Skip navigation

Fbi Conference Countering Terrorism 2002

Download original document:
Brief thumbnail
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
2

Countering Terrorism: Integration of
Practice and Theory
An Invitational Conference
FBI Academy, Quantico, Virginia
February 28, 2002

Sponsored by:
Behavioral Science Unit, FBI Academy
Science Directorate, American Psychological Association
University of Pennsylvania, School of Arts & Sciences
and the Solomon Asch Center for the Study of Ethnopolitical Conflict
Decade of Behavior Initiative

3

Preface _______________________________________________________________ 4
Introduction: Countering Terrorism: Integration of Practice and Theory ___________ 6
Executive Summary______________________________________________________ 8
Scenario 1: A trustworthy local businessman reports suspicious activity by an apparently
Middle Eastern neighbor. ________________________________________________ 12
Scenario 2a: A woman contacts her therapist about a friend of her son’s “martyrdom
mission.” _____________________________________________________________ 15
Scenario 2b: A Palestinian reports to the FBI that a recent suicide bombing in Israel was
committed by his brother. ________________________________________________ 18
Scenario 2c: A teacher tells an officer about her student’s father who talks about killing
himself “like the people who flew planes into buildings.” _______________________ 20
Scenario 3a: Without links to the local Muslim community, police receive an anonymous
call about a conversation in a local mosque about plans to attack an American city. _ 22
Scenario 3b: Law enforcement must evaluate hoax terrorist threats. They also must
construct media statements about possible threats and false alarms. ______________ 30
Scenario 4: Three persons are arrested near a nuclear power plant; two refuse to talk
and the third (who recently traveled to Indonesia, Yemen and Germany) will talk. ___ 34
Scenario 5: Improvised explosive device material is found in an apartment. The only
witness to activity there is an alcoholic in withdrawal. _________________________ 38
Scenario 6 (a-c): How can law enforcement build effective ties to local Muslim
communities, and what can these communities do to mobilize their members to speak out
against terrorism?______________________________________________________ 40
Scenario 7: Effective interview strategies for relatives, friends, or acquaintances of
terrorists or suicide bombers. _____________________________________________ 44
Additional issues for practice, training and research __________________________ 48
Conference Participants _________________________________________________ 50
Appendix 1: Information Management and Evaluation _________________________ 53
Appendix 2: Communications Technologies__________________________________ 54
Appendix 3: Community Policing Models ___________________________________ 55
Appendix 4: Psychology of Deception ______________________________________ 57
Appendix 5: Data Mining ________________________________________________ 58
Appendix 6: Decision Trees ______________________________________________ 59
Appendix 7: Training Guide for Hate Crime Training Program __________________ 61
Appendix 8: Psychology of Bias ___________________________________________ 62

4

Preface
The movement from idea to actuality often involves the cooperation of many
individuals. This action becomes more complicated when it occurs within a bureaucracy.
It was during a meeting of members of the FBI’s Behavioral Science Unit (BSU) and
members of the American Psychological Association, two large and complex
bureaucracies, when the idea of an invitational conference on countering terrorism was
born. The excitement of bringing together highly qualified law enforcement officers with
various terrorism experts and academics was palpable.
As exciting as the idea was, so was it daunting. The practical decisions of whom
to invite, what to discuss, where and when to convene were difficult to make. The
decision to hold the conference at the FBI Training Academy in Quantico, VA, during the
week of February 24 was easy. Time and place were decided upon for the practical
reason of availability of space. However, restricting the list of invitees to only sixty
individuals from among the numerous experts in law enforcement and civilian
populations was most formidable. We recognize there are other individuals with
excellent credentials, experience and expertise, whose presence would have added much
to the results of the conference. Time, space and availability restricted the number of
invitations. We are most grateful to the invitees who accepted our request to participate.
From conference conception to convocation, only ten weeks remained to
orchestrate the various components of a successful conference: initiate and complete the
reams of paperwork to hold a conference at the FBI Academy, obtain necessary
clearances and permissions, create scenarios for discussions, invite participants, arrange
transportation, prepare special menus, and design graphics. This could not have been
completed without the assistance of many individuals and groups. We are most grateful
to all who shared in this endeavor. They include supervisors and support staff of the
American Psychological Association, the Decade of Behavior initiative, the University of
Pennsylvania, School of Arts and Sciences, the Solomon Asch Center for the Study of
Ethnopolitical Conflict, and the FBI’s Training Division and Behavioral Science Unit.
A special note of thanks is extended to the FBI’s Training Division, specifically,
the BSU’s training technicians and interns; graphic design artists; maintenance workers;
and food service personnel. Our gratitude also is extended to members of the FBI’s
National Center for the Analysis of Violent Crime Unit for their assistance in the
preparation of the conference as well as their active participation in the conference.
The financial support and guidance of the Solomon Asch Center for the Study of
Ethnopolitical Conflict at the University of Pennsylvania was vital to our bringing
together the diverse group of people whose expertise contributed to the conference and to
this report. For the original idea of having this conference, and for full participation and
guidance all along the way, we thank Professor Ian Lustick, Professor of Political Science

5

and Merriam Term Chair in Political Science at the University of Pennsylvania, and
Brendan O’Leary, Professor of Political Science and Chair of the Department of
Government at the London School of Economics and Political Science and Co-Director
of the Solomon Asch Center.
During these meetings, individual and collective expertise worked together to
answer the questions posed by the scenarios. Results were two-fold. Answers,
suggestions, and theories were applied to questions, issues, and scenarios. Additional
questions – simple and complex – were raised. As with all good research, the conference
offered few complete answers and raised important questions. We look to the immediate
future to address these compelling questions and challenges.
While the content of this report reflects the observations and views of the
participants in this conference, the opinions expressed do not necessarily represent the
positions of the FBI Academy or the APA. The authors accept full responsibility for the
ways the observations and views are expressed in these pages.
Finally, it is with a deep sense of gratitude and admiration that we dedicate this
work and our continuing efforts in counter terrorism to the men and women who continue
to risk their lives on a daily basis keeping our Nation free and the American people safe.
Anthony J. Pinizzotto, PhD
Federal Bureau of Investigation
Behavioral Science Unit
Susan E. Brandon, Ph.D.
American Psychological Association
Senior Scientist
Geoffrey K. Mumford, PhD
American Psychological Association
Director of Science Policy
September 24, 2002

Introduction: Countering Terrorism: Integration of Practice and Theory
On February 28, 2002, more than 70 academic scholars and researchers, and
personnel from justice, intelligence and law enforcement agencies, met at the FBI
Academy in Quantico, Virginia, for an invitational conference on “Countering Terrorism:
Integration of Practice and Theory.” The meeting was sponsored by the FBI Academy’s
Behavioral Science Unit, the School of Arts and Sciences and the Solomon Asch Center
for Study of Ethnopolitical Conflict at the University of Pennsylvania, and the American
Psychological Association.
The participants, roughly half academic scholars and researchers and half law
enforcement personnel, dispersed into seven small groups to discuss scenarios that had
been developed before the conference by the FBI. These scenarios described some of the
current problems that the FBI, other law enforcement agencies and intelligence agencies
are facing as they try to discover cadres of terrorists or those who harbor them, as well as
deter support for terrorism by individuals, designated groups, and communities. Two
hours of scenario discussions were followed by two hours of small group discussions
centered on questions that had been developed before the conference by the academic
researchers and scholars. These questions were about stereotyping and ethnopolitical
conflict, risk perception and communication, education regarding fundamentalism in all
religious traditions, analysis of intelligence data, and strategies to deal with bioterrorism.
The whole group convened for a final meeting where issues and concerns raised in the
small groups were described and further analyzed. Conversations continued at a dinner
provided in the large atrium meeting room at the Academy. The proceedings and
recommendations offered by the various discussion groups, after review by the members
of the individual groups, are the substance of this document.
The ten or so discussants in each small group were likely to be:
Scholars or researchers from psychology or political science or medical
science,
An attorney with expertise in immigration laws,
Someone from the Office of Science and Technology Policy or from the
National Academy of Sciences or the National Science Foundation,
A member of a training or operational unit of the FBI,
Personnel from the CIA, the U.S. Secret Service, the National Security
Agency, the Department of Defense, the U.S. Marine Corps, or the State
Department,
Someone on staff at the Office of Homeland Security or the new
Transportation Security Administration,
Officers from the New Mexico State or Stafford or Arlington, VA,
Washington, DC, Philadelphia, PA or New York City Police or Sheriff’s
Departments.
Each participant was able to offer a different point of view and a different
expertise on the issues raised by the scenarios and the questions. The juxtaposition of

7

people whose expertise lies largely in theory with those whose expertise lies largely in
practice, allowed each to expand on what they already knew and to be informed by the
view of the other. The conversations were reported to be alternatively lively and
sobering, informative and probing, and consistently collegial and respectful.
National and local government offices and agencies have received a large volume
of information and offers of assistance from Americans across the country, as well as
concerned individuals from other nations. One of the challenges has been how to collect
this information and organize people in order to take advantage of all that is offered, to
get relevant expertise to the people who are at the forefront of counter-terrorism efforts,
and to let the experience of those who are on the front lines inform the research and
inquiries of the scholars. This conference was viewed as one way to accomplish this
kind of interaction.

8

Executive Summary
Three broad themes emerged from the discussions. These were:
Efficient and effective collection and dispersal of information,
Development and maintenance of working relationships among various
communities and law enforcement personnel, and
Effective communication with targeted people or groups that are important to
effective counter-terrorist strategies.
Information exchange. The volume of incoming information to local police and
local and regional FBI offices has greatly increased since September 11. The impact of
this increase is exacerbated by the unwillingness of law enforcement to ignore any of it,
given the perceived risk that some vital piece of information will escape notice, and the
felt need on the part of individual officers and agents not to be the person who let a
critical piece of information go unnoticed. Thus, triage procedures have changed,
concurrently with the increase in volume, without opportunities for planning and
evaluation, and without a significant increase in the number of personnel available to
receive and vet the information.
The social sciences have developed highly efficient methods for processing large
volumes of data that can be useful even at the level of a local police station – these
include data mining and decision tree techniques (Appendices 5 and 6). However, these
need to be tailored to the unique cultures in which they would be used, and their
development and implementation requires a cooperative effort on the part of those who
have developed these systems and those who will use them. The value of such systems –
that they can provide complete records that can be easily searched for target items, that
they offer a method of protecting the confidentiality of sources, that they can be queried
for changes in patterns of incoming data, that they can be tailored to sound alarms when
targeted items appear, while keeping the false alarm rate low – must be demonstrated to
the users, while assuring the user that he or she still will have the opportunity to make a
final judgment as to action.
There also are systems being developed and evaluated for the coordination and
effective communication among local responders, such as law enforcement, fire
departments and local health facilities, state-wide and national agents such as the INS,
National Guard, Department of Energy, FEMA, and the Department of Defense, and
allies that are outside the United States (Appendix 2). These also need to be made
available to local responders.
Concern was expressed at the lack of effective information sharing among these
groups, especially between those at the local level and those at the statewide and national
levels. The issue of the protection of the confidentiality of sources, while providing
important information to those who need it most, is an issue that social scientists can
investigate for the development of effective models that take into account human
information processing and cognitive limitations and capabilities.

9

Relationships with key communities. Triage is made more difficult in instances
where law enforcement has little ongoing relationship with communities that have been
targeted both by law enforcement and by the American public in general to be most likely
to harbor terrorists, which are the Arab-American and Muslim-American communities,
especially those with significant proportions of immigrants. The argument was made that
a focus on such communities may be short-sighted (because such a focus will drive
terrorists either further underground or to seek refuge in other communities); however, it
is prudent and effective for both the FBI and local police to establish and maintain good
working relationships with such communities. Specific steps towards that end were
offered in terms of the characteristics of those chosen to approach the community, how
these people should approach and interact with it, and what kinds of information should
be solicited and offered. Some consideration was given to the appropriateness of
community policing models (Appendix 3) in this effort. Law enforcement should be
informed by previous, similar situations that have occurred in other countries, such as the
interactions of England with Irish terrorist networks and of Israel with Palestinian
terrorist networks.
Other “communities” which are or should be involved in triage efforts are
universities; professional groups such as those involving teachers, physicians, and clinical
psychologists (especially, the American Psychological Association); and other social
service and community agencies. Operating procedures for how law enforcement might
interact with these communities were provided; in some cases, issues of jurisdiction,
confidentiality, and civil liberties were considered.
Strategies were offered for how law enforcement can make most effective use of
the media to deliver messages to the public, especially in view of the human tendency
towards negativity bias (Appendix 8). Guidelines were offered for how to maximize the
effectiveness of the “speakers” and how to assess the status of the “listeners.” It was
recognized that the media serves an important role in providing critical commentary, and
that law enforcement can take advantage of this function as well by offering more
evidence of incidents that were avoided by effective intelligence and of the protection of
the citizenry from hate crimes, and by being more open about failures that occurred and
instances where expertise was not immediately available (for example, in the instances of
the anthrax mail-delivery attacks).
Interrogation/interview techniques. Suggestions were offered on how to most
effectively interview community members who may have information relating to
individuals who are involved in terrorist networks, either within or outside the United
States. Special focus was given to instances where these people are recent immigrants.
The impact on the Arab-American and Muslim-American communities of changes in
laws relating to immigration procedures and attorney/client interactions, of the
incarceration of individuals who may have information relating to terrorist networks but
are themselves not terrorists, and of other actions taken by the Department of Justice,
were described. These were recognized as posing additional obstacles for the creation

