Suicide terror : understanding and confronting the threat /

Based on U.S. and Israeli experiences and detailed interviews with frontline personnel, Suicide Terror enables policymakers, first responders, and students of homeland security to understand and deal with the growing threat of suicide terror. It analyzes recent suicide attacks as well as our current...

Full description

Bibliographic Details
Other Authors: Falk, Ophir, 1968-, Morgenstern, Henry, 1951-
Format: Book
Language:English
Published: Hoboken, N.J. : Wiley, c2009
Hoboken, N.J. : [2009]
Subjects:
LEADER 15774nam a22011894a 4500
001 0331e64c-07d3-495b-93ad-96e7178683fd
005 20240926000000.0
008 080916t20092009njuab b 001 0 eng
010 |a  2008038591 
010 |a ^^2008038591 
020 |a 0470087293 (cloth) 
020 |a 0470087293  |q cloth 
020 |a 9780470087299 (cloth) 
020 |a 9780470087299  |q cloth 
024 8 |a 2985805 
029 1 |a CDX  |b 8840147 
035 |a (DLC) 2008038591 
035 |a (NjP)5955596-princetondb 
035 |a (OCoLC)246887534 
035 |a (OCoLC)ocn246887534 
035 |a (OCoLC)ocn689344496 
035 |a (OCoLC-I)501015145 
035 |a (OCoLC-M)246887534 
035 |a (PU)4522511-penndb-Voyager 
035 |a (Sirsi) cis8840147 
035 |a 2008038591 
035 |a 8912810 
035 |z (NjP)Voyager5955596 
040 |a DLC  |b eng  |c DLC  |d YDX  |d BTCTA  |d YDXCP  |d CDX  |d PMC  |d BWX 
040 |a DLC  |b eng  |c DLC  |d YDX  |d BTCTA  |d YDXCP  |d CDX 
040 |a DLC  |c DLC  |d NNfCLS 
040 |a DLC  |c DLC  |d YDX  |d BTCTA  |d YDXCP  |d CDX  |d PMC  |d UtOrBLW 
040 |a DLC  |c DLC  |d YDX  |d BTCTA  |d YDXCP  |d CDX 
040 |a DLC  |c DLC  |d YDX  |d BTCTA  |d YDXCP 
049 |a PAUU 
050 0 0 |a HV6431  |b .S83 2009 
079 |a ocn246887534 
082 0 0 |a 363.325  |2 22 
090 |a HV6431  |b .S83X 2009 (LC) 
245 0 0 |a Suicide terror :  |b understanding and confronting the threat /  |c edited by Ophir Falk, Henry Morgenstern 
260 |a Hoboken, N.J. :  |b Wiley,  |c c2009 
264 1 |a Hoboken, N.J. :  |b Wiley,  |c [2009] 
264 4 |c ©2009 
300 |a xix, 407 p. :  |b ill., map ;  |c 25 cm 
300 |a xix, 407 p. :  |b ill., maps ;  |c 25 cm 
300 |a xix, 407 pages :  |b illustrations, map ;  |c 25 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
500 |a This WorldCat-derived record is shareable under Open Data Commons ODC-BY, with attribution to OCLC  |5 CTY 
504 |a Includes bibliographical references and index 
505 0 |a Introduction : Overview and historical account of the weapon / Ophir Falk -- The global jihad / Henry Morgenstern -- Israel's confrontation with suicide terrorism / Amir Kulick -- The eagle and the snake : America's experience with suicide bombings / Yaron Schwartz -- The internationalization of suicide terrorism / Ophir Falk and Hadas Kroitoru -- High-risk scenarios and future trends / Ophir Falk -- Methods for confronting suicide terror / William Cooper -- Medical management of suicide terrorism / Shmuel C. Shapira and Leonard A. Cole 
505 0 0 |t Introduction: Overview And Historical Account Of The Weapon /   |r Ophir Falk  |g 1 --  |t Background  |g 1 --  |t Defining the Threat  |g 2 --  |t Definition Criteria  |g 6 --  |t Proposed Definitions  |g 6 --  |t Analyses of Data  |g 23 --  |t Overview  |g 25 --  |t Endnotes  |g 26 --  |g 1  |t The Global Jihad /   |r Henry Morgenstern  |g 31 --  |t Introduction: Where Is the Jihad Today?  |g 31 --  |t Do We Need to Know Why?  |g 32 --  |t The Meaning of Jihad for the Jihadists (Mujahedeen)  |g 35 --  |t The Origins and Evolution of the Global Jihad  |g 35 --  |t Osama bin Laden and Dr. Ayman al-Zawahiri-The Al-Qaeda View of the Jihad  |g 36 --  |t Support for the Global Jihad  |g 41 --  |t Seminal Ideas and Movements that Have Led to the Global Jihad  |g 42 --  |t Tauhid-The Oneness of God  |g 42 --  |t Takfir  |g 43 --  |t Jihad  |g 43 --  |t Jahaliyyah  |g 44 --  |t The Spread of the Jihad Across the World  |g 46 --  |t Case Study of Jihad Development: Egypt  |g 47 --  |t The Jihad in the United States  |g 49 --  |t Toward a Legal Definition of Terrorism in the United States  |g 51 --  |t Financing and Organization  |g 53 --  |t The Jihad: Version 2.0  |g 56 --  |t The Jihad's Virtual 007  |g 57 --  |t Real-Time Threat Example  |g 59 --  |t Understanding Techno-Intelligence Signatures  |g 59 --  |t Internet Activity and Terrorist Finance-Synergy in Cyberspace  |g 60 --  |t The Global Jihad Has a New Home Base-The Internet  |g 61 --  |t Conclusions  |g 61 --  |g Appendix 1  |t Internet Sites and the Global Jihad  |g 62 --  |g Appendix 2  |t Incidents in the United States since 9/11  |g 63 --  |t Endnotes  |g 68 --  |g 2  |t Israel's Confrontation With Suicide Terrorism /   |r Amir Kulick  |g 73 --  |t Background  |g 73 --  |t Arab-Israeli Conflict  |g 73 --  |t The First Circle: The Palestinian Suicide Bomber and His Motives  |g 87 --  |t The Second Circle: The Organizational Wrapping  |g 91 --  |t The Third Circle: The Social Wrapping  |g 96 --  |t How Has Israel Confronted Suicide Terrorism?  |g 105 --  |t The Prevention Circle  |g 107 --  |t The Delay Circle  |g 108 --  |t The Consequence Mitigation Circle  |g 109 --  |t The Intelligence Level  |g 110 --  |t The Intelligence Challenge in the War on Suicide Terrorism  |g 110 --  |t Israeli Intelligence  |g 112 --  |t The Operational Level  |g 118 --  |t The Evolution of Israel's Responses to Suicide Terrorism- A Brief Historic Review  |g 118 --  |t The Israeli Methods of Action  |g 122 --  |t Targeted Killing  |g 123 --  |t Passive Measures  |g 135 --  |t Public Resilience  |g 142 --  |t Deterring Suicide Bombers  |g 142 --  |t Relevant Lessons for American Law Enforcement  |g 144 --  |t Key Lessons Learned-Operative Level  |g 145 --  |t Specific Lessons-Operational-Tactical Level  |g 150 --  |t Summary and Conclusions  |g 155 --  |t Endnotes  |g 157 --  |g 3  |t The Eagle and the Snake: America's Experience With Suicide Bombings /   |r Yaron Schwartz  |g 175 --  |t The Origins of Suicide Attacks Against the United States  |g 175 --  |t Suicide Bombings in Iraq  |g 179 --  |t The Insurgency: Who, Why, When, and How  |g 182 --  |t The Role of Suicide Bombings  |g 193 --  |t Assessing the Surge  |g 199 --  |t The Impact of Iraq and Its Lessons  |g 208 --  |t Future Threats and Suicide Terrorism  |g 213 --  |t Endnotes  |g 214 --  |t Bibliography  |g 221 --  |g 4  |t The Internationalization Of Suicide Terrorism /   |r Ophir Falk, Hadas Kroitoru  |g 225 --  |t Lebanon  |g 228 --  |t Hezbollah  |g 228 --  |t Hezbollah's International Reach  |g 231 --  |t The Iran-Hezbollah-al-Qaeda Connection  |g 233 --  |t Hezbollah's Direct Threat to U.S. Homeland  |g 234 --  |t Sri Lanka  |g 235 --  |t A History of Conflict  |g 235 --  |t The Tamil Tigers and Suicide Terrorism  |g 236 --  |t Consequences and Counterterrorism Efforts  |g 238 --  |t Israel  |g 241 --  |t Historical Background  |g 242 --  |t A Decade and a Half of Suicide Terrorism  |g 243 --  |t Misconceptions  |g 244 --  |t From Deterrence to Prevention and