How quickly your company can get back to business after a terrorist attack, a tornado, a fire, or a flood often depends on emergency planning done today. While the Department of Homeland Security is working hard to prevent terrorist attacks, the lessons of the 1993 World Trade Center bombing, the 1995 Oklahoma City bombing and the September 11, 2001 terrorist attacks demonstrate the importance of being prepared.
Terrorism is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion, or ransom.
High-risk targets for acts of terrorism include military and civilian government facilities, international airports, large cities, and high-profile landmarks. Terrorists might also target large public gatherings, water and food supplies, utilities, and corporate centers. Further, terrorists are capable of spreading fear by sending explosives or chemical and biological agents through the mail..
Business continuity and crisis management can be complex issues depending on the particular industry, size and scope of your business. However, putting a plan in motion will improve the likelihood that your company will survive and recover. The following information is a good start for small- to mid-sized businesses. Companies that already have their emergency plans in place can continue to help create a more robust sustainable community by mentoring businesses in their own supply chain and others needing advice.
The Homeland Security Advisory System was designed to provide a national framework and comprehensive means to disseminate information regarding the risk of terrorist acts to the following:
• Federal, state, and local authorities
• The private sector
• The American people
This system provides warnings in the form of a set of graduated “threat conditions” that increase as the risk of the threat increases. Risk includes both the probability of an attack occurring and its potential gravity. Threat conditions may be assigned for the entire nation, or they may be set for a particular geographic area or industrial sector. At each threat condition, government entities and the private sector, including businesses and schools, would implement a corresponding set of “protective measures” to further reduce vulnerability or increase response capability during a period of heightened alert.
There are five threat conditions, each identified by a description and corresponding color. Assigned threat conditions will be reviewed at regular intervals to determine whether adjustments are warranted.
Official definitions determine counter-terrorism policy, and are often developed to serve it. Most government definitions outline the following key criteria: target, objective, motive, perpetrator, and legitimacy or legality of the act. Terrorism is also often recognizable by a following statement from the perpetrators.
Violence – According to Walter Laqueur of the Center for Strategic and International Studies, "the only general characteristic of terrorism generally agreed upon is that terrorism involves violence and the threat of violence". However, the criterion of violence alone does not produce a useful definition, as it includes many acts not usually considered terrorism: war, riot, organized crime, or even a simple assault. Property destruction that does not endanger life is not usually considered a violent crime, but some have described property destruction by the Earth Liberation Front and Animal Liberation Front as violence and terrorism; see eco-terrorism.
Psychological impact and fear – The attack was carried out in such a way as to maximize the severity and length of the psychological impact. Each act of terrorism is a “performance” devised to have an impact on many large audiences. Terrorists also attack national symbols, to show power and to attempt to shake the foundation of the country or society they are opposed to. This may negatively affect a government, while increasing the prestige of the given terrorist organization and/or ideology behind a terrorist act.
Perpetrated for a political goal – Something many acts of terrorism have in common is a political purpose. Terrorism is a political tactic, like letter-writing or protesting, which is used by activists when they believe that no other means will effect the kind of change they desire. The change is desired so badly that failure to achieve change is seen as a worse outcome than the deaths of civilians. This is often where the inter-relationship between terrorism and religion occurs. When a political struggle is integrated into the framework of a religious or "cosmic" struggle, such as over the control of an ancestral homeland or holy site such as Israel and Jerusalem, failing in the political goal (nationalism) becomes equated with spiritual failure, which, for the highly committed, is worse than their own death or the deaths of innocent civilians.
"Terrorism is defined as political violence in an asymmetrical conflict that is designed to induce terror and psychic fear (sometimes indiscriminate) through the violent victimization and destruction of noncombatant targets (sometimes iconic symbols). Such acts are meant to send a message from an illicit clandestine organization. The purpose of terrorism is to exploit the media in order to achieve maximum attainable publicity as an amplifying force multiplier in order to influence the targeted audience in order to reach short- and midterm political goals and/or desired long-term end states."
