If the FBI both planned and thwarted a terrorist attack, who's the hero?

A New York City Police Department vehicle is parked near the New York Stock Exchange the morning of the attempted attack. A New York City Police Department vehicle is parked near the New York Stock Exchange the morning of the attempted attack. Richard Drew/AP

A 21-year-old Bangladeshi man tried and failed to blow up the Federal Reserve Building in downtown Manhattan on Wednesday, largely thanks to the efforts of the Federal Bureau of Investigation. That "thanks" ought to be attached both to the "tried" and the "failed" parts of that sentence, since it was the FBI that not only coaxed the suspect, Quazi Mohammad Rezwanul Ahsan Nafis, into moving forward with the bombing but also supplied him with the means to do so. Don't worry. The Feds know what they're doing. They do this all the time.

Nafis is just another terrorist. He arrived in the United States in January ambitious like a lot of immigrants. Except his ambition wasn't to open a small business or work his way up the ladder of an American company. He wanted to "destroy America," according to a statement he wrote to claim responsibility for the terrorist attack he would inevitably attempt to carry out. However, it's unclear if he would've gotten as far as he did without help from undercover FBI agents.

After arriving in the United States and settling into his new home in Jamaica, Queens, Nafis got to know a person whom he believed was connected to Al Qaeda. This contact talked him through the process of identifying a target. First it was a high ranking government official, and then it was the New York Stock Exchange. Nafis and his accomplice finally settled on the Federal Reserve Building in downtown Manhattan, since they thought it could reap the most damage on the American economy. Said accomplice helped Nafis acquire "20 50-pound bags of purported explosives," according to the U.S. Attorney's office, and even rode in the van with Nafis as he went to deliver the payload on Wednesday, arming the bomb on the way. They parked the fan in front of the Fed and retreated to a hotel room, where Nafis recorded a video explaining the attack. The only problem was that this accomplice was an undercover FBI agent, the bomb materials were fake and as soon as Nafis flipped the switch to finalize his attack on America, the Feds swooped in and arrested him.

Let's try to process all that. Our first reaction was a simple one: "Yea, we caught a terrorist!" And then we started thinking, "Wait a second -- it seems like the FBI had a lot to do with planning this fake attack." Which leads to, "Would this terrorist have actually built this bomb and delivered it to the Fed's doorstep if the FBI hadn't walked him through the process?" This question inevitably leads to one thinking, "What they hell am I thinking? This guy wanted to 'destroy America,' " and he didn't thanks to the FBI." Then, maybe your mind might wander into patriotic territory, "Maybe I should join the FBI and fight terrorists, too."

Read more at The Atlantic Wire

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.