| Foreword to the First Edition |
|
xv | |
| Foreword to the Third Edition |
|
xvii | |
| Preface |
|
xxi | |
| Acknowledgments |
|
xxiii | |
| Author |
|
xxv | |
| Introduction |
|
xxvii | |
| Chapter 1 A Need for Understanding and Analysis |
|
1 | (14) |
|
|
|
2 | (1) |
|
Intelligence Analysis Units |
|
|
3 | (1) |
|
Defining Analytical Positions and Roles |
|
|
4 | (1) |
|
|
|
5 | (2) |
|
What Is Homeland Security and Terrorism Analysis') |
|
|
7 | (1) |
|
Understanding What Needs to Be Analyzed |
|
|
7 | (1) |
|
|
|
8 | (2) |
|
Deterrence, Prevention, Arrest, and Target Hardening |
|
|
10 | (2) |
|
|
|
10 | (1) |
|
|
|
10 | (1) |
|
|
|
11 | (1) |
|
|
|
11 | (1) |
|
|
|
12 | (1) |
|
|
|
12 | (3) |
| Chapter 2 Understanding and Defining Terrorism |
|
15 | (28) |
|
|
|
15 | (1) |
|
Defining Terrorist Activity |
|
|
16 | (1) |
|
|
|
17 | (3) |
|
|
|
18 | (1) |
|
|
|
19 | (1) |
|
|
|
19 | (1) |
|
|
|
19 | (1) |
|
|
|
19 | (1) |
|
|
|
20 | (1) |
|
History and Roots of Modern Terrorism |
|
|
20 | (1) |
|
The Evolution of Domestic Terrorism |
|
|
21 | (4) |
|
|
|
25 | (2) |
|
Organized Hate Groups and Crimes |
|
|
27 | (6) |
|
Role of Organized Hate Groups in Domestic Terrorism |
|
|
28 | (5) |
|
|
|
33 | (3) |
|
Terrorist versus Street Criminal |
|
|
34 | (17) |
|
Differences between Typical Street Criminals and Terrorists |
|
|
34 | (1) |
|
September 11, 2001: Are the Subjects Criminals or Terrorists? |
|
|
35 | (1) |
|
Understanding the Religious Connection |
|
|
36 | (1) |
|
|
|
36 | (1) |
|
|
|
37 | (1) |
|
Terrorism: Structure and Management |
|
|
38 | (3) |
|
|
|
41 | (1) |
|
|
|
41 | (2) |
| Chapter 3 Homeland Security and Analysis |
|
43 | (18) |
|
Definition of Homeland Security |
|
|
43 | (1) |
|
Homeland Security Advisory System |
|
|
44 | (3) |
|
The Updated Homeland Security Advisory System |
|
|
47 | (2) |
|
National Threat Advisory System |
|
|
49 | (1) |
|
Homeland Security and Analysis |
|
|
49 | (1) |
|
The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act |
|
|
50 | (1) |
|
Importance of Finances in Terrorist Activities |
|
|
51 | (3) |
|
|
|
52 | (2) |
|
Benefits of Hawala System |
|
|
53 | (1) |
|
Charitable Contributions-Zakat |
|
|
53 | (1) |
|
|
|
54 | (4) |
|
|
|
55 | (2) |
|
Coordination, Training, and Awareness |
|
|
57 | (1) |
|
|
|
58 | (1) |
|
|
|
59 | (2) |
| Chapter 4 Behavioral Traits and Suspicious Activity |
|
61 | (22) |
|
National Information Sharing and Suspicious Activity Reporting |
|
|
63 | (1) |
|
Why Suspicious Activity Reporting, and the Role of Local Law Enforcement |
|
|
64 | (2) |
|
Suspicious Activity Reporting and the National Landscape |
|
|
66 | (1) |
|
Suspicious Activity Reporting Behavioral Indicators |
|
|
67 | (2) |
|
Actions Arousing Suspicion |
|
|
67 | (1) |
|
Possession Arousing Suspicion |
|
|
68 | (1) |
|
Retrieving the Suspicious Activity Report for Analysis |
|
|
69 | (1) |
|
Terrorism Information Needs |
|
|
69 | (3) |
|
Radicalization and Behaviors |
|
|
72 | (1) |
|
Early Indicators of Terrorism |
|
|
73 | (2) |
|
|
|
75 | (1) |
|
Relationships of People, Places, and Things |
|
|
76 | (3) |
