Antiterrorist initiatives

書誌事項

Antiterrorist initiatives

John B. Wolf

(Criminal justice and public safety)

Plenum Press, c1989

大学図書館所蔵 件 / 3

この図書・雑誌をさがす

注記

Bibliography: p. 205-207

Includes index

内容説明・目次

内容説明

Traditionally, terrorist bands operating in rural or urban areas use vio- lence to cast themselves as a legitimate political force. Necklacing, plac- ing an oil-soaked tire around the neck of an informer and then igniting it, and knee-capping, positioning a handgun behind the kneecap of a "tout" (a police informer) and then squeezing the trigger, are among the enforcement methods used by clandestine groups to administer "revo- lutionary justice." Necklacing is used by the African National Con- gress (A.N.C.). Knee-capping is a traditional Irish Republican Army (I. R. A.) tactic. Governments frequently lend credibility to the terrorists' claim of legitimacy by not implementing measures intended to extirpate them. Frequently, democratic societies fear that rigid control measures pose a threat to civil liberties. Reluctant to move, a democracy is often ham- strung by terrorists bent on manipulating its values. A media campaign, intended to mobilize public opinion against the terrorists and garner mass support for the government and its control measures, is the linchpin of any antiterrorist campaign. Centralized intelligence-gathering is another essential component. Terrorism, when it becomes a regular campaign of bombings and other atrocities, is no longer a problem for just the police and the army. The entire society is affected. For example, all groups comprising the multi ethnic popu- vii viii PREFACE tion of Sri Lanka and South Africa are presently exposed to the terror- ist threat.

目次

I: Essence and Manifestations.- 1 * The Deadly Masquerade: Is Political Assassination an Intelligence Task?.- "Executive Action".- Assassinations: Soviet-Style.- The Propaganda Coverup.- The Soviet Committee for State Security (K.G.B.).- The Murder of Richard S. Welch.- The C.I.A. and Political Assassination.- Special Operations in Fiction and in Fact.- Controlling Special Operations.- Philosophical and Moral Considerations.- Reagan's Executive Order.- Proactive Antiterrorist Policy.- The Case for "Active Measures".- Notes.- 2 * State-Directed Terrorist Squads: A New Dimension in Warfare.- Attempted Assassination of the Pope.- Surrogate Warfare.- Armenian Terrorist Organizations and Operations.- Libyan Clandestine Operations.- The Croatian National Resistance.- Suriname and the Libyans.- Iranian-Sponsored Terrorism.- Aspects of Hispanic-Contrived Terrorism in the Americas.- Notes.- 3 * Propaganda: Activities and Analysis.- Elements of Propaganda.- Analyzing Press Releases.- Attempt to Destabilize Ecuador.- Guevara's "Lost" Diaries an Upset for Bolivians.- Use of Disinformation in India.- Soviet Disinformation Techniques.- The Panamanian Link to American Disinformation.- Collapse of the Public Safety Program.- Notes.- 4 * Antiterrorist Intelligence.- Bombings in Beirut.- Antiterrorist Legislation.- Controlling Terrorism in the United States.- Technical Means for Collecting Intelligence.- Intelligence Support Activity.- Restrictions on Intelligence Gathering.- Electronic Surveillance and Videotapes.- The Vice-President's Task Force on Combatting Terrorism.- Approaches to Antiterrorism.- Notes.- 5 * Antiterrorist Military Units: Organization and Operations.- The American Delta Force.- Managing the Delta Force.- Sound Intelligence Needed for Raids.- American Activities in the Middle East.- Positioning Strike Forces.- Preparing for a Raid.- The Delta Team's Exploits.- Upgrading the American Antiterrorists.- Success in the Persian Gulf.- American Moves in the Eastern Mediterranean.- Israel's Antiterrorist Strategy.- Soviet Spetsnaz: Organization and Operations.- Notes.- 6 * Clandestine Channels and Networks.- "Narco-terrorism".- Mayombero Bandidos from Mariel.- Santeria (Saint Worship).- Nicaragua and Weapons Traffic.- I.R.A. Weapons Channels.- Operation Shamrock.- Irish Northern Aid Committee.- The American-Made "Stinger" Missile.- Notes.- II: Applications.- 7 * Antiterrorism in Northern Ireland.- I.R.A.: Organization and Operations.- Attacks on the Judiciary.- Use of Explosives.- Attacks on the Royal Ulster Constabulary.- Ambush Tactics.- British Military Operations.- The Royal Marines.- The Garda.- The Ulster Volunteer Force.- Professionalism of the Police.- Staking Out the Terrorists.- Special Air Services.- Informant Development and Control.- Policy Guidelines.- Emergency Legislation.- Political Prisoner Status.- Antiterrorism Courts.- Hanging.- Torture.- House Searches.- Arrest Procedures.- Informant Development.- Extradition.- Reform of the Police and the Army.- Conclusion.- Notes.- 8 * Terrorism in the Pacific Regions.- Liberation Theology.- Nicaraguan Clergy.- Latin American Clerics.- Vatican Analysis.- Base Communities.- The Aquino/Sin Alliance.- Aquino's Move to Isolate the People from the Communists.- The Unseen General.- Contest for the Barangays.- The Sparrow Teams.- The "Reform the Armed Forces" Movement.- Role of General Ramos.- The New People's Army (N.P.A.).- Paramilitary Village Organizations.- American Bases in the Philippines.- Libya's Role in the Southwest Pacific.- Insurgency on New Caledonia.- Sri Lanka Inflamed.- Sri Lanka's Strategic Position.- Ethnic Discord: Tamils versus Sinhalese.- Upgrading Sri Lanka's Antiterrorist Capability.- Conclusion.- Notes.- 9 * Covert Cuban Intelligence Operations in the Americas.- Cuba's Role in the Narcotics Trade.- Revelations from Informers.- Terrorism in Peru.- Cuba's Role in Central American Revolutions.- Cuban Involvement in Nicaragua.- Cuban Strategy in Central America.- Cuba's Links to Puerto Rican Independista Factions.- Ambush near Sabana Seca.- A Possible Cuban Link and Ghosts.- Destruction of Military Aircraft at the Muniz Airbase.- Role of Armed Propaganda.- The D.G.I. and the "Dialogue".- C.I.A. Networks in Cuba.- Notes.- 10 * Upgrading the American Antiterrorist Capability.- Beirut Bombings.- Attacks in Greece.- Ideology of the Arab Terrorists.- The United States Embassy Network.- Security Guard Battalion.- Avoiding "the Honey Trap".- Training for Embassy Guards.- Monitoring the Terrorist Threat.- Safeguarding Information.- Communications Security.- Electronic Emanations.- Delta Force: Its Operational and Technical Deficiencies.- Upgrading Special Operations.- Small Nations with Powerful Weapons.- Reagan's Hardline: "Go to the Source".- Intelligence Shortfall.- Congressional Recommendations.- Covert Action.- Intelligence Leaks.- Intelligence Shortcomings.- Exile Organizations.- Resupply from the Sea.- Conclusion.- Notes.- 11 * The Antiterrorist Analyst.- Ground Truth.- Truthful Analysis.- Covert Collection.- Targeting of American Embassy in Togo.- The Antiterrorist Analyst.- Antiterrorist Intelligence and Counterintelligence.- The Collection Process.- Press Criticism of American Intelligence Operations.- Earth-Satellite Collection.- The C.I.A.'s Performance.- Target Analysis.- Coyuntura Assessment.- Goals and Objectives.- Notes.- Selected Bibliography.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

ページトップへ