Skip to content
You are not logged in |Login  
     
Limit search to available items
Book Cover
book
BookBook
Author Johnson, Ross.

Title Antiterrorism and threat response : planning and implementation / Ross Johnson.

Publication Info. Boca Raton, FL : CRC Press, [2013]
©2013

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Standard Shelving Location  363.32 J68A    Check Shelf
Description xxi, 274 pages : illustrations ; 25 cm
Contents Machine generated contents note: 1. Some Thoughts on Terrorism and Government -- Why Do Governments React So Strongly to Terrorism? -- Public Fear and National Risk -- Monopoly on Violence -- Hijacking the Agenda -- You Have to Pay to Play -- Terrorism and Risk -- 2. The Target Community -- Critical Infrastructure -- Actual Target History -- Categories of Targets -- Types of Attacks -- Islamist Project and Al Qaeda -- Ecoterrorism -- Target: North America -- Target: Western Europe -- Target: Eastern Europe -- Target: Australasia and Oceania -- Role of the Target Community -- 3. Terrorism -- What Is Terrorism? -- Strengths of Terrorist Groups -- Weaknesses of Terrorist Groups -- Anatomy of a Terrorist Group -- Terrorist Cell Organization -- Terrorist Incident Anatomy -- Broad Target Selection -- Intelligence Gathering and Surveillance -- Specific Target Selection -- Preattack Surveillance and Planning -- Attack Preparation and Rehearsal -- Actions on the Objective -- Escape and Evasion -- Today's Terrorist Threat -- Terrorist Methods -- Vulnerability -- 4. Counterterrorism -- Definitions -- Intelligence Leads the Way -- Analytical Tools -- Pattern Analysis Wheel -- Time-Event Charting -- Matrix Manipulation -- Association Matrix -- Activities Matrix -- Link Analysis -- Working with Counterterrorism Forces -- 5. Antiterrorism Planning -- Fundamentals -- 6. Threat Vulnerability Assessment -- Risk Formula -- Threat Assessment Process -- Vulnerability Assessment -- TVA Tools -- A Few Other Things to Keep in Mind -- Converting Information into Intelligence, or So What? -- Internet -- Revolution in Social Media -- Don't Learn the Wrong Lessons -- 7. Security Measures -- Design of Security Measures -- Security Measures-An Example -- What about Guns? -- U.S. Military Basic THREATCON Procedures -- 8. Observation Planning -- Seven Signs of Terrorist Activity -- Automated Systems -- Surveillance -- Surveillance Detection -- Static Surveillance Detection -- Facility Vulnerability Assessment -- Surveillance Detection Plan -- How Surveillance Detection Works -- Mobile Surveillance Detection -- Foot Surveillance Detection -- GPS Tracking -- Writing an Observation Plan -- Verification of Your Observation Plan -- Mobile Patrol Pattern Analysis -- 9. Random Antiterrorism Measures -- Violence and Crime -- RAMs in a Low-Threat Environment -- 10. Response Planning -- Communications -- Suspected Surveillance -- Actual or Suspected Sabotage -- Active Shooter -- Fire or Explosion -- Protesters -- Illegally Parked or Abandoned Vehicle Outside a Perimeter -- Illegally Parked or Abandoned Vehicle Inside a Perimeter -- Hostage Taking -- Kidnapping -- Vehicle Accident on the Perimeter -- Suspicious or Unusual Incident -- Bomb Threat -- Hoax Call to First Responders -- 11. Putting It All Together -- Framework for Corporate Security -- Example Threat Response Plan-Industrial Facility -- pt. 1 Threat and Vulnerability Assessment -- Construction Phase -- pt. 2 Security Measures -- Low -- Medium -- High -- Imminent -- pt. 3 Observation Plan -- Verification Plan -- pt. 4 Random Antiterrorism Measures -- Facility Random Antiterrorism Measures -- pt. 5 Response Plans -- pt. 6 Training and Review -- Training and Review Plan -- 12. Infrastructure Protection Zones -- Threat Response Planning -- 13. Maritime Antipiracy Operations -- Resources -- Characteristics of Maritime Pirates -- Piracy Threat Vulnerability Assessments -- Antipiracy Security Measures -- 14. Individual Threat Response Planning -- Residential Security Planning -- Threat Vulnerability Assessment -- Security Measures -- Physical -- Logical -- Procedural -- Observation Planning -- Random Deterrence Measures -- Response Planning -- Travel Security Planning -- Threat Vulnerability Assessment -- Kidnapping -- Confidentiality -- Travel Security Programs -- Infectious Diseases -- Safety -- Security Measures -- Observation Plan -- Random Antiterrorism Measures -- Response Plans -- 15. Insider Threats -- Background Checks -- Credit Checks -- Ethics Hotlines -- "It Couldn't Happen Here" -- Access Control.
Note Includes index.
Bibliography Includes bibliographical references and index.
Subject Terrorism -- Prevention.
Internal security.
ISBN 9781466512900 hardback alkaline paper
1466512903 hardback alkaline paper
-->
Add a Review