Preemption  |g 244 --  |t Relevance to U.S. Homeland Security  |g 247 --  |t Operational Lessons  |g 247 --  |t India  |g 248 --  |t History of Conflict  |g 248 --  |t India's Experience with Suicide Terrorism  |g 250 --  |t Turkey  |g 253 --  |t Civil War and Civil Strife: The PKK's Answer to the "Kurdish Question"  |g 253 --  |t Turkey's Experience with Suicide Terror  |g 254 --  |t Islamic Groups Step Up to the Plate  |g 258 --  |t Turkish Counterterrorism Tactics  |g 259 --  |t Lessons from Turkey's Experience with Suicide Terrorism  |g 261 --  |t Al-Qaeda  |g 262 --  |t Establishing the "Base"  |g 263 --  |t Al-Qaeda Organization: Affiliates and Networks  |g 264 --  |t Al-Qaeda Attacks  |g 266 --  |t Al-Qaeda in Europe  |g 269 --  |t Al-Qaeda in Southeast Asia  |g 273 --  |t Consequences and Counterterrorism  |g 274 --  |t The Future of al-Qaeda  |g 277 --  |t Chechnya  |g 278 --  |t History of Conflict  |g 278 --  |t Chechen Separatists and Suicide Terrorism  |g 279 --  |t Consequences and Counterterrorism  |g 288 --  |t Summary and Conclusions-The Internationalization of Suicide Terrorism  |g 289 --  |t Endnotes  |g 290 --  |g 5  |t High-Risk Scenarios And Future Trends /   |r Ophir Falk  |g 301 --  |t Scenario No. 1: Cyber and Physical Attack on Energy Distribution Systems  |g 302 --  |t Description of Scenario  |g 302 --  |t Vulnerability  |g 305 --  |t Consequence  |g 305 --  |t Means of Mitigation  |g 306 --  |t Scenario No. 2: Attacks on and by Civilian Aircraft-Back to the Future  |g 307 --  |t Description of Scenario  |g 307 --  |t Vulnerability  |g 309 --  |t Consequence  |g 310 --  |t Means of Mitigation  |g 310 --  |t Prosperity or Security in the Maritime Trade  |g 311 --  |t Scenario No. 3: Dirty Bomb in Maritime Container  |g 312 --  |t Description of Scenario  |g 312 --  |t Vulnerability  |g 314 --  |t Consequence  |g 316 --  |t Means of Mitigation  |g 317 --  |t Scenario No. 4: Blocking World Oil Transit by Sea Ofer Israeli  |g 318 --  |t Description of Scenario  |g 318 --  |t Vulnerability  |g 320 --  |t Consequence  |g 321 --  |t Means of Mitigation  |g 324 --  |t Scenario No. 5: PC Doomsday  |g 325 --  |t Description of Scenario  |g 325 --  |t Vulnerability  |g 326 --  |t Consequence  |g 326 --  |t Means of Mitigation  |g 327 --  |t Scenario No. 6: Suicide Terrorist Attack on Subway Followed by a Suicide Terrorist Attack on Premises of a Level I Trauma Center Shmuel C. Shapira  |g 327 --  |t Description of Scenario  |g 328 --  |t Vulnerability  |g 328 --  |t Consequence  |g 329 --  |t Means of Mitigation  |g 329 --  |t Future Trends  |g 331 --  |t Endnotes  |g 333 --  |g 6  |t Methods For Confronting Suicide Terror /   |r William Cooper  |g 341 --  |t Detection of Key Terrorist Activities  |g 346 --  |t The Suicide Bomber  |g 350 --  |t Detection of Terrorist Recruitment in the Community  |g 350 --  |t Identifying Safe Houses and Planning Centers  |g 353 --  |t Terrorist means of Communication  |g 355 --  |t Identifying Terrorist Transportation  |g 363 --  |t Identifying Terrorist Financing  |g 366 --  |t Identifying Paper Falsification  |g 366 --  |t Land Attack Characteristics  |g 367 --  |t Sea Attack Characteristics  |g 368 --  |t Air Attack Characteristics  |g 369 --  |t The Public and the Battle Against Terrorism  |g 370 --  |t Legislation in the Battle Against Terrorism  |g 371 --  |t Negotiation Tactics to Use in Incidents of Terror  |g 372 --  |t Rules of