Hesterman | Soft Target Hardening: Protecting People from Attack | Buch | 978-1-4822-4421-2 | sack.de

Buch, Englisch, 321 Seiten, Format (B × H): 163 mm x 236 mm, Gewicht: 590 g

Hesterman

Soft Target Hardening: Protecting People from Attack

Buch, Englisch, 321 Seiten, Format (B × H): 163 mm x 236 mm, Gewicht: 590 g

ISBN: 978-1-4822-4421-2
Verlag: CRC PR INC


Winner of ASIS International’s 2015 Security Book of the Year AwardTerrorist attacks occur daily and are increasingly being aimed at civilian populations around the world. Battlefield lines have been redrawn to include churches, schools, hospitals, and malls. This breach of moral boundary is shocking and invokes fear—two primary goals of terrorism.Although there is an increase in soft target activity—or attacks on places of worship, study, and leisure—there is hesitation to explore such susceptibility in the United States. Soft Target Hardening: Protecting People from Attack starts the national dialogue by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States. Offering deterrence and mitigation techniques from more than 275 sources, this comprehensive book:

Explores U.S. cultural nuances contributing to the country turning a psychological blind eye toward soft target threats
Assesses the attractiveness of soft target threats presented by foreign and domestic terror groups and drug trafficking organizations
Analyzes the unique vulnerabilities of churches, schools, hospitals, malls, sporting and recreational events, and other soft targets
Gives an overview of soft target hardening tactics from global hotspots, including first-person accounts and photographs
Introduces the concept of effects-based hardening, derived from the military model of effects-based operations
Discusses emerging soft target challenges such as insider threats, kidnapping, and use of human shields
Evaluates the likelihood of the use of weapons of mass destruction against civilian-centric venues
Soft Target Hardening: Protecting People from Attack is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack.
Hesterman Soft Target Hardening: Protecting People from Attack jetzt bestellen!

Zielgruppe


Those who secure, own, and operate soft target facilities such as churches, schools, hospitals, malls, and sporting and recreational arenas, as well as citizens who want to protect themselves and their families from attack.


Autoren/Hrsg.


