Includes bibliographical references (pages 271-291) and index.
CONTENTS NOTE
Text of Note
The gap in our defenses -- pt. I. Analyzing our vulnerabilities. Think terrorist -- The key role of opportunity -- Airliner hijackings : the lessons of reducing opportunity -- Suicide bombings, step by step -- Dynamics of terrorist decisions -- pt. II. The opportunity structure of terrorism. Targets -- Weapons -- Tools -- Facilitating conditions : the nuclear example -- pt. III. Vulnerability at home and overseas. Targets--near and far -- Taking it to them--when far is near -- Terror in three English cities -- Confusing near and far : crisis planning in the United States -- pt. IV. Responding to the threat. A framework for prevention -- Situational techniques and publicity -- Implementing a program of situational prevention -- Becoming smarter.
0
SUMMARY OR ABSTRACT
Text of Note
Given that the war on terror is currently being fought the way crime typically is-after the fact-this country cannot protect its citizens from future terrorist events solely in this way. Instead, measures must be taken to actually stop terrorists before they can attack. Here, the authors argue that government anti-terrorism policy must pay much more attention to reducing opportunities for terrorist attacks by protecting vulnerable targets, controlling the tools and weapons used by terrorists, and by removing the conditions of everyday life that make these attacks possible. While some of this work is done on an ad hoc basis, there are no recognized methods to guide the work, there is limited experience on which to draw, and the government has no trained professionals to oversee the work. In this book, the authors address these deficiencies, and lay out a systematic approach for reducing opportunities for terrorism. The current "take-them-out mindset" may be the main reason why reducing opportunities for terrorism has been so neglected by governments, but another important reason is that the task seems so overwhelmingly difficult. How can we possibly protect every vulnerable target or person? How can we control all the everyday tools that terrorists must use in carrying out their attacks? How can we control their weapons when we cannot even keep guns out the hands of ordinary criminals? In this book, the authors show that these tasks are indeed manageable. They take readers through the methods for preventing terrorism and the policies that will assist in this important work. They show that in order to protect the country from terrorists, security forces must do what the terrorists do: identify vulnerable targets, analyze their specific weaknesses, consider the tools and weapons needed to attack, and assess access to the targets. Once these steps are taken, security agencies can then provide appropriate protection, limit accessibility, anticipate the forces needed to combat a potential attack, and plan carefully for an attack if it does occur. By "outsmarting the terrorists" security forces undertake the same analysis of vulnerabilities and opportunities that terrorists themselves undertake in planning their operations, and can more effectively defeat them before they strike. This books shows how this approach works and can succeed.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Greenwood eBooks
Stock Number
C9230
OTHER EDITION IN ANOTHER MEDIUM
Title
Outsmarting the terrorists.
International Standard Book Number
9780275992309
TOPICAL NAME USED AS SUBJECT
National security-- United States.
Security, International.
Terrorism-- Government policy-- United States.
Terrorism-- Prevention.
Terrorism-- United States-- Prevention.
War on Terrorism, 2001-2009.
Opération Liberté immuable, 2001-
Sécurité internationale.
Sécurité nationale-- États-Unis.
Terrorisme-- États-Unis-- Prévention.
Terrorisme-- Politique gouvernementale-- États-Unis.
Terrorisme-- Prévention.
Bestrijding.
National security.
POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.