Engagement  |g 373 --  |t Response to Suicide/Homicide Bombers  |g 374 --  |t Patrol Level Response  |g 375 --  |t Operational Philosophy  |g 377 --  |t Endnotes  |g 378 --  |g 7  |t Medical Management of Suicide Terrorism /   |r Shmuel C. Shapira, Leonard A. Cole  |g 381 --  |t Explosives  |g 382 --  |t Effects and Management of Suicide Terrorism  |g 384 --  |t Preparing for Suicide Terror Mass Casualty Incidents  |g 387 --  |t Mass Casualty Incident Management  |g 389 --  |t Pre-Hospital Management, Short Term  |g 389 --  |t Pre-Hospital Management, Prolonged Term  |g 390 --  |t Hospital Management of Suicide Terrorism  |g 392 --  |t Conclusion  |g 393 --  |t Endnotes  |g 393 
520 |a Based on U.S. and Israeli experiences and detailed interviews with frontline personnel, Suicide Terror enables policymakers, first responders, and students of homeland security to understand and deal with the growing threat of suicide terror. It analyzes recent suicide attacks as well as our current vulnerabilities and high-risk scenarios for future attacks. Following the expert authors' advice, readers learn possible measures to prevent an attack. Moreover, they learn how to prepare for and implement an effective and quick response to minimize casualties and losses in the event of an attack 
520 1 |a "Based on U.S. and Israeli experiences and detailed interviews with frontline personnel, Suicide Terror enables policymakers, first responders, and students of homeland security to understand and deal with the growing threat of suicide terror. It analyzes recent suicide attacks as well as our current vulnerabilities and high-risk scenarios for future attacks. Following the expert authors' advice, readers learn possible measures to prevent an attack. Moreover, they learn how to prepare for and implement an effective and quick response to minimize casualties and losses in the event of an attack."--BOOK JACKET 
520 8 |a America's experience with suicide bombings 
520 8 |a Following an overview and historical review of suicide terror, the book covers: 
520 8 |a Global jihad 
520 8 |a High-risk scenarios and future trends 
520 8 |a Internationalization of suicide terrorism 
520 8 |a Israel's confrontation with suicide terrorism 
520 8 |a Medical management of suicide terrorism 
520 8 |a Methods for confronting suicide terror 
520 8 |a This book is a definitive study of suicide terror, synthesizing the experience of well-known Israeli and American experts who have dealt with it firsthand. Anyone responsible for understanding, preventing, and confronting this devastating threat should read this book and consider its recommendations with all seriousness 
520 8 |a Using eyewitness accounts, the text re-creates the look and feel of actual terrorism incidents. Detailed case studies help readers get into the minds of suicide terrorists in order to understand how to best prevent and confront these very dangerous threats 
650 0 |a Suicide bombers 
650 0 |a Suicide bombings 
650 0 |a Terrorism  |x Prevention 
650 0 |a Terrorism  |x Psychological aspects 
650 0 |a Terrorists  |x Suicidal behavior 
650 7 |a Suicide bombers  |2 fast 
650 7 |a Suicide bombings  |2 fast 
650 7 |a Terrorism  |x Prevention  |2 fast 
650 7 |a Terrorism  |x Psychological aspects  |2 fast 
650 7 |a Terrorists  |2 fast 
650 7 |a Terrorists  |x Suicidal behavior  |2 fast 
655 0 |a Electronic books 
700 1 |a Falk, Ophir,  |d 1968-  |0 http://viaf.org/viaf/21619406 