10

and/or maintenance of effective relationships between law enforcement and these
communities, which cannot be ignored.
Specific strategies were offered for the evaluation of, and interactions with,
community members and those who are held as suspects or who might serve as assets.
The group recognized that the current tendency to view Arab-American and MuslimAmerican men as especially suspect is shortsighted and ineffective. Social scientists
have investigated and described the situational and behavioral characteristics of
individuals who are likely to be vulnerable to joining and supporting terrorist networks,
especially here in the United States. The applicability of these characteristics to
international terrorism is part of ongoing investigations within the social sciences.
Conclusions and recommendations. This conference highlighted both the current
distance between the academic/scholarship community and law enforcement and
intelligence communities, and the extent to which these two groups can greatly inform
each other. Law enforcement and intelligence personnel have the hard data that can
shape the course of social science in areas such as decision making, risk determination
and communication, communication analysis, characterization of terrorist and other
extremist networks, analyses of deception, predictors of fault lines within immigrant
groups, and information management and communication. The social scientists have
tools that have been developed, evaluated, and already shown to be highly effective for
communicating to the general public, developing triage procedures, predicting
individuals at risk for membership in terrorist networks, enhancing community relations,
dealing with large volumes of information, and so on.
The format of the conference was a fundamental determinant of its effectiveness.
It was generally agreed that the problems needed to be stated by those in practice; thus,
having law enforcement create the scenarios that served as the focus of the discussion
groups was vital. It also was agreed that creative solutions and strategies came out of the
opportunity for relatively small groups of people from both practice and theory to sit at
the same table and just talk about issues within and without their immediate expertise. In
some ways, the format made no one the perfect expert, so that particular skills may not
have been taken advantage of. However, the small-group, focused discussions avoided
the lecture format of an academic conference and forced the academics to think and speak
in concrete terms. It also allowed the law enforcement personnel to ask questions that
provided a way for the academics to offer evidence of the scholarship and research that is
available and can be used. It provided both groups with some practice at speaking in a
common language and applying old techniques to new problems. It was recommended
that further meetings maintain the same format, even while perhaps addressing different
issues and inviting different people.
It is vital to the health of both law enforcement and the social sciences that the
distance between these two groups, broadly-defined, not increase to the point that
common points of reference, language, and concerns cannot be found. One outcome of
September 11 was to heighten the awareness of the social sciences community to the
need for their active engagement in programs of national security. The events of that day

11

also made our vulnerabilities transparent and indicated the strengths and weaknesses of
current law enforcement and intelligence practices. It is opportune for both sides, such as
were part of this conference, to take advantage of the momentum provided by the
September 11 attacks.
The interaction of good people who came with a wide variety of experience and
expertise provided a unique opportunity for the kinds of creative thinking that is so
critical to how America will protect its citizens from the immediate and long-term effects
of the terrorism that it certainly faces in this 21st century.

12

Scenario 1: A trustworthy local businessman reports suspicious activity by an apparently
Middle Eastern neighbor.
A citizen contacts a detective in a small east coast city. The detective knows the caller to
be a trustworthy local businessman. He reports suspicious activity by a neighbor who
moved into a rental residence nearby. The neighbor appears Middle Eastern. The
neighbor claims to be a student at the local university; however, he is noticed to be
absent from the residence for weeks at a time. The caller engaged the neighbor in
conversation and learned that although he claimed to be enrolled in an International
Studies program at the University, he was very vague and clearly did not recognize the
names of the most prominent professors within that program. The neighbor has observed
three other Middle Eastern males intermittently staying at the neighbor’s home,
sometimes when his neighbor is not there.
Problem: This scenario was viewed as quite typical of the many that have come through
local police and FBI offices since 9/11. The problem is how to develop an effective
triage system that helps officers or agents handle the large volume of incoming
information while assuring that important details are not overlooked.
Strategies: Make use of data gathering/vetting systems already in use in other situations,
such as in the medical and legal professions. These are designed to (1) process all
incoming information and then sound an alert when a targeted item appears, and (2) show
changes in patterns of data flow that would not be seen by the casual, part-time observer
(an individual on duty at any particular time would see only that part of the incoming
data, whereas the artificial system sees it all). The pattern of change in incoming data
might be informative, in addition to targeted items.
For example, one such system already in use searches through large volumes of text for
specific words or phrases. When it finds a targeted item, an alarm is sounded. An
important aspect of this system is that it will find text that means the same without using
the same words. For example, if a target search specifies “racketeering,” one will get
documents that mention racketeering, but also documents that mention “unlawful
conspiracies.”1 Also, the data are kept in files that can be re-searched for words or
meanings that are of interest at some later date, to look for similar instances, as well as to
allow for the generation of graphs and other descriptors to evaluate changes in the pattern
of incoming information.
Further information is provided in Appendix 1 (Information Evaluation Systems).
Problem: What predictor variables do we have for the identification of potential
terrorists?
1

Example provided by Herbert L. Roitblat at www.dolphinsearch.com.

13

Strategies: We might consider using the information that is known about the men who
attacked New York and Washington on 9/11. For example, it appears that the men who
attacked on 9/11 had not maintained their family relationships, perhaps in order to ensure
good cover. Thus, the presence or absence of family relationships might be used as
predictors of membership in terrorist networks. Such information also might be useful in
the interrogation and identification of suspects.
Problem: What should be the standard operating procedure for dealing with local
universities that might have students who are either under suspicion or know others who
are?
Strategies:
XShort-term standard operating procedures should include:
Find a way of ensuring minimal adverse impact. A student or a professor – or
any university employee – could be put at risk if he or she is approached by a law
enforcement officer in a manner that is obvious to their coworkers. There also is
risk involved in simply asking a professor about a student (or vice versa). One
way to minimize such impact is to ask about an entire class or an entire
department, so that individuals are not singled out (even if the law enforcement
agent only wants to know about one or two individuals).
The officer or agent should assess whether their procedure passes a “60
Minutes” test. That is, would their approach be an embarrassment either to them
or their department if it were exposed to the general public?
Decide in advance if the person being sought is a suspect or a citizen who
might be able to help, and modify the approach and advance accordingly.
Be prepared to offer assurances that if a person is willing to come forward
with information, they will not be penalized for doing so with prosecution for
minor violations (including minor visa violations).
Assure the individual that if they request legal representation, this will not be
viewed as an admission of guilt, nor will they subsequently be viewed as
uncooperative.
Offer an assurance that the law enforcement agent is bound by law and is not
the kind of police that immigrant populations are likely to have encountered in
their countries of origin.

X Recognize that an academic culture is, by nature, more likely to value its openness and
willingness to talk than other communities. Attempts to be secretive likely will be
viewed as evidence of ignorance of the university culture (and might expose an
undercover agent), and would be viewed as contrary to the open nature of the university
culture. Therefore, the long-term strategy of planting individuals in the university to

14

serve as information conduits was rejected because the cost of discovery of such
individuals would, in the long run, greatly outweigh their usefulness in the short-term.
X A better strategy would be one that recognizes that the university culture welcomes
diversity and talking. Local law enforcement might participate in various lectures,
discussion groups, classes, and social events that are open to the public and also are
attended by members of the university. This would increase the perception of law
enforcement as part of the community, rather than outside it. Law enforcement agents
that like to talk, as well as listen, would be best suited for such an assignment.
Implications for practice, training, and research
Social scientists need to evaluate the implications of the current concerted focus on
Muslim- and Arab-Americans as potential threats, where these are the primary
characteristics that trigger responses of faster and greater scrutiny. We are making
assumptions about which terrorists are on the basis of essentially indiscriminate
characteristics (most Muslim- and Arab-Americans are not terrorists).
There are two dangers of using the trait rather than behavioral indicators. One is that
people will be unduly and inappropriately targeted. The other is that we will miss
terrorists who are operating in other religious and ethnic communities. This focus also
brings up issues of discriminatory practices and whether such a focus is occurring
because of an underlying racism. Would the current strategies (community surveillance,
etc.) be possible were the 19 terrorists of 9/11 Caucasian rather than Middle Eastern (e.g.,
what if they were part of the IRA)?

15

Scenario 2a: A woman contacts her therapist about a friend of her son’s “martyrdom
mission.”
A woman contacts her psychologist from whom she has been receiving therapy for the
past year for bouts with depression. She reports that she has just learned that a friend of
her 19-year-old son appears to be recruiting her son for a martyrdom mission. This
friend has voiced some fundamental Islamic beliefs that are very anti-American. The
woman has overheard worrisome conversations between her son and his friend but had
tried to discount their significance until her son revealed today that he was asked to
become a Martyr for an unspecified attack against the United States. He is very
concerned that his friend is involved in something that may be planned for the near
future. They are afraid to report this to the police because her son has a juvenile record
and he is somewhat anti-American himself. They are naturalized citizens of the United
States after having moved here from Iran many years ago.
Problem: This situation is not covered explicitly by the American Psychological
Association's (APA's) Ethical Principles of Psychologists and Code of Conduct.
Pertinent portions of this Code are as follows:
5.05 Disclosures.
(a) Psychologists disclose confidential information without the consent of the
individual only as mandated by law, or where permitted by law for a valid
purpose, such as (1) to provide needed professional services to the patient or the
individual or organizational client, (2) to obtain appropriate professional
consultations, (3) to protect the patient or client or others from harm, or (4) to
obtain payment for services, in which instance disclosure is limited to the
minimum that is necessary to achieve the purpose.
8.01 Familiarity With Ethics Code.
Psychologists have an obligation to be familiar with this Ethics Code, other
applicable ethics codes, and their application to psychologists' work. Lack of
awareness or misunderstanding of an ethical standard is not itself a defense to a
charge of unethical conduct.
8.02 Confronting Ethical Issues.
When a psychologist is uncertain whether a particular situation or course of action
would violate this Ethics Code, the psychologist ordinarily consults with other
psychologists knowledgeable about ethical issues, with state or national
psychology ethics committees, or with other appropriate authorities in order to
choose a proper response.
Comments (Robert Kinscherff, Director of forensic training at the Law and Psychiatry
Service of the Massachusetts General Hospital; senior forensic psychologist for the

16

Boston Juvenile Court Clinic; member of the faculty of Harvard Medical School,
communication to Susan Brandon, May 5, 2002):
I do not believe that the Ethics Code explicitly mentions mandated
reporting of child abuse, elder abuse, etc. Rather, the Code handles it by
obligating psychologists to be aware of and to utilize whenever appropriate or
mandated the exceptions to confidentiality found in the law. This is partly
because most of the relevant law is state law and these laws governing
confidentiality and permitted/mandated exceptions to confidentiality differ in their
specific details. The law that permits or requires a psychologist to break
confidentiality in order to protect third parties from potential violence is the
closest body of law to the scenario. However, this law contemplates that it is the
client/patient who poses the serious threat of harm to a third party; it does not
contemplate violation of the confidentiality of the client/patient if the
client/patient is not the source of the risk of harm.
There is no specific mention of national-security related issues in the
Code, and I am unaware of any APA policy document or guidelines document
that refers to national security issues as they might arise in the practice of
psychology.
The Code as currently worded would actually permit breaking of
confidentiality despite the patient's/client's wishes in the "national security risk
from a third party" scenario BUT ONLY IF there were applicable state or federal
law that MANDATED the breaking of confidentiality or PERMITTED the
breaking of confidentiality in order to protect the client/patient or others (see, for
example, 5.05(3) which permits disclosure to protect others if mandated or
permitted by law).
Problem: Where might a psychologist help, such as by providing telephone numbers for
tip lines, going to the police with the client, etc.? Are there rules for such actions?
(Kinscherff:) There are no written rules for these steps. However, each of these
steps [referred to above] presumes that the patient/client will be taking the
affirmative actions, not the psychologist. The psychologist would only be acting
in a supportive role by providing information (telephone number) or support
(going to the police with the client). This situation is not unlike those situations in
which a client/patient may disclose being victimized by domestic violence; the
psychologist might help the client/patient access further supports by locating
shelter services or other related services, or might support the client/patient by
going with them to file a police report regarding the domestic violence. In either
case, the psychologist is not violating the confidentiality of the professional
communications without the consent of the patient/client.
Strategies: Seek guidance from the American Psychological Association and state
psychological associations to consider:

17

Including statements regarding information related to national security in its
code of ethics;
Broadening training programs to include instruction on how to deal with such
situations, and
Teaching clinicians and clinical students how to become familiar with various
law enforcement agencies and rules, and how to deal with third parties such as
probation officers.
Problem: What information about the family might be useful to law enforcement
agencies?
Strategies: The woman and her son appear amenable to approach by law enforcement
for several reasons. First, both are naturalized citizens of the United States and have
lived in this country for many years. Second, the mother being in therapy suggests a
significant degree of acculturation of the family. Third, the fact that the son approached
his mother with his fears about his friend indicates that the son regards his mother as a
confidant and perhaps an authority figure.
Implications for practice, training and research:
This scenario highlights the fact that law enforcement may be in situations that challenge
current views of confidentiality. It would be useful to look at the literature regarding
precedents with organized crime.
Investigation is needed that compares the development and maintenance of informants in
counter-terrorism efforts with the support of informants in other contexts, such as
organized crime and narcotics.
One might ask how the appropriate response of the psychologist would be changed by a
reduction in the age of the child (e.g., from 19 to 15), or by the assumption that the
community in which the family lives is rural or middle America, where Christian
fundamentalist groups are known to be more likely to have strong support.
There is a need for the American Psychological Association and state psychological
associations to develop an ethical code for practitioners for instances where a client may
have information relevant to terrorism (similar to other mandates that already exist, such
as those for instances of abuse of children and the elderly and a client’s intention to harm
himself or another person). Such instances are peculiar because they involve third-party
harm. Psychologists need to be trained for what behaviors to look for, and how to report
information to law enforcement while protecting the client and their family and
community. This may include some kinds of cross-cultural training. The APA may have
to work with legislatures and licensing boards regarding some of these issues. Similar
training and issues of confidentiality need to be considered for the training of clergy,
teachers, and physicians.

