Antiterrorism and Threat Response: Planning and Implementation

Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
ISBN 9781466512900
Cat# K14932

$79.95

$63.96

SAVE 20%


eBook (VitalSource)
ISBN 9781466512917
Cat# KE16537

$79.95

$55.97

SAVE 30%


eBook Rentals

Other eBook Options:
 

Features

  • Provides insight into how terrorist organizations operate and how counterterrorist and antiterrorist organizations should work to combat terrorist threats
  • Outlines a methodology for the flow of intelligence and information between counterterrorist forces and antiterrorism planners
  • Offers a methodology to enhance the protection of critical infrastructure through collaborative effort between infrastructure owners/operators, law enforcement and intelligence, and the public
  • Establishes response plans for a wide variety of contingencies related to terrorist attacks

Summary

One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense’s antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book’s antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists—setting them off balance and keeping them off balance—thereby disrupting their planning cycle and thwarting attack.

The book helps security managers to:

  • Understand the terrorist attack planning cycle
  • Conduct a terrorism threat vulnerability assessment
  • Develop an observation plan and the corresponding verification plan
  • Understand how surveillance detection works
  • Learn how pattern analysis wheels can be used to find weaknesses in security operations
  • Appreciate the role of random antiterrorism measures and learn how to develop them
  • Establish response plans for a wide variety of contingencies related to terrorist attack
  • Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments
  • Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack

The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiqués. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

Table of Contents

Some Thoughts on Terrorism and Government
Why Do Governments React So Strongly to Terrorism?
Public Fear and National Risk
The Monopoly on Violence
Hijacking the Agenda
You Have to Pay to Play
Terrorism and Risk
The Target Community
Critical Infrastructure
Actual Target History
Categories of Targets
Types of Attacks
The Islamist Project and Al Qaeda
Ecoterrorism
Target: North America
Target: Western Europe
Target: Eastern Europe
Target: Australasia and Oceania
The Role of the Target Community
Terrorism
What Is Terrorism?
Strengths of Terrorist Groups
Weaknesses of Terrorist Groups
Anatomy of a Terrorist Group
Terrorist Cell Organization
Terrorist Incident Anatomy
Broad Target Selection
Intelligence Gathering and Surveillance
Specific Target Selection
Preattack Surveillance and Planning
Attack Preparation and Rehearsal
Actions on the Objective
Escape and Exploitation
Today’s Terrorist Threat
Terrorist Methods
Vulnerability
Counterterrorism
Definitions
Intelligence Leads the Way
Analytical Tools
Pattern Analysis Wheel
Time-Event Charting
Matrix Manipulation
Association Matrix
Activities Matrix
Link Analysis
Working with Counterterrorism Forces
Antiterrorism Planning
The Fundamentals
Threat Vulnerability Assessment
Risk Formula
Threat Assessment Process
Vulnerability Assessment
TVA Tools
A Few Other Things to Keep in Mind
Converting Information into Intelligence, or So What?
The Internet
The Revolution in Social Media
Don’t Learn the Wrong Lessons
Security Measures
The Design of Security Measures
Security Measures—An Example
What about Guns?
U.S. Military Basic THREATCON Procedures
Observation Planning
The Seven Signs of Terrorist Activity
Automated Systems
Surveillance
Surveillance Detection
Static Surveillance Detection
Facility Vulnerability Assessment
Surveillance Detection Plan
How Surveillance Detection Works
Mobile Surveillance Detection
Foot Surveillance Detection
GPS Tracking
Writing an Observation Plan
Verification of your Observation Plan
Mobile Patrol Pattern Analysis
Random Antiterrorism Measures
Violence and Crime
RAMs in a Low-Threat Environment
Response Planning
Communications
Suspected Surveillance
Actual or Suspected Sabotage
Active Shooter
Fire or Explosion
Protesters
Illegally Parked or Abandoned Vehicle Outside the Perimeter
Illegally Parked or Abandoned Vehicle Inside the Perimeter
Hostage Taking
Kidnapping
Vehicle Accident on the Perimeter
Suspicious or Unusual Incident
Bomb Threat
Hoax Call to First Responders
Putting It All Together
A Framework for Corporate Security
Example Threat Response Plan—Industrial Facility
Part 1: Threat and Vulnerability Assessment
Construction Phase
Part 2: Security Measures
Low
Medium
High
Imminent
Part 3: Observation Plan
Verification Plan
Part 4: Random Antiterrorism Measures
Facility Random Antiterrorism Measures
Part 5: Response Plans
Part 6: Training and Review
Training and Review Plan
Infrastructure Protection Zones
Threat Response Planning
Maritime Antipiracy Operations
Resources
Characteristics of Maritime Pirates
Piracy Threat Vulnerability Assessments
Antipiracy Security Measures
Individual Threat Response Planning
Residential Security Planning
Threat Vulnerability Assessment
Security Measures
Physical
Logical
Procedural
Observation Planning
Random Deterrence Measures
Response Planning
Travel Security Planning
Threat Vulnerability Assessment
Kidnapping
Confidentiality
Travel Security Programs
Infectious Diseases
Safety
Security Measures
Observation Plan
Random Antiterrorism Measures
Response Plans
Insider Threats
Background Checks
Credit Checks
Ethics Hotlines
"It Couldn’t Happen Here"
Access Control
Afterword
Glossary
Index

Editorial Reviews

"This book is full of sense – keep your response plan up to date; work off your electronic copy, but keep a paper copy at home and in the office and guardhouse. … sound, useful and wide-ranging."
—Professional Security Magazine

"A comprehensive and practitioner-based examination of the components required to prepare for potential terrorist attacks … in order to prevent them from occurring."
Joshua Sinai, Perspectives on Terrorism

"Ross Johnson has extensive experience in the field as a military officer and then as the head of corporate security for a number of firms. He draws on his background to provide an excellent detailed guide for those who are responsible for preventing and responding to acts of terrorism in the corporate sector. It is a well-organized book that provides panoply of information to be applied throughout the whole spectrum of antiterrorism measures."
ASIS Dynamics