Suchen und Finden
Service
A New Understanding of Terrorism - Case Studies, Trajectories and Lessons Learned
M.R. Haberfeld, Agostino von Hassell
Verlag Springer-Verlag, 2009
ISBN 9781441901156 , 366 Seiten
2. Auflage
Format PDF, OL
Kopierschutz Wasserzeichen
Preface
6
Acknowledgments
8
Contents
9
Contributors
11
Book Editors
11
Chapter Contributors
13
1 Todays Terrorism Introduction and Analysis: The Have Nots Versus the Haves
17
The Have Nots Versus the Haves
17
The Conceptual Themes Through A Pragmatic Lens
19
References
24
2 Proper Proactive Training to Terrorist Presence and Operations in Friendly Urban Environments
25
Introduction
25
Reacting to Terrorism
25
Proactive Law Enforcement Response
27
Responses that Fail
28
Why?
29
Suggested Mechanism for Effective Law Enforcement Counter-Terrorism
29
Definitions
31
What Can We Do? -- A Two-Prong Approach
32
Proper Proactive Training to Terrorist Presence and Operations in Friendly Urban Environments
33
References
38
3 Waco: A Review of the Response by Law Enforcement
39
Introduction
39
History and Description of Cults
40
Description of the Branch Davidians
42
Political and Historical Context
44
Description of the Incident
45
Controversy Surrounding the Waco Standoff
47
Implications and Conclusion
51
References
52
4 The Solo Crusader: Theodore Kaczynskiand Timothy McVeigh
53
Introduction
53
Kaczynski's History: The Progressive Deterioration
53
The Long Crusade
54
Pursuit of the Unabomber
57
From Cabin to Courtroom
60
McVeighs Journeys and the Militia Movement
60
The Bombing: April 19, 1995
63
The Response
65
The Prosecution: US v. McVeigh
67
Countermeasures and Analysis
68
Conclusion
71
References
71
5 It Happened Here: Biological Terrorism in the United States
74
Introduction
74
The Rajneeshees
76
Cults and the State
78
Uncivil Movements
80
The Rajneeshees in America
82
The Attack
85
Law Enforcement Response
86
Rajneeshees as Terrorists
88
Anthrax Attacks Fall 2001
90
Profile of the Anthrax Killer
93
Analysis
96
Conclusion
97
References
98
6 When Radical Becomes Terrorist: Law Enforcement and Eco-Sabotage
102
Introduction
102
The Environmental Movement
103
The Earth Liberation Front
105
Investigating and Prosecuting the Eco-Sabotage
106
Analysis –What Should be the Adequate Response?
109
Conclusions
111
References
112
7 September 11 Terrorist Attacks Against the United States and the Law Enforcement Response
114
Introduction
114
Overview of the Group Behind September 11
115
The Rise of a New Extremist Group: Al Qaeda
115
The Motivation to Join Al Qaeda
120
The New Al Qaeda
122
Homegrown Terrorists
124
Overview of the Events of September 11
124
Political and Historical Context
124
The Attacks
129
Overview of the Law Enforcement Response and Analysis
139
The Law Enforcement Response
139
Analysis
141
Conclusion
152
References
153
8 Aviation Security in the Face of Tragedy
158
Introduction
158
Relevant Aviation Security Prior to the Bombingof Pan Am Flight 103
159
Events Leading Up to the Bombing
160
Political Context
160
Intelligence Reports and Warnings
161
The Bombing of Pan Am Flight 103
162
The Response
163
Fire Department Response
163
Military Response
163
Police Response
163
International Investigative Response
164
Intelligence Response
165
The Investigation
165
Diplomatic Response
166
Analysis
167
Conclusions
172
References
173
9 Maritime Security: Case Studies in Terrorism
174
Introduction
174
The Attack on USS Cole
175
Legal Steps for Law Enforcement Cooperation
183
The Evolving Threat
186
The Adequate (Inadequate?) Response
189
Assessing the Proper Response
194
Conclusions
197
References
199
10 Rail Transport Security
204
Introduction
204
Overview of March 11, 2004, Madrid Railway Attack
205
The Attack
205
The Investigation of the March 11 Attacks
206
Islam and Spain
208
Response to March 11 Attack in Madrid
209
Political Ramifications of the March 11 Attacks
209
Overview of August 10, 2001, Angola Railway Attack
210
History of the Angolan Conflict
211
Reactions to the Angola Attack
213
Impact on the Angola Conflict
214
Overview and Analysis of Rail Security
215
Law Enforcement and Emergency Response
217
Conclusion
217
References
218
11 Securing the Gold: Olympic Security from a Counter-Terrorist Perspective
220
Introduction
220
Attacking During the Olympic Games
