In last week's Security Weekly, I talked about the threat posed by skilled and imaginative terrorists who are capable of conceiving, planning and conducting sophisticated attacks. Countering these novel means and tactics, in turn, takes an equally creative approach to crafting security measures. This idea dovetails nicely with a presentation I gave Sept. 14 at an InfraGard conference in Orlando on the dangers and limitations of using information found on the internet. The key point of my talk was that although a lot of data is available online and can be used by those planning an attack, there are also critical pieces of information that cannot be found on any website and can only be gleaned through physical surveillance.
Where these two topics intersect is the terrorist attack cycle. No matter how innovative a terrorist planner is or how sophisticated his tradecraft, he is still bound by the constraints inherent to...