Soft Target Hardening - Jennifer Hesterman

Soft Target Hardening

Protecting People from Attack
Buch | Hardcover
321 Seiten
2014
Apple Academic Press Inc. (Verlag)
978-1-4822-4421-2 (ISBN)
69,95 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Winner of ASIS International’s 2015 Security Book of the Year Award

Terrorist attacks occur daily and are increasingly being aimed at civilian populations around the world. Battlefield lines have been redrawn to include churches, schools, hospitals, and malls. This breach of moral boundary is shocking and invokes fear—two primary goals of terrorism.

Although there is an increase in soft target activity—or attacks on places of worship, study, and leisure—there is hesitation to explore such susceptibility in the United States. Soft Target Hardening: Protecting People from Attack starts the national dialogue by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States. Offering deterrence and mitigation techniques from more than 275 sources, this comprehensive book:


Explores U.S. cultural nuances contributing to the country turning a psychological blind eye toward soft target threats
Assesses the attractiveness of soft target threats presented by foreign and domestic terror groups and drug trafficking organizations
Analyzes the unique vulnerabilities of churches, schools, hospitals, malls, sporting and recreational events, and other soft targets
Gives an overview of soft target hardening tactics from global hotspots, including first-person accounts and photographs
Introduces the concept of effects-based hardening, derived from the military model of effects-based operations
Discusses emerging soft target challenges such as insider threats, kidnapping, and use of human shields
Evaluates the likelihood of the use of weapons of mass destruction against civilian-centric venues


Soft Target Hardening: Protecting People from Attack is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack.

Dr. Jennifer L. Hesterman, US Air Force (Retired), was commissioned in 1986 as a graduate of Air Force ROTC at Penn State University. During her military career, she served in three Pentagon tours and commanded multiple times in the field. A cleared professional, she is an advisor for Watermark Risk Management International, a senior analyst for the MASY Group, on the Advisory Board for the Government Security Conference, and a member of the ASIS Crime and Loss Prevention Council. Dr. Hesterman holds a doctoral degree from Benedictine University and master’s degrees from Johns Hopkins University and Air University.

Foreword


Preface


Acknowledgments


The Author


Soft Targets


Introduction


The Difference in Threat, Vulnerability, and Risk


References


The Psychology of Soft Targeting and Our Unique Vulnerability


Introduction


What Is Terrorism?


Who Becomes a Terrorist?


Terrorist Motivations


Terrorist Behavior


Terrorism’s Effectiveness


Terrorism’s Target


Soft Target Violence: A Collective Twenty-First Century Black Swan


The Internet as a Tool


Soft Targeting Motivations


Our Unique Vulnerability


What Do We Most Fear?


How Should We Respond?


