A Course Produced By
The United Nations Institute For
Training and Research,
Programme of Correspondence Instruction In
Peacekeeping Operations
Course Author:
Paul Medhurst Ph.D.
Deputy Chief,
Security and Safety Section
UNOV
Series Editor:
Harvey J. Langholtz
UNITAR Training Programme Programme UNITAR de Formation
of Correspondence Instruction Par Correspondance Aux
in Peacekeeping Operations Operations de Maintien de la Paix
Dag Hammarskjld Centre Palais des Nations
Box 20475 1211 Genve 10
New York, NY 10017 Suisse
USA
iii
Global Terrorism
A Course Produced By
The United Nations Institute for Training and Research,
Programme of Correspondence Instruction
in Peacekeeping Operations
Course Author:
Paul Medhurst. Ph.D.
Deputy Chief,
Security and Safety Section
UNOV
Series Editor:
Harvey J. Langholtz
COPYRIGHT 2002
UNITED NATIONS INSTITUTE FOR TRAINING AND RESEARCH
PROGRAMME OF CORRESPONDENCE INSTRUCTION
ADDRESS ALL CORRESPONDENCE TO:
UNITAR Programme of Correspondence Instruction
Dag Hammarskjld Centre
Box 20475
New York, NY 10017 - 20475
U.S.A.
iv
Important Note:
The material contained herein does not reflect the
[apolitical and unexpressed] opinions of UNITAR or
the Author in any sense.
UNITAR and the Author disclaim any and all
responsibility for facts and opinions contained in the
text, which have been assimilated largely from open
media and other independent sources.
Notwithstanding, vigorous effort has been undertaken
to verify the information contained herein. It is
portrayed in as impartial a fashion as possible.
Information with diametrically opposing views is
sometimes provided on given topics, in order to
stimulate scholarly interest, and is in keeping with the
norms of pure and free academic pursuit.
v
FORMAT OF STUDY
This course is designed for independent study, at a pace determined by the student
THE COURSE FORMAT AND MATERIALS FACILITATE:
MODULAR STUDY
EASE OF REVIEW
INCREMENTAL LEARNING
MATERIALS NEEDED FOR COMPLETION OF THIS
COURSE ARE ENCLOSED WITH THIS BOOKLET:
COURSE BOOKLET: GLOBAL TERRORISM
END-OF-COURSE EXAMINATION (STARTS ON PAGE 551)
ANSWER SHEET FOR END-OF-COURSE EXAMINATION
RETURN ENVELOPE FOR END-OF-COURSE EXAMINATION
STUDENT S RESPONSIBILITIES:
LEARNING COURSE MATERIAL
COMPLETING THE END-OF-COURSE EXAMINATION
SUBMITTING THE END-OF-COURSE EXAMINATION
PLEASE SEE THE END-OF-COURSE EXAMINATION ANSWER SHEET
FOR SUBMISSION INSTRUCTIONS
vi
METHOD OF STUDY
Below are suggestions for how to proceed with a UNITAR POCI Course. Though the
student may have alternate approaches that are effective, the following hints have worked
for many.
Before you actually begin studying, first browse through the overall course material.
Notice the lesson outlines which give you an idea of what will be involved as you
proceed.
The material should be logical and straightforward. Instead of memorizing individual
details, strive to understand concepts and overall perspectives in regard to the course
subject.
Set up guidelines regarding how you want to schedule your time.
Study the lesson content. At the beginning of each lesson, orient yourself to the main
points. If you are able to, read the material twice to ensure maximum understanding and
retention, and let time elapse between the readings.
When you finish a lesson, take the End-of-Lesson Quiz. For any error, go back to the
lesson section and re-read it. Before you go on, be aware of the discrepancy in your
understanding that led to the error.
After you complete all lessons, take time to review the main points of each lesson. Then,
while the material is fresh in your mind, take the End-Of-Course Examination. It is
generally best to complete the End-Of-Course Examination in one sitting.
Return your End-Of-Course Examination answer sheet to UNITAR POCI. Your exam will
be scored and if you achieve a passing grade of 75% or higher, you will be sent a
Certificate of Course Completion. If you score below 75%, you will be given one
opportunity to take a second version of the End-Of-Course Examination.
One note of explanation of spelling. There are six official languages at the United
Nations. One of these is English as used in the UK. UNITAR POCI courses are written
using English spelling.
vii
GLOBAL TERRORISM
TABLE OF CONTENTS
Format of Study................................................................................................................................v
Method of Study..............................................................................................................................vi
Table of Contents...........................................................................................................................vii
Introduction........................................................................................................................................1
Lesson 1: The Phenomenon of Terrorism.................................................................................19
Section 1.1: Perceptions and History of Terrorism
a) Perceptions
b) Terrorism in History
c) Early Twentieth Century Terrorism
d) Post World War II Terrorism
Section 1.2: Geography, Types and Origins of Contemporary Terrorism
a) Geography of Terrorism
b) Domestic, International and Transnational Terrorism
c) Guerrilla Warfare
d) Emergence of Modern Terrorism from Guerilla Warfare
Section 1.3: Terrorism and Society
a) Terrorism, Guerilla Warfare and the Geneva Conventions
b) Terrorism in War and Peace
c) Terrorism and Democracy
d) Keywords to Note
e) Terrorist Attack Brief: Attacks on Rome (Italy) and Vienna (Austria) International Airports
Lesson 2: Definitions, Elements, and Anomalies of Terrorism.................................................83
Section 2.1: Defining Terrorism
a) The Necessity
b) Linguistic Barriers
c) Political Differences
d) Existing Definitions
e) Conclusions
Section 2.2: Essential Elements of Terrorism
a) The Four Pillars of Terrorism
b) Cause or Motive
c) Ends and Means
d) Ability
e) Calculation
f) Terror
g) Recognition
h) Publicity
i) Targets and Victims
viii
j) Demands and Coercion
Section 2.3: Anomalies of Terrorism
a) Demands Versus Actions
b) Motives; Planner and Operative
c) Co-operation between Terrorist Groups
d) Terrorism, War Crimes and Crimes against Humanity
e) Financing Terrorism through Crime
f) Terrorism and Human Rights Violations
g) Keywords to Note
h) Terrorist Attack Brief: Bombing of US Embassy, Beirut, Lebanon
Lesson 3: Justifications Proclaimed by Terrorists..................................................................111
a) Confronting Oppression
b) Independence Struggle
c) Resistance to Military Occupation
d) Religious Duty
e) Political Conviction
f) Social Conviction
g) Pursuit of Mystical, Doomsday or Messianic Goals
h) Restoration of Past Social or Religious System
i) Keywords to Note
j) Terrorist Attack Brief: Restaurant Bombing in Madrid, Spain
Lesson 4: Other Motivations for Terrorism: Catalysts, and Negotiations...........................129
Section 4.1: Concealed and Other Motivations for Terrorism
a) Opportunism
b) Hatred and Intolerance
c) Frustration and Rejection
d) Conventional Criminality
e) Class Resentment
f) Incrimination of Opposition Groups
g) Expediency and Overzealousness
h) Post Traumatic Stress Disorder (PTSD)
i) Insanity
Section 4.2: Catalysts for Terrorism
a) Extreme Social or Economic Hardship
b) Suspension of Democracy
c) Favourable Political Environment
Section 4.3: Terrorists and Negotiation
a) Negotiating Groups
b) Non-Negotiating Groups
c) Insincere Negotiations
d) Case Study: Suspension of Democracy; The Armenian Genocide
e) Keywords to Note
f) Terrorist Attack Brief: Bomb Attack in Omagh, Northern Ireland, UK
ix
Lesson 5: A Profile of Terrorists and Their Organisations....................................................159
Section 5.1: A Profile of Terrorists
a) Age
b) Education
c) Background
d) Recruitment
e) Summary
Section 5.2: Structure and Practice of Terrorist Organizations
a) Leadership, Operational, Political and Spiritual
b) Intelligence and Reconnaissance
c) Security and Counter-Intelligence
d) Organising Terrorist Acts
e) Logistics
f) Recruitment, Training and Support
g) The Terrorist Cell Format
h) Keywords to Note
i) Terrorist Attack Brief: Bombing of US Air Base, Frankfurt, West Germany
Lesson 6: Terrorist Weapons, Resources, and Equipment....................................................175
Section 6.1: The Terrorist Armoury
a) Small Arms, Light and Medium-Sized Infantry Weapons
b) Improvised Explosive Devices (IEDs) and Assassination Devices
c) Military and Improvised Nuclear, Biological and Chemical Weapons
d) Volunteer Suicide-Terrorists
e) Compelled Suicide-Terrorists
f) Computer Viruses and Logic Bombs
g) Other Weapons
Section 6.2: Other Resources, Services and Equipment
a) Illicit Arms Sources
b) Support from Other Terrorist Groups and Sympathisers
c) Diplomatic, Ideological, Political and Spiritual Support
d) Commercially Available Equipment
e) Commercially Available Communications Facilities
f) Funding; Illegally-Generated and Sponsored
g) Negotiating Options
h) Diplomatic Immunity
i) Individual Sponsorship
j) Sponsorship by Governments
k) Rogue Intelligence and Security Personnel
l) Keywords to Note
m) Terrorist Attack Brief: Attacks on Cafs, San Salvador, El Salvador
x
Lesson 7: Types of Terrorist Acts.............................................................................................215
Section 7.1: Extreme Violence
a) Terrorist Preferences
b) Systematic Genocide and Spontaneous Massacre
c) Random Murder, Wounding and Mutilation
d) Selective Murder and Wounding
e) Forced Suicide of Victims Compelled to Engage in Terrorist Acts
f) De-population or Ethnic Cleansing
g) Political Purges
Section 7.2: Other Crimes
a) Destruction or Damage of Structures, Resources, Craft and other Property
b) Hijacking, Kidnapping, Siege-and-Hostage Situations
c) Racketeering, Extortion, Drug Trafficking and other Crimes
d) Destruction or Disruption of Information and Networks
e) Poisoning of Consumer Food Products
f) Brainwashing and Psychological Warfare
g) Threats and Hoax Threats of Terrorist Action
h) Case Study: The US Embassy Bombing, Nairobi, 7th August 1998
i) Keywords to Note
j) Terrorist Attack Brief: Murder of UK Defence Attach, Athens, Greece
Lesson 8: Terrorist Tactics and the Targets of Terrorism.....................................................257
Section 8.1: Terrorist Tactics
a) Pursuit of Political Status
b) Blackmail and Corruption of Officials
c) Covert Penetration of Security Forces and Target Circles
d) Provision of Clandestine Interviews with Media
e) Dissemination of Inflammatory Material, Disinformation and Propaganda
f) Breaking of Agreements
Section 8.2: Targets of Terrorism
a) Evaluation and Selection of Targets
b) Government Institutions
c) International and Non-Governmental (NGO) Organisations
d) Commercial Enterprises
e) Ethnic, Political and Religious Groups
f) Rival Criminal Groups
g) Individuals
h) Keywords to Note
i) Terrorist Attack Brief: Attack on US Officer's Club, Rome, Italy
Lesson 9: The Victims of Terrorism........................................................................................271
a) Innocent Individuals
b) Military, Police, Security and Intelligence Services Personnel
c) Governmental, International and NGO Civil Servants
d) Leaders in Society
e) Commercial Enterprises
xi
f) Democracy
g) Global, Regional and National Security
h) Societies and Environment
i) Rival Criminals
j) Case Study; Jammu and Kashmir
k) Keywords to Note
l) Terrorist Attack Brief: Attack on CIA Officers, Langley (McLean), Virginia, USA
Lesson 10: Terrorism and the Cold War; Terrorism and the Media....................................295
Section 10.1: Terrorism During the Cold War
a) Sponsorship
b) Organisation and Training
c) Coalitions
Section 10.2: Terrorism Since the Cold War
a) Resumption and Re-alignment
b) Loss of Control
c) The Intelligence and Security Communities
d) Nuclear Terrorism
e) New Forms of Terrorism
f) The New Wave of Religious Terrorism
Section 10.3: The Media and Terrorism
a) Media: A Two-Edged Sword
b) Excessive Publicity
c) Media Complicity
d) Professional Ethics of the Media
e) Condemnation of Terrorism
f) Keywords to Note
g) Terrorist Attack Brief: Attack on MI 6 Headquarters, London, UK
Lesson 11: Anti-Terrorism and Counter-Terrorism................................................................315
Section 11.1: Institutions and Techniques
a) Law and Terrorism
b) Forces Opposing Terrorism
c) Anti-Terrorism and Special Police Formations
d) Notes on Anti-Terrorism Security
e) Counter-Terrorism and Military Special Forces
f) Assessing Terrorist Threats
Section 11.2: Tactics
a) Intelligence Security
b) Security Intelligence
c) Negotiation
d) Concession
e) Deterrent
f) Case Study: Al Qaida attacks on the US: 9/11/01
g) Keywords to Note
h) Terrorist Attack Brief: Achile Lauro Hijacking, near Port Said, Egypt
xii
Lesson 12: Terrorism, The United Nations, and the Future..................................................363
Section 12.1: The United Nations and Terrorism
a) UN Resolutions and Other Instruments against Terrorism
b) The UN Organisation Against Terrorism
c) Other UN Activities Indirectly Affecting Terrorism
Section 12.2: Terrorism and the Future
a) Technological Advantages of Security Forces
b) Political Integrity and Will to Counter Terrorism
c) The Horizon
d) Possibilities to Effectively Defeat Terrorism
e) Keywords to Note
f) Terrorist Attack Brief: Seizure of US Embassy and Hostages, Teheran, Iran
Annex A: Internet Information Sites Related to Terrorism..........................................................383
Annex B: Glossary of Terms........................................................................................................391
Annex C: List of Groups Accused of Terrorism by Governments or Media................................403
Annex D: International Instruments; Prevention and Suppression of Terrorism..........................465
Annex E: UN Resolutions on Terrorism.......................................................................................467
Annex F: International Terrorist Acts by Region, 2001................................................................471
Annex G: Characteristics and Effects of Chemical Weapons.......................................................472
Annex H: Characteristics and Effects of Biological Weapons.....................................................477
Annex I: Characteristics and Effects of Nuclear Weapons...........................................................487
Annex J: Significant Terrorist Incidents 1961-2001 (US State Department)...............................491
Annex K: List of Terrorist Organisations, Compiled by US, UK, and EU...................................508
Annex L: Locations where Al Qaida Network has Firm Presence..............................................511
Annex M: Militants Presence (fought or trained in Afghanistan/Kashmir)................................512
Annex N: Photographic Evidence: Armenian Genocide..............................................................513
Annex O: Photographic Evidence: Nazi Genocide.......................................................................515
Annex P: Photographic Evidence: Chinese (Nanjing) and Asian Genocide................................ 524
Annex Q: Photographic Evidence: Former Yugoslavia Genocide (Kosovo).............................. 527
Annex R: Balfour Declaration/White Papers/League of Nations Palestine................................. 529
Annex S: Further Reading.............................................................................................................545
Course Epilogue............................................................................................................................546
Space for Notes.............................................................................................................................548
Illustration Copyright Acknowledgments.....................................................................................549
End-of-Course Examination.........................................................................................................551
ntroduction 1
The 20
th
Century.
150 million people killed
WAR
Anti-Aircraft fire (tracer ammunition), Tunisia, World War II
Courtesy: US Nat. Archives
Introduction to the Self-Paced Correspondence Course
Global Terrorism
One of the difficulties in compiling a study course on
global terrorism has been the fact that there is no universally
accepted definition of terrorism.
On the other hand, this has permitted the inclusion of
a wider range of material which might otherwise have been
excluded by the terms of a rigid definition; few of the many
definitions of terrorism include war crimes and crimes against
humanity; unjustifiably so, given the murder and widespread,
sustained terror that is generated for reasons that can plainly
not be attributed to conventional criminality.
Confining terrorism solely to mean the activities of
groups such the Baader Meinhof gang, the IRA, PLO, Aum
Shinri Kyo and Osama bin Ladens Al Qaida, would be facile,
providing a much narrowed view of the phenomena.
There is some differentiation between types of
terrorism. In this self-paced correspondence course all known
types of terrorism, including international, transnational and
domestic terrorism, are included under the overall title of
Global Terrorism.
This course includes considerable historical reference
to terrorism. This is important, in order to appreciate the roots
and growth of terrorism and to provide a control by which to measure its current intensity and
diversity. Equally as important, it
illustrates that the same patterns of
intolerance, greed, unaccountability, lack
of dialogue and inhumanity, have
remained essentially unchanged for
many centuries and continue to underpin
terrorism.
In the past 3000 years of
recorded history, there have been less
than 300 years free of armed conflict.
We live in an age of disturbing
violence, on a scale of which, the world
has never before seen. The twentieth
century witnessed more than 170 armed
conflicts, from which only arms dealers
profited, in acquiring astonishing wealth.
ntroduction 2
US M-60 Fire-Team of 101
st
Airborne division, cutting loose at
Vietcong Guerrillas, seconds before being hit and wounded by
return fire. Vietnam was a watershed between WWII and
contemporary conflicts: Regular forces on both sides; guerrillas;
terrorists; limited resources; modern weapons; protracted; harsh
terrain dictating the course of the war; domestic controversy, and
the endless casualties.
Courtesy: VWAM / US Army
The Baader-Meinhof Gang
Former West German Police Wanted Poster
More than 120 of these armed
conflicts occurred in the years between
the end of World War II and the end of
the 20
th
Century.
Approximately 150 million people
were killed in scores of countries, by war,
purges, and other forms of persecution
and oppression in the 20
th
century:
That is 4109 people killed every
day for 100 years, or in different terms, a
person was killed every 21 seconds for
100 years.
As a result of contemporary armed
conflict alone, occurring even as students
take this course, 2700 people are killed
every day; that is 112 per hour, or in other
terms: a person killed every 31 seconds
day and night, non stop.
Overall, this tragedy is an
appalling and dismal memorial to
civilisation and the enlightenment which we might have expected to have followed from the
Industrial Revolution to the Information Age.
The majority of the 20
th
century armed conflicts
involved guerrilla or irregular warfare to varying extent
and many also involved use of terrorism.
Terrorism is now a daily event and an increasingly
significant source of violence, especially in relation to the
maintenance of peace between States and by extension,
world peace. Several conflicts have even begun as a direct
result of terrorism.
Almost without exception, the current bi-lateral,
regional, civil-war and separatist conflicts in the world all
involve elements of terrorism, variously including
genocide, depopulation, massacre, assassination and
indiscriminate bombing.
These acts of terrorism continue to be carried out
mostly with impunity, and occasionally by all parties to
the conflict.
From the 1960s to the 1980s most terrorist groups
fell into two categories; nationalist and separatist (such as
the Provisional Irish Republican Army and the Kashmir
separatists) or anarchist-communist terrorists seeking the
overthrow of capitalism and a world revolution (such as
ntroduction 3
Starving Armenian boys in 1917 - victims of state organised terror
and genocide in the former Ottoman empire
Armenian National Institute. John Elder collection
Anthrax Letter
A new era of bio-terrorism
Courtesy: FBI
the Red Army Faction [Baader-
Meinhof gang], the Italian Red
Brigades and the Japanese Red
Army).
Since the 1980s however,
terrorism also expanded to include a
wider range of diverse conflicts of a
political, religious, ethnic and social
nature.
In the 1990s, following
removal of Cold War restraints,
regional low intensity conflicts and
attendant genocide sprang forth on
several continents, fired by
nationalism and religion and led by a
new generation of petty warlords. More alarmingly, a new strain of ruthless terrorism emerged.
It is characterised by fanatic and bloody religious intolerance, and driven by an almost
fantasy-like ambition to create a single medival-style religious state across half or more of the
world, needless to say, without consulting its inhabitants. The figurehead and current leader of this
transnational terrorist foundation, or network, is Osama bin Laden.
Cause for further serious concern is the quest by transnational terrorists, for almost a decade,
to acquire nuclear weapons and their components.
The possibility of terrorists
procuring or manufacturing (less
likely) a crude nuclear weapon (of
which there are several categories) in
the fairly near future, seems almost
certain and merely a question of time.
The period in which we live is
also termed as the age of information.
Books and Internet information
certainly exist on various, specific
aspects of terrorism (Annex A
provides a list of internet information
sites related to terrorism).
However, public knowledge of
terrorism is in general, mostly limited
to either specific terrorist incidents or
censored informat i on whi ch
governments and their law
enforcement bodies reveal to the
media, usually following a terrorist
outrage.
ntroduction 4
Josef Goebbels
Hi t l er s Mi ni s t er of
Propaganda. A master at lies
and deceit, despised by even
his peers. Like contemporary
t er r or i st s, t he Nazi s
murdered innocent victims
and tried to justify their
crimes under cover of a
propaganda barrage
Courtesy: US Army / USHMM
Rogove Village, Kosovo, 1998
A terrorised region where massacres like this were
commonplace and a deliberate tactic of ethnic
cleansing (depopulation and genocide - a war crime
and a crime against humanity, respectively); for
which the UN conducted trials at the international
criminal tribunal in the Hague
Courtesy: E. B. Albania Net
An IED (Improvised Explosive Device)
Courtesy: Washington State Military Dept. EMD
Information is censored and partially withheld due to
well-founded security reasons and a legitimate
inclination towards confidentiality. Consequently, the
information finally presented by media is sometimes piece-
meal. The subject of terrorism is not generally dealt with
comprehensively.
This course aims to fill this information gap with a
wide-ranging exposure of terrorism: of definitions and law; of
terrorists and victims; of weapons and acts; of motives and
catalysts; of tactics and resources, and of its history and future.
Every effort has been taken to confirm the information
in this course and to present it as impartially as possible.
It is not within the scope of this course to research and
assemble the vast amounts of
information concerning all single
acts of contemporary terrorism,
but four detailed and important
case-studies are included in the course.
The first three case studies are examined in the contexts of
Lessons 4, 7 and 9, and concern the Armenian genocide, the US
Embassy bombings in Nairobi on 7th August 1998, and the conflict in
the former princely state of Jammu and Kashmir, now in its 55
th
year.
Most importantly, the fourth case study at the end of Lesson 11
examines the unprecedented terrorist attacks in the US on 11
th
September 2001 and
t h e s u b s e q u e n t
scrambling for political
alliances, seemingly in
preparation for a
historical landmark
conflict, yet to come.
The domestic
US Anthrax attacks
which followed those
events are mentioned in
Les s on 6 under
biological weapons.
This course
separately dissects each
aspect of terrorism; the acts, perpetrators, weapons,
motives, causes, financing and many other elements.
Mention of the more notorious terrorist
groups, individuals and their acts, is necessarily
ntroduction 5
Major T. E. Lawrence, Cairo 1918
Despite the legality of the albeit
unconventional guerrilla warfare, which
he organised and carried out in WW1
Arabia, the Ottoman government put a
price on his head for terrorism
LHCMA (Kings College London)
FAPLA soldier in wait for UNITA guerrillas in Angola
The 20
th
Century launched a new era of guerrilla warfare
from which contemporary terrorism sprang
Courtesy: MPLA
repeated in differing contexts, amongst the lessons, not only to
illustrate the wide-ranging complexities of terrorism, but to
separate and simplify them individually for learning purposes.
To better prepare the student, before launching directly
into the lessons and learning material, this introduction
concludes in the form of a preface, briefly discussing some of
the most frequently asked questions about terrorism.
The meaning of terrorism.
The words terror and terrorism were adopted from the
word terreur, a 14
th
century French word, which derives from
the Latin: terrere (to frighten). The word was first used widely
in France during the French Revolution in what was called the
Reign of Terror (1793-1794).
Since then, terrorism has evolved into something
unrelated to its historical origin. Terrorism is now a specialised
and sometimes sophisticated and large-scale, type of criminal
conduct.
It mostly involves the ruthless, pre-meditated use of
military weapons or force to generate: multiple casualty
incidents, in
w h i c h
r a n d o m ,
innocent, defenceless and unrelated civilians are
the victims, or, the destruction of select physical
assets of a States infrastructure, including
cultural sites.
The object of this murder and carnage is
mostly to coerce political concession from third
parties known as targets, usually governments.
Terrorism is usually carried out under the
political shelter of some sort of proclaimed
agenda in which the terrorists portray themselves
as acting for virtuous or popular interests.
Ordinary crimes stem mostly from need,
greed, or passion. In contrast, most terrorism is
compelled neither by need (since there are no
poor terrorists), nor passion (since most terrorist
acts are clinically calculated in several distinct
phases).
Terrorism in general, is motivated for
individual reasons of greed, egotism and a wide
ntroduction 6
The ultimate weapon and terrorist threat: A nuclear bomb
Courtesy: US National Oceanic and Atmospheric Administration
US FBI examining barrels of mail, for anthrax contamination
Courtesy: US FBI / Environmental Protection Agency
range of vices related to intolerance,
especially religious and ethnic
intolerance. Intolerance is often the
primary motive behind genocide and
depopulation, running in tandem
with whole-sale looting and
dispossession (theft).
The political cover that
terrorists adopt in trying to justify
their actions behind a shield of
virtue, is plainly absurd and
hypocritical, since innocent and
defenceless victims are maimed and
murdered in the name of furthering
social justice and fighting
oppression.
Nevertheless, terrorists are
able to win a certain number of
hearts and minds, whatever the
nature of their group or cause, uncomfortably giving credence to Hitlers Minister for propaganda
who said tell a lie that is big enough and repeat it often enough and the whole world will believe
it.
Terrorism was frequently used throughout history by tyrants against the oppressed, and by
the oppressed against tyrants, but it now seems exclusively used by tyrants and oppressors against
the innocent.
What is common to all forms of terrorism is that they involve use of force or the threat of it;
there are always victims and targets;
terror (or extreme anxiety in the modern
meaning of the word) is always
deliberately invoked, and all forms of
terrorism are illegal. There are many
differing definitions of terrorism; some
are discussed in Lesson 2 (a glossary
with definitions for terrorism-related
words may be found in Annex B).
What terrorists are.
Many terrorists will not view themselves
as terrorists. They prefer to posture
themselves as idealists or altruists
engaged in a partisan struggle for
ntroduction 7
Even in our defeat we had succeeded. We welcomed Lucifer with joyous and open arms, and went
to our deaths knowing we had succeeded in opening the very gates of Hell here on this planet. And
for that we would be well rewarded, oh well rewarded
Former Nazi General in South American exile, on the phenomenon of Nazi-style genocide
Genocide generates an enormous amount of terror, especially among the victim populations.
Genocide is the planned murder (the pre-meditated form of unlawful killing) of a large number of
people.
The victims of genocide are from a specific religious, ethnic, national or racial group.
As discussed in Lesson 1, genocide is the worst form of terrorism and it is generally
systematic, not spontaneous, in that it is sanctioned openly or subtly by a government or a state or
defacto leader.
Genocide is illegal under the 1948 Genocide Convention and is tried as a crime against
humanity. Genocide mostly begins without warning, and is often difficult to prevent or to arrest, as
it is perpetrated by powerful military forces. Evidence of Genocide is often discovered after the event
and mostly, but not always (as in the case of the Stalinist purges), occurs during wartime.
Examples of genocide have occurred throughout history. Some examples are:
The former Ottoman Empire, 1890 to 1921 Sudan from 1985 to date
WWII Germany & Nazi occupied territories Former Yugoslavia from 1991 (intermittently)
Cambodia between 1975 and 1978 Rwanda in 1994 (and thereafter intermittently)
In the same fashion as systematic genocide, massacres (also slaughter with cruelty, but on
a far smaller scale than genocide) can be subject to pre-planning.
A few examples (of many hundreds) of pre-planned massacres are as follows:
The massacre of 9,439 Russian citizens by the Soviet NKVD, between 1937 and 1938, with
their subsequent burial in 95 unmarked pits
The massacres at Katyn wood near Smolensk, Russia where 4,253 unarmed Polish Army
Officers were massacred. Soviet authorities blamed the massacre upon the Nazis, attributing
the date of the massacre as after 1941 (Operation Barbarossa; the Nazi invasion of Russia)
Lesson 7/ Types of Terrorist Acts 219
British Paratroopers await helicopter airlift over the border into Kosovo
to restore order and help to hunt down war criminals
Crown
British Paratroopers arrest three Serbian gunmen in Pristina,
Kosovo
and produced items of German
military equipment from the burial pits
as evidence. The massacre was in fact
pre-planned by the Soviet government
and carried out by Soviet NKVD
troops in 1939; misleading forensic
evidence was planted in order to lay
blame upon the Nazis. In 1991, it was
publicly revealed in Russia that the
former Soviet NKVD had committed
this massacre.
The massacres at Bykovniya,
near Kiev, where 6,329 people
were massacred by Soviet VV
(Vnutrenniye Voyska or
Internal troops) in 1937 and
thrown into a burial pit. In 1988, the VV erected a memorial monument over the burial pit
falsely attributing the massacre to the fascist (Nazi) occupiers during 1941 to 1943
The massacres in the Kuropaty forest, near Minsk, Byelorussia, where an estimated 200,000
Russian bodies were found in 500 communal graves; all were victims of the former Soviet
regime
Another World War II pre-planned
massacre was carried out in 1944 by
SS and Gestapo officials. Upon re-
capture, following their escape from
Sagen prisoner of war camp in
Germany, 50 Brit i sh and
Commonwealth Royal Air Force
Officers were murdered and
cremated (to destroy forensic
evidence)
Not all massacres are pre-planned;
some are spontaneous. Spontaneous
terrorist massacres (or atrocities) are
sometimes committed by military or
security forces, against victims or prisoners
Lesson 7/ Types of Terrorist Acts 220
Murder victims killed by Serbian armed forces ethnically
cleansing Rogove village, Kosovo, 1999
E. Bardhi/Albania Net
US FBI forensic specialists uncover war crime mass
graves in Kosovo, 1999
Courtesy: FBI
that they have at their mercy, mostly during
wartime in rural areas, and most frequently,
immediately following the heat of combat, or
related to recently sustained losses.
Reasons vary and may be for vengeance,
deterrent by reprisal, ethnic cleansing or Post
Traumatic Stress Disorder.
A variety of well known wartime
examples of spontaneous massacre are:
The 1944 massacre of 86 US Prisoners
of War at Malmedy, France by Waffen
SS soldiers
The 1944 massacre of 648 unarmed
men, women and children at Oradour sur Glane, France by Waffen SS soldiers
The 1945 massacre of 43 surrendered Waffen SS soldiers in Webling, Germany by US
soldiers
The frequent spontaneous massacres of civilians by south and north Vietnamese troops and
Vietmin Viet Nam Cong San (south Vietnamese communist guerrillas known as Vietcong),
during the Vietnam War of 1959 to 1975
The sometimes spontaneous massacres
of Cambodians murdered by Khmer
Rouge terrorists between 1975 and 1978,
in both cities and the countryside
A different type of spontaneous terrorist
massacre occurred at the 1972 Munich (West
Germany) Olympic Games. Palestinian terrorists
from the Black September group took 11 Israeli
athletes hostage, demanding release of 200
Palestinians held in Israeli prisons, in exchange
for releasing the hostages.
As the terrorists and hostages were about
Lesson 7/ Types of Terrorists Acts 221
US Prisoners of War in the snows of
Malmedy, murdered by Waffen SS who
were later tried and punished for war
crimes
Courtesy: US Army
An elderly victim of terrorism in Kashmir
to board a jet airliner, demanded as part of the escape plan,
German police snipers opened fire upon the terrorists at
Furstenfeldbruck airfield.
The terrorists spontaneously threw hand-grenades at
the hostages and opened fire. At the end of the fire-fight, 11
hostages, five terrorists and a west German police officer
were dead.
Random Murder, Wounding and Mutilation
Its not the bullet with my name on it that worries me.
Its the one that says To whom it may concern
Anonymous Belfast resident, Northern Ireland, 1991
All deaths caused by terrorists are murders as they
are premeditated, even if the victims are selected at random.
Some terrorist attacks are upon victims who are
selected for their affiliation.
(i.e. a military group of soldiers, Embassy staff or
Government officials).
In other attacks, victims are loosely selected at, in or
around a given attack-site, with little or no effort to
discriminate.
Random murder or wounding of victims unknown to the terrorists, especially by bombing,
accounts for the majority of contemporary terrorism.
The fact that many terrorists murder and wound at random and without warning, adds to the
terror (or extreme anxiety) generated amongst populations.
Terrorists commonly place bombs in population centres, detonating them without warning,
after a delay permitting the terrorists to escape.
This results in the indiscriminate murder
and wounding of random civilians and
destruction and damage of buildings.
It is the type of terrorist action much
favoured in the Middle East.
Different examples of terrorist acts
involving selection of random, unknown victims
both in and around main targeted areas are:
The pipe-bomb detonated at the 1996
Atlanta (US) Olympic Games, which
killed a spectator
Lesson 7/ Types of Terrorists Acts 222
An innocent truck driver delivering supplies to
a village that RUF terrorists were attacking in
Sierra Leone. RUF cut his hands off.
Crown
British Troops restoring order in Sierra Leone
The almost simultaneous terrorist massacres in
1985 at Rome and Vienna international airports,
targeting Israeli El Al check-in counters and their
environs, with hand-grenades and machine guns
(also used on the escape route), which killed 18
people and wounded over 100. It was carried out by
Palestinian terrorists of the Abu Nidal (Father of
the Struggle) group, headed by Sabri al Banna
The Al Qaida terrorist bombings of the US
embassies in Dar es Salaam, Tanzania and Nairobi,
Kenya, on 7th August 1998. In these attacks, the
victims killed and thousands of wounded included
many Muslims and other civilians, outside of the
embassies, and entirely unrelated to the terrorists
and their cause
If campaigns in which civilians are killed and
wounded are sustained over long periods, it tends to
further alienate civilian populations against the
terrorists.
This trend was most probably a motivation
for some terrorist factions in the Northern Ireland
dispute; they began to give warnings of bombs to
security forces, permitting a part or whole civilian
evacuation.
The terrorists would have pre-arranged
secret code-words known only to them and the
security forces (and sometimes media), in order to
discount hoax bomb threats.
Excluding hoaxes by use of code words, is
to the mutual benefit of both security forces and the
terrorists.
In wartime or combat, the ratio of killed to wounded varies, but is approximately:
1 killed to 3 (or more) wounded
In cases of terrorist bombings, the number of wounded is also several times greater than the
Lesson 7/ Types of Terrorist Acts 223
US Marine on the USS Kearsarge comforts a small boy refugee
that he airlifted out of Freetown, Sierra Leone
Courtesy: US Dept. of Defense
number killed. However, in the
bombing of the US Embassy in
Nairobi on 7th August 1998, the ratio
was far from normal proportions, due
to the characteristics of the bomb,
location, timing and environment: 213
were killed to 4000+ wounded.
Mutilation
Bes i des i n Rwanda,
widespread examples of mutilation
took place in the territory controlled
by a terrorist bandit leader, Foday
Sankoh, in Sierra Leone.
Despite a July 1999 peace
agreement between government
President Kabbah and RUF
(Revolutionary United Front) leader
Foday Sankoh, the RUF engaged in
fighting against UN peacekeeping forces. By 2001, 12,000 UN peacekeeping troops were present
to restore order.
Sankohs RUF committed many barbaric acts of terrorism and mutilation of those captured,
whether innocent civilians or combatants. Mutilation was commonplace and isolated cases of
cannibalism were reported.
Selective Murder, Wounding and Torture
When there is a person, there is a problem. No person, no problem
Joseph Stalin
While many terrorists kill unknown persons at random, some terrorists identify, target and
take hostage, specific victims whose identity is known to them and whom they sometimes mutilate,
torture or murder.
It is held in some security circles that on terrorist-targeted international flights, passenger
manifests (supplied by corrupt airline staff or others) are scrutinised by terrorists or their agents, prior
to the terrorist act.
This is presumably done as a precaution to ensure that there are no friendly forces or parties
on board. e.g. in the case of Pan Am Flight 103, to ensure that no Libyan officials, trade delegations,
diplomats or their families are on board. Due to cancellations however, this cannot be very effective.
A notorious example of selective (non spontaneous or random) murder was the painstakingly
planned bombing of US Pan Am flight 103 over Lockerbie in Scotland, UK in 1988. A bomb was
concealed on board the flight, which detonated, causing 259 passengers and aircrew to be killed, in
Lesson 7/ Types of Terrorist Acts 224
Abdel Baset Ali al Megrahi
FBI
addition to a further 11 persons on the ground, killed by
falling wreckage.
In 1999, the Libyan government submitted to
persistent demands that the two government-employed
suspects be handed over for trial in the Hague, Netherlands,
under Scottish Law.
One of two indicted suspects was found guilty and
convicted. Abdel Baset Ali al-Megrahi was sentenced to life
imprisonment (in effect, 20 years), and lost his appeal in
March 2002.
The initial trial cost over US$ 75 million, with basic
trial facilities alone costing in excess of US$ 15 million, and
running costs of US$ 2 million per month.
Another example of selective terrorist murders
occurred in 1998 at the Iranian Consulate at Mazar e Sharif,
Afghanistan after the Taliban (Students) militia took over
the city.
Nine Iranian (Shiite Muslim) diplomats and support
staff were murdered by unknown terrorists. The Taliban militia (Sunni Muslims) subsequently
denied any knowledge of those responsible.
Torture
The dead only count when they leave a testimony
Joel Filartiga, Father of a son tortured to death
In Kashmir, members of the Al Faran (the Mountain Fighters) terrorist group, linked to the
Harkat ul Ansar (Companions [of the prophet Mohammed] Movement) terrorist group, kidnapped
a group of western tourists in July 1995.
They eventually beheaded a Norwegian tourist who was one of their hostages, and eluded
security forces indefinitely.
The terrorists and their other victims never came to light, despite deployment in Kashmir of
officers from the US FBI, the UKs New Scotland Yard and Germanys GSG-9.
It is thought that the objective was to draw western attention to the Kashmir dispute, and that
to make sure the fate and graves of the tourists never came to light (to minimise adverse publicity),
the terrorists themselves were later killed by their masters.
Mercy is not generally shown by terrorists. A historical catalogue of horrific crimes testifies
that murder, mutilation and torture are methods to which terrorists resort to without hesitation, if it
serves their purpose.
Khiam jail in south Lebanon, inside the former Israeli Security Zone area, had a notorious
history of savage torture (and on occasions, murder) when under the control of the South Lebanese
Lesson 7/ Types of Terrorist Acts 225
The notorious Khiam Jail, south Lebanon
Al Hayat
Army (SLA) who were loyal to Israel during
the conflict in Lebanon.
Grievous bodily harm, mutilation,
electrocution, bone-softening, rape and
mental torture were commonplace in Khiam.
Several former prisoners from Khiam
stated (to the author, living in South Lebanon
at the time) that during the SLA reign, it was
standard treatment when leaving Khiam to be
threatened.
The penalty (carried out on some
occasions) for talking of what went on in
Khiam would result in relatives being taken
there to be beaten and tortured, including the
possible rape of their female family members.
In the 1980s, eighteen US and a
number of European nationals were
kidnapped, mainly in Beirut, Lebanon, and
dispersed in different parts of west Beirut to
deter rescue attempts and bombing reprisals.
Two of the more notorious cases were
that of:
US Embassy Diplomat and CIA Station Chief William Buckley, kidnapped in March 1984
Col. William Higgins, US Army, seconded as Chief of UN (UNTSO) Observer Group
Lebanon, kidnapped in February 1988
They were both, according to media, subjected to cruel and long-term physical maltreatment
accompanied by professional psychological torture, inflicted by a Dr. Aziz Al Abub (also known as
Ibrahim al Nadhir), a former Pasdoran* leader at the Teheran University Medical School. He was
also trained at the [KGB-controlled] Patrice Lumumba Peoples Friendship University in Moscow.
The victims were later murdered, according to media, by terrorists within the Hizbollah guerrilla
group.
[*Pasdaran e Inqilab is the Iranian Revolutionary Guard Corps, technically a military unit, but with
a large number of personnel covertly deployed on domestic political intelligence and security
functions, observing their own population and protecting the revolution.
According to media, on 17
th
April 1995, Ayatollah Ali Khamenei appointed Hassan
Firuzabadi (a civilian veterinary surgeon) to the military rank of full General and placed him above
Brigadier-General Rezai, Commander-in-Chief of Pasdaran, and Brigadier-General Shahbazi of
the regular Iranian Armed Forces.]
Another example of torture and terrorism occurred in the early 20
th
century in Afghanistan
during Shah Amanullahs reign. Pasha Sikao, an Afghan warlord, was widely known and terrorised
Lesson 7/ Types of Terrorist Acts 226
Basha Sikao
Courlesy: lav. V. Karr (rel)
Urban Anti-Terrorist patrol: British Internal Security Forces, Northern Ireland
Crown
his enemies on account of his habit of personally torturing each of his
prisoners.
In Peru during April 2002, at a Government Truth and
Reconciliation Commission, officials heard evidence from witnesses
concerning the [Maoist] Sendero Luminoso (Shining Path) terrorist
activities in Ayacucho, a jungle and mountainous region.
Shining Path terrorists, in an effort to force rural peasants to
help them overthrow the government, committed many massacres
involving torture.
An example is as follows:
On one occasion, 23 random peasants (men) from a village in
Ayacucho were rounded up, hands tied behind their backs, following
which, the hooded Sendero Luminoso terrorists crushed their heads
with rocks and cut their throats, so that they died in protracted agony.
Forced Suicide of Victims Compelled to Engage in Terrorist Acts
There will be no justice as long as man will stand with a knife or with a gun and destroy those who
are weaker than he is
Isaac Bashevis Singer, Polish-born American writer
From time to time during the Northern Ireland dispute, terrorists from the PIRA (Provisional
Irish Republican Army) would kidnap a male victim with his wife and / or children and hold them
hostage, sometimes at
gunpoint in their own
home.
The male victim
would then be forced to
dr i ve a vehi c l e
(sometimes trapped or
handcuffed inside)
filled with explosives
or another type of
bomb, to a target such
as a security forces
checkpoint.
Th e b o mb
wo u l d t h e n b e
detonated, killing the
mal e vi ct i m and
members of the security
Lesson 7/ Types of Terrorist Acts 227
UN Int. Criminal
Tribunal at the Hague
Evidence of ethnic cleansing: Mass graves in Kosovo, May 1999
Photo courtesy of NATO
forces and damaging or destroying the checkpoint. If the male victim refused to drive the vehicle,
he was offered the alternative of his family members being killed instead.
De-population or Ethnic Cleansing
You take my life when you take the means whereby I live
The Merchant of Venice, William Shakespeare
Deportation (de-population) of civilians is a war crime under the
Fourth Geneva Convention.
Some of the most violent post World War II cases of de-
population occurred in Rwanda from 1994 onwards.
In July 1995 during the conflict in the former Yugoslavia, Serbian
forces overran a UN Protected Area (UNPA) in Srebrenica, an old mining
town in eastern Bosnia.
They ejected the Muslim population, but detained a reported 5000
men, women and children. Most were massacred and the rest simply
disappeared while in Serbian hands.
Later in the month at Val dAosta in Italy, Pope John Paul II spoke
out at the genocide and publicly invoked God to strengthen the Martyred
people of Bosnia-Herzogovina.
According to media, during the first few months of the conflict in Bosnia in 1992, Serbian
forces had ethnically cleansed Bosnia by killing approximately 100,000 people and by forcing
about 3 million to flee their homes (the
war crime of depopulation).
These cases were carried out by
military, police and para-military
forces, partly aided by civilians, upon
orders and sanction of the highest
authorities.
The trial of the former President
of Yugoslavia (and later Serbia),
Slobodan Miloevi, began at the UNs
International Criminal Tribunal in
February 2002.
He unleashed a savage reign of
terror in the Balkans for a decade
following the Cold War.
He was indicted with three
major charges relating to Kosovo,
Croatia and Bosnia, of which there
were 57 counts. Some are as follows:
Lesson 7/ Types of Terrorist Acts 228
The Expulsion, from The Dance of Death by
Hans Holbein, Lyons, 1538
Depopulation of 800,000 Albanian civilians from Kosovo (1
st
Jan. to 20
th
Jun.1999)
Massacres and attacks on refugees fleeing Kosovo
Genocide in Bosnia (two counts)
Depopulation of 170,000 civilians in Croatia (Aug.1991 to Jun.1992)
Atrocities in Croatia including massacre of civilian refugees
Establishment of [Nazi style] concentration camps in Croatia
In August 2001, A Bosnian Serb General, Radislav Krstic was convicted at the Hague
International Criminal Tribunal and sentenced to 46 years imprisonment, for genocide committed
at Srebrenica.
Bosnian Serb leader Radovan Karadzic and
General Radko Mladic are also wanted at the Hague
for genocide at Srebrenica.
Media reported on a subsequent French
Government enquiry to investigate why the General
commanding the UN forces in Bosnia at the time did
not intervene to stop the genocide at Srebrenica.
The former Dutch Defence Minister, Joris
Voorhoeve, gave evidence at the enquiry and later
went on record saying that:
We [the Netherlands UN contingent] did not
stop requesting intervention [air strikes], but General
Janvier refused to offer it for reasons that have
remained unclear until this day.
In April 2002, the entire Dutch Government
Cabinet resigned over a newly released official
report, commissioned five years ago, that condemned
its failure to prevent the massacres at Srebrenica.
In 1994 to 1995, Serbian troops first
blockaded the town, a UN protected area, and then
moved in without a shot being fired.
Lesson 7/ Types of Terrorist Acts 229
On film evidence, women are shown being corralled into a barbed wire enclosure, and the
men separated, while Serb troops laughed and jeered.
The UN international criminal tribunal heard that some of the men committed suicide rather
than have their genitals, lips, noses and ears cut off and then be shot.
Film evidence shows that numbers of people lost control of their bodily functions, realising
the terror to come.
Allegations were also made of women having hand grenades forced into them and detonated
and that parents were made to kill their own children or watch Serb troops do it for them. Some who
escaped said that they were made to wait in line and watch while their friends were shot and killed
in turn.
When international investigators entered the cultural centre, they found human remains
spread about, traces of explosives, and body parts, even on the theatre stage.
The harshest criticism in the report by the Netherlands Institute for War Documentation
report was for the Dutch political and military leadership that sent lightly armed troops to Srebrenica
with ill-defined goals and a weak mandate.
Another case of depopulation or ethnic cleansing occurred in the late 1980s when Iraqi
authorities enacted a forced re-location of 500,000 ethnic Kurds and Syrians, in direct contravention
of the 1948 Genocide Convention.
Since 1967, 2500 Palestinians were deported from Israeli occupied territories, most being
accused (but not charged or convicted) of membership of terrorist groups. Several hundreds were
allowed back in 1993 after intense international pressure.
Depopulation or ethnic cleansing is a type of terrorism calculated to satisfy ethnic, political
or religious hatred, enact vengeance or to acquire land.
It is carried out upon the direct command or sanction of the highest national or defacto
authorities. De-population or ethnic cleansing, is tried as a war crime, while genocide is tried as a
crime against humanity.
Political Purges
There are times when lunacy takes over and then it is the best heads that are axed....
Albrecht Haushofer, anti-Nazi resistance fighter, executed in Moabit, Berlin in April 1945
Political purges occurred quite frequently throughout the Soviet era, but especially during the
Stalin era, in which millions of victims were despatched to the Gulag Archipelago: a grouping of
concentration camps filled with dissidents and other victims of the Soviet regimes.
Imprisonment in the Gulag was characterised variously by the following:
Release from captivity was not automatic afer time-serving
Deliberate confinement of mentally healthy dissidents in lunatic asylums
Lesson 7/ Types of Terrorist Acts 230
STALIN
IDI AMIN
Former British colonial army Sergeant, President, and mass murderer
UN
Sentences of detention with forced labour for
unspecified periods were common
Commonplace malnutrition deaths, untreated ailments
and execution-style murder
During Stalins political purges of the Soviet Military
from 1935 to 1940, he had over 600 General Officers and
Navy Flag Officers murdered, in addition to more than 20,000
other Soviet officers.
This seriously weakened the Soviet military leadership
capability, especially after Nazi Germany attacked the Soviet
Union in 1941 (Operation Barbarossa), in breach of a non
aggression pact.
Pol Pots Khmer Rouge purged Cambodia from 1975
to 1978, in a collectivisation programme, forcing millions
from to work in the countryside; between two and four million died.
Another example of a
campaign of terror through purges
was carried out by Ugandas
dictator Idi Amin, who illegally
seized power from President Obote.
Amin then carried out a
campaign of terror from 1971 to
1979 in which more than 300,000
Ugandan citizens were murdered.
Rooms in several selected
villas (where Amin would
occasionally take visitors) were
filled with dead bodies, stacked
from floor to ceiling.
The Amin reign of terror
ended with his overthrow in 1979
when Tanzanian troops invaded,
whereupon he fled and took refuge
in Saudi Arabia.
Lesson 7/ Types of Terrorist Acts 231
Wreckage of flight UTA 772. Bomb exploded in mid-air
over the Tenere dessert, Niger, in 1989.
Section 7.2 Other Crimes
Destruction or Damage of Structures, Resources, Craft and other Property
Any victim or physical target is
acceptable to terrorists, if they consider it
worthwhile and have the resources to
commit the act.
Records of terrorist acts show that
terrorists carry out almost every imaginable
type of destruction and damage under the
broad categories of:
Bombing (IED)
Arson (Incendiary)
This type of damage and destruction can
be further sub-categorised as either:
Random
or
Target Specific
The physical targets include:
Religious or Political centres Installations (e.g. oil rigs) The environment Aircraft
Cultural sites, incl. monuments Structures (buildings) Population centres Vessels
Commercial or Financial centres Natural resources Resource supplies Vehicles
The more valuable or costly the target, the more attractive the target is to the terrorists, as the
publicity, terror (extreme anxiety) and asset harm will be correspondingly greater.
An example of this is the terrorist bombing of the US World Trade Centre (New York) in
1993, where besides the six persons killed and many injured, the structural damage amounted to
US$ 600 million.
In the attacks of 11
th
September 2001, the shock, effects and costs were infinitely greater,
with thousands killed and enormous financial costs as yet inestimable.
An example of inspiring terrorist acts on structures and landmarks came from US convicted
Egyptian religious cleric, Omar Abdel Rahman.
Lesson 7/ Types of Terrorist Acts 232
The Face of Despair: Refugees outside
their burnt-out house in the Jammu and
Kashmir state (one of 8000+ cases of
terrorist arson since 1991)
Rahman stated that it was a duty to blow up the
United Nations building, the FBI headquarters, two New
York traffic tunnels and a bridge, and also to assassinate the
Egyptian President.
This illustrates that demolition of significant
structures and landmarks is a deliberate, well thought out
modus operandi (method of operation) and preference of this
particular type of terrorist, as opposed to other types of
terrorist act.
Hijacking, Kidnapping, Siege-and-Hostage Situations
Less fears he who is near the thing he fears
Samuel Daniel; Cleopatra. Act iv, sc. 1
Although popular in the 1960s and 1970s, hi-jacking
has decreased in popularity amongst terrorists.
This is due to the low chances of escape and the fact
that they may leave evidence at the scene of the hijacking
that later helps in identifying and apprehending them.
Furthermore, terrorists fear the now highly refined
counter-terrorist operations carried out by special military
formations, in which terrorists who have taken hostages are
likely to be killed when buildings, aircraft or boats are assaulted.
An exception to this are the unique, unprecedented terrorist attacks of 11
th
September 2001.
Kidnapping and its characteristics for the purposes of this course, means the following:
Abduction, usually of one but sometimes multiple individuals
The victim is carefully selected and targeted by terrorists before being abducted
The victim is held at a location unknown to the security forces
A demand is usually made by the terrorists in exchange for release of the victim
The terrorist demand is usually for release of other terrorists or payment of a ransom
The victim is usually released unharmed once the demand is met
Sometimes the victim is murdered in order to prevent later identification of the terrorists
Sometimes the victim is murdered with no terrorist demand, the objective being publicity
Lesson 7/ Types of Terrorist Acts 233
Ayatollah Khomenei
Several businessmen were kidnapped but later murdered in the 1970s and 1980s for
vengeance, notably Hanns-Martin Schleyer, by the Red Army Faction (Baader-Meinhof Gang).
Hostage taking and its characteristics, for the purposes of this course, means:
The spontaneous seizing of hostages by terrorists
The identity of the hostages was not known by the terrorists, prior to the attack
The hostages are seized and held at weapon point, under threat of harm
The hostages are used to deter immediate action or pursuit by security forces
Hostage taking often occurs simultaneously with a hijacking or a siege situation
If escaping a siege, terrorists often take hostages with them, to deter security forces action
As a result of the deposed Shah of Iran receiving medical
treatment in the US, a notorious case of hostage-taking occurred:
Iranian revolutionaries of the post-Shah regime, stormed the
US Embassy in Teheran, Iran taking 53 US Embassy staff
hostage for 444 days from November 1979 to January 1981
Eventually, after a new President was elected in the US,
Algerian mediators were able to negotiate the release of the
hostages
Another example of a siege-and-hostage situation occurred in
1980 at Princes Gate, London:
Six ethnic-Arab Iranian terrorists took 24 men and women hostage inside the Iranian
Embassy
They demanded the release of 91 political prisoners held by the Khomenei government
After five days, a hostage was shot by the terrorists
As a result, the Armys Special Air Service (SAS) Regiment assaulted the Embassy
Lesson 7/ Types of Terrorist Acts 234
During the assault, the terrorists managed to kill one hostage and wound two more
Five out of six of the terrorists were killed and one was taken prisoner
A historical (and somewhat unusual) siege case occurred as follows:
On 23
rd
January 1909, two Latvian refugees of London's East End assaulted a wages
messenger and fired shots while robbing him.
This was heard at a local Police station and police gave chase after rapidly arming themselves
(use of firearms by criminals was unheard of at that time and police were unarmed). In the six mile
chase that followed, 2 persons were killed and 27 wounded.
