Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Public’s Role in Preventing Terrorism

By Terry Mors, Dean C. Alexander
May 2, 2013

 In the wake of the Boston marathon bombings much attention has focused on domestic and foreign intelligence gathering, analysis, and sharing as well as law enforcement responses to terrorism. Meriting further focus, though, is the role of the public in informing authorities regarding prospective terrorist threats. Among pre-terror incident indicators the public should report to authorities include: terrorists conducting surveillance, gathering information, testing security, acquiring supplies and funds, acting suspiciously, undertaking dry runs, and getting into position to undertake an attack.

Since 9/11 the public has often recognized these signs of terrorism, informed law enforcement, and aided in preventing potentially large-scale incidents. The case studies shared here are illustrative of the benefits of the public forewarning law enforcement involving alleged suspicious activities, including actions that appear incongruous with standard practices.

A terror cell planned to undertake attacks at Ft. Dix, New Jersey, and other locations in the U.S. Employees at Circuit City approached law enforcement over concern that a customer sought to convert video of the operatives training with weapons and taking about violent jihad from one medium to another (VHS to DVD). Following the use of an informant and undercover agent a sting was forged. Convicted of conspiracy to kill military personnel and weapons charges, four of the five cell members were sentenced to life in prison.

 A chemical supplier called the FBI after Khalid Aldawsari, a Saudi Arabian citizen and a former student at South Plains College in Texas, tried to purchase the toxic chemical phenol, an ingredient in making the explosive trinitrophenol, TNP. A freight company called the police after Aldawsari requested that the firm allow him to pick up the phenol order at their office. Electronic surveillance exposed that he used various email accounts to research explosives and targets. Ultimately, Aldawsari was convicted of attempted use of a weapon of mass destruction and sentenced to life in prison.

 A one-time suspected 20thhijacker on 9/11, Zacarias Moussaoui, pled guilty to various terrorism charges, including conspiracy with al Qaeda to hijack and crash planes into buildings in the U.S. He received a sentence of life in prison. Authorities initially gained custody of Moussaoui following a call from a Minnesota-based flight school that Moussaoui told instructors he was interested in steering a plane but not learning how to takeoff or land.

 Mohamed Alessa and Carlos Almonte, who pled guilty to conspiracy to commit murder outside the U.S. on behalf of a foreign terror organization, al Shabaab, came to the attention of authorities following a tip from the public. An undercover agent met with the two and recorded their plans to travel to Somalia and join the terror group. Alessa and Almonte were sentenced to prison terms of 22 and 20 years, respectively.

Shahawar Siraj and James Elshafay were convicted of conspiring to bomb the Herald Square subway station in New York City, and sentenced to 20 and 5 years in prison, respectively. New York City Police Department received a tip about Siraj, who worked at an Islamic bookstore in Bay Ridge, New York. Siraj was reported to have articulated anti-U.S. tirades. Following an investigation of Siraj, he and Elshafay were introduced to a confidential informant, who facilitated a terror sting operation.

Amin el Khalifa was sentenced to 30 years in prison for attempting to undertake a suicide bombing at the U.S. Capitol. El Khalifa’s landlord called law enforcement in relation to threats by the tenant against him and suspicion that el Khalifa was making bombs in his apartment. Following interactions with an informant and undercover agent, el Khalifa proposed several plots before choosing to target Washington, D.C.

 As illustrated, reporting upon possible telltale signs of terrorist activity serves society interests. The investigation of the Tsarnaev brothers in the Boston attacks has brought this truism to full view, as a month before the incident Dzhokhar allegedly told one of his friends that he knew how to make bombs. Even more troubling, Dzhokhar’s three friends, upon learning of the Tsarnaev’s role in the incidents, disposed of items, including a laptop, which would incriminate the younger Tsarnaev.

The responsibility for protecting society against acts of terrorism does not rest solely with government. It is everyone's responsibility. So, if you see something, say something.

 Dean Alexander is director of the homeland security research program, and Terry Mors is director and professor, at the School of Law Enforcement and Justice Administration, Western Illinois University.

KEYWORDS: conspiracy See Something, Say Something Terrorism

Share This Story

Professor Mors received his Doctorate in Education from Northern Illinois University in 2002. He also holds a Master of Arts Degree in Law Enforcement and Justice Administration from Western Illinois University and a Bachelor of General Studies Degree from Roosevelt University. Professor Mors has 12 years of teaching experience at the community college and university levels. He is currently the Interim Director for Western Illinois University’s School of Law Enforcement and Justice Administration. Prior to joining Western Illinois University, Professor Mors worked for the Gurnee (Chicago area), Illinois Police Department in numerous positions ranging from patrol officer to commander. Professor Mors has over 17 years of law enforcement and private security experience, and has made numerous presentations worldwide on a variety of law enforcement topics. He is also a former and present member of several law enforcement professional organizations, including the American Society for Industrial Security (ASIS), the Central Illinois Association of Law Enforcement Executives, and the Illinois Association of Chiefs of Police.
Dean alexander 200px

Dean C. Alexander is Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. He is the author of the new book, Family Terror Networks (2019), available at Amazon.com. He is also a valued member of Security’s Editorial Advisory Board.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!