ebook img

The counterterrorism handbook: tactics, procedures, and techniques: 2nd ed PDF

265 Pages·2002·2.076 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The counterterrorism handbook: tactics, procedures, and techniques: 2nd ed

Second Edition The Counterterrorism Handbook Tactics, Procedures, and Techniques Frank Bolz, Jr. Kenneth J. Dudonis David P. Schulz CRC PR ESS Boca Raton London New York Washington, D.C. Library of Congress Cataloging-in-Publication Data Bolz, Frank, 1930– The counterterrorism handbook : tactics, procedures, and techniques / Frank Bolz, Jr., Kenneth J. Dudonis, David P. Schulz.— 2nd ed. p. cm. — (Practical aspects of criminal and forensic investigations (Series)) Includes index. ISBN 0-8493-0964-6 (alk. paper) 1. Terrorism—Prevention. I. Title: Counterterrorism handbook. II. Dudonis, Kenneth J. III. Schulz, David P. IV. Title. V. Series. Practical aspects of criminal and forensic investigations HV6431 .B65 2001 363.3¢2—dc21 2001035374 CIP This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such copying. Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation, without intent to infringe. © 2002 by CRC Press LLC No claim to original U.S. Government works International Standard Book Number 0-8493-0964-6 Library of Congress Card Number 2001035374 Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 Printed on acid-free paper Table of Contents Foreword Acknowledgments Section I: Pre-Incident 1 Common Elements of Terrorism The Meaning of Terrorism Nature of Terrorism Terrorism by the Numbers Purpose of Terrorism Characteristics of Terrorists Counterterrorist Response Counterterrorist Operations Weapons of Mass Destruction Role of the Military Role of the Federal Aviation Administration Financial Terrorism Counterterrorist Capabilities Counterterrorist Tactics Investigative Techniques Local Law Enforcement Capabilities Interagency Liaison Local Significance Private Sector Cooperation 2 Pre-Incident Planning Introduction to Risk Assessment Structuring a Defense Plan Information-Gathering Target Analysis Organization ©2002 CRC Press LLC Training Terrorist Tactics Risk Analysis Risk Avoidance Hostage/Kidnap Defense 3 Bomb Defense Planning Types of Bomb Incidents The Bomb Threat Rationale of Bomb Threats A Note of Warning Warning or Hoax? Responding to the Bomb Threat Evacuation Options Evacuation Procedures Putting Out the Message Planning Issues The Role of Police in Handling a Bomb Threat Why Terrorists Bomb Types of Bombers Motivations of Bombers 4 Hostage Situations A Rare Occurrence Who Takes Hostages? Panic Reaction Suicide by Cop Why Hostages Are Taken The Magic Triangle Munich, 1972 Deadlines Killing on Deadline Evaluation Responsibilities of the First Responding Officers The Mobilization Point Location of the Mobilization Point Decision-Makers Evacuation Keeping Track of People Start Intelligence-Gathering Inner Perimeter ©2002 CRC Press LLC Tactical Units Communications First-Response Review Summary 5 Defining Terrorism What Is Terrorism? A Brief History of Terrorism Terrorism as a Political Statement Modern Terrorist Groups Terrorist Actions Other Terrorist Actions Intimidation and Use of Threats Disinformation and Propaganda Assassinations Success of Terrorists 6 Threat of Weapons of Mass Destruction Introduction The Threat Today Aum Shinrikyo Incident Chemical and Biological Agents Response to a WMD Incident Section II: Incidents 7 Kidnapping Kidnapping as a Weapon Risks Involved Differences between Hostage-Taking and Kidnapping Uses of Kidnapping Types of Kidnappers Post-Cold War Political Kidnapping Private Industry’s Role The Police Role Police Response to Residence or Workplace of Victim Response to the Kidnap/Extortion Threat “Do Not Contact the Police” Hoax Prevention Tactics ©2002 CRC Press LLC What the Individual Can Do What the Family Can Do One Man’s Ordeal What the Corporation Can Do On Becoming a Victim 8 Bomb Incidents The Mechanics Search Overview Building Searches Exterior Searches Interior Searches Search Teams Setting Up a Program Alternative to Search Teams Mechanics of the Search Searching a Room Common Bomb Placement Locations Precaution Vehicle Searches Antipersonnel Car Bombs Vehicle-Borne Explosive Devices Aircraft Searches Pre-Incident VIP Search Explosive-Detection Canines Suspicious Packages Identifying Improvised Explosive Devices Explosives Initiation Systems Summary 9 Hostage Incidents What Is Involved Communicating with the Hostage-Taker The Making of a Hostage