Terrorist Weapons, SKS

Terrorist Weapons, SKS PDF Author:
Publisher:
ISBN:
Category : Simonov semiautomatic rifle
Languages : en
Pages : 18

Get Book Here

Book Description

Terrorist Weapons, SKS

Terrorist Weapons, SKS PDF Author:
Publisher:
ISBN:
Category : Simonov semiautomatic rifle
Languages : en
Pages : 18

Get Book Here

Book Description


Stealing the Sword

Stealing the Sword PDF Author: James Bonomo
Publisher: Rand Corporation
ISBN: 0833039652
Category : History
Languages : en
Pages : 155

Get Book Here

Book Description
Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems i.

Stealing the Sword

Stealing the Sword PDF Author: James Bonomo
Publisher:
ISBN:
Category :
Languages : en
Pages : 155

Get Book Here

Book Description
Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems.

Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 156

Get Book Here

Book Description
This book examines one manifestation of the general technical competition between terrorist groups and security organizations: the balance between the potential use by terrorists of advanced conventional weapons and the responses available to deter or counter them. Use of the term "advanced conventional weapons" is inclusive and broad: any new or unusual conventional weaponry developed for ordinary military forces. All weaponry is obviously designed to do damage, but new design features might enable new, or at least unfamiliar, terrorist attacks. At the same time, the usual limitation of weaponry to militaries implies that various controls could be applied. One example of this competition has received much attention: the balance between terrorist use of man-portable air defense systems (MANPADS) and U.S. responses. The November 2002 attacks in Mombasa, Kenya, using Russian-built MANPADS against an Israeli airliner, demonstrated that terrorists are able to acquire and use that type of advanced weaponry. In response, the United States has negotiated a multinational agreement that calls for imposing both technical and procedural use controls on new MANPADS, and also has started a pilot program within the Department of Homeland Security to demonstrate technical countermeasures suitable for protecting commercial aircraft from MANPADS. But MANPADS are only one of a long list of advanced conventional weapons that are potentially attractive to terrorists. This monograph explores a range of other weapons, both those still under development and those already available but relatively unused by terrorists. These weapons are as follows: sniper rifles and associated instrumentation, improved squad-level weapons of several types, long-range antitank missiles, large limpet mines, and precision indirect fire systems.

Firearms, Explosives and Terrorists

Firearms, Explosives and Terrorists PDF Author: Frank R. Lautenberg
Publisher: DIANE Publishing
ISBN: 1437942032
Category : Political Science
Languages : en
Pages : 13

Get Book Here

Book Description
Instead of making us safer, U.S. law is enabling suspected terrorists to purchase the guns and explosives they need to carry out an attack. The ¿Terror Gap¿ ¿- which prohibits the gov¿t. from stopping people on the terrorist watch list from purchasing guns and explosives -- must be closed before it is too late. Given the trend in terror attacks toward firearms and explosives, this loophole in the law is a clear and present danger to the safety of Americans. Contents of this report: Commando-style attacks abroad; The growing threat at home; Current U.S. gun laws increase risk of commando attacks; Avail. of firearms and explosives in the U.S.; Proposed legislation that will help prevent the next attack. Charts and tables. A print on demand pub.

Terrorist Recognition Handbook

Terrorist Recognition Handbook PDF Author: Malcolm W. Nance
Publisher: CRC Press
ISBN: 1466554606
Category : Business & Economics
Languages : en
Pages : 439

Get Book Here

Book Description
First published in 2003, Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities remains one of the only books available to provide detailed information on terrorist methodology revealing terrorist motivation, organizational structure, planning, financing, and operational tactics to carry out atta

Masters of Terror

Masters of Terror PDF Author: Richard Tanter
Publisher: Rowman & Littlefield
ISBN: 9780742538344
Category : History
Languages : en
Pages : 266

Get Book Here

Book Description
The terror campaign by pro-Indonesian armed groups before, during, and after East Timor's independence referendum in 1999 was a blatant challenge to the international community as many of the acts of murder, political intimidation, destruction, and mass deportation took place before the eyes of the world. Yet still the ultimate responsibility has been denied and obscured. Masters of Terror provides an authoritative analysis and documentation of the brutal operations carried out by the Indonesian army and its East Timorese allies. The authors carefully assemble detailed accounts of the actions of the major Indonesian officers and East Timorese militia commanders accused of gross human rights violations. This indispensable work explores a horrific frontal attack on democracy and calls for the establishment of an international tribunal for crimes against humanity in East Timor.

