Excerpt from product page

Send a message to terrorists... "you will not succeed here"

From the terrorists...

"If we have a free path we go forward.
If we meet an obstacle we go around it.
If the object cannot be overcome, we retreat.
When the enemy is unprepared, we surprise him.
If he is alert we leave him alone."
- Andreas Baader, Baader-Meinhof terrorist gang (1943-1977)

"The main point is to select targets where success is 100% assured."
- Dr. George Habash, Popular Front for the Liberation of Palestine (1926-2008)

"Information gathering is a continuous operation..."
- Irish Republican Army's 'Handbook for Volunteers of the Irish Republican Army, 1956'

"It is necessary to gather as much information about the location as possible..."
- Al Qaeda Manual, Part 18


From the experts...

"Relatively sophisticated terrorist groups do not attack people or places without a basic level or planning or reconnaissance. Therefore, arguably the greatest return on investment is in the identification and disruption of pre-attack planning operations. It is crucially important to intercept the terrorists' own intelligence-gathering processes."
- Hoffman and Cragin, Four Lessons from Five Countries, RAND Review Summer 2002

An antiterrorism planning methodology for security managers

Make your company or organization an unattractive target to terrorists

There are five fundamentals you should be good at to deter terrorists

Anti-terrorism planning is all about communication. We want to send the terrorists a clear and simple message, in the language they understand: "You will not succeed here." Anti-terrorism planning is about seizing the initiative away from terrorists, setting them off balance, and keeping them off balance.

What you will learn in this book is not about more expensive equipment or staff, but how to use what you already have in a more effective and interesting way. Your company will be safer, your guards will be happier, and you will be more successful.

This book is not about going out and buying more high-priced security technology. It is not about automating security, or reducing human intervention. It is about connecting the work that you do in a seamless process, and teaching your people to think about what they are doing; to see themselves and their work as terrorists do; and to learn about what terrorists do so they can disrupt them.
We are not trying to fight terrorists: that is the job of law enforcement, the military, intelligence organizations and diplomats. We simply want them to go away and leave us alone. At the same time, though, we can support the counterterrorism effort by learning to communicate more effectively with police and intelligence agencies.

How antiterrorism planning interacts with terrorist planningHow antiterrorism planning works with counterterrorism forcesHow to write an observation plan and verify that it's being usedHow to design effective security measuresHow antiterrorism planning can be used to discourage criminal activityAnalytical tools that will help you to be a more effective security managerSpecial situations: persons at risk; maritime piracy

This book is published in Adobe pdf format, and is 136 pages in length. If you choose to print it, it is formatted to 8 1/2 by 11 inch standard paper.

It is hotlinked to chapters and headings, external references, and additional source material. Full http URLs are provided in case you choose to print the book, and still want to look up the external reference or source material.

"I know of no other book that contains so much immediately useful information on antiterrorism."

Ross Johnson strikes a home run for antiterrorism planning. I know of no other single book that contains so much immediately useful information on antiterrorism.

In this one single book, Ross leads the reader through a basic understanding of how terrorist organizations select targets, plan strikes, perform surveillance, conduct test runs and finally carry out an attack, and how to parry all those moves.

This information is presented in a manner that focuses on how to make facilities and organizations significantly less attractive to any terrorist organization. Ross explains the difference between counter-terrorism and antiterrorism, the fundamentals of antiterrorism planning, analytical tools, how to conduct threat and vulnerability assessments and how to establish threat levels. Ross presents surveillance and counter-surveillance principals and planning tools, discusses the importance of random antiterrorism measures and response planning, and presents a framework for a corporate security program that includes not only a baseline security program to deal with day-to-day events, but which also includes effective antiterrorism measures. Finally, Ross presents a sample antiterrorism program to illustrate all the elements above.

I can solidly recommend “The Sword and the Shield” as one of the most essential books in any Security Professional’s library. I know of no other book like it.

Thomas P. Norman, CPP/PSP/CSC
International Terrorism Security Analyst and author of “Risk Analysis & Security Countermeasure Selection” and other security books

The Sword and The Shield: Antiterrorism Planning for Corporations and Non-Governmental Organizations

Only $25 (Canadian)


ClickBank is a registered trademark of Keynetics Inc., a Delaware corporation. www.atplanningbook.com is not affiliated with Keynetics Inc. in any way, nor does Keynetics Inc. sponsor or approve any www.atplanningbook.com product. Keynetics Inc. expresses no opinion as to the correctness of any of the statements made by www.atplanningbook.com in the materials on this Web page.
If you need any help, please contact me at [ross@antiterrorism-planning.com](mailto:ross@antiterrorism-planning.com)
©2010 Ross Johnson. ross@antiterrorism-planning.com

Sites you may be interested in