Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Combat Terrorism - Foreign and Domestic: Third Edition
Combat Terrorism - Foreign and Domestic: Third Edition
Combat Terrorism - Foreign and Domestic: Third Edition
Ebook304 pages13 hours

Combat Terrorism - Foreign and Domestic: Third Edition

Rating: 0 out of 5 stars

()

Read preview

About this ebook

The intent of this book is not to scare anyone or to cause readers not to travel. The intent is to give the readers some common sense ideas on how to survive if they should become a victim of a terrorist attack, and also to educate readers in conducting normal everyday activities in a manner that will prevent them from becoming a victim of a terrorist act.
LanguageEnglish
PublisherAuthorHouse
Release dateMay 1, 2013
ISBN9781481742450
Combat Terrorism - Foreign and Domestic: Third Edition
Author

Lenzy Kelley

Lenzy Kelley was born and raised in New York City. He attended Haaren High School in Hells Kitchen. After graduation in 1962, he joined the United States Army. After completing parachute training at Fort Benning Georgia, he was assigned to Fort Campbell Kentucky. In 1963 he married his childhood sweetheart Carolyne. Their first son Lenzy Darnell was born in 1963 with a second son Darren born in 1964. In 1965 he went to Fort Monmouth NJ for radio training. He later was assigned to Germany where he was stationed at Heidelberg and Karlsruhe Germany. A daughter, Stacie was born in Germany in 1967. Lenzy departed Germany in 1968. His subsequent military assignments took him to Arizona, Florida, Boston, Panama, Belgium, Holland, Korea, Indonesia and Saudi Arabia. Lenzy retired from the Army in 1985 as a Master Sergeant. He worked a year in the private sector before being hired at Fort Monmouth NJ as a Department of Defense civilian employee. During the next 25 years, Lenzy worked in Program and Project management assignments in support communications support to Joint Military units. His last job assignment required several trips to Kuwait and Iraq in support of Operation Iraqi Freedom. One of his other duties as assigned was being his organizations representative at all briefings and lectures regarding terrorism and bomb threats. This is where he acquired the knowledge to write this book. Lenzy retired from the Federal service in August 2011. Lenzy holds a Bachelor Degree in Vocational Education from Southern Ill University, August 1987 and a Masters Degree in Educational Leadership from Temple University, May 1992. In addition, Lenzy holds a Program Management certificate from Rutgers University. Lenzy originally published a book on Terrorism in January 2001. This will be the third edition. His hobbies entail Writing, Politics and History. Lenzy is an active member of the Red Bank Elks, Neptune American Legion, Neptune Disabled American Veterans (DAV), SIU Alumni, Temple Alumni, Advance Guard Wounded Warriors and the Mount Olive Baptist Church.

Related to Combat Terrorism - Foreign and Domestic

Related ebooks

Antiques & Collectibles For You

View More

Related articles

Related categories

Reviews for Combat Terrorism - Foreign and Domestic

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Combat Terrorism - Foreign and Domestic - Lenzy Kelley

    Combat

    Terrorism

    Foreign and Domestic

    THIRD EDITION

    LENZY KELLEY

    40303.png

    AuthorHouse™

    1663 Liberty Drive

    Bloomington, IN 47403

    www.authorhouse.com

    Phone: 1-800-839-8640

    ©

    2013 by Lenzy Kelley. All rights reserved.

    No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author.

    Published by AuthorHouse 10/20/2017

    ISBN: 978-1-4817-4244-3 (sc)

    ISBN: 978-1-4817-4245-0 (e)

    Library of Congress Control Number: 2013907250

    Any people depicted in stock imagery provided by Thinkstock are models, and such images are being used for illustrative purposes only.

    Certain stock imagery © Thinkstock.

    Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.

