APA Tactical Home About APA Tactical APA Tactical Site Map Contact APA Tactical Administrator
APA System Outline
Roots to Combat Motion
Tactical Combat
Counterterrorism Infrastructure
Quartermaster Supply
Gallery of Teams and Members

Counterterror Joint Command

Infrastrucutral Readiness in case of a terrorist event

by Chief Instructor Chris Mar -

Special Police Corps Combined Forces

Counterterrorist Instructors Training Group



These hyperlinks connect to the online version of Counterterror_Joint_Command


Mission Statement

Government Counterterrorism Policy centers on cooperating with regional members by adhering to international intelligence security guidelines and long term strategic objectives. National guidelines involve protecting Energy Resources, Information and Electronic Technologies, enforcing Trade, Transportation and Telecommunication Policies and Force Interdiction by Department of Defense, Military, and Federal Rapid Response Law Enforcement for tactical interdiction in response to incursion by limited foreign elements.

It is a common conception that only major trade and political allies to the USA, are likely targets for violent international terrorist activities therefore many incidents involving explosives, hostages or destructive chemicals will remain a responsibility of City and County Police and their own Tactical Teams as according to the current criminal code. It is our belief that Law Enforcement’s Role in Counterterrorism is much more significant and far wider in scope then most country's governments set forth by constitutional reform, rather tasking and outsourcing for support and resources is by far the norm.


The Essence Of Counterterrorism

The essence of Counterterrorism is to achieve an infrastructure with capabilities to plan, organize, staff, implement and control every aspect of potential terrorism so that a terrorist-like incident causing great destruction and suffering does not occur when it could have been preventable. Furthermore these capabilities will take into account how to minimize the adverse effects and maximize speedy restoration of order should terrorism strike, not only as a function of manpower but through information sharing, intelligence gathering and dissemination of public warnings as an intrinsic responsibility of LE. Most importantly, these integrations elevate present police capabilities to the highest level of responsiveness and competency for any emergency including earthquakes, other disasters and widespread calamity.



The purpose of this report is to outline a general summary of the actions that Police Agencies must focus on in order to establish a sound Counterterrorism Command and Management Infrastructure for Law Enforcement to face the threat of terrorism and which includes the following functions:

 1. Vulnerability Assessment and Threat Detection

 2. Monitoring and Occurrence Prediction

 3. Protection and Mitigation

 4. Information Assurance

 5. Risk Management

 6. Contingency Planning and Red Team Tasking


The next steps taken will help guide international agencies into the 21st Century in a cost effective manner utilizing support from the foremost experts available. Our objective is to bring to Taiwan leading experts in Advanced Security Infrastructure and Occurrence Management who can fulfill the requirements of training, software, hardware and technological guidance specifically for use by the Chiefs of Police Departments.


Defining Terrorism

According to terrorism specialist Louise Richard, sub-state terrorism is the deliberate targeting of non-combatants for a political purpose. She expands on this definition with several inherent characteristics of this terrorism:

  1. A terrorist act must be a political act

  2. It must involve violence or the threat of violence

  3. It must be symbolic since sub-state terrorists are invariably outmanned and outgunned by their adversaries

  4. The violence is to communicate a political message - not to defeat an enemy, nor violence for the sake of violence

  5. The victims of terrorism and the audience of terrorism are not the same

  6. The targeting of non-combatants must be deliberate

Terrorism is the means used and not the end which are pursued. This is crucial, since many are reluctant to label those with whom they agree as terrorists, even if they are, and instead reserve that label for terrorism directed against them or their allies. Terrorism is terrorism regardless of whether you agree with their ends. Richard also points out that there are often legitimate goals which are the basis for terrorism.


 Weapons of Terrorism

The traditional tools of terrorism include explosives, incendiary devices, taking of hostages and kidnapping however Modern Day Terrorism now includes what has been generally referred to as Weapons of Mass Destruction or “WMD”. A suitable acronym which describes the basic categories of “WMD” scale is “B-NICE” which stands for Biological, Nuclear, Incendiary, Chemical, and Explosive. The most common weapons are Incendiary Devices and Explosives; however a greater danger exists from the combining of components to enhance damage and injury not only to potential victims, but to investigators who enter into the Hot Zone to collect evidence.



Supplementing traditional improvised explosive devices by adding a biological or chemical agent can increase the length of time and the effective area of danger. If a biological weapon releases deadly viruses or bacterial pathogens into the environment, agriculture, animals, water, soil and air are at risk from contamination and recovery then becomes a tremendous challenge requiring resources, equipment and expertise which may be very limited or unavailable. Even more so, the effects of a biological agent may not be felt for hours or days after its release, severely complicating detection and containment. On the simplest scale, a plastic water bottle containing caustic or toxic agents with a hand grenade taped to its exterior becomes a weapon with surgical strike capabilities and a means of focused assassination. Binary Devices are weapons with two chemicals held in separate sections that are mixed after firing to produce deadly substances such as Sarin. Detonation can be through impact, fuse, timed dissolve, preliminary charge, ballistic, wired or wireless electrical signal such as a mobile phone for remote and distance connect. A deterrent to this type of electronic relay is a frequency jammer now in common use with US Forces in the Middle East to protect fortified positions.

Law Enforcement whose basic goal is to protect the public must deter these acts prior to occurrence which requires preplanning, acquiring equipment, specialized training and to develop an infrastructure to command, and manage Operations, Planning, Logistics and Administrative functions of Incidence Response.


