Business Can Employ Strategies and Tactics Against Terrorism

0



By RANDY PARSONS and HANK GATLIN


A persistent old adage asserts that today’s success doesn’t guarantee tomorrow’s effectiveness. Adages endure for a reason, and Los Angeles should take note.


Our society has traditionally focused on preserving individual rights and responsibilities. Terrorists, in contrast, are interested in groups preferably large ones. By inflicting mass casualties, causing catastrophic economic damage, and triggering sustained and graphic media coverage, terrorists seek to negate the power of the individual by invoking terror on a grand scale. And since Sept. 11, 2001, they have succeeded all too often.


Many of us still view terrorism as a national security problem rather than one that we can personally affect or influence. That’s understandable. After the Sept. 11 attacks, our government’s message was that individuals and organizations could best help by just supporting national security initiatives. But in those attacks we were all victimized, and we all must work to protect our nation, ourselves, and our allies. Los Angeles need only remember 1999, shortly before the millennium celebration, when an Algerian man named Ahmed Ressam was arrested at the U.S.-Canada border. He had a car full of explosives and a plan to attack Los Angeles International Airport. In addition, follow-on plans for the Sept. 11 plot purportedly called for an attack on the Library Tower in Los Angeles.


Unfortunately, the development of meaningful proactive measures has been complicated by several factors. There has not been a major terrorist attack within the United States since 2001. Domestically, we have not encountered the stereotypical terrorist cell (e.g., one recruited, trained, funded, and operated by al Qaeda). The terrorist enemy doesn’t fit our traditional adversary profile. That makes it difficult to focus effectively on the problem.



Global reach

But attacks against the United States and our allies continue outside our borders. Such overseas attacks were the precursors to Sept. 11. We must also take note that we continue to disrupt groups and individuals within our borders who subscribe to radical ideologies and have attempted to harm us. For example, in the summer of 2005 Los Angeles was once again targeted, this time by a group of homegrown terrorists. Members of Jamiyyat Ul Islam Is Saheeh were indicted on federal charges for allegedly planning attacks against U.S. military facilities, Israeli national interests, and synagogues around Los Angeles. Because terrorists have a global reach and tactics that constantly evolve, proactive preparation, detection, response, and recovery strategies must evolve as well.


How can businesses mount an effective defense against terrorism? There is no single, simple solution. However, there are strategies and tactics that when coupled with appropriate expertise and careful planning can generate security systems that are tailored, economical, sustainable, and flexible. Such a system should integrate three factors: people, technology, and procedures.


The people you already have are one of your most effective security elements. Know the people you hire, and train them to recognize and report suspicious behavior. Develop a culture of awareness that is alert, yet free of panic or fear. Then integrate, test, and evaluate your emergency response systems in tandem with outside disaster-response agencies, both public and private. Trained eyes and ears can go a long way in recognizing, minimizing, or even preventing a catastrophic event.



Technology as tool

Another tool at your disposal is technology, but remember the most expensive solution is not always your best choice. Sometimes a well-placed mirror can have more utility than an entire closed-circuit television system. Examine proposed technologies for both efficacy and value, while considering integration capabilities and expansion options.


Well-designed procedures are another inexpensive but valuable security mechanism. For example, exploit the power of surprise. If you have overt patrols, vary their time, location, size, and mission. Periodically change access codes and passwords. Keep potential opponents guessing.


In terms of physical features, set priorities and start hardening the assets you most want to protect. Physical security covers a broad spectrum of systems. Start early during facility planning and design. Focus initially on the perimeter and then work inward, ultimately covering all facilities, internal operations, and procedures.


Organizations should utilize these tools, along with subject-matter expertise, to produce a layered security system that protects day-to-day business operations. After all, obtaining the security we all seek is not a matter of just spending money; it is about spending money wisely.


Finally, recognize that there is no universal, magic security solution. Even similar businesses in similar circumstances will have unique strengths and vulnerabilities. Create a security master plan using the most effective people, technology, and practices you can find, and regularly re-evaluate your approach.


Individuals do matter, and you can make a difference. Though the United States has escaped attack for quite some time, the enemy has not given up. And today’s success is still no guarantee of tomorrow’s effectiveness.



Randy Parsons formerly was a special agent in charge of the FBI’s counterterrorism program in Los Angeles. Hank Gatlin formerly served with the CIA’s Senior Intelligence Service. Both are now vice presidents with DMJM H & N;, where they specialize in addressing security threats.

No posts to display