The Robbers were Asylum seekers who came from the Latvian refugee society in London's
East End.
Many Latvians had fled and been allowed into Great Britain to settle in London following
the suppression of the Latvian revolt of 1905.
In London however, they abused the sanctuary given them and continued revolutionary
activities, extorting funds from other refugees, under the leadership of a man known variously as
Peter the Painter, Peter Piaktow or Peters.
The Home Secretary (Interior Minister) Winston Churchill described Peter the Painter as
one of those wild beasts who in later years, amid the convulsions of the Great War, were to devour
and ravage the Russian State and people.
On the evening of 16
th
December 1910, a neighbour heard hammering caused by tunnelling
and called the police.
Several unarmed constables responded. Police Constable (PC) Bentley entered the building
rented by the Piaktow gang, and was shot dead. In a subsequent battle on the street, PCs Strongman,
Choat and Tucker were also murdered by gunfire, and a gang member named Gardstein was
accidentally shot and mortally wounded by the other members of the Latvian gang.
Peters, Vassilleva, and Dubof made their escape, dragging Gardstein along, ending up in the
room of Svaars (another Latvian anarchist). There, Gardstein, tended by a supporter of the gang, Sara
Trasslonsky, was left to die.
The murders of the policemen sparked outrage throughout Great Britain. Discovering
evidence in Gardsteins room and in receipt of information from informants, the Metropolitan Police
arrested several gang members during the subsequent weeks.
On New Years Day 1911, Charles Perelman, the gangs former landlord, informed the police
that two members of the gang were hiding at 100 Sidney Street.
By 0200 hrs on the morning of 3
rd
January 1911, 200 police officers had sealed off the block
in which Sidney Street was located. Armed police officers were posted in shops and buildings
surrounding the gangs house.
The battle started at dawn, but the gang seemed to have superior firepower and plentiful
ammunition.
Army troops were called in from the Tower of London and the Home Secretary, Winston
Churchill attended the scene.
Lesson 7/ Types of Terrorist Acts 235
Col. William Higgins, Chief of UNTSO OGL
Photo: Courtesy of Mrs. Robin Higgins (Lt. Col. USMC retired)
A company of the Army's Scots Guards
saturated the upper floors of No. 100 with
bullets.
The fire brigade tried to pass the police
barricade lines to get into No. 100 in order to
extinguish the flames of the fire that had started.
The police refused to let them through
and a heated dispute continued until Churchill
forbade the fire brigade to approach the house.
He did retain them on standby however,
in case adjacent houses became threatened by
the fire.
By this time, the fire consumed the house
and the floors collapsed. The charred bodies of
Svaars and Joseph were recovered.
The trial of the remaining gang members
was grossly mishandled, the prosecution fell to
pieces, and those on trial were released.
Peters (the most likely murderer of the
Policemen), returned to Russia and during the
Russian revolution rose high in the Bolshevik
regime, no doubt by possessing the required
character traits.
As was the later fate of so many
Bolshevik revolutionaries, Peters himself was murdered by the regime during a Soviet political purge
in the late 1930s.
An example of a hijacking where terrorists spontaneously seized hostages was the Achile
Lauro ocean liner hi-jacking in 1985. The terrorist act was planned as a terrorist mission on land,
inside Israel, but went wrong and ended in a chase onto an ocean liner, where hostages were seized
and one was subsequently murdered.
During the 1980s, different terrorist groups in Lebanon, including the Iranian-supported
Hezbollah according to media, kidnapped westerners and held them hostage, some for many years.
Victims were sometimes kept chained in darkness, poorly fed and denied medical attention
for years: One such case was that of William Buckley, US CIA station chief in Beirut, taken in 1984
and who was murdered by systematic neglect and psychological torture in 1985.
Another case was that of US Colonel William Higgins, Chief of the United Nations Truce
Supervision Organisation (Observer Group Lebanon).
He was taken hostage in 1988, murdered and hung on a makeshift gallows in 1989, and his
remains callously dumped onto a Beirut street over a year later.
For further information on the Buckley and Higgins cases, see earlier in this Lesson, under
Murder, Wounding and Torture.
A British church envoy, Terry Waite, was one of those westerners taken hostage in Lebanon.
Lesson 7/ Types of Terrorist Acts 236
UN Assistant Secretary General
(Political Affairs)
Mr. Giandomenico Picco
He was trying to mediate, having had some previous success
in this type of endeavour.
Following his release, he described the apology of one
of the terrorist kidnappers:
We apologise for having captured you. We recognise
now that it was the wrong thing to do, that holding hostages
achieves no useful, constructive purpose.
Terry Waite was released owing to the efforts at that
time, of the young and well known UN Assistant Secretary
General for Political Affairs and hostage negotiator,
Giandomenico Picco of Italy, who risked his life contacting
the abductors and being taken to their base.
Three western hostages were murdered but the others
were subsequently released in Lebanon, around the time that
covert (concealed from Congress) weapons and spare parts
sales and transfers to Iran took place from the US and Israel,
respectively.
A case of a siege-and-hostage situation by 14 Tupac
Amaru terrorists took place in Lima, Peru in December 1996.
It occurred at the residence of the Japanese Ambassador to Peru, as follows:
The terrorists burst into the residence at a cocktail party for 200 guests
They took 72 hostages
In exchange for release of the hostages unharmed, they demanded:
Release of several hundred of their jailed comrades
Transportation to a central jungle
A government commitment to change its free-market policy
Payment of an unspecified war-tax
After four months of siege, 140 Peruvian commandos stormed the residence
All hostages were rescued, but one died later
All 14 terrorists and two government commandos were killed in the operation
Lesson 7/ Types of Terrorist Acts 237
The Robber, from The Dance of Death by Hans
Holbein, Lyons 1538
Pre-selected installations or buildings are sometimes broken into by protest groups who
subsequently threaten to destroy the building if attempts to eject them are made.
These types of terrorist are not usually hard core terrorists using military weapons, but usually
seek publicity for their cause, which might be humanitarian, animal rights or similar.
After illegally occupying buildings, they sometimes destroy or damage them for publicity,
if their demands are not met.
Sometimes a siege situation can develop, which in most cases ends either in a negotiated
settlement with security forces, or very rarely, a counter-terrorist assault.
It is worthy of note that a strange phenomenon called Stockholm Syndrome sometimes occurs
in hostage cases, whereby after a period of time, the hostages illogically develop positive or
sympathetic feelings towards their captors.
The term derives from a 1973 bank robbery in Stockholm, Sweden, where hostages were
taken and the phenomenon was identified by psychologists.
Racketeering, Extortion, Drug Trafficking and other Crimes
Terrorists engage in many conventional criminal activities such as blackmail of individuals;
a threat to divulge incriminating or embarrassing information or evidence, unless a demand is met.
Demands vary from cash to information or any other resource useful to the terrorists.
Extortion is another method terrorists use to collect funds, sometimes known as protection
money.
Extortion of protection money first occurred on the large scale during the era of the US
Prohibition (1920 to 1933). The US Prohibition meant that manufacture and sale of intoxicating
liquor was illegal. It was however carried on illicitly
and known as bootlegging.
During that era, many gangsters such as the
notorious Al Scarface Capone, made colossal
amounts of illicit money from bootlegging and a
variety of constant criminal activities, including the
extortion of so called protection money, enforced by
terror.
In extortion of protection money cases, the
victims, usually community shop and business
owners, must pay a regular sum to the gangsters (or
terrorists), or suffer personal injury or damage to
their businesses.
Gangsters or terrorists extort this money,
telling their victims that it is in exchange for
protecting them from criminals.
The criminals do not exist in reality - but if
the victims do not pay protection money, the
gangsters or terrorists will inflict damage, injury or
worse.
In some areas of the dispute in Northern
Lesson 7/ Types of Terrorist Acts 238
Ireland, PIRA (Provisional Irish Republican Army) terrorists regularly extorted money from as many
businesses and shops as they could, to the point where for some of the terrorists, this criminal
activity had became their primary occupation.
Robbery and theft are other crimes committed by terrorists, usually to obtain funding.
Burglary is sometimes carried out to steal information, for blackmail or intelligence purposes. Some
terrorists traffic in illegal narcotics.
An example of a terrorist group heavily involved in narcotics trafficking is the PKK (Kurdish
Workers Party) who are responsible for large amounts of heroin smuggled into Europe, especially
Germany (See Lesson 2: Financing Terrorism through Crime and Lesson 6: Funding: Illegally
Generated and Sponsored).
Destruction or Disruption of Information and Networks
Computer information terrorism is a fairly new form of terrorism. It requires gaining
electronic access to a victims computer or computer network and inserting malicious data to change
existing data in the computer which affects either the information stored or the operating system
within which it is stored.
These types of inserted information have the purposes to either destroy, damage or disrupt
data systems. They are generally termed as viruses, malicious codes or logic bombs, amongst other
names. There are many thousands of purpose-designed viruses, all with different names. Trojan
Horse is one such type.
This type of terrorism is of great concern to those charged with securing national computer
systems. The following areas are generally recognised as being particularly vulnerable to information
terrorism:
Defence weapon systems
Telecommunications
Transportation
Water supply
Oil and gas production
Banking and finance
Electrical generation
Emergency services
Essential government functions
Lesson 7/ Types of Terrorist Acts 239
Animal Liberation Front
Poisoning of Consumer Food Products
Poisoning consumer food products is a potent but not very
common form of terrorism. It has occurred in the form of poisoning
reservoirs and food products.
This form of terrorism is committed for deterring selected
companies from certain business or marketing practices, animal
rights or simply for extortion of cash. It usually has the effect of the
consumer product being withdrawn from up to thousands of
retailers; avoiding public fear of the product can be very costly.
An example occurred in 1984, when the ALF or Animal
Liberation Front claimed to have poisoned some Mars Bars
(chocolate bars) in the UK. As a result, every Mars Bar in the UK
was withdrawn from retailers at a cost of over 3 million (approx.
US$ 4.5 million).
In 1998, ALF terrorists forced a Swiss chocolate company to halt production by
contaminating some of the companys confectionary products with rat poison and sending them to
media. The subsequent halt in production, loss in sales, and related logistical and legal activities, cost
the Swiss company US$ 30 million.
Brainwashing and Psychological Warfare
Terror closes the ears of the mind
Sallust; Catilina. Ch. 58, sec. 3
Brainwashing and psychological warfare is a very rare type of terrorism. However,
brainwashing was occasionally carried out during the Vietnam War by the north Vietnamese against
US prisoners of war. They were later filmed and televised in a disinformation campaign calculated
to portray that the war was morally wrong and that the combatants were guilt-ridden.
Another objective was to spread terror amongst US troops that if captured, they would be
subjected to brainwashing.
Psychological warfare techniques are sometimes used on captured prisoners of war and
guerrillas, in order to break their will during interrogation. Contemporary special forces training
often simulates psychological interrogation techniques, which includes periods hooded in total
darkness, submerged in water and being subjected to white sound. This form of Psychological
terrorism was also carried out on the long-term victims taken hostage between the 1980s and early
1990s in Lebanon, some of whom were kept mal-fed for years in darkness, without knowledge of
time, date or situation and with poor or no medical care.
Some were subjected to sensory deprivation (wearing of hoods, ear muffs and gloves,
subjected to white noise) and placed in very uncomfortable positions in order to enhance the effects
of pain and disorientation. More aggressive forms of mental torture were used on a few hostages,
known by a variety of names, such as psychic driving and de-patterning.
Lesson 7/ Types of Terrorist Acts 240
Threats and Hoax Threats of Terrorist Action
The terror we fear is often empty, but nevertheless it causes real misery
Schiller; Piccolomini. Act v, sc. 1, l. 105
A threat of terrorist action in this context, means a threat by a terrorist group capable of
carrying out a terrorist act, or believed by security forces as having that capability.
Sometimes, terrorists make a threat, which they are capable of carrying out, but have no
intention of so doing. Terrorists do this in order to waste the time and resources of security forces,
sometimes to cause a diversion to occupy security forces elsewhere, and sometimes to heighten terror
of an existing threat.
In achieving widespread fear, threats of terrorist action are often as effective as an actual
terrorist act. A threat moreover, does not alienate sectors of the population who might react strongly
against the bloodshed of an actual terrorist act. It is far easier in many ways to threaten than to mount
a real terrorist act.
In order to be convincing, it is crucial that the security forces believe in the ability and
inclination of the terrorists to carry out the act. Without this, the entire strategy fails. It therefore
generally works only if carried out by established and known terrorist groups.
Some established terrorist groups have an identification code word or phrase with which they
identify themselves to security forces or media, when in contact.
By this, the security forces know that it is an authentic terrorist group and not a hoax, and the
terrorist group knows that the security forces will take them seriously.
Some persons make hoax threats of terrorist action. These threats are carried out by persons
who are not known terrorists and do not possess the ability or resources to carry out the acts, such
as juveniles and students. Hoax bomb threats however, are also terrorist acts and punishable as such
in many countries.
Below are a list of characteristics and sounds that [ideally] are noted when receiving a bomb
threat, hoax or otherwise, by telephone. From the information noted, investigators can analyse many
things concerning the threat and its origin:
rnicoL-, =ccnceeivc
cn ccoceccoic
CALLERs
VOICE
enc=+iic =nceLcme, ccLciic,
cLc=nic +inc=+
r=miLi=n cn Lcw e+L++cn, Lie=, n=e=, iieeic
c=v- enc=+iic c=Lm, cnm=L cn cxci+co mLeco, cnm=L, L=ec+, =cn-
=nei, cnm=L, ecv+ n==io, cnm=L cn eLcw LcLo, mcoiLm, cLic+, wiie=cnic
e=c cn n=+ic=L cLc=n, cnm=L cn v=oco ccco mcoiLm, =ccn L=cL=cc
1==c ncccnoco 1icic ciec c Lic ccc=, cnm=L. iici cn =e=L
cevicLeL- oiecLieco &cic cn mc+=LLic +cc nccccieco oi=Lcc+
ccc+ rcLL L=cL=cc rcncic / e+n=cc wcnoe
cvvicc ecLoe
BACKGROUND SOUND cnc=L=ce cn 1n=ie
MLeic ecLLe/+cLc=icce nicic eLece, +n=me cn +n=vvic
r=in/e=cn+e cncLoe ciiLonc cn =im=Le L=Lci+cn cn nccnc=+ic=L ciec
LcLoe=c=cn e-e+cm ccmce+ic ecLoe M=ciic eic=/cce+nLc+ic wcn
Lesson 7/ Types of Terrorists Acts 241
US Embassy Nairobi, Kenya, after
bombing on 7
th
August 1988
Courtesy: FBI
US Embassy Dar es Salaam, Tanzania
following 7
th
August 1998 bombing
Courtesy FBI
A Case Study of Terrorism: The US Bombing, Nairobi, 7th
August 1998
At approximately 1030am on Friday 7th August
1998, at the US Embassy in Nairobi, Kenya, terrorists drove
into the rear parking area, near a ramp to the basement
garage and detonated a bomb, killing a total of 213 people.
Of these, 12 were US Citizens and 32 were Foreign Service
National employees (FSNEs). Additionally, 10 Americans
and 11 FSNEs were seriously injured. An estimated 200
Kenyan civilians were killed and 4,000 were injured by the
blast in the vicinity of the building. The building suffered
severe damage, especially inside.
The locally-contracted guards at the rear of the
Embassy saw the terrorist truck pull into the uncontrolled
exit lane of the rear parking lot just as they closed the fence
gate and the barrier after a mail van had exited the
Embassys garage. The truck proceeded to the Embassys
rear access control area but was blocked by an automobile
coming out of the Co-op Banks underground garage. The
blocking auto was forced to back up allowing the truck to
come up to the Embassy barrier.
One of the two terrorists in the truck demanded that
the guards open the gates. The guards refused. One of the
terrorists began shooting at the chancery and the other tossed a flash grenade at one of the guards.
The unarmed guards ran for cover in the guard booth and tried to contact the Marine Security Guard
(MSG) at their command post by radio and telephone, but
the single radio frequency and the telephone were both
busy.
The gunshots and grenade detonation caused many
employees to go to the windows to observe what was
happening. They were either killed or seriously wounded
as a result; neither the posts Emergency Action Plan nor
any relevant drills had prepared employees for actions to
take in the event of a vehicle bomb or firearms being
discharged in the immediate vicinity of the Embassy.
The Embassy had only one radio frequency and no
alert alarms for use by perimeter guards. There was a time
lapse between the time the guards saw the truck enter the
rear parking lot and the detonation of the bomb. The
inability of the perimeter guards to alert those inside the
chancery of a suspected truck bomb explosion could have
been remedied in two ways. Had the Kenyan Government
granted the Embassys long-standing request to have more
Lesson 7/ Types of Terrorists Acts 242
Passers-by rescue the wounded at the US Embassy, Nairobi, Kenya, just after the
Al Qaida attack on 7
th
August 1998, which killed 213 and wounded approximately
4000, many of them innocent Muslims
Courtesy: US Dept. of State
than one radio frequency,
the perimeter guards
would have had a
reserved frequency to
communicate with the
MSG at the command
post.
The MSG could
then have triggered the
Embassys internal alarm
system, giving personnel
time to take cover.
Secondly, either a
r a d i o e l e c t r o n i c
emergency alarm for the
perimeter guards or an
alarm button in the rear
guard booth to activate
the Embassys internal
alarm system could have
permitted the guards
there to trigger the system directly, warning employees of an impending blast. In either scenario, a
special alarm signal for taking cover does not exist at any US Embassys Selectone alarm system.
The 1980 Embassy building was constructed under pre-Inman standards (security-
construction criteria). It was located at the intersection of two of the busiest streets in Nairobi, near
two mass transit centres. It lacked sufficient distance from the streets and from adjacent buildings.
To compensate for its close proximity to the streets, the Embassy was surrounded by a 2.6
metre high steel picket vertical bar fence. An outer perimeter was established beyond the fence with
a line of steel bollards, ranging 5 metres to 18 metres in distance from the outer walls of the
chancery. The window frames were not anchored into the core structure, but the windows were
covered by 4mm Mylar protective film.
Before 7th August 1998, Nairobi was designated as a medium-threat post in the political
violence and terrorism category, and the Embassy was in compliance with that threat levels
physical security standards, except for the lack of a 100ft. clear ground distance requirement.
However, the bombing revealed that the system for determining terrorism threat levels, which in turn
determine physical security standards and procedures, was seriously flawed. Additional criteria are
now being applied to achieve a more realistic threat profile.
There were no intelligence reports immediately before the bombing to have warned the
Embassy of the attack. However, a number of earlier intelligence reports cited alleged threats against
several US diplomatic and other targets including the US Embassy in Nairobi. While all of these
reports were disseminated to the intelligence community and to appropriate posts abroad, they were
largely discounted because of doubts about the sources. Other reporting was imprecise, changing and
non-specific as to dates, diminishing its usefulness.
Lesson 7/ Types of Terrorists Acts 243
Embassy bombing victim is brought home to US Andrews
Air Base on 13
th
August 1998
Additionally, actions taken by
intelligence and law enforcement authorities
to confront suspect terrorist groups in
Nairobi, including the Al-Haramayn
non-governmental organization and the
Osama Bin Laden organization, were
believed to have dissipated the threats.
The Embassy responded to these
reported threats by increasing the number of
patrolling guards around the perimeter of
the chancery, closer monitoring of the visa
line, and additional vehicle and perimeter
searches. The Regional Security Officer
(RSO) advised personnel on security
precautions and the importance of reporting
incidents of surveillance.
She and the Marine Security Guards
(MSGs) conducted numerous emergency
react drills (with only MSG participation), and the RSO requested the Kenyan Government to
enhance security around the Embassy, to engage in counter-surveillance activities and met with the
Kenyan police to discuss their bomb reaction procedures.
The also requested and received a team from Washington to further familiarize the MSGs
and the local guards about explosive devices.
The Emergency Action Committee met frequently to review security procedures and upgrade
them.
The Ambassador cabled Washington on 24th December 1997, reviewing the threats and the
response to them by the Embassy and the Kenyan government. She pointed to certain reports about
terrorist threats aimed at the mission, as well as threats of crime and political violence, emphasising
the Embassys extreme vulnerability due to lack of distance from the streets and adjacent buildings.
She requested Washingtons support for a new chancery.
The response to the Ambassadors cable in January 1998, stated that after a review of the
threat, the posts current security rating of medium for political violence and terrorism was
appropriate, and that no new office building was contemplated.
The Department offered to send a security assessment team to assist in identifying areas
where security could be upgraded, and they found ways to reduce the number of personnel, through
re-assignments to Pretoria.
The security assessment team (SAT) arrived in March 1998. An offer by the militarys US
Central Command (CENTCOM) was also made. The SAT conducted a review of the Embassys
needs, but no report was filed by the team.
Subsequent cables from the Embassy and an interview with one of the SAT engineers
indicated that Washington was prepared to support all the posts requests for upgrades, even beyond
the normal standards required for a medium threat post.
Lesson 7/ Types of Terrorists Acts 244
A Tomahawk Cruise Missile is launched from a US
warship at an Al Qaida terrorist training camp in
Afghanistan in 1998
Courtesy: US Department of Defense
The Embassy senior management, the
RSO, and the visiting team did not particularly
focus on upgrades in the rear of the Embassy or
possible vehicle bomb attacks, but instead
concentrated on ways to reduce the danger from
crime and political violence. They approved a
fence for the parking lot in front of the Embassy,
as well as roll-down doors for the chancerys
front entrance and the rear basement garage
door. (The latter door, broken for several
months, had been replaced by a temporary two
panel swing door which remained open during
the day).
These improvements were in process and
had not been completed by the time of the 7th
August bombing. As it turned out, they would
have made no difference in mitigating the blast,
given its size. Nor would they have deterred the
terrorists from getting as close to the chancery as
they did.
In March 1998, the Department of State
issued a world-wide alert drawing attention to
an Osama bin Laden threat against American
military and civilians.
However, this alert was not accompanied
by any special warning or analysis that
embassies in East Africa might be targeted by
Bin Ladens group.
Ambassador Bushnell, in letters to the
Secretary in April 1998, and to Under Secretary Cohen a month later, restated her concern regarding
the vulnerability of the Embassy, repeating the need to have a new chancery that would meet Inman
standards. Ms. Cohen responded in June 1998 stating that, because of Nairobis designation as a
medium security threat post for political violence and terrorism and the general soundness of the
building, its replacement ranked relatively low among the chancery replacement priorities. She drew
attention to the plan to extend the chancerys useful life and improve its security, including US$ 4.1
million for the replacement of the windows.
Periodic efforts by the to gain control over the back parking lot, and thus to expand the clear
zone, met with limited success.
Efforts were made several years earlier to obtain control of all parking spaces in that area
from the Co-op Bank, this proved unsuccessful.
In late 1997, they increased the number of patrolling guards in the rear area to ensure that
unauthorized persons would not park in those spaces leased to the Embassy.
In May 1998, the Bank wrote a letter to the Embassy inviting it to share costs of installing
Lesson 7/ Types of Terrorist Acts 245
US Defense Secretary Cohen and General Shelton conduct a briefing on
response strikes in Afghanistan and Sudan
US Dept. of State
a fence along side the parking
lot and a barrier at the exit to
the street which the terrorists
entered through on 7
th
August.
The letter was never
formally answered as the
Embassy did not consider this
its responsibility, since the
fence and the barrier were not
on Embassy property and were
being installed in any case.
Also, the Embassy had
experienced difficulty obtaining
permission from the Kenyan
government for building a fence
around the front parking lot.
There was a concern
that the Bank had not received
p e r mi s s i o n f r o m t h e
government for the construction
in the back, and if US funds had been used, the government might condemn the move, bring a
lawsuit, and generate adverse publicity against the Embassy.
The Co-op Banks fence had been completed by August 1998, but the barrier intended for
the exit was lying on the ground ready for installation at the time of the bombing.
While it is uncertain whether the Embassys participation in the Co-op Banks project might
have expedited the installation of the barrier, its presence could have provided an additional hurdle
the terrorists would have had to overcome to enter the Embassys rear parking lot area.
However, even if the barrier had discouraged the terrorists from entering the rear lot, they still
could have proceeded up the street (from which they entered).
They would only need to have proceeded for another 50 feet and detonated the bomb at a
point even closer to the chancery than the back gate barrier, thereby causing as much if not more
damage to the Embassy.
That the Embassy did not seek more actively to gain control of the back lot reflected the
prevailing view in the Embassy and in Washington at that time that the crime threat was far more
serious than the terrorist threat.
This conclusion was based in part on the judgment of intelligence officials in Washington
and in Nairobi that the potential terrorist threats had dissipated by the latter part of 1997 and that no
new threat had been uncovered specifically aimed at the Embassy.
Terrorism was seen as a serious but non-specific potential threat, whereas crime, including
robbery and murder in the immediate vicinity of the Embassy, was a daily reality that posed a
continual threat to every member of the family.
The Embassys local guard program, under contract with the United International
Investigative Service (UIIS) since 1997, is one of the largest in the world. Many of the guards
Lesson 7/ Types of Terrorist Acts 246
Zhawar Kili al Badr camp west (one of three), Afghanistan. This is an Al Qaida
terrorist training camp which was targeted by US Forces after the attacks on the
US Embassies in Nairobi and Dar as Salaam
Courtesy: US Depts. of State & Defense
serving around the
chancerys perimeter
had worked for UIIS's
predecessors.
Training levels
called for in the UIIS
contract fell well short
of the specifications,
both in quality and
frequency.
Of particular
note was the absence of
training and procedures
on vehicular bombs.
Wh i l e t h e
guards were trained on
s e a r c h a n d
identification of parcel
bombs concealed on
vehicles, they were not
given any direction on
t h r e a t , s e a r c h ,
r e c o g n i t i o n a n d
reaction to suspect
vehicle bombs.
No procedures or guidelines were established that would cause guards to raise an alarm if a
strange truck pulled into the parking lot and/or up to the gate of the Embassy.
Another anomaly was that guards at Embassy residences possessed radio electronic duress
or panic alarms to activate in times of emergency while those at the chancery did not.
The local guards did not participate in emergency drills or have much interchange with the
MSG detachment.
In spite of these deficiencies, however, the guards in the rear parking lot on 7th August
performed well in refusing to permit the terrorists access to the Embassys garage. This prevented
an even greater disaster.
After the bombing, all personnel from the Ambassador on down quickly responded to care
for the wounded, account for properly, handle those who died and coordinate the myriad details of
reestablishing operations while dealing with the crisis.
In Washington, the Task Force formed in the State Departments operations centre
established immediate contact with personnel who had transferred operations from the bombed out
chancery to the USAID building across Nairobi.
The Task Force began to ascertain the extent of the damage and the casualties, and mobilized
resources to dispatch to Nairobi.
A special response team departed within about six hours of its alert time. Its aircraft broke
Lesson 7/ Types of Terrorist Acts 247
down in Rota, Spain, causing a 15-hour delay before a backup plane could arrive and be loaded.
Though the team arrived in Nairobi nearly 40 hours after the blast, its contingent brought
relief to the Embassy, assisting the Ambassador and her staff to restoring functions, restoring
communications, and aiding rescue and other emergency relief efforts.
On 9th August, another US Air Force plane with additional support personnel from
Washington broke down in Sicily and was delayed by about 8 hours before the group could proceed
to Kenya.
When the US Air Forces Nightingale medical evacuation (medivac) aircraft arrived in
Nairobi from Germany on 8th August, its load capacity prevented it from bringing needed medical
supplies already palletized and pre-positioned in Germany.
Differing reasons from medical personnel and from the US Air Force were given as to why
the medivac aircraft did not return immediately to Germany with some of the most seriously
wounded Americans.
What was clear was that there was a misunderstanding about aircrew rest requirements and
the need for pre-flight stabilization of patients by Air Force medical personnel before departure.
Kenyan medical professionals at the Nairobi Hospital where the wounded Americans were
receiving care claimed that US Air Force medical personnel were insensitive.
The first military medical evacuation did not take place until 40 hours after the bombing. A
second medical evacuation 70 hours after the bombing went much more smoothly.
A special unit of US Marines was dispatched to Nairobi from Bahrain to help provide
security for the Embassy. Their aircraft experienced delays as well.
The FBI sent 200 agents to the scene to find and detain the perpetrators of the bombing.
These groups performed well in important aspects of the crisis.
With the large influx of people from Washington and elsewhere into Nairobi, inevitable
coordinating problems with some personnel occurred; they had to be reminded more than once that
the Ambassador was ultimately in charge. Logistical facilities were overloaded.
The special response team, which normally deals with evolving terrorist crises like hostage
taking, realised that its standard personnel formation was not quite appropriate for the situation faced
in Nairobi.
In Washington, shift changes in personnel on the Task Force bought confusion and
unnecessary repetition of requests to the field. Because of the massive damage to operations and the
high number of Embassy casualties, operations were at times chaotic.
Given the extensive damage to Embassy operations and the large number of casualties, the
Task Force had to call on offices seldom used in normal evacuations and other emergencies.
Some of the logistical and coordination problems with the US Air Force could have been
alleviated if clear instructions had been provided and better liaison established in advance through
designated points of contact.
The Department of States Bureau of African Affairs has completed an after action report
from which valuable lessons learned should be instructive for the future.
Better crisis management training and contingency planning was identified as an imperative
if the Department of State is to handle mass casualties and destruction emergencies in a more
expeditious and professional manner.
It was proposed that Department of State should also explore the cost effectiveness of
Lesson 7/ Types of Terrorist Acts 248
chartering commercial aircraft in times of emergency to provide more reliable airlift.
Media attention following the bombing was immense, since Nairobi is a regional hub for the
international media.
The Embassys public affairs (USIS) officers were overwhelmed. They concentrated on
answering the queries of the international press and ignored the local press.
By the second day after the explosion, the local media focused their anger on the Embassy
in particular and the US in general.
The local press reported that the Americans were concerned only with their own people,
ignoring the plight and suffering of the many Kenyans who were killed or injured.
Had additional public affairs personnel been dispatched to Nairobi immediately following
the bombing, this media problem might have been better anticipated and lessened.
Also, the Department of State insisted on clearing in advance whether the Ambassador could
appear at press conferences and what she could say during those conferences.
These limits on the Ambassadors discretion to speak publicly, unnecessarily limited her
ability to counter the criticism in the local media.
The US board of enquiry (Accountability Review Board) made the following findings:
1. The bomb that exploded in the rear parking lot of the US Embassy in Nairobi on August 7, 1998
was detonated by terrorists who intended to cause loss of lives and destruction of property. The
incident was thus security related.
2. No recent tactical intelligence information existed to alert the Embassy to the bombing.
Intelligence received in 1997 about plans for vehicle bomb attacks or assassinations was carefully
vetted, but by early 1998 these alleged threats had been discredited. In retrospect, the Department
and the intelligence community relied too heavily on warning intelligence to measure the threat of
terrorism and failed to take other factors into account in determining and confirming in 1998 that the
threat of terrorism was only medium. Also, the Embassy was heavily preoccupied with the critical
crime level.
3. In the fall of 1997, the Embassys management, upon receiving intelligence information regarding
a potential terrorist bomb, took additional steps to upgrade security at the post. The Ambassador
alerted Washington to the Embassys extreme vulnerability and called for and received assistance
in 1998 from the Department of State for a few physical security upgrades beyond those required for
a medium threat post for political violence and terrorism. In her messages to Washington, the
Ambassador also requested that the chancery be relocated elsewhere. Officials throughout the
Department of State rejected this, citing lack of funds and the designation of Nairobi, as a medium
threat post, as an unlikely terrorist target.
4. Security systems and procedures at the Embassy were implemented well within, and even beyond,
the medium threat level established by the Department of State, although the building had virtually
no setback, having been built before the standard was established and therefore was exempted.
5. Local security guards performed as they had been instructed and refused the terrorists access to
the perimeter.
Lesson 7/ Types of Terrorist Acts 249
6. But a number of security shortcomings existed. The most critical was that no attention was paid
to vehicle bomb attacks in the Departments Emergency Alert Procedures guidance or the Embassys
security procedures and systems.
The security guards were not trained for such a contingency. They did not have alarm mechanisms
to give warning of such an attack.
There was no internal alarm signal to warn of a car bomb attack. And Embassy personnel were not
informed about what to do in case of a car bomb warning.
7. The Embassy did not have a radio frequency dedicated to security communications, which would
have enhanced security, because the Kenyan government had consistently rejected this request.
8. More rigorous efforts by the Embassy could possibly have been made to secure more control over
the rear parking lot.
But legal impediments and public relations concerns served as constraints. It is uncertain whether
additional control would have deterred the terrorists or lessened the damage from the blast, given
the lack of setback at other points around the chancery.
9. In the aftermath of the bombing, the special response teams, the medical teams, US Air Force
crews and aircraft, and others from Washington provided invaluable support to the Embassy. But
logistical problems caused delays in the arrival of people and resources.
And the massive influx of personnel from numerous US agencies into Kenya brought problems of
coordination and logistical overload in Nairobi.
Heavy media criticism in Nairobi could have been alleviated by more public affairs officers on the
scene and by giving the Ambassador more flexibility in dealing with the press.
The Departments Task Force performed valiantly under extremely difficult circumstances, but there
were problems of discontinuity of leadership and organization.
The Departments ability to handle emergencies involving mass casualties and heavy damage to
Embassy operations needs to be improved through crisis management training and better contingency
planning.
10. The Board found that no employee of the US government or member of the uniformed services,
breached his or her duty.
11. The Board found a possible breach of responsibility in the contractors administration of the
contract for the training of the Embassy guards.
But even if this training had been carried out, it would not have affected what happened in the
bombings.
12. In the review of systems and procedures required by the law, the Board found that systemic and
institutional failures in Washington were responsible for: a) a flawed process for assessing threat
levels worldwide which underestimated the threat of terrorism in Nairobi, notwithstanding the
Ambassadors repeated pleas, b) a chronic major lack of funds for building new, safer embassies,
to replace buildings like the Nairobi chancery, which, even had there been no terrorist threat, was
Lesson 7/ Types of Terrorist Acts 250
in a dangerous location and extremely vulnerable to crime and mob violence, and c) failing to
prepare for vehicle bombs by providing guidance in Emergency Action Plans to deal with such
attacks, and the warning alarm signals and systems to alert personnel to imminent bomb attacks.
13. The Board commended the Embassy personnel for their professionalism and courage in their
performance both during and after the disaster.
-----------------------------------------------------------------------
SUBSEQUENT INDICTMENTS
Osama bin Laden, Muhammed Atef (bin Ladins military commander, killed by bombing in
November 2001 in Afghanistan), Wadih el Hage, Fazul Abdullah Mohammed, Mohammed Sadeek
Odeh and Mohamed Rashed Daoud al Owhali (all of the Al Qaida terrorist network) and Mamdouh
Mahmud Salim were indicted on 4th November 1998 in the US Court for the Southern District of
New York, U.S., in connection with the 7th August 1998 US Embassy bombings in Nairobi, Kenya
and in Dar as Salaam, Tanzania.
Majority of this report: Courtesy of the US Department of State.
Lesson 7/ Types of Terrorist Act 251
0sara o|r Lad|r
Ayrar A| ZaWar|r|
Vurarrad Alel
3a|l A| Ade|
Aras A| L|o|
Arred Vorared
lared A||
Vurs|r Vusa ValWa|||
AlWar
Aodu||ar Arred
Aodu||ar
Vuslala Vorared
Fadr||
Arred Kra|lar
0ra||ar|
3re||r Arred 3a||r
3Wedar
Far|d Vorarred A||y
Vsa|ar
Fazu| Aodu||ar
Vorarred
The suspects below were sought by the US FBI after the 1998 Embassy attacks in Nairobi and Dar as Salaam
Lesson 7/ Types of Terrorist Act 252
KEYWORDS TO NOTE
Abduction In the context of terrorism, a pre-planned kidnapping. The victim is specifically selected
Deportation Depopulation (aka ethnic cleansing). A War Crime under the 4
th
Geneva Convention.
Forced removal of a person who has a legal and widely recognised right of abode or
residency, especially a citizen or a person born in the country or land from which he is
being forcibly deported. Legal exceptions are governments lawful deportation of
foreigners who have entered a nation illegally, or dispatch to origin of registered aliens
who have their residency rights withdrawn, following conviction for a criminal offence or
similar misconduct
Genocide Willful extermination of a religious, ethnic, national or racial group
Gulags Soviet political prisons / forced labour camps. The Gulag archipelago (a grouping of
similar camps) is located in Siberia
Hostage
Taking
In the context of terrorism, captives spontaneously seized by terrorists during a siege or
pursuit, to deter attack by security forces, or to use as a human shield during escape
Sensory
Deprivation
Form of mental torture. Destabilises and disorientates captive in order to break mental
resistance, by denying sensation of sound, vision, touch, smell and taste. Includes
covering eyes and ears; wearing gloves; denying food and drink. This torture is
sometimes used in conjunction with exposure to white noise
Lesson 7/ Types of Terrorist Acts 253
TERRORIST ATTACK BRIEF
Murder of UK Defence Attach Brig. Saunders, Athens, Greece
Facts of the Case: On 8th June 2000,
Brigadier Saunders was driving to work in
Athens, Greece when he stopped in traffic. A
motorcycle carrying two men drew alongside his
car and stopped. The motorcycle passenger
drew out a semi-automatic rifle and began firing.
It jammed after one shot, whereupon the
terrorist killed Brigadier Saunders with four
shots from a Colt .45 pistol.
Investigation: It was soon established that the group responsible was
the Revolutionary Organization 17 November. This is a left wing group,
formed in 1975, named to commemorate an uprising by Greek Students
who protested rule by the Military Junta in Greece during the same year.
Revolutionary Organization 17 November is anti-NATO, anti-Turkish and
anti-US. It demands: Removal of Turkish forces from Cyprus; removal of
US bases from Greece, and installation of a radical government in
Greece.
The group carried out several bombings and attacked US military bases
in 1987.
US personnel murdered by this group include:
An Army Sergeant (1990)
Defence Attach Capt. William Nordeen (1988)
Navy Captain George Tsantes (1983)
CIA Station Chief for Greece, Richard Welch (1975)
Lesson 7/ Types of Terrorist Acts 254
END-OF-LESSON QUIZ
1. Contemporary terrorist bombers prefer killing few victims and causing more structural damage.
a) True
b) False
2. Contemporary terrorists mostly prefer
a) Grenade attacks
b) Sniping
c) Bombing
3. Genocide is mass killing whether deliberate or accidental.
a) True
b) False
4. Terrorist massacres are
a) Pre-planned
b) Pre-planned or spontaneous
c) Spontaneous
5. Terrorists murder and wound
a) Victims that they do not know
b) Victims that are known to them
c) Both known and unknown victims
6. The 1948 Genocide Convention includes legislation about depopulation or forced re-location.
a) True
b) False
7. Hi-jacking in the 1990s
a) Decreased
b) Increased
c) Was at the same level as the 1970s
8. Poisoning of consumer food goods is usually carried out by
a) Animal rights terrorists
b) Ethnic or political terrorists
c) Religious terrorists
9. A hoax threat to carry out a terrorist act is in some countries punishable in the same way as an
authentic terrorist threat.
a) True
b) False
Lesson 7/ Types of Terrorist Acts 255
10. In combat, the average ratio of killed to wounded is
a) 1 : 1
b) 1 : 2
c) 1 : 3
11. Which terrorist group kidnapped western tourists in July 1995 and later beheaded a Norwegian?
a) Harkat ul Ansar
b) Al Faran
c) Jammu Kashmir Liberation Front
12. Stockholm Syndrome describes hostages
a) Hatred or aggression towards their captors
b) Traumatic Stress syndrome
c) Positive or sympathetic feelings towards their captors
13. The Gulag Archipelago is a
a) Grouping of political prisons / forced labour camps
b) Grouping of Pacific islands
c) Chain of terrorist training camps
14. Which Group carried out terrorist massacres in 1985 at Rome and Vienna international airports?
a) Fatah
b) Black September
c) Abu Nidal
15. Who murdered 9,439 Russian citizens from 1937 to 1938, burying them in 95 unmarked pits?
a) Cheka
b) NKVD
c) VV
16. Hi-jacking was popular in the 1960s and 1970s.
a) True
b) False
17. From 1971 to 1979, more than 300,000 Ugandans were murdered on the orders of
a) Jonas Savimbi
b) Idi Amin
c) Robert Mugabe
Lesson 7/ Types of Terrorist Acts 256
18. Which hostage was released through great personal risk and efforts on the ground in Beirut, by
UN Assistant Secretary General and hostage negotiator, Giandomenico Picco?
a) William Buckley
b) Terry Waite
c) William Higgins
19. Explosives (all types including grenades) are used in approximately how many terrorist attacks?
a) 20%
b) 70%
c) 98%
20. Depopulation is ordered or sanctioned at the highest level of national or defacto authorities.
a) True
b) False
ANSWERS:
1-b, 2-c, 3-b, 4-b, 5-c, 6-a, 7-a, 8-a, 9-a, 10-c, 11-b, 12-c, 13-a, 14-c, 15-b, 16-a, 17-b, 18-b, 19-b,
20-a.
Lesson 8
Terrorist Tactics and the Targets of Terrorism
Section 8.1: Terrorist Tactics
Pursuit of Political Status
Blackmail and Corruption of Officials
Covert Penetration of Security Forces and Target Circles
Provision of Clandestine Interviews with Media
Dissemination of Inflammatory Material, Disinformation and Propaganda
Breaking of Agreements
Section 8.2: Targets of Terrorism
Evaluation and Selection of Targets
Government Institutions
International and Non-Governmental (NGO) Organisations
Commercial Enterprises
Ethnic, Political and Religious Groups
Rival Criminal Groups
Individuals
Keywords to Note
Terrorist Attack Brief: Attack on US Officer's Club, Rome, Italy
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 258
Lesson 8 Scope and Objectives
Section 8.1: Terrorist Tactics
This section explains some of the tactics that terrorists use in order to enhance their acts or
objectives, such as: pursuing political status; blackmailing officials, penetrating security forces and
target circles for intelligence purposes; manipulating media for publicity, disseminating
inflammatory material, disinformation, propaganda, and breaking of agreements. The Terrorist
Attack Brief for this Lesson concerns the attack on the US Officers Club in Rome, Italy
After studying this lesson, the student should be able to:
Explain why many terrorists pursue political status
Know why terrorists try blackmailing officials and penetrate security forces and target circles
Comprehend the purpose of a clandestine media interview of a terrorist
Realise the dual terrorist objectives in disseminating inflammatory material
Understand the tactic of breaking an agreement at a point too late for the target to withdraw
Section 8.2: Targets of Terrorism
This section explains the subject of terrorist targets, including governments, international
organisations, non-government organisations, commercial enterprise, different social groups,
individuals and rival criminals.
After studying this lesson, the student should be able to:
Explain how terrorists evaluate and select a target
Cite some examples of terrorist objectives and some examples of terrorist targets
Describe current attack trends against international and non-governmental organisations
State which types of commercial enterprise are most frequently targeted and why and how
Describe examples of ethnic, religious and political disputes in which terrorism is used
Explain why rival criminal groups sometimes target each other
Describe the reasons for terrorist targeting of individuals
Recall the meaning of the words contained in the Lessons Keywords to Note table
Recall the basic facts concerning the attack on the US Officers Club in Rome, Italy
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 259
Lesson 8. Terrorist Tactics and the Targets of Terrorism
Section 8.1: Terrorist Tactics
Thus, what is of supreme importance in war is to attack the enemys strategy
Sun Tzu, Chinese philosopher. The Art of War. c 400 BC
Pursuit of Political Status
Most terrorists with demands against governments, seek special political status and
recognition. These types of terrorists experience credibility problems, as they seek special political
status from governments they mostly profess not to recognise.
The order of events that some of the more optimistic terrorist groups seek is:
Formal recognition by the government
Conferral of special political status upon the terrorist group
Government concession to terrorist demands
An amnesty for all of the terrorists
If a government begins to negotiate with terrorists, that government has afforded a degree of
political recognition to the terrorists. That is why governments strive to avoid negotiation with
terrorists or making any concessions to them.
In this context, negotiation means engaging in formal discussions to negotiate a lasting
settlement. It does not refer to siege or hostage situations whereby security forces at the scene initiate
dialogue to achieve release of hostages (sometimes known as hostage negotiation).
Blackmail and Corruption of Officials
Another tactic used to achieve terrorist goals is blackmail. Terrorists occasionally engage in
ordinary blackmail just as conventional criminals do, in order to raise funds; but sometimes also
bribery, in order to corrupt an official they have targeted or find useful for intelligence purposes.
Terrorists exploit any weaknesses that they are able to identify: They sometimes target
dissatisfied intellectuals, lonely individuals and those with financial, marital, alcohol or drug
problems, amongst other problems or weaknesses that can be exploited.
Covert Penetration of Security Forces and Target Circles
A tactic some terrorists are very occasionally able to use is the covert introduction of a
sympathetic supporter of their cause into the security forces, in order to gain intelligence on the
forces ranged against them.
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 260
This is progressively more difficult in proportion to the stage of development and integrity
of the security force. In fully developed countries, careful vetting and other types of screening and
observation practically make it impossible to infiltrate a sympathiser except perhaps at the lowest
levels of regular armed forces or police, but not into those special units dealing with anti and counter
terrorism.
In some theatres of conflict, it is not uncommon for terrorists to have previously served in
the regular armed forces now ranged against them. An example of this was the few members of the
PIRA (Provisional Irish Republican Army) that had in previous years, served in the British Army.
Such intimate knowledge of the inner workings of the security forces can be of some limited
benefit to terrorists.
In cases of terrorism in which a specific human target (who is also the victim) is selected,
infiltration of the circles of friends and acquaintances of the victim is often a terrorist objective, in
order to gain intelligence such as habits, movements and other details, which helps them plan and
execute the terrorist act.
Provision of Clandestine Interviews with Media
One relatively effective tactic used by terrorists is giving clandestine interviews to media, in
order to publicise their cause. It is an effective way of widely transmitting a terrorist agenda or
demands, and reminding the target audience. Once the interview is given, it may be passed or sold
to a wide variety of international media networks.
Carlos the Jackal (Ilich Ramirez Sanchez) conducted a clandestine filmed interview with
media during the late 1970s, in order to boost his reputation.
Providing such interviews is hazardous for the terrorist because of the risk of betrayal to
security forces, but it can achieve valuable publicity for the terrorist cause. Bin Laden is making full
use of media, periodically releasing video cassettes of interviews, re-enforcing his message.
Governments who sponsor terrorism often provide or indirectly make possible, televised
interviews for members of the terrorist groups that they sponsor.
Dissemination of Inflammatory Material, Disinformation and Propaganda
The great mass of the people...will more easily fall victim to a big lie than to a small one
Adolf Hitler, Mein Kampf
Terrorists routinely disseminate distorted information and propaganda in order to further their
cause. This is called disinformation, which is defined as knowingly passing false information to
specific bodies or areas in order to achieve a strategic effect (misinformation is innocent or negligent
passing of false information).
Terrorists sometimes disseminate inflammatory material not only to provoke a response from
groups they oppose, but also to incite hatred against them. This material can take the form of hate
messages against religious, racial or social groups.
Since the advent of the Internet, terrorists have used its easy anonymity to propagate
disinformation, propaganda and inflammatory material. It is a very effective tool due to the low
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 261
Propaganda in Northern Ireland (UK): PIRA Republican
Separatist (above) and UFF Unionist / Loyalist (right)
Crown
chances of detection and remote delivery capability, although it is becoming less secure and
anonymous with advances in security technology.
Breaking of Agreements
Terrorists frequently lie in negotiations with governments and other targets, even in everyday
dealings with members of their own group, sometimes to achieve their objective, sometimes to
inspire members of the group and sometimes for security reasons.
Terrorists cannot reasonably be expected to adhere to any form of agreement and they
frequently break them.
It would not be realistic to trust persons who are prepared to terrorise, murder and maim
innocent people, but governments and their forces, when faced with terrorists, often have little option
but to trust them in order to keep negotiations open. It is a tactic that terrorists do not hesitate to
exploit.
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 262
Lord Walter Moyne, UK Minister
Resident in the Middle East,
assassinated in Cairo on 6
th
November 1944 by terrorists from
the Stern Gang
IPS Washington
Indian Army in Kashmir; anti-terrorist bunker
Section 8.2: The Targets of Terrorism
Evaluation and Selection of Targets
There will be no justice as long as man will
stand with a knife or with a gun and destroy
those who are weaker than he is
Isaac Bashevis Singer (1904-91), Polish-born
American Yiddish writer, Nobel prize winner
(lit.)
Targets (entities to be coerced) are
carefully evaluated and selected according to
the projected terrorist ability to coerce them.
The terrorist objectives which
determine the particular choice of target may
vary considerably.
Some widely differing examples of
these objectives are as follows:
Political change Deterrent
Extortion Demographic change
Vengeance Social change
Before terrorist acts are commissioned, terrorists engage in
separate phases of selecting the target and then the type of asset harm
(Human and/or non human), in that sequence.
Government Institutions
Governments and their institutions are the most common
targets for terrorists as they possess the power to bring about political
changes.
They are also empowered to make concessions.
What many terrorists fail to grasp is the fact that most
terrorist demands are so radical and unreasonable, governments
cannot accede to them.
Should they do so, they risk loss of public confidence,
political failure and possible collapse of the government.
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 263
Ecological Action Group logo
International and Non-Government (NGO) Organisations
International Organisations such the United Nations (UN) are infrequently targeted as
organisations by terrorists, in comparison to national governments.
This is because organisations such as the UN have little or no practical authority in any
sovereign state to make and enforce political concessions or accede to terrorist demands. They exist
and function by consent and funding of the member states, whose representatives (Ambassadors)
comprise their decision-making bodies. The UN and other international organisations are therefore
not generally attractive targets for terrorists pursuing coercion as it is not possible to exploit them
to any great extent. The UN is on Al Qaidas potential attack list, but is not the highest priority.
NGO employees and their organisations are sometimes targeted by terrorists, especially those
engaged on relief, humanitarian or development projects located in remote regions of developing
countries, where terrorists kidnap and extort to grow rich from sometimes well-funded NGO
projects.
Commercial Enterprises
Commercial enterprises are sometimes targeted by terrorists,
especially with social belief or humanitarian causes. Examples of
such companies are those engaged in production of consumer goods
or medical research, in which animals are used for experimentation,
or those which for commercial reasons, are accused of over-
exploiting the ecosphere.
Such companies or enterprises are usually targeted until
either terrorist demands are met or security forces eliminate the
threat. An example of commercial concerns targeted in the US are
medical enterprises, or clinics involved in abortion, which have
been subjected to considerable attacks during the past few years. In
general, these attacks have been unsuccessful in coercing the clinics
to close and cease business.
Another example of targeting commercial enterprise, which
is growing in popularity, is that of oil exploration. Due to the often remote areas of operation, oil
companies tend to encounter security problems, where local government security forces are thin on
the ground. These companies or corporations are consequently vulnerable to sectors of local
communities who seek to extort resources or cash from them.
Terrorists engaged in this type of targeting, commonly cause asset harm in the form of
sabotage, kidnapping and extortion, in order to coerce their demands through.
Ethnic, Political and Religious Groups
The Armenian massacre was the greatest crime of the war, and the failure to act against Turkey
is to condone it . . . the failure to deal radically with the Turkish horror means that all talk of
guaranteeing the future peace of the world is mischievous nonsense
Former US President Theodore Roosevelt, May 11, 1918
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 264
Aryan Nations crest
Ethnic, political or religious groups or sects are
sometimes the targets and victims of terrorism motivated
by intolerance.
The objective in targeting such groups is to either
suppress and minimise their activity or to drive them out
to a different location and seize their assets. Inflicted asset
harm aimed at achieving this is often select murder,
random massacre, rape and torture of members of the
victim group.
Many terrorist campaigns are currently conducted
in the world for motives of religious intolerance,
sometimes by members of the same religion but from a
different sect. These campaigns can be extremely violent.
An example of such a campaign took place in
Pakistan, where some majority-Sunni Muslim groups
engaged in targeting minority-Shiite Muslim groups.
The Shiite groups in turn countered the attacks
until 1995, when the conflict escalated from infrequent sectarian style murders to low intensity
terrorism; acts became more violent and frequent.
Another example is the former Yugoslavia, where occasional religious terrorism occurred,
but escalated for several additional reasons into genocide and depopulation with the outbreak of war
in 1991.
Several continuing political conflicts in the world are aggravated by religious intolerance:
Examples are the Middle East conflict and the Kashmir conflict, where from time to time, members
of all sides target religious sites and shrines.
Ethnic groups, especially if in a minority, are sometimes subjected to terrorist attacks for
reasons of ethnic intolerance.
In the case of Rwanda in 1994, following suspension of democracy, full scale genocide was
provoked, a motivating factor being historic reasons of political and ethnic hatred of one ethnic
group by another.
The conflicts in Sri Lanka and East Timor (until independence) are other examples of
conflicts involving ethnicity.
Rival Criminal Groups
Rival criminal groups sometimes target each other in power-seeking or expansionist
initiatives whereby members of different criminal groups fall victim to each others terrorist acts,
such as assassination or bombing.
Usually, police action halts such campaigns, or a settlement is negotiated between the
criminal groups.
Examples during the past decades have occurred between organised criminal gangs in the US,
UK, Italy (especially Sicily), Japan and Russia.
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 265
Remnants of the Baader Meinhof Gang {Red Remnants of the Baader Meinhof Gang {Red Remnants of the Baader Meinhof Gang {Red Remnants of the Baader Meinhof Gang {Red
Army Faction}, sought by Police Army Faction}, sought by Police Army Faction}, sought by Police Army Faction}, sought by Police after the after the after the after the
murder of Hanns- Martin murder of Hanns- Martin murder of Hanns- Martin murder of Hanns- Martin 8chleyer on 18 8chleyer on 18 8chleyer on 18 8chleyer on 18
th th th th
October 1977 October 1977 October 1977 October 1977
Individuals
Individuals are not usually targeted
by terrorists unless they happen to be
powerful or wealthy. In those cases, they
tend to become victims as well as targets.
