Driverless Car image for Cop without Client

Cop without a Client – a perspective on public safety in an age of unstoppable cars (by Aristotle Wolfe)

I am a California highway patrolman, and this is what I know. I know that driving is dangerous, and I know that people are fallible, a combination that results in over 30,000 deaths a year on our nation’s highways. I also know that criminals drive those highways, and I know how to find them, even when I am just trying to keep the roads safe. I know that, when I do my job well, less people die and more criminals go to jail. I also know that this may change someday. In the future, cars will drive themselves, and when they do, our highways are going to be safer than I can make them today. I know that will change my job, but I don’t know how. I think driverless cars are going to save a lot of lives, and I think that is good. But I also think there is space in this new, safer world for criminals—and terrorists—to move more freely than they do today, to commit crimes we have not yet imagined, with fewer traffic cops out there to stop them. And I think we all need to do some thinking on that.

Autonomous vehicles (AVs) are already driving on some of the nation’s streets and highways. This technology is advancing quickly and will likely diffuse rapidly throughout society. AVs are expected to reduce traffic collisions and prevent motorist deaths, but only if those motorists become passengers, not drivers, thus eliminating the human error that causes most accidents. With the traffic safety benefits of the AV, there will be little need for the traffic enforcement conducted by police and highway patrol agencies across the country today. Yet traffic stops are the most common form of face-to-face contact between police officers and citizens, and traffic enforcement has been a form of crime detection, deterrence and disruption in this country since the dawn of the conventional automobile.

There are myriad examples of crimes discovered during traffic stops, including those of some infamous criminals and terrorists. Serial killer Ted Bundy was arrested over a traffic violation while driving a stolen vehicle, even though he was not immediately connected to his more nefarious and gruesome crimes. Oklahoma City bomber Timothy McVeigh was pulled over after the bombing because he was driving a vehicle without license plates, and then arrested for carrying a concealed firearm. Only days later was it discovered that a traffic stop had led to the apprehension of a man responsible for the deaths of 168 people. Similarly, a sharp New Jersey State Trooper arrested Chinese Red Army terrorist Yu Kikumura after observing him act suspiciously and then drive unlawfully at a service area near the New Jersey Turnpike. The stop uncovered plans and bomb-making materiel that led to Kikumura’s conviction for plotting to blow up a Navy recruiting station in Manhattan.

While examples such as these are illustrative of the power of the traffic stop as a criminal interdiction tool, local traffic and highway patrol officers are not deployed primarily to fight crime. Their mission is to keep streets and highways safe by reducing traffic accidents, and they are permitted to stop a vehicle a violation of any traffic law—no matter how minor the infraction—because the public believes in that mission. Because of this support, the traffic stop has historically been afforded great latitude in the courts, which have granted significant discretion for officers to stop vehicles, detain drivers and conduct searches based on lower standards of reasonable suspicion or probable cause than apply to buildings, residents and persons.

But it is hard to envision a future in which traffic officers are deployed to enforce traffic laws when driverless cars rarely violate those laws, especially if those infrequent violations seldom result in traffic collisions. It is equally unlikely that officers will have the same discretion they do today to detain and search vehicles or the passengers inside them. As criminals, including terrorists, adopt AV technology, they will be able to move contraband, including weapons and improvised explosives, in vehicles with little fear of detection. In fact, they will not even need to be in a car themselves, as AVs will be able to drive unoccupied. Furthermore, when officers develop probable cause to stop an occupied AV, they might not be allowed to question the occupants, as early AV policy has determined that the software itself can be considered the “driver” of the vehicle. Though the “vehicle exception” to the Fourth Amendment’s search warrant requirement would still apply, it would be difficult for police officers to establish probable cause for such searches without a reason to question passengers whose license status, driving habits or sobriety has little or no bearing on traffic safety.

It would be unrealistic to overstate the traffic stop’s power to detect crime or terrorism. There is no doubt that many criminals are released from traffic stops with nothing worse than a ticket, while greater crimes went undetected by officers who either failed to notice them or were not presented sufficient probable cause to delve deeply enough to discover them. Furthermore, future technology will present new opportunities for police to solve crimes—AVs are going to interact with cyber-physical systems built into the transportation infrastructure of the future, as well as with limitless services based on personal computing and Internet-of-things platforms.

But solving crimes is not the same as detecting them. The capacity of traffic enforcement to interdict crime is not easily measurable, but there are indicators that it is effective. In 2014, the California Highway Patrol—a department whose primary mission is traffic enforcement—made 8,400 felony arrests, most of which resulted from traffic stops. In 2015, traffic enforcement operations focused on drug interdiction resulted in the seizure of approximately ten tons of marijuana, 526 kilograms of heroin, 1,788 kilograms of cocaine, and 978 illegal firearms. These operations also resulted 13,614 arrests and the forfeiture of over $54 million in cash associated with drug trafficking. And despite many sophisticated counterterrorism efforts that have been established in the United States since the 9/11 attacks, the FBI’s Terrorism Screening Center still attributes traffic stops as the most common source of “domestic encounters” with watch-listed terrorism subjects.

Again it is important to stress that traffic enforcement is not primarily a tool to detect street crime, discover contraband or deter terrorism. It is a public safety imperative that society has given great leeway to keep motorists safer on the highway. Driverless cars are going to keep those highways safe without the need for as much enforcement. But a failure to anticipate how those safer highways, patrolled by fewer police with less reason to meet the people inside the driverless cars of the future, is a failure in imagination that police and policymakers can ill afford.

This technology is well beyond its infancy, but it is still new, and it is not too late to shape and influence how it will be integrated into society. Now is the time that government will have the most influence over the developers and corporations that are bringing driverless technology to the road. Those companies need government support, and the government needs to work with them to ensure that regulations, industry standards and public funding are developed alongside the technology to ensure it is introduced cautiously with an eye toward unintended consequences that impact public safety.

I am a highway patrolman, and the last person in my profession has already been born. After today, if a kid wants to grow up and serve to keep you safe in your community, she won’t do it the same way I did. Driverless cars are going to change things, and we need to talk to the people who build them so we can make the best of that change. And we need to start talking today, so that little girl has what she needs to keep us safe tomorrow.

Monday, June 19th, 2017

Security in an Era of Uncertainty (by Chris Milburn)

The United States has new leadership. Among many notable changes made immediately by the new administration, the president has authorized religion-based immigration restrictions and has taken action to focus solely on Islam as a source of violent extremism within the United States. These early actions indicate a newly institutionalized “Islamophobia” that could prove to be disastrous for national security efforts if not addressed correctly by security practitioners.

Islam is the second largest religion in the world, and is as vast and complex as any of the world’s other faiths. As with all religions, understandings of its holy texts and traditions range from liberal to conservative on a spectrum with an infinite number of points in between. Muslims range from the intensely practical to mystical, from socially active to intensely private. Among this diverse group of Muslims, a branch known as Islamism has emerged from chaotic social conditions in the Middle East.

Islamism generally refers to a particular activist ideology with specific territorial, political, and social aspirations, and represents only a small fraction of the religion of Islam. Islamist extremists have threatened to upset global efforts toward peace and human rights by suppressing other Muslim groups and focusing some of their efforts toward western nations such as the U.S. and her allies. One of their most important ideas is the claim that the U.S. is at war with all Muslims, and they consistently produce evidence that they use to support their claim.

Islamist groups – such as al-Qaida and the Islamic State – specifically attempt to inflate their appearance by claiming to represent the true face of Islam. In falsely adopting the whole identity of Islam, these violent extremists aspire to appear larger and more threatening than they really are. The symbolic violence associated with terrorism functions in precisely the same way. Disproportionate fear of the terrorist often causes the target group to sacrifice its own freedoms for the sake of increasing security. The promise of improved security, of course, cannot be quantified, but is used to justify austere authoritarian measures when promised to a group living in fear.

In terms of Muslim beliefs, it is the violent Islamist ideology that is of most concern to the homeland security enterprise. But in treating all Muslims with suspicion, Americans play directly into the hands of those very few extremists seeking ownership of the Muslim identity. Suspicion leads to scapegoating, and the suppression of group rights is rarely far behind. Muslims seem to make easy targets for suspicious Americans, and this impulse to scapegoat “others” is often difficult to suppress in times of uncertainty.

It is fundamentally important to accurately identify sources of violent extremism. Homeland security efforts are most effective when approached with analytical precision and a constitutional foundation. Painting the adversary with a broad brush is the easy approach – one that is rarely effective and usually counterproductive. The American homeland security enterprise must painstakingly distinguish between peaceful religious practitioners and those seeking to commit violence using the false cover of an entire religion. American efforts should undoubtedly focus on violent ideologies and take measures to prevent their proliferation. Violent Islamism is one of these, but it is not by any means the sole producer of terrorist violence within the U.S.

By all indications, the years ahead could pose significant challenges for national security and counterterrorism efforts. Security experts in western nations will be expected to perform increasingly complex tasks in an amorphous and ambiguous environment. Consistency will be maintained when security efforts remain analytical and evidence-driven, while applying rigorous frameworks to understand social conflicts. Security practitioners should bear in mind that rigorous threat analysis will always outperform both hysteria and generalities in national security efforts.

U.S. security efforts must maintain an essential American character in which violence is not tolerated while constitutional protections remain intact. It is of the utmost importance that security efforts support the free expression of religion while seeking to disrupt violent ideologies that threaten the United States. Homeland security actions that interfere with Muslims’ abilities to exist as ordinary Americans will be devastating to American values. In this way, the battle for the identity of Islam is a battle for the identity of the United States. The success of homeland security efforts over the coming few years will depend on practitioners’ firm individual commitments to measured, precise strategies that resist the tendency to generalize the nature of the threat.

Wednesday, February 22nd, 2017

National Homeland Security Conference 2017

The National Homeland Security Conference provides a direct bridge to connect and share best practices among those charged with keeping the nation safe. The conference brings together over 1,000 attendees from the homeland security and emergency management disciplines, representing local, state, federal government, military, and the private sector.

This year the NHSA will be hosting 60 and 75 minute national homeland security presentations based on the following areas: Recent Events; Training for Preparedness; Grant Management; Emergency Medical Response and Public Health Issues; Port and Transit Security; Intelligence & Information Sharing; Whole Community Preparedness; Public Safety; Counterterrorism – Protecting The Homeland. (Buffalo, NY)

Click here to view additional event details and registration.

Tuesday, November 15th, 2016
damaged US flag

ISIS and the Existential Threat (by Chris Milburn)

In the wake of violent attacks on civilians in the U.S. and Europe, ISIS, also known as the self-proclaimed “Islamic State”, poses a unique and unprecedented challenge to the western world. Americans, in particular, struggle to understand the group, its motivations, and capabilities. Among the most important points of conversation is the recurrent question: Does ISIS pose an “existential” threat to the United States?

Opinions on this matter vary widely. An existential threat would be one that threatens the existence of the United States, but the nature of the threat from violent jihadists remains unclear. In the past, an existential threat may be have been described as a uniformed enemy capable of overtaking a nation’s territory or resources. But acquisition of physical territory and large-scale force become less relevant to conflict as it intensifies in a world dominated by communication.

War remains a physically violent conflict, but the symbolic elements of war take on greater importance in a globalized world. The murder of Father Jacques Hamel, the French priest in Normandy, is but one gruesome illustration of this theory in action; a single murder, carried out in highly symbolic fashion, becomes an act of terrorism gaining notoriety on the global stage. Indeed, it is this type of decentralized symbolic violence that has allowed ISIS to extend their reach into Europe and the United States.

As ISIS continues to assert their claim to Islamic authority by executing effective symbolic violence, they have forced the two major U.S. political parties to divide into two opposing positions. Democrats refuse to acknowledge the ideological roots of the spreading violence while Republicans propose to exclude immigrants based on their religious practices or ethnic background. Both positions overlook significant elements of the intensifying conflict and open the door for the Islamic State to continue to thrive.

The United States president has set the tone for the Democratic Party’s response by rhetorically asserting that nothing would be accomplished by acknowledging that ISIS’ violence is the product of radical ideas rooted in Islamic belief – a blatant analytical bias certainly preventing his administration from properly engaging the threat posed by the Islamic State. The Republican Party’s presidential candidate has repeatedly proposed banning Muslims from the United States – a vague yet alarming proposal that is not only impractical, but also unconstitutional.

Contrary to the president’s declaration, an analysis of any such violent ideology must address the political, social, religious, and territorial claims of the violent actors. In the past and under different conditions, blunt military force may have been sufficient to prevent the advances of certain hostile armies. But if effective counter-measures are to be employed in the current conflict, the complexity of the new operating environment demands an accurate analysis of the ideological conditions leading to violence. American inaction in this regard allows violent Islamists to gain a strategic upper hand by manipulating a particularly compelling narrative of the United States to their advantage. This approach also ignores the decentralized nature of modern terrorism, a fundamental factor contributing to the problems understood by westerners as “radicalization” and “violent extremism.” The Islamic State’s influence flourishes in these conditions.

The Republican proposal predictably takes the opposite approach in recommending that Muslims be prevented from entering the United States. Proposing that any religious adherents be banned from the United States “until our country’s representatives figure out what is going on” is a massive shift away from the core American tenet of freedom of religious expression. Further, this proposal inflames fears of immigrants and outsiders (perhaps intentionally) by erroneously branding an entire population with the horrible violence of a few. Such a ban would be an egregious assault on the very identity of the United States itself. This, too, creates an environment in which the Islamic State’s influence flourishes.

Finding the way forward in such a conflict is not easy. An effective approach will require a nuanced view of humanity and social interactions, and a clear vision of a desirable United States identity. Perhaps the Islamic State does not pose an existential threat in any traditionally understood sense of the term; Islamist soldiers are not likely to arrive on the beaches of North America and forcibly overtake the United States. But the Islamic State threatens the existence of the U.S. when Americans allow their national identity to be manipulated by fear. When America no longer exists as a strategic global peacekeeper or the champion of freedom, liberty, and justice, it will have succumbed to the existential threat of ISIS.

