fbpx
Wikipedia

Counterterrorism

Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or eliminate terrorism. Counterterrorism strategies are a government's motivation to use the instruments of national power to defeat terrorists, the organizations they maintain, and the networks they contain.[1]

GIGN operators in 2015. GIGN is the counterterrorist tactical unit of the National Gendarmerie of France.
A United States Coast Guard vessel conducting a counterterrorism patrol in Upper New York Bay

If definitions of terrorism are part of a broader insurgency, counterterrorism may employ counterinsurgency measures. The United States Armed Forces uses the term foreign internal defense for programs that support other countries' attempts to suppress insurgency, lawlessness, or subversion, or to reduce the conditions under which threats to national security may develop.[2][3][4]

History

The first counter-terrorism body formed was the Special Irish Branch of the Metropolitan Police, later renamed the Special Branch after it expanded its scope beyond its original focus on Fenian terrorism. Law enforcement agencies established similar units in the United Kingdom and elsewhere.[5] The first tactical counterterrorist unit was GSG 9 of the German Federal Police, formed in response to the 1972 Munich massacre.[6]

Counter-terrorism forces expanded with the perceived growing threat of terrorism in the late 20th century. After the September 11 attacks, Western governments made counter-terrorism efforts a priority, including more foreign cooperation, shifting tactics involving red teams,[7] and preventive measures.[8] Although sensational attacks in the developed world receive a great deal of media attention,[9] most terrorism occurs in less developed countries.[10] Government responses to terrorism, in some cases, can lead to substantial unintended consequences,[11] such as in the above-mentioned Munich massacre.

Planning

Intelligence, surveillance, and reconnaissance

 
Yamam, one of Israel's counter-terrorism units

Most counter-terrorism strategies involve an increase in standard police and domestic intelligence. The central activities are traditional: interception of communications and the tracing of persons. New technology has, however, expanded the range of military and law enforcement operations.

Domestic intelligence is often directed at specific groups, defined based on origin or religion, which is a source of political controversy. Mass surveillance of an entire population raises objections on civil liberties grounds. Domestic terrorists, especially lone wolves, are often harder to detect because of their citizenship or legal status and ability to stay under the radar.[12]

To select the effective action when terrorism appears to be more of an isolated event, the appropriate government organizations need to understand the source, motivation, methods of preparation, and tactics of terrorist groups. Good intelligence is at the heart of such preparation, as well as a political and social understanding of any grievances that might be solved. Ideally, one gets information from inside the group, a very difficult challenge for human intelligence operations because operational terrorist cells are often small, with all members known to one another, perhaps even related.[13]

Counterintelligence is a great challenge with the security of cell-based systems, since the ideal, but the nearly impossible, goal is to obtain a clandestine source within the cell. Financial tracking can play a role, as a communications intercept. However, both of these approaches need to be balanced against legitimate expectations of privacy.[14]

Legal contexts

In response to the growing legislation.

  United Kingdom

Since 1978 the UK's terrorism laws have been regularly reviewed by a security-cleared Independent Reviewer of Terrorism Legislation, whose often influential reports are submitted to Parliament and published in full.

  United States
  Australia
  • Australia has passed several anti-terrorism acts. In 2004, a bill comprising three acts Anti-terrorism Act, 2004, (No 2) and (No 3) was passed. Then Attorney-General, Philip Ruddock, introduced the Anti-terrorism bill, 2004 on March 31. He described it as "a bill to strengthen Australia's counter-terrorism laws in a number of respects – a task made more urgent following the recent tragic terrorist bombings in Spain." He said that Australia's counter-terrorism laws "require review and, where necessary, updating if we are to have a legal framework capable of safeguarding all Australians from the scourge of terrorism." The Australian Anti-Terrorism Act 2005 supplemented the powers of the earlier acts. The Australian legislation allows police to detain suspects for up to two weeks without charge and to electronically track suspects for up to a year. The Australian Anti-Terrorism Act of 2005 included a "shoot-to-kill" clause. In a country with entrenched liberal democratic traditions, the measures are controversial and have been criticized by civil libertarians and Islamic groups.[16]
  Israel
  • Israel monitors a list of designated terrorist organizations and has laws forbidding membership in such organizations and funding or helping them.
  • On December 14, 2006, the Israeli Supreme Court ruled targeted killings were a permitted form of self-defense.[17]
  • In 2016 the Israeli Knesset passed a comprehensive law against terrorism, forbidding any kind of terrorism and support of terrorism, and setting severe punishments for terrorists. The law also regulates legal efforts against terrorism.[18]

Human rights

 
John Walker Lindh was captured as an enemy combatant during the United States' 2001 invasion of Afghanistan.

One of the primary difficulties of implementing effective counter-terrorist measures is the waning of civil liberties and individual privacy that such measures often entail, both for citizens of, and for those detained by states attempting to combat terror.[19] At times, measures designed to tighten security have been seen as abuses of power or even violations of human rights.[20]

Examples of these problems can include prolonged, incommunicado detention without judicial review or long periods of 'preventive detention';[21] risk of subjecting to torture during the transfer, return and extradition of people between or within countries; and the adoption of security measures that restrain the rights or freedoms of citizens and breach principles of non-discrimination.[22] Examples include:

  • In November 2003, Malaysia passed new counter-terrorism laws, widely criticized by local human rights groups for being vague and overbroad. Critics claim that the laws put the fundamental rights of free expression, association, and assembly at risk. Malaysia persisted in holding around 100 alleged militants without trial, including five Malaysian students detained for alleged terrorist activity while studying in Karachi, Pakistan.[22]
  • In November 2003, a Canadian-Syrian national, Maher Arar, publicly alleged that he had been tortured in a Syrian prison after being handed over to the Syrian authorities by the U.S.[22]
  • In December 2003, Colombia's congress approved legislation that would give the military the power to arrest, tap telephones, and carry out searches without warrants or any previous judicial order.[22]
  • Images of unpopular treatment of detainees in U.S. custody in Iraq and other locations have encouraged international scrutiny of U.S. operations in the war on terror.[23]
  • Hundreds of foreign nationals remain in prolonged indefinite detention without charge or trial in Guantánamo Bay, despite international and U.S. constitutional standards some groups believe outlaw such practices.[23]
  • Hundreds of people suspected of connections with the Taliban or Al-Qaeda remain in long-term detention in Pakistan or in U.S.-controlled centers in Afghanistan.[23]
  • China has used the "war on terror" to justify its policies in the predominantly Muslim Xinjiang Uyghur Autonomous Region to stifle Uyghur identity.[23]
  • In Morocco, Saudi Arabia, Tunisia, Yemen, and other countries, scores of people have been arrested and arbitrarily detained in connection with suspected terrorist acts or links to opposition armed groups.[23]
  • Until 2005, eleven men remained in high security detention in the UK under the Anti-Terrorism, Crime and Security Act 2001.[23]
  • United Nations experts condemned the misuse of counter-terrorism powers by the Egyptian authorities following the arrest, detention, and designation of human rights activists Ramy Shaath and Zyad El-Elaimy as terrorists. The two activists were arrested in June 2019, and the first-ever renewal of remand detention for Shaath came for the 21st time in 19 months on 24 January 2021. Experts called it alarming, and demanded the urgent implementation of the Working Group's opinion and removal of the two's names from the "terrorism entities' list.[24]

Many argue that such violations of rights could exacerbate rather than counter the terrorist threat.[22] Human rights activists argue for the crucial role of human rights protection as an intrinsic part to fight against terrorism.[23][25] This suggests, as proponents of human security have long argued, that respecting human rights may indeed help us to incur security. Amnesty International included a section on confronting terrorism in the recommendations in the Madrid Agenda arising from the Madrid Summit on Democracy and Terrorism (Madrid March 8–11, 2005):

Democratic principles and values are essential tools in the fight against terrorism. Any successful strategy for dealing with terrorism requires terrorists to be isolated. Consequently, the preference must be to treat terrorism as criminal acts to be handled through existing systems of law enforcement and with full respect for human rights and the rule of law. We recommend: (1) taking effective measures to make impunity impossible either for acts of terrorism or for the abuse of human rights in counter-terrorism measures. (2) the incorporation of human rights laws in all anti-terrorism programs and policies of national governments as well as international bodies."[23]

While international efforts to combat terrorism have focused on the need to enhance cooperation between states, proponents of human rights (as well as human security) have suggested that more effort needs to be given to the effective inclusion of human rights protection as a crucial element in that cooperation. They argue that international human rights obligations do not stop at borders, and a failure to respect human rights in one state may undermine its effectiveness in the global effort to cooperate to combat terrorism.[22]

Preemptive neutralization

Some countries see preemptive attacks as a legitimate strategy. This includes capturing, killing, or disabling suspected terrorists before they can mount an attack. Israel, the United Kingdom, the United States, and Russia have taken this approach, while Western European states generally do not.

Another major method of preemptive neutralization is the interrogation of known or suspected terrorists to obtain information about specific plots, targets, the identity of other terrorists, whether or not the interrogation subjects himself is guilty of terrorist involvement. Sometimes more extreme methods are used to increase suggestibility, such as sleep deprivation or drugs. Such methods may lead captives to offer false information in an attempt to stop the treatment, or due to the confusion caused by it. These methods are not tolerated by European powers. In 1978 the European Court of Human Rights ruled in the Ireland v. United Kingdom case that such methods amounted to a practice of inhuman and degrading treatment, and that such practices were in breach of the European Convention on Human Rights Article 3 (art. 3).

Non-military

 
Transparent garbage bin installed at Central Station in Sydney. The bin is clear so police can easily examine its contents, preventing the potential placement of bombs or the disposal of weaponry by terrorists.

The human security paradigm outlines a non-military approach that aims to address the enduring underlying inequalities which fuel terrorist activity. Causal factors need to be delineated and measures implemented which allow equal access to resources and sustainability for all people. Such activities empower citizens, providing "freedom from fear" and "freedom from want".[citation needed]

This can take many forms, including the provision of clean drinking water, education, vaccination programs, provision of food and shelter and protection from violence, military or otherwise. Successful human security campaigns have been characterized by the participation of a diverse group of actors, including governments, NGOs, and citizens.[citation needed]

Foreign internal defense programs provide outside expert assistance to a threatened government. FID can involve both non-military and military aspects of counter-terrorism.[citation needed]

A 2017 study found that "governance and civil society aid is effective in dampening domestic terrorism, but this effect is only present if the recipient country is not experiencing a civil conflict."[26]

Military

 
U.S. Marines in Afghanistan

Terrorism has often been used to justify military intervention in countries like Pakistan, where terrorists are said to be based. That was the primary stated justification for the U.S. invasion of Afghanistan. It was also a stated justification for the second Russian invasion of Chechnya.

