Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Former anti-terror detective: We are perhaps too reliant on electronic surveillance in this war

Police and a bomb disposal unit at the junction between Boscombe Street and Yew Tree Road in the Moss Side area of Manchester, after an evacuation took place as part of an ongoing search following the terror attack in the city earlier this week. (Jonathan Brady/PA Wire)
Police and a bomb disposal unit at the junction between Boscombe Street and Yew Tree Road in the Moss Side area of Manchester, after an evacuation took place as part of an ongoing search following the terror attack in the city earlier this week. (Jonathan Brady/PA Wire)

MANCHESTER bomber Salman Abedi travelled to Libya, where his family hail from, in the months before the attack.

It is likely he has been engaged in military training and bomb making at some point during his travels.

Questions are now being asked about how this man was able to move about freely, given his extremist connections and the fact he was known to the Security Service.

Mistakes have clearly been made by the Security Service (MI5) in the risk assessment of Abedi’s activities and his risk to the public.

Similar mistakes were made in the assessments of Mohammed Siddique Khan, who led the July 7 attack cell that killed 52 people in London in 2005, and Michael Adebolajo, who murdered drummer Lee Rigby in 2013. MI5 held extensive intelligence files on both Khan and Adebolajo. Like Abedi, both Khan and Adebolajo had travelled to conflict zones – Adebolajo was even arrested as he attempted to enter Somalia to join an al Qaida-affiliated group.

If mistakes like this are made, even sporadically, what does this mean when any one of the UK’s 850 Islamist extremists, known to be fighting in theatres of war, try to re-enter our country?

What does it mean for Scotland where around a hundred of these fighters are likely to have previously lived and will want to return?

Mistakes in risk assessments are easily made, especially if the intelligence picture isn’t clear and there are gaps.

MI5 makes extensive use of communications intercepts to assess risk. They work closely with the Secret Intelligence Service (MI6), which collects intelligence from outside the UK, and with GCHQ, known informally as “the listening service” which collects bulk data and communications.

They pool this intelligence to try to understand who is doing what and where. It’s an immense task.

Intelligence is of little use without context. Extremists often talk and communicate in code. Hearing someone say: “I’m taking my girlfriend to the concert tonight,” might seem banal, until you realise “girlfriend” is code for bomb.

And we can’t monitor everyone’s communications all of the time. It is simply impossible so gaps develop about what people are doing.

And people who are “known” will drop further down the risk list all the time they are not popping up in a live investigation, meaning they will not be re-assessed again.

We are perhaps too heavily reliant on this desktop electronic surveillance, the interception of their communications, and the skills of a tiny group of individuals to be constantly on the top of their game to stop attacks like that in Manchester.

If extremists have been trained in counterintelligence and counter-surveillance techniques, this work is pretty much useless anyway.

What if the man who cleaned Abedi’s rented flat had called the police when he found suspicious items in the property? What if the man who had noticed a strange chemical smell coming from the premises had done the same?

It’s easy to be wise in hindsight, but educating the general public about how these sadistic killers work is extremely important.

Having police officers walking our streets again, and building relationships with local communities, so that these communities can and will act as the eyes and ears of the police, is the only way to plug the gap as these fighters return home.

David Videcette is a former counter-terror investigator with Scotland Yard and was a lead detective on the intelligence development cell during the 7/7 London bombings investigation.

He is author of The Theseus Paradox which explores the motives behind 7/7, and The Detriment, which looks at the 2007 attacks on Glasgow airport.

Sales of his books support the charity work of the Police Dependants’ Trust.