- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Winner of ASIS International's 2015 Security Book of the Year AwardTerrorist attacks occur daily and are increasingly being aimed at civilian populations around the world. Battlefield lines have been redrawn to include churches, schools, hospitals, and malls. This breach of moral boundary is shocking and invokes fear-two primary goals of terrorism.Although there is an increase in soft target activity-or attacks on places of worship, study, and leisure-there is hesitation to explore such susceptibility in the United States. Soft Target Hardening: Protecting People from Attack starts the national dialogue by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States. Offering deterrence and mitigation techniques from more than 275 sources, this comprehensive book: Explores U.S. cultural nuances contributing to the country turning a psychological blind eye toward soft target threatsAssesses the attractiveness of soft target threats presented by foreign and domestic terror groups and drug trafficking organizationsAnalyzes the unique vulnerabilities of churches, schools, hospitals, malls, sporting and recreational events, and other soft targetsGives an overview of soft target hardening tactics from global hotspots, including first-person accounts and photographsIntroduces the concept of effects-based hardening, derived from the military model of effects-based operationsDiscusses emerging soft target challenges such as insider threats, kidnapping, and use of human shieldsEvaluates the likelihood of the use of weapons of mass destruction against civilian-centric venuesSoft Target Hardening: Protecting People from Attack is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack.
Contents
ForewordPrefaceAcknowledgmentsThe AuthorSoft TargetsIntroductionThe Difference in Threat, Vulnerability, and RiskReferencesThe Psychology of Soft Targeting and Our Unique VulnerabilityIntroductionWhat Is Terrorism?Who Becomes a Terrorist?Terrorist MotivationsTerrorist BehaviorTerrorism's EffectivenessTerrorism's TargetSoft Target Violence: A Collective Twenty-First Century Black SwanThe Internet as a ToolSoft Targeting MotivationsOur Unique VulnerabilityWhat Do We Most Fear?How Should We Respond?ReferencesInternational Terror Groups: Propensity and Ability to Mount Soft Target AttacksIntroductionModern Terrorism's RootsAQ and AffiliatesThe IdeologyRise of bin Laden and al-QaedaEmergent al-QaedaAQAP ISIS/ISILOther AQ Splinter GroupsBin Laden SpeaksAQ's New Goals and TacticsHezbollahMethodology and ObjectivesPrimary Area of OperationsTactical ProficiencyActive and DeadlyOperations in the Western HemisphereSouth AmericaCanadaAt the Mexican BorderUnited StatesHamasHamas in the Western HemisphereSummary of ThreatReferencesDomestic Terrorism and the Homegrown ThreatIntroductionHistory of Domestic Terrorism in the United StatesThe Twenty-First Century and the Rising Tide of Domestic ExtremismRight-Wing ExtremismMilitiasSovereign CitizensLeft WingAnarchistsAnarchism and the MilitarySingle-Issue or Special-Interest TerrorismThe Earth Liberation FrontAnimal Liberation FrontHomegrown TerrorRehabilitation and the Domestic TerroristJihadist DefinedRecidivismCounter-Radicalization EffortsInside the Saudi ProgramPossible Solutions in the United StatesThe Lone WolfMexican Cartels Cross the BorderIdeology: MoneyTactic: Brutal Violence Against Soft TargetsGoals: Money, Power, ControlMajor DTOs Impacting the United StatesSpecial Concern: Los ZetasZetas TacticsIncreasing Reach in the United StatesNexus with GangsSummary of Domestic Terrorist Threats against Soft TargetsReferencesSoft Target Threat Assessment: Schools, Churches, and HospitalsIntroductionVulnerability in the United StatesSmall Cities and Rural Areas in the CrosshairsHow Bad Actors Choose TargetsThe Soft TargetsSchoolsK-12 in the CrosshairsK-12 VulnerabilityColleges: Campus Culture and VulnerabilityCampuses Already Under AttackEscalating Number of Attacks on College CampusesBad Blood: Intelligence, Law Enforcement, and Higher EducationChurchesThe Proliferation of Church AttacksUS Churches as TargetsHospitalsNefarious Use of AmbulancesReferencesSoft Target Threat Assessment: Malls, Sporting Events, and Recreational VenuesIntroductionShopping MallsOther Significant Mall AttacksTerrorist Threats Against US MallsVulnerable Open Air MarketplacesSports VenuesStadiums and Arenas in the CrosshairsPerforming Arts and Recreation VenuesTourist Sites: A Vulnerable TargetReferencesHardening Tactics at Global HotspotsIntroductionSoft Target Hardening in the Middle EastLife in a CompoundSchools and Christian ChurchesHotel SecurityThe Westerner as a TargetState Department EngagementUnited Nations and Soft TargetsReferencesSoft Target Hardening 101IntroductionSteady-State and Crisis LeadershipIntuitionInsider Threat: A Fifth ColumnGood Hiring Practices-First Line of DefenseBackground ChecksKidnapping and the Use of Human Shields in Terrorist OperationsSurrounded by CrisesFirst Response and the Threat of Secondary AttacksWeapons of Mass DestructionIn the SIRA MethodSuicide TerrorismFace of RageReferencesDeterring and Mitigating AttackIntroductionEffects-Based Hardening (EBH) Physical SecurityParking LotsPrepositioned VehicleTraffic DutySecurityLocksAlarmsVisitor Access and BadgesClosed Circuit Television (CCTV)Public Address SystemVentilation SystemDining HallsEmergency PreparationsHold RoomEmergency Response Team and the Command CenterBomb ThreatMedical ProgramShelter in PlaceElementary Schools in FocusHardening the College CampusBuilding RelationshipsStudents and Staff as Force MultipliersExercising Due DiligenceChurchesHospitalsMallsSports and Recreation VenuesRed Teaming Soft TargetsConclusionReferencesFifteen Takeaways about Soft Target HardeningReferenceGlossaryAppendix A: List of Foreign Terrorist OrganizationsAppendix B: NIMS, the ICS and FEMA CoursesAppendix C: Federal Bureau of Investigation (FBI) Terrorism Vulnerability Self-Assessment ChecklistAppendix D: Bomb Threat ChecklistAppendix E: National Counterterrorism Center Bomb Threat Standoff ChartsAppendix F: Planning and Emergency Smartphone ApplicationsAppendix G: Primary and Secondary School Threat Assessment and Response ChecklistIndex