Military intervention has not always been successful in stopping or preventing future terrorism, such as during the Malayan Emergency, the Mau Mau uprising, and most of the campaigns against the IRA during the Irish Civil War, the S-Plan, the Border Campaign (IRA) and the Troubles in Northern Ireland. Although military action can temporarily disrupt a terrorist group's operations temporarily, it sometimes does not end the threat completely.[27]

Repression by the military in itself usually leads to short term victories, but tend to be unsuccessful in the long run (e.g., the French doctrine used in colonial Indochina and Algeria[28]), particularly if it is not accompanied by other measures. However, new methods such as those taken in Iraq have yet to be seen as beneficial or ineffectual.[29]

Preparation

Target-hardening

Whatever the target of terrorists, there are multiple ways of hardening the targets to prevent the terrorists from hitting their mark, or reducing the damage of attacks. One method is to place hostile vehicle mitigation to enforce protective standoff distance outside tall or politically sensitive buildings to prevent car bombings. Another way to reduce the impact of attacks is to design buildings for rapid evacuation.[30]

Aircraft cockpits are kept locked during flights and have reinforced doors, which only the pilots in the cabin are capable of opening. UK railway stations removed their garbage bins in response to the Provisional IRA threat, as convenient locations for depositing bombs. Scottish stations removed theirs after the 7 July 2005 London Bombings as a precautionary measure. The Massachusetts Bay Transportation Authority purchased bomb-resistant barriers after the September 11 attacks.

 
Israeli Iron Dome active protection system, capable of intercepting airborne rockets and artillery shells

As Israel is suffering from constant shelling of its cities, towns, and settlements by artillery rockets from the Gaza Strip (mainly by Hamas, but also by other Palestinian factions) and Lebanon (mainly by Hezbollah), Israel developed several defensive measures against artillery, rockets, and missiles. These include building a bomb shelter in every building and school, but also deploying active protection systems such as the Arrow ABM, Iron Dome and David's Sling, which intercept the incoming threat in the air. Iron Dome has successfully intercepted hundreds of Qassam rockets and Grad rockets fired by Palestinians from the Gaza Strip.

A more sophisticated target-hardening approach must consider industrial and other critical industrial infrastructure that could be attacked. Terrorists do not need import chemical weapons if they can cause a major industrial accident such as the Bhopal disaster or the Halifax Explosion. Industrial chemicals in manufacturing, shipping, and storage thus require greater protection, and some efforts are in progress.[31] To put this risk into perspective, the first major lethal chemical attack of World War I used 160 tons of chlorine; industrial shipments of chlorine, widely used in water purification and the chemical industry, travel in 90- or 55-ton tank cars.

To give one more example, the Northeast blackout of 2003 demonstrated the vulnerability of the North American electrical grid to natural disasters coupled with inadequate, possibly insecure, SCADA (supervisory control and data acquisition) networks. Part of the vulnerability is due to deregulation, leading to much more interconnection in a grid designed for only occasional power-selling between utilities. A small number of terrorists, attacking critical power facilities when one or more engineers have infiltrated the power control centers, could wreak havoc.

Equipping likely targets with containers of pig lard has been used to discourage attacks by suicide bombers. The technique was apparently used on a limited scale by British authorities in the 1940s. The approach stems from the idea that Muslims perpetrating the attack would not want to be "soiled" by the lard in the moment before dying.[32] The idea has been suggested more recently as a deterrent to suicide bombings in Israel.[33] However, the actual effectiveness of this tactic is likely limited. A sympathetic Islamic scholar could issue a fatwa proclaiming that a suicide bomber would not be polluted by the swine products.

Command and control

For a threatened or completed terrorist attack, an incident command system (ICS) may be invoked to control the various services that may need to be involved in the response. ICS has varied levels of escalation, such as might be required for multiple incidents in a given area (e.g. 2005 London bombings or the 2004 Madrid train bombings), or all the way to a national response plan invocation if national-level resources are needed. For example, a national response might be required for a nuclear, biological, radiological, or significant chemical attack.

Damage mitigation

Fire departments, perhaps supplemented by public works agencies, utility providers, and heavy construction contractors, are most apt to deal with the physical consequences of an attack.

Local security

Again under an incident command model, local police can isolate the incident area, reducing confusion, and specialized police units can conduct tactical operations against terrorists, often using specialized counterterrorist tactical units. Bringing in such units will typically involve civil or military authority beyond the local level.

Medical services

Emergency medical services are capable of triaging, treating, and transporting the more severely affected individuals to hospitals, which typically have mass casualty and triage plans in place for terrorist attacks.

Public health agencies, from local to the national level, may be designated to deal with identification, and sometimes mitigation, of possible biological attacks, and sometimes chemical or radiologic contamination.

Tactical units

 
Royal Malaysia Police Pasukan Gerakan Khas officers breaching a door.

Many countries have dedicated counterterrorist units trained to handle terrorist threats. Besides various security agencies, there are police tactical units whose role is to directly engage terrorists and prevent terrorist attacks. Such units perform both in preventive actions, hostage rescue, and responding to ongoing attacks. Countries of all sizes can have highly trained counterterrorist teams. Tactics, techniques, and procedures for manhunting are under constant development.

These units are specially trained in military tactics and are equipped for close-quarters combat, with emphasis on stealth and performing the mission with minimal casualties. The units include assault teams, snipers, EOD experts, dog handlers, and intelligence officers. Most of these measures deal with terrorist attacks that affect an area or threaten to do so, or are lengthy situations such as shootouts and hostage takings that allow the counterterrorist units to assemble and respond; it is harder to deal with shorter incidents such as assassinations or reprisal attacks, due to the short warning time and the quick exfiltration of the assassins.[34]

The majority of counterterrorism operations at the tactical level are conducted by state, federal, and national law enforcement or intelligence agencies. In some countries, the military may be called in as a last resort. For countries whose military is legally permitted to conduct domestic law enforcement operations, this is not an issue, and such counterterrorism operations are conducted by their military.

Counterterrorist operations

 
GSG 9 troopers disembarking from a helicopter in 1978

Some counter-terrorist actions of the 20th and 21st centuries are listed below. See list of hostage crises for a more extended list, including hostage-takings that did not end violently.

Representative counterterrorist operations
Incident Main locale Hostage nationality Kidnappers
/hijackers
Counter-terrorist force Results
1972 Sabena Flight 571 Tel Aviv-Lod International Airport, Israel Mixed Black September Sayeret Matkal 2 hijackers killed, 1 passenger died from wounds during raid. 2 passengers and 1 commando injured. 2 kidnappers captured. All other 96 passengers rescued.
1972 Munich massacre Munich, West Germany Israeli Black September German Federal Border Guard All hostages murdered; 5 kidnappers and 1 West German police officer killed. 3 kidnappers captured and released. This fatal result was the reason for the foundation of the German special counterterrorism unit GSG9
1975 AIA building hostage crisis AIA building, Kuala Lumpur, Malaysia Mixed. American and Swedish Japanese Red Army Special Actions Unit All hostages released, all kidnappers flown to Libya.
1976 Operation Entebbe Entebbe Airport, Uganda Israelis and Jews. Non-Jewish hostages were released shortly after capture. PFLP Sayeret Matkal, Sayeret Tzanhanim, Sayeret Golani All 7 hijackers, 45 Ugandan troops, 3 hostages, and 1 Israeli soldier were killed. 100 hostages rescued
1977 Lufthansa Flight 181 Initially over the Mediterranean

Sea, south of the French coast;

subsequently Mogadishu International Airport, Somalia

Mixed PFLP GSG 9, Special Air Service consultants 1 hostage killed before the raid; 3 hijackers killed and 1 captured. 90 hostages rescued.
1980 Casa Circondariale di Trani Prison riot[citation needed] Trani, Italy Italian Red Brigades Gruppo di intervento speciale (GIS) 18 police officers rescued, all terrorists captured.
1980 Iranian Embassy siege London, UK Mostly Iranian but some British Democratic Revolutionary Movement for the Liberation of Arabistan Special Air Service 5 kidnappers killed, 1 kidnapper captured. 1 hostage killed prior to raid, 1 hostage killed by kidnapper during raid; 24 hostages rescued. 1 SAS operative received minor burns.
1981 Garuda Indonesia Flight 206 Don Mueang Airport, Bangkok, Thailand Mostly Indonesian, some Europeans/Americans Komando Jihad Kopassus assault group, RTAF securing perimeter 5 hijackers killed (2 likely killed extrajudicially after raid),1 Kopassus operative killed, 1 pilot fatally wounded by terrorist, all hostages rescued.
1982 Kidnapping of General James L. Dozier Padua, Italy American Red Brigades Nucleo Operativo Centrale di Sicurezza (NOCS) Hostage saved, capture of the entire terrorist cell.
1983 Turkish embassy attack Lisbon, Portugal Turkish Armenian Revolutionary Army GOE 5 hijackers, 1 hostage, and 1 police officer killed, 1 hostage and 1 police officer wounded.
1985 Achille Lauro hijacking MS Achille Lauro off the Egyptian coast Mixed Palestine Liberation Organization U.S. military, turned over to Italian special forces (Gruppo di intervento speciale) 1 hostage killed during hijacking, 4 hijackers convicted in Italy
1986 Pudu Prison siege Pudu Prison, Kuala Lumpur, Malaysia Two doctors Prisoners Special Actions Unit 6 kidnappers captured, 2 hostages rescued
1993 Indian Airlines Flight 427 Hijacked between Delhi and Srinagar, India 141 passengers Islamic terrorist (Mohammed Yousuf Shah) National Security Guard 1 hijacker killed, all hostages rescued.
1986 Pudu Prison siege Pudu Prison, Kuala Lumpur, Malaysia Two doctors Prisoners Special Actions Unit 6 kidnappers captured, 2 hostages rescued
1988 Mothers Bus Hijacked between Beer Sheva and Dimona, Israel 11 passengers Palestinian Liberation Organization YAMAM 3 hijacker killed, 3 hostages killed, 8 hostages rescued
1994 Air France Flight 8969 Marseille, France Mixed Armed Islamic Group of Algeria GIGN 4 hijackers killed. 3 hostages killed before the raid, 229 hostages rescued
1996 Japanese embassy hostage crisis Lima, Peru Japanese and guests (800+) Túpac Amaru Revolutionary Movement Peruvian military & police mixed forces All 14 kidnappers, 1 hostage, and 2 rescuers killed.
1996 Mapenduma hostage crisis Mapenduma, Indonesia Mixed (19 Indonesians, 4 British, 2 Dutch, & 1 German) Kelly Kwalik's Free Papua Movement (OPM) Group Kopassus's SAT-81 Gultor CT Group, Kostrad's Infantry Battalion, & Penerbad (Army Aviation) Mixed Forces. 8 kidnappers killed, 2 kidnappers captured. 2 hostages killed by kidnappers, 24 Hostages rescued. 5 Army Operatives killed in helicopter accident.
2000 Sauk Siege Perak, Malaysia Malaysian (2 police officers, 1 soldier and 1 civilian) Al-Ma'unah Grup Gerak Khas and 20 Pasukan Gerakan Khas, mixed forces 2 hostages, 2 rescuers, and 1 kidnapper killed. Other 28 kidnappers captured.
2001–2005 Pankisi Gorge crisis Pankisi Gorge, Kakheti, Georgia Mixed, Al-Qaeda and Chechen rebels led by Ibn al-Khattab 2400 troops and 1000 police officers Terrorism threats in the gorge were repressed.
2002 Moscow theater hostage crisis Moscow, Russia Mixed, mostly Russian (900+) Special Purpose Islamic Regiment Spetsnaz All 39 kidnappers and 129–204 hostages killed. 600–700 hostages freed.
2004 Beslan school siege Beslan, North Ossetia-Alania, Russia Russian Riyad-us Saliheen MVD (including OMON), Russian army (including Spetsnaz), Russian police (Militsiya) 334 hostages killed and hundreds wounded. 10–21 rescuers killed. 31 kidnappers killed, 1 captured.
2007 Siege of Lal Masjid Islamabad, Pakistan Students and Tehrik-i-Taliban Pakistan Pakistan Army and Rangers, Special Service Group 91 students/militants killed, 50 militants captured. 10 SSG and 1 Ranger killed; 33 SSG, 3 Rangers, 8 soldiers wounded. 204 civilians injured.
2007 Kirkuk Hostage Rescue[citation needed] Kirkuk, Iraq Turkman child Islamic State of Iraq Al Qaeda PUK's Kurdistan Regional Government's Counter Terrorism Group 5 kidnappers arrested, 1 hostage rescued[citation needed]
2008 Operation Jaque Colombia Mixed Revolutionary Armed Forces of Colombia Columbian military 15 hostages rescued. 2 kidnappers captured
2008 Operations Dawn Gulf of Aden, Somalia Mixed Somali pirates and militants PASKAL and mixed international forces Negotiation finished. 80 hostages released. RMN, including PASKAL navy commandos with mixed international forces patrolling the Gulf of Aden during this festive period.[35][36][37]
2008 2008 Mumbai attacks Multiple locations in Mumbai city Indian Nationals, Foreign tourists Ajmal Qasab and other Pakistani nationals affiliated to Laskar-e-taiba National Security Guard, MARCOS and Para SF 141 Indian civilians, 30 foreigners, 15 police officers, and two NSG commandos were killed. 9 attackers killed, 1 attacker captured. 293 individuals injured
2009 2009 Lahore Attacks Multiple locations in Lahore city Pakistan Lashkar-e-Taiba Police Commandos, Army Rangers Battalion March 3, The Sri Lankan cricket team attack – 6 members of the Sri Lankan cricket team were injured, 6 Pakistani police officers and 2 civilians killed.

