Professional Documents
Culture Documents
In
Response
To
Terrorism
By
Randy Gonzalez
Contents
Chapter 1 - Introduction and Overview Page 1
Throughout the country and around the globe, both the media and the
government have various notions and definitions as to what defines the term
“terrorism”. Some have said that terrorism is a form of “warfare” used by
those who cannot afford an army or traditional military action of a
nationalistic nature. Or, that it is the “poor man’s” method of fighting an
oppressive government. Others have said that “terrorism” is more
economical for those opposing an existing government, and trying to bring
about some kind of political change. These are fanciful notions fostered by
naïve and sympathetic representatives of the media. Terrorism is criminal
political violence that intends to destabilize a government, in order to
promote a cause. It uses violence through various criminal acts to raise the
level of fear among those who may affect governmental decision-making.
Definitions
FBI – The unlawful use of force against persons or property to
intimidate or coerce a government, the civilian population, or any
segment thereof, in the furtherance of political or social objectives.
Domestic Terrorism - involving groups or individuals whose terroristic
activities are directed at elements of our government or population
without foreign direction.
International Terrorism - involves groups or individuals whose terrorist
activities are foreign-based and/or directed by countries or groups
outside the United States or whose activities transcend national
boundaries.
To say, “one man’s terrorist is another man’s freedom fighter” distorts the
real and sinister picture of terrorism. In the real world, perfect distinctions
and definitions often blur in the realty of human cruelty and degradation.
The many “experts” in the field of terrorism have contrived many definitions
of terrorism. In many cases, these efforts have led to the difficulty not only
in understanding it, but also in combating it as well. Terrorism is criminal
behavior and should not be associated with some fanciful notion connected
to liberating a country from oppression. It is a brutal form of expression that
includes non-combatants as easy target of prey. In the harsh reality of
human actions, terrorism remains a deliberate act of aggression and hostility
toward others which includes harming the “civilian” population in general.
It is murder and aggravated battery, along with other criminal acts, designed
to intimidate and otherwise frighten various population groups for mainly
political purposes. Acts of terrorism must be separated from other types of
politically motivated activities, such as guerrilla warfare and insurrection.
Guerrilla warfare is generally concerned with attacking military targets and
political officials in order to bring about a governmental change within a
particular country.
Terrorism Includes
Attitudes and forms expression do not normally reflect the potential for
terrorist incidents. People can have opinions no matter how strange they are.
They can deviate from “mainstream” belief systems and carry on with a
variety of viewpoints. Yet, extreme belief systems should not be ignored
and should be part of the information gathering process of effective law
enforcement action. When the attitudes and opinions transcend the bridge
between thought and action, then attention should be given to that which
violates the law.
Threats of violence arise from feelings or ideas that range from the mean-
spirited to the messianic. Sometimes a threat is backed by the will and
capacity to do harm; at other times, a voiced threat may amount to nothing
but emotional “venting”. However, violent acts can be committed when
no prior threat has been uttered. For law enforcement and security
officers, recognize the differences between “making” and “posing” a threat
is crucially important.
Perpetrators of violence often have a traceable history of problems,
conflicts, disputes, and failures. Violent behavior may be triggered by
these individuals’ perception that it provides a means to rectify or avenge
an injustice or wrongdoing. Targeted violence can be premeditated or
opportunistic when a situation arises that facilitates or permits the violence
or does not prevent it from occurring.
(6)
10
Through cover means, the patrol officer can gather additional data in his or
her research of actual and potential criminal threats within the community.
Finding clues to criminal activity or conspiracies may come in bits and
pieces, before the whole picture falls into place. In actuality, it may be akin
to the pieces of a puzzle that may be large or small. Developing information
sources and networks of contacts is an important part of the goals and
objectives of the patrol officer. Overt methods of information gathering
begin the process of data collection. When it becomes necessary to fit the
pieces together, then covert methods may be called for in a given situation.
The two interrelated aspects may be ongoing functions that compliment each
other in an intelligently shared analytical process. The sharing process
includes a continuum of activity that bridges interaction between squads and
patrol shifts, beat assignments, organizational divisions and units, patrol,
court and corrections operations, and interagency cooperation. Correctional
operations, for example, is one element that should not be overlooked in
particular. Corrections officers are in a particularly good position to develop
information sources that could assist patrol operations. Each day, they come
into contact with a variety of people. These people are incarcerated for one
reason or another. The potential for gathering important intelligence
information is always present. Such activities should be an essential part of
the law enforcement information and threat assessment process.
Essential Elements
Command, control and communications
Planning, analysis, simulation and operational procedures
Resources, logistics, and supply
Research, development and equipment
Threat assessment, intelligence and security
Allied services, support components
Healthcare, hazardous materials and related resources
Medical, quarantine and health services
18
Threat potential
Physical security – target vulnerability
Target hardening
Preventive patrol operations
Personal security and public safety
Operational security
Tactics, tools and techniques
Technology
Command authority and jurisdiction
Critical incident management
19
The action plan of the organization defines the goals and objectives, the
mission statement, the situation, execution of actions, command and control
mechanisms, and supporting resources and services. This is the continuum
of short and long range public safety planning and implementation. The
continuum in formulating a combat strategy is an ongoing process. It is a
plan that emphasizes mutual aid among local agencies, information sharing,
proactive vigilance as well as combined command, communications and
control systems. The mix is delicate, and many interests are connected to
the process. Too often, this kind of planning is affected by emotionally
influenced interests that include personal fear factors for some, and political
or career enhancement potential for others. This typically occurs after a
major incident has taken place. Emotions and feelings run high and may
tend to cloud rational thinking when planning a response. Such influences
must be controlled and balanced with calm directed rationality. Reason must
prevail in the overall effort to implement “combat” efforts or
countermeasures. This is where effective and efficient patrol operations are
essential. Patrol is the backbone of law enforcement, and thereby
contributes to the ongoing analysis of community safety and security needs.
And, this includes the gathering of intelligence information in order to make
well-calculated threat assessments.
The urban focus of terrorism places a significant burden upon local public
safety and security resources. Strong effective working relationships among
local agencies are essential in order to formulate strategies for combating
terrorism. The police and fire services, in particular, in any given local area,
should have a plan for unifying the communications system. To this,
consideration must be given to an interrelated command structure, whereby
command, control and communications can be maximized in an emergency
situation. The cooperative structure should also support the prevention and
planning process of public safety and security services. Every effort should
be made to ensure that the action plan does not become cumbersome,
confusing and inflexible. Instead, standard operating procedures for dealing
with terrorism should be uncomplicated, innovative and adaptive to local
needs and issues.
The public needs to understand that these are dangerous times and the
world is not an entirely safe place to live. An ongoing public
information and education program accomplishes this. Law
enforcement has a responsibility for the short and long range planning,
education and development of proactive public safety
countermeasures. Efforts must be designed to deal with the serious
realities of extreme criminal behavior. Measures to combat terrorism
cannot be accomplished by public safety personnel alone. The public
must play an important role in supporting and helping their local
public safety agencies. Primarily, this support comes in the form of
sufficient funding to get the tasks done effectively. In addition,
support also means active involvement by concerned citizens in the
protection of their community. Among other things, vigilance and
awareness are essential. From the home to the office, to the
playground, citizens should be alert to signs of unusual or suspicious
behavior and actions.
24
Over the past several decades, the scope and intensity of terrorist activity
throughout the world has transitioned from small-scale operations to full-
scale actions. Groups most likely to inflict mass destruction tend to be
extreme in their views, educated and well funded. Their actions include the
escalation of tactics and techniques, which employ weapons of mass
destruction. Both cult groups, as well as religious extremist groups, appear
to have the inclination to deploy extreme measures in pursuit of their ‘end-
times’ apocalyptic thinking. The tendency exists that the ‘fundamentalist
cultic mindset’ perceives the use of mass destruction weapons as necessary
to defeat an evil empire’. The intent is to inflict mass casualties on the
population, strike fear in the minds of the citizenry and make the
government look impotent. Thinking that runs along these lines may see the
world in very simplistic terms. Everything and everyone are reduced to a
basic formula. That is, the group may believe the end of the world is
coming, and it is up to them to fight back – “us against them”. The group is
right and everyone outside the group is wrong, regardless of the truth or
reality. Sometimes, the thinking focuses on the mysterious always-active
entity known as “they” or “them”. Many times, “they” is the government.
Or, “they” could be a particular race, ethnicity or other belief system.
Extreme political or religious belief systems have fostered some of the most
dangerous terrorist in the world. Such continues to be a significant trend for
some groups. God, unfortunately and contrary to the truth, can be used to
justify some of the most heinous acts of criminal behavior in history. To
deploy such weapons as biological, chemical, nuclear, etc, requires
organization, funding, training and so forth.
27
Among both right and left wing groups, as well as the issue focused
organizations, there may be a variety of belief systems and political
ideologies. Belief systems range from extreme worldviews that are left and
right of political and religious interests, to ethnic and nationalistic
conceptions of societal reform. Regardless of the professed ideologies,
terrorist acts by any such group represent criminal behavior. Law
enforcement efforts must be vigilant, aggressive and well defined. Obvious
targets at the local community level should be given special considerations.
Communications systems, airports and transportation services, public service
agencies and infrastructure, health care providers, financial and business
interests, research complexes, utilities, energy and power source supplies,
land and conservation management areas, etc, should receive scrutiny in
terms of security countermeasures. Education, training and information
sharing are important. It is therefore critical that all agencies and the local
level work closely together with regard to this issue.