Weitere Infos & Material


Foreword
Preface
Acknowledgments
The Author
Soft Targets
Introduction
The Difference in Threat, Vulnerability, and Risk
References
The Psychology of Soft Targeting and Our Unique Vulnerability
Introduction
What Is Terrorism?
Who Becomes a Terrorist?
Terrorist Motivations
Terrorist Behavior
Terrorism’s Effectiveness
Terrorism’s Target
Soft Target Violence: A Collective Twenty-First Century Black Swan
The Internet as a Tool
Soft Targeting Motivations
Our Unique Vulnerability
What Do We Most Fear?
How Should We Respond?
References
International Terror Groups: Propensity and Ability to Mount Soft Target Attacks
Introduction
Modern Terrorism’s Roots
AQ and Affiliates
The Ideology
Rise of bin Laden and al-Qaeda
Emergent al-Qaeda
AQAP
ISIS/ISIL
Other AQ Splinter Groups
Bin Laden Speaks
AQ’s New Goals and Tactics
Hezbollah
Methodology and Objectives
Primary Area of Operations
Tactical Proficiency
Active and Deadly
Operations in the Western Hemisphere
South America
Canada
At the Mexican Border
United States
Hamas
Hamas in the Western Hemisphere
Summary of Threat
References
Domestic Terrorism and the Homegrown Threat
Introduction
History of Domestic Terrorism in the United States
The Twenty-First Century and the Rising Tide of Domestic Extremism
Right-Wing Extremism
Militias
Sovereign Citizens
Left Wing
Anarchists
Anarchism and the Military
Single-Issue or Special-Interest Terrorism
The Earth Liberation Front
Animal Liberation Front
Homegrown Terror
Rehabilitation and the Domestic Terrorist
Jihadist Defined
Recidivism
Counter-Radicalization Efforts
Inside the Saudi Program
Possible Solutions in the United States
The Lone Wolf
Mexican Cartels Cross the Border
Ideology: Money
Tactic: Brutal Violence Against Soft Targets
Goals: Money, Power, Control
Major DTOs Impacting the United States
Special Concern: Los Zetas
Zetas Tactics
Increasing Reach in the United States
Nexus with Gangs
Summary of Domestic Terrorist Threats against Soft Targets
References
Soft Target Threat Assessment: Schools, Churches, and Hospitals
Introduction
Vulnerability in the United States
Small Cities and Rural Areas in the Crosshairs
How Bad Actors Choose Targets
The Soft Targets
Schools
K–12 in the Crosshairs
K–12 Vulnerability
Colleges: Campus Culture and Vulnerability
Campuses Already Under Attack
Escalating Number of Attacks on College Campuses
Bad Blood: Intelligence, Law Enforcement, and Higher Education
Churches
The Proliferation of Church Attacks
US Churches as Targets
Hospitals
Nefarious Use of Ambulances
References
Soft Target Threat Assessment: Malls, Sporting Events, and Recreational Venues
Introduction
Shopping Malls
Other Significant Mall Attacks
Terrorist Threats Against US Malls
Vulnerable Open Air Marketplaces
Sports Venues
Stadiums and Arenas in the Crosshairs
Performing Arts and Recreation Venues
Tourist Sites: A Vulnerable Target
References
Hardening Tactics at Global Hotspots
Introduction
Soft Target Hardening in the Middle East
Life in a Compound
Schools and Christian Churches
Hotel Security
The Westerner as a Target
State Department Engagement
United Nations and Soft Targets
References
Soft Target Hardening 101
Introduction
Steady-State and Crisis Leadership
Intuition
Insider Threat: A Fifth Column
Good Hiring Practices—First Line of Defense
Background Checks
Kidnapping and the Use of Human Shields in Terrorist Operations
Surrounded by Crises
First Response and the Threat of Secondary Attacks
Weapons of Mass Destruction
In the SIRA Method
Suicide Terrorism
Face of Rage
References
Deterring and Mitigating Attack
Introduction
Effects-Based Hardening (EBH)
Physical Security
Parking Lots
Prepositioned Vehicle
Traffic Duty
Security
Locks
Alarms
Visitor Access and Badges
Closed Circuit Television (CCTV)
Public Address System
Ventilation System
Dining Halls
Emergency Preparations
Hold Room
Emergency Response Team and the Command Center
Bomb Threat
Medical Program
Shelter in Place
Elementary Schools in Focus
Hardening the College Campus
Building Relationships
Students and Staff as Force Multipliers
Exercising Due Diligence
Churches
Hospitals
Malls
Sports and Recreation Venues
Red Teaming Soft Targets
Conclusion
References
Fifteen Takeaways about Soft Target Hardening
Reference
Glossary
Appendix A: List of Foreign Terrorist Organizations
Appendix B: NIMS, the ICS and FEMA Courses
Appendix C: Federal Bureau of Investigation (FBI) Terrorism Vulnerability Self-Assessment Checklist
Appendix D: Bomb Threat Checklist
Appendix E: National Counterterrorism Center Bomb Threat Standoff Charts
Appendix F: Planning and Emergency Smartphone Applications
Appendix G: Primary and Secondary School Threat Assessment and Response Checklist
Index


Dr. Jennifer L. Hesterman, US Air Force (Retired), was commissioned in 1986 as a graduate of Air Force ROTC at Penn State University. During her military career, she served in three Pentagon tours and commanded multiple times in the field. A cleared professional, she is an advisor for Watermark Risk Management International, a senior analyst for the MASY Group, on the Advisory Board for the Government Security Conference, and a member of the ASIS Crime and Loss Prevention Council. Dr. Hesterman holds a doctoral degree from Benedictine University and master’s degrees from Johns Hopkins University and Air University.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.