Summary of Events
Faisal Shahzad’s path to radicalization emerged starting around 2006. By the time he gained his US citizenship in mid 2009, his radicalization had crystallized into private admiration of violent jihadism and one of its most vociferous practitioners, the Pakistani Taliban. As it would later emerge, he would receive instructions on bomb making from the Taliban later that year, thereby coming full circle (Elliott, Tavernise & Barnard, 2010).
Image 1: The perpetrator’s Pakistani passport (Adapted from (Elliott, Tavernise & Barnard, 2010))
Returning to America from his nine-month-long stay in Pakistan in February 2010, federal investigators would later report that he had determined to plant a bomb in the Manhattan Times Square (Elliott, Tavernise & Barnard, 2010). Indeed, on May 3, 2010, he was arrested for the attempted bombing of the Times Square two days earlier. Although his explosive device ignited, it did not explode due to the incorrect design of the detonators, inexact chemical compositions of the volatile substances, and its timely discovery (Mazzetti, Tavernise & Healy, 2010; Grier, 2010). Had the car bomb exploded, federal investigators estimate that the fatalities would have eclipsed the 168 that followed the Oklahoma City bombing in 1995 (United States of America v. Faisal Shahzad, 2010).
Image 2: Intersection of 45th Street and Broadway where Faisal parked a Nissan PathFinder, intending to detonate his car bomb (Modified from (Google, 2007))
While Faisal remonstrated that America’s foreign policy- most notably, the use of clandestine Predator strikes in Pakistan by American military and intelligence forces- had propelled him to Jihadi militancy (Singer, 2012), his actions can only properly be contextualized by appreciating the impact of the September 11th, 2001 World Trade Center attacks. The world, and America in particular, has changed drastically since then.
Figure 1: Terror attacks in New York City by motivation (Adapted from (Quinn, 2016))
In the years since 1975, the motivations of terror attacks have shifted markedly from nationalist and separatist cause to the more immediately identifiable Islamic extremism (Quinn, 2016). In addition, terror attacks have reduced in number, from a peak of 39 in 1976 alone to an average of 1.6 attacks between 2011 and 2015. Furthermore, individual attackers have perpetrated the overwhelming majority of terror attacks, giving rise to the term “lone wolf” attackers among other disambiguations (Caschetta, 2016; Wiskind, 2016). Faisal is an excellent example of this trend, although there have been more recent and violently more successful exemplars.
As intelligence organizations, police forces, and other law-enforcement agencies (LEA), domestic and allied, have increased their ability to pre-empt, foil, and punish terrorism, Islamic fundamentalist organizations such as al-Qaeda and Daesh have invested in more nimble, self-organizing, and responsive planning (Tucker, 2010). This shift has been manifested in the online radicalization of individuals and infiltration of small and self-contained units of operators into Western countries with a view to perpetrating terror acts.
Take for instance the tragic cases of Colleen LaRose (Halverson & Way, 2012), Mohamed Reza and numerous other independently motivated terrorists (Vidino, 2009; Jasparro, 2010). These individuals were radicalized by interacting with extremist material online and consummated their religious fundamentalism by perpetrating terror attacks (Teich, 2013). Significant scholarship has gone into understanding, detecting, and codifying the trend of online radicalization in America and elsewhere (Dalgaard-Nielsen, 2010; McCauley & Moskalenko, 2014; Klausen, 2015; Chavhan, 2016). It remains to be seen whether deradicalization programs will be reliably effective and also whether aggressive surveillance will inadvertently jeopardize efforts at trust-building with Muslim communities (Jasparro, 2010; Horgan & Braddock, 2010). Indeed, while political Islam has become deeply soiled with the unenviable reputation of fringe yet violent extremism (Gabriel, 2002) and judging by successes elsewhere, working with Muslim communities is perhaps the surest and most sustainable means to de-radicalize the disenfranhized and prevent terror attacks (Vidino, 2009; Rabasa, Pettyjohn, Ghez & Boucek, 2010; Ashour, 2011; Kruglanski, Gelfand & Gunaratna, 2011; Uhlmann, 2015; Ferguson, 2016).
