COUNTERTERRORIST PROGRAM PRIMER
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP85-00671R000200250001-4
Release Decision:
RIPPUB
Original Classification:
C
Document Page Count:
68
Document Creation Date:
November 17, 2016
Document Release Date:
July 27, 1998
Sequence Number:
1
Case Number:
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP85-00671R000200250001-4.pdf | 2.4 MB |
Body:
- 4pproved For Release 1999091, 2.4.,:_OJA- RPP85-00671 R000200250001-4
RETIRED FILE
JOB-W--00 (07IR
BOX FOLDER--Oa(.
D ::SENSITJZ D
COUNTERTERRORIST PROGRAM PRIMER
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
This working paper contains a series of summaries and
checklists suggested as planning aids for officials concerned
with the initial development of counterterror programs. No
attempt has been made to recommend specific solutions to par-
ticular terrorist situations since these will vary in accordance
with the nature of the threat and with the social, economic,
psychological, political, and security factors in any given
situation---local, national, or international.
It is assumed that readers will already have a working
knowledge of those specific terrorist groups and techniques
with which they are confronted---and that essential expertise
and resources for effectively conducting a counterterror pro-
gram are readily attainable.
For the purpose of this presentation, the terms terrorist,
subversive or guerrilla are synonymous. They are used without
particular distinction in any situation where violence is the
vehicle for increasing political influence and power at the
expense of law and order.
Readers will observe that the overall paper is actually
a collection of several different drafts. As a result, depth
and focus of individual subjects varies between sections. There
are also some minor redundancies and a few English errors.
However, these problems are not detrimental to general or
specific utility, and they are being temporarily overlooked
e o t to mmediate requirements.
Approve or~F~eiease 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
INDEX
1. SUMMARY . ... . . . . . . . . . . . , . . . 1
1. Offensive Terror . . . . . . . . . ? . . . 1
2. Defensive Terror . . . . . . . . . . . . . 3
3. Counterterror . . . . . . . . . . . . . . 5
II. TERRORIST METHODS . . . . . . . . . . . . 8
1. Propaganda and Agitation . . . . . . . . . 8
2. Assassination and Kidnapping . . . . . . . 9
3. Infiltration . . . . . . . . . . . . . . . . 10
4. Bombing and Sabotage . . . . . . . . . . . 11
5. Armed Attacks . . . . . . . . . . . . . . 13
6. Mob Violence . . . . . . . . . . . . . 13
III. COUNTERTERRORIST TOOLS . . . . . . . . 16
IV. THREAT ANALYSIS . . . . . . . . . . . . . 25
1. Terrorist Fact Sheet . . . . . . . . . . . 25
2. Possible Terrorist Objectives . . . . . . . 26
3. Terrorist Potential . . . . . . . . . . . . 26
DEFENSIVE MEASURES . . . . . . . . . . . 28
1. Essential Elements of Support . . . . . . 28
2. Local Security Checklist . . . . . . . . . . 30
3. Prepara`:ion of Operational Environment. . . 31
4. Personal/Physical Factors . . . . . . . . 33
5. Communication Related Defense . . . . . . 35
6. Terrorist Activity Gaming . . . . . . . . . 37
7. ITC System . . . . . . . . . . . . . . . . 4:1
8. Deception . . . . . . . . . . . . . . . . 4:7
9. File Systems . . . . . . . . . . . . . . . 48
10. Essential Equipment. . . . . ? ? ? ? ? ? 49
11. Pre-Crises Pointers . . . . . . . . . ? ? 53
VI. INCIDENT PROCEDURES . . . . . . . s . . 54
1. Protective Reaction Chart . . . . . . . . . 54
2. Reaction Questionnaire . . . . . . . . . . 57
3. Immediate Response . . . . . . . . . . . 60
4. Hostage Location . . . . . . . . . . . 63
5. Potential Hostage Notes . . . . . . . . . . 64
VII. TERRORIST EXEMPLARS . . . . . . . . . 66
VIII. BIBLIOGRAPHY . . . . . . . . . . . . . 67
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
I. SUMMARY
1. OFFENSIVE TERROR
Threats, violence and coercion form the basis of offensive terror.
Terrorism is used to reduce effectively resistance to the aims of its
proponents. It is the means to (1) demoralize governmental authority;
(2) separate a people from their leaders; (3) paralyze opposition forces;
(4) shock the indifferent; (5) agitate and influence; (6) 'build terrorist
morale; (7) enforce conformity or compliance; (8) eliminate an enemy;
(9) advertise and initiate a revolutionary movement; (10) destroy group
or population solidarity; (11) disorient a target mass; and (12) provoke
repressive government countermeasures which will antagonize the
population concerned.
Terror ruthlessly applied is a powerful and effective weapon so
long as it is not employed clumsily or to excesses which stimulate
general population alienation against the terrorists. Further, it can
only be applied for short durations or its effectiveness will be diminished
as the population becomes accustomed to living under these conditions.
It is, therefore, imperative that terrorist actions be planned to evoke a
high but short-term state of fear, dread, or anxiety among its target
population. If terror is not measured to accomplish these conditions,
it cannot hope to attain favorable results for the terrorists or their
sponsors.
Approved For Release 1999/09/24: CIA-RbP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Given the above considerations, terrorism may not be effective
unless it is climactic and successful in its initial stages. All prepara-
tory action must therefore be clandestine and premature acts of vio-
lence cannot be permitted.
The preparatory phase of terrorism represents the most important
and crucial period. Dedicated covert leadership is needed to begin the
process of clandestine organization. Motivated manpower with fanatical
ideology must be spotted, recruited, trained and secretly formulated
into small compartmented action "cells. " Financial and material re-
sources, plus related supporting mechanisms are essential if terrorist
action is to be undertaken with sufficient impact. Agents or informant s
must be recruited and trained to provide target intelligence required
for discriminate or indiscriminate acts of violence. Technical skills
and specialized equipment will need to be acquired for bombing opera-
tions or unique approaches to assassination. Tactics must be re-
hearsed generally without secure use of any geographic; area or
facility. And last but not least, the means must be achieved to provide
communication dispersion of assets, command and control plus tactical
mobility.
Having completed all preparatory action secretly among an in-
finitesimal portion of the population, a well-planned terrorist campaign
is launched suddenly by the conduct of massive acts of violence that
Approved For Release 1999/09/24: CI-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
occur simultaneously over a wide area. The resultant shock effect may
be expected to create highly desirable psychological responses, and per-
haps temporarily neutralize opposition security forces. Taking advantage
of this situation, the effective terrorist organization can rapidly expand
the level of violence until a balance of power is achieved favoring the
originators. Acts of terrorism can then be dramatically decreased or
curtailed until future needs demand a resurgence.
During the conduct of the terror campaign, discriminate terrorism
targets selected leaders or individuals whose loss will severely handi-
cap the "cause" they represent. This selective violence is also used
to disrupt government machinery or impress specific groups by elimina-
tion of key personnel. Indiscriminate terror is utilized to spread panic
among the general population, with the aim of eroding trust, authority
and security. The general technique includes bombing of restaurants,
movies, hospitals, religious centers, and transportation services,
or assassination of people in the street. As a general rule, this type
of terror is most effective when it appears to have no specific targets
even though particular acts of violence may be highly selective.
2. DEFENSIVE TERROR
If governments or independent groups become frustrated over their
inability to negate offensive terror by legal means, they may resort to
the employment of violence to counter violence. The targets of such
- 3 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
defensive terror include opposition cadre, terrorists, and their
supporting mechanisms. Since regimes or individuals do not normally
wish to become overtly involved in any terrorist action, most defensive
terror campaigns are conducted on a covert basis.
Primary tactics of defensive terror include selective assassination
and bombing. Ancillary efforts may involve raids, ambush, kidnapping,
torture and harsh punishment without "due process. " Normally, defen-
sive acts of violence are discriminate unless an easily identifiable
population group is directly responsible for offensive terror. Under
such circumstances, indiscriminate action against such groups may
be thought justifiable, but the government concerned would probably
reap a harvest of accusations charging brutal repression -- regard-
less of where the guilt may lie.
The fundamental problem with defensive terror is that violence
begets more violence and the general population usually becomes
antagonistic toward government because of this consequence. Even
if government is not the actual sponsor of defensive terror, suspicion
and accusation will eventually lead to an official image of brutal re-
pression which does not enhance the legal government's chances for
survival. This reason, plus ethical and moral considerations, will
usually preclude any regimes consideration of this technique.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
3. COUNTERTERROR
First and most importantly, counterterror has no relationship to
defensive terror. Counterterror usually involves a combination of
social, economic, psychological, political, propaganda, intelligence,
and internal security actions designed to neutralize a terrorist force.
Further, these actions must be individually and/or collectively structured
to erode the terrorists basis of popular support.
Essential counterterrorist actions should incude (1) development
of programs designed to meet "felt needs" and resolve conditions per-
ceived as being intolerable by various population elements; (2) upgrading
of security force capabilities to provide population protection and freedom
from fear; (3) effective utilization of "law and due process" to convince
the populace that government will defeat the subversives without utilizing
repressive measures; and (4) creation of institutional and governmental
mechanisms that provide the means for effective "change" without
violence.
