Antiterrorism and Threat Response: Planning and Implementation, 1st Edition (Hardback) book cover

Antiterrorism and Threat Response

Planning and Implementation, 1st Edition

By Ross Johnson

CRC Press

296 pages | 45 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781466512900
pub: 2013-02-21
SAVE ~$18.79
eBook (VitalSource) : 9780429253577
pub: 2013-02-21
from $46.98

FREE Standard Shipping!


One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense’s antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book’s antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists—setting them off balance and keeping them off balance—thereby disrupting their planning cycle and thwarting attack.

The book helps security managers to:

  • Understand the terrorist attack planning cycle
  • Conduct a terrorism threat vulnerability assessment
  • Develop an observation plan and the corresponding verification plan
  • Understand how surveillance detection works
  • Learn how pattern analysis wheels can be used to find weaknesses in security operations
  • Appreciate the role of random antiterrorism measures and learn how to develop them
  • Establish response plans for a wide variety of contingencies related to terrorist attack
  • Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments
  • Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack

The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiqués. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.


"This book is full of sense – keep your response plan up to date; work off your electronic copy, but keep a paper copy at home and in the office and guardhouse. … sound, useful and wide-ranging."

—Professional Security Magazine

"A comprehensive and practitioner-based examination of the components required to prepare for potential terrorist attacks … in order to prevent them from occurring."

Joshua Sinai, Perspectives on Terrorism

"Ross Johnson has extensive experience in the field as a military officer and then as the head of corporate security for a number of firms. He draws on his background to provide an excellent detailed guide for those who are responsible for preventing and responding to acts of terrorism in the corporate sector. It is a well-organized book that provides panoply of information to be applied throughout the whole spectrum of antiterrorism measures."

ASIS Dynamics

Table of Contents

Some Thoughts on Terrorism and Government

Why Do Governments React So Strongly to Terrorism?

Public Fear and National Risk

The Monopoly on Violence

Hijacking the Agenda

You Have to Pay to Play

Terrorism and Risk

The Target Community

Critical Infrastructure

Actual Target History

Categories of Targets

Types of Attacks

The Islamist Project and Al Qaeda


Target: North America

Target: Western Europe

Target: Eastern Europe

Target: Australasia and Oceania

The Role of the Target Community


What Is Terrorism?

Strengths of Terrorist Groups

Weaknesses of Terrorist Groups

Anatomy of a Terrorist Group

Terrorist Cell Organization

Terrorist Incident Anatomy

Broad Target Selection

Intelligence Gathering and Surveillance

Specific Target Selection

Preattack Surveillance and Planning

Attack Preparation and Rehearsal

Actions on the Objective

Escape and Exploitation

Today’s Terrorist Threat

Terrorist Methods




Intelligence Leads the Way

Analytical Tools

Pattern Analysis Wheel

Time-Event Charting

Matrix Manipulation

Association Matrix

Activities Matrix

Link Analysis

Working with Counterterrorism Forces

Antiterrorism Planning

The Fundamentals

Threat Vulnerability Assessment

Risk Formula

Threat Assessment Process

Vulnerability Assessment

TVA Tools

A Few Other Things to Keep in Mind

Converting Information into Intelligence, or So What?

The Internet

The Revolution in Social Media

Don’t Learn the Wrong Lessons

Security Measures

The Design of Security Measures

Security Measures—An Example

What about Guns?

U.S. Military Basic THREATCON Procedures

Observation Planning

The Seven Signs of Terrorist Activity

Automated Systems


Surveillance Detection

Static Surveillance Detection

Facility Vulnerability Assessment

Surveillance Detection Plan

How Surveillance Detection Works

Mobile Surveillance Detection

Foot Surveillance Detection

GPS Tracking

Writing an Observation Plan

Verification of your Observation Plan

Mobile Patrol Pattern Analysis

Random Antiterrorism Measures

Violence and Crime

RAMs in a Low-Threat Environment

Response Planning


Suspected Surveillance

Actual or Suspected Sabotage

Active Shooter

Fire or Explosion


Illegally Parked or Abandoned Vehicle Outside the Perimeter

Illegally Parked or Abandoned Vehicle Inside the Perimeter

Hostage Taking


Vehicle Accident on the Perimeter

Suspicious or Unusual Incident

Bomb Threat

Hoax Call to First Responders

Putting It All Together

A Framework for Corporate Security

Example Threat Response Plan—Industrial Facility

Part 1: Threat and Vulnerability Assessment

Construction Phase

Part 2: Security Measures





Part 3: Observation Plan

Verification Plan

Part 4: Random Antiterrorism Measures

Facility Random Antiterrorism Measures

Part 5: Response Plans

Part 6: Training and Review

Training and Review Plan

Infrastructure Protection Zones

Threat Response Planning

Maritime Antipiracy Operations


Characteristics of Maritime Pirates

Piracy Threat Vulnerability Assessments

Antipiracy Security Measures

Individual Threat Response Planning

Residential Security Planning

Threat Vulnerability Assessment

Security Measures




Observation Planning

Random Deterrence Measures

Response Planning

Travel Security Planning

Threat Vulnerability Assessment



Travel Security Programs

Infectious Diseases


Security Measures

Observation Plan

Random Antiterrorism Measures

Response Plans

Insider Threats

Background Checks

Credit Checks

Ethics Hotlines

"It Couldn’t Happen Here"

Access Control




Subject Categories

BISAC Subject Codes/Headings:
LAW / Forensic Science
POLITICAL SCIENCE / Political Freedom & Security / Terrorism