dummies
 

Suchen und Finden

Titel

Autor/Verlag

Inhaltsverzeichnis

Nur ebooks mit Firmenlizenz anzeigen:

 

A New Understanding of Terrorism - Case Studies, Trajectories and Lessons Learned

M.R. Haberfeld, Agostino von Hassell

 

Verlag Springer-Verlag, 2009

ISBN 9781441901156 , 366 Seiten

2. Auflage

Format PDF, OL

Kopierschutz Wasserzeichen

Geräte

117,69 EUR


 

Preface

6

Acknowledgments

8

Contents

9

Contributors

11

Book Editors

11

Chapter Contributors

13

1 Todays Terrorism Introduction and Analysis: The Have Nots Versus the Haves

17

The Have Nots Versus the Haves

17

The Conceptual Themes Through A Pragmatic Lens

19

References

24

2 Proper Proactive Training to Terrorist Presence and Operations in Friendly Urban Environments

25

Introduction

25

Reacting to Terrorism

25

Proactive Law Enforcement Response

27

Responses that Fail

28

Why?

29

Suggested Mechanism for Effective Law Enforcement Counter-Terrorism

29

Definitions

31

What Can We Do? -- A Two-Prong Approach

32

Proper Proactive Training to Terrorist Presence and Operations in Friendly Urban Environments

33

References

38

3 Waco: A Review of the Response by Law Enforcement

39

Introduction

39

History and Description of Cults

40

Description of the Branch Davidians

42

Political and Historical Context

44

Description of the Incident

45

Controversy Surrounding the Waco Standoff

47

Implications and Conclusion

51

References

52

4 The Solo Crusader: Theodore Kaczynskiand Timothy McVeigh

53

Introduction

53

Kaczynski's History: The Progressive Deterioration

53

The Long Crusade

54

Pursuit of the Unabomber

57

From Cabin to Courtroom

60

McVeighs Journeys and the Militia Movement

60

The Bombing: April 19, 1995

63

The Response

65

The Prosecution: US v. McVeigh

67

Countermeasures and Analysis

68

Conclusion

71

References

71

5 It Happened Here: Biological Terrorism in the United States

74

Introduction

74

The Rajneeshees

76

Cults and the State

78

Uncivil Movements

80

The Rajneeshees in America

82

The Attack

85

Law Enforcement Response

86

Rajneeshees as Terrorists

88

Anthrax Attacks Fall 2001

90

Profile of the Anthrax Killer

93

Analysis

96

Conclusion

97

References

98

6 When Radical Becomes Terrorist: Law Enforcement and Eco-Sabotage

102

Introduction

102

The Environmental Movement

103

The Earth Liberation Front

105

Investigating and Prosecuting the Eco-Sabotage

106

Analysis –What Should be the Adequate Response?