The developmental or modernization approach usually requires
human, technological and capital inputs at a rate which will provide
substantial agricultural and/or industrial growth. This is a long-term
and complex solution which cannot be achieved easily without adequate
savings, trade, aid or credit. In addition to the above inputs, markets
must be developed; producer incentives created; income and employment
Approved For Release 1999/09/24: CIA-13QP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
levels increased; educational programs expanded; birth rates reduced
to something less than Gross National Product increases; and skilled
manpower, energy sources, raw materials, machinery or other capital
items must be assembled at the production point. Apart from these
overall development efforts, dissident and impoverished population
elements should be provided with basic minimal subsistence plus the
opportunity for socio-economic self-advancement.
Security improvement programs should be based upon legislative
actions which provide the police and other internal defense forces with
appropriate increases in leadership, manpower, training, finance,
communications, mobility, weapons, equipment and material. Es-
sential tactical innovations will be discussed under the following section.
The fundamental basis for improving security operations is via better
intelligence collection and collation. Human/technical penetrations,
agent or informant operations, prisoner interrogation., communications
intercept, and investigative techniques all provide essential information
inputs. Effective collation of this data should result eventually in the
identification of subversive leadership, cadre, action and support
elements, ideology, modus operandi, organizational patterns, strength,
capability, plans or intentions, facilities, mechanisms, and other details.
In turn, the finished intelligence produce is used to provide targets or
operational leads and as legal evidence for judicial processing of
subversives.
Approved For Release 1999/09/24: CIA?RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Regarding "law and due process", it is essential that judicial proce-
dures be established to assure that violence control measures are
politically, legally and morally justifiable. This is particularly true
of methods used to arrest, detain, interrogate, convict and imprison
or execute individual members of a subversive movement. If repressive,
brutal, or illegal tactics are used by the government to attack subversive
forces, popular sentiment may favor success of the latter.
Creation of adaptive and responsible institutions provide government
with its most effective psychological weapon against violence. Assuming
such organizations provide the basis for peaceful constructive change,
the perpetrators of violence cannot justify their methods to a target
populace. In fact, history has proven that the urban guerrilla cannot
long survive in an environment where popular political, economic,
or social aspirations can be achieved by non-violent methods.
Subversion and social unrest thrives on the inability of a nation to
modernize existing private or governmental institutions in a manner
which will facilitate the effective, peaceful resolution of intolerable
conditions. It is therefore essential that government assure that there
is an adaptive organizational basis for reform, modernization and pro-
gressive change. This process must include government bureaucracy,
political parties, unions, cooperatives, youth groups, and other pri-
vate institutions.
- 7 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
II. TERRORIST METHODS
The following sub-sections provide a general synopsis of terrorist
methodology.
1. PROPAGANDA AND AGITATION
In order to be successful, most subversive movements must con-
vince a majority of a target population that the conditions under which
they exist are intolerable. This attitude will then provide the motivation
and 17cause" needed to stimulate the popular dissidence essential to ruining
or overthrowing any government.
Propaganda comes in many and varied forms to include (1) leaflets;
(2) letter campaigns; (3) wall slogans; (4) rumors; (5) oratory; and
(6) radio, newspapers or other media. However, the latter forum
exists only where free speech is guaranteed or for low-level efforts
which might not be supressed.
Agitation is usually accomplished by agents of influence who seize
upon controversial issue to "inflame" specific audiences for the pur-
pose of stimulating the development of particular attitudes, actions or
reactions. These individuals usually focus their attention on labor,
student or other population organizations that have banded together
because of common interests they wish to protect or promote. By
identifying with their cause, the agitator can thus seek to exploit any
known grievance.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
2. ASSASSINATION AND KIDNAPPING
The urban guerrillas may employ assassination and/or kidnapping
operations to eliminate "key" leaders within government or the private
sector. Liquidation of existing leadership is the oldest method of re-
volution and afford a relatively simple means to dislocate or disorganize
political- social- economic institutions.
Targets may be limited to "heads" of state, representatives of
government, local leaders, or other individuals who act: to support
the status quo. The primary aim of a systematic campaign of assassina-
tion is to alienate a populace from their government by establishing the
omnipotent power of the guerrillas. Kidnapping operations may also
be designed to accomplish this same objective, and to extract conces-
sions, capture publicity, provoke controversy or free political pri-
soners. Targets for kidnapping may also include foreign diplomats or
business executives and various personalities who might be useful for
propaganda purposes. In some cases, the kidnap victim may be executed
after his usefulness has ended, so that net effect is that of a combined
kidnapping and assassination.
Individuals or select three to five-man guerrilla teams are usually
employed to conduct the above types of operations. Normally, such
individuals are selected on the basis of their proven courage, dedication,
resourcefulness and cunning. Preferably, they are not persons wanted by
Approved For Release 1999/09/24: ClA RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
the authorities, but ordinary citizens capable of moving about freely.
Assassinations or kidnappings are planned in detail and special sur-
veillance parties first check on the movements of prospective victims.
The target is shadowed to learn his habits, hours, movement patterns
and usual security procedures. When a pattern is established, the
guerrillas then develop and rehearse their specific modus operandi.
3. INFILTRATION"'
The security and operational potential of an urban guerrilla force
is usually predicated on the quantity of intelligence obtained by suc-
cessful infiltration. If police and internal security organizations can
be penetrated, the guerrillas may thus be forewarned of actions planned
against them. The infiltration of security forces was seen by Lenin
as one of the essential preconditions for a successful urban uprising.
Lenin's theory being that urban guerrillas would always be outgunned
unless they neutralize the police and other security elements by in-
filtrating their own agents at all levels.
In addition, the subversive movement cannot be expected to succeed
unless it attacks and erodes any official programs designed to esta-
blish or sustain population confidence in government. To help accomp-
lish this goal, the urban guerrillas will attempt to infiltrate all elements
of the target regime. The net objective is to obtain information which
,',,As used in this case, the word infiltration is synonymous with
penetration.
Approved For Release 1999/09/24: CtA1 RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
can be used to plan disruptive or destructive attacks against socio-
economic development projects or other programs designed to alleviate
popular grievances.
Select infiltration operations may be used to obtain specific target
intelligence, particularly as regards procurement of funds, weapons,
or other supplies. Penetration agents can also provide information
on potential targets for terrorist, sabotage, assassination and kidnap
operations.
Classic clandestine "tradecraft" techniques are used as the basis
for organizing and accomplishing infiltration operations.
We are first concerned with human penetrations and to a lesser
degree, theft, bribery, technical penetrations and other ancillary types
of espionage. However, the primary danger is that guerrillas may
obtain a popular following from among elements of the population having
existing intelligence access. This situation will then create a more
spontaneous flow of information which the urban guerrillas can use
for protection or advantage.
4. BOMBING & SABOTAGE
The essential purpose of bombing or sabotage is effective disrup-
tion of the economic- political- security activities within a state whose
government is targeted for ruin or overthrow. It is a tactic that may
be employed by urban guerrillas and terrorists, or by specialized
Approved For Release 1999/09/24: CIA- tbP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
"cells. " Fundamental objectives include: (1) reduction of agricultural
and industrial production; (2) impeding the effective functioning of
essential services such as communication, transportation and utilities;
(3) limiting the conduct of various government activities with emphasis
on internal security services and political machinery; and/or (4) "cowing"
of a target population.
Most of the above is based upon covert destructive attack using
explosives, combustibles, abrasives or subtle disruptive action.
Methods include: (1) descriminate or indescriminate bombing; (2)
mechanical breakage; (3) use of damaging chemicals; (4) arson;
(5) electronic interruptions; (6) pilferage of vital components; (7) dis-
semination of incorrect information, falsification of data, misfiling
and records manipulation; (8) tampering; (9) fatal "flawing" of materials
or equipment; (10) work slowdowns; (11) interruption of command or
control procedures; and (12) use of laws, courts, and parliamentary
rules to impede the effective functioning of government.
The extensive employment of various bombing and sabotage techniques
affords the revolutionary with a relatively secure and inexpensive weapon
that can have disastrous consequences on the economy and security of
a state. Further, the systematic employment of same: erodes public
morale and confidence in government while advertising the success and
apparent invincibility of subversive forces.
- 12 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
5. ARMED ATTACKS
Terrorist groups may employ snipers or "firing groups" of four or
five men which may undertake limited hit and run attacks to erode popular
confidence in government security forces and to force the initiation of
repressive acts antagonistic to a target populace. Weapons include
rifles, shotguns, pistols, grenades, Molotov cocktails, explosives
and other lightweight, easily concealable items. Targets may be
discriminately or indiscriminately selected. Police, firemen, govern-
ment officials, foreign diplomats or businessmen and leaders of mo-
derating forces are high on the discriminate list. Indiscriminate tar-
gets are usually selected to incite population fear. These armed action
groups may also be used to undertake robbery, kidnapping, assassina-
tion or other select activity in support of overall subversive objectives.
In the urban environment, such guerrilla action is at close quarters
for extremely short duration. Specific tactics will depend on the target,
the metropolitan terrain, attack options, movement alternatives, type
of weapons, accepted modus operandi and the potential for surprise/
retreat. The net effect being a great diversification of tactical approach
from one situation to another.
6. MOB VIOLENCE
Street tactics of the terrorist or urban guerrillas include the in-
stigation and/or manipulation of demonstrations, mobs, and strikes.
Approved For Release 1999/09/24: CIA tDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
The objective is to create a situation wherein peaceful protect groups
can be agitated to- participate in acts of civil disobedience or riot.
Agents of influence and subversive agitators may seize upon any
popular grievance to stimulate the formation of protest groups. The
next objective is for agitators to encourage the type of public demon-
stration that could easily "flare" into a confrontation with police.
Having created a proper environment, various guerrilla elements
can infiltrate the street mobs to incite a riot or undertake acts of
violence using the protestors for cover.
Tactics are simple. Bottles, bricks, and stones can be hurled
at police. Hasty barricades may be used to block streets. Business
establishments, factories and/or government buildings can be looted
or burned. Snipers can be deployed to fire at police, hoping they in
turn will retaliate by killing innocent members of the rr.Lob. When the
police attempt to arrest an agitator, a larger group of urban guerrillas
may attempt to aid his escape. If internal security forces effectively
contain the riot, the guerrillas will retreat along pre-planned avenues
of escape.
The primary objective of such group agitation is to force the
government to take strong repressive measures, thereby further
alienating the population. Promoting general disorder also helps
to disrupt the economy and undermine the government. Last but
Approved For Release 1999/09/24: CI&RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
not least, by organizing social discontent, the urban guerrillas induce
the population to accept their leadership while- demonstrating the re-
gime's lack of authority.
Basic ingredients for group agitation include: (1) leadership
trained in mob psychology and tactics; (2) an executive committee
responsible for overall planning and execution; (3) propaganda efforts
to rally public sympathy for a cause; (4) compilation and continuous
review of exploitable grievances; (5) registration of potential dissidents;
(6) study of overall environment; (7) profiling of radical organizations;
(8) enlistment of financial and moral support; (9) tactical training for
agitators; (10) development of community support; (11) recruitment of
"crowd-moving" orators; (12) preparation of music, chants and slogans;
(13) creation of demands and ultimatums; (14) planning for pivotal events
designed to precipitate conflicts; (15) public announcement of time
and place for planned demonstration; (16) stimulation of actions to
incite media coverage; and (17) encouraging demonstators to partici-
pate in dramatic mass arrests.
By effective manipulation of mob psychology, the urban guerrilla
thus plans to push the aggrieved citizen into outright breaches of law
that will lead to heightened outbursts of violence. In addition, all-out
revolution must be rapidly precipitated or mob participants will lose
stamina in the face of prolonged adversity. To succeed, group agitation
App' b'td} -O? fdWet'I /6@/2$1 'li eFtD`8S `~7~' 6 '~62! 1il a actions.
- 15 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
III. COUNTERTERRORIST TOOLS
An effective counterterrorist program must incorporate most if not
all of the working tools described herein.
Terrorist Profiles - can be used to provide security personnel with
a classic thumbnail description of individuals who warrant close scrutiny
as potential participants in acts of violence. This approach facilitates
narrowing the focus of investigative and intelligence operations designed
to identify members of terrorist organizations. Further, the profile
improves routine observation by police and other authorities responsible
for internal security.
An example profile of a potential terrorist might indicate basic
characteristics to include: (1) male or female age 16 to 58; (2) member
of potentially dissident group; (3) person with emotional or fanatical
tendency; (4) individual who has evidenced violent behavior or emotional
instability; (5) citizens who are isolated from the national socioeconomic
or political "mainstream"; (6) radicals who have engaged in demands
for revolutionary change; and (7) individuals who obviously have nothing
to lose by engaging in terrorism.
Potential terrorist traits should be adjusted to fit each particular
local or national environment. The main objective being to create a
system that is easily developed and readily applied by all security or
intelligence personnel.
Approved For Release 1999/09/24 : dI RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Documentation Controls - facilitate security forces in their efforts
to identify suspect terrorists and their supporters. Population identi-
fication papers should be designed to allow the police to spot-check any
individual's name, date and place of birth, residence, family status,
employment, race, religion, and physical description. Photographs
and fingerprints can also be added to documents. In cases of emer-
gency, citizens may be required to obtain special documentation for
travel and resource control permits for the purchase of any item that
might be used to aid a terrorist act.
The intended objective of detailed documentation is to aid the
screening of dissident population elements. When used in conjunction
with terrorist profiles and when properly focused on areas where vio-
lence has occurred the system can be effective in providing investiga-
tive leads.
Biographic Registry - involves the establishment of a central security
reference containing biographic card files or computer data on all.
known criminals, subversives, terrorists, dissidents and suspicious
personalities. Each security and intelligence service would provide
appropriate biographic inputs, and have controlled access to the com-
plete registry. Sources and information would be protected by appro-
priate compartmentation and security clearance procedures.
In effect, a national biographic reference is created to facilitate
collation of all source intelligence on confirmed or suspect terrorists.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
If the quality and quantity of information inputs are adequate, all
security personnel -can use existing files as the basis for rapidly
determining any persons possible association with terrorist or sub-
versive activity. By establishing secure radio procedures for sending
queries to the biographic registry, any policemen with appropriate
communication can immediately validate the suspect status of indivi-
duals stopped for spot-checks.
The biographic registry does not negate the need to investigate or
collect intelligence on potential terrorists having or not having files,
but it does preclude suspect persons from easily going unnoticed.
Personnel& Physical Security - must necessarily be provided
for the indigenous leaders and government personnel who will likely
be targeted for terrorist violence. This requirement includes pro-
tection of individuals from threats, coercion, assassination and bombing;
the latter action prompting the need for physical security of offices, homes,
meeting places and transportation facilities.
General defensive procedures include: (1) personnel security
clearances; (2) entry and exit control for offices} (3) protective fences
for fixed facilities; (4) guards for personnel and buildings; (5) screening
of communications, mail and cargo; (6) use of metal detectors for routine
weapons search; (7) utilization of bomb squads with dogs trained to
smell out plastic explosives; (8) travel control procedures emphasizing
alternate routes and various methods of trans o p trols
Approved For Release 1999/09/24: CIA-RDP85-0 X06 R6bb2Ua2 v~~~l -
- 18 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
in the area of offices and individual homes; and (10) other techniques
appropriate to environmental situations.
The primary objective of such elaborate precautions is to frustrate
the effective conduct of terrorist actions and thereby prevent those
spectacular successes which encourage expanded future violence.
To better focus defensive efforts and conserve resource allocation,
it is essential that hard intelligence be obtained on terrorist intentions
and modus operandi. This intelligence effort also provides the 'basis
for offensive actions designed to negate terrorist violence before it
can be employed. Personnel and physical security is thus achieved
by a combination of defensive and offensive programs, the latter of
which can be the most effective. The offensive methods will be dis-
cussed further in subsequent sections.
Intelligence Collection - is essential to the conduct of effective
counterterror operations. Neutralization of violence is dependent
upon government having some knowledge of terrorist personalities,
organization, plans, intentions, ideology, modus operandi, and support
mechanisms. Without such knowledge, security forces will be unable
to properly focus defensive or offensive actions. Unfocused counter-
measures are usually doomed to failure since the terrorists will be
largely unaffected. Detailed information on terrorists can best be
obtained by clandestine human or technical penetration operations.
Failing this, intelligence must be gathered by alternate means to include:
Approved For Release 1999/09/24 :-CCI#-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
(1) recruitment of informants; (2) suspect surveillance; (3) police
investigation of potential terrorists; (4) search for weapons, explo-
sives, or other incriminating evidence; (5) prisoner interrogation;
(6) monitoring of possible targets and suspected terrorist supply
sources; and (7) mass population education in observation and reporting
techniques related to terrorist activity.
To narrow the focus of the above collection operations, demographic
data and terrorist profiles can be used to fix specific geographic areas
where terrorists could reside and organize with some degree of relative
safety. Although terrorists may operate anywhere, they normally main-
tain their residence and meeting places among dissident population ele-
ments who evidence negative or hostile reaction to government security
forces. This fact, therefore, allows selective elimination of those urban
and rural areas which would not provide a hospitable terrorist environ-
ment.
Physical data on roads, communication facilities, residential patterns,
buildings, and isolated areas can also be used to help determine likely
patterns of terrorist organizational activity within suspect geographic
areas. Trash collectors, building inspectors, electricians and other
personnel with natural access can be recruited to aid collection of this
physical information. Again, this effort further serves to pinpoint where
intelligence operations should be targeted.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
-Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Counterintelligence/counterespionage operations will, also be
needed to supplement the above efforts. The qbjective of these
operations includes: (1) penetrating and manipulating terrorist
cells; (2) stopping, disrupting, misorienting or negating terrorist
intelligence collection activities; and (3) developing passive or
specialized defenses against planned terrorist acts of violence.
In summary, intelligence and counterintelligence operations form
the foundation for counterterror campaigns. Those security services
or personnel not familiar with essential clandestine tradecraft should
seek appropriate guidance and assistance.
Intelligence Collation - provides the detailed compilation and
analysis of information, needed to help identify, arrest and convict
the perpetrators of violence. It also facilitates the location and elimina-
tion of terrorist support mechanisms and other hard targets.
To function effectively, any collation center must have access to
all sources of information. This implies cooperation with all security
and intelligence services using appropriate clearances, "source" pro-
tection and compartmentation. In addition, the-centers must have the
legal right to pinpoint specific targets and assign collection or action
requirements to individual government components. Without such
follow-on authority, the collation centers become little more than
repositories of unexploited intelligence.
- 21 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
-Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
All source information inputs should include: (1) biographic data;
(Z) pertinent socioeconomic, demographic and geographic publications;
(3) details on transportation, communications, and material resources;
(4) target assessments; (5) analysis of terrorist organizations and
modus operandi; and (6) all reporting on criminals, dissidents, ra-
dicals, subversives or terrorists. After collecting every scrap of
available information, trained analysts then collate data with the ob-
jective of developing investigative and target leads.