March 30, the Manawan Police Academy in Lahore attack – 8 gunmen, 8 police personnel and 2 civilians killed, 95 people injured, 4 gunmen captured.[citation needed]
Plaza Cinema Chowk attack – 16 police officers, an army officer and unknown number of civilians killed. As many as 251 people injured.[citation needed]

2011 Operation Dawn of Gulf of Aden Gulf of Aden, Somalia Koreans, Myanmar, Indonesian Somali pirates and militants Republic of Korea Navy Special Warfare Flotilla (UDT/SEAL) 4+ kidnappers killed or missing (Jan 18). 8 kidnappers killed, 5 captured. All hostages rescued.
2012 Lopota Gorge hostage crisis Lopota Gorge, Georgia Georgians Ethnic Chechen, Russian, and Georgian militants Special Operations Center, SOD, KUD and army special forces 2 KUD members and one special forces corpsman killed, 5 police officers wounded. 11 kidnappers killed, 5 wounded, and 1 captured. All hostages rescued.
2013 2013 Lahad Datu standoff Lahad Datu, Sabah, Malaysia Malaysians Royal Security Forces of the Sultanate of Sulu and North Borneo (Jamalul Kiram III's faction) Malaysian Armed Forces, Royal Malaysia Police, Malaysian Maritime Enforcement Agency and joint counter-terrorism forces as well as Philippine Armed Forces. 8 police officers (including 2 PGK commandos) and one soldier killed, 12 others wounded. 56 militants killed, 3 wounded, and 149 captured. All hostages rescued. 6 civilians killed and one wounded.
2017 2017 Isani flat siege Isani district, Tbilisi, Georgia Georgians Chechen militants SUS Counter Terror Unit, Police special forces 3 militants killed, including Akhmed Chatayev. One special forces officer killed during skirmishes.

Designing counterterrorist systems

The scope for anti-terrorism systems is very large in physical terms and in other dimensions, such as type and degree of terrorist threats, political and diplomatic ramifications, and legal concerns. Ideal counterterrorist systems use technology to enable persistent intelligence, surveillance and reconnaissance missions, and potential actions. Designing such a system-of-systems comprises a major technological project.[38]

A particular design problem for counterterrorist systems is the uncertainty of the future: the threat of terrorism may increase, decrease or remain the same, the type of terrorism and location are difficult to predict, and there are technological uncertainties. A potential solution is to incorporate engineering flexibility into system design, allowing for flexibility when new information arrives. Flexibility can be incorporated in the design of a counterterrorism system in the form of options that can be exercised in the future when new information is available.[38]

Law enforcement

While some countries with longstanding terrorism problems have law enforcement agencies primarily designed to prevent and respond to terror attacks,[39] in other nations, counterterrorism is a relatively more recent objective of law enforcement agencies.[40][41]

Though some civil libertarians and criminal justice scholars have criticized efforts of law enforcement agencies to combat terrorism as futile and expensive[42] or as threats to civil liberties,[42] other scholars have analyzed the most important dimensions of the policing of terrorism as an important dimension of counter-terrorism, especially in the post-9/11 era, and have discussed how police view terrorism as a matter of crime control.[40] Such analyses highlight the civilian police role in counterterrorism next to the military model of a war on terror.[43]

American law enforcement

Pursuant to passage of the Homeland Security Act of 2002, federal, state, and local law enforcement agencies began to systemically reorganize.[44][45] Two primary federal agencies, the Department of Justice (DOJ) and the Department of Homeland Security (DHS), house most of the federal agencies that are prepared to combat domestic and international terrorist attacks. These include the Border Patrol, the Secret Service, the Coast Guard and the FBI.

Following suit from federal changes pursuant to 9/11, however, most state and local law enforcement agencies began to include a commitment to "fighting terrorism" in their mission statements.[46][47] Local agencies began to establish more patterned lines of communication with federal agencies. Some scholars have doubted the ability of local police to help in the war on terror and suggest their limited manpower is still best utilized by engaging community and targeting street crimes.[42]

While counter-terror measures (most notably heightened airport security, immigrant profiling[48] and border patrol) have been adapted during the last decade, to enhance counter-terror in law enforcement, there have been remarkable limitations to assessing the actual utility/effectiveness of law enforcement practices that are ostensibly preventative.[49] Thus, while sweeping changes in counter-terrorism rhetoric redefined most American post 9/11 law enforcement agencies in theory, it is hard to assess how well such hyperbole has translated into practice.

In intelligence-led policing (ILP) efforts, the most quantitatively amenable starting point for measuring the effectiveness of any policing strategy (i.e.: Neighborhood Watch, Gun Abatement, Foot Patrols, etc.) is usually to assess total financial costs against clearance rates or arrest rates. Since terrorism is such a rare event phenomena,[50] measuring arrests or clearance rates would be a non-generalizable and ineffective way to test enforcement policy effectiveness. Another methodological problem in assessing counter-terrorism efforts in law enforcement hinges on finding operational measures for key concepts in the study of homeland security. Both terrorism and homeland security are relatively new concepts for criminologists, and academicians have yet to agree on the matter of how to properly define these ideas in a way that is accessible.

Counter-terrorism agencies

 
SEK members of North Rhine-Westphalia (Germany) during an exercise

Military

Within military operational approaches, counter-terrorism falls into the category of irregular warfare.[51] Given the nature of operational counter-terrorism tasks national military organizations do not generally have dedicated units whose sole responsibility is the prosecution of these tasks. Instead the counter-terrorism function is an element of the role, allowing flexibility in their employment, with operations being undertaken in the domestic or international context.

In some cases the legal framework within which they operate prohibits military units conducting operations in the domestic arena; United States Department of Defense policy, based on the Posse Comitatus Act, forbids domestic counter-terrorism operations by the U.S. military. Units allocated some operational counter-terrorism tasks are frequently special forces or similar assets.

In cases where military organisations do operate in the domestic context some form of formal handover from the law enforcement community is regularly required, to ensure adherence to the legislative framework and limitations. such as the Iranian Embassy siege, the British police formally turned responsibility over to the Special Air Service when the situation went beyond police capabilities.