|
Data and Information Quality |
|
|
79 | (1) |
|
|
|
79 | (1) |
|
|
|
80 | (1) |
|
|
|
80 | (1) |
|
|
|
81 | (2) |
| Chapter 5 Radicalization and Recruitment |
|
83 | (48) |
|
Defining the Topic of Radicalization |
|
|
83 | (1) |
|
Factors Conducive to Radicalization |
|
|
84 | (4) |
|
|
|
88 | (1) |
|
The Commonalities of Lone Wolf Terrorism: A Summary |
|
|
89 | (1) |
|
|
|
90 | (1) |
|
Profiles of Individual Radicalization |
|
|
91 | (1) |
|
|
|
92 | (1) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
|
|
95 | (8) |
|
|
|
96 | (1) |
|
|
|
97 | (1) |
|
|
|
98 | (1) |
|
Recruiting in the Digital Age |
|
|
99 | (4) |
|
|
|
103 | (3) |
|
Online Publications, Video Games, Live Streaming, and Direct Marketing Tactics |
|
|
103 | (3) |
|
|
|
106 | (1) |
|
Prison and Jail Radicalization |
|
|
106 | (3) |
|
Shared Characteristics and Backgrounds |
|
|
109 | (2) |
|
Religion in Correctional Institutions |
|
|
111 | (1) |
|
|
|
112 | (1) |
|
Other Religions and Trends |
|
|
113 | (2) |
|
Radical Extremist Groups with a Presence in Prisons and Jails |
|
|
115 | (2) |
|
Legal Concerns and Challenges |
|
|
117 | (5) |
|
Religious Freedom and Restoration Act |
|
|
117 | (1) |
|
The Religious Land Use and Institutionalized Persons Act |
|
|
118 | (1) |
|
Requests for Religious Accommodations and Libraries |
|
|
119 | (1) |
|
Identifying the Radical Visually |
|
|
120 | (2) |
|
Review of Worldwide Research Studies |
|
|
122 | (3) |
|
New York Police Department |
|
|
123 | (1) |
|
|
|
123 | (1) |
|
|
|
124 | (1) |
|
|
|
124 | (1) |
|
What Can Be Done to Prevent Recruitment and Radicalization |
|
|
125 | (2) |
|
|
|
127 | (1) |
|
|
|
127 | (4) |
| Chapter 6 Gathering Information: The Key to the Process |
|
131 | (18) |
|
|
|
131 | (2) |
|
Role of the First Responder |
|
|
133 | (2) |
|
Crimes and Incidents That May Yield Information or Links |
|
|
135 | (6) |
|
|
|
136 | (1) |
|
|
|
136 | (3) |
|
|
|
136 | (1) |
|
Illegal Trafficking of Cigarettes |
|
|
136 | (1) |
|
|
|
137 | (1) |
|
|
|
138 | (1) |
|
|
|
138 | (1) |
|
Found or Abandoned Property |
|
|
139 | (1) |
|
Gathering Limitations and Restrictions |
|
|
139 | (1) |
|
Gathering Information from Tips |
|
|
140 | (1) |
|
Intelligence Gathering and Information Interpretation |
|
|
141 | (4) |
|
Evaluating the Information Used |
|
|
145 | (1) |
|
|
|
146 | (1) |
|
|
|
146 | (3) |
| Chapter 7 Enhancing Investigations: Going Beyond the Traditional |
|
149 | (12) |
|
Middle Eastern Criminal Enterprises |
|
|
149 | (1) |
|
Financing Terrorism through Various Forms of Criminal Activity |
|
|
150 | (1) |
|
Role of the Financial Investigator in the Intelligence Process |
|
|
151 | (1) |
|
Role of Fusion Centers in the Intelligence Process |
|
|
152 | (3) |
|
Intelligence-Led Policing |
|
|
152 | (1) |
|
|
|
153 | (2) |
|
|
|
154 | (1) |
|
Handling of Classified Materials |
|
|
155 | (2) |
|
Security and Nondisclosure |
|
|
156 | (1) |
|
Source Development and Use in Investigations (Human Intelligence) |
|
|
157 | (3) |
|
Source Development and Handling Procedures |
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
