Hlsc 730-discussion 7-reply 2 | HLSC 730 – Counterterrorism and Counterintelligence Strategies | Liberty University

The thread must be a minimum of 200-250 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.

TEXTBOOK: Prunckun, H. (2019). Counterintelligence theory and practice (2nd ed.). New York, NY: Rowman & Littlefield Publishers. Inc. ISBN: 9781786606884.

Ronczkowski, M. R. (2018). Terrorism and organized hate crime. (4th ed.). Boca Raton FL: Taylor & Francis (CRC Press). ISBN: 9781138703469.


Data Collection: Detecting suspicious terrorist activity to prevent attacks or investigating post-attack incidents requires strong and consistent data collection techniques, Ronczkowski (2018) encourages the utilization of multiple sources with credibility forefront. Collecting pristine data on terrorist organizations continues to present a series of complications for American and Western countries, as these organizations personify the phrase a tight-knit community (Schuurman, 2018). Schuurman (2018) investigated data collection methodology from terrorist groups, arguing that the leadership is insulated from traditional soldiers and requires years, sometimes decades, of dedication. Therefore, Schuurman (2018) has promoted varying sources of data collection including virtual items like social media tracking, IP address identification, and WIFI monitoring. Terrorists have been increasingly prone to spread their extremist views through virtual means, especially on social media, allowing government entities an advantageous position when tracking recruitment, pre-planning, or post-celebration (Schuurman, 2018). Ultimately, these virtual environments were created by Westerners and managed mostly by people unfriendly to terrorists, generating keen adversarial surveillance opportunities without directly risking lives (Ronczkowski, 2018).

Primitive Tools: Encouraging a strong conversation regarding the tools law enforcement employ to acquire data on terrorists begins with the most basic of records, pedigree information (Ronczkowski, 2018). For instance, when a police officer arrests an individual and processing this person through their records system obtaining identification confirmation, addresses, phone numbers, next of kin, vehicles, or known associates are all essential (Geldenhuys, 2019). Geldenhuys (2019) explains how important identification confirmation is by highlighting how complicated it is to process hundreds of thousands of immigrants arriving at the U.S./Mexico border annually. Geldenhuys (2019) close to fully concedes the fact that immigrants without official identification could be anyone, as international record systems fail to interface with each other and cooperation between international government agencies is limited. For example, if a naturally born Venezuelan citizen arrives at the U.S./Mexico border without a passport or any identification documents, stating his name, date of birth, country of origin, and citizenship as different than actual would be close to impossible to disprove (Geldenhuys, 2019). Therefore, the most basic tool afforded the modern-day law enforcement officers attempting to confirm identification is their investigation abilities, interviewing people meticulously is, and will always be, the best vetting tool possible (Ronczkowski, 2018). 

Enhanced Tools: Although rudimentary tools, like interviewing skills, will never place second, enhanced technical developments have allowed law enforcement agencies to involve more enhanced terrorist data collection tools (Ronczkowski, 2018). Wang et al. (2020) contend that unmanned aircraft systems (Drones) have cultivated a new series of terrorist investigation methods, amounting to an eye in the sky. Drone capabilities have significantly developed within the past 5-7 years, for example, Wang et al. (2020) cite that mapping, surveying, and observing terrorist occupied mountains in Middle Eastern regions were previously impossible. These impossibly complicated and difficult to access areas have long been utilized by terrorist organizations attempting to conspire in concealment, however, the eye in the sky sees everything (Wang et al., 2020). Enhanced data collection tools like drones encompass the modernized technological approaches law enforcement entities are capable of, however, rudimentary methods remain impactful. The Bible speaks of the impact rudimentary methods have, “The Lord preserves the simple; when I was brought low, he saved me” (English Standard Version, 2001/2016 Psalm, 116:6).


English Standard Version. (2016). Bible hub. Retrieved from https://biblehub.comLinks to an external site. (Original

work published 2001).

Geldenhuys, K. (2019). Border Security – Technology as a Solution. Servamus Community-

Based Safety and Security Magazine. 112(8).

https://hdl.handle.net/10520/EJC-1747f7413bLinks to an external site.

Ronczkowski, M. (2018). Terrorism and Organized Hate Crime. Taylor & Francis Group. 

            Boca Rotan, Fl. 

Schuurman, B. (2018). Research on Terrorism, 2007-2016: A Review of Data, Methods, and

Authorship. Terrorism and Political Violence. 32(5). https://doi.org/10.1080/09546553.2018.1439023Links to an external site.

Wang, W., Jiang, B., Yang, J., & Li, C. (2020). Research on UAV Application in Mountain Anti-

Terrorism Combat. Journal of Physics: Conference Series. 1792. https://doi.org/10.1088/1742-6596/1792/1/012079Links to an external site.