Beruflich Dokumente
Kultur Dokumente
Table of Contents
Table of Contents .......................................................................................................... 1
MODULE 2 UNDERSTANDING TERRORIST BOMBING INCIDENTS –
Administration Page ..................................................................................................... 2
Duration ....................................................................................................................... 2
Scope Statement ......................................................................................................... 2
Terminal Learning Objectives (TLO) ............................................................................ 2
Enabling Learning Objectives (ELO)............................................................................ 2
Resources ................................................................................................................... 2
Instructor to Participant Ratio ...................................................................................... 3
Reference List ............................................................................................................. 3
Assessment Strategy ................................................................................................... 3
ICON MAP ...................................................................................................................... 4
MODULE INTRODUCTION ............................................................................................ 5
BASIC DEFINITIONS ................................................................................................... 10
COMMON CHARACTERISTICS OF TERRORISTS .................................................... 16
TERRORIST ORGANIZATIONS .................................................................................. 23
TERRORISM AND ENERGETIC MATERIALS IN HISTORY ....................................... 41
TERRORIST TARGETS, PLANNING, AND EXECUTION ........................................... 46
PRE-ATTACK INDICATORS AND COUNTERMEASURES ........................................ 67
SUMMARY .................................................................................................................... 72
• Flash drive containing Participant Guide, Video Library, Case Study Library, and
Additional Resources (one per participant).
• Digital projectors, flip-chart, and whiteboard.
• Slides and video clips.
Instructor to Participant Ratio
Conference (Classroom–2:50; Range–3:50).
Reference List
See Appendices.
Assessment Strategy
• Observation of the level and quality of classroom participation.
• Participation and quality of performance on the course performance exercise.
• Administration of the post-test to assess mastery of module objectives (TLO and
ELOs).
ICON MAP
Question: Used when there is an opportunity to ask a question or start a class
discussion.
First Responder Safety: Used to highlight information that relates directly to the
personal safety of first responders.
MODULE INTRODUCTION
BASIC DEFINITIONS
ELO 2-1
Define the terms energetic material, terrorism, and weapon of
mass destruction (WMD).
1
28 Code of Federal Regulations (C.F.R.) § 0.85 (2010).
Such incidents include the October 12, 2000 attack on the USS
Cole. Seventeen American sailors were killed and 39 were injured
when the USS Cole, which was anchored for refueling in the
Yemeni port of Aden, was attacked by a small boat carrying
explosives. Al-Qaeda claimed responsibility for the attack. The
United States was not in a state of war at that time.
2
START Consortium, (2012). “Integrated United States Security Database (IUSSD): Data on the Terrorist Attacks in
the United States Homeland, 1970 to 2011. Final Report to Resilient Systems Division, DHS Science and
Technology Directorate.” http://www.start.umd.edu/sites/default/files/files/publications
/START_IUSSDDataTerroristAttacksUS_1970-2011.pdf
ELO 2-2
Identify common characteristics of terrorists
This slide shows photos of the known terrorists who hijacked four
airplanes and created fuel-air explosions by crashing them into the
World Trade Center, the Pentagon, and a field in Shanksville, PA,
on September 11, 2001.
3
Southern Povery Law Center (2015).“Age of the Wolf: A Study of the Rise of Lone Wolf and Leaderless Resistance
Terrorism,” p. 12.
4
S. Taylor (2014, Sept. .9). The Psycology of Terrorism; What Makes Young Men Prepare to Kill for a Cause?
[Blog}. Retrieved from https://www.psychologytoday.com/blog/out-the-darkness/201512/the-psychological-
roots-terrorism.
5
Baylouni, A. M., (2004). Emotion, Poverty, or Politics? Misconceptions About radical Islamist Movements.
Connections III, Vol. 4. pp. 41-47 Retrieved from
http://faculty.nps.edu/ambaylou/baylouny%20emotions%20poverty%20politics.PDF
6
Hearing Before the Sente Select Committee on Intelligence. (2015, Feb 12) Current Terrorist Threat to the United
States. Retrieved from: http://www.nctc.gov/docs/Current_Terrorist_Threat_to_the_United_States.pdf
7 Horgan, J. (2009). Walking Away from Terrorism Routledge, 23, 186. doi:10.1080/09546553.2011.533083.
8
DeAngelis, T. (2009). Understanding Terrorism. American Psychological Association, 40. 60. Retrieved from
http://www.apa.org/monitor/2009/11/terrorism.aspx.
9
Advanced Concepts Group: Sandia National Laboratories, (2002). Terrorist Organizations and Criminal Street
Gangs; An argument for an Analogy. Retrieved from
http://www.au.af.mil/au/awc/awcgate/sandia/terrorism_gang_analogy.pdf.
