Understanding, Assessing, and Responding to Terrorism
Home > Society and Social Sciences > Politics and government > Political activism / Political engagement > Terrorism, armed struggle > Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel
Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel

Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel


     0     
5
4
3
2
1



Available


X
About the Book

Preparedness is the best weapon against terrorism Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel gives a detailed explanation of how to implement preventive and/or protective measures to ensure the safety of personnel and facilities. It includes: Easily customized templates for the vulnerability analysis, security procedures, emergency response procedures, and training programs Vulnerability assessment methodologies and formulas for prioritizing targets Coverage of critical infrastructure sectors, hard targets, and soft targets, such as hotels, places of worship, and commercial districts Countermeasures for terrorist attacks using weapons of mass destruction with coverage of chemical, biological, radiological/nuclear, and explosive materials A seven-step Security Vulnerability Analysis (SVA) process to identify and categorize critical infrastructure, key resources, and key assets Information on the National Incident Management System (NIMS) that enables all public, private, and non-governmental organizations to work together effectively to prepare for, prevent, respond to, and recover from domestic incidents Numerous case studies and examples A practical, how-to book with step-by-step processes to help reduce risks from terrorist attacks, this is a must-have reference for private and public sector risk managers, safety engineers, security professionals, facility managers, emergency responders, and others charged with protecting facilities and personnel.

Table of Contents:
Preface xiii 1. The Terrorist Threat 1 1.1 What Is Terrorism? 1 1.2 Terrorism Statistics 2 1.3 Purpose of Terrorism 2 1.4 Goals of Terrorism 3 1.5 Case Study: Economic Effects of a Terrorist Attack 4 1.6 Objectives of Terrorism 4 1.7 The Terrorism Challenge 5 1.8 What is Homeland Security? 5 1.9 The Motivation for Terrorism 20 1.10 Common Terms in Terrorism 20 1.11 Types of Terrorists 23 1.12 Historical Terrorist Attacks 26 1.13 International Terrorism 27 1.14 Examples of International Terrorist Groups 31 1.15 Terrorist Groups that Claimed Responsibility for Terrorist Attacks in 2004 36 1.16 Recent International Terrorist Attacks 38 1.17 Domestic Terrorism 44 1.18 Examples of Domestic Terrorist Groups 46 1.19 Recent Domestic Terrorist Attacks 48 References 50 2. Critical Infrastructure 51 2.1 Introduction 51 2.2 Evolution of the Definition of Critical Infrastructure 51 2.3 Current Definition of Critical Infrastructure 53 2.4 Definition of Key Resources 54 2.5 Definition of Key Assets 54 2.6 Discussion of Critical Infrastructure 54 2.7 Soft Targets 62 2.8 Hard Targets 62 2.9 Cascading Effects from Interdependencies of Critical Infrastructures 63 2.10 Coordination of Critical Infrastructure Protection 64 2.11 Selection of Critical Infrastructure and Key Assets 67 2.12 Identification and Selection of Soft Targets by a Jurisdiction 68 2.13 Inventorying and Prioritizing Critical Infrastructure/Key Resources/Key Assets/Soft Targets 69 References 83 Appendix 2.1 Executive Order 13010 by President William J. Clinton 84 Appendix 2.2 Presidential Decision Directive 63 by President William J. Clinton 88 Appendix 2.3 Executive Order 13228 by President George W. Bush 100 Appendix 2.4 Executive Order 13231 by President George W. Bush 106 Appendix 2.5 Homeland Security Presidential Directive 7 by President George W. Bush 115 3. Types of Terrorist Attacks 123 3.1 Introduction 123 3.2 Types of Destructive Events 124 3.3 Who Can Execute an Attack? 124 3.4 Ways in Which an Asset May be Attacked 125 3.5 Target Selection 126 3.6 Identifying Lucrative Targets 127 3.7 Difference between Terrorism and Insurgency 128 3.8 Characteristics of a Terrorist Attack 129 3.9 Results of a Terrorist Attack 130 3.10 Terrorist Tactics 131 3.11 Case Study of a Terrorist Attack 138 3.12 The Interrupted Terrorist Plots 139 References 141 4. Weapons of Mass Destruction 143 4.1 Introduction 143 4.2 History of Weapons of Mass Destruction 144 4.3 Why Use a Weapon of Mass Destruction? 145 4.4 Limitations of the Use of Weapon of Mass Destruction Materials 146 4.5 Indicators of a Possible Weapon of Mass Destruction Attack 147 4.6 Results of a Weapon of Mass Destruction Attack 147 4.7 How a Chemical, Biological, or Radiological Agent Can Enter the Body 149 4.8 Questions About Weapons of Mass Destruction 150 4.9 Types of Weapons of Mass Destruction 152 4.10 Weaponization of Chemical and Biological Agents 183 References 191 5. The Terrorist’s Preparation for an Attack 193 5.1 General 193 5.2 Target Considerations 193 5.3 The Terrorist’s Investment 194 5.4 Example of Terrorist Financing 195 5.5 Eight Indicators of Terrorism 196 5.6 Raising Suspicion 211 5.7 Summary of Attack Process 212 References 213 6. Risk and Threat Assessment 215 6.1 Introduction 215 6.2 Definitions 215 6.3 The Risk of Attack 217 6.4 Determining Key Asset and Its Value 217 6.5 Threats 219 6.6 Probability of Attack Occurrence 225 6.7 Consequences of a Successful Attack 226 6.8 Risk 226 6.9 The CARVER Assessment Tool 244 References 250 Appendix 6.1 Homeland Security Presidential Directive 3 by President George W. Bush 251 7. Protecting Critical Infrastructure, Key Resources, and Key Assets 255 7.1 Introduction 255 7.2 Purpose of Security Vulnerability Analysis (SVA) 255 7.3 Preparing to Conduct a Security Vulnerability Analysis 259 7.4 The Security Vulnerability Analysis Process 260 7.5 Administrative Functions in Security Vulnerability Analysis Process 268 7.6 Risk Assessment 273 7.7 Preparing to Conduct a Threat and Risk Analysis 274 7.8 The Buffer Zone Protection Plan (BZPP) 282 7.9 The CARVER Target Analysis Tool 284 Reference 287 8. Principles of Protective Security 289 8.1 Introduction 289 8.2 Prevention 289 8.3 Information Collection 290 8.4 Information Sharing 290 8.5 Risk Mitigation 290 8.6 Cost–Benefit Analysis 291 8.7 Situational Awareness 292 8.8 Security 295 8.9 Suspicious Activity 299 8.10 What Can be Done to Protect People and Facilities 300 8.11 Conclusion 309 References 310 9. Effective Security Countermeasures 311 9.1 Introduction 311 9.2 Counterterrorism Policy: National Security Strategy 312 9.3 Hardening 312 9.4 What Are Security Countermeasures? 312 9.5 Management of Change 317 9.6 Risk Management 317 9.7 Critical Infrastructure Resiliency 318 9.8 Critical Infrastructure Protection 320 9.9 All Hazards Protection 322 9.10 Cost–Benefit Analysis 322 9.11 Information Sharing and Analysis Centers 323 9.12 Private Sector’s Responsibility 323 9.13 Protecting Critical Infrastructure, Key Resources, and Key Assets 324 9.14 Administrative Security Enhancements 329 9.15 Recommendations for Enhanced Security Through Various ISACs 348 References 360 Appendix 9.1 Homeland Security Presidential Directive 8 by President George W. Bush 361 10. General Emergency Response Considerations 367 10.1 Introduction 367 10.2 Definition of First Responder 367 10.3 Emergency Response Plans 368 10.4 Pre-Emergency Plans 369 10.5 Drills and Exercises 370 10.6 Emergency Response Priorities 372 10.7 Operational Risk Management 374 10.8 Situational Awareness 376 10.9 Homeland Security Presidential Directive 5 (HSPD 5) 377 10.10 Homeland Security Presidential Directive 8—National Preparedness 383 10.11 The Incident Command System 384 10.12 Determining Potential Outcomes 391 10.13 Approving the Level of Personal Protective Equipment 391 10.14 Developing a Plan of Action 393 10.15 Requirements for the Incident Command System 395 10.16 Evaluating Progress of the Plan of Action 412 10.17 Terminating the Incident 413 10.18 Critical Incident Stress 416 10.19 Family Preparedness 417 Reference 418 Appendix 10.1 Homeland Security Presidential Directive 5 by President George W. Bush 419 11. Emergency Response to a Weapon of Mass Destruction Attack 425 11.1 Introduction 425 11.2 Use of a Weapon of Mass Destruction 426 11.3 The Emergency Scene as a Crime Scene 426 11.4 Size up 427 11.5 The Secondary Device 427 11.6 Evacuation of Personnel in a Weapon of Mass Destruction Attack 429 11.7 Protecting Building Environments from Airborne Agents 431 11.8 Emergency Response Actions at the Scene of a Weapon of Mass Destruction Incident 432 Index 461