See also

References

  1. ^ Stigall, Miller, and Donnatucci (October 7, 2019). "The 2018 National Strategy for Counterterrorism: A Synoptic Overview". American University National Security Law Brief. SSRN 3466967.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  2. ^ https://www.doctrine.af.mil/Portals/61/documents/AFDP_3-22/3-22-D01-FID-Introduction.pdf[bare URL PDF]
  3. ^ (PDF). Curtis e. Lemay Center for Doctrine Development and Education. Archived from the original (PDF) on January 24, 2017. Retrieved July 10, 2019.
  4. ^ "Differences Between Foreign Internal Defense (FID) and Counter Insurgency (COIN)".
  5. ^ Tim Newburn, Peter Neyroud (2013). Dictionary of Policing. Routledge. p. 262. ISBN 9781134011551.
  6. ^ "Conception for the Establishment and Employment of a Border-Guard for Special Police Action (GSG9)" (PDF). September 19, 1972. Archived (PDF) from the original on October 9, 2022. Retrieved September 9, 2017.
  7. ^ Shaffer, Ryan (2015). "Counter-Terrorism Intelligence, Policy and Theory Since 9/11". Terrorism and Political Violence. 27 (2): 368–375. doi:10.1080/09546553.2015.1006097. S2CID 145270348. Volume 27, Issue 2, 2015.
  8. ^ "Preventive Counter-Terrorism Measures and Non-Discrimination in the European Union: The Need for Systematic Evaluation". The International Centre for Counter-Terrorism – The Hague (ICCT). July 2, 2011. Retrieved September 6, 2016.
  9. ^ "Which Countries' Terrorist Attacks Are Ignored By The U.S. Media?". FiveThirtyEight. 2016.
  10. ^ "Trade and Terror: The Impact of Terrorism on Developing Countries". Federal Reserve Bank of St. Louis. 2017.
  11. ^ Sexton, Renard; Wellhausen, Rachel L.; Findley, Michael G. (2019). "How Government Reactions to Violence Worsen Social Welfare: Evidence from Peru". American Journal of Political Science. 63 (2): 353–367. doi:10.1111/ajps.12415. ISSN 1540-5907. S2CID 159341592.
  12. ^ "The Challenges of Effective Counterterrorism Intelligence in the 2020s". June 21, 2020.
  13. ^ Feiler, Gil (September 2007). "The Globalization of Terror Funding" (PDF). Begin-Sadat Center for Strategic Studies, Bar-Ilan University: 29. Mideast Security and Policy Studies No. 74. Retrieved November 14, 2007. {{cite journal}}: Cite journal requires |journal= (help)
  14. ^ "Counter-Terrorism Module 12 Key Issues: Surveillance & Interception".
  15. ^ Exclusive: Trump to focus counter-extremism program solely on Islam – sources, Reuters 2017-02-02
  16. ^ "Proposals to further strengthen Australia s counter-terrorism laws 2005".
  17. ^ Summary of Israeli Supreme Court Ruling on Targeted Killings February 23, 2013, at the Wayback Machine December 14, 2006
  18. ^ "Terror bill passes into law". The Jerusalem Post. June 16, 2016. Retrieved June 16, 2016.
  19. ^ "Accountability and Transparency in the United States' Counter-Terrorism Strategy". The International Centre for Counter-Terrorism – The Hague (ICCT). January 22, 2015. Retrieved September 6, 2016.
  20. ^ Lydia Canaan, The Huffington Post, March 21, 2016
  21. ^ de Londras, Detention in the War on Terrorism: Can Human Rights Fight Back? (2011)
  22. ^ a b c d e f Human Rights News (2004): "Human Rights and Counter-Terrorism", in the Briefing to the 60th Session of the UN Commission on Human Rights. online
  23. ^ a b c d e f g h Amnesty International (2005): "Counter-terrorism and criminal law in the EU. online
  24. ^ "UN experts call for removal of rights defenders Ramy Shaath and Zyad El-Elaimy from 'terrorism entities' list". OHCHR. Retrieved February 11, 2021.
  25. ^ "Preventive Counter-Terrorism Measures and Non-Discrimination in the European Union: The Need for Systematic Evaluation". The International Centre for Counter-Terrorism-The Hague (ICCT). July 2, 2011. Retrieved September 6, 2016.
  26. ^ Savun, Burcu; Tirone, Daniel C. (2018). "Foreign Aid as a Counterterrorism Tool – Burcu Savun, Daniel C. Tirone". Journal of Conflict Resolution. 62 (8): 1607–1635. doi:10.1177/0022002717704952. S2CID 158017999.
  27. ^ Pape, Robert A. (2005). Dying to Win: The Strategic Logic of Suicide Terrorism. Random House. pp. 237–250.
  28. ^ Trinquier, Roger (1961). . Archived from the original on January 12, 2008. 1964 English translation by Daniel Lee with an Introduction by Bernard B. Fall
  29. ^ Nagl, John A.; Petraeus, David H.; Amos, James F.; Sewall, Sarah (December 2006). "Field Manual 3–24 Counterinsurgency" (PDF). US Department of the Army. Retrieved February 3, 2008. While military manuals rarely show individual authors, David Petraeus is widely described as establishing many of this volume's concepts. {{cite journal}}: Cite journal requires |journal= (help)
  30. ^ Ronchi, E. (2015). "Disaster management: Design buildings for rapid evacuation". Nature. 528 (7582): 333. Bibcode:2015Natur.528..333R. doi:10.1038/528333b. PMID 26672544.
  31. ^ Weiss, Eric M. (January 11, 2005). "D.C. Wants Rail Hazmats Banned: S.C. Wreck Renews Fears for Capital". The Washington Post. p. B01.
  32. ^ "Suicide bombing 'pig fat threat". BBC News. February 13, 2004. Retrieved January 2, 2010.
  33. ^ "Swine: Secret Weapon Against Islamic Terror?". ArutzSheva. December 9, 2007.
  34. ^ Stathis N. Kalyvas (2004). (PDF). Journal of Ethics. 8 (1): 97–138. doi:10.1023/B:JOET.0000012254.69088.41. S2CID 144121872. Archived from the original (PDF) on October 11, 2006. Retrieved October 1, 2006.
  35. ^ Crewmen tell of scary ordeal October 8, 2008, at the Wayback Machine The Star Sunday October 5, 2008.
  36. ^ No choice but to pay ransom December 5, 2008, at the Wayback Machine The Star Monday September 29, 2008
  37. ^ . The Star. October 10, 2008. Archived from the original on October 24, 2008. Retrieved November 7, 2008.
  38. ^ a b Buurman, J.; Zhang, S.; Babovic, V. (2009). "Reducing Risk Through Real Options in Systems Design: The Case of Architecting a Maritime Domain Protection System". Risk Analysis. 29 (3): 366–379. doi:10.1111/j.1539-6924.2008.01160.x. PMID 19076327. S2CID 36370133.
  39. ^ Juergensmeyer, Mark (2000). Terror in the Mind of God: The Global Rise of Religious Violence. Berkeley, CA: University of California Press.
  40. ^ a b Deflem, Mathieu. 2010. The Policing of Terrorism: Organizational and Global Perspectives. New York: Routledge.
  41. ^ Deflem, Mathieu and Samantha Hauptman. 2013. "Policing International Terrorism." Pp. 64–72 in Globalisation and the Challenge to Criminology, edited by Francis Pakes. London: Routledge. [1]
  42. ^ a b c Helms, Ronald; Costanza, S E; Johnson, Nicholas (February 1, 2012). "Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror". Security Journal. 25 (1): 57–75. doi:10.1057/sj.2011.6. ISSN 1743-4645. S2CID 154538050.
  43. ^ Michael Bayer. 2010. The Blue Planet: Informal International Police Networks and National Intelligence. Washington, DC: National Intelligence Defense College. [2]
  44. ^ Costanza, S.E.; Kilburn, John C. Jr. (2005). "Symbolic Security, Moral Panic and Public Sentiment: Toward a sociology of Counterterrorism". Journal of Social and Ecological Boundaries. 1 (2): 106–124.
  45. ^ Deflem, M (2004). "Social Control and the Policing of Terrorism Foundations for a sociology of Counterterrorism". American Sociologist. 35 (2): 75–92. doi:10.1007/bf02692398. S2CID 143868466.
  46. ^ DeLone, Gregory J. 2007. "Law Enforcement Mission Statements Post September 11." Police Quarterly 10(2)
  47. ^ Mathieu Deflem. 2010. The Policing of Terrorism: Organizational and Global Perspectives. New York: Routledge.
  48. ^ Ramirez, D., J. Hoopes, and T.L. Quinlan. 2003 "Defining racial profiling in a post-September 11 world." American Criminal Law Review. 40(3): 1195–1233.
  49. ^ Kilburn, John C. Jr.; Costanza, S.E.; Metchik, Eric; Borgeson, Kevin (2011). "Policing Terror Threats and False Positives: Employing a Signal Detection Model to Examine Changes in National and Local Policing Strategy between 2001–2007". Security Journal. 24: 19–36. doi:10.1057/sj.2009.7. S2CID 153825273.
  50. ^ Kilburn, John C. Jr. and Costanza, S.E. 2009 "Immigration and Homeland Security" published in Battleground: Immigration (Ed: Judith Ann Warner); Greenwood Publishing, Ca.
  51. ^ Kitzen M. (2020) Operations in Irregular Warfare. In: Sookermany A. (eds) Handbook of Military Sciences. p. 1-21. Springer, Cham doi:10.1007/978-3-030-02866-4_81-1

Further reading

  • Ariel Merari, "Terrorism as a Strategy in Insurgency," Terrorism and Political Violence, Vol. 5, No. 4 (Winter 1993), pp. 213–251.
  • Edwin Bakker, Tinka Veldhuis, A Fear Management Approach to Counter-Terrorism (International Centre for Counter-Terrorism – The Hague, 2012)
  • J.M. Berger, Making CVE Work: A Focused Approach Based on Process Disruption, (International Centre for Counter-Terrorism – The Hague, May 2016
  • Janos Besenyo: Low-cost attacks, unnoticeable plots? Overview on the economical character of current terrorism, Strategic Impact (ROMANIA) (ISSN: 1841–5784) (eISSN: 1824–9904) 62/2017: (Issue No. 1) pp. 83–100.
  • Deflem, Mathieu. 2020. "Responses to Terror: Policing and Countering Terrorism in the Modern Age." In The Handbook of Collective Violence: Current Developments and Understanding, eds. C.A. Ireland, et al. Abingdon, UK: Routledge.
  • Deflem, Mathieu, and Stephen Chicoine. 2019. "Policing Terrorism." In The Handbook of Social Control, edited by Mathieu Deflem. Hoboken, NJ: Wiley-Blackwell.
  • Deflem, Mathieu and Shannon McDonough. 2015. "The Fear of Counterterrorism: Surveillance and Civil Liberties Since 9/11." Society 52(1):70–79.
  • Gagliano Giuseppe, Agitazione sovversiva, guerra psicologica e terrorismo (2010) ISBN 978-88-6178-600-4, Uniservice Books.
  • Ishmael Jones, The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture (2008, revised 2010) ISBN 978-1-59403-382-7, Encounter Books.
  • Ivan Arreguín-Toft, "Tunnel at the End of the Light: A Critique of U.S. Counter-terrorist Grand Strategy," Cambridge Review of International Affairs, Vol. 15, No. 3 (2002), pp. 549–563.
  • Ivan Arreguín-Toft, "How to Lose a War on Terror: A Comparative Analysis of a Counterinsurgency Success and Failure," in Jan Ångström and Isabelle Duyvesteyn, Eds., Understanding Victory and Defeat in Contemporary War (London: Frank Cass, 2007).
  • James Mitchell, "Identifying Potential Terrorist Targets" a study in the use of convergence. G2 Whitepaper on terrorism, copyright 2006, G2. Counterterrorism Conference, June 2006, Washington D.C.
  • James F. Pastor, "Terrorism and Public Safety Policing:Implications for the Obama Presidency" (2009, ISBN 978-1-4398-1580-9, Taylor & Francis).
  • Jessica Dorsey, Christophe Paulussen, Boundaries of the Battlefield: A Critical Look at the Legal Paradigms and Rules in Countering Terrorism (International Centre for Counter-Terrorism – The Hague, 2013)
  • Judy Kuriansky (Editor), "Terror in the Holy Land: Inside the Anguish of the Israeli-Palestinian Conflict" (2006, ISBN 0-275-99041-9, Praeger Publishers).
  • Lynn Zusman (Editor), "The Law of Counterterrorism" (2012, ISBN 978-1-61438-037-5, American Bar Association).* Marc Sageman, Understanding Terror Networks (Philadelphia, PA: University of Pennsylvania Press, 2004), ISBN 0-8122-3808-7.
  • Newton Lee, Counterterrorism and Cybersecurity: Total Information Awareness (Second Edition) (Switzerland: Springer International Publishing, 2015), ISBN 978-3-319-17243-9.
  • Teemu Sinkkonen, Political Responses to Terrorism (Acta Universitatis Tamperensis, 2009), ISBN 978-9514478710.
  • Vandana Asthana, "," ACDIS Occasional Paper (June 2010), Program in Arms Control, Disarmament, and International Security (ACDIS), University of Illinois