10
Written Testimony of Charles E. Allen before the U. S. Senate Committee of Homeland Security and
Governmental Affairs. (2007, March 14). Threat of Islamic Radicalization to the Homeland. Pg 4 Retrieved
from http://www.investigativeproject.org/documents/testimony/270.pdf.
Stages of Radicalization12
Action - The fourth and final stage is when the individual commits
an act of terrorism, which can include any of the steps of facilitation,
11 U.S. National Counterterrorism Center. (2009). Radicalization: Myth and Reality. Counterterrorism Calendar, 2009,
132. Retrieved from http://library.uoregon.edu/ec/e-asia/reada/ct_calendar_2009.pdf.
12
Dyer, C., McCoy, R. E., Rodriguez, J., & Van Duyn, D. N. (2007). Countering Violent Islamic Extremism, A
Community Responsibility. FBI Law Enforcement Bulletin, 76 (12). Retrieved from https://leb.fbi.gov/2007-
pdfs/leb-december-2007
TERRORIST ORGANIZATIONS
ELO 2-3
Identify types of international and domestic terrorist
organizations and their goals.
13
18 U.S.C. § 2331(5).
14
18 U.S.C. § 2331(1).
Anti-Government
• Sovereign Citizens
• Militias
Religious-oriented Extremists
• Phineas Priesthood
• Army of God
Racist/Hate Groups
• Ku Klux Klan (KKK)
• Neo-Nazis
• Skinheads
• National Alliance
15
The Federal Bureau of Investigation. (2010). Domestic Terrorism, The Sovereign Citizens Movement. Retrieved
from https://archives.fbi.gov/archives/news/stories/2010/april/sovereigncitizens_041310/domestic-terrorism-
the-sovereign-citizen-movement.
16
Ryan, Jason, & Esposito, Richard. (2011, January 18). FBI: Pipe Bomb Found on MLK Parade Route. Retrieved
from http://abcnews.go.com.
17
Richey, Warren. (2011, December 20). Failed Martin Luther King Day parade bomber gets 32-year sentence.
Retrieved from http://www.csmonitor.com.
The report states that “There’s no question that the jihadist threat is
a tremendous one. Close to 3,000 Americans were murdered by al-
Qaeda on September 11, 2001, far more than the number killed by
any other form of terrorism. And officials are now warning that the
Islamic State, known for its barbaric beheadings and the burning
alive of a Jordanian pilot, may be plotting to kidnap Americans
abroad in a slew of other countries. But that is not the only terrorist
threat facing Americans today. A large number of independent
studies have agreed that since the 9/11 mass murder, more people
have been killed in America by non-Islamic domestic terrorists than
jihadists. That fact is also apparent in the new Southern Poverty
18
Cuniff, M.M. (2012, January 11). Police step up march presence. The Spokesman—Review. Retrieved from
http://www.spokesman.com/stories/2012/jan/11/police-step-up-march-presence/
19
Carter, D., Chermak, S., Carter, J. & Drew, J. (2014). Understanding Law Enforcement Intelligence Processes:
Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of
Homeland Security, National Consortium for the Study of Terrorism and Responses to Terrorism Retrieved
from https://www.start.umd.edu/pubs/START_UnderstandingLawEnforcementIntelligenceProcesses
July2014.pdf
Law Center (SPLC) study of the 2009-2015 period. The report can
be viewed or downloaded at
https://www.splcenter.org/sites/default/files/d6_legacy_files/downlo
ads/publication/lone_wolf_special_report_0.pdf.”20
20
Rivinius, J. (2014). Sovereign Citizen Movement Perceived as Top Terrorist Threat. National Consortium for the
Study of Terrorism and Responses to Terrorism, Retrieved from
http://www.start.umd.edu/news/sovereign-citizen-movement-perceived-top-terrorist-threat
This slide contains a logo for the Armed Forces for National
Liberation of Puerto Rico (FALN), a formerly active left-wing
terrorism group.
Animal Rights
• Animal Liberation Front (ALF)
Environmental Issues
• Earth Liberation Front (ELF)
Abortion Issues
Anti-Abortion extremists
21
Dyson, W. E. (2016). Terrorism, An Investigator’s Handbook (4th ed.). Content Technologies, Inc.
22
Department of Homeland Security. (2016) Countering Violent Extremism. Retrieved from
http://www.dhs.gov/topic/countering-violent-extremism.
23
Southern Povery Law Center (2015).“Age of the Wolf: A Study of the Rise of Lone Wolf and Leaderless
Resistance Terrorism,” p. 4.