    TABLE OF CONTENTS

    Chapter 1 Introduction

    Terrorist Ideologues

    Terrorist Attacks

    Chapter 2 Terrorism

    Characteristics:

    Chapter 3 Legacy Of Terror

    Chapter 4 Terrorist Organizations

    Chapter 5 Bomb Threat Procedures

    Chapter 6 Evacuation

    Mass Casulaties

    Chapter 7 How To Spot A Terrorist

    Chapter 8 Emergency Supply List For Massive Exodus (National Emergency Or Hurricane Survival)

    Chapter 9 Steps To Take To Avoid Becoming A Victim Of Terrorism

    Chapter 10 Vehicular Evasive Actions And Attack Recognition

    High Speed Turn Arounds:

    Chapter 11 Americans Working Abroad

    Chapter 12 Exercise Caution In These Countries

    Chapter 13 Precautions During Travel

    Chapter 14 Do’s And Don’t’s When Traveling In The Middle-East

    Chapter 15 Religious Police

    Chapter 16 Ramadhan And Muslim Hajj

    Chapter 17 Code Of Conduct/Guidance If You Are Subjected To Terrorist Captivity

    Chapter 18 Stockholm Syndrome/Capture Bonding

    Chapter 19 Airline Security

    Chapter 20 The Most Dangerous Foreign Airlines In The World.

    Chapter 21 Worst Foreign Airports

    Chapter 22 The Top Six Safest Foreign Airlines

    Chapter 23 The Safest Foreign Airports In The World

    Chapter 24 The Most Dangerous Airports In America

    Chapter 25 Safest American Airports (In No Special Order)

    Chapter 26 American Airlines With The Best Safety Record

    Chapter 27 New York Area Airports, Airline And Ports

    Chapter 28 Transportation Security Agency (Tsa)

    Airports Tsa Security Screening Post 9/11

    Security Check In

    Chapter 29 On Board Seating

    At The Back Of The Plane

    On An Aisle

    Near An Exit

    Additional Considerations

    Chapter 30 How To Re-Act To Terrorist During A Skyjacking.

    Chapter 31 Assault Team Rescue (Plane On The Ground)

    Chapter 32 Recent Government Actions

    Chapter 33 Home Grown Radical Muslims

    Chapter 34 9/11 Timeline

    Chapter 35 9/11 Lessons Learned

    Chapter 36 Boston Marathon Bombing

    After A Bombing The Police Should:

    For Future Events

    Questions And Other Considerations:

    Chapter 37 Nuclear, Biological And Chemical Attacks

    Characteristics Of A Nuclear Terrorist Attack:

    Blasts And Shockwaves

    Fire Risk

    Radiation

    Fallout

    Different Types Of Nuclear Attack:

    Chapter 38 How To Survive A Nuclear Attack:

    The Initial Explosion

    After The Blast

    How To Survive A Nuclear Attack On A Major City:

    How To Make Your Living Areas Safe Before An Attack:

    Internal And External Health Effects Of Nuclear Exposure:

    Fallout Shelters

    Surviving A Nuclear Blast (Addendum)

    Emp

    Chapter 39 Characteristics Of A Biological Or Chemical Attack:

    Chemical Attack:

    Biological Attack:

    How To Survive A Biological Or Chemical Attack:

    Chapter 40 Anti-Bio-Chemical Terror Plan

    Nbc Drill (Nuclear, Biological And Chemical)

    Chapter 41 Cyber-War Threat

    Chapter 42 Drones

    Chapter 43 Terror Attacks And New Terror Alerts That Have Occurred In The Last 18 Months Which Include: Airport Shootings And False Alarm Incidents; Airline Downing; Us, Europe And Middle-East Terror Attacks; Steps To Counter Terror Attacks; How To Spot A Terrorist; Official Visits And Special Events; Cell Phone Alerts; Lone Wolves; Active Shooter; Bin Laden’s Terror Text Book; Al Qaeda Website; Encryption; Death By Pilot

    Chapter 44 Torture

    Chapter 45 Recent Events

    SUMMARY

    PREFACE

    This handbook is intended to provide information and suggestions to reduce the vulnerability to acts of terrorism. In addition, it’s also intended to educate the general public as to the nature of our enemies and various steps that can be taken to protect individuals and their loved ones at home and abroad.

    In view of recent and continued high levels of terrorist activity, both foreign and domestic, it’s become necessary to take appropriate measures to protect yourself from terroristic acts not only when traveling, but also on a day to day basis within your community and work environment. Recent terrorist acts more than suggest that terrorist acts are no longer confined to other countries. Since 1993 there have been two attacks on the World Trade Center and numerous other attacks detected and foiled. In today’s climate, no one is safe. With our everyday safety at peril, it is imperative that all of us become aware of our surroundings and take the necessary steps to be discussed in this handbook to protect ourselves against terrorist activities.

