Terrorist Threat Analysis: Shaping the Traditional Threat Formula
Publication Title
Wiley Handbook of Science and Technology
Editor
John G. Voeller
Document Type
Contribution to Book
Publication Date
1-1-2009
Abstract
This article will summarize methods that can be used for threat analysis with applications for modeling threats generated by non-state adversaries. Traditionally, threat models focused on an adversary's capability to mount a specific attack and that adversary's intent to carry out such an attack. However, as explicated in this article, threat is best understood as the product of an adversary's capability, intent, and authority to engage a specific target by a particular attack mode. Furthermore, threat does not emerge from a clean room; rather, threat is strongly influenced by an adversary's culture and constituencies. Thus, any robust model of threat requires a cultural awareness of an adversary, and its intended audience. Examples of capability, intent, and authority will be provided in an effort to portray a robust threat profile. Specifically, this article will employ an al-Qaeda WMD threat as an example of the application of the threat assessment suggested.
Recommended Citation
Jack F. Williams, Terrorist Threat Analysis: Shaping the Traditional Threat Formula, in Wiley Handbook of Science and Technology (John G. Voeller ed., 2009)
Institutional Repository Citation
Jack F. Williams,
Terrorist Threat Analysis: Shaping the Traditional Threat Formula,
Faculty Publications By Year
2185
(2009)
https://readingroom.law.gsu.edu/faculty_pub/2185
First Page
260
Last Page
278