Confidential Source Management and Reporting |
|
|
159 | (1) |
|
|
|
160 | (1) |
|
|
|
160 | (1) |
| Chapter 8 Working the Puzzle One Piece at a Time: Learning to Anticipate Behavior |
|
161 | (24) |
|
|
|
162 | (1) |
|
|
|
162 | (2) |
|
|
|
164 | (2) |
|
Identifying What Is Needed |
|
|
166 | (2) |
|
Forms of Analysis That Can Be Used to Identify the Missing Piece |
|
|
168 | (9) |
|
Use of Calendars and Significant Dates in Analysis |
|
|
169 | (10) |
|
|
|
169 | (2) |
|
Dates of Terrorism Significance |
|
|
171 | (6) |
|
Learning from Past Behavior |
|
|
177 | (1) |
|
Looking for Skill, Knowledge, Resource, Access(ibility), Motive |
|
|
177 | (2) |
|
|
|
179 | (1) |
|
Prisons-Recruitment and Communication |
|
|
179 | (2) |
|
Ability to Communicate from Within |
|
|
179 | (2) |
|
Gangs-Today's Street Terrorists |
|
|
181 | (1) |
|
Mara Salvatrucha 13 and Sureno 13 |
|
|
181 | (1) |
|
Music-Another Means to Recruit |
|
|
182 | (1) |
|
|
|
183 | (1) |
|
|
|
183 | (2) |
| Chapter 9 Enhanced Analysis: Transforming Information into Intelligence |
|
185 | (30) |
|
Analyzing: Transforming Information into Intelligence |
|
|
185 | (1) |
|
Analytical and Investigative Variables |
|
|
186 | (3) |
|
Websites and Other Resources |
|
|
189 | (5) |
|
Macro-Micro-Macro Continuum |
|
|
194 | (5) |
|
|
|
196 | (1) |
|
Association and Directional Matrices |
|
|
197 | (1) |
|
|
|
198 | (1) |
|
Heuer's Analysis of Competing Hypotheses (ACH) |
|
|
199 | (1) |
|
|
|
199 | (2) |
|
|
|
201 | (2) |
|
Spatial Referencing and Its Use in Homeland Security Analysis |
|
|
203 | (7) |
|
Range of Geographic Information System Uses |
|
|
205 | (1) |
|
|
|
206 | (1) |
|
Geographic Information System Linking |
|
|
206 | (1) |
|
Additional Benefits of a Geographic Information System |
|
|
207 | (14) |
|
Identifying Potential Targets |
|
|
207 | (3) |
|
Dissemination of Intelligence |
|
|
210 | (1) |
|
Commonly Used Analytical Reports |
|
|
211 | (1) |
|
|
|
212 | (1) |
|
|
|
213 | (2) |
| Chapter 10 The Threat: The Future Is Here Today-Learning from the Past |
|
215 | (36) |
|
|
|
216 | (1) |
|
Transportation and Terrorism |
|
|
216 | (3) |
|
The IRA Campaign against Transportation |
|
|
219 | (1) |
|
Planes, Trains, and Automobiles-But There Are More |
|
|
219 | (1) |
|
United States: Terrorism and Transportation |
|
|
219 | (1) |
|
Symbolic Government Targets |
|
|
220 | (1) |
|
Notable Terrorist Cases and Attacks with a Transportation Nexus Other than 9/11 |
|
|
221 | (15) |
|
|
|
221 | (3) |
|
Popular Front for the Liberation of Palestine-The Masters of Airplane Hijacking |
|
|
221 | (1) |
|
|
|
221 | (1) |
|
|
|
222 | (1) |
|
|
|
223 | (1) |
|
|
|
224 | (1) |
|
|
|
225 | (1) |
|
|
|
225 | (1) |
|
Buses and Trains/Railways |
|
|
225 | (5) |
|
|
|
227 | (1) |
|
|
|
227 | (1) |
|
|
|
227 | (1) |
|
Highlights of Aum in Other Countries |
|
|
228 | (1) |
|
|
|
229 | (1) |
|
Trucks, Cars, Vans, Taxis, Limos, and Rescue Vehicles |
|
|
230 | (4) |
|
|
|
232 | (1) |
|
|
|
233 | (1) |
|
Embassy-Dar es Salaam, Tanzania |
|
|
233 | (1) |
|
|
|
234 | (1) |
|
Summary of Recent Transportation Targets |