Weapons Continued
Bombings are typical of the types of weapons that terrorists use to attack
their targets. Bombs and explosives come in all shapes, size and destructive
capability. The variety of devices employed, the targets selected and the
means of activation include a wide range of possibilities. In addition,
environmental conditions, security, building design and population
characteristics are important to the actions being carried out. Targets may be
specific or they may be general in nature. Some may be highly symbolic,
while others provide intense news coverage. The use of any particular
device is usually preceded by careful study and analysis of the intended
target. Security of the target is also a consideration. In most cases, terrorists
would prefer to escape in the aftermath of the attack. Sometimes escape is
not part of the overall plan of attack. If terrorists target and attack a
shopping center or a popular nightclub, their intention may be raising the
fear factor of the local population. Media attention on such an act brings
about an even greater impact on the community.
Targets
While terrorist groups are tending to operate more and more on a rogue or
independent basis, their tactics to date appear to focus on vehicle bombings,
murder-martyr bombers, and attacking significant business and government
facilities. Fund raising is conducted through a variety of “business” oriented
operations. These include organized crime associations, drug and arms
trafficking, business fronts, donations, community fund raising and a series
of financial connections. Planning, organization and profit continuity
continue to be important to their “networking” operations. Terrorist groups
exploit opportunities wherever they can find them. Exploitation and
corruption of human, corporate and governmental resources continue to be
essential operational capabilities. In some cases, their activities have been
cloaked in such things are religious convictions, class struggle, and cultural
survival. This remains an important aspect of a creative public relations
campaign. In particular, exploitation focuses on the young idealistic,
disadvantaged, and disgruntled members of various cultural environments.
The pseudo-portrayal of their “freedom fighting” efforts covers the reality of
their more sinister hidden agendas. Such media efforts are often effective.
And, with the help of the international news services, terrorist groups are
able to gain public support. Terrorist tactics of disinformation and public
deception seek to conceal their real motives as much as possible. Gaining
public sympathy has worked well, particularly when the target is the U.S.
Some groups, in the meantime, actively seek the procurement of weapons of
mass destruction in order to maximize their targeting capabilities.
40
Terrorist organizations have found uses for new technology such as the
Internet. It has become a source of instant communication to recruit, plan,
organize, raise funds, and so on. As the use of such technology continues,
so does the capability to attack critical infrastructures using cyber-weapons
along the “information highway”. Utilities, communications, transportation
systems and financial networks could be targets.
44
Terrorism serves the political purposes of the terrorists, whose goals are self-
centered, materialistic and criminal in nature. Some groups have attempted
to cloak their tactics in a religious disguise or socio-political context. This
of course gathers widespread media attention and sympathy from some
segments of society, including politicians advancing their own agendas.
Propaganda and public disinformation serves the ends of the terrorists and
helps discredit legitimate opposition. Such efforts mask the reality of their
malevolent intentions. Its capabilities to inflict psychological disruption
have been proved by the events occurring around the globe. Actions by
terrorist groups foster fear and unrest throughout the population groups that
are affected. But, ripple effects from one location span outward to the world
community. Individually and collectively terrorist acts impede political
processes, stifle debate and negotiation, and otherwise provoke
disintegration of civilized efforts. Terrorism also interferes with economic
and social processes, not to mention health care and related efforts to assist
disadvantaged areas of the world. Use of mass casualty weapons has
emerged as a serious threat to the world community. The weapons of mass
destruction arena has been defined in certain governmental sectors to
generally include five areas: biological, nuclear, incendiary, chemical and
explosive.
The overall tactical capabilities of terrorist groups span the spectrum of real-
world possibilities. From biological to nuclear materials, the possibilities
run the full extent of the human imagination. Given the determination of a
particular individual or group, anything is possible. Terrorism represents a
target specific kind of criminal violence. Tactics are planned and executed
with specific outcomes in mind. Terrorist organizations employ goals and
objectives that are designed to meet the requirements of their particular
agenda. Everyone and everything are potential targets for political or
religious reasons. A particular public impact is sought in terms of politics,
economics, psychology, environment and ideology. Terrorism is kind of
militant psychodrama intended to affect a particular mindset. This applies
both in terms of the terrorist in particular, as well as the public in general.
The mass media serves as an excellent conduit to transport impact of an
event to the imagination of the public, and capitalize on fear and
intimidation. This works to the advantage of the terrorists. And, every
citizen should bear in mind, in the real world, everyone is a potential target
of terrorist acts. The greater the fear factor the better the impact of terrorist
actions. Governments cannot protect all of their citizens every single day, in
every situation against every possibility. There are no 100% foolproof
techniques to make us all safe in all aspects of our lives.
The capabilities and intentions of terrorist organizations have become more
pronounced and more extensive in the past few decades. Many groups assert
for one reason or another their animosity for the U.S. government and its
citizens. Whether cultural, psychological or philosophical, terrorists are
dedicated and determined. Like any organizational structure, terrorist
organizations plan, staff and manage calculated tactics to advance their goals
and objectives. They assess and evaluate the gains and losses of their
intended activities. Their antisocial tendencies manifest into a self-centered
preoccupation with having the world conform to them. They will use their
cultural aspects to shape values and beliefs to fit their particular inclinations
and achieve their goals and objectives. In modern times, their capabilities
have expanded significantly. Given their desire to accomplish their goals,
they exploit opportunities that exist in urban society and carry out their
ability to execute operations. Make no mistake terrorists pose a serious
threat to the world community. Along with the desire to make an impact,
target selection and weaponry have become an important part of the terrorist
mission. Each time an attack is carried out, a message is sent to the local
setting, the surrounding neighborhoods and to the world community.
49
World citizens cannot expect their law enforcement and military services to
protect them in every possible aspect of their lives. Governmental protective
services do what they can in terms of planning, preparation and prevention
of terrorist incidents. Each person must take responsibility for his or her own
safety and security. Citizens, as with any other aspect of crime prevention,
must be vigilant, practice good security tactics, train and otherwise become
educated in personal safety strategies.
Consider for a moment how these factors affect the destructive power of
biological agents. Some agents cause symptoms in humans that are not
life threatening; others cause death in virtually every case. Obviously, the
type of agent (or product) has a significant impact on its destructive
capabilities. An agent contained in a compacted explosive device will
disperse in a manner different from that of an agent contained in an aerosol
dispersal device. In many cases the effects of a detonation – particularly
the heat generated by the explosive device – will destroy a biological
agent. Destruction is less likely to occur from the effects of an aerosol
dispersal device. The environment can also have a significant impact on
the effectiveness of biological agents. For example, many agents are
sensitive to light, oxygen or other components of the environment. An
agent sensitive to ultraviolet light may be destroyed when introduced in
daylight in an outdoor area.
(25)
51
Basic
Selected Definitions
Skin injection
Ingestion
Inhalation
Absorption – Skin contact
Chemical and biological materials can find
routes into the body via inhalation and
ingestion. Never agents can follow a route
through the skin by being absorbed. Blister
agents, on the other hand, can be inhaled,
ingested and destroy the skin. Radioactive
materials act in a similar manner.
54
Anthrax – is a bacteria that tends to have a very light color and finds a
route through open wounds, cuts on the skin, ingestion and inhalation.
It is an acute disease, which causes fever, chest discomfort, fatigue and
coughing. With an incubation period of about 7 days, it is considered of
high lethality, especially when inhaled. Dissemination is generally
considered by way of spores in aerosol spray. And, contamination
through transmission generally is possible by direct skin contact. Black
lesions may occur after a period of intense itching when exposure
occurs by direct skin contact.
Plague – is a bacterium that is sometimes called the “black plague”.
Symptoms may be coughing with bloody sputum, fever, swollen lymph
glands, and later, dead tissue in the lymph nodes. This is highly
contagious and kills people very quickly. Fleas often carry the disease
and transmit it to humans when biting the skin. Routes of infection
occur from the respiratory system and injection. Transmission is
considered extremely high in terms of passing the disease onto other
humans. The incubation period runs from 1 to 6 days, and considered
to be lethal, unless immediately treated.
(28)
56
(32)
59
Ricin – This toxin is derived from castor beans. The runoff water from
the preparation process of developing castor oil has up to 5% ricin in its
contents. About 1 milligram (1/1000 of a gram) can cause the death of
one person, by way of inhalation, injection or ingestion. Its rate of
action is about 1 to 2 hours. Exposure results in coughing, chest
tightness, breathing problems nausea and muscle aches. Inhalation of
Ricin causes tissue death resulting in injury to the airway. Transmission
from person to person does not occur.
Biological Warfare
Development of biological weapons involves selection criteria, along with
various stages of production and final completion of weaponized
components. Beginning with the process of selecting an organism, the
productive stages involve the development of larger quantities from small
cultures. Completion of the project requires stabilization of the developed
organism for use as a weapons system. Biotechnology in the past quarter of
a century has greatly increased the capabilities of bio weapons in the arsenal
of modern warfare. Both quality and quantity of materials have a significant
impact in terms of the threat against military forces and civilian populations.
Technology has enhanced delivery systems, targeting, productive capacity
as well as transition of non-pathogenic strains into more potent pathogenic
organisms. The later is the result of genetic manipulation. (39)
66
(40)
67
While U.S. government facilities take precautions to ensure against the loss
of nuclear materials and technology, several countries do not adequate
precautions. From South Africa to the former Soviet Union, there are
reports that nuclear materials have been stolen or otherwise unaccounted for
from storage areas. In addition to losses and theft of such materials, there
are several countries actively engaged in the acquisition of nuclear materials.
Along with the procurement of nuclear materials, certain countries desire to
develop a nuclear capability that could be hostile to the interests of the
United States. An attack using a nuclear device against U.S. military targets,
or within the U.S., is a serious concern within the intelligence community.