External links

  • U.S. Bureau of Counterterrorism
  • UK Counter Terrorism Policing
  • "Public order and safety" – International project on combating crime and terrorism

counterterrorism, also, spelled, counter, terrorism, also, known, anti, terrorism, incorporates, practices, military, tactics, techniques, strategies, that, governments, enforcement, business, intelligence, agencies, combat, eliminate, terrorism, strategies, g. Counterterrorism also spelled counter terrorism also known as anti terrorism incorporates the practices military tactics techniques and strategies that governments law enforcement business and intelligence agencies use to combat or eliminate terrorism Counterterrorism strategies are a government s motivation to use the instruments of national power to defeat terrorists the organizations they maintain and the networks they contain 1 GIGN operators in 2015 GIGN is the counterterrorist tactical unit of the National Gendarmerie of France A United States Coast Guard vessel conducting a counterterrorism patrol in Upper New York Bay If definitions of terrorism are part of a broader insurgency counterterrorism may employ counterinsurgency measures The United States Armed Forces uses the term foreign internal defense for programs that support other countries attempts to suppress insurgency lawlessness or subversion or to reduce the conditions under which threats to national security may develop 2 3 4 Contents 1 History 2 Planning 2 1 Intelligence surveillance and reconnaissance 2 2 Legal contexts 2 3 Human rights 2 4 Preemptive neutralization 2 4 1 Non military 2 4 2 Military 3 Preparation 3 1 Target hardening 3 2 Command and control 3 3 Damage mitigation 3 4 Local security 3 5 Medical services 4 Tactical units 4 1 Counterterrorist operations 4 2 Designing counterterrorist systems 4 3 Law enforcement 4 3 1 American law enforcement 4 4 Counter terrorism agencies 4 5 Military 5 See also 6 References 7 Further reading 8 External linksHistory EditThe first counter terrorism body formed was the Special Irish Branch of the Metropolitan Police later renamed the Special Branch after it expanded its scope beyond its original focus on Fenian terrorism Law enforcement agencies established similar units in the United Kingdom and elsewhere 5 The first tactical counterterrorist unit was GSG 9 of the German Federal Police formed in response to the 1972 Munich massacre 6 Counter terrorism forces expanded with the perceived growing threat of terrorism in the late 20th century After the September 11 attacks Western governments made counter terrorism efforts a priority including more foreign cooperation shifting tactics involving red teams 7 and preventive measures 8 Although sensational attacks in the developed world receive a great deal of media attention 9 most terrorism occurs in less developed countries 10 Government responses to terrorism in some cases can lead to substantial unintended consequences 11 such as in the above mentioned Munich massacre Planning EditIntelligence surveillance and reconnaissance Edit See also Intelligence cycle management Intelligence analysis HUMINT and Counterintelligence Yamam one of Israel s counter terrorism units Most counter terrorism strategies involve an increase in standard police and domestic intelligence The central activities are traditional interception of communications and the tracing of persons New technology has however expanded the range of military and law enforcement operations Domestic intelligence is often directed at specific groups defined based on origin or religion which is a source of political controversy Mass surveillance of an entire population raises objections on civil liberties grounds Domestic terrorists especially lone wolves are often harder to detect because of their citizenship or legal status and ability to stay under the radar 12 To select the effective action when terrorism appears to be more of an isolated event the appropriate government organizations need to understand the source motivation methods of preparation and tactics of terrorist groups Good intelligence is at the heart of such preparation as well as a political and social understanding of any grievances that might be solved Ideally one gets information from inside the group a very difficult challenge for human intelligence operations because operational terrorist cells are often small with all members known to one another perhaps even related 13 Counterintelligence is a great challenge with the security of cell based systems since the ideal but the nearly impossible goal is to obtain a clandestine source within the cell Financial tracking can play a role as a communications intercept However both of these approaches need to be balanced against legitimate expectations of privacy 14 Legal contexts Edit Main article Anti terrorism legislation In response to the growing legislation United KingdomThe United Kingdom has had anti terrorism legislation in place for more than thirty years The Prevention of Violence Act 1939 was brought in response to an Irish Republican Army IRA campaign of violence under the S Plan This act had been allowed to expire in 1953 It was repealed in 1973 to be replaced by the Prevention of Terrorism Acts a response to the Troubles in Northern Ireland From 1974 to 1989 the temporary provisions of the act were renewed annually In 2000 the Acts were replaced with the more permanent Terrorism Act 2000 which contained many of their powers and then the Prevention of Terrorism Act 2005 The Anti terrorism Crime and Security Act 2001 was formally introduced into the Parliament on November 19 2001 two months after the September 11 2001 attacks in the United States It received royal assent and went into force on December 13 2001 On December 16 2004 the Law Lords ruled that Part 4 was incompatible with the European Convention on Human Rights However under the terms of the Human Rights Act 1998 it remained in force The Prevention of Terrorism Act 2005 was drafted to answer the Law Lords ruling and the Terrorism Act 2006 creates new offenses related to terrorism and amends existing ones The act was drafted in the aftermath of the 7 July 2005 London bombings and like its predecessors some of its terms have proven to be highly controversial Since 1978 the UK s terrorism laws have been regularly reviewed by a security cleared Independent Reviewer of Terrorism Legislation whose often influential reports are submitted to Parliament and published in full United StatesU S legal issues surrounding this issue include rulings on the domestic employment of deadly force by law enforcement agencies Search and seizure is governed by the Fourth Amendment to the United States Constitution The U S passed the USA PATRIOT Act after the September 11 attacks as well as a range of other legislation and executive orders relating to national security The Department of Homeland Security was established to consolidate domestic security agencies to coordinate anti terrorism and national response to major natural disasters and accidents The Posse Comitatus Act limits domestic employment of the United States Army and the United States Air Force requiring Presidential approval before deploying the Army or the Air Force Pentagon policy also applies this limitation to the United States Marine Corps and the United States Navy because the Posse Comitatus Act does not cover naval services even though they are federal military forces The Department of Defense can be employed domestically on Presidential order as was done during the Los Angeles riots of 1992 Hurricane Katrina and the Beltway Sniper incidents External or international use of lethal force would require a Presidential finding In February 2017 sources claimed that the Trump administration intends to rename and revamp the U S government program Countering Violent Extremism CVE to focus solely on Islamist extremism 15 AustraliaAustralia has passed several anti terrorism acts In 2004 a bill comprising three acts Anti terrorism Act 2004 No 2 and No 3 was passed Then Attorney General Philip Ruddock introduced the Anti terrorism bill 2004 on March 31 He described it as a bill to strengthen Australia s counter terrorism laws in a number of respects a task made more urgent following the recent tragic terrorist bombings in Spain He said that Australia s counter terrorism laws require review and where necessary updating if we are to have a legal framework capable of safeguarding all Australians from the scourge of terrorism The Australian Anti Terrorism Act 2005 supplemented the powers of the earlier acts The Australian legislation allows police to detain suspects for up to two weeks without charge and to electronically track suspects for up to a year The Australian Anti Terrorism Act of 2005 included a shoot to kill clause In a country with entrenched liberal democratic traditions the measures are controversial and have been criticized by civil libertarians and Islamic groups 16 IsraelIsrael monitors a list of designated terrorist organizations and has laws forbidding membership in such organizations and funding or helping them On December 14 2006 the Israeli Supreme Court ruled targeted killings were a permitted form of self defense 17 In 2016 the Israeli Knesset passed a comprehensive law against terrorism forbidding any kind of terrorism and support of terrorism and setting severe punishments for terrorists The law also regulates legal efforts against terrorism 18 Human rights Edit John Walker Lindh was captured as an enemy combatant during the United States 2001 invasion of Afghanistan One of the primary difficulties of implementing effective counter terrorist measures is the waning of civil liberties and individual privacy that such measures often entail both for citizens of and for those detained by states attempting to combat terror 19 At times measures designed to tighten security have been seen as abuses of power or even violations of human rights 20 Examples of these problems can include prolonged incommunicado detention without judicial review or long periods of preventive detention 21 risk of subjecting to torture during the transfer return and extradition of people between or within countries and the adoption of security measures that restrain the rights or freedoms of citizens and breach principles of non discrimination 22 Examples include In November 2003 Malaysia passed new counter terrorism laws widely criticized by local human rights groups for being vague and overbroad Critics claim that the laws put the fundamental rights of free expression association and assembly at risk Malaysia persisted in holding around 100 alleged militants without trial including five Malaysian students detained for alleged terrorist activity while studying in Karachi Pakistan 22 In November 2003 a Canadian Syrian national Maher Arar publicly alleged that he had been tortured in a Syrian prison after being handed over to the Syrian authorities by the U S 22 In December 2003 Colombia s congress approved legislation that would give the military the power to arrest tap telephones and carry out searches without warrants or any previous judicial order 22 Images of unpopular treatment of detainees in U S custody in Iraq and other locations have encouraged international scrutiny of U S operations in the war on terror 23 Hundreds of foreign nationals remain in prolonged indefinite detention without charge or trial in Guantanamo Bay despite international and U S constitutional standards some groups believe outlaw such practices 23 Hundreds of people suspected of connections with the Taliban or Al Qaeda remain in long term detention in Pakistan or in U S controlled centers in Afghanistan 23 China has used the war on terror to justify its policies in the predominantly Muslim Xinjiang Uyghur Autonomous Region to stifle Uyghur identity 23 In Morocco Saudi Arabia Tunisia Yemen and other countries scores of people have been arrested and arbitrarily detained in connection with suspected terrorist acts or links to opposition armed groups 23 Until 2005 eleven men remained in high security detention in the UK under the Anti Terrorism Crime and Security Act 2001 23 United Nations experts condemned the misuse of counter terrorism powers by the Egyptian authorities following the arrest detention and designation of human rights activists Ramy Shaath and Zyad El Elaimy as terrorists The two activists were arrested in June 2019 and the first ever renewal of remand detention for Shaath came for the 21st time in 19 months on 24 January 2021 Experts called it alarming and demanded the urgent implementation of the Working Group s opinion and removal of the two s names