The primary advantage to central collation is simply that all.
available pieces of an investigative puzzle are laid before personnel
experienced in the art of formulating a composite intelligence picture
which provides the sharpest available detail on any terrorist organi-
zation. If this collation process is absent or fragmented, any intelli-
gence produce cannot be properly exploited and subsequent counter-
terror activities may be expected to be largely ineffective. It is,
therefore, imperative that any government targeted by terrorists seek
to establish the best possible intelligence collation system.
Security Force Requirements - generally include: (1) defense of
official personnel and physical facilities; (2) riot control, bomb disposal
and population protection from acts of violence; (3) enforcement of law
and order; (4) preparation for national defense against; internal or
external acts of aggression; (5) investigation leading to location,
arrest, and conviction of criminals, dissidents, subversives or
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
-22-
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
terrorists; and (6) other actions required to resist lawlessness, vio-
lence, subversion and warfare originating within or outside the state.
The conduct of counterterror operations primarily burdens police
forces with the requirement to provide population freedom from fear
and violence, while undertaking legal investigation which will ultimately
result in conviction and punishment of terrorists after "due process."
As previously stated, the foundation for this effort is based upon adequate
intelligence collection which may be a_primary or secondary function of
various security services.
Once intelligence leads are provided, the lengthy and arduous process
begins to obtain sufficient evidence for a court trial which will prove the
suspect terrorist guilty of accomplished or planned crimes of violence.
This requirement demands the skills and extensive application of modern
criminal investigation. It is, therefore, suggested that appropriate
actions be undertaken to provide police or other security forces with
adequate authority, leadership, manpower, funds, training and equip-
ment needed to accomplish the task.
Under most circumstances, it is recommended that -target govern-
ments seek whatever resources deemed necessary to upgrade security
forces and give them the capability to deal with terrorists by action
within existing legal parameters. Even though this is often the most
difficult course of action, it has proven to be the most successful.
-23-
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Population Mobilization - is initiated by advising the target nation's
citizenry of the nature of any terrorist threat and motivating mass popular
participation in negating acts of violence. To accomplish this objective,
the populace should be organized and instructed in the techniques of
aiding security forces in the identification of possible terrorists.
The latter may be accomplished by launching an aggressive educational
program designed to establish citizen procedures for reporting suspi-
cious activities or personalities that are observed by local inhabitants.
Carried to its ultimate conclusion, each village and city block would
have resident protection committees with direct communications to
local police forces. Possible investigative leads would thus be immediately
relayed for exploitation by security forces.
The unique advantage of such citizen participation is based on the
fact that local residents are most keenly aware of unusual events or
the appearance of strangers in their neighborhoods. Another obvious
benefit is the increase in numbers of eyes and ears, that terrorists
will be forced to avoid.
Actual techniques of population mobilization -will vary according to
environmental situations and citizen receptivity or motivation. Pro-
cedural approaches are the same as for so-called "block warning
systems. " As stated in the introductory note, implementation should
not be attempted prior to consultation with appropriate specialists.
- 24 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Judicial Base - is created by formulating those laws which fully
support security forces in their conduct of counterterror operations.
In addition, such laws should insure that all efforts are politically,
legally and morally justifiable. This is particularly true of methods
used to arrest, detain, interrogate, convict and imprison or execute
individual members of a terrorist movement.
IV. THREAT ANALYSIS
1. TERRORIST FACT SHEET
1. Who are they, how many, how organized, what is their motivation,
and what are their basic objectives?
2. What are their linguistic, technical and communications capa-
bilities ?
3. Where located, how armed, how equipped, current status, and
degree of mobility?
4. What are their psychological and/or physical vulnerabilities ?
5. How is command and control exercised?
6. What are the terrorists' probable courses of action under any
given set of circumstances?
7. When, where and how might essential and/or minimal outside
support be provided?
8. What are the minimum concessions the terrorists will accept
in exchange for hostage release?
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
? Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
2. POSSIBLE TERRORIST OBJECTIVES
1. Publicity,` propaganda, and/or influence
2. Political concessions.
3. Finance by ransom of hostages and/or aircraft, etc.
4. Release of fellow terrorists.
5. Expanded control via induced fear.
6. World-wide attention to grievances they have been unable to
resolve by legal means.
7. Elimination of principal opponents.
8. Consternation among all the groups, factions, and/or nations
who oppose their "cause".
9. Expanded use of target government repressive measures which
tend to create sympathy for the terrorists.
3. TERRORIST POTENTIAL
1. What dissident, subversive, terrorist or other elements re-
side within the country?
2. Do international or third-country terrorist organizations have
support and/or action components assigned to the country?
3. What is the record and modus operandi or post terrorist op-
erations, and what is the frequency of incidents?
4. If specific persons were targeted as potential victims, where
would terrorists probably initiate the kidnapping or seizure?
Approved For Release 1999/09/24: GI&RDP85-00671 R000200250001-4
ApprgyeqkF91(rg J iQ9124 vlA MP96PO "I 6062{90 boa1-4
a hostage, where would they probably be held?
6. What factors regarding activities and/or movement patterns
unnecessarily expose potential victims to a possible kidnapping?
7. In cases of seizures, airline skyjackings, or other mass
hostage operations, why might particular individuals be singled out
for special attention?
8. What unusual events normally proceed a terrorist kidnapping
or seizure -- either within or outside the country?
9. What disposition is usually made of the hostages of those
terrorist groups with which you are familiar and what time factors
are involved?
10. In cases of negotiated release, what individuals or groups might
be used as a go-between?
11. What are the usual communication channels or systems used
by terrorists for command control and/or negotiations?
12. What is the ethnic and psychological profile of those terrorist
leaders with whom you might come in contact, and what are their
grievances or political objectives?
13. Have terrorists tended to panic, upon lea-rning they are threatened
or that governments will not bargain for release of hostages ?
14. Under what conditions have most hostages been held, and what
circumstances have led to their release or execution?
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
V. DEFENSIVE MEASURES
1. ESSENTIAL ELEMENTS OF SUPPORT
1. Judicial: Laws must be established which facilitate the effective
functioning of those intelligence and security operations essential to
the conduct of counterterror programs without the creation of a re-
pressive police state which will antagonize the populations concerned.
2. Legislative: Governing bodies must enact and sustain the above
process of law, while creating the financial and other resources needed
to accomplish same.
3. Social: Institutional process should be created to provide op-
portunities for personal social advancement and the peaceful resolution
of individual grievances regardless of sex, religion, creed, language,
ethnic origin, status, or other differences.
4. Economic: Each individual should be afforded the means of
subsistance, and the opportunity to attain basic felt needs, e. g. ,
housing, clothing, and essential material goods.
5. Psychological: Popular attitudes must be created which dis-
credit the terrorist "cause" and the violent methods used to attain
their objective -- and at the same time the population must be con-
vinced that the government should, can, and will prevail without re-
sorting to violence to counter violence.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
'Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
6. Political: Governments should create and/or sponsor a political
system which foste-rs the means for peaceful changes of leadership,
thereby negating the need or justification for violent overthrow of any
regime.
7. Media: Newspaper, radio, and television should be encouraged to
avoid giving terrorists free publicity of the type which would engender
sympathy or support from the general population.
8. Security: Intelligence and internal security services must provide
the population with freedom from fear while identifying, apprehending,
convicting, and imprisoning terrorists via due process of law.
9. Population: Various elements of the populace should be organized
into "block" or village security committees to provide advance alert to
any terrorist activity -- assuming all the above actions have first been
implemented and have motivated the population to become so involved.
10. Leadership: All government and institutional leaders/adminis-
trators should fully support and underwrite the counterterror campaign.
They must provide the management, direction, coordination, and re-
source inputs which assures the development and continuation of an
effective program.
NOTE: It is imperative that advance determination be made regarding
establishment of priorities and division of labor regarding what private
and/or governmental institutions have responsibility for the above actions.
Approved For Release 1999/09/24 t 6FA=RDP85-00671 R000200250001-4
25X1C1Oc
L Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Next 2 Page(s) In Document Exempt
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
I
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
25X1 C10c
4. PERSONAL /PHYSICAL FACTORS
1. Instruct all potential targeted personnel to periodically alter
modes, times and routes of movement.
2. Where possible, they should avoid making advance appointments
or establishing routine schedules.
3. Limit regular travel by personal vehicle unless plans are made
for en route protection, e. g. , armed escort, scout vehicles, car ar-
moring, street patrols, defensive driving, car pool, car swapping,
random routes or other techniques.
4. Fence private residences and utilize dogs, geese, ducks and/or
guinea fowl to provide exterior alarm -- while installing adequate hard-
ware to preclude a hasty forced entry. (If the situation warrants, guards
should also be considered.
5. Armed guards, alarms, fences, control zones, hardware and
other protective procedures should be used to deter all possible types
of hostiles against office facilities.
- 33 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
6. Periodic security investigations should be conducted on all
employees having access to residences, vehicles and/or places of
work of potential targets.
7. Initiate or accelerate intelligence /counterintelligence efforts
focused on terrorist organizations and their sponsors or supporters.
8. Assist security forces in screening all internal and external
travelers for suspect terrorists or persons having similar profile.
9. Surveil the movements of all foreign diplomats or other persons
who might offer communications or other support for terrorists.
10. Photograph and surveil all strangers moving in or out of foreign
embassies sympathetic to the terrorist cause.
11. Establish "block warning systems" whereby local residents
can immediately alert security forces if suspect persons or activity
is observed.
12. Train all potential targets in counter surveillance techniques
and specific security precautions that may be used for personal defense.
13. Qualify selected individuals in the use of small arras and pro-
vide them with appropriate weapons.
14. Retain maps of all potential target areas to include! floor plans
and defense plan for key buildings.
15. Check airline passenger lists and hotel registrations on a daily
basis against known terrorist list by true names and aliases.
- 34 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
16. Stimulate security forces to maintain port of entry surveillance
and tighten pa~-:sport/visa control.
17. When appropriate, utilize technical penetration and/or wire
taps to monitor points of terrorist contact or support.
18. Watch for thefts of automobiles, explosives or weapons and
relate stolen items to plausible terrorist operational concepts.
19. Restrict movement and set curfews as needed.
5. COMMUNICATION RELATED DEFENSE
1. Establish periodic radio or telephone check-in procedures
whereby all personnel advise their location and status to an alert
center having the authority and capability to immediately react to
determine why an officer has failed to make his safety report on time --
and to initiate appropriate action as needed.
2. Equip potential target personnel with beacons or other emergency
devices that can be used to relay immediate alert when an attack occurs.
3. Organize and periodically test various lines of expedient communi-
cation with internal security services who will be called upon to react
in the event of any hostile action against personnel.
4. Provide for alternate means of communications with all higher
headquarters in the event primary facilities are seized or otherwise
rendered inoperative.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
5. Prepare and advise all personnel of word, phrase, gestures
or other codes which may be used by hostages to relay information by
phone, letter or via intermediaries.
6. Develop necessary contingency plans to control, monitor,
block, jam or cut all communications which might be used by any
terrorist group.
7. Pre-position equipment and technicians to facilitate immediate
employment of remote listening devices, direction finding systems and
other specialized communication related items.
8. Pre-determine probable conditions under which media coverage
may be granted in exchange for concessions from terrorists. In any
event, arrange to prevent, guide, limit and/or control media coverage
of any terrorist incident until it has reached a conclusion.
9. Equip potential targets with push-button activated sirens, flares,
floodlights and other systems should be considered for aiding emer-
gency alert and/or as a means to "foil" an attack.
10. Create a command control center with constant 24-hour communi-
cations, and the established capability to coordinate all resources that
might be used to deter, negate or react to a terrorist attack. (Therein,
establish the focal for intelligence collation and analysis to provide
potential advance alert to all hostile actions. )
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
11. Be prepared to record all conversations during any terrorist
incident to facilitate on-going and/or after-action analysis.
12. Maintain an open communication or dialogue with all security
services and/or potential intermediaries.
6. TERRORIST ACTIVITY GAMING
Experience has generally proven that various terrorist groups
eventually evolve stereotyped operational procedures that develop as
a result of: (1) standardized organization, doctrine and training; (2)
limited quantity or quality of available men, money and material; (3)
target area social, economic, political, psychological and security
strengths or weaknesses; (4) communication, transportation, support
and intelligence limitations; (5) climate, weather, demography and
geography; and (6) types of countermeasures which must be overcome.
Systematic analysis of these influencing factors thus facilitates the
development of hostile activity signal patterns which may be used as an
aid in estimating terrorist strength, location, deployment, modus op-
erandi, and planned or intended actions.
A basic problem in developing such patterns is that most intelli-
gence analysts are unwilling or unable to postulate plausible theories
relating to suspected terrorist activity. A natural tendency is to avoid
theoretical hypothesis and relay solely on indicators substantiated by
multiple source intelligence. The lack of a theoretical framework thus
deters sequential logic de
Approved For Release 1vjJ e et
f 20VQ0001-4
37 --
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
plausible operational approaches can be proven or disproven by available
data and known events. To further complicate the analytical process,
it is also recognized that sufficient intelligence is seldom available in
the quantity or quality needed to forecast operational stereotypes. It
is therefore essential that "gaps" be filled by developing and testing
all possible action options expressed as theoretical operational alternatives.
Probable terrorist actions should be advanced by personnel. experienced
in operating with or against the types of militant organizations with
which any analysis is concerned. If such expertise is not available,
it is suggested that indigenous personnel be employed in a role casting
exercise. Ideally, groups of prisoners or defectors can also be used
"game" particular problem situations confronting those terrorist
groups which they previously represented.
Initial operational theory should disregard available intelligence data.
Once all probable action alternatives are postulated, training analysts
may then be used to prove or disprove theoretical concepts. However,
actual events may be more useful in determining the validity of particular
theories. This, of course, assumes a careful analysis of causal factors
contributing to the timing and accomplishment of any particular terrorist
action.
Application and usefulness of any gaming model is thus dependent
upon proper development of a logic sequence predicted on theoretical
concept evaluated against intelli ence data a QWM
Approved For Release 1999/09P24 : CIA-RDI 9v`bUb-rl`W(YO6200250001-4
- 38 -
Approved For-Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
The logic sequence itself is nothing more than the studied formulation
of operational hypothesis which are then supported or challenged by all
available evidence and the process of deductive reasoning. As theoretical
concepts are proven valid, this then facilitates advance prediction of in-
tended terrorist action in situations where "hard" intelligence is lacking.
Those persons attempting to use initial TAG models should not expect
100 percent accuracy. Basic pitfalls include: (1) failure to properly
read indicators; (2) signal patterns can be read out of context; (3)
terrorists may cancel or postpone intended actions; and (4) the absence
of partial reading of indicators may lead to false conclusions.
In addition to the above pitfalls, the system will probably not be
effective unless it is managed by an officer with some previous operational
experience against the general type of opposition force being evaluated.
The officer must also have: (1) courage of conviction; (2) a
willingness to develop and express "gut" feeling; (3) basic tactical
aptitude; (4) an ability to explore theoretical hypothesis; and (5) skill
in developing indicators without substantial multiple source intelligence.
Assuming the above conditions are met, the TAG systems should have
a reasonable chance of success. Further, it is assumed that a carefully
structured TAG system would produce effective results against any type
of terrorist force operating in a rural or urban environment. The basic
difference is that evaluative criteria must be adjusted to fit each unique
- 39 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
set of circumstances. Additionally, the TAG system must be employed
by operatives with relevant tactical experience, basic analytical ability,
and a large measure of common sense.
Prior to developing a TAG model, the following questions must be
carefully answered for each specific terrorist group considered:
a. What ideological, organizational and tactical patterns
are clearly evidenced?
b. How do known doctrinal or training concepts compare
with specific operational approaches?
c. What tactics would be feasible given probable limitations
of men, money and material?
d. How do various subversive elements overcome the social,
economic, political, psychological and security strengths of the
target area?
e. What types of activities are being directed against the
target and how do these relate to known vulnerabilities ?
f. What are the probable limits of available communication,
transporatation, support and intelligence?
g. How do terrorists adapt themselves to limit handicaps
caused by adverse climate, weather, demography or geography?
h. What types of countermeasures must be overcome and
how will these effect operational concepts ?
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
i. What is the best estimate of probable modus operandi
given known limitations ?
In short, the effective development of a workable TAG system is
predicated or minimal all-source intelligence and a studied evaluation
of specific subversive forces in the local, national or international en-
vironment in which they exist. Each scrap of information is then evaluated
to determine the validity of activity patterns which are initially presented
as plausible theories. A logic sequence is then developed to relate theories
to available data, terrorist operational options, and probable events.
7. ITC SYSTEM
The Intelligence-Targeting Collation or ITC System has been effectively
used to provide a visual system for displaying, locating, and dating large
quantities of information on a terrorist or guerrilla force. It is basically
a plot-board technique that makes data easier to interpret when compared
with most map and/or record systems.
In the course of daily plotting, an analyst uses the ITC Plot Board
to closely observe developing patterns of activity. He contemplates the
purpose of any single action as it relates to potential target proximity
and sequential relationship to all other intelligence data. After a brief
period, trends will begin to emerge, thus allowing the analyst to make
accurate projections on terrorist or guerrilla strength, location, de-
ployment, modus operandi and/or intentions.
- 41 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
'Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
The ITC System clearly reveals activity signatures that generally
hold true for all opposition forces operating in,a particular area. This
allows an analyst to assume the role of a master chess player who can
view the board and determine various logical moves of an opponent.
Obviously, these signatures will vary according to environment,
types of conflict and standard methodology of the hostile force. As an
example, urban terrorist signatures might be revealed by the following
types of information input:
a. Police report increasing theft of explosive or incendiary
materials.
b. Informant observes suspect dissidents conducting a
"casual meeting.
c. Intelligence asset discovers a terrorist surveillance
operation against a likely target for violence.
d. A technical penetration operation reveals intentions
for future terrorist actions.
e. Surveillance team follows suspect terrorist during his
recon of local airport.
Although certain specific intelligence reports may clearly indicate
intended hostile actions, the ITC System can provide a much broader and
deeper insight regarding the total threat. It also facilitates the expedient
collation of intelligence that might otherwise be handled on a fragmented
Approved or eiease1~1`99?jWZ e lA--'RD 85?(Y66f1060b 96601-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
counteraction within a limited time frame.