Terror Interdiction Action Plan

In order to support the required functions the NPA antiterrorism plan must be:

1) Dynamic and Flexible in order to proactively deter and preemptively deny an entity that is as yet unknown from:

 a) Destroying vital services* thereby crippling society,

 b) Propagating fear and mayhem to paralyze our nation’s vitality.

 c) Using a WMD to end life and 

2) Simple and Practical for:

 a) Rapid Implementation

 b) Optimal Infrastructure in order to:

   i) Gather and share essential interagency intelligence

   ii) Disseminate information and warnings to the public

   iii) Liaison w/ Civilian Reps as well as the Chief of Staff

 c) Effective Incident Management Chain of Command to:

   i)  Understand the nature of the terrorist threat.

   ii) Understand your antiterrorism plan and their role.

   iii) Recognize indications of a terrorist attack.

   iv) Take effective and appropriate action.

   v)  Restore Order and Assist Recovery



Special attention must be placed on Training and Administration:

1. Officer Safety Issues

2. First Responder Procedure, Secondary Criticality

3. Explosives and Incendiary Devices, WMD and HAZMAT

4. International Terrorism and Extremism Groups

5. Domestic Terrorism and Religious Fanaticism

6. Understanding the Terrorist Mindset - Terrorism Indicators

7. Terrorist Financing – Criminal Investigations

8. Special-Interest/Single-Issue Terrorism -

9. Special-Interest/Anarchist Groups

10. Interview, interrogation, Negotiation Techniques With Extremists

11. Threat Assessments -  Risk Management

12. The Role of Intelligence – Information Sharing

13. Human Rights, Legal Issues

14. First Responders – Public Safety and Dangerous Containment

15. Tactical Force Response

16. Hostage Rescue

17. Guarding public Services

18. Recovery and Restoration


 Process and Protocol

Establishing a Counterterrorist Command Center

1) Before an incident – Plan and Preparation

  a) A Risk Assessment

   i) Description of the types of potential threat

   ii)   Analysis of potential locations most likely in threat.

   iii)Procedure to keep this assessment current.

  b) Training

   i) Simulations and Reviews

   ii) 2nd Response

   iii) Contingency

   iv) Special Operations

   v) Scientific Teams

   vi) Containment

  c) Acquiring Equipment

   i) Bio-Chemical Scanning Detection

   ii) Radioactivity Measurement

   iii) Special Operations Listening, Radar, Visual Aids

   iv) Medical Emergency

   v) Isolation Equipment – NBC Masks and Suits

   vi) Detoxification – Cleaners

   vii) Disposal

2) During the incident – Executing and Responding

  a) Joint Field Command Structure

  b) Incident Command Layout

  c) On-scene Coordination Protocol, Contingency, 2nd Occurrence

  d) Commissioner’s Command Tree

  e) Securing Vital Public Services*, Events, and Important Areas

    i) Energy Resources, Power transmission and lines

    ii) Waterways, Harbors, Freight and Container Loading

    iii) Shoreline, Borders, Airspace

    iv) Banks, Financial Institutions, Businesses, IT, TV

    v)   Hospitals, Evacuation Centers, Prisons

    vi) Roadways, Bridges, Tunnels, Mountain Passage

    vii) Railways, Electric Circuitry and Control Stations

    viii) Airports, Cargo Centers, Mail, Telecommunication

    ix) Dams, Construction, Refineries, Science and Industry

    x)   Schools, Universities, Libraries, Sports Events, Media

    xi) Public Gathering, Auditoriums, Concert Halls, Malls

    xii) Government Buildings, Memorials, Landmarks

3) After an Incident – The Follow Through

  a) Criminal Investigation

  b) Recovery

  c) Analysis

  d) Victim Assistance


 The Role of Law Enforcement – Sequence of Events

1. SCENE ASSESSMENT – Threat Evaluation Team, Forensics, Scientist, Health

  1) What type of B-NICE Incident is suspected?

  2) How many victims?

  3) Current status – on-going or stable?

  4) What other resources are required, Fire, Medical?

  5) Where is the location exactly?

  6) What is the safest approach?

  7) Any other devices or suspicious possibilities?

  8) Are any perpetrators present?

  9) What is the threat? Ambush Traps, Secondary Explosives


  1) Prevent witnesses from leaving

  2) Prevent others from entering danger areas

  3) Preserve Evidence

  4) Prepare staging area

  5) Limit contamination


  1) Understand the blast potential, direct force and shrapnel

  2) Contain contamination and contaminated persons, materials

  3) Use scanning and detection to read the types

  4) Understand the weather and wind conditions, glaze distances

  5) Locate Spread Points, water tables, waterways, animals


  1) Securing traffic

  2) Establishing Emergency Medical Services Entry

  3) Containment and removal of HAZMAT

  4) Evacuation of Injured

  5) Isolation of non-injured


  1) Scene is equal to Violent Crime Scene

  2) Recording and photographing and identifying witnesses

  3) Install earliest possible investigations and specialists teams


  1) Establishing Security and Perimeter

  2) Assisting Medical Staff

  3) Evacuation Support


  1) Visibility

  2) Fielding Questions

  3) Public Relations

  4) Restore Confidence

  5) Proper equipped and trained investigations teams


The Infrastructure

A. Joint Command Echelon


B. Incident Command Center


C. Scene Coordination