Combat Terrorism - Foreign and Domestic: Third Edition
By Lenzy Kelley
()
About this ebook
Lenzy Kelley
Lenzy Kelley was born and raised in New York City. He attended Haaren High School in Hells Kitchen. After graduation in 1962, he joined the United States Army. After completing parachute training at Fort Benning Georgia, he was assigned to Fort Campbell Kentucky. In 1963 he married his childhood sweetheart Carolyne. Their first son Lenzy Darnell was born in 1963 with a second son Darren born in 1964. In 1965 he went to Fort Monmouth NJ for radio training. He later was assigned to Germany where he was stationed at Heidelberg and Karlsruhe Germany. A daughter, Stacie was born in Germany in 1967. Lenzy departed Germany in 1968. His subsequent military assignments took him to Arizona, Florida, Boston, Panama, Belgium, Holland, Korea, Indonesia and Saudi Arabia. Lenzy retired from the Army in 1985 as a Master Sergeant. He worked a year in the private sector before being hired at Fort Monmouth NJ as a Department of Defense civilian employee. During the next 25 years, Lenzy worked in Program and Project management assignments in support communications support to Joint Military units. His last job assignment required several trips to Kuwait and Iraq in support of Operation Iraqi Freedom. One of his other duties as assigned was being his organizations representative at all briefings and lectures regarding terrorism and bomb threats. This is where he acquired the knowledge to write this book. Lenzy retired from the Federal service in August 2011. Lenzy holds a Bachelor Degree in Vocational Education from Southern Ill University, August 1987 and a Masters Degree in Educational Leadership from Temple University, May 1992. In addition, Lenzy holds a Program Management certificate from Rutgers University. Lenzy originally published a book on Terrorism in January 2001. This will be the third edition. His hobbies entail Writing, Politics and History. Lenzy is an active member of the Red Bank Elks, Neptune American Legion, Neptune Disabled American Veterans (DAV), SIU Alumni, Temple Alumni, Advance Guard Wounded Warriors and the Mount Olive Baptist Church.
Related to Combat Terrorism - Foreign and Domestic
Related ebooks
Combating a Modern Hydra: Al Qaeda and the Global War on Terrorism Rating: 0 out of 5 stars0 ratingsCOMBAT TERRORISM Rating: 0 out of 5 stars0 ratingsActivists and the Surveillance State: Learning from Repression Rating: 0 out of 5 stars0 ratingsThe Terrorist Trap: America's Experience with Terrorism Rating: 3 out of 5 stars3/5Who Becomes a Terrorist and Why?: The Psychology and Sociology of Terrorism Rating: 3 out of 5 stars3/5Right of Boom: The Aftermath of Nuclear Terrorism Rating: 3 out of 5 stars3/5Activists and the Surveillance State: Learning from Repression Rating: 0 out of 5 stars0 ratingsCyberwars in the Middle East Rating: 0 out of 5 stars0 ratingsThe Ultimate Guide to Understanding Terrorism and Counterterrorism: Terrorism and Counterterrorism Explained Rating: 0 out of 5 stars0 ratingsDIPLOMATIC TERRORISM: Anatomy of Iran's State Terror Rating: 0 out of 5 stars0 ratingsGlobal Secret and Intelligence Services I: Hidden Systems that deliver Unforgettable Customer Service Rating: 5 out of 5 stars5/5Dirt Ordinary Rating: 0 out of 5 stars0 ratingsMiddle Eastern Terrorism: From Black September to September 11 Rating: 0 out of 5 stars0 ratingsWhy Terrorist Groups Form International Alliances Rating: 0 out of 5 stars0 ratingsThe Senate Intelligence Committee Report on Torture: Complete Standard Reflowable Flexible Ebook Edition Rating: 0 out of 5 stars0 ratingsPsychological Operations Supporting Counterinsurgency: 4th Psyop Group In Vietnam Rating: 5 out of 5 stars5/5Guantanamo and the Abuse of Presidential Power: Guantanamo and the Abuse of Presidential Power Rating: 0 out of 5 