109

Conclusions

111

References

112

7 September 11 Terrorist Attacks Against the United States and the Law Enforcement Response

114

Introduction

114

Overview of the Group Behind September 11

115

The Rise of a New Extremist Group: Al Qaeda

115

The Motivation to Join Al Qaeda

120

The New Al Qaeda

122

Homegrown Terrorists

124

Overview of the Events of September 11

124

Political and Historical Context

124

The Attacks

129

Overview of the Law Enforcement Response and Analysis

139

The Law Enforcement Response

139

Analysis

141

Conclusion

152

References

153

8 Aviation Security in the Face of Tragedy

158

Introduction

158

Relevant Aviation Security Prior to the Bombingof Pan Am Flight 103

159

Events Leading Up to the Bombing

160

Political Context

160

Intelligence Reports and Warnings

161

The Bombing of Pan Am Flight 103

162

The Response

163

Fire Department Response

163

Military Response

163

Police Response

163

International Investigative Response

164

Intelligence Response

165

The Investigation

165

Diplomatic Response

166

Analysis

167

Conclusions

172

References

173

9 Maritime Security: Case Studies in Terrorism

174

Introduction

174

The Attack on USS Cole

175

Legal Steps for Law Enforcement Cooperation

183

The Evolving Threat

186

The Adequate (Inadequate?) Response

189

Assessing the Proper Response

194

Conclusions

197

References

199

10 Rail Transport Security

204

Introduction

204

Overview of March 11, 2004, Madrid Railway Attack

205

The Attack

205

The Investigation of the March 11 Attacks

206

Islam and Spain

208

Response to March 11 Attack in Madrid

209

Political Ramifications of the March 11 Attacks

209

Overview of August 10, 2001, Angola Railway Attack

210

History of the Angolan Conflict

211

Reactions to the Angola Attack

213

Impact on the Angola Conflict

214

Overview and Analysis of Rail Security

215

Law Enforcement and Emergency Response

217

Conclusion

217

References

218

11 Securing the Gold: Olympic Security from a Counter-Terrorist Perspective

220

Introduction

220

Attacking During the Olympic Games

221

The Failed Response

223

Securing the Games Post the Munich Attack

224

Analyzing the Olympic Games Threat

226

Counter Measures

229

Conclusion

231

References

232

12 1995 Tokyo Subway Attack: The Aum Shinrikyo Case

234

Introduction

234

Description of the Attack

235

Description of the 1995 Tokyo Subway Attack

235

The Characteristics of the Attack

235

Aum Shinrikyo's Rationalization Regarding the Attack

236

The Background of the Terrorists and Their Leader

237

The Aum Shinrikyo

237

Shoko Asahara – His Personality and Leadership

237

The Path to Become a Terrorists Group

238

Analysis of the Law Enforcement Response

239

The Response to the Attack and Its Problems

239

Arrest of the Terrorists and the Compensation of the Victims

240

Lessons Learned from the Tokyo and Other Subway Attacks

240

The Development of the Subway Attack Protection/Response Policy

242

The Need for a Contingency Plan Against Subway Attacks

242

Recommendation for the Future

243

Protection Physical Subways and Stations from the Attack

243

Recommendation for Law Enforcement Agencies and First Responders

243

Subway Passengers and Citizens

244

The Oversight over the Dangerous Religious Groups

244

Conclusion

245

References

245

13 2005 London Bombings

247

Introduction

247

Overview of the Threat

248

The Threat from Islamic Fundamentalism and Al-Qaeda

248

Vulnerability of Railway Targets

250

Overview of the Events on July 7, 2005

250

Timeline of the Events

251

Overview of the Events on July 21, 2005

252

Overview of the Law Enforcement Response and Analysis

254

Investigation of the 7/7 Attacks

254

Overview of 7/7 Bombers

257

Investigation of 7/21 Attacks

258

Conclusion

260

References

260

14 Reforming Power Structures: Russian Counter-Terrorism Response to Beslan

263

Introduction The Beslan Incident

263

The Law Enforcement Response to Counter Terrorist Activities

265

The System Prior to the Beslan Incident

266

Changes in the System of Interdepartmental Coordinationand Information Exchange

268

Information Exchange with Other Countries Special Services

269

Coordination Center and Information Exchange in North Caucasus

269

Defense Department's Army Reassignments

270

Coordination in Case of Hostage Captures and Subversive Terrorist Attack

271

Changes in the System of Obtaining Intelligence on Terrorist Acts

273

Tactics of the Special Division After the Beslan Incident

274

Main Intelligence Directorate (GRU)

275

Tactics Involving Capture of Terrorists' Relatives Tactics

277

Establishment of New Divisions

278

The MVD Internal Troops

278

Federal Security Service

279

Conclusion

280

Appendix: MI5 organization chart

282

References

283

15 Beirut 1983: Have We Learned This Lesson?

285

Introduction

285

Lessons Learned or to Be Learned?

285

The Failure of Intelligence

288

The Rules of Engagement

290

The Chain of Command

292

A Changed Mission

293

Conclusions

294

References

296

16 Lost in Transition: Khobar Towers and the Ambiguities of Terrorism in the 1990s

297

Introduction

297

Islamist Extremism in Saudi Arabia

298

The Khobar Towers Plot

301

Investigations and Responses

304

The FBI Investigation: A Byzantine Case

304

Investigating Force Protection: Organizational Learningor Witch-hunt?

310

Conclusions: Khobar Towers in Context

313

References

318

17 The Siege in Mumbai: A Conventional Terrorist Attack Aided by Modern Technology

322

Introduction

322

Colonial Influences in South Asia

323

The Formation of India, Pakistan, and Jammu and Kashmir

323

A History of Terrorism in Pakistan and India

325

Lashkar-e-Taiba

327

Attacks by Lashkar-e-Taiba Prior to November 2008

328

Pakistans Directorate of Inter-Services Intelligence (ISI)

328

The Mumbai Massacre

330

The Operation

332

First Group

333

Second Group

335

Third Group

337

Fourth Group

339

The Aftermath

340

Attacks Used Conventional Weapons but Modern Technology

341

Target Selection

342

Mumbai Police Response

344

Lessons Learned

345

Conclusion

350

References

351

18 Conclusions -- A New Understanding of Counter-Terrorist/ism Response

354

Introduction

354

Risk Management

355

Building an Intelligence File

356

Step I

356

Step II. Creating an Intel File

358

Create Links (A)

358

Create a Backup System

358

Create Security Access System

359

Create Links (B)

359

Develop Personal Relationship

359

Crisis Preparation

359

References

362

Index

363