Antiterrorism and Threat Response : Planning and Implementation

By (author) Johnson, Ross

One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book's antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists-setting them off balance and keeping them off balance-thereby disrupting their planning cycle and thwarting attack. The book helps security managers to: Understand the terrorist attack planning cycle Conduct a terrorism threat vulnerability assessment Develop an observation plan and the corresponding verification plan Understand how surveillance detection works Learn how pattern analysis wheels can be used to find weaknesses in security operations Appreciate the role of random antiterrorism measures and learn how to develop them Establish response plans for a wide variety of contingencies related to terrorist attack Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiques. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

「Nielsen BookData」より

[目次]

  • Some Thoughts on Terrorism and Government Why Do Governments React So Strongly to Terrorism? Public Fear and National Risk The Monopoly on Violence Hijacking the Agenda You Have to Pay to Play Terrorism and Risk The Target Community Critical Infrastructure Actual Target History Categories of Targets Types of Attacks The Islamist Project and Al Qaeda Ecoterrorism Target: North America Target: Western Europe Target: Eastern Europe Target: Australasia and Oceania The Role of the Target Community Terrorism What Is Terrorism? Strengths of Terrorist Groups Weaknesses of Terrorist Groups Anatomy of a Terrorist Group Terrorist Cell Organization Terrorist Incident Anatomy Broad Target Selection Intelligence Gathering and Surveillance Specific Target Selection Preattack Surveillance and Planning Attack Preparation and Rehearsal Actions on the Objective Escape and Exploitation Today's Terrorist Threat Terrorist Methods Vulnerability Counterterrorism Definitions Intelligence Leads the Way Analytical Tools Pattern Analysis Wheel Time-Event Charting Matrix Manipulation Association Matrix Activities Matrix Link Analysis Working with Counterterrorism Forces Antiterrorism Planning The Fundamentals Threat Vulnerability Assessment Risk Formula Threat Assessment Process Vulnerability Assessment TVA Tools A Few Other Things to Keep in Mind Converting Information into Intelligence, or So What? The Internet The Revolution in Social Media Don't Learn the Wrong Lessons Security Measures The Design of Security Measures Security Measures-An Example What about Guns? U.S. Military Basic THREATCON Procedures Observation Planning The Seven Signs of Terrorist Activity Automated Systems Surveillance Surveillance Detection Static Surveillance Detection Facility Vulnerability Assessment Surveillance Detection Plan How Surveillance Detection Works Mobile Surveillance Detection Foot Surveillance Detection GPS Tracking Writing an Observation Plan Verification of your Observation Plan Mobile Patrol Pattern Analysis Random Antiterrorism Measures Violence and Crime RAMs in a Low-Threat Environment Response Planning Communications Suspected Surveillance Actual or Suspected Sabotage Active Shooter Fire or Explosion Protesters Illegally Parked or Abandoned Vehicle Outside the Perimeter Illegally Parked or Abandoned Vehicle Inside the Perimeter Hostage Taking Kidnapping Vehicle Accident on the Perimeter Suspicious or Unusual Incident Bomb Threat Hoax Call to First Responders Putting It All Together A Framework for Corporate Security Example Threat Response Plan-Industrial Facility Part 1: Threat and Vulnerability Assessment Construction Phase Part 2: Security Measures Low Medium High Imminent Part 3: Observation Plan Verification Plan Part 4: Random Antiterrorism Measures Facility Random Antiterrorism Measures Part 5: Response Plans Part 6: Training and Review Training and Review Plan Infrastructure Protection Zones Threat Response Planning Maritime Antipiracy Operations Resources Characteristics of Maritime Pirates Piracy Threat Vulnerability Assessments Antipiracy Security Measures Individual Threat Response Planning Residential Security Planning Threat Vulnerability Assessment Security Measures Physical Logical Procedural Observation Planning Random Deterrence Measures Response Planning Travel Security Planning Threat Vulnerability Assessment Kidnapping Confidentiality Travel Security Programs Infectious Diseases Safety Security Measures Observation Plan Random Antiterrorism Measures Response Plans Insider Threats Background Checks Credit Checks Ethics Hotlines "It Couldn't Happen Here" Access Control Afterword Glossary Index

「Nielsen BookData」より

この本の情報

書名 Antiterrorism and Threat Response : Planning and Implementation
著作者等 Johnson, Ross
書名別名 Planning and Implementation
出版元 Taylor & Francis Inc
刊行年月 2013.03.06
ページ数 296p
ISBN 9781466512917
言語 英語
出版国 アメリカ合衆国
この本を: 
このエントリーをはてなブックマークに追加

このページを印刷

外部サイトで検索

この本と繋がる本を検索

ウィキペディアから連想