Abbas, Abu, 23, 25, 31–33, 54–55 Abdallah, Georges Ibrahim
Total Page:16
File Type:pdf, Size:1020Kb
INDEX 167 Index Abbas, Abu, 23, 25, 31–33, 54–55 animal rights activists, 1 Abdallah, Georges Ibrahim, 17, 57–58, anti-terrorism 101–102 British “Diplock Courts,” 121–122 Abdel-Rahman, Sheik Omar, xiv–xvi, FBI team, 117 83, 92, 112, 130–131, 142 government measures, 114 Abouhalima, Mahmud, xiii–xiv, xvi– legislation (1974), Britain, 123, 141 xvii, xx, 79 Antiterrorism Act (1996), United Achille Lauro hijacking, xi, 1 States, 61, 81, 82, 93, 94, 96–97 events of, 20–23 Arafat, Yasir, xii, 22–23 terrorists using foreign territory, 19 Assad, Hafez al-, 36 Afghanistan, xiii, xvi, 66 assassinations agreements, international of Archduke Francis Ferdinand, 11 jurisdiction over certain terrorist of- attempt on George Bush, 69, 71, 72, fenses, 52 76 Aircraft Sabotage Act (1984), United of John Kennedy, 6 States, 53, 55 of Meir Kahane, xvi, xxi, 133 airport machine gunnings, Rome and plan against Mubarak, 80 Vienna (1985), 1 potential effect of, 14 aliens of Rabin, xxi, x, 6, 8 circumstances for deporting, 81 of Sadat, xv–xvi, 8 monitoring activities of, 81 of terrorists by Spain and Israel, 115 not protected under U.S Fourth U.S. agencies prohibited from, 28, 50 Amendment, 51 Aum Shinrikyo cult, xi, 2, 86 as terrorists, 92–94 Allen, Gary, xix Barsimantov, Yacov, 57–58 Allison, Graham, 86, 87, 88 Bennett Committee of Inquiry into Alvarez Machain, Humberto, 51, 55 Police Interrogation Procedures in Angola, 66 Northern Ireland, 124 168 INDEX Berri, Nabih, 36 Camarena-Salazar, Enrique, 50–51 biological weapons Cambodia, 66 government response to prevent, 85, Carter, Jimmy, 2 89–92 Central Intelligence Agency (CIA) making and using, 89–90 foreign intelligence collection func- preventing opportunities to use, 90– tion, 24 92 permission to investigate abroad, 53 restricting access to, 94 role in Achille Lauro hijacking, 22 risk and threat of terrorism with, search for Kansi, 26 154–155 support for Afghan Mujahedeen, xiii, Black Panthers, 117 xvi bombings Chapman, Christian, 57–58 American soldiers in Berlin disco, xi chemical weapons Atlanta Olympics, 110 under Antiterrorism Act, 94 Holland Tunnel threat, x Aum Shinrikyo use of poison gas, 2, Jerusalem (1995), x, 132, 142 86 Oklahoma City, 1, 131–133, 140, 153– restricting access to, 94 154 risk and threat of terrorism with, Pan Am Flight 103, xi, 23, 71, 133 154–155 Tel Aviv (1995), x, 132, 142 Chirac government, 101–102 U.S. Air Force complex in Saudi Clinton, William J., 48, 66, 71, 72, 75–76 Arabia, xi Colombia U.S. Marine barracks in Beirut, 8 judges’ identity hidden, 121 U.S. Marine barracks in Beirut (1983), threats of guerrilla forces (1997), 10 1, 8 witness’s identity kept secret, 120 World Trade Center, x, 1, 105–106, Committee for Solidarity with Arab 132–133, 153–154 and Middle Eastern Political Pris- Bosnia, 13 oners (CSAMPP), 101 Branch Davidian compound fire, Committee in Solidarity with the Waco, Texas People of El Salvador (CISPES) defiance of authority, 38 activities and philosophy of, 149 McVeigh’s anger over, xviii FBI investigation of, 147–149 significance of date of, x, 110, 131 political support to FMLN, 150 Brandenburg v. Ohio (1969), 98 computers British-American Supplementary Ex- FBI use of, 186 tradition Treaty (1985), 56 use in Germany for intelligence and Brokaw, Tom, 37 information-gathering, 134–136 Bureau for Intelligence and Research concessions to terrorists (INR), U.S. State Department, 22 advantages and disadvantages, 40– Burnham, David, 136 43 Bush, George, x–xi, 69, 71, 72, 76 conditions for conceding to, 43–46 Bush administration, 50 INDEX 169 confessions deadly force defendant, 123 cover-ups after use of, 117–120 threats to induce, 125 current Department of Justice rules, Constitution, U.S. 17 First Amendment freedom of asso- regulated use of, 115 ciation, 99–100 rules followed by FBI, 115 First Amendment rights protected rules of British armed forces, 115 under, 29 Defense Intelligence Agency (DIA), Fourth Amendment “probable 22–23 cause,” 80, 125 democratic nations Fifth Amendment protection against access of ordinary citizens, 93–94 incrimination, 139 dangers of terrorism in, 158 Sixth Amendment rights under, 120, dealing with terrorism, ix 123 effect of terrorism on policies of, 12– interrogation rights under, 124–125 18 cooperation, international intelligence investigations in, 142– among Group of Eight nations, 60– 151 61 risk of changing law enforcement for effective sanctions, 69 rules, 113–120 formal instruments of, 52–54 unintentional support of terrorist information exchange, 47–48 groups, 100–103 politics of, 54–59 deportation to regulate transfer of NBC weapon of alien suspected terrorists, 81 ingredients, 155 effective, 92 courts, special deterrence anti-terrorism courts in Britain, 121– as effect of retaliation, 68–69, 73–76 122 as justification for retaliation, 69–72 secret, 122 Deutch, John, 2, 29–30 U.S. foreign intelligence surveillance, Diplock Courts, Britain, 121–122 123, 126 Drug Enforcement Administration Craxi, Bettino, 21, 23, 30–33 (DEA), United States, 50–51, 62 crimes factors in solving, 109 Egypt files on suspected individuals, 110 role in Achille Lauro hijacking, 20, 22, investigatory methods in solving, 30–34 105–108 El Salvador crisis team, U.S. interagency, 20 FBI investigation of CISPES activi- CSAMPP. See Committee for Solidar- ties, 147–148 ity with Arab and Middle Eastern FMLN activities, 147–149 Political Prisoners (CSAMPP) U.S. military assistance to, 149 Cuba, 68 Emergency Provisions Act (1987 amendments), Britain, 125 170 INDEX evidence Foreign Intelligence Surveillance Act, defendant’s confession in place of, United States 123 investigation of organizations under, terrorists’ hiding of physical, 132– 150 133 required reports of electronic sur- Executive Order 12333, United States, veillance under, 29 28, 115 searches and electronic surveillance explosives under, 126, 138 required detectants in plastic, 94 foreign policy, Group of Eight (G-8) restricting access to, 94 nations, 60 taggants in, 85 Fortier, Michael, 112, 125, 140 extradition Foster, John, 87–88 alternatives under treaties, 55–56 France British-American Supplementary avoidance of Abdallah’s extradition, Extradition Treaty, 56 57–59 government’s avoidance of, 57–58 response to terrorist bombings, 17, Italy’s objection in Achille Lauro case, 101–102 32, 54 terrorist campaigns in, 2 of terrorists in states providing sanc- Freeh, Louis J., 61, 105, 117, 118, 144 tuary, 59–61 fugitive location system, Germany, treaties of, 53–57 135–136 U.S. request in Achille Lauro case, 32 gas attack, Tokyo subway system, xi, Farabundo Marti National Liberation 2, 86 Front (FMLN), El Salvador, 147– Germany 150 Bureau for the Protection of the Con- Federal Bureau of Investigation (FBI) stitution (BfV), 23, 137–138 arrest of Kansi in Pakistan, 63 changes in criminal justice system, counterintelligence operations, 24, 106 130 computer-based cross-reference sys- investigation of World Trade Center tem (PIOS), 134–136 bombing, 105–106 conviction of TWA hijacker in, 37 as lead agency in information-gath- definition of terrorism, 3 ering, 82 denying support to terrorists, 99 liaison offices abroad, 61–62 handling of Hammadei’s extradition, permission to investigate abroad, 53 55–57 rules of engagement at Ruby Ridge, intelligence-gathering, 137 117 Military Intelligence Service (MAD), use of computers for information and 23 intelligence gathering, 136 release of prisoners to RAF, 41 Ford administration, 143 terrorist campaigns in, 2 INDEX 171 use of computers to create intelli- Hamas gence, 134–136 suicide bombings (1997), x, xii Gibraltar shooting of IRA personnel, terrorist attacks in Israel (1996), x, 116 xii, 65, 68 government Hammadei, Mohammed Ali, 37, 54– role in denying needs of terrorists, 57 95–100 Hassan, Hani Al-, 23, 31–32 role in protecting nationals of other Hewitt, Christopher, 106 countries, 19 Hezbollah task to prevent terrorism, 79–86 role in TWA hijacking (1985), 35–37 See also specific countries terrorist attacks in Israel (1996), 65, Great Britain 68 anti-terrorism courts, 121–122 hijackings anti-terrorist legislation (1974), 123 of Achille Lauro (1985), 20–23 Bennett Committee on Northern Ire- buses in Israel (1984), 117–119 land, 124 TWA Flight 847 (1985), xi, 20–21, 35– changes in criminal justice system, 36, 39, 49, 51, 54–55 106 U.S. response to Achille Lauro, 68 coercive interrogation, 141 Holland Tunnel, x, 85 definition of terrorism, 3 Homme, Robert, 58 denying support to terrorists, 97–99 Horiuchi, Lon, xviii Emergency Provisions Act of North- hostages ern Ireland (amendments), 125 options of United States to rescue, government power to obtain infor- 39–46 mation, 82 U.S. hostage rescue teams, 21 intelligence-gathering, 137 hostage-taking interrogation guidelines in North- in Achille Lauro incident, 38–39 ern Ireland, 124 following hijacking of TWA Flight law enforcement in Northern Ireland, 847, 20, 35–39 123 hostage rescue teams, 39 MI-5 and MI-6 intelligence organiza- Israel’s policy, 41–42 tions, 24, 27 related to Hammadei’s arrest, 56–57 Prevention of Terrorism Acts (1974, as terrorist tactic, 37–39 1987), 3, 96, 140 U.S. “no concessions” policy, 39–41 rules for armed forces in Northern Hostage-Taking Act (1984), United Ireland, 115 States, 53, 55 Scotland Yard Special Branch, 27 Hunt, Leamon, 58 terrorist campaigns in, 2 use of coercive interrogation, 131– Immigration and Nationality Act (1990 132 amendments), 81 Group of Eight (G-8) nations, 60 immigration controls, 92 Guatemala, 29–30 172 INDEX informants U.S. networks, 24–27 protection of, 120–121 U.S. rules applicable to, 27–30 role in getting witness information, when terrorists use foreign territory, 112 19 as sources of information, 106–108 interrogation information British policies in Northern Ireland, fact-finders, 106, 121–123 124 gathered about terrorist groups, 131 coercive and custodial, 141–142 used in German computer-based by Israel’s Shin Bet, 142 cross-reference system, 134–136 U.S.