CHAPTER 24
TERRORISM
The Wrath of Man

Terrorism: the systematic use of violence as a means
to intimidate or coerce societies or governments.
—WordNet® 1.6, © 1997 Princeton University

INTRODUCTION

Terrorism has many definitions. In its simplest form, it is a violent action intended to inflict harm on some person or object with the intention of coercing someone in the future to act in a specific way. Terrorists function similarly to a publicity-hungry cinema actress. They will create any spectacle or perform any action to gain attention for their organization or cause.

The other chapters of this book assumed you had some personal knowledge of the nature of the risks your company faced, such as a fire, a power outage, or severe weather. The issues surrounding terrorism are somewhat foreign to many businesspeople, so a brief history is provided. This may help you to better prepare a risk assessment and initiate mitigation actions to protect your employees and your company.

Some governments use terror as a coercive tool to manipulate their own populations. The French Revolution’s “Reign of Terror” and Stalin’s suppression of the Ukrainian farmers are classic examples. Other masters of this evil action include Hitler and Cambodia’s Pol Pot. This is known as state terrorism. Recent exposure of mass graves in Iraq vividly demonstrates that the practice continues in some parts of the world. This type of terrorism generally remains within its own borders. You must be aware of such activities when exporting goods or traveling internationally to such places.

Terrorism can be against property as well as people. Some animal lovers have splashed blood on people wearing fur coats. Although somewhat violent, this action is intended to dramatize the killing of animals for their fur and not to permanently harm the fur wearer.

Terrorists seek to magnify their power through the news media. They strive to obtain maximum publicity from the meager means at their disposal. An attack on a “mom-and-pop” grocery store doesn’t have the same impact as attacking the corporate headquarters of a multinational company. In fact, an attack on the store will swing public opinion against the attackers. Many people are apathetic if large companies are attacked, so terrorists focus efforts on them (and also this is where the money is).

Some terrorists look for visible targets where they can avoid detection before and after an attack, such as international airports, large cities, major international events, resorts, and high-profile landmarks. Some terrorists are suicidal and committed to die during their attack, such as a suicide bomber. Others mix with the crowds before and after the attack.

The form of a terror attack depends on several factors: the means available, the political issues involved, and the weaknesses of the target. The means available refers to the weapons the terror organization has at its disposal. Not everyone is familiar with handling explosives or is an accurate marksman. The political issues refer to what is bothering the person. If they personalize their issue by identifying it in a single individual, then the attack may be sharply focused on that person. Weakness in targets can be from how available they are to how easy it is to commit the crime. A clean getaway is not always a requirement, and an arrest may be one of the goals to further publicize the issue.

Terrorism can be broken down into two primary categories: “domestic” and “international.” This distinction refers to the origin of the individuals or groups responsible for it.

Domestic terrorism involves groups or individuals whose terrorist activities are directed at the people of a specific country or its government. Domestic terrorists are organized and exist within this country and do not receive any foreign direction or support.

International terrorism involves groups or individuals whose terrorist activities are foreign-based. These groups exist outside a country or are directed or supported by someone outside.

Counterterrorism actions are proactive steps to deter a terrorist attack and to respond quickly. Counterterrorism actions include increased police patrols and fighter aircraft patrolling key cities. Other counterterrorism actions involve police monitoring of suspected terror groups to prevent or protect against an attack.

Antiterrorism steps are defensive in nature and reduce the vulnerability of people and property to terrorist acts. Antiterrorism involves mitigation action to reduce the likelihood of an attack or its damage.

A BRIEF HISTORY

Most terrorist organizations espouse some sort of social or political agenda as a justification for their actions. Terrorism is defined in the Code of Federal Regulations as “the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” The key elements to remember are violence, intimidation, and coercion.

In 1605, England was in the midst of sectarian strife between Protestants and Catholics. To further their cause, a group of Catholic supporters plotted to blow up the English Parliament as it sat in session. A coconspirator, Guy Fawkes, managed to stockpile 36 barrels of gunpowder in the cellar of the Parliament building. When authorities were tipped off to the plot, the conspiracy was foiled. Using violence to advance or defend a religion? Bombing of government buildings? Does this sound familiar?

