목차 일부
CONTENTS
List of figures and tables ... ⅹ
preface ... xi
Abbreviations ... xiii
Part Ⅰ INTRODUCTION
1 Conflict in the post-Communist world ... 3
Despite the and of the Cold War ... 3
Te...
더보기
목차 전체
CONTENTS
List of figures and tables ... ⅹ
preface ... xi
Abbreviations ... xiii
Part Ⅰ INTRODUCTION
1 Conflict in the post-Communist world ... 3
Despite the and of the Cold War ... 3
Ten thousand years of terrorism ... 3
Intimidation and terror ... 5
The aftermath of Marxism ... 5
The Middle East and ... 6
Central, South and East / Asia ... 9
Africa ... 9
Latin America ... 10
Terrorism against the rich world ... 11
2 A new kind of peacekeeping ... 13
Hard1y an occupation a gentleman ... 13
The rule of law ... 14
Security and intelligence ... 15
Technology ... 17
Part Ⅱ TECHNOLOGICAL DEVELOPMENT
3 A vulnerable society ... 21
The microelectronics revolution ... 21
The sinews of the new sociery ... 22
Cash, electronic transfer and extortion ... 22
○centres ... 24
○Is ... 25
4 Personal weapons ... 26
A maiure market ... 26
Ammunition ... 27
The G11 assault rife ... 31
Other rifles and light machine-guns ... 33
Sights and night vision equipment ... 35
Sub-machine-guns ... 36
Pistols ... 42
Shotguns ... 43
5 Missiles, longer range weapons and bombs ... 44
Free flight armour-piercing missiles (hand held) ... 44
Heavy muchine-guns ... 45
Guided armour-piercing missiles (han held) ... 46
Mortars ... 47
Anti-aircraft missiles (hand held) ... 47
Grenades ... 49
Bombs and mines ... 50
Nuclear, biological and chemical weapons ... 53
Incapacitating weapons ... 54
6 Detecting explosives, bombs and guns ... 55
The developing challenges detection ... 55
Aids to the senses ... 57
Tagging of explosives ... 57
Vapour detection ... 59
Enhanced X-ray ... 61
Neutron detection ... 62
The multiple approach ... 63
7 Intelligence and the microelectronics revolution ... 64
The magnitude of the change ... 61
The computer and the brain ... 67
The nature and development of the computer ... 68
Teaching a computer to make logical inferences ... 70
Expert syslems for police intelligence ... 72
Risc ... 74
8 Physical security ... 77
Access control ... 77
Identification and impersonation ... 78
Perinieter security. surveillance and alarn systems ... 81
Travel and VIP security ... 83
Part Ⅲ DRUGS, POLITICAL VIOLENCE AND CRIME
9 Cocaine ... 87
The narcotic supply, chain ... 87
Bolivia ... 88
Peru ... 89
Colombia ... 89
Central America, the Caribbean and Florida ... 92
10 Heroin and hashish ... 95
Opium and heroin ... 95
The Golden Triangle ... 95
The Golden Crescent ... 98
Lebanon. Syria and West Africa ... 99
Mexico - and black tai ... 100
11 The consumers ... 101
The multinational narcotic corporations ... 101
The distribution chain ... 102
Addicts ... 102
The cure at the demand end ... 103
Part Ⅳ RURAL GUERRILLA WARFARE
12 Rural guerrillas - Latin America ... 111
Peru ... 111
The war against Sendero Luminoso ... 113
Colombia ... 117
El Salvador ... 121
Nicaragua ... 122
Prognosis for Latin America ... 124
13 Rural guerrillas - Asia and Africa ... 125
The Asian rural querrilla heritage ... 125
Cambodia ... 126
The Philippines ... 128
Sri Lanka ... 130
India ... 132
Afghanistan. Central Asia and Kurdistan ... 135
Sudan ... 137
Somalia ... 138
Southern Africa ... 140
14 Development of rural guerrilla warfare ... 142
The psychology of rural terrorism ... 142
Target selection ... 143
Weapons ... 143
Security of premises and installations ... 144
Personal and travel security ... 144
Search techniques ... 146
Intelligence ... 146
The security forces ... 147
public Support ... 148
Part Ⅴ URBAN TERRORISM
15 Urban terrorist organizations ... 153
The urben guerrilla heritage ... 153
The Palestinians ... 154
Lebanon ... 156
Iran. Iraq and Libya as sponsors of terrorism ... 156
Algeria and ETA ... 158
The IRA and ETA ... 158
Other west European terrorists ... 161
Ethnic cleansing and Bosnia ... 163
16 Urban terrorist techniques ... 167
Damage to property ... 167
Bombs to kill ... 167
Guns and missiles ... 170
Intimidation and racketeering ... 171
Kidnapping ... 172
Hostage seizure ... 176
Hijacking ... 177
17 Developments in countering terrorism ... 180
Security of premises and installations ... 180
Seureh techniques and research ... 181
Personal and travel security ... 181
Weapons ... 182
The security forces ... 184
Intelligence ... 188
Identification and prevention of impersonation ... 190
Interrogation and justice ... 191
18 Airport and airline security ... 194
Access to aircraft ... 194
Ramp security ... 195
Hold baggage ... 195
Baggage reconciliation ... 196
Passengers and cabin baggage ... 197
Detecting potential terrorists ... 198
A fast stream for passengers posing on threat ... 200
Enforcing and financing standards ... 202
Part Ⅵ CONCLUSIONS
19 Stopping people killing each other ... 207
Likeliest areas of instability ... 207
Peacekeeping and peacemaking ... 207
NATO as an executive arm for the UN ... 211
Funding ... 212
20 Civil liberties and the rule of law ... 213
The rule of law in face of intimidation ... 213
Laws to help fight terrorism ... 215
Drugs and illegal money ... 217
Technological research ... 218
Public safety and civil liberties ... 219
Sources and bibliography ... 222
Idex ... 228
더보기 닫기