24
18 U.S. Code § 2331 (1).
The 1993 and 2001 World Trade Center attacks are examples of
international terrorism. These attacks clearly transcended national
boundaries. Terrorists from foreign countries, supported by foreign
sources, crossed an international boundary to attack targets in the
U.S.
25
18 U.S.C. § 2331(1).
The Islamic State of Iraq and Syria (ISIS, also known as the Islamic
State of Iraq and the Levant (ISIL) as well as Daesh) is another
formal terrorist group that has rapidly gained power in the Middle
East and parts of Africa since proclaiming itself to be a worldwide
caliphate on June 29, 2014. Islamic State followers have claimed
responsibility for a number of terrorist activities worldwide, including
inside the United States. Major Islamic State-sponsored terror
events include:
ELO 2-4
Identify reasons why terrorists often select energetic materials
for use in their attacks.
26
START Consortium, (2016). “Annex of Statistical Information: Country Reports on Terrorism 2015.” Retrieved from
http://www.state.gov/documents/organization/257738.pdf.
27
Johnston, Wm. Robert. (2016, February 16). Terrorist attacks and related incidents in the United States.
Retrieved from http://www.johnstonsarchive.net/terrorism/wrjp255a.html.
The map on this slide depicts IED attacks in the United States from
2010 through 2016, demonstrating that terrorist bombings have
touched communities throughout the country. This graphic was
developed for the DHS website TRIPwire (Technical Resource for
Incident Prevention).
ELO 2-5
Identify characteristics of potential targets for a terrorist
attack.
ELO 2-6
Order the steps in terrorist planning and execution for a
bombing attack.
The observable actions that occur within each of these phases may
be “pre-attack indicators.” They include the following:
1. Obtaining funding
2. Acquiring information
3. Training personnel
4. Moving personnel to targeted country or area
28
(2015, February 18). Investigations uncover Randolph County man’s alleged plot to attack federal courthouse.
Retrieved from http://wvmetronews.com.
ELO 2-7
Identify sources where terrorists acquire information and
explosive and incendiary material, devices, and device
components.
29
United States Bomb Data Center. (2014). United States Bomb Data Center (USBDC) Explosives Incident Report
(EIR). Retrieved from https://www.atf.gov/explosives/docs/report/2014-usbdc-explosive-incident-
report/download.
Over the past few years, federal, state, and local governments have
implemented a variety of controls to reduce the availability of
explosives to potential terrorists and other criminals. The
government’s role is vital in regulating and educating the explosives
industry and in protecting the public from inadequate storage and
security. The government has moved to establish mechanisms to
identify the origin of explosives used in terrorist attacks. These
regulations will reduce the availability of explosive materials on the
open market, but will have limited impact on black market sources
and potential theft of these materials. The ATF Federal Explosives
Law and Regulations 2012 is provided as a PDF on the participant
thumb drive. First responders can also go to the ATF’s website at
https://www.atf.gov/explosives/tools-services-law-enforcement for
more information on explosive laws and regulations.
ELO 2-8
Identify common terrorist methods for packaging and delivery
of explosive and incendiary devices.
30
Thomas, P. and Wilson, Toni. (2012, June 11). Police Seek Phoenix-Area Flashlight Bomber. ABC News.
Retrieved from http://abcnews.go.com/blogs/headlines/2012/06/police-seek-phoenix-area-flashlight-
bomber/.
ELO 2-9
Identify types of WMD materials (including chemical,
biological, and radiological) that can be disseminated using
conventional explosives.
chemical weapons during World War I.) However, intense heat from
a conventional explosion can change the properties of a chemical
substance in a manner that reduces its potential lethality.
31 Silverstein, K. (1998). The Radioactive Boy Scout: When a teenager attempts to build a breeder reactor. Harpers
Magazine. Retrieved from http://harpers.org/archive/1998/11/the-radioactive-boy-scout/.
32 Associated Press. (2007, October 4). ‘Radioactive Boy Scout’ Sentenced to 90 Days for Stealing Smoke Detectors.
ELO 2-10
Identify common indicators of terrorist preoperational
surveillance and basic first responder countermeasures.
Dry Runs. Terrorists have proven in the past that they will
conduct dry runs to determine if an attack will be successful.
Several of the July 7, 2005 London suicide bombers conducted
a dry run less than two weeks before the actual attacks.34
34 (2005, September 20). Bombers staged dry run before London attacks. Retrieved from
http://www.telegraph.co.uk/news/1498782/Bombers-staged-dry-run-before-London-attacks.html.
SUMMARY