Assassination had long been a method of terrorism. The Guy Fawkes bomb plot against the English Parliament would easily meet our current definition of terrorism. Terrorist groups as now known began to emerge in the late 19th century in Europe. One of the reasons was changes in technology that created powerful explosives and weapons that are small and easy to handle. Modern communications ensures new visibility for terrorist groups out of proportion to their actual size.

Some terrorist acts are just a cover for old-fashioned criminal activities, such as kidnapping, bank robberies, etc. Jesse James, whose criminal career spanned 20 years, always tried to cast himself as the defender of the common man, all the while robbing and murdering.

The concept of terrorism is more acceptable in some cultures than it is in others. Depending on your point of view, one person’s terrorist is another person’s patriot. Western culture seems to favor the underdog. Hollywood movies love to show one person (the “common man”) overcoming all odds to defeat the undefeatable. Depending on your political point of view, Robin Hood was a protector of the people or a common thief. The same goes for terrorists. Are they heroes or murderers?

To magnify the effect of their attack, terrorists depend on widespread public notice of their actions. World leaders are normally as well protected as they want to be. A nation’s citizens see themselves as vulnerable to a terrorist action and could potentially apply pressure on their leaders to accommodate them. Playing to this public sentiment is the reason terrorists espouse some form of social or political platform.

One common goal of terrorism is to establish a fear in the population while showing the authorities as incapable of protecting everyone, everywhere, all of the time. The terrorists seek to goad law enforcement authorities into actions that may be viewed as repressive by the population to gain sympathizers or overt supporters for their cause. Their violent actions are combined with political announcements espousing selfless actions (food for the poor, freedom for jailed comrades, or any number of things). Terrorism always tries to cloak itself in some “just” cause, whether true or not. Terrorism sometimes attempts to excuse its indiscriminate violence as attacking those who benefit from whatever evil they are attacking. Fulfilling any demand leads to others because the demand is only a cover for the violence.

Terrorist attacks range from a single impulsive person to a large group and carefully planned actions. A common element is that they are all calculated to gain the greatest impact with minimal resources. They are found throughout history. Some countries have used terrorist threats to extort “protection” money (Barbary pirates), to sell their services (Ninja assassins), or even to intimidate their own population.

Terrorism is different from guerilla warfare. Terrorists attack the opponent’s population because they lack the strength to attack their armed forces. Guerilla warfare includes some terrorist actions but is focused on military targets. The main difference between the two is the number of casualties among the general population. Terrorists work for maximum damage, and the guerillas seek to establish a “moral” status by minimizing them.

Whether you feel that terrorists are patriots or murderers, in terms of business continuity planning, it does not matter. They represent a threat to the ongoing profitability of the business. The risk of a terrorist attack occurring must be assessed and a mitigation plan implemented.

RISK ASSESSMENT

Like any other part of your plan, you must make a risk assessment of the threat to your facilities and employees from terrorism. Based on this risk assessment, a mitigation plan can be assembled to protect your property and improve the safety of your employees. Unfortunately, the nature of terrorism is surprise and, in some instances, the attackers are more than a little mentally unbalanced, so even if you believe you have nothing to fear you should still perform a risk analysis.

On February 29, 1993, a bomb exploded in the parking garage of the World Trade Center in New York City, resulting in the death of five people and thousands of injuries. The crater was 200 by 100 feet and five stories deep.

The first thing to assess is the location of your facility. Begin your risk analysis with an examination of your location. Stand outside and look around. Are you near:

Image A government building (some people have a grudge against the IRS, for example)?

Image A landmark whose destruction might have symbolic significance, such as a war memorial, a natural feature, a major bridge, or a famous building?

Image A defense supplier? An attack on them may close the roads surrounding them and therefore you!

The definition of what is “too near” is up to you. If one of these nearby facilities was attacked, how disruptive would it be to your business? At a minimum, the streets around the target would be blocked for rescue teams and then, later, investigations. If you are several city blocks away and there are many avenues of approach, you should be all right. If the potential target is next door, then there is a risk.

