Episode Summary: The Government Isn’t Telling You This
Podcast: The Watch Floor with Sarah Adams
Host: Sarah Adams
Date: March 31, 2026
Overview
In this gripping episode, former CIA Targeter Sarah Adams takes listeners inside the frontlines of counterterrorism, breaking down how most terrorist attacks begin with subtle, observable behaviors rather than sudden violence. Adams demystifies the pre-attack stages—from reconnaissance and dry runs to communication changes and supply gathering—and demonstrates how ordinary people can spot these warning signs. Through high-profile case studies, real-life U.S. examples, and actionable insights, she urges public vigilance and stresses that “see something, say something” truly saves lives.
Key Discussion Points & Insights
1. Terrorism Begins with Behaviors, Not Violence
- Terrorist attacks typically start with quiet, subtle behaviors—not with explosions or gunfire. Adams attributes foiled or thwarted attacks to the keen observation of these warning signs during the pre-attack phase.
- Quote:
“Most terrorist attacks don't begin with violence. They begin with behaviors. Small decisions, subtle movements, patterns of activity that appear perfectly normal at first glance.”
—Sarah Adams [00:15]
- Quote:
2. Reconnaissance: Mapping, Observing, and Testing
- Terrorists typically study targets meticulously:
- Observing access and exit points;
- Noting security routines;
- Tracking crowd flows.
- Case Studies:
- 2006 Transatlantic Plane Plot:
- Terrorists booked flights and hotel rooms to surveil airline and security procedures, inspiring today’s liquid restrictions at airports.
- Recent U.S. Example: Suspicious individuals sought a hotel room with a clear runway view—denied by staff who trusted their instincts.
- 2019 Sri Lankan Easter Bombings:
- Attackers repeatedly visited churches/hotels to monitor attendance and security patterns; asked odd questions like “Do you livestream?”
- 2006 Transatlantic Plane Plot:
- Quote:
“It seems so simple, but when it feels off to you, it likely is.”
—Sarah Adams [00:35]
3. Dry Runs: Practice Makes (Deadly) Perfect
- Terrorists rehearse attacks by blending in with normal activities to spot vulnerabilities.
- 2015 Paris Attacks:
- Movement between potential targets to scrutinize security positioning.
- 2008 Mumbai Attacks:
- Walkthroughs in hotels/rail stations to check security patrols.
- 2013 Boston Marathon Bombing:
- Perpetrators ran portions of the racecourse as “normal” participants to plan their attack.
- 2015 Paris Attacks:
- Behavioral Red Flags:
- Loitering near entrances without entering
- Repeatedly passing through security checkpoints without reason
- Observing crowd or law enforcement patterns without clear purpose
4. Target Lock-In: Deep Dives into Chosen Location
-
Final planning involves intense study of the selected target.
- Example:
- Omar Mateen:
- Initially targeted Disney Springs; after discovering increased security during a second visit, he changed his plan.
- Westgate Mall Attack (2013, Nairobi):
- Months of camera placement studies and observing security staff routines.
- London 7/7 Bombings:
- Focused on train schedules and reliable transit patterns for maximum impact.
- Omar Mateen:
- Example:
-
Quote:
“Increases and changes in our posture and our security can also push a terrorist away from wanting to target locations we work at or frequent.”
—Sarah Adams [31:30]
5. Stealth Communications: Going Dark and Hiding in Plain Sight
-
Terrorists often shift to encrypted apps—Signal, WhatsApp, Session—or use less monitored platforms like gaming chats.
-
Sudden disappearance from social media, quitting jobs, or major lifestyle changes can indicate radicalization or pre-attack focus.
-
Examples:
- October 7 Attacks: Coordination via Telegram
- Recent Indian attack: Use of Signal and Session, which don’t require phone number registration.
-
Quote:
“They’re getting smart in using platforms where they can hide more...there are such easy ways to mask some of these discussions in the tools we use every day and even in the games that we play.”
—Sarah Adams [37:05]
6. Supply Chain: Acquiring Materials and Hiding Equipment
- Attackers must buy or move weapons, chemicals, and bomb-making materials—often in small quantities or to hidden safehouses.
- Mumbai: Weapons, GPS devices moved covertly
- London Liquid Bombers: Gradual acquisition of bomb chemicals
- Paris/Brussels: Cross-border weapons shipment, leveraging safehouses away from attack sites
7. Micro-Indicators: The Subtle Signs Most Miss
-
“Micro-signs” are ordinary-looking actions with sinister intent, such as:
- Repeatedly asking about security procedures
- Unusual photography of entrances, badges, infrastructure
- Loitering near key access points
- Piggybacking into secure areas (e.g., tailgating at schools or offices)
- Obsessive study of transportation schedules (not typical for average commuters)
- Focusing on unattractive but critical infrastructure (e.g., power grids, oil facilities)
-
Notable Story:
- On a U.S. flight, a passenger insisted on speaking with the captain, asking unusually detailed questions about crew rotations—correctly reported and investigated. [48:22]
8. Call to Action: Active, Not Passive, Vigilance
-
Terrorists are not “sleeping” in so-called sleeper cells—they are actively surveilling, rehearsing, and planning.
- Quote:
“These terrorists aren't sleeping. They're doing reconnaissance, they're doing dry runs, they're doing different surveillance, they're on encrypted communications apps, they're acquiring resources, they're making bombs…”
—Sarah Adams [01:01:35]
- Quote:
-
“See something, say something” saves lives by giving authorities early warning.
Notable Quotes & Memorable Moments
- “Terrorism doesn't announce itself, it leaves footprints.” —Sarah Adams [00:25]
- “If you see something, of course, say something.” —Sarah Adams [28:11]
- Memorable Analogy (On Security):
“We always want to be changing our security and mixing things up so we can throw them off.” [31:00] - On Overlooked Signs:
“If someone keeps showing up and there's no real reason for them to be there, especially let’s say it’s a school and he doesn’t have a kid there...That needs to be reported immediately.” [53:12]
Timestamps for Key Segments
- 00:15 – 05:00: Introduction to pre-attack behaviors, reconnaissance case studies
- 05:00 – 14:00: U.S. examples, religious institution surveillance, and dry runs
- 14:00 – 25:00: International case studies on rehearsals and pattern detection
- 25:00 – 33:00: Target lock-in, final planning, and security countermeasures
- 33:00 – 38:00: Terrorist communications, “going dark,” and gaming platforms
- 38:00 – 44:00: Material acquisition, logistics, and safehouses
- 44:00 – 56:00: Micro-indicators and subtle suspicious behaviors
- 56:00 – end: Infrastructure focus, myth-busting “sleeper” cells, and practical steps for vigilance
Final Thoughts
Sarah Adams delivers a high-stakes educational message: ordinary citizens can help thwart attacks if they learn to spot the behavioral breadcrumbs terrorists leave behind. Every act of reporting “something off” contributes to disruption—no sign is too small.
Takeaway: Know what’s normal in your environment; if it’s an outlier, report it. Early vigilance saves lives.