|
|
235 | (1) |
|
|
|
236 | (3) |
|
Who Are the Bombers and Their Groups? |
|
|
237 | (1) |
|
|
|
238 | (1) |
|
Homegrown Terror-Learning from Others |
|
|
239 | (10) |
|
|
|
240 | (3) |
|
|
|
240 | (1) |
|
|
|
241 | (1) |
|
Jose Padilla-Aka The Dirty Bomber |
|
|
242 | (1) |
|
William Morgan-Cuban Revolutionary |
|
|
243 | (1) |
|
Cases for Groups Found in the United States and Abroad |
|
|
243 | (3) |
|
|
|
243 | (1) |
|
|
|
243 | (1) |
|
|
|
243 | (1) |
|
Islamic Association for Palestine |
|
|
243 | (1) |
|
Jamaat al-Fuqra and the Muslims of America |
|
|
244 | (1) |
|
Coming to the Attention of Law Enforcement |
|
|
245 | (1) |
|
The Jamaat al-Fuqra and Muslims of the America Today |
|
|
245 | (1) |
|
Educating, Recruiting, and Funding |
|
|
245 | (1) |
|
|
|
246 | (8) |
|
|
|
246 | (1) |
|
|
|
247 | (1) |
|
|
|
248 | (1) |
|
|
|
249 | (1) |
|
|
|
249 | (2) |
| Chapter 11 What the Future May Hold |
|
251 | (40) |
|
Foreign-Based Terrorist Influence |
|
|
251 | (3) |
|
Groups, Movements, and Ideologies with a Presence in the United States |
|
|
254 | (12) |
|
|
|
255 | (1) |
|
|
|
255 | (1) |
|
Hamas (Islamic Resistance Movement) |
|
|
256 | (10) |
|
The Muslim Brotherhood Movement (Hizb al-lkhwan al-Muslimun) |
|
|
266 | (2) |
|
|
|
266 | (3) |
|
Wahhabi Organizations in North America |
|
|
267 | (1) |
|
|
|
268 | (1) |
|
|
|
268 | (1) |
|
|
|
269 | (5) |
|
|
|
269 | (1) |
|
Spectrum of Cyber Conflict |
|
|
270 | (4) |
|
Using IP Addresses and E-mails in Analysis |
|
|
274 | (1) |
|
Some Internet Problems That Might Come Up during Analysis |
|
|
274 | (1) |
|
Finding Information in an E-mail |
|
|
274 | (7) |
|
|
|
275 | (1) |
|
|
|
275 | (1) |
|
|
|
276 | (2) |
|
Understanding IP Addresses |
|
|
276 | (1) |
|
|
|
277 | (1) |
|
No Message, No Extended Header, No IP Address |
|
|
278 | (1) |
|
Tracing an E-mail Address to an Owner |
|
|
278 | (1) |
|
Does the Target Have a Web Page? |
|
|
279 | (1) |
|
How Does One Trace a Web Address? |
|
|
279 | (2) |
|
Bioterrorism and Weapons of Mass Destruction |
|
|
281 | (8) |
|
The Past, Present, and Future |
|
|
289 | (1) |
|
|
|
289 | (1) |
|
|
|
290 | (1) |
| Chapter 12 Conclusion |
|
291 | (4) |
|
Expanding Horizons through Media Outlets |
|
|
292 | (1) |
|
Muslim/Arab Internet News Sites and Resources |
|
|
292 | (2) |
|
|
|
294 | (1) |
| Appendices |
|
|
Appendix A: Domestic-Based Terrorist Organizations |
|
|
295 | (4) |
|
Appendix B: "Patriot" Groups in the United States |
|
|
299 | (24) |
|
Appendix C: Symbols of Hate |
|
|
323 | (2) |
|
Appendix D: Foreign-Based Terrorist Organizations |
|
|
325 | (30) |
|
Appendix E: Explosive Materials |
|
|
355 | (8) |
|
Appendix F: Homeland Security State Contact List |
|
|
363 | (10) |
|
Appendix G: Publication References |
|
|
373 | (6) |
|
Appendix H: Government Legislative References |
|
|
379 | (4) |
|
Appendix I: Glossary of Terminology |
|
|
383 | (22) |
|
Appendix J: Department of Homeland Security-Recognized Fusion Centers |
|
|
405 | (10) |
|
Appendix K: Sources of Information References for Investigators |
|
|
415 | (18) |
| Index |
|
433 | |