“…Atkinson and Wein (2010) examine how a government should allocate its resources over the inspection of terror and criminal networks to exploit the finding of Smith, Damphousse, and Roberts (2006) that, prior to an attack, terrorists frequently participate in crimes such as theft or procuring explosives. Other articles address problems such as predicting the number of undetected terror threats (Kaplan, 2010), estimating the duration of a terrorist plot (Kaplan, 2012a), locating terrorists (Alpern & Lidbetter, 2013;Atkinson, Kress, & Lange, 2016), processing intelligence (Dimitrov, Kress, & Nevo, 2016;Lin, Kress, & Szechtman, 2009), patrolling an area (Lin, Atkinson, & Glazebrook, 2014;Papadaki, Alpern, Lidbetter, & Morton, 2016;Szechtman, Kress, Lin, & Cfir, 2008), and predicting the goal of a suspected terrorist (Tsitsiklis & Xu, 2018). In particular, Atkinson et al (2016) consider a searcher who, based on a stream of unreliable intelligence about a target's location, needs to decide whether to engage or to wait for more information.…”