700 1 |a Falk, Ophir,  |d 1968-  |1 http://viaf.org/viaf/21619406 
700 1 |a Falk, Ophir,  |d 1968- 
700 1 |a Morgenstern, Henry,  |d 1951-  |0 http://viaf.org/viaf/36394403 
700 1 |a Morgenstern, Henry,  |d 1951-  |1 http://viaf.org/viaf/36394403 
700 1 |a Morgenstern, Henry,  |d 1951- 
776 0 8 |i Online version:  |t Suicide terror  |d Hoboken, N.J. : Wiley, c2009  |w (OCoLC)620371323 
776 0 8 |i Online version:  |t Suicide terror  |d Hoboken, N.J. : Wiley, c2009  |w (OCoLC)631988087 
776 0 8 |i Online version:  |t Suicide terror  |d Hoboken, N.J. : Wiley, ©2009  |w (OCoLC)620371323 
776 0 8 |i Online version:  |t Suicide terror  |d Hoboken, N.J. : Wiley, ©2009  |w (OCoLC)631988087 
999 1 0 |i 0331e64c-07d3-495b-93ad-96e7178683fd  |l a8298855  |s US-CST  |m suicide_terrorunderstanding_and_confronting_the_threat_____________________2009_______wileya___________________________________________________________________________p 
999 1 0 |i 0331e64c-07d3-495b-93ad-96e7178683fd  |l 8912810  |s US-CTY  |m suicide_terrorunderstanding_and_confronting_the_threat_____________________2009_______wileya___________________________________________________________________________p 
999 1 0 |i 0331e64c-07d3-495b-93ad-96e7178683fd  |l 7839375  |s US-ICU  |m suicide_terrorunderstanding_and_confronting_the_threat_____________________2009_______wileya___________________________________________________________________________p 
999 1 0 |i 0331e64c-07d3-495b-93ad-96e7178683fd  |l 990120347710203941  |s US-MH  |m suicide_terrorunderstanding_and_confronting_the_threat_____________________2009_______wileya___________________________________________________________________________p 
999 1 0 |i 0331e64c-07d3-495b-93ad-96e7178683fd  |l 9959555963506421  |s US-NJP  |m suicide_terrorunderstanding_and_confronting_the_threat_____________________2009_______wileya___________________________________________________________________________p 
999 1 0 |i 0331e64c-07d3-495b-93ad-96e7178683fd  |l 9945225113503681  |s US-PU  |m suicide_terrorunderstanding_and_confronting_the_threat_____________________2009_______wileya___________________________________________________________________________p 
999 1 1 |l a8298855  |s ISIL:US-CST  |t BKS  |p UNLOANABLE 
999 1 1 |l a8298855  |s ISIL:US-CST  |t BKS  |b e6b56ee3-4cf3-53bd-b23b-6171ac02c935  |y e6b56ee3-4cf3-53bd-b23b-6171ac02c935  |p UNLOANABLE 
999 1 1 |l a8298855  |s ISIL:US-CST  |t BKS  |a SUL-ELECTRONIC  |p UNLOANABLE 
999 1 1 |l a8298855  |s ISIL:US-CST  |t BKS  |a GRE-STACKS  |b 36105124133674  |c HV6431 .S83 2009  |d Library of Congress classification  |k 1  |x book  |y 36105124133674  |p UNLOANABLE 
999 1 1 |l 8912810  |s ISIL:US-CTY  |t BKS  |a lsfssl  |b 39002094168573  |c HV6431 .S83X 2009 (LC)  |g 0  |v 1 piece  |x lsfc  |y 8265231  |p LOANABLE 
999 1 1 |l 7839375  |s ISIL:US-ICU  |t BKS  |a JRL-Gen  |b 091952486  |c HV6431 .S83 2009  |d Library of Congress classification  |y 8662982  |p LOANABLE 
999 1 1 |l 990120347710203941  |s ISIL:US-MH  |t BKS  |a WID WIDLC  |b 32044111125803  |c HV6431 .S83 2009  |d 0  |x 01 BOOK  |y 232130591260003941  |p LOANABLE 
999 1 1 |l 9959555963506421  |s ISIL:US-NJP  |t BKS  |a firestone stacks  |b 32101076956604  |c HV6431 .S83 2009  |d 0  |x Gen  |y 23751907020006421  |p LOANABLE 
999 1 1 |l 9945225113503681  |s ISIL:US-PU  |t BKS  |a VanPeltLib vanp  |b 31198051180219  |c HV6431 .S83 2009  |d 0  |x BOOK  |y 23398218930003681  |p LOANABLE