Individuals targeted by terrorists,
such as wealthy industrialists or
businessmen, are sometimes kidnapped
and later released after the objective is
achieved: the payment of a ransom in
exchange for the release of the hostage.
This is not always the case; in
1977, the Baader-Meinhof terrorist group
(Rote Armee Faktion or Red Army
Faction) kidnapped and held a German
businessman, Hanns-Martin Schleyer.
Baader committed suicide inside
his prison cell, in the wake of a Lufthansa
airliner hi-jacking at Mogadishu, after the
airliner was stormed by German anti-
terrorist troops.
In vengeance, other members of the terrorist group murdered their captive, Hanns-Martin
Schleyer.
On the following page are police photographs of various convicted terrorists, who were
involved in terrorist bombings (explosives offences), as a tactic to try and coerce or achieve their
objectives.
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 266
George Metesky. New York City Bomber, 1940s
Theodore Kaczynski
The Unabomber
Eric Rudolph
Atlanta pipe bomber
David Copeland
Neo Nazi nail-bomber, UK
Timothy McVeigh
Oklahoma bomber
David Gilbert
Weather Underground
Terrorists who committed bombing and explosives offences involving various targets
Courtesy: US: FBI, NYPD (1). UK: New Scotland Yard (6)
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 267
KEYWORDS TO NOTE
Blackmail Extortion of money / services in exchange for not disclosing discreditable facts
Clandestine Concealed, private, stealthy, covert, hidden or sly
Demographic Related to population, especially density and distribution
Disinformation Deliberate passing of information known to be false
Ethnic A member of a racial or cultural minority group
Misinformation Innocent or negligent passing of false information
NGO Non Governmental Organisation
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 268
TERRORIST ATTACK BRIEF
Attack on US Officers Club, Rome, Italy
Facts of the Case: On 14th April 1988, a car
bomb was detonated
outside of the front of the
US Officers Club in
Naples, Italy.
The bomb killed five
people, including a US
servi cewoman, and
injured 15 others, of
which four were US
servicemen.
Investigation: Inquiries revealed that the
Japanese Red Army (JRA) were responsible for
the attack.
JRA member Junzo Okudaira was subsequently
indicted, but remains at large.
Substantial rewards, identity protection and
relocation are offered for information leading to
his arrest.
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 269
END-OF-LESSON QUIZ
1. Many terrorists seek
a) Political status
b) No compromise in negotiation
c) Defeat of governments
2. Terrorists penetrate security forces with a terrorist or a terrorist sympathiser
a) Frequently
b) Never
c) Very infrequently
3. Distributing inflammatory material is sometimes calculated to
a) Avoid personal contact with the victims
b) Provoke a response not only from the victims, but also to incite others to hate the victims
c) Commit terrorist acts that require only very limited funds
4. Terrorists use tactics of blackmail, bribery and covert media interviews if it suits their purpose.
a) True
b) False
5. To a terrorist, when a target and victims are not the same, the target is
a) Of the same importance as the victims
b) Of less importance than the victims
c) Of more importance than the victims
6. A government can be
a) A target and a victim of terrorism
b) Only a target of terrorism
c) Only a victim of terrorism
7. The UN as an organisation (not individual staff members) is infrequently targeted by terrorists.
a) True
b) False
8. Examples of conflicts involving terrorism and ethnicity are
a) Rwanda and East Timor
b) Northern Ireland and Angola
c) Algeria and Egypt
9. Terrorism is committed by sects of the same religion against each other
a) Never
b) Always
c) Sometimes
10. Rival criminal gangs who sometimes target each other with terrorist attacks exist in
a) Japan, Malta, Jordan, Mali
b) US, Italy, Japan, Russia
c) UK, France, Cyprus, Liechtenstein
Lesson 8/ Terrorist Tactics and the Targets of Terrorism 270
11. Rival criminal groups sometimes target each other in power-seeking or expansionist initiatives.
a) True
b) False
12. What do terrorists coerce?
a) Victims
b) Targets
c) Neither
13. Terrorist objectives which determine terrorist targets, may vary considerably.
a) True
b) False
14. The Baader Meinhof Gang murdered Hanns-Martin Schleyer
a) For non-payment of Ransom
b) To coerce the German government
c) For vengeance
15. Terrorists are frequently honest in negotiations with governments and other targets.
a) True
b) False
16. If victim and target are an individual, terrorists never infiltrate circles of friends and
acquaintances.
a) True
b) False
17. Most terrorist demands are so radical and unreasonable, governments cannot accede to them.
a) True
b) False
18. Which commercial enterprise is increasingly targeted by terrorists?
a) Sporting events
b) Oil exploration
c) Confectionary industry
19. Knowingly passing false information is known as
a) Intelligence
b) Misinformation
c) Disinformation
20. Providing clandestine media interviews is not hazardous for terrorists.
a) True
b) False
ANSWERS: 1-a, 2-c, 3-b, 4-a, 5-c, 6-a, 7-a, 8-a, 9-c, 10-b, 11-a, 12-b, 13-a, 14-c, 15-b, 16-b, 17-a,
18-b, 19-c, 20-b.
Lesson 9
The Victims of Terrorism
Innocent Individuals
Military, Police, Security and Intelligence Services Personnel
Governmental, International and NGO Civil Servants
Leaders in Society
Commercial Enterprises
Democracy
Global, Regional and National Security
Societies and Environment
Rival Criminals
A Case Study: Jammu and Kashmir
Keywords to Note
Terrorist Attack Brief: Attack on CIA Officers, Langley, Virginia, USA
Lesson 9/ The Victims of Terrorism 272
Lesson 9 Scope and Objectives
This lesson explains the different types of victims of terrorism; both intended and randomly selected.
The categories of victims are explained; individuals, security, police, military and intelligence
services personnel, national leaders, government officials and criminals. The lesson also mentions
with examples, how entities and institutions such as democracy, global, regional and national
security, societies and the environment are victims of terrorism. Finally, a case study of the conflict
in the former princely state of Jammu and Kashmir illustrates in close detail exactly how victims and
society, institutions and the environment have fallen victim to terrorism and guerrilla warfare.
The Terrorist Attack Brief for this lesson is the attack on CIA Officers at Langley, Virginia, USA.
After studying this lesson, the student should be able to:
Explain why a terrorist victim may be different from the target of terrorism
Describe the different types of victims of terrorism
Name at least six national premiers or monarchs who have been assassinated by terrorists
Give reasons why security, democracy, society and the environment are victims of terrorism
Broadly describe terrorist murder and destruction of the society in Jammu and Kashmir
Recall the meaning of the words contained in the Lessons Keywords to Note table
Recall the basic facts concerning the attack on CIA Officers at Langley, Virginia, USA
Lesson 9/ The Victims of Terrorism 273
Jerusalem February 1948
Palestine Police Officers shelter family from Irgun sniper
Courtesy: IPS Washington DC
Rifle and blood-soaked field-dressings. The murder scene of a
UN soldier of the Irish Battalion in Lebanon
Lesson 9 The Victims of Terrorism
A humane and just society is not built on violence and the force of arms
Pope John Paul II
Innocent Individuals
Most victims of terrorism throughout the world continue to be innocent individuals
(especially those who are caught up in
armed conflict and subjected to
genocide and so called ethnic
cleansing).
Terrorists plan deliberately
and often kill their victims in surprise
attacks. The result is wide-scale fear by
the public, in that anywhere and at
anytime, anyone unrelated to the
terrorist or conflict may be killed or
wounded.
If members of security forces or
governments were the only victims of
terrorism, or only buildings and not
people were blown up, wide-scale fear
by the public would not be achieved.
Military, Police, Security and
Intelligence Services Personnel
The bravest are surely those who have the clearest vision of what is before them, glory and danger
alike, and yet notwithstanding, go out
to meet it"
Thucydides
Greek historian, 460 to 400 BC
Being the front-line opponents
of terrorism in many parts of the world,
these forces naturally sustain casualties
who fall victim to terrorism of many
varieties.
Lesson 9/ The Victims of Terrorism 274
Pte. Hugh Murphy, UN Interim Force in
Lebanon (UNIFIL). Ambushed at UN
Checkpoint 6-22 Delta, then abucted
and murdered in south Lebanon on 27
th
April 1981. His murderers, either from
de Facto Forces or the SLA, are still
sought.
Courtesy: Litani (UNIFIL)
The Soldier, from The Dance of Death, by
Hans Holbein, Lyons, 1538
The most hazardous of these duties is in the counter-
terrorism units that engage in sophisticated military
operations, such as hostage rescue attempts and ambushes.
The next most hazardous duty is in the military
intelligence and police anti-terrorist units, whose officers are
sometimes targets and victims of terrorists, either to
interrogate and gain intelligence from, take hostage or
assassinate.
An example of such a case occurred in the UK in
1977. Captain Robert Nairac was seconded from the Brigade
of Guards to 14 Intelligence Company, a group which works
in conjunction with the Special Air Service in Northern
Ireland in combatting terrorism.
He lost his sidearm during a struggle with several
PIRA (Provisional
Iri sh Republ i can
Ar my) t er r or i s t s
outside an Armagh inn. He was subsequently taken to a
remote area and tied to a fence for a brutal interrogation,
which apparently failed. While tied to a fence, he was then
beaten unconscious with a fence post and shot dead.
Another more recent victim was a Police Officer who
was shot and wounded in Vienna in September 1999, during
a routine police stop-check in daylight.
He was shot by Horst Ludwig Meyer, a member of
the Baader-Meinhof gang (Red Army faction) hiding in
Vienna. Meyer then made off, shortly to be intercepted and
shot dead by another police officer when he again began
firing.
On 28
th
February 2002, a bomb was detonated outside
the counter-terrorism branch of Jordans state security
organisation, killing two people.
Governmental, International and NGO Civil Servants
As media reports from time to time, Government Officials are victims of terrorism,
sometimes high level officials. An example is British defence attach Stephen Saunders.
On his way to the British in Athens on 8
th
June 2000, Brigadier Saunders was shot and
murdered in his car at a traffic halt, by two terrorists on a motorcycle.
A US Navy officer was murdered by the same group in Athens, in the same circumstances,
some years before.
Besides several other murders in addition, the same terrorist group murdered the US CIA
Station Chief, Richard Welch, in Athens in 1975. The only suspect of this group was caught in June
2002. They are probably the most successful terrorist group in history, if success is measured by
Lesson 9/ The Victims of Terrorism 275
UN Interim Force in Lebanon (UNIFIL)
UN Peacekeeping forces are lightly armed for self defence
Litani (UNIFIL)
UN Observation Posts are vulnerable to attacks
and abductions
Courtesy: J. Macmillan-Murphy
killing victims and indefinitely evading
identification and justice.
Their agenda is anti western, anti
Turkey and anti NATO. The groups name is
Epanastaiki Organosi 17 Noemvri
(Revolutionary Organisation 17
th
November).
International and NGO (Non
Governmental Organisation) civil servants are
also periodically the victims of terrorism.
Individual United Nations officials are
victims of terrorism more frequently since the
conclusion of the Cold War, from a variety of
terrorist acts including murder, hostage-taking
and bombing, generally in areas where
military conflicts are taking place.
This is because since the conclusion
of the Cold War, the superpowers relaxed
control over their client or satellite nations;
consequently many semi-official, para-
military and irregular armed forces all over the world have emerged.
Most are ill-disciplined, loosely controlled and do not hesitate to engage in terrorism and
criminality.
A notorious example occurred at Atambua in
East Timor on 6
th
September 2000 when three
unarmed and innocent staff of the UN High
Commission for Refugees (Ethiopian, Croatian and
US nationals) were murdered in a night of violence.
They were beaten and hacked to death with
machetes, clubs and knives, and then their bodies
dragged into the street and burnt.
These crimes were perpetrated by between 50
and 100 militia gang members, professing loyalty to
the Indonesian Government, that terrorised Refugee
camps, especially after future independence for East
Timor became a certainty.
Subsequently, six of these terrorists were
arrested, confessed their crimes, were charged and
appeared in an Indonesian court, potentially facing a
34 year jail sentence.
Surprisingly, the Judge handed down jail
sentences of between 10 and 20 months each. One of
the convicted told the court that he accepted the
sentence with pride because he did what he did to
defend Indonesias flag.
Lesson 9/ The Victims of Terrorism 276
US President Kennedy in Dallas
Leaders in Society
You never know whats hit you. A gunshot is the perfect way
US President John Fitzgerald Kennedy, when once asked about dying
Religious and political leaders throughout history have been victims of terrorism. Terrorists
kill leaders for personal vengeance, reasons of insanity, because they consider them dangerous to
their interests, or because they seek to introduce anarchy and revolution to replace an existing system
with a different one, by assassinating its leader.
An assassination can sometimes cause the victim to become a martyr figure and rallying point
for a movement.
Sometimes the assassination of a leader takes place after a revolution, in order to eliminate
a possible rallying figure for dissidents.
This was one of the major reasons behind the murder in captivity of Czar Nicolas and his
family in 1918 at Ekaterinburg, by Bolshevik terrorists.
Some of the more well-known cases of terrorist assassination and murder of leaders and other
prominent people during the last 150 years are as follows:
US President Abraham Lincoln, 1865
US President James Garfield, 1881
Czar Alexander II of Russia, 1881
Chief Secretary of Ireland Lord Frederick
Cavendish, 1882
President Sadi Carnot of France, 1894
Prime Minister Antonio Cnovas del Castillo
of Spain, 1897
Empress Elisabeth of Austria-Hungary, 1898
King Umberto I of Italy, 1900
US President William McKinley, 1901
Prime Minister Jose Mendez of Spain, 1912
Arch-Duke Franz Ferdinand of Austria &
Hungary, 1914
King Aleksandar I of Yugoslavia, 1934
Mohandas Gandhi, spiritual leader of India,
1948
King Abdullah of Jordan, 1951
Lesson 9/ The Victims of Terrorism 277
The King, from The Dance of Death by
Hans Holbein, Lyons, 1538
US President John F. Kennedy, 1963
King Faisal 1
st
of Saudi Arabia, 1975
President Anwar Sadat of Egypt, 1981
President Mohammad Rajai of Iran, 1981
President (Elect) of Lebanon Bashir Gemayel,
1982
Prime Minister Indira Ghandi of India, 1984
Prime Minister Olof Palme of Sweden, 1986
President Rene Moawad of Lebanon, 1989
Prime Minister Rajiv Ghandi of India, 1991
President Mohammed Boudiaff of Algeria, 1992
Prime Minister Yitzhak Rabin of Israel, 1995
President Ibrahim Bar of Niger, 1999
King Birendra Sahadev of Nepal, 2001
President Laurent Kabila of DR Congo, 2001
Commercial Enterprises
Commercial enterprises are quite frequently targeted. In most cases they are both targets and
victims of terrorism, since some are forced to close or are driven out of business. This type of
terrorism is common against those enterprises that conduct experiments upon animals, use by-
products of animals; against those clinics that provide abortion services, and those that allegedly
over-exploit the ecosphere.
In the case of other commercial enterprises, many avoid becoming victims by acceding to
terrorist demands, which are sometimes to pay off a monetary demand, or occasionally a ransom for
a hostage. Commercial companies do not always inform police authorities of pay-offs.
As mentioned in Lesson 8 (The Tactics and Targets of Terrorism), oil corporations are
increasingly targeted and are often victims. Cases of this have occurred in Libya and Nigeria,
frequently involving blown up and damaged pipe lines, in cases where the companies would not
negotiate.
Media representatives are sometimes victims of terrorism. In many countries, especially
developing countries, media that portray terrorists unfavourably are often subject to reprisal terrorist
action, such as murder and injury of their employees, arson, bombings and threats.
An example occurred in Pakistan when US Wall Street Journalist David Pearl was abducted
in Karachi in January 2002 and savagely murdered, for expressed reasons of religious and political
hatred, while conducting a journalistic investigation into terrorism.
Another way in which media is a victim (and also an unwilling accomplice of terrorism), is
as follows: The ideal of the media is to impartially disseminate news, from a neutral and apolitical
standpoint. Much terrorism depends upon media exposure, which the media must provide for ethical
and commercial reasons.
Therefore, the media is in effect involuntarily compelled to contribute to the spread of terror
(fear or extreme anxiety), partly by terrorists and partly by its own commercial objectives.
Lesson 9/ The Victims of Terrorism 278
Militia Political Poster Lebanon
Democracy
Democracy has become a victim of terrorism. Certain freedoms have been curtailed during
the past decades, but especially since the terrorist events of 11
th
September 2001, because of
increased security precautions, which prevent many terrorist threats, but have not entirely eliminated
them.
Air travel throughout the world, with its attendant delays owing to security precautions, is
an example of a democratic casualty. Democracy is a victim because it is a soft target. Totalitarian
regimes are rarely victims or targets of terrorism, because they will simply not tolerate it. Personal
freedoms are subordinated to public safety and justice priorities.
Many governments in the developing world are authoritarian to varying degrees, but most
lack the capability to significantly suppress internal terrorism.
There are often a combination of reasons for this such as:
Terrain and infrastructure of the country
External sponsorship of the terrorists
Public terror and sometimes a degree of public sympathy for the terrorist cause
However, not all such governments are unable to suppress or eliminate terrorism. Egypt is
an example where firm and skillful measures have resulted in a 66% reduction in those killed by
terrorists from 1997 to 1999.
Another example of such a government is Syria. It is noteworthy that Syria stood accused by
the US of actively sponsoring terrorism for many years, up until 1986. Syria is still accused by the
US of harbouring terrorist groups, despite passing intelligence (gathered through surveillance of Al
Qaida associates) to Washington, which saved US lives.
Syria provides sanctuary to several exiled Palestinian groups accused of terrorism (and some
other regional dissident groups), pending implementation of
UN Resolutions to return their land.
Domestically, the Syrian government refuses to
tolerate terrorism and especially expression of prejudice
towards any religion. This is reflected by the fact that the Vice
President, in a predominantly Muslim country, is a Christian.
In 1982, Muslim Brotherhood (Iqhwan ul Muslimeen)
terrorists, with a measure of foreign manipulation, staged a
full scale uprising in the west Syrian province of Hama; it was
forcefully suppressed by the Syrian army and air force.
Reportedly, between 5000 and 10,000 people died as
a result; a heavy human price to pay for counter-terrorism.
Lesson 9/ The Victims of Terrorism 279
Domestically however, it was painfully viewed as the only alternative to Syria becoming a
sequel to the tragedy of neighbouring Lebanon, which was covertly manipulated into civil war (to
an extent by foreign powers) for reasons of political, economic and commercial exploitation.
The facts of Lebanons civil war are as follows:
It lasted for 15 years from 1975 to 1990
Between 130,000 and 150,000 people were killed
Resulting war damage was estimated at between US$ 25 billion and US$ 30 billion
Over 100 identifiable factions, militias, guerrilla and terrorist groups took part
National peacekeepers came from France, Iran, Italy, Saudi Arabia, Syria, UK and US
The UN stationed approximately 6000 soldiers there in an Interim force (UNIFIL)
Lebanon was subjected to underhand political manipulation and intrigue by several countries
The war was artificially stimulated and prolonged by unscrupulous politicians both from
without and within, also by drug traffickers and those exercising control over illicit
commerce
At times, the Lebanese civil war was used as a testing ground for weapons, by unscrupulous
arms dealers in league with some foreign and domestic politicians
At a news conference on 21
st
June 2002, the President of the UN Security Council (and
Syrian Foreign Minister), Farouk al-Sharaa, was asked about media reports concerning Syrian aid
in preventing an Al Qaida attack on US troops. He would not confirm security details, but
acknowledged that Syria had helped in saving American lives, adding We have done that because
this is a matter of principle. We are against terrorism, and at the same time the Americans know that
we differentiate between terrorism, which we condemn, by Al Qaida, and the resistance, which we
support, in the occupied (Palestinian) territories against (Israeli) occupation.
He went on to strongly deny that Syria supported terrorist organizations like Islamic Jihad
and Hezbollah, adding that, Syria has taken in about 400,000 Palestinian refugees who have the
right to express their political opinion.
He said, Palestinian organizations dont operate from Syria although they have press
offices there. They dont cross the border and dont have to do that because ... all operations by the
Palestinians are engineered, planned and executed inside the occupied territories. Syria has nothing
to do with all these steps.
In the region, uprisings staged by terrorist groups are currently occurring in Egypt and
Algeria, despite sometimes quite effective, repressive anti-terrorist measures.
The terrorists receive covert aid and sponsorship from dissidents, networks like Al Qaida
and certain foreign governments.
The Egyptian government is currently having some measure of success in containing
domestic terrorism, but the Algerian government is struggling very hard against a similar but more
Lesson 9/ The Victims of Terrorism 280
virulent terrorist campaign, with far less assistance than it deserves from the International
community.
Global, Regional and National Security
Except for some very short but extremely tense moments during the Cold War, global
security has never faced such serious threats as this time.
This is due to many different and sometimes seemingly unrelated factors, but including:
Widespread human rights abuses
Widespread and extreme global poverty
Genocide occurring more frequently and not necessarily subject to intervention
Member States unevenly implementing internationally agreed UN Resolutions
A global greed for domination and wealth, dwarfing even the colonial period in comparison
An increasing acceptance / acquiescence towards states acting outside of international law
International inability or unwillingness to adequately fund and support UN activities
Weapons of Mass Destruction in the hands of so called pariah states
Successful attacks by highly covert, ruthless and sophisticated transnational terrorists
Unprecedented new levels of destruction and sophistication in transnational terrorist attacks
Perceptions amongst sizable amounts of the global population, of instability, greed,
domination, double standards, an absence of justice and integrity, and of being
disenfranchised
Ruthless use of some sectors of the media, for political disinformation purposes
Significant symptoms which illustrate the threat to global security are as follows:
For several years, ruthless terrorists (Al Qaida) openly established themselves in
Afghanistan
Al Qaida was hosted by the illegal (internationally refuted) defacto Taliban government
Through religious bigotry and callousness, the population was decimated and oppressed
Al Qaida dominated Taliban, forming in effect, the first state governed by a terrorist group
National security has steadily declined in many countries over the past forty years, partly
owing to the new and potent type of terrorism which emerged in the 1960s, with the removal of the
constraints of the colonial era, but also on account of the withdrawal of superpower support and
Lesson 9/ The Victims of Terrorism 281
1920s Chicago cartoon
Chicago Historical Society
control of satellite nations following the conclusion of the Cold War.
This situation became worse in the 1990s, with the firm emergence of transnational terrorists
such as Al Qaida (founded in 1988) - a new, loose, and ever-evolving network coalition of terrorists
(many transitory), characterised as follows:
CHARACTERISTICS OF TRANSNATIONAL TERRORISTS
[OF THE TYPE THAT PROJECT RELIGION AS MOTIVE]
Fanatically dedicated:-
non-negotiable and
practically incorruptible
Intelligent Cunning Resourceful
Practically impenetrable
circles and associations
Imaginative Wealthy Ruthless Savage No fixed base
They have no conventional terrorist group affiliation and very few, if any, tangible activity patterns. They
are very conscious of security (avoiding covert communications monitoring) and capture
Many are overtly sanctimonious and display great piousness. They freely project that killing innocent victims
(including co-Muslims) is part of a Holy duty, in order to achieve their goals
They are informally and spontaneously supported when need be, by global networks of sleeper type
agents and trusted members of disenfranchised or alienated communities
Terrorism is sometimes a cause of bi-lateral and regional tensions, which occasionally erupt
into conventional conflicts. National security in certain regions, such as the Middle East and the
Indian sub-continent, is seriously compromised as a result of terrorism, especially as it is sponsored
and supported by governments, India and Pakistan being a recent example, mentioned in the media.
Rival Criminals
You can get a lot farther with a kind word and a gun than a kind word alone
Al Capone (1899-1947), U.S. Gangster
Criminal groups have been mentioned
in Lesson 8 as targets of terrorism;
specifically from rival criminal gangs.
Usually the victims are the lowest
members in the criminal group, who are killed
in a cycle of alternating murders, known as
gang warfare, which often involves bombing,
assassinations, abductions and drive-by
shootings.
Sometimes, however, competition for
territory results in one group assassinating (or
trying to assassinate) the leader of a rival
group in order to take over his territory and
illicit profits.
This type of terrorism characterised
the organised criminal gangsters who
terrorised several US cities during the
prohibition era.
Lesson 9/ The Victims of Terrorism 282
Al Capone
Courtesy: Chicago Police Dept.
Eliot Ness. The Treasury Department (Bureau of Prohibition)
Agent that brought Al Capone to justice, signalling the beginning
of the end for the kind of terrorism that involved using machine
guns and bombs in the streets of Chicago
Courtesy: US Bureau of Alcohol, Tobacco and Firearms
Prohibition was a period in the US when intoxicating
liquor, except limited amounts of beer brewed domestically
and consumed there, was banned, between 1919 and 1933.
Notable gangsters who periodically terrorised some of
the major US cities, especially Chicago, with bombings, car
chases when exchanging automatic fire, murders and machine
gunnings on the streets, included:
Al and Ralph Capone, John Dillinger, Legs Diamond, Hymie
Weiss, Bugs Moran, Franky Yale, Tony Arccardo, Jack
McGurn, Dutch Schultz, Tony Lombardo, Meyer Lansky,
Johnny Torio, Jack Guzick, John Scalise, Dion OBanion,
Paul Ricca, Joe Masseria, Sam DeStefano, Albert Anselmi,
Pretty Boy Floyd, Lucky Luciano, Frank Nitti and Jackie
Cerone.
Bootlegging made the financial foundations of
contemporary US organised crime and can be compared to the
criminal wealth and power generated in later decades by
narcotics trafficking.
i.e. The criminal income of Alphonse Capone in 1930, was estimated at US $100,000,000 (one
hundred million dollars) per year.
Al Capone was eventually brought to justice by a Treasury Agent named Eliot Ness, who,
with his hand picked team, convicted Al Capone for tax evasion.
Bootlegging in Chicago, USA was characterised by repeated rival gang shootings, car chases
with police and rivals through the city streets and mobile shooting exchanges using military sub
machine guns and pistols, leaving a trail of dead and wounded.
This intermittent terror
culminated in the notorious slaughter
of seven rival criminals on 14
th
February 1929 in Chicago.
The slaughter is known as the
St. Valentines Day Massacre.
Gangsters dressed in uniforms and
posing as police, raided a rival
bootlegging factory of the Chicago
North Side Gang.
The bootleggers dropped their
guns, believing that police were
conducting a raid, only to be lined up
against a wall and shot to death with
machine guns and a shotgun.
Contemporary organised
criminal gangs, most notably in Italy,
Japan, Russia, some South
Lesson 9/ The Victims of Terrorism 283
St. Valentines Day Massacre, Chicago. 14
th
February 1929
Chicago Historical Society
Near Muzaffarabad in Azad Kashmir: The Old Domel
Bridge, next to the Police Station where Militants
would go to hand over their green Jihad card and
collect their weapons. They would then be
transported to a staging area, from which they would
depart on an infiltration mission, crossing the cease-
fire line (Line of Control) into the Indian side of
Kashmir
G. Hanif
American countries and the US, target
each other from time to time, but on a
less frequent and publicised scale, and
without causing the degree of public
terror generated by the prohibition era
gangs.
A Case Study: Jammu and Kashmir
Many conflicts in the world are
characterised by both guerrilla warfare
a n d t e r r o r i s m, o c c u r r i n g
simultaneously.
It is sometimes difficult to
segregate terrorist acts from those of
the guerrilla.
Some guerrillas adhere to
military warfare principles, while other guerrillas sometimes also commit terrorist acts.
Yet others involved in such conflicts commit only terrorist acts. All of these categories are
found in the conflict in Jammu and Kashmir (disputed by India, Pakistan, Militants and Counter-
Militants who desire either full independence or
accession to either India or Pakistan).
Jammu and Kashmir has been an ongoing
conflict since 1947; the harm to the populations
and damage to the infrastructure is beyond
estimation.
In that a solution has not been found, it is
a notable example of political intransigence, and to
an extent, obstinacy and callousness, for which the
populations have paid and continue to pay a very
high price.
Jammu and Kashmir (often termed in an
abbreviated form as Kashmir) is one of 560
former Princely States which mostly chose
accession to either India or Pakistan in 1947 under
the Independence Act, upon the lapse of the
British Crown and paramountcy.
Kashmir is disputed by three main parties;
India, Pakistan, and a segment of the several
Kashmiri populations that demands total
independence from both India and Pakistan, under
pre-independence pledges and legislation.
Lesson 9/ The Victims of Terrorism 284
Kashmiris in the ruins of their burnt out home - political arson
Courtesy: KLC
Pakistani President Musharraf with US Defence Secretary
Rumsfeld at the Pentagon in February 2002
Courtesy: US Dept. of Defense
The remaining segments of
the Kashmiri populations support
and seek accession to either India or
Pakistan and support those
governments positions on Kashmir.
A very small number of
intelligentsia, known as Pandits
(Panun Kashmir), seek their own
independent country within the
confines of Jammu and Kashmir,
whatever its eventual fate may be.
Jammu and Kashmir is
divided by a cease-fire line (called
the Line of Control, Line of Actual
Control or LoC), arising from the
several wars between India and
Pakistan. The cease-fire line divides
Pakistani and Indian administered
or controlled sectors of Kashmir; roughly speaking, Pakistan controls the western part and India
controls the eastern part of Jammu and Kashmir.
Some guerrillas and terrorists originate and fight from inside the Indian controlled part of
Kashmir (known as the JK State) against Indian security forces, which at times number half a million
men of many different types of unit.
Many guerrillas and terrorists however, cross the cease-fire line from the Pakistan controlled
part of Kashmir (known as Azad or liberated Kashmir, that has its own semi-autonomous
government) and into the Indian side to fight. The number of guerrillas and terrorists (there are both,
all called Militants) present at any one
time on the Indian side of the cease-fire
line fluctuates between an estimated
4000 and 8000.
The Jammu and Kashmir state
has been disputed since 1947; the conflict
has fluctuated in intensity ever since. The
last major escalation of guerrilla warfare
and terrorist activity occurred in 1989
and continues until today, with a slight
lessening of activity during the winter
months.
The two (now nuclear) nations
have fought three conventional wars over
this former princely state since 1948,
between which, several protracted
artillery duels have occurred.
Lesson 9/ The Victims of Terrorism 285
During the summer of 1999, tensions rose (as they tend to, after the winter thaw) and an
artillery duel took place. The episode culminated in the shooting down of a Pakistani Air Force
(PAF) Fighter aircraft. Prior to the events of 11
th
September 2001, tensions again rose to a near war-
footing and again in May 2002, during which time Pakistan test-fired a missile.
In early 2002, President Musharraf of Pakistan ordered the ISI (Pakistans Inter Services
Intelligence) to cease all training and aid to Kashmir militants, to assist US anti-terrorism coalition
efforts.
That alone is unlikely to halt the conflict as, despite an informal control over the Azad
Kashmir Government (Azad Kashmirs western perimeter is the ceasefire line), it is a large
continent, the ceasefire line is 800 kilometres of mostly unfenced rough terrain and the militant
movement is popular and widespread.
Moreover, Pakistan now has less influence over the Militants on the Indian side of the
ceasefire line. The results of shutting down aid to militants on the Pakistan side of the ceasefire line
remain to be seen.
The scale of the damage to the population, environment and social structures is apparent from
the statistics which follow.
Many of the killed are victims of terrorism, committed upon occasion, by all of the sides in
the conflict.
The figures are very close approximates and span the latest ten-year period of resurgence in
guerrilla warfare and terrorism, from 1989 to 1999, with some statistics reaching up to 2000. This
resurgence is also known under its military name of Operation Topac.
Operation Topac is the plan conceived by a former President of Pakistan, General Zia ul Huq,
assisted by some religious clerics, especially Maulana Abdul Bari of the Jamaat i Islami (Islamic
Group).
Operation Topac has marginally changed over the decade since it was implemented, in order
to adjust to new challenges, but remains essentially unchanged, except for media reports in early
2002 to the effect that Pakistan had ordered a cessation of further training of insurgents in the
Kashmir conflict. This follows talks with the US, concerning terrorism and the conflict in Jammu
& Kashmir.
Operation Topac is (according to media):
A five-phased plan with the overall objective of ejecting / separating India from all parts of
Kashmir. The final phase is to deploy nuclear weapons, should all the other phases fail. Phases one
and two are currently in operation. The main two phases are as follows:
Phase 1 is to launch a political campaign, internationalising the dispute and Islamicising it.
Phase 2 is to wage Jihad, promoting militancy (local term for guerrilla warfare and terrorism)
This includes recruiting (some Internationally), training, arming, deploying and remunerating
militants (guerrillas and terrorists).
Phase 2 is (or was) effected by the Inter Services Intelligence with assistance from the Army,
Special Service Group, the Police and other agencies (as mentioned, according to media reports in
early 2002, the Pakistani Government ordered ISI to cease operations, so this phase may be frozen).
Lesson 9/ The Victims of Terrorism 286
Overall, the intolerable price paid in this conflict, during a ten year period, is as follows:
Casualties: Killed
Civilians
7,124 Civilians were killed. Of these, 4,050 were killed by guerrillas and terrorists. Of the
remainder, the majority were killed in cross-fire, 353 adults and 200 schoolchildren were burnt to
death, 354 persons were tortured to death and 265 persons were forcibly drowned.
Guerrillas and Terrorists
7,932 guerrillas and terrorists were killed, the vast majority in armed combat against Indian
security forces, but also some allegedly from torture and killing in over 100 interrogation centres,
located in seven main cities / towns, in the west of the Jammu and Kashmir State where the
insurgency is most intense. The interrogation centres are run and operated by the Border Security
Force (BSF), Jammu and Kashmir Police (JKP), Central Reserve Police Force (CRPF) and some by
units of the two Indian Army Corps deployed in the JK state.
Indian Security Forces
11,625 members of the Indian Security Forces were killed, belonging to a large variety of
Indian Army units, Police formations, Border Security Force units, Special Forces and Counter
Militant forces (former guerrillas and terrorists who have changed sides). Of the 11,625 killed, 134
were Army Officers, 150 were Army non-commissioned Officers and 1872 were Army Privates.
Total Killed in the Conflict
In 1998, media reported 34,000 (approximately) killed during the period 1989 to 2000 in the
Jammu and Kashmir conflict (BBC media, 1998). In May 2002, media (CNN) reported with an
updated figure that at least 60,000 people had been killed during this period.
Casualties: Wounded, Maimed, Raped, Tortured and Injured
Wounded
12,220 were wounded, of which 8065 were civilians and 4155 were members of the Indian
Security Forces.
Serious Injuries
15,311 persons from all parties and sides suffered serious injuries.
Juvenile Torture Victims
11,729 juveniles suffered physical torture during interrogation.
Children with Broken Limbs
2,038 children suffered broken limbs.
Women Raped
2,837 women were raped.
Persons Deliberately Crippled
766 persons were deliberately crippled.
Lesson 9/ The Victims of Terrorism 287
Missing and Displaced Persons
Abductions
2,503 persons were abducted.
Missing Persons
68,000 cases of missing persons were reported.
Refugees
29,035 extended families (407,670 members) were forced to flee on account of violence from
various parties to the dispute and became refugees.
Persons Underground
95,000 suspects were listed as wanted, but went underground to evade arrest.
Suspects held without Trial
43,390 persons were held without being charged or brought before a judge.
Captured Guerrillas and Terrorists
Guerrilla and Terrorist Suspects Arrested
30,000 actual and suspected guerrillas and terrorists were captured or arrested.
Guerrillas and Terrorists in Prison
Between 1000 and 1500 guerrillas and terrorists were sentenced to imprisonment.
Guerrillas and Terrorist Surrenders
2,217 guerrillas and terrorists surrendered to Indian security forces.
Guerrillas and Terrorists Turned
Between 3000 and 5000 guerrillas and terrorists changed sides after apprehension by Indian
security forces. They are called Counter-Militants.
Guerrilla and Terrorist Attacks
Guerrilla and Terrorist Attacks
12,000 (approximately) guerrilla and terrorist attacks took place against Indian security
forces, civilians, buildings and resources.
Explosions
6,551 explosions occurred as a result of guerrilla and terrorist bombs, rockets, mortar rounds,
mines and hand-grenades.
Lesson 9/ The Victims of Terrorism 288
Rocket Attacks
547 attacks were made by guerrillas and terrorists using hand-launched military rockets and
rocket-propelled grenades.
Damage Caused to Buildings
Public Property
Property damage caused by all sides in the conflict amounted to the value of US$103 million.
Schools and Hospitals
189 schools and hospitals were damaged.
Bomb-Damaged
194 buildings were damaged by guerrilla and terrorist bombs.
Private Dwelling houses
8,093 houses were destroyed by fire and 16,129 were damaged.
Shops
4,831 shops were damaged and destroyed by fire.
Religious Temples
132 religious temples were damaged.
Damage to Livestock and the Environment
Cattle
1,361 cattle were burnt to death both deliberately and as a result of combat.
Food and crops
Crops valued at US$ 1.22 million were destroyed by fire, deliberately and as a result of
combat and armed exchanges.
De-Forestation
Forested trees to the value of US$ 1.1 million were destroyed by fire, deliberately and as a
result of combat.
Miscellaneous
Missionary Schools
490 missionary schools were banned (closed by force).
Lesson 9/ The Victims of Terrorism 289
Daily Newspapers
3 daily newspapers were banned.
Funding of Guerrilla Warfare and Terrorism in the Jammu and Kashmir Conflict
It is reported by media that over US$ 1.5 million per day is spent sponsoring guerrillas and
terrorists in the Jammu and Kashmir conflict. A proportion of these funds originates from profits
arising from cultivation and sale of illegal narcotics, generated by countries bordering and near to
India. Other financial support allegedly comes from government and private sponsors from several
countries in the region of Kashmir, middle-east, the Arabian gulf and the north of Africa.
Indian Security Commitments in the Jammu and Kashmir Conflict
Approximately 400,000 Indian security force members are on duty in the Jammu and
Kashmir State, on the Indian side of the cease-fire line (LoC). They increase to 600,000 during local
election periods.
Security Forces consist of members of the police, border security, specialist and para-military
forces. In addition, two Army Corps are deployed in the state, partly engaged in counter-terrorism,
but mainly to face the Pakistan Army on the other side of the cease-fire line in Azad (liberated)
Kashmir. From 1989 to 1998, 174 personnel of the Indian security forces were indicted in India for
human rights violations in Kashmir, of which 32 were Army Officers.
_________________________
Inter-Services Intelligence (ISI)
To assist the international anti-terrorist coalition after 11
th
September 2001, Pakistans President
Musharraf announced that he stood down ISIs Joint Intelligence North to a passive Intelligence role.
Lesson 9/ The Victims of Terrorism 290
KEYWORDS TO NOTE
Assassination Murder by surprise assault, often publically, politically or with treachery
Human Rights Rights of each human being to freedom and justice, according to the Universal
Declaration of Human Rights. All nations have ratified this at the UN
Intolerance Inability or unwillingness to tolerate, treat fairly or accept
Militant An irregular combatant or one who supports irregular armed struggle
Militia A domestic military force made up of civilians, usually raised in emergencies
Tyranny Unjustly controlling, restraining or banishing of people, freedoms, or beliefs
Victim A being subjected to death, suffering or ill treatment
Lesson 9/ The Victims of Terrorism 291
TERRORIST ATTACK BRIEF
Attack on CIA Officers, Langley (McLean), Virginia, USA
Facts of the Case: On the morning of
25th January 1993, a terrorist got out
of his car near the CIA Headquarters
entrance at Langley.
He approached a number of cars of
CIA officers waiting to enter the
Headquarters complex for the
workday, and fired an AK 47 assault
rifle (sub machine gun) at them.
The attack killed two CIA officers and wounded three others
nearby.
The terrorist then fled the scene.
Investigation: Subsequent enquiries and operations involving
CIA, FBI and Afghans led to the arrest of Mir Aimal Kasi in
Pakistan, near the boarder with Afghanistan.
Kasi was extradited to face trial in the US.
Admitting the crime, he claimed it was retaliation for the US
position on Muslims in the Middle East and Iraq.
He was convicted and sentenced to death for capital murder in
November 1997.
Lesson 9/ The Victims of Terrorism 292
END-OF-LESSON QUIZ
1. Most victims of terrorism are
a) Innocent random civilians
b) Members of security, intelligence, police and armed forces
c) Politicians and diplomats
2. The most hazardous duties are undertaken by
a) Police anti-terrorist squads
b) Intelligence organisations
c) Counter-terrorist special forces
3. Counter-terrorist operations include
a) Hostage-siege assaults, ambushes and sabotage of terrorist weapons caches
b) Legal prosecution of terrorists
c) Propaganda activities against terrorists
4. UN staff are victims of terrorism far more frequently, since the conclusion of the Cold War.
a) True
b) False
5. Societies political or religious leaders are sometimes assassinated by terrorists
a) To elicit widespread public fear and coerce goals
b) Who are mostly personal opponents of the victim
c) Because they are considered dangerous, or to provoke anarchy
6. The following commercial enterprises are increasingly victims of terrorism
a) Airlines
b) Oil corporations
c) Stock markets
7. One reason why democracy is a victim of terrorism is because
a) Terrorists cannot attack authoritarian regimes
b) Penalties for terrorism are mild in democracies
c) Of institutionalised travel and shipping delays for anti-terrorist checks
8. In Kashmir, how much is spent fighting against how many Indian Security Force members?
a) Half a million US dollars per day again 150,000 members of the Indian security forces
b) 1 million US dollars per day against 250,000 members of the Indian security forces
c) 1.5 million US dollars per day against 400,000 members of the Indian security forces
Lesson 9/ The Victims of Terrorism 293
9. US Wall Street Journalist David Pearl was abducted in January 2002 and savagely murdered in
a) Kabul
b) Karachi
c) Kandahar
10. The most successful terrorists in history (only one suspect caught in 30 years) are
a) Euzkadi Ta Askatasuna (ETA or Basque Fatherland and Liberty)
b) Epanastaiki Organosi 17 Noemvri (Revolutionary Organization 17th November)
c) Ethniki Organosis Kyprion Agoniston (EOKA or National Organization of Cypriot Fighters)
11. In September 1999, a Viennese policeman shot dead Horst Ludwig Meyer of which group?
a) Committee for the Liberation of South Tyrol (Befreiungs Ausschuss Sudtirols)
b) Bavarian Liberation Army (Bayouwarische Befreiungs Armee / BBA)
c) Baader Meinhof Gang (Rote Armee Fraction / Red Army Faction / RAF)
12. Operation Topac concerns
a) Liberation movements in Iraq
b) Militancy in Kashmir
c) Libyan training camps for terrorism
13. Al Qaida dominated Taliban, forming in effect, the first state governed by a terrorist group.
a) True
b) False
14. How many identifiable factions, guerrilla and terrorist groups fought in the Lebanese civil war?
a) Between 20 and 50
b) Between 50 and 100
c) Over 100
15. Terrorists from which group murdered UK Captain Robert Nairac of 14 Intelligence Company?
a) UDA (Ulster Defence Association)
b) PIRA (Provisional Irish Republican Army)
c) UFF (Ulster Freedom Fighters)
16. Since the Cold War, the superpowers relaxed control over their client or satellite nations.
a) True
b) False
17. Between 1865 and 2001, how many Kings, Presidents and Prime Ministers were assassinated?
a) Between 8 and 12
b) Between 13 and 20
c) At least 23
Lesson 9/ The Victims of Terrorism 294
18. On East Timor in September 2000, three unarmed UNHCR staff were brutally murdered by
a) Militia gang members, loyal to the Indonesian Government
b) The Revolutionary Front for an Independent East Timor (FRETILIN)
c) Ordinary criminals
19. Anti-terrorism measures in Egypt resulted in what reduction of those killed from 1997-1999?
a) 23 %
b) 66 %
c) 95 %
20. Unscrupulous foreign and domestic politicians artificially stimulated the war in Lebanon.
a) True
b) False
ANSWERS: 1-a, 2-c, 3-a, 4-a, 5-c, 6-b, 7-c, 8-c, 9-b, 10-b, 11-c, 12-b, 13-a, 14-c, 15-b, 16-a, 17-c,
18-a, 19-b, 20-a.
Lesson 10
Terrorism and the Cold War; Terrorism and the Media
Section 10.1: Terrorism During the Cold War
Sponsorship
Organisation and Training
Coalitions
Section 10.2: Terrorism Since the Cold War
Resumption and Re-alignment
Loss of Control
The Intelligence and Security Communities
Nuclear Terrorism
New Forms of Terrorism
The New Wave of Transnational Terrorism
Section 10.3: The Media and Terrorism
Media: A Two-Edged Sword
Excessive Publicity
Media Complicity
Professional Ethics of the Media
Condemnation of Terrorism
Keywords to Note
Terrorist Attack Brief: Attack on MI 6 Headquarters, London, UK
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 296
Lesson 10 Scope and Objectives
Section 10.1: Terrorism During the Cold War
This section describes terrorism during the Cold War, explaining sponsorship of terrorists and
guerrillas by the protagonists and the political reasons behind it. To fully appreciate this, a very basic
political explanation of the Cold War is first given. Several authentic cases of sponsorship are
outlined. A notable case-study is provided concerning the coalition raged against soviet forces in
Afghanistan. The Terrorist Attack Brief for this Lesson is the attack on MI 6 Headquarters, London.
After studying this section, the student should be able to:
Understand the reasons why the Cold War occurred
Describe how superpower coalitions emerged to sponsor terrorism and guerrilla warfare
State what the primary objectives for superpower were, during the Cold War
Understand how religion was artificially manipulated to motivate terrorists and guerrillas
Explain how protagonists tried to distance themselves from overt sponsorship of terrorism
Discuss a case of government sponsorship of guerrilla-terrorism in the Cold War
Section 10.2: Terrorism Following the Cold War
This section explains the period after the Cold War, the disengagement of the superpowers and their
withdrawal of war-footing support for client nations. It discusses how the superpowers surrogate
guerrilla-terrorist forces of the Cold War were not effectively de-mobilised, and how they and their
training camps were re-aligned to fight different campaigns. The original motivating element of
religion is reiterated and the concept of handling guerrillas and terrorists by security and intelligence
officials is discussed. This section also explains the principles of biological and chemical terrorism,
and the rationale behind threats of nuclear terrorism. This section describes new forms of post-Cold
War terrorism and studies the new wave of transnational terrorism carried out misusing the name
of Islam.
After studying this lesson, the student should be able to:
Describe the post-Cold war resumption of terrorist and guerrilla training camps
Explain how Cold War intelligence communities lost control of veteran guerrillas/terrorists
Comprehend the global threat of guerrillas and terrorists that have not been de-mobilised
Understand the current rationale and likelihood of terrorists obtaining nuclear weapons
List forms of post-Cold War terrorism and the new transnational terrorism, distorting Islam
Section 10.3: The Media and Terrorism
This section describes how the media can work for or against terrorism. The section explains the
differences between sensationalising and minimising terrorist publicity and also influencing public
opinion against terrorists. This section goes on to examine media ethics and condemnation of
terrorism.
After studying this lesson, the student should be able to:
Describe the degrees of publicity afforded terrorism by media
Explain the meaning of an agent of influence
Discuss media ethics and the defence, often cited by media, to sensationalising terrorism
Describe widespread condemnation of terrorism
Recall the meaning of the words contained in the Lessons Keywords to Note table
Recall the basic facts concerning the attack on MI 6 Headquarters, London, UK
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 297
Lesson 10 Terrorism and the Cold War; Terrorism and the Media
Section 10.1: Terrorism During the Cold War
Sponsorship
To understand the issue of state-sponsored terrorism and guerrilla warfare during the Cold
War, it is first necessary to briefly clarify what the Cold War was.
It began on account of forced expansionism into Europe, by the Soviet Union, in the wake
of the Second World War. This expansionism was opposed by the western democracies and it
became a conflict for global domination of doctrines and client nations.
The Cold War was intensified by arms races, at an eventual cost of over US$ one trillion (a
million million), which occurred as a result of the mutual belief that the opposing side would
eventually preemptively strike the other, utilising multiple nuclear weapons.
Eastern and western superpower coalitions opposed each other and these blocs supported
armed conflicts around the world in a competition to wean as many nations to their sides as they
were able to. Especially targeted were those developing nations that were strategically or politically
important, or rich in natural resources.
In the simplest possible terms it can be said that:
The Soviet Union and other members of the Warsaw Pact, sponsored any armed struggle
against western, capitalist, fascist or right-wing governments or forces. An example of this
is the Soviet and surrogate-Cuban aid given to the Marxist MPLA Angolan Government,
with which to fight UNITA rebels and South African forces
In response, US and some other NATO members, sponsored any armed struggle against the
Soviet Union, Soviet-supported socialist, communist or left-wing governments or forces. The
most notable example of this occurred in Afghanistan where some western nations supported
and helped create Mujahideen units to eject Soviet forces. According to media reports and
televised interviews with former CIA officers who organised the training in Pakistan and
Afghanistan, the US CIA spent US$ 500 million per year to arm and train Mujahideen
(Religious fighters) in this successful campaign to end the illegal Soviet occupation of
Afghanistan. The total sum expended to eventually win the war was more than US$ 3 billion.
The campaign initially involved the fielding of 10,000 Mujahideen from 14 countries
A whole range of allied countries, sympathetic or surrogate to either western or eastern
power-doctrines, also helped to support armed conflicts, in the interests of the superpowers.
An example was the communist (non-aligned) Yugoslavian aid given to Angolan
communists in order to fight Portuguese colonialism up to 1975. Following this, in
pendulum fashion, an Angolan Communist government came to power, only to be fought by
Angolan UNITA rebels, supported by the US and South Africa
East and western government sponsorship in the Cold War occasionally involved setting up
camps and providing instructors for training guerillas and terrorists. Sometimes, sponsoring
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 298
guerrilla and terrorist warfare was effected not by practical and visible aid, but solely by
covert funding. This type of sponsoring provided deniability, a tactic by which governments
politically disassociated themselves from, and denied linkage with, terrorists and guerrillas
Further deniability, or distancing from guerrillas and terrorists by their sponsoring
governments, was achieved by using retired military personnel, natives of the conflict theatre,
other foreigners and intelligence and security operatives posing as businessmen, under the
cover of specially set-up businesses, sometimes called front-businesses or covers
A notable case of government sponsorship for guerrillas and terrorists in the Cold War was
that of the US support for right-wing Nicaraguan Contra rebels (Contras).
The Contras were engaged in armed struggle against the Sandanista government whom the
US (and other NATO governments) viewed as pro-communist (and therefore Soviet).
Viewed by political necessity as freedom fighters by most of the west, the Contras were in
fact the brutal hard core of the deposed Somoza dictatorship whose national guards had engaged in
murder, terrorising and raping of civilians near the Honduran border.
Nicaragua was devastated by the Somoza government in the longest dictatorship in South
American history.
Congress severed US support to the Contras by law in the 1984 Boland amendment, but aid
continued to be covertly channelled by rogue intelligence officials of the National Security Council
(See Lesson 6 under Rogue Intelligence and Security Personnel).
Such paradoxical support for brutal dictatorships characterised the Cold War, in which the
primary and overriding criterion of the superpowers in supporting armed conflicts, was political
leaning; all part of efforts to block and defeat the opponent.
Organisation and Training
During the Cold War, the sponsored training and organisation of guerillas and terrorists was
of a high standard; powerful and well organised governments provided adequate funding and
professional training.
The results of subsequent campaigns reflect this; hit-and-run military defeats of conventional
forces by guerrillas and terrorists were commonplace in several African, Central American and Asian
countries.
On some occasions, governments provided more than instructors, training, weapons and
funding. They sometimes covertly encouraged and permitted their domestic guerrilla groups to
engage in combat, but not wearing national uniform.
Training during the Cold War period was also carried out by a number of non-superpower
countries and organisations.
During the Cold War, prior to its recognition of Israel, renunciation of terrorism and
declaration of peace, the Palestinian Liberation Organisation (PLO) was mainly funded by Saudi
Arabia and Kuwait (according to media).
According to further media reports, the PLO was also funded and sponsored by the former
Soviet Union and in turn the PLO supported and trained other guerrillas and terrorists in four-month
courses conducted in Lebanon and South Yemen.
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 299
Guerrilla-terrorists involved in insurgency campaigns in their own national and neighbouring
conflicts attended these PLO-run training courses, during the Cold War, from the following
countries:
COUNTRE8' NATONAL8 ON PLO TRANNG COUR8E8 COUNTRE8' NATONAL8 ON PLO TRANNG COUR8E8 COUNTRE8' NATONAL8 ON PLO TRANNG COUR8E8 COUNTRE8' NATONAL8 ON PLO TRANNG COUR8E8
Argentina Iran Niger Sri Lanka
Bangladesh Iraq Nigeria Togo
Brazil Ireland Pakistan Tunisia
Chile Italy Phillippines Turkey
Egypt Japan Somalia Uruguay
El Salvador Mali South Africa West Germany
Ghana Mexico Soviet Union (Armenia) Zimbabwe
Coalitions
During the Cold War there were occasional instances of coalitions of nations normally
unaligned or opposed to each other, but allied against commonly perceived enemies. The following
is the most notable example.
On 28
th
December 1979, one day after Soviet Forces blew up the central communications
centre and seized control of Kabul, US National Security Advisor (1977-1981) Zbigniew Brzezinsky,
wrote a memorandum to President Carter informing him that the US now has the opportunity to
give the Soviet Union its Vietnam, meaning in essence that the Soviet Union could now be bogged
down in an inconclusive guerrilla war.
The US, opposing the Soviets on political grounds, was subsequently able to ally with
Afghan and other Muslim resistance forces, who opposed communism on religious grounds, to co-
fight the Soviets and the Afghan Soviet puppet regime.
