Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSectorsSecurity Leadership and ManagementGovernment: Federal, State and Local

Public-Private Partnerships and The Fight Against Terrorism

How strong relationships with the private sector are a pillar of the FBI’s strategy to combat global terrorism.

By Diane Ritchey
SEC1018-cover-Feat-slide_900px

Michael McGarrity,

Assistant Director for the Counterterrorism Division of the FBI.

October 1, 2018

The threats that face the United States today are the same threats that we faced on 9/11,” says  Michael McGarrity, Assistant Director for the Counterterrorism Division of the FBI.  “Of course they have evolved over the years. We still have threats from Al Qaeda, but other new groups have formed and evolved, such as Al Qaeda in the Arabian Peninsula and ISIS.”

McGarrity stresses that today’s threat environment is complex and dynamic. The primary international terrorism threat to the United States has evolved from the sophisticated, externally directed plot to the individual, inspired attack. The groups, how they operate, and their targets have all changed over the last few years. What hasn’t changed is the commitment to do harm.

The most imminent threat to the United States comes from Homegrown Violent Extremists; usually individuals inspired by on online propaganda from terrorist organizations like ISIS and Al Qaeda.  Homegrown Violent Extremists may mobilize to violence quickly and act without devising an elaborate plot. The FBI response to any threat, McGarrity says, is the same: “Whether it’s a terrorism incident or an active shooter mental health issue or just someone who wants to kill people, it doesn’t matter in our response. We will work the case and look for motivation. Our initial response is to save lives and try to figure out the who and the why.”

McGarrity has spent more than 22 years working terrorism cases and seeking answers to the motivation behind terrorist thinking, motivations and actions. His career began as a New York City prosecutor, and before 9/11, he was based out of Six World Trade Center. At the FBI he was a member of the Joint Terrorism Taskforce in New York, the FBI detailee to the Bin Laden Unit at the CIA’s Counterterrorism, Deputy on Scene Commander in Afghanistan with the Joint Special Operations Command, a unit chief in the FBI’s International Terrorism Operations Section, and an Acting Assistant Section Chief for in the FBI’s International Terrorism Operations Section. He led the FBI Extraterritorial Squad in the field, going after Al Qaeda senior leadership, in addition to bombings and terrorists in Afghanistan, Pakistan, Iraq and Israel.

He also served as Director of Counterterrorism for the White House National Security Council; Assistant Special Agent in Charge, Washington Field Office for violent crime, gangs, drugs, and crimes against children. He managed the Navy Yard shooting and stood up the U.S. Government Hostage Recovery Fusion Cell. The mission of the HRFC was to coordinate a whole government response to safely recover Americans taken hostage or kidnapped outside of the United States.

 

Fighting Terrorism

What does a terrorist look like, if that is something that can be identified? McGarrity has studied terrorists and terrorist groups for many years, and he notes that today’s Homegrown Violent Extremists are radicalized and mobilized to violence very quickly, “And that mobilization of violence could be a grievance and a personal situation,” he says. “But sometimes it’s just violence.”

In addition, he says that “Some of these terrorists don’t ‘look’ like a terrorist. They are U.S. born, educated and younger (the average age is 19 to 25). But that doesn’t matter. What they all do have in common is their need to commit violence and mobilize to that violence fairly quickly.”

There are several methods that the FBI and its field agents use to fight terrorism, McGarrity says, and among the very best is U.S. government and law enforcement partnerships. In fact, it’s the FBI’s main tool. “There are more than 100 joint terrorism taskforces that we have in the U.S.  That is our number one tool to go after terrorism here in the U.S. and overseas. There’s nothing we do in the FBI in regards to counterterrorism that we do alone. Our federal, state and local law enforcement teams are helping us identify homegrown violent extremists, anomalies and threats that they get through their 911 call centers and their local police who see something that’s not right in their communities. That is our number one tool.”

“Through the Joint Terrorism Task Forces, we can leverage the tools of our other partners, he adds “Everything we do we do together.  We look to see where there’s a comparative advantage where one department or agency might do something better, and we look to leverage that.  And sometimes that’s not the FBI. If you look at a threat in a smaller rural community, that’s where we are going to rely heavily on the state and local police to help us work that case.”

These partnerships very heavily rely upon the “See Something Say Something” mentality, McGarrity explains. “For example, someone working a register at a store might see a customer purchasing specific items that could be used to make a bomb. That should result in a call to the local police or to the FBI.  If we can educate the private sector better on specific behaviors or the things that homegrown violent extremists look to buy or rent, we’re more likely to get better leads to solve cases and prevent terrorist attacks.”

Another strong private sector partnership is enterprise security. “More than just the need to educate chief security officers, we need to provide them with relevant information to train their workforce who might come into contact with threats, information and customers.”

For example, in banking, says McGarrity, “It’s all about knowing your customer. Over the last 10 years we have stressed to banks and financial institutions the need to know who is opening accounts, why they are opening them, and have interactions with the customer. Are there unique transactions that are taking place? The same can be said for other sectors. Educate your employees and team so that they know the customer. This mindset will form the basis for better tips to law enforcement to prevent an attack.”

The work that enterprise security does to know customers to mitigate terrorism risk can also trickle down to citizens, who increasingly are engaging with law enforcement to protect themselves and their families from terrorist acts. “They are taking what they see on the news much more seriously, and they are much more engaged with their surroundings,” he says. “And the nature of the homegrown violent extremist threat means that more citizens are calling our Public Access Line (or tip line, which receives 15,000 tips per year) or the local police to identify suspicious people. They see some type of behavior that doesn’t make sense. Community notification is important to our job. And frankly, when information comes in through the community, no matter how that information comes in, people need to know that something’s being done.”

 

The Security 500 Conference

Overall, says McGarrity, as the threat remains persistent in the United States and overseas, the U.S. must adapt and confront these challenges, relying heavily on partnerships. “We depend on our strong partnerships across the varying levels of government, international relationships, the private sector, and communities across the United States. The value of these collective relationships for our threat mitigation is a team effort; it’s this relationship and collaboration which is critical to the counterterrorism fight.”

McGarrity will address the importance of public and private partnerships at this year’s Security 500 conference on November 12, 2018. Register at http://www.security500.com/


 

 

KEYWORDS: counterterrorism international security law enforcement public private partnerships security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • partnerships feat

    6 Public-Private Partnerships that Push Beyond Information-Sharing

    See More
  • Juan C. Zarate

    Money and Terror: How the Financial Sector is Hitting Back Against International Crime

    See More
  • Public and Private Security: Bridging the Gap

    See More

Related Products

See More Products
  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing