically it is the hardest to get and the most unpredictable. The best source of political intelligence is diplomats who are working in the country in question because they are so immersed in the country and its internal politics that they can make the most informed political predictions. Military intelligence is another major type of information needed by intelligence agencies. This category includes information concerning the military organization and equipment other nations have or even the number of units and formations their military uses. The most common source of this information is from space reconnaissance technology and military agents within the countries. Economic information is also critical because it plays an integral role in a country's development of their political, military, and foreign policy. Much of this economic information is publicly available in trade or economic journals of the country. The final category of information is technological. A country must always be on guard to the technological advancement of other countries in many frontiers of scientific knowlege and specifically the...

Other Essays Like Terrorism, Surveillance, And Radio-Transmitters

Are Cell Phones Dangerous Essay

1359 words - 6 pages past two or three years. The new generation of WAP phones now allow the user to connect to the Internet, send e-mail and even listen to the radio. The e-mail feature, a tremendous advancement in technology, allows businesspeople to contact their office at anytime day or night. Not only can e-mail be used throughout Britain but also messages can be sent globally. Sending e-mail is not nearly as expensive as the conventional methods of contact

Nsa Policies and Privacy Essay

2301 words - 10 pages monitored for billing purposes), the Fourth Amendment doesn't protect the privacy of those numbers against pen/trap surveillance by the government. The contents of your telephone conversation are protected, but not the dialing information.” (“”Pen Registers" and "Trap and Trace Devices"", 2012). In 2001 the Patriot Act was passed with the express purpose of being used to combat terrorism. Under the Patriot Act the prerequisite that government prove

Mobile Patrol Surveillence System

2024 words - 9 pages - Saving time: Time is a critical factor in order to save lives. Officers can take important decisions and actions with just touch of a screen. 2- Improving quality of services: Based on added functionalities in iPad mini solution, it will give a higher control on surveillance as compare with traditional radio communication used by officers on field. 3- Effective investigations based on evidence collected on field. 4- Proactive

Radio Broadcasting

845 words - 4 pages engaged in both sides of radio broadcast. “Every radio at the time—or all the good ones—could both transmit and receive,” explains Michele Hilmes, professor of media and cultural studies at the University of Wisconsin at Madison. Radio was a highly technical leisure activity. Fans used wire coils and spark plugs as they built receivers and transmitters at home. Early radios required multiple dial adjustments. Not everyone embraced the radio or

9/11 Terrorist Attacks Impact on Us National Security

1493 words - 6 pages intercepting, disclosing, using or divulging phone calls or electronic communications.  It prohibits the individual states from investigating, sanctioning, or requiring disclosure by large telecoms and protects them from lawsuits.  The act requires the government to keep records on surveillance for a period of 10 years.  It increased the time for warrantless surveillance from 48 hours to 7 days.  It requires government agencies to cease

Terrorism – Is There Any Working Global Frameworks To Counter It?

3750 words - 15 pages recruiting sergeants for the very terrorists. We have to win hearts and minds.” The causes of terrorism may be inter alia historical, economical, religious or ideological, and there is no way to entirely eliminate it from our world. Preventing terrorism needs complete understanding of the phenomenon and cooperation between states. There are different actions taken by various organisations and people but not all of them succeed. What exactly is

The Emergence Of Satellite Radio

4231 words - 17 pages . In addition to the encoded sound, the signal contains additional information about the broadcast. The song title, artist and genre of music are all displayed on the radio. In urban areas, where buildings can block out the satellite signal, XM's broadcasting system is supplemented by ground transmitters. ( Each receiver contains a proprietary chipset. XM began delivering chipsets to

N.S.A. Spying

3689 words - 15 pages of terrorism also gave the FBI increased powers to access personal information such as medical and financial records. The Patriot Act superseded all state laws. The NSA’s domestic spying program, known in official government documents as the “President’s Surveillance Program,” ("The Program") was implemented by President George W. Bush shortly after the attacks on September 11, 2001. The US Government still considers the Program officially

Where to Draw the Line on Government Surveillance

878 words - 4 pages Where to draw the line on government surveillance  You're being watched. But, of course, you already knew that. Camera surveillance has become an accepted -- almost expected -- backdrop to modern life. We willingly give permission to Google and Facebook to make billions trading on our personal preferences and interests. And it's been common knowledge for decades that Canada participates with the United States and other English-speaking

Domestic Terrorism

1663 words - 7 pages to numerous businesses as well as stores and local radio stations. Even though they have security measures in place they are still vulnerable to acts of domestic terrorism. The Empire State Building’s vulnerabilities are from employees and visitors being allowed to access the building without their bags being checked. Their computer network is vulnerable to cyber-attacks because they only implement the minimal security measures to protect the

Wireless Telecommunication

1592 words - 7 pages telephone service. These early radio phones had powerful transmitters that put them in contact with towers, but this method has a major drawback. There are only so many frequencies a radio can operate on, and this meant that only a few people could effectively use cell phones. As they became more popular, it was obvious that a new method would have to be devised in order to utilize the available frequencies more effectively. The ?cell? part of a cell

Related Papers

Pandoras Box Essay

4448 words - 18 pages particles known as ions and electrons. This ionized medium can distort, reflect and absorb radio signals, and thus can affect numerous civilian and military communications, navigation, surveillance and remote sensing systems in many varied ways. For example, the performance of a satellite-to-ground communication link is affected by the ionosphere through which the signals pass. AM broadcast programs, which in the daytime can be heard only within a

Terrorism Essay

702 words - 3 pages Table of Contents I. Al-Qaeda significance on surveillance II. President’s Surveillance Program III. Foreign Intelligence Surveillance Act IV. Patriot Act V. Preparedness to Terrorism Terrorism touched the lives of many Americans on September 11th, 2001 when Al-Qaeda decided to attack the United States through means of our airways. The significance of terrorism truly showed face to all citizens seconds after the news

The Usa Patriot Act 1 Essay

550 words - 3 pages extension of three expiring Patriot Act provisions without making much-needed changes to the overly broad surveillance bill. The extended provisions are set now set to expire on June 1, 2015. The title of the act is a ten letter acronym (USA PATRIOT) that stands for: Uniting (and) Strengthening America (by) Providing Appropriate Tools Required (to) Intercept (and) Obstruct Terrorism Act of 2001. The extended provision basically gives the

National Security Should Be More Important

1764 words - 8 pages goals we all want to achieve today. However, since 9/11, the government implemented more tools to ensure the national security against the terrorism, including Patriot Act and Foreign Intelligence Surveillance Act. Although the further engagement in surveillance by the government in order to protect national security caused strong disagreements from organizations like ACLU, which argued that the threat of terrorism is vastly exaggerated, and