On the practical side, this meant a massive expansion of the forces to form a guerrilla army.
This was achieved by a US-Chinese coalition which established guerrilla warfare training
camps at Peshawar in Pakistans North West Frontier Province (NWFP) and along the border with
Afghanistan.
The US led Sino-American coalition necessary for this strategy, was a delicate and unlikely
union, achieved through a complicated arrangement brokered by the Shah of Iran (shortly before the
Iranian revolution), and Israel.
The operational task was to train Mujahideen units to defeat and eject Soviet forces from
Afghanistan through a large scale guerrilla warfare campaign, greatly expanding upon the marginal
resistance that had already begun, but not to any significance.
The war was to last ten years from 1979 to 1989, but a decisive turning point, with very far
reaching consequences, occurred in 1986 when the hand-held US Stinger (FIM 92-A) Missile was
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 300
The Stinger Missile
Courtesy: US Army
deployed against the Soviets.
It was an extraordinary
example of a coalition in which
vastly differing political, religious
and religious sect affiliations were
put aside in order to fight the
commonly perceived enemy.
US (and Saudi Arabian) funding
amounted to US$ 3 billion, while
coordination and logistics were
taken care of by Pakistans ISI (Inter
Services Intelligence).
In order to motivate a large
number of volunteers to form for
this irregular army, the strategy
adopted was the widespread
stimulation of militant Islam. It
resulted eventually in 14,000
recruits from 22 Muslim countries
going to fight.
These volunteers went out (mainly from and via Middle Eastern countries) to train and
become Mujahideen, fighting the Soviets under the western-stimulated banner of Jihad.
Mujahideen recruiting traffic became so intense at some periods that logistics offices (a type
of MoveCon or Movement Control) were set up in the Gulf and in Peshawar to handle the traffic.
They were variously called the Maktuba e Khidmat (Services Office) and Maktaba el
Khidmat lel Mujahideen el Arab (Office for the Services of Arabic Holy Fighters).
Associating with western intelligence agencies, Osama bin Ladin helped set up these offices
(with Abdullah Azzam, head of the Palestinian branch of the Ikhwan ul Muslimeen or Muslim
Brotherhood), and also fought in combat the Soviets, in addition to becoming an instructor for a
period, in one of the training camps.
At the beginning of the campaign, Warsaw Pact weapons were supplied to the Mujahideen
in order to maintain a degree of political deniability.
A milestone came however, later in the campaign when US Stinger missiles were issued to
the Mujahideen. This highly effective weapon changed the course of the conflict and played a
decisive role in achieving victory.
The ten year campaign resulted in the ejection of the Soviets from Afghanistan. This defeat
did not pass unnoticed in the Warsaw Pact Countries, especially Poland, that the might of the Soviet
Union, a superpower, had been defeated by a much smaller guerilla army, poorly equipped in
comparison. This was the single most reason that triggered the chain reaction subsequently leading
to the collapse of the Soviet Union.
The Soviets had not merely the Vietnam that Brzezinsky envisaged, so much as a
Stalingrad. This protracted defeat not only cost them the entire Cold War, and practically their
superpower status, but subsequently destroyed the 70 year old Soviet police state system, triggering
wide reform, independence, and events that turned the course of world history.
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 301
Section 10.2: Terrorism Since the Cold War
Resumption and Re-alignment
Following the conclusion of the Cold War, the superpowers dis-engaged most of the forces
and missiles which stood opposing each other. They also ceased to fund most of their irregular
warfare programmes, re-assigning, repatriating or dispersing the commanders, instructors and
handlers.
Guerrilla and terrorist training camps in several countries however, were taken over by many
of the governments in whose regions they were sited.
This is the case with those camps sited in Afghanistan near to Pakistans North-West Frontier
Province, which was the hub of anti-Soviet efforts in Afghanistan during the Cold War. Several of
those camps resumed operations, having been re-aligned by various powers to train guerrillas and
terrorists for other conflicts, notably post-Soviet Afghanistan and Kashmir.
Some camps, however, were closed since the end of the Cold War. An example of this
occurred around 1994, when owing to international pressure, Pakistani Prime Minister Benazir
Bhutto closed half of the camps located in the North-West Frontier Province and many in Azad
Kashmir, co-run by a department of Pakistans ISI (Inter Services Intelligence) known as Joint
Intelligence North.
ISIs Joint Intelligence North, responsible solely for Jammu & Kashmir, were ordered by the
Pakistan Government to cease operations in 2002, and to only monitor intelligence.
Loss of Control
Following the withdrawal of support, organisation and control of guerrillas and terrorists by
the superpowers, especially in the case of Afghanistan, many governments have been unable to solve
the problem of what to do with these small armies of highly-trained, fanatically motivated and war-
experienced guerrilla-terrorists.
Clearing up the debris of war and rebuilding Afghanistan after the Soviet-Afghan war ended
in 1989, were tasks left to Saudi Arabia and Pakistan. They neither demobilised all of the
Mujahideen left in Afghanistan nor dismantled all of the training camps.
The consequences of this directly resulted in:
A resurgence of guerilla warfare and terrorism in neighbouring Kashmir (in less than a year after
the Soviet-Afghan war ended)
The emergence of transnational terrorists such as belong to the Al Qaida coalition, responsible
for the new strain of terrorism including the 1998 US bombings in Africa and the events of 11
th
September 2001
The emergence of the Afghani, highly mobile veteran Mujahideen from the Soviet-Afghan war,
who travel to fight in any conflict in the world where Muslims oppose non Muslims (e.g
Bosnia)
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 302
Afghan Liberation Organisation
One of dozens of armed groups that
sprang up in the last 30 years
Just after the Soviet-Afghan war, several of the Middle-East and
North African governments who permitted, and in many cases
indirectly encouraged their citizens to go and fight the Soviet
forces in Afghanistan, did not permit numbers of Mujahideen to
return home.
This is because militant Islam, under the banner of Jihad
(holy war) was used extensively as a rallying factor to encourage,
motivate and recruit volunteers. A fanatic (and to an extent)
religious doctrine was subsequently instilled into many of the
Mujahideen of that campaign.
The very same governments who assisted to indirectly
dispatch them to Afghanistan, feared and still fear their
repatriation and capability to sow domestic dissent.
After the Soviet-Afghan war, some Mujahideen were
able to obtain favourable relocation. There are up an estimated
200 living in New Jersey, USA. Of those who did return to their
home countries after the Soviet-Afghan War, numbers of them
were refused entry and were forced to live in exile back in Afghanistan or elsewhere, while others
were executed and jailed by their Governments, immediately upon return.
These Mujahideen were fully trained guerrillas and terrorists, with combat experience, many
with no other trade or vocation, or indeed interest in life, except to continue fighting for Militant
Islam, as they had been manipulated and trained to do.
Many of these veteran Mujahideen, although semi-literate and under-educated, hold
sophisticated and fanatical religious convictions which include the overthrow of most existing
Arabic governments whom they consider corrupt. Prior to the US entry into Afghanistan in late 2001,
in order to eject the Taliban, several thousand Arabic Mujahideen from the Soviet-Afghan war were
still exiled (and most fighting) in Afghanistan, with nowhere to go.
A sizeable amount of these veterans of the Soviet war in Afghanistan are sometimes called
Afghanis. Few are Afghan nationals; most are Arabic. Osama bin Ladin is an Afghani. Many
Afghanis will engage in any conflict where Muslims oppose non-Muslims, as a principle, whether
right or wrong.
This illustrates the degree to which religious fanaticism has been instilled in them. Sightings
of Afghanis have been reported as far afield as Bosnia, Chechnya, China, Kashmir, Nigeria,
Phillippines, Sudan and Tajikistan. In Uzbekistan, bin Ladin, according to Boris Mylnikov, head of
the CIS member states Counter-Terrorism centre, is reported to have funded US$ 20 million to rebels
of the Islamic movement.
Afghanistan is the best but not the only example of a country in which guerrillas and
terrorists, professionally trained by the superpowers during the Cold War but not de-mobilised,
continue their activities as a result of unemployment, no opportunity to return home, fanatical
religious or political convictions, or an inability to re-adjust to ordinary civilian life.
[Refer to Annex M for a map showing the present locations in the world of Militants who
have trained or fought in either Afghanistan or Kashmir].
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 303
A Nuclear Explosion
Courtesy: US Dept. of Energy
The Intelligence and Security Communities
In those countries where guerrilla warfare and terrorism are sponsored, government
intelligence and security officials are often engaged in the role of practical organisers, trainers and
field handlers of guerrillas and terrorists. This was the case in Pakistan until early 2002 when the
government ordered its ISI to halt further assistance and training of Militants destined for the Indian
side of Kashmir. This is easier said than done, and some Militants are in defiance of this order.
This form of sponsoring entails inherent long-term dangers, as can be noted by the
Afghanistan episode; it is one concept to train and field guerrillas and terrorists, but when the time
for demobilisation arrives, it can result in an uncontrollable and persistent threat if not handled
correctly.
Historically, the greatest problems posed by failure to properly demobilise combatants after
war have occurred following the Napoleonic and Soviet-Afghan wars.
Nuclear Terrorism
It is believed that no terrorist group
has ever managed to obtain a nuclear device
or all of its components. Several have
attempted to and continue to do so, from a
variety of sources including illicit arms
dealers. Osama Bin Ladins associates are
reported to have been engaged in trying to
obtain a nuclear device since 1993.
Should terrorists in the future
eventually succeed in obtaining or
constructing a nuclear weapon, it is likely
that sooner or later they would detonate it,
probably in a major population centre, in
the United States or Europe.
Naturally, they will also have to
acquire the expertise to bypass fail-safe,
security and arming systems.
Safeguarding the movement and production of nuclear materials is monitored by several
international and inter-governmental organisations, but following the conclusion of the Cold War,
some nuclear materials are unaccounted for, notably in the former Soviet Union.
Certainly a few governments who have nuclear capability also sponsor (or sponsored in the
past) terrorism. It is extremely unlikely, however, that they would supply the terrorists they sponsor
with such weapons, as the governments themselves would then become vulnerable.
Furthermore, such governments are deterred in general by other nations who closely monitor
nuclear capabilities and the sponsorship of terrorism. A transfer of a nuclear weapon to a terrorist
group would most probably be detected, and through intelligence work.
To understand the threat of nuclear terrorism, it is necessary to examine the nuclear deterrent
of the Cold War, maintained by a status quo, and to examine the possible scenario of a launch and
Lesson 10/ Terrorism and the Cold War; Terrorism and the Media 304
Lesson 12/ Terrorism, the United Nations and the Future 378
KEYWORDS TO NOTE
Echelon A Global Electronic Communications surveillance system
General
Assembly
GA. One of six principle UN organs. Six sub committees, two dealing with security
and political issues. Each country has one representative and one vote. Resolutions
are legally binding upon Member States
International
Criminal
Tribunals
UN successor to the post WWII International Military Tribunals that tried Axis nation war
criminals. Established for the former Yugoslavia and Rwanda. The UN Security Council
passed a Resolution in 2001 to set up a similar (but not identical) special court for
Sierra Leone to mainly try crimes against humanity and war crimes, committed there
during the war.
Intolerance Unwilling to recognize, accept or permit certain types of difference
Poverty Poor. The state of insufficiency or below recognised and accepted norms
Security
Council
SC. One of six principle UN organs. Primary responsibility for world peace. Only UN
Organ (Chapter VII UN Charter), which can order peace enforcement action.
15 members (five permanent: US, UK, Russia, France and China). Other ten members
rotate (non-consecutive terms) on geographic basis, for two-year terms. Resolutions
are legally binding upon Member States
Shadow /
Alternative
Governments
Groups [usually criminal] that take control of a loose anarchy, after government forces
become ineffective or are displaced. Rare phenomena, but has occurred in a part of a
Brazilian city and in parts of Columbia.
Lesson 12/ Terrorism, the United Nations and the Future 379
TERRORIST ATTACK BRIEF
Seizure of US Embassy and Hostages, Teheran, Iran
Facts of the Case: On 4th November
1979, at the height of the Iranian
Revolution, with full support of the
Khomeini government, a violent crowd
of Iranian students stormed the
American embassy in Tehran.
This was contrary to International Law
and the United Nations Charter, the
Embassy being inviolable and
considered as US soil under International Law.
Sensitive documents and equipment were seized, and 52
American citizens were abducted and held hostage for 444
days.
Investigation: The United States broke diplomatic relations
with Iran five months later (April 1980).
After a failed rescue attempt by U.S. special forces, the
hostages were finally released in January 1981, a short while
before the first inauguration of President Ronald Reagan.
Ayatollah Khomeini had allegedly refused to release them to
the Carter Administration.
A formal Iranian apology came in 1997 from one of Ayatollah
Khomeini's successors, President Khatemi.
Lesson 12/ Terrorism, the United Nations and the Future 380
END-OF-LESSON QUIZ
1. For the first time in history, a UN resolution (748 in 1992) imposed sanctions under chapter VII
of the UN Charter, against a state accused of terrorism.
a) True
b) False
2. The UN Terrorism Prevention Branch is located in
a) New York
b) Geneva
c) Vienna
3. The international criminal tribunals in the Hague and Rwanda are a significant defacto deterrent
to some dictators and tyrants contemplating genocide and de-population.
a) True
b) False
4. Efforts to define and repress terrorism are partly frustrated owing to
a) Passive resistance by governments who support terrorism as freedom fighting
b) Lack of financial resources
c) The Geneva Conventions
5. Which advances will eventually be the deciding factor in suppressing much terrorism in the
developed nations?
a) Technological advances by those nations that can afford them
b) Political advances
c) Advances in counter-terrorist tactics
6. Besides intolerance, what is the main reason underpinning terrorism?
a) Political differences
b) Illicit financial aid
c) Oppression: social, political and especially economic
7. The worlds population is expected to increase in 15 years from the present 5 billion to almost 9
billion, with worsening oppression of large populations by dictators and tyrants, collectively
expected to fuel further terrorism.
a) True
b) False
8. Which of the following are realistic measures to effectively undermine the roots of terrorism?
a) Improved detection and harsher sentencing for convicted terrorists
b) Increase in the size of counter-terrorist forces and more refined counter-terrorist operations
c) Fighting oppression and poverty, enforcement of human rights, democracy and UN resolutions
Lesson 12/ Terrorism, the United Nations and the Future 381
9. Operation Rio was calculated to
a) Take back civic control from armed elements
b) Be an anti-narcotics operation
c) Be an anti-money laundering operation
10. How many people in the world are currently suffering from chronic malnourishment?
a) 10 million
b) 30 million
c) 500 million
11. UN resolutions are divided into two categories: Security Council and General Assembly.
a) True
b) False
12. Which UN resolution condemned the attacks of 11
th
September 2001?
a) SC 1269
b) GA 54 / 164
c) SC 1368
13. Powerful cameras with integrated thermal imaging equipment, can observe and record
a) At night, and through cloud and rain
b) From distances of several kilometers away
c) a and b
14.Satellites cannot take recognizable photographs of individuals.
a) True
b) False
15. Who said Even the most repressive leaders watch to see what they can get away with, how far
they can tear the fabric of human conscience before triggering an outraged external response?
a) US President George Bush
b) Indian spiritual leader Mohandas Gandhi
c) UN Secretary General Kofi Annan
16. 1.3 billion people exist on US$ 1 (one) per day.
a) True
b) False
17. The genocide in Rwanda lasted how long (apparently without intervention or disruption)?
a) 10 days
b) 30 days
c) 100 days
Lesson 12/ Terrorism, the United Nations and the Future 382
18. State-sponsored terrorism is no more hazardous a practice than before 11
th
September 2001.
a) True
b) False
19. SC Resolution 1373 provided for the establishment of
a) An international military coalition to remove the Taliban government
b) A Security Council committee for counter-terrorism
c) International laws to seize terrorists financial assets
20. How many of the worlds children are continually malnourished?
a) 1 in 1000
b) 1 in 100
c) 1 in 3
ANSWERS: 1-a, 2-c, 3-a, 4-a, 5-a, 6-c, 7-a, 8-c, 9-a, 10-c, 11-a, 12-c, 13-c, 14-b, 15-c, 16-a, 17-c,
18-b, 19-b, 20-c.
Annex A/ Internet Information Sites Related to Terrorism 383
Annex A: Internet Information Sites Related to Terrorism
GOVERNMENTAL
http://www.nato.int/ North Atlantic Treaty Organisation
http://www.state.gov/www/ind.html U.S. Department of State
http://www.open.gov.uk/ UK Government
http://goov.org/ French Government
http://www.gov.ru/main/page8.html Russian Government
http://ce.cei.gov.cn/ Chinese Government
http://www.bundesregierung.de German Government
http://www.mi5.gov.uk/ MI5
http://www.odci.gov/cia/ CIA
http://www.GSG9-INFO.de GSG-9 (German Counter-Terrorist Police)
http://www.ncis.co.uk UK National Criminal Intelligence Service (NCIS)
http://www.europol.eu.int European Police Office (EUROPOL)
http://www.dia.mil US Defense Intelligence Agency (DIA)
http://www.met.police.uk UK New Scotland Yard (NSY)
http://www.whitehouse.gov/homeland/ US Office of Homeland Security (OHS)
http://www.fbi.gov US Federal Bureau of Investigation (FBI)
http://www.interpol.com International Criminal Police Organisation (Interpol)
http://www.nsa.gov US National Security Agency (NSA)
http://www.csis-scrs.gc.ca Canadian Security Intelligence Service (CSIS)
http://www.asis.gov.au/asiscorpinfo.html Australian Secret Intelligence Service (ASIS)
http://www.asio.gov.au Australian Security Intelligence Organisation (ASIO)
http://www.rcmp-grc.gc.ca Royal Canadian Mounted Police (RCMP)
http://www.fema.gov US Federal Emergency Management Agency (FEMA)
http://www.nacic.gov US National Counter Intelligence Centre (NCIC)
http://www.nsi.org US National Security Institute (NSI)
http://www.gid.gov.jo/english/index.html Jordanian General Intelligence Department (GID)
Annex A/ Internet Information Sites Related to Terrorism 384
INSTITUTES / RESEARCH ESTABLISHMENTS / ASSOCIATIONS
http://www.cdiss.org/ Centre for Defence and Int. Security Studies
http://nsi.org National Security Institute
http://www.terrorism.net/home.asp The Counter-Terrorism Page
http://www.emergency.com/cntrterr.htm Emergency Response & Research Institute
http://www.ict.org.il/default.htm Int. Policy Institute for Counter-Terrorism
http://www.iacsp.com/ Int. Assoc. for CT & Security Professionals
http://www.terrorism.com/ Terrorism Research Centre
http://www.fas.org/irp/ Intelligence Resource
http://polisci.home.mindspring.com/ptd/ Political Terrorism
http://www.specialoperations.com Terrorist groups
http://www.netaxs.com/~iris/whoswho.htm Terrorist groups
http://web.nps.navy.mil/~library/tgp/tgp2.htm US Naval Post Graduate School: Terrorism
http://www.loyola.edu/dept/politics/intel.html Loyola College: Strategic Intelligence Links
http://www.adl.org/ Anti-Defamation League
http://www.satp.org/index4.asp South Asia Terrorism Portal
http://www.cdt.org/policy/terrorism/ Centre for Democracy and Technology
http://www.kimsoft.com/kim-spy.htm Intelligence, Counter Intel., terrorism, WMD
http://www.specialoperations.com/Counterterrorism/default.html Counter Terrorism operations
http://www.intelbrief.com/ Intelligence Briefings
Annex A/ Internet Information Sites Related to Terrorism 385
NOTABLE TERRORIST ATTACKS / OTHER INCIDENTS / PEOPLE
http://www.cnn.com/2001/US/09/11/chronology.attack/index.html WTC, Pentagon and Pennsylvania
http://www.fbi.gov/majcases/eastafrica/summary.htm US Embassies (Kenya & Tanzania)
http://www.cnn.com/US/OKC/index.html Oklahoma City
http://www.cnn.com/US/9804/03/wtc.bombing/ World Trade Centre (1993)
http://cnn.com/specials/1997/unabomb/ Unabomber (Theodore Kaczynski)
http://www.sptimes.com/News/ 122999/Sports/Terrorists_turn72_M.shtml Munich Olympics
http://www.cnn.com/WORLD/9707/30/israel.bombing/ Mahane Jehuda market (Jerusalem)
http://the-tech.mit.edu/V114/N10/hebron.10w.html Hebron Mosque
http://www.britains-smallwars.com/Palestine/Kingdavid.htm King David Hotel (Jerusalem)
http://www.findarticles.com/cf_0/m2082/263/72435149/print.jhtml Deir Yassin
http://news.bbc.co.uk/hi/english/audiovideo/programmes/panorama/newsid_138
1000/1381328.stm
Sabra & Shatilla (Beirut)
http://www.sabapress.com/gallery_thumb.html Ethnic cleansing:Fr. Yugoslavia
http://www.alb-net.com/warcrimes-img/warcrimes.htm Kosovo
http://www.wesleyan.edu/gov/us_marines_in_lebanon.htm US Marine barracks (Beirut)
http://www.af.mil/current/Khobar/ Khobar Towers (Dhahran)
http://cnn.com/WORLD/1996/saudi.special/index.html Khobar Towers (Dhahran)
http://www.cnn.com/US/9607/27/olympic.bomb.main/index.html Atlanta (Olympic Park)
http://www.ussliberty.com USS Liberty (Mediterranean)
http://www.chinfo.navy.mil/navpalib/news/news_stories/cole.html USS Cole (Aden)
http://www.geocities.com/CapitolHill/5260/ Pan Am Flight 103 (Lockerbie)
http://www.cnn.com/WORLD/europe/9903/08/france.libya/ UTA Flight 772 (Tenere Desert)
http://news.bbc.co.uk/hi/english/world/americas/newsid_1370000/1370205.stm Air India Flight 182 (Atlantic)
http://web.qx.net/jon/stalin.html Stalins victims
http://www.candles-museum.com/HITLER.HTM Summary of Hitler
Annex A/ Internet Information Sites Related to Terrorism 386
CURRENT / FORMER / ACCUSED GROUPS AND RELATED ORGANISATIONS
http://www.pna.net/ Palestinian National Authority / PLO
http://www.hizbollah.org/english/frames/index_eg.htm Hizbollah (Lebanon)
http://www.palestine-info.com/hamas/ Hamas (Palestine, Israel)
http://www.palestinian.org/~alaeddin/jish.html Popular Front for Liberation of Palestine (PFLP)
http://www.kahane.org/ Kahane Chai (US, Israel)
http://burn.ucsd.edu/~ats/PKK/pkk.html Kurdistan Workers Party (PKK)
http://burn.ucsd.edu/~ats/PKK/argk.html Peoples Kurdistan Liberation Army (ARGK)
http://sinnfein.ie/index.html Sinn Fin - PIRA political wing (UK: N. Ireland)
http://www.irsm.org/statements/inla/010428.html Irish National Liberation Army (INLA)
http://www.ezln.org/ Zapatistas - EZLN (Mexico)
http://burn.ucsd.edu/~ats/mrta.htm Tupac Amaru Revolutionary Movement (Peru)
http://www.nadir.org/nadir/initiativ/mrta/ Tupac Amaru Revolutionary Movement (Peru)
http://www.csrp.org/ Sendero Luminoso / Communist Party (Peru)
http://www.eelamweb.com/ Tamil Tigers - LTTE (Sri Lanka)
http://www.jvpsrilanka.com/ Peoples Liberation Front (Sri Lanka)
http://www.a-l-o.org/index.htm Afghan Liberation Organisation
http://www.animalliberationfront.com/ Animal Liberation Front (international)
http://www.earthliberationfront.com/ Earth Liberation Front (international)
http://www.eco-action.org/ Ecological Direct Action (international)
http://www.kukluxklan.org/ Ku Klux Klan (US)
http://www.nidlink.com/~aryanvic/index-E.html Ayran Nations (US)
http://www.wcotc.com/ World Church of the Creator (US)
http://www.sevenseals.com/ Branch Davidians (US)
http://free.freespeech.org/ehj/html/freta.html Euskadi Ta Askatasuna [ETA - Basques] (Spain)
http://www.jklf.net/ Jammu Kashmir Liberation Front (JKLF)
http://www.kashmir.org/ Kashmir Liberation Cell (Gov. Azad Kashmir)
http://www.laskarjihad.or.id Laskar Jihad (Indonesia)
http://www.unita.org/ UNITA (Angola)
http://www.web.net/eln/ National Liberation Army - ELN (Columbia)
http://www.flnc.com/ Corsican National Liberation Front (FLNC)
http://www.contrast.org/mirrors/farc/ Revolutionary Armed Force of Columbia (FARC)
Annex A/ Internet Information Sites Related to Terrorism 387
CURRENT / FORMER / ACCUSED GROUPS AND RELATED ORGANISATIONS, cont.
http://www.rss.org/ Rashtriya Swayan Sevak Sangh (India)
http://www.nwo.it/ Ordine Nuovo - New World Order (Italy)
http://www.eco-action.org/opm/ Free Papua Movement (Papua New Guinea)
http://www.dhkc.org/ Revolutionary Peoples Liberation Front (Turkey)
http://www.csrp.org Comm. of Revolutionary Int. Movement (Peru)
http://www.sufo.demon.co.uk/oppos001.htm Sudan Peoples Liberation Movement
http://www.geocities.com/MotorCity/Track/4165/kla2.html Kosova (Kosovo) Liberation Army
http://www.aum-shinrikyo.com/ Aum Shinri Kyo (Japan)
http://www.meskerem.net/ Eritrean Peoples Liberation Front
http://www.skrewdriver.net/ Combat 18 (UK)
http://www.nufronliv.org National United Front for Liberation of Vietnam
http://www.fmln.org.sv/ FMLN - Farabundo Marti National Liberation Front
(El Salvador)
http://www.dalitstan.org/tamil/ Tamil Nadu Liberation Front (India)
http://www.sidamaliberationfront.org/ Sidama Liberation Front (Ethiopia)
http://www.oromoliberationfront.org/ Oromo Liberation Front (Ethiopia)
http://www.afrikan.net/NALF/NALF/ New Afrikan Liberation Front
http://www.sierra-leone.org/footpaths.html Revolutionary United Front (Sierra Leone)
http://www.geocities.com
/CapitolHill/Congress/1228/anglais.htm
Emgann - Combat (France)
http://www.democratafrica.org/mozambique/renamo.html Renamo (Mozambican National Resistance)
http://www.ummah.net/ikhwan/ Iqwan ul Muslimeen -Muslim Brotherhood (Int.)
http://www.bloodandhonour.com/~finland/ Blood and Honour (Finland)
Annex A/ Internet Information Sites Related to Terrorism 388
MISCELLANEOUS / MEDIA
http://www.odci.gov/cia/publications/factbook/index.html CIA World Fact Book
http://chemdef.apgea.army.mil/ Bio-Chemical Warfare
http://www.chem-bio.com/resource/ Bio Chemical Threats
http://www.unitarpoci.org/ UNITAR-POCI
http://www.undcp.org/terrorism.html UN Terrorism Prevention Branch (TPB)
http://www.un.org/ United Nations main website
http://www.un.org/site_index/ UN Central Index / links to UN websites
http://www.janes.com Defence, intelligence, politics, terrorism
http://stratfor.com Strategic intelligence (STRATFOR)
http://ananova.com Strategic intelligence (ANANOVA)
http://www.janes.com Media Co.: Defence, intel., geo-politics, terrorism
http://www.bbc.co.uk/ BBC (UK)
http://www.cnn.com/ CNN (US)
http://www.reuters.com/news/ Reuters (UK)
http://www.the-times.co.uk/ London Times (UK)
http://www.ap.org/ Associated Press - AP (US)
http://abcnews.go.com/ ABC News (US)
http://www.spiegel.de/ Der Spiegel (Germany)
http://www.guardian.co.uk/ The Guardian (UK)
http://www.sky.com/skynews/ Sky (UK)
http://www.lemonde.fr/ Le Monde (France)
http://www.nytimes.com/ New York Times (US)
http://www.washingtonpost.com/ Washington Post (US)
http://www.un.org/News/ U.N. News
http://www.teshreen.com/syriatimes/ Syria Times (Syria)
http://www.jpost.co.il/ Jerusalem Post (Israel)
http://www.cairotimes.com/ Cairo Times (Egypt)
http://www.jordantimes.com Jordan Times (Jordan)
http://www.worldtribune.com/ World Tribune (US)
http://www.truthout.org Controversial politics (US)
http://www.onlinenewspapers.com/ 5000 International Newspapers On-line
http://www.rewardsforjustice.net/ Anti-Terrorism skills test. US State Dept.
http://www.vwam.com Vietnam veterans site (Vets with a Mission)
Annex A/ Internet Information Sites Related to Terrorism 389
SECURITY RELATED
http://www.un.org United Nations Main Website
http://www.unitarpoci.org UNITAR-POCI. UN Peacekeeping Training (distance)
http://www.un.org/Depts/dpko/glossary UN DPKO. Glossary of Peacekeeping terms
http://www.amunet.edu American Military University -many distance courses
http://www.cia.gov US Central Intelligence Agency (CIA)
http://www.mi5.gov.uk UK Government Security Service (MI5)
http://www.ncis.co.uk UK National Criminal Intelligence Service (NCIS)
http://www.europol.eu.int European Police Office (EUROPOL)
http://www.dia.mil US Defense Intelligence Agency (DIA)
http://www.met.police.uk UK New Scotland Yard (NSY)
http://www.interpol.com Interpol (International Criminal Police Organisation)
http://www.nsa.gov US National Security Agency (NSA)
http://www.csis-scrs.gc.ca Canadian Security Intelligence Service (CSIS)
http://www.asis.gov.au/asiscorpinfo.html Australian Secret Intelligence Service (ASIS)
http://www.asio.gov.au Australian Security Intelligence Organisation (ASIO)
http://www.fbi.gov US Federal Bureau of Investigation (FBI)
http://www.rcmp-grc.gc.ca Royal Canadian Mounted Police (RCMP)
http://www.fema.gov US Federal Emergency Management Agency (FEMA)
http://www.nacic.gov US National Counter Intelligence Centre (NCIC)
http://www.nsi.org US National Security Institute (NSI)
http://www.gid.gov.jo/english/index.html Jordanian General Intelligence Department (GID)
http://www.fas.org/index.html US Scientific website on policy, security, groups, weapons etc
http://www.terrorism.com Independent Institute for study of terrorism
http://www.trojansecurities.com Global security and specialist training services
http://www.emergency.com Emergency Response and Research Institute (ERRI)
http://stratfor.com Media strategic intelligence company (STRATFOR)
http://ananova.com Media strategic intelligence company (ANANOVA)
http://www.un.org/site_index UN Central Index and link to UN News website
Annex A/ Internet Information Sites Related to Terrorism 390
SECURITY RELATED, cont.
http://www.onlinenewspapers.com 5000 Newspapers Online, listed by country and name
http://www.cnn.com CNN Media
http://www.bbc.co.uk BBC Media
http://www.crg.com Security consultants
http://www.iapps.org Security protection specialists
http://www.sdms.co.uk Company marketing wide range of security products
http://www.audiotel-international.com Company marketing counter surveillance equipment
http://www.spyzone.com/ Surveillance, count. surveillance & Security equipment
http://www.safe-co.com Security safes and vaults company
http://www.chubblocks.co.uk Security locks company
http://www.evva.com/WelcomeE.htm Security locks company
http://www.sasproducts.co.uk Range of security products for vehicles and home
http://www.safetyandsecurityinternational.com Range of security products
http://sharplink.com/jkits/ Range of compact survival kits
http://www.spytechagency.com Surveillance / counter surveillance equipment / services
Annex B/ Glossary of Terms 391
Annex B: Glossary of Terms
A
ABDUCTION. Taking away of someone by force or fraud, usually pre-planned.
AGENT OF INFLUENCE. A person strategically influencing opinions, events, or trends.
AKA (or aka). Also known as.
AK 47. Very common assault rifle (sub machine gun variant). Also AK 56, 74, 74M, 101 & 105.
AL (or El). Arabic. The.
ALF. Animal Liberation Front. Branches in many countries; some commit terrorist acts.
AL QAIDA. Arabic: The Foundation or Base (military connotation).
AMBUSH. Victims approach an ambush party who surprise-attack, sealing escape routes.
AMIN. Hebrew: Israeli Military Intelligence. (Spelling varies).
AMMEN (or Amin). Arabic: Security [organisation]. (Spelling varies).
ANTI-TERRORISM. General, passive, defensive or preventative measures against terrorism.
ANTI-HANDLING DEVICE. Device which triggers bomb detonation if handled or moved.
ANTI-SURVEILLANCE. Measures taken to confirm that surveillance is being carried out.
ARMAGEDDONIST. Believer in: last battle of good versus evil and /or end of the world, followed
by divine-judgement.
ARMALITE. M16 - very common US assault rifle. Used by security forces and terrorists.
ARMOURY. Secured storage area for weapons.
ARREST. Detaining a person, stopping their freedom of movement. Not a temporary check.
ARSON. Deliberate setting of fires, usually to cause loss of life or damage.
ARTILLERY. Heavy weapon of war, land based, tubed, launching shells in a trajectory.
ASSASSINATION. Murder of political or prominent public figure.
ASSAULT RIFLE. Type of SMG. Automatically fires and reloads single or multiple rifle rounds.
B
BALLISTICS. Science dealing with projectiles; bullets, rockets, bombs.
BASE. Headquarters or camp.
BERETTA. An Italian arms manufacturer.
BIOLOGICAL WEAPONS. Bacterial & Rickettsia, Viral, Bio-toxins.
Annex B/ Glossary of Terms 392
BLACKMAIL. Extortion in exchange for not revealing discreditable or embarrassing facts.
BLAST. High pressure pulse or air shock-wave, caused by explosion.
B-NICE. Biological, Nuclear, Incendiary, Chemical, Explosive. Categories of Weapons of Mass
Destruction.
BOOBY TRAP. A cunningly concealed lethal / injurious trap, often using explosives.
BOOSTER. Small high brisance charge, between detonator and main explosive charge.
BURGLARY. Illegal entry with intent to steal, and sometimes assault, rape or damage.
C
CALIBRE. The diameter of a bullet or shell, or of the bore of a barrel or weapon-tube or gun.
Commonly found calibres used by security forces and terrorists are 5.56mm, 7.62mm, and 9mm.
CAPTIVE. Prisoner or hostage.
CARL GUSTAV. A Swedish arms manufacturer.
CASE OFFICER. An official who runs, assists or controls specific agents or terrorists.
CELL. A terrorist or guerrilla sub-unit that for security, does not know details of other cells.
CHARGE. The explosive content of a bomb, IED, shell or round.
CHEMICAL WEAPONS. Nerve Agents, Blood Agents, Choking Agents, Blister Agents, Irritating
Agents.
CHOKE POINT. High risk passage which target is compelled to travel through.
CHRISTIANITY. One of the three great monotheistic religions, as taught by Jesus Christ,
believed by Christians to be the Son of God, as recorded in the Holy Bible.
CIA. [US] Central Intelligence Agency.
CICP. United Nations: Centre for International Crime Prevention.
CLANDESTINE. Concealed or sly activity associated with espionage or terrorism.
CLOSE PROTECTION. Organised vicinity-protection of a principal, by security personnel.
COERCE. To compel or force. Terrorists coerce targets with acts of terrorism.
COLD WAR. Post WWII struggle of US and allies against the Soviet Union and allies.
COLT. A US arms manufacturer.
COMBAT. To contend or struggle. Often describes military engagement of protagonists.
CONTROLLER. See CASE OFFICER.
COUNTER TERRORISM. Active, hostile or offensive measures to suppress terrorism.
COUNTER-SURVEILLANCE. Taking active measures to prevent or halt surveillance.
Annex B/ Glossary of Terms 393
COVER. Legitimate occupation concealing clandestine activity such as terrorism.
CYCLONITE. A powerful explosive, also known as RDX, used in IEDs.
DAMAGE. Level of demolition or harm, below destruction.
DEENIE MEDRESSEH. Religious School [Arabic].
DEEP COVER OPERATIVE. An undercover agent deep inside an organisation.
DELTA FORCE. US counter-terrorist force.
DEMOCRACY. Government, where power is vested in a population who elect leaders. A society
in which all members are held equal under the law.
DEMOLITION. Destruction, especially blowing up.
DENIABILITY. Describes evasive possibilities for denying involvement by governments.
DE-POPULATION. Forcing civilian population to flee by force or terror. A war crime.
DEPORTATION. Formal physical ejection of persons from a state. Can be legal or illegal.
DESTRUCTION. Complete ruin, beyond repair.
DETENTION. Being legally held, denied freedom of movement, by governments.
DETERRENT. A measure or an act to discourage.
DETONATOR. Small highly volatile charge, which when triggered, detonates (decomposes)
main explosive charge in an IED. Common detonators are mercury fulminate and lead azide.
DIPLOMATIC COVER. Use of diplomatic appointment to conceal illegal activity.
DIPLOMATIC IMMUNITY. Immunity from legal process by International agreement.
DISINFORMATION. Deliberate passing of information known to be false.
DISSEMINATION. Distribution, especially information or propaganda.
DOMESTIC. Relating to home, family or within a nation; not foreign.
DOOMSDAY. See ARMAGEDDONIST.
DRIVE-BY SHOOTING. Shooting of random victims from a moving vehicle.
DYNAMITE. Explosive charge for IEDs. Sometimes used by less sophisticated terrorists.
E
EAR. Slang word for a clandestine informant.
ECHELON. A global electronic communications surveillance system.
ELECTRONIC INTERCEPT. Intelligence collected electronically, especially radio traffic.
Annex B/ Glossary of Terms 394
ENDS. Objectives or successful final results. See MEANS.
ENTRAPMENT. Baited trapping of victim; blackmail applied to pre-arranged indiscretion.
ESOTERIC. Mysterious beliefs, associated with semi-religions and occult.
ETHNIC CLEANSING. Modern name for de-population. A war-crime (Genocide Act).
ETHNIC. A member of a racial or cultural group or minority.
EXECUTION. Legal capital punishment. Terrorists misuse the word to describe murder.
EXTORTION. Illegal securing of money, goods or services by threat or coercion.
EXPLOSIVES. Used in ordnance and IEDs. Two main categories: High Explosives (HE burns
at between 1000 to 10,000 yards or 914 and 9140 metres per second) and Low Explosives (LE
burns at the rate of only inches or centimetres per second). Four main purpose-categories:
Disrupting or Bursting explosives; Initiating explosives; Propellants and Impulse explosives;
Auxiliary explosives.
EXTRACTION. Removal. In this context, of self or others from a situation or zone.
EXTRADITION. Legal transfer of an accused person by one government to another.
F
FALSE FLAG OPERATION. An act carried out by a person who believes he is working for a
certain power, but who in fact has been unknowingly manipulated by a different power. The
manipulation may be calculated to engineer the execution of a crime or discreditable act,
followed by the deliberate leak of evidence, thereby incriminating the opponent.
FATWA. An Islamic religious injunction, edict or precedent.
FBI. US Federal Bureau of Investigation.
FEDAYEEN. Arabic: plural of Fedayi.
FEDAYI. Arabic: literally a 'self-sacrificer' who undertakes dangerous missions (not martyr).
FIREARM. Rifle, assault-rifle, pistol, revolver, shotgun, sub, light or heavy machine guns.
FN. Fabrique Nationale: A Belgian arms manufacturer.
FORENSIC SCIENCE. Scientific collection of evidence for legal purposes (Latin: Forum).
FRONT. Slang for a business or cover concealing terrorist, criminal or espionage activity.
FUSE. Device which activates a detonator in an explosive charge, or detonates it directly.
G
GENEVA CONVENTIONS. International Conventions governing certain aspects of war,
especially treatment of captured combatants and civilians.
GENOCIDE. Deliberate mass-murder of a religious, national, ethnic or racial group.
Annex B/ Glossary of Terms 395
GLOBAL. World or International.
GLOCK. An Austrian arms manufacturer.
GRENADE. Hand held/ launched bomb which explodes into fragments. Always lethal to 2m.
GRU. Glavnoye Razvedyvatelnoye Upravleniye (Chief Intelligence Directorate) Former Soviet
Union Military intelligence organisation.
GSG-9. Grenzschutzgruppe 9 (9th Border Guard Group). German counter-terrorist force.
GUERRILLAS. Irregular armed forces usually with political, religious or ethnic motives.
GUILLOTINE. Mechanical platform device with a large heavy blade that drops down vertically
and decapitates the victim. Used in the French Revolution to execute Royalty, aristocrats and
political enemies during a period known as La Terreur (French: the terror, from Latin terrere, to
frighten), from which the word terrorism came into common use.
H
HANDGUN. Pistol or revolver. Sidearm.
HANDLER. An official who runs (controls, organises and supports) agents or terrorists.
HARKAT. Arabic. Movement (in political context).
HEAT-TRIGGER. A trigger in a bomb which is activated by a change in temperature.
HEAVY WEAPONS. Weapons of large capability / calibre. e.g. Artillery, heavy mortar.
HECKLER & KOCH. German Arms manufacturer.
HEZB (or Hizb). Arabic. Party (in political context). e.g. Hizbollah (Hezb Allah) = Party of God.
HIJACK. To stop and take over a vehicle, craft or vessel by force, usually for political coercion.
HIT. Slang word for attack or an individual murder or assassination.
HIT-MAN. Slang word for an assassin or organised criminal murderer.
HMG. Heavy Machine Gun, often of calibres such as 50mm.
HOAX. Unreal or not authentic. Bogus, in context of bomb-threats which are false.
HOMICIDE. Killing of a human being, possibly with extenuating reasons (e.g. self defence).
HOSTAGE. A captive held as security or used for coercion, usually taken spontaneously.
HOSTAGE-TAKING. Abduction of person for use as a human shield, deterrent or coercion.
HUMAN RIGHTS. Civil rights defined by binding International and regional conventions,
especially the [UN] Universal Declaration of Human Rights, signed and ratified by all Nations.
HUMINT. Human Intelligence. Information collected by persons rather than machines.
Annex B/ Glossary of Terms 396
I
IKHWAN (Ikwan or Iqwan). Arabic. Brotherhood. The Muslim Brotherhood (Ikhwan ul Muslimeen
or Muslimoon) is often referred to in Arabic as simply El Ikhwan (the Brotherhood).
14 INTELLIGENCE COMPANY. Elite British Army undercover counter-terrorist intelligence unit.
IED. Improvised Explosive Device. Bomb which is not government manufactured. Delivery
methods: Courier, mail, projectile, sited (concealed).
ILLEGAL. Not within the law, or a terrorist or agent who is illegally present in a country.
IMINT. Imagery Intelligence. Information and photographs collected by special satellites.
INFILTRATION / EXFILTRATION. Clandestine entry/exit to/from country, conflict or attack zone.
INFRA-RED. Radiation between the red end of the visible spectrum and microwaves. Used for
some types of weapon-sight and intruder-detection devices.
INSERTION. Describes entry of personnel, usually to a specific zone or organisation.
INTELLIGENCE SECURITY. Guarding intelligence and the methods used to obtain it.
INTELLIGENCE. Strategic information, especially on opposing forces.
INTERNATIONAL. Existing or occurring between nations.
ISLAM. One of the three great monotheistic religions, believed by Muslims to have been
revealed by God to Mohammed as his last Prophet, and as recorded in the Holy Quran.
J
JAISH (or Jesh). Arabic. Army.
JAMAAT. Arabic. Group (in political context). Pronounced with a soft J, as in the French word
Je. In Egyptian Arabic, Jamaat is Gamaat (the G is pronounced hard as in Goal).
JAMIAT. Arabic. Groups. Plural of Jamaat. In Egyptian Arabic: Gamiat (G pronounced hard).
JANBAAZ. Urdu. Martyrs or brave soldiers.
JARGON. Terminology or slang of a profession or trade.
JIHAD (or Jehad). Arabic: Islamic holy (or spiritual) struggle, war or effort.
JUDAISM. One of the three great monotheistic religions, which Jews base upon the teachings
of the Old Testament of the Holy Bible and the Talmud.
K
KAFIL. Arabic: Sponsor.
KGB. Komitet Gosudarstvennoy Bezopasnosti (Committee for State Security). Coercive former
Soviet security and intelligence organisation.
KIDNAPPING. Abduction of a human being, usually for ransom or coercion.
Annex B/ Glossary of Terms 397
KILL ZONE. Area where victims of terrorism or military ambush are trapped and attacked.
L
LASHKAR (Lascar or Laskar). Arabic / Urdu / Pushtoon. Army.
LA TERREUR. A period in the French Revolution during which Royalty, aristocrats and political
enemies were publicly executed by guillotine. Terreur is a 14
th
century French word meaning:
the terror (from the Latin terrere, to frighten). From increased use of the word Terreur during
the French revolution-period, terror came into common use as an English word, and the words
terrorism and deter derive from it.
LAW. Light Anti-Tank Weapon. Often wire-guided onto target.
LMG. Light Machine Gun, magazine or belt-fed. Often of a calibre around 7.62 mm.
LOW INTENSITY CONFLICT. Short of war. Sporadic fighting, often with irregular forces.
M
MAFIA. A criminal organisation opposed to government rule of law (historical origins: Morte alla
Francia, Italia anela. Italian: Death to France cries Italy). Aka Cosa Nostra (Our thing / cause).
MAGAZINE. Integral container of ammunition in a weapon. An ammunition store.
MASSACRE. Slaughter, especially with cruelty and carnage.
MAUSER. A German arms manufacturer.
MCI. Mass Casualty Incident.
MEANS. The method by which a successful conclusion to an objective is achieved. See ENDS.
MEDIA. Mass communications industry and those engaged in it: Newspapers, TV, radio.
MEDIUM ARMS. Between Small Arms and Heavy Weapons. eg. Rocket Propelled Grenade.
MESSIANIC. Pertaining to the religious belief of the coming of a saviour.
MI-5. Military Intelligence, 5 branch. UK Security Service.
MI-6 / SIS. Military Intelligence, 6 branch. UK Secret Intelligence Service.
MINE. A military purpose explosive, within a casing, with a charge, trigger and detonator.
MINEFIELD. A regular or irregular patterned deployment of concealed mines.
MISINFORMATION. Innocent or negligent passing of information which is false.
MODUS OPERANDI.(M.O.) Latin: Method of operation. Especially patterns in criminal acts.
MORTAR. A tubed artillery weapon, launching bombshells in a high trajectory onto target.
MOSSAD. Hebrew: Mossad Letafkidim Meyouchadim [originally Mossad Le Aliyah Beth]; Israeli
Institute for Intelligence and Special Services.
Annex B/ Glossary of Terms 398
MOTION DETECTOR. Detects Infra Red Waves (heat) radiating from moving objects.
MUJAHID (plural:MUJAHIDEEN). Arabic: Religious fighter (Islamic equivalent of Crusader).
MUKHABARAT. Arabic: Intelligence service. Literal translation; those who call / pass messages.
MURDER. Unlawful killing with intent and premeditation.
N
NATO. North Atlantic Treaty Organisation. 1949 ~. A collective western defence alliance-
organisation, now containing some members of the former (enemy) Warsaw Pact (1955-1991).
NBC. Nuclear, Biological and Chemical (weapons).
NEGOTIATE. Bargain, discuss, mediate, arbitrate, intercede, intervene.
NEO-NAZI. Similar to or following Nazi traits or political dogma, especially racial.
NINE ELEVEN (9 /11). The 11
th
September 2001 attacks on the World Trade Centre, Pentagon
and Pennsylvania, US.
NOM DE GUERRE. French: War name e.g. Carlos the Jackal (Ilich Ramirez Sanchez).
NON-NEGOTIABLE. Those terrorists who will not negotiate. Also called sub-conflict.
O
OBSERVATION. Viewing, listening or monitoring, and noting of that which is observed.
OCCULT. Concealed, esoteric, mysterious, cult-like. Group, band, sect; especially Satanist and
pseudo-religious.
ODCCP. United Nations: Office of Drug Control and Crime Prevention.
ONU. French: Organisation des Nations Unies. Acronym for United Nations Organisation.
OP. Observation Post. A type of small field station or post with observation facilities.
OPEN SOURCE. Intelligence from open sources, usually media.
ORDNANCE. Military equipment arrangements. Especially ammunition or arms.
OXIDISER. Compound containing Oxygenised propellant which enhances combustion of main
charge (explosive).
P
PARKER-HALE. A UK arms manufacturer.
PENETRATE. Clandestine infiltration of opposition forces.
PENTOLITE. A combination of Pentaerythritol-tetranitrate and TNT, used in IEDs.
PETN. Pentaerythritol-tetranitrate. An explosive in IEDs. See RDX.
PHOTO-ELECTRIC TRIGGER. Light-activated cell in IED, causing fuse to detonate charge.
Annex B/ Glossary of Terms 399
PISTOL. A semi-automatic hand-gun (small arm or side arm), with a magazine of ammunition.
PLANT. Slang word for agent infiltrated by opposition forces.
PLASTICISER. Practical compound to bind explosive charges and make them malleable.
POLITICS. The study of people in a group context. Used to describe government actions.
POPULATION CENTRE. A heavily-populated urban capital, city, town or centre.
POSITION. Small defensive military site. May be a bunker, trench or shell-scrape.
PRINCIPAL. Person vulnerable to attack, being guarded by security close-protection personnel.
PRISONER. Captive or hostage.
PROCUREMENT. Supply acquisition process after logistical needs are identified.
PROFILE. A characterisation of an individual or a site.
PROTECTION MONEY. Money illegally extorted for bogus protection services.
PTSD. Post Traumatic Stress Disorder. Formerly battle fatigue and shell shock. Also known as
burn out. Stress disorder resulting from severe traumatic experience or persistent exposure to
negative stress.
PURGE. Cleansing, purifying, filtering. Especially widespread political detention and murder.
R
RACIST. One who holds and sometimes exhibits animosity for other (usually specific) races.
RANSOM. Sum of money or goods, illegally demanded for return of person or property.
RDD. Radiological Dispersal Device. Bomb attached to radioactive material.
RDX. Research Department Explosive. A powerful high explosive used in IEDs.
RECONNAISSANCE. Preliminary survey to discover enemy position or strength.
REGULAR WARFARE. Conflict of conventional, recognised (government) combatants.
RELIGION / RELIGIOUS. Moral belief system in a higher unseen controlling entity (ies).
REVOLVER. A handgun (sidearm or small arm), with rotating cylinder, containing ammunition.
RIFLE. A long arm with spiral grooves in barrel to spin projectile (bullet) and enhance accuracy.
RIFLE-GRENADE. A grenade fired from a rifle, using a special round of ammunition.
ROBBERY. Theft, accompanied with violence before or during the act of theft.
ROGUE. Word to describe an intelligence or security official acting outside of his legal authority.
ROUND. A charge, bullet, shell or piece of ammunition.
RPG. Rocket propelled grenade. Shoulder-held weapon which fires a rocket-driven grenade.
Annex B/ Glossary of Terms 400
S
SABOTAGE. Deliberate and often clandestine damage or destruction as part of a tactical plan.
SAFE HOUSE. A house (for a fugitive) of which opposition forces are supposedly unaware.
SAS. Special Air Service (Regiment). Elite British Army regiment with counter-terrorist wing.
SATELLITE. Technical entity orbiting the earth, for communications or sensor activity.
SAT-INT. Intelligence gained by satellite technology.
SAWAB. Arabic: Divine credit.
SC. United Nations: Security Council.
SEAJACKING. Taking over a vessel by force, usually for political or financial motive.
SEARCH-AND-DESTROY. Military mission in hostile territory, to find and kill enemy.
SECT. A division, cult or group.
SECURITY INTELLIGENCE. Information enhancing security or known about security.
SECURITY. Condition, sense or capability of safety from threats or harm.
SEMI-AUTOMATIC. Weapon that fires one shot at a time, re-loading itself automatically.
SEMTEX. A very powerful type of Czech-manufactured plastic high explosive.
SERIAL KILLER. A murderer who kills multiple victims, sometimes over a long period.
SHAHEED. Arabic: Martyr.
SHRAPNEL. Pieces of projectile, usually from an artillery shell, mortar round or grenade.
SIDEARM. A pistol or revolver. Literally an arm worn at the side (waist).
SIEGE. Situation in which persons are encircled and contained in structure or vessel.
SIG. A Swiss arms manufacturer.
SILENCER. An attachment on the barrel-end of a hand-gun, rifle or SMG, which suppresses
sound, prolongs the element of surprise or alert, and facilitates escape.
SLEEPER. Slang word for an agent infiltrated by opposition forces, activated in long term.
SMALL ARMS. Side arms, hand guns, some types of rifle and SMG, usually small calibre.
SMG. Sub machine gun (assault rifles are variants). Single or fully automatic fire / reloading.
SNIPER. Concealed marksman with enhanced rifle sights who shoots over long distances.
SOCIAL. Term to describe terrorists and causes such as anti-abortion and animal rights.
SOURCE. An intelligence informant.
Annex B/ Glossary of Terms 401
SPONSOR. A person, group or government who provides free money, services or provisions.
STERLING (ARMS CO). A UK arms manufacturer.
STOCKHOLM SYNDROME. A phenomena by which hostages begin to experience sympathy
for their captors, first formally recognised in Stockholm after a bank robbery / siege and hostage
incident.
STUN GRENADE. A type of grenade used by counter-terrorist forces which is non-lethal.
SUB-CONFLICT. Describes those terrorists who will not negotiate.
SURVEILLANCE. Open or covert monitoring, often with electronic or mechanical aids.
SUSPECT. A person believed to have committed, or be about to commit a given act.
T
TARGET HARDENING. Reinforcing security measures to enhance protection of a potential
victim.
TARGET. The objective. Terrorist targets may be individuals, groups and also the victims.
TEAM. Slang word for a security force, terrorist or criminal group.
