책 이미지

책 정보
· 분류 : 외국도서 > 인문/사회 > 정치학 > 테러리즘
· ISBN : 9781466512900
· 쪽수 : 296쪽
· 출판일 : 2013-02-21
목차
Some Thoughts on Terrorism and Government
Why Do Governments React So Strongly to Terrorism?
Public Fear and National Risk
The Monopoly on Violence
Hijacking the Agenda
You Have to Pay to Play
Terrorism and Risk
The Target Community
Critical Infrastructure
Actual Target History
Categories of Targets
Types of Attacks
The Islamist Project and Al Qaeda
Ecoterrorism
Target: North America
Target: Western Europe
Target: Eastern Europe
Target: Australasia and Oceania
The Role of the Target Community
Terrorism
What Is Terrorism?
Strengths of Terrorist Groups
Weaknesses of Terrorist Groups
Anatomy of a Terrorist Group
Terrorist Cell Organization
Terrorist Incident Anatomy
Broad Target Selection
Intelligence Gathering and Surveillance
Specific Target Selection
Preattack Surveillance and Planning
Attack Preparation and Rehearsal
Actions on the Objective
Escape and Exploitation
Today’s Terrorist Threat
Terrorist Methods
Vulnerability
Counterterrorism
Definitions
Intelligence Leads the Way
Analytical Tools
Pattern Analysis Wheel
Time-Event Charting
Matrix Manipulation
Association Matrix
Activities Matrix
Link Analysis
Working with Counterterrorism Forces
Antiterrorism Planning
The Fundamentals
Threat Vulnerability Assessment
Risk Formula
Threat Assessment Process
Vulnerability Assessment
TVA Tools
A Few Other Things to Keep in Mind
Converting Information into Intelligence, or So What?
The Internet
The Revolution in Social Media
Don’t Learn the Wrong Lessons
Security Measures
The Design of Security Measures
Security Measures?An Example
What about Guns?
U.S. Military Basic THREATCON Procedures
Observation Planning
The Seven Signs of Terrorist Activity
Automated Systems
Surveillance
Surveillance Detection
Static Surveillance Detection
Facility Vulnerability Assessment
Surveillance Detection Plan
How Surveillance Detection Works
Mobile Surveillance Detection
Foot Surveillance Detection
GPS Tracking
Writing an Observation Plan
Verification of your Observation Plan
Mobile Patrol Pattern Analysis
Random Antiterrorism Measures
Violence and Crime
RAMs in a Low-Threat Environment
Response Planning
Communications
Suspected Surveillance
Actual or Suspected Sabotage
Active Shooter
Fire or Explosion
Protesters
Illegally Parked or Abandoned Vehicle Outside the Perimeter
Illegally Parked or Abandoned Vehicle Inside the Perimeter
Hostage Taking
Kidnapping
Vehicle Accident on the Perimeter
Suspicious or Unusual Incident
Bomb Threat
Hoax Call to First Responders
Putting It All Together
A Framework for Corporate Security
Example Threat Response Plan?Industrial Facility
Part 1: Threat and Vulnerability Assessment
Construction Phase
Part 2: Security Measures
Low
Medium
High
Imminent
Part 3: Observation Plan
Verification Plan
Part 4: Random Antiterrorism Measures
Facility Random Antiterrorism Measures
Part 5: Response Plans
Part 6: Training and Review
Training and Review Plan
Infrastructure Protection Zones
Threat Response Planning
Maritime Antipiracy Operations
Resources
Characteristics of Maritime Pirates
Piracy Threat Vulnerability Assessments
Antipiracy Security Measures
Individual Threat Response Planning
Residential Security Planning
Threat Vulnerability Assessment
Security Measures
Physical
Logical
Procedural
Observation Planning
Random Deterrence Measures
Response Planning
Travel Security Planning
Threat Vulnerability Assessment
Kidnapping
Confidentiality
Travel Security Programs
Infectious Diseases
Safety
Security Measures
Observation Plan
Random Antiterrorism Measures
Response Plans
Insider Threats
Background Checks
Credit Checks
Ethics Hotlines
"It Couldn’t Happen Here"
Access Control
Afterword
Glossary
Index