FM 3-37.2. Antiterrorism

Total Page:16

File Type:pdf, Size:1020Kb

FM 3-37.2. Antiterrorism FM 3-37.2 ANTITERRORISM February 2011 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. government agencies and their contractors only to protect operational information. This determination was made on 1 June 2010. Other requests for this document must be referred to Commandant, U.S. Army Military Police School, ATTN: ATZT-CDC, 320 MANSCEN Loop, Suite 270, Fort Leonard Wood, MO 65473-8929. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). FM 3-37.2 Field Manual Headquarters No. 3-37.2 Department of the Army Washington, DC, 18 February 2011 Antiterrorism Contents Page PREFACE .............................................................................................................iv INTRODUCTION ....................................................................................................v Chapter 1 TERRORISM IN THE OPERATIONAL ENVIRONMENT .................................. 1-1 Strategic Context ................................................................................................ 1-1 Antiterrorism in Army Operations ....................................................................... 1-3 Spectrum of Conflict ........................................................................................... 1-4 Operational Themes ........................................................................................... 1-4 Irregular Warfare ................................................................................................ 1-5 Full Spectrum Operations ................................................................................... 1-7 Operational Variables ......................................................................................... 1-8 Evolution of Terrorism ...................................................................................... 1-12 Chapter 2 TERRORIST TACTICS ...................................................................................... 2-1 Armed Nonstate Groups ..................................................................................... 2-1 Terrorist Networks .............................................................................................. 2-3 Terrorist Planning Cycle ................................................................................... 2-13 Threat Vulnerabilities ........................................................................................ 2-16 Terrorist Tactics ................................................................................................ 2-17 Chapter 3 FOUNDATIONS OF ANTITERRORISM ............................................................ 3-1 Combating Terrorism .......................................................................................... 3-1 Protection Warfighting Function ......................................................................... 3-2 Antiterrorism Principles ...................................................................................... 3-4 Deployed Antiterrorism Program ........................................................................ 3-6 Chapter 4 EXECUTING ANTITERRORISM MEASURES .................................................. 4-1 Movement ........................................................................................................... 4-1 Defensive Operations ......................................................................................... 4-9 Offensive Operations ........................................................................................ 4-14 Stability Operations .......................................................................................... 4-16 Civil Support Operations .................................................................................. 4-17 Distribution Restriction: Distribution authorized to U.S. government agencies and their contractors only to protect operational information. This determination was made on 1 June 2010. Other requests for this document must be referred to Commandant, U.S. Army Military Police School, ATTN: ATZT-CDC, 320 MANSCEN Loop, Suite 270, Fort Leonard Wood, MO 65473-8929. Destruction Notice: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. 18 February 2011 FM 3-37.2 i Contents Chapter 5 INTEGRATION INTO THE OPERATIONS PROCESS ......................................5-1 Command and Control Activities ........................................................................5-1 Planning ..............................................................................................................5-2 Preparation..........................................................................................................5-8 Execution ............................................................................................................5-9 Assessment .......................................................................................................5-10 Chapter 6 ANTITERRORISM OFFICER IN THE FORCE...................................................6-1 Roles and Responsibilities ..................................................................................6-1 Echelons Above Corps .......................................................................................6-2 Corps and Divisions ............................................................................................6-4 Brigades and Battalions ......................................................................................6-5 Companies ..........................................................................................................6-6 Protection Cells ...................................................................................................6-6 Working Groups ..................................................................................................6-6 Appendix A METRIC CONVERSION CHART ...................................................................... A-1 Appendix B PERSONAL PROTECTION MEASURES ......................................................... B-1 Appendix C ANTITERRORISM EXERCISES ....................................................................... C-1 Appendix D ANTITERRORISM MEASURES IN OPERATIONAL CONTRACT SUPPORT D-1 Appendix E ANTITERRORISM ASSESSMENTS ................................................................. E-1 GLOSSARY .............................................................................................................. Glossary-1 REFERENCES .......................................................................................................... References-1 INDEX .................................................................................................................... Index-1 Figures Figure 1-1. Challenges within persistent conflict .............................................................1-2 Figure 1-2. AT support across the spectrum of conflict ...................................................1-4 Figure 1-3. Full spectrum operations and adversary influencers ....................................1-8 Figure 2-1. Terrorist network............................................................................................2-4 Figure 2-2. Operational reach of terrorists .......................................................................2-9 Figure 2-3. Terrorist organizational support pyramid.....................................................2-11 Figure 2-4. Terrorist planning cycle ...............................................................................2-13 Figure 2-5. Khobar Towers 1996 bombing incident .......................................................2-21 Figure 2-6. Attack on the USS Cole ...............................................................................2-23 Figure 3-1. AT supported functions .................................................................................3-3 Figure 3-2. AT principles ..................................................................................................3-5 Figure 3-3. Army tactical tasks and supporting AT tasks ................................................3-7 Figure 4-1. Threats to in-transit movements ....................................................................4-2 Figure 5-1. The operations process and mission command ...........................................5-1 Figure 6-1. AT tasks and principles .................................................................................6-2 Figure C-1. Training exercise selection process ............................................................ C-2 Figure C-2. Nested concepts within mission command.................................................. C-4 ii FM 3-37.2 18 February 2011 Contents Figure C-3. Protection tasks within the Army universal task list .....................................C-6 Figure C-4. Sample timeline for exercise development ..................................................C-7 Figure E-1. Sample threat matrix .................................................................................... E-5 Figure E-2. Sample criticality assessment matrix ........................................................... E-6 Figure E-3. Sample MSHARPP prioritization matrix ....................................................... E-7 Figure E-4. Sample
Recommended publications
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-Terrorism Related Subjects by Joshua Sinai
    PERSPECTIVES ON TERRORISM Volume 8, Issue 1 IV. Book Reviews “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects by Joshua Sinai "is column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by signi$cant publishers (listed in alphabetical order) - capsule reviews of 13 important books published by CRC Press. Note: Future columns will review books by publishers such as Hurst, Oxford University Press, Palgrave Macmillan, Polity, Routledge, Rowman & Little#eld, Springer, Stanford University Press, and the University of Chicago Press. General Reviews Gershon Baskin, with Ilene Prusher, !e Negotiator: Freeing Gilad Schalit From Hamas. New Milford, CT: "e Toby Press, 2013. 283 pages, US$24.95 [Hardcover], ISBN: 978-1592643493. "is is a $rst-hand account by an American-Israeli peace activist of his role in arranging for the release of Gilad Schalit, an Israeli soldier who was kidnapped by Hamas in 2006. Schalit was released in October 2011 as part of an exchange deal by the Israeli government and Hamas for 1,027 Palestinian and Israeli Arab prisoners with a nexus to terrorist activity. Acting in his non-governmental capacity, Jerusalem-based Dr. Baskin was extensively involved (with other players) in the secret back channel negotiations between Israel and Hamas, with these dealings and the wider context in which they were conducted revealed in the letters, e-mails, and other documents that were exchanged between the players over the $ve-year period, which are contained in the book, thus making it a valuable primary source for those analyzing Israeli-Hamas relations.
    [Show full text]
  • The Davidians of Waco
    THE DAVIDIANS OF WACO BY VANCE FERRELL THE STORY BEHIND THE STORY -THE DAVIDIANS OF WACO * Who was David Koresh? * Where did he come from? * How could he take control of the minds and bodies of nearly 150 people? * Why did they let him do it? IN THIS BOOK, YOU WILL FIND THE ASTOUNDING STORY OF THIS STRANGE ORGANIZATION. * How it started over 60 years ago, by a man that a European nation expelled. * The strange reason they moved to Waco in 1935. * The terrible crisis which developed from 1955 to 1962. * The blood feud between two men in the 1980s—out of which Koresh emerged as the leader. * His food and munitions preparations to withstand an attack by the world. * In detail: the astonishing events of February 28, 1993, when the Waco raid shocked America into forgetting for a day the twin towers blast of two days earlier. * Clear evidence that, from its beginning, the Shepherd's Rod/Davidians have not been connected with the Seventh-day Adventist Church. TABLE OF CONTENTS 1 - The Houteff Years - 1 ...................................... page 1 The Rod in Southern California 1929-1942 Houghton Starts the Rod ....................................... page 2 The Meetings Begin .............................................. page 3 2 - The Houteff Years - 2 ...................................... page 7 The Rod in Waco, Texas 1935-1955 Changing the Name to Davidian .......................... page 10 3 - The Rod In Waco, Texas - 3 .......................... page 12 The Florence Houteff Years 1955-1962 The 1955 Time Prophecy.....................................page 14 The 1959 Gathering ............................................ page 17 Florence Steps In—And Closes It .... page 18 4 - The Roden Years - 4 ..................................... page 25 The Branch In Riverside And Waco 1962-1983 5 - The Howell/Koresh Years - 5 ........................
    [Show full text]
  • Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes
    PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Bibliography: Terrorist Tactics and Strategies Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2018-6] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on terrorist tactics and strategies (such as the planning of attacks, targeting, decision making, and successful or failed plots). Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to September 2018. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography; resources; literature; terrorism; tactics, strategies, planning, plots, attacks, targeting, decision making NB: All websites were last visited on 16.09.2018. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Al-Khalidi, Ashraf; Renahan, Thomas (Eds.) (2015, May-): Daesh Daily: An Update On ISIS Activities. URL: http://www.daeshdaily.com Atkins, Stephen E. (2011): Annotated Bibliography. In: Stephen E. Atkins (Ed.): The 9/11 Encyclopedia. (Vol. 1). (2nd ed.). Santa Barbara: ABC-CLIO, 481-508. Bergen, Peter et al. (2016-): Terrorism in America after 9/11. (New America In-Depth Report). URL: https:// www.newamerica.org/in-depth/terrorism-in-america Bowie, Neil G. (2017, August): Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017. Perspectives on Terrorism, 11(4), 50-72. URL: https://www.universiteitleiden.nl/binaries/content/assets/ customsites/perspectives-on-terrorism/2017/issue-4/0620174-terrorism-events-data-an-inventory-of- databases-and-data-sets-1968-2017-by-neil-g.-bowie.pdf Bowie, Neil G.; Schmid, Alex P.
    [Show full text]
  • Thecultphenomenonhowgroup
    Authors: Mike Kropveld Executive Director Info-Cult Marie-Andrée Pelland Doctoral Student in Criminology Université de Montréal Translated by: Natasha DeCruz Gwendolyn Schulman Linguistic Landscapes Cover Design by: Philippe Lamoureux This book was made possible through the financial support of the Ministère des Relations avec les citoyens et de l'Immigration. However, the opinions expressed herein are those of the authors. The translation from the French version (Le phénomène des sectes: L’étude du fonctionnement des groupes ©2003) into English was made possible through the financial support of Canadian Heritage. ©Info-Cult 2006 ISBN: 2-9808258-1-6 The Cult Phenomenon: How Groups Function ii Contents Contents ....................................................................................................................... ii Preface .......................................................................................................................viii Introduction ...................................................................................................................1 Chapter 1: History of Info-Cult.......................................................................................3 Cult Project................................................................................................................3 Description.............................................................................................................3 Cult Project’s objectives.........................................................................................4
    [Show full text]
  • HLS 225 Legal and Ethical Issues in Homeland Security
    Christopher Wren Association Week 2 Terrorism, Cybersecurity, Disaster Response What We’ll Learn in Week 2 The Homeland Security Enterprise takes a broad “All Hazards” approach to threats—preventing and responding to both man-made and natural threats Terrorism, Cyber, other Man-Made, and Natural Threats are reviewed in Week 2 U.S. interagency responses to these threats have improved since 9/11—but are far from totally ready Fundamental and Powerful Concept: DHS “All Hazards” Threat State (define): all natural and man-made hazards that can threaten the US homeland. Elaborate: includes natural hazards and threats, e.g., weather, geologic, disease, etc., and man-made hazards and threats to include both accidents and deliberate attempts to harm people, infrastructure, or resources. Exemplify: a hurricane is a natural hazard, a bridge or dam collapse is a man-made accident (hazard), a terrorist attack is a man-made hazard. An attack by a foreign military on U.S. territory is not an all hazards attack for DHS action—but is a national security issue to be handled by DOD. Illustrate: as doctors must diagnose and treat a person for all manner of different diseases and other afflictions, the Homeland Security Enterprise is responsible for preparing and responding to U.S. “all hazard” threats Defining the Virginia “All Hazards” Threat Terrorism-Related: WMD Weather-Related: Floods, (Nuclear/Radiological (Dirty Tornadoes, Hurricanes, Tropical Bombs), Chemical, Biological), Storms, Thunderstorms, Winter Explosive Devices (IED, etc.), Cyber
    [Show full text]
  • Terrorism and Responses Mr
    Terrorism and Responses Mr. Yisrael Neeman Course Number: 702.2199 Office Hours: TBA Semester: Spring 2019 Location: TBA Class Time: Thursday 15:15-17:45 Phone: 04-824-2065 Class Location: TBA E-Mail: [email protected] Course Description: This course will examine the issue of terrorism as a growing form of political violence into the 21st Century. The last three decades of the 20th Century witnessed a phenomenal growth in terrorist activity around the world. Some groups rose and fell quite rapidly, but others have managed sustained campaigns and have achieved spectacular tactical success, among them the attacks on the United States on September 11, 2001. We will investigate the causes, methods and responses involved in the ongoing conflict between terrorist organizations and their adversaries. Topics covered will include: What is terrorism, as distinct from other forms of violence? What are the objectives of terrorists? What are the strategy and tactics of terrorists? Is suicide terrorism a distinct form of terrorism or another tactic among many? Why do terrorists use the tactics of terrorism? Is the use of terrorist tactics ever justified? What is the history of terrorism and terrorist organizations? What are some of the major terrorist groups active today? How do religious beliefs and ideological dogma aid terrorists? Does terrorism work? Does it achieve strategic goals? How do terrorist organizations transform? Can terrorism be deterred, defeated or prevented? Is there a military solution? Is the use of torture ever justified for extracting information from terrorists? Targeted assassination? Requirements, grades, and so on 1 This course has just a few simple requirements: read the assignments, attend class, participate in discussions, write the papers, and pass the tests.