stars0 ratingsThe role of terrorism in twenty-first-century warfare Rating: 0 out of 5 stars0 ratingsOur Eyes: Counter Terrorism Intelligence Network Rating: 0 out of 5 stars0 ratingsPay Attention and Have Fun! Rating: 0 out of 5 stars0 ratingsThe Last Soldiers of the Cold War: The Story of the Cuban Five Rating: 0 out of 5 stars0 ratingsAnatomy of a Spy Rating: 0 out of 5 stars0 ratingsAmong Enemies: Counter-Espionage for the Business Traveler Rating: 0 out of 5 stars0 ratingsFaces of Terrorism and The Ultimate Solution. By: Prit Paul Singh Bambah Rating: 0 out of 5 stars0 ratingsTo Be an FBI Special Agent Rating: 2 out of 5 stars2/5Al-Qaeda the Spider: Mass Terrorism Is Not Dead. Are We Safe? Rating: 0 out of 5 stars0 ratingsCia Tiger Shadow Assassination Association: Determination of Guilt Rating: 0 out of 5 stars0 ratingsKey Moments in Espionage: Spy Ships, Failures, & the Cold War Era: SPYCRAFT, #3 Rating: 0 out of 5 stars0 ratingsOverthrow a Fascist Regime on $15 a Day Rating: 0 out of 5 stars0 ratingsThe Transnational Dimension of Cyber Crime and Terrorism Rating: 2 out of 5 stars2/5
Antiques & Collectibles For You
Horny Stories And Comix # 3 Rating: 2 out of 5 stars2/5Brick Flicks: A Comprehensive Guide to Making Your Own Stop-Motion LEGO Movies Rating: 5 out of 5 stars5/5The ABC's of Reloading, 10th Edition: The Definitive Guide for Novice to Expert Rating: 5 out of 5 stars5/5101 More Items To Sell On Ebay: 101 Items To Sell On Ebay, #2 Rating: 0 out of 5 stars0 ratingsCoin Collecting For Dummies Rating: 4 out of 5 stars4/5Garbage Pail Kids Rating: 4 out of 5 stars4/5The Story Behind: The Extraordinary History Behind Ordinary Objects Rating: 3 out of 5 stars3/5Coin Collecting - A Beginners Guide to Finding, Valuing and Profiting from Coins: The Collector Series, #1 Rating: 4 out of 5 stars4/5Gem Identification Made Easy (4th Edition): A Hands-On Guide to More Confident Buying & Selling Rating: 5 out of 5 stars5/5The Brick Bible: A New Spin on the Old Testament Rating: 0 out of 5 stars0 ratingsThe Existential Literature Collection Rating: 3 out of 5 stars3/5The Trapper's Bible: The Most Complete Guide on Trapping and Hunting Tips Ever Rating: 5 out of 5 stars5/5101 Items To Sell On Ebay: 101 Items To Sell On Ebay, #1 Rating: 0 out of 5 stars0 ratingsThe Ultimate Guide to Home Butchering: How to Prepare Any Animal or Bird for the Table or Freezer Rating: 0 out of 5 stars0 ratingsThe NES Encyclopedia: Every Game Released for the Nintendo Entertainment System Rating: 4 out of 5 stars4/5The Comprehensive Guide to NFTs, Digital Artwork, and Blockchain Technology Rating: 4 out of 5 stars4/5Illustrated Guide to Jewelry Appraising (3rd Edition): Antique, Period & Modern Rating: 0 out of 5 stars0 ratingsBibliophile: An Illustrated Miscellany Rating: 4 out of 5 stars4/5Wacky Packages Rating: 4 out of 5 stars4/5Life in Miniature: A History of Dolls' Houses Rating: 4 out of 5 stars4/5The Everything Coin Collecting Book: All You Need to Start Your Collection And Trade for Profit Rating: 0 out of 5 stars0 ratingsDark Archives: A Librarian's Investigation into the Science and History of Books Bound in Human Skin Rating: 4 out of 5 stars4/5Coin Collecting - A Beginner's Guide To Coin Collecting And Make Money With Your Collection Rating: 5 out of 5 stars5/5Buying & Selling Antiques & Collectibl: For Fun & Profit Rating: 0 out of 5 stars0 ratingsI'd Rather Be Reading: A Library of Art for Book Lovers Rating: 4 out of 5 stars4/5
Related categories
Reviews for Combat Terrorism - Foreign and Domestic
0 ratings0 reviews
Book preview
Combat Terrorism - Foreign and Domestic - Lenzy Kelley
Combat
Terrorism
Foreign and Domestic
THIRD EDITION
LENZY KELLEY
40303.pngAuthorHouse™
1663 Liberty Drive
Bloomington, IN 47403
www.authorhouse.com
Phone: 1-800-839-8640
©
2013 by Lenzy Kelley. All rights reserved.
No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author.
Published by AuthorHouse 10/20/2017
ISBN: 978-1-4817-4244-3 (sc)
ISBN: 978-1-4817-4245-0 (e)
Library of Congress Control Number: 2013907250
Any people depicted in stock imagery provided by Thinkstock are models, and such images are being used for illustrative purposes only.
Certain stock imagery © Thinkstock.
Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.
TABLE OF CONTENTS
Chapter 1 Introduction
Terrorist Ideologues
Terrorist Attacks
Chapter 2 Terrorism
Characteristics:
Chapter 3 Legacy Of Terror
Chapter 4 Terrorist Organizations
Chapter 5 Bomb Threat Procedures
Chapter 6 Evacuation
Mass Casulaties
Chapter 7 How To Spot A Terrorist
Chapter 8 Emergency Supply List For Massive Exodus (National Emergency Or Hurricane Survival)
Chapter 9 Steps To Take To Avoid Becoming A Victim Of Terrorism
Chapter 10 Vehicular Evasive Actions And Attack Recognition
High Speed Turn Arounds:
Chapter 11 Americans Working Abroad
Chapter 12 Exercise Caution In These Countries
Chapter 13 Precautions During Travel
Chapter 14 Do’s And Don’t’s When Traveling In The Middle-East
Chapter 15 Religious Police
Chapter 16 Ramadhan And Muslim Hajj
Chapter 17 Code Of Conduct/Guidance If You Are Subjected To Terrorist Captivity
Chapter 18 Stockholm Syndrome/Capture Bonding
Chapter 19 Airline Security
Chapter 20 The Most Dangerous Foreign Airlines In The World.
Chapter 21 Worst Foreign Airports
Chapter 22 The Top Six Safest Foreign Airlines
Chapter 23 The Safest Foreign Airports In The World
Chapter 24 The Most Dangerous Airports In America
Chapter 25 Safest American Airports (In No Special Order)
Chapter 26 American Airlines With The Best Safety Record
Chapter 27 New York Area Airports, Airline And Ports
Chapter 28 Transportation Security Agency (Tsa)
Airports Tsa Security Screening Post 9/11
Security Check In
Chapter 29 On Board Seating
At The Back Of The Plane
On An Aisle
Near An Exit
Additional Considerations
Chapter 30 How To Re-Act To Terrorist During A Skyjacking.
Chapter 31 Assault Team Rescue (Plane On The Ground)
Chapter 32 Recent Government Actions
Chapter 33 Home Grown Radical Muslims
Chapter 34 9/11 Timeline
Chapter 35 9/11 Lessons Learned
Chapter 36 Boston Marathon Bombing
After A Bombing The Police Should:
For Future Events
Questions And Other Considerations:
Chapter 37 Nuclear, Biological And Chemical Attacks
Characteristics Of A Nuclear Terrorist Attack:
Blasts And Shockwaves
Fire Risk
Radiation
Fallout
Different Types Of Nuclear Attack:
Chapter 38 How To Survive A Nuclear Attack:
The Initial Explosion
After The Blast
How To Survive A Nuclear Attack On A Major City:
How To Make Your Living Areas Safe Before An Attack:
Internal And External Health Effects Of Nuclear Exposure:
Fallout Shelters
Surviving A Nuclear Blast (Addendum)
Emp
Chapter 39 Characteristics Of A Biological Or Chemical Attack:
Chemical Attack:
Biological Attack:
How To Survive A Biological Or Chemical Attack:
Chapter 40 Anti-Bio-Chemical Terror Plan
Nbc Drill (Nuclear, Biological And Chemical)
Chapter 41 Cyber-War Threat
Chapter 42 Drones
Chapter 43 Terror Attacks And New Terror Alerts That Have Occurred In The Last 18 Months Which Include: Airport Shootings And False Alarm Incidents; Airline Downing; Us, Europe And Middle-East Terror Attacks; Steps To Counter Terror Attacks; How To Spot A Terrorist; Official Visits And Special Events; Cell Phone Alerts; Lone Wolves; Active Shooter; Bin Laden’s Terror Text Book; Al Qaeda Website; Encryption; Death By Pilot
Chapter 44 Torture
Chapter 45 Recent Events
SUMMARY
PREFACE
This handbook is intended to provide information and suggestions to reduce the vulnerability to acts of terrorism. In addition, it’s also intended to educate the general public as to the nature of our enemies and various steps that can be taken to protect individuals and their loved ones at home and abroad.