TEHREEK. Urdu / Hindi. Movement.
TERR. Slang word for terrorist.
TERROR. From the French: La Terreur, derived [root] from Latin: Terror-terrere (to frighten).
THEFT. Dishonest taking of anothers property with intent to permanently deprive.
THREAT. Warning, intimidation or danger.
TNT. Tri-Nitro-Toluene. An explosive used in IEDs.
TPB. United Nations: Terrorism Prevention Branch. Unit of ODCCPs CICP branch.
TRACEM. Thermal, Radiation, Asphyxiation, Chemical, Etiological, Mechanical. Types of harm
caused by terrorist weapons or Weapons of Mass Destruction.
TRANSNATIONAL. Extending or operating across national boundaries.
TRIGGER. Device when activated that operates the fuse or detonator in an IED.
TURN / TURNING. Changing service, loyalty or views of a target, to that of his opponents.
U
ULTRA VIOLET. Beyond the violet end of the visible spectrum. Radiations are less than those
of visible light. Limited forensic use as a detective tool.
UN. United Nations (Organisation). Planned in WWII, formed 1945, superseded the League of
Nations and assumed all of its un-discharged responsibilities in 1946.
Annex B/ Glossary of Terms 402
UNDERCOVER OPERATIVE. Covert operative or agent.
UNO. United Nations Organisation.
UZI. An Israeli arms manufacturer.
V
VICTIM. The prey, casualty, hunted, dead. In the context of terrorism, may also be the target.
W
WARSAW PACT. Former Soviet Union treaty with its allies (1955-1991). A Cold War force
opposing NATO (1949 ~ ) and consisting of the Soviet Union, Bulgaria, East Germany,
Czechoslovakia, Hungary, Poland, and Romania.
WEAPON READINESS. Alertness in which weapons are loaded, cocked and ready to fire.
WEAPON. An instrument of defence or offence. May or may not be purpose manufactured.
WIRED. Slang word for a dwelling or object with a hidden IED bomb attached (booby trap).
Secondary slang meaning: A person with a concealed tape-recorder or transmitter.
WIRE-GUIDED MISSILE. Hand-shoulder launched missile, guided onto target by electronic
signal wires. Origin in wire-guided air-to air missiles on Nazi Luftwaffe jet fighters, late in WWII.
WORLD WAR I. From 11:10 am, 28
th
July 1914, to 11 am, 11
th
November 1918.
WORLD WAR II. From 11 am, 3
rd
September 1939, to 8 am, 5
th
May 1945 (German surrender)
and 9:08 am, 2
nd
September 1945 (Japanese surrender).
WOUNDING. Serious physical injury, generally breaking of skin, causing blood to flow.
WMD. Weapons of Mass Destruction.
X
XENOPHOBIA. General fear of foreigners or their customs.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 403
ANNEX C: List of Groups Accused of Terrorism by Governments or Media
* This list is not comprehensive.
* Arabic, Cyrillic, Farsi, Hebrew, Hindi, Pushtoun and Urdu translations reflect English spelling variance, according to accepted phonetic practice.
* Note: The material contained here is not the [apolitical and unexpressed] opinion of UNITAR or the Author. UNITAR and the Author disclaim any and all responsibility for
facts or opinions contained in the text, which have largely been assimilated from media and other independent sources.
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
14k Triad Macau Macau Criminal
Rivalry
Organised criminal gang.
15th May Organisation Iraq Middle East Political Dormant.
1st October Anti-Fascist Resistance
Group (GRAPO)
Spain Spain Political Seeks US forces withdrawal from Spain and
revolutionary government.
Abu Nidal (Father of the Struggle)
Organisation. Abu Nidal is the nom de
guerre of Sabri al Banna. Also known
as Abu Nidals Arab Revolutionary
Command, Black September, Cells of
the Arab Fedayeen (Self-Sacrificers)
Lebanon
(Bekaa
Valley)
International Political Opposed to Israel, western countries with
Middle East interests, PLO and moderate
Arab states. Restrained by Syria. This group
is an umbrella Organisation for at least
seven other groups; Fatah Revolutionary
Council, Arab Revolutionary Council, Arab
Revolutionary Brigades, Black September
and Revolutionary Organisation of Socialist
Muslims.
Abu Sayyaf Group (Father of the
Sword)
Phillippines
(Mindanao)
Phillippines
(Mindanao)
Religious
Separatist
Seeks independent Islamic state on island of
Mindanao. Linked to Moro Islamic
Liberation Front (MILF).
Aceh Security Disturbance Movement Indonesia
(Sumatra)
Indonesia
(Sumatra)
Ethnic
Political
Seeks independence from Indonesia.
Action Directe (Direct Action) France
(Paris)
France Political Marxist-Leninist group. Sought revolution to
overthrow world capitalist system.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 404
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Aden (Abyan) Islamic Army Yemen Yemen Political
Religious
Anti-Government, Anti-US and Anti-UK.
Advocates For Life US US Social
Convictions
Anti-abortion. Violent.
Afghanis Afghanistan International Religious
Ethnic
Political
Mobile former Afghanistan-Soviet war
veterans from 14 countries. Participate in
any conflict involving Muslims.
Afghan Liberation Organisation Afghanistan Afghanistan Political Seeks Marxist Government in Afghanistan.
Anti-US.
Aimal Khufia Action Committee Pakistan Karachi Religious Anti-US, Anti-Western.
Akbar Tigers (Greater Tigers) India;
Jammu and
Kashmir,
Azad
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Al Aqsa Martyrs Brigade (named after
Islamic holy site [and also Mosque] in
Jerusalem)
Palestinian
Autonomous
Areas
(PAAs)
PAAs
Israel
Political Seeks independence of a Palestinian State.
Related to Hammas.
Al Badar (The Perfect) India:
Jammu and
Kashmir
India:
Jammu and
Kashmir
Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan.
Al Barq (The Lightening. Named after
the white of Prophet Mohammed)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 405
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Al Dawa al Islamiya (Party of the
Islamic Call)
Iran Iraq, Kuwait,
Lebanon
Religious Seeks to promote Shiite revolution.
Al Faran (The Mountain Fighters) Indian part
of Jammu
and Kashmir
Indian administered
part of Jammu and
Kashmir
Political
Religious
Related to Harkat ul Ansar in Jammu and
Kashmir.
Al Fatah (The Conquest), also known
as Amn Araissi (Main Security)
Israel
Palestine
AA,
Lebanon,
Tunis
Israel
Palestine
AA
Political Renounced terrorism in 1993. Dormant.
Al Fatah (The Conquest) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Al Fuqra (The impoverished) US US Religious US Black Muslim sect.
Al Gamaa al Islamiya (GAI, The
Islamic Group)
Egypt Egypt Religious Seeks to establish a GIA Islamic regime in
Egypt. GIA is sometimes held responsible
for acts of small largely unknown Egyptian
terrorist groups (up to 50 such groups).
Al Hadda (the Guides) Yemen Yemen Criminal Tribesmen.
Al Hadid (The Edicts [of the Prophet]) Jammu and
Kashmir
Indian administered
part of Jammu and
Kashmir
Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan.
Al Hamas (Harakat al Muqawama al
Islamiya or Islamic Resistance
Movements)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 406
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Al Harakan al Islamiya (The Islamic
Movement)
Pakistan Iran Ethnic Seeks to establish an Arab state in south
west Iran (Arabistan oil-fields).
Al Haramayn (word to describe Mecca
and Medina [ancient Yathib]; 1st and
2nd holiest sites in Islam)
Kenya Kenya Religious
Political
Anti-US members.
Al Inqualab (The Revolution) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Al Ittahad al Islamiya (The Islamic
Union)
Somalia Ethiopia Political Seeks to overthrow Ethiopian government.
Linked to Iraq and Al Qaida.
Al Jamaa al islamiyya al Muqatilah bi
Libya (Islamic Fighting group of
Libya)
Libya Libya Religious
Political
Anti-Qadaffi, Anti-US. Links to Al Qaida.
Al Jehadia Police Commandos (Police
Commandos of the Holy War)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Al Jihad or New Jihad (Holy War or
Struggle)
Egypt Egypt Religious Seeks overthrow of government.
Al Jihad (The Holy Struggle) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Al Karbala (lit. Those close to God,
named after Iraqi city, holy to Shiites)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 407
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Al Khomeini (named after Iranian
Ayatollah)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Al Mahdi Mohammed (Mohammed,
the Guide)
Somalia Somalia Political Clansmen.
Al Mujahid Force (The Force of the
Religious Fighter)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Al Mujahideen (Religious Fighters)
Force
India;
Jammu and
Kashmir
India;
Jammu and Kashmir
Afghanistan
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Al Najun min al Nasar (Those rescued
from the Christians)
Egypt Egypt Religious Seeks overthrow of government.
Al Qaida (The Base [military
connotations] or the Foundation)
Afghanistan
(remnants)
Pakistan
Lebanon
Somalia
Sudan
International
presence
focussed
around Gulf
and East
Africa
Afghanistan, Kenya,
Tanzania, US,
Europe, Tunisia,
Saudi Arabia,
Kuwait,
Yemen
Religious
Political
Seeks to liberate holy Islamic sites and
establish Islamic world state. Anti-US,
Israeli, western, Arabic governments and
monarchies. Named after a guesthouse
owned by Osama bin Laden, as part of the
recruitment process for Mujahideen in the
Soviet-Afghan war. See Maktaba I Khidmat
(Service Office). A Muslim extremist
network (loose coalition) of transnational
terrorists, of no particular group affiliation or
national base. Headed by bin Laden,
responsible for 9 /11 and many other attacks.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 408
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Al Qanoon (the law) Pakistan Pakistan Political
Religious
Anti-US / west. Detonated bomb outside US
Consulate in Karachi, Pakistan, on 14
th
June
2002, killing 11 and injuring 25.
Al Shawqiyoun (The Zealous Ones) Egypt Egypt Religious Splinter of Gamaa al Islamiya (GIA).
Al Takfir wa el Higra (The Atonement
and Flight [of the Prophet] )
Egypt Egypt Religious Seeks overthrow of government.
Al Tawaqquf wal Tabayyun (Final
Judgement and the Converts) also
known as Al Najunmin al Nar
(Deliverance from Hell)
Egypt Egypt Religious Anti-Government.
Al Tawhid (The Union) Germany
UK
Germany
UK
Europe
Tunisia
Religious
Political
Anti-Western and moderate Muslim
governments. Interacts with Al Qaida.
Al Umar Mujahideen (The Religious
Fighters of Umar [2nd Caliph] )
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Alex Boncayao Brigade (also ABB; Red
Scorpion Group)
Phillippines
(Manila)
Phillippines Political Maoist group. Seeks overthrow of
government. Acts in urban areas. Rural acts
carried out by co-group; New Peoples
Army.
Allah Tigers (Tigers of God) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 409
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Allied Democratic Forces Uganda Uganda Religious
Political
An Anti-Western Islamic group.
All India Sikh Students Federation (2
factions)
India
(Punjab
state)
India
(Punjab
state)
Religious
Separatist
Seeks independent Sikh country called
Khalistan, around Amritsar in Indias Punjab
state.
Al Shaif (tribesmen) Yemen Yemen Criminal Engage in Extortion and Kidnappings.
Amal (meaning Hope / also an
acronym: Afwaj al Muqawamah al
Lubnaniyyah (Lebanese Resistance
Detachments)
Lebanon Lebanon Religious Seeks to replace Hezbollah as primary Shiite
group.
American Coalition of Life Activists US US Social
Convictions
Anti-Abortion. Violent.
Anarchist Attack Groups Greece Greece Anarchist
Political
Arson attacks. Demands release of
imprisoned anarchists.
Animal Abuse Society UK UK Animal
Rights
A cover name used by the Animal Liberation
Front to disassociate themselves from
terrorism.
Animal Defence League UK UK Animal
Rights
A cover name used by the Animal Liberation
Front to disassociate themselves from
terrorism.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 410
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Animal Liberation Front (ALF)
also known as - Animal Abuse Society,
Animal Defence League, Animal Rights
Militia, Hunt Retribution Squad and
Justice Department
UK, US,
Italy
Australia, Canada,
Finland, France,
Italy, Poland,
Sweden, UK, US
Animal
Rights
Origins from a group called Bank of Mercy
whose roots emerged from a group called
Hunt Saboteurs Association. Uses following
cover groups to commit terrorist acts;
Animal Abuse Society, Animal Defence
League, Animal Rights Militia, Hunt
Retribution Squad and Justice Department.
Members include those who are politically
far left and far right, and from all classes.
Animal Rights Militia UK UK Animal
Rights
A cover name used by the Animal Liberation
Front to disassociate themselves from
terrorism.
Ansar ul Islam (The Islamic Supporters
[Companions of the Prophet] )
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Ansar ul Mujahideen (Supporters of
the Religious Fighters)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Anti-American Arab Liberation Front Libya Germany,
Europe
Political Anti-Western.
Arab Fedayeen Cells
(Arab Self Sacrificers* Cells)
* Fedayeen is not translated as Martyrs
Lebanon Lebanon Political Anti-Western. Possibly dormant.
Arab Liberation Front Iraq Iraq Political Dormant.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 411
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Arab Revolutionary Brigades (ARB) Lebanon
(Bekaa
valley)
International Political Opposed to Israel, western countries with
Middle East interests, PLO and moderate
Arab states. Restrained by Syria. One of
several groups under the umbrella of the
Abu Nidal Organisation.
Arab Revolutionary Council (ARC)
also known as Arab Revolutionary
Organisation
Lebanon
(Bekaa
valley)
International Political Opposed to Israel, western countries with
Middle East interests, PLO and moderate
Arab states. Restrained by Syria. One of
several groups under the umbrella of the
Abu Nidal Organisation.
Aracan United National Front Burma Burma Ethnic
Political
Seeks Autonomy / Independence.
Ar e wa Pe o p l e s Co n g r e s s Nigeria Nigeria Political
Ethnic
Anti-Government.
Armata Corsa (Corsican Army) France
(Corsica)
France
(Corsica)
Political
Ethnic
Seeks elimination of organised crime on
Corsica, Independence from France and
release of Armata Corsa members from
French prisons.
Armed Forces of Madina (3rd holiest
site in Islam)
Pakistan;
Rawalpindi
Pakistan;
Rawalpindi
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Armed Forces of Popular Resistance Puerto Rico Puerto Rico, US Political S e e k s I n d e p e n d e n c e f r o m US -
commonwealth association.
Armed Forces Revolutionary Council Sierra Leone Sierra Leone Political Opposition Movement.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 412
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Armed Islamic Movement India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Very small group.
Arm Islamique du Salut (AIS, Islamic
Salvation Arm)
Algeria Algeria Religious Seeks to establish an FIS Islamic regime in
Algeria. Armed wing of FIS.
Armed Revolutionary Nuclei Italy Italy Political Left-wing anti-fascist group.
Armenian Secret Army for the
Liberation of Armenia (ASALA, aka
Orly Group, 3rd October, Asalarm,
Asal Mi l i tant, Revol uti onary
Movement)
Middle East,
Europe,
North
America
International Political Communist. Seeks to elicit Turkish
government acknowledgement of
responsibility for Armenian genocide at turn
of 20th century. Anti-Turkish colonialism,
anti-imperialism, NATO and Zionism.
Army of Suicidals Yemen Yemen Religious Seeks overthrow of government.
Aryan Nations (also known as Church
of Aryan Nations and Church of Jesus
Christ-Theological Arm)
US US Racial
Political
Neo-Nazis.
Aryan Republican Army US US Political
Racial
Neo-Nazis.
Asbat ul Ansar (League of Companions
[of the prophet])
Lebanon Lebanon Religious
Political
Seek overthrow of government and
replacement by strict Islamic regime.
Aum Shinri Kyo (Supreme Truth) aka
Aleph
Japan Japan Armageddon-
ist
Uses chemical and biological weapons.
10,00 members, US$ 1 billion assets.
Autonomia Operaia (Autonomous
Workers movement)
Italy Italy Political Seeks revolution.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 413
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Avengers of Infants Israel Israel Political
religious
Very small group. Planted a bomb in a
Palestinian schoolyard in retaliation for
Palestinian terrorist acts.
Azione Rivoluzionaria (Revolutionary
Action)
Italy Italy Political Anarchists.
Babbar Khalsa (Babbar Group) India
(Punjab
state)
India Religious
Ethnic
Seeks independent Sikh country called
Khalistan, around Amritsar in Indias Punjab
state.
Balokot Tanzeem (Balakot Group) India;
Jammu and
Kashmir,
Delhi
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Very small group.
Batmaloo Co-ordination Committee
Named after small area of Srinagar,
summer capital of Jammu and
Kashmir)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
BBA (Bayouwarische Befreiungs
Armee or Bavarian Liberation Army)
Austria Austria, Germany,
other European
countries
Racial
Political
Frustration
One member convicted. Believed to be the
sole terrorist (Franz Fuchs) of a neo-Nazi
group.
Befreiungs Ausschuss Sudtirols
(Committee for the Liberation of South
Tyrol)
Austria
Italy
Austria
Italy
Political
Ethnic
Dormant for many years.
Bengali Tiger Force India: Assam India: Assam Political Separatists.
Bhagwan Shree Rajneesh Cult US US Religious Used biological weapons.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 414
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Bharatiya Janata Party (BJP) India India Religious
Political
See RSS.
Bhinderanwala Tiger Force North India India, Europe, Asia,
U.S., Canada
Political Sikh Separatist group.
Black Hand Serbia Europe Political National Extremists.
Black June Lebanon
(Bekaa
valley)
International Political Opposed to Israel, western countries with
Middle East interests, PLO and moderate
Arab states. Restrained by Syria. One of
several groups under the umbrella of the
Abu Nidal Organisation.
Black September Lebanon
(Bekaa
valley)
International Political Opposed to Israel, western countries with
Middle East interests, PLO and moderate
Arab states. Restrained by Syria. One of
several groups under the umbrella of the
Abu Nidal Organisation.
Black September Organisation Middle East Middle East Political Dormant . Formed aft er expul si on of
Palestinian guerrillas and terrorists from
Jordan in 1970.
Black Tigers - Liberation Tigers of
Tamil Eelam (LTTE, Tamil Tigers)
Sri Lanka
(Jaffna
Peninsula)
Sri Lanka, India Ethnic
Separatist
A group of volunteer suicide terrorists
within the Liberation Tigers of Tamil Eelam
(LTTE, Tamil Tigers).
Blood and Honour Europe, US Europe, US Racial
Political
Neo-Nazi.
Bodo Security Force Bhutan
(south)
Assam Ethnic
Separatist
Seeks an independent country called
Bodoland in northwest Assam.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 415
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Bougainville Revolutionary Army
(BRA)
Papua New
Guinea;
Bougainville
Island
Papua New
Guinea;
Bougainville
Island
Political
Ethnic
Seeks secession from Papua New Guinea.
Branch Davidians US US Religious
Messianic
Messianic Group which seeks isolation and
low profile.
Brethren Brigades of the Faithful Saudi Arabia Saudi Arabia Religious Seeks to overthrow Royal family in Saudi
and establish Sunni Islamic state.
Caprivi Liberation Front Namibia Namibia Ethnic Separatist / Independence group.
Casamance Democratic Forces
Movement
Senegal Senegal Political Separatist. Seeks Independence.
Champions of the Prophets Example
(Ansaru es Sunna)
Egypt Egypt Religious Seek overthrow of government.
Cholana Kangtoap Serei Cheat
Kampouchea (Cambodian Freedom
Fighters)
Cambodia Cambodia Political Anti-Government (Cambodian Peoples
Party).
Christian Action Group US US Social
Convictions
Anti-Abortion. Violent.
Chukaka Ha (Central Faction or
Kansai Revolutionary Army)
Japan Japan Political Extremist left wing group. Seeks to
overthrow government. Anti-US. Armed
wing is Kansai Revolutionary Army.
Church of the Creator US US Racial
Political
Fascist, Anti-Semitic, Anti-Christian, racist
group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 416
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Collegiates Activated to Liberate Life US US Social
Convictions
Anti-Abortion. Violent.
Column 88 UK UK Racist Neo-Nazi group.
Column 88 Heil Hitler France France Political
Racial
Neo-Nazi group.
Combat 18 UK UK Racial
Political
Neo-Nazi group.
Committee for Road Safety
Committee for Security on the Roads
Israel Israel Political
Religious
Racial
A splinter group of Kach, that attacks
random Palestinians.
Committee for Solidarity with Arab
and Middle Eastern Prisoners
Turkey Turkey,
France
Ethnic Armenian group.
Committee of the Revolutionary
Internationalist Movement
Peru Peru Political Anti-US, Anti-Interventionalist.
Communist Combatant Party (PCC) Italy Italy Political Split from Red Brigades with Union of
fighting Communists.
Communist Fighting Cells (CCC,
Cellules Communists Commbattantes)
Belgium Belgium Political Marxist-Leninist group. Opposed US troop
presence in Europe.
Communist New Peoples Army Philippines Philippines Political Seeks overthrow of government.
Congolese Movement for Democracy South Africa South Africa
DR Congo
Political Some members train as insurgents and
terrorists.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 417
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Continuity Irish Republican Army
(also known as Continuity Army
Council)
Northern
Ireland, UK
Rep. of
Ireland
Northern
Ireland, UK
Rep. of
Ireland
Political
Religious
Fanatical group established to continue
terrorism after PIRA announced cease-fire.
Convoy of Mercy Jammu and
Kashmir
Indian administered
part of Jammu and
Kashmir
Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan.
Daar al Islam (The House of Islam) US US Religious Some members are accused of terrorism.
Dagenstani Kidnappers Russia Chechnya Criminal A criminal gang that commits terrorism.
Dal Khalsa India
(Punjab
state)
India Religious
Ethnic
Seeks independent Sikh country called
Khalistan, around Amritsar in Indias Punjab
state.
Dashmesh 10th Regiment (also
Dashmesh Regiment and 10th
Regiment)
India
(Punjab
state)
India, Japan Religious
Ethnic
Seeks independent Sikh country called
Khalistan, around Amritsar in Indias Punjab
state.
Dawa (The Call or Mission) Libya Libya, centre and east Religious Seeks to overthrow government and
establish Islamic regime in Libya.
Defensive Action US US Social
Convictions
Anti-Abortion. Violent.
Democratic Front for the Liberation of
Palestine (DFLP or Popular DFLP)
Palestinian
Territories
Israel,
Palestinian
Territories
Political
Ethnic
Seeks Palestinian state.
Democratic Party of Iranian Kurdistan
(DPIK)
Iran Iranian Kurdistan Ethnic Seeks to establish a Kurdish state.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 418
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Democratic Revolutionary Front for
the Liberation of Arabistan (DRFLA)
Iran Iran, UK Ethnic Seeks to establish an Arab state in south
west Iran (Arabistan oil-fields).
Devrimci Sol (Revolutionary Left).
Changed name to Revolutionary
Popular Liberation Party / Front
Turkey
(Ankara)
Turkey Political Marxist group. Opposed US troop presence
in Europe.
Dukhtran e Millat (Daughters of the
Nation)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Womens group; a few members
commit terrorism.
Earth First UK UK Social Beliefs Environmental protection group. Very few
terrorists in this group.
Earth Liberation Front UK,
International
UK,
International
Social Beliefs Environmental protection group.
- Eastern Shan State Army
- Mong Tai Army Myanmar
- National Democratic Alliance Army
- United Wa State Army
Burma Burma Ethnic
Criminal
(narcotics)
Oppose(d) anti-narcotics efforts by Burmese
Government.
Ecological Direct Action International International Social Beliefs Environmental protection group.
Egyptian Regional Group Afghanistan Afghanistan Religious Some members are accused of terrorism.
Ejercito de Liberacion Nacional-(ELN,
National Liberation Army-Columbia)
Columbia Columbia Political Marxist-Maoist group. Anti-Government
and US.
Ejercito de Liberacion Nacional Bolivia
(ELN, National Liberation Army-
Bolivia)
Bolivia Bolivia Political Marxist-Leninist group. Anti-Government
and US. Founded by Che Ernesto Guevara.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 419
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Ejercito Guerrillero Tupac Katari
(EGTK, Tupac Katari Guerrilla Army)
Bolivia
(Chapare)
Bolivia Racist
Political
Maoist and racist group. Indigenous Indian
natives. Opposes government, Anti-US.
Ejercito Popular de Liberacion (EPL,
Peoples [or Popular] Liberation Army)
Columbia Columbia Political Maoist group, opposes government. Split
into two factions.
Ejercito Popular Revolucionario (EPR,
Peoples Revolutionary Army)
Mexico
(Guerrero)
Mexico Financial
Political
Seeks political reform. Kidnaps for large
ransoms. Avoided by other terrorist groups.
Political wing is the Ejercito Popular
Revolucionario.
Ejercito Zapatistas de Liberation
Nacional (EZLN, Zapatista National
Liberation Army)
Mexico
(Chiapas)
Mexico Political
Ethnic
Et hni c mi nor i t y gr oup. Seeks
implementation of government-promised
autonomy and democracy.
Emgann - Combat France France Ethnic
Political
Separatist / Independence.
Enough is Enough in the Niger Nigeria Nigeria Political Ant i - Commer ci al expl oi t at i on ( oi l
companies).
Epanastaiki Organosi 17 Noemvri
(Revolutionary Organisation 17
November)
Greece Greece Political Committed several attacks spanning
decades. Only one suspect has ever been
caught. Anti-US and NATO. Evolved from
student uprising against Greek military junta
in 1970s.
Eritrean Islamic Jehad (Holy War) Sudan Eritrea Religious Seeks overthrow of Eritrean government.
Eritrean Liberation Front Sudan Eritrea Religious Seeks overthrow of Eritrean government.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 420
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Euzkadi Ta Askatasuna (ETA, Basque
Fatherland and Liberty). Also known
as Tierra Vasca y Libertad. Sub groups
of ETA are K.a.s.; Xaki; Ekin; Jarrai
Haika Segi; Gestoras Pro Amnistia;
Askatasuna
Spain Spain Ethnic Separatist group seeking an independent
state. Split in 1974 into ETA / PM (political-
military) and ETA / M (militant).
Euzkadi Ta Askatasuna-Militant (ETA,
Basque Fatherland and Liberty-/ M)
Spain Spain Ethnic One of two splinter groups which in 1974
emerged from Euzkadi Ta Askatasuna
(ETA, Basque Fatherland and Liberty).
Euzkadi Ta Askatasuna Political-
Military (ETA, Basque Fatherland and
Liberty-P/M).
Spain Spain Ethnic One of two splinter groups which in 1974
emerged from Euzkadi Ta Askatasuna
(ETA, Basque Fatherland and Liberty).
Exercito Guerrilleiro do Povo Galego
Ceibe (Free Galician Peoples Army)
Spain Spain Political
Separatists
Seek independence for Galicia.
Eyal Israel Israel Ethnic
Political
Opposes Oslo peace accords.
Farabundo Marti National Liberation
Front (FMLN, Peoples Revolutionary
Army, Revolutionary Party of Central
American Workers)
El Salvador El Salvador Political Opposes government.
Fatah Revolutionary Council
(Conquest Revolutionary Council)
Lebanon
(Bekaa
valley;
Lebanese
part)
International Political Opposed to Israel, western countries with
Middle East interests, PLO and moderate
Arab states. Restrained by Syria. One of
several groups under the umbrella of the
Abu Nidal Organisation.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 421
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Ferkat Salahudin (Saladin Brigade).
Named after the Kurd, Salah ad Din
Yusuf, the first Ayyubid Sultan [born
in Takrit, the same town as Saddam
Hussein] who repelled the Crusaders
from the Holy Land
Palestinian
Autonomous
Areas
(PAAs)
Palestinian
Autonomous
Areas
(PAAs)
Political
Religious
Unites militants from Fatah and Hamas.
Fighting Ansar (Companions) of Allah
(God)
Saudi Arabia Saudi Arabia Religious Seeks to overthrow Saudi Royal family and
establish Sunni Islamic state.
Fighting Communist Party (Fighting
Communist Nuclei)
Italy Italy Political One of two splinter groups originating from
the Red Brigades.
Fighting Guerrilla Formation Greece Greece Political Anarchists.
Fighting Islamic Group in Libya
(FIGL)
Libya Libya, centre and east Religious Seeks to overthrow government and
establish Islamic regime in Libya.
Force 17 Lebanon,
Europe
Middle East Political
Religious
Originally bodyguard group for PLO
chairman Yasir Arafat. Dormant since 1985.
Frankreich Hoffmann Group
(Pfeiffer Group)
France France Political
Racial
Neo-Nazi.
Free Aceh Movement
(Gerakin Aceh Merdeka)
Indonesia
(Aceh,
Sumatra)
Indonesia
(Aceh,
Sumatra)
Ethnic
Political
Seeks independence from Indonesia.
Free Papua Movement
(OPM or Organisasi Papua Merdeka)
Papua New
Guinea
Papua New
Guinea
Political
Ethnic
Seeks separatism from Indonesia, federation
with Papua New Guinea or independence as
West Papua or West Melanesia.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 422
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Front contre loccupation Tutsie (Front
against Tutsi occupation). Political
wing is Union des forces vives pour la
liberation et la democratie en RDC-
Zaire
Congo (DR) Congo (DR) Political
Ethnic
Seeks restoration of former Zaire and ethnic
cleansing of Tutsis.
Front de la Liberation Nationale de la
Corse - Canal Habituel (FLNC,
Corsican National Liberation Front -
Regular Branch)
France
(Corsica)
France
(mainland and
Corsica)
Ethnic Separatist group. Regular Branch. Political
front of this group is the Movement for Self-
Determination (PMA).
Front de la Liberation Nationale de la
Corse - Canal Historique (FLNC,
Corsican National Liberation Front -
Historical Branch )
France
(Corsica)
France
(mainland and
Corsica)
Ethnic Separatist group. Historical Branch. Political
front of this group is the Conculta
Naciunalista.
Front for the Liberation of the Cabinda
Enclave - Cabindan Armed Forces
(FLEC-FAC)
Congo Angola (Cabinda
enclave)
Separatism Seeks independence. Opposes MPLA
government and foreign oil companies.
Aided by UNITA.
Front Islamique du Salut
(FIS, Islamic Salvation Front)
Algeria Algeria
Jammu and Kashmir
Religious Seeks to establish an FIS Islamic regime in
Algeria. Outlawed with its armed wing the
AIS. Few members in India; Jammu and
Kashmir.
Front Islamique du Salut
(FIS, Islamic Salvation Front)
Europe Tunisia Religious Seeks to overthrow Tunisian government
and establish Islamic state.
Fuerzas Armadas de Liberacion
Nacional (FALN, National Liberation
Armed Forces)
Puerto Rico Puerto Rico, US Political S e e k s I n d e p e n d e n c e f r o m US -
commonwealth association.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 423
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Fuerzas Armadas Revolutionarias de
Columbia (FARC, Revolutionary
Armed Forces of Columbia)
Columbia Columbia, Panama,
Venezuela
Political Communist group. Opposes government and
US. Sometimes acts under the umbrella of
the Simon Bolivar Guerrilla Coordination
Group.
Gamaa Al Islamiya (Islamic Group) Egypt Egypt, Italy, UK,
Belgium, Germany
Religious Seeks overthrow of Egyptian Government
and establishment of Islamic regime.
Green Army India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, possibly dormant.
Grey Wolves Turkey Turkey, Latin
America
Political Reportedly dormant.
Groupe Salafiste pour la Predication et
le Combat ( GSPC / Salafist Group for
Preaching and Combat)
Algeria Algeria Religious
Political
Offshoot of Group Islamique Arm.
Group Islamique Arm (GIA, Islamic
Armed Group)
Algeria Algeria, France Religious Seeks to establish a GIA Islamic regime in
Algeria.
Group Islamique Arm - GSPC Algeria Algeria Religious
Political
Dissident splinter group of Group Islamique
Arm.
Hamas (Harakat al Muqawama al
Isl ami ya [Isl ami c Resi st ance
Movement]) or Hammas Izz al Din Al
Qassem
Israel,
Palestinian
Autonomous
Area
Israel,
Palestinian
Autonomous
Area
Religious Seeks destruction of Israel and establishment
of Palestinian state within former borders of
Palestine. Main armed wings are Izz al Din
al Qassam (Izz al Din Brigades).
Annex C/ List of Groups Accused of Terrorism by Governments or Media 424
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Harkat (i) Mujahideen (The Movement
of Religious Fighters)
India;
Jammu and
Kashmir;
UK
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Harkat ul Ansar (HuA, Companions [of
Prophet Mohammed] Movement)
Jammu &
Kashmir
(disputed)
Indian administered
part of Jammu &
Kashmir
Religious
Political
Seeks pledged plebiscite and accession to
Pakistan.
Harkat ul Jihad Islami Bangladesh
(Islamic Holy War Movement
Bangladesh)
Bangladesh Bangladesh Religious
Political
Seeks strict Islamic regime in Bangladesh,
Kashmir and Pakistan.
Harkat ul Jehad e Islami (Islamic Holy
War Movement)
Pakistan
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Many members joined Harkat ul
Ansar. Small group, probably dormant.
Jamiat Ulema-I-Islam Fazlur Rehman
faction (Accepted Groups of Islam,
Fazhur Rahman faction)
Pakistan
Azad
Kashmir
Jammu and Kashmir Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan.
Harkat ul Mujahideen (Religious
Fighters Movement)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Many members joined Harkat ul
Ansar. Small group, probably dormant.
Different group from Harkat i Mujahideen.
Hawari Group (Fatah Special
Operations, Group Martyrs of Tal al
Za atar, Amn Araissi [Main Security])
Middle East Middle East Political
Religious
Many members accused of terrorism.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 425
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Helpers of Gods Precious Infants US US Social
Convictions
Anti-abortion. Violent.
Hezb e Hurriyat (Freedom Party) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Umbrella group created for Al
Inquillab, Pasbane Islami, Islami Jang,
Islamic Freedom Movement and Tehreek ul
Mujahideen to form a coalition with JKLF,
JKSLF, Ikhwan ul Muslimeen and Tehreek
ul Mujahideen.
Hezb el Nahda (Islamic Revival Party)
Other name; Leadership of Islam
Europe Tunisia Religious Seeks to overthrow Tunisian government
and establish Islamic state.
Hezbollah (Party of God) Lebanon International Religious Seeks to establish a Shiite Islamic state in
Lebanon and the destruction of Israel.
Hezbollah (Party of God) - Bahrain Iran Bahrain Religious Seeks establishment of Shiite Islamic
government in Bahrain.
Hezbollah (Party of God) External
Security Organisation
London London Religious
Political
Small Presence in London, but on
Proscribed List.
Hizballah (Party of God) Turkey Turkey Political Kurdish (and Muslim) extremist group,
formed in response to Kurdish PKK
atrocities against Muslims in southeast
Turkey, where Hizballah wants to establish
strict Islamic state.
Hezbollah (Party of God) -Gulf Saudi Arabia Saudi Arabia Religious Shiite Muslim group. Seeks to overthrow
Royal family in Saudi Arabia.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 426
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Hizb Islami (Islamic Party) India;
Jammu and
Kashmir,
Azad
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Supplies recruits. Small
organisation.
Hizb i Wahadat (Unity Party) Afghanistan Afghanistan,
India; Jammu and
Kashmir
Political
Religious
Anti-Taliban. Some members fight in
Jammu and Kashmir.
Hizb ul Jihad (Holy Struggle Party) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Hizbullah (Party of God) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Hizb ul Momineen (The Believers
Party)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Hizb ul Mujahideen (Party of the
Religious Fighters)
Jammu and
Kashmir
Indian administered
part of Jammu and
Kashmir
Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan.
Hizb ul Nissa (The Womans Party) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group; a few members
commit terrorism.
Hunt Retribution Squad UK UK Animal
Rights
A cover name used by the Animal Liberation
Front to disassociate themselves from
terrorism.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 427
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Ikhwan ul Muslimeen (Muslim
Brotherhood)
Egypt,
Syria
Egypt,
Syria
Religious
Political
Shiite Muslim group. Dormant in Syria.
Ikhwan ul Muslimeen (The Muslim
Brotherhood)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Shiite Muslim group.
Ikhwan ul Muslimoon (The Muslim
Brotherhood)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political Former Guerrilla-terrorists, engaged on
counter-insurgency in support of Indian
security forces.
Ikhwan ul Muslimeen (Muslim
Brotherhood) - Libya
Libya Libya, centre and east Religious Shiite Muslim group. Seeks to overthrow
government and establish Islamic regime in
Libya.
Indigenous Defence Front for Pastaza
Province (FDIP)
Ecuador Ecuador Environ-
mental,
Political
Accused of terrorism.
INE Israel Israel Political
religious
Right Wing Israeli group. Anti-Government
and Anti-Peace process. Claimed
responsibility for the assassination of Prime
Minister Rabin by Yigal Amir. Possibly a
cover name.
Interahamwe (those who kill without
mercy)
Rwanda Rwanda Ethnic
Profit
Political
Hutu Militias and former Rwandan Army
soldiers.
International Islamic Front for
Fighting Jews and Crusaders
Afghanistan International Religious Seeks removal of US troops from Saudi
Arabia and Islamic world revolution.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 428
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
International Justice Group
(International Group for Justice)
Egypt Egypt
Switzerland
Religious Seeks overthrow of government.
International Sikh Youth Federation India
UK
India
UK
Religious
Ethnic
Separatist Independence. Seeks Sikh
Homeland (Khalistan).
Iraqi National Accord Iraq, Jordan Iraq Political Anti-Government.
Irish National Liberation Army (INLA,
Peoples Liberation Army, Peoples
Republican Army, Catholic Reaction
Force)
Ireland
(Dublin)
UK (Mainland and
Northern Ireland)
Ethnic
Political
This group aids separatists in Northern
Ireland and seeks unification of Ireland.
Islamic Action Turkey Turkey Religious Anti-Government.
Islamic Army for the Liberation of
Holy Places (sites)
Arabian Gulf
or
Afghanistan
Kenya
Tunisia
Religious Anti-US, Israel, West, Arabic and Arabic
monarchist governments. A group using this
name claimed responsibility for the 1998
attacks on US embassies in Kenya and Dar
as Salaam, and an explosion (truck carrying
gas) at a Jewish Synagogue on the Tunisian
island of Djerba (11
th
April 2002) that killed
15 people including ten German tourists.
Likely Al Qaida affiliation.
Islamic Freedom Movement India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Islamic Front India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 429
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Islamic Front for the Liberation of
Bahrain
Iran Bahrain Religious Seeks establishment of Shiite Islamic
government in Bahrain.
Islamic Great Eastern Raiders Front Turkey Turkey Religious Members accused of terrorism.
Islamic Jihad (Holy Struggle) See
Remarks
See
Remarks
Religious Various national groups in: Afghanistan,
Albania, Algeria, Azerbaijan, Bosnia,
Croatia, Djibouti, Egypt, Eritrea, Indonesia,
Lebanon, Pakistan, Philippines, Saudi
Arabia, Somalia, Sudan, Tajikistan, Tunisia,
Yemen, the Kashmiri region of India and the
Chechen region of Russia.
Islamic Jihad (Holy Struggle) for the
Liberation of Palestine
Lebanon International Religious Splinter- group of Hezbollah (Lebanon).
Seeks to establish a Shiite Islamic state in
Lebanon and the destruction of Israel.
Islamic Jehad (Holy Struggle) - Egypt Egypt Egypt Religious Seeks to establish an Islamic regime in
Egypt. A coalition group including Al
Takfir, New Jihad group, Talaal al Fateh
and Vanguards of Conquest.
Islamic Jihad (Holy War) -Egypt; Al
Tuhari Faction
Egypt Egypt
International
Religious Seeks overthrow of Egyptian Government
and replacement by Islamic Sharia law
government.
Islamic Jihad (Holy War) in Hejaz Saudi Arabia
(east)
International Religious Seeks to establish a Shiite Islamic
government in Saudi Arabia.
Islamic Liberation Movement Turkey Turkey Religious Anti-Government.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 430
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Islamic Liberation Party Tunisia Tunisia Religious Seeks to overthrow Tunisian government
and establish Islamic state.
Islamic Movement for Change Libya Libya, centre and east Religious Seeks t o overt hrow government and
establish Islamic regime in Libya.
Islamic Movement of Change Saudi Arabia Riyadh Religious Seeks t o overt hrow government and
establish strict Islamic regime in Saudi
Arabia. Anti-US, Anti-Western.
Islamic Movement for Uzbekistan Uzbekistan Uzbekistan Religious Seeks to establish Islamic state. Anti-US and
West.
Islamic Movement Organisation Turkey Turkey Religious Anti-Government.
Islamic Movement of Martyrs Libya Libya, centre and east Religious Seeks t o overt hrow government and
establish Islamic regime in Libya.
Islamic Peninsula Movement for
Change- Jihad (Holy War) Wing
Saudi Arabia Saudi Arabia Religious Seeks to overthrow Royal family in Saudi
Arabia.
Islamic Resistance (Jihad Islami)
Organisation
Lebanon Lebanon,
France,
International
Religious Armed wing of Hezbollah. Seeks to
establish a Shiite Islamic state in Lebanon
and the destruction of Israel.
Islamic Resistance Force India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Joint operations Co-ordination
group for Hizballah, Al Fatah, Hizb ul
Momineen, Jamaat i Islami and Jamiat ul
Muslimeen.
Islamic Resistance Party (IRP) Iran
Pakistan
Tajikistan, north
Afghanistan
Ethnic
Religious
Seek separatism and opposes Tajik
government.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 431
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Islamic Revolutionary Council India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, possibly defunct.
Islamic Revolutionary Organisation Saudi Arabia
(east)
International Religious Seeks to establish a Shiite Islamic
government in Saudi Arabia.
Islamic Salvation Front Afghanistan
(moved to
unspecified
location)
International Religious Group of Osama bin Laden (Head of Al
Qaida and chairman of higher council in the
International Islamic Front for fighting Jews
and Crusaders).
Islamic Students Organisation India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Separatist
Divided; seeks either accession to Pakistan
or independence of Jammu and Kashmir.
Small group, dormant.
Islamic Tendency Movement Tunisia Tunisia Religious Seeks to overthrow Tunisian government
and establish Islamic state.
Islami Jang (Islamic War) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Islami Inqalab Group (Islamic
Revolution Group)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan. Small group. Anti-US, Anti-
Western.
Islami Inquilabi Council (Islamic
Revolutionary Council)
Pakistan Karachi
Pakistan
Religious Anti-US, Anti-Western.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 432
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Islami Inquilabi Mahaz (Islamic
Revolution Front)
India;
Jammu and
Kashmir,
Nepal,
Bangladesh
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Ittehad Shoora e Jehad (United Council
of Holy War)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
A coalition umbrella group comprising:
Harkat ul Ansar, Hizb ul Mujahideen, Al
Jehad, Tehreek ul Mujahideen and Al Umar
Mujahideen. Seeks accession of Jammu and
Kashmir to Pakistan.
Izrael Group India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, possibly dormant.
Jago Mujahideen (The Vigilant
Religious Fighters)
India;
Jammu and
Kashmir,
Azad
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Jaish e Mohammed (Army of
Mohammed)
India;
Jammu and
Kashmir,
Azad
Kashmir;
UK
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Jamaat Ahle Hadith (Group of the
Pure Edicts)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 433
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Jama at al Adala al Alamiya
(International Justice Group)
Saudi Arabia Saudi Arabia Religious Seeks to overthrow Royal family in Saudi
Arabia.
Jamaat e Islam (Islamic Groups) Jammu and
Kashmir
Indian administered
part of Jammu and
Kashmir
Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan. Some members commit terrorism.
Jamaat al Fuqra (The Group of the
Poor)
Pakistan Pakistan, US Religious Members accused of terrorism.
Jamiat Hamadania (Groups of
Hamadan [Hamadan introduced Islam
to Kashmir])
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, possibly dormant.
Jamiat i Ulema e Pakistan (Accepted
Groups of the Land of the Pure)
Pakistan Pakistan Political
Religious
Political Party; a very few members commit
terrorism.
Jamiat Taliba (Students Group) India;
Jammu and
Kashmir,
Azad
Kashmir,
Pakistan
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, possibly defunct.
Jamiat ul Fugra (Groups of the poor) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small political party; some
members commit terrorism.
Jamiat ul Mujahideen (Groups of
Religious Fighters)
India;
Jammu and
Kashmir,
Azad
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks a Caliphate.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 434
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Jamiat ul Muslimeen (The Muslim
Groups)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Jamiat ul Shabab ul Islam (Islamic
Youth Groups)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group involved in recruiting.
Jammu Kashmir Harkat ul Momineen
(Jammu Kashmir Believers Movement)
India;
Jammu and
Kashmir,
Delhi
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
J a mmu Ka s h mi r I k h w a n
(Brotherhood), also known as
Islamabad Ikhwan, Kashmir Ikhwan
and South JK Ikhwan
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political Former guerrilla-terrorists, engaged on
counter-insurgency in support of Indian
security forces.
Jammu Kashmir Islamic Front India;
Jammu and
Kashmir,
Delhi
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Jammu Kashmir Liberation Front or
JKLF (7 factions)
Jammu and
Kashmir
(disputed)
India, Pakistan, UK,
US, Holland, Canada
Ethnic
Political
Separatist
Seeks pledged plebiscite and independent
country of Jammu and Kashmir.
Jammu Kashmir Muslim Mujahideen
(Religious Fighters)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 435
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Jammu Kashmir National Liberation
Front
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Separatist
Seeks independence.
Japanese Communist League North Korea South Korea, Japan Political Seek overthrow of government.
Japanese Red Army (JRA, Anti-
Imperialist International Brigade, Anti
War Democratic Front, Nippon
Sekigun)
Lebanon
Japan
International Political Communist group. Former instructors of
multi- national terrorists. Seeks overthrow of
Japanese government.
Jawed Langra (The Lame Jawed) Pakistan Pakistan Political Incites terrorism, possibly dormant.
Jehad (Holy Struggle) Force India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Jemaah Islamiya (Islamic Groups) Singapore
Malaysia
Phillippines
Singapore
Malaysia
Phillippines
Religious
Political
Anti-US. Links to Al Qaida.
Jihad (Holy Struggle) Council for
North America
Canada Canada Religious Members accused of terrorism.
Junbish I Milli yi Islami
(National Islamic Movement)
Afghanistan Afghanistan Political An Anti-Taliban alliance.
Justice Commandos of the Armenian
Genocide
Armenia Armenia, Turkey,
Austria, France
Ethnic
Religious
Members accused of terrorism.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 436
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Justice Department UK UK Animal
Rights
A cover name used by the Animal Liberation
Front to disassociate themselves from
terrorism.
Just Retribution Unit Egypt Egypt Religious Seeks overthrow of government.
Kach Party Israel Israel
West Bank
Ethnic
Political
Seeks deportation of Arabs from Israel and
Occupied Territories. Opposes Oslo peace
accords.
Kahane Chai (Kahane lives) Israel Israel
West Bank
Ethnic
Political
Splinter group of Kach group. Seeks
deportation of Arabs from Israel and
Occupied Territories. Opposes Oslo peace
accords.
Kakumaruha Revolutionary Marxist
Faction
Japan Japan Political Opposes government.
Kakurokyo Hazamaha Revolutionary
Worker Organisation
Japan Japan Political Opposes government.
Kansai Revolutionary Army Japan Japan Political Extremist left wing group. Seeks to
overthrow government. Anti-US. Armed
wing of Chukaka Ha (Central Faction).
Kashmir Freedom Fighters India;
Jammu and
Kashmir,
Delhi
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 437
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Kashmir Liberation Army India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, name sometimes
used by Islamic Revolutionary Council.
Kashmir Liberation Cell Azad
Kashmir
Azad Kashmir, India;
Jammu and Kashmir
state
Political A branch of the Azad (Free) Kashmir
Government on the Pakistan side of the
cease-fire line (Line of Control).
Kashmir National Liberation Front India;
Jammu and
Kashmir,
Azad
India;
Jammu and
Kashmir
Political
Religious
Separatist
Seeks independence. Small group related to
Plebiscite Front and National Liberation
Front. Believed to be dormant.
Khalifah (Caliphate) Egypt Egypt Religious
Political
Seeks overthrow of Government and
establishment of a Caliphate.
Khalistan Commando Force India;
Amritsar
India;
Jammu and Kashmir,
Delhi, Amritsar
Political
Religious
Separatist
Seeks independent Sikh country of Khalistan
(Land of the Pure). Aids Jammu and
Kashmir guerrillas and terrorists.
Khalistan Liberation Force; Khalistan
Liberation Front; Khalistan Liberation
Tiger Force; Khalistan Liberation
Force-Shahidi Group; Khalistan
Commando Force; Khalistan National
Army; Bhinderawala Tiger Force
India;
Jammu and
Kashmir,
Delhi,
Punjab
India;
Jammu and
Kashmir
Political
Religious
Separatist
Seeks independent Sikh country of Khalistan
(Land of the Pure). Aids Jammu and
Kashmir guerrillas and terrorists. Some
members joined the Jammu Kashmir Harkat
ul Momineen in 1996.
Khalistan Movement Pakistan
(exiled)
India; Jammu and
Kashmir, Delhi,
Amritsar
Political
Religious
Separatist
Seeks independent Sikh country of Khalistan
(Land of the Pure). Aids Jammu and
Kashmir guerrillas and terrorists. Leaders in
exile in Pakistan; wanted in India.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 438
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Khalistan Zindabad Force India; Punjab
state
India; Delhi, Jammu
and Kashmir
Religious
Political
Separatist
Seeks independent Sikh country of Khalistan
(Land of the Pure). Aids Jammu and
Kashmir guerrillas and terrorists
Khawateen i Kashmir (The Kashmir
Sisterhood)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Womens group; a very few
commit terrorism.
Khmer Rouge (The Party of
Democratic Kampuchea)
Cambodia Cambodia Political Extremist communist group. Fragmented
into many uncontrolled factions.
Ku Klux Klan (97+ groups) US US Religious
Political
Racial
Anti-Semitic, Anti-Catholic, Anti-
Communist and Anti-Abortion. Racial
Protestant fanatics.
Komala; Komala Lidni Kurdistan;
Komalay Shoreshgeri Zahmatkeshani
Ku r di s t a n i I r a n ( Ko ma l a ,
Revolutionary Organisation of the
Toilers of Kurdistan in Iran)
Iran Iran Political
Ethnic
Separatist. Seeks Independent Kurdish State.
Kosova(o) Liberation Army (KLA) Kosovo Kosovo Political
Ethnic
Religious
Anti-Serbian paramilitary group.
Kurdish Communist Party of Iran Iran Iranian Kurdistan Ethnic Seeks to establish a Kurdish State.
Kurdish Democratic Party (KDP) Iraq (north) Iraq (north) Ethnic Seeks to establish a KDP Kurdish state in
northern Iraq.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 439
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Lascar Jihad (Holy War Militia) Molucu
Islands
(Mollucca
Islands)
Molucu
Islands
(Mollucca
Islands)
Ethnic
Religious
A militia of religious fanatics helping
Indonesian government troops and Taliban
to suppress Moluccan Islanders (both
Christian and Muslim).
Lashkar e Ayubi (The Militia of Ayub) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Lashkar e Jhangvi (Jhangvi Militia) Pakistan Pakistan
(Lahore)
Religious Religious fanatic group. Anti-Muslim Shia
Sect and Anti-Government.
Lashkar e Omar (Army of Omar) Pakistan Islamabad Religious
Political
Anti-Western and Anti-Christian. Previously
unheard of group claiming responsibility for
throwing grenades into a Protestant church
in Islamabad, in March 2002, killing five
(including three foreigners) and wounding
about 40 others.
Lashkar e Toiba [or Tayyba] (The Holy
Army / Militia)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Laskar e Sajjad (Army of Sajjad
[named after 4th Imam])
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group.
Laskar Jihad or Jihad Troopers (Holy
War Militia)
Indonesia Indonesia Religious
Ethnic
Religious fanatics group. Engaged in ethnic
cleansing of Christians and tribal natives.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 440
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Lautaro Youth Movement
(Lautaro Popular Rebel Forces or
Lautaro Faction of United Popular
Action Movement)
Chile Chile Political Members accused of terrorism.
League of St. George UK UK Political
Racial
Neo-Nazi.
League of the followers of the Sunna
(Sunni Muslims)
Tajikistan Tajikistan Religious Members accused of terrorism.
Lebanese Armed Revolutionary
Factions
Lebanon Lebanon,
France
Political Anti-Western.
Lef ti st Revol uti onary Armed
Commandos for Peace in Columbia
Columbia Columbia Political Leftist group. Seeks overthrow of
government.
Legion of the Martyr Abdullah al
Huzaifi
Saudi Arabia Saudi Arabia Religious Seeks to overthrow Royal family in Saudi
and establish Sunni Islamic state.
Liberation Front India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Separatist
Seeks independence. Small group. Worked
with Peoples League and Jamiat Tulba.
Possibly merged with JKLF.
Liberation Tigers of Tamil Eelam
(LTTE, Tamil Tigers)
Sri Lanka
(Jaffna
Peninsula)
Sri Lanka, India Ethnic
Separatist
Seeks to establish an independent Tamil
country called Eelam
Libyan Jehad (Holy War) Movement Libya Libya, centre and east Religious Seeks t o overt hrow government and
establish Islamic regime in Libya.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 441
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Libyan Security Services Libya International Political Deputy Chief (Abdullah Senoussi, brother-
in-law of Muammar Khadafi) and five other
members of this state security organisation
were convicted in absentia by a French
Court for the bombing of a French UTA
airliner that killed 171 persons in 1989.
Abdel Baset Ali al-Megrahi (of the same
service) was convicted at the Hague in 2002
for the bombing of Pan Am flight 103
(Boeing 747 Maid of the Sea) over
Lockerbie, Scotland, UK in 1988.
Life Enterprises Unlimited US US Social
Convictions
Anti-Abortion. Violent.