    [Show full text]
  • Perspectives on Terrorism, Volume 5, Issue
    Volume V, Issues 3-4 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Special Double Issue on Terrorism and Political Violence in Africa Guest Editors: James J. F. Forest and Jennifer Giroux 2 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Table of Contents: Articles Terrorism and Political Violence in Africa: Contemporary Trends in a Shifting Terrain ................................................................................................5 by James J.F. Forest and Jennifer Giroux Terrorism in Liberation Struggles: Interrogating the Engagement Tactics of the Movement for the Emancipation of the Niger Delta ........................18 by Ibaba Samuel Ibaba ‘Forcing the Horse to Drink or Making it Realise its Thirst’? Understanding the Enactment of Anti-Terrorism Legislation (ATL) in Nigeria .............................................................................................................33 by Isaac Terwase Sampson and Freedom C. Onuoha Opportunity Costs or Costly Opportunities? The Arab Spring, Osama Bin Laden, and Al-Qaeda's African Affiliates .............................................50 by Alex S. Wilner Al-Qaeda's Influence in Sub-Saharan Africa: Myths, Realities and Possibilities .....................................................................................................63 by James J.F. Forest From Theory to Practice: Exploring the Organised Crime-Terror Nexus in Sub-Saharan Africa ...................................................................................81 by Annette
    [Show full text]
  • Integrated Helicopter Survivability
    Cranfield University Nicholas G. Law Integrated Helicopter Survivability Aeromechanical Systems Group Cranfield Defence and Security PhD DSTL/PUB36228 Cranfield University Cranfield Defence and Security Aeromechanical Systems Group PhD 2011 Nicholas G. Law Integrated Helicopter Survivability Supervisor: Prof. Kevin Knowles May 2011 © Crown copyright 2011. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO. DISCLAIMER Any views expressed are those of the author and do not necessarily represent those of Dstl, MOD or any other UK government department. ABSTRACT A high level of survivability is important to protect military personnel and equipment and is central to UK defence policy. Integrated Survivability is the systems engineering methodology to achieve optimum survivability at an affordable cost, enabling a mission to be completed successfully in the face of a hostile environment. “Integrated Helicopter Survivability” is an emerging discipline that is applying this systems engineering approach within the helicopter domain. Philosophically the overall survivability objective is ‘zero attrition’, even though this is unobtainable in practice. The research question was: “How can helicopter survivability be assessed in an integrated way so that the best possible level of survivability can be achieved within the constraints and how will the associated methods support the acquisition process?” The research found that principles from safety management could be applied to the survivability problem, in particular reducing survivability risk to as low as reasonably practicable (ALARP). A survivability assessment process was developed to support this approach and was linked into the military helicopter life cycle. This process positioned the survivability assessment methods and associated input data derivation activities.