Figure 2: After Action responses from focus group participants on lessons learned from recent terror attacks (Adapted from (Donahue & Tuohy, 2006))
Regardless, several lessons can be gleaned from the response to the attempted Times Square bombing. Firstly, it appears that there was uncoordinated leadership and inefficient coordination between agencies in the years leading up to the attempted attack. Faisal was already listed on the Traveler Enforcement Compliance System (TECS) (CBS, 2010), a multi-million dollar border-screening database intended to stop the entry of illegal or harmful people and goods into the United States (Lovelace & Boon, 2012; Mazmanian, 2014). Regardless, Shahzad managed to bring in significant amounts of money without detection. It can be argued the system’s unenviable complexity and poor agency interoperability when using TECS may have played a role in enabling Shahzad to bring in the sums of money that, arguably, could have been used in part to finance his terror plot.
With that said, there was clear leadership and coordination between law-enforcement agencies (LEA) from the moment of the bomb’s detection. The responding officers swiftly once alerted several private citizens (Lapointe, 2010), federal and state investigators collaborated in unearthing and pursuing leads (Barrett, Perez & Gardiner, 2010), apprehend the perpetrator, and investigate financial ties between Shahzad and other alleged facilitators. The response was comparable in its competence and ambition to that following the 2013 Boston Marathon bombing (Dugan & Fisher, 2015). This comparability demonstrated successful implementation of personnel training and motivation, resource allocation, public relations, disaster planning, and field communications.
These successes also extend to investigators’ competence in deploying and utilizing surveillance assets such as CCTV footage and electronic mail and mobile phone conversation transcripts (Baker & Shane, 2010). In a post-Snowden world, it is perhaps permissible to wonder whether pervasive domestic intelligence, while making us safer, is tolerable in light of reduced liberties. In the months following the foiled attack, The New York Police Department embarked on a “surveillance surge” in Midtown New York. The department installed about 500 subway cameras in three subway stations. This is in addition to the 1,400 that had been activated since Faisal’s attack. Other installations included license plate readers and radiation sensors. The NYPD also installed another 1,800 cameras in Lower Manhattan and Midtown alone in the same period (NYPD, 2010). Despite the hundreds of cameras in the immediate area around the incident area (NYPD, 2010), CCTV footage failed to prevent the attack and detect the impending detonation- it was up to several vigilant street vendors to alert police. Surveillance technology and systems only proved useful in locating the suspect as opposed to preventing or detecting his crime. Indeed, CCTV footage often has minimal forensic utility, and it would seem that surrendering personal liberties and privacy for the sake of greater security is a dubious enterprise. Extant literature agrees in this regard (Greenberg & Roush, 2008; Ratcliffe, Taniguchi & Taylor, 2009; Monahan, 2010; Sasse, 2010; Schneier, 2010; Caplan, Kennedy, & Petrossian, 2011; Belakova, 2013). Take for instance the fact that for every 1,000 CCTV cameras in London, the Metropolitan Police solve just one crime. At the same time, private citizens “are captured on camera 300 times a day” (Hope, 2009). This seems like an exceedingly high price to pay for an Orwellian and hopefully safer society. It would seem that the real threat is the surveillance itself: massive investments to set up technology that, ultimately, fails at its core task of significantly reducing crime, thereby depriving other legitimate constituents of the resources necessary to achieve their goals.
Although this argument undermines the very imperative for greater surveillance, it is incumbent on law-enforcement and policy-making agencies to strengthen the domestic counterterrorism infrastructure. Not all terror threats can be prevented or even mitigated against, and the marginal advantage that surveillance systems confer on security officials cannot be downplayed. There is an opportunity for LEA officers to strengthen collaboration with the local community, as it was the latter that was instrumental in averting an unmentionable disaster. Police officers should have greater opportunity and tools to engineer or welcome chance encounters with concerned private citizens. Furthermore, available tools such as the border-screening tools TECS should receive prioritized Congressional attention, and the counterterrorism enterprise streamlined to ensure fewer lapses in vigilance. These tools also extend to surveillance tools necessary to collate signal intelligence on foreign adversaries. Although the majority of domestic terror cases are now perpetrated by nationals or residents, radicalization or open source jihadism is conducted by overseas actors and the government should proactively pursue strategies that lead to their detention and eventual interrogation or, when all else fails, their unapologetic elimination.
Figure 3: Reasons why terror plots failed from a case study of 89 domestic cases (Adapted from (Dahl, 2011))
Ashour, O. (2011). Online de-radicalization? Countering violent extremist narratives: message, messenger and media strategy. Perspectives on Terrorism, 4(6).
Baker, P., & Shane, S. (May 5, 2010). Suspect Was Tracked Through Phone Numbers. The New York Times Company. Retrieved on Nov 04, 2014 from http://www.nytimes.com/2010/05/06/us/06cellphone.html?rref=collection%2Ftimestopic%2FTimes%20Square%20Bomb%20Attempt%20(May%201%2C%202010)
Barrett, D., Perez, E., Gardiner, S. (May 5, 2010). Race to Track Clues in Time. Dow Jones & Company, Inc. Retrieved on Nov 04, 2014 from http://www.wsj.com/articles/SB10001424052748704866204575224652481039126
Belakova, N. (2013). Drawing the line between security and privacy. An analysis of security discourses in the US press, 2010-2013. Prague SECONOMICS Discussion Papers 2013/7. Retrieved on Nov 04, 2014 from http://www.soc.cas.cz/sites/default/files/soubory/drawing_the_line_between_security_and_privacy.pdf
Caplan, J. M., Kennedy, L. W., & Petrossian, G. (2011). Police-monitored CCTV cameras in Newark, NJ: A quasi-experimental test of crime deterrence. Journal of Experimental Criminology, 7(3), 255-274.
Caschetta, A.J. (2016). Flaws in the ‘Lone Wolf’ Analysis. New English Review. http://www.newenglishreview.org/custpage.cfm/frm/184480/sec_id/184480
CBS. (May 7, 2010). Shahzad on U.S. Travel Security List Since 1999. CBS Interactive Inc. Retrieved on Nov 04, 2014 from http://www.cbsnews.com/news/shahzad-on-us-travel-security-list-since-1999/
Chavhan, M. R. N. (2016). Solutions to Detect and Analyze Online Radicalization. INTERNATIONAL JOURNAL, 1(4).
Dahl, E. J. (2011). The plots that failed: Intelligence lessons learned from unsuccessful terrorist attacks against the United States. Studies in Conflict & Terrorism, 34(8), 621-648. Retrieved on Nov 04, 2014 from https://www.homeworkmarket.com/sites/default/files/q2/02/02/plots_that_failed.pdf
Dalgaard-Nielsen, A. (2010). Violent radicalization in Europe: What we know and what we do not know. Studies in Conflict & Terrorism, 33(9), 797-814.
Donahue, A., & Tuohy, R. (2006). Lessons we don't learn: A study of the lessons of disasters, why we repeat them, and how we can learn them. Homeland Security Affairs, 2(2).
Dugan, L., & Fisher, D. (2015). Strategic Responses to the Boston Marathon Bombing. Criminology and Criminal Justice, Terrorism and Security, Violent Crime.
Elliott, A., Tavernise, S., & Barnard, A. (May 15, 2010). For Times Sq. Suspect, Long Roots of Discontent. The New York Times Company. Retrieved on Nov 04, 2014 from http://www.nytimes.com/2010/05/16/nyregion/16suspect.html
Ferguson, N. (2016). Disengaging from Terrorism: A Northern Irish Experience. Journal for Deradicalization, (6), 1-23.
Gabriel, M. A. (2002). Islam and terrorism. Charisma Media.
Google, Inc. Sept., 2007. Street View- 1536 Broadway, New York. Google, Inc. Retrieved on Nov 04, 2014 from https://email@example.com,-73.9856371,3a,90y,320.32h,91.87t/data=!3m6!1e1!3m4!1sGXrYqoHVC2rR4gK2g7Ihuw!2e0!7i3328!8i1664!6m1!1e1
Greenberg, D. F., & Roush, J. B. (2008). The effectiveness of an electronic security management system in a privately owned apartment complex. Evaluation review.
Grier, P. (May 10, 2010). Times Square bomb: Did Pakistan Taliban send its 'C' team? The Christian Science Monitor. Retrieved on Nov 04, 2014 from http://www.csmonitor.com/USA/2010/0510/Times-Square-bomb-Did-Pakistan-Taliban-send-its-C-team
Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization. Media, War & Conflict, 5(2), 139-153.
Horgan, J., & Braddock, K. (2010). rehabilitating the Terrorists?: Challenges in Assessing the Effectiveness of De-radicalization programs. Terrorism and Political Violence, 22(2), 267-291.
Jasparro, C. (2010). Lone wolf: The threat from independent jihadists. Jane’s Intelligence Review, 3-4.
Klausen, J. (2015). Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1-22.
Kruglanski, A. W., Gelfand, M. J., & Gunaratna, R. (2011). Aspects of deradicalization. Terrorist Rehabilitation and Counter-Radicalisation: New Approaches to Counter-Terrorism, 135-143.