Life Ministries US US Social
Convictions
Anti-Abortion. Violent.
Lords Resistance Army (Formerly
Holy Spirit Movement)
Sudan Uganda (north) Religious Seeks implementation of extremist Christian
religious law.
Los Macheteros Puerto Rico Puerto Rico, US Political S e e k s I n d e p e n d e n c e f r o m US -
commonwealth association.
Lower Tagilsk and Serovsk Group Russia Russia Criminal Organised criminal gangs accused of
terrorism.
Loyalist Volunteer Force (LVF) Northern
Ireland (UK)
Northern
Ireland (UK)
Religious
Political
Protestant group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 442
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Maktaba I Khidmat (Service Office)
or Maktab el Khidmat lel Mujahideen
el Arab (Office for the Services of
Arabic Holy Fighters)
Afghanistan Afghanistan
The Gulf
Religious
Political
The notable [now defunct] Peshawar
recruitment-logistics office of the Soviet-
Afghan war which processed Arabic
volunteers for fighting in Afghanistan. Bin
Laden was associated with setting up this
office. The Al Qaida network is based upon
the information and associations resulting
from this office.
Maktaba I Khidmat (Service Office) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Religious
Political
Seeks accession of Jammu and Kashmir to
Pakistan. Small group. Named after the
office in Peshawar during the Soviet Afghan
war.
Malaita Eagles Force;
Isatabu Freedom Movement
Solomon
Islands
Solomon
Islands
Ethnic Separatist Malaitans seek independence
from Solomon Islands.
Manuel Rodriguez Patriotic Front-
Dissident (FPMR-D)
Chile Chile Political Opposes government.
Maoist Communist Centre (MCC);
Maoist Coordination Committee
(MCC)
India India Political Attacks so called class enemies.
Markaz Dawat ul Irshad (Centre for
Guidance Appeals)
India;
Jammu and
Kashmir,
UK
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan.
Mayi Mayi or Alliance for la resistance
democratique (Democratic Resistance
Alliance)
Congo (DR) Congo (DR) Ethnic Militias alliance. Anti-Tutsi and Anti-
Rwandan army.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 443
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Michigan Militia US,
Michigan
US Political Anti-Government.
Missionaries of the Preborn National US US Social
Convictions
Anti-Abortion. Violent.
Mojahideen e Khalq (Religious fighters
of the people, also known as The
National Liberation Army of Iran
[militant wing of MeK]; The Peoples
Mujahideen of Iran; Sazman e
Mojahidin e Khalq e Iran; Muslim
Iranian Students Society; National
Council of Resistance).
Iraq Iran Political Seeks to overthrow Iranian government and
replace it with a Marxist regime.
Morazanist Patriotic Front Honduras Honduras Political Members accused of terrorism.
Moro Islamic Liberation Front Phillippines
(Mandanao)
Phillippines Religious
Separatist
Seeks an independent Islamic country on
Mindanao Island. Splinter group from Moro
National Liberation Front (dissolved).
Mouvement de Liberation Congolais
(MLC)
Congo (DR) Congo (DR) Political Seeks overthrow of Kabila government.
Movement for Islamic Change Saudi Arabia Saudi Arabia Religious Seeks to overthrow Royal family in Saudi
Arabia and establish Sunni Islamic state.
Movement for the Liberation of
Bahrain
Iran Bahrain Religious Seeks establishment of Shiite Islamic
government in Bahrain.
Mozambican National Resistance
(Renamo)
Mozambique Mozambique Political Members accused of terrorism.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 444
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Muhammad Commandos US US Religious Members accused of terrorism.
Mujahideen (Religious Fighters)
Balakote [scene of Raj uprising]
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group. Associated with
Hezb e Hurriyet.
Mujahideen (Religious Fighters) Co-
ordination Committee
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Umbrella group; failed to merge
several guerrilla-terrorist groups.
Muslim Guerrilla Tigers India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, possibly dormant or
merged.
Muslim Janbaaz (Martyrs/Brave
Soldiers) Force
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small group, possibly dormant or
merged.
Muslim Khawateen Markaz (Muslim
Central Sisterhood)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Womens group; a very small
number commit terrorism.
Muslim Liberation Army India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political Cattle herdsmen and former guerrilla-
terrorists engaged in tracking guerrillas and
terrorists for Indian security forces.
Muslim Militant Faction India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political Former guerrillas and terrorists, now
engaged in counter-insurgency in support of
Indian security forces.
Muslim Mujahideen (Religious
Fighters)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political Former guerrillas and terrorists, now
engaged in counter-insurgency in support of
Indian security forces.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 445
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Muslims Against Global Oppression
(MAGO)
South Africa South Africa Political
Religious
A front organisation for the Muslim group;
People Against Gangsterism and Drugs
(PAGAD).
Muslims of the Americas US US Religious Members accused of terrorism.
Mutahidda Quami Movement
(Mohajir Quami Movement);
Khidmat e Khalq Foundation
Pakistan Pakistan Ethnic
Political
Refugee / Immigrant movement: Muslims
who left India for Pakistan in 1947 upon
partition. Opposes government for
discriminatory treatment.
Nadeem Commando Pakistan Pakistan Political
Ethnic
Linked to MQM (Mutahidda Quami
Movement).
National Army for the Liberation of
Uganda (NALU)
Uganda Uganda Religious
Political
Profit
An offshoot of the Allied Democratic Front.
National Council of Maubere
Resistance (CNRM)
East Timor
Indonesia
East Timor
Indonesia
Ethnic
Political
Religious
Fought for separatism / Independence from
Indonesia, and committed some acts of
terrorism. Dormant / Defunct.
National Council of Resistance Pakistan Pakistan Religious Members accused of terrorism.
National Armed Forces for the
Liberation of East Timor
Indonesia
(East Timor)
Indonesia
(East Timor)
Ethnic
Political
Separatist group, prior to Independence.
Dormant / defunct.
National Front for the Liberation of
Vietnam
Vietnam Vietnam Political Seeks overthrow of Government.
National Front for the Renewal of
Chad (FNTR)
Chad Chad Political Members accused of terrorism.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 446
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
National Front for the Salvation of
Libya
Libya Libya, centre and east Religious Seeks to overthrow government and
establish Islamic regime in Libya.
National Islamic Front Sudan Sudan Religious
Political
Anti-US, Anti-Israel.
National Islamic Movement Afghanistan Afghanistan,
India; Jammu and
Kashmir
Political
Religious
Afghan Party allied to the Taliban Militia.
Some few members involved in Jammu and
Kashmir insurgency.
National Liberation Army Columbia Columbia Political
Criminal
(narcotics)
Anti-US communist group / force seeks
overthrow of government.
National Liberation Front India;
Jammu and
Kashmir;
Azad
Kashmir;
Pakistan
India;
Jammu and
Kashmir;
Azad
Kashmir;
Pakistan
Political
Separatist
Seeks independence. Small group related to
Kashmir National Liberation Front and
Plebiscite Front. Believed to be dormant.
National Revolutionary Army India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political Claimed responsibility for one terrorist
attack: bombing of a bus in 1993; many
Muslims killed, including children. Not
heard of since. Possibly non-existent (a false
flag operation).
National Socialist Council of Nagaland
(NCSN)
India
(Nagaland)
India
Nagaland
Ethnic
Secessionist
Seeks union with ethnic group in Burma.
Nestor Paz Zamora Commission
(CNPZ)
Bolivia Bolivia Political Marxist-Leninist group. Operates under the
umbrella of the Ejercito de Liberacion
Nacional (ELN, National Liberation Army).
Annex C/ List of Groups Accused of Terrorism by Governments or Media 447
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
New Mon State Party Burma Burma Ethnic
Political
Seeks Autonomy / Independence.
New Pattani United Liberation
Organisation
Thailand Thailand Political Members accused of terrorism.
New Peoples Army Phillippines
(Manila)
Phillippines Political Maoist group. Seeks overthrow of
government. Acts in rural areas. Urban acts
carried out by co-group; Alex Boncayao
Brigade.
Nidaul Islam (Call of Islam) Egypt Egypt Religious
Political
Seeks overthrow of present government and
establishment of an Islamic State.
Ogaden National Liberation Front Ethiopia Ethiopia Political Seeks to overthrow Ethiopian government.
Oodua Liberation Movement; Oodua
Peoples Congress;
Revolutionary Council of Nigeria
Nigeria Nigeria Ethnic
Separatist
Seeks independence from Nigeria.
Operation Balakot [named after scene
of uprising during the Raj]
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks a Caliphate. Many of the 300
members left to join the Ikhwan ul
Muslimeen between 1993 and 1994.
Possibly dormant.
Operation Rescue US US Social
Convictions
Anti-Abortion. Violent.
Orange Volunteers Northern
Ireland (UK)
Northern
Ireland (UK)
Religious
Political
A protestant so-called loyalist paramilitary
group in Northern Ireland. Anti-IRA, pro-
security forces.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 448
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Ordine Nuovo (New Order) Italy Italy Political Fascist group which is now possibly
dormant or split into other groups.
Organi s at i on of Egypt i an
Revolutionaries
Egypt Egypt Religious
Political
Anti-government.
Organisation of Jihad (Holy War)
Brigades
Italy Italy Religious Anti-US, Anti-Western.
Organisation of the Oppressed on
Earth
Lebanon Spain, Germany,
International
Religious Splinter group of Hezbollah (Lebanon).
Seeks to establish a Shiite Islamic state in
Lebanon and the destruction of Israel.
Organisation of Volunteers for the
Puerto Rican Revolution (OVRP)
Puerto Rico Puerto Rico, US Political Seeks Independence fr om t he US-
commonwealth association.
Organisasi Papua Merdek (OPM, Free
Papua Movement)
Papua New
Guinea,
Irian Jaya
Indonesia, Irian Jaya Ethnic
Separatist
Socialist and Melanesian nationalist group.
Seeks an independent country.
Oromo Liberation Front Ethiopia Ethiopia Ethnic
Political
Separatist / Independence group.
Palestinian Islamic Jihad (Holy War) Israel and
Palestinian
Auton. Area
Israel and
Palestinian
Autonomous Area
Religious
Political
Seeks destruction of Israel and establishment
of Islamic Palestinian state. Political
headquarters in Damascus.
Palestinian Islamic Jihad (Holy War) -
Shaqaqi Faction
Israel and
Palestinian
Autonomous
Area
Israel and
Palestinian
Autonomous
Area
Religious
Political
Seeks destruction of Israel and establishment
of Islamic Palestinian state.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 449
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Palestine Liberation Front (PLF, three
factions)
Iraq
(Baghdad),
Syria
(Damascus),
Libya
(Tripoli)
Middle East Political
Religious
Seeks destruction of the state of Israel.
Splinter group from PFLP-GC.
Palestinian National Liberation (or
Salvation) Front
Syria
Lebanon
Middle East Political Opposes peace-treaty with Israel.
Parti pour la liberation du peuple
Hutu -Palipehutu - (Hutu peoples
Liberation Party)
Burundi Burundi Ethnic
Separatist
Seeks separatism.
Partisans Movement India:
Jammu and
Kashmir
India: Jammu
and Kashmir
Political Separatists.
Partiya Karkeren Kurdistan (PKK,
Kurdistan Workers Party or Kurdish
Labour Party)
Turkey Turkey (southeast)
Iraq (north), Europe,
Armenia
Ethnic
Political
Marxist. Seeks to establish an independent
Kurdish state. Heavily engaged in narcotics
trafficking to Europe.
Pasbane Islami (Guardians of Islam) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Associated to the Hezb e Hurriyat.
Small group, may have merged.
Pasdarani Islami (Guards of Islam) India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Noted for its attempted kidnap of
Europeans and Israelis.
Pashan e Ahle Hadis (Followers of the
Divine Edicts)
Pakistan Pakistan Religious
Political
Anti-US, Anti-Western. Liked to Lashkar e
Tayyba.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 450
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Patriotic Union of Kurdistan (PUK) Iraq (north),
Iran
Iraq (north) Political Seeks to establish a PUK Kurdish state in
north Iraq.
People Against Gangsterism and Drugs
(PAGAD)
South Africa South Africa Political
Religious
A Muslim group which attacks criminals and
moderate Muslims. Uses a front
organisation; Muslims Against Global
Oppression (MAGO).
People in Action for the Liberation of
Rwanda
DR Congo DR Congo Political Believed to be former Rwandan soldiers.
Peopl e s Ext ra- Parl i amentary
Opposition
Austria Austria
Germany
Political
Racial
Neo-Nazi. Very small group, probably
dormant.
Peoples Kurdistan Liberation Army
(ARGK)
Turkey Turkey, Europe Political Separatism from Iraq and Turkey - Seek
Independent Kurdish State.
Peoples Liberation Front Sri Lanka Sri Lanka Political Seek to establish a separate Tamil state.
Plebiscite Front India;
(Jammu and
Kashmir;
Azad
Kashmir;
Pakistan)
India;
Jammu and
Kashmir
Political
Religious
Separatist
Seeks independence. Related to Kashmir
National Liberation Front and Plebiscite
Front Party. Possibly dissolved or merged.
Popular Front for the Liberation of
Palestine - General Command (PFLP-
GC)
Syria
(Damascus)
Lebanon, Israel,
Palestinian
Autonomous Area
Political Seeks destruction of Israel. Restrained by
Syria.
Popular Front for the Liberation of
Palestine (PFLP and PFLP; Red Eagle
Faction)
Syria
(Damascus),
Lebanon
International Political Seeks a Marxist-Leninist Arab revolution.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 451
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Popular Front for the Liberation of
Palestine - Special Command (PFLP-
SC)
Syria
(Damascus),
Lebanon
(south)
Middle East
Western Europe
Political Seeks overthrow of Israel and establishment
of a Marxist-Leninist government in
Palestine.
Popular Front for the Liberation of
Saguia el Hamra and Rio de Oro
(Polisario)
Western
Sahara
Western
Sahara
Political Seeks to remove Moroccan security forces
and gain independence for the Western
Sahara. Dispute over eligible voters for
referendum.
Popular Struggle Front Syria Syria
Lebanon
Political Palestinian group.
Popular Union of Carinthia and Styria Austria Austria Political
Racial
Neo-Nazi group.
Pro-Life Action Network US US Social
Convictions
Anti-Abortion. Violent.
Pro-Life Virginia US US Social
Convictions
Anti-abortion. Violent.
Provisional Irish Republican Army
(PIRA)
UK
(Northern
Ireland)
UK (Northern Ireland
and mainland),
Republic of Ireland
Political
Religious
Engaged in a cease-fire.
Puka Inti (Sol Rojo or Red Sun) Ecuador Ecuador Political Small but violent. Possibly dormant.
Quibla (Security or the Direction of
Mecca)
South Africa South Africa Religious Seeks to establish Shiite Islamic state in
South Africa.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 452
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Rashid Khan Group India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Possibly dormant.
Rashtriya (Presidential) Rifles India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Large Indian paramilitary force; some
members commit terrorism.
Rashtriya Swayam Sevak Sangh
(RSSS, Presidential Personal Service
Union)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Fundament al i s t Hi ndu Pol i t i cal
Organisation; action group for the Bharatiya
Janata Party (BJP or Indian Peoples Party).
Some members commit terrorism.
Real (or New) Irish Republican Army
[Also known as Oglaigh na hEireann]
UK
(Northern
Ireland)
UK
(Northern
Ireland)
Political
Religious
Fanatical splinter group of PIRA.
Red Brigades (Brigate Rosse) Italy (north) Europe Political Marxist-Leninist group. Seeks revolution to
overthrow world capitalist system. Split in
1984 into two groups; The Fighting
Communist Party (FCP) and the Union of
Fighting Communists (UFC).
Red Hand Commandos UK
(Northern
Ireland)
UK
(Northern
Ireland)
Religious
Political
Extremist Christian (Protestant) group
professing loyalty to UK, formed as a
response to oppose PIRA (Catholic).
Red Hand Defenders UK
(Northern
Ireland)
UK
(Northern
Ireland)
Religious
Political
Extremist Christian (Protestant) group
professing loyalty to UK, formed as a
response to oppose PIRA (Catholic).
Red Aid Holland Holland Political Communist.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 453
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Reform and Defiance Movement Jordan Jordan Religious Opposes government.
Rescue America US US Social
Convictions
Anti-Abortion. Violent.
Rescue Operation US US Social Beliefs Anti-Abortion group.
Resistance of the Believers Lebanon Lebanon Political
Religious
Splinter group of the AMAL militia.
Possibly dormant.
Revolution of Egypt Egypt Egypt Religious
Political
Anti-Government and Anti-Western.
Revenge Underground Israel Israel Ethnic
Political
Opposes Oslo peace accords.
Revolutionary Organisation of Socialist
Muslims
Lebanon
(Bekaa
valley)
International Political Opposed to Israel, western countries with
Middle East interests, PLO and moderate
Arab states. Restrained by Syria. One of
several groups under the umbrella of the
Abu Nidal Organisation.
Revolutionary Popular Struggle (ELA
or Epanastatikos Laikos Agonas)
Greece Greece Political Opposes Government, NATO, west.
Revolutionary Peopless Liberation
Party - Front (Devrimei Halk
Kurtulus Partisi, Cephesi)
Turkey
(Ankara)
Turkey Political Marxist group. Opposed US troops presence
in Europe. Changed name in 1994 from
Devrimci Sol (Revolutionary Left).
Revolutionary Justice Organisation Lebanon International Religious Splinter group of Hezbollah (Lebanon).
Seeks to establish a Shiite Islamic state in
Lebanon and the destruction of Israel.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 454
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Revolutionary Proletarian Initiative
Nuclei
Italy Italy Political Anti-US, Anti-Italian Government Foreign
Policy and Labour laws. Links to Red
Brigades.
Revolutionary United Front (RUF) Nigeria Nigeria Political
Religious
Opposes government.
Revolutionary United Front (RUF) Guinea,
Liberia
Sierra Leone Political Post-settlement remnants seek overthrow of
government.
Rote Armee Fraction (RAF, Red Army
Faction)
Germany Germany,
Austria
Political Marxist-Leninist group. Sought revolution to
overthrow world capitalist system.
Originally called the Baader-Meinhof gang.
Declared operations ceased, but members
still sought, armed and dangerous (one killed
in a 1999 shoot-out with police in Vienna,
Austria).
Rwandan Liberation Army Rwanda Rwanda Political Killed random Hutus and Tutsis. Agenda not
clear. Possible cover name for another
group.
Saharawi Peoples Liberation Army
(SPLA)
Western
Sahara
Western Sahara Political Seeks to remove Moroccan security forces to
gain independence for Western Sahara.
Dispute over eligible voters for referendum.
Saheed Khalsa Force North India India, Europe, Asia,
US, Canada
Political Sikh Separatist group.
Sana Mheidleh Commando (named
after female martyr)
Lebanon France,
Europe
Political Anti-Western, Anti-US, Anti-Israel.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 455
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Scottish National Liberation Army Scotland Scotland Political Separatists. Mostly threats of violence.
Sendero Luminoso (Shining Path) Peru Peru Ethnic
Political
Marxist-Leninist-Maoist group of Peruvian
Indians. Opposes government.
Serbian Volunteer Guard (Tigers) Former
Yugoslavia
Eastern Bosnia,
Former Yugoslavia
Ethnic
Religious
Criminal
Formed from amongst Serbian White Eagles
paramilitary forces in 1992. Led by Zeljko
Raznatovic (Arkan); wanted for crimes
against humanity (until his murder in 2000),
committed in 1991 with White Eagles.
Shanti Bahini (Peace Force) Bangladesh
(Chittagong)
Bangladesh Religious
Separatist
Seeks secession from Bangladesh and
accession to India as a Buddhist state.
Shiv Sina
(Party of Shiva [Indian Deity] )
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Fundamentalist Hindu Political Party; some
members conduct counter-insurgency
operations in Jammu and Kashmir; a few
commit terrorism.
Sidama Liberation Front Ethiopia Ethiopia Political Separatists.
Simon Bolivar Guerrilla Coordination
Group
Columbia Columbia Political Communist umbrella group, opposes
government and US.
Sipah e Sahaba Pakistan Pakistan Religious Anti-Shiite Muslim.
Solar Temple Cult US, Canada US Religious Mystical suicide cult, Anti-Government.
Soldiers of Allah US US Religious Members accused of terrorism.
Soldiers of God (Gund Allah) Egypt Egypt Religious Anti-Government.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 456
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Sons of Glendower (Meibion Glyndwr) UK (Wales) UK (Wales) Ethnic
Political
A very small separatist group.
Southern Sudan Independence
Movement (SSIM). Formerly the Sudan
Peoples Liberation Army Dissident
(SPLA-D)
Sudan Sudan Separatism Separatist movement. Seeks independent
state in south Sudan.
Sudan Peoples Liberation Army
(SPLA)
Sudan Sudan Religious Seeks a secular Sudan. Armed wing of
Sudan Peoples Liberation Movement
(SPLM).
Sudan Peoples Liberation Movement
(SPLM)
Sudan Sudan Religious Seeks a secular Sudan. Political wing of
Sudan Peoples Liberation Army.
Supreme Assembly of the Islamic
Revolution in Iraq
Iraq Iraq Political
Ethnic
Religious
Seeks overthrow of government.
Supreme Council for Islamic
Revolution in Iraq
Iran Iraq Ethnic
Religious
Shiite group; seeks overthrow of
government.
Sword of David Israel Israel Ethnic
Political
Opposes Oslo peace accords.
Tabligh wa Dawa (Evangelisation and
Mission)
Egypt Egypt Religious Opposes government.
Takfir wa el Hijra (The Repentance
and the Flight [of the Prophet] )
Lebanon Lebanon Religious
Political
Seeks to overthrow government and
establish Islamic regime in Lebanon.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 457
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Takfir wa el Hijra (The Repentance
and the Flight [of the Prophet] )
Libya Libya, centre and east Religious Seeks to overthrow government and
establish Islamic regime in Libya.
Talaal al Fatah (Vanguards of
Conquest)
Egypt Egypt Religious Anti-Government.
Tali atu al Salafiya (Vanguard that
Emulates the Pious Forebearers)
Egypt Egypt Religious Opposes government.
Taliban (students) Afghanistan,
Pakistan
Afghanistan
Jammu and Kashmir
Religious
Political
Originally formed in Pakistan. Initially noted
for opposing Iranian Shia influence in west
of Afghanistan. Took over Afghanistan and
imposed harsh Islamic regime. Eventually
controlled by bin Laden and Al Qaida.
Ejected by US led coalition.
Tamil Nadu Liberation Front India India Ethnic Separatist group.
Tarsq ul Mujahideen (The Divinely-
Rewarded Religious Fighters)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Small Group. Member of
Mutahidda Jehad Council coalition.
Tashnag (Right-wing) Armenia Armenia Ethnic
Religious
A tiny handful of this very large (global)
mainly social group / political party are
terrorists (Anti-Turkey, on account of the
genocide).
Tehreek i Wattan (Homeland
Movement)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political Former guerrillas and terrorists, now
engaged on counter insurgency in support of
Indian security forces. Transferred from the
Ikhwan ul Muslimoon counter-militant
group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 458
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Tehreek ul Mujahideen (The
Movement of Religious Fighters)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Related to the Hezb e Hurriyet
coalition.
Tehreek e Islami Jamhoria Kashmir
(Isl ami c Kashmi r Republ ican
Movement)
India;
Jammu and
Kashmir;
Azad
Kashmir,
Pakistan
India;
Jammu and
Kashmir
Political
Religious
Divided. Seeks either accession to Pakistan
or independence for Jammu and Kashmir.
Demands 10-year UN Trusteeship for
deciding accession or independence.
Tehreek e Jafria Pakistan (Movement
for the Religious Land of the Pure)
Pakistan Pakistan Political
Religious
Pakistan Police registered cases against this
political party after a drive-by machine-gun
massacre on Pakistans 1996 Independence
day celebrations.
The Order US US Racial
Political
Neo-Nazi.
The Martyr Khalil Alsid from the
Heavenly Battalion for the Liberation
of Holy Kabaa
Arabian Gulf Arabian Gulf Religious Anti-Saudi Arabian government and
Anti-US.
The Organisation of Martyrs and
Wounded 1957-1994
Pakistan;
Rawalpindi
Pakistan;
Rawalpindi
Political Opposes foreigners.
The Warrior Abdullah Alzawi (or
Alazaam)
Arabian Gulf Arabian Gulf Religious Seeks overthrow of moderate Arabic and
Arabic monarchist governments.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 459
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Tigers of the Gulf Saudi Arabia Saudi Arabia Religious Seeks to overthrow Royal family in Saudi
Arabia and establish Sunni Islamic state.
Anti-US.
Tigray Peoples Liberation Front Ethiopia Ethiopia Political Political Party. Members occasionally carry
out assassinations.
Timorese National Resistance Council Indonesia
(East Timor)
Indonesia
(East Timor)
Ethnic
Political
Separatist group. Dormant/defunct.
Tunisian Combatant Group (aka
Tunisian Islamic Fighting Group)
Tunisia
Europe
Tunisia
Europe
Religious
Political
Seeks overthrow of Government in Tunisia
and imposition of strict Islamic rule. Anti-
US and Anti-Western. Links to Al Qaida.
Tupac Amaru Revol uti onary
Movement (MRTA)
Peru Peru Political Marxi st -Leni ni st group. Opposes
government and US. Seeks communist
revolution to overthrow capitalist systems in
Latin America.
Tupac Katari Guerrilla Army (EGTK) Bolivia Bolivia Political Anti-Western.
Turkish Communist Party Turkey Turkey Political Anti-Government. Several attacks on Police.
Turkish Peoples Liberation Army Turkey Turkey Political Anti-Government, Anti-Western and Anti-
NATO.
Turkish Peoples Liberation Front Turkey Turkey Political Anti-Government.
Turkish Workers and Peasants
Liberation Army
Turkey Turkey Political Anti-Government.
Uganda National Rescue Front II Uganda Uganda Political Opposes government.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 460
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Uganda National Resistance Front II Uganda
(northwest)
Uganda
(northwest)
Ethnic
Religious
Seeks tribal dominance. Splinter group
emerged because of Muslim dominance of
West Nile Bank Front.
Uighur Militants
Committee for Eastern Turkistan
China China Ethnic
Religious
Separatist
Separatist / Independence.
Ulster Defence Association (UDA) UK
(Northern
Ireland;
Belfast)
UK
(Northern
Ireland)
Religious
Political
Christian (Protestant) group professing
loyalty to UK, formed as a response to
oppose IRA (Catholic).
Ulster Freedom Fighters (UFF) UK
(Northern
Ireland;
Belfast)
UK
(Northern
Ireland)
Religious
Political
Christian (Protestant) group professing
loyalty to UK, formed as a response to
oppose IRA (Catholic).
Ulster Volunteer Force (UVF) UK
(Northern
Ireland;
Belfast)
UK
(Northern
Ireland)
Religious
Political
Christian (Protestant) group professing
loyalty to UK, formed as a response to
oppose IRA (Catholic).
Uniao Democratica Timorese
(Democratic Union of Timor)
Indonesia
(East Timor)
Indonesia
(East Timor)
Ethnic
Political
Former separatist group. Dormant / defunct.
Uniao Nacional para a Independencia
Total de Angola (UNITA, National
Union for the Total Liberation of
Angola)
Angola Angola Political Seeks overthrow of government or coalition
with conditions. Leader killed in 2002.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 461
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Unidad Revolucionaria Nacional
Guatemalteca (URNG, United National
Guatemalan Revolution)
Guatemala Guatemala Political Opposes government.
Union of Democratic Forces Chad Chad Political Demands removal of French troops and
western oil companies from Chad.
Union of Fighting Communists (UFC) Italy Italy Political One of two splinter groups originating from
the Red Brigades.
Union pour la Liberation Nationale Burundi Burundi Ethnic
Political
Hutu umbrella group.
United Liberation Front of Assam
(ULFA)
India (Assam
state),
Bhutan,
Bangladesh
India (Assam
state)
Ethnic
Separatist
Political
Seeks secession from India and an
independent country called Bodoland in
northwest Assam, India.
United Self Defence Forces of
Columbia / Group of Columbia
(Autodefensas Unidas de Columbia)
Columbia Columbia Political
Criminal
Criminal group.
Usbat al Ansar (Union of the
Companions [of the Prophet])
Lebanon Lebanon Religious
Political
Fanatic religious terrorists. Anti-
Government, Anti-Western. Linked to Tafkir
wa al Hijra in Lebanon.
Ushtria Clirimtare e Kosoves (UCK) or
Kosovo [Albanian] Liberation Army
(KLA)
Kosovo Kosovo Political
Religious
Opposing Serbian forces.
Vasat Turkey Turkey Religious
Political
Seeks overthrow of government. Fanatic
religious group.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 462
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
Vigorous Burmese Student Warriors Burma Burma Political Opposes government.
Vishwa Hindu Parishad (Hindu Saints
Organisation)
India India Religious
Political
Political party that engages in violence. Part
of a Hindi revivalist movement.
Volcano Italy Italy Political Anti-Libyan.
Volk (People) United National
Socialism
France France Political
Racial
Neo-Nazi.
Weather Underground (formerly
Weathermen; an offshoot of a group
called Students for a Democratic
Society. This group was also known as
Non-sexist Weather Underground)
US US Political Dormant. Anti-Vietnam War. Anti-Racist,
Anti-Government.
West Nile Bank Front (WNBF) Uganda
(northwest)
Uganda
(northwest)
Ethnic Seeks tribal dominance. This group is a
Splinter group of the Uganda National
Resistance Front II.
White Beret US US Racial
Political
Fascist.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 463
NAME BASE AREA OF MOTIVE REMARKS
ACTIVITY
White Eagles Former
Yugoslavia
Eastern Slavonia,
Former Yugoslavia
Ethnic
Religious
Criminal
Paramilitary formation led in Bosnian war
by Vojislav Seselj and Zeljko Raznatovic
(Arkan, a former ice-cream parlour owner,
wanted for crimes against humanity [and for
bank robbery in several western European
countries], committed in 1991). Raznatovic
was publicly killed in a Belgrade hotel by
unknown gunmen in 2000, probably on
orders of senior politicians, to silence him,
or by his peer organised criminals.
White Ranger US US Racial
Political
Fascist.
White Wolves UK UK Racial
Political
Neo-Nazi. Splinter group of Combat 18.
Won On Lok Macua Macau Criminal Organised criminal gang that commits
terrorism.
World Church of the Creator US US Racial
Political
Racial Political group.
World Union of National Socialists France France Political
Racial
Neo-Nazi.
Zia Missionary Force (named after
Pakistans President Zia ul Haq)
India;
Jammu and
Kashmir
India;
Jammu and
Kashmir
Political
Religious
Seeks accession of Jammu and Kashmir to
Pakistan. Quite a small group, possibly
dormant.
Annex C/ List of Groups Accused of Terrorism by Governments or Media 464
Revolutionary Armed Forces of
Columbia (FARC)
World Church of the
Creator
MRTA - Tupac Amaru
Revolutionary Movement
Kahane Chai
National Liberation Army
Columbia
Combat 18 Emgann-Combat
Popular Front for
Liberation of Palestine -
General Command
(PFLP-GC)
Kosovo Liberation
Army
PKK (Kurdistan Workers
Party) Tamil Tigers (LTTE)
Revolutionary Peoples
Liberation Front
Ulster Volunteer Force
Some random crests and logos of groups accused of terrorism by Governments and / or media
Jammu & Kashmir
Plebiscite Front
Annex D/ International Instruments: Prevention & Suppression of Terrorism 465
ANNEX D: International Instruments: Prevention & Suppression of Terrorism
UNIVERSAL INSTRUMENTS
Convention on Offences and Certain Other Acts Committed on Board Aircraft, signed at Tokyo
on 14
th
September 1963 (in force on 4
th
December 1969)
Convention for the Suppression of Unlawful Seizure of Aircraft signed at The Hague on
16
th
December 1970 (in force on 14
th
October 1971)
Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, signed at
Montreal on 23
rd
September 1971 (in force on 26
th
January 1973)
Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons,
including Diplomatic Agents, adopted by the General Assembly of the United Nations on
14
th
December 1973 (in force on 20
th
February 1977)
International Convention against the Taking of Hostages, adopted by the General Assembly of the
United Nations on 17
th
December 1979 (in force on 3
rd
June 1983)
Convention on the Physical Protection of Nuclear Material, signed at Vienna on 3
rd
March 1980
(in force on 8
th
February 1987)
Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil
Aviation, supplementary to the Convention for the Suppression of unlawful Acts against the Safety
of Civil Aviation, signed at Montreal on 24
th
February 1988 (in force on 6
th
August 1989)
Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation, done
at Rome on 10
th
March 1988 (in force on 1
st
March 1992)
Protocol for the Suppression of Unlawful Acts against the safety of Fixed Platforms Located on
the Continental Shelf, done at Rome on 10
th
March 1988 (in force on 1
st
March 1992)
Convention on the Marking of Plastic Explosives for the Purpose of Detection, signed at Montreal
on 1
st
March 1991 (in force on 21
st
June 1998)
International Convention for the Suppression of Terrorist Bombings, adopted by the General
Assembly of the United Nations on 15
th
December 1997
International Convention for the Suppression of the Financing of Terrorism, adopted by the
General Assembly of the United Nations on 9
th
December 1999
Annex D/ International Instruments: Prevention & Suppression of Terrorism 466
REGIONAL INSTRUMENTS
OAS Convention to Prevent and Punish the Acts of Terrorism Taking the Form of Crimes Against
Persons and Related Extortion that are of International Significance, concluded at Washington,
DC, on 2
nd
February 1971 (in force on 16
th
October 1973)
European Convention on the Suppression of Terrorism, concluded at Strasbourg on 27
th
January
1977 (in force on 4
th
August 1978)
SAARC Regional Convention on Suppression of Terrorism, signed at Kathmandu on 4
th
November
1987 (in force on 22
nd
August 1988): all seven member States of SAARC (Bangladesh, Bhutan,
India, Maldives, Nepal, Pakistan and Sri Lanka) are parties to the Convention
Arab Convention on the Suppression of Terrorism, signed at a meeting held at the General
Secretariat of the League of Arab States in Cairo from 22
nd
to 24
th
April 1998
Treaty on Cooperation among the States Members of the Commonwealth of Independent States
in Combating Terrorism, done at Minsk, on 4
th
June 1999
Convention of the Organisation of the Islamic Conference on Combating International Terrorism,
adopted at Ouagadougou, on 1
st
July 1999
Organisation of African Unity Convention on the Prevention and Combating of Terrorism, adopted
at Algiers on 14
th
July 1999
OTHER INSTRUMENTS
Convention on the Safety of United Nations and Associated Personnel, adopted by the General
Assembly of the United Nations, on 9
th
December 1994 (in force on 15
th
January 1999)
Geneva Convention for the Amelioration of the Conditions of the Wounded and Sick in Armed
Forces in the Field, signed at Geneva on 12
th
August 1949 (in force on 21
st
October 1950)
Geneva Convention for the Amelioration of the Conditions of the Wounded, Sick and Shipwrecked
members of Armed Forces at Sea, signed at Geneva on 12
th
August 1949 (in force on 21
st
October
1950)
Geneva Convention Relative to the Treatment of Prisoners of War, signed at Geneva on
12
th
August 1949 (in force on 21
st
October 1950)
Geneva Convention Relative to the Protection of Civilian Persons in Time of War, signed at
Geneva on 12
th
August 1949 [Protocol I] (in force on 21
st
October 1950)
Protocol Additional to the Geneva Conventions of 12
th
August 1949, and Relating to the Protection
of Victims of International Armed Conflicts, signed at Geneva on 8
th
June 1977 [Protocol II] (in
force on 7
th
December 1978)
Protocol Additional to the Geneva Conventions of 12
th
August 1949, and Relating to the Protection
of Victims of Non-international Armed Conflicts, signed at Geneva on 8
th
June 1977 (in force on
7
th
December 1978)
Annex E/ UN Resolutions on Terrorism 467
ANNEX E: UN Resolutions on Terrorism
UN GENERAL ASSEMBLY RESOLUTIONS
A/res/56/1. Condemnation of Terrorist Attacks in the United States of America
A/res/55/158. Measures to Eliminate International Terrorism
A/res/54/164. Human Rights and Terrorism
A/res/54/110. Measures to Eliminate International Terrorism
A/res/54/109. International Convention for Suppressing the Financing of Terrorism
A/res/53/108. Measures to Eliminate International Terrorism
A/res/52/165. Measures to Eliminate International Terrorism
A/res/52/133. Human Rights and Terrorism
A/res/51/210. Measures to Eliminate International Terrorism
A/res/50/186. Human Rights and Terrorism
A/res/50/53. Measures to Eliminate International Terrorism
A/res/49/185. Human Rights and Terrorism
A/res/49/60. Measures to Eliminate International Terrorism
A/res/48/122. Human Rights and Terrorism
A/res/46/51. Measures to Eliminate International Terrorism
A/res/44/29. Measures to Prevent International Terrorism
A/res/42/159. Measures to Prevent International Terrorism
A/res/40/61. Measures to Prevent International Terrorism
A/res/39/159. Inadmissibility of State Terrorism/Undermining State Socio-political
Systems
A/res/38/130. Measures to Prevent International Terrorism
A/res/36/109. Measures to Prevent International Terrorism
A/res/34/145. Measures to Prevent International Terrorism
A/res/32/147. Measures to Prevent International Terrorism
A/res/31/102. Measures to Prevent International Terrorism
A/res/3034 (XXVII). Measures to Prevent International Terrorism
Annex E/ UN Resolutions on Terrorism 468
UN SECURITY COUNCIL RESOLUTIONS
S/res/1373. International Cooperation Against Terrorist Threats to International Peace and Security
[Security Council Committee for Counter-Terrorism established pursuant to this Resolution] (2001)
S/res/1368. Condemnation of Attacks of 11/9/01: New York, Washington, DC & Pennsylvania (2001)
S/res/1363. Mechanism to Monitor Resolutions 1267 [1999] and 1333 [2000] (2001)
S/res/1333. Measures against the Taliban (2000)
S/res/1269. International Cooperation in the Fight Against Terrorism (1999)
S/res/1267. Measures against the Taliban (1999)
S/res/1214. Situation in Afghanistan (1998)
S/res/1189. Terrorist Bomb Attacks of 7
th
August 1998 in Kenya and Tanzania (1998)
S/res/1054. Sanctions Against Sudanese Government for Non-Compliance with S/Res1044 (1996)
S/res/1044. Sudan Extradition concerning Assassination Attempt upon President Mubarak (1996)
S/res/748. Sanctions against the Libyan Government (1992)
S/res/731. On the Destruction of Pan Am Flight 103 and Uta Flight 772 (1992)
S/res/ 687. Restoration of Sovereignty, Independence and Territorial Integrity of Kuwait (1991)
S/res/ 635. Marking of Plastic or Sheet Explosives for the Purpose of Detection (1989)
VERBATIM UN SECURITY COUNCIL RECORDS
S/PV/4385. Meeting of 28
th
September 2001
S/PV/4370. Meeting of 12
th
September 2001
REPORTS OF THE UN GENERAL ASSEMBLYS SIXTH COMMITTEE
Measures to Eliminate International Terrorism
A/40/1003 A/49/743 A/50/643 A/54/615
A/42/832 A/46/654 A/53/636 A/55/614
A/44/762 A/52/653 A/51/631 A/48/609
UN DECLARATIONS
Declaration to supplement 1994 Declaration: Measures to Eliminate International Terrorism (A/RES/51/210)
Declaration on Measures to Eliminate International Terrorism (A/RES/49/60)
Annex E/ UN Resolutions on Terrorism 469
REPORTS OF THE UN SECRETARY-GENERAL
A/56/190. Human Rights and Terrorism
A/56/160. Measures to Eliminate International Terrorism
A/55/179 + Add.1. Measures to Eliminate International Terrorism
A/54/439 Human Rights and Terrorism
A/54/301 + Add.1. Measures to Eliminate International Terrorism
A/53/314 + Add.1. Measures to Eliminate International Terrorism
A/52/304 + Add.1. Measures to Eliminate International Terrorism
A/51/336 + Add.1. Measures to Eliminate International Terrorism
A/50/685. Human Rights and Terrorism
A/50/372 + Add.1. Measures to Eliminate International Terrorism
A/49/257 + Add.1, Add.2 & Add.3. Measures to Eliminate International Terrorism
A/48/267 + Add.1. Measures to Eliminate International Terrorism
A/46/346/Add.1 + Add.2. Measures to Eliminate International Terrorism
A/44/456 + Add.1. Measures to Prevent International Terrorism
A/42/519 + Add.1. Measures to Prevent International Terrorism
A/40/445 + Add.1 + Add.2. Measures to Prevent International Terrorism
A/38/355 + Add.1 + Add.2 + Add.3. Measures to Prevent International Terrorism
A/36/425. Measures to Prevent International Terrorism
STATEMENTS BY PRESIDENTS OF THE UN SECURITY COUNCIL
S/PRST/2000/38. Security Council Responsibility for Maintenance of Int. Peace and Security
S/PRST/2000/12. Situation in Afghanistan
S/PRST/1999/29. Situation in Afghanistan
S/PRST/1996/10. Terrorist attacks in Jerusalem and Tel Aviv on 3
rd
-4
th
March 1996
S/PRST/1995/3. Terrorist attacks in Nordiya, Israel on 22
nd
January 1995
S/PRST/1994/40. Condemnation of Terrorist Attacks in Buenos Aires and London
S/20988. Assassination of the President of Lebanon
Annex E/ UN Resolutions on Terrorism 470
UN COMMISSION OF HUMAN RIGHTS: RESOLUTIONS ON TERRORISM
E/CN.4 / RES/ 2001 / 37 Human Rights and Terrorism
E/CN.4 / RES/ 2000 / 30 Human Rights and Terrorism
E/CN.4 / RES/ 1999 / 27 Human Rights and Terrorism
E/CN.4 / RES/ 1998 / 47 Human Rights and Terrorism
E/CN.4 / RES/ 1997 / 42 Human Rights and Terrorism
E/CN.4 / RES/ 1996 / 47 Human Rights and Terrorism
E/CN.4 / RES/ 1995 / 43 Human Rights and Terrorism
SUB COMMISSION RESOLUTIONS: HUMAN RIGHTS PROMOTION & PROTECTION
E/CN.4 / SUB.2 / RES/ 2001 /18 Terrorism and Human Rights
E/CN.4 / SUB.2 / RES/ 1999 / 26 Terrorism and Human Rights
E/CN.4 / SUB.2 / RES/ 1998 / 29 Human Rights and Terrorism
E/CN.4 / SUB.2 / RES/ 1997 / 39 Human Rights and Terrorism
E/CN.4 / SUB.2 / RES/ 1996 / 20 Human Rights and Terrorism
E/CN.4 / SUB.2 / RES/ 1994 / 18 Human Rights and Terrorism
REPORTS BY THE SPECIAL RAPPORTEUR (HUMAN RIGHTS)
E/CN.4 / SUB.2 / 2001 / 31 Terrorism and Human Rights (progress report)
E/CN.4 / SUB.2 / 1999 / 27 Terrorism and Human Rights (preliminary report)
RESOLUTION: HUMAN RIGHTS COMMISSION ON THE STATUS OF WOMEN
E/CN.6 / RES/ 36 / 7 Advancement of Women & Acts of Terrorism against Women
QUICKFINDER FOR UN WEBSITES RELATED TO TERRORISM
www.un.org Main UN site
www.un.org/site_index/ UN Central Index / links to UN
websites
www.unitarpoci.org UNITAR-POCI
http://www.un.org/terrorism/ UN Action Against Terrorism website
http://www.un.org/terrorism/sc.htm UN Security Council
http://www.un.org/terrorism/ga.htm UN General Assembly
http://www.un.org/terrorism/ecosoc.htm UN Economic & Social Council
http://untreaty.un.org/English/Terrorism.asp UN Terrorism Conventions
(Instruments)
http://www.undcp.org/terrorism.html UN Terrorism Prevention Branch (TPB)
http://www.odccp.org/pdf/leaflet_2000-04-30_1.pdf UN TPB brochure
Annex F/ International Terrorists Attacks by Region, 2001 471
ANNEX F: INTERNATIONAL TERRORIST ATTACKS by REGION, 2001
Annex G/ Characteristics and Effects of Chemical Weapons 472
ANNEX G: Characteristics and Effects of Chemical Weapons
cHEmcAL WEAPON5
NERVE
AGENTS
Function:
Disruption of
Nerve Impulse
Signals
TABUN (GA) SOMAN (GD)
SARIN (GB) V SERIES (VX)
Tabun [GA] (G for German) was discovered in 1936 and Sarin [GB] in 1938 by G. Schrader of IG
Farben. In 1944, Richard Kuhn discovered Soman [GD]. Between 1952 and 1953, VX (the most toxic
nerve agent) was almost simultaneously prepared by Schrader (with Bayer AG after WWII); R. Ghosh
and J. Newman of ICI; and M. Tammelin of the Swedish Government Chemical Warfare Defence
Laboratory.
Lethality
High. A small drop on skin or inhaled is fatal. LCt50 (lethal concentration that kills 50% of
people): 75 -100 mg min/m
3
(inhaled).
Delivery
In droplets, aerosol or vapour form, it may be inhaled or ingested.
Symptoms
(mild dose +)
Pupils contract, headache, eye pain, running nose, loss of appetite, nausea, sweating,
tight chest, heartburn
Stomach cramps, vomiting, increased sweating, painful involuntary or ineffective
defecation and urination, drooling, respiratory secretion
Fatigue, jerking, twitching, staggering, cramps, paleness
Tension, anxiety, restlessness, emotional disturbance, giddiness, insomnia
Headache, drowsiness, slowness of recall and confusion
Symptoms
(lethal dose)
The afore-mentioned symptoms and the following:
Lack of muscle control, slurred speech, coma
Loss of reflexes, alternate rapid breathing / not breathing
Convulsions, respiratory halt and death
Treatment
Atropine, Oximes and anti-convulsants.
Decontamination
Hydrolysis with solids, powders and solutions containing bleach. For V agent (series X):
Oxidisation. Special DeCon powder.
Notes: Tabun(GA)
Dimethylphosphoramidocyanidate (C
5
H
11
N
2
O
2
P).
Pure: Colourless / fruit odour. Impure: Brown / bitter almonds odour.
Notes: Sarin(GB)
Dethylphosphonofluoridate (C
4
H
10
FO
2
P). Colourless and odourless.
Notes: Soman(GD)
Methylphosphonofluoridate (C
7
H
16
FO
2
P).
Pure: Colourless / Fruit odour. Impure: Yellow - brown / camphor odour.
Notes: V Series(VX)
Methylphosphonothioate (C
11
H
26
NO
2
PS). Colourless and odourless.
Annex G/ Characteristics and Effects of Chemical Weapons 473
cHEmcAL WEAPON5
BLOOD
AGENTS
Function: Hindering ability
of blood to carry oxygen
Hydrogen Cyanide (CH N)
Cyanogen Chloride (CC1 N)
Lethality
High. Death within 6 to 8 minutes if above LCt50 (lethal concentration that
kills 50% of people): Cyanogen Chloride (11,000 mg min/m
3
). Hydrogen
Cyanide (2500 -5000 mg min/m
3
).
Delivery
In droplets, aerosol vapour. It may be inhaled or ingested.
Symptoms (mild dose +)
Respiratory distress, vomiting, diarrhoea, vertigo, anxiety, headache.
Symptoms (lethal dose)
The above, followed by seizures, cardiac arrest and death.
Treatment
Immediate removal to fresh air. Aggressive oxygenisation and blood
treatment. Antidotes: Amyl Nitrite, Sodium Nitrite, Sodium Thiosulphate.
If ingested, charcoal and stomach wash.
Decontamination
Purpose designed DeCon powder. Soap and water.
Notes:
Both agents usually colourless. CH N sometimes has odour of bitter
almonds. CC
1
N often has a pungent biting odour.
Annex G/ Characteristics and Effects of Chemical Weapons 474
cHEmcAL WEAPON5
CHOKING
AGENTS
Function: Damage or
Destruction of Lungs
Phosgene Gas (CCl
2
O)
Chlorine Gas (Cl
2
)
Lethality
Low to Medium, mostly if not treated and depending upon dose. General
exposure to 50 ppm is dangerous and 1000ppm is fatal (ppm = parts per
million).
Delivery
Aerosol vapour.
Symptoms (Mild dose +)
Cough, chest pain, breathing difficulties, wheezing and railing, eye
irritation, tearing at ear, nose and throat, distress, cyanosis (bluish skin from
lack of oxygen), rhinorrhoea (excessive discharge from nose),
blepharospasm (fluttering eyelids).
Symptoms (Lethal dose)
The afore-mentioned + within 2 to 6 hours, swelling and fluid in lungs
which reacts with phosgene to form hydrochloric acid (causing further lung
damage). Sensation of drowning. Death by asphyxiation.
Treatment
Chest X-Ray. Diuretics (lessen fluid loss into lungs). Bronchodilator therapy
(airway enlargement with aerosol). Attention to ABC (airway, breathing,
circulation). No antidote.
Decontamination
Disrobing.
Notes:
CCl
2
O (Carbonyl Chloride): Colourless. Odour of mown hay.
Cl
2
(Chlorine): Green-yellow. Suffocating odour.
Annex G/ Characteristics and Effects of Chemical Weapons 475
cHEmcAL WEAPON5
BLISTER
AGENTS
(VESICANTS)
Function: Damage or
Destruction of Lungs,
Eyes and Skin
Mustard Gas (C
4
H
8
Cl
2
S)
Lewisite Gas (C
2
H
2
AsCl
3
)
Lethality
Mustard: Approximately 2 to 5 % of military combat exposures die. Three grams
absorbed through the skin is fatal. LCt50 (lethal concentration that kills 50% of
people) for Mustard Gas is 1500 mg min/m
3
. Lethal dose to 50% of exposures
(LD50) for Mustard liquid on skin is 100 mg/kg. A few drops on the skin causes
severe injury.
Lewisite: Approximately 2 to 5 % of military combat exposures die. LCt50 (lethal
concentration that kills 50% of people) for Lewisite Gas is 1500 - 2500 mg min/m
3
.
Lethal dose to 50% of exposures (LD50) for Lewisite liquid on skin is 95 mg/kg.
Delivery
Aerosol vapour.
Symptoms
(mild dose +)
Mustard: Itching, burning, and inflammation of contact areas approximately 4
hours later, followed by swelling of tissue. Small blisters form in the vicinity of the
affected area after 20 to 24 hours. These develop to large blisters filled with a
colourless to yellow liquid. Severe tissue damage occurs inside the blisters. If
infected, the blisters take up to several months to heal. In serious cases, eyes may
take months to heal and sight may be lost, unless treated. Can cause long-term
cancer with high (sub-lethal) intakes.
Lewisite: As for mustard but with immediate pain and 2nd or 3rd degree burn
symptoms. It is faster acting than Mustard, but healing is more rapid with less
chance of infection.
Symptoms
(lethal dose)
Central Nervous System depression. The afore-mentioned + pulmonary edema,
flooding of lungs with body liquids. Sensation of drowning. Death by asphyxiation.
Some long term deaths caused by bone marrow failure.
Annex G/ Characteristics and Effects of Chemical Weapons 476
cHEmcAL WEAPON5
BLISTER
AGENTS
(VESICANTS)
Function: Damage or
Destruction of Lungs,
Eyes and Skin
Mustard Gas (C
4
H
8
Cl
2
S)
Lewisite Gas (C
2
H
2
AsCl
3
}
(60NT|NUE0}
Treatment
Mustard: no antidote. Lewisite: Antidote- 2,3-dimercaptopropanol. Provides good
level of protection for skin and mucous membrane. Both Mustard and Lewisite:
Ointments, antibiotics, eye drops (atropine), pain relievers, range of respiratory
treatments, depending on dose. Hospitalisation. Possible plastic surgery.
Decontamination
Chlorine (old method). DS2 (2% Na OH, 70% diethylenetriamine and 28%
ethylene glycol monomethyl ether). Hypochlorite solution (10% bleach with 90%
water or saline solution). DeCon must be within 2 minutes to prevent blistering but
is needed in all cases to prevent harm to others handling casualty. Aqueous
chlorine solution, washed off by soap and water.
Notes:
Mustard is generally known as H. Mustard (1,1' thiobis [2 chloroethane] ) has
variants including N Mustard. Pure Mustard is colourless and odourless. Impure
Mustard is amber-dark brown with a sweet odour like garlic, onion or horseradish.
Nitrogen Mustard Agents are HN1, HN2 and HN3. Sulphur Mustard Agents are
H, HD, HT.
Mustard is also mixed with Lewisite and termed as Mustard Lewisite Mix.
Arsenical vesicants such as phenyldichloroarsine (PD) or chlorovinyldichloroarsine
(L) are often mixed with Mustard Agent. This causes the same level of blisters but
confuses and makes the diagnosis more difficult.
Lewisite (2chloroethenyl arsonous dichloride) is a complex mixture of
compounds, known as L. Discovered by Capt. W. L. Lewis (US Army). Toxic,
non-vesicant variants of main Lewisite Agent (L1) are L2 and L3. Pure Lewisite:
odourless and colourless. Impure: Brownish colour with geranium odour.
ANNEX H/ Characteristics and Effects of Biological Weapons 477
ANNEX H: Characteristics and Effects of Biological Weapons
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Bacterial & Rickettsia
Agent: ANTHRAX
Type Cutaneous Respiratory Intestinal
Probable Delivery Via broken skin. Aerosol. Ingestion.
Lethality 20% if untreated. 90% if untreated. 20% to 70%.
Incubation 1 to 12 days. 1 to 7 days if intake is
sufficient.
1 to 7 days.
Symptoms Lesions (sores or blisters) on skin. Possible: fever; fatigue;
headaches and other pains; Lymph gland infections; muscular
aching; respiratory failure; shock; Meningitis; Lower intestinal
infection; nausea; stomach pain; bloody diarrhoea. Possibly
lesions on base of the tongue.
