Tactical and Technological Innovation in Terrorist Campaigns

Total Page:16

File Type:pdf, Size:1020Kb

Tactical and Technological Innovation in Terrorist Campaigns This document is downloaded from DR‑NTU (https://dr.ntu.edu.sg) Nanyang Technological University, Singapore. Tactical and technological innovation in terrorist campaigns Dolnik, Adam 2006 Dolnik, A. (2006). Tactical and technological innovation in terrorist campaigns. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/14420 https://doi.org/10.32657/10356/14420 Nanyang Technological University Downloaded on 01 Oct 2021 10:16:09 SGT ATTENTION: The Singapore Copyright Act applies to the use of this document. Nanyang Technological University Library Tactical and Technological Innovation in Terrorist Campaigns Adam Dolnik Institute of Defence and Strategic Studies Thesis submitted to the Nanyang Technological University in fulfilment of the requirement for the degree of Doctor of Philosophy (Strategic Studies) 2006 1 ATTENTION: The Singapore Copyright Act applies to the use of this document. Nanyang Technological University Library ACKNOWLEDGEMENTS First and foremost, my thanks go to Dr. Rohan Gunaratna, who has guided me through this effort and who stood up for me when I needed it most. I would also like to thank all of my mentors of past and present: Jason Pate, Dr. Alex Schmid, Dr. Bruce Hoffman, Dr. Amin Tarzi, Dr. Amy Sands, Dr. Stephen Garrett, Dr. Gerard Chaliand, William Monning J.D., Dr. James Wirtz, Dr. Kumar Ramakrishna, Dr. Richard Pilch, Dr. Gavin Cameron, Dr. Jonathan Tucker, Doug MacKinnon, Eric Croddy, Kimberly McCloud, Dr. Raymond Zilinskas, Dr. William Potter, Dr. Anna Vassilieva, Dr. Ibrahim al Marashi, Sundeep Nayak, Dr. Hamidullah Tarzi and others. Special thanks to Chong Yee Ming, hands down the world’s best librarian. I would also like to thank all researchers who have contributed to the terrorism field – without your work there would be no accumulation of knowledge, and nothing for me to build on. Deep thanks go to investigators Mark Tuly, Keith Weston, Jeff Penrose and Neeraj Kumar, and to the many hostages, journalists, victims, family members and witnesses who were kind enough to share their insights with me. My thanks also go to friends and fellow travelers from Afghanistan and the Northern Caucasus Petr Lebeda, Adela Kubickova, Elena Pavlova and Kelly Mc Evers. I’m also especially thankful to Ismail for risking his life while getting me in and out of Chechnya alive. I would like to dedicate this thesis to my parents Vladislav and Jana for their life long support, and to my wife Katerina for her undying patience and encouragement. 2 ATTENTION: The Singapore Copyright Act applies to the use of this document. Nanyang Technological University Library CONTENTS Acknowledgements 2 Summary 4 Introduction 5 Chapter One Definitions and Methodology 8 Terrorism 8 Innovation 9 Methodology 12 Variables explained 20 PART I 34 Chapter Two Terrorist Tactics and Technologies 34 Primitive Assaults 34 Firearms 37 Stand-off weaponry 40 Hostage incidents 43 Sabotage 49 Bombings 53 Suicide bombings 60 CBRN agents 66 Nontraditional tactics 68 Analysis 71 The case of aviation terrorism 76 Conclusion 80 PART II 83 Chapter Three Aum Shinrikyo 83 History of operational progression 84 Analysis 94 Conclusion 112 Chapter Four Popular Front for the Liberation of Palestine-General 114 Command (PFLP-GC) History of operational progression 114 Analysis 126 Conclusion 144 Chapter Five Riyadus-Salikhin Reconnaissance and Sabotage 146 Battalion of Chechen Martyrs (RAS) History of operational progression 146 Analysis 157 Conclusion 178 Chapter Six Revolutionary Organization November 17 (17N) 179 History of operational progression 180 Analysis 187 Conclusion 204 PART III 205 Chapter Seven Toward a theory of terrorist innovation 205 Conclusion 240 After word Implications for the future 244 Bibliography 249 3 ATTENTION: The Singapore Copyright Act applies to the use of this document. Nanyang Technological University Library SUMMARY This thesis explores the subject of tactical and technological innovation in terrorist campaigns. The key question concerns the global historical trends in terrorist innovation, as well as the critical factors that are responsible for the differences in innovative practices among individual terrorist organizations. The principal method used is based on the model of structured, focused comparison developed by Alexander George. The final product then is a historical explanation of the trends in terrorist innovation, which besides contributing to theory development also has a policy relevant value by identifying the distinct characteristics of especially innovative terrorist organizations. The question of these factors is highly important, as a terrorist organization’s willingness and ability to innovate is one of the key components necessary for achieving a mass- destruction CBRN capability. Our ability to identify signature characteristics of innovation-prone terrorist organizations is thus a critical element in predictive threat assessment of future terrorist violence. The first part of the thesis focuses on general trends in terrorism, providing an overview of what tactics and technologies have been used by terrorists thus far. The aim of this section is to set the stage for further study by identifying the key points at which innovation occurred, followed by an attempt to explain the reasons behind its occurrence at those particular moments. The second part then consists of a comparative analysis of several case studies, the goal of which is take a more in depth look at the level of innovation demonstrated by various terrorist organizations in order to identify the factors that were responsible for the differences in the outcomes among these individual cases. For this purpose, ten variables hypothesized to be the key drivers behind terrorist innovations are tested in each case, in an attempt to identify the level of correlation of these variables with the level of innovativeness demonstrated by the respective groups. The final part then provides an analytical comparison of the findings, leading to the inductive construction of a comprehensive theory of terrorist innovation, which seeks to explain the circumstances and characteristics that determine a group’s involvement in tactical or technological innovation. Some of the thesis’ key findings include the observation that the main advances in terrorist methods have included incremental innovation, in the sense that terrorist have arguably improved in using the traditional tactics and technologies already available to them, as opposed to creating new means of attack per se. Another finding is that whether a group will be innovative or not will depend on a combination of factors, most importantly on the presence of expressive fascination with a sophisticated weapon or technology, or the process of innovation itself. Without the presence of this expressive component, groups forced to change their strategy, adapt to countermeasures, or prevail in competition with other groups can be expected to react by modifying their modus operandi, broadening their target categories, or intensifying their attacks, but not necessarily by engaging in radical innovation. Overall, the presence of the non-rational component such as the expressive emphasis to innovation, overly high ambitions in the operational realm, and ideological or expressive attachment to a particular type of weapon or technology serves as the strongest and most universal pre-indicator of the propensity of a terrorist group to innovate. 4 ATTENTION: The Singapore Copyright Act applies to the use of this document. Nanyang Technological University Library INTRODUCTION: Over the course of the past several years, the possibility of the use of chemical, biological, radiological, and nuclear (CBRN) weapons by terrorist groups has become a topic of an extensive academic and public debate. This debate has thus far largely oscillated around two main components: the capability to acquire and successfully weaponize CBRN agents, and the motivation to produce mass-fatalities. At the level of capability, terrorists have traditionally not been deemed to be able to overcome the significant hurdles involved in CBRN acquisition and weaponization. However, the breakup of the Soviet Union has according to many authors eroded many of these constraints. Not only has the questionable security of former state-level CBRN programs made it easier for terrorists to gain an access to lethal agents, the know-how necessary for successful weaponization of these agents has also allegedly become more available to terrorists, mainly trough the “brain drain” caused by the high level of unemployment among ex-Soviet scientists, as well as the proliferation of communication technologies such as the internet. Overall, the capability constraints associated with CBRN terrorism are generally regarded as gradually eroding. Besides the ability to acquire and weaponize successfully lethal agents, “superterrorists” must also possess the motivation to inflict indiscriminate mass casualties. But despite the fact that terrorism does typically involve killing and destruction, most traditional terrorists have practiced a level of restraint on their activities. Traditionally, terrorists have not necessarily been interested in killing a lot of people, but rather in inflicting only the minimum amount of damage necessary in order to gain publicity and spread fear, but also to attract sympathy and support. An act of mass killing would likely hinder such support rather than attract it, especially if it were to be achieved by
Recommended publications
  • Burn It Down! Anarchism, Activism, and the Vancouver Five, 1967–1985
    Burn it Down! Anarchism, Activism, and the Vancouver Five, 1967–1985 by Eryk Martin M.A., University of Victoria, 2008 B.A. (Hons.), University of Victoria, 2006 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Department of History Faculty of Arts and Social Sciences © Eryk Martin 2016 SIMON FRASER UNIVERSITY Spring 2016 Approval Name: Eryk Martin Degree: Doctor of Philosophy (History) Title: Burn it Down! Anarchism, Activism, and the Vancouver Five, 1967–1985 Examining Committee: Chair: Dimitris Krallis Associate Professor Mark Leier Senior Supervisor Professor Karen Ferguson Supervisor Professor Roxanne Panchasi Supervisor Associate Professor Lara Campbell Internal Examiner Professor Gender, Sexuality, and Women’s Studies Joan Sangster External Examiner Professor Gender and Women’s Studies Trent University Date Defended/Approved: January 15, 2016 ii Ethics Statement iii Abstract This dissertation investigates the experiences of five Canadian anarchists commonly knoWn as the Vancouver Five, Who came together in the early 1980s to destroy a BC Hydro power station in Qualicum Beach, bomb a Toronto factory that Was building parts for American cruise missiles, and assist in the firebombing of pornography stores in Vancouver. It uses these events in order to analyze the development and transformation of anarchist activism between 1967 and 1985. Focusing closely on anarchist ideas, tactics, and political projects, it explores the resurgence of anarchism as a vibrant form of leftWing activism in the late tWentieth century. In addressing the ideological basis and contested cultural meanings of armed struggle, it uncovers Why and how the Vancouver Five transformed themselves into an underground, clandestine force.
    [Show full text]
  • [Japan] SALA GIOCHI ARCADE 1000 Miglia
    SCHEDA NEW PLATINUM PI4 EDITION La seguente lista elenca la maggior parte dei titoli emulati dalla scheda NEW PLATINUM Pi4 (20.000). - I giochi per computer (Amiga, Commodore, Pc, etc) richiedono una tastiera per computer e talvolta un mouse USB da collegare alla console (in quanto tali sistemi funzionavano con mouse e tastiera). - I giochi che richiedono spinner (es. Arkanoid), volanti (giochi di corse), pistole (es. Duck Hunt) potrebbero non essere controllabili con joystick, ma richiedono periferiche ad hoc, al momento non configurabili. - I giochi che richiedono controller analogici (Playstation, Nintendo 64, etc etc) potrebbero non essere controllabili con plance a levetta singola, ma richiedono, appunto, un joypad con analogici (venduto separatamente). - Questo elenco è relativo alla scheda NEW PLATINUM EDITION basata su Raspberry Pi4. - Gli emulatori di sistemi 3D (Playstation, Nintendo64, Dreamcast) e PC (Amiga, Commodore) sono presenti SOLO nella NEW PLATINUM Pi4 e non sulle versioni Pi3 Plus e Gold. - Gli emulatori Atomiswave, Sega Naomi (Virtua Tennis, Virtua Striker, etc.) sono presenti SOLO nelle schede Pi4. - La versione PLUS Pi3B+ emula solo 550 titoli ARCADE, generati casualmente al momento dell'acquisto e non modificabile. Ultimo aggiornamento 2 Settembre 2020 NOME GIOCO EMULATORE 005 SALA GIOCHI ARCADE 1 On 1 Government [Japan] SALA GIOCHI ARCADE 1000 Miglia: Great 1000 Miles Rally SALA GIOCHI ARCADE 10-Yard Fight SALA GIOCHI ARCADE 18 Holes Pro Golf SALA GIOCHI ARCADE 1941: Counter Attack SALA GIOCHI ARCADE 1942 SALA GIOCHI ARCADE 1943 Kai: Midway Kaisen SALA GIOCHI ARCADE 1943: The Battle of Midway [Europe] SALA GIOCHI ARCADE 1944 : The Loop Master [USA] SALA GIOCHI ARCADE 1945k III SALA GIOCHI ARCADE 19XX : The War Against Destiny [USA] SALA GIOCHI ARCADE 2 On 2 Open Ice Challenge SALA GIOCHI ARCADE 4-D Warriors SALA GIOCHI ARCADE 64th.
    [Show full text]
  • 2017 National History Bowl National Championships Playoff Round 7
    2017 National History Bowl National Championships Playoff Round 7 Round: Playoffs 7 Supergroup Group Room: Reader: Scorekeep: Team Names, including letter designation if needed, go in the large boxes to the right. TU# Bonus Bonus Points Cumulative Score Bonus Points Cumulative Score 1 Quarter 1 2 Tossups Only 3 4 Put a "10" in the 5 column of the team 6 that answers correctly. 7 Otherwise leave box 8 blank. 9 10 1 Quarter 2 2 Tossups and bonuses 3 Put "10" in the team's 4 column. Otherwise, 5 leave box blank. 6 For bonuses, put "0" or 7 Substitutions allowed between Qtrs all "10" in the bonus 8 column. 9 10 Quarter 3 points points 60 sec. rds - trailing team Lightning Lightning goes first. 10 pts each. Bounceback Bounceback 20 pt bonus for sweep! Total Total 1 Quarter 4 2 Tossups worth 30, 20, or 3 10 points each 4 Put the appropriate 5 number in the column of 6 the team that answers 7 correctly. Otherwise leave 8 box blank. 9 10 Tiebreakers 1 Tiebreak questions Tie Breaker (Sudden are only used 2 have no point value Victory) to determine winner! 3 at all! Final Score NHBB Nationals Bowl 2016-2017 Bowl Playoff Packet 7 Bowl Playoff Packet 7 First Quarter (1) Description acceptable. This event was thought to have occurred in retaliation for the bombing of the perpetrator's Tunisian headquarters in Operation Wooden Leg. Muhammad Zaidan organized this event, which involved the redirection of a vessel to Tartus, Syria. A John Adams opera focusing on this event opens with two choruses of exiles and is named after its only casualty, the 69-year old Leon Klinghoffer.
    [Show full text]
  • Unholy Alliance. the Connection Between the East German Stasi and the Right-Wing Terrorist Odfried Hepp
    Unholy Alliance. The Connection between the East German Stasi and the Right-Wing Terrorist Odfried Hepp Bernhard Blumenau Introduction On 18 February 1983, a young man, aged 23, suspected that the police were keeping his apartment under surveillance and took his rucksack, climbed onto an adjacent balcony to hide there until the police were gone. In the depth of night, he left the building and ran ceaselessly through the streets of West Berlin. Finally, to confuse his pursuers, he took several taxis, as well as the U-Bahn, to the Friedrichstraße checkpoint between West Berlin and the German Democratic Republic (GDR), where he arrived just before 6 am. Announcing himself to the East German border guards, he waited in a backroom until he was finally picked up by an officer of the East German State Security, the Stasi.1 This man, Odfried Hepp (aka ‘Friedrich’ in the Stasi files), was one of the most wanted right-wing terrorists2 in the Federal Republic of Germany (FRG) in the 1980s. What sounds like an extract from a spy novel is only one of the highlights of a story that has all the basic ingredients of a thriller: murders and bank robberies, a young man driven by – however abhorrent – political and idealistic beliefs, Cold War politics, Palestinian ‘freedom fighters’, boot camps in the Middle East, spies, and fake identities. Yet this story, which is at the centre of this article, is not fiction – it is the very real account of the life of Odfried Hepp as well as a glimpse at radicalisation and political extremism as well as right-wing terrorism in West Germany, the dimensions of the German- German Cold War struggle and the GDR’s relationship with terrorism.
    [Show full text]
  • The Anglo/American - Nazi War
    The Anglo/American - Nazi War By CalBear Preface (Page 1) Before examining the actual final conflict between the Western democracies, chiefly Canada, Great Britain, and the United States and Nazi Germany, it is worth reviewing the circumstances that brought the world to that critical juncture. In 1939 Nazi Germany, then also called the “Third Reich” or simply the Reich, had initiated the European Phase of the Second World War with the invasion of Poland. At the time of the invasion Germany was in a state of near alliance with the Soviet Union with Soviet oil and agriculture providing much of Reich’s fuel and food. Poland was supported by both France and Great Britain and the two Western states had made clear that an attack on Poland would lead to war. It has long been debated why the Democracies waited until the Polish crisis to confront the still developing German war machine, but the decisions made in both London and Paris in late summer of 1939 were resolute and both nations believed that their combined power would be sufficient to deter Adolph Hitler’s Germany from aggression against Poland. On September 1, 1939 Hitler demonstrated his contempt for, and disbelief in, the Democracies statements and warnings when the German military (or, as it was known at the time, the Wehrmacht) crossed the international frontier separating Germany and Poland, and unleashed an early version of mechanized warfare against the Polish Army. Shortly after the Reich’s invasion of Poland, its quasi-ally the Soviet Union entered Poland and annexed a significant portion of the country’s eastern provinces.
    [Show full text]
  • Date Event Source 1 October 1990 Usama Bin Ladin (UBL) Sent
    Date Event Source 1 October 1990 Usama bin Ladin (UBL) sent “emissaries to Jordan … to meet with Iraqi government officials” ‘Summary of Body of Intelligence among a delegation, led by Hassan al-Turabi, the de facto leader of Sudan’s Islamist regime, which Reporting on Iraq-al Qaeda made a public display of defending Saddam’s annexation of Kuwait. Al-Turabi was the primary Contacts (1990-2003)’, a.k.a. intermediary between Saddam and al-Qaeda in these early years. “The Feith Memo”, a classified annex of a Pentagon report sent to the Senate Intelligence Committee in October 2003, drawing from detainee debriefings, communications intercepts (SIGINT), open sources, raw intelligence, and finished products of the CIA, NSA, and FBI. Pieces are available here, here, here, and here. 19 January 1991 An event remembered to history as Operation DOGMEAT: The bombing phase of DESERT The Connection (2004), by Stephen STORM had begun two days before, and Ahmed J. Ahmed and Abdul Kadham Saad, two Iraqi Hayes students, attempted to bomb the Thomas Jefferson Cultural Center in Manila, the Philippines. Unfortunately (for them) the bomb went off early, killing Ahmed. Saad recited the Iraqi Embassy’s telephone number from memory at the hospital when asked for a contact. Muwafak al-Ani, the Iraqi consul general at the Philippine Embassy, in reality one of Saddam’s top intelligence officers in East Asia, met with the bombers five times in the run-up to the attack; indeed his car delivered the bombers to within a few blocks of their target. Al-Ani and the brothers Husam and Hisham Abdul Sattar were ordered out of the country for involvement in this.
    [Show full text]
  • A Day in the Salient with Bernard Comyn by Ian Chambers, August 2007
    A Day in the Salient with Bernard Comyn by Ian Chambers, August 2007 Bernard is a friend of Harry Canvin, and knowing that I was spending a few days in the Salient, Harry arranged for Gary and me to spend a day with him. Bernard, (pictured here with my son Gary) is, I would guess, in his early seventies and was born in Zillebeke, where he still lives. He is a walking encyclopaedia on the war in the Salient and once you have spent a little time with him it soon becomes clear that he gets great enjoyment from passing that knowledge on. Our first stop was Hill 60, which is on the outskirts of Zillebeke. This mound, 60 metres high, was of great importance bearing in mind the general low lying nature of most of the area. It was held by the Germans until 7 June 1917 when a series of mines was detonated over the Messines Ridge area to signal the start of what became known as the Battle of Messines. The tunnel to Hill 60 was 1,380 feet long and was officially known as The Berlin Sap, just before it reached Hill 60 the tunnel branched off to run under another German position known as The Caterpillar which was a second "hill" formed from the spoil from the railway cutting. In total 123,500 pounds of ammonal and guncotton was placed under the two hills and when both mines exploded as planned, this allowed British troops to storm and capture them and they remained in British hands until the German advance of 1918.
    [Show full text]
  • Book XVIII Prizes and Organizations Editor: Ramon F
    8 88 8 88 Organizations 8888on.com 8888 Basic Photography in 180 Days Book XVIII Prizes and Organizations Editor: Ramon F. aeroramon.com Contents 1 Day 1 1 1.1 Group f/64 ............................................... 1 1.1.1 Background .......................................... 2 1.1.2 Formation and participants .................................. 2 1.1.3 Name and purpose ...................................... 4 1.1.4 Manifesto ........................................... 4 1.1.5 Aesthetics ........................................... 5 1.1.6 History ............................................ 5 1.1.7 Notes ............................................. 5 1.1.8 Sources ............................................ 6 1.2 Magnum Photos ............................................ 6 1.2.1 Founding of agency ...................................... 6 1.2.2 Elections of new members .................................. 6 1.2.3 Photographic collection .................................... 8 1.2.4 Graduate Photographers Award ................................ 8 1.2.5 Member list .......................................... 8 1.2.6 Books ............................................. 8 1.2.7 See also ............................................ 9 1.2.8 References .......................................... 9 1.2.9 External links ......................................... 12 1.3 International Center of Photography ................................. 12 1.3.1 History ............................................ 12 1.3.2 School at ICP ........................................
    [Show full text]
  • Digest of Terrorist Cases
    back to navigation page Vienna International Centre, PO Box 500, 1400 Vienna, Austria Tel.: (+43-1) 26060-0, Fax: (+43-1) 26060-5866, www.unodc.org Digest of Terrorist Cases United Nations publication Printed in Austria *0986635*V.09-86635—March 2010—500 UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Digest of Terrorist Cases UNITED NATIONS New York, 2010 This publication is dedicated to victims of terrorist acts worldwide © United Nations Office on Drugs and Crime, January 2010. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication has not been formally edited. Publishing production: UNOV/DM/CMS/EPLS/Electronic Publishing Unit. “Terrorists may exploit vulnerabilities and grievances to breed extremism at the local level, but they can quickly connect with others at the international level. Similarly, the struggle against terrorism requires us to share experiences and best practices at the global level.” “The UN system has a vital contribution to make in all the relevant areas— from promoting the rule of law and effective criminal justice systems to ensuring countries have the means to counter the financing of terrorism; from strengthening capacity to prevent nuclear, biological, chemical, or radiological materials from falling into the
    [Show full text]
  • Narcotics Funded Terrorists/Extremist Groups
    A GLOBAL OVERVIEW OF NARCOTICS-FUNDED TERRORIST AND OTHER EXTREMIST GROUPS A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Department of Defense May 2002 Researchers: LaVerle Berry Glenn E. Curtis Rex A. Hudson Nina A. Kollars Project Manager: Rex A. Hudson Federal Research Division Library of Congress Washington, D.C. 20540−4840 Tel: 202−707−3900 Fax: 202−707−3920 E-Mail: [email protected] Homepage: http://www.loc.go v/rr/frd/ Library of Congress – Federal Research Division Narcotics-Funded Terrorist/Extremist Groups PREFACE This global survey, based entirely on open sources, is intended to provide an assessment of the nexus between selected anti-U.S. terrorist and extremist groups in the world and organized crime, specifically drug trafficking, and how this relationship might be vulnerable to countermeasures. More specifically, the aim is to help develop a causal model for identifying critical nodes in terrorist and other extremist networks that can be exploited by Allied technology, just as counterdrug technology has been used in the war against drug trafficking. To this end, the four analysts involved in this study have examined connections between extremist groups and narcotics trafficking in the following countries, listed by region in order of discussion in the text: Latin America: Triborder Region (Argentina, Brazil, and Paraguay), Colombia, and Peru; the Middle East: Lebanon; Southern Europe (Albania and Macedonia); Central Asia: Kyrgyzstan, Tajikistan, and Uzbekistan; and East Asia: Philippines. These are preliminary, not definitive, surveys. Most of the groups examined in this study have been designated foreign terrorist organizations by the U.S.
    [Show full text]
  • Hijacking of Air France Airbus by Followers of Popular Front for The
    Keesing's Record of World Events (formerly Keesing's Contemporary Archives), Volume 22, August, 1976 France, Israeli, Ugandan, Britain, Kenya, Uganda, Page 27888 © 1931-2006 Keesing's Worldwide, LLC - All Rights Reserved. Hijacking of Air France Airbus by Followers of Popular Front for the Liberation of Palestine - Israeli Action to liberate Hostages held at Entebbe Airport - Inconclusive Debate at UN security Council - Ugandan Recriminations against Britain and Kenya - Severance of Diplomatic Relations with Uganda by Britain An Air France A300-B airbus, under way from Tel Aviv to Paris and carrying a crew of 12 and 247 passengers, was hijacked shortly after it had taken off from Athens at 11.55 a.m. on June 27, 1976, by an armed group of three men and a woman calling itself the Che Guevara cell of the Haifa section of the Popular Front for the Liberation of Palestine (PFLP). A spokesman for the PFLP in Damascus telephoned the Reuter office in Kuwait on the same day to announce his organization's responsibility for the hijacking, but a Beirut spokesman for the PFLP denied on June 28 that it had anything to do with the action. The PFLP led by Dr George Habash, is part of the "rejection front" whwich opposes any "partal" settlement which would guuarantee the existence of a Jewish state on the territory of Plestine—see 26961.] The leader of the hijackers was Herr Wilfried Bose (27), a West German lawyer who had been part of the PFLP network, for whose terrorist activities in Europe Sr Ilich Ramirez Sánchez (alias Carlos Martínez or "The Jackal") had been responsible [see 27587].
    [Show full text]
  • Commerce in Explosives; 2020 Annual Those on the Annual List
    Federal Register / Vol. 85, No. 247 / Wednesday, December 23, 2020 / Notices 83999 inspection at the Office of the Secretary or synonyms in brackets. This list Black powder substitutes. and on EDIS.3 supersedes the List of Explosive *Blasting agents, nitro-carbo-nitrates, This action is taken under the Materials published in the Federal including non-cap sensitive slurry and authority of section 337 of the Tariff Act Register on January 2, 2020 (Docket No. water gel explosives. of 1930, as amended (19 U.S.C. 1337), 2019R–04, 85 FR 128). Blasting caps. and of §§ 201.10 and 210.8(c) of the The 2020 List of Explosive Materials Blasting gelatin. Commission’s Rules of Practice and is a comprehensive list, but is not all- Blasting powder. Procedure (19 CFR 201.10, 210.8(c)). inclusive. The definition of ‘‘explosive BTNEC [bis (trinitroethyl) carbonate]. materials’’ includes ‘‘[e]xplosives, BTNEN [bis (trinitroethyl) nitramine]. By order of the Commission. BTTN [1,2,4 butanetriol trinitrate]. Issued: December 18, 2020. blasting agents, water gels and detonators. Explosive materials, Bulk salutes. William Bishop, include, but are not limited to, all items Butyl tetryl. Supervisory Hearings and Information in the ‘List of Explosive Materials’ Officer. C provided for in § 555.23.’’ 27 CFR Calcium nitrate explosive mixture. [FR Doc. 2020–28458 Filed 12–22–20; 8:45 am] 555.11. Accordingly, the fact that an BILLING CODE 7020–02–P Cellulose hexanitrate explosive explosive material is not on the annual mixture. list does not mean that it is not within Chlorate explosive mixtures. coverage of the law if it otherwise meets DEPARTMENT OF JUSTICE Composition A and variations.
    [Show full text]