Your mitigation plan for your location is to:

Image Identify ways to keep your business open if a nearby attack occurs. You may need to provide information on alternate access routes to suppliers or customers. In general, it would be difficult to move your location, but you can pay close attention to who your neighbors are and who may be considering relocating to your vicinity.

Image Provide some separation or barrier between your building and a close neighbor that may be a target. Concrete walls may slow down a fire or the blast of an explosion. Ensure vulnerable spaces within your facility (such as your computer room) are not located on the side of the building toward the potential target.

Image Relocate to another site if your building also houses potential targets. If you cannot relocate, can you move out your most sensitive operations?

What goods or services does your company provide? Sometimes seemingly innocent lines of business can attract violent protest. Sometimes peaceful protest can turn violent if demands go unfulfilled and the people involved feel threatened by something. What is the risk that the products or services provided by your company will make it a target?

“On September 9, 1980, the ‘Plowshares Eight’ carried out the first of what have come to be known as plowshares actions. Eight peacemakers entered the General Electric plant in King of Prussia, PA, where the nose cones from the Mark 12-A nuclear warheads were manufactured. With hammers and blood they enacted the biblical prophecies of Isaiah (2:4) and Micah (4:3) to ‘beat swords into plowshares’ by hammering on two of the nose cones and pouring blood on documents.”

(Source: From a Web site maintained by the organization “Swords into Plowshares,” http://www.craftech.com/~dcpledge/brandywine/plow/webpages/plow8.htm)

Organizations or places that may be in danger include the following:

Image Police or Military Suppliers. Some people feel that suppliers of military goods are contributing to the violence between nations, while others are thankful for a strong defense industry. If you directly or indirectly supply goods to the military or even police departments, this may place you in the sights of a terrorist. As related in the box above, a supplier of components for nuclear weapons could attract antiwar as well as environmental issues protesters.

Image Controversial Businesses. Some businesses can raise the emotions of people by the mention of their name. One of these controversial businesses is women’s health clinics that perform abortions. Whatever your opinion of this service, these facilities have over the years been the target of violent attacks. Is such a facility near you?

Animal rights groups have targeted fur coats as unethical and have publicly attacked people wearing them by splashing blood on the coat and the person wearing it. Other animal rights groups include those people who believe that dolphins are killed and discarded during tuna fishing, those in opposition to some livestock farming practices, and on and on. Unless you are the first target, you can gain some insight into how controversial your business is to some groups by regularly monitoring news broadcasts and your industry-specific media.

Image Government Buildings. The infamous attack on the Murrah Federal Building in Oklahoma City in 1995 was a violent protest against U.S. government policies. Whatever the reason, government offices will remain a target of violent protest in the future. Sometimes these buildings rent excess space to other companies. If you are in such a building, consider what the risks may be and how they might be mitigated.

Another potential source of terrorism is your employees. Some things to consider when evaluating the potential for terrorism include:

Image Who Are Your Employees? Even with a proper screening, employees can be a source of risk of domestic terrorism. Sometimes, crime can be an act of opportunity. It is important that all employees are screened before hiring and monitored for unusual behavior.

Image Security for Your Employees. An important counterterrorism function is your facility’s security. But all life (for most of us) is not within your company’s four walls. People drive to and from work and around their community. Train your employees, and specifically your executives, to watch for suspicious behavior. Kidnapping is a high-profile crime that a terrorist can use for daily publicity.

An easy action is to vary your travel times. When traveling away from the facility, keep your itinerary vague, including departure and arrival times, flight number, etc. In smaller airports this may be more difficult.

When traveling away from your facility, there are some simple steps to take that will lessen the likelihood that you will be caught up in a terrorist attack.

Image Avoid Crowds. Crowds are easy to find; just look at an airport’s luggage carrousel. People crowd around waiting for their bags. Instead of joining the crowd, select a point off to the side or where the crowd is the thinnest to watch for your bags. Crowds are easy to find at public venues, such as sports events and other gatherings. In 1996, a bomb was placed near a sound stage during the Olympic Games in Atlanta. Keep on the lookout for people acting suspiciously. Other crowded places that have previously attracted terrorists include nightclubs and theaters.

