LACP.org
 
.........
Detecting and Characterizing Terrorist Activity
Clues for law enforcement also relevant to the community

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Clues in the report that are meant to help
law enforcement are also relevant to the
community and should be considered
 

Detecting and Characterizing Terrorist Activity
Clues meant for law enforcement also relevant to the community

Department of Homeland Security
December 2, 2010

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Detecting and Characterizing Terrorist Activity

(Source: Institute for Homeland Security Solutions)

"Clues to Terrorism"
Download the REPORT
( 18 page pdf file )

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) recently received the research brief, Building on Clues: Methods to Help State and Local Law Enforcement Detect and Characterize Terrorist Activity" (PDF, 199 KB), published by the Institute for Homeland Security Solutions (IHSS).

The Institute is a research consortium established to conduct applied research in the social and behavioral sciences to address a wide range of homeland security challenges. The consortium focuses on developing near-term solutions to practical, real world problems including an understanding and analysis of homeland security threats.

This particular research concentrates on describing methods for finding and analyzing information indicating potential terrorist activity. Within this context, the paper addresses the following two central challenges:

How to find initial “clues” or “cues” indicative of potential terrorist activity.

How to collect additional information to determine whether an attack really is being planned and, if so, how to characterize the plot.

The EMR-ISAC acknowledges the focus of the research is on the role of state and local law enforcement agencies in terrorism prevention; however, the information presented is also relevant to federal agencies tasked with protecting American citizens and critical infrastructure.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

EDITOR'S NOTE: Here's a sample of the info that might be helpful for the community in the report:

  Broadly speaking, there are three types of initial clues:

• Discoveries adjacent to law enforcement investigations. These can be discoveries made during routine law enforcement activities, as in the case of the plot to bomb a Florida Islamic center, in which police discovered weapons and plot details while responding to a domestic dispute call. These discoveries can also result from efforts to monitor people and activities known to be of interest; for example, the “Liquid Explosives Plot” to destroy transatlantic airlines was discovered as part of police efforts to monitor a person of interest (in this case, searching the suspect’s luggage).

• Direct reports that a person or group is planning an attack. Examples include reports from an informant, a telephone or e-mail tip that a person is planning a terror attack, or an investigative report. Reports from intelligence agencies describing the threat posed by a person or group can also be included in this category.
 
• Reports on suspicious behavior that may pertain to terrorist activity. The Memorial Institute for the Prevention of Terrorism has found that the following types of activity “consistently” precede a terrorist attack: acquiring explosives, weapons, or chemical precursors; conducting site surveillance (especially taking video, pictures, or notes of private areas and structural components of potential targets); conducting supply staging, as indicated by abandoned vehicles or concealed packages; carrying out “odd activity” (most commonly involving chemical odors or stains); and leading criminal activity to finance the attack (Memorial Institute for the Prevention of Terrorism, 2007). Data sources for suspicious activity include call-in or e-mail tips, police incident and field interview reports, 911 calls for service, suspicious financial transactions, and suspicious travel reports. Some of the reports are formerly labeled as suspicious activity reports (SARs) potentially related to terrorist activity. Other events are obscured in larger data sources reporting on more innocuous activity, including “ordinary” forms of crime (e.g., loitering, trespassing, theft, fraud, robbery).

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

There are multiple types of challenges involved in both the initial reporting of incidents and in recognizing the significance of particular events. These include challenges related to

(1) people (i.e., how well individuals involved are trained to recognize, handle and share the reports of suspicious activity),

(2) process (i.e., how well processes exist to capture and analyze the reports),

(3) organization (i.e., how well the organizations involved are structured to capture and analyze the reports), and

(4) technology (i.e., how effective information technology methods and tools are at filtering, storing and analyzing the reports).

With respect to “people,” training of both law enforcement personnel and the general public is critical if suspicious activity reports are to be made in the first place. The importance of training is evidenced by the “Millennium Plot” to blow up Los Angeles International Airport, in which an alert border agent picked up on the suspect’s suspicious behavior, helping lead to his detainment (WGBH Educational Foundation, 2008). Conversely, prior to the 2002 Paradise Hotel bombing in Kenya, a farmer saw the vehicle that would carry out the attack and noted the occupants behaving suspiciously, but he did not know of any way to report the activity (Wax, 2002). More recently, in the 2008 Mumbai attacks, fishermen reported the arrival of the terrorists to local police, describing them as foreign trespassers who told them to “mind their own business,” but the local police did not respond (Moreau & Mazumdar, 2008). Training must be discriminating, teaching both examples of genuine suspicious activity and examples of activity that may seem suspicious but is not, such as explaining differences between tourists taking photos and actual instances of site surveillance. The general public also must be given clear directives on how to report suspicious activity.

NOTE: There's much more info inside the report.

Download it HERE