The IT Law Wiki


Anti-terrorism (AT) entails using

passive and defensive measures . . . such as education, foreign liaison training, surveillance, and countersurveillance, designed to deter terrorist activities. [It is an] integrated, comprehensive approach . . . to counter the terrorist threat. The concept has two phases: proactive and reactive. The proactive phase encompasses the planning, resourcing, preventive measures, preparation, awareness education, and training that take place before a terrorist incident. The reactive phase includes the crisis management actions taken to resolve a terrorist incident.[1]


Effective data dissemination is a key measure to improving anti-terrorism awareness and preparedness. The rapid evolution of information technology has facilitated the transfer of accurate terrorist profiles (to include photographs) and the ability to transfer the information anywhere in the world quickly. Other key AT data, such as protection technologies and procedures, can also be transmitted to field locations quickly and effectively. Recent efforts have reduced barriers between agencies on the fusion and dissemination of AT data.


  1. Joint Chiefs of Staff, Joint Tactics, Techniques, and Procedures for Antiterrorism, at ix (Joint Pub 3-07.2 Mar. 17 1998) (full-text).

See also[]