U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Use of a Computerized Database of Terrorist Activities for Threat Assessment (From Proceedings, 1988 Carnahan Conference on Security Technology: Electronic Crime Countermeasures, P 7-11, 1988, R. William De Vore, ed., -- See NCJ-117849)

NCJ Number
117851
Author(s)
A Rozen; J M Musacchio
Date Published
1988
Length
5 pages
Annotation
This paper describes the use of "TERROR," a computerized data base of terrorist incidents, as an engineering tool to be used during the threat assessment phase.
Abstract
Threat assessment forms a crucial and basic step which, combined with a vulnerability analysis of the target, can provide the basis for a logical, efficient, and cost-effective design of countermeasures. Rather than focusing on a specific individual or group, this approach focuses on the discrete terrorist incident as the unit of analysis and allows the analyst to examine terrorist behavior itself as expressed by actual acts, rather than statements by observers, reporters, or terrorists about such behavior. The incidents are presented in a spread sheet sorted by a group of keywords and an additional memo file supplementing data that is not given in the spread sheet. 4 figures, 6 references. (Author abstract modified)