    In Memory of Lenzy Kelley, Sr.

    Unpublished Work © 1996 Lenzy Kelley, Jr.

    Chapter 1

    Introduction

    Introduction: I’m fairly certain that we don’t have anyone like James Bond working for us. What we have are ordinary people doing an extraordinary job in protecting the Homeland. Some of those extraordinary people are part of a group that falls under the auspices of Home Land Security (HLS) called the Red Cell Group. Their job is to anticipate how would-be terrorist would attack the United States. This group is extremely important as terrorist groups are constantly probing our defenses in an attempt to discover weaknesses. The United States was recently tipped off by an al Qaeda turn coat that warned of mail packages send as a dry run. The bomb plotters needed to determine how long it would take and whether there would be any problems encountered with the packages getting through the U.S. mail system. This plot is an example of why we must remain on our guard at all times because our enemies do not let up. The 9/11 attack has forever changed the landscape in America. Things will never be the same. We cannot afford to do business as usual. The moment we let our guards down, it will result in people dying.

    9/11 should have shaken our complacency of past years when terror acts occurred elsewhere. Unfortunately, terror attacks visits the world with frightening regularity. Most people want to know why it is happening, when it will stop and how to defend against it. There is no magic bullet to stop it and no location to hide from it. We can only expect our Government to maintain a vigilant watch, address the causes and carry the battle to the enemy. Beyond that we must carry on with our lives and routines with a watchful eye. To do otherwise means the terrorists have won. Asking our Government to protect us could be a problem as our Government is run by ordinary people who make mistakes and are not always vigilant. This is the scenario which led to 9/11. We were not paying attention. We missed clues and red flags. As a result, we were not prepared and we paid for it in lives. Unfortunately, a lot of Americans believe that more home land attacks are inevitable with bus, train and harbor attacks next. Hopefully that won’t come to past. However, Americans expect their Government to do a better job of protecting the Homeland. The mistakes made leading up to 9/11 are not acceptable and cannot be repeated.

    Terrorist strikes are not only against the US Government but other Governments and installations worldwide. During the past 15 years, terrorists have killed or maimed thousands of military personnel, public servants, businessmen, educators and clergy worldwide. Each year, the statistics get increasingly grim and the terrorist incidents become increasingly lethal. Even though the Islamic terror threat is directed mainly at the United States the majority of the countries in the world today are dealing with some level of terrorist threats and actual terrorist attacks.

    In the past, the threat of terrorism came principally from two distinct ideologies, communism and Iranian Islamic fundamentalism. Both used terrorism as a form of warfare with knowledge that democracies, their main enemies, are especially vulnerable. However, with the collapse of the Soviet empire, terrorism from communist regimes has all but vanished, while terrorism from Islamic fundamentalist has increased dramatically.

    The cost of terrorism goes far beyond the carnage and destruction caused by individual incidents. When the United States is the target of such actions, the cost of terrorism must be measured not only in loss of American life or damage to U.S. installations and property, but in less tangible though no less meaningful terms-loss of American credibility and a diminished capacity of the United States to influence international events. After the 9/11 WTC attacks it several years for the American Airline Industry to recover.

    For some time, ISIS has been in control of the rhythm and tempo of their terror attacks. Isis and groups like Boko Haram cannot be allowed this control to include the comfort of sanctuary. The west must retake control of the rhythm and tempo with strong leadership willing to do whatever it takes to win. The west must unleash ruthlessness that matches ISIS and accept that there is no clean way to wage war. The west must also recognize that civilization cannot be saved solely by civilized means.

    TERRORIST IDEOLOGUES

    Not all Islamic Muslims are terrorist. However a lot terrorist are Islamic Muslims. The chief terror threat directed at the west is Islamic. Sharia or Islamic law rule most Muslim countries. Non Muslim symbols such as churches or crosses and anything else touched by western influence are Haram (forbidden). Those suspected of holding Christian or other non-Islamic beliefs become a target. Terror groups such as Boko Haram often recruit common thugs who also kill rape, and loot.

    TERRORIST ATTACKS

    Each terrorist attack—each bombing, each assassination, each incident that brings international humiliation to Free World institutions—undermines public confidence in the established government and erodes national resolve and faith in its leadership. The U. S. Defense Department responds to the terrorist threat and activities with two forms of positive actions:

    —Counterterrorism

    "Counter-terrorism—actions initiated by Governments to combat terrorism. Those actions include intelligence gathering, sharing intelligence with other countries, enhanced personnel training, apprehension of terrorists, and infiltration of terrorists organizations.

    —Anti-terrorism

    Anti-terrorism—actions that individuals can take to reduce the vulnerability of people and facilities, such as barriers, gates, armed guards, travel visa controls and personal habits. Recent terrorists acts directed at US personnel and resources at home and overseas reinforce the need for additional training and anti-terrorism planning. The term anti-terrorism" is used to denote those defensive measures personnel can take to reduce their vulnerability

    Chapter 2

    TERRORISM

    Definition: Terrorism is the criminal use of violence or the threat of violence to attain goals, often political or ideological in nature, through fear, intimidation, or coercion. A terrorist act is usually dramatic and violent. It is often directed against a symbolic target and is intended to influence others, rather than the immediate victim. The serious effects of terrorism generated by local and international terrorist groups in many countries of the world and the demonstrated ability of some groups to operate across national boundaries have made terrorism an international problem.

    As a calculated use or threat of violence its intent is to cause fear to coerce or intimidate governments or societies and individuals in the pursuit of goals that are generally political, religious or ideological. Terrorist seek goals beyond the ugliness of their acts that may be economic, historical, ideological, political or religious. Terrorist worldwide engage in horrific behavior that ordinary people can hardly comprehend. Terrorist carry out their acts methodically, and shrewdly. They demonstrate patience and have a keen awareness of their intended target. One of the frightening aspects of terrorist is that they don’t care if they get caught as most of their attacks are suicide. Terrorism in short is a formidable adversary. Americans continue to be a target of these crazed bloodthirsty terrorist who believe in their twisted vision that killing Americans is the highest virtue. Along with killing westerns, terrorist are also killing history with their wanton destruction of priceless ancient Islamic manuscripts and parchments. In October 2012, the Taliban stormed the fabled city of Timbuktu and destroyed many ancient monuments, as they also did in Afghanistan.

    Characteristics:

    1. Terrorist groups are not governed by time constraints. Preparation for conspiratorial terrorism can take months or even years, and most terrorist groups are psychologically prepared for protracted operations.

    2. Terrorism is not limited by political borders. Many terrorist operate internationally.

    3. Political terrorist groups are durable. Some organizations thought to have been destroyed or dispersed have revived in one form or another to pose renewed threats.

    4. Most political terrorism is calculated and rational, not mindless. Terrorists usually seek to create a credible threat for political leverage. Their immediate objectives are mainly psychological: generation of fear among the populace, disruption within the government, and a general loss of confidence in the existing social order or government policies.

    5. The more common types of violence committed by terrorist are bombings, hijacking, kidnapping and assassination; however, robbery of finance offices or weapons storage facilities play an important role in furthering terrorist objectives, and such acts are of particular concern to government agencies and personnel.

    6. Terrorists carefully reconnoiter any target they intend to attack.

    7. Terrorists seek to adapt their appearance to the given surroundings. They could try for instance to gain access in uniforms of police or in ambulances using appropriate vehicles. (This tactic has been used in Afghanistan on numerous occasions costing many American lives). Many terrorists are females!

    8. Terrorist bombers will plant a first bomb to drive the crowd towards a second explosion or avenue of escape. In the event of a bombing it’s important that all stay calm and leave the area quickly at the same time avoiding large crowds as the entire area will become a crime scene and will be condone off. The crime scene should encompass the furthest broken window shattered by the blast. The bombing may occur with no intelligence, warning, chatter or other credible advance threat. If the bomb is an IED it could be an anti-personnel type designed not to kill but to cause shrapnel damage to soft tissue, physiological shock, maim and cause general chaos. Depending on how it is placed, the explosion trajectory could go up (push) or sideways (knee-high). The bomb could be detonated by a timer, remote control or cell phone. After a bombing attack, the FAA should immediately declare a no-fly zone and check airplane departures for perpetrators who may be trying to flee. In addition, phone carriers should shut down cell phone service to prevent possible remote detonation.

