1st Edition

Antiterrorism and Threat Response Planning and Implementation

By Ross Johnson Copyright 2013
    296 Pages 45 B/W Illustrations
    by CRC Press

    296 Pages 45 B/W Illustrations
    by CRC Press

    One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense’s antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book’s antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists—setting them off balance and keeping them off balance—thereby disrupting their planning cycle and thwarting attack.

    The book helps security managers to:

    • Understand the terrorist attack planning cycle
    • Conduct a terrorism threat vulnerability assessment
    • Develop an observation plan and the corresponding verification plan
    • Understand how surveillance detection works
    • Learn how pattern analysis wheels can be used to find weaknesses in security operations
    • Appreciate the role of random antiterrorism measures and learn how to develop them
    • Establish response plans for a wide variety of contingencies related to terrorist attack
    • Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments
    • Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack

    The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiqués. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

    Some Thoughts on Terrorism and Government
    Why Do Governments React So Strongly to Terrorism?
    Public Fear and National Risk
    The Monopoly on Violence
    Hijacking the Agenda
    You Have to Pay to Play
    Terrorism and Risk
    The Target Community
    Critical Infrastructure
    Actual Target History
    Categories of Targets
    Types of Attacks
    The Islamist Project and Al Qaeda
    Target: North America
    Target: Western Europe
    Target: Eastern Europe
    Target: Australasia and Oceania
    The Role of the Target Community
    What Is Terrorism?
    Strengths of Terrorist Groups
    Weaknesses of Terrorist Groups
    Anatomy of a Terrorist Group
    Terrorist Cell Organization
    Terrorist Incident Anatomy
    Broad Target Selection
    Intelligence Gathering and Surveillance
    Specific Target Selection
    Preattack Surveillance and Planning
    Attack Preparation and Rehearsal
    Actions on the Objective
    Escape and Exploitation
    Today’s Terrorist Threat
    Terrorist Methods
    Intelligence Leads the Way
    Analytical Tools
    Pattern Analysis Wheel
    Time-Event Charting
    Matrix Manipulation
    Association Matrix
    Activities Matrix
    Link Analysis
    Working with Counterterrorism Forces
    Antiterrorism Planning
    The Fundamentals
    Threat Vulnerability Assessment
    Risk Formula
    Threat Assessment Process
    Vulnerability Assessment
    TVA Tools
    A Few Other Things to Keep in Mind
    Converting Information into Intelligence, or So What?
    The Internet
    The Revolution in Social Media
    Don’t Learn the Wrong Lessons
    Security Measures
    The Design of Security Measures
    Security Measures—An Example
    What about Guns?
    U.S. Military Basic THREATCON Procedures
    Observation Planning
    The Seven Signs of Terrorist Activity
    Automated Systems
    Surveillance Detection
    Static Surveillance Detection
    Facility Vulnerability Assessment
    Surveillance Detection Plan
    How Surveillance Detection Works
    Mobile Surveillance Detection
    Foot Surveillance Detection
    GPS Tracking
    Writing an Observation Plan
    Verification of your Observation Plan
    Mobile Patrol Pattern Analysis
    Random Antiterrorism Measures
    Violence and Crime
    RAMs in a Low-Threat Environment
    Response Planning
    Suspected Surveillance
    Actual or Suspected Sabotage
    Active Shooter
    Fire or Explosion
    Illegally Parked or Abandoned Vehicle Outside the Perimeter
    Illegally Parked or Abandoned Vehicle Inside the Perimeter
    Hostage Taking
    Vehicle Accident on the Perimeter
    Suspicious or Unusual Incident
    Bomb Threat
    Hoax Call to First Responders
    Putting It All Together
    A Framework for Corporate Security
    Example Threat Response Plan—Industrial Facility
    Part 1: Threat and Vulnerability Assessment
    Construction Phase
    Part 2: Security Measures
    Part 3: Observation Plan
    Verification Plan
    Part 4: Random Antiterrorism Measures
    Facility Random Antiterrorism Measures
    Part 5: Response Plans
    Part 6: Training and Review
    Training and Review Plan
    Infrastructure Protection Zones
    Threat Response Planning
    Maritime Antipiracy Operations
    Characteristics of Maritime Pirates
    Piracy Threat Vulnerability Assessments
    Antipiracy Security Measures
    Individual Threat Response Planning
    Residential Security Planning
    Threat Vulnerability Assessment
    Security Measures
    Observation Planning
    Random Deterrence Measures
    Response Planning
    Travel Security Planning
    Threat Vulnerability Assessment
    Travel Security Programs
    Infectious Diseases
    Security Measures
    Observation Plan
    Random Antiterrorism Measures
    Response Plans
    Insider Threats
    Background Checks
    Credit Checks
    Ethics Hotlines
    "It Couldn’t Happen Here"
    Access Control


    Ross Johnson

    "This book is full of sense – keep your response plan up to date; work off your electronic copy, but keep a paper copy at home and in the office and guardhouse. … sound, useful and wide-ranging."
    —Professional Security Magazine

    "A comprehensive and practitioner-based examination of the components required to prepare for potential terrorist attacks … in order to prevent them from occurring."
    Joshua Sinai, Perspectives on Terrorism

    "Ross Johnson has extensive experience in the field as a military officer and then as the head of corporate security for a number of firms. He draws on his background to provide an excellent detailed guide for those who are responsible for preventing and responding to acts of terrorism in the corporate sector. It is a well-organized book that provides panoply of information to be applied throughout the whole spectrum of antiterrorism measures."
    ASIS Dynamics