Image Dress to Blend in. Do you look as if you belong there or are you obviously a traveler? Try to look unimportant and focused on where you are going.

Image Avoid Unattended Parcels or Baggage. The 1996 Atlanta bomb was in a knapsack. Although people sometimes carelessly discard parcels or even forget things, if you see a package and no one is around, alert the police. Never accept packages from strangers.

Image Hire a Driver. If you are driving in a strange city, consider hiring a local driver or security company to move you around.

Image Always Be Alert and Aware of Your Surroundings. The nature of terrorism suggests there will be little or no warning. Take a few moments to see where the emergency exits and staircases are and consider how you might exit a congested area quickly.

A terrorist attack can take several forms, depending on the technology available to the attacker, the nature of the political issue motivating the attack, and the points of weakness of the target. Therefore the goal is to identify and eliminate the points of weakness to protect your facility. Some items to consider include:

Image Enforce Your Security Plan. Most companies use security guards to ensure that only employees can enter. Sometimes this is as basic as a receptionist with a remote switch for opening the entrance door. Ensure that only properly identified personnel can enter the facility. Even if the front door is locked and well protected, often the receiving dock in the rear of the building is wide open! A chain is only as strong as its weakest link.

Image Ensure Everyone Understands the Evacuation Procedures. Depending on the circumstances, you may want to take shelter within the building (storm shelter) or evacuate outward. If there was a problem outside your building, it would not be a good idea for everyone to exit according to the normal evacuation plan. It might be better to move them away from the walls in question or to direct everyone out a specific side of the building.

Image Bomb Threats. Your security plan should contain detailed instructions on what to do when a bomb threat is received. Try to get as much information from the caller as you can and write it all down as it is said. Notify the police and the facility management immediately.

Information on what to do when a threat is received should be placed at all “public” inbound numbers such as switchboard, receptionist, help desk, or 800 numbers. Time should be set aside to train everyone how to fill out incident report forms and the best way to react to a threat.

In most cases, the building should be promptly evacuated using your evacuation procedures.

Image Ensure the people standing outside do not block access routes for emergency vehicles. Avoid standing in front of windows in case the bomb blows glass shards out onto the people.

Image Avoid suspicious packages and keep everyone else away from them.

Sometimes, the use of bombs is a matter of how convenient your building is. Permitting parking immediately adjacent to your building could set the scene for a vehicle-transported bomb, as in the case of the 1995 Oklahoma City bomb. In the 1993 vehicle-transported bomb attack against the World Trade Center, the vehicle was parked in the lower-level parking garage.

To reduce the likelihood of an explosive-filled vehicle destroying your facility, do not allow anyone to park near the building. In the case of under-the-building parking garages, place strong steel bars across the door opening so that only passenger vehicles can enter (no trucks). Install large obstacles around the main entrance (often large cement planters holding trees) to reduce the likelihood that someone could drive straight into the building.

Install heavy curtains with weighted bottoms to cover windows. This will reduce the amount of inward flying glass from an explosion outside your building.

Some facilities and public buildings have removed trash cans from outside their structure. Trash cans are an easy place to dump a bomb disguised as a discarded box.

Your employees are an important line of defense in detecting terrorist activity. Educate your employees by doing the following:

Image Explain the Importance of Your Facility’s Security Program and Ask for Their Help. You can’t be everywhere but your employees are. Teach them what to look for. How would you describe a person acting suspiciously? What should they do if they see an unattended parcel? Do they keep their packages with them or properly stowed away? How much of this training your employees should have is based on your risk assessment of an attack. If you are a high-risk target, then they should be very involved. If the employees understand how the security process benefits them, they will be more inclined to actively support it.

Image Report Suspicious Activity to Police. Explain how to file a police report of suspicious activity. The police need the traditional facts of who, what, where, when, why, and how. Your security policies should provide guidelines on who should file police reports. The policy might require all observations to be confirmed by a second person before reporting. Your security policy might require that a security supervisor investigate before calling in law enforcement. Perhaps an incident report form would be helpful to gather the details.

