Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Anti-terror Calculations: What’s Next?

By Dean C. Alexander
March 16, 2006
Homeland security executives feel that hotel and resort facilities such as Walt Disney World could be a terror target. Pictured is the meditation tea garden in a Disney World hotel.


Last year’s suicide bombings against U.S.-brand hotel chains in Amman, Jordan, underscored the fragility of business in the face of global terrorism. The events call for a review of security methodologies by many large enterprises so they can better prevent or minimize future terror incidents.

Three al Qaeda-linked Iraqis, along with a failed female suicide bomber whose husband succeeded in exploding his explosives belt, attacked poorly defended hotels in Amman: the Grand Hyatt, Radisson SAS and Days Inn.

Fearing subsequent attacks, declining foreign tourism revenue and foreign investor angst, Jordanian Deputy Foreign Minister Marwan Muasher immediately stated that all major hotels, banks, government and nongovernmental institutions in Jordan would have metal detectors and other advanced security equipment installed.



Hotels are targets

Suicide bombers attacking hotel targets are no longer an anomaly.

During the past few years, suicide bombers victimized lodging facilities globally from Jakarata and Netanya to Baghdad and Mombasa.

Against this backdrop, enterprise security executives must ask as to what security plan could stop or reduce the negative impact of suicide bombers. Initially, the assets at a lodging facility must be analyzed including human, financial, equipment and intellectual property. Next, the risks and vulnerabilities that exist at such sites should be calculated.

Subsequently, disparate defenses and the benefits they provide must be balanced against the negative impact of such measures (e.g., costs and inconvenience). Adoption of appropriate security strategies would then proceed, followed by a review of defensive actions to ensure their effectiveness. Company-wide dedication to security is a prerequisite for this defensive scheme to succeed.

As the aforementioned security process is not novel, why is security often lacking at lodging facilities? Some of the reasons include:

  • Failure to appreciate terror risks and a naivety that terrorism can “never happen here.” Many Jordanians thought they were immune from radical, Islamic terrorist attacks as Jordan is a predominately Muslim country. A look at neighboring countries and beyond demonstrates otherwise.
  • Managers often view security equipment, personnel and training costs as more burdensome than the negative impact of any terror attack. In a perverse way, business has thus far calculated that the occasional terrorist attack is a “cost of doing business” not worth gauging against with full vigor. Yet, one need only look at the negative implications of the September 11 attacks on commercial aviation to comprehend that weak security may prove shortsighted.
  • Draconian security measures, including barriers at hotel entrances, metal and explosives detectors, heavily armed guards, bomb-sniffing dogs, search of luggage prior to entering a hotel and identification checks are currently viewed as time-consuming and burdensome. Under such rigid security measures, managers predict that consumers would go to less fortified lodging establishments with easier accessibility and a more relaxed atmosphere.

Upon weighing these distinct variables, it is not surprising that often security actions fall short. Yet, under a minimalist security paradigm, suicide terrorist adversaries will continue to aggregate corpses and physical destruction rather easily. That is until government and consumers force industry to adjust their perspectives on security.



“Not here” attitude

Despite the severity of some terror attacks on hotels, it is highly unlikely that we will see significant security measures, legislation or funding allocated to defend lodging facilities in the United States. Only after multiple, momentous terrorist attacks occur against hotels on U.S. soil will groundbreaking legislation, copious funding and broad-based security operational upgrades be adopted on a large-scale here – as was the case with commercial aviation post-9/11. While such types of attacks are not expected in the immediate future, we presently do not have adequate defense measures in place should suicide bombers accelerate their terror timetable against hotels here.

Links

  • Dean C. Alexander
  • Dean C. Alexander

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dean C. Alexander is Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. He is the author of the new book, Family Terror Networks (2019), available at Amazon.com. He is also a valued member of Security’s Editorial Advisory Board.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • COVID-vaccine-freepik.jpg

    COVID-19, anti-vaxxers and moving forward together

    See More
  • The Role of Universities in Preparing the Next Generation of Security Professionals

    See More
  • Extremism in the United States: where are the risks and what security enterprises can do regarding extremism

    Extremism in the United States in 2021: What’s out there and where are the risks?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing