Terrorism and organized hate crime : intelligence gathering, analysis, and investigations /

Saved in:
Bibliographic Details
Author / Creator:Ronczkowski, Michael.
Imprint:Boca Raton : CRC Press, c2004.
Description:256 p. : ill. ; 25 cm.
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/5017094
Hidden Bibliographic Details
ISBN:0849320127 (alk. paper)
Notes:Includes bibliographical references (p. 221-226) and index.
Table of Contents:
  • Chapter 1. A need for understanding and analysis
  • The mission
  • Intelligence analysis units
  • Defining analytical positions and roles
  • What is homeland security and terrorism analysis?
  • Understanding what needs to be analyzed
  • Keys to analyzing
  • Deterrence, prevention, arrest, and target hardening
  • Deterrence
  • Prevention
  • Arrest
  • Target hardening
  • Chapter concepts
  • References
  • Chapter 2. Understanding and defining terrorism
  • Defining terrorism
  • Defining terrorist activity
  • Forms of terrorism
  • Political terrorism
  • Ecological terrorism
  • Agricultural terrorism
  • Narco terrorism
  • Biological terrorism
  • Cyber terrorism
  • History and roots of modern terrorism
  • The evolution of domestic terrorism
  • Known domestic terrorist groups
  • Domestic terrorism
  • Organized hate groups and crimes
  • Role of organized hate groups in domestic terrorism
  • What is a terrorist?
  • Terrorist vs. street criminal
  • Differences between typical street criminals and terrorists
  • September 11, 2001--subjects, criminals, or terrorists?
  • Terrorism structure and management
  • Chapter concepts
  • References
  • Chapter 3. Homeland security and analysis
  • Homeland security defined
  • Homeland security advisory system
  • Low condition (green)
  • Guarded condition (blue)
  • Elevated condition (yellow)
  • High condition (orange)
  • Severe condition (red)
  • Homeland security and analysis
  • The USA PATRIOT Act
  • Importance of finances
  • Hawala
  • Dealing with terrorism
  • Law enforcement concerns
  • Coordination, training, and awareness
  • Chapter concepts
  • References
  • Chapter 4. Gathering information, the key to the process
  • Intelligence gathering
  • Role of the first responder
  • Crimes and incidents that may yield information or links
  • Stolen identities
  • False identification
  • Illegal trafficking of cigarettes
  • Misappropriation
  • Cargo crimes
  • Suspicious vehicles
  • Found or abandoned property
  • Gathering limitations and restrictions
  • Tips
  • Intelligence gathering and information interpretation
  • Chapter concepts
  • References
  • Chapter 5. Enhanced analysis: transforming information into intelligence
  • Analyzing: transforming information into intelligence
  • Analytical and investigative variables
  • Components of a group or organization profile
  • Components of an offender profile
  • Web sites and other resources
  • Macro-micro-macro continuum
  • Link analysis charts
  • Association and directional matrixes
  • Event flowcharts
  • Heuer's analysis of competing hypotheses (ACH)
  • Assessing the threat
  • Vulnerability assessment
  • Spatial referencing and its use in homeland security analysis
  • Range of GIS uses
  • Preparation and planning
  • GIS linking
  • Additional benefits of GIS
  • Identifying potential targets
  • Dissemination of intelligence
  • Commonly used analytical reports
  • Chapter concepts
  • References
  • Chapter 6. What the future may hold
  • Foreign-based terrorist influence
  • Cyberterrorism
  • Defining cyberterrorism
  • Spectrum of cyber conflict
  • Bioterrorism and weapons of mass destruction (WMD)
  • The past, present, and future
  • Chapter concepts
  • References
  • Chapter 7. Conclusion
  • Reference
  • Appendix A. Domestic-based terrorist organizations
  • Appendix B. Known active "Patriot" groups in the United States as of 2001
  • Appendix C. Symbols of hate
  • Appendix D. Foreign-based terrorist organizations
  • Appendix E. Explosive materials
  • Appendix F. Homeland security state contact list
  • Appendix G. Publication references
  • Appendix H. Government legislative references
  • Appendix I. Glossary of terminology
  • Index