Deliberate targeting of non-combatants – It is commonly held that the distinctive nature of terrorism lies in its intentional and specific selection of civilians as direct targets. Specifically, the criminal intent is shown when babies, children, mothers and the elderly are murdered, or injured and put in harm's way. Much of the time, the victims of terrorism are targeted not because they are threats, but because they are specific "symbols, tools, animals or corrupt beings" that tie into a specific view of the world that the terrorists possess. Their suffering accomplishes the terrorists' goals of instilling fear, getting their message out to an audience or otherwise satisfying the demands of their often radical religious and political agendas.
Disguise – Terrorists almost invariably pretend to be non-combatants, hide among such non-combatants, fight from vantage points in the midst of non-combatants, and (when they can), strive to mislead and provoke the government soldiers into attacking other people, so that the government will be blamed. When an enemy is identifiable as a combatant, the word "terrorism" is rarely used.
|Bomb Threat Outsidesearch||Download|
|Bomb Threat Package||Download|
|Bomb Threat Publicsearch||Download|
|Bomb Threat Roomsearch1||Download|
|Bomb Threat Roomsearch2||Download|
|Bomb Threat Roomsearch3||Download|
|Fleet Driver Law Alert||Download|
|Fleet Driver Managing Security||Download|
|Fleet Driver Security||Download|
|Naerg Instructors Guide Safety Topic Fact Sheet||Download|
|OCC Health Anthrax Faq||Download|
|Personal Emergency Respirator||Download|
|Respirator Fact Sheet For Preparedness Purchases Safety Topic Fact Sheet||Download|
|Terrorism Active Shooter Booklet||Download|
|Terrorism Active Shooter Pocket Card||Download|
|Terrorism Building Protection 1||Download|
|Terrorism Building Protection 2||Download|
|Terrorism Building Protection 3||Download|
|Terrorism Building Ventilation||Download|
|Terrorism Hsd Chemical Facility Security Reg||Download|
Forms & Documents
|Bomb Threat Checklist||Download|
|Violence Incident Report Form||Download|
|Bomb Threat Training Handout Spanish||Download|
|Bomb Threat Training Handout||Download|
|Terrorism Active Shooter Poster||Download|
|Terrorism Suspicious Mail Poster||Download|
GET INSTANT ACCESS
to THE MEMBERS LIBRARY
Safety materials created by safety professionals.
Access to the Safety Manager software.
Wide variety of safety videos and courses.
**Brand New** Safety Training Management System
Free with full membership subscription
Training LMS System
Ask The Safety Consultant
Safety Equipment Deal Finder
Note: You must have a full subscription to the Safety Library in order to use this material. Any use outside of your organization, for resell, or without an active membership is strictly prohibited and may result in prosecution under copyright infringement laws. Please contact us first, if you would be interested in reselling or using our materials for reproduction.
Inside the Members Library
Cranes & Slings
Driver / Fleet Safety
Drug Free Workplace
Fire Safety & Prevention
Job Safety Analysis
Machinery & Equipment
Medical & First Aid
Off the Job Safety
Rules & Policies
Signs & Labels
Slips, Trips & Fall
Vehicle & Driver
Welding & Hot Work
Confined Space Death
Confined Space Hazards & Response
Driving & Medication
Electrical Arc Flash Hazards
Fall Protection - Tie Off
Forklift Carbon Monoxide Hazard
Forklift Tipover Accidents
Forklifts & Pedestrians
Healthcare Worker Safety
Hot Work Dangers
Lockout - Tagout
Reactive Chemical Hazards - Process
Safety For Small Business
Understanding Job Stress - for Managers
Young Worker Safety
2 Minute OSHA Safety Talks
First Aid Training
Forms & Documents
Safety Management Resources
Safety Manuals/Written Programs
Process Safety Management
Drug Free Workplace
Safety Manager Software
23 Module Software - Manage, Track, Schedule & OSHA Log
1. Employee Info
2. Accident Reports
3. Incident Reports
4. Lockout - Tagout
5. Corrective Actions
6. Equipment Safety
7. Confined Space
8. Hot Work Permits
9. Vehicle Accidents
10. Safety Committee
11. Industrial Hygiene
12. IR Calculator
13. Respirator Schedule
14. Protective Equipment
15. Chemical Exposure
16. Event Planner
17. Expense Tracker
18. Job Safety Analysis
19. Chemical Data
20. Training Planner
22. Process Safety
23. Chemical Labels
Safety References & Graphics
New Safety Training System