from the terrorism entities list 24 Many argue that such violations of rights could exacerbate rather than counter the terrorist threat 22 Human rights activists argue for the crucial role of human rights protection as an intrinsic part to fight against terrorism 23 25 This suggests as proponents of human security have long argued that respecting human rights may indeed help us to incur security Amnesty International included a section on confronting terrorism in the recommendations in the Madrid Agenda arising from the Madrid Summit on Democracy and Terrorism Madrid March 8 11 2005 Democratic principles and values are essential tools in the fight against terrorism Any successful strategy for dealing with terrorism requires terrorists to be isolated Consequently the preference must be to treat terrorism as criminal acts to be handled through existing systems of law enforcement and with full respect for human rights and the rule of law We recommend 1 taking effective measures to make impunity impossible either for acts of terrorism or for the abuse of human rights in counter terrorism measures 2 the incorporation of human rights laws in all anti terrorism programs and policies of national governments as well as international bodies 23 While international efforts to combat terrorism have focused on the need to enhance cooperation between states proponents of human rights as well as human security have suggested that more effort needs to be given to the effective inclusion of human rights protection as a crucial element in that cooperation They argue that international human rights obligations do not stop at borders and a failure to respect human rights in one state may undermine its effectiveness in the global effort to cooperate to combat terrorism 22 Preemptive neutralization Edit Some countries see preemptive attacks as a legitimate strategy This includes capturing killing or disabling suspected terrorists before they can mount an attack Israel the United Kingdom the United States and Russia have taken this approach while Western European states generally do not Another major method of preemptive neutralization is the interrogation of known or suspected terrorists to obtain information about specific plots targets the identity of other terrorists whether or not the interrogation subjects himself is guilty of terrorist involvement Sometimes more extreme methods are used to increase suggestibility such as sleep deprivation or drugs Such methods may lead captives to offer false information in an attempt to stop the treatment or due to the confusion caused by it These methods are not tolerated by European powers In 1978 the European Court of Human Rights ruled in the Ireland v United Kingdom case that such methods amounted to a practice of inhuman and degrading treatment and that such practices were in breach of the European Convention on Human Rights Article 3 art 3 Non military Edit Transparent garbage bin installed at Central Station in Sydney The bin is clear so police can easily examine its contents preventing the potential placement of bombs or the disposal of weaponry by terrorists The human security paradigm outlines a non military approach that aims to address the enduring underlying inequalities which fuel terrorist activity Causal factors need to be delineated and measures implemented which allow equal access to resources and sustainability for all people Such activities empower citizens providing freedom from fear and freedom from want citation needed This can take many forms including the provision of clean drinking water education vaccination programs provision of food and shelter and protection from violence military or otherwise Successful human security campaigns have been characterized by the participation of a diverse group of actors including governments NGOs and citizens citation needed Foreign internal defense programs provide outside expert assistance to a threatened government FID can involve both non military and military aspects of counter terrorism citation needed A 2017 study found that governance and civil society aid is effective in dampening domestic terrorism but this effect is only present if the recipient country is not experiencing a civil conflict 26 Further information Violent extremism Prevention of radicalization and deradicalization Military Edit U S Marines in Afghanistan Terrorism has often been used to justify military intervention in countries like Pakistan where terrorists are said to be based That was the primary stated justification for the U S invasion of Afghanistan It was also a stated justification for the second Russian invasion of Chechnya Military intervention has not always been successful in stopping or preventing future terrorism such as during the Malayan Emergency the Mau Mau uprising and most of the campaigns against the IRA during the Irish Civil War the S Plan the Border Campaign IRA and the Troubles in Northern Ireland Although military action can temporarily disrupt a terrorist group s operations temporarily it sometimes does not end the threat completely 27 Repression by the military in itself usually leads to short term victories but tend to be unsuccessful in the long run e g the French doctrine used in colonial Indochina and Algeria 28 particularly if it is not accompanied by other measures However new methods such as those taken in Iraq have yet to be seen as beneficial or ineffectual 29 Preparation EditTarget hardening Edit Whatever the target of terrorists there are multiple ways of hardening the targets to prevent the terrorists from hitting their mark or reducing the damage of attacks One method is to place hostile vehicle mitigation to enforce protective standoff distance outside tall or politically sensitive buildings to prevent car bombings Another way to reduce the impact of attacks is to design buildings for rapid evacuation 30 Aircraft cockpits are kept locked during flights and have reinforced doors which only the pilots in the cabin are capable of opening UK railway stations removed their garbage bins in response to the Provisional IRA threat as convenient locations for depositing bombs Scottish stations removed theirs after the 7 July 2005 London Bombings as a precautionary measure The Massachusetts Bay Transportation Authority purchased bomb resistant barriers after the September 11 attacks Israeli Iron Dome active protection system capable of intercepting airborne rockets and artillery shells As Israel is suffering from constant shelling of its cities towns and settlements by artillery rockets from the Gaza Strip mainly by Hamas but also by other Palestinian factions and Lebanon mainly by Hezbollah Israel developed several defensive measures against artillery rockets and missiles These include building a bomb shelter in every building and school but also deploying active protection systems such as the Arrow ABM Iron Dome and David s Sling which intercept the incoming threat in the air Iron Dome has successfully intercepted hundreds of Qassam rockets and Grad rockets fired by Palestinians from the Gaza Strip A more sophisticated target hardening approach must consider industrial and other critical industrial infrastructure that could be attacked Terrorists do not need import chemical weapons if they can cause a major industrial accident such as the Bhopal disaster or the Halifax Explosion Industrial chemicals in manufacturing shipping and storage thus require greater protection and some efforts are in progress 31 To put this risk into perspective the first major lethal chemical attack of World War I used 160 tons of chlorine industrial shipments of chlorine widely used in water purification and the chemical industry travel in 90 or 55 ton tank cars To give one more example the Northeast blackout of 2003 demonstrated the vulnerability of the North American electrical grid to natural disasters coupled with inadequate possibly insecure SCADA supervisory control and data acquisition networks Part of the vulnerability is due to deregulation leading to much more interconnection in a grid designed for only occasional power selling between utilities A small number of terrorists attacking critical power facilities when one or more engineers have infiltrated the power control centers could wreak havoc Equipping likely targets with containers of pig lard has been used to discourage attacks by suicide bombers The technique was apparently used on a limited scale by British authorities in the 1940s The approach stems from the idea that Muslims perpetrating the attack would not want to be soiled by the lard in the moment before dying 32 The idea has been suggested more recently as a deterrent to suicide bombings in Israel 33 However the actual effectiveness of this tactic is likely limited A sympathetic Islamic scholar could issue a fatwa proclaiming that a suicide bomber would not be polluted by the swine products Command and control Edit For a threatened or completed terrorist attack an incident command system ICS may be invoked to control the various services that may need to be involved in the response ICS has varied levels of escalation such as might be required for multiple incidents in a given area e g 2005 London bombings or the 2004 Madrid train bombings or all the way to a national response plan invocation if national level resources are needed For example a national response might be required for a nuclear biological radiological or significant chemical attack Damage mitigation Edit Fire departments perhaps supplemented by public works agencies utility providers and heavy construction contractors are most apt to deal with the physical consequences of an attack Local security Edit Again under an incident command model local police can isolate the incident area reducing confusion and specialized police units can conduct tactical operations against terrorists often using specialized counterterrorist tactical units Bringing in such units will typically involve civil or military authority beyond the local level Medical services Edit Emergency medical services are capable of triaging treating and transporting the more severely affected individuals to hospitals which typically have mass casualty and triage plans in place for terrorist attacks Public health agencies from local to the national level may be designated to deal with identification and sometimes mitigation of possible biological attacks and sometimes chemical or radiologic contamination Tactical units Edit Royal Malaysia Police Pasukan Gerakan Khas officers breaching a door Many countries have dedicated counterterrorist units trained to handle terrorist threats Besides various security agencies there are police tactical units whose role is to directly engage terrorists and prevent terrorist attacks Such units perform both in preventive actions hostage rescue and responding to ongoing attacks Countries of all sizes can have highly trained counterterrorist teams Tactics techniques and procedures for manhunting are under constant development These units are specially trained in military tactics and are equipped for close quarters combat with emphasis on stealth and performing the mission with minimal casualties The units include assault teams snipers EOD experts dog handlers and intelligence officers Most of these measures deal with terrorist attacks that affect an area or threaten to do so or are lengthy situations such as shootouts and hostage takings that allow the counterterrorist units to assemble and respond it is harder to deal with shorter incidents such as assassinations or reprisal attacks due to the short warning time and the quick exfiltration of the assassins 34 The majority of counterterrorism operations at the tactical level are conducted by state federal and national law enforcement or intelligence agencies In some countries the military may be called in as a last resort For countries whose military is legally permitted to conduct domestic law enforcement operations this is not an issue and such counterterrorism operations are conducted by their military Counterterrorist operations Edit GSG 9 troopers disembarking from a helicopter in 1978 Some counter terrorist actions of the 20th and 21st centuries are listed below See list of hostage crises for a more extended list including hostage takings that did not end violently Representative counterterrorist operations Incident Main locale Hostage nationality Kidnappers hijackers Counter terrorist force Results1972 Sabena Flight 571 Tel Aviv Lod International Airport Israel Mixed Black September Sayeret Matkal 2 hijackers killed 1 passenger died from wounds during raid 2 passengers and 1 commando injured 2 