In view of recent and continued high levels of terrorist activity, both foreign and domestic, it’s become necessary to take appropriate measures to protect yourself from terroristic acts not only when traveling, but also on a day to day basis within your community and work environment. Recent terrorist acts more than suggest that terrorist acts are no longer confined to other countries. Since 1993 there have been two attacks on the World Trade Center and numerous other attacks detected and foiled. In today’s climate, no one is safe. With our everyday safety at peril, it is imperative that all of us become aware of our surroundings and take the necessary steps to be discussed in this handbook to protect ourselves against terrorist activities.
In Memory of Lenzy Kelley, Sr.
Unpublished Work © 1996 Lenzy Kelley, Jr.
Chapter 1
Introduction
Introduction: I’m fairly certain that we don’t have anyone like James Bond working for us. What we have are ordinary people doing an extraordinary job in protecting the Homeland. Some of those extraordinary people are part of a group that falls under the auspices of Home Land Security (HLS) called the Red Cell Group
. Their job is to anticipate how would-be terrorist would attack the United States. This group is extremely important as terrorist groups are constantly probing our defenses in an attempt to discover weaknesses. The United States was recently tipped off by an al Qaeda turn coat that warned of mail packages send as a dry run. The bomb plotters needed to determine how long it would take and whether there would be any problems encountered with the packages getting through the U.S. mail system. This plot is an example of why we must remain on our guard at all times because our enemies do not let up. The 9/11 attack has forever changed the landscape in America. Things will never be the same. We cannot afford to do business as usual. The moment we let our guards down, it will result in people dying.
9/11 should have shaken our complacency of past years when terror acts occurred elsewhere. Unfortunately, terror attacks visits the world with frightening regularity. Most people want to know why it is happening, when it will stop and how to defend against it. There is no magic bullet to stop it and no location to hide from it. We can only expect our Government to maintain a vigilant watch, address the causes and carry the battle to the enemy. Beyond that we must carry on with our lives and routines with a watchful eye. To do otherwise means the terrorists have won. Asking our Government to protect us could be a problem as our Government is run by ordinary people who make mistakes and are not always vigilant. This is the scenario which led to 9/11. We were not paying attention. We missed clues and red flags. As a result, we were not prepared and we paid for it in lives. Unfortunately, a lot of Americans believe that more home land attacks are inevitable with bus, train and harbor attacks next. Hopefully that won’t come to past. However, Americans expect their Government to do a better job of protecting the Homeland. The mistakes made leading up to 9/11 are not acceptable and cannot be repeated.
Terrorist strikes are not only against the US Government but other Governments and installations worldwide. During the past 15 years, terrorists have killed or maimed thousands of military personnel, public servants, businessmen, educators and clergy worldwide. Each year, the statistics get increasingly grim and the terrorist incidents become increasingly lethal. Even though the Islamic terror threat is directed mainly at the United States the majority of the countries in the world today are dealing with some level of terrorist threats and actual terrorist attacks.
In the past, the threat of terrorism came principally from two distinct ideologies, communism and Iranian Islamic fundamentalism. Both used terrorism as a form of warfare with knowledge that democracies, their main enemies, are especially vulnerable. However, with the collapse of the Soviet empire, terrorism from communist regimes has all but vanished, while terrorism from Islamic fundamentalist has increased dramatically.
The cost of terrorism goes far beyond the carnage and destruction caused by individual incidents. When the United States is the target of such actions, the cost of terrorism must be measured not only in loss of American life or damage to U.S. installations and property, but in less tangible though no less meaningful terms-loss of American credibility and a diminished capacity of the United States to influence international events. After the 9/11 WTC attacks it several years for the American Airline Industry to recover.
For some time, ISIS has been in control of the rhythm and tempo of their terror attacks. Isis and groups like Boko Haram cannot be allowed this control to include the comfort of sanctuary. The west must retake control of the rhythm and tempo with strong leadership willing to do whatever it takes to win. The west must unleash ruthlessness that matches ISIS and accept that there is no clean way to wage war. The west must also recognize that civilization cannot be saved solely by civilized means.
TERRORIST IDEOLOGUES
Not all Islamic Muslims are terrorist. However a lot terrorist are Islamic Muslims. The chief terror threat directed at the west is Islamic. Sharia or Islamic law rule most Muslim countries. Non Muslim symbols such as churches or crosses and anything else touched by western influence are Haram (forbidden). Those suspected of holding Christian or other non-Islamic beliefs become a target. Terror groups such as Boko Haram often recruit common thugs who also kill rape, and loot.
TERRORIST ATTACKS
Each terrorist attack—each bombing, each assassination, each incident that brings international humiliation to Free World institutions—undermines public confidence in the established government and erodes national resolve and faith in its leadership. The U. S. Defense Department responds to the terrorist threat and activities with two forms of positive actions:
—Counterterrorism
"Counter-terrorism—actions initiated by Governments to combat terrorism. Those actions include intelligence gathering, sharing intelligence with other countries, enhanced personnel training, apprehension of terrorists, and infiltration of terrorists organizations.
—Anti-terrorism
Anti-terrorism—actions that individuals can take to reduce the vulnerability of people and facilities, such as barriers, gates, armed guards, travel visa controls and personal habits. Recent terrorists acts directed at US personnel and resources at home and overseas reinforce the need for additional training and anti-terrorism planning. The term
anti-terrorism" is used to denote those defensive measures personnel can take to reduce their vulnerability
Chapter 2
TERRORISM
Definition: Terrorism is the criminal use of violence or the threat of violence to attain goals, often political or ideological in nature, through fear, intimidation, or coercion. A terrorist act is usually dramatic and violent. It is often directed against a symbolic target and is intended to influence others, rather than the immediate victim. The serious effects of terrorism generated by local and international terrorist groups in many countries of the world and the demonstrated ability of some groups to operate across national boundaries have made terrorism an international problem.
As a calculated use or threat of violence its intent is to cause fear to coerce or intimidate governments or societies and individuals in the pursuit of goals that are generally political, religious or ideological. Terrorist seek goals beyond the ugliness of their acts that may be economic, historical, ideological, political or religious. Terrorist worldwide engage in horrific behavior that ordinary people can hardly comprehend. Terrorist carry out their acts methodically, and shrewdly. They demonstrate patience and have a keen awareness of their intended target. One of the frightening aspects of terrorist is that they don’t care if they get caught as most of their attacks are suicide. Terrorism in short is a formidable adversary. Americans continue to be a target of these crazed bloodthirsty terrorist who believe in their twisted vision that killing Americans is the highest virtue. Along with killing westerns, terrorist are also killing history with their wanton destruction of priceless ancient Islamic manuscripts and parchments. In October 2012, the Taliban stormed the fabled city of Timbuktu and destroyed many ancient monuments, as they also did in Afghanistan.
Characteristics:
1. Terrorist groups are not governed by time constraints. Preparation for conspiratorial terrorism can take months or even years, and most terrorist groups are psychologically prepared for protracted operations.
2. Terrorism is not limited by political borders. Many terrorist operate internationally.
3. Political terrorist groups are durable. Some organizations thought to have been destroyed or dispersed have revived in one form or another to pose renewed threats.
4. Most political terrorism is calculated and rational, not mindless
. Terrorists usually seek to create a credible threat
for political leverage. Their immediate objectives are mainly psychological: generation of fear among the populace, disruption within the government, and a general loss of confidence in the existing social order or government policies.
5. The more common types of violence committed by terrorist are bombings, hijacking, kidnapping and assassination; however, robbery of finance offices or weapons storage facilities play an important role in furthering terrorist objectives, and such acts are of particular concern to government agencies and personnel.
6. Terrorists carefully reconnoiter any target they intend to attack.
7. Terrorists seek to adapt their appearance to the given surroundings. They could try for instance to gain access in uniforms of police or in ambulances using appropriate vehicles. (This tactic has been used in Afghanistan on numerous occasions costing many American lives). Many terrorists are females!
8. Terrorist bombers will plant a first bomb to drive the crowd towards a second explosion or avenue of escape. In the event of a bombing it’s important that all stay calm and leave the area quickly at the same time avoiding large crowds as the entire area will become a crime scene and will be condone off. The crime scene should encompass the furthest broken window shattered by the blast. The bombing may occur with no intelligence, warning, chatter or other credible advance threat. If the bomb is an IED it could be an anti-personnel type designed not to kill but to cause shrapnel damage to soft tissue, physiological shock, maim and cause general chaos. Depending on how it is placed, the explosion trajectory could go up (push) or sideways (knee-high). The bomb could be detonated by a timer, remote control or cell phone. After a bombing attack, the FAA should immediately declare a no-fly zone and check airplane departures for perpetrators who may be trying to flee. In addition, phone carriers should shut down cell phone service to prevent possible remote detonation.