221
The Failed Response
223
Securing the Games Post the Munich Attack
224
Analyzing the Olympic Games Threat
226
Counter Measures
229
Conclusion
231
References
232
12 1995 Tokyo Subway Attack: The Aum Shinrikyo Case
234
Introduction
234
Description of the Attack
235
Description of the 1995 Tokyo Subway Attack
235
The Characteristics of the Attack
235
Aum Shinrikyo's Rationalization Regarding the Attack
236
The Background of the Terrorists and Their Leader
237
The Aum Shinrikyo
237
Shoko Asahara – His Personality and Leadership
237
The Path to Become a Terrorists Group
238
Analysis of the Law Enforcement Response
239
The Response to the Attack and Its Problems
239
Arrest of the Terrorists and the Compensation of the Victims
240
Lessons Learned from the Tokyo and Other Subway Attacks
240
The Development of the Subway Attack Protection/Response Policy
242
The Need for a Contingency Plan Against Subway Attacks
242
Recommendation for the Future
243
Protection Physical Subways and Stations from the Attack
243
Recommendation for Law Enforcement Agencies and First Responders
243
Subway Passengers and Citizens
244
The Oversight over the Dangerous Religious Groups
244
Conclusion
245
References
245
13 2005 London Bombings
247
Introduction
247
Overview of the Threat
248
The Threat from Islamic Fundamentalism and Al-Qaeda
248
Vulnerability of Railway Targets
250
Overview of the Events on July 7, 2005
250
Timeline of the Events
251
Overview of the Events on July 21, 2005
252
Overview of the Law Enforcement Response and Analysis
254
Investigation of the 7/7 Attacks
254
Overview of 7/7 Bombers
257
Investigation of 7/21 Attacks
258
Conclusion
260
References
260
14 Reforming Power Structures: Russian Counter-Terrorism Response to Beslan
263
Introduction The Beslan Incident
263
The Law Enforcement Response to Counter Terrorist Activities
265
The System Prior to the Beslan Incident
266
Changes in the System of Interdepartmental Coordinationand Information Exchange
268
Information Exchange with Other Countries Special Services
269
Coordination Center and Information Exchange in North Caucasus
269
Defense Department's Army Reassignments
270
Coordination in Case of Hostage Captures and Subversive Terrorist Attack
271
Changes in the System of Obtaining Intelligence on Terrorist Acts
273
Tactics of the Special Division After the Beslan Incident
274
Main Intelligence Directorate (GRU)
275
Tactics Involving Capture of Terrorists' Relatives Tactics
277
Establishment of New Divisions
278
The MVD Internal Troops
278
Federal Security Service
279
Conclusion
280
Appendix: MI5 organization chart
282
References
283
15 Beirut 1983: Have We Learned This Lesson?
285
Introduction
285
Lessons Learned or to Be Learned?
285
The Failure of Intelligence
288
The Rules of Engagement
290
The Chain of Command
292
A Changed Mission
293
Conclusions
294
References
296
16 Lost in Transition: Khobar Towers and the Ambiguities of Terrorism in the 1990s
297
Introduction
297
Islamist Extremism in Saudi Arabia
298
The Khobar Towers Plot
301
Investigations and Responses
304
The FBI Investigation: A Byzantine Case
304
Investigating Force Protection: Organizational Learningor Witch-hunt?
310
Conclusions: Khobar Towers in Context
313
References
318
17 The Siege in Mumbai: A Conventional Terrorist Attack Aided by Modern Technology
322
Introduction
322
Colonial Influences in South Asia
323
The Formation of India, Pakistan, and Jammu and Kashmir
323
A History of Terrorism in Pakistan and India
325
Lashkar-e-Taiba
327
Attacks by Lashkar-e-Taiba Prior to November 2008
328
Pakistans Directorate of Inter-Services Intelligence (ISI)
328
The Mumbai Massacre
330
The Operation
332
First Group
333
Second Group
335
Third Group
337
Fourth Group
339
The Aftermath
340
Attacks Used Conventional Weapons but Modern Technology
341
Target Selection
342
Mumbai Police Response
344
Lessons Learned
345
Conclusion
350
References
351
18 Conclusions -- A New Understanding of Counter-Terrorist/ism Response
354
Introduction
354
Risk Management
355
Building an Intelligence File
356
Step I
356
Step II. Creating an Intel File
358
Create Links (A)
358
Create a Backup System
358
Create Security Access System
359
Create Links (B)
359
Develop Personal Relationship
359
Crisis Preparation
359
References
362
Index
363