kidnappers captured All other 96 passengers rescued 1972 Munich massacre Munich West Germany Israeli Black September German Federal Border Guard All hostages murdered 5 kidnappers and 1 West German police officer killed 3 kidnappers captured and released This fatal result was the reason for the foundation of the German special counterterrorism unit GSG91975 AIA building hostage crisis AIA building Kuala Lumpur Malaysia Mixed American and Swedish Japanese Red Army Special Actions Unit All hostages released all kidnappers flown to Libya 1976 Operation Entebbe Entebbe Airport Uganda Israelis and Jews Non Jewish hostages were released shortly after capture PFLP Sayeret Matkal Sayeret Tzanhanim Sayeret Golani All 7 hijackers 45 Ugandan troops 3 hostages and 1 Israeli soldier were killed 100 hostages rescued1977 Lufthansa Flight 181 Initially over the Mediterranean Sea south of the French coast subsequently Mogadishu International Airport Somalia Mixed PFLP GSG 9 Special Air Service consultants 1 hostage killed before the raid 3 hijackers killed and 1 captured 90 hostages rescued 1980 Casa Circondariale di Trani Prison riot citation needed Trani Italy Italian Red Brigades Gruppo di intervento speciale GIS 18 police officers rescued all terrorists captured 1980 Iranian Embassy siege London UK Mostly Iranian but some British Democratic Revolutionary Movement for the Liberation of Arabistan Special Air Service 5 kidnappers killed 1 kidnapper captured 1 hostage killed prior to raid 1 hostage killed by kidnapper during raid 24 hostages rescued 1 SAS operative received minor burns 1981 Garuda Indonesia Flight 206 Don Mueang Airport Bangkok Thailand Mostly Indonesian some Europeans Americans Komando Jihad Kopassus assault group RTAF securing perimeter 5 hijackers killed 2 likely killed extrajudicially after raid 1 Kopassus operative killed 1 pilot fatally wounded by terrorist all hostages rescued 1982 Kidnapping of General James L Dozier Padua Italy American Red Brigades Nucleo Operativo Centrale di Sicurezza NOCS Hostage saved capture of the entire terrorist cell 1983 Turkish embassy attack Lisbon Portugal Turkish Armenian Revolutionary Army GOE 5 hijackers 1 hostage and 1 police officer killed 1 hostage and 1 police officer wounded 1985 Achille Lauro hijacking MS Achille Lauro off the Egyptian coast Mixed Palestine Liberation Organization U S military turned over to Italian special forces Gruppo di intervento speciale 1 hostage killed during hijacking 4 hijackers convicted in Italy1986 Pudu Prison siege Pudu Prison Kuala Lumpur Malaysia Two doctors Prisoners Special Actions Unit 6 kidnappers captured 2 hostages rescued1993 Indian Airlines Flight 427 Hijacked between Delhi and Srinagar India 141 passengers Islamic terrorist Mohammed Yousuf Shah National Security Guard 1 hijacker killed all hostages rescued 1986 Pudu Prison siege Pudu Prison Kuala Lumpur Malaysia Two doctors Prisoners Special Actions Unit 6 kidnappers captured 2 hostages rescued1988 Mothers Bus Hijacked between Beer Sheva and Dimona Israel 11 passengers Palestinian Liberation Organization YAMAM 3 hijacker killed 3 hostages killed 8 hostages rescued1994 Air France Flight 8969 Marseille France Mixed Armed Islamic Group of Algeria GIGN 4 hijackers killed 3 hostages killed before the raid 229 hostages rescued1996 Japanese embassy hostage crisis Lima Peru Japanese and guests 800 Tupac Amaru Revolutionary Movement Peruvian military amp police mixed forces All 14 kidnappers 1 hostage and 2 rescuers killed 1996 Mapenduma hostage crisis Mapenduma Indonesia Mixed 19 Indonesians 4 British 2 Dutch amp 1 German Kelly Kwalik s Free Papua Movement OPM Group Kopassus s SAT 81 Gultor CT Group Kostrad s Infantry Battalion amp Penerbad Army Aviation Mixed Forces 8 kidnappers killed 2 kidnappers captured 2 hostages killed by kidnappers 24 Hostages rescued 5 Army Operatives killed in helicopter accident 2000 Sauk Siege Perak Malaysia Malaysian 2 police officers 1 soldier and 1 civilian Al Ma unah Grup Gerak Khas and 20 Pasukan Gerakan Khas mixed forces 2 hostages 2 rescuers and 1 kidnapper killed Other 28 kidnappers captured 2001 2005 Pankisi Gorge crisis Pankisi Gorge Kakheti Georgia Mixed Al Qaeda and Chechen rebels led by Ibn al Khattab 2400 troops and 1000 police officers Terrorism threats in the gorge were repressed 2002 Moscow theater hostage crisis Moscow Russia Mixed mostly Russian 900 Special Purpose Islamic Regiment Spetsnaz All 39 kidnappers and 129 204 hostages killed 600 700 hostages freed 2004 Beslan school siege Beslan North Ossetia Alania Russia Russian Riyad us Saliheen MVD including OMON Russian army including Spetsnaz Russian police Militsiya 334 hostages killed and hundreds wounded 10 21 rescuers killed 31 kidnappers killed 1 captured 2007 Siege of Lal Masjid Islamabad Pakistan Students and Tehrik i Taliban Pakistan Pakistan Army and Rangers Special Service Group 91 students militants killed 50 militants captured 10 SSG and 1 Ranger killed 33 SSG 3 Rangers 8 soldiers wounded 204 civilians injured 2007 Kirkuk Hostage Rescue citation needed Kirkuk Iraq Turkman child Islamic State of Iraq Al Qaeda PUK s Kurdistan Regional Government s Counter Terrorism Group 5 kidnappers arrested 1 hostage rescued citation needed 2008 Operation Jaque Colombia Mixed Revolutionary Armed Forces of Colombia Columbian military 15 hostages rescued 2 kidnappers captured2008 Operations Dawn Gulf of Aden Somalia Mixed Somali pirates and militants PASKAL and mixed international forces Negotiation finished 80 hostages released RMN including PASKAL navy commandos with mixed international forces patrolling the Gulf of Aden during this festive period 35 36 37 2008 2008 Mumbai attacks Multiple locations in Mumbai city Indian Nationals Foreign tourists Ajmal Qasab and other Pakistani nationals affiliated to Laskar e taiba National Security Guard MARCOS and Para SF 141 Indian civilians 30 foreigners 15 police officers and two NSG commandos were killed 9 attackers killed 1 attacker captured 293 individuals injured2009 2009 Lahore Attacks Multiple locations in Lahore city Pakistan Lashkar e Taiba Police Commandos Army Rangers Battalion March 3 The Sri Lankan cricket team attack 6 members of the Sri Lankan cricket team were injured 6 Pakistani police officers and 2 civilians killed March 30 the Manawan Police Academy in Lahore attack 8 gunmen 8 police personnel and 2 civilians killed 95 people injured 4 gunmen captured citation needed Plaza Cinema Chowk attack 16 police officers an army officer and unknown number of civilians killed As many as 251 people injured citation needed 2011 Operation Dawn of Gulf of Aden Gulf of Aden Somalia Koreans Myanmar Indonesian Somali pirates and militants Republic of Korea Navy Special Warfare Flotilla UDT SEAL 4 kidnappers killed or missing Jan 18 8 kidnappers killed 5 captured All hostages rescued 2012 Lopota Gorge hostage crisis Lopota Gorge Georgia Georgians Ethnic Chechen Russian and Georgian militants Special Operations Center SOD KUD and army special forces 2 KUD members and one special forces corpsman killed 5 police officers wounded 11 kidnappers killed 5 wounded and 1 captured All hostages rescued 2013 2013 Lahad Datu standoff Lahad Datu Sabah Malaysia Malaysians Royal Security Forces of the Sultanate of Sulu and North Borneo Jamalul Kiram III s faction Malaysian Armed Forces Royal Malaysia Police Malaysian Maritime Enforcement Agency and joint counter terrorism forces as well as Philippine Armed Forces 8 police officers including 2 PGK commandos and one soldier killed 12 others wounded 56 militants killed 3 wounded and 149 captured All hostages rescued 6 civilians killed and one wounded 2017 2017 Isani flat siege Isani district Tbilisi Georgia Georgians Chechen militants SUS Counter Terror Unit Police special forces 3 militants killed including Akhmed Chatayev One special forces officer killed during skirmishes Designing counterterrorist systems Edit This section s tone or style may not reflect the encyclopedic tone used on Wikipedia See Wikipedia s guide to writing better articles for suggestions June 2021 Learn how and when to remove this template message The scope for anti terrorism systems is very large in physical terms and in other dimensions such as type and degree of terrorist threats political and diplomatic ramifications and legal concerns Ideal counterterrorist systems use technology to enable persistent intelligence surveillance and reconnaissance missions and potential actions Designing such a system of systems comprises a major technological project 38 A particular design problem for counterterrorist systems is the uncertainty of the future the threat of terrorism may increase decrease or remain the same the type of terrorism and location are difficult to predict and there are technological uncertainties A potential solution is to incorporate engineering flexibility into system design allowing for flexibility when new information arrives Flexibility can be incorporated in the design of a counterterrorism system in the form of options that can be exercised in the future when new information is available 38 Law enforcement Edit While some countries with longstanding terrorism problems have law enforcement agencies primarily designed to prevent and respond to terror attacks 39 in other nations counterterrorism is a relatively more recent objective of law enforcement agencies 40 41 Though some civil libertarians and criminal justice scholars have criticized efforts of law enforcement agencies to combat terrorism as futile and expensive 42 or as threats to civil liberties 42 other scholars have analyzed the most important dimensions of the policing of terrorism as an important dimension of counter terrorism especially in the post 9 11 era and have discussed how police view terrorism as a matter of crime control 40 Such analyses highlight the civilian police role in counterterrorism next to the military model of a war on terror 43 American law enforcement Edit FBI Hostage Rescue Team agents Pursuant to passage of the Homeland Security Act of 2002 federal state and local law enforcement agencies began to systemically reorganize 44 45 Two primary federal agencies the Department of Justice DOJ and the Department of Homeland Security DHS house most of the federal agencies that are prepared to combat domestic and international terrorist attacks These include the Border Patrol the Secret Service the Coast Guard and the FBI Following suit from federal changes pursuant to 9 11 however most state and local law enforcement agencies began to include a commitment to fighting terrorism in their mission statements 46 47 Local agencies began to establish more patterned lines of communication with federal agencies Some scholars have doubted the ability of local police to help in the war on terror and suggest their limited manpower is still best utilized by engaging community and targeting street crimes 42 While counter terror measures most notably heightened airport security immigrant profiling 48 and border patrol have been adapted during the last decade to enhance counter terror in law enforcement there have been remarkable limitations to assessing the actual utility effectiveness of law enforcement practices that are ostensibly preventative 49 Thus while sweeping changes in counter terrorism rhetoric redefined most American post 9 11 law enforcement agencies in theory it is hard to assess how well such hyperbole has translated into practice In intelligence led policing ILP efforts the most quantitatively amenable starting point for measuring the effectiveness of any policing strategy i e Neighborhood Watch Gun Abatement Foot Patrols etc is usually to assess total financial costs against clearance rates or arrest rates Since terrorism is such a rare event phenomena 50 measuring arrests or clearance rates would be a non generalizable and ineffective way to test enforcement policy effectiveness Another methodological problem in assessing counter terrorism efforts in law enforcement hinges on finding operational measures for key concepts in the study of homeland security Both terrorism and homeland security are relatively new concepts for criminologists and academicians have yet to agree on the matter of how to properly define these ideas in a way that is accessible Counter terrorism agencies Edit Main article List of counter terrorism agencies SEK members of North Rhine Westphalia Germany during an exercise Military Edit Further information List of special forces units Within military operational approaches counter terrorism falls into the category of irregular warfare 51 Given the nature of operational counter terrorism tasks national military