It’s possible that no one will claim responsibility. If so, the investigators will need to determine if this was group or individually driven. Islamic radicals don’t mind dying in a suicide attack. Domestic terrorist most likely want to get away without being caught. Following the blast, the forensic teams move in to try and determine who was responsible (Terrorist, foreign or domestic or local extremist). Questions to be answered: was it rehearsed? If so, did anybody see anything? How sophisticated was the explosive device? Who made it? How many bombs were there? The more bombs, the more people involved. More people could mean a group or an organization. What type of bomb was it? How was it constructed? What did the shrapnel consist of? If ball bearings, who’s the manufacture? Is there a bomb signature? (Similar to other bombings) Was it military C4 or smokeless powder? Unfortunately, at crime scenes you often have turf battles. However, the forensic team needs to clear all personnel out of the crime scene in order to gather evidence. The type of evidence they are looking for includes finger prints, fiber, hair, shoe impressions, clothing, backpacks, receipts, circuit boards, and other materials. Other investigators should check cell phone carriers to determine what phone numbers were called before, during and after the blast. During the investigations, authorities may reach out to the public in the event cell phone camera videos managed to capture the event. Use of an unsophisticated device doesn’t mean that those responsible are unsophisticated. Use of low tech items may be a means for bombers to stay off of the radar of the investigators.
Chapter 3
Legacy of Terror
(Not a Total Listing):
April 2013 - KANDAHAR, Afghanistan - A car bomb blast killed five Americans, including three U.S. soldiers and a young diplomat while an American civilian died in a separate attack.
8 March 2013 - A suicide bomber on a bicycle struck outside the Afghan Defense Ministry on Saturday, one of two attacks that killed at least 18 people as U.S. Defense Secretary Chuck Hagel visited the nation.
February 2013 - A bomb hidden in a water tank ripped through a crowd bazaar in Quetta Pakistan killing 79 people. The bomb targeted the country’s minority Shiite Muslim sect. No group has stepped forth to claim responsibility.
February 2013 - Suicide terrorist attack at the US Embassy in Ankara Turkey.
February 2013 - Road side bombing kills 6 in Afghanistan
February 2013 - Two men arrested after a suicide bomber blows himself up in a bombing attempt in northern Mali
January 2013 - Al Qaeda linked terrorist attack a gas plant in Algeria. During this attack, hostages were taken and one terrorist demand was for the release of blind Sheik Omar Abdel Rahman. Rahman was convicted in 1995 of plotting to blow up New York City landmarks and was implicated in the 1993 WTC bombing. He is currently serving a life sentence in a Federal prison.
January 2013 - An alleged Al Qaeda operative was recently extradited to New York from Great Britain to face charges of participating in a plot to attack international targets to include New York City subways.
December 2012 - In Mogadishu, Members of al-Shabaab staged a suicide car bombing in Somalia’s capital Mogadishu that left 2 civilians dead and 7 injured.
December 2012 - Boko Haram terrorist murdered at least 10 Christians in the Nigeria village of Chibok
November 2012 - In the Philippines, suspected NPA insurgents ambushed an army patrol in the south of the Philippines, killing 4 soldiers
October 2012 - Pakistani school girl shot by Islamic radicals because she promoted girls education and western thinking
October 2012 - Suspected Islamic militants staged a number of attacks in three southern Thai provinces (Patani, Songkhla and Yala), killing at least 11 people. The victims included 3 paramilitary rangers, as well as 2 Muslims killed in a drive-by shooting.
September 2012 - Around 100 suspected PKK fighters simultaneously attacked four government and security buildings in the small town of Beytüşşebap, near the border with Syria. At least 10 soldiers and 3 attackers were killed during the assault, while 7 soldiers were injured.
August 2012 - In Russia, a suspected suicide bomber attacked a Russian armored vehicle leaving a garrison in the Chechen capital Grozny, killing at least four soldiers and injuring three others.
July 2012 - In Kenya, Masked militants attacked worshipers with hand grenades and automatic