skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 118455 Find in a Library
Title: Terrorism in Your Own Backyard
Journal: Security Management  Volume:33  Issue:5  Dated:(May 1989)  Pages:56-60
Author(s): N S Leach
Date Published: 1989
Page Count: 5
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: The United States has all the elements of a country that is a potential terrorist target, thus security measures should be adopted by vulnerable targets to counter this threat.
Abstract: Elements that make the United States an attractive terrorist target are an open system of government, a free press, a large choice of soft targets, and its international symbolism of the free world. The United States faces an increase in terrorist activity in the 1990's because nothing breeds success like success. As there are more terrorist attacks, more will occur. Strategic and vulnerable terrorist targets in the United States include facilities that supply electricity, oil, and computers. The first step in providing security for such facilities is to upgrade existing structures. This could include the use of alarms, card access systems, and closed-circuit television surveillance. After the building itself has been secured, the perimeter must be strengthened. Fences, lighting, security patrols, barriers, and remote surveillance equipment should be considered. The security director is also responsible for the safety of upper level management and key personnel. The homes as well as the primary facility of such personnel must undergo security enhancement. The use of technical countermeasures and counterintelligence programs must also be considered.
Main Term(s): Counter-terrorism tactics
Index Term(s): Terrorist tactics; Threat assessment; United States of America
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.