Geoscience Reference
In-Depth Information
used by terrorists would be expected to fall outside the definition of a WMD. Small
explosive devices can be left in packages or bags in public areas for later detonation
at a time and place when and where the terrorist feels that the maximum damage
can be inflicted.
The relatively small size of these explosive devices can also be brought onto
planes, trains, ships, or buses, within checked bags or hand carried. Although pres-
ent airline security procedures minimize the possibility of explosives being brought
on board airliners, planners will need to consider the level of security presently
employed on ships, trains, and buses within their jurisdictions.
Larger quantities of explosive materials can be delivered to their intended target
area via car or truck bombs. Planners need to consider the possible need to restrict
or prohibit vehicular traffic within certain distances of key facilities identified as
potential terrorist targets. Planners may also need to consider the possible use of
concrete barriers to prevent the forced entry of vehicles into restricted areas.
Infrastructure Attacks
Potential attacks on elements of the nation's infrastructure require protective consid-
erations. Infrastructure protection involves risk management actions taken to prevent
destruction of or incapacitating damage to networks and systems that serve society.
Infrastructure protection is more often focused on security, deterrence, and
law enforcement, than on emergency consequence management preparedness and
response. Nevertheless, planners must develop contingencies and plans in the event
critical infrastructures are brought down as the result of a terrorist incident.
Cyberterrorism
Cyberterrorism involves the malicious use of electronic information technology to
commit or threaten to commit acts dangerous to human life, or against a nation's
critical infrastructures in order to intimidate or coerce a government or civilian
population to further political objectives. As with other infrastructure guidance,
most cyber protection guidance focuses on security measures to protect computer
systems against intruders, denial of service attacks, and other forms of attack,
rather than addressing issues related to contingency and consequence management
planning.
Emergency Operations Plan: Situation
The situation section of a terrorism annex to your EOP should discuss what con-
stitutes a potential or actual terrorist incident. It needs to present a clear, concise,
Search WWH ::




Custom Search