Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Drawve, Jonathan Grubb, Hannah Steinman, Michelle Belongie (2018)
Enhancing Data-Driven Law Enforcement Efforts: Exploring how Risk Terrain Modeling and Conjunctive Analysis Fit in a Crime and Traffic Safety FrameworkAmerican Journal of Criminal Justice, 44
(2015)
Validation of the Nationwide Suspicious Activity Reporting (SAR) Initiative
T. Hart, Jennifer Hart, Terance Miethe (2013)
Situational Context of Student Bullying Victimization and Reporting Behavior: A Conjunctive Analysis of Case ConfigurationsJustice Research and Policy, 15
A. Graycar (2005)
Intelligence-led policing
Priscilla Regan, T. Monahan, Krista Craven (2015)
Constructing the SuspiciousAdministration & Society, 47
D. Carter, J. Carter (2009)
The Intelligence Fusion Process for State, Local, and Tribal Law EnforcementCriminal Justice and Behavior, 36
T. Monahan (2011)
The Future of Security? Surveillance Operations at Homeland Security Fusion CentersSocial Justice, 37
Carla Lewandowski, J. Carter (2017)
End-user perceptions of intelligence dissemination from a state fusion centerSecurity Journal, 30
Erik Dahl (2011)
The Plots that Failed: Intelligence Lessons Learned from Unsuccessful Terrorist Attacks Against the United StatesStudies in Conflict & Terrorism, 34
H. Goldstein (1979)
Improving Policing: A Problem-Oriented ApproachCrime & Delinquency, 25
Brent Klein, Jeff Gruenewald, B. Smith (2017)
Opportunity, Group Structure, Temporal Patterns, and Successful Outcomes of Far-Right Terrorism Incidents in the United StatesCrime & Delinquency, 63
Priscilla Regan, T. Monahan (2013)
Beyond Counterterrorism: Data Sharing, Privacy, and Organizational Histories of DHS Fusion CentersInt. J. E Politics, 4
(2010)
State police and the fusion center: a study of intelligence flow to and from the street
William Walsh (2001)
Compstat: an analysis of an emerging police managerial paradigmPolicing-an International Journal of Police Strategies & Management, 24
G. Drawve, Joel Caplan, Michael Ostermann (2018)
Utilizing a Risk of Crime Measure for Recidivism Research: Moving Environmental Corrections ForwardCrime & Delinquency, 65
(2010)
Are fusion centers achieving their intended purposes? Findings from a qualitative study on the internal efficacy of state fusion centers
T. Monahan, Priscilla Regan (2012)
Zones of Opacity: Data Fusion in Post-9/11 Security Organizations*Canadian journal of law and society, 27
Jerome Bjelopera (2011)
Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress
(2002)
Recommendations from the IACP Summit, criminal intelligence sharing: a national plan for intelligence-led policing at the local, state and federal levels
Pamela Paxton, R. Long (1997)
Regression Models for Categorical and Limited Dependent Variables
S. Chermak, J. Carter, D. Carter, E. McGarrell, Jack Drew (2013)
Law Enforcement’s Information Sharing InfrastructurePolice Quarterly, 16
J. Maple, Christiaan Mitchell (2000)
The Crime Fighter: How You Can Make Your Community Crime Free
William Bratton, Peter Knobler (1998)
Turnaround: How America's Top Cop Reversed the Crime Epidemic
D. Carter, J. Carter (2009)
Intelligence-Led PolicingCriminal Justice Policy Review, 20
Terance Miethe, T. Hart, Wendy Regoeczi (2008)
The Conjunctive Analysis of Case Configurations: An Exploratory Method for Discrete Multivariate Analyses of Crime DataJournal of Quantitative Criminology, 24
L. Summers, Monica Caballero (2017)
Spatial conjunctive analysis of (crime) case configurations: Using Monte Carlo methods for significance testingApplied Geography, 84
Jeff Gruenewald, Brent Klein, Joshua Freilich, S. Chermak (2016)
American jihadi terrorism: A comparison of homicides and unsuccessful plotsTerrorism and Political Violence, 31
J. Carter (2015)
Inter-organizational relationships and law enforcement information sharing post 11 September 2001Journal of Crime and Justice, 38
T. Mieczkowski, Eric Beauregard (2010)
Lethal Outcome in Sexual Assault Events: A Conjunctive AnalysisJustice Quarterly, 27
T. Monahan, Neal Palmer (2009)
The Emerging Politics of DHS Fusion CentersSecurity Dialogue, 40
M. Innes, N. Fielding, Nina Cope (2004)
'The Appliance of Science?': The Theory and Practice of Crime Intelligence AnalysisBritish Journal of Criminology, 45
T. Hart, C. Rennison, Terance Miethe (2017)
Identifying Patterns of Situational Clustering and Contextual Variability in Criminological Data: An Overview of Conjunctive Analysis of Case ConfigurationsJournal of Contemporary Criminal Justice, 33
P. Gill, J. Horgan, P. Deckert (2013)
Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡Journal of Forensic Sciences, 59