An ITC System may be established for a rural or urban environ-
ment using the following procedural approach:
a. Obtain a roll of lined graph paper with grids on an
approximate map scale of 1:25, 000 for rural areas, or 1:10, 000
for urban areas.
b. Bind the graph paper to chartboards or cardboard squares
roughly 3 x 4 feet in size.
c. Number graph lines on bottom and right side of chartboard
to correspond with Universal Transverse Mercator (UTM) grid
numbers for selected target areas.
d. Match and bind corresponding map sections to reverse
side of each board or on a feasible alternate location.
e. Establish secure work area where analyst may handle
and plot sensitive intelligence data on boards.
f. Develop symbol code to identify plotted sources of
information, e. g. :
SOURCE SYMBOL
(1) Agent
(2) Informant
(3) Penetration
(4) Incident
(5) Photography
Approved For Release 1999/09/24 - CF4=RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
SOURCE
SYMBOL
(6)
Historical
0
(7)
Prisoners
A
(8)
Civilian
r
(9)
Research
(10)
Rumors
g. Establish color codes for various time periods of informa-
tion acquisition, and plot source symbols in appropriate time color.
(NOTE: Color normally should indicate specific 10 - 30 day time
periods. )
h. If sourcing of data and dates must be exacting, develop
sequential number codes for intelligence reports and place same
numeric code beside plotted symbol, e. g. , 3 - 84 for the 84th report
during March of that year. (Use card box to maintain record of codes
and reference to source reporting related to same. )
i. In conjunction with source codes, utilize two-letter
alphabetic vocabulary code to identify and plot critical information
reported, e. g. :
ACTIVITY CODE
Action AC
Agent AG
Assassination AS
Base BA
Approved For Release 1999/09/24. GItA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
ACTIVITY CODE
Bombing BM
Cache CH
Cadre CA
Clandestine Meeting CM
Communication CN
Demonstration DM
Enemy Agent _ EA
Espionage ES
Explosives EX
Facility FA
Guerrilla GU
Headquarters HQ
Homicide HC
Hospital HS
Hostage HT
Incendiary Device ID
Kidnapping KN
Killed KL
Prison PR
Raid RD
Route RU
Signal SG
Approved For Release 1999/09/24: -CfA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
ACTIVITY CODE
Supplies ' SU
Supply Cache Sc
Terrorist TR
Traffic TF
Unknown Activity UA
Vehicle VH
Weapons (Small Arms) WP
(NOTE: Vocabulary code symbols given are exemplary only and may
be reduced or expanded as the situation dictates. These codes may
also be used on combination as appropriate, e. g. , SQ/AB for squad
sized ambush. )
j. Supplementary symbols can be added as needed, e. g. ,
small arrows attached to source code symbols to indicate
direction of movement.
Example ITC Plot Board
Hq
TK/TF
agq
SD
CH
aPA
CO/AB
X
30
29
12 13 14 15 16 17 18
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
46-
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
NOTE: Use fine-line ink pens to record symbols on plot board. Make
symbols and alpha-numeric lettering as small as possible without being
unreadable.
25X1C10c
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
25X1C1Oc
Ilk Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Next 4 Page(s) In Document Exempt
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
25X1 C1 Oc
11. PRE- CRISES POINTERS
1. Plan im-.ginative delaying tactics that can be used to "stall"
negotiations with terrorists and gain time needed to fully explore
various options for attaining hostage release.
2. Design contingency plans to avoid premature and unplanned
direct confrontation with terrorists.
S
Approved For Release 1999/09/24: dIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
3. Develop themes for humanitarian appeals designed to persuade
terrorists that they are losing support for their "cause. IT
4. Game probable negotiated release situations to determine
advance guarantees needed to assure that hostages will be returned
unharmed simultaneous with the granting of any concessions to
terrorists.
5. Determine transportation and security options assuming
terrorists will probably demand aircraft for flight to a safe haven.
6. Establish various contingency reaction plans among and
between all governments that might possibly be concerned with any
anticipated terrorist action.
7. Take necessary steps to be prepared to control terrorist
communications and movement to prevent guidance, direction or
assistance from outside sources.
8. Game all possible future actions with various government
security elements to preclude uncoordinated panic reaction during
any terrorist incident.
VI. INCIDENT PROCEDURES
1. PROTECTIVE REACTION CHART
TERRORIST ACTION EXAMPLE REACTION
1. Assault Escape, evade, initiate
emergency commo and/or
Approved For Release 1999/09/24: CIA-RDP85-006 IIgbdb1'66'( Olc ion
- 54 -
' Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
PROTECTIVE REACTION CHART (continued)
TERRORIST ACTION EXAMPLE REACTION
1. Assault (continued) until security reaction force can
2. Kidnapping
3. Ambush
4. Bombing
break attack.
If possible and advisable, attempt to
escape and evade. Activate emer-
gency or other warning device. If
captured, cooperate with your captors
without divulging sensitive intelligence
or compromising information. In
response to kidnapping, pre-planned
rescue and/or negotiated release to
be attempted.
Move away from fields of fire, seek
protective cover, and if armed,
immediately return fire. Initiate
emergency commo and take evasive
action avoiding exposed or open areas.
Dive for protective cover and lie flat
with feet toward explosion. Activate
bomb squads and fire teams to attempt
to limit further damage. Be alert for
second bomb.
Approved For Release 1999/09/24 : -C1A-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
TERRORIST ACTION
5. Hijacking
7. Sabotage
EXAMPLE REACTION
Do not attempt to overpower hijackers
unless given a very reasonable chance
for success. Avoid attracting attention
to yourself. If kidnapped as a result
of hijacking, follow above para 2.
guidance.
Encirclement or entrapment of
terrorists accompanied by no-bar-
gaining position with demand that
terrorists surrender. Armed surrep-
titious entry team should be prepared
to attempt release of any captives.
Attempt to rapidly identify exact
type and source of sabotage. Use
search and security teams to locate
follow-on sabot age actions. Screen
personnel with access to target and
implement protective security procedures
Immediate reaction must be spontaneous
defensive maneuver to escape particular
type of attack. Then initiate emergency
Approved For Release 1999/09/24-: 1A-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
TERRORIST ACTION EXAMPLE REACTION
8. Assassination (continued) procedures and take evasive action until
security forces arrive. Practice
counter surveillance and good security
to avoid future assassination attempts.
9. Deception and threats Take immediate defensive action until
such time as proven. false, particularly
in situations where deception or threats
are a prelude to actual attack.
25X1 C8a
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
25X1 C8a
Communication
8. What types of communication are believed or known to be avail-
able to terrorists, and how might these be employed for command control?
9. Has action been taken to disrupt terrorist communications, and if
not, why not?
10. What types of communication systems are being used by security
services, and how are these employed?
11. What capability exists for immediate communication between various
services, command elements within government, and/or the responsible
leadership ?
12. What is the status of critical communication, and is there a
possibility that such communications might be delayed or disrupted?
13. In the case of a hostage, is the victim equipped with any clandes-
tine communication system?
Physical
14. Where, how, and under what conditions are terrorists deployed?
15. What routes of entry and/or escape might be used to gain access
to, or exit from the terrorist's present location?
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
- 58 -
' Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Physical (continued)
16. If terrorists use hostages to demand safe passage, what
routes might be used?
17. What physical attributes of the terrorist's present location,
or probable movement routes, would facilitate an ambush and/or other
surprise action?
18. Have detailed maps, building blueprints, utility layouts, and
other physical data been used in answering questions 14 through 17 above?
19. In cases of skyjacking or use of aircraft for escape, what physical
attributes of airports and/or aircraft might be used to negate on-going or
indicated terrorist action?
20. What are the physical advantages and disadvantages of the
terrorist's current location and/or disposition?
Logistics
21. What items of equipment are immediately available to support
operations against terrorists? (Consider weapons, ammo, explosives,
starlight scopes, remote listening devices, cameras, helicopters, ve-
hicles and other appropriate items. )
22. What equipment is now in use by security services ?
23. What equipment is known to be available to terrorists?
24. How might available equipment be employed to negate present
and/or intended terrorist action(s)?
Approved For Release 1999/09/245:9C1A-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Negotiations
25. Have the terrorists been told that their demands will be met
in order to gain time to develop the best possible response?
26. Has every effort been made to conceal the fact that terrorist
demands might not be met?
27. What preparations have been made to meet terrorist demands
in the event no other alternative is possible?
28. If inaction or a no bargaining position is to be taken, have all
the consequences been fully evaluated?
29. How can any bargaining best be conducted to facilitate release
of any hostages while increasing chances that terrorists will be captured?
Expertise
30. What special skills are available from internal security services ?
(Consider bomb disposal squads, snipers, radio direction finding units,
teletap teams, camera crews, technical personnel, communicators,
and others that might be appropriate to the situation. )
31. What special skills are available from the foreign community?
32. What special skills have been evidenced by the terrorists,
and what others might they probably have?
3. IMMEDIATE RESPONSE
25X1 C8a
Approved For Release 1999/09/24.: 4pIA-RDP85-00671 R000200250001-4
25X1C1Oc
L Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Next 1 Page(s) In Document Exempt
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
25X1 C10c
4. HOSTAGE LOCATION
1. If foot movement involved, consider use of trackers and/or
tracking dogs.
2. Screen and question local residents near kidnap scene to attempt
to determine routes of travel.
3. Be prepared to trace telephone calls and/or surveil couriers as
one means to locate general area where hostage is being held.
