Terrorism and organized hate crime : intelligence gathering, analysis, and investigations /
Saved in:
Author / Creator: | Ronczkowski, Michael. |
---|---|
Imprint: | Boca Raton : CRC Press, c2004. |
Description: | 256 p. : ill. ; 25 cm. |
Language: | English |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/5017094 |
Table of Contents:
- Chapter 1. A need for understanding and analysis
- The mission
- Intelligence analysis units
- Defining analytical positions and roles
- What is homeland security and terrorism analysis?
- Understanding what needs to be analyzed
- Keys to analyzing
- Deterrence, prevention, arrest, and target hardening
- Deterrence
- Prevention
- Arrest
- Target hardening
- Chapter concepts
- References
- Chapter 2. Understanding and defining terrorism
- Defining terrorism
- Defining terrorist activity
- Forms of terrorism
- Political terrorism
- Ecological terrorism
- Agricultural terrorism
- Narco terrorism
- Biological terrorism
- Cyber terrorism
- History and roots of modern terrorism
- The evolution of domestic terrorism
- Known domestic terrorist groups
- Domestic terrorism
- Organized hate groups and crimes
- Role of organized hate groups in domestic terrorism
- What is a terrorist?
- Terrorist vs. street criminal
- Differences between typical street criminals and terrorists
- September 11, 2001--subjects, criminals, or terrorists?
- Terrorism structure and management
- Chapter concepts
- References
- Chapter 3. Homeland security and analysis
- Homeland security defined
- Homeland security advisory system
- Low condition (green)
- Guarded condition (blue)
- Elevated condition (yellow)
- High condition (orange)
- Severe condition (red)
- Homeland security and analysis
- The USA PATRIOT Act
- Importance of finances
- Hawala
- Dealing with terrorism
- Law enforcement concerns
- Coordination, training, and awareness
- Chapter concepts
- References
- Chapter 4. Gathering information, the key to the process
- Intelligence gathering
- Role of the first responder
- Crimes and incidents that may yield information or links
- Stolen identities
- False identification
- Illegal trafficking of cigarettes
- Misappropriation
- Cargo crimes
- Suspicious vehicles
- Found or abandoned property
- Gathering limitations and restrictions
- Tips
- Intelligence gathering and information interpretation
- Chapter concepts
- References
- Chapter 5. Enhanced analysis: transforming information into intelligence
- Analyzing: transforming information into intelligence
- Analytical and investigative variables
- Components of a group or organization profile
- Components of an offender profile
- Web sites and other resources
- Macro-micro-macro continuum
- Link analysis charts
- Association and directional matrixes
- Event flowcharts
- Heuer's analysis of competing hypotheses (ACH)
- Assessing the threat
- Vulnerability assessment
- Spatial referencing and its use in homeland security analysis
- Range of GIS uses
- Preparation and planning
- GIS linking
- Additional benefits of GIS
- Identifying potential targets
- Dissemination of intelligence
- Commonly used analytical reports
- Chapter concepts
- References
- Chapter 6. What the future may hold
- Foreign-based terrorist influence
- Cyberterrorism
- Defining cyberterrorism
- Spectrum of cyber conflict
- Bioterrorism and weapons of mass destruction (WMD)
- The past, present, and future
- Chapter concepts
- References
- Chapter 7. Conclusion
- Reference
- Appendix A. Domestic-based terrorist organizations
- Appendix B. Known active "Patriot" groups in the United States as of 2001
- Appendix C. Symbols of hate
- Appendix D. Foreign-based terrorist organizations
- Appendix E. Explosive materials
- Appendix F. Homeland security state contact list
- Appendix G. Publication references
- Appendix H. Government legislative references
- Appendix I. Glossary of terminology
- Index