Contagion Non-contagious.
Treatment Penicillin, Ciprofloxacin, Doxycycline. Vaccine required 18
months before, for full effectiveness. Serious side effects
reported by some soldiers, after use of vaccine.
Notes: Anthrax spores are highly persistent and may survive in the
earth for decades. Resistant to 159C. Approximately 8000+
Anthrax spores needed to inflict respiratory anthrax illness.
Approximately 100 spores needed to inflict intestinal anthrax.
DeCon (Decontamination) with bleach (chlorine).
ANNEX H/ Characteristics and Effects of Biological Weapons 478
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\ w^0\ w^0\ w^0\; ;; ;
Category: Bacterial & Rickettsia
Agent: CHOLERA
Probable Delivery Ingestion of contaminated food or water.
Lethality 50% to 80% without treatment. 3% to 30% with treatment.
Incubation Between 12 hours and 6 days.
Symptoms Vomiting, nausea, chronic diarrhoea, rapid loss of body fluids,
toxaemia, unconsciousness, death.
Contagion Medium to high, depending upon personal hygiene and
preventative measures. Ingestion usually via mouth.
Treatment Routine injection vaccine is not always effective. Two oral
vaccines available provide high degree of protection for some
months. Treatment: Replacement of lost fluid and salts by
Oral Rehydration Salts (ORS). Antibiotics may shorten illness.
Notes: Resistant to 117C. DeCon (Decontamination) by boiling,
steam, and disinfectant.
ANNEX H/ Characteristics and Effects of Biological Weapons 479
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Bacterial & Rickettsia
Agent: PLAGUE
Type Pneumonic Bubonic
Probable Delivery Aerosol. Extremely difficult. Requires rat fleas to
transmit.
Lethality High. 1 to 2 days if untreated within 24 hours.
Incubation 1 to 6 days. 2 to 6 days.
Symptoms Fever, extreme pain in lymph nodes, headaches, muscle
aching, fatigue, inflamed glands, pneumonia, haemorrhages in
skin and mucous membranes, Septicmia, death. Sometimes
generates meningitis.
Contagion
High.
Cycle of Infection is: Rat-Flea-Human-
Rat. Bubonic plague can become
pneumonic plague and is then easily
and highly contagious.
Treatment No Pneumonic plague vaccine. Bubonic plague: Vaccine is
effective only for Bubonic form. Doxycycline, Streptomycin,
Ciprofloxacin and Gentamicin. If administered within 24 hours
of symptoms, chances of recovery are enhanced.
ANNEX H/ Characteristics and Effects of Biological Weapons 480
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Bacterial & Rickettsia
Agent: Q FEVER
Probable Delivery Aerosol, or ingestion of contaminated food.
Lethality Very low.
Incubation 2 to 3 weeks.
Symptoms Fever, headache, shivering, fatigue, perspiration, respiratory
irritation, pain in joints, muscles and chest.
Contagion Infrequent.
Treatment Ciprofloxacin and Tetracycline. No vaccine.
Notes: This is rarely lethal, so is largely considered as an
incapacitating agent. A Persistent Agent: It can withstand
temperatures within -52C to +40C. It can also survive on
non-living surfaces from 1 to 8 weeks.
ANNEX H/ Characteristics and Effects of Biological Weapons 481
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Bacterial & Rickettsia
Agent: TULAREMIA
Probable Delivery Aerosol.
Lethality Medium if not treated.
Incubation 2 to 10 days.
Symptoms Fever, shivering, fatigue, muscle and headaches, loss of
bodily fluids. Deep cutaneous ulcers. Swelling of Lymph
nodes.
Contagion Non-Contagious.
Treatment Gentamicin and Streptomycin. Some national Armed
Forces have developed a vaccine.
Notes: Highly infectious. A single bacterium will cause infection in
90% to 100% of people exposed.
ANNEX H/ Characteristics and Effects of Biological Weapons 482
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Viral
Agent: hH0RRhAC|6 FEVER8
Probable Delivery Contact with victim fluids, or aerosol.
Lethality High. 50% to 90% death rate, 7 to 16 days after
symptoms appear.
Incubation 2 to 21 days.
Symptoms Fever, fatigue, head and muscle aches, sore throat,
vomiting, diarrhoea, rash, kidney failure, liver failure,
internal and external bleeding after the fifth day.
Contagion Medium.
Treatment None. General medical care only. No vaccine.
Notes: Different strains of Ebola Virus exist with varying degrees
of virulence. Other related but less virulent Viral
Hmorrhagic fevers are Marburg fever, Congo fever,
Crimean fever and Argentine fever.
ANNEX H/ Characteristics and Effects of Biological Weapons 483
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Viral
Agent: ENCEPHALITIS
Probable Delivery Aerosol.
Lethality Low.
Incubation 1 to 5 days.
Symptoms Fever, despondency, vomiting, nausea, diarrhoea, severe
head, muscle and back ache, sensitivity to light, respiratory
irritation. 3% to 5% develop symptoms of CNS (Central
Nervous system) infection: convulsions, coma and paralysis.
1 to 3 day peak, with full recovery after 1 to 2 weeks.
Contagion Low. Mosquito vectors, as with Malaria.
Treatment None. General medical care only. No vaccine.
Notes: Of the several strains of encephalitis, the most probable for
Biological weapon use are Venezuelan Equine Encephalitis
and Eastern Equine Encephalitis.
ANNEX H/ Characteristics and Effects of Biological Weapons 484
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Viral
Agent: 8HALLP0X (VAR|0LA}
Probable Delivery Aerosol.
Lethality High to Medium.
Incubation 7 to 17 days. Illness afflicts after 10 to 12 days, followed 2
to 4 days later with cutaneous rash. Illness lasts 4 weeks.
Symptoms Harsh fever with 15% of patients becoming delirious.
Blisters on skin, which bleed together with mucous
membranes. Blisters form scabs, leaving permanent scars.
Contagion High. Infected retain contagion 16 to 17 days after
contraction.
Treatment None. General medical care only. Prophylactic vaccine
available in limited amounts.
Notes: UN (World Health Organisation or WHO) eradicated
naturally occurring smallpox by 1980.
ANNEX H/ Characteristics and Effects of Biological Weapons 485
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Bio-Toxins
Agent: BOTULINUM TOXIN
Probable Delivery Contamination of food or water, or aerosol.
Lethality High. 60% to 100% (depending on dose) without artificial
respiration. Death in 24-72 hours. If not fatal, impairs
metabolism for many months.
Incubation Illness onset after 1 to 12 hours in bloodstream, longer if
inhaled.
Symptoms Blockage of motor nerve transmissions. Impaired speech,
swallowing and vision. Dryness of throat and mouth.
Drooping eyelids. Muscular paralysis, resulting in respiratory
failure.
Contagion None.
Treatment An anti-toxin exists but must be delivered rapidly.
Otherwise artificial respiratory support and general
medical care only.
Notes: A highly lethal toxin generated by the bacteria Clostridium
Botulinum. Especially potent if inducted orally or into
abdomen; marginally less lethal when inhaled. The mean
lethal dose for humans is 1 nanogram (10-9 grams) per Kg
of body weight. Not very persistent: stable in water for 7 days
and in air for 12 hours. DeCon (Decontamination) by boiling
or alkali solution.
ANNEX H/ Characteristics and Effects of Biological Weapons 486
l0t0(l0^t l0t0(l0^t l0t0(l0^t l0t0(l0^t
w^0\; w^0\; w^0\; w^0\;
Category: Bio-Toxins
Agent: RICIN TOXIN
Probable Delivery Contamination of food or water, or aerosol.
Lethality Extremely High. Death within 36 to 48 hours.
Incubation Illness onset after 1 to 12 hours.
Symptoms If inhaled: nausea, muscle ache, respiratory difficulties;
tightness of chest and coughing is experienced within 3
hours. This escalates to severe inflammation of the lungs,
cyanosis and death within 36 to 48 hours.
If ingested: vomiting, nausea, internal bleeding in stomach
and intestines, kidney failure, liver failure, spleen failure and
circulatory collapse causing death.
Contagion None.
Treatment None. No vaccine.
Notes: Ricin is a derivative of the seeds of the castor bean plant
(Ricinus communis). A mean lethal dose for a human being
is approximately 30 micrograms per Kg of body weight (if
ingested orally). It is approximately 130 times more toxic
than potassium cyanide. A persistent agent: stable in water
and dilute acids.
Annex I/ Characteristics and Effects of Nuclear Weapons 487
Annex I: Characteristics and Effects of Nuclear Weapons
CHARACIFRIIIICI OF A NUCIFAR DFIONAIION
Note: The below data is based upon a 20 Megaton bomb ground-burst' detonation in
daytime, ]ust above a city of 2.8 million people.
=e&
&rr&c1
FLASH Intense flash of light (1000 times brighter than lightning). On a clear
day, could permanently blind people up to 37 miles (60 km).
FIREBALL (HEAT) Within 1/1000th of a second, a heat radiation fireball or heat pulse
would envelope a two mile radius of the weapon site at a temperature
of 20 million degrees Fahrenheit (11 million degrees Celsius).
Humans, buildings, vegetation, vehicles and everything else would
be vapourised. At six miles distance, car body panels would be
vapourised and glass would melt. At 29 miles (46 km) distance, all
uncovered skin would suffer 3
rd
degree burns.
X-RAY X-ray pulse, inflicting lethal radiation doses to 2 miles (3.2 km).
BLAST / WIND A blast wave would reach levels of 25 pounds per square inch (1.7
kilograms per square centimetre) at 2.5 miles (4 km) from the
detonation. Those at distances considerably farther away who
survived the fireball and blast would suffer burst ear-drums and
collapsed lungs. Hurricane force winds at 4 miles from the blast site
would reach speeds of 650 mph (1046km/h).
CASUALTIES Of 2.8 million people, 1 million would die within minutes of the
detonation. Of approximately 1.8 million survivors, 1.1 million would
die from their wounds in the near future. 500,000 might live if treated
(extremely difficult, given the numbers). 200,000 would be uninjured.
FALLOUT Radioactive fallout would cause deaths of those contaminated from
weeks up to decades later.
Annex I/ Characteristics and Effects of Nuclear Weapons 488
NUCIFAR RADIAIION
1v=& cnc1&ne1ce
ALPHA
PARTICLES
Alpha particles are the heaviest and most highly charged of
emitted nuclear particles. Limited in travel and penetration,
Alpha particles do not travel more than a few inches or
centimeters in the air. They are repelled by a single sheet
of paper and certainly by the epidermis (outermost layer of
dead skin on the body).
BETA
PARTICLES
Beta particles are smaller than Alpha particles and their
velocity is higher. Beta particles can penetrate several
millimeters of human tissue, but not to the depth of the vital
internal organs. However, if they are ingested (by eating
contaminated food, drinking contaminated water, breathing
contaminated air), or if they enter through broken skin (an
open wound), they damage and destroy human tissue and
body organs.
GAMMA RAYS
Gamma rays are the most dangerous type of nuclear
radiation. They are a pure energy form and the most
penetrating type of radiation. They are able to travel
considerable distance through uninterrupted space (in the
form of radiation waves), and can penetrate most materials.
Once inside a human body, Gamma rays damage and
destroy all types of human tissue and organs.
Please refer to the next chart for characteristics of Radiation Sickness.
Annex I/ Characteristics and Effects of Nuclear Weapons 489
NUCIFAR RADIAIION IICKNFII
A 20 Megaton nuclear detonation in daytime, above a city of 2.8 million people, would shortly generate tens
of thousands of casualties suffering from Radiation Sickness. Radiation Sickness injuries depend mainly
upon weather conditions, especially wind direction and speed, which determines how far and in what
direction the nuclear radiation fallout travels, and by extension, the level of contamination.
cce& evM=1cMe
LOW
(Approx. 100 - 130 Rads)
Casualties with a small radiation exposure, would experience
hmatologic radiation syndrome (a blood disorder). They would also
temporarily experience nausea, vomiting and diarrhoea for some days.
Approximately three weeks after contamination, their bone marrow
would stop producing the normal blood cell count. The number of blood
clotting cells (platelets) would drop. The white blood cell deficit would
weaken the immune system and mouth ulcers would be experienced.
Injuries and burns would become infected, not heal up and hmorrhage
(bleed) into the skin with fresh hmorrhaging commencing in the
intestines and stomach.
MEDIUM
(Approx. 400 - 600 Rads)
Casualties with a medium radiation exposure, would experience
gastrointestinal radiation sickness. This amounts to nausea, vomiting
and diarrhoea shortly after contamination and would last several days
before appearing to stem. After some days (up to about a week), the
same symptoms return in an intense form. The diarrhoea and vomit
becomes blood impregnated as the radiation-damaged lining of the
stomach and intestine disintegrates. In spite of intensive [medical] care,
this level of radiation sickness proves fatal in most cases.
HIGH
(Approx. 4000 - 5000 Rads)
Casualties who are exposed to high doses of radiation, experience
central nervous system syndrome. Radiation damaged brain tissue
swells up, and the casualty experiences nausea, vomiting and intense
diarrhoea; increasing difficulty in thought and speech processes;
deteriorating mobility. Convulsions result in a coma, followed by death
with a couple of days after contamination, despite the most intensive
[medical] care.
A
n
n
e
x
I
/
C
h
a
r
a
c
t
e
r
i
s
t
i
c
s
a
n
d
E
f
f
e
c
t
s
o
f
N
u
c
l
e
a
r
W
e
a
p
o
n
s
4
9
0
E
x
a
m
p
l
e
o
f
N
u
c
l
e
a
r
R
a
d
i
a
t
i
o
n
E
f
f
e
c
t
s
:
C
H
E
R
N
O
B
Y
L
M
a
p
s
h
o
w
i
n
g
t
h
e
a
r
e
a
w
o
r
s
t
a
f
f
e
c
t
e
d
b
y
R
a
d
i
a
t
i
o
n
f
r
o
m
t
h
e
C
h
e
r
n
o
b
y
l
N
u
c
l
e
a
r
R
e
a
c
t
o
r
e
x
p
l
o
s
i
o
n
i
n
t
h
e
U
k
r
a
i
n
e
,
U
S
S
R
,
o
n
2
6
t
h
A
p
r
i
l
1
9
8
6
.
A
n
o
p
e
r
a
t
o
r
m
a
d
e
a
s
e
r
i
e
s
o
f
m
i
s
t
a
k
e
s
d
u
r
i
n
g
r
e
a
c
t
o
r
e
c
o
n
o
m
y
t
e
s
t
s
.
A
f
t
e
r
m
i
s
-
s
e
t
t
i
n
g
t
h
e
o
u
t
p
u
t
(
t
o
o
l
o
w
)
a
n
d
h
a
v
i
n
g
d
i
s
a
b
l
e
d
t
h
e
a
u
t
o
m
a
t
i
c
s
h
u
t
d
o
w
n
f
o
r
t
h
e
t
e
s
t
s
,
h
e
t
r
i
e
d
m
a
n
u
a
l
l
y
t
o
s
h
u
t
d
o
w
n
t
h
e
r
e
a
c
t
o
r
.
T
h
i
s
l
a
t
e
s
t
S
o
v
i
e
t
m
o
d
e
l
o
f
r
e
a
c
t
o
r
t
h
e
n
r
e
a
c
h
e
d
1
2
0
t
i
m
e
s
i
t
s
s
a
f
e
m
a
x
i
m
u
m
p
o
w
e
r
.
T
h
e
r
a
d
i
o
a
c
t
i
v
e
f
u
e
l
d
i
s
i
n
t
e
g
r
a
t
e
d
a
n
d
b
l
e
w
t
h
e
t
o
p
s
h
i
e
l
d
e
n
t
i
r
e
l
y
o
f
f
o
f
t
h
e
r
e
a
c
t
o
r
.
3
%
o
f
t
h
e
N
u
c
l
e
a
r
R
e
a
c
t
o
r
c
o
r
e
e
s
c
a
p
e
d
,
e
v
e
n
t
u
a
l
l
y
h
a
v
i
n
g
w
o
r
l
d
w
i
d
e
e
f
f
e
c
t
s
.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 491 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Annex J: Significant Terrorist Incidents 1961-2001 (US State Dept.)
1961 - 1982 1961 - 1982 1961 - 1982 1961 - 1982
First US Aircraft Hijacked, May 1, 1961: Puerto Rican born Antuilo Ramierez Ortiz forced at
gunpoint a National Airlines plane to fly to Havana, Cuba, where he was given asylum.
Ambassador to Guatemala Assassinated, August 28, 1968: US Ambassador to Guatemala
John Gordon Mein was murdered by a rebel faction when gunmen forced his official car off
the road in Guatemala City and raked the vehicle with gunfire.
Ambassador to Japan Attacked, July 30, 1969: US Ambassador to Japan A.H. Meyer was
attacked by a knife-wielding Japanese citizen.
Ambassador to Brazil Kidnapped, September 3, 1969: US Ambassador to Brazil Charles Burke
Elbrick was kidnapped by the Marxist revolutionary group MR-8.
US Agency for International Development Adviser Kidnapped, July 31, 1970: In Montevideo,
Uruguay, the Tupamaros terrorist group kidnapped USAID Police adviser Dan Mitrione; his body
was found on August 10.
Bloody Friday, July 21, 1972: An Irish Republican Army (IRA) bomb attack killed 11 people
and injured 130 in Belfast, Northern Ireland. Ten days later, three IRA car bomb attacks in the
village of Claudy left six dead.
Munich Olympic Massacre, September 5, 1972: Eight Palestinian Black September terrorists
seized 11 Israeli athletes in the Olympic Village in Munich, West Germany. In a bungled rescue
attempt by West German authorities, nine of the hostages and five terrorists were killed.
Ambassador to Sudan Assassinated, March 2, 1973: US Ambassador to Sudan Cleo A. Noel
and other diplomats were assassinated at the Saudi Arabian Embassy in Khartoum by members
of the Black September organisation.
Consul General in Mexico Kidnapped, May 4, 1973: US Consul General in Guadalajara
Terrence Leonhardy was kidnapped by members of the Peoples Revolutionary Armed Forces.
Domestic Terrorism, January 27-29, 1975: Puerto Rican nationalists bombed a Wall Street bar,
killing four and injuring 60; Two days later, the Weather Underground claims responsibility for
an explosion in a bathroom at the US Department of State in Washington DC.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 492 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Entebbe Hostage Crisis, June 27, 1976: Members of the Baader-Meinhof Group and the Popular
Front for the Liberation of Palestine (PFLP) seized an Air France airliner and its 258 passengers.
They forced the plane to land in Uganda, where on July 3 Israeli commandos successfully rescued
the passengers.
Assassination of Former Chilean Diplomat, September 21, 1976: In Washington DC, exiled
Chilean Foreign Minister Orlando Letelier was killed by a car bomb.
Kidnapping of Italian Prime Minister, March 16, 1978: Premier Aldo Moro was seized by the
Red Brigade and assassinated 55 days later.
Iran Hostage Crisis, November 4, 1979: After President Carter agreed to admit the Shah of Iran
into the US, Iranian radicals seized the US embassy in Tehran and took 66 American diplomats
hostage. Thirteen hostages were soon released, but the remaining 53 were held until their release
on January 20, 1981.
Grand Mosque Seizure, November 20, 1979: 200 Islamic terrorists seized the Grand Mosque
in Mecca, Saudi Arabia, taking hundreds of pilgrims hostage. Saudi and French security forces
retook the shrine after an intense battle in which some 250 people were killed and 600 wounded.
US Installation Bombing, August 31, 1981: The Red Army exploded a bomb at the US Air
Force Base at Ramstein, West Germany.
Assassination of Egyptian President, October 6, 1981: Soldiers who were secretly members of
the Takfir Wal-Hajira sect attacked and killed Egyptian President Anwar Sadat during a troop
review.
Murder of Missionaries, December 4, 1981: Three American nuns and one lay missionary were
found murdered outside San Salvador, El Salvador. They were believed to have been assassinated
by a right-wing death squad.
Assassination of Lebanese Prime Minister, September 14, 1982: Premier Bashir Gemayel was
assassinated by a car bomb parked outside his partys Beirut headquarters.
1983 1983 1983 1983
Colombian Hostage-Taking, April 8, 1983: A US citizen was seized by the Revolutionary
Armed Forces of Colombia (FARC) and held for ransom.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 493 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Bombing of US Embassy in Beirut, April 18, 1983: Sixty-three people, including the CIAs
Middle East director, were killed, and 120 were injured in a 400-pound suicide truck-bomb attack
on the US Embassy in Beirut, Lebanon. The Islamic Jihad claimed responsibility.
Naval Officer Assassinated in El Salvador, May 25, 1983: A US Navy officer was assassinated
by the Farabundo Marti National Liberation Front.
North Korean Hit Squad, October 9, 1983: North Korean agents blew up a delegation from
South Korea in Rangoon, Burma, killing 21 persons and injuring 48.
Bombing of Marine Barracks, Beirut, October 23, 1983: Simultaneous suicide truck-bomb
attacks were made on American and French compounds in Beirut, Lebanon. A 12,000-pound
bomb destroyed the US compound, killing 242 Americans, while 58 French troops were killed
when a 400-pound device destroyed a French base. Islamic Jihad claimed responsibility.
Naval Officer Assassinated in Greece, November 15, 1983: A US Navy officer was shot by the
17 November terrorist group in Athens, Greece, while his car was stopped at a traffic light.
1984 1984 1984 1984
Kidnapping of Embassy Official, March 16, 1984: The Islamic Jihad kidnapped and later
murdered Political Officer William Buckley in Beirut, Lebanon. Other US citizens not connected
to the US Government were seized over a succeeding two-year period.
Hizballah Restaurant Bombing, April 12, 1984: Eighteen US servicemen were killed, and 83
people were injured in a bomb attack on a restaurant near a US Air Force Base in Torrejon, Spain.
Responsibility was claimed by Hizballah.
Golden Temple Seizure, June 5, 1984: Sikh terrorists seized the Golden Temple in Amritsar,
India. One hundred people died when Indian security forces retook the Sikh holy shrine.
Assassination of Prime Minister Gandhi, October 31, 1984: The Indian premier was shot to
death by members of her security force.
1985 1985 1985 1985
Kidnapping of US Officials in Mexico, February 7, 1985: Under the orders of narcotrafficker
Rafael Cero Quintero, Drug Enforcement Administration agent Enrique Camarena Salazar and
his pilot were kidnapped, tortured, and executed.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 494 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
TWA Hijacking, June 14, 1985: A Trans-World Airlines flight was hijacked en route to Rome
from Athens by two Lebanese Hizballah terrorists and forced to fly to Beirut. The eight crew
members and 145 passengers were held for 17 days, during which one American hostage, a US
Navy sailor, was murdered. After being flown twice to Algiers, the aircraft was returned to Beirut
after Israel released 435 Lebanese and Palestinian prisoners.
Air India Bombing, June 23, 1985: A bomb destroyed an Air India Boeing 747 over the Atlantic,
killing all 329 people aboard. Both Sikh and Kashmiri terrorists were blamed for the attack. Two
cargo handlers were killed at Tokyo airport, Japan, when another Sikh bomb exploded in an Air
Canada aircraft en route to India.
Soviet Diplomats Kidnapped, September 30, 1985: In Beirut, Lebanon, Sunni terrorists
kidnapped four Soviet diplomats. One was killed, but three were later released.
Achille Lauro Hijacking, October 7, 1985: Four Palestinian Liberation Front terrorists seized
the Italian cruise liner in the eastern Mediterranean Sea, taking more than 700 hostages. One US
passenger was murdered before the Egyptian Government offered the terrorists safe haven in
return for the hostages freedom.
Egyptian Airliner Hijacking, November 23, 1985: An EgyptAir airplane bound from Athens
to Malta and carrying several US citizens was hijacked by the Abu Nidal Group.
1986 1986 1986 1986
Aircraft Bombing in Greece, March 30, 1986: A Palestinian splinter group detonated a bomb
as TWA Flight 840 approached Athens Airport, killing four US citizens.
Berlin Discoteque Bombing, April 5, 1986: Two US soldiers were killed, and 79 American
servicemen were injured in a Libyan bomb attack on a nightclub in West Berlin, West Germany.
In retaliation, US military jets bombed targets in and around Tripoli and Benghazi.
Kimpo Airport Bombing, September 14, 1986: North Korean agents detonated an explosive
device at Seouls Kimpo Airport, killing five persons and injuring 29 others.
1987 1987 1987 1987
Bus Attack, April 24, 1987: Sixteen US servicemen riding in a Greek Air Force bus near Athens
were injured in an apparent bombing attack, carried out by the revolutionary organisation known
as 17 November.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 495 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Downing of Airliner, November 29, 1987: North Korean agents planted a bomb aboard Korean
Air Lines Flight 858, which subsequently crashed into the Indian Ocean.
Servicemens Bar Attack, December 26, 1987: Catalan separatists bombed a Barcelona bar
frequented by US servicemen, resulting in the death of one US citizen.
1988 1988 1988 1988
Kidnapping of William Higgins, February 17, 1988: US Marine Corps Lt. Col. W. Higgins was
kidnapped and murdered by the Iranian-backed Hizballah group while serving with the United
Nations Truce Supervision Organisation (UNTSO) in southern Lebanon.
Naples USO Attack, April 14, 1988: The Organisation of Jihad Brigades exploded a car bomb
outside a USO Club in Naples, Italy, killing one US sailor.
Attack on US Diplomat in Greece, June 28, 1988: The Defence Attache of the US Embassy in
Greece was killed when a car bomb was detonated outside his home in Athens.
Pan Am 103 Bombing, December 21, 1988: Pan American Airlines Flight 103 was blown up
over Lockerbie, Scotland, by a bomb believed to have been placed on the aircraft in Frankfurt,
West Germany, by Libyan terrorists. All 259 people on board were killed.
1989 1989 1989 1989
Assassination of US Army Officer, April 21, 1989: The New Peoples Army (NPA) assassinated
Col. James Rowe in Manila. The NPA also assassinated two US government defence contractors
in September.
Assassination of German Bank Chairman, November 30, 1989: The Red Army Faction
assassinated Deutsche Bank Chairman Alfred Herrhausen in Frankfurt.
1990 1990 1990 1990
US Embassy Bombed in Peru, January 15, 1990: The Tupac Amaru Revolutionary Movement
bombed the US Embassy in Lima, Peru.
US Soldiers Assassinated in the Philippines, May 13, 1990: The New Peoples Army (NPA)
killed two US Air Force personnel near Clark Air Force Base in the Philippines.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 496 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
1991 1991 1991 1991
Attempted Iraqi Attacks on US Posts, January 18-19, 1991: Iraqi agents planted bombs at the
US Ambassador to Indonesias home residence and at the USIS library in Manila.
1992 1992 1992 1992
Kidnapping of US Businessmen in the Philippines, January 17-21, 1992: A senior official of
the corporation Philippine Geothermal was kidnapped in Manila by the Red Scorpion Group, and
two US businessmen were seized independently by the National Liberation Army and by
Revolutionary Armed Forces of Colombia (FARC).
Bombing of the Israeli Embassy in Argentina, March 17, 1992: Hizballah claimed
responsibility for a blast that leveled the Israeli Embassy in Buenos Aires, Argentina, causing the
deaths of 29 and wounding 242.
1993 1993 1993 1993
Kidnappings of US Citizens in Colombia, January 31, 1993: Revolutionary Armed Forces of
Colombia (FARC) terrorists kidnapped three US missionaries.
World Trade Center Bombing, February 26, 1993: The World Trade Center in New York City
was badly damaged when a car bomb planted by Islamic terrorists exploded in an underground
garage. The bomb left six people dead and 1,000 injured. The men carrying out the attack were
followers of Umar Abd al-Rahman, an Egyptian cleric who preached in the New York City area.
Attempted Assassination of President Bush by Iraqi Agents, April 14, 1993: The Iraqi
Intelligence service attempted to assassinate former US President George Bush during a visit to
Kuwait. In retaliation, the US launched a cruise missile attack two months later on the Iraqi capital
Baghdad.
1994 1994 1994 1994
Hebron Massacre, February 25, 1994: Jewish right-wing extremist and US citizen Baruch
Goldstein machine-gunned Moslem worshippers at a mosque in West Bank town of Hebron,
killing 29 and wounding about 150.
FARC Hostage-Taking, September 23, 1994: FARC rebels kidnapped US citizen Thomas
Hargrove in Colombia.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 497 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Air France Hijacking, December 24, 1994: Members of the Armed Islamic Group seized an Air
France Flight to Algeria. The four terrorists were killed during a rescue effort.
1995 1995 1995 1995
Attack on US Diplomats in Pakistan, March 8, 1995: Two unidentified gunmen killed two US
diplomats and wounded a third in Karachi, Pakistan.
Tokyo Subway Station Attack, March 20, 1995: Twelve persons were killed, and 5,700 were
injured in a Sarin nerve gas attack on a crowded subway station in the center of Tokyo, Japan. A
similar attack occurred nearly simultaneously in the Yokohama subway system. The Aum
Shinri-kyu cult was blamed for the attacks.
Bombing of the Federal Building in Oklahoma City, April 19, 1995: Right-wing extremists
Timothy McVeigh and Terry Nichols destroyed the Federal Building in Oklahoma City with a
massive truck bomb that killed 166 and injured hundreds more in what was up to then the largest
terrorist attack on American soil.
Kashmiri Hostage-Taking, July 4, 1995: In India, six foreigners, including two US citizens,
were taken hostage by Al-Faran, a Kashmiri separatist group. One non-US hostage was later found
beheaded.
Jerusalem Bus Attack, August 21, 1995: Hamas claimed responsibility for the detonation of a
bomb that killed six and injured over 100 persons, including several US citizens.
Attack on US Embassy in Moscow, September 13, 1995: A rocket-propelled grenade was fired
through the window of the US Embassy in Moscow, ostensibly in retaliation for US strikes on
Serb positions in Bosnia.
Saudi Military Installation Attack, November 13, 1995: The Islamic Movement of Change
planted a bomb in a Riyadh military compound that killed one US citizen, several foreign national
employees of the US Government, and more than 40 others.
Egyptian Embassy Attack, November 19, 1995: A suicide bomber drove a vehicle into the
Egyptian Embassy compound in Islamabad, Pakistan, killing at least 16 and injuring 60 persons.
Three militant Islamic groups claimed responsibility.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 498 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
1996 1996 1996 1996
Papuan Hostage Abduction, January 8, 1996: In Indonesia, 200 Free Papua Movement (OPM)
guerrillas abducted 26 individuals in the Lorenta nature preserve, Irian Jaya Province. Indonesian
Special Forces members rescued the remaining nine hostages on May 15.
Kidnapping in Colombia, January 19, 1996: Revolutionary Armed Forces of Colombia (FARC)
guerrillas kidnapped a US citizen and demanded a US$ 1 million ransom. The hostage was
released on May 22.
Tamil Tigers Attack, January 31, 1996: Members of the Liberation Tigers of Tamil Eelam
(LTTE) rammed an explosives-laden truck into the Central Bank in the heart of downtown
Colombo, Sri Lanka, killing 90 civilians and injuring more than 1,400 others, including two US
citizens.
IRA Bombing, February 9, 1996: An Irish Republican Army (IRA) bomb detonated in London,
killing two persons and wounding more than 100 others, including two US citizens.
Athens Embassy Attack, February 15, 1996: Unidentified assailants fired a rocket at the US
embassy compound in Athens, causing minor damage to three diplomatic vehicles and some
surrounding buildings. Circumstances of the attack suggested it was an operation carried out by
the 17 November group.
ELN Kidnapping, February 16, 1996: Six alleged National Liberation Army (ELN) guerrillas
kidnapped a US citizen in Colombia. After nine months, the hostage was released.
Hamas Bus Attack, February 26, 1996: In Jerusalem, a suicide bomber blew up a bus, killing
26 persons, including three US citizens, and injuring some 80 persons, including three other US
citizens.
Dizengoff Center Bombing, March 4, 1996: Hamas and the Palestine Islamic Jihad (PIJ) both
claimed responsibility for a bombing outside of Tel Avivs largest shopping mall that killed 20
persons and injured 75 others, including two US citizens.
West Bank Attack, May 13, 1996: Arab gunmen opened fire on a bus and a group of Yeshiva
students near the Bet El settlement, killing a dual US-Israeli citizen and wounding three Israelis.
No one claimed responsibility for the attack, but Hamas was suspected.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 499 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
USAID Worker Abduction, May 31, 1996: A gang of former Contra guerrillas kidnapped a US
employee of the Agency for International Development (USAID) who was assisting with election
preparations in rural northern Nicaragua. She was released unharmed the next day after members
of the international commission overseeing the preparations intervened.
Zekharya Attack, June 9, 1996: Unidentified gunmen opened fire on a car near Zekharya, killing
a dual US-Israeli citizen and an Israeli. The Popular Front for the Liberation of Palestine (PFLP)
is suspected.
Manchester Truck Bombing, June 15, 1996: An IRA truck bomb detonated at a Manchester
shopping center, wounding 206 persons, including two German tourists, and caused extensive
property damage.
Khobar Towers Bombing, June 25, 1996: A fuel truck carrying a bomb exploded outside the
US militarys Khobar Towers housing facility in Dhahran, killing 19 US military personnel and
wounding 515 persons, including 240 US personnel. Several groups claimed responsibility for the
attack.
ETA Bombing, July 20, 1996: A bomb exploded at Tarragona International Airport in Reus,
Spain, wounding 35 persons, including British and Irish tourists. The Basque Fatherland and
Liberty (ETA) organisation was suspected.
Bombing of Archbishop of Oran, August 1, 1996: A bomb exploded at the home of the French
Archbishop of Oran, killing him and his chauffeur. The attack occurred after the Archbishops
meeting with the French Foreign Minister. The Algerian Armed Islamic Group (GIA) is suspected.
Sudanese Rebel Kidnapping, August 17, 1996: Sudan Peoples Liberation Army (SPLA) rebels
kidnapped six missionaries in Mapourdit, including a US citizen, an Italian, three Australians, and
a Sudanese. The SPLA released the hostages 11 days later.
PUK Kidnapping, September 13, 1996: In Iraq, Patriotic Union of Kurdistan (PUK) militants
kidnapped four French workers for Pharmaciens Sans Frontieres, a Canadian United Nations High
Commissioner for Refugees (UNHCR) official, and two Iraqis.
Assassination of South Korean Consul, October 1, 1996: In Vladivostok, Russia, assailants
attacked and killed a South Korean consul near his home. No one claimed responsibility, but
South Korean authorities believed that the attack was carried out by professionals and that the
assailants were North Koreans. North Korean officials denied the countrys involvement in the
attack.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 500 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Red Cross Worker Kidnappings, November 1, 1996: In Sudan, a breakaway group from the
Sudanese Peoples Liberation Army (SPLA) kidnapped three International Committee of the Red
Cross (ICRC) workers, including a US citizen, an Australian, and a Kenyan. On December 9, the
rebels released the hostages in exchange for ICRC supplies and a health survey for their camp.
Paris Subway Explosion, December 3, 1996: A bomb exploded aboard a Paris subway train as
it arrived at the Port Royal station, killing two French nationals, a Moroccan, and a Canadian, and
injuring 86 persons. Among those injured were one US citizen and a Canadian. No one claimed
responsibility for the attack, but Algerian extremists are suspected.
Abduction of US Citizen by FARC, December 11, 1996: Five armed men claiming to be
members of the Revolutionary Armed Forces of Colombia (FARC) kidnapped and later killed a
US geologist at a methane gas exploration site in La Guajira Department.
Tupac Amaru Seizure of Diplomats, December 17, 1996: Twenty-three members of the Tupac
Amaru Revolutionary Movement (MRTA) took several hundred people hostage at a party given
at the Japanese Ambassadors residence in Lima, Peru. Among the hostages were several US
officials, foreign ambassadors and other diplomats, Peruvian Government officials, and Japanese
businessmen. The group demanded the release of all MRTA members in prison and safe passage
for them and the hostage-takers. The terrorists released most of the hostages in December but held
81 Peruvians and Japanese citizens for several months.
1997 1997 1997 1997
Egyptian Letter Bombs, January 2-13, 1997: A series of letter bombs with Alexandria, Egypt,
postmarks were discovered at Al-Hayat newspaper bureaus in Washington DC, New York City,
London, and Riyadh, Saudi Arabia. Three similar devices, also postmarked in Egypt, were found
at a prison facility in Leavenworth, Kansas. Bomb disposal experts defused all the devices, but
one detonated at the Al-Hayat office in London, injuring two security guards and causing minor
damage.
Tajik Hostage Abductions, February 4-17, 1997: Near Komsomolabad, Tajikistan, a
paramilitary group led by Bakhrom Sodirov abducted four United Nations military observers. The
victims included two Swiss, one Austrian, one Ukrainian, and their Tajik interpreter. The
kidnappers demanded safe passage for their supporters from Afghanistan to Tajikistan. In four
separate incidents occurring between Dushanbe and Garm, Bakhrom Sodirov and his group
kidnapped two International Committee for the Red Cross members, four Russian journalists and
their Tajik driver, four UNHCR members, and the Tajik Security Minister, Saidamir Zukhurov.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 501 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Venezuelan Abduction, February 14, 1997: Six armed Colombian guerrillas kidnapped a US
oil engineer and his Venezuelan pilot in Apure, Venezuela. The kidnappers released the
Venezuelan pilot on February 22. According to authorities, the FARC is responsible for the
kidnapping.
Empire State Building Sniper Attack, February 23, 1997: A Palestinian gunman opened fire
on tourists at an observation deck atop the Empire State Building in New York City, killing a
Danish national and wounding visitors from the United States, Argentina, Switzerland, and France
before turning the gun on himself. A handwritten note carried by the gunman claimed this was a
punishment attack against the enemies of Palestine.
ELN Kidnapping, February 24, 1997: National Liberation Army (ELN) guerrillas kidnapped
a US citizen employed by a Las Vegas gold corporation who was scouting a gold mining operation
in Colombia. The ELN demanded a ransom of US$ 2.5 million.
FARC Kidnapping, March 7, 1997: FARC guerrillas kidnapped a US mining employee and his
Colombian colleague who were searching for gold in Colombia. On November 16, the rebels
released the two hostages after receiving a US$ 50,000 ransom.
Hotel Nacional Bombing, July 12, 1997: A bomb exploded at the Hotel Nacional in Havana,
injuring three persons and causing minor damage. A previously unknown group calling itself the
Military Liberation Union claimed responsibility.
Israeli Shopping Mall Bombing, September 4, 1997: Three suicide bombers of Hamas
detonated bombs in the Ben Yehuda shopping mall in Jerusalem, killing eight persons, including
the bombers, and wounding nearly 200 others. A dual US-Israeli citizen was among the dead, and
seven US citizens were wounded.
OAS Abductions, October 23, 1997: In Colombia, ELN rebels kidnapped two foreign members
of the Organization of American States (OAS) and a Colombian human rights official at a
roadblock. The ELN claimed that the kidnapping was intended to show the international
community that the elections in Colombia are a farce.
Yemeni Kidnappings, October 30, 1997: Al-Sha'if tribesmen kidnapped a US businessman near
Sanaa. The tribesmen sought the release of two fellow tribesmen who were arrested on smuggling
charges and several public works projects they claim the government promised them. They
released the hostage on November 27.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 502 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Murder of US Businessmen in Pakistan, November 12, 1997: Two unidentified gunmen shot
to death four US auditors from Union Texas Petroleum Corporation and their Pakistani driver
after they drove away from the Sheraton Hotel in Karachi. The Islami Inqilabi Council, or Islamic
Revolutionary Council, claimed responsibility in a call to the US Consulate in Karachi. In a letter
to Pakistani newspapers, the Aimal Khufia Action Committee also claimed responsibility.
Tourist Killings in Egypt, November 17, 1997: Al-Gama'at al-Islamiyya (IG) gunmen shot and
killed 58 tourists and four Egyptians and wounded 26 others at the Hatshepsut Temple in the
Valley of the Kings near Luxor. Thirty-four Swiss, eight Japanese, five Germans, four Britons,
one French, one Colombian, a dual Bulgarian-British citizen, and four unidentified persons were
among the dead. Twelve Swiss, two Japanese, two Germans, one French, and nine Egyptians were
among the wounded.
1998 1998 1998 1998
UN Observer Abductions, February 19, 1998: Armed supporters of late Georgian President
Zviad Gamsakhurdia abducted four UN military observers from Sweden, Uruguay, and the Czech
Republic.
FARC Abduction, March 21-23, 1998: FARC rebels kidnapped a US citizen in Sabaneta,
Colombia. FARC members also killed three persons, wounded 14, and kidnapped at least 27
others at a roadblock near Bogota. Four US citizens and one Italian were among those kidnapped,
as well as the acting president of the National Electoral Council (CNE) and his wife.
Somali Hostage-Takings, April 15, 1998: Somali militiamen abducted nine Red Cross and Red
Crescent workers at an airstrip north of Mogadishu. The hostages included a US citizen, a
German, a Belgian, a French, a Norwegian, two Swiss, and one Somali. The gunmen were
members of a subclan loyal to Ali Mahdi Mohammed, who controlled the northern section of the
capital.
IRA Bombing, Banbridge, August 1, 1998: A 500-pound car bomb planted by the Real IRA
exploded outside a shoe store in Banbridge, North Ireland, injuring 35 persons and damaging at
least 200 homes.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 503 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
US Embassy Bombings in East Africa, August 7, 1998: A bomb exploded at the rear entrance
of the US Embassy in Nairobi, Kenya, killing 12 US citizens, 32 Foreign Service Nationals
(FSNs), and 247 Kenyan citizens. About 5,000 Kenyans, six US citizens, and 13 FSNs were
injured. The US Embassy building sustained extensive structural damage. Almost simultaneously,
a bomb detonated outside the US Embassy in Dar es Salaam, Tanzania, killing seven FSNs and
three Tanzanian citizens, and injuring one US citizen and 76 Tanzanians. The explosion caused
major structural damage to the US Embassy facility. The US Government held Osama bin Laden
responsible.
IRA Bombing, Omagh, August 15, 1998: A 500-pound car bomb planted by the Real IRA
exploded outside a local courthouse in the central shopping district of Omagh, Northern Ireland,
killing 29 persons and injuring over 330.
Colombian Pipeline Bombing, October 18, 1998: A National Liberation Army (ELN) planted
bomb exploded on the Ocensa pipeline in Antioquia Department, killing approximately 71 persons
and injuring at least 100 others. The pipeline is jointly owned by the Colombia State Oil Company
Ecopetrol and a consortium, including US, French, British, and Canadian companies.
Armed Kidnapping in Colombia, November 15, 1998: Armed assailants followed a US
businessman and his family home in Cundinamarca Department and kidnapped his 11-year-old
son after stealing money, jewelry, one automobile, and two cell phones. The kidnappers demanded
US$ 1 million in ransom. On January 21, 1999, the kidnappers released the boy.
1999 1999 1999 1999
Angolan Aircraft Downing, January 2, 1999: A UN plane carrying one US citizen, four
Angolans, two Philippine nationals, and one Namibian was shot down, according to a UN official.
No deaths or injuries were reported. Angolan authorities blamed the attack on National Union for
the Total Independence of Angola (UNITA) rebels. UNITA officials denied shooting down the
plane.
Ugandan Rebel Attack, February 14, 1999: A pipe bomb exploded inside a bar, killing five
persons and injuring 35 others. One Ethiopian and four Ugandan nationals died in the blast, and
one US citizen working for USAID, two Swiss nationals, one Pakistani, one Ethiopian, and 27
Ugandans were injured. Ugandan authorities blamed the attack on the Allied Democratic Forces
(ADF).
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 504 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Greek Embassy Seizure, February 16, 1999: Kurdish protesters stormed and occupied the Greek
Embassy in Vienna, taking the Greek Ambassador and six other persons hostage. Several hours
later the protesters released the hostages and left the embassy. The attack followed the Turkish
Governments announcement of the successful capture of the Kurdistan Workers Party (PKK)
leader Abdullah Ocalan. Kurds also occupied Kenyan, Israeli, and other Greek diplomatic
facilities in France, Holland, Switzerland, Britain, and Germany over the following days.
FARC Kidnappings, February 25, 1999: FARC kidnapped three US citizens working for the
Hawaii-based Pacific Cultural Conservancy International. On March 4, the bodies of the three
victims were found in Venezuela.
Hutu Abductions, March 1, 1999: 150 armed Hutu rebels attacked three tourist camps in
Uganda, killed four Ugandans, and abducted three US citizens, six Britons, three New Zealanders,
two Danish citizens, one Australian, and one Canadian national. Two of the US citizens and six
of the other hostages were subsequently killed by their abductors.
ELN Hostage-Taking, March 23, 1999: Armed guerrillas kidnapped a US citizen in Boyaca,
Colombia. The National Liberation Army (ELN) claimed responsibility and demanded a
US$ 400,000 ransom. On July 20, ELN rebels released the hostage unharmed following a ransom
payment of US$ 48,000.
ELN Hostage-Taking, May 30, 1999: In Cali, Colombia, armed ELN militants attacked a church
in the neighborhood of Ciudad Jardin, kidnapping 160 persons, including six US citizens and one
French national. The rebels released approximately 80 persons, including three US citizens, later
that day.
Shell Platform Bombing, June 27, 1999: In Port Harcourt, Nigeria, armed youths stormed a
Shell oil platform, kidnapping one US citizen, one Nigerian national, and one Australian citizen,
and causing undetermined damage. A group calling itself Enough is Enough in the Niger River
claimed responsibility. Further seizures of oil facilities followed.
AFRC Kidnappings, August 4, 1999: An Armed Forces Revolutionary Council (AFRC) faction
kidnapped 33 UN representatives near Occra Hills, Sierra Leone. The hostages included one US
citizen, five British soldiers, one Canadian citizen, one representative from Ghana, one military
officer from Russia, one officer from Kyrgyzstan, one officer from Zambia, one officer from
Malaysia, a local Bishop, two UN officials, two local journalists, and 16 Sierra Leonean nationals.
Burmese Embassy Seizure, October 1, 1999: Burmese dissidents seized the Burmese Embassy
in Bangkok, Thailand, taking 89 persons hostage, including one US citizen.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 505 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
PLA Kidnapping, December 23, 1999: Colombian Peoples Liberation Army (PLA) forces
kidnapped a US citizen in an unsuccessful ransoming effort.
Indian Airlines Airbus Hijacking, December 24, 1999: Five militants hijacked a flight bound
from Kathmandu to New Delhi carrying 189 people. The plane and its passengers were released
unharmed on December 31.
2000 2000 2000 2000
Car Bombing in Spain, January 27, 2000: Police officials reported unidentified individuals set
fire to a Citroen car dealership in Iturreta, causing extensive damage to the building and destroying
12 vehicles. The attack bore the hallmark of the Basque Fatherland and Liberty (ETA).
RUF Attacks on UN Mission Personnel, May 1, 2000: On May 1 in Makeni, Sierra Leone,
Revolutionary United Front (RUF) militants kidnapped at least 20 members of the United Nations
Assistance Mission in Sierra Leone (UNAMSIL) and surrounded and opened fire on a UNAMSIL
facility, according to press reports. The militants killed five UN soldiers in the attack. RUF
militants kidnapped 300 UNAMSIL peacekeepers throughout the country, according to press
reports. On May 15 in Foya, Liberia, the kidnappers released 139 hostages. On May 28, on the
Liberia and Sierra Leone border, armed militants released unharmed the last of the UN
peacekeepers. In Freetown, according to press reports, armed militants ambushed two military
vehicles carrying four journalists. A Spaniard and one US citizen were killed in a May 25 car
bombing in Freetown for which the RUF was probably responsible. Suspected RUF rebels also
kidnapped 21 Indian UN peacekeepers in Freetown on June 6. Additional attacks by RUF on
foreign personnel followed.
Diplomatic Assassination in Greece, June 8, 2000: In Athens, Greece, two unidentified gunmen
killed British Defense Attache Stephen Saunders in an ambush. The revolutionary organisation
17 November claimed responsibility.
ELN Kidnpapping, June 27, 2000: In Bogota, Colombia, ELN militants kidnapped a 5-year-old
US citizen and his Colombian mother, demanding an undisclosed ransom.
Kidnappings in Kyrgyzstan, August 12, 2000: In the Kara-Su Valley, the Islamic Movement
of Uzbekistan took four US citizens hostage. The Americans escaped on August 12.
Church Bombing in Tajikistan, October 1, 2000: Unidentified militants detonated two bombs
in a Christian church in Dushanbe, killing seven persons and injuring 70 others. The church was
founded by a Korean-born US citizen, and most of those killed and wounded were Korean. No
one claimed responsibility.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 506 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Helicopter Hijacking, October 12, 2000: In Sucumbios Province, Ecuador, a group of armed
kidnappers led by former members of defunct Colombian terrorist organization the Popular
Liberation Army (EPL), took hostage 10 employees of Spanish energy consortium REPSOL.
Those kidnapped included five US citizens, one Argentine, one Chilean, one New Zealander, and
two French pilots who escaped 4 days later. On January 30, 2001, the kidnappers murdered
American hostage Ronald Sander. The remaining hostages were released on February 23
following the payment of US$ 13 million in ransom by the oil companies.
Attack on USS. Cole, October 12, 2000: In Aden, Yemen, a small dingy carrying explosives
rammed the destroyer U.S.S. Cole, killing 17 sailors and injuring 39 others. Supporters of Osama
bin Laden were suspected.
Manila Bombing, December 30, 2000: A bomb exploded in a plaza across the street from the
US Embassy in Manila, injuring nine persons. The Moro Islamic Liberation Front was likely
responsible.
2001 2001 2001 2001
Srinagar Airport Attack, January 17, 2001: In India, six members of the Lashkar-e-Tayyba
militant group were killed when they attempted to seize a local airport.
BBC Studios Bombing, March 4, 2001: A car bomb exploded at midnight outside of the British
Broadcasting Corporations main production studios in London.
ETA Bombing, March 9, 2001: Two policemen were killed by the explosion of a car bomb in
Hernani, Spain.
Bus Stop Bombing, April 22, 2001: A member of Hamas detonated a bomb he was carrying near
a bus stop in Kfar Siva, Israel, killing one person and injuring 60.
Tel Aviv Nightclub Bombing, June 1, 2001: Hamas claimed responsibility for the bombing of
a popular Israeli nightclub that caused over 140 casualties.
Hamas Restaurant Bombing, August 9, 2001: A Hamas-planted bomb detonated in a Jeruselum
pizza restaurant, killing 15 people and wounding more than 90.
Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department) 507 Annex J/ Significant Terrorist Incidents 1961-2001 (US State Department)
Terrorist Attacks on US Homeland, September 11, 2001: Two hijacked airliners crashed into
the twin towers of the World Trade Center. Soon thereafter, the Pentagon was struck by a third
hijacked plane. A fourth hijacked plane, suspected to be bound for a high-profile target in
Washington DC, crashed into a field in southern Pennsylvania. Approximately 2950+ US citizens
and other nationals were killed as a result of these acts. President George W. Bush and Cabinet
officials indicated that Osama bin Laden was the prime suspect and that they considered the
United States in a state of war with international terrorism. In the aftermath of the attacks, the
United States formed the Global Coalition Against Terrorism.
Annex K/ List of Terrorist Organisations complied by US, UK and EU 508
l. Abu IdnI OrgnnIsnfIon l. Abu IdnI OrgnnIsnfIon l. Abu IdnI OrgnnIsnfIon l. Abu IdnI OrgnnIsnfIon
2. Abu Snyynf Crou 2. Abu Snyynf Crou 2. Abu Snyynf Crou 2. Abu Snyynf Crou
3. AIAqsn Mnrfyrs IrIgndo 3. AIAqsn Mnrfyrs IrIgndo 3. AIAqsn Mnrfyrs IrIgndo 3. AIAqsn Mnrfyrs IrIgndo
4. AIJIhnd IgyfInn IsInmIc JIhnd 4. AIJIhnd IgyfInn IsInmIc JIhnd 4. AIJIhnd IgyfInn IsInmIc JIhnd 4. AIJIhnd IgyfInn IsInmIc JIhnd
5. AI Qn`Idn 5. AI Qn`Idn 5. AI Qn`Idn 5. AI Qn`Idn
6. Armod IsInmIc Crou 6. Armod IsInmIc Crou 6. Armod IsInmIc Crou 6. Armod IsInmIc Crou
?. Asbnf nIAnsnr ?. Asbnf nIAnsnr ?. Asbnf nIAnsnr ?. Asbnf nIAnsnr
8. Aum ShInrIkyo 8. Aum ShInrIkyo 8. Aum ShInrIkyo 8. Aum ShInrIkyo
9. Insquo InfhorInnd nnd !Iborfy ITA 9. Insquo InfhorInnd nnd !Iborfy ITA 9. Insquo InfhorInnd nnd !Iborfy ITA 9. Insquo InfhorInnd nnd !Iborfy ITA
l0. Cnmn`n nIIsInmIyyn IsInmIc Crou l0. Cnmn`n nIIsInmIyyn IsInmIc Crou l0. Cnmn`n nIIsInmIyyn IsInmIc Crou l0. Cnmn`n nIIsInmIyyn IsInmIc Crou
ll. Hnmns IsInmIc !osIsfnnco Movomonf ll. Hnmns IsInmIc !osIsfnnco Movomonf ll. Hnmns IsInmIc !osIsfnnco Movomonf ll. Hnmns IsInmIc !osIsfnnco Movomonf
l2. Hnrnknf uIMujnhIdIn H!M l2. Hnrnknf uIMujnhIdIn H!M l2. Hnrnknf uIMujnhIdIn H!M l2. Hnrnknf uIMujnhIdIn H!M
l3. HIzbnIInh Inrfy of Cod l3. HIzbnIInh Inrfy of Cod l3. HIzbnIInh Inrfy of Cod l3. HIzbnIInh Inrfy of Cod
l4. IsInmIc Movomonf of !zbokIsfnn IM! l4. IsInmIc Movomonf of !zbokIsfnn IM! l4. IsInmIc Movomonf of !zbokIsfnn IM! l4. IsInmIc Movomonf of !zbokIsfnn IM!
l5. JnIshoMohnmmod JIM Army of Mohnmmod l5. JnIshoMohnmmod JIM Army of Mohnmmod l5. JnIshoMohnmmod JIM Army of Mohnmmod l5. JnIshoMohnmmod JIM Army of Mohnmmod
l6. Knhnno ChnI Knch l6. Knhnno ChnI Knch l6. Knhnno ChnI Knch l6. Knhnno ChnI Knch
l?. KurdIsfnn Workors` Inrfy IKK l?. KurdIsfnn Workors` Inrfy IKK l?. KurdIsfnn Workors` Inrfy IKK l?. KurdIsfnn Workors` Inrfy IKK
l8. !nshknroTnyyIbn !T Army of fho !Ighfoous l8. !nshknroTnyyIbn !T Army of fho !Ighfoous l8. !nshknroTnyyIbn !T Army of fho !Ighfoous l8. !nshknroTnyyIbn !T Army of fho !Ighfoous
l9. !IbornfIon TIgors of TnmII IoInm !TTI l9. !IbornfIon TIgors of TnmII IoInm !TTI l9. !IbornfIon TIgors of TnmII IoInm !TTI l9. !IbornfIon TIgors of TnmII IoInm !TTI
20. MujnhodIno KhnIq OrgnnIznfIon MIK 20. MujnhodIno KhnIq OrgnnIznfIon MIK 20. MujnhodIno KhnIq OrgnnIznfIon MIK 20. MujnhodIno KhnIq OrgnnIznfIon MIK
2l. nfIonnI !IbornfIon Army I! 2l. nfIonnI !IbornfIon Army I! 2l. nfIonnI !IbornfIon Army I! 2l. nfIonnI !IbornfIon Army I!