18

Scenario 2b: A Palestinian reports to the FBI that a recent suicide bombing in Israel was
committed by his brother.
A young man walks into a local FBI office and claims to be from Palestine. He reports
that the recent suicide bombing in Israel that is being widely reported in the international
media was committed by his brother. The reporting person is conflicted about his desire
to stay in the United States, his need to return to his family, and his previous thoughts
about becoming a martyr for the Palestinian cause. His work permit expires in one week,
and his family expects him to come home. He has met a young woman who is a U.S.
citizen, a devout Muslim, and will not leave her close-knit family here in the United
States. He doesn’t want to abandon his family or raise any suspicion from them. Both he
and his brother previously talked about becoming martyrs but they decided against it.
Apparently, his brother lied to him or changed his mind. He is dedicated to his family
and has many friends and associates at home.
Part of the investigation will be attempting to discern the young man’s reasons
for contacting the FBI.
Problem: What information should be sought from such an individual?
Strategies: Additional information should be sought about this individual’s particular
background:
What are the social and economic circumstances of his family in Palestine?
What part of Palestine does he come from, and, if he is religious, to what
religion and sect does he belong?
Does or has any other member of his family resided in the United States?
Why did he leave Palestine?
Are there pro-American forces in his local community (such as a local Imam)?
Problem: How to determine whether the person should be developed as an asset, either
via being encouraged to go back to Palestine, or by staying in the United States.
Strategies: This scenario was described by law enforcement personnel as a perfect
opportunity to open up the young man and work on developing his trust as a potential
asset. However, a contrary view was offered. The following comments were offered by
Brendan O’Leary, Professor of Political Science and Chair of the Department of
Government at the London School of Economics and Political Science, Visiting Professor
at the University of Pennsylvania, Department of Political Science, and Co-Director of
the Solomon Asch Institute (communication with Susan Brandon, April 29, 2002):
The scenario is highly implausible. If I were a police/intelligence officer in
the scenario I would assume it was an attempt to penetrate the FBI by outsiders,
rather than an opportunity for the FBI. Even if this initial surmise proved false, I

19

would assume that anyone with this level of cross-pressures would, in any case,
be unlikely to be stable. He would therefore merely, in my view, be useful for
obtaining useful information about past activities. People in his position do not, in
general, sell family and friends down the river just for a green card.
General comments: The Irish in Britain were subject to heavy surveillance
and organizational penetration after bombings in Guildford and Birmingham in
the mid-1970s. Police arrested, and judges and juries convicted, the wrong people
in both cases -- creating terrible miscarriages of justice, which was very bad for
the UK's reputation and did not help in counter-terrorism. Thereafter the Irish in
Britain were highly suspicious of the police and reluctant to help. Just as
importantly, from the mid-1970s the IRA rarely used operatives from amongst the
locally born or historically established Irish in Britain. They preferred to use
sleepers or active service units -- who were under strict instructions to avoid
contact with the social and other organizations of the Irish in Britain. In this way
they generally avoided capture and were highly effective in the early 1990s. Their
one surprise tactic was the occasional use of southern rather than northern Irish
operatives.
By analogy, smart members of al-Qaeda would stay away from Arab- and
Muslim-American civil organizations – and, by analogy, extensive penetration of
their organizations by the FBI and others may often be pointless and possibly
counter-productive from the point of view of obtaining spontaneous and voluntary
intelligence.
Implications for practice, training and research:
Research on cult recruitment in this country may be particularly relevant to questions of
how future terrorists become involved in these groups and which factors may predict a
movement towards proximate violence.2 Law enforcement personnel emphasized that
our models of criminal behavior most often presume that culprits want to escape capture
and stay alive, whereas these martyrdom paradigms do not meet those characteristics.
Thus, research on cult recruitment should also include data collected from outside the
United States, in particular, Israel, where substantial information has been collected about
the situations of Palestinian suicide bombers.3
Social psychology research, based largely on the study of domestic cult groups, suggests
that strong ethnic identity may not lead to separatism if there also is a strong American
(superordinate) identity. Does this apply to groups outside the United States as well?

2

See, for example, Pinizzotto, A. J. (1996). Deviant social groups: Investigations should use objective,
verifiable criteria. Law and Order, 44(10), 75-80.
3
See, for example, McCauley, C. (in press). Understanding the 9/11 perpetrators: crazy, lost in hate, or
martyred? In N. Matuszak (Ed.), History behind the headlines, Vol. 5. Farmington Place, MI: Gale
Publishing Group.

20

Scenario 2c: A teacher tells an officer about her student’s father who talks about killing
himself “like the people who flew planes into buildings.”
An off-duty law enforcement officer received a call from his neighbor who is a teacher at
a local private elementary school. Today a ten-year-old boy student told her that he was
worried about his father killing himself “like the people who flew planes into the
buildings.” The student asked if this school would put his father’s picture on the wall if
that happened. The boy claimed that the picture of his friend’s older brother was placed
on the wall in his previous school when he died a Martyr. The boy was recently enrolled
in this elementary school after moving from a foreign country. The boy also revealed
that his father is very strict and usually questions him every day after school about whom
he talked to and what they talked about. His father has been away for several days and is
expected home tomorrow or the next day. (What if the “foreign country” were
___________?)
Problem: A rapid response is required in order to do risk assessment. This assumes that
the local law enforcement has a good relationship with the FBI. And, whereas there is
likely to be an arranged vehicle for information sharing in large cities, this may not be the
case for small cities or towns.
Strategies: This is an instance where systems that are designed to facilitate
communication across agencies (groups, services, locales) are needed. Such systems
have been designed and are currently being evaluated. If no such system is available,
and if local law enforcement has no standing relationship with the FBI, it is suggested
that the strategies offered for Scenario 3a, which describe some rules to follow for
collection of information from members of a Muslim community, would be useful. If
the father and family came from another “foreign country,” such as Indonesia, these rules
would have to be modified according to the local customs of that country.
Problem: This scenario is similar to Scenario 2a in that is raises the question of how
persons in positions of some confidence should provide information to law enforcement.
Here, the question is what should rise to the level of reporting for teachers and social
services?
Strategies: It was suggested that the APA might develop guidelines for such reporting,
and offer these to other agencies (school systems, social services), where appropriate.
Problem: How can intelligence or law enforcement agencies share information and still
protect their source?
Strategies: It was agreed that this has been and remains a primary problem for
intelligence gathering agencies. The problem may be of even more concern to the FBI in
the immediate future than it has been in the past, because of the increased efforts that

21

recently have been mandated within the Bureau regarding the management of secret
intelligence information.
Implications for practice, training and research:
The social and behavioral sciences can aid in understanding this kind of person in more
depth – his motivations and possible behaviors – and making such information available
to law enforcement in a manner that would allow them to use the information without
violating civil rights or resorting to profiling or stereotyping.
Risk assessments rely on data about baselines of normal behavior within populations, so
that abnormal behavior may be clearly distinguished, but there are few data about
violence, for example, in Arab- and Muslim-American populations. In order to conduct
timely, appropriate risk assessments, law enforcement must have access to information
on minority communities, what their experiences suggest in terms of motivations and
behavior, and effective engagement with these communities and their citizens.
It was generally agreed that previous attempts to offer alternative models of information
management to intelligence agencies and/or law enforcement have been viewed as
unworkable, and that this problem deserves additional attention on the part of social
scientists who deal with artificial intelligence networks, modeling of information
systems, human cognition, and human perception under conditions of stress and duress.
Such work is currently underway. Notably, such a system would have to be created and
evaluated with the full partnership of those agencies that need and might use such a
system.
If multiple agencies (law enforcement, child protective services) become involved with a
family, clearly there is a need for some level of collaboration or at least communication
to avoid inadvertent, negative effects on the family and any investigation underway.

22

Scenario 3a: Without links to the local Muslim community, police receive an anonymous
call about a conversation in a local mosque about plans to attack an American city.
A city police department of a medium size U.S. city received an anonymous telephone call
to their published but non-emergency number. The caller reported overhearing a
conversation that took place in a local mosque regarding a plan to attack an American
city. The caller identified the mosque but did not provide the names or indicate if he
knew the people having the conversation. However, he expressed his confidence that the
individuals having this conversation hate the United States and have the ability to commit
a terrorist act. No law enforcement agency has any confidential source within the mosque
and the police department does not have a confidential source or cooperating witness
within the Islamic community. At least one concern of the police department is how to
develop assets or informants within this community.
Problem and general comment: The issue of the relationship between law enforcement
and the Muslim- and Arab-American communities was central to the conference. In
some sense, the issue posed by this question goes to the heart of the strategy of terrorism,
which is to alienate a people from its government.
Strategies: Discussions of the relationship between law enforcement and these particular
communities focused on how these two entities view each other and what each perceives
the usefulness of the other to be. Law enforcement agencies tend to view these
communities as relative unknowns and in terms of what information they can provide that
is relevant to terrorist activities or persons. Whereas people within these communities
sometimes view law enforcement as threatening – especially those who are more recent
immigrants – generally, they have a positive view of the local police and identify with the
larger American public.
For law enforcement to function more effectively with these groups for
information-gathering purposes, the following recommendations were made:
X Law enforcement should create a mechanism to meet regularly with the community.
The Community Affairs Officer of the New York City Police Department was viewed as
a good model. (See also Appendix 3, “Community Policing Models.”) The law
enforcement contact here should not be in a rotational assignment, but should be a longterm resident of the larger community. It may be less important that this officer be a
member of the targeted community than that he or she be viewed as a member of the
larger community because it is the larger community with which people in the targeted
community identify. For example, if the targeted community members are MuslimAmericans in Staten Island, the contact need not be a Muslim-American living in Staten
Island as much as a New Yorker because members of the targeted community identify
themselves as New Yorkers. Ideally, as well, the law enforcement contact should feel
personal commitment and identify with this larger community, either because they grew
up there or because they have family members within the community.

23

X The need is to establish a specifically trained group of local and/or state law
enforcement officers who have the mission (and the resources) to learn about Islamic
cultures and to establish the kinds of relationships that foster mutual trust, cooperation,
and regard – as well as the sharing of potentially useful/vital information. Depending on
the locale and circumstances, these officers would also attend to specific groups
operating in their jurisdictions that are thought to be at risk for supporting or fomenting
acts of international or domestic terrorism.
X The immediate goals would be to develop the relevant kinds of expertise, begin
addressing a current climate of mistrust between law enforcement and many persons from
the Islamic world, and begin effective collaboration among relevant federal and local law
enforcement agencies operating within the same jurisdictions.
X Given that the FBI may not have the opportunity to develop such long-term and close
relationships with targeted communities, it needs to adopt alternative strategies. These
might include:
Increasing the number of citizens academies, where local FBI personnel hold
a series of classes and discussion groups to which community leaders (corporate,
civic, religious) are invited. These academies offer the FBI a way of describing
its role and its needs to the community, and helping the community identify with
law enforcement.
The Boston FBI Office instituted a Citizen’s Academy in the spring of
1998, bringing together prominent civic, business, education, and financial
leaders for seminars.
Being invited by local law enforcement (such as Community Affairs Officer
or the local beat cop) to speak to community gatherings such as those that are in
churches, schools, and sports events.
Speaking at educational institutions, not just to provide information, but also
to be open about seeking information and help, and to explain the problems and
needs of law enforcement. People like to be asked to help.
In October 1998, the Boston FBI Office adopted South Boston’s Patrick F.
Gavin Middle School. The FBI’s Adopt-A-School Program is a 16-week
Junior Special Agent and Mentoring Program that provides a youth
program in which targeted sixth-grade students are counseled, instructed,
and mentored by Boston FBI employees, with the intent of raising levels
of expectation, improvement of school performance, and instilling a
respect for law enforcement.
Partnering with personnel from Immigration and Naturalization Service (INS)
and from local law enforcement to meet regularly with immigrants in the local
community. The FBI contact – who ideally would be assigned to these duties for

24

an extended period of time – would help explain the laws and regulations to these
new members of the community and would come to be viewed as a resource
rather than only as a police agent whose presence signals trouble.
Consider using a strategy that was viewed as successful in NYC with the
Muslim-American community who became distrustful after learning of apparent
harassment of African Americans in housing projects. NYPD engaged in a series
of role-playing exercises with Muslim-American youth in local mosques where
the youth played the part of the police and the police, the youth.
X The contact person should know the important cultural rules of the targeted
community, especially those that involve forms of greetings and the rules around social
interactions. This might involve training officers to distinguish among Muslim cultures
and religious groups. However, whereas the contact person should be sensitive to the
religious and social mores of the targeted community, they should not view members of
the targeted community as anything but fellow Americans, and they should avoid labels
and interactions that signal otherwise.
It should not be assumed that information about the Muslim- and Arab-American
communities must be provided by members of those communities. In some sense, an
intimate knowledge of a culture takes many years to acquire. However, much can be
learned about the history and culture of one group of people from those who are scholars
of the group (e.g., social anthropologists, historians) even though they may not be
members of it. This certainly can be the case if the need is to know basic rules of social
interaction and etiquette.4 Any scholar of Arab or Muslim history would know how to
recommend avoiding some of the errors already made (e.g., the use of terms like “evil,”
“crusade” and more recently the Attorney General’s use of the Responsible Collaborator
Program [“collaborator” translated into Arabic comes close to meaning “traitor”]).
X Both the police and the FBI should develop relationships with social agencies whose
primary functions are not law enforcement, such as the PTA, mental health agencies,
child welfare agencies, and agencies that help the homeless. These agencies are not
usually concerned with inter-group conflicts and tensions; however, as preexisting
entities and because their members and constituents are located within the community,
they can be used as vehicles for getting the law enforcement/FBI agenda out to the
community.
X Law enforcement should try to understand the fault lines within a community. That is,
when there is a crisis, who is likely to be perceived as vulnerable or culpable? If these
4

The important point was made that if the stated goal is to try to understand the terrorists of 9/11 as
apparent members of Arab and/or Muslim communities, that assimilated Muslim- and Arab-Americans
(much less Christian Arab-Americans, which are the majority) do not "understand" Osama bin Laden any
better than non-Arab scholars of (for example), militant Islamic movements. The Islamic terrorist
community is the Islamic terrorist community, not the Muslim community nor the Arab community, much
less the Arab-American community. Islamic terrorist communities have more in common with other
terrorist movements, such as the Tamil Liberation Tigers, than they do with Muslim-Americans.

