U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Fighting Terrorism - The Private Sector

NCJ Number
81146
Journal
Conflict Volume: 3 Issue: 2/3 Dated: (1981) Pages: 177-219
Author(s)
N C Livingstone
Date Published
1981
Length
43 pages
Annotation
This article examines counterterrorist programs and techniques which may help the private sector enhance its overall defense against potential terrorist threats.
Abstract
The first step in an effective program is a comprehensive analysis of the threat. A system can then be designed to reduce the vulnerabilities that have been identified. As a general rule, individuals are most vulnerable when traveling. According to some estimates, 80 percent of all terrorist kidnappings occur when the victim is riding in an automobile. Almost any car can be 'hardened,' or made resistant to terrorist attack; the choice of the vehicle depends on taste and use. Basic to any hardened vehicle is extensive armoring, and car owners can choose a variety of protective accessories, such as an antifire system or a remote control starter. Every effort should be made to avoid routine patterns of travel since terrorists often keep their intended victims under surveillance for some time. Drivers should also be taught evasive/aggressive driving techniques. Residential protection techniques, background checks of household personnel, methods of detecting letter bombs, and business security measures are also important. Advice for foreign business travel is given. The organization and function of a crisis management team are noted as well. Because of the growth in the incidence of kidnapping, security precautions are suggested, including a step-by-step response to kidnapping, beginning with confirming the event and extending through ransom payments and hostage retrieval. How to behave when kidnapped is also mentioned. The closing discussion addresses the responsibility of corporations to protect their employees and the functions of private security firms. Endnotes are supplied.