Lapointe, J. (May 7, 2010). Heroes’ Welcome for Two Times Square Vendors. The New York Times Company. Retrieved on Nov 04, 2014 from http://www.nytimes.com/2010/05/08/sports/baseball/08citifield.html?rref=collection%2Ftimestopic%2FTimes%20Square%20Bomb%20Attempt%20(May%201%2C%202010)
Lovelace, D., & Boon, K. (2012). Terrorism: Commentary on Security Documents Volume 126: The Intersection of Law and War. Oxford: Oxford University Press
Mazmanian, A. (Feb 6, 2014). House panel probes delays in border enforcement system. Public Sector Media Group. Retrieved on Nov 04, 2014 from https://fcw.com/articles/2014/02/06/house-panel-probes-delays-in-border-enforcement-system.aspx
Mazzetti, M., Tavernise, S., & Healy, J. May 4, 2010. Suspect, Charged, Said to Admit to Role in Plot. The New York Times Company. Retrieved on Nov 04, 2014 from http://www.nytimes.com/2010/05/05/nyregion/05bomb.html?hp
McCauley, C., & Moskalenko, S. (2014). Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action. Terrorism and Political Violence, 26(1), 69-85.
Monahan, T. (2010). Surveillance in the Time of Insecurity. Rutgers University Press.
NYPD. (Sept. 20, 2010). Midtown Manhattan Security Initiative. The City of New York. Retrieved on Nov 04, 2014 from http://www.nyc.gov/html/nypd/html/pr/pr_2010_midtown_security_initiative.shtml
Quinn, M. 2016. A History of Violence: A Quantitative Analysis of the History of Terrorism in New York City. Homeland Security Affairs: 12(4).
Rabasa, A., Pettyjohn, S. L., Ghez, J. J., & Boucek, C. (2010). Deradicalizing Islamist Extremists. RAND CORP ARLINGTON VA NATIONAL SECURITY RESEARCH DIV.
Ratcliffe, J. H., Taniguchi, T., & Taylor, R. B. (2009). The crime reduction effects of public CCTV cameras: a multimethod spatial approach. Justice Quarterly, 26(4), 746-770.
Sasse, M. A. (2010). Not seeing the crime for the cameras?. Communications of the ACM, 53(2), 22-25.
Schneier, B. (Feb 26, 2010). Spy Cameras Won't Make Us Safer. Turner Broadcasting System, Inc. Retrieved on Nov 04, 2014 from http://edition.cnn.com/2010/OPINION/02/25/schneier.security.cameras/index.html
Singer, P. (Jan. 21, 2012. Do Drones Undermine Democracy? The New York Times Company. Retrieved on Nov 04, 2014 from http://www.agriculturedefensecoalition.org/sites/default/files/file/drones_517/517S_1_2012_Do_Drones_Undermine_Democracy_January_21_2012_by_Singer_NYTimes_THE_ANSWER_IS_YES.pdf
Teich, S. (2013). Trends and Developments in Lone Wolf Terrorism in the Western World. An Analysis of Terrorist Attacks and Attempted Attacks by Islamic Extremists. Terrorism.
Tucker, D. (2010). Jihad Dramatically Transformed? Sageman on Jihad and the Internet. Homeland Security Affairs, 6(1).
Uhlmann, M. (2015). Challenges and Possible Opportunities for Developing Effective Counter-Narrative Measures vis-à-vis the ‘Islamic State’Movement. Understanding Deradicalisation: Pathways to Enhance Transatlantic Common Perception and Practices, Washington DC: Middle East Institute.
United States of America v. Faisal Shahzad. S.D.N.Y., 2010. Government's Memorandum in Connection with the Sentencing of Faisal Shahzad. Retrieved on Nov 04, 2014 from http://online.wsj.com/public/resources/documents/06l1shap.pdf
Vidino, L. (2009). Homegrown jihadist terrorism in the United States: A new and occasional phenomenon?. Studies in Conflict & Terrorism, 32(1), 1-17.
Wiskind, C. (2016). Lone Wolf Terrorism and Open Source Jihad: An Explanation and Assessment. Retrieved on Nov 04, 2014 from https://www.ict.org.il/UserFiles/ict-lone-wolf-osint-jihad-wiskind.pdf
Need a paper on the same topic?
We will write it for you from scratch!
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- History of Latin America
- Theory of Knowledge
- Moral philosophy essay
- Attending a church service
- Factors Affecting Enterprise Innovations in Companies
- Ron Popeil research
- Education as an instrument for social change Essay Example
- Child Development Theory
- Political Science Essay
- Software Developer BIS
- Sales Budget
- Name of the Institution