Special Branch War

Special Branch War PDF Author: Ed Bird
Publisher: Helion and Company
ISBN: 1909982342
Category : History
Languages : en
Pages : 321

Get Book Here

Book Description
This searing account primarily covers Ed Bird's Special Branch (SB) service in the Beitbridge area of southern Matabeleland, 1976-1980, encompassing Operations Repulse and Tangent of the bitter Rhodesian 'bush war'. Joining the British South Africa Police (BSAP) in 1964, Bird cut his teeth on Selous Scouts 'pseudo' operations during Operation Hurricane in 1974-1976, so was well equipped to deal with the insidious escalation of the ZANLA and ZIPRA campaigns in the south of the country. A meticulous recorder, Bird implemented and maintained the Beitbridge SB incident log, and it is this diary of terror and death upon which Bird's account hangs, interspersed with detailed accounts of fire fights, ambushes, landmine blasts, ZANLA executions, traitors and assassinations, SB 'dirty tricks' and 'turning' terrorists. Although first and foremost an intelligence-gatherer, Bird thrived on combat and against all protocol inveigled his way onto Fire Force operations and as an air mobile MAG machine-gunner on converted Police Reserve Air Wing aircraft. Decorated for bravery but overlooked for promotion, Bird's BSAP career became victim to spurious political expedience.

Rhodesian Air Force Operations

Rhodesian Air Force Operations PDF Author: Preller Geldenhuys
Publisher: Lulu.com
ISBN: 0994115415
Category : History
Languages : en
Pages : 353

Get Book Here

Book Description
This book records the operations of the Rhodesian Air Force. It includes a log of over 1100 airstrikes carried out as well as maps where most of these strikes have been meticulously plotted. The maps are in full colour. Numerous photographs illustrate the text. The author has produced a comprehensive account of the Air Force role in the war in Rhodesia - Zimbabwe. The work includes one of the most detailed summaries of Rhodesian military operations to have been published, and in this respect serves as an excellent work or reference to those historians and collectors of militaria. It is a book that fills in much detail.A comprehensive index is included. To the very end the Air Force kept up its valiant task of securing the airspace for the troops, the BSAP, the farmers and industry. All in all this is a highly readable, extremely detailed account of the Air Force's part in the war against terrorism

Terror on the Tracks

Terror on the Tracks PDF Author: Tom Bryer
Publisher: Paragon Publishing
ISBN: 1908341327
Category : Fiction
Languages : en
Pages : 222

Get Book Here

Book Description
The story tells of two men, one (Matthew Kumalo) bent on disrupting the stretch of Rhodesia Railways track south of Victoria Falls and towards Bulawayo in the south, harassing and murdering railway staff, and the other in protecting the same and keeping traffic flowing. Phillip Lewis, was the railway civil engineer in charge of keeping the vital railway lines open in the face of the continued terrorist attacks. Joanna Wilson, working as a reporter on the South African Johannesburg Star newspaper, was the woman that Phillip had never got out of his system. She revisits Rhodesia with a South African media group to report on the war presently raging across the country. Simultaneously the ZANLA forces of Robert Mugabe, working out of Mozambique, are planning to destroy the road/rail bridge over the Zambezi River at Victoria Falls, chiefly to prevent Joshua Nkomo's Russian tanks crossing from Zambia into Rhodesia where they could potentially be used against Mugabe's ZANU party. The war of terror subsequently leads to Phillip and Joanna being isolated and pursued through the bush leaving Phillip with life-changing decisions to make. The Author Tom Bryer, OLM, C.Eng. FICE (ret'd) A retired Chartered Civil Engineer, whose career centred on the design, construction and maintenance of a variety of railway systems, including those in Central and Southern Africa, Channel Tunnel, Docklands Light Railway, London Underground, Network Rail and South Wales Docks. Tom lived with his wife Ida in Rhodesia/Zimbabwe for a period from 1967 to 1983 and witnessed much of the internal strife of the period. Recently a widower, he now spends his time writing novels (un-published), choir singing and tending to house and garden.