Studies of terrorist's methods reveal that the best chance of success against terrorism lies in the
proactive phase. Well-planned prevention is the best defense against terrorism.
The installation must plan to prevent a terrorist incident, and to make the initial response should a
terrorist incident occur. Rudin's Law states that in time of crisis most people will choose the worst
course of action possible. This is not due to incompetency, but a lack of enough information on which
to base a decision. Proper crisis management does not mean management by crisis.
Crisis Management is a detailed, rehearsed plan to prevent and deal with special threat scenarios that
all key personnel must be familiar with. Using the USAMPS model will help ensure that your
counterterrorism plan is successful.
The Ad Hoc Threat Committee.
The ad hoc threat committee meets quarterly or as the situation dictates. They share intelligence data
to help predict and prepare for special threat situations. As the committee that performs the crisis
management for the installation, they should also perform as the crisis management team during a real
terrorist incident. As a minimum, the committee should be composed of the Chief of Staff or Director,
Plans, Training, and Security (DPTSEC), and primary installation staff personnel. The Chief of Staff or
DPTSEC chairs the committee. He is in charge of scheduling times and frequency of meetings,
emergency sessions, and facilities. Key personnel are from FBI, CID, physical security and
counterterrorism, G2/military intelligence, and G3/operations. The ad hoc threat committee is an
indispensable tool in developing liaison and a working coordination with all post and civilian
counterparts. They should be combined with other committees, such as the crisis management team,
to make decisions from a single efficient source. To prepare for special threat situations, the committee
must conduct a threat analysis to identify the potential threat. They should have tasking authority to be
A threat analysis is a total evaluation of all possible information to determine the security posture of the
installation. The analysis is done with regard to the various threats, targets, and weaknesses.
When conducting a threat analysis, you must think like a terrorist. Look around your installation. Ask
yourself questions that a terrorist would ask. How would you attack your own installation? Consider
areas that are vulnerable and that would attract publicity if attacked. Consider previous terrorist
operations that have been successful. What did the terrorist use as targets? Thinking like a terrorist
will help you to identify the area you must protect.
War games can help to identify installation weaknesses. Develop various attack scenarios with your
threat committee. Field exercises using small MP