About the Author :
Brian T. Bennett, PhD. has more than twenty years of experience in dealing with health and safety, emergency response, and security/counterterrorism issues in both the chemical manufacturing industry as well as in the community as a volunteer firefighter and emergency management official. He holds numerous professional certifications, including Certified in Homeland Security (CHS), Certified Safety Professional (CSP), and Certified Hazardous Materials Manager (CHMM). He is Chair of the New Jersey Domestic Security Task Force Infrastructure Advisory Committee for the chemical sector. Dr. Bennett is a certified Firefighter, Fire Official, Fire Officer, Fire Instructor, Hazardous Materials Specialist, and Weapons of Mass Destruction Technician. He has written and lectured extensively on combating terrorism.

Review :
"...comprehensive and well written. Its should be read by all security personnel, both public and private, as it contains valuable insights…" (Journal of Hazardous Materials, October 1, 2007)


Best Sellers


Product Details
  • ISBN-13: 9780471771524
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Interscience
  • Height: 238 mm
  • No of Pages: 480
  • Sub Title: Protecting Critical Infrastructure and Personnel
  • Width: 163 mm
  • ISBN-10: 047177152X
  • Publisher Date: 26 Apr 2007
  • Binding: Hardback
  • Language: English
  • Spine Width: 31 mm
  • Weight: 824 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel
John Wiley & Sons Inc -
Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!