25

individuals are identified solely on the basis of race, class or sex, then the community is
more likely to view the response on the part of law enforcement as being unjust and
unfair.
X The FBI and other law enforcement should be open about errors and mistakes that are
made in interactions with community members, and offer as much explanation as
possible, on an individual basis. They should not rely on media coverage for this.
X If information is sought from a community member, the following guidelines are
recommended:
When law enforcement agents approach community members for information,
they should be as transparent as possible about their needs and what they are
looking for.
Similarly, law enforcement agents must be clear to the members of the
community what the laws are, and changes in laws must be stated clearly and
loudly as soon as they occur, even if these new laws are likely to further alienate
the community members (because secrecy alienates them even more).
When practicable, interviewing community members should be done in a
neutral location, not in the person’s home and not in FBI or police headquarters.
When appropriate, law enforcement agents interviewing members of the
ethnic group associated with the terrorist acts should inform those individuals that
they can have an attorney or trusted community leader present (and if the person
decides to do so, this should not be viewed as evidence of guilt).
Law enforcement agents should know that if they ask most immigrants if
anyone in their family is known to have minor immigration violations, most
people will answer, “yes” if they are being honest. This immediately creates a
problem: The agent may not be able to ignore this information, and the
community member risks informing on family members for activities not related
to terrorism and may as well be put in legal jeopardy themselves. Given the high
incidence of minor visa infractions within many recent immigrant communities, it
is recommended that the Department of Justice consider developing policies that
facilitate acquiring relevant terrorism information from people who know others
or who themselves have minor visa difficulties.
Law enforcement agents who are interacting with community members should
be cognizant of information (including rumors) that the community has about past
apparent grievances (e.g., a case where a man who is viewed as having killed an
Arab-American is known to be living free in Israel). Even if no action is taken to
address the grievance, at least the agents will be seen as aware of the problems
and concerns of the community.

26

X Interactions with targeted communities should not be just to gain information, but also
to reiterate and provide evidence that law enforcement is there to protect members of the
community from attack by other citizens. Behavioral scientists have documented the
general human tendency to take more notice of bad things happening than of nothing bad
happening, or even of good things happening. It is important that law enforcement and
other government agents help to identify examples where citizens and law enforcement
personnel have engaged in exemplary behaviors which demonstrate their good will to
members of the community that may be feeling alienated. These examples could be
shared with community leaders and the media. It was noted that in therapeutic settings,
psychiatrists and psychologists sometimes reveal something personal about themselves to
patients as a way of engendering trust. Law enforcement might use the same strategy by
sharing some of their own personal experiences with community members, as a way of
building rapport.
X The actions by President Bush and Secretary Powell to declare solidarity with MuslimAmericans have been viewed as very positive. Certain government officials and media
representatives have asked the Mulsim-American community to be proactive on the part
of Islam and educate the rest of America about the peaceful nature of Islam. Targeted
communities themselves have made concerted efforts to speak out via public speeches,
visiting local community functions, websites, letters, and word of mouth.5 It should be
recognized, however, that:
There is some tension created by such community action: the community is
self-labeling itself as separate, which further heightens its sense of alienation from
the larger American community with which it has (perhaps more so before 9/11)
identified; and

5

The view of some segments of the Muslim- and Arab-American communities is that their relationship
with law enforcement has been damaged by incidents that occurred after September 11. Importantly, these
incidents are not seen as inevitable outcomes of 9/11 by members of that community, but rather, as
apparently arbitrary results of policy decisions made by the Department of Justice and the Bush
Administration. Among the events that have been most troubling to some of these individuals are (a) by
September 15, the INS was granted the right to detain people without charges from 24 to 48 hours or
indefinitely if there were extenuating circumstances; (b) On September 21, 2001, an internal memo was
issued by Chief Immigration Judge Michel Creppy stating that the Attorney General had implemented
additional security procedures for certain cases in the Immigration Court. It stated that these procedures
require Immigration Judges to close the hearing to the public. Thus, special hearings were created that
were outside the usual legal system, and which could be neither confirmed nor denied in instances where a
family member, attorney or other concerned citizen inquired; these people also were not allowed to attend
these hearings; (c) the Patriot Act was passed, whereby people can be held for up to seven days without
being charged, or indefinitely if they are suspected of being even connected to a terrorist – this effectively
expanded the definition of who was considered a terrorist; (d) the Bureau of Prisons passed regulations
stating that it can eavesdrop on client-attorney conversations; current laws already allowed this without
statutory standard; (e) the INS passed a rule that even if someone is cleared of charges, it may hold them
without being charged during an INS appeal; (f) the Attorney General announced that the Department of
Justice wanted to interview 5000 Muslim-Americans across the country; (g) at the end of the day, so to
speak, a Muslim-American offering information to the FBI or other law enforcement agencies was
perceived by many other members of that community as just as likely to end up in jail as to walk away.

27

Many Arab-Americans are not Muslims and that those types of public
requests reflect the fact that the speakers do not have an appreciation for the
diversity of most Arab-American communities.
X There is some risk in the manner in which people from the Muslim- and ArabAmerican communities appear to have been targeted for intensive and continued scrutiny.
The critical characteristics of the profile of a terrorist have been made out to be gender
(male), age (young), and ethnicity (apparently Arab, or at least, not Caucasian), but of
course, these are not discriminating factors at all (most people with these characteristics
are not terrorists). It should be recognized that there also is a real danger of ignoring
other people who do not have these characteristics, who may actively support or
participate in terrorist acts and are able to escape detection because they do not fit the
prevailing profile. It is advised that profiles be based on behaviors as well as traits, and
that every effort should be taken to reduce false positive and false negative hits that
would result from using them. A concerted focus on Muslim- and Arab-Americans may
be shortsighted.
X Finally, previous instances of law enforcement/community interactions have shown
the following:
Victimization within these communities is likely to breed solidarity. In the
current context, the short-term indefinite detention policy can be predicted to seed
long-term discontent.
Law enforcement personnel may suffer an image problem as a result of the
way that new immigrants perceive law enforcement in their country of origin. If
they are accustomed to rough treatment back home, they may assume they will be
treated the same way here. It also is likely that any intimidation tactics used here
will pale by comparison to what they may have been exposed to in their country
of origin, so such tactics will likely backfire.
Most Muslim religious organizations in the U.S. view themselves as
Americans: Richard Reid’s mosque was cooperative with the police not because
they were antagonistic towards Reid, but because the mosque leaders wanted to
maintain a good public image.
It is useful to recognize that the openness of American society is our strength,
not just our vulnerability, and that this openness generates great loyalty among
Americans who come from very closed and heterogeneous societies.
X Evaluate the generality of models based on similar situations, such as those that come
from organized crime and community policing. (Examples of such models are described
in Appendix 3, “Community Policing Models”).

28

Implications for practice, training and research:
It would be useful to develop a program to assess just how isolated any group (club,
mosque, etc.) is, because isolation is more likely to encourage anti-American behaviors.
We could ask, for example, about the percentage of people who speak English, who work
in other than ethnic employment, whose children go to public schools, or who live in
mixed neighborhoods. This might be accomplished within a context of providing both
incentives and opportunities for integration or assimilation. Assimilation strategies could
include free English lessons, informal contact with government (including law
enforcement) organizations, improved neighborhood patrols and schools, and so on. The
extent to which a particular group took advantage of such opportunities would be a way
of measuring whether assimilation is valued.
It may be strategic to consider the implications of how counter-terrorism measures are
framed. If we operate under a war model, then certain things follow:
Community policing models may not be appropriate for dealing with targeted
communities, because these models assume a criminal justice view, where
targeted individuals are criminals.
The enemy is a large group or collection of groups, unified by some ideology.
A suspension of civil liberties of certain groups is sure to occur.
Civil liberties for the populace at large are sure to be affected.
We have to deal with the question of a war between whom? Who are the
“good” and who are the “bad”?
We have framed counter-terrorism as a political issue (rather than a criminal
one) in large part because of the immensity of the threat (especially considering
the possibility of weapons of mass destruction), but also because of the amount of
resources we are allocating. The latter illustrates a tautology: It must be war
because we are acting like it is.
In some respects, counter-terrorism efforts may be considered similar to the
American war on drugs. Both are amorphous and ill-defined, and the enemy is
often unseen. Both are asymmetric, in that one side must use guerilla tactics
because the other had greater military strength. Both have been politicized, which
probably make them more difficult to win. That is, we have been inconsistent in
the war on drugs (e.g., trading with drug cartels for strategic purposes in
Nicaragua). On other respects, these are different. Terrorism reflects the larger
political problem of how America is viewed by the rest of the world.
Evaluate the generality of models based on similar situations, such as those
that come from organized crime and community policing.

29

Use the data we have about the men who attacked New York and Washington
on 9/11, as well as about Timothy McVeigh. Who knew these men? Who knew
their plans? If such people are identified, why did they not contact law
enforcement?

30

Scenario 3b: Law enforcement must evaluate hoax terrorist threats. They also must
construct media statements about possible threats and false alarms.
Investigators arrest an individual that has made several anonymous terrorist threats
directed toward a city facility. Substantial investigative and security enhancements have
occurred during the course of these threats. No financial or specific demands were ever
made but sufficient credibility was attributed to the caller's threats to generate a
significant investigative and security response, as well as a public notification and
closing of several city facilities. The subject was arrested at a public telephone in the act
of making his third related threat. It has been determined that he never intended nor had
the ability to carry out the events he threatened. Investigators involved in the case have
established rapport with the subject, and he has agreed to be interviewed. The subject
denies any history of mental illness or mental health treatment. City officials are asking
for law enforcement input to developing plans to prevent future hoax terrorist threats.
The responses to these threats have generated major media interest and daily reporting.
Problem: What are the likely motivations and behavioral issues that can be usefully
explored with the person here?
Strategies: Judgments about how to view this situation should include:
Assessment of the person’s perception of disadvantage and their explanatory
ideology or worldview;
Whether the person has a facilitating social network that may move them into
real action;
If they have immigrant status, determination of their fear of deportation;
Determination of their connection to their family either here or abroad;
Determination of the what social groups the individual associates with; if the
individual has a previous record, where and when were they incarcerated?
Problem: City officials are asking for law enforcement input to developing plans to
prevent future hoax terrorist threats. What kind of plan is most effective?
Strategies: A hoax threat can be identified as a hoax only to the extent that city officials
have information from law enforcement so as to adequately evaluate the situation. Direct
channels of communication should be established between city officials, law enforcement
and the media before an event occurs. A standard operating procedure for how to
evaluate the threat and how to alert the public via the media should be established.
The evaluation of incoming information is an issue here. The suggestions offered
earlier with regard to Scenario 1 might be useful.
The decision-making methodology described in Appendix 6 (Decision Trees)
offers a way of standardizing the responses to threats across agencies, and a way of
understanding how decisions to take a threat seriously or not, are made. Thus, this

31

method also allows for a systematic evaluation of threat assessment after the fact, so that
modifications in the decision-making process can occur on a regular basis as necessary.
Problem: What specific recommendations can be made regarding media releases, given
that these threats have generated major media interest and daily reporting?
Strategies:
X It is important to decide how messages to the public should be framed. Part of framing
is to decide whether to focus on risks and vigilance or on prevention, and then to frame
information in one format or the other. That is, do you want people to be vigilant and on
guard, or do you want them to be calm and behave as usual? Different levels of
instruction to the public can be within one context or the other, but which frame is used
should be recognized by those who construct the framing and be apparent to those who
read the messages.
X In interactions with the public and the media, law enforcement can point to events that
have been prevented in the past to make clear that conflict resolution strategies are in
place and are being successful, to reinforce their continued success. The public can be
persuaded with dramatic, personalized accounts of how attacks have been thwarted
(drama is a way to load a message with an emotional account, which greatly affects
processing and retention of information).
X In interactions with the public and the media, law enforcement should distinguish
between prevented events and lack of action. That is, if conflict resolution is successful,
then bad things don’t happen.
X Risk perception and communication is a function of both the speaker and the listener.
What both the listeners and the speakers know and believe should be assessed before any
message is delivered, so that it can be framed within those contexts.
Recommendations for the speakers:
Identify your valued outcomes (e.g., to make sure that the public is properly
alert for people whose activities might indicate some terrorist actions, and
specification of what priority this outcome holds).
Identify the contributing processes (e.g., making people alert will be a
function of previous history, such as degree of exposure and proximity to the
events of 9/11; degree of loss associated with such events; time since such events;
what previous such calls to action have been taken; cultural differences among the
public audience; cultural differences between the speaker and the public
audience).

