National Academies Press: OpenBook

Responding to Threats: A Field Personnel Manual (2004)

Chapter: 2 How Terrorists/Criminals Select a Target or a Victim

« Previous: 1 Introduction
Page 2
Suggested Citation:"2 How Terrorists/Criminals Select a Target or a Victim." National Academies of Sciences, Engineering, and Medicine. 2004. Responding to Threats: A Field Personnel Manual. Washington, DC: The National Academies Press. doi: 10.17226/13831.
×
Page 2

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

22 How Terrorists/Criminals Select a Target or a Victim Terrorists and criminals often consider many factors when selecting a target or vic- tim. Some of their considerations are listed below. Terrorists Only • Terrorists select targets that are highly visible; have a high economic, symbolic, or sentimental value; and have a highly disruptive destruction value. For example, the World Trade Center represented America’s economic might. • The method of attack selected is designed to generate shock and widespread pub- lic fear, leave a severe psychological impact, and attract a great deal of attention to the terrorist group and its cause. Terrorists and Criminals • There should be a high potential for success. • Security should be lax or easily overcome. • There is little probability that the intended victim will offer significant or unfore- seen resistance. • There should be multiple opportunities for quick escape after the event. Al Qaeda is an exception to this rule. It prefers suicide attacks to prevent possible capture and interrogation. • Target may be selected on the basis of race, religion, sexual orientation, or politics. Criminals Only • Target may be selected in a more emotional, impulsive manner. • Target may be selected because of a real or imagined slight by a spouse or supervisor. • In the case of road rage, irrational anger is the prevalent force. The victim may only have to be present when the rage explodes.

Next: 3 Potential Targets »
Responding to Threats: A Field Personnel Manual Get This Book
×
 Responding to Threats: A Field Personnel Manual
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB’s National Cooperative Highway Research Program (NCHRP) Report 525: Surface Transportation Security, Volume 1: Responding to Threats: A Field Personnel Manual includes a draft template that contains basic security awareness training in a workbook format that can be redesigned as a pamphlet, glove-box brochure, or other user-specific document. This NCHRP manual emphasizes noticing and reporting behavior that may be part of the planning stages of an event, and explains how an increased level of attention on the part of all employees can deter criminal and terrorist plans prior to implementation.

NCHRP Report 525: Surface Transportation Security is a series in which relevant information is assembled into single, concise volumes—each pertaining to a specific security problem and closely related issues. The volumes focus on the concerns that transportation agencies are addressing when developing programs in response to the terrorist attacks of September 11, 2001, and the anthrax attacks that followed. Future volumes of the report will be issued as they are completed.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!