C. Sanders, C. Weston, N. Schott (2015)
Police Innovations, ‘Secret Squirrels’ and Accountability: Empirically Studying Intelligence-led Policing in CanadaBritish Journal of Criminology, 55
B. Schuurman, E. Bakker, P. Gill, N. Bouhana (2018)
Lone Actor Terrorist Attack Planning and Preparation: A Data‐Driven Analysis ,Journal of Forensic Sciences, 63
K. Lockwood, T. Hart, A. Stewart (2015)
First Nations Peoples and Judicial Sentencing: Main Effects and the Impact of Contextual VariabilityBritish Journal of Criminology, 55
J. Ratcliffe (2016)
Intelligence-Led PolicingTrends and issues in crime and criminal justice
Willow Bryant, M. Townsley, Benoit Leclerc (2014)
Preventing maritime pirate attacks: a conjunctive analysis of the effectiveness of ship protection measures recommended by the international maritime organisationJournal of Transportation Security, 7
J. Carter, D. Carter (2012)
Law enforcement intelligence: implications for self-radicalized terrorismPolice Practice and Research, 13
J. Carter, S. Chermak (2012)
Evidence-Based Intelligence Practices: Examining the Role of Fusion Centers as a Critical Source of Information
(2010)
More about suspicious activity reporting
(2016)
Suspicious activity reporting indicators and behaviors
Carla Lewandowski, J. Carter, W. Campbell (2018)
The Utility of Fusion Centres to Enhance Intelligence-Led Policing: An Exploration of End-UsersPolicing: A Journal of Policy and Practice, 12
Robert Taylor, Amanda Russell (2012)
The failure of police ‘fusion’ centers and the concept of a national intelligence sharing planPolice Practice and Research, 13
B. Smith, P. Roberts, K. Damphousse (2012)
Update on geospatial patterns of precursor behavior among terrorists
Terance Miethe, William Sousa (2010)
Carjacking and its consequences: A situational analysis of risk factors for differential outcomesSecurity Journal, 23
G. Drawve, Shaun Thomas, T. Hart (2017)
Routine Activity Theory and the Likelihood of Arrest: A Replication and Extension With Conjunctive MethodsJournal of Contemporary Criminal Justice, 33
A mixed-methods examination of law enforcement investigatory strategies used in jihadi and far-right foiled terrorist plots before and after 9/11
The purpose of this paper is to provide a metric for validating the Nationwide Suspicious Activity Reporting (SAR) Initiative’s (NSI) sixteen-category instrument, which is designed to guide law enforcement in the collection and analysis of suspicious behaviors preceding serious crimes, including terrorist attacks.Design/methodology/approachData on suspicious preoperational activities and terrorism incident outcomes in the USA between 1972 and 2013 come from the American Terrorism Study (ATS). Using a mixed-method approach, the authors conduct descriptive and multivariate analyses to examine the frequencies of the least and most prevalent suspicious activities (or SAR indicators) and how they predict the likelihood of terrorism prevention. In addition, the authors contextualize how configurations of SAR indicators are associated with the successful thwarting of terrorism incidents by law enforcement using an analytical method known as conjunctive analysis of case configurations (CACC).FindingsThe study reveals several key findings. First, certain behaviors categorized as suspicious, such as making threats, occur more frequently than others. Second, making threats, conducting surveillance and terrorist recruitment/financing predict law enforcement interdiction in terrorism plots, while misrepresentation (or the manufacturing and use of false documents) is more associated with terrorist success. Third, prevalent SAR indicators operate differently in the context of various combinations of suspicious activities to shape the likelihood for law enforcement interdiction.Research limitations/implicationsThe current study’s findings may not be generalizable to other forms of violent extremism and terrorism outside of the USA.Practical implicationsThis study illuminates opportunities for the NSI to provide law enforcement with the necessary tools to reduce terrorism risk and prevent future attacks.Originality/valueTo our knowledge, no scholarly work to date has assessed how observable behavioral indicators of suspicious preoperational activities affect the outcomes of terrorist plots.
Policing: An International Journal of Police Strategies and Management – Emerald Publishing
Published: Feb 4, 2019
Keywords: Intelligence-led policing; American Terrorism Study; Conjunctive analysis of case configurations; Suspicious Activity Reporting
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.