22. InIosfInInn IsInmIc JIhnd IIJ 22. InIosfInInn IsInmIc JIhnd IIJ 22. InIosfInInn IsInmIc JIhnd IIJ 22. InIosfInInn IsInmIc JIhnd IIJ
23. InIosfIno !IbornfIon Ironf I!I 23. InIosfIno !IbornfIon Ironf I!I 23. InIosfIno !IbornfIon Ironf I!I 23. InIosfIno !IbornfIon Ironf I!I
24. IouInr Ironf for fho !IbornfIon of InIosfIno II!I 24. IouInr Ironf for fho !IbornfIon of InIosfIno II!I 24. IouInr Ironf for fho !IbornfIon of InIosfIno II!I 24. IouInr Ironf for fho !IbornfIon of InIosfIno II!I
25. II!IConornI Commnnd II!ICC 25. II!IConornI Commnnd II!ICC 25. II!IConornI Commnnd II!ICC 25. II!IConornI Commnnd II!ICC
26. !onI I!A 26. !onI I!A 26. !onI I!A 26. !onI I!A
2?. !ovoIufIonnry Armod Iorcos of CoIombIn IA!C 2?. !ovoIufIonnry Armod Iorcos of CoIombIn IA!C 2?. !ovoIufIonnry Armod Iorcos of CoIombIn IA!C 2?. !ovoIufIonnry Armod Iorcos of CoIombIn IA!C
28. !ovoIufIonnry ucIoI formorIy I!A 28. !ovoIufIonnry ucIoI formorIy I!A 28. !ovoIufIonnry ucIoI formorIy I!A 28. !ovoIufIonnry ucIoI formorIy I!A
29. !ovoIufIonnry OrgnnIznfIon l? ovombor 29. !ovoIufIonnry OrgnnIznfIon l? ovombor 29. !ovoIufIonnry OrgnnIznfIon l? ovombor 29. !ovoIufIonnry OrgnnIznfIon l? ovombor
30. !ovoIufIonnry IooIo`s !IbornfIon Army/Ironf HKI/C 30. !ovoIufIonnry IooIo`s !IbornfIon Army/Ironf HKI/C 30. !ovoIufIonnry IooIo`s !IbornfIon Army/Ironf HKI/C 30. !ovoIufIonnry IooIo`s !IbornfIon Army/Ironf HKI/C
3l. SnInfIsf Crou for CnII nnd Combnf CSIC 3l. SnInfIsf Crou for CnII nnd Combnf CSIC 3l. SnInfIsf Crou for CnII nnd Combnf CSIC 3l. SnInfIsf Crou for CnII nnd Combnf CSIC
32. ShInIng Infh Sondoro !umInoso, S! 32. ShInIng Infh Sondoro !umInoso, S! 32. ShInIng Infh Sondoro !umInoso, S! 32. ShInIng Infh Sondoro !umInoso, S!
33. !nIfod SoIfofonco Iorcos of CoIombIn A!C 33. !nIfod SoIfofonco Iorcos of CoIombIn A!C 33. !nIfod SoIfofonco Iorcos of CoIombIn A!C 33. !nIfod SoIfofonco Iorcos of CoIombIn A!C
*L|st as of Harch 2002
Annex K: List of Terrorist Organisations compiled by US, UK and EU
Annex K/ List of Terrorist Organisations complied by US, UK and EU 509
l. l. l. l. AI Cnmn`nf nIIsInmIyn AI Cnmn`nf nIIsInmIyn AI Cnmn`nf nIIsInmIyn AI Cnmn`nf nIIsInmIyn
2. 2. 2. 2. AI Qn`Idn AI Qn`Idn AI Qn`Idn AI Qn`Idn
3. 3. 3. 3. Abu IdnI OrgnnIsnfIon Abu IdnI OrgnnIsnfIon Abu IdnI OrgnnIsnfIon Abu IdnI OrgnnIsnfIon
4. 4. 4. 4. Armod IsInmIc Crou Crouo IsInmIquo Armoo lCIA Armod IsInmIc Crou Crouo IsInmIquo Armoo lCIA Armod IsInmIc Crou Crouo IsInmIquo Armoo lCIA Armod IsInmIc Crou Crouo IsInmIquo Armoo lCIA
5. 5. 5. 5. Inbbnr KhnIsn Inbbnr KhnIsn Inbbnr KhnIsn Inbbnr KhnIsn
6. 6. 6. 6. Insquo HomoInnd nnd !Iborfy IuskndI fn Asknfnsunn lITA Insquo HomoInnd nnd !Iborfy IuskndI fn Asknfnsunn lITA Insquo HomoInnd nnd !Iborfy IuskndI fn Asknfnsunn lITA Insquo HomoInnd nnd !Iborfy IuskndI fn Asknfnsunn lITA
?. ?. ?. ?. ConfInuIfy Army CouncII ConfInuIfy Army CouncII ConfInuIfy Army CouncII ConfInuIfy Army CouncII
8. 8. 8. 8. Cumnnn nn mInn Cumnnn nn mInn Cumnnn nn mInn Cumnnn nn mInn
9. 9. 9. 9. IgyfInn IsInmIc JIhnd IgyfInn IsInmIc JIhnd IgyfInn IsInmIc JIhnd IgyfInn IsInmIc JIhnd
l0. l0. l0. l0. IInnnn nn hIIronnn IInnnn nn hIIronnn IInnnn nn hIIronnn IInnnn nn hIIronnn
ll. ll. ll. ll. Hnmns Izz nIIn nIQnssom IrIgndos Hnmns Izz nIIn nIQnssom IrIgndos Hnmns Izz nIIn nIQnssom IrIgndos Hnmns Izz nIIn nIQnssom IrIgndos
l2. l2. l2. l2. Hnrnknf MujnhIdoon Hnrnknf MujnhIdoon Hnrnknf MujnhIdoon Hnrnknf MujnhIdoon
l3. l3. l3. l3. HIzbnIInh IxfornnI SocurIfy OrgnnIsnfIon HIzbnIInh IxfornnI SocurIfy OrgnnIsnfIon HIzbnIInh IxfornnI SocurIfy OrgnnIsnfIon HIzbnIInh IxfornnI SocurIfy OrgnnIsnfIon
l4. l4. l4. l4. InfornnfIonnI SIkh Youfh IodornfIon InfornnfIonnI SIkh Youfh IodornfIon InfornnfIonnI SIkh Youfh IodornfIon InfornnfIonnI SIkh Youfh IodornfIon
l5. l5. l5. l5. IrIsh nfIonnI !IbornfIon Army IrIsh nfIonnI !IbornfIon Army IrIsh nfIonnI !IbornfIon Army IrIsh nfIonnI !IbornfIon Army
l6. l6. l6. l6. IrIsh IooIo`s !IbornfIon OrgnnIsnfIon IrIsh IooIo`s !IbornfIon OrgnnIsnfIon IrIsh IooIo`s !IbornfIon OrgnnIsnfIon IrIsh IooIo`s !IbornfIon OrgnnIsnfIon
l?. l?. l?. l?. IrIsh !oubIIcnn Army IrIsh !oubIIcnn Army IrIsh !oubIIcnn Army IrIsh !oubIIcnn Army
l8. l8. l8. l8. IsInmIc Army of Adon IsInmIc Army of Adon IsInmIc Army of Adon IsInmIc Army of Adon
l9. l9. l9. l9. l? ovombor !ovoIufIonnry OrgnnIsnfIon l? ovombor !ovoIufIonnry OrgnnIsnfIon l? ovombor !ovoIufIonnry OrgnnIsnfIon l? ovombor !ovoIufIonnry OrgnnIsnfIon
20. 20. 20. 20. JnIsh o Mohnmmod JnIsh o Mohnmmod JnIsh o Mohnmmod JnIsh o Mohnmmod
2l. 2l. 2l. 2l. KurdIsfnn Workors` Inrfy InrfIyn Knrkoron KurdIsfnn lIKK KurdIsfnn Workors` Inrfy InrfIyn Knrkoron KurdIsfnn lIKK KurdIsfnn Workors` Inrfy InrfIyn Knrkoron KurdIsfnn lIKK KurdIsfnn Workors` Inrfy InrfIyn Knrkoron KurdIsfnn lIKK
22. 22. 22. 22. !nshknr o Tnyynbn !nshknr o Tnyynbn !nshknr o Tnyynbn !nshknr o Tnyynbn
23. 23. 23. 23. !IbornfIon TIgors of TnmII IoInm !IbornfIon TIgors of TnmII IoInm !IbornfIon TIgors of TnmII IoInm !IbornfIon TIgors of TnmII IoInm
24. 24. 24. 24. !oynIIsf VoIunfoor Iorco !oynIIsf VoIunfoor Iorco !oynIIsf VoIunfoor Iorco !oynIIsf VoIunfoor Iorco
25. 25. 25. 25. MujnhoddIn o KhnIq MujnhoddIn o KhnIq MujnhoddIn o KhnIq MujnhoddIn o KhnIq
26. 26. 26. 26. Ornngo VoIunfoors Ornngo VoIunfoors Ornngo VoIunfoors Ornngo VoIunfoors
2?. 2?. 2?. 2?. InIosfInInn IsInmIc JIhnd ShnqnqI fncfIon InIosfInInn IsInmIc JIhnd ShnqnqI fncfIon InIosfInInn IsInmIc JIhnd ShnqnqI fncfIon InIosfInInn IsInmIc JIhnd ShnqnqI fncfIon
28. 28. 28. 28. !od Hnnd Commnndo !od Hnnd Commnndo !od Hnnd Commnndo !od Hnnd Commnndo
29. 29. 29. 29. !od Hnnd ofondors !od Hnnd ofondors !od Hnnd ofondors !od Hnnd ofondors
30. 30. 30. 30. !ovoIufIonnry IooIos` !IbornfIon Inrfy Ironf ovrImcI HnIk !ovoIufIonnry IooIos` !IbornfIon Inrfy Ironf ovrImcI HnIk !ovoIufIonnry IooIos` !IbornfIon Inrfy Ironf ovrImcI HnIk !ovoIufIonnry IooIos` !IbornfIon Inrfy Ironf ovrImcI HnIk
KurfuIus InrfIsICohosI KurfuIus InrfIsICohosI KurfuIus InrfIsICohosI KurfuIus InrfIsICohosI
3l. 3l. 3l. 3l. SnInfIsf Crou for CnII nnd Combnf Crouo SnInfIsfo our In SnInfIsf Crou for CnII nnd Combnf Crouo SnInfIsfo our In SnInfIsf Crou for CnII nnd Combnf Crouo SnInfIsfo our In SnInfIsf Crou for CnII nnd Combnf Crouo SnInfIsfo our In
IrodIcnfIon of Io Combnf IrodIcnfIon of Io Combnf IrodIcnfIon of Io Combnf IrodIcnfIon of Io Combnf
32. 32. 32. 32. Snor IIro Snor IIro Snor IIro Snor IIro
33. 33. 33. 33. !Isfor ofonco AssocInfIon !Isfor ofonco AssocInfIon !Isfor ofonco AssocInfIon !Isfor ofonco AssocInfIon
34. 34. 34. 34. !Isfor Iroodom IIghfors !Isfor Iroodom IIghfors !Isfor Iroodom IIghfors !Isfor Iroodom IIghfors
35. 35. 35. 35. !Isfor VoIunfoor Iorco !Isfor VoIunfoor Iorco !Isfor VoIunfoor Iorco !Isfor VoIunfoor Iorco
* L|st as of June 2002
Annex K/ List of Terrorist Organisations complied by US, UK and EU 510
l. l. l. l. Abu IdnI OrgnnIsnfIon Abu IdnI OrgnnIsnfIon Abu IdnI OrgnnIsnfIon Abu IdnI OrgnnIsnfIon
2. 2. 2. 2. AI Aqsn Mnrfyrs` IrIgndo AI Aqsn Mnrfyrs` IrIgndo AI Aqsn Mnrfyrs` IrIgndo AI Aqsn Mnrfyrs` IrIgndo
3. 3. 3. 3. Aum ShInrIkyo nkn A!M, Aum Suromo Trufh or AIoh Aum ShInrIkyo nkn A!M, Aum Suromo Trufh or AIoh Aum ShInrIkyo nkn A!M, Aum Suromo Trufh or AIoh Aum ShInrIkyo nkn A!M, Aum Suromo Trufh or AIoh
4. 4. 4. 4. AnfIfnscIsf !osIsfnnco Crous IIrsf of Ocfobor C!AIO AnfIfnscIsf !osIsfnnco Crous IIrsf of Ocfobor C!AIO AnfIfnscIsf !osIsfnnco Crous IIrsf of Ocfobor C!AIO AnfIfnscIsf !osIsfnnco Crous IIrsf of Ocfobor C!AIO
5. 5. 5. 5. Inbbnr KhnIsn Inbbnr KhnIsn Inbbnr KhnIsn Inbbnr KhnIsn
6. 6. 6. 6. ConfInuIfy IrIsh !oubIIcnn Army CI!A ConfInuIfy IrIsh !oubIIcnn Army CI!A ConfInuIfy IrIsh !oubIIcnn Army CI!A ConfInuIfy IrIsh !oubIIcnn Army CI!A
?. ?. ?. ?. IuskndI IuskndI IuskndI IuskndI Tn Tn Tn Tn Asknfnsunn Asknfnsunn Asknfnsunn Asknfnsunn / // / fIorro fIorro fIorro fIorro Vnscn Vnscn Vnscn Vnscn y yy y !Iborfnd !Iborfnd !Iborfnd !Iborfnd /Insquo /Insquo /Insquo /Insquo InfhorInnd InfhorInnd InfhorInnd InfhorInnd nnd nnd nnd nnd
!Iborfy ITA Kns, XnkI, IkIn, JnrrnIHnIknSogI, Cosforns ronmnIsfn, !Iborfy ITA Kns, XnkI, IkIn, JnrrnIHnIknSogI, Cosforns ronmnIsfn, !Iborfy ITA Kns, XnkI, IkIn, JnrrnIHnIknSogI, Cosforns ronmnIsfn, !Iborfy ITA Kns, XnkI, IkIn, JnrrnIHnIknSogI, Cosforns ronmnIsfn,
Asknfnsunn Asknfnsunn Asknfnsunn Asknfnsunn
8. 8. 8. 8. Cnmn`n nIIsInmIyyn IsInmIc Crou, nkn AICnmn`n nIIsInmIyyn Cnmn`n nIIsInmIyyn IsInmIc Crou, nkn AICnmn`n nIIsInmIyyn Cnmn`n nIIsInmIyyn IsInmIc Crou, nkn AICnmn`n nIIsInmIyyn Cnmn`n nIIsInmIyyn IsInmIc Crou, nkn AICnmn`n nIIsInmIyyn
9. 9. 9. 9. HnmnsIzz nIIn nIQnssom forrorIsf wIng of Hnmns HnmnsIzz nIIn nIQnssom forrorIsf wIng of Hnmns HnmnsIzz nIIn nIQnssom forrorIsf wIng of Hnmns HnmnsIzz nIIn nIQnssom forrorIsf wIng of Hnmns
l0. l0. l0. l0. HoIy !nnd IoundnfIon for !oIIof nnd ovoIomonf HoIy !nnd IoundnfIon for !oIIof nnd ovoIomonf HoIy !nnd IoundnfIon for !oIIof nnd ovoIomonf HoIy !nnd IoundnfIon for !oIIof nnd ovoIomonf
ll. ll. ll. ll. InfornnfIonnI SIkh Youfh IodornfIon ISYI InfornnfIonnI SIkh Youfh IodornfIon ISYI InfornnfIonnI SIkh Youfh IodornfIon ISYI InfornnfIonnI SIkh Youfh IodornfIon ISYI
l2. l2. l2. l2. Knhnno ChnI Knch Knhnno ChnI Knch Knhnno ChnI Knch Knhnno ChnI Knch
l3. l3. l3. l3. KurdIsfnn Workors` Inrfy IKK KurdIsfnn Workors` Inrfy IKK KurdIsfnn Workors` Inrfy IKK KurdIsfnn Workors` Inrfy IKK
l4. l4. l4. l4. !nshknr o Tnyynbn !IT / InshnnoAhIo HndIs !nshknr o Tnyynbn !IT / InshnnoAhIo HndIs !nshknr o Tnyynbn !IT / InshnnoAhIo HndIs !nshknr o Tnyynbn !IT / InshnnoAhIo HndIs
l5. l5. l5. l5. !oynIIsf VoIunfoor Iorco !VI !oynIIsf VoIunfoor Iorco !VI !oynIIsf VoIunfoor Iorco !VI !oynIIsf VoIunfoor Iorco !VI
l6. l6. l6. l6. MujnhodIno KhnIq OrgnnIsnfIon MIK MujnhodIno KhnIq OrgnnIsnfIon MIK MujnhodIno KhnIq OrgnnIsnfIon MIK MujnhodIno KhnIq OrgnnIsnfIon MIK
l?. l?. l?. l?. Ornngo VoIunfoors OV Ornngo VoIunfoors OV Ornngo VoIunfoors OV Ornngo VoIunfoors OV
l8. l8. l8. l8. InIosfInInn IsInmIc JIhnd IIJ InIosfInInn IsInmIc JIhnd IIJ InIosfInInn IsInmIc JIhnd IIJ InIosfInInn IsInmIc JIhnd IIJ
l9. l9. l9. l9. InIosfIno !IbornfIon Ironf I!I InIosfIno !IbornfIon Ironf I!I InIosfIno !IbornfIon Ironf I!I InIosfIno !IbornfIon Ironf I!I
20. 20. 20. 20. IouInr Ironf for fho !IbornfIon of InIosfIno II!I IouInr Ironf for fho !IbornfIon of InIosfIno II!I IouInr Ironf for fho !IbornfIon of InIosfIno II!I IouInr Ironf for fho !IbornfIon of InIosfIno II!I
2l. 2l. 2l. 2l. IouInr Ironf for fho !IbornfIon of InIosfIno ConornI Commnnd II!I IouInr Ironf for fho !IbornfIon of InIosfIno ConornI Commnnd II!I IouInr Ironf for fho !IbornfIon of InIosfIno ConornI Commnnd II!I IouInr Ironf for fho !IbornfIon of InIosfIno ConornI Commnnd II!I
CC CC CC CC
22. 22. 22. 22. !onI I!A !onI I!A !onI I!A !onI I!A
23. 23. 23. 23. !od Hnnd ofondors !H !od Hnnd ofondors !H !od Hnnd ofondors !H !od Hnnd ofondors !H
24. 24. 24. 24. !ovoIufIonnry Armod Iorcos of CoIombIn IA!C !ovoIufIonnry Armod Iorcos of CoIombIn IA!C !ovoIufIonnry Armod Iorcos of CoIombIn IA!C !ovoIufIonnry Armod Iorcos of CoIombIn IA!C
25. 25. 25. 25. !ovoIufIonnry ucIoI / InnnsfnfIkI IIrInos !ovoIufIonnry ucIoI / InnnsfnfIkI IIrInos !ovoIufIonnry ucIoI / InnnsfnfIkI IIrInos !ovoIufIonnry ucIoI / InnnsfnfIkI IIrInos
26. 26. 26. 26. !ovoIufIonnry OrgnnIznfIon l? ovombor / oknfI IvdomI oomvrI !ovoIufIonnry OrgnnIznfIon l? ovombor / oknfI IvdomI oomvrI !ovoIufIonnry OrgnnIznfIon l? ovombor / oknfI IvdomI oomvrI !ovoIufIonnry OrgnnIznfIon l? ovombor / oknfI IvdomI oomvrI
2?. 2?. 2?. 2?. !ovoIufIonnry !ovoIufIonnry !ovoIufIonnry !ovoIufIonnry IooIo`s IooIo`s IooIo`s IooIo`s !IbornfIon !IbornfIon !IbornfIon !IbornfIon Arm Arm Arm Army/Ironf/Inrfy HKI/C, nkn y/Ironf/Inrfy HKI/C, nkn y/Ironf/Inrfy HKI/C, nkn y/Ironf/Inrfy HKI/C, nkn
ovrImcI SoI !ovoIufIonnry !off or ov SoI ovrImcI SoI !ovoIufIonnry !off or ov SoI ovrImcI SoI !ovoIufIonnry !off or ov SoI ovrImcI SoI !ovoIufIonnry !off or ov SoI
28. 28. 28. 28. !ovoIufIonnry IouInr SfruggIo / InnnsfnfIkos !nIkos Agonns I!A !ovoIufIonnry IouInr SfruggIo / InnnsfnfIkos !nIkos Agonns I!A !ovoIufIonnry IouInr SfruggIo / InnnsfnfIkos !nIkos Agonns I!A !ovoIufIonnry IouInr SfruggIo / InnnsfnfIkos !nIkos Agonns I!A
29. 29. 29. 29. ShInIng Infh Sondoro !umInoso or S! ShInIng Infh Sondoro !umInoso or S! ShInIng Infh Sondoro !umInoso or S! ShInIng Infh Sondoro !umInoso or S!
30. 30. 30. 30. !Isfor ofonco AssocInfIon / !Isfor Iroodom IIghfors !A/!II !Isfor ofonco AssocInfIon / !Isfor Iroodom IIghfors !A/!II !Isfor ofonco AssocInfIon / !Isfor Iroodom IIghfors !A/!II !Isfor ofonco AssocInfIon / !Isfor Iroodom IIghfors !A/!II
3l. 3l. 3l. 3l. !nIfod SoIfofonco Iorcos / Crou of CoIombIn A!C !nIfod SoIfofonco Iorcos / Crou of CoIombIn A!C !nIfod SoIfofonco Iorcos / Crou of CoIombIn A!C !nIfod SoIfofonco Iorcos / Crou of CoIombIn A!C
* L|st as of June 2002
Annex L/ Locations Where Al Qaida Network has Firm Presence 511
Annex L: Locations Where Al Qaida Network has Firm Presence
Annex M/ Militants Presence (fought or trained in Afghanistan / Kashmir) 512
Annex M: Militants Presence (fought or trained in Afghanistan / Kashmir)
1. AFGHANISTAN 2. ALBANIA 3. ALGERIA 4. ARGENTINA 5. AUSTRALIA 6. AUSTRIA 7. AZERBAIJAN 8. BANGLADESH 9. BELGIUM 10. BOSNIA & HERZ.
11. BRAZIL 12. BULGARIA 13. BURMA 14. CAMEROON 15. CANADA 16. CHECHNYA 17. CHILE 18. CHINA 19. CROATIA 20. CZECH REP.
21. DAGESTAN 22. DENMARK 23. DJIBOUTI 24. EGYPT 25. ERITREA 26. ETHIOPIA 27. FRANCE 28. GERMANY 29. GREECE 30. GREENLAND
31. GUINEA 32. HUNGARY 33. INDIA 34. INDONESIA 35. IRAN 36. IRAQ 37. ISRAEL 38. ITALY 39. JAPAN 40. JORDAN
41. KAZAKHSTAN 42. KENYA 43. KUWAIT 44. KYRGYZSTAN 45. LEBANON 46. LIBYA 47. LUXEMBOURG 48. MACEDONIA 49. MALAYSIA 50. MALDIVES
51. MAURITANIA 52. MEXICO 53. MOROCCO 54. NAMIBIA 55. NEPAL 56. NETHERLANDS 57. NIGERIA 58. NORWAY 59. OMAN 60. PAKISTAN
61. PHILIPPINES 62. POLAND 63. PORTUGAL 64. QATAR 65. ROMANIA 66. RUSSIA 67. SAUDI ARABIA 68. SINGAPORE 69. SLOVAKIA 70. SLOVENIA
71. SOMALIA 72. STH. AFRICA 73. SPAIN 74. SRI LANKA 75. SUDAN 76. SWEDEN 77. SWITZERLAND 78. SYRIA 79. TAJIKISTAN 80. TANZANIA
81. THAILAND 82. TUNISIA 83. TURKEY 84. TURKMENISTAN 85. UAE 86. UGANDA 87. UK 88. USA 89. UZBEKISTAN 90. YEMEN
Annex N/ Photographic Evidence: The Armenian Genocide 513
ATTENTION:
The following pages contain photographs submitted for trial evidence.
They are provided for those students who wish for academic reasons,
to fully comprehend the depth and terrorist nature of war crimes and
crimes against humanity.
However, they may perhaps be disturbing to some students, and while
viewing is encouraged for purposes of education and humanitarian
concern, it is naturally not mandatory, and does not provide the Student
with any advantage when taking the final examination.
Annex N: Photographic Evidence: Armenian Genocide
What on earth do you want? The question is settled. There are no more Armenians
Talt Pasha to the German Ambassador, persistently bringing up the Armenian question in 1918
__________________________________________
I refer to those awful massacres. They are the greatest stain that has ever disgraced our nation and
race. They were entirely the work of Talat and Enver. I asked him [Enver] if it was true that they
intended to recommence the massacres which had been our shame and disgrace under Abdul Hamid.
The only reply I could get from him was It is decided. It is the program
Prince Abdul Mecid, heir-apparent to the Ottoman throne in an interview following the massacres
__________________________________________
. . . the Armenian massacre was the greatest crime of the war, and the failure to act against Turkey
is to condone it . . . the failure to deal radically with the Turkish horror means that all talk of
guaranteeing the future peace of the world is mischievous nonsense
Theodore Roosevelt in a letter to Cleveland H. Dodge on 11
th
May 1918
__________________________________________
It was not war. It was most certainly massacre and genocide, something the world must
remember...We will always reject any attempt to erase its record, even for some political advantage
Israeli Deputy Foreign Minister Yossi Beilin in the Knesset on 27
th
April 1994, in response to claims
that it was war, by the Turkish Ambassador to Israel during a TV interview
Annex N/ Photographic Evidence: The Armenian Genocide 514
Deportees fleeing in 1915
Children dead and dying in the gutter to the
indiffference of passers-by
A boy, starved to death on a doorstep
Massacred and left in the street
Widowed homeless women , living in the
streets
The executions in Constantinople
A boy stripped and beaten to death Massacre, burning to death and other savagery
Courtesy and copyright of the Armenian National Institute, USA. Photos taken by a Missionary, John Elder, and a German Officer, Armin Wegner,
serving with the Ottoman Army (he was arrested for disseminating photographs and information on the genocide).
Annex O: Photographic Evidence: Nazi Genocide 515
ATTENTION:
The following pages contain photographs used in UN War Crimes trial
evidence (UN Military Tribunals) . They are provided for those students
who wish for academic reasons, to fully comprehend the depth and
terrorist nature of war crimes and crimes against humanity.
However, they may perhaps be disturbing to some students, and while
viewing is encouraged for purposes of education and humanitarian
concern, it is naturally not mandatory, and does not provide the Student
with any advantage when taking the final examination.
Annex O: Photographic Evidence: Nazi Genocide
The things I saw beggar description...The visual evidence and the verbal testimony of starvation, cruelty
and bestiality were...overpowering...I made the visit deliberately in order to be in a position to give
first-hand evidence of these things if ever, in the future, there develops a tendency to charge these allegations
merely to propaganda
US General Dwight D. Eisenhower in a letter to General George C. Marshall, 15
th
April 1945
_____________________________________
I have only one purpose, the destruction of Hitler, and my life is much simplified thereby. If Hitler invaded
Hell, I would make at least a favourable reference to the Devil in the House of Commons.
We will never parley...never negotiate with Hitler or any of his gang. We shall fight him by land...by sea...in
the air...until, with Gods help, we have rid the earth of his shadow and liberated its peoples from his yoke
UK Wartime Prime Minister Winston Churchill, when his private secretary asked him, as an arch anti-
communist, how could he bring himself to assist the USSR
____________________________________
We who did not go their way owe them this. We must make sure that their deaths have posthumous meaning.
We must make sure that from now until the end of days, all humankind stares this evil in the face...and only
then can we be sure it will never arise again
President Ronald Reagan, at the site of the US Holocaust Memorial Museum, 5
th
October 1988
____________________________________
...and later the work of transporting hundreds of thousands of Jews to their deaths, was carried out by
Jewish collaborators...the entire Nazi success...stemmed from the subtle and diabolical use of collaborators,
who did most of the dirty work for them. Therefore, if we knew a little of the truth about the Holocaust, we
would at least understand (with or without agreeing) why the Palestinians are now eliminating their
collaborators. That is the only means they have if they wish to continue to struggle against our limb-breaking
regime
The late Prof. Dr. Israel Shahak (Hebrew University), Holocaust survivor of Bergen-Belsen camp
(Photos courtesy of: US Army; UN; British Government; US Holocaust Memorial Museum; Vad Yashem).
Annex O: Photographic Evidence: Nazi Genocide 516
Nuremburg Rally
1928
Students and SA burning
un-Germanic books, in a
night ritual, Berlin 1933
SA and SS enforce
boycott of Jewish shop
Siegen Synagogue burning
down on Krystall Nacht,
10
th
November 1938
The
beginnings
of Terror
ID tag of Jewish child
sent from Austria to
England in 1938 by
Kinder (children)
Transport
Nazi Police at
Zawierca cut off
elderly Jews beard
Buchenwald prisoner
intake including
Clergymen
Other categories (note
triangle badges) of
prisoner
Reinhard Heydrich, a
Major-General at 29: chief
architect of Nazi genocide
SS herd Jewish families
(Warsaw Ghetto)
Annex O: Photographic Evidence: Nazi Genocide 517
Soviet prisoners of war at
Auschwitz
Captured Maquis
(French Resistance)
fighters massacred
by the Nazis
Belgian civilians massacred
by Nazis
New arrivals at
Mauthausen kept waiting
in a courtyard. After 24
hours, 140 were dead
The real meaning of Nazism
SS Einsatzgruppen
(special action
squads; a name for
mobile murder
squads) murdering
Jews in the Ukraine
An inmate of a death
camp
The murdered at
Mauthausen
A death camp oven for
disposing of the bodies
of murdered victims
Annex O: Photographic Evidence: Nazi Genocide 518
Jewish men forced to dig their
own graves before being
murdered by SS and SD men
Einsatzgruppe A near
Kovno,
1941-2, about to murder
Jews
Nazi sets his dogs to attack a
Jewish forced labourer
The Nazi murder continues
Mother and child wait in
turn to be murdered at
Lubny, 1941
A young political
prisoner about to be
murdered in a forest at
Buchenwald
Mass grave at Bergen-
Belsen
Woman and child murdered
by Einsatzgruppen at
Ivangorod, Ukraine, 1942
The murdered at
Buchenwald
Annex O: Photographic Evidence: Nazi Genocide 519
Map of SS Einsatzgruppen & Sonderkommando Crimes Against Humanity
Annex O: Photographic Evidence: Nazi Genocide 520
US 3
rd
Army at Buchenwald
crematorium
Shrunken head of
Polish Prisoner
found at
Buchenwald
US soldier oversees the
burial of murdered
children
US General William
Parsons and
Congressman John
Vorys, stunned at the
full horror of a death
camp
What the Allies found
Ei chel sdr f er , SS
c o mma n d a n t o f
Kaufering 4 camp,
wading amongst those
he murdered. He was
compelled by the allies
to clear up and bury his
victims
SS prisoners of war
compelled by the allies to
bury 800 of their murder
victims at Namering
The remains of so
called Nazi medical
experiments
German civilians compelled to
view the horror of the death
camps by the allies
Annex O: Photographic Evidence: Nazi Genocide 521
The Nuremburg War Crimes Trials
80 Christian and Jewish graves of Nazi
victims at Ludwigslust. All Residents of
the Schweirin district were compelled to
attend the burial by the Allies
Joseph Schleifstein, a 5-year
old survivor of Buchenwald,
sitting on a UN truck
Franz Trenkle is
identified as a Nazi
torturer during a
War Crimes Trial
Joseph Harzgen, one of five German
civilians convicted and sentenced to
death for murdering six US Airmen
The Nazis face justice
Dr. Klaus Schilling explaining how
he murdered 1000 camp inmates in
experiments with Malaria parasites.
He was convicted and hanged
Annex O: Photographic Evidence: Nazi Genocide 522
Otto Ohlendorf,
Commander of
Einsatzgruppe D
Franz Six,
Commander of
Einsatzgruppe B
Moscow detachment
Martin Sandberger,
Commander of
Einsatzgruppe A
Some of the SS-T
(Totenkopfverbnde or
Deathshead Detachment) and
Einsatzgruppen (Task Forces)
convicted of War Crimes and
Crimes against Humanity
Amon Goeth, Commandant of Plaszow camp, later
portrayed in the 1990s film Schindlers List
We r ner Br a u n e ,
C o mma n d e r o f
Einsatzkommando 11b
(part of Gruppe D)
Er wi n Sc h u l z ,
Co mma n d e r o f
Einsatzkommando 5
(part of Gruppe C)
Annex O: Photographic Evidence: Nazi Genocide 523
Nazi General Anton Dostler after sentence
was carried out at Aversa by the UN War
Crimes Military Tribunal. He was convicted of
war crimes in Italy and shot at dawn by
military firing squad.
SS General Paul Blobel, Commander of
Einsatzkommando 4a (part of Gruppe C),
is sentenced to death for war crimes by the
UN Military Tribunal
Consequences
of Nazism
The ancient city of Nuremburg - spiritual home
of Nazism, bombed to ruin
1947. Political activist Marc Jarblum addresses a crowd of
Jewish Displaced Persons (DPs) from the ship Exodus
(refused entry to Palestine and returned to Europe)
Annex P:Photographic Evidence: Chinese (Nanjing) and Asian Genocide 524
ATTENTION:
The following pages contain many photographs used in UN War Crimes
Commission trial evidence (US Military Tribunal for Asia). They are
provided for those students who wish for academic reasons, to fully
comprehend the depth and terrorist nature of war crimes and crimes
against humanity.
However, they may perhaps be disturbing to some students, and while
viewing is encouraged for purposes of education and humanitarian
concern, it is naturally not mandatory, and does not provide the Student
with any advantage when taking the final examination.
Annex P:Photographic Evidence: Chinese (Nanjing) and Asian Genocide
After having been subjected to all the standard forms of torture, they were taken,
one at a time, marched blindfold for a considerable distance and then halted. The
victim heard voices and marching feet, the sound of a squad halting and loading their
rifles as a firing party would.
A Japanese officer then approached the American pilot and said, We are the Knights
of Bushido, of the order of the Rising Sun. We do not execute at sunset, but at
sunrise.
The pilot was then marched back to his cell, and told that unless he talked before
dawn, he would be executed
Extract from evidence given at the UN (US held) Military Tribunal for the Far East
__________________________________________
They were nothing more nor less than brutal acts of indiscriminate vengeance which
both violated the unchallenged rules of warfare and outraged the general sentiments
of humanity
Lord Russell of Liverpool
__________________________________________
A favourite method of execution was to herd groups of a dozen men at entrances of
dugouts and to shoot them so the bodies toppled inside. Dirt then was shoveled in and
the men buried
Eye witness report (New York Times reporter) sent from the U.S.S. Oahu,
17
th
December 1937
(Photos Courtesy: China News Digest, US Army, UN, Imperial War Museum)
Annex P:Photographic Evidence: Chinese (Nanjing) and Asian Genocide 525
Soldiers of the Imperial
Japanese Army about to
bury Chinese prisoners
alive
Imperial soldier posing for
photograph with victims
Imperial soldier and
victim after atrocity
Imperial soldiers
bayoneting Chinese
prisoner
Atrocity victims remains
The Knights of Bushido
in Nanjing, China, 1937
Rape victim forced by
Imperial officer to pose for a
degrading photograph
Chinese women,
r a p e d a n d
mu r d e r e d b y
Imperial troops
Remains of decapitated
victims. Put on display of
Imperial troops
Remains of an atrocity
victim displayed by
Imperial troops
Annex P: Photographic Evidence: Chinese (Nanjing) and Asian Genocide 526
General Tomoyuki
Yamashita, Commander of
the 14
th
Army Group,
Japanese Imperial Army,
during his trial and in the
custody of a US MP
Starved Allied
Prisoners of War
are liberated
War Crimes in the Philippines
for which General Yamashita
was convicted and executed
(Extract from Trial proceedings, United
Nations War Crimes Commission)
__________________________________
________
(1) Starvation, execution or massacre
without trial and mal-administration
generally of civilian internees and
prisoners of war;
(2) Torture, rape, murder and mass
execution of very large numbers of
residents of the Philippines, including
women and children and members of
religious orders, by starvation,
beheading, bayoneting, clubbing,
hanging, burning alive, and destruction
by explosives;
(3) Burning and demolition without
adequate military necessity of large
numbers of homes, places of business,
places of religious worship, hospitals,
public buildings, and educational
institutions. In point of time, the offences
extended throughout the period the
accused was in command of Japanese
troops in the Philippines. In point of area,
the crimes extended throughout the
Philippine Archipelago, although by far
the most incredible acts occurred on
Luzon.
September 1945: Fifteen years of
Asian terror come to an end
War Crimes trials for Asia
Shortly after the UN War Crimes trials came to an
end, prior to the suppression of Imperialism, this
memorial was set up honouring the actions and
memory of the convicted and executed war
criminals
War Crimes evidence
uncovered at Luzon,
Philippines
Annex Q: Photographic Evidence: Former Yugoslavia Genocide (Kosovo) 527
ATTENTION:
The following pages contain photographic evidence submitted to the
(UN) International Criminal Tribunal for the former Yugoslavia. It is
provided for those students who wish for academic reasons, to fully
comprehend the depth and terrorist nature of war crimes and crimes
against humanity.
However, they may perhaps be disturbing to some students, and while
viewing is encouraged for purposes of education and humanitarian
concern, it is naturally not mandatory, and does not provide the Student
with any advantage when taking the final examination.
Annex Q: Photographic Evidence: Former Yugoslavia Genocide
(Kosovo)
This fatherland certificate must have on its cover page the Serb coat of arms: the white double-
headed eagle of the Nemanjics, and the crest with four Cyrillic Ss. The failure to possess this paper
would be the basis for expulsion...
However, we consider that through a strong and efficient police force, it is quite easy to make people
seek refuge abroad...
Distinguished individuals [Kosovo ethnic Albanians] who play important roles in their political life
should be eliminated through scandals or by staging traffic accidents, jealousy killings or infecting
them with the AIDS virus when they travel abroad...
Extracts from a written statement by Serb Deputy Prime Minister Voislav Seselj in Velika Serbija,
Belgrade, dated 14
th
October 1995
If you kill one person, you are a murderer, if you kill ten people you are a celebrity, and if you kill
a quarter of a million people, you get invited to a peace conference
Haris Silajdzic, Bosnian Foreign Minister referring to Serbian President Slobodan Milosevic
Lying is a form of our patriotism and is evidence of our innate intelligence. We lie in a creative,
imaginative, and inventive way
Dobrica Cosic - former President of FR Yugoslavia and a Member of Serb Academy of Arts and
Sciences, referring to nationalism and the Serbian nation
(Photos courtesy of Kosovo Crisis Centre)
Annex Q: Photographic Evidence: Former Yugoslavia Genocide (Kosovo) 528
A baby murdered at Abri e
Eprme, Drenic in October 1998
Men from Lybeniq, Drenic,
Murdered in early summer, 1998
Child murdered at Abri e Eprme,
Drenic, in October 1998
Men of different ages murdered in
Reak, Nerodime, in January 1999
The meaning of Ethnic Cleansing: a so-called politically correct phrase to describe what is actually a
Crime (Murder), a War Crime (Depopulation) and a Crime against Humanity (Genocide)
Man from Lybeniq,
Drenic. Murdered in
early summer 1998
Massacre at Rogove
village in January 1999
Elderly man murdered at Abri e
Eprme, Drenic, in October 1998
Young child from Prekaz,
Drenic. Murdered in
February 1998
A young c hi l d
murdered at Skederaj
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 529
The Balfour eclaration, l9l
~cvcmecn &o, =
cc=n Lcno nc+ieciiLo,
i=vc mLci =Lc=eLnc i ccvc-ic +c -cL, c eci=Lv cv
ie M=Jce+-e ccvcnmc+, +ic vcLLcwic occL=n=+ic cv
e-m==+i- wi+i ucwiei zicie+ =e=in=+ice wiici i=e ecc
eLemi++co +c, =o ===ncvco e-, +ic c=eic+.
-ie M=Jce+-e ccvcnmc+ vicw wi+i v=vcLn +ic
ce+=eLieimc+ i ==Lce+ic cv = =+ic=L icmc vcn +ic
ucwiei =cc=Lc, =o wiLL Lec +icin ece+ coc=vcLne +c
v=ciLi+=+c +ic =ciicvcmc+ cv +iie ceJcc+, i+ ecic cLc=nL-
Locne+cco +i=+ c+iic ei=LL ec occ wiici m=- =ncJLoicc
+ic civiL =o ncLicicLe nici+e cv cxie+ic c-ucwiei
ccmmLi+ice i ==Lce+ic, cn +ic nici+e =o =cLi+ic=L e+=+Le
cJc-co e- ucwe i =- c+icn ccL+n-."
eicLLo ec cn=+cvLL iv -cL wcLLo enic +iie
occL=n=+ic +c +ic cwLcocc cv +ic zicie+ rcocn=+ic.
vcLne eiccncL-,
n+iLn u=mce e=LvcLn
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 530
British White Paper, ]une l922
1ic eccnc+=n- cv e+=+c vcn +ic ccLcice i=e civc nccwco cceiocn=+ic +c +ic cxie+ic
=cLi+ic=L ei+L=+ic i ==Lce+ic, wi+i = vcn- c=nce+ oceinc +c =nnivc =+ = ec++Lcmc+ cv +ic
cL+e+=oic cLce+ice wiici i=vc civc niec +c Lccn+=i+- =o Lnce+ =mcc ccn+=i
ecc+ice cv +ic =c=LL=+ic. v+cn cceLL+=+ic wi+i +ic ici ccmmieeiccn vcn ==Lce+ic (ein
cnecn+ e=mLcL +ic vcLLcwic e+=+cmc+ i=e ecc on=w L=. + eLmm=nizce +ic ceec+i=L
==n+e cv +ic ccnnce=coccc +i=+ i=e =Lnc=o- +=c =L=cc ec+wcc +ic eccnc+=n- cv e+=+c
=o = ocLcc=+ic vncm +ic MceLcm cinie+i= eccic+- cv ==Lce+ic, wiici i=e ecc vcn ecmc
+imc i &cL=o, =o i+ e+=+ce +ic vLn+icn cccLLeice wiici i=vc eicc ecc nc=cico.
1ic +ceic wiici i=e =ncv=iLco vncm +imc +c +imc i ==Lce+ic ie m=iL- oLc +c ===nciceice,
wiici =nc c+cn+=ico ec+i e- ecc+ice cv +ic n=e =o e- ecc+ice cv +ic ucwiei =c=LL=+ic.
1icec ===nciceice, ec v=n =e +ic n=ee =nc ccccnco =nc ==n+L- e=eco L=c cx=cccn=+co
i+cn=nc+=+ice cv +ic mc=ic cv +ic (e=LvcLn cccL=n=+ic v=vcLnic +ic ce+=eLieimc+ cv
= ucwiei ~=+ic=L cmc i ==Lce+ic, m=oc c eci=Lv cv ie M=Jce+-e ccvcnmc+ c
&
o
~cvcmecn, =.
U=L+icnizco e+=+cmc+e i=vc ecc m=oc +c +ic cvvcc+ +i=+ +ic =Ln=cec i vicw ie +c cnc=+c
= wicLL- ucwiei ==Lce+ic. =in=ece i=vc ecc Leco eLci =e +i=+ ==Lce+ic ie +c ecccmc -=e
ucwiei =e &cL=o ie &cLiei." ie M=Jce+-e ccvcnmc+ ncc=no =- eLci cx=cc+=+ic =e
im=n=c+ic=eLc =o i=vc c eLci =im i vicw. ~cn i=vc +ic- =+ =- +imc cc+cm=L=+co, =e
===c=ne +c ec vc=nco e- +ic n=e ocLcc=+ic, +ic oie===c=n=cc cn +ic eLecnoi=+ic cv +ic
n=eic =c=LL=+ic, L=cL=cc, cn cLL+Lnc i ==Lce+ic. 1ic- wcLLo on=w =++c+ic +c +ic v=c+
+i=+ +ic +cnme cv +ic cccL=n=+ic ncvcnnco +c oc c+ cc+cm=L=+c +i=+ ==Lce+ic =e = wicLc
eicLLo ec ccvcn+co i+c = ucwiei ~=+ic=L cmc, eL+ +i=+ eLci = cmc eicLLo ec vcLoco
i ==Lce+ic. +iie cccc+ic i+ i=e ecc ceecnvco wi+i e=+iev=c+ic +i=+ =+ = mcc+ic cv
+ic zicie+ cccncee, +ic eL=ncmc ccvcnic eco- cv +ic zicie+ cnc=ie=+ic, icLo =+
c=nLee=o i ec=+cmecn, =&, = ncecLL+ic w=e ==eeco cx=nceeic =e +ic cvvici=L e+=+cmc+
cv zicie+ =ime -+ic oc+cnmi=+ic cv +ic ucwiei =cc=Lc +c Livc wi+i +ic n=e =cc=Lc c +cnme
cv Li+- =o mL+L=L nce=cc+, =o +ccc+icn wi+i +icm +c m=c +ic ccmmc icmc i+c =
vLcLnieiic ccmmLi+-, +ic L=eLiLoic cv wiici m=- =eeLnc +c c=ci cv i+e =cc=Lce =
Loie+Lneco =+ic=L ocvcLc=mc+."
+ ie =Lec cccee=n- +c =ci+ cL+ +i=+ +ic zicie+ ccmmieeic i ==Lce+ic, cw +cnmco +ic
==Lce+ic zicie+ &xccL+ivc, i=e c+ oceinco +c =ceecee, =o occe c+ =ceecee, =- ei=nc
i +ic cccn=L =omiie+n=+ic cv +ic ccL+n-. ~cn occe +ic e=cci=L =cei+ic =eeicco +c +ic
zicie+ cnc=iz=+ic i n+icLc v cv +ic cn=v+ M=o=+c vcn ==Lce+ic im=L- =- eLci
vLc+ice. 1i=+ e=cci=L =cei+ic ncL=+ce +c +ic mc=eLnce +c ec +=c i ==Lce+ic =vvcc+ic
+ic ucwiei =c=LL=+ic, =o cc+cm=L=+ce +i=+ +ic cnc=ie=+ic m=- =eeie+ i +ic cccn=L
ocvcLc=mc+ cv +ic ccL+n-, eL+ occe c+ c+i+Lc i+ +c ei=nc i =- occncc i i+e ccvcnmc+.
rLn+icn, i+ ie cc+cm=L=+co +i=+ +ic e+=+Le cv =LL ci+izce cv ==Lce+ic i +ic c-ce cv +ic
L=w ei=LL ec ==Lce+ii=, =o i+ i=e cvcn ecc i+coco +i=+ +ic-, cn =- ecc+ic cv +icm,
eicLLo =ceecee =- c+icn JLnioic=L e+=+Le. ec v=n =e +ic ucwiei =c=LL=+ic cv ==Lce+ic =nc
ccccnco i+ ===c=ne +i=+ ecmc =mcc +icm =nc ===nciceivc +i=+ ie M=Jce+-'e ccvcnmc+
m=- oc==n+ vncm +ic =cLic- cmecoico i +ic cccL=n=+ic cv =. + ie cccee=n-, +icncvcnc,
ccc mcnc +c =vvinm +i=+ +icec vc=ne =nc LvcLoco, =o +i=+ +i=+ cccL=n=+ic, nc-=vvinmco
e- +ic ccvcnccc cv +ic =nici=Lc LLico =cwcne =+ e= ncmc =o =c=i i +ic 1nc=+- cv
ecvnce, ie c+ eLecc=+ieLc cv ci=cc.
cLnic +ic L=e+ +wc cn +incc cccn=+ice +ic ucwe i=vc nccnc=+co i ==Lce+ic = ccmmLi+-,
cw Lmecnic ec,ccc, cv wicm =ecL+ cc vcLn+i =nc v=nmcne cn wcncne L=c +ic L=o.
1iie ccmmLi+- i=e i+e cw =cLi+ic=L cnc=e; = cLcc+co =eecmeL- vcn +ic oincc+ic cv i+e
ocmce+ic ccccne; cLcc+co ccLciLe i +ic +cwe; =o = cnc=iz=+ic vcn +ic cc+ncL cv
i+e eciccLe. + i=e i+e cLcc+co ciicv n=eei=+c =o n=eeiic=L ccLciL vcn +ic oincc+ic cv
i+e ncLicicLe =vv=ine. +e eLeicee ie ccoLc+co i cencw =e = vcn=cLL=n L=cL=cc, =o =
cencw =ncee ecnvce i+e ccoe. + i=e i+e oie+ic+ivc i+cLLcc+L=L Livc =o oie=L=-e
cceiocn=eLc ccccmic =c+ivi+-. 1iie ccmmLi+-, +ic, wi+i i+e +cw =o ccL+n- =c=LL=+ic,
i+e =cLi+ic=L, ncLicicLe, =o ecci=L cnc=iz=+ice, i+e cw L=cL=cc, i+e cw cLe+cme, i+e cw
Livc, i=e i v=c+ -=+ic=L" ci=n=c+cnie+ice. vic i+ ie =eco wi=+ ie mc=+ e- +ic
ocvcLc=mc+ cv +ic ucwiei ~=+ic=L cmc i ==Lce+ic, i+ m=- ec =ewcnco +i=+ i+ ie c+ +ic
im=cei+ic cv = ucwiei =+ic=Li+- L=c +ic ii=ei+=+e cv ==Lce+ic =e = wicLc, eL+ +ic
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 531
vLn+icn ocvcLc=mc+ cv +ic cxie+ic ucwiei ccmmLi+-, wi+i +ic =eeie+=cc cv ucwe i c+icn
==n+e cv +ic wcnLo, i cnocn +i=+ i+ m=- ecccmc = cc+nc i wiici +ic ucwiei =cc=Lc =e =
wicLc m=- +=c, c cncLoe cv ncLicic =o n=cc, = i+cnce+ =o = =nioc. eL+ i cnocn +i=+
+iie ccmmLi+- eicLLo i=vc +ic ece+ =nce=cc+ cv vncc ocvcLc=mc+ =o =ncvioc = vLLL
c==cn+Li+- vcn +ic ucwiei =cc=Lc +c oie=L=- i+e c===ci+ice, i+ ie ceec+i=L +i=+ i+ eicLLo
cw +i=+ i+ ie i ==Lce+ic =e cv nici+ =o c+ c +ic eLvvcn=cc. 1i=+ ie +ic nc=ec wi-
i+ ie cccee=n- +i=+ +ic cxie+ccc cv = ucwiei ~=+ic=L cmc i ==Lce+ic eicLLo ec
i+cn=+ic=LL- cL=n=+cco, =o +i=+ i+ eicLLo ec vcnm=LL- nccccizco +c nce+ L=c =cic+
iie+cnic cccc+ic.
1iie, +ic, ie +ic i+cn=nc+=+ic wiici ie M=Jce+-e ccvcnmc+ =L=cce L=c +ic
cccL=n=+ic cv =, =o, ec Locne+cco, +ic eccnc+=n- cv e+=+c ie cv c=iic +i=+ i+ occe
c+ cc+=i cn im=L- =-+iic wiici cco c=Lec ci+icn =L=nm +c +ic n=e =c=LL=+ic cv
==Lce+ic cn oie===ci+mc+ +c +ic ucwe.
rcn +ic vLLviLmc+ cv +iie =cLic- i+ ie cccee=n- +i=+ +ic ucwiei ccmmLi+- i ==Lce+ic
eicLLo ec =eLc +c icnc=ec i+e Lmecne e- immicn=+ic. 1iie immicn=+ic c=c+ ec ec cnc=+
i vcLLmc =e +c cxccco wi=+cvcn m=- ec +ic ccccmic c===ci+- cv +ic ccL+n- =+ +ic +imc +c
