skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 76475 Find in a Library
Title: Threat Analysis Methodology (From Clandestine Tactics and Technology - A Technical and Background Intelligence Data Service, Volume 3 See NCJ-77155)
Author(s): J R Reber
Date Published: 1976
Page Count: 37
Sponsoring Agency: International Assoc of Chiefs of Police
Alexandria, VA 22314
Sale Source: International Assoc of Chiefs of Police
44 Canal Center Plaza, Suite 200
Alexandria, VA 22314
United States of America
Language: English
Country: United States of America
Annotation: This report designed to be a planning document for police and security officers, is a step-by-step guide for the development of a methodology to determine the seriousness of the terrorist threat in order to neutralize that threat.
Abstract: Terrorist threats take the form of kidnappings, bombings, assassinations, harassment, propaganda, and a multitude of related activities and indications of potential activity. The vulnerability of the potential targets of these threats must be constantly reassessed. Threat and vulnerability assessment must be developed into a format that matches precise, objective threat analysis with precise, objective vulnerability assessment. The following methodology produces a system for determining the seriousness of the threat of terrorism. The analysis format includes both worldwide and local situation assessments and the listing of all possible threats that could be directed against the area of protective responsibility. The vulnerability assessment focuses on the assessment of potential and probable victims based on the history of threats, current threats, intelligence information, and victim profiles. Protective resources in both public and private sectors should be taken into account. Finally, a threat profile can be created by matching threats and victims and by conducting a vulnerability assessment of the threat-target relationship. The report also discusses international terrorism and international terrorist groups in order to illustrate the practicality of the methodology. To implement the methodology, those charged with the task must study terrorists, their tactics, and their propaganda. A formal and permanent structure for gathering, evaluating, and disseminating the gathered data must be created. Propaganda of radical groups not directly linked to terrorist groups as well as terrorist literature should be analyzed since the radical press often influences terrorist strategies and actions. A sample fault tree, which provides a visible representation of the relationship of threat and victim by detailing all the ways of carrying out the identification action, is provided, as are other methods of expressing the threat-victim relationship. Tabular data and footnotes are included.
Index Term(s): Counter-terrorism tactics; International terrorism; Planning; Research design; Research methods; Terrorist profiles; Threat assessment; Victims of terrorism
Note: *This document is currently unavailable from NCJRS.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=76475

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.