    [Show full text]
  • The Anatomy of Undue Influence Used by Terrorists Cults And
    Ethics, Medicine and Public Health (2019) 8, 97—107 Available online at ScienceDirect www.sciencedirect.com STUDIES The anatomy of undue influence used by terrorist cults and traffickers to induce helplessness and trauma, so creating false identities Anatomie de l’influence indue utilisée par les sectes et les trafiquants terroristes pour induire l’impuissance et le traumatisme, créant ainsi de fausses identités a,∗ b S.A. Hassan (MEd, LMHC, NCC) , M.J. Shah (MA) a Freedom of Mind Resource Center Inc., 716 Beacon Street #590443, 02459 Newton, MA, USA b Dare Association, Inc., 234, Huron Avenue, Cambridge, 02138 MA, USA Received 1st August 2018; accepted 1st March 2019 KEYWORDS Summary There is a need to update the legal system to recognize the use of hypnosis and BITE model; undue influence occurring throughout the world. Extremist groups are deceptively recruiting Brainwashing; and indoctrinating people to do terrorist attacks. Human traffickers are grooming and using Coercive control; hypnosis and social influence techniques to create labor and sex slaves. In this paper, a num- Dissociative identity ber of key concepts and models will be used to more fully define DSM-5’s Dissociative Disorder disorder; 300.15: Festinger’s Cognitive Dissonance Theory, along with Robert Jay Lifton and Margaret Influence continuum; Singer’s work (1995) are the foundation of the BITE model of mind control (Hassan, 1988). Mind control; Behavior, Information, Thought, and Emotional Control are the four overlapping components Thought reform; through which destructive groups bring people to be obedient and compliant to authority. A Undue influence programmed cult identity is created through a complex social influence process.
    [Show full text]
  • Pakistan Response Towards Terrorism: a Case Study of Musharraf Regime
    PAKISTAN RESPONSE TOWARDS TERRORISM: A CASE STUDY OF MUSHARRAF REGIME By: SHABANA FAYYAZ A thesis Submitted to the University of Birmingham For the degree of DOCTOR OF PHILOSOPHY Department of Political Science and International Studies The University of Birmingham May 2010 University of Birmingham Research Archive e-theses repository This unpublished thesis/dissertation is copyright of the author and/or third parties. The intellectual property rights of the author or third parties in respect of this work are as defined by The Copyright Designs and Patents Act 1988 or as modified by any successor legislation. Any use made of information contained in this thesis/dissertation must be in accordance with that legislation and must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the permission of the copyright holder. ABSTRACT The ranging course of terrorism banishing peace and security prospects of today’s Pakistan is seen as a domestic effluent of its own flawed policies, bad governance, and lack of social justice and rule of law in society and widening gulf of trust between the rulers and the ruled. The study focused on policies and performance of the Musharraf government since assuming the mantle of front ranking ally of the United States in its so called ‘war on terror’. The causes of reversal of pre nine-eleven position on Afghanistan and support of its Taliban’s rulers are examined in the light of the geo-strategic compulsions of that crucial time and the structural weakness of military rule that needed external props for legitimacy. The flaws of the response to the terrorist challenges are traced to its total dependence on the hard option to the total neglect of the human factor from which the thesis develops its argument for a holistic approach to security in which the people occupy a central position.
    [Show full text]
  • National Drug Threat Assessment 2004: Threat Matrix
    National Drug Threat Assessment 2004: Threat Matrix Seized Primary Markets Wholesale Retail Source Transit Entry Points Key Illicit Drug en route/within and Principal Price Range Price Range Retailers Projections Locations Countries into U.S. Developments U.S. in 2002 Suppliers in the U.S. in the U.S. Foreign: Colombia, 101,877.8 kg Mexico, Central SWB states (Texas, Atlanta: Mexican, Dominican $10,000-$38,000 per kg $20-$200 per gram African American and DEA Cocaine Signature Potential worldwide cocaine Peru, Bolivia (352,000 kg reportedly American countries, California, Arizona, Chicago: Mexican, Colombian, (powder) (powder) Hispanic criminal groups Program data indicate production will likely decrease Domestic: None available to U.S. markets) Caribbean island nations New Mexico), Dominican $5-$100 per rock (crack) and street gangs; that average wholesale slightly due to increases in Miami/S Florida, Houston: Mexican, Colombian Caucasian local cocaine purity may be eradication and coca spray New York Los Angeles: Mexican, independent dealers; increasing after previous operations as well as a Cocaine Colombian Dominican, Haitian, decreases each year resumption of the Airbridge Miami: Colombian Jamaican, Mexican, between 1999 and 2002. Denial Program. This may New York: Colombian, Mexican, Native American, and result in a decrease in Dominican (also Jamaican, Puerto Rican criminal cocaine availability in the Puerto Rican, and Traditional groups United States. Organized Crime groups) Foreign: Mexico and, 2,512.6 kg Mexican: Direct from
    [Show full text]