O'Reilly logo

The Science and Technology of Counterterrorism by Carl Young

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Nontraditional Terrorist Threats and Risk Mitigation

7.1 Introduction

In the last several decades the types of threats appearing on the radar screens of security professionals have broadened. It was not so long ago that issues like vandalism, theft, robberies, and general harassment dominated the security landscape. Accordingly, locks, alarms, and security officers essentially covered the gamut of required mitigation. Those traditional threats have not gone away, but the list of security concerns has expanded.

Although the potential for threats like radiological, biological, chemical, and electromagnetic weapons may or may not have increased, the public is definitely more aware of their existence. In addition, the abundance of dangerous ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required