-Tia Ghose
Most terrorist plots are still foiled using traditional law-enforcement legwork, says a new study by researchers at the Institute for Homeland Security Solutions, made up of university scholars and the nonprofit firm RTI International.
Contributors to the report examined 86 plots over the last decade, nearly 70 percent of which failed. In more than 80 percent of thwarted schemes, law enforcement became aware at the first signs of trouble, or the government received tips from ordinary citizens, not from counterterrorism intelligence gathering.
Investigators caught nearly one in five of the planned attacks accidentally while responding to suspicious behavior or everyday crimes like parole violations and traffic stops, the report noted. The researchers acknowledge, however, that they may be underestimating the role of intelligence because some foiled plots are never publicized.
Still, many of the earliest hints of would-be attacks aren’t exactly subtle. It’s no surprise that threats against a target, extremist rants and crimes such as robbery or identity theft routinely raise the suspicion of alert citizens and police.
The report also urged counterterrorism officials and experts to broaden their focus beyond Al-Qaeda and its allied groups, which hatched less than half of the terror plots studied. White supremacists and militia movements planned nearly as many attacks, while anti-abortion, right-wing and animal-rights groups succeeded more often than Al-Qaeda, the report noted. White-power groups developed more plans to use nuclear or biological weapons than Al-Qaeda.
Because 40% of these attacks were halted due to an insider or informant, according to the report, racial profiling could ultimately alienate people in the best position to know of dangerous plans early on and may actually be counterproductive.
To enhance counterterrorism efforts, rank-and-file first responders should be trained to prioritize suspicious activities, while state and local agencies should continue working to improve information sharing, the report urged. Once initial clues suggest a potential terrorist threat, follow-up surveillance may be vital, but in those instances, authorities need to understand which tips other agencies should receive.
The report’s findings show how personal information collected in massive databases without a specific threat in mind may not always contribute meaningfully to the war on terror. Homeland security officials hope such systems will enable them to detect crime and terrorism early by showing patterns that common police work might otherwise miss.
The Department of Homeland Security has spent over $426 million on dozens of fusion centers across the country for collecting, analyzing, and merging data across localities and agencies. But the centers have come under fire for among other things not developing policies that protect privacy and civil liberties and for targeting peace activists and lobbying groups.
There’s also a risk that intelligence analysts will be overwhelmed by data – several failures allowed the Christmas Day bomber to board a Detroit-bound plane wearing explosives in his underwear, a Senate panel concluded earlier this year. In that case, passengers with sharp eyes caught what professional terror-watchers missed.
Image via Flickr courtesy Orange County Archives
Republish this article
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Republish Our Content
Thanks for your interest in republishing a story from Reveal. As a nonprofit newsroom, we want to share our work with as many people as possible. You are free to embed our audio and video content and republish any written story for free under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 license and will indemnify our content as long as you strictly follow these guidelines:
-
Do not change the story. Do not edit our material, except only to reflect changes in time and location. (For example, “yesterday” can be changed to “last week,” and “Portland, Ore.” to “Portland” or “here.”)
-
Please credit us early in the coverage. Our reporter(s) must be bylined. We prefer the following format: By Will Evans, Reveal.
-
If republishing our stories, please also include this language at the end of the story: “This story was produced by Reveal from The Center for Investigative Reporting, a nonprofit news organization. Learn more at revealnews.org and subscribe to the Reveal podcast, produced with PRX, at revealnews.org/podcast.”
-
Include all links from the story, and please link to us at https://www.revealnews.org.
PHOTOS
-
You can republish Reveal photos only if you run them in or alongside the stories with which they originally appeared and do not change them.
-
If you want to run a photo apart from that story, please request specific permission to license by contacting Digital Engagement Producer Sarah Mirk, smirk@revealnews.org. Reveal often uses photos we purchase from Getty and The Associated Press; those are not available for republication.
DATA
-
If you want to republish Reveal graphics or data, please contact Data Editor Soo Oh, soh@revealnews.org.
IN GENERAL
-
We do not compensate anyone who republishes our work. You also cannot sell our material separately or syndicate it.
-
You can’t republish our material wholesale, or automatically; you need to select stories to be republished individually. To inquire about syndication or licensing opportunities, please contact Sarah Mirk, smirk@revealnews.org.
-
If you plan to republish our content, you must notify us republish@revealnews.org or email Sarah Mirk, smirk@revealnews.org.
-
If we send you a request to remove our content from your website, you must agree to do so immediately.
-
Please note, we will not provide indemnification if you are located or publishing outside the United States, but you may contact us to obtain a license and indemnification on a case-by-case basis.
If you have any other questions, please contact us at republish@revealnews.org.