Terrorism Awareness: Understanding the Threat and How You Can Protect Yourself

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Terrorism Awareness: Understanding the Threat and How You Can Protect Yourselfprovides readers a foundationalunderstanding of the threats that face us every day.The goal is to introduce readers to different tactics and techniques used by terrorists―both international and domestic―to better understand personal protection concepts and, if necessary, take actions to make themselves "hard targets" that terrorist organizations will want to avoid. This includes providing a background on understanding how terrorists operate, and, more specifically, how to recognize the pre-incident indicators associated with terrorist operations.

Coverage includes situation awareness of the phases of terrorist operations, common attacks, surveillance and targeting tactics, kidnapping and hostage situations, bombings and blast effects, hijacking, armed assaults, and more. With such awareness, readers can be alert to common cues to avoid dangerous situations, as well as familiarize themselves with various actions they can take to better protect themselves. Sometimes certain events may arise which are unavoidable and, in those cases, learning how to best mitigate those scenarios can mean life or death and provide the best opportunity for safety and survival.

Terrorism Awareness is a helpful guide to provide anyone working or traveling in the United States or overseas―particularly in potentially volatile places subject to terrorism or civil unrest―the tools they need to recognize potential threats and to keep themselves, and those they are with, safe.

Author(s): Robert H. Deatherage Jr.
Publisher: CRC Press
Year: 2023

Language: English
Pages: 296
City: Boca Raton

Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Introduction
Chapter 1: Introduction to Terrorism
A Brief History of Terrorism
Perspectives of Terrorism
Long-Range Objectives of Terrorism
Motivation That Binds People Together into Terrorist Groups
Mechanisms Used to Label Terrorist Groups
Immediate Goals and Characteristics of Terrorist Groups
The Typical Internal Organization of Terrorist Groups
Training Programs Used by Terrorist Groups
Chapter 2: Terrorist Operations
Characteristics of Terrorist Operations
Dynamic
Simple
Offensive
Designed for Their Impact
Examples of terrorist attacks against Americans
Other Characteristics of Terrorist Operations
Phases of a Terrorist Operation
Common Terrorist Acts
Bombings
Steps of a Bombing
Other Techniques of Bombings
Kidnapping
Steps of Kidnapping an Individual from a Static Location
Steps to Kidnapping a Victim Enroute
Example of an Enroute Kidnapping
Hostage Barricade
Hijacking (Mobile Hostage Barricade)
Example of a Hijacking (Ship, Piracy)
Phases of a Hijacking
Skyjacking (Air Piracy) (Mobile Hostage Barricade)
Phases of skyjacking
Example of a Skyjacking
Example 2
Example 3
Assassination
Steps to an Assassination
Common Factors of Assassinations
Examples of Assassinations
Example 2
Example 3
Example 4
Armed Assaults
Fundamentals of a Raid
Example of a Raid
Fundamentals of an Ambush
Standoff Weapons
Overrun Attack (Drive-by)
Examples of Overrun Attacks
Arson
Maiming
Terrorist Weapons
Chapter 3: Improvised Explosive Devices
Reasons for Terrorist Bombings
Define and Categorize IEDs
Describe the Effects of Bomb Fragmentation and Blast
Describe Initiation Systems of Explosives
How the IED Gets to the Target Site
IED Concealment Techniques
How to Detect a Concealed IED
Methods Used to Recognize Postal Bombs
Vehicle Bomb Search
Bomb Search Techniques for Buildings
The Bomb Threat Plan
HOAX Bombs
Bomb Threat by Phone
Written Bomb Threat
Chapter 4: Hostage Survival
Reasons behind Taking of Hostages
How They Chose the Victims
Different Categories of Hostage Takers
Guidelines When Dealing with Hostage Takers
Personal Contingency Planning
The Moment of Capture
Resist or Surrender?
Stress
A Part of any Captivity
Meditation
The Stockholm Syndrome
Adjusting to Captivity
Incident Resolution
The Aftermath of a Hostage Situation
Chapter 5: Rapport-Building Techniques
Rapport
Neurolinguistic Programming
What Is Communication?
Symbolic and Behavioral Communications
Reflective Pacing
Nonverbal Pacing
Matching
Mirroring
Verbal Pacing
Partial Pacing
Crossover Pacing
Cross-Cultural Communication
Other Rapport-Building Techniques
Chapter 6: Detecting Terrorist Surveillance
Define Surveillance
Surveillance Techniques
Stationary or Fixed Surveillance
Moving Surveillance or Enroute Surveillance
Foot Surveillance
Vehicle Surveillance
Leading Surveillance
Progressive Surveillance
Technology
Objectives of Terrorist Surveillance
The Phases of Terrorist Surveillance
General Items of Information Required by the Threat
Techniques That Can Be Used to Detect Surveillance
Passive Maneuvers
Passive Maneuvers on Foot
Passive Maneuvers while Driving
Route Surveys
Observation and Description
Chapter 7: Individual Protective Measures
How to Determine the Threat in an Area
Why We Are Targets? How We Become Victims?
Identification and Selection of Targets
Identification by Name
Personal Recognition
Soft Targets
Hard Targets
Protection Measures for Movement
Moving on Foot
Moving in a Vehicle
If You Have a Driver Assigned
Rules of Conduct for Assigned Drivers
Your Behavior as a Passenger
Other Considerations
Protection Measures when Traveling by Commercial Means
Conduct Prior to Boarding
Conduct while in the Air
Attitude toward Terrorists
Rescue Attempt
Brief Dependents
Hotel Security
Residential Security
Layered Defense
Information
Outer Layer
Exterior Lighting
Night Watchmen/Roving Patrol
Inner Layer
Behavioral Aspects of the Family
Servants
Service Personnel (Repair People)
Being Absent from the Residence
Protection Measures in the Office
Socializing
Note
Chapter 8: Riots and Protests
Stationary
Mobile
What You Can Do
Chapter 9: Active Incident
Active Shooter
What You Can Do?
What You Should Do in Case of an Active Shooter?
Knife Attack
Vehicle Used as a Weapon
What You Can Do?
Chapter 10: Domestic Terrorism
Lone Wolf
What Can You Do?
Note
Chapter 11: Fire Used as a Weapon
What You Can Do?
Chapter 12: Cyber Awareness
When Online, How to Prevent Divulging Critical Information?
Phishing and Spear Phishing
Malicious Code
Weak Passwords
Removable Media
Bluetooth
Chat Rooms, Game Rooms, etc. and Children’s Devices Online. The Danger of Solicitation
Chapter 13: Conclusion
Index