Terror Operations: Case Studies in Terrorism 25 July 2007

Total Page:16

File Type:pdf, Size:1020Kb

Terror Operations: Case Studies in Terrorism 25 July 2007 TRADOC G2 Handbook No.US 1.01, Terror Army Operations: CaseTRADOC Studies in Terrorism 25 July 2007 TRADOC G2 Handbook No. 1.01 TerrorTerror OperationsOperations CaseCase StudiesStudies inin TerrorismTerrorism US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity (TRISA) - Threats Fort Leavenworth, Kansas 25 July 2007 DISTRIBUTION RESTRICTION: Approved for public release; distribution unlimited. TRADOC G2 Handbook No. 1.01, Terror Operations: Case Studies in Terrorism 25 July 2007 Summary of Change U.S. Army TRADOC G2 Handbook No. 1.01 Terror Operations: Case Studies in Terror This handbook dated 25 July 2007 – • Adds one case study on the “Beslan: Hostage Crisis and Mass Murder” as chapter 6. • Adds bibliographical references to support Chapter 6. • Adds source notes to support images in Chapter 6. TRADOC G2 Handbook No. 1.01, Terror Operations: Case Studies in Terrorism 25 July 2007 Preface Terror Operations: Case Studies in Terrorism is a supplemental handbook that presents several terrorist incidents in a case study methodology. This handbook supports a U.S. Army Training and Doctrine Command, TRADOC G2 capstone reference guide on terrorism, TRADOC G2 Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century. Both the capstone guide and supplemental handbook are prepared under the direction of the TRADOC G2, TRADOC Intelligence Support Activity-Threats. Understanding terrorism spans foreign and domestic threats of nation-states, rogue states with international or transnational agent demonstrations, and extremist cells with members or loosely affiliated actors with specific strategies, tactics, and targets. A central aspect of this handbook comprises foreign and domestic threats against the United States of America in a contemporary operational environment (COE). Purpose. This informational handbook supports institutional training, professional military education, and operational missions for U.S. military forces in the War on Terrorism (WOT). This document provides an introduction to the nature of terrorism and recognition of terrorist threats to U.S. military forces. A common situational awareness by U.S. military forces considers three principal venues for armed forces: forces that are deployed, forces that are in- transit to or from an operational mission, and forces that are primarily installation or institution support. Compiled from open source materials, this handbook promotes a “Threats” perspective and enemy situational awareness of U.S. strategies and operations in combating terrorism. Neither a counterterrorism directive nor antiterrorism manual, this handbook complements but does not replace Army training and intelligence products on terrorism. Intended Audience. This handbook exists primarily for U.S. military forces; however, other applicable groups include interdepartmental, interagency, intergovernmental, civilian contractor, nongovernmental, private volunteer, and humanitarian relief organizations, and the general citizenry. Handbook Use. Study of contemporary terrorist motivations and behavior, terrorist goals and objectives, and knowledge of terrorist tactics, techniques, and procedures (TTP) improve training and readiness of U.S. military forces. This handbook will be updated as necessary to enhance a current and relevant resource. A selected bibliography presents citations for detailed study of specific terrorism topics. Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men. Proponent Statement. Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is the proponent for this publication. Periodic updates will accommodate emergent user requirements on terrorism. Send comments and recommendations on DA Form 2028 directly to Director, U.S. Army TRADOC Intelligence Support Activity (TRISA)-Threats, ATTN: ATIN-T, Threats Terrorism Team, Bldg 53, 700 Scott Avenue, Fort Leavenworth, Kansas 66027-1323. This handbook is available at https://dcsint-threats.leavenworth.army.mil. and requires an Army Knowledge Online (AKO) login for access. i TRADOC G2 Handbook No. 1.01, Terror Operations: Case Studies in Terrorism 25 July 2007 This Page Intentionally Blank ii TRADOC G2 Handbook No. 1.01, Terror Operations: Case Studies in Terrorism 25 July 2007 Terror Operations: Case Studies in Terrorism Contents Preface........................................................................................................................................ i Contents ................................................................................................................................iii Introduction.............................................................................................................................. 1 Case Study Purpose................................................................................................................ 2 Case Study Elements.............................................................................................................. 3 The Contemporary Operational Environment........................................................................ 4 Chapter 1: Tokyo Subway Sarin Attack.............................................................................1-1 Introduction.........................................................................................................................1-2 Learning Objectives ............................................................................................................1-3 Case Study Overview– Tokyo Chemical Sarin Attack (1995) ...........................................1-3 Background .........................................................................................................................1-5 Planning and Preparation: Matsumoto – Sarin in the Air .................................................1-10 The Decision to Attack Tokyo ..........................................................................................1-12 Tokyo – Recipe for Disaster .............................................................................................1-13 The Sarin Attack ...............................................................................................................1-13 Supplemental Vignettes -The Immediate Aftermath ........................................................1-18 The Terrorists....................................................................................................................1-19 The Victims.......................................................................................................................1-20 Case Discussion Questions ...............................................................................................1-21 Assessment........................................................................................................................1-22 Chapter 2: Murrah Federal Building Bombing.................................................................2-1 Introduction.........................................................................................................................2-2 Learning Objectives ............................................................................................................2-2 Case Study Overview - Murrah Federal Building (1995)...................................................2-3 Background .........................................................................................................................2-4 Planning and Preparation: Oklahoma City Target ..............................................................2-6 The Attack with a High Yield Explosive ..........................................................................2-12 Supplemental Vignettes: The Immediate Aftermath.........................................................2-12 Case Discussion Questions ...............................................................................................2-14 Assessment........................................................................................................................2-15 Chapter 3: Khobar Towers VBIED Bombing....................................................................3-1 Introduction.........................................................................................................................3-2 Learning Objectives ............................................................................................................3-2 Case Study Overview – Khobar Towers Bombing (1996) .................................................3-3 Background .........................................................................................................................3-3 Planning and Preparation ....................................................................................................3-4 The Attack with a VBIED...................................................................................................3-5 Supplemental Vignettes: The Immediate Aftermath...........................................................3-8 iii TRADOC G2 Handbook No. 1.01, Terror Operations: Case Studies in Terrorism 25 July 2007 Case Discussion Questions ...............................................................................................3-13 Assessment........................................................................................................................3-14 Chapter 4: USS Cole Bombing.............................................................................................4-1
Recommended publications
  • Hezbollah's Syrian Quagmire
    Hezbollah’s Syrian Quagmire BY MATTHEW LEVITT ezbollah – Lebanon’s Party of God – is many things. It is one of the dominant political parties in Lebanon, as well as a social and religious movement catering first and fore- Hmost (though not exclusively) to Lebanon’s Shi’a community. Hezbollah is also Lebanon’s largest militia, the only one to maintain its weapons and rebrand its armed elements as an “Islamic resistance” in response to the terms of the Taif Accord, which ended Lebanon’s civil war and called for all militias to disarm.1 While the various wings of the group are intended to complement one another, the reality is often messier. In part, that has to do with compartmen- talization of the group’s covert activities. But it is also a factor of the group’s multiple identities – Lebanese, pan-Shi’a, pro-Iranian – and the group’s multiple and sometimes competing goals tied to these different identities. Hezbollah insists that it is Lebanese first, but in fact, it is an organization that always acts out of its self-interests above its purported Lebanese interests. According to the U.S. Treasury Department, Hezbollah also has an “expansive global network” that “is sending money and operatives to carry out terrorist attacks around the world.”2 Over the past few years, a series of events has exposed some of Hezbollah’s covert and militant enterprises in the region and around the world, challenging the group’s standing at home and abroad. Hezbollah operatives have been indicted for the murder of former Lebanese Prime Minister Rafiq Hariri by the UN Special Tribunal for Lebanon (STL) in The Hague,3 arrested on charges of plotting attacks in Nigeria,4 and convicted on similar charges in Thailand and Cyprus.5 Hezbollah’s criminal enterprises, including drug running and money laundering from South America to Africa to the Middle East, have been targeted by law enforcement and regulatory agen- cies.
    [Show full text]
  • 80-93 a Study of Traditional Boats and Navigational History of Odisha, East
    Author version: Man Environ., vol.40(2); 2015; 80-93 A study of Traditional Boats and Navigational History of Odisha, East coast of India Sila Tripati Marine Archaeology Centre CSIR- National Institute of Oceanography Dona Paula, Goa 403 004 Email: [email protected] Abstract It is generally believed that there were seafarers before there were farmers and potters. Man must have used some kind of craft to cross the rivers, seas, bays for collection of food during prehistoric time onwards if not earlier. With regard to the earliest voyages, it is believed that these were made around 60,000 years ago when the sea level was lower and people would have used floats or rafts for the purpose. After many centuries different types of traditional boats were constructed and used for maritime trade, fishing, warfare, etc. Indian epics and regional literature mention different types of vessels and their use and the vessels used in the seas, rivers and lakes are different in their construction, shape and size. Like other littoral states of India, references to a good number of traditional boats of Odisha are found in the contemporary literature namely Pota (dug out), Nauka, Bhela, Chapa and Padhua. There are some traditional boats, for instance teppa, padhua, nauka and patia, which are still in use and built along the Odisha Coast. The present paper details construction techniques of traditional boats of Odisha, their usages, difference between the traditional boats of Odisha and those on other parts of the east coast of India and navigational technology. Keywords: Traditional boats, Navigation, Maritime trade, Odisha, East coast of India 1 Introduction The history of boatbuilding is as old as the relationship between man and the sea.