Image Report All Threats to Police. The old saying is that barking dogs don’t bite. However, a threat is not a time to gamble whether it was real or not. All threats should be reported immediately to the police. The police will also want to know how the threat was transmitted to you, when you received it, etc. You might add these fields to your incident report form.

The next step is to determine what the Homeland Security Threat Levels mean to you. Based on its intelligence sources, the Department of Homeland Security issues changes to its threat level (see the end of this chapter). Given your assessment of the risks to your facility, what will this mean to your company? You may establish contingency plans based on elevated threat levels if your situation is risky. These might be to increase security patrols, temporarily close some operations, or to confine all freight pickups and deliveries to a few hours of the day.

You should also check your insurance coverage. Just exactly what sort of threats does your insurance cover? Are you covered against a terrorist attack? In the aftermath of the attack on September 11, 2001, some insurance companies invoked the war clause, which states that no losses are covered due to war. This statement was inadvertently supported by the government when they declared a “War on Terrorism.”

Check with your insurance company to determine what is and what is not covered. In general, domestic terrorism is covered as a criminal action. However, international terrorism may not be covered. Now is the time to find out.

HOMELAND SECURITY ADVISORY SYSTEM

1. Low Condition (Green). This condition is declared when there is a low risk of terrorist attacks. Federal departments and agencies should consider the following general measures in addition to the agency-specific Protective Measures that they develop and implement:

Image Refining and exercising, as appropriate, preplanned Protective Measures.

Image Ensuring personnel receive proper training on the Homeland Security Advisory System and specific preplanned department or agency Protective Measures.

Image Institutionalizing a process to ensure that all facilities and regulated sectors are regularly assessed for vulnerabilities to terrorist attacks and that all reasonable measures are taken to mitigate these vulnerabilities.

2. Guarded Condition (Blue). This condition is declared when there is a general risk of terrorist attacks. In addition to the Protective Measures taken in the previous Threat Condition, federal departments and agencies should consider the following general measures in addition to the agency-specific Protective Measures that they develop and implement:

Image Checking communications with designated emergency response or command locations.

Image Reviewing and updating emergency response procedures.

Image Providing the public with any information that would strengthen its ability to act appropriately.

3. Elevated Condition (Yellow). An Elevated Condition is declared when there is a significant risk of terrorist attacks. In addition to the Protective Measures taken in the previous Threat Conditions, federal departments and agencies should consider the following general measures in addition to the Protective Measures that they develop and implement:

Image Increasing surveillance of critical locations.

Image Coordinating emergency plans as appropriate with nearby jurisdictions.

Image Assessing whether the precise characteristics of the threat require the further refinement of preplanned protective measures.

Image Implementing, as appropriate, contingency and emergency response plans.

4. High Condition (Orange). A High Condition is declared when there is a high risk of terrorist attacks.

Image Coordinating necessary security efforts with federal, state, and local law enforcement agencies or any National Guard or other appropriate armed forces organizations.

Image Taking additional precautions at public events and possibly considering alternative venues or even cancellation.

Image Preparing to execute contingency procedures, such as moving to an alternate site or dispersing their work force.

Image Restricting threatened facility access to essential personnel only.

5. Severe Condition (Red). A Severe Condition reflects a severe risk of terrorist attacks. Under most circumstances, the Protective Measures for a Severe Condition are not intended to be sustained for substantial periods of time.

Image Increasing or redirecting personnel to address critical emergency needs.

Image Assigning emergency response personnel and prepositioning and mobilizing specially trained teams or resources.

Image Monitoring, redirecting, or constraining transportation systems.

Image Closing public and government facilities.

Source: Department of Homeland Security www.dhs.gov.

CONCLUSION

While terrorism is not a new threat, until recently the threat of terrorism was miniscule in the United States. Recent political events have made this a threat that you need to consider when developing your disaster recovery plan. Even if you are unlikely to be a target, your neighbors might be. The world has become a scarier place, and you must be aware of your surroundings to keep safe.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset