TY - JOUR
T1 - Covert radio communications
T2 - A viable tactic for international terrorists?
AU - Prunckun, Henry
N1 - Includes bibliographical references.
PY - 2014/4
Y1 - 2014/4
N2 - Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy.
AB - Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy.
KW - Counterterrorism
KW - Covert operations
KW - Transnational terrorism
KW - Wireless communications
U2 - 10.1080/14751798.2014.894296
DO - 10.1080/14751798.2014.894296
M3 - Article
VL - 30
SP - 176
EP - 184
JO - Defense and Security Analysis
JF - Defense and Security Analysis
SN - 0743-0175
IS - 2
ER -