    [Show full text]
  • THE IMPACT of STATE V. SWINTON on the AUTHENTICATION of DIGITAL IMAGES∗
    File: Guthrie.362.GALLEY(f).doc Created on: 9/21/2007 3:34:00 PM Last Printed: 9/26/2007 9:54:00 AM THE SWINTON SIX: THE IMPACT OF STATE v. SWINTON ON THE AUTHENTICATION OF DIGITAL IMAGES∗ Catherine Guthrie∗∗ Brittan Mitchell∗∗∗ I. INTRODUCTION “[T]he machine does not isolate man from the great problems of nature but plunges him more deeply into them.”1 Nowhere is this more apparent than in the struggle between rules of law and scientific and technological advances. Our court system’s response to this challenge is scrutiny and adaptability, two traits evidenced by the ebb and flow of requirements for authentication of digital images. This Article examines the evolution of authentication re- quirements for digital images, with particular emphasis on the impact of State v. Swinton.2 Part II of this Article provides an overview of digital images as well as the general rationale for their authentication. Part III reviews past statutory and common law rules for establishing the authenticity of such evidence. Part IV summarizes Swinton, a 2004 case from Connecticut which represents a major development in this area of law. Part V ap- plies the holding from Swinton to a new type of digital evidence, virtual autopsies, in a theoretical context. The Article concludes in Part VI. ∗ © 2007, Catherine Guthrie and Brittan Mitchell. All rights reserved. ∗∗ Catherine Guthrie is a graduate of Stetson University College of Law and an ac- tive member of The Florida Bar. She is currently working for the National Clearinghouse for Science, Technology and the Law as a Research Attorney.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Iran's Gray Zone Strategy
    Iran’s Gray Zone Strategy Cornerstone of its Asymmetric Way of War By Michael Eisenstadt* ince the creation of the Islamic Republic in 1979, Iran has distinguished itself (along with Russia and China) as one of the world’s foremost “gray zone” actors.1 For nearly four decades, however, the United States has struggled to respond effectively to this asymmetric “way of war.” Washington has often Streated Tehran with caution and granted it significant leeway in the conduct of its gray zone activities due to fears that U.S. pushback would lead to “all-out” war—fears that the Islamic Republic actively encourages. Yet, the very purpose of this modus operandi is to enable Iran to pursue its interests and advance its anti-status quo agenda while avoiding escalation that could lead to a wider conflict. Because of the potentially high costs of war—especially in a proliferated world—gray zone conflicts are likely to become increasingly common in the years to come. For this reason, it is more important than ever for the United States to understand the logic underpinning these types of activities, in all their manifestations. Gray Zone, Asymmetric, and Hybrid “Ways of War” in Iran’s Strategy Gray zone warfare, asymmetric warfare, and hybrid warfare are terms that are often used interchangeably, but they refer neither to discrete forms of warfare, nor should they be used interchangeably—as they often (incor- rectly) are. Rather, these terms refer to that aspect of strategy that concerns how states employ ways and means to achieve national security policy ends.2 Means refer to the diplomatic, informational, military, economic, and cyber instruments of national power; ways describe how these means are employed to achieve the ends of strategy.
    [Show full text]
  • The Influence of Terrorism on Discriminatory Attitudes and Behaviors
    Shades of Intolerance: The Influence of Terrorism on Discriminatory Attitudes and Behaviors in the United Kingdom and Canada. by Chuck Baker A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey In partial fulfillment of the requirements For the degree of Doctor of Philosophy Graduate Program in Global Affairs Written under the direction of Dr. Gregg Van Ryzin and approved by ___________________________________________________ ___________________________________________________ ___________________________________________________ ___________________________________________________ Newark, New Jersey May, 2015 Copyright page: © 2015 Chuck Baker All Rights Reserved ABSTRACT The Influence of Terrorism on Discriminatory Attitudes and Behaviors in the United Kingdom and Canada by Chuck Baker Dissertation Director: Dr. Gregg Van Ryzin, Ph.D. Terrorism has been shown to have a destabilizing impact upon the citizens of the nation- state in which it occurs, causing social distress, fear, and the desire for retribution (Cesari, 2010; Chebel d’Appollonia, 2012). Much of the recent work on 21st century terrorism carried out in the global north has placed the focus on terrorism being perpetuated by Middle East Muslims. In addition, recent migration trends show that the global north is becoming much more diverse as the highly populated global south migrates upward. Population growth in the global north is primarily due to increases in the minority presence, and these post-1960 changes have increased the diversity of historically more homogeneous nations like the United Kingdom and Canada. This research examines the influence of terrorism on discriminatory attitudes and behaviors, with a focus on the United Kingdom in the aftermath of the July 7, 2005 terrorist attacks in London.
    [Show full text]
  • Military Guide to Terrorism in the Twenty-First Century
    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
    [Show full text]
  • Disaster Response and Biological/Chemical Terrorism
    Disaster Response and Biological/Chemical Terrorism Information Packet Prepared by: Emergency Medical Services Department October 2001 Disaster Response and Biological/Chemical Terrorism Clearinghouse Information The College has been very active in disaster planning and response as well as biological/chemical terrorism preparation for a number of years. The membership section, Disaster Medicine, was the first membership section organized in 1989. They have been one of the largest in membership and one of the most active. The EMS Department maintains information for members and the public on disaster response and biological/chemical terrorism topics in a variety of formats and publications. POLICY STATEMENTS The College has current policies addressing the following: · Disaster Data Collection (Oct. 2000) · Disaster Medical Service (June 2000) · Support for National Disaster Medical System-NDMS (Mar. 1999) · Handling of Hazardous Materials (June 1999) TEXT BOOKS The College developed and published the text: Community Medical Disaster Planning and Evaluation Guide through a section grant with the Disaster Medicine Section. This is an excellent guide for developing or updating a hospital or city/county disaster plan. While biological or chemical agents are not specifically mentioned, many of the same disaster planning and response issues remain the same. This text can be ordered through the College bookstore at 1-800-798- 1822, ext. 6for $69.00, item number 513000-1020. NBC TASK FORCE The College’s nuclear, biological and chemical (NBC) Task Force recently completed a grant with the Department of Health and Human Services (HHS), Office of Emergency Preparedness (OEP) to develop objectives, content and competencies for the training of emergency medical technicians, emergency physicians, and emergency nurses to care for casualties resulting from nuclear, biological, or chemical (NBC) incidents.
    [Show full text]
  • Jews Control U.S.A., Therefore the World – Is That a Good Thing?
    Jews Control U.S.A., Therefore the World – Is That a Good Thing? By Chairman of the U.S. based Romanian National Vanguard©2007 www.ronatvan.com v. 1.6 1 INDEX 1. Are Jews satanic? 1.1 What The Talmud Rules About Christians 1.2 Foes Destroyed During the Purim Feast 1.3 The Shocking "Kol Nidre" Oath 1.4 The Bar Mitzvah - A Pledge to The Jewish Race 1.5 Jewish Genocide over Armenian People 1.6 The Satanic Bible 1.7 Other Examples 2. Are Jews the “Chosen People” or the real “Israel”? 2.1 Who are the “Chosen People”? 2.2 God & Jesus quotes about race mixing and globalization 3. Are they “eternally persecuted people”? 3.1 Crypto-Judaism 4. Is Judeo-Christianity a healthy “alliance”? 4.1 The “Jesus was a Jew” Hoax 4.2 The "Judeo - Christian" Hoax 4.3 Judaism's Secret Book - The Talmud 5. Are Christian sects Jewish creations? Are they affecting Christianity? 5.1 Biblical Quotes about the sects , the Jews and about the results of them working together. 6. “Anti-Semitism” shield & weapon is making Jews, Gods! 7. Is the “Holocaust” a dirty Jewish LIE? 7.1 The Famous 66 Questions & Answers about the Holocaust 8. Jews control “Anti-Hate”, “Human Rights” & Degraded organizations??? 8.1 Just a small part of the full list: CULTURAL/ETHNIC 8.2 "HATE", GENOCIDE, ETC. 8.3 POLITICS 8.4 WOMEN/FAMILY/SEX/GENDER ISSUES 8.5 LAW, RIGHTS GROUPS 8.6 UNIONS, OCCUPATION ORGANIZATIONS, ACADEMIA, ETC. 2 8.7 IMMIGRATION 9. Money Collecting, Israel Aids, Kosher Tax and other Money Related Methods 9.1 Forced payment 9.2 Israel “Aids” 9.3 Kosher Taxes 9.4 Other ways for Jews to make money 10.
    [Show full text]
  • ACHILLES INFLATABLE BOATS a Division of Achilles USA, Inc
    2018 INFLATABLE BOATS It begins with the best fabric. Designed and built with safety Because our boats last, Our quality CSM fabric has and performance in mind. so does our support. such a great reputation in the From built-in safety features like We provide our dealers and inflatable boat industry that the strongest four-layer seam customers with comprehensive other inflatable boat manufac- construction in the industry to and responsive post-sales turers buy their fabric from us. custom designs engineered to support in every aspect of It all starts with an exterior complement and enhance the Achilles ownership. Our The Achilles boating experience begins with best inflatable coating of our custom CSM performance of each of our customer and mobile-friendly boat fabric, designs and options and ends with unsurpassed over a heavy duty fabric which boats, boaters get more out of web site not only offers customer support for as long as you own your boat. makes our inflatables virtually an Achilles. Our boats are built comprehensive information In between you will enjoy years of on-the-water activities impervious to the elements, oil, to not only last, but to also about our current models, in the most durable inflatable boat you can find. gasoline and abrasions. And it deliver the practicality you but also on all Achilles boats ends with two interior coatings expect from an inflatable with- produced since 1978. of Chloroprene for unsurpassed out sacrificing the performance CSM exterior for air retention. you want from any boat. toughness www.achillesboats.com Heavy-duty Nylon or Polyester core fabric A SMOOTH, SIMPLE OAR SYSTEM NON-CORROSIVE CHECK VALVES Two layers of Chloroprene We invented the fold-down, locking oar system All Achilles valves are non-corrosive with no moving for unsurpassed that makes rowing a breeze while keeping oars parts that might break.
    [Show full text]
  • Immigration Policy, Race Relations and Multiculturalism in Post-Colonial Great Britain Flora Macivor Épouse Lamoureux
    The Setting Sun : Immigration Policy, Race Relations and Multiculturalism in Post-Colonial Great Britain Flora Macivor Épouse Lamoureux To cite this version: Flora Macivor Épouse Lamoureux. The Setting Sun : Immigration Policy, Race Relations and Multi- culturalism in Post-Colonial Great Britain. History. 2010. dumas-00534579 HAL Id: dumas-00534579 https://dumas.ccsd.cnrs.fr/dumas-00534579 Submitted on 10 Nov 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE DU SUD TOULON-VAR FACULTE DES LETTRES ET SCIENCES HUMAINES MASTER RECHERCHE : CIVILISATIONS CONTEMPORAINES ET COMPAREES ANNÉE 2009-2010, 1ERE SESSION THE SETTING SUN: IMMIGRATION POLICY, RACE RELATIONS AND MULTICULTURALISM IN POST- COLONIAL GREAT BRITAIN FLORA MACIVOR LAMOUREUX UNDER THE DIRECTION OF PROFESSOR GILLES LEYDIER ii TABLE OF CONTENTS INTRODUCTION ............................................................................................................ 1 THE FIRST BRITISH ASIANS: A HISTORY .............................................................. 8 I. The Colonial
    [Show full text]
  • Western Hemisphere Overview ______
    Western Hemisphere Overview ___________________________________________________________________________ “We stand firm in the fight against terrorism and firm in our conviction that a sustained and permanent victory depends upon the success of each individual country in the struggle for social cohesion. In projecting our security policy to become an axiom of the State, we conceive it to be inexorably linked to the constant improvement of the social conditions of our people.” Álvaro Uribe Vélez, President of Colombia 60th Session of the United Nations General Assembly September 17, 2005 ___________________________________________________________________________ Terrorism in the Western Hemisphere was primarily perpetrated in by narcoterrorist organizations based in Colombia and by the remnants of radical leftist Andean groups. With the exception of the United States and Canada, there are no known operational cells of Islamic terrorists in the hemisphere, although scattered pockets of ideological supporters and facilitators in South America and the Caribbean lent financial, logistical, and moral support to terrorist groups in the Middle East. Cuba remained a state sponsor of terrorism, while Venezuela virtually ceased its cooperation in the global war on terror, tolerating terrorists in its territory and seeking closer relations with Cuba and Iran, both state sponsors of terrorism. The threat of terrorist attack remained low in for most countries. Overall, governments took modest steps to improve their counterterrorism (CT) capabilities and tighten border security, but corruption, weak government institutions, ineffective or lacking interagency cooperation, weak or non-existent legislation, and reluctance to allocate sufficient resources limited the progress of many. Some countries, like Panama, Trinidad and Tobago, Jamaica, Mexico, and El Salvador, made serious prevention and preparedness efforts.
    [Show full text]