32

Identify the relevant experts (e.g., engage experts in communication rather
than public officials who command attention because of their position; let the
message reflect those with the best estimates of risk or likelihood of terrorist
activities in that community).
Know what the beliefs, uncertainties, and controversies are among those who
are speaking. Seldom do even the experts all agree. Disagreements must be aired
and, sometimes, be part of the communication. If there is no expertise, it is
important to acknowledge this (for example, this might have been a better strategy
at the beginnings of the anthrax incidents).
Be as consistent as possible – with the caveat that it is better to admit mistakes
than to ignore them.
Find an independent audience to listen to the message and evaluate it for
comprehensibility and efficacy.
Points to know about an audience:
Current beliefs are the basis for future understanding. For example, in an
analysis of how best to communicate with the public in the event of tap water
contamination, it was found that many people thought that simply running the tap
for a long time would be sufficient to rid the water of pathogens, and that in the
event of water contamination, only cold tap water needed to be boiled. Thus, an
effective speaker will know what the audience already knows and believes.
People have limited cognitive capacity. For example, they are better
understanding a scale on one dimension than on two; they will remember a set of
instructions better if each step is associated with the letters of a familiar word.
Thus, keep the message simple.
People use robust but imperfect heuristics. For example, most people think
that there is some significant chance that they will win a state-wide or multi-statewide lottery, even though the odds are extremely low (and this is explicitly
stated); people think that if they get two heads in a row when they toss a coin, it is
more likely that the next coin toss will result in tails. This belief will affect what
people think about the likelihood of future events, such as more terrorist attacks
here in the United States: the longer since 9/11, the less likely more attacks are
likely to be considered possible.
Some concepts are inherently difficult. Low probability concepts are difficult
(as can be seen from the lottery example above). Random probability concepts
are difficult (as can be seen from the coin toss example above). Cumulative risk,
verbal qualifiers (such as “likely”), and experientially unfamiliar events also are
inherently difficult to understand. Avoid these concepts in delivering a message,
or anchor them in concepts that are well understood already.

33

Emotions both confound and support the understanding of risk. Information
that is coded within the context of emotions is likely to be remembered well, but
not accurately. Important aspects of the information will be lost or overshadowed
as a function of the emotional loading. The emotions that are most likely to be
elicited as a function of this country’s recent experiences with terrorism are fear
(direct and indirect effects of terrorism), frustration (with oneself as well as with
authorities), mourning, solidarity, and reflection (about oneself and society).
Consider the emotional content of the message, and whether it should be used to
increase the salience of the general message even though it will decrease
understanding of the details of the message.6

Implications for practice, training and research:
Research on the motivations of people who make vacuous threats is needed. Some of this
already exists within the U.S. Secret Service agency, which investigates more than 2000
cases involving threats or threatening behavior towards the President or another protectee
each year, and where fewer than 2.5% of such cases result in arrest.7 These data could be
used to provide behavioral profiles of the individuals that make terrorist-related threats,
which then could be made available to local law enforcement. This kind of research
could build on the model provided by previous instances of interactions between the
Secret Service and law enforcement that provided law enforcement and justice systems
with guides for forensic decision-making in areas of targeted violence.

6

These analyses of risk perception and communication come from a presentation of one of the Conference
participants, Professor Baruch Fischhoff, Department of Social and Decision Sciences, Carnegie Mellon
University, to the American Association for the Advancement of Science, titled “Science and Technology
in a Vulnerable World: Rethinking Our Roles.” The Omni Shoreham Hotel, Washington D.C., April 1112, 2002.
7
Coggins, M., Reddy Pynchon, M., & Dvoskin, J. (1998). Integrating research and practice in federal law
enforcement: Secret Service applications of behavioral science expertise to protect the President.
Behavioral Sciences and the Law, 16, 51-70.

34

Scenario 4: Three persons are arrested near a nuclear power plant; two refuse to talk
and the third (who recently traveled to Indonesia, Yemen and Germany) will talk.
Three individuals were arrested for trespassing near a nuclear power plant after having
been observed by plant security photographing and sketching the facility. The three
individuals have been separated and interviewed individually. Two individuals appear to
have limited English language skills. They have asked for an attorney and refuse to talk
with police. The third person has signed a waiver of Miranda and is fluent in English.
He has offered weak explanations about their purpose. A passport issued in Saudi
Arabia has been found along with information that he has traveled to Indonesia, Yemen
and Germany in the past two months. His interaction with investigators indicates he is
willing to keep talking to find out as much as he can about what the investigators know
and what his associates may have said.
Problem: How do we work out issues of jurisdiction? For example, here, should the
Nuclear Regulatory Commission and the Immunization and Naturalization Service (INS)
be contacted immediately, as well as the FBI?
Strategies: It is recommended that agencies find a way to assure the necessary levels of
security clearance for front line responders who may need access to critical information.
The efforts by the FBI and CIA to create avenues of information exchange with local
police do not necessarily fit into the operating systems already in place. For example,
police officers may seek to protect their source of information, which means that they
cannot divulge their sources. This in turn means that the information coming from those
individuals cannot be adequately evaluated by anyone except those officers. Although
the FBI and the CIA have created system “tear lines,” below which unclassified
information can be freely exchanged, and “liaison officers” who can help evaluate
information, these may not have had much impact on the operating structure of most
local police departments.
Strategies: It may be appropriate that local police stations are instructed to contact their
regional FBI office, as well as the Department of Homeland Security.
Problem: How do we ensure that local law enforcement has access to all the necessary
languages needed to interrogate people in their own languages, as well as monitor what
these individuals might be saying to each other?
Strategies: A similar challenge exists in the medical profession. Physicians in the
Washington, DC area have a number to call that gives them access to 165 languages. The
same could be made available to police departments across the country. In this way, a set
of instructions about what law enforcement should ask of individuals engaged in such
suspicious behaviors could be made available.

35

Problem: How can we be sure that the procedures that we develop for security do not
also threaten individual rights, one of the hallmarks of the American justice system?
Strategies: Given the current laws of the United States, we could not detain people based
on the evidence given here. The INS could hold them only for as long as it would take
to establish their identity (which implies that the INS investigation should be instigated
immediately). In order to protect individual rights, we must ask the question of whether
we are creating procedures that will be evaluated as protecting our tradition of freedom
only if they work to deter terrorists. If people such as those in the scenario turn out to be
innocent, however, will these procedures mean that we are violating human rights?
Problem: How do we best interrogate such individuals?
Strategies: Conference participants suggested that effective practices on the part of the
interrogation team could include:
Fingerprinting the drawings to assess where they were pointing and then ask
the suspects why they were pointing to those spots.
Using interrogators who are disarming and good at getting others to talk.
Personality is very important in the interrogator. It may be that an American
simply could not develop sufficient rapport with a foreign visitor.
Exploring as many situational variables as possible: if a vehicle was used, was
it rented and were credit cards used? If so, what names do these cards carry and
do the individuals reside at the associated addresses?
Watching for denials and inconsistencies. In order to look for inconsistencies,
it is advisable to make transcripts and then have someone analyze them later.
Noting the order of events as they are described. The truth is likely to be less
chronological than lying.8
Knowing that the best strategy for a terrorist is to not discuss details because
details can be checked; thus, they may not have been given details, or even if they
have, they probably have been advised to stick to one brief story. Innocent
people, however, are likely to tell a lot of details.
8

Does lying look different in a different language? Psychologists have collected data on this question, but
they are limited in scope and the number of different languages investigated. (Some of these studies are
briefly described in Appendix 4, “Psychological evaluations of deception.”) These studies indicate that
people are good at detecting lying in people using a different language and coming from another culture. It
is possible to indicate lying across cultures by using gestures and to make people more likely to think that
you are lying by engaging in weird nonverbal behaviors, such as arm raising, head tilting, and staring.

36

Checking the travel itinerary. Did the others go to those countries as well, and
were any of them detained at any point?
Knowing that even in a well-trained person, being in the moment can take a
person off balance. Thus, it would be effective to implement interrogation
strategies soon after an arrest is made, when the person is most surprised and
emotionally charged. Delay will make it more likely that the person will have
time to construct a reasonable lie and practice it.
Implications for practice, training and research:
There is a need to create, simulate and evaluate an infrastructure for the people who will
be responsible in emergency situations. This requires:
Identification of who those people are (often, these are police or fire
departments, since they are local);
Setting up clean lines of authority and communication before the crisis occurs;
Creating communication lines that are independent of the general public so
that emergency workers can communicate even while cell phones are jammed,
and on the other hand, create ways for family members to contact each other even
when cell phone lines are jammed;
Using what social scientists already know about how best to communicate
information to the public: information should be as comprehensive and accurate
as possible, including admission of ignorance. It should be provided in
recognition that people inflate perceived dangers of disease, overestimate
problems initially and do not think in terms of long-term outcomes, especially
when under pressure to act quickly. However, people also adapt to situations that
are initially viewed as intolerable, in relatively short amounts of time (e.g., how
we have adapted to the high rates of automobile accidents in the U.S. and the high
possibility of sudden death from heart attacks);
Increasing the capacity for treatment of potential disease at local health
facilities apart from quarantine (during the anthrax incidents in 2001 and 2002,
many people did not want to leave the hospital because they felt safe there, thus
crowding the medical facilities);
Anticipating that there is a greater danger of imposing a useless quarantine
than of failing to impose an adequate quarantine, because official agents are afraid
of appearing careless or callous. This makes it likely that those who make the

37

decision will be viewed as incompetent. It also increases risk, because of the
“escape behaviors” that will occur when a quarantine is imposed.9
Making mental health professionals available for both the victims of the
disease and their caretakers;
Offering people coping strategies, such as gas masks, filters, hand washing
information that they can employ at no or little cost and with current technology.
These messages should be framed in terms of benefits, rather than risks; including
bioterrorist events in public education, along with other health information.
Taking advantage of large gatherings of people (e.g., football games) to offer
inoculations;
Making various vaccines and prophylactic medications available to the public
now to avert panic and give people a sense of control.
There is a need to develop rules for law enforcement in emergency situations as
well. These will include decisions as to whether law enforcement should be instructed to
shoot people who try to force their way into or out of quarantine areas subsequent to a
biological attack, and what constitutional rights (no loss of life and no loss of property)
and civil liberties should be ignored and under what circumstances (e.g., being in a
situation where one has to let some people die in order to save a larger group).
The Office of Homeland Security might consider making links to social service
agencies, as well as to the other groups with which it is already associated, to devise
some appropriate strategies.

9

Comments here were that in the event of an evacuation plan, most people will not follow the plan if it
means they cannot go find their family and that “the average guy is not going to stay put if it means
that he would be failing to protect his family.” A report also was offered of an event at B’nai B’rith
Hospital in Washington, DC, during the 2001-2002 anthrax threats. A quarantine imposed because of
a red Jell-O box found with a note saying, “anthrax.” People tried to escape and there was a lot of
trauma, even though the threat turned out to be a hoax. In fact, since humans are not a vector for
anthrax, the medically correct response would have been to let everyone go home.

38

Scenario 5: Improvised explosive device material is found in an apartment. The only
witness to activity there is an alcoholic in withdrawal.
Fire and rescue personnel respond to an explosion and subsequent fire in an apartment
building near an industrial section of the city. Arson investigators determine the cause
and origin to be detonation of an improvised explosive device (IED) in a backpack near
or on the one deceased victim. Investigators found evidence that the detonated IED, and
other unrecovered IED's, were constructed in the apartment. Documents have also been
recovered that indicate that the resident of the apartment recently received inpatient
treatment at a mental health facility in a neighboring state. A neighborhood canvas
located one witness who observed several males in their early- to mid-20's carrying
backpacks leave the residence yesterday. The witness could not further describe the
individuals, stating that he only observed the people for a short period of time and did
not pay close attention to them. Their automobile may have been parked on the street but
the witness cannot be certain. The witness lives on the street and is in alcohol
withdrawal, having been unable to obtain alcohol in the past 48 hours.
Problem: How can law enforcement facilitate good reporting from individual citizens,
including those who might usually provide unreliable information (e.g., distressed
homeless persons, people who were inebriated when they saw the event)?
Strategies: Memories often exhibit what is called “state dependency.” That is, if an
event is perceived while someone is under the influence of a drug (e.g., alcohol), then it is
remembered better if the recall occurs under the same state (that is, while drinking). A
similar effect sometimes has been found to operate for moods – that is, memories also are
recalled better if the person is in the same mood they were in when they acquired the
memory. This poses a potential problem for effectively interviewing people with
histories of the abuse of alcohol or other drugs.
Problem: Can we identify the likely characteristics of suicide bombers in the Middle
East at present, ask how many of the same characteristics (especially, support structures)
might or do exist in the United States, and use these characteristics to identify people who
might be considered at risk? Similarly, can we use what is known about the men who
engaged in the attacks on the United States on 9/11, to offer a likely description of such a
terrorist?
Strategies: Data mining techniques might be useful here. The data mining technique is
useful when someone is confronted with a huge collection of individual items (e.g.,
telephone call narratives, case histories, medical histories, indices of aberrant behavior)
and needs these items be prioritized according to which should be pursued thoroughly. It
also allows the user to find patterns of behavior that are almost impossible for the human
observer to perceive. Importantly, then, this is not just a technique that is faster than a
human. It is a technique that allows a human to view aspects of a large data set that they

39

otherwise would not be able to see, and to discover interesting associations among data in
the database. 10 (Some examples of this technique are in Appendix 5, “Data Mining
Methodology.”)
Problem: How can law enforcement create standard operating procedures that could be
provided to local and regional offices to use when an event like that described in the
scenario occurs?
Strategies: Most real-life decisions involve multiple decision stages – that is, a sequence
of actions that are taken over time. Each action results in some consequence, which then
affects the next action. During the past 30 years, decision researchers have learned a
great deal about the basic principles of multistage decisions, which are represented in
terms of a decision tree. (An example of a decision tree is provided in Appendix 4,
Decision Tree Methodology.) The creation of a decision tree requires the collaboration of
a technical advisor with those who are the recipients of the incoming information (and
will use the decision tree). However, once such a tree is established, using it requires
relatively little technical skill, so that it can be broadly applied.
It is important to note that decision trees, like data mining techniques, serve only
to report to the user, who then makes a final decision regarding action and follow-up. It
is important also to recognize that the use of these techniques can be effective while
maintaining much of the privacy of the person or persons who supplied the information,
thereby not violating civil liberties of the populace at large and protecting important
sources of information.
Implications for practice, training and research
This scenario is an instance where it appears as if the social sciences have the necessary
and useful tools, and law enforcement and intelligence have the data. Research is needed
on how to:
Provide social scientists with the data without compromising security, and
Implement these research tools within the local and national cultures of law
enforcement and intelligence agencies.
Social scientists in Israel have collected data pertinent to the Palestinian suicide
bombers.11 Research in the United States is needed to understand whether similar
conditions exists in this country, and whether such conditions might develop in the
future. Research also is needed as to whether the 19 attackers of September 11 shared
characteristics with the Palestinian suicide bombers.
10

Data mining comes from analyses of self-organizing map (SOM) networks, one of the most important
network architectures developed during the 1980s. The main function of SOM networks is to map the input
data from an n-dimensional space to a lower dimensional (usually one or two-dimensional) plot while
maintaining the original topological relations. Therefore, it can be viewed as an analog of factor analysis.
11
McCauley, C. (in press). Understanding the 9/11 perpetrators: crazy, lost in hate, or martyred? In N.
Matuszak (Ed.), History behind the headlines, Vol. 5. Farmington Place, MI: Gale Publishing Group.