References


International Terror Groups: Propensity and Ability to Mount Soft Target Attacks


Introduction


Modern Terrorism’s Roots


AQ and Affiliates


The Ideology


Rise of bin Laden and al-Qaeda


Emergent al-Qaeda


AQAP


ISIS/ISIL


Other AQ Splinter Groups


Bin Laden Speaks


AQ’s New Goals and Tactics


Hezbollah


Methodology and Objectives


Primary Area of Operations


Tactical Proficiency


Active and Deadly


Operations in the Western Hemisphere


South America


Canada


At the Mexican Border


United States


Hamas


Hamas in the Western Hemisphere


Summary of Threat


References


Domestic Terrorism and the Homegrown Threat


Introduction


History of Domestic Terrorism in the United States


The Twenty-First Century and the Rising Tide of Domestic Extremism


Right-Wing Extremism


Militias


Sovereign Citizens


Left Wing


Anarchists


Anarchism and the Military


Single-Issue or Special-Interest Terrorism


The Earth Liberation Front


Animal Liberation Front


Homegrown Terror


Rehabilitation and the Domestic Terrorist


Jihadist Defined


Recidivism


Counter-Radicalization Efforts


Inside the Saudi Program


Possible Solutions in the United States


The Lone Wolf


Mexican Cartels Cross the Border


Ideology: Money


Tactic: Brutal Violence Against Soft Targets


Goals: Money, Power, Control


Major DTOs Impacting the United States


Special Concern: Los Zetas


Zetas Tactics


Increasing Reach in the United States


Nexus with Gangs


Summary of Domestic Terrorist Threats against Soft Targets


References


Soft Target Threat Assessment: Schools, Churches, and Hospitals


Introduction


Vulnerability in the United States


Small Cities and Rural Areas in the Crosshairs


How Bad Actors Choose Targets


The Soft Targets


Schools


K–12 in the Crosshairs


K–12 Vulnerability


Colleges: Campus Culture and Vulnerability


Campuses Already Under Attack


Escalating Number of Attacks on College Campuses


Bad Blood: Intelligence, Law Enforcement, and Higher Education


Churches


The Proliferation of Church Attacks


US Churches as Targets


Hospitals


Nefarious Use of Ambulances


References


Soft Target Threat Assessment: Malls, Sporting Events, and Recreational Venues


Introduction


Shopping Malls


Other Significant Mall Attacks


Terrorist Threats Against US Malls


Vulnerable Open Air Marketplaces


Sports Venues


Stadiums and Arenas in the Crosshairs


Performing Arts and Recreation Venues


Tourist Sites: A Vulnerable Target


References


Hardening Tactics at Global Hotspots


Introduction


Soft Target Hardening in the Middle East


Life in a Compound


Schools and Christian Churches


Hotel Security


The Westerner as a Target


State Department Engagement


United Nations and Soft Targets


References


Soft Target Hardening 101


Introduction


Steady-State and Crisis Leadership


Intuition


Insider Threat: A Fifth Column


Good Hiring Practices—First Line of Defense


Background Checks


Kidnapping and the Use of Human Shields in Terrorist Operations


Surrounded by Crises


First Response and the Threat of Secondary Attacks


Weapons of Mass Destruction


In the SIRA Method


Suicide Terrorism


Face of Rage


References


Deterring and Mitigating Attack


Introduction


Effects-Based Hardening (EBH)


Physical Security


Parking Lots


Prepositioned Vehicle


Traffic Duty


Security


Locks


Alarms


Visitor Access and Badges


Closed Circuit Television (CCTV)


Public Address System


Ventilation System


Dining Halls


Emergency Preparations


Hold Room


Emergency Response Team and the Command Center


Bomb Threat


Medical Program


Shelter in Place


Elementary Schools in Focus


Hardening the College Campus


Building Relationships


Students and Staff as Force Multipliers


Exercising Due Diligence


Churches


Hospitals


Malls


Sports and Recreation Venues


Red Teaming Soft Targets


Conclusion


References


Fifteen Takeaways about Soft Target Hardening


Reference


Glossary


Appendix A: List of Foreign Terrorist Organizations


Appendix B: NIMS, the ICS and FEMA Courses


Appendix C: Federal Bureau of Investigation (FBI) Terrorism Vulnerability Self-Assessment Checklist


Appendix D: Bomb Threat Checklist


Appendix E: National Counterterrorism Center Bomb Threat Standoff Charts


Appendix F: Planning and Emergency Smartphone Applications


Appendix G: Primary and Secondary School Threat Assessment and Response Checklist


Index

Zusatzinfo 21 Tables, black and white; 28 Illustrations, black and white
Verlagsort Oakville
Sprache englisch
Maße 156 x 235 mm
Gewicht 590 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Recht / Steuern EU / Internationales Recht
Recht / Steuern Strafrecht Kriminologie
Sozialwissenschaften Politik / Verwaltung
Wirtschaft
ISBN-10 1-4822-4421-7 / 1482244217
ISBN-13 978-1-4822-4421-2 / 9781482244212
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00