4. Game possible locations where a specific terrorist; group might
hold the hostage in question assuming you have determined who is res-
ponsible.
5. Post rewards for information leading to the hostages safe recovery.
6. Organize a systematic search procedure using several small
teams composed of local residents to avoid giving terrorists any advance
alert.
7. Utilize intelligence /informant networks to attain leads on terrorist
safehouses or known locations where hostages might be held.
8. Attempt to monitor all telephone calls and other communications
going to or from suspect area(s).
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
9. Consider selective use of remote listening devices to help
pinpoint hostage location. (Hopefully, the victim may already be
equipped with a self-j=ctivated "bug" so that he and/or the terrorists
may reveal their location. )
5. POTENTIAL HOSTAGE NOTES
1. Maintain your dignity and avoid taking any action which might
provoke the terrorists.
2. Start thinking about escape the minute you are captured. Your
best chance to escape will usually occur during the confusion of the
attack.
3. Do not volunteer information about yourself or any other subject.
4. Attempt to convince terrorists that the only hope of accomplishing
their objectives is to assure your safety.
5. Make careful observations regarding the terrorists and the
situation so you can provide vital intelligence to your potential
rescuers -- assuming a means of communication has been or will
be provided.
6. As one possible means of communication, remember "key"
words, phrases, and gestures you will need to signal a friendly inter-
mediary and/or other contact.
7. Assess the determination of the terrorists with regard to the
accomplishment of their mission.
Approved For Release 1999/09/24: PJA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
8. In appropriate situations, sympathize with the terrorist
"cause" and attempt to convince them of your desire to cooperate,
within limits, which would not embarrass you with your government.
9. Avoid any outward expression of fear, panic, or hatred which
might stimulate an automatic hostile reaction from the terrorist.
10. Convince the terrorists that patience will gain them at least
some of the objectives they seek, that delays or negative responses are
inevitable but that, the local government will eventually meet part of
their demands.
11. Attempt to buy time with the above techniques and any others
you can improvise, as you must give your potential rescuers a chance
to fully prepare their response.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
4 - TERRORIST OPERATIONAL EX04F AR CHART
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
MOONS OPF.RANDL INTERNATIONAL PROFILE - LOCAL/' NATIONAL PROFILE
1. Organization Patriotic front, e.g., Palestinian Fedayeen. Communist or
other radical organizations. Fanatic individuals.
2. Sponsorship and External to target area. Communist bloc, patriotic
Leadership front, dissident elements and/or governments sympathetic
to terrorist "cause".
Detailed and specific with emphasis on high impact opera-
tions having maximum propaganda potential and/or the means
to extract concessions, Plans are also designed to directly
or indirectly undermine the strength of a particular target,
e,g., Israel.
4. Target Analysia Vulnerable to classic or improvised terrorist attack. Target
and?llntelligence meeting above planning criteria. Objective with known and
fixed pattern of activity, or one exposed to detailed tar-
getting assessment by informants, intelligence agents, or
other methods.
Subject to element of surprise, Unprepared for hostile
action, Limited physical defense if fixed, or exposed
and undefended if mobile. Known to lack effective intelli-
gence and/or counterintelligence capabilities. Meets
criteria in 3. and 4, above,
Couriers, deaddrops, cutouts, radio, CW, microdot and
diplomatic pouch of governments sympathetic to terrorist
cause. Usually no direct communication between leadership
and operatives. -
7. Coordination Decentralized, compartmented and specifically geared to
particular operations. All coordination begins at planning
stage and is designed to provide direction for independent
support, intelligence and action cells.
8. Funding and
Logistics
Governments sympathetic to terrorist cause provide clandestine
funding and act as a conduit for explosives, weapons, equip-
ment, or other items. t:onsidcrable quantities of logistics
originate from Communist Bloc countries, but Seldom pass
directly to terrorists.
9. Personnel Selection Any fanatic organization may provide sources of personnel.
and Training Actual selection depends on individual motivation, skills,
and potential cover for access and/or action. General
and specific target training generally accomplished within
countries sympathetic to terrorist cause,
International airlines, stolen vehicles, boats, and/or any
other method compatible with cover and movement requirements
related to covert preparation to hit a particular target.
World-wide network of small clandestine cells designed to
provide intelligence and operational support for specific
and isolated acts of terrorism. In some cases AL FATAH
and possibly other terrorist groups also have legal
representation in a number of countries. Individual
terrorists may or iiay not he associated with local
revolutionary and/or subversive organizations,
12, Documentation Stolen and altered, Obtained under false pretense,
Provided by sympathetic governments. Fabricated and/or
obtained in name of unwitting or deceased subject.
13. Basing and Staging Generally non-specific and located as required to facilitate
attack against a specific target, However, governments sym-
pathetic to terrorist cause will usually provide training
bases and temporary staging areas as needed.
14. Attack Methods Hijacking, kidnapping, bombing, assassination, seizure,
threats and deception, Isolated attacks covering
wide geographic area.
15, Operational
Execution
Compartmented, specific, exacting, with attack group(s)
usually isolated from planning or support elements.
Terrorist action may be unwitting individual, composite
groups or dedicated team,
Subversives or extremists. Fanatics and nuts. Armsl
guerrillas and/or revolutionaries. Action arm and/,t
legal apparrat of international terrorists. 't'hird
country groups or individuals.
Internal and/or external to target nation. Subver-
sives or revolutionaries acting alone or in conjunc-
tion with third country governments or movements.
General and non-specific with emphasis on operation:+
designed to force a target regime to undertake
repressive acts which will alienate a government
from their national population.
Exposed to type of attack normally employed by loc.,1
terrorist groups. Discriminate or indiscriminate
with primary objective being to "cow" a target p,.pu-
lation. Intelligence only required for discrimin.ct,?
targets and this usually provided by existing net-
work of agents and/or informants.
Random target of opportunity hit because of im-
mediate undefended exposure to terrorists, or dis-
criminate and specific target relatively undefended
and/or Subject to element of surprise. Selection
primarily based on probable impact as regards objec-
tive to "cow" population or force target regime to
initiate repressive acts.
Local mail, bamboo telegraph, couriers or runners,
deaddrops cutouts, radio, and direct passage between
terrorist cells or from leadership down.
Centralized with limited compartmentation and mini-
mal directional. control. Designed to provide over
all guidance on psychological, political, opera-
tional and other objectives for a subversive move-
ment in which the terrorists may play a major or
minor role.
Robbery, theft, extortion and kidnap operations
used to raise all or portion of needed funds. Log-
istics items are stolen, purchased on black market
or clandestinely provided by external sponsors.
Recruits are primarily drawn from dissident ele-
ments of population who are aggravated with thaa1r
personal situation and the target regime. Train-
ing of cadre usually takes place in Communist or
other revolution exporting third countries. How-
ever, many terrorists receive clandestine train-
ing within target nation.
Primarily by foot, local transportation facili-
ties, and/or stolen vehicles. Sustained rate of
high mobility.
Support cells are usually an integral part of any
terrorist or subversive organization. They may
or may not have independent functional and/or geo-
graphic responalbilities, but are noreslly located
within the immediate area(s) targetted by terro-
rists.
Rural based guerrillas seldom use docv-entation,
whereas urban oriented terrorists or .Subversives
tend to rely on their cover rather than false
documentation. If papers needed, the are
usually bought or obtained under falr.~ pretense.
Safe areas and houses are normally used to pro-
vide fixed facilities where operations may be
planned, prepared, and rehearsed. Sins target
options limited to confined geographlc area,
basing must be relatively static.
Assault, ambush, sabotage, and other methods as
indicated in international profile. kopetitive
attacks usually limited to single national
environment.
Discriminate, indiscriminate, random, or targets
of opportunity usually hit by compartmented ter-
rorist cell. Local terrorist elements cites
engage in their own planning and support activi-
ties. Action may be undertaken by unwitting in-
dividual, composite group or dedicated team, as
in the case of international terrorists.
~i'ia~f,2ra CIA-RDP85-00671 R000200250001-4
added AS appropriate, e.g, timing, cover, and access.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
VIII. BIBLIOGRAPHY
1. Andies, Hellmut Rule of Terror, New York: Holt, Rinehart, and Winston,
1969.
2. Assassination and Political Violence, a Task Force of the National Commis-
sion on the Causes and Prevention of Violence. Washington:
U. S. Government Printing Office, 1969.
3. Arther, Richard O. , and Caputo, William C. , Interrogation. for Investigators.
William C. Copp and Associates, New York, 1959.
4. Bain, Chester A. , Vietnam -- The Roots of Conflict. Englewood Cliffs,
N. J. , 1967.
5. Bennett, Richard L. , The Black and Tans. Boston: Houghton Miffin Co. , 1959.
6. Bern, Major H. von Dach, Total Resistance. Boulder, Colorado: Panther
Publications, 1965.
7. Black, Cyril E., and Thornton, Thomas P., Communism and Revolution.
Princeton: Princeton University Press, 1964.
8. Bocca, Geoffrey, The Secret Army. Englewood Cliffs, N. J.: Prentice-
Hall, Inc., 1968.
9. Brown, Robert M. , The Electronic Invasion. John F. Rider Inc., New
York, 1966.
10. Browne, Malcolm W. , The New Face of War. Indianapolis: The Bobbs -
Merrill Co., 1965.
11. Clark, Michael K., Algeria in Turmoil. New York: Frederick A. Praeger,
1959.