Incident The Announcement Reaction of Law Enforcement Professional Criminal Role Public Role Containment Evacuation and Intelligence ©2002 CRC Press LLC Why Police Do the Negotiating Post-Incident Crisis Intervention Teams Controlling the Environment Dynamics of Hostage Negotiation A Note on Weapons Saying “No” The Art of Negotiation Courses of Action The Surrender and Suicide Ritual Thought Interruption Never Take a Weapon from the Hand of a Surrendering Perpetrator Special Qualifications Section III: Post-Incident 10 Post-Blast Environment Getting Back to Normal The Incident First Responder Investigative Phase Seat of the Explosion Gathering Physical Evidence Examining Fragments Evidence Recovery Physical Evidence Post-Blast Investigation Process Case Studies 11 Hostage/Kidnapping Aftermath The Dangers Involved The Immediate Reaction of Victims Long-Term Reactions The Family Police Handling of the Incident The Stockholm Syndrome Transference When an Incident May End in the Use of Deadly Physical Force Ransom: To Pay or Not to Pay? Making the Payoff ©2002 CRC Press LLC The Recovery Victimology Post-Incident Effects on Rescue Officers 12 Interviewing Victims By Dr. Frank Ochberg Intrusive Recollections Emotional Anesthesia: Constricting Life Activity Lowered Threshold for Anxiety and Arousal PTSD Is Not Always the Same Who Gets PTSD? Other Difficulties A Guide to Interviewing Timing Setting the Stage Eliciting Emotion Informed Consent Stages of Response The Humanitarian Role of the Investigator Secondary Traumatic Stress Disorder 13 Role of the Commander Who’s in Charge? Pre-Incident: Developing Guidelines Make-Up of the Team Maintenance of Manpower and Equipment Keeping Up-to-Date on New Techniques and Strategies Evaluate and Update Liaisons with Other Agencies During the Incident: Intelligence-Gathering Evaluate Alternatives Sharpshooter Chemical Agents Food Alcohol and Drugs Contain and Negotiate Impact of the Event on the Public Post-Incident Debriefing Formal Debriefing Evaluate New Developments and Outcomes ©2002 CRC Press LLC 14 The Command Post The Nerve Center Staffing the Command Post Bomb Incident Command Post Log and Situation Map Equipment and Supplies Communications Concealment vs. Cover Handling the Media Epilogue Appendix: Terrorist Organizations and Support Groups ©2002 CRC Press LLC Foreword By Dr. Robert Kupperman Stephanie Lanz Terrorism is a form of warfare that relies principally upon fear to deliver its message. The target of the violence often goes beyond the immediate victim. Its ultimate goal is theatrical, the Broadway of villainous acts. This holds especially true today with television news programs broadcasting images of the terrorist event even before senior officials have had time to assess the situation. This, together with the advent of cell phones, has led to just-in-time decision making, a new phenomenon in managing a crisis. In recent years, we have witnessed a staccato of bombings, assassina- tions, and hostage-taking incidents, with every new threat spawning a new countermeasure and every new countermeasure resulting in new threats. While terrorists are unlikely to give up the truck bombs or spectacular suicide missions that afford them instant gratification and notoriety, a new cadre of terrorists exists that may look to nontraditional tactics and weapons. The young terrorist of today is often computer savvy and well educated, bringing a whole new level of sophistication to the table. Computers and the Internet are increasingly being used for planning terrorist activity, recruiting, and fundraising. And, while terrorists can afford the latest tech- nological equipment, law enforcement and other officials more often than not find themselves lagging behind, making it difficult for them to keep up with the terrorists. Further complicating terrorism warfare calibrations is the possibility that cyberattacks against critical infrastructures may be used as a force multiplier to extend the deadliness of an incident. Furthermore, the target of the attack, the critical infrastructure, currently is owned and operated primarily by the private sector, bringing a whole new group of players into the counterterrorism game. In contrast with the period of the Cold War when terrorist groups were predominantly politically motivated, the most prominent groups today carry a religious banner. This makes them especially dangerous, for the only entity ©2002 CRC Press LLC

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.