Antiterrorism and Threat Response
eBook - ePub

Antiterrorism and Threat Response

Planning and Implementation

  1. 464 pages
  2. English
  3. ePUB (mobile friendly)
  4. Only available on web
eBook - ePub

Antiterrorism and Threat Response

Planning and Implementation

Book details
Table of contents
Citations

About This Book

As security professionals, we tend to get seduced by the beauty of our technology. We go to trade exhibitions filled with the latest innovations and marvel at what we see without understanding how it fits in with what we do. It's both overwhelming and distracting, like trying to learn to cook by walking through a grocery store.

This focus on technology teaches us to judge the effectiveness of physical protection systems by the strength of the barriers, the acuity of the cameras, and the sensitivity of the sensors. Terrorists and criminals look for something else entirely, though: where we see strength, they find weakness and vulnerability. We are looking at the same things, but not seeing the same things. If we want to stop them, we need to know more than how they work. We need to learn to see the way they see.

A physical protection system - that collection of people, sensors, barriers, policies, and technology – is a lot like a piano: and you cannot tell if a piano is in tune by looking at it. You have to play it. The major contribution of Antiterrorism and Threat Response: Planning and Implementation, 2e is the detailed instruction and practical advice on how to see the weaknesses and vulnerabilities in physical protection systems and upgrade them to meet the challenges of terrorists and criminals.

Key features of this book are:

  • Provides professionals with the background to understand how terrorists think and operate, in order to best coordinate their counterterrorism efforts and antiterrorism strategies
  • Examines difficult new problems facing security professionals: such as the use of drones, guns, and the internet as a tool of both recruitment and indoctrination
  • Teaches the reader how to step outside the security department to find and fix weaknesses and vulnerabilities in physical protection systems
  • Introduces and discusses security management and insider threat risk management programs

This is the advanced course in protecting physical assets from terrorists and criminals.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Antiterrorism and Threat Response by Ross Johnson in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Terrorism. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover
  2. Half-Title Page
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. Foreword
  8. Acknowledgments
  9. Introduction
  10. Chapter 1 Some Thoughts on Terrorism and Government
  11. Chapter 2 Terrorism
  12. Chapter 3 Counterterrorism
  13. Chapter 4 Antiterrorism Planning
  14. Chapter 5 Threat Vulnerability Assessment
  15. Chapter 6 Security Measures
  16. Chapter 7 Design Basis Threat
  17. Chapter 8 The VISA Methodology
  18. Chapter 9 Outsider-Only Scenarios
  19. Chapter 10 Insider-Only Scenarios
  20. Chapter 11 Insider Colluding with Outsiders Scenarios
  21. Chapter 12 Observation Planning and Surveillance Detection
  22. Chapter 13 Random Antiterrorism Measures
  23. Chapter 14 Response Planning
  24. Chapter 15 Insider Threat Risk Management
  25. Chapter 16 Individual Threat Response Planning
  26. Chapter 17 Threats from Drones and Guns
  27. Chapter 18 Security Management Programs
  28. Chapter 19 Searching for Weaknesses and Vulnerabilities
  29. Chapter 20 Checklists and Worksheets
  30. Glossary
  31. Index