Possible Targets
A Large City
Amusement Park – Entertainment Complex
Sports Arena or Stadium
Significant Transportation Terminal
Major University
Nuclear Reactor Production Facility
There are over 100 “suitcase bombs” missing from the Soviet nuclear
inventory. The former head of Soviet National Security, Alexander Lebed
testified to that fact before Congress. He stated that the devices measure
approximately 24” x 16” x 8” and can be set off by an individual in less than
30 minutes, producing a 1 kilo ton yield. Such a device, set off in New York
Harbor would produce a 15 to 20 foot wave that would destroy New York
City. Other sources have confirmed that the number of suitcase bombs
missing from the Soviet inventory is correct. (43)
70
We must keep mind the impact of radiation on the human body. There are
short term and long-term affects that cause changes in the bodies cells. On
the lower level, we experience radiation every day in small amounts.
Generally, the body has defenses that repair changes that take place.
Radiation is all around us in many aspects of our daily lives.
71
(46)
72
(47)
Alpha particles do not go very far from their source. They are short range in
nature and travel only a couple of inches in air. With a large mass, they
deliver a sizeable amount of energy in a short distance. Alpha particles travel
only a few inches. Things like paper and a layer of skin can shield against
Alpha particles. Due to this configuration, they can cause internal injury if
inhaled or ingested. This kind of radiation generally comes from plutonium
and uranium. By contrast, Beta particles are smaller in terms of their mass.
Their range is somewhat limited up to several feet. Beta particles also
present an internal hazard, as well as an external threat to the eyes and skin
areas. Beta radiation is generally found in fission products and tritium.
Gamma radiation, on the other hand, is referred to as an electromagnetic
wave or photon. Gamma radiation is like x-rays and travels hundreds of
feet. Without mass or electrical charge, it is capable of penetrating other
solid objects. This would include the human body. Gamma radiation causes
both internal and external damage to the whole body of a person. Shielding
can only be afforded by use of concrete, steel or lead. This type of radiation
is found in fission products, cobalt, iridium and x-rays equipment. Terrorists
may have the capability to deliver “dirty bombs” containing hazardous
radioactive materials. At least three possibilities exist. These include:
activation of an atomic weapon; dispersal using nuclear materials and
conventional explosives; and exploding a large amount of conventional
explosives next to a facility containing nuclear materials. (48)
73
General Information
Triggering Methodology
First Classification of Incendiaries
Delivery Methodology
Second Classification of Incendiaries
(51)
76
Firecracker fuse
Fireworks materials
Highway flares
Gasoline and other fuel sources
Light bulbs
Glass containers
Old wine or liquor bottles
Various electrical components
Chemical products used around the home
Gas cylinders from cooking grills
Aircraft used as incendiary bomb
Fill materials such as nails and metal debris
Household chemicals
77
Chemical Weapons
Manufacture is easy
Materials are readily available
Development costs are low
Dispersal is aided by building design and environment
Victim injury is immediate
Expensive for first responders – decontamination – resources
Fear factor is significant
Capabilities have increased with technology
Never agents
Blister agents
Choking agents
Blood agents
Irritants
78
In addition to the major categories indicated for chemical agents (e.g. nerve,
blister, choking, etc.), these substances can be assigned as a type that is
either “persistent” or “non-persistent”. If an agent is “persistent”, it is
considered to be one that remains in the target location for a long period of
time. Following delivery of the agent, it may stay in the target of r hours,
days and even weeks. Dangers stem from vapor and liquid presence of the
chemical. If an agent is characterized as being “non-persistent”, then it is
considered to be of short duration in the target area. Dangers persist from
chemical vapors that may linger from minutes to hours in the area of attack.
Chemicals such as Tabun, Sarin and Soman tend to be volatile and persistent
agents that have a rapid rate of action. Their route of entry to the human
body is typically by way of the respiratory system or the skin. These three,
for example, are typically considered to be semi-persistent in nature. The
VX chemical, by comparison, is considered to be a persistent agent with a
rapid rate of action. Symptoms of their affects include: headache, runny
nose, salivation, pinpointing of the pupils, problems with breathing, seizures
and convulsions.
79
Nerve Agents
Nerve agents include such substances as Tabun (GA-1936), Soman
(GD-1944), Sarin (GB-1938) and V Agent (VX-1952). The liquid
vapors of these substance cause illnesses in humans. The letters in
parenthesis indicates military designated letters of abbreviation, along
with date of development. For example, the “G” makes reference to
German development, while the next letter refers to the scientist
mainly responsible for its creation. With regard to the “V”, it refers to
venom, while the “X” refers to a chemical series. This group of
chemicals represents some of the most dangerous and toxic chemicals
developed. Their route of entry into the human body is by skin
absorption, inhalation, ingestion and injection. Nerve agents are
related to substances called “organophosphorus pesticides”.
Organophosphorus pesticides are used in the agricultural industry.
Many kinds of pesticides are used in food production. During the 19th
century, such pesticides were produced to control insects, rodents and
other animals that affected farming and food production. The more
potent substances eventually were processed into nerve agents. These
substances affect the human nervous system and inhibit the ability of
“cholinesterase” (enzyme) to properly control the neurotransmitter
“acetylcholine”. With this malfunction, nerve impulses cannot be
properly transmitter to muscle or other nerve cells. As such, over
stimulation of the nerves and muscles occur and subsequently cause
weakness or paralysis of the muscles. Convulsions and uncontrolled
muscle reactions result from the affects of the never agent. In the
victim, it becomes very pronounced and significant that they display
pinpoint pupils, runny nose, problems in breathing, unconsciousness,
seizures and vomiting. Exposure to such chemical generally is the
result of airborne vapors. Other exposure possibilities include liquid
contact with the skin, resulting in absorption. And, while the “G”
chemicals may evaporate at about the same rate as water (1 to 2 days),
the “V” series may last longer. The “V” agents have been known to
linger for days and up to months within the target area.
(56)
80
Blister Agents
Blood Agents
When talking about Blood Agents, cyanide comes to mind. Once they are
transformed into weapons grade chemicals, they are used in vapor form.
Yet, cyanides are also produced in other forms such as powders and liquids.
Human exposure can occur through either contact with liquid or vapor
substances. It is often suggested that their existence, even though colorless,
smells something on the order of burned almonds. Once human exposure
occurs, respiratory arrest can take place very rapidly. They are generally
non-persistent in nature. The chemical action works to block the transfer of
oxygen among the cells and organs via the blood system of the body.
Routes of entry are typically through the respiratory tract. Bodily functions
become greatly affected by the oxygen interruption that occurs. Common
blood agents include: Hydrogen Cyanide and Cyanogen Chloride. Again,
access to bodily tissue takes place through inhalation, absorption, ingestion
and injection. Symptoms of exposure include: increased respirations,
dizziness, cardiac difficulties and so forth.
Characteristics:
Non-Persistent in nature
Rapid rate of action
Route of entry via inhalation, skin, eyes
Smell of burned almonds
Common Names:
Hydrogen Cyanide
Cyanogen Chloride
Arsine
(57)
84
Choking Agents
Choking Agents
Irritants
Irritants are on the low end of the spectrum in terms of injury. These agents
generally refer to those chemicals that are found in military and law
enforcement crowd control applications. Skin absorption and inhalation are
the usual routes of exposure for people. The irritants include: tear gas, mace
and the so-called pepper spray.
Law enforcement, as well as the military services, have used these types of
chemical agents for quite some type. Typically, they are deployed in a
number of confrontational situations. Police officers use these tools to
enhance enforcement capabilities in dealing with persons who resist lawful
authority, or otherwise commit criminal incidents. In this regard, chemical
agents have proved to be essential to the law enforcement function of
providing public safety and security. Additionally, the chemicals have
greatly assisted police personnel in controlling potentially dangerous
situations.
Chemical agents have been used by the police to subdue criminal and
riotous individuals or groups for many years. The police of Paris are
credited with the modern development of the concept in the year 1912
when “hand bombs” filled with an early tear gas were used to
incapacitate gangs of criminals that were presenting a serious threat to
life and property in the French capital. From this law enforcement
origin grew the subsequent development of military chemical warfare
which began with tear gas and quickly escalated to the dreaded lethal
and disabling gases of World War I and the modern era.
(59)
For police and military applications, the world over, the irritant chemicals
have been effective in controlling uncooperative people. The irritants remain
an essential tool in the array of equipment needed by law enforcement to
ensure order maintenance and peace keeping responsibilities. OC spray, for
example, has been proved effective even on persons under the influence of
alcohol or illegal drugs. And, its popularity has grown significantly over the
last ten years. Exposure routes generally follow that of other chemical
weapons, including inhalation and skin absorption. By the very nature of
their design, they are intended to cause a certain amount of pain. This
relates to burning sensations and physical discomfort once contact is made
with mucous membranes and the skin. The volatility and persistence of OC
depends upon the surface it is applied. Its rate of action tends to be fast was
exposure is made. Involuntary tearing is typical among the irritant class of
chemical weapons. Likewise, vomiting may sometimes occur with certain
subjects. But, the overall experience of shortness of breath, nose and throat
irritation remains of primary significance in most cases. Irritants are not
considered to be weapons of choice by terrorist groups or individuals.
89
Explosives
In most cases, terrorist groups and individuals have relied on the use of
conventional explosives. Approximately 70% of all incidents defined as
terrorist acts are related to the use of explosives. These devices have a long
history, particularly in regard to warfare. Grenades and other pyrotechnics
date back to very early centuries in ancient China. The word “grenade”, for
example, comes from the Latin word “Granatus”, which referred to a
handheld device used by the Spaniards during the 16th century. The Spanish
military called their explosive device “Granada”, because it resembled the
pomegranate fruit. Such implements of warfare are suggested to have been
used by the Romans around 250 B.C. In the 13th century, with the advent of
gunpowder, historians report that grenades, as well as other explosives were
developed by Western countries. The tactical deployment of such devices is
reported to have taken place during the Crusades. Containers such as glass
globes, jars, kegs and various types of pots were used to fashion grenade-
like explosive devices. Later, in 1677, it is recorded that “rifle-type”
grenades were fashioned from muskets and used in Germany. (62)
When a bomb explodes pressure is released and three major actions occur.
These include blast pressure, fragmentation and thermal effects. Blast
pressure consists of two aspects: positive and negative pressure. With
regard to positive blast pressure, the action of the explosion at “ground
zero”, or the center, causes the pressure to move outward. This action of
moving away from the center causes significant pressure of pounds per
square inch. The pounds per square inch are exerted as the result of the
explosive energy release. The pressure per square inch is in the thousands of
pounds per square inch. This primary blast wave can cause damage to
humans due to the sudden change in air pressure. The shock can tear vital
organs, as well as damage the eardrums. In contrast to the initial action of
the pressure release, a secondary phase occurs. This is referred to as the
negative pressure. In negative pressure, air returns to fill the vacuum created
from the initial blast at the center of the explosion. Fragmentation concerns
those objects that are expelled into the surrounding areas as a result of the
explosion. At high rates of speed, the blast causes deliberate “missile-like”
fragments, contained or attached to the device, to fire in multiple directions.
In addition, parts of surrounding structures may also become fragments of
the explosion. Debris such a wood, glass and concrete can also become
deadly projectiles. These flying projectiles can inflict all kinds of injury
upon the human body. While fragmentation is seen as parts of the device
itself, shrapnel is sometimes added to increase the device’s affect. Nails,
nuts and bolts, ball bearings, and other objects are sometimes used to
enhance the destructiveness of the bomb. When the bomb explodes, heat is
generated. The thermal effects, which may also be incendiary in nature,
vary by nature of the device’s design and components. It is a function of
type of mixture, container and additives (fuels, accelerants, etc.). The fireball
produced at the time of the explosion is representative of the thermal effect.
A bomb is activated by a series of actions that begin with initiation. This
series of events, from initiation to explosion, is referred to as the “firing
train”. The initiation of a bomb can be either by electric or non-electric
means.
Electronic
vs
Non-Electronic
93
Silver azide and lead styphnate are considered highly volatile and sometimes
unstable chemicals. They will readily detonate from heat or shock. Lead
styphnate is sometimes combined with lead azide to enhance its properties of
detonation when electrical ignition is applied. Lead styphnate is very
susceptible to static electricity. This chemical substance is used mainly in
primers for ammunition, and also as a mixture for detonators. RDX and
PETN (pentaerythritol tetranitrate) represent very sensitive high explosive
compounds. RDX, sometimes called “cyclonite”, has the chemical name of
“cyclotrimethylenetrinitramine”. The letters RDX actually stand for “Royal
Demolition explosive”, and originate from Great Britain. RDX is a military
explosive that is often mixed with plasticizers, as well as other explosives in
order to develop various compositions, such as C-4. PETN by comparison
was developed in 1894 in Germany. It is used in detonating cords, which
burns at an extremely high rate of speed. PETN is also found in grenades
and blasting caps. (67)
Explosives
Primary Secondary
Explosives Explosives
Over the years, tons of Semtex have been exported to countries like Libya,
Syria, North Korea, Yugoslavia, Iraq and Iran. Semtex is considered to be
far more powerful than TNT and other traditional types of explosives. In
addition to the composition types of explosives, booster explosives represent
a group of explosive materials involved in the transmission of explosive
force. Booster explosives are designed to be components of the “explosive
train” to transmit and enhance the force and heat of the initiating explosive.
Their function is to ensure the firing sequence works as constructed. The
reliable detonation of the burster charge is crucial to the explosive action.
Water gels are explosive mixtures that contain water, fuel source, an
oxidizer and other components to ensure effective function of the explosive
mixture. Tertiary explosives require well-designed containers and significant
force of action in order to detonate. An explosive device that includes
tertiary explosives as components, may also require the use of primary
explosives so that enough power is generated to cause an explosion.
Examples include substances such as ammonium nitrate and ammonium
perclorate.
Improvised explosive combinations span the spectrum of individual human
creativity. These have included car bombs, pipe bombs and packaged
charges of different configurations. Car bombs (or truck) may employ a
large amount of explosives, and could be remotely activated or set to a time
delay mechanism. While vehicular bombs have been seen in recent years as
a large scale terrorist weapon, pipe bombs are generally the most commonly
used explosive device. In terms of design and explosive potential, pipe
bombs are vastly different from vehicle bombs. Pipe bombs typically are
configured from a length of pipe or tubing, with explosive material pressed
inside. The ends of the pipe are capped off, and some sort of timing device
is attached to either the middle section, or one of the ends of the pipe. It is
similar to a hand grenade or Molotov Cocktail. Remote sensors, fuses,
clocks, motion detectors and so on, can be attached to the pipe bomb, in
order to active the explosive sequence. Another type of low-tech, but
effective homemade explosive is the “backpack” or “satchel charge” device.
This device can be extremely effective, and is usually more powerful than a
hand grenade. The contemporary “backpack” device is related to the old
military expression that was used for a cloth-type pack filled with
explosives. Metal objects, glass and so forth, are sometimes packed around
the explosive material to enhance the damage and injury capabilities.
98
Basic precautions include the careful analysis of all mail received, prior to
opening any pieces. This is especially true if the letter or package was not
expected. Such mail should not be accepted particularly if it is being received in
a foreign location. Staff personnel, as well as family members should refuse
unexpected mail. If, for some reason, the item is suspected to be a bomb, then it
should be treated that way. Indicators include things like excessive postage,
poorly spelled names and common words, wrong title of person addressed to,
oily stains, lack of return address, weight feels heavy, and stiffness of materials
inside. Suspicious packages may also have excessive tape and wrappings
around the contents.
100
Events that include the use of the WMD materials are dangerously
confrontational for first responder personnel. A broader, less defined
perspective is encountered, as terrorists and associated groups become
more creative and more dangerous. These kinds of terrorist tactics
require extreme caution on the part of the criminal justice and public
safety community. Such actions require more intelligence gathering,
more training and increased numbers of law enforcement personnel.
Such possible situations also require a well-informed public that is
better educated in personal safety matters. The criminal justice is
typically used to traditional and more historic kinds of acts. While law
enforcement has become accustomed to dealing with conventional
bomb threats, actual explosive devices, gun incidents and hostage
situations, more sinister dimensions occur when chemicals or bio-
toxins are added to an incident. Add the potential for a nuclear device
and real problems emerge. The psychological aspects can be
devastating for an entire population.
101
Priority Planning
Operational Considerations
Environmental and terrain considerations are not always easy to secure and
protect. The incident scene will change as a result of the WMD incident.
Likewise, depending on the nature of the incident, protecting first responders
from the environmental conditions becomes a high priority. Protective
devices, clothing and support materials will be essential. Given the nature of
American technology and scientific knowledge, critical support resources
are essential to effective tactical responses. Such technology and scientific
capability should be employed to the extent possible. The local
governmental infrastructure may dictate the level of response. Interagency
coordination and cooperation at all levels of government will be important.
Local law enforcement may not have sufficient equipment or protective
clothing to effectively cope with hazardous materials. In addition, there are
limitations as to the extent to which law enforcement can be trained to
respond to WMD incidents. The resources, tools, equipment and time to
train all personnel within a police agency may be limited. Effective
countermeasures must rely on cooperative multi-agency alliances within
significant geographical areas. Basic awareness training is essential for law
enforcement personnel in anticipating danger, gathering street level
intelligence and planning coordinated interdiction. In addition, officers need
to be able to recognize hazardous situations, secure and isolate crime scenes,
activate chain of command structures, coordinate collective responses and
manage people at the scene.
For law enforcement personnel, basic common sense tactics apply to any
incident scene. This is especially true when dealing with WMD incidents. It
is very important that responding officers reduce their exposure to hazards at
a particular scene. Reduction of exposure, in terms of dose, concentration
and time, will be necessary for responding officers to consider. A number of
factors are critical: age, fitness, overall health condition, sensitivity to the
agent present, level of exposure, etc. Some people may be affected
differently than others. An older officer, or a less physically fit officer, may
have a lower level of resistance. A number of factors must be calculated
into the equation of exposure, contamination and dose level. In essence,
exposure refers to how a person is affected once a foreign agent enters the
body. External aspects concern the issue of contamination, which requires
officers to avoid be contaminated as much as possible. Levels of protection
involve the use of protective types of clothing that first responders may
employ. Standard issue police uniforms do not offer a significant degree of
protection at the scenes of hazardous materials.
106
(77)
(78)
109
The types of harm for which first responders must plan, in terms of
protective countermeasures, have been described as six areas of threat.
These have been defined as the aspects of WMD that pose on scene dangers
to the officers responding to the incident. Each type of potential weapons
use presents unique hazards that threaten people. Protective measures
should be considered with regard to the different possibilities that may exist.
Mechanical Hazards – These threats result from pieces of objects that are
destructive to the human body. They include such things as shrapnel and
flying projectiles of various sorts. (79)
Attacks may occur by a single or multiple incident initiative. That is, one
lone terrorist may carry out a “murder-bomb” action, such as blowing
himself or herself up as part of the terrorist cause. Or, he or she may initiate
a situation in which there is threat to smash a vial of alleged anthrax. On the
other hand, a multiple incident scenario might involve several terrorists
carrying out an attack, using decoys, diversions, secondary devices, booby
traps and so forth. Actions may be overt or covert in nature. A public health
crisis may be initiated by the planting of toxins in a restaurant.
110
(80)
113
Mass Decontamination
Before a blast occurs, and following the initial threat, time must be used to
maximum advantage in order to safeguard people and property. Caution
should be exercised in moving people into open areas once a decision is
made to evacuate a structure. The size and type of the device, depending on
what information is known, may determine the distance the shielding
employed to protect people and first responders. Other factors include the
nature of the environment, the layout of buildings and the availability of
other protective structures. Following the blast, additional security
precautions must be employed to protect first responders and others.
115
Caution is important!
Presence at ground zero must be controlled.
Secondary devices and actions may be present.
Incendiaries and other explosives may be present as booby traps.
Use appropriate contamination reduction, decontamination and disposal.
Law enforcement personnel must be given the tools, tactics, training and
techniques to deal with a variety of dangers present in the modern world.
From traditional crime fighting to non-traditional countermeasures, law
enforcement must be capable of meeting all kinds of threats to public safety.
These threats include WMD, Hazmat, cyber crimes, organized crime and
terrorism of one sort or another. Tactical implications for dealing with such
incidents, as well as the typical street crimes, require effective leadership
and planning operations. Recruitment, selection, education and training are
crucial to the tactical implications of law enforcement. Officers must
initially be appropriately trained using a training model that is “real world”
oriented, as opposed to that which is “politically correct”. And, training
models must be developed, designed and implemented by experienced
professionals in the field of law enforcement. Training must subsequently
be translated into action based on good intelligence and investigative
capabilities. Theorists, non-practitioners, “alleged experts” and
inexperienced research “gurus” must be kept at a healthy distance. We must
be alert to the adverse influences of bureaucrats and politicians who are
sometimes persuaded by special interest groups and non-practitioners. Be
wary of people who live in “think tanks”.
In order to anticipate threats, intelligence must be gathered. Investigations
and assessments must be conducted. And, in order to develop good
intelligence, intentions and motives must be postulated. “War gaming” must
be part of the thinking processes, where various scenarios are considered.
Officer survival and safety tactics are essential training and life-style
components. The officer as a “modern warrior” concept is necessary to the
essence of professionalism in a contemporary context. Training should
emphasize that officers be constantly aware and alert to everything in their
operational environment, both on and off duty. Tactical skills must be
instilled to the point of precision. Officers must be constantly perceptive,
observant, vigilant and inquisitive. They must think prevention, suspect
motives and be on guard at every occasion. Officers must know, do and be
proficient tactically and technically. To be effective, they must be
independent thinkers and problem solvers. Officers must study and learn to
outwit the opposition at every turn by knowing as much as possible about
individuals, groups, cultures and inclinations. We must look beyond the
obvious and discern what lurks in the shadows.
118
Officers must practice being aware, astute, watchful and ready to take action
if it is required. We must be wary of our habits, routines and actions that
create opportunities for vulnerability. Hardening the targets, both human
and material must be practiced. Preparation and planning are important to
the development of an effective security posture. First responders should
always practice good security and safety activities. This applies no matter
where you go or what you do. The world is a dangerous place, and, officer
survival tactics apply no matter where you are or what you do. Criminals,
and particularly, the terrorist type, are committed to getting their way and
doing what is necessary to achieve their goals. They study and practice their
criminal career for whatever their personal gain might be. Likewise, officers
must anticipate and plan ahead for the “what ifs” that might take place.
Contingencies must be considered and balanced with good common sense,
training, knowledge and use of effective resources.
119
Basic Tactics #1
Develop and implement a personal safety and security strategy for yourself
and your family. Conduct threat assessments, crime analysis and ensure
ongoing training and education. Do not allow personal information about
you or your family to be printed or published by any means. Keep phone
numbers and addresses confidential.
A personal security plan involves activities that occur both at home, at the
office and when traveling for any reason. Conduct a security analysis of
your home and working environment. Maintain a low profile as much as
possible. Avoid emulating anything you see in the movies or on television
“cop shows”.
Terrorist attacks may occur near the home, at the workplace or enroute to
those destinations. Attention to detail is important in your environment in
terms of activities, layout, terrain, etc. Conduct periodic reviews of
innovations in protective equipment, weapons, tools and tactics.
Basic Tactics #2
Establish a “buddy system” both on and off the job. Let people know
what you are doing, where you are and when you will return. On the job,
the telecommunications system is you lifeline. Always stay in touch with
dispatch communications and report activities in detail, such as traffic
stops, encounters with suspicious persons, places, etc.
Use good common sense in your investigative activities and always use a
backup. Have contingency plans in mind before taking action. Always
plan an escape route, and use communication system effectively.
Have a code system for alerting others, family members, co-workers, etc.,
so that they know when something is happening and possible danger is
present. Signals should be accompanied by appropriate protective action.
Operational Plans
Emergency Response Operations
Command Structures and Mutual Aid Systems
Intelligence and Investigative Resources and Capabilities
Threat Analysis and Assessments
Detection and Monitoring Equipment
Possible Targets and Protective Measures
Leadership, Supervision and Management
Support Services and Health Care Resources
Inter-Agency Coordination and Information Exchange
122
ICS operations cross over into several areas of law. These include federal
regulations, directives and standards. At the state and local level, state laws,
administrative code, ordinances and regulations may also apply to a given
situation. These must work in harmony with federal regulations. In addition
to the legal aspects of dealing with a crisis incident, multi-agency
coordination also involves the process of decision-making. The decision-
making requirements address issues related to what is going to be done, and
who is going to do it. At the agency level, police departments direct the
operations of law enforcement from the standpoint of “standard operating
procedures”, or “general orders”. By contrast, state law and local ordinance
will normally address the public’s behavior, especially in terms of criminal
violations.
Incident management begins from the time the first officer arrives on
the scene. And, in all probability, the first officer on the scene will
be a law enforcement officer. He or she will subsequently set things
in to motion. His or her actions may have a long-term affect on the
overall operations as they develop.
124
(82)
Planning-----Operations-----Logistics-----Administration
Command Authority
Someone has to be in charge. Direction and focus must be ensured.
The command structure is important and delegation is essential.
Establishing command and setting up a command post ensures the
process in put into action. Liaison is also an important part of this
function.
126
On Scene
Commander
Liaison Officer
The on-scene commander should ensure that proper staffing takes place in
order to facilitate the objectives involved with the incident scene. Command
authority will transfer as needed to accommodate the operational
responsibilities of the agencies involved. The agency with the primary
operational responsibilities will most likely serve as the “Incident
Commander”. Depending on the nature of the incident, the primary agency
may prefer to assign the more senior person to take command of the overall
command structure. Under the Incident Commander, the Information
Officer handles relations with the news media. He or she coordinates the
dissemination of information through news releases as appropriate to the
information process. A Liaison Officer is necessary to coordinate contact
with other agencies that may become associated with the incident scene.
The Safety Officer serves in the capacity to monitor the safety conditions at
the incident scene. In this role, he or she also evaluates and oversees the
safety of the first responders. Critical functions include: leadership, ensuring
the protection of life and property, managing and controlling personnel and
resources, supervising accountability, fostering effective liaison, and
maintaining effective communications with the Emergency Operations
Center. When a transfer of command occurs, a full briefing is necessary
from the departing commander to the incoming commander.
(83)
127
(84)
Common Goals
Overall Mutual Objectives
Joint Operational Actions
Managed integrated Administration
Coordination of Resources
Single Authority System
Cooperative Incident Action Plan
Combined Command Post
Shared Cost of Support Services
Realistic Response Incident Situation
Shared Responsibility and Accountability
Coordinated Information Process
Geographic Mutual Aid Interface
Calculated Response to Recovery
129
Tactical Implications
Prevention and Deterrence
(85)
130
(87)
132
Threat assessments must also consider the impact of the various acts of
terrorism. The psychological dimension cannot be overlooked in terms of
impact on the public and personnel. It should be part of the overall planning
process. Analysis of this multidimensional element must be seriously
weighed in light of the goals and objectives for positive prevention and
deterrence.
Local law enforcement planning should consider the extent to which terrorist
groups will use fear in order to destabilize the public’s sense of security.
The media is particularly vulnerable to manipulation by extremist
organizations. Every effort will be made by such groups to play the media
to achieve their objectives. Law enforcement must be ready to counter such
activities by effective implementation of public information strategies.
Careful tactical use of information must be skillfully crafted and deployed in
order to carry out the law enforcement mission. In addition, information
dissemination must be handled in a manner that does not unnecessarily
increase the public’s anxiety, fear level or insecurity. And, by contrast, local
law enforcement cannot afford to allow themselves to be used by the media,
misguided politicians or public opinion where such influence is based upon
irrational fears, psychological manipulation or other aspects of erroneous
information.
133
Law enforcement should pursue a sure and swift posture in developing and
implementing preventive tactical strategies. These efforts should encompass
the analysis of things that are realistic and practical. Common sense is
crucial throughout each aspect of planning and subsequent implementation.
Each step that culminates in action should be well reasoned and balanced
with a focus on developing sensible cost-effective approaches. The ongoing
development of science and technology, as well as forensics and tactics,
supported by aggressive patrol strategies, should underscore the policies and
procedures for preventive actions. Operational actions, reinforced by both
defensive and offensive activities, should be followed by persistent
prosecutorial and punitive measures that are certain and swift in every
aspect. The law enforcement community should take the lead in fostering
emergency management coordination efforts. This involves bringing
together progressive and innovative thinkers to provide an effective planning
framework. Specific needs, resources and support mechanisms should be
identified as early as possible. Mutual assistance and cooperative efforts are
essential in the development of an effective response to acts of terrorism.
This includes elements of the federal government working closely with local
government to ensure public safety and security is at the highest level
possible.
Operational Development
Policies and Procedures – Deployment and Implementation
Local Task Force on Major Incidents
Local Community Inventory of Potential Targets
Operational Guidelines and Command Authority
Tactical Operations – Mutual Aid Policies
Command Post – Evacuation Processes
Information and Intelligence Gathering
Legal Requirements
Patrol and Investigative Operations
Crime Scene Investigations and Evidence Collection
Hostage Rescue Operations & Negotiation Teams
Bomb Threat Policies and Search Procedures
Target Analysis – Threat Assessments
Detection and Early Warning Systems – Equipment
Training and Education
134
(89)
(90)
136
The weapons listed above are sample possibilities of the types of devices
that may be employed by terrorist groups. Terrorist organizations use a
variety of both conventional and non-conventional weaponry. Intelligence,
research and training sources should foster a greater understanding and
awareness for law enforcement personnel regarding the use of such threats.
137
Cyber Tactics
1. “Cyber-Terrorism”, and the day-to-day use of the Internet for a variety of criminal
purposes, presents a range of problems that could potentially be devastating to
business, government and the public. The goals and objectives are to maximize
protection for associated systems and equipment by ensuring high-level
safeguards. Cyber-terrorism is basically criminal activity carried out by criminals
to intimidate, threaten or coerce lawful entities, in the furtherance of their
particular goals, by using computing resources. This realm is inclusive of the
potential threats by both terrorism and industrial espionage. While there are no
foolproof methods of absolute security, there are preventive measures that can
reduce the opportunities for attacks on computing systems.
2. Basically, security countermeasures involve “locking the door and turning the
lights on”. The basics include the use of encryption where feasible, firewalls, virus
protection, passwords, vendor updates and security patches, testing and evaluation,
and security audits. Also, when a breach occurs, immediate action is necessary to
change the network configuration and realign security procedures. Skilled and
knowledgeable practitioners should be consulted in the process.
3. Protective countermeasures are vital. Critical infrastructure affected by
interrelated systems includes telecommunications, business and industry,
transportation systems, utilities and consumer services and governmental
operations. All must be assessed, analyzed and evaluated in terms of protective
measures. Threat assessment and risk analysis processes should be put into place
as an ongoing process.
4. Efforts should be designed to provide maximum protection against intentional
damage wherever possible. Priorities need to be established given the nature of the
operations and the systems to be protected. Government and private sector
coordination will be critical to the interface of security precautions. Early warning
systems must be in place, with established contingency for responding to
emergency situations.
5. A vigorous investigative and prosecutorial program should be established to work
vigilantly with government and private industry to ensure a swift response to
infrastructure intrusions and attacks. Prevention, detection and response are
essential to the overall process.
6. Implementation of human and technological security measures are essential. A
strong foundation of information security strategies and tactics includes: security
systems, personnel training and education, analysis and assessment, enforcement,
policies and procedures, legal mandates and teamwork.
7. An “Information Protection Counter-Measures” (IPC) program should endeavor to
deploy safeguards prudently as appropriate to the nature of the operations and the
personnel involved. Security needs should be well-defined and networks
segregated as necessary to the operations. Some aspects may require more security
protocols than others. The IPC must consider both internal and external threats to
the systems. Internal threats could come from employees seeking their personal
gain for one reason or another. External threats could stem from hackers, terrorists
and industrial spies. Effective management and oversight becomes critical to the
process of workable security countermeasures.
139
- Know that some people will take advantage of your electronic operations to
advance their own personal gain. Hackers and terrorists look for targets of
opportunity. Plan and implement your own security tactics. Conduct research
and get good advice from experienced practitioners.
- Ensure that work products, operations, passwords, account numbers, credit card
numbers and any other sensitive information are protected. Be cautious about
sharing or using this information over the Internet. In particular you should
never use any sensitive information in email communications. Keep your IP
address confidential at all times.
- Become suspicious if someone calls you, or emails you, and wants your
personal information (e.g. password, credit card number, etc). The phone
company, utilities services or your Internet server will not call you asking for
such information. If this happens, try to get their phone number, etc., and
verify the request. And, then call the police.
- Configure your computer for high security operations. Be extremely cautious
about “Chat Rooms”. Never reveal personal information in one of these sites.
Protect your identify online at all times. Configure your PC settings to
preclude file and print sharing possibilities.
- If for some unexplained reason you experience difficulties while online, or
system failures occur, then it is possible your system is being attacked by a
hacker. If problems persist, then be ready to shut down your system,
disconnect and reboot. A sudden slow-down of surfing activity may mean
potential problems.
- Use appropriate settings and security support systems, if you PC is always
connected to a network and connected to the Internet. Alert appropriate
services and personnel if you experience regular problems with your system.
- Make sure, before you submit any information to a website, that you check to
see if the site has “secure connections”. Regularly clear your temporary files,
such as the “browser cache” and so forth. It is possible for hackers to gain
access to such information and then use it later.
- Be suspicious of email from persons you do not know. Avoid opening
attachments to such emails as they could contain a virus. Any information you
receive should be treated cautiously, especially if you are not familiar with the
sender.
- Be ready to disconnect and redial if you are experiencing problems connecting
to a website. Check your “Internet connection information” to see if there is a
lot activity on your connection. If so, and you have not attempted to open a
website, conduct file downloads, or other activity, someone may be accessing
your system.
- Keep data files encrypted on your computer if you are doing any kind of
important activity. Use firewalls, virus protection, security protocols, security
updates to operating systems and so on to protect your operations.
(92)
140
(93)
(94)
141
(95)
(96)
142
(97)
(98)
143
(99)
(100)
144
Website Sources
http://www.iacsp.com
http://www.hppmag.com
http://www.ict.org
http://www.terrorism.com
http://www.fas.org/irp/threat/terror.htm
http://www.spystuff.com/terrorism.html
http://www.specialoperations.com/Terrorism/
http://www.terrorismanswers.com/terrorism/introduction/html
http://www.terrorism.net
www.terrorism.com/terrorism/links.shtml
www.globalterrorism101.com
http://www.brook.edu/dybdocroot/default.htm
www.us-israel.org/source/terrorism/terror_report_orgs.html
http://www.state.gov/www/global/terrorism/index.html
http://www.odccp.org/odccp/terrorism.html
http://www.fema.gov/hazards/terrorism/
http://jurist.law.pitt.edu/terrorism/terrorism1a.htm
http://www.cia.gov/terrorism/ctc.html
http://www.fbi.gov/congress/congress01/freeh051001.htm
http://cns.miis.edu/research/terror.htm
http://www.cdc.gov
http://jama.ama-assn.org/
http://cia.gov
http://www.hopkins-biodefense.org/index.html
http://www.emedicine.com
http://www.freerepublic.com
http://www.emergency-preparedness.net
http://www.csis.org
http://www.atsdr.cdc.gov
http://roguesci.org
http://www.adl.org.il
http://www.fema.org
http://www.dhs.gov
http://hazmat.dot.gov
http://www.emergency.com
http://emsnetwork.org
http://www.02online.org
http://www.emrtc.nmt.edu/ndpc/
http://www.doce.lsu.edu
http://www.nv.doe.gov/nts/default.atm
http://ojp.usdoj.gov
http://www.cgsc.army.mil/milrev/english
145
References
1. Carr, H. K., WMD – Special Hazards Emergency Response
Reference Guide, (Milford, OH: AMEC Publishing Company, 2002),
page 4 – 6;
2. Spear, R. K., and Moak, D. M., Surviving Hostage Situations,
(Leavenworth, KS: Universal Force Dynamics, 1989), page 4;
3. Shavit, S., The International Policy Institute for Counter-Terrorism,
“Defining Terrorism – Is One Man’s Terrorist Another Man’s
Freedom Fighter?”, by Boaz Ganor, (Herzlia, Israel: The
International Policy Institute for Counter-Terrorism, 2002) page 1 of
17; www.ict.org;
4. Vaughn, J.R., Editor-in-Chief, The Police Chief Magazine, “Current
Trends in the Terrorist War” by W. Ronald Olin, (Gaithersburg, MD:
International Association Chiefs of Police, 1986), page 28;
5. Louisiana State University, Emergency Response to Terrorism –
Law Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September, 1999), pages 2-9 to 2-10;
6. Travis, J., “Threat Assessment: An Approach to Prevented Targeted
Violence”, (Washington, D.C.: U.S. Department of Justice, Office of
Justice Programs, National Institute of Justice, July 1995), an article
by Robert A. Fein, Bryan Vossekuil, and Gwen A. Holden, page 1-2;
7. Travis, J., “Threat Assessment: An Approach to Prevented Targeted
Violence”, (Washington, D.C.: U.S. Department of Justice, Office of
Justice Programs, National Institute of Justice, July 1995), an article
by Robert A. Fein, Bryan Vossekuil, and Gwen A. Holden, page 3;
8. O’Hara, C. E., and O’Hara, G. L., Fundamentals of Criminal
Investigation – Sixth Edition, (Springfield, IL: Charles C. Thomas,
Publisher, 1994), page 7;
9. Baltic, S., Editor, Homeland Protection Professional magazine, “The
Fear Factor”, an article by David C. Wagman, (Western Springs, IL:
A.J. Parrino and Associates, Ltd. September/October 2002), page 23;
10. Perry, N., The Journal of Counterterrorism & Homeland Security
International magazine, “Defending the Homeland – Part One”, an
article by Christopher Brennan, (Arlington, VA: Secure Worldnet,
Ltd., Vol. 8 No.4, 2002), pages14-15);
146
11. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September, 1999) page 2-12;
12. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September, 1999), page 2-17;
13. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September, 1999), page 2-17 – 2-19;
14. Office of the Coordinator for Counterterrorism, “U.S.
Counterterrorism Policy”, U.S. Department of State, Office of Public
Affairs, Coordinator for Counterterrorism, Washington, D.C.,
www.state/gov/www/global/terrorism/index.html, page 1 of 2 pages.
15. Terrorism 101 – Understanding Terrorism, “Terrorist Weapons”,
from the website: www.globalterrorism101.com, information has
been adapted from this website, page 1 of 6 pages;
16. Federation of American Scientist, Intelligence Resource Program,
Weapons of Mass Destruction Intelligence Threat Assessments,
“Unclassified Report to Congress on the Acquisition of Technology
Relating to Weapons of Mass Destruction and Advanced
Conventional Munitions, 1 July Through 31 December 2001,
Unclassified Report to Congress from the Director of Central
Intelligence January 2003, www.fas.org/irp/threat/bian_jan_2003.htm
Page 2 of 13 pages;
17. Sheehan, Michael A., Ambassador, “Terrorism: The Current Threat”,
Thursday, February 10, 2000; (Washington, D.C.: The Brookings
Institution, A Brookings Policymaker Series Event, 2003), P. 4;
www.brook.edu/dybdocroot/comm/transcripts/20000210a.htm
18. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September, 1999), page 5-2;
147
19. Godber, A., “Terrorist Use of Chemical Weapons”, (Arizona State
University, 1995), Page 1 of 2 Pages, from the website of A. Godber,
http://www.uberhip.com/people/godber/research/cwpaper.html
20. Freeh, L. J., “Threat of Terrorism to the United States”,
Congressional Statement – Federal Bureau of Investigation, United
States Senate, Committee on Appropriations, Armed Services, and
Select Committee on Intelligence, May 10, 2001, Washington, D.C.,
Page 5 of 9 Pages, FBI Press Room, Congressional Statement –2001,
http://www.fbi.gov/congress/congress01/freeh051001.htm
21. BBC News-UK, “Seventh Arrest in Ricin Case”, from a news article
appearing at the BBC News website, Page 1 of 4 Pages, London,
England, http://news.bbc.co.uk/1/hi/uk/2637515.stm
22. Pollard, N.A., Director, Terrorism Research Center, “Terrorism and
Transnational Organized Crime: Implications of Convergence”, The
Terrorism Research Center, February 10, 2003, Page 1 of 2 Pages,
http://www.terrorism.com/terrorism/crime.shtml
23. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September, 1999), page 4-4;
24. The Terrorism Research Center, “The Basics of Terrorism – Part 6 –
Terrorism in the Future”, Page 1 of 2 Pages, Terrorism Research
Center, Inc., February 12, 2003, from the Terrorism Research Center,
http://www.terrorism.com/terrorism/bpart6.html
25. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September, 1999), page 4-5;
26. Carr, H.K., Hall, R., Carr, J.A., WMD (Weapons of Mass
Destruction) Special Hazards Emergency Response Reference And
Guide (Milford, OH: AMEC Publishing Company, 2001); Nuclear
Incident Section, page 132-133;
27. Federation of American Scientists, “Weapons of Mass Destruction”,
“Militarily Critical Technologies List (MCTL) Part II: Weapons of
Mass Destruction Technologies”, (Washington, D.C.: Federation of
American Scientists, February 26, 2003), Appendix D – Definitions,
page II-D-1 to II-D-15, http://www.fas.org/index.html
148
28. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), pages 4-13 to 4-14;
29. Dennis, David T., MD, MPH, et al, JAMA Consensus Statement,
“Tularemia as a Biological Weapon: Medical and Public Health
Management”, Vol. 285 No. 21, June 6, 2001, Page 1 of 2 Pages;
30. Centers for Disease Control and Prevention (CDC), “Brucellosis” and
“Q-Fever”, Technical Information section, from the CDC website at
http://www.cdc.gov/ncidod/dbmd/diseaseinfo/brucellosis_t.htm as
well as http://cdc.gov/ncidod/dvrd/qfever/ dated 3/11/02, pages 1 of 2
pages, and page 1 of 5 pages;
31. Center for Civilian BioDefense Strategies, “Smallpox” Fact Sheet
Info, The Johns Hopkins University, 2002, from the website at
http://www.hopkins-biodefense.org/pages/agents/agentsmallpox.html
32. Chart courtesy of “Treatment of Biological Agent Exposures”, from
the Images file of www.google.com, found originally in the text of
http://www.ahcpub.com/ahc_root_html/hot/archive/mea112001.html
33. “CBRNE – Venezuelan Equine Encephalitis”, by Robert Derlet, MD,
(Emedicine Instant Access to the Minds of Medicine, August 30,
2002), www.emedicine.com article from the website located at
http://www.emedicine.com/emerg/topic886.htm with reference to the
signs and symptoms of VEE, dated 3/12/03, page 2 of 10 pages;
34. “Viral Hemorrhagic Fever (VHF): Current, Comprehensive
Information on Pathogenesis, Microbiology, Epidemiology,
Diagnosis, Treatment, and Prophylaxis”, by the Center for Infectious
Disease Research and Policy, Academic Health Center, University of
Minnesota, February 24, 2003, page 2 of 2 pages, from the website at
http://www.cidrap.umn.edu/cidrap/content/bt/vhf/biofacts/vhffactshee
t.html
35. “General Epidemiologic Features of Hemorrhagic Fever Viruses”
table reference from the aforementioned article, at the website of
http://www.cidrap.umn.edu/cidrap page 2 of 2 pages;
36. Appendix C: Biological Agents, Central Intelligence Agency,
Director of Central Intelligence, Speeches and Testimony, 27 March
1996, Types of BW Agents, from information located at the website
http://www.cia.gov/cia/public_affairs/speeches/archives/1996/go_app
endixc_032796.html
149
37. “Botulism Toxins Seen as Potential Bio-Weapon”, by Jon Dougherty,
WorldNetDaily.com, Thursday, March 1, 2001, FreeRepublic.Com,
Fresno, CA, 1996, page 1 of 3 pages, from the website located at
http://www.freerepublic.com/forum/a3a9e06922039.htm
38. Louisiana State University, Emergency Response to Terrorism –
Law Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), pages 4-20 to 4-21;
39. “Emergency Preparedness: Biological Incidents – Sample Page 3”, by
Emergency Preparedness Net, ( 1998-2002), Bio Weapons graphic,
located at the Images section of Google.com, from the website at
http://www.emergency-preparedness.net/bio3.htm, page 1 of 2 pages,
as of 3/19/03;
40. “Saddam Ready to Use Bio-Weapons”, by Anton La Guardia,
Diplomatic Editor, filed 10/09/02, The Spectator, Wednesday, 19
March 2003, telegraph.co.uk, image is from Google.com, found in
the above cited article that is from the website located at
http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2002/09/10/
wirq110.xml, page 1 of 4 pages;
41. Oehler, G.C., Director, Nonproliferation Center, Statements to the
Senate Armed Services Committee, “The Continuing Threat from
Weapons of Mass Destruction, 27 March 1996, Central Intelligence
Agency, Director of Central Intelligence, “The Threat of Nuclear
Diversion”, indicated at Page 1 of 2 Pages, from the website at
http://www.cia.gov/cia/public_affairs/speeches/archives/1996/go_test
imony_032796.html
42. The Federal Emergency Management Agency, Emergency Response
to Terrorism Job Aid, (Washington, D.C., FEMA and USDOJ, May
2000), Section III-2: Nuclear/Radiological, Page III-2-1;
43. Director of Homeland Security Programs, “Do Terrorists Really Have
Nukes Here?”, (Gonzales, Texas: KI4U, Inc., 2002), from a paper
presented November, 2002, as of April 7, 2003, at the website
http://www.ki4u.com/loose_nukes.htm, page 1 of 24 pages;
44. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Nuclear Materials”, Page 4-23;
150
45. Curtis, R.A., “Lecture Outline – Introduction to Ionizing Radiation”,
January, 1999, (Washington, D.C.: OSHA, 2003), from the website at
http://www.osha-slc.gov/SLTC/radiationionzing.index.html, page 1
of 3 pages;
46. Director of Homeland Security Programs, “Do Terrorists Really Have
Nukes Here?”, (Gonzales, Texas: KI4U, Inc., 2002), from a paper
presented November, 2002, as of April 7, 2003, at the website
http://www.ki4u.com/loose_nukes.htm, page 1 of 1 pages; image at
http:images.google.com/imgres?imgurl+www.ki4u.com/NUCLEAR_
TRAFFICKING.jpg;
47. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Nuclear Materials”, Page 4-25;
48. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Nuclear Materials”, Page 4-26 – 4-27;
49. The Federal Emergency Management Agency, Emergency Response
to Terrorism Job Aid, (Washington, D.C., FEMA and USDOJ, May
2000), Section III-2: Incendiary Devices, Page III-3-1;
50. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Incendiary Devices”, Page 4-33 to 4-34;
51. The Russian Battlefield, article entitled “Molotov Cocktail”, (The
Russian Battlefield, 1998), and image of the Molotov Cocktail,
from the website: http://www.battlefield.ru/index.html, and the site:
http://www.battlefield.ru/library/bookshelf/weapons2.html;
52. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Introduction to Chemical Weapons”, Page 4-36 to
4-37;
151
53. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Introduction to Chemical Weapons”, Page 4-38 to
4-39;
54. Cordesman, A. H., “Defending America – Asymmetric and Terrorist
Attacks with Chemical Weapons”, (Washington, D.C.: Center for
Strategic and International Studies, September 24, 2001), pg.9 of 48
pgs., http://www.csis.org/homeland/reports/terrrorasymw&chem.pdf
55. “Blister Agents: Lewisite (L) Mustard-Lewisite Mixture (HL)”, by
ATSDR, Agency for Toxic Substances and Disease Registry, April
2002, CAS# Lewisite 541-25-3, (Atlanta, GA) from the website
located at http://www.atsdr.cdc.gov/tfactsd1.html, page 2 of 5 pages;
56. “No need to panic”, by Eric Croddy, Friday September 28, 2001, The
Guardian (England, UK: The Guardian Education, 2002), pg1of 2pgs,
http://education.guardian.co.uk/Print/0,3858,4265998,00.html
57. The Federal Emergency Management Agency, Emergency Response
to Terrorism Job Aid, (Washington, D.C., FEMA and USDOJ, May
2000), Section III-4; Blood Agents, page III 4-5;
58. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Introduction to Chemical Weapons”, Page 4-44 to
4-45;
59. International Association of Chiefs of Police, The Police Reference
Notebook, (Gaithersburg, MD: IACP, 1970-75), Unit 51 “Chemicals
Weapons”, Training Key #148, page 51-1/2;
60. International Association of Chiefs of Police, The Police Reference
Notebook, (Gaithersburg, MD: IACP, 1970-75), Unit 51 “Chemicals
Weapons”, Training Key #148, page 51-1/2;
61. Atkinson, J. M., Advanced Chemical Weapons, (Gloucester, MA:
Granite Island Group, 1997), pages 27 to 39.
62. U.S. Army, Grenades and Pyrotechnic Signals, (Washington, D.C.:
Headquarters, Department of the Army, December 1969), FM 23-30,
Page 80;
152
63. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Explosive Devices”, Page 4-46;
64. The Ordinance Shop, “Types of Explosives – Propellants”, page 1 of
1 pages, from the website: http://www.ordinance.org
65. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Explosive Devices”, Page 4-49;
66. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Explosive Devices”, Page 4-50;
67. Megalomania’s Controversial Chem Lab, “Explosives, 1997-2003,
RDX, PETN, Lead Stypnate, Page 1 of 2 Pages, from the website at:
http://www.roguesci.org/megalomonia/explo/RDX.html
68. Hopkins, R., Fire and Safety Engineering Technology, Eastern
Kentucky University, March 20, 2003, “B. Commercial High
Explosives”, page 19-20 of 21 pages, from the website found at:
http://www.fireandsafety.eku.edu/VFRE-99/Recognition/High/high.htm
69. Hopkins, R., Fire and Safety Engineering Technology, Eastern
Kentucky University, March 20, 2003, “B. Commercial High
Explosives”, page 21 of 21 pages, from the website found at:
http://www.fireandsafety.eku.edu/VFRE-
99/Recognition/High/high.htm
70. Bureau of Alcohol, Tobacco and Firearms, Identification of Firearms,
(Washington, D.C.: Superintendent of Documents, U.S. Government
Printing Officer), picture from Figure 1, “Explosives”, page 29;
71. Petrousky, J.A., Bomb Threat Awareness, (Indian Mead, MD: Naval
Explosive Ordinance Disposal Technology Center, 1986), picture
from “Internally Fuzed Pipe Bomb” diagram, page 3;
72. Headquarters, Department of the Army, Grenades and Pyrotechnic
Signals, (Washington, D.C.: Department of the Army, FM-23-30,
1969), picture from Figure 1, “Fuze Functioning”, page 5-6;
153
73. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Explosive Devices – Package Bombs” diagram
from Module 4, Page 4-55, on page 4-54;
74. International Association Chiefs of Police, Police Reference
Notebook – Supervision, (Gaithersburg, MD: The International
Association Chiefs of Police, 1975), Unit 4CI - III “The Preliminary
Investigation, Page 4C1-7
75. The Federal Emergency Management Agency, Emergency Response
to Terrorism Job Aid, (Washington, D.C., FEMA and USDOJ, May
2000), Section III-4; Operational Considerations, page II-1-1;
76. Image from Google Images file, “Emergency Survival Program
Additional Materials”, CERT-LA, 2002-3, 07 May 2003, from
http://www.cert-la.com/ESP-Additional.htm
77. Picture, courtesy Google.com, Images Section, from “Radiation
Safety Primer”, Troxler Electronic Laboratories, Copyright 1997-
2003, http://www.troxlerlabs.com/images/radprimer.gif
78. Picture, courtesy Google.com, Images Section, from the website at:
http://www.butte.cc.ca.us/instruction/pstc/images/hazmat.jpg
79. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Personal Protection and Safety”, Types of Harm
Section, from Module 5, Page 5-11;
80. Diagram from the website at Google.com, Images Section, reference
http:www.envectra.com/env/erg/ipadhow2.gif, U.S. Department of
Labor's Occupational Safety and Health Administration (OSHA, 29
CFR §1910.120), and the U.S. Environmental Protection Agency
(EPA, 40 CFR Part 311), first responders reference to the ERG2000;
81. The Federal Emergency Management Agency, Emergency Response
to Terrorism Job Aid, (Washington, D.C., FEMA and USDOJ, May
2000), Section II-6; Mass Decontamination, page II-6-3 &4;
82. U.S. Department of Homeland Security, United States Coast Guard
Auxiliary, ICS Orientation, 06/20/03, diagram of the ICS flowchart
from the website at: http://www.auxetrain.org/icsmodule1.htm;
154
83. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Coordinated Response to WMD Incidents”, Page
3-16 to Page 3-17;
84. Federal Emergency Management Administration, “Incident
Command System,/Unified Command”, Figure 1, FEMA,
Washington, D.C., 11 February 2003, from the website at
http://www.fema.gov/graphics/rrr/conplan/fig1.gif
85. Appendix H, Federal Response Plan for A Terrorism Incident
Response, Figure H-1, Relationship Between Crisis Management and
CM; from Google.com Images file, from the website located at:
http://www.globalsecurity.org/…/army/fm/3-11-21/fligh-1.gif;
86. Louisiana State University, Emergency Response to Terrorism – Law
Enforcement Response to Weapons of Mass Destruction,
(Washington, D.C.: U.S. Department of Justice, Office of Justice
Programs, Office for State and Local Domestic Preparedness Support,
September 1999), “Strategies and Tactics for WMD Incidents”, Page
6-15 to Page 6-21;
87. “Security Strategy for Buildings”, Gordon Herrald Associates, East
Sussex, England, 2003, Figure 1 “Risk Assessment Methodology”,
from the website: http://www.herrald.co.uk/riskass.gif, from
google.com images file;
88. “Terror as a Strategy of Psychological Warfare, July 15, 2002, by Dr.
Boaz Ganor, ICT Executive Director, International Policy Institute
for Counter-Terrorism, Herzlia, Israel, 2003, page 1 of 2 pages, from
the website at: http://www.ict.org.il/
89. “Minimum Safe Distances”, by Wally Glenn, Edited by Neil
Carlberg, et al, Artist’s Republic of Fremont, Safety Information,
from the website: http://www.arfarfarf.com/safety/distances.shtml ©
1998-202 by Wally Glenn;
90. Emergency Response to Terrorism – Self-Study, U.S. Department of
Justice, Federal Emergency Management Agency, Emmitsburg,
M.D., June 1999, Module 3 – Self-Protection, page 35
155
91. ERRI Counter-Terrorism Archive, “Shoulder-Fired” and “Soviet/Chi-
Com” weapons, from the website of Emergency.com, located at:
http://www.emergency.com/samissle.htm, and related materials at:
http://www.emergency.com/rpg7.htm, 09/12/03, Emergency
Response and Research Institute, 1996, Chicago, IL, page 1 of 1
pages;
92. Systems Solutions Group, online article, “Dial-up Protection – How
to Stop Hackers”, SSG, Inc., Systems Security Group, 2003, Page
1 of 2 Pages, from the website located at: http://www.ssg-inc.net/;
93. Diagram 1, “Countering State-Sponsored Terrorism”, an article by
Boaz Ganor, ICT – Counter-Terrorism, Herzlia, Israel, 2003, from
the website: http://www.ict.org.il/articles/counter.htm
94. Graphic 1, “Introduction to Terrorist Intelligence Analysis”,
Counterterrorism Analysis Course, Defense Intelligence College,
from an article located at the GlobalSecurity.org website:
http://www.globalsecurity.org/intell/library/policy/dod/part1_ct_analysis_course.htm;
95. Graphic – World Map, from an article entitled: “The Transnational
Threat: Dangers from Terrorism, Insurgencies, Civil Wars, and
Organized Crime”, at Defenselink.com, U.S. Department of Defense,
Washington, D.C., original context from the website located at:
http://www.defenselink.mil/pubs/prolif/transnational.html;
96. “A Framework Against Terrorism – Intelligence”, graphic from the
Google.com images archive, located at the website found at:
http://sibelle.info/terror/intel.gif, Sni 04/17/02, original context at:
http://sibelle.info/terror/intel.htm;
97. “The Terrorist Network in America”, map, from S2 Online.org, at the
website: http://www.s2online.org, 1993-2002 Omni Sys
Enterprises, Inc., page 1 of 3 pages, as of 9/29/03;
98. Figure 1 – “Generic Terrorist Activities Time Line”, from an article
by Lt. Colonel Andrew J. Smith, Australian Army, The Military
Review, Command & General Staff College, Fort Leavenworth,
Kansas, January – February 2002, from the website located at:
http://www.cgsc.army.mil/milrev/english/JanFeb02/smith.asp; as of
31 July 2002, and images located at Google.com;
156
99. Figure 2 – “Generic Terrorist Countermeasures”, from an article by
Lt. Colonel Andrew J. Smith, Australian Army, The Military Review,
Command & General Staff College, Fort Leavenworth, Kansas,
January – February 2002, from the website located at:
http://www.cgsc.army.mil/milrev/english/JanFeb02/smith.asp; as of
31 July 2002, and images located at Google.com;
100. Threat Sources Graphic, “Tracking the Global Spread of
Advanced Technologies”, an article by Eileen Vergino, Science and
Technology Review, Lawrence Livermore National Laboratory,
University of California, U.S. Dept. of Defense, September 5, 2003,
Page 2 of 12 Pages, located at the S & TR website found at:
http://www.llnl.gov/str/September01/Vergino.html;