Repository hosted by TU Delft Library

Home · Contact · About · Disclaimer ·

Counter terrorism functions to enhance critical infrastructure resilience against CBRNe terrorism

Publication files not online:

Author: Bonsen, I.M. · Gaasbeek, R.C.
Institution: TNO Defensie en Veiligheid
Source:2009 IEEE Conference on Technologies for Homeland Security, HST 2009, Waltham, MA, USA, 11-12 May 2009, 381-384
Identifier: 248216
doi: doi:10.1109/THS.2009.5168062
ISBN: 9781424441785
Article number: 5168062
Keywords: Electronics · CBRN · CBRNe · Critical infrastructure protection · Methodology · Protection · Risk analysis · Terrorism · Vulnerability assessment · Life · CBRN - CBRN Protection · EELS - Earth, Environmental and Life Sciences


Current approaches in critical infrastructure protection use long lists of items that fail to give its user a structured answer to the state of protection of its object. The functionality approach uses different terrorist functions to structure the threat (which are to have intent, to scout, to transport, to attack and to have an effect). It uses four different counter terrorist functions (to deter, to detect, to mitigate and to respond) to disturb and counter these terrorist functions. © 2009 IEEE.