International Journal on Criminology Volume 7, Number 1, Winter 2019/2020 | Page 123
International Journal on Criminology
The radical nature of their religious practice and the fear of death and of the
hellfire that awaits them for the sins they have committed resonate with the
notion of attaining salvation through death as a martyr. Mohammed Mehra set
the alarm bells ringing when he told us: “I love death as you love life.” Taken
together, these beliefs accelerate progression from words to deeds in a way that
is difficult to predict.
• Simplicity of the modus operandi
The simplicity of the modus operandi in terror attacks (knives, cars, etc.) makes
the detection of imminent action almost impossible. This is a very different
scenario from the preparation of a bomb attack, a robbery, or a drug deal, all of
which require a variety of observable actions constituting a criminal act. Most
of the elements appear after the act is committed. But how does one “detect” an
individual leaving his home with a knife or driving off in his car?
• Surveillance Techniques
There are two types of surveillance, technical and physical, which must be used
together in order to be effective.
The surveillance of internet communications is made more difficult by the use
of software like Tor (allowing anonymous browsing), which was recommended
in Dar Al-Islam, the magazine produced by the Islamic State. Furthermore, it is
possible to sign up for a telephone subscription in a Tabac without any form of
identification. This allows ordinary data allowances to be used to surf the internet
with complete anonymity. Gone are the days of easily traceable payments
made in an official France Télécom outlet.
Some jihadists change telephones several times a week and borrow those of colleagues,
friends, and family members when they make sensitive calls, in much
the same way as drug traffickers and armed robbers. At the same time, writing
up an application asking a magistrate for authorization to wiretap a suspect’s
telephone line involves writing pages of justifications—it is not a fair fight. And
it is only made worse by the proprietary encryption keys used in applications
such as Telegram and WhatsApp, which make conversations inaudible for investigators.
Physical surveillance is no easier. Tailing a suspect in those neighborhoods
rightly named “the Republic’s lost territories” is virtually impossible. Any outsider
is spotted and sometimes even accompanied. This kind of surveillance inevitably
appears to be a poor option, and every failure will be seen by the French
public as an error of strategy on the part of the government.
118