Clicky

How Do We Stop the New Terrorist Modus Operandi?

Consider the following hypothetical situations:

None of these activities are criminal events and, taken individually, probably would not rise to a level worthy of an investigation by local law enforcement. Nevertheless, when viewed together, each of these actions could represent pre-attack planning for a terrorist event. Even more so if all of these activities were being carried out by the same two or three individuals, or were occurring in the same geographic area. But how do we make this determination?

Connecting these dots is currently the single greatest challenge facing law enforcement and intelligence agencies around the world. With few exceptions, every successful terrorist attack over the past fifty years was preceded by some kind of planning. In some instances, such as the US Embassy attacks in Africa, this operational planning was conducted over many years. In others, such as San Bernardino, Orlando, Brussels, Paris and Istanbul, the planning cycle appears to have been anywhere from a few weeks to several months.

Law enforcement, intelligence and security forces have become very good at collecting forensic evidence in post-attack investigations that eventually leads to the identification of the perpetrators. However, in many instances most of this same information was actually available prior to the attack, but missed or never acted upon. From pre-attack indicators posted by the perpetrators on social media, to suspicious activities observed (but never reported) by security officers at the attack site, to private citizens who noted unusual activity, but opted not to report out of fear of being labeled racist – the opportunities to identify and thwart terrorist attacks have been numerous but remain, for the most part, an untapped resource.

Contact Us

CALL US

703-439-6750

[email protected]

Monday–Friday | 9-5 pm EST

WRITE US

Contact Us