U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Terrorist Tactics and Security Practices

NCJ Number
153346
Editor(s)
A Corsun
Date Published
1994
Length
142 pages
Annotation
This report identifies and assesses significant terrorist security concerns, including terrorist tactics, techniques, and innovations, and suggests possible countermeasures useful to potential victims.
Abstract
The first article analyzes the assassination of Germany's "senior industrialist," Alfred Herrhausen, by Germany's Red Army Faction (RAF). Although Herrhausen traveled in an armored car with a lead and follow car, the article describes how the RAF, through meticulous planning, was able to defeat a $200,000 armored Mercedes using a simple photoelectric cell device. Turkey's Dev-Sol (Revolutionary Left) is currently the most active and violent European Fighting Communist Organization (FCO) After briefly looking at the historical roots of left-wing terrorism in Turkey, an article focuses on the assassination of two Americans and the attempted assassination of a third by Dev- Sol. Also featured is a 21-page security program developed as a countermeasure during the resurgence of anti-American terrorist activity in Turkey. The third article considers the reasons for the increase in Middle East terrorist activity in Eastern Europe and also summarizes the December 1991 attack on Soviet Jews at Ferihegy Airport in Budapest, Hungary. The scope of the fourth article addresses the proliferation of manportable, surface-to- air missiles and the potential threat they pose to civil aircraft. Using case studies of the civil unrest in Liberia, Zaire, and Somalia, the last article describes the circumstances and mechanisms for implementing the drawdown and evacuation of Americans. Security guidelines are designed to assist the reader in preparing a customized security package based on local requirements, threat levels, and resources.