12. Cook, Fred J. , The Secret Rulers. Duell, Sloan, Pearce, New York, 1966.
13. Cross, James Eliot, Conflict in the Shadows. New York: Doubleday & Co. , 1963
14. Crozier, Brian, South-East Asia in Turmoil. Baltimore: :Penguin Books, 1965.
15. Davies, James Chowning, ed. When Men Revolt and Why: A Reader in
Political Violence and Revolution. New York, Free Press,
1971.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
- 67 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
16, Dienstein, William, Technics for the Crime Investigator. Charles C.
Thomas, Publisher, Springfield, Illinois;, 1965.
17. Dubois, Jules, Fidel Castro. Indianapolis: The New Bobbs-Merrill Co., 1959.
18. Eckstein, Harry, ed. Internal War. New York: The Free Press of Glencoe,
1964.
1.9. Egen, Frederick W., Plainclothesman. Arco Publishing Company, Inc. ,
New York, 1963.
U. Endleman, Shalom, ed. Violence in the Streets. Chicago, Quandrangle, 1968.
21. Frank, Gerold. The Deed. New York: Simon and Schuster, Inc. , 1963.
42. Giap, General Vo Nguyen, The South Vietnam People Will Win. Hanoi:
Foreign Languages Publishing House, 1965.
23. Gibson, Walter B., The Fine Art of Spying. Crossett and Dunlap, New
York, 1965.
74. Greene, Lt. Col. T. N., ed. The Guerrilla -- and How to Fight Him. New
York: Frederick A. Praeger, 1962.
?5. Gross, Feliks, The Seizure of Political Power in a Century of Revolutions.
New York: Philosophical Library, 1958.
t,6. Guzman, Campos, Mons. German, Fals Borda, Orlando, and Umana Luna,
Eduardo. La Violencia en Colombia, vols. 1 and 2.
Bogota: Ediciones Tercer Mundo, 1963.
' 7. Harvey, Malachi L. and Cross, John C. , The Informer In Law Enforcement.
Charles C. Thomas, Publisher, Springfield, Illinois, 1962.
28. Hazelet, John C. , Police Report Writing Charles C. Thomas, Publisher,
Springfield, Illinois, 1960.
29. Heisel, James H. , Counter Revolution. Atherton Press, New York, 1966.
30. Hoover, J. Edgar, Masters of Deceit. Cardinal Edition Pocket Books Inc. ,
New York, 1961.
s1. Hosmer, Stephen T. , Viet Cong Repression and Its Implications for the
Future. Lexington: Heath Lexington Books, 1970.
Approved For Release 1999/09/24' a A-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
32. Janowitz, Morris, Social Control of Escalated Riots. Chicago, University
of Chicago Press, 1968.
33. Jenkins, Brian Michael, "The Five Stages of Urban Guerrilla Warfare:
Challenge of the 1970s". RAND, July 1971.
34. Kirk, Paul L. and Bradford, Lowell W. , The Crime Laboratory. Charles C.
Thomas, Publisher, Springfield, Illinois, 1965.
35. Kitson, Frank, Low Intensity Operations. Stackpole, 1971.
36. Koontz, Harold and O'Donnell, Cyril, Principles of Management. McGraw-
Hill Book Company, New York - Toronto - London, --.
37. Leiden, Carl and Schfrnitt, Karl M. , eds. The Politics of Violence. Englewood
Cliffs, N. J.: Prentice Hall, Inc. , 1968.
38. Lenz, Robert R., Explosives and Bomb Disposal Guide. Springfield, Ill. ,
Thomas, 1965.
39. Mallin, Jay, Terror in Viet Nam. Princeton: D. Van Nostrand Co. , 1966.
40. MacCarthy, J. M. , ed. Limerick's Fighting Story. Tralee, Ireland: Anvil
Books, 1966.
41. Marx, Karl, Capital. New York: International Publishers Co. , 1967.
42. Masotti, Louis H. , ed. "Urban Violence and DisorderP1, Issue 11:4 of The
American Behavioral Scientist, March - April, 1968.
43. Mendel, Arthur P. , ed. Essential Works of Marxism. New York: Bantam
Books, 1965.
44. Momboisse, Raymond M., Blueprint of Revolution. Springfield, Ill., Thomas,
1970.
45. Momboisse, Raymond M. , Confrontations, Riots, Urban Warfare. Sacramento,
California, MSM Enterprises, 1969.
46. Moinboisse, Raymond M. "Riot Protection; Check List for Business"
Sacramento, California, MSM Enterprises, 1968.
47. Momboisse, Raymond M , Riots, Revolts, and Insurrestion.s. Springfield,
Ill., Thomas. 1967.
Approved For Release 1999/09/24 6trA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
48. Moss, Robert, The War for the Cities. New York, Coward, McCann &
Goeghegan, Inc., 1972. British edition entitled: Urban
Guerrillas.
49. Moss, Robert, "Urban Guerrillas in Uruguay", Problems of Communism,
September - October 1971, pp. 14 - 23.
50. Moss, Robert, Urban Guerrilla Warfare. With an Appendix: Minimanual
of the Urban Guerrilla by Carlos Marighella. (Adelphi
Papers, No. 79). London, The International Institute for
Strategic Studies, August 1971.
51. Moss, Robert, Urban Guerrillas in Latin America. (Conflict Studies No. 8).
London, Institute for the Study of Conflict, 1970.
52. Mydans, Carl and Shelley, The Violent Peace. New York: Atheneum, 1968.
53. Nunez, Carlos and Jose Diaz. The Tupamaros; Urban Guerrilla Warfare in
Uruguay. New York, Liberated Guardian, 1970.
54. Oppenheimer, Martin and George Lakey. A Manual for Direct Action. Chicago,
Quandrangle, 1965.
55. Oppenheimer, Martin. The Urban Guerrilla. Chicago, Quandrangle, 1969.
56. O'Sullivan, B. Dalton, Crime Detection. The O'Sullivan Publishing House,
Chicago, Illinois, 1928.
57. Penkovskiy, Oleg., The Penkovskiy Papers. Avon Company, New York, 1966.
58. Pfiffner, John M. and Sherwood, Frank P. Administrative Organization.
Prentice-Hall Inc., Englewood Cliffs, New Jersey, 1960.
59. Phillips, R. Hart, Cuba--Island of Paradox. New York: McDowell,
Obolensky, 1959.
60. Pike, Douglas. The Viet-Cong Strategy of Terror. Saigon: United States
Mission, Viet-Nam, 1970.
61. Powell, William, The Anarchist Cookbook. New York, Lyle Stuart, 1971.
62. Powers, Thomas, Diana: The Making of a Terrorist. Boston, 1971.
63. Report of the National Advisory Commission on Civil Disorders. New York:
Bantam Books, 1968.
Approved For Release 1999/09/24 7 IA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
64. Reed, David, 111 Days in Stanleyville. New York: Harper & Row, 1965.
65. Riots, Civil and Criminal Disorders -- Hearings before the Permanent Sub-
committee on Investigations of the Committee on Govern-
ment Operations, United States Senate. Washington: U. S.
Government Printing Office, 1970.
66. Rosenthal, Carl F., Phases of Civil Disturbances: Characteristics and
Problems. Washington, D. C. , Center for Research in
Social Systems, June, 1969.
67. Russell, Charles and Hildner, Robert E. "Urban Insurgency in Latin
America", Air University Review, September - October
1971, pp. 54 - 64.
68. Soderman, Harry and O'Connell, John J., Modern Criminal Investigation.
Funk and Wagnalls Company. New York? 1952.
69. Sondern, Frederic, Jr., Brotherhood of Evil- -The Mafia. Farrar, Straus,
and Cudahy, New York, 1959.
(0. Stahl, O. Glenn, Public Personnel Administration. Harper & Row, New
York, 1962.
/1. Stoffel, Joseph F. , Explosives and Homemade Bombs. Springfield, Ill. ,
Thomas, 1962.
72. Stoner, John K. "Riot Control Doctrine", Military Review. February
1965, pp. 40 - 44.
73. Suchlicki, Jaime, University Students and Revolution in Cuba, 1920 - 1968.
Coral Gables: University of Miami Press, 1969.
'74. Taber, Robert, The War of the Flea. New York: Lyle Stuart, 1965.
75. To Establish Justice, To Insure Domestic Tranquility. Final report of the
National Commission on Causes and Prevention of Violence.
New York: Bantam Books, 1970.
76. Trotsky, Leon, Stalin. New York: Harper & Brothers, 1941.
/7. United States Department of Justice.. Federal Bureau of Investigation,
"Prevention and Control of Mobs and Riots. " Washington, D. C.
FBI, 3 April 1967.
- 71 -
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4
78. United States Mission in Viet Nam. A Study -- Viet Cong Use of Terror.
Saigon, 1967.
79. Whelton, Charles, Skyjack? New York: Tower Publications, 1970.
80. Wilson, O. W., Police Administration. McGraw-Hill Book Co., Inc.
New York, Toronto, London, 1950.
81. Wilson, O. W. , Police Planning. Charles C. Thomas, Publisher,
Springfield, Illinois, 1958.
82. Wilson, O.W., Police Records. Public Administration Service,
Chicago, Illinois, 1951.
83. Wolfe, Bertram D., Three Who Made a Revolution. New York: The
Dial Press, 1961.
Approved For Release 1999/09/24: CIA-RDP85-00671 R000200250001-4