Preface xiii
1. The Terrorist Threat 1
1.1 What Is Terrorism? 1
1.2 Terrorism Statistics 2
1.3 Purpose of Terrorism 2
1.4 Goals of Terrorism 3
1.5 Case Study: Economic Effects of a Terrorist Attack 4
1.6 Objectives of Terrorism 4
1.7 The Terrorism Challenge 5
1.8 What is Homeland Security? 5
1.9 The Motivation for Terrorism 20
1.10 Common Terms in Terrorism 20
1.11 Types of Terrorists 23
1.12 Historical Terrorist Attacks 26
1.13 International Terrorism 27
1.14 Examples of International Terrorist Groups 31
1.15 Terrorist Groups that Claimed Responsibility for Terrorist Attacks in 2004 36
1.16 Recent International Terrorist Attacks 38
1.17 Domestic Terrorism 44
1.18 Examples of Domestic Terrorist Groups 46
1.19 Recent Domestic Terrorist Attacks 48
References 50
2. Critical Infrastructure 51
2.1 Introduction 51
2.2 Evolution of the Definition of Critical Infrastructure 51
2.3 Current Definition of Critical Infrastructure 53
2.4 Definition of Key Resources 54
2.5 Definition of Key Assets 54
2.6 Discussion of Critical Infrastructure 54
2.7 Soft Targets 62
2.8 Hard Targets 62
2.9 Cascading Effects from Interdependencies of Critical Infrastructures 63
2.10 Coordination of Critical Infrastructure Protection 64
2.11 Selection of Critical Infrastructure and Key Assets 67
2.12 Identification and Selection of Soft Targets by a Jurisdiction 68
2.13 Inventorying and Prioritizing Critical Infrastructure/Key Resources/Key Assets/Soft Targets 69
References 83
Appendix 2.1 Executive Order 13010 by President William J. Clinton 84
Appendix 2.2 Presidential Decision Directive 63 by President William J. Clinton 88
Appendix 2.3 Executive Order 13228 by President George W. Bush 100
Appendix 2.4 Executive Order 13231 by President George W. Bush 106
Appendix 2.5 Homeland Security Presidential Directive 7 by President George W. Bush 115
3. Types of Terrorist Attacks 123
3.1 Introduction 123
3.2 Types of Destructive Events 124
3.3 Who Can Execute an Attack? 124
3.4 Ways in Which an Asset May be Attacked 125
3.5 Target Selection 126
3.6 Identifying Lucrative Targets 127
3.7 Difference between Terrorism and Insurgency 128
3.8 Characteristics of a Terrorist Attack 129
3.9 Results of a Terrorist Attack 130
3.10 Terrorist Tactics 131
3.11 Case Study of a Terrorist Attack 138
3.12 The Interrupted Terrorist Plots 139
References 141
4. Weapons of Mass Destruction 143
4.1 Introduction 143
4.2 History of Weapons of Mass Destruction 144
4.3 Why Use a Weapon of Mass Destruction? 145
4.4 Limitations of the Use of Weapon of Mass Destruction Materials 146
4.5 Indicators of a Possible Weapon of Mass Destruction Attack 147
4.6 Results of a Weapon of Mass Destruction Attack 147
4.7 How a Chemical, Biological, or Radiological Agent Can Enter the Body 149
4.8 Questions About Weapons of Mass Destruction 150
4.9 Types of Weapons of Mass Destruction 152
4.10 Weaponization of Chemical and Biological Agents 183
References 191
5. The Terrorist s Preparation for an Attack 193
5.1 General 193
5.2 Target Considerations 193
5.3 The Terrorist s Investment 194
5.4 Example of Terrorist Financing 195
5.5 Eight Indicators of Terrorism 196
5.6 Raising Suspicion 211
5.7 Summary of Attack Process 212
References 213
6. Risk and Threat Assessment 215
6.1 Introduction 215
6.2 Definitions 215
6.3 The Risk of Attack 217
6.4 Determining Key Asset and Its Value 217
6.5 Threats 219
6.6 Probability of Attack Occurrence 225
6.7 Consequences of a Successful Attack 226
6.8 Risk 226
6.9 The CARVER Assessment Tool 244
References 250
Appendix 6.1 Homeland Security Presidential Directive 3 by President George W. Bush 251
7. Protecting Critical Infrastructure, Key Resources, and Key Assets 255
7.1 Introduction 255
7.2 Purpose of Security Vulnerability Analysis (SVA) 255
7.3 Preparing to Conduct a Security Vulnerability Analysis 259
7.4 The Security Vulnerability Analysis Process 260
7.5 Administrative Functions in Security Vulnerability Analysis Process 268
7.6 Risk Assessment 273
7.7 Preparing to Conduct a Threat and Risk Analysis 274
7.8 The Buffer Zone Protection Plan (BZPP) 282
7.9 The CARVER Target Analysis Tool 284
Reference 287
8. Principles of Protective Security 289
8.1 Introduction 289
8.2 Prevention 289
8.3 Information Collection 290
8.4 Information Sharing 290
8.5 Risk Mitigation 290
8.6 Cost Benefit Analysis 291
8.7 Situational Awareness 292
8.8 Security 295
8.9 Suspicious Activity 299
8.10 What Can be Done to Protect People and Facilities 300
8.11 Conclusion 309
References 310
9. Effective Security Countermeasures 311
9.1 Introduction 311
9.2 Counterterrorism Policy: National Security Strategy 312
9.3 Hardening 312
9.4 What Are Security Countermeasures? 312
9.5 Management of Change 317
9.6 Risk Management 317
9.7 Critical Infrastructure Resiliency 318
9.8 Critical Infrastructure Protection 320
9.9 All Hazards Protection 322
9.10 Cost Benefit Analysis 322
9.11 Information Sharing and Analysis Centers 323
9.12 Private Sector s Responsibility 323
9.13 Protecting Critical Infrastructure, Key Resources, and Key Assets 324
9.14 Administrative Security Enhancements 329
9.15 Recommendations for Enhanced Security Through Various ISACs 348
References 360
Appendix 9.1 Homeland Security Presidential Directive 8 by President George W. Bush 361
10. General Emergency Response Considerations 367
10.1 Introduction 367
10.2 Definition of First Responder 367
10.3 Emergency Response Plans 368
10.4 Pre-Emergency Plans 369
10.5 Drills and Exercises 370
10.6 Emergency Response Priorities 372
10.7 Operational Risk Management 374
10.8 Situational Awareness 376
10.9 Homeland Security Presidential Directive 5 (HSPD 5) 377
10.10 Homeland Security Presidential Directive 8 National Preparedness 383
10.11 The Incident Command System 384
10.12 Determining Potential Outcomes 391
10.13 Approving the Level of Personal Protective Equipment 391
10.14 Developing a Plan of Action 393
10.15 Requirements for the Incident Command System 395
10.16 Evaluating Progress of the Plan of Action 412
10.17 Terminating the Incident 413
10.18 Critical Incident Stress 416
10.19 Family Preparedness 417
Reference 418
Appendix 10.1 Homeland Security Presidential Directive 5 by President George W. Bush 419
11. Emergency Response to a Weapon of Mass Destruction Attack 425
11.1 Introduction 425
11.2 Use of a Weapon of Mass Destruction 426
11.3 The Emergency Scene as a Crime Scene 426
11.4 Size up 427
11.5 The Secondary Device 427
11.6 Evacuation of Personnel in a Weapon of Mass Destruction Attack 429
11.7 Protecting Building Environments from Airborne Agents 431
11.8 Emergency Response Actions at the Scene of a Weapon of Mass Destruction Incident 432
Index 461