    It’s possible that no one will claim responsibility. If so, the investigators will need to determine if this was group or individually driven. Islamic radicals don’t mind dying in a suicide attack. Domestic terrorist most likely want to get away without being caught. Following the blast, the forensic teams move in to try and determine who was responsible (Terrorist, foreign or domestic or local extremist). Questions to be answered: was it rehearsed? If so, did anybody see anything? How sophisticated was the explosive device? Who made it? How many bombs were there? The more bombs, the more people involved. More people could mean a group or an organization. What type of bomb was it? How was it constructed? What did the shrapnel consist of? If ball bearings, who’s the manufacture? Is there a bomb signature? (Similar to other bombings) Was it military C4 or smokeless powder? Unfortunately, at crime scenes you often have turf battles. However, the forensic team needs to clear all personnel out of the crime scene in order to gather evidence. The type of evidence they are looking for includes finger prints, fiber, hair, shoe impressions, clothing, backpacks, receipts, circuit boards, and other materials. Other investigators should check cell phone carriers to determine what phone numbers were called before, during and after the blast. During the investigations, authorities may reach out to the public in the event cell phone camera videos managed to capture the event. Use of an unsophisticated device doesn’t mean that those responsible are unsophisticated. Use of low tech items may be a means for bombers to stay off of the radar of the investigators.

    Chapter 3

    Legacy of Terror

    (Not a Total Listing):

    April 2013 - KANDAHAR, Afghanistan - A car bomb blast killed five Americans, including three U.S. soldiers and a young diplomat while an American civilian died in a separate attack.

    8 March 2013 - A suicide bomber on a bicycle struck outside the Afghan Defense Ministry on Saturday, one of two attacks that killed at least 18 people as U.S. Defense Secretary Chuck Hagel visited the nation.

    February 2013 - A bomb hidden in a water tank ripped through a crowd bazaar in Quetta Pakistan killing 79 people. The bomb targeted the country’s minority Shiite Muslim sect. No group has stepped forth to claim responsibility.

    February 2013 - Suicide terrorist attack at the US Embassy in Ankara Turkey.

    February 2013 - Road side bombing kills 6 in Afghanistan

    February 2013 - Two men arrested after a suicide bomber blows himself up in a bombing attempt in northern Mali

    January 2013 - Al Qaeda linked terrorist attack a gas plant in Algeria. During this attack, hostages were taken and one terrorist demand was for the release of blind Sheik Omar Abdel Rahman. Rahman was convicted in 1995 of plotting to blow up New York City landmarks and was implicated in the 1993 WTC bombing. He is currently serving a life sentence in a Federal prison.

    January 2013 - An alleged Al Qaeda operative was recently extradited to New York from Great Britain to face charges of participating in a plot to attack international targets to include New York City subways.

    December 2012 - In Mogadishu, Members of al-Shabaab staged a suicide car bombing in Somalia’s capital Mogadishu that left 2 civilians dead and 7 injured.

    December 2012 - Boko Haram terrorist murdered at least 10 Christians in the Nigeria village of Chibok

    November 2012 - In the Philippines, suspected NPA insurgents ambushed an army patrol in the south of the Philippines, killing 4 soldiers

    October 2012 - Pakistani school girl shot by Islamic radicals because she promoted girls education and western thinking

    October 2012 - Suspected Islamic militants staged a number of attacks in three southern Thai provinces (Patani, Songkhla and Yala), killing at least 11 people. The victims included 3 paramilitary rangers, as well as 2 Muslims killed in a drive-by shooting.

    September 2012 - Around 100 suspected PKK fighters simultaneously attacked four government and security buildings in the small town of Beytüşşebap, near the border with Syria. At least 10 soldiers and 3 attackers were killed during the assault, while 7 soldiers were injured.

    August 2012 - In Russia, a suspected suicide bomber attacked a Russian armored vehicle leaving a garrison in the Chechen capital Grozny, killing at least four soldiers and injuring three others.

    July 2012 - In Kenya, Masked militants attacked worshipers with hand grenades and automatic

    Enjoying the preview?
    Page 1 of 1