Learn about the nature of terrorism.
Terrorists look for visible targets where they can avoid detection before
or after an attack such as international airports, large cities, major
international events, resorts, and high-profile landmarks.
about the different types of terrorist weapons including explosives,
kidnappings, hijackings, arson, and shooting
to deal with a terrorist incident by adapting many of the same techniques used
to prepare for other crises.
Be alert and aware of the surrounding area. The very nature of terrorism
suggests that there may be little or no warning.
Take precautions when traveling. Be aware of conspicuous or unusual
behavior. Do not accept packages from strangers. Do not leave luggage
Learn where emergency exits are located. Think ahead about how to
evacuate a building, subway or congested public area in a hurry. Learn where
staircases are located.
your immediate surroundings. Be aware of heavy or breakable objects that could
move, fall or break in an explosion.
Anti Terrorism Planning
the Terrorist Threat through Industrial Risk Assessment Methodologies
risk of private industries becoming the target of a terrorist attack is
increasing. As governmental assets become privatized, as industries explore new
endeavors, and as data availability throughout the World Wide Web becomes more
widespread, the target list of possible terrorist victims grows longer and
attempt to identify, analyze, and counter the threat posed by terrorists can be
a daunting task. Companies that do not normally employ modern qualitative risk
analysis techniques may not be aware that risk assessment methodologies can be
used to significantly reduce the threat of terrorist attack.
modern three-step qualitative risk analysis technique can be used to conduct
internal corporate security analyses and determine specific protective
recommendations. These recommendations, if implemented, can reduce the threat or
effect of an attack by terrorists. When used properly, these techniques can be
applied to attacks that use anything from electronic hacking
to conventional firearms, explosives, electronic means, kidnapping, sabotage,
three-step technique requires the active participation of everyone in the
corporate infrastructure, through identifying areas or interests that are
reasonably likely to be the targets of attack, determining the severity of such
an attack, and then using the findings to mitigate or harden areas identified as
vulnerable to attack.
todays society, the threat of terrorism is real and growing. Companies must
be concerned about ensuring that they are safe from attack and that they can
determine the proper controls that they must instigate to both reduce the threat
of a terrorist attack, as well as mitigate the effects of such an attack. This
methodology will assist companies in making honest and informed decisions in
determining if they are, in fact, at risk, and how they can best bring their
threat level down to more acceptable levels.
the play button to hear actual footage of the Baltic Exchange and Docklands
bombings and others, WTC bottom.
file names do not correspond to the incident.
Post Office Tower London 1971
Harrods Bomb 1983
Military Barracks Bombed 1989
Bishops Gate London 1993
Docklands Bomb / South Quay London 1996
Omagh Car Bomb 1998
World Trade Centre
more information please contact :
Back to main page :