organizations do not generally have dedicated units whose sole responsibility is the prosecution of these tasks Instead the counter terrorism function is an element of the role allowing flexibility in their employment with operations being undertaken in the domestic or international context In some cases the legal framework within which they operate prohibits military units conducting operations in the domestic arena United States Department of Defense policy based on the Posse Comitatus Act forbids domestic counter terrorism operations by the U S military Units allocated some operational counter terrorism tasks are frequently special forces or similar assets In cases where military organisations do operate in the domestic context some form of formal handover from the law enforcement community is regularly required to ensure adherence to the legislative framework and limitations such as the Iranian Embassy siege the British police formally turned responsibility over to the Special Air Service when the situation went beyond police capabilities See also Edit Wikimedia Commons has media related to Counter terrorism Civilian casualty ratio Counterinsurgency Counter IED efforts Counterjihad Deradicalization Explosive detection Extrajudicial execution Extraordinary rendition Fatwa on Terrorism Global Initiative to Combat Nuclear Terrorism Informant International counter terrorism operations of Russia Irregular warfare Manhunt law enforcement Manhunt military Preventive State Security increase Sociology of terrorism Special Activities Division Central Intelligence Agency Targeted killing Terrorism Research Center War amongst the peopleReferences Edit Stigall Miller and Donnatucci October 7 2019 The 2018 National Strategy for Counterterrorism A Synoptic Overview American University National Security Law Brief SSRN 3466967 a href Template Cite journal html title Template Cite journal cite journal a CS1 maint multiple names authors list link https www doctrine af mil Portals 61 documents AFDP 3 22 3 22 D01 FID Introduction pdf bare URL PDF Introduction to Foreign Internal Defense PDF Curtis e Lemay Center for Doctrine Development and Education Archived from the original PDF on January 24 2017 Retrieved July 10 2019 Differences Between Foreign Internal Defense FID and Counter Insurgency COIN Tim Newburn Peter Neyroud 2013 Dictionary of Policing Routledge p 262 ISBN 9781134011551 Conception for the Establishment and Employment of a Border Guard for Special Police Action GSG9 PDF September 19 1972 Archived PDF from the original on October 9 2022 Retrieved September 9 2017 Shaffer Ryan 2015 Counter Terrorism Intelligence Policy and Theory Since 9 11 Terrorism and Political Violence 27 2 368 375 doi 10 1080 09546553 2015 1006097 S2CID 145270348 Volume 27 Issue 2 2015 Preventive Counter Terrorism Measures and Non Discrimination in the European Union The Need for Systematic Evaluation The International Centre for Counter Terrorism The Hague ICCT July 2 2011 Retrieved September 6 2016 Which Countries Terrorist Attacks Are Ignored By The U S Media FiveThirtyEight 2016 Trade and Terror The Impact of Terrorism on Developing Countries Federal Reserve Bank of St Louis 2017 Sexton Renard Wellhausen Rachel L Findley Michael G 2019 How Government Reactions to Violence Worsen Social Welfare Evidence from Peru American Journal of Political Science 63 2 353 367 doi 10 1111 ajps 12415 ISSN 1540 5907 S2CID 159341592 The Challenges of Effective Counterterrorism Intelligence in the 2020s June 21 2020 Feiler Gil September 2007 The Globalization of Terror Funding PDF Begin Sadat Center for Strategic Studies Bar Ilan University 29 Mideast Security and Policy Studies No 74 Retrieved November 14 2007 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Counter Terrorism Module 12 Key Issues Surveillance amp Interception Exclusive Trump to focus counter extremism program solely on Islam sources Reuters 2017 02 02 Proposals to further strengthen Australia s counter terrorism laws 2005 Summary of Israeli Supreme Court Ruling on Targeted Killings Archived February 23 2013 at the Wayback Machine December 14 2006 Terror bill passes into law The Jerusalem Post June 16 2016 Retrieved June 16 2016 Accountability and Transparency in the United States Counter Terrorism Strategy The International Centre for Counter Terrorism The Hague ICCT January 22 2015 Retrieved September 6 2016 Lydia Canaan The Huffington Post March 21 2016 de Londras Detention in the War on Terrorism Can Human Rights Fight Back 2011 a b c d e f Human Rights News 2004 Human Rights and Counter Terrorism in the Briefing to the 60th Session of the UN Commission on Human Rights online a b c d e f g h Amnesty International 2005 Counter terrorism and criminal law in the EU online UN experts call for removal of rights defenders Ramy Shaath and Zyad El Elaimy from terrorism entities list OHCHR Retrieved February 11 2021 Preventive Counter Terrorism Measures and Non Discrimination in the European Union The Need for Systematic Evaluation The International Centre for Counter Terrorism The Hague ICCT July 2 2011 Retrieved September 6 2016 Savun Burcu Tirone Daniel C 2018 Foreign Aid as a Counterterrorism Tool Burcu Savun Daniel C Tirone Journal of Conflict Resolution 62 8 1607 1635 doi 10 1177 0022002717704952 S2CID 158017999 Pape Robert A 2005 Dying to Win The Strategic Logic of Suicide Terrorism Random House pp 237 250 Trinquier Roger 1961 Modern Warfare A French View of Counterinsurgency Archived from the original on January 12 2008 1964 English translation by Daniel Lee with an Introduction by Bernard B Fall Nagl John A Petraeus David H Amos James F Sewall Sarah December 2006 Field Manual 3 24 Counterinsurgency PDF US Department of the Army Retrieved February 3 2008 While military manuals rarely show individual authors David Petraeus is widely described as establishing many of this volume s concepts a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Ronchi E 2015 Disaster management Design buildings for rapid evacuation Nature 528 7582 333 Bibcode 2015Natur 528 333R doi 10 1038 528333b PMID 26672544 Weiss Eric M January 11 2005 D C Wants Rail Hazmats Banned S C Wreck Renews Fears for Capital The Washington Post p B01 Suicide bombing pig fat threat BBC News February 13 2004 Retrieved January 2 2010 Swine Secret Weapon Against Islamic Terror ArutzSheva December 9 2007 Stathis N Kalyvas 2004 The Paradox of Terrorism in Civil Wars PDF Journal of Ethics 8 1 97 138 doi 10 1023 B JOET 0000012254 69088 41 S2CID 144121872 Archived from the original PDF on October 11 2006 Retrieved October 1 2006 Crewmen tell of scary ordeal Archived October 8 2008 at the Wayback Machine The Star Sunday October 5 2008 No choice but to pay ransom Archived December 5 2008 at the Wayback Machine The Star Monday September 29 2008 Ops Fajar mission accomplished The Star October 10 2008 Archived from the original on October 24 2008 Retrieved November 7 2008 a b Buurman J Zhang S Babovic V 2009 Reducing Risk Through Real Options in Systems Design The Case of Architecting a Maritime Domain Protection System Risk Analysis 29 3 366 379 doi 10 1111 j 1539 6924 2008 01160 x PMID 19076327 S2CID 36370133 Juergensmeyer Mark 2000 Terror in the Mind of God The Global Rise of Religious Violence Berkeley CA University of California Press a b Deflem Mathieu 2010 The Policing of Terrorism Organizational and Global Perspectives New York Routledge Deflem Mathieu and Samantha Hauptman 2013 Policing International Terrorism Pp 64 72 in Globalisation and the Challenge to Criminology edited by Francis Pakes London Routledge 1 a b c Helms Ronald Costanza S E Johnson Nicholas February 1 2012 Crouching tiger or phantom dragon Examining the discourse on global cyber terror Security Journal 25 1 57 75 doi 10 1057 sj 2011 6 ISSN 1743 4645 S2CID 154538050 Michael Bayer 2010 The Blue Planet Informal International Police Networks and National Intelligence Washington DC National Intelligence Defense College 2 Costanza S E Kilburn John C Jr 2005 Symbolic Security Moral Panic and Public Sentiment Toward a sociology of Counterterrorism Journal of Social and Ecological Boundaries 1 2 106 124 Deflem M 2004 Social Control and the Policing of Terrorism Foundations for a sociology of Counterterrorism American Sociologist 35 2 75 92 doi 10 1007 bf02692398 S2CID 143868466 DeLone Gregory J 2007 Law Enforcement Mission Statements Post September 11 Police Quarterly 10 2 Mathieu Deflem 2010 The Policing of Terrorism Organizational and Global Perspectives New York Routledge Ramirez D J Hoopes and T L Quinlan 2003 Defining racial profiling in a post September 11 world American Criminal Law Review 40 3 1195 1233 Kilburn John C Jr Costanza S E Metchik Eric Borgeson Kevin 2011 Policing Terror Threats and False Positives Employing a Signal Detection Model to Examine Changes in National and Local Policing Strategy between 2001 2007 Security Journal 24 19 36 doi 10 1057 sj 2009 7 S2CID 153825273 Kilburn John C Jr and Costanza S E 2009 Immigration and Homeland Security published in Battleground Immigration Ed Judith Ann Warner Greenwood Publishing Ca Kitzen M 2020 Operations in Irregular Warfare In Sookermany A eds Handbook of Military Sciences p 1 21 Springer Cham doi 10 1007 978 3 030 02866 4 81 1Further reading EditAriel Merari Terrorism as a Strategy in Insurgency Terrorism and Political Violence Vol 5 No 4 Winter 1993 pp 213 251 Edwin Bakker Tinka Veldhuis A Fear Management Approach to Counter Terrorism International Centre for Counter Terrorism The Hague 2012 J M Berger Making CVE Work A Focused Approach Based on Process Disruption International Centre for Counter Terrorism The Hague May 2016 Janos Besenyo Low cost attacks unnoticeable plots Overview on the economical character of current terrorism Strategic Impact ROMANIA ISSN 1841 5784 eISSN 1824 9904 62 2017 Issue No 1 pp 83 100 Deflem Mathieu 2020 Responses to Terror Policing and Countering Terrorism in the Modern Age In The Handbook of Collective Violence Current Developments and Understanding eds C A Ireland et al Abingdon UK Routledge Deflem Mathieu and Stephen Chicoine 2019 Policing Terrorism In The Handbook of Social Control edited by Mathieu Deflem Hoboken NJ Wiley Blackwell Deflem Mathieu and Shannon McDonough 2015 The Fear of Counterterrorism Surveillance and Civil Liberties Since 9 11 Society 52 1 70 79 Gagliano Giuseppe Agitazione sovversiva guerra psicologica e terrorismo 2010 ISBN 978 88 6178 600 4 Uniservice Books Ishmael Jones The Human Factor Inside the CIA s Dysfunctional Intelligence Culture 2008 revised 2010 ISBN 978 1 59403 382 7 Encounter Books Ivan Arreguin Toft Tunnel at the End of the Light A Critique of U S Counter terrorist Grand Strategy Cambridge Review of International Affairs Vol 15 No 3 2002 pp 549 563 Ivan Arreguin Toft How to Lose a War on Terror A Comparative Analysis of a Counterinsurgency Success and Failure in Jan Angstrom and Isabelle Duyvesteyn Eds Understanding Victory and Defeat in Contemporary War London Frank Cass 2007 James Mitchell Identifying Potential Terrorist Targets a study in the use of convergence G2 Whitepaper on terrorism copyright 2006 G2 Counterterrorism Conference June 2006 Washington D C James F Pastor Terrorism and Public Safety Policing Implications for the Obama Presidency 2009 ISBN 978 1 4398 1580 9 Taylor amp Francis Jessica Dorsey Christophe Paulussen Boundaries of the Battlefield A Critical Look at the Legal Paradigms and Rules in Countering Terrorism International Centre for Counter Terrorism The Hague 2013 Judy Kuriansky Editor Terror in the Holy Land Inside the Anguish of the Israeli Palestinian Conflict 2006 ISBN 0 275 99041 9 Praeger Publishers Lynn Zusman Editor The Law of Counterterrorism 2012 ISBN 978 1 61438 037 5 American Bar Association Marc Sageman Understanding Terror Networks Philadelphia PA University of Pennsylvania Press 2004 ISBN 0 8122 3808 7 Newton Lee Counterterrorism and Cybersecurity Total Information Awareness Second Edition Switzerland Springer International Publishing 2015 ISBN 978 3 319 17243 9 Teemu Sinkkonen Political Responses to Terrorism Acta Universitatis Tamperensis 2009 ISBN 978 9514478710 Vandana Asthana Cross Border Terrorism in India Counterterrorism Strategies and Challenges ACDIS Occasional Paper June 2010 Program in Arms Control Disarmament and International Security ACDIS University of IllinoisExternal links EditU S Bureau of Counterterrorism UK Counter Terrorism Policing Public order and safety International project on combating crime and terrorism Retrieved from https en wikipedia org w index php title Counterterrorism amp oldid 1131735011, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.