Tuesday, August 9th, 2016
Banner for Favre article

The Wicked Problems of Low-tech Terrorism (by Gregg Favre)

When ideology is primary, the “means” is a matter of access

In France, the investigation into the Bastille Day attack is in its infancy. During the nation’s declared days of mourning, specialists will confer to uncover the specifics of how this horrific event occurred. Over the coming days and weeks, details will emerge about the driver, his networks and, perhaps most importantly, his motivations. But what is known now is that a rented delivery truck evaded security measures and menacingly ran down innocent men, women and children. While many share the brutality of the attack, its lack of sophistication should come as a surprise to few.


Saturday, July 16th, 2016
Dallas Reflections Featured Article HS Community

Dallas Reflections (by Max Geron)

“Hey man this is Reuben. I don’t know if you heard but there’s a city-wide assist and reports of officers down at the demonstration. I’ve got some guys and we’re headed that way and I just wanted you to know in case you hadn’t heard.”

That was my first indication that something had gone horribly wrong. I glanced at social media and immediately saw throngs of people scattering from the anti-police brutality protests going on in downtown Dallas. I knew it was bad. They reported one officer having been evac’d to the hospital in a squad car – you know it’s bad when cops are evacuating other cops in squad cars and not waiting for ambulances.


Saturday, July 9th, 2016
understanding radicalization

The Problem with Radicalization (by Douglas Weeks)

The advent of ‘new terrorism’ studies that began in the 1970’s remains as robust as ever. Exacerbated by 9/11, 3/11, 7/7, the Arab Spring, the rise of the Islamic State, the two Paris attacks, and more recently the San Bernardino attack to name but a few, terrorism research is here to stay. Couched under the banner of Countering Violent Extremism (CVE) governments around the globe have sought to manage risk and build resilience through securitization and engagement. Convinced that radicalization is the ultimate evil, an enormous amount of research has focused on radicalization and ‘Islamic radicalization’ in particular. However, despite years of research, what is known about radicalization is defined more by what it is not rather than what it is.


Monday, May 30th, 2016

Security, Social Media and Encryption (by Joseph Campos)

The November 13, 2015 attacks in Paris, France that killed 150 people and wounded more than 350, and the San Bernardino, U.S. on December 2, 2015, that killed 14 people, raise questions as to the conflation of security and democratic principles, especially that of privacy. Smart phones and other devices have an array of applications/tools that enable users to encrypt various forms of communication. The question for the security apparatus in democratic societies is how do we continue to promote ideals of freedom and privacy while ensuring security.


Monday, May 30th, 2016

Anonymous (Analysis by Robert Runnels)

Group Name: Anonymous

Principal Ideology: Freedom of speech and non-censorship

Area of Operation: Worldwide

Leadership: Constantly shifting coalition of like-minded participants, shaped by current hot issues

Affiliated Groups: Affiliations change based on the targets of the collective, however anarchist affiliations are common

Principal Enemy: Organizations and individuals who seek to restrict freedom of speech, particularly on the Internet

Tactics: Internet “hacktivism”

Anonymous is an Internet-based collective with members worldwide. Essentially, all a person needs to do to join Anonymous is to join in their online activities. The group uses the Internet as a medium for communication and coordination for its actions. These actions have included Distributed Denial of Service Attacks (DDoS) on such disparate targets as Stratfor, the Motion Picture Association of America, the Church of Scientology, Paypal, Bank of America and various law enforcement organizations. The group gains its collective power from the participation and acts of individual participants.[1]   The group is largely associated with Internet “hacktivism.” Hacktivism is a fairly controversial term. The Oxford online dictionary defines a hacktivist as a “computer hacker whose activity is aimed at promoting a social or political cause.”[2]


Tuesday, May 3rd, 2016
Security Paris

Counter Terrorism through Dialogue (by Joseph Campos)

The anti-immigration, pro-security, and pro-enhanced tactics rhetoric over the past eight months, in various debates to secure the presidential nomination for both parties, is not a new phenomena. This fevered rhetoric traces its origins to the very beginnings of Operation Enduring Freedom and the U.S. “war on terrorism”. Specifically, George W. Bush announced on June 12, 2001, that the world had to address the “new threats of the 21st century if we’re to have a peaceful continent and a peaceful world.”[1]

The rhetoric of the United States’ “War on Terrorism” has come to contains a specific discourse that conjoins moral authority, application of meaning, infinite justice, and a prescribed search for peace with terrorism’s overarching incorporative aspect, revealing an ideological and cultural interpretation of both the U.S. state and its position in the world as the archetypal virtuous state.


Wednesday, April 27th, 2016