Skip to main content
Log in

Policing terror threats and false positives: Employing a signal detection model to examine changes in national and local policing strategy between 2001 and 2007

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

This paper presents a theory of agency decision-making regarding homeland security policy over the last decade in the United States and inquires about appropriate modes of study to test its potential effectiveness. The key hypothesis is that the staple strategy of agency decision-making during the last decade has been ‘hypervigilance’; defined here as: a state in which agency policy is rationally structured to maximize the pursuit of false positives and gravitate aggressively toward security threats. The related research question is ‘How can we study hypervigilance and false positives in all matters regarding policing terror threats?’ We argue that increased security measures tend to err toward pursuing false positives. However, we do not claim to understand the overall economic costs and benefits of recent homeland security policy decisions, in tangible financial or other realms. We contend that such an understanding is presently unattainable, considering the lack of raw data availability of how many terrorist attacks have been halted by increased security measures within the last decade. We do argue however, that the signal detection model is an appropriate starting methodology for study of such policing strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1

Similar content being viewed by others

Notes

  1. Most contemporary literature has political leanings on the issues and this is a key problem for various reasons.

  2. It is assumed that acts that were passed after 9/11 tremendously empowered the executive branch. This is a trend that dates back to the Alien and Sedition Acts of the early nineteenth century.

  3. Many of these are freely available as pdfs on the Internet, including declassified White-House press releases and FBI reports. Some of the latter indicate that there was a growing concern about Osama bin Laden before 9/11.

  4. It is helpful to compare the mission statement of ICE which is focused on terrorism http://www.ice.gov/about/index.htm to the old Customs bureau whose key goal was to regulate trade imports or to that of the INS whose objective was the investigation and handling of illegal immigrants attempting to defraud the government.

References

  • Bohrnstedt, G.W. and Knoke, D. (1988) Statistics for Social Data Analysis, 2nd edn. Itasca, IL: F.E. Peacock Publishers.

    Google Scholar 

  • Byman, D. (2005) Deadly Connections: States that Sponsor Terrorism. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • Costanza, S.E. and Kilburn, J. (2006) Symbolic security, moral panic and public sentiment: Toward sociology of counterterrorism. Journal of Social and Ecological Boundaries 1 (2): 106–124.

    Google Scholar 

  • DeLone, G.J. (2007) Law enforcement mission statements post-September 11. Police Quarterly 10 (2): 218–235.

    Article  Google Scholar 

  • Dror, I.E. and Charlton, D. (2006) Why experts make errors. Journal of Forensic Identification 56 (4): 600–616.

    Google Scholar 

  • DuBow, F., McCabe, E. and Kaplan, G. (1979) Reactions to Crime: A Critical Review of the Literature. Washington DC: U.S. Department of Justice.

    Google Scholar 

  • Farrington, D.P. and Tarling, R. 1985 Criminal prediction: An introduction. In: D.F. Farrington and R. Tarling (eds.) Prediction in Criminology. Albany, NY: SUNY Press, pp. 2–33.

    Google Scholar 

  • Green, D.M. and Swets, J.A. (1966) Signal Detection Theory and Psychophysics. New York: Wiley.

    Google Scholar 

  • Hindelang, M., Gottfredson, M. and Garofalo, J. (1978) Victims of Personal Crime. Cambridge, MA: Ballinger.

    Google Scholar 

  • Jeong, H.S. and Abraham, D. (2006) Operational response model for physically attacked water networks using NSGA-II. Journal of Computing in Civil Engineering 20 (5): 328–338.

    Article  Google Scholar 

  • Jones, D.M. and Smith, M. (2002) The perils of hyper-vigilance: The war on terrorism and the surveillance state in South-East Asia. Intelligence and National Security 17 (4): 36.

    Article  Google Scholar 

  • Kean, T.H. and Hamilton, L. (2004) The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States by National Commission on Terrorist Attacks upon the United States. New York: W.W. Norton.

    Google Scholar 

  • Kelling, G. (1978) Police field services and crime: The presumed effects of a capacity. Crime and Delinquency 24 (2): 173–184.

    Article  Google Scholar 

  • Kerwin, D. (2005) The use and misuse of ‘national security’ rationale in crafting U.S. refugee and immigration policies. International Journal of Refugee Law 17 (4): 749–763.

    Article  Google Scholar 

  • Kilburn, J.C. and Shrum, W. (1998) Private and collective protection in urban areas. Urban Affairs Review 33 (6): 790–812.

    Article  Google Scholar 

  • Lavrakas, P.J., Normoyle, J., Skogan, W.G., Hertz, E.J., Salem, G. and Lewis, D.A. (1981) Factors Related to Citizen Involvement in Personal, Household, and Neighborhood Anti-crime Measures. Washington DC: Government Printing Office.

    Google Scholar 

  • Lewis, D.A., Grant, J.A. and Rosenbaum, D. (1988) The Social Construction of Reform: Crime Prevention and Community Organizations. New Brunswick, NJ: Transaction Books.

    Google Scholar 

  • Lowenkamp, C.T., Pealer, J., Smith, P. and Latessa, E. (2006) Adhering to the risk and need principles: Does it matter for supervision-based programs? Federal Probation 70 (3): 3–8.

    Google Scholar 

  • Lubit, R., Rovine, D., DeFrancesci, L. and Eth, S. (2003) Impact of trauma on children. Journal of Psychiatric Practice 9 (2): 128–138.

    Article  Google Scholar 

  • Marks, D.E. and Sun, I.Y. (2007) The impact of 9/11 on organizational development among state and local law enforcement agencies. Journal of Contemporary Criminal Justice 23 (2): 159–173.

    Article  Google Scholar 

  • Meeks, B.N. (2002) True blue and vigilante, too. Communications of the ACM 45 (7): 13–15.

    Article  Google Scholar 

  • Mueller, J. (2006) Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats and Why We Believe Them. New York: Free Press.

    Google Scholar 

  • Newman, W.W. (2002) Reorganizing for national security and homeland security. Public Administration Review 62: 126–137.

    Article  Google Scholar 

  • Omer, S.B. (2007) Impact of homeland security alert level on calls to a law enforcement peer support hotline. International Journal of Emergency Mental Health 9 (4): 253–257.

    Google Scholar 

  • Pastor, R.A. (2008) The future of North America. Foreign Affairs 87 (4): 84–98.

    Google Scholar 

  • Rees, D.M. (2006) Post-September 11 policing in suburban America. The Police Chief 73 (2): 72.

    Google Scholar 

  • Reimers, D.M. (1998) Unwelcome Strangers: American Identity and the Turn Against Immigration. New York: Columbia University Press.

    Google Scholar 

  • Sherman, L.W. and Wesiburd, D. (1995) General deterrent effects of police patrol in crime ‘hot spots’: A randomized controlled trial. Justice Quarterly 12 (4): 625–648.

    Article  Google Scholar 

  • Sorkin, R.D., Hayes, C.J. and West, R. (2001) Signal-detection analysis of group decision making. Psychological Review 108 (1): 183–203.

    Article  Google Scholar 

  • Spivak, A.L. and Sharp, S.F. (2008) Inmate recidivism as a measure of private prison performance. Crime & Delinquency 54 (3): 482–508.

    Article  Google Scholar 

  • Stuntz, W.J. (2002) Local policing after the terror. The Yale Law Review 111 (8): 2137–2194.

    Article  Google Scholar 

  • Suskind, R. (2006) The One Percent Doctrine: Deep Inside America's Pursuit of It's Enemies Since 9/11. New York: Simon & Schuster.

    Google Scholar 

  • Tenet, G. (2007) At the Center of the Storm: My Years at the CIA. New York: Harper Collins.

    Google Scholar 

  • Tumlin, K. (2004) Suspect first: How terrorism policy is reshaping immigration policy. California Law Review 92 (4): 1173–1239.

    Article  Google Scholar 

  • Welch, M. (2004) Quiet constructions in the war on terror: Subjecting asylum seekers to unnecessary detention. Social Justice 31 (1/2): 113–128.

    Google Scholar 

  • Wise, C.R. and Nader, R. (2002) Organizing the federal system for homeland security: Problems, issues, and dilemmas. Public Administration Review 62: 44–57.

    Article  Google Scholar 

  • Weinberg, L., Pedahzur, A. and Hirsch-Hoefler, S. (2004) The challenges of conceptualizing terrorism. Terrorism and Political Violence 16: 777–794.

    Article  Google Scholar 

  • Zimbardo, P. (2003) The political psychology of terrorist alarms, http://www.zimbardo.com/downloads/2002%20Political%20Psychology%20of%20Terrorist%20Alarms.pdf, accessed 12 January 2006.

Download references

Acknowledgements

The authors thank Diana Ferguson and the anonymous reviewers for their helpful comments related to this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John C Kilburn Jr..

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kilburn, J., Costanza, S., Metchik, E. et al. Policing terror threats and false positives: Employing a signal detection model to examine changes in national and local policing strategy between 2001 and 2007. Secur J 24, 19–36 (2011). https://doi.org/10.1057/sj.2009.7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2009.7

Keywords

Navigation