Terrorism and Guerrilla Warfare: Forecasts and Remedies

Terrorism and Guerrilla Warfare: Forecasts and Remedies

Language: English

Pages: 260

ISBN: 0415024404

Format: PDF / Kindle (mobi) / ePub

Terrorism and guerrilla warfare are increasingly common in many countries of the world. This book examines the current state of terrorism and guerrilla warfare and indicates how they may develop in the future. It sets out the different kinds of terrorism and guerrilla warfare and discusses in detail the various types of weapons and techniques favoured by terrorists, assessing for each the latest technological changes and their effects. It looks at intelligence, propaganda and communications. It explores the tactics and strategy of terrorists and guerrillas and surveys the methods currently used and being developed for countering their activities. Throughout the author illustrates the points made with examples from around the world.














request of the authorities outside the country. The criminal or terrorist has only to process the money through one, or better still two, of these banks to ensure that it cannot be traced; $12 million acquired by the Colombian M19 movement in the early 1980s and transferred in this way have never been traced and probably never will be. It can be (and some no doubt has been) transferred piecemeal by these means back to a perfectly respectable bank in Colombia, held by an apparently respectable

cards or tags, transmitting their own signals and processing signals received, need be no more than 4 mm thick, like the smallest pocket calculator. Passive smartcards, with a lot of data in the memory of their microprocessor, are no bigger than a credit card and some cost less than £2. Embarkation and disembarkation Identification and control of passengers embarking and disembarking at airports to prevent, respectively, hijacking and the entry of terrorists is at least as important as detecting

internal between rival communities or by dissidents hoping to overturn their government. They have, however, been exploited by foreign powers: sometimes by neighbours bent on annexation (e.g. by North Vietnam in South Vietnam from 1959 to 1972, culminating in conventional military invasions in 1972 and 1975); and sometimes from far away (e.g. by Cuba on behalf of the USSR in Africa and Central America, and by the USA in Nicaragua 4 FIGHTING UNDER THE NUCLEAR UMBRELLA and Afghanistan).

FARC approval) and ask them to employ local people to the maximum possible extent (e.g. junior management, staff, labour, and sub-contracting locally for construction, transport, etc.). It is made clear that if they do this, they will have no trouble from FARC, and this promise is honoured. If the company declines to accept this proposal, its next callers will be from FARC members, stating themselves to be ‘representatives of the people’ but leaving no doubt, from their guerrilla-style dress and

they lost and, even in the worst year (1950) the ratio was 2.5 to one. The problem is to find them or to predict their movements; this is a matter of good intelligence, and the best intelligence comes from human sources. Though these can be assisted and supplemented by hardware, no surveillance equipment has yet been invented which can equal the human eye and ear, and the human ability to differentiate between true and false. The primary task of the security forces in rural guerrilla conflict is

Download sample