U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Clandestine Tactics and Technology - A Technical and Background Intelligence Data Service, - Volume 4

NCJ Number
77152
Date Published
1978
Length
468 pages
Annotation
Designed to provide police executives and their operating personnel with technical intelligence data about terrorists' illegal tactics and equipment, this volume evaluates countermeasure procedures and hardware.
Abstract
Update reports discuss nuclear power foes and actions taken against operating nuclear plants, the U.S. Labor Party, crisis management, terrorist and revolutionary organizations around the world, the Weathermen, and the New World Liberation Front (NWLF). Also examined are such topics as the potential for increased terrorism in the United States, the threat from the right, the Ku Klux Klan, neo-Nazi organizations in the United States, antiterrorism and West German police operations, the West German antiterrorist computer network, prison control measures, the effect of terrorism on the media, the public demand to know, and terrorism in Italy during 1978. Technical notes analyze the clandestine use of chemical or biological weapons and the objectives and operations of antiterrorism, and examine the diffusion of transnational terrorism. In addition, tactic and countermeasure briefs review the prevention of aerial piracy in the United States from 1972-78, the anatomy of nonterritorial terrorism, and target analysis, including the techniques and practices of terrorist groups. A section on group and area studies includes obervations on Palestinian terror and tactics, techniques of transnational terrorism, and an investigation of terrorist activities. The volume also contains a bomb summary for 1976 and a report on how governments should face terrorist threats, including an analysis of threat assessment and risk taking, a description of hardening the target, and a discussion of incident management and damage limitation. Footnotes, diagrams, tables, and appendixes are provided. A selective bibliography presents approximately 170 publications from the 1970's. For separate sections of this report, see NCJ 76481-90. For other volumes in this series, see NCJ 77150-51 and 77153.