40

Scenario 6 (a-c): How can law enforcement build effective ties to local Muslim
communities, and what can these communities do to mobilize their members to speak out
against terrorism?
(a) FBI behavioral specialists have been requested to provide a local police department
and field office with specific recommendations to improve trust and cooperation within
their large Muslim community. There already have been two incidents of violent
retaliation against members of the Muslim community. These incidents, a homicide and
violent physical assault, remain unsolved. Both incidents are being actively investigated
by the FBI and local police, yet there is very limited cooperation from the victims'
families and the community.
(b) The wealthier families and the Imam of a moderate Muslim mosque are discussing
ways to attract and keep youth involved in religious and community activities. Many of
the community's young people have latched onto other charismatic speakers in mosques
who preach a strident, yet more hopeful sense of rules and order to the basic
interpretation of the Koran.
The families and the moderate Imam are wondering what is the best way to
mobilize the international Muslim community to speak out against abuses of the Koran
and negative perceptions of mainstream Islam. They are also wondering how the
mainstream Muslim community might help in deterring the development of extremist
ideas in mosques.
During this period of time, threats have been made to moderate and mainstream
Muslims. They are being accused of "watering down" the Koran. Several of the
moderates within the Muslin community received various damage to their cars and
homes.
(c) Members of the Muslim community are being harassed and victimized but are
reluctant to report these crimes to the police. In regards to community policing issues,
what strategies can the police use to build effective communications between the Muslim
community and the local, state, and federal agencies? Do the strategies depend on the
gender, age, and education of the community members?
Discussion notes regarding Scenarios 6a, b and c are presented together because of the
similarity of the remarks.
Problem: What can the FBI do to enhance its image with the public in general and with
the Arab-American and Muslim-American communities in particular?
Strategies: Ideally, good relationships with local communities are established before the
community becomes a focal point for investigation or for protection against hate crimes.
It is important to note that a long history of a good relationship between law enforcement

41

and specific communities can be negated almost instantaneously with some real or
perceived breach of faith on the part of law enforcement. In a real sense, law
enforcement seldom gets a second chance, once such a misunderstanding occurs.
Description of a training program for law enforcement agencies is provided in
Appendix 7, “Training Guide for Hate Crime Program.”
Outreach initiatives should include:
X Providing information:
Information should be as accurate as possible, and the manner of presentation
should be as consistent as possible.
If erroneous information is provided, this should be admitted and corrected as
soon as possible.
Law enforcement’s tendency to offer “no comment” in response to inquiry is
almost always taken as evidence that it is trying to hide something from the
community. An alternative response should be crafted, that is individually suited
to the particular issue at hand.
It also can be effective to admit mistakes, in order to provide a basis for
asking for help. The effectiveness of such a strategy may be related to the fact
that it gives the public a perception that it is an active partner in the process, and
not just an entity that is acted on.
It should be recognized that humans have what is called a negativity bias.
That is, they are more affected by bad things happening than by good things
happening. The psychological distance is even greater between bad things
happening and nothing happening (examples of “Psychological Evaluations of
Negativity Bias” are given in Appendix 8). This means that information about the
protections or other service that the FBI and other law enforcement has provided
will not be counted as much or remembered as well as what is done poorly. It
would be useful to reiterate successes as often as possible, both when they occur
and when failures occur.
X Knowing and understanding the perspective of the community towards law
enforcement and other U.S. government agencies. From the political perspective, there
appears to be a significant tendency for the actions of U.S. government agencies to be to
affected by political contributions. Here, this means (to the Arab-American and MuslimAmerican communities) that some groups which should have been shut down after 9/11
were not, whereas those with less political clout were. In discussions with these
communities, law enforcement should be aware of these controversial points and show
sensitivity towards their negative impact.

42

X The community can be contacted via local organizations and groups, including
schools.
X Ideally, law enforcement develops a regular and ongoing outreach initiative, rather
than an erratic one that appears to be responding only to the crisis of the moment. The
model of the beat cop is a good one, although this may be precluded for personnel who
are rotational.
X The lack of FBI presence in most communities – unlike the police – means that people
interpret its presence as “bad news,” rather than as potentially helpful or protective. This
means that the FBI might best work with local law enforcement in communities where it
otherwise is not often present.
X Law enforcement should know that whatever side they embrace, that side might have
its credibility with the larger community compromised. This is a cost of law enforcement
engaging in a public partnership with a community group, which should be considered
before such a strategy is used. Ideally, the potential for such compromise would be
determined before the partnership is considered or made public.
X There was some consensus that the relations with FBI are the good, and that mistrust is
limited to a fairly narrow segment of the Arab-American population. The FBI should
consider taking advantage of, and nurturing relationships with, the majority of ArabAmericans who are willing to trust the FBI and other law enforcement agencies. These
people also are those from whom agents can be recruited.
X See also discussion of Scenarios 1 and 3a.
Problem: What might be the expected impact of the long-term detention policies of
various suspects on the relationship of the Arab-American and Muslim-American
communities with law enforcement?
Strategies: Victimization within the Arab-American community is likely to breed
solidarity. In the current context, use of the indefinite detention policy can be predicted
to seed long-term discontent.
Problem: What can law enforcement and intelligence do to discourage Americans from
joining fundamentalist groups with anti-government agenda?
Strategies: It was recommended that law enforcement conduct information campaigns
that emphasize the:
Disapproval and even condemnation of such movements by respected
Muslim leaders and theologians (thus reducing the cognitive dissonance caused
by opposing or reporting terrorists).

43

Number of Arabs and Muslims who died in the WTC, Pentagon, and other
Islamic terrorist attacks (other than the terrorists themselves, of course, thus
emphasizing in-group solidarity).
Backlash against the larger communities from which the terrorists come,
making their lives more difficult.
The greater probability of success of nonviolent strategies for influencing
government policy and public opinion (reciprocity norms).
Problem: How likely is it that Muslim-American and Arab-American communities will
be assimilated into mainstream American culture, especially as the number of individuals
in these communities grows?
Strategies: Muslims do not need to do much assimilating to get along in U.S. society
because Americans expect very little in the way of conforming behavior. However,
Arabs living in America may feel like they are living in enemy territory because of the
way the United States has positioned itself in the Arab-Israeli conflict. This may serve to
produce conflicts within Arab-Americans who see the United States at war with their
country, and will make it increasingly difficult for law enforcement to enlist the aid of
these communities in counter-terrorism efforts.
Implications for practice, training and research:
Additional research is needed on the extent to which religion was important to the actions
of the 19 men who attacked on 9/11, as opposed to the social, economic, political and
historical conditions that are characteristic of the countries from which they came.
Additional research is needed on the variations of the practice of fundamental Islam as a
function of world region: for example, do the same conditions exist in India and
Indonesia, which also contain large Muslim populations?
As much as possible, this research must be longitudinal, so as to avoid making
conclusions based on only a recent or current analyses of the situation, given that the
social, economic and political conditions of many regions of the world are changing at a
fast rate. To this end, historians and political scientists must be engaged in the research
endeavor.

44

Scenario 7: Effective interview strategies for relatives, friends, or acquaintances of
terrorists or suicide bombers.
Officers and agents are sent overseas to interview relatives, friends, and/or
acquaintances of terrorists and/or suicide bombers. Identify interview strategies to be
utilized with Middle Eastern women, children, and/or relatives of terrorists (e.g.,
nonverbal behaviors, cultural practices, communication styles, gender differences, etc.).
Do these strategies differ depending on the outcome of the terrorist acts (e.g., attempted
terrorist acts vs. accomplished suicide terrorist, etc.)?
Problem: How can we ensure that we have access to reliable information in cases where
the sources of information are overseas?
Strategies: In instances of collecting information from sources that are overseas:
X There should be a mechanism for dealing with the turnover of overseas personnel; for
example, have overlap from one Legal Attaché to the next so that the next person gets the
benefit of the prior appointee there and can meet people through that person.12
X Overseas agents should be aware of the fact that the United States is viewed as a
country that cooperates based on a particular situation (like the current terrorism
situation) but disappears when its issue is resolved. Middle Eastern countries have a
moderate feeling of betrayal when someone comes in and out of their country for shortterm goals.
X Law enforcement agents who operate overseas should be prepared for encountering
more closed societies than in the United States.
X Law enforcement agents should be aware that the expertise of “knowing how to
investigate” (which the FBI has) is different than “knowing about a specific country”
(which the FBI may not have).
X Law enforcement agents should be aware that we are establishing relationships with
other countries now (because of American counter-terrorism efforts) that would
otherwise not exist, and this raises additional questions such as to what extent can we
trust agencies with whom we otherwise would not share information, and how can we
maintain some control over information that is shared?
12

One conference participant noted that, in the United States, with its varied ethnic communities, there are
likely to be people who would be willing (or could be effectively encouraged) to take on an important
position like this for extended periods of time. In the USAF, there are many who desire to remain at
particular overseas locations, sometimes because of marriage, but also sometimes because they embrace the
culture. He recalled comments about the Army's catastrophic rotation policies during portions of the
Vietnam War--just as platoon and company commanders became seasoned and effective (and earned this
badge or that ribbon), they were replaced by "green" commanders.

45

Problem: How should such interviews be conducted?
Strategies:
X Before the interview:
When practicable, interviewing community members should be done in a
neutral location; alternatively, one can change the environment depending on the
goal of the interview: if the person is considered a suspect, provide an
uncomfortable environment; if the goal is to gain information about a specified
third party, or general information about unknown persons, provide a comfortable
environment.
Call before coming to the individual’s home, and avoid going to their place of
work if possible.
Avoid going to a person’s home in the dark.
Be a plain clothed agent, with a discreet but clearly identifiable badge, so that
neighbors or coworkers don’t know what is happening.
Know the rules and nuances of the culture of the person being interviewed,
especially of rules that are differentiated on the basis of gender. Understand what
important nonverbal behaviors exist for that particular culture. For example, what
is the personal space allowed between strangers, between friends, or between men
and women?
Know the attitudes of that person’s community as expressed verbally. One
person’s “suicide bomber” is another person’s “martyr.”
X The course of the interview:
Avoid expressing one’s own bias (e.g., sympathy or distress) until it is
determined how the community members feel about the person who is being
interviewed or about whom information is being sought. Recognize that emotions
may be complex: the family members of the men who attacked New York and
Washington on 9/11 were likely to feel both anguish and pride. In some respects,
the greater the grief, the greater the need to take pride (in order to support and
justify the loss).
Begin with whole family present, and then see if any individual member
appears to want to provide more information, apart from the family;

46

Understand that most people who are being interviewed want to help, despite
what group they apparently belong to;
If people think that they are part of a screening process, rather than being
treated as a friendly source, they are less likely to cooperate.
Be fully briefed before the interview, with relevant data from FBI, CIA, INS,
etc., and with data from various sources cross-referenced.
X Information to be sought and given via interviews:
Whether the person who perpetrated the attack was considered part of the
family – i.e., in touch with the family;
Whether the person felt as if they had alternative behaviors available to them,
or did they feel stuck in that pursuit?
How does the family regards this person? Are they proud, or ashamed? Do
they distance themselves from the person?
Sometimes it may be useful to remind the party, or at least offer for their
consideration, the possibility that they may be being used by the larger cause.
X Have experts (including anthropologists, State Department) put together a DO’s and
DON’T’s bullet point sheet describing these rules. Provide these to local law
enforcement agencies, not just FBI or other regional agencies.
Problem: What are the best tactics of finding terrorists?
Strategies: Long-term, there are three possibilities: accidental discovery, interrogating or
screening an entire community (as the British did with the IRA), or detaining entire
communities (as the Americans did for the Japanese). Corresponding to the latter two,
law enforcement runs the risk of “frying the little fish and losing the big fish” (there may
be some parallel with anti-drug campaigns).
Both screening and detention run the risk of alienating the very people that are
needed to help. The paradox is that the more you treat a certain group as a stereotype, the
more they will conform to that stereotype. The British found that with the IRA, when
someone was harassed, jailed, or killed, there was a corresponding increase in sympathy
for the IRA from the community commensurate with the extent of the event.

47

Implications for practice, training and research
There is an increasing number of methods for detecting lies that appear to be crosscultural. These include using facial expressions as clues to deception13 and establishing a
baseline behavior of which the interviewee is unaware, changes in which can then be
used to assess the truthfulness of responses to set questions.14 These methods need to be
evaluated in the situations in which law enforcement and intelligence agencies encounter
potential informants.
Data on the differences between those who are willing to risk their lives for a political or
moral ideology and those who are not, are available by review of combat training
protocols and the men and women who go through them. Rather than view the suicide
bomber as a relatively aberrant person, we might consider that he or she has much in
common with members of the armed forces that agree to put themselves in positions of
great risk – and especially with individuals who have engaged in activities that were
viewed as highly lethal. What can these people tell us about their motivations, fears, and
support groups that were important to their behaviors? How might their behaviors be
investigated so as to provide an understanding of the differences between the hero/martyr
and the soldier who is not willing to put himself or herself at such risk?

13

Ekman, P., & Friesen, W. (1975). Unmasking the face: A guide to recognizing emotions from facial
clues. NY: Prentice-Hall; Ekman, P. & Friesen, W. (1978). The Facial Action Coding System. Palo Alto,
CA: Consulting Psychologists Press.
14
Sokolov, E. N; Cacioppo, J. T. (1997). Orienting and defense reflexes: Vector coding the cardiac
response. Lang, P. J. & Simons, R. F. (Eds.); et al. , Attention and orienting: Sensory and motivational
processes, pp. 1-22. Mahwah, NJ: Erlbaum.

48

Additional issues for practice, training and research
There were many questions and issues raised either in discussions that were tangential to
the scenario focus sessions, or in the plenary session that occurred at the end of the
conference day. These included:
Can we characterize the relationship between culture and religion for the Saudis and
Palestinians in the same manner as we do for that relationship among Americans?
How can we make use of someone who has family or other close contacts with terrorist
groups?
How can law enforcement most effectively deal with the various culturally determined
attitudes about women that might be found in Muslim-American communities? How
might this limit or affect the efficacy of women officers?
How should response on the part of the teacher and law enforcement (in the instance of
scenario 2c) depend on the country of origin of the child? How might we educate people
both to know more about countries from which terrorists are likely to emerge, or – given
the international characteristics of such – to look for indices that cross cultural
boundaries?
How can we document the experiences and views of recent Arab- and Muslim-American
immigrants?
How might law enforcement might make use of the U.S.A. Freedom Corps?
How can we document the integration practices and outcomes in European communities?
How can we document how Arab- and Muslim-American communities deal with crime
within their communities?
What happens to people (psychologically and socially) when they inform on someone in
their own community?
Does admitting vulnerability engender trust? How can law enforcement agents use this
strategy, if it is effective, without compromising important information?
What are the effects of the U.S. policy position towards Israel on the Arab-American
community?
What is the role of misogyny in fundamental religious groups (especially, fundamental
Islam)?

49

How do terrorists cope with multiple, and perhaps quite conflicting, motivations? The
empirical evidence suggests that, like soldiers, they may be troubled by the acts of
violence they feel necessary to their cause.
Some cultures are explored more than others, some almost not at all. Cross-cultural
research needs to increase, but with attention as to how it grows and what cultures
become better understood in comparison to the parent cultures in which most
psychologists reside.
A phenomenon that may be grossly under explored by psychology is diaspora or "longdistance" nationalism. Long-distance nationalism provides funding for a number of
violent (as well as non-violent and charitable) organizations, both with and without
contributors' knowledge.
How will the strategies the FBI and police utilize to build effective communication
between the Muslim- and Arab-American communities and the local, state, and federal
agencies, depend on the gender, age, and education of the community members, or the
gender, age and education of the law enforcement agent?
Where within the United States might there be conditions that would support suicide
bomb attacks of the sort that are part of the conflict between the Palestinians and Israelis?

50

Conference Participants
Catherine B. Ahmad: FBI, Washington, DC.
Larry G. Ankrom: Behavioral Assessment Unit, West Region, NCAVC, FBI Academy,
Quantico, VA.
Stephen Band: Behavioral Science Unit, FBI Academy, Quantico, VA.
Lara Baranowski: FBI, Washington, DC.
Constance Barrett: FBI, Washington, DC.
Stephen Behnke: Ethics, American Psychological Association, Washington, DC.
Robert L. Benson: Office of Security, NSA Headquarters, Fort Meade, MD.
Bev: CIA, Langley, VA.
Kristen R. Beyer: Child Abduction and Serial Murder Investigative Resources
Center, NCAVC, FBI Academy, Quantico, VA.
George Bonanno: Department of Psychology, Columbia Teachers College, New York, NY.
Charles F. Bond Jr.: Department of Psychology, Texas Christian University,
Fort Worth, TX.
Susan E. Brandon: Science Directorate, American Psychological Association,
Washington, DC.
Alan C. Brantley: Behavioral Assessment Unit, West Region, FBI Academy, Quantico,
VA.
Frank Cilluffo: Office of Homeland Security, Washington, DC.
Charlotte A. Council: Philadelphia Police Department; currently in Leadership,
Management and Science Unit, FBI Academy, Quantico, VA.
Laurence A. Cove: OTI/VIDMAC, Washington, DC.
Dave Crane: Counter-terrorism Division, FBI Academy, Quantico, VA.
Edward F. Davis: Behavioral Science Unit, FBI Academy, Quantico, VA.
Raymond Davis: Criminal Investigations, Stafford County Sheriff’s Office,
Stafford, VA.
Dickson S. Diamond: FBI, Washington, DC.
Jonathan Drummond: Department of Psychology, Princeton University, Princeton, NJ.
Victoria M. Esses: Department of Psychology, Social Science Centre, The University of
Western Ontario, London, Ontario.
Stephen Etter: Behavioral Assessment Unit, East Region, NCAVC, Quantico, VA.
Baruch Fischhoff: Carnegie Mellon University, Pittsburgh, PA.
James R. Fitzgerald: Behavioral Assessment Unit, East Region, NCAVC, FBI Academy,
Quantico, VA.
Joseph D. Foelsch, Jr.: FBI NY Brooklyn-Queens RA; Brooklyn, NY.
Sy Frenkel: (formerly) Defense Intelligence Agency
Deborah Frisch: Decision, Risk and Management Sciences, The National Science
Foundation, Arlington, VA.
Barry Galfano: Emergency Service Unit, Edwards Hall, Floyd Bennet Field, Brooklyn, NY.
Melvin Gravitz: George Washington University, Washington, DC.
James Griffin: Social and Behavioral Sciences, Office of Science and Technology Policy,
Washington, DC.
Rebecca Hackney: Arlington County Police Department, Arlington, VA.

51

Khalil Jahshan: National Association of Arab-Americans, Washington, DC.
Heather Kelly: Science Public Policy Office, American Psychological Association,
Washington, DC.
Harry Kern, Behavioral Science Unit, FBI Academy, Quantico, VA.
Stephen Khoobyarian: Security Battalion, Marine Corps Base, Quantico, VA.
Kate Kilham: Professional Development Unit, FBI Academy, Quantico, VA.
Robert Kinscherff: Law and Psychiatry Service, Massachusetts General Hospital; Boston
Juvenile Court Clinic; Harvard Medical School, Boston, MA.
Arie Kruglanski: Department of Psychology, University of Maryland, College Park, MD.
George Loewenstein: Department of Social & Decision Sciences, Carnegie Mellon
University, Pittsburgh, PA.
Ian Lustick: Department of Political Science, University of Pennsylvania, Philadelphia, PA.
Martin Lustick: Operations for the Mid- Atlantic Permanente Medical Group,
Washington, DC.
Carlos Maldinado: New Mexico State Police, currently at Leadership, Management and
Science Unit, FBI Academy, Quantico, VA.
Clark McCauley Jr.: Department of Psychology, University of Pennsylvania; Solomon
Asch Center, Philadelphia, PA.
James McEniry: Emergency Service Unit, Edwards Hall, Floyd Bennett Field, Brooklyn, NY.
Faith Mitchell: Division of Behavioral and Social Sciences and Education of the National
Academy of Sciences/ National Research Council, Washington, DC.
James Mitchell: CIA, Langley, VA.
Geoffrey K. Mumford: Science Public Policy Office, American Psychological
Association, Washington, DC.
Kenneth Myers: Professional Development Unit, FBI Academy, Quantico, VA.
Eric Niederman: Transportation Security Agency, FAA, Washington, DC.
Brendan O’Leary: Department of Government at the London School of Economics and
Political Science; Department of Political Science, University of Pennsylvania,
Philadelphia, PA.
Keith Perrigan: ATSAIC/USSS Intelligence Division, Washington, DC.
Anthony J. Pinizzotto: Behavioral Science Unit, FBI Academy, Quantico, VA.
Stephen Romano: FBI Crisis Negotiation Unit, NCAVC, FBI Academy, Quantico, VA.
Carol S. Rosenblum: CTC Senior Psychologist, Potomac, MD.
Marc Ross: Department of Political Science, Bryn Mawr, Philadelphia, PA.
Paul Rozin: Department of Psychology, University of Pennsylvania; Solomon Asch
Center, Philadelphia, PA.
Denyse Sabagh: Attorney and Counsel, National Association of Arab-Americans,
Washington, DC.
Eldar Shafir: Department of Psychology, Princeton University, Woodrow Wilson School
of Public and International Affairs, Princeton, NJ.
Kareem W. Shora: Legal advisor, National Association of Arab-Americans,
Washington, DC.
Michael W. Smith: State Department, Arlington, VA.
Marla Sommerstein: American Psychological Association, Washington, DC.
Peter Suedfeld: Peter Wall Institute of Advanced Studies, University of British Columbia,
Vancouver, British Columbia.

52

Howard Timm: Defense Personnel Security Research Center, Monterey, CA.
Karl St. Valsson: Iceland Federal Police, currently at Leadership, Management, and
Science Unit, FBI Academy, Quantico, VA.
Barbara Wanchisen: The Federation of Behavioral, Psychological, and Cognitive
Sciences, Washington, DC.
David O’Neil Washington: APA Congressional and Executive Branch Fellow,
Washington, DC.
Ron Wasson: Emergency Service Unit, Edwards Hall, Floyd Bennett Field, Brooklyn, NY.

53

Appendix 1: Information Management and Evaluation
Information Management and Evaluation Systems – an example
The words that people use in communication are ill suited to standard word-based
search engines. Frequently, new uses are invented for old words, ambiguous terms are
used (the word “strike,” for example, has more than 80 definitions), and multiple words
are used to refer to the same idea. People also constantly categorize, but these categories
are unstable both from individual to individual and from time to time, depending on the
user’s needs and interests. In short, human language is fuzzy and it requires fuzzy tools to
deal with its meaning.
The problem is that most knowledge management tools are based not on how
people use words, but on a symbolic approach to documents, where each word in a
document is a symbol with a discrete and specific meaning. As a result, document
retrieval systems that depend on the presence of exact words fail to retrieve relevant
documents.
Biomimetic information management systems provide those fuzzy tools by using
neural networks and other soft-computing techniques that emulate the way biological
brains work. These systems also are self-organizing and do not require the laborious
construction of rigid, expensive, prestructured rule bases. The result is an ad hoc
categorization system that adapts itself to the intelligence problem at hand. The
technology learns the meanings of words from the documents it indexes and can
recognize the relevance of particular words or phrases based on their meaning. For
example, if an investigator wants to search a document for the word “undercover,” the
system will not only indicate each place that the word “undercover” is used but also will
find phrases such as “secret agent” or “covert operative.” These systems are
independent of the language in which the documents being searched are written.
Kintsch, W. & Keenan, J. (1973). Reading rate and retention as a function of the
number of propositions in the base structure of sentences. Cognitive Psychology, 5, 257274.
Barsalou, L. W. (1987) The instability of graded structure: Implications for the nature
of concepts. In U. Neisser (Editor), Concepts and conceptual development, (pp. 101140), Cambridge: Cambridge University Press.
Roitblat, H. L. & Henning, M. J. (1992) Connectionist investigations in language.
International Congress of Psychology, Brussels, July, 1992, and Roitblat, H. L. (2001)
Biomimetic Systems for Information Retrieval. In M. E. Williams (Ed.) Proceedings of
the 22nd National Online Meeting (pp. 423-430). Medford NJ: Information Today.
Herbert L. Roitblat, Ph.D., at DolphinSearch, Inc. (herb@dolphinsearch.com).

54

Appendix 2: Communications Technologies
Domestic Emergency Response Information System
One of the most critical problems in emergency response is the lack of
interoperable communications. No authority exists to arbitrate the choice of
communications systems across different community agencies (e.g., police, fire, or
medical) or the choice of systems across the same agency in neighboring jurisdictions.
This problem is compounded where support components (e.g., National Guard or military
units that may be charged with civil support) are involved.
The Domestic Emergency Response Information System is a set of interoperable
communications technologies designed to support emergency responses among multiple
organizations under crisis conditions. Space and Naval Warfare Systems Command
Center (SSC) – San Diego has been charged by Office of the Assistant Secretary of
Defense with testing this system. The tests will include scenario development and the
establishment and maintenance of agency liaisons. To this end, SSC is working with a
consortium of private industry participants to develop scenarios that are relevant,
realistic, and appropriate to the information needs of the sponsor. This is being
accomplished by soliciting the input and approval of representatives from each
participating agency, as well as related stakeholders (e.g., city government).
The most difficult dimension of the evaluation of the introduction of new
technologies into group settings is social. These settings can be complex, especially
when they involve life-critical missions; such settings typically have well-defined
procedures and values that must be respected. The challenge is to evaluate system
performance in terms of support to an existing context, as well as to project changes to
that context that might be enabled by system use. Effective evaluation must establish
credibility and the buy in of agencies that typically are not the subject of technology
testing efforts. It must ensure that required data can be collected from conditions
embedded in an otherwise free-flowing timeline. It must accommodate the impact of
technologies on operating concepts; i.e., address the impact of new systems on current
task procedures and social interactions, and make that impact explicit. Finally, it must
ensure that data are collected in such a way that results may be compared with other
similar testing efforts.
The Domestic Emergency Response Information System is being developed under
the sponsorship of several companies by SCC – San Diego: murrays@spawar.navy.mil.

55

Appendix 3: Community Policing Models
Models of Community Policing
A series of strategies begun in the early to mid-1990s in Boston to address
violence among youth and the illicit gun market are given credit for greatly reducing
homicides, especially among the youth. The plan relied on:
The police generally adopting an active presence in the community within a
community policing model rather than a reactive model in which police simply rode
around in their cars and responded to emergency calls.
Creation of a specific group of officers into an anti-gang unit that was specially
trained to rely on street intelligence gathered by uniformed officers, and develop their
own sources of information within the (mostly) inner city area of Boston where gangs
were thriving.
Creating relationships with persons who lived in the community in order to address
an existing sense that the police were hostile and more of an "occupying force" in the
neighborhood and less of a balanced and fair law enforcement presence; and
Creating relationships with federal law enforcement agencies to coordinate activities
focused upon suppression of gang-related criminal activities. The end result of this way
of conducting police business substantially contributed to the activities of others in the
community in creating the so-called "Boston Miracle," the effective suppression of very
high rates of gang-related homicides and other gang-related crime between about 1987
and 1998.15 Boston, New York City and other municipalities developed and implemented
this model.
Another model is the National Institute of Justice’s Crime Prevention Through
Environmental Design (CPTED). CPTED emphasizes a problem-solving approach to
crime prevention as well as a close cooperation between police and residents in reducing
both crime and fear of crime. Police, citizens, and government have a role to play: police
on foot patrol in neighborhoods and working with community groups; residents working
together to improve neighborhood appearance and deter criminals; government using
building codes and inspection power to increase environmental security and discourage
drug use and other criminal activities. The basic principles of CPTED include target
hardening (controlling access to neighborhoods and buildings and conducting
surveillance on specific areas to reduce opportunities for crime to occur) and territorial
reinforcement (increasing the sense of security in settings where people live and work
through activities that encourage informal control of the environment).

15

The number of homicides dropped from 152 in 1990 to 59 in 1996, and there was a 29-month period that
ended in 1998 when there were no teenage homicides.

56

Most community policing models include the decentralization of police services,
the collaboration of police departments with other city agencies (such as parks or utility
departments) to resolve problems, and regular police-citizen dialogues about perceived
problems.

57

Appendix 4: Psychology of Deception
Psychological Evaluations of Deception
Bond, Charles F. Jr; Atoum, Adnan Omar (2000). International deception.
Personality & Social Psychology Bulletin. Vol. 26(3), 385-395.
This article describes three studies of international deception. Americans,
Jordanians, and Indians were videotaped while lying and telling the truth, and the
resulting tapes were judged for deception by other Americans, Jordanians, and Indians.
The results showed that lies could be detected across cultures. They were detected across
cultures that shared a language and across cultures that did not, and by illiterates as well
as by university students. Perceivers showed no general tendency to judge persons from
other countries as deceptive; in fact, they often judged foreigners to be more truthful than
compatriots. There was, however, some evidence for a language-based ethnocentrism
when perceivers are judging the deceptiveness of a series of people from the same
multilingual culture.
Bond, Charles F; Berry, Diane S; Omar, Adnan (1994). The kernel of truth in
judgments of deceptiveness. Basic & Applied Social Psychology. Vol. 15(4), 523-534.
This article describes an investigation of the relationship between appearancebased impressions of honesty and individuals' willingness to engage in deceptive
behaviors. Neutral-expression photographs were taken of 133 study participants, and
these photographs were judged by other participants for whether the person looked honest
or dishonest. The study participants then were provided with an opportunity to engage in
deceptive behavior. Participants who were rated as looking dishonest by the third parties
(via the photographs), were more likely to volunteer to participate in research that was
described as requiring deception than were participants who were perceived to look
honest. The results suggested that naive judgments of deception are more accurate than
has been supposed.
Bond, Charles F; Omar, Adnan; Pitre, Urvashi; Lashley, Brian R; et al. (1992).
Fishy-looking liars: Deception judgment from expectancy violation. Journal of
Personality & Social Psychology. Vol. 63(6), 969-977.
To explain how people judge that others are lying, the expectancy-violation model
is proposed. According to this model, deception is perceived from nonverbal behavior
that violates normative expectation. To test the model, three experiments were conducted,
two in the United States and one in India. In each experiment, people described
acquaintances while exhibiting weird nonverbal behaviors, such as arm raising, head
tilting, and staring. Other people watched the videotapes of the descriptions and made
deception judgments. Consistent with the expectancy-violation model, both American
undergraduates and Indian illiterates inferred deception from weird behaviors, even
when the people were telling the truth.

58

Appendix 5: Data Mining
Data Mining Methodology is a way of looking through large amounts of information to
find particular bits of information. The “looking through” can be done by computer.
Once the computer finds what it is looking for, it will sound an alarm or alert a human
operator, who can then judge whether the item is what was wanted. Also useful is the
fact that this methodology allows for a record of the search process, so that patterns of
object or item occurrence can be stored and graphed. This pattern-creation is an aspect
of the methodology that humans simply cannot perform on their own because of the very
large amount of information that must be processed simultaneously.
The methodology has been developed largely by businesses to help with
marketing, but it has also been useful to the medical profession and has real potential to
law enforcement and intelligence operations.
Shaw, Michael J; Subramaniam, Chandrasekar; Tan, Gek Woo; Welge, Michael
E. (2001). Knowledge management and data mining for marketing. Decision Support
Systems. Vol. 31(1) 127-137.
Due to the proliferation of information systems and technology, businesses
increasingly have the capability to accumulate huge amounts of customer data in large
databases. However, much of the useful marketing insights into customer characteristics
and their purchase patterns are largely hidden and untapped. A systematic methodology
that uses data mining and knowledge management techniques is proposed to manage the
marketing knowledge and support marketing decisions. This methodology can be the
basis for enhancing customer relationship management.
Dennis, Charles; Marsland, David; Cockett, Tony. Data mining for shopping
centers--Customer knowledge-management framework (2001). Journal of Knowledge
Management. Vol. 5(4), 368-374.
The question was what specific attributes of shopping centers were most
associated with spending for subgroups of shoppers. About 300 shoppers at six shopping
centers were interviewed. They were asked for comparative ratings of the shopping
center where the interview took place, as well as of the one where they shopped the most
(or next most) for non-food shopping. Participants also rated the importance of 38
attributes, provided estimates of travel distance and time to each shopping center, and
gave details such as monthly spending at each center. Conventional demographic
variables were examined (females vs. males, upper vs. lower socioeconomic groups,
higher vs. lower income groups, older vs. younger shoppers, and shoppers traveling by
car vs. those traveling by public transport). Data mining (cluster analysis) identified two
subgroups of consumers sharing particular needs and wants: those for whom service was
important, and those for whom particular shops were important. These two subgroups
differed in terms of high vs. low spending. These results demonstrate that data mining
from a simple dataset can identify high-spending target consumers. Aspects of customer
knowledge management for shopping centers are considered.

59

Appendix 6: Decision Trees
Decision Tree Methodology: Decision trees can be used to help make decisions. The
idea is to concretely identify the choice points and map the sequence of decisions from
beginning to end. The advantage is that how a decision is made is made explicit, and
others can use the decision tree if faced with the same questions.
DESCRIBES PLOT TO ATTACK
p = .1
INTERROGATE

1
p = .8

ARREST

NO EVIDENCE OF PLOT

2

2

p = .1

1

RELEASE

NO EVIDENCE
OF PLOTTING

1

SURVEILLANCE

PLACE
COVERT
AGENT

p = .2

p = .1

MEETS WITH
KNOWN
TERRORIST

AGENT
KILLED

4

SENT TO
GUANTANAMO
p = .8

p = .1
NO SURVEILLANCE

1

ARREST
ALL
SUSPECTS

10

3

2
p = .1

3

DISCOVER
PLANS TO
ATTACK

2

p = .8

DON'T
ARREST

10

-3

2

4
p = .6
RELEASED
ON BAIL

1

A decision tree is started with a decision that must be made: whether or not to
arrest a suspect. A square (representing this decision) is drawn on the left hand side of
the paper. From this box, lines are drawn out towards the right for each possible solution,
and the solutions are written along those lines. At the end of each line, the results are
considered. If the result is outside the decision-maker’s control – that is, if nature makes
the next move – then a circle is drawn at the end of the line. If the result is another
decision, a square is drawn. If there is a final consequence, a solid dot is drawn.

60

(Decision trees, continued)
The procedure for choosing a decision strategy from a decision tree is called
backward induction analysis. This analysis can be summarized as follows: First, each
terminal node (marked by the black dot) is assigned a number that represents the worth or
utility of the final consequence to the decision maker. For example, at the top of the
figure above, the consequence of “describes plot to attack” is given a high value of 10; at
the bottom right hand corner, the consequence of “released on bail” is given a low value
of 1. Second, each event node (the circles) is assigned a sum that represents the expected
utility of the node. This is the weighted average utility of the event node – for node (1)
for example, this is the consequence of “describing a plot to attack” multiplied by the
likelihood of that outcome (p) which is estimated at 1/10 or 0.1, or 10*0.1=1.0, plus the
consequence of “no evidence of plot” multiplied by the likelihood of that outcome (p)
which is estimated at 8/10 or 0.8, or 2*0.8=2.6, that is, [10(.10)+2(.8)=2.6]. Finally, each
decision node is a assigned a number that is the maximum value of the nodes that branch
out from it. Thus, for decision [2], since 2.6>1(.1), at decision point [2]. “interrogate” is
the best choice.
Working from right to left, these calculations are:
3

10(.2) + [-3(.1)] = 1.7

4

2(.8) + 1(.6) = 2.2

4

2.2>1.7 so choose (4). This means cutting off the top branch after
decision [4] and planning to move from decision [4] to event node (4).

2

Since 2.2>2(.8), move from (2) to [4].

3

Since 2.2>1(.1), move from [3] to (2).

1

10(.1)+2(.8)=2.6

2

Since 2.6>1(.1), move from [2] to (1).

1

Since 2.6>2.2, move from [1] to [2].

The value of decision trees are (1) the choices are made very explicit; (2) each choice is
explicitly evaluated in terms of the importance of its outcome and the probability of that
outcome; (3) how a decision will be made – or was made – can be communicated to
another person. As with any technique or tool suggested here, decision trees can be used
to guide decisions, not make them. The final decision is left up to the operator.

61

Appendix 7: Training Guide for Hate Crime Training Program
Training Guide for Hate Crime: Data Collection. Summary Reporting System,
National Incident-Based Reporting System (1997). U.S. Department of Justice, Federal
Bureau of Investigation: Criminal Justice Information Services Division.
The material in this training guide is intended to assist law enforcement agencies
in establishing a hate crime training program for their personnel. It was written in
response to the Hate Crime Statistics Act of 1990 and the amended Hate Crime Statistics
Act of 1994, which mandated that the Attorney General establish guidelines and collect
data about hate crimes as part of the FBI’s Uniform Crime Reporting.
Three learning modules are presented, intended for use in instruction of law
enforcement personnel on hate crime variables. Learning Module One: “The Social
Psychology of Prejudice,” is an introduction to the social psychology of prejudice, and
instructs the student to look at the relationship of bias to stereotypical beliefs, prejudicial
attitudes, and discriminatory behavior. Learning Module Two: “Bias-Motivated Crimes
– Definitions & Procedures,” provides definitions of the terms law enforcement personnel
need to know in dealing with hate crimes. The module describes a two-tier review
process, whereby incident is reviewed both by the responding officer and by a second
officer or unit with greater expertise in hate crime incidents. Learning Module Three:
“Case Study Exercises of Possible Bias-Related Crimes,” gives the student officer an
opportunity to apply their knowledge of hate crime to hypothetical cases.

62

Appendix 8: Psychology of Bias
Psychological Evaluations of Negativity Bias: psychologists have discovered that there is
a tendency for humans to give greater weight to negative events than positive events.
This should be considered when public officials are trying to communicate strategies for
protecting against attacks or coping with the outcomes of attacks.
Rozin, Paul; Royzman, Edward B. Negativity bias, negativity dominance, and
contagion (2001). Personality & Social Psychology Review. Vol. 5(4), 296-320.
These investigators found that there is a general bias, based on both innate
predispositions and experience, in animals and humans, to give greater weight to
negative events or attributes. This is evident in four ways: (a) negative potency
(negative entities are stronger than the equivalent positive entities), (b) steeper
negative gradients (the negativity of negative events grows more rapidly with
approach to them in space or time than does the positivity of positive events), (c)
negativity dominance (combinations of negative and positive entities yield
evaluations that are more negative than the algebraic sum of individual subjective
evaluations would predict), and (d) negative differentiation (negative entities are
more varied, yield more complex conceptual representations, and engage a wider
response repertoire). The authors review this taxonomy, with emphasis on negativity
dominance, including literary, historical, religious, and cultural sources, as well as the
psychological literatures on learning, attention, impression formation, contagion,
moral judgment, development, and memory. They suggest that one feature of
negative events that make them dominant is that negative entities are more
“contagious” than positive entities.
Stewart, Dennis D. Stereotypes, negativity bias, and the discussion of
unshared information in decision-making groups (1998). Small Group Research, Vol.
29(6), 643-668.
These investigators examined how stereotypic expectancies and the negativity
bias (the tendency to use negative information more than positive information) made
groups less likely to overlook unshared information. In the first study, 51 university
students were asked to rate applicants in terms of the likelihood of hiring, likelihood
of success, likelihood of promotion, starting salary of the applicant, and the amount of
effort that the applicant would put into the position by examining application
materials and interview notes compiled by the researchers for either a male or female
applicant. Results indicated that a stereotype was activated and resulted in
individuals rating a male applicant higher than a female applicant for a masculine
gender-typed position. In the second study, groups (rather than individuals) assessed
the same information as in the first study. No effects for stereotypic expectancies
were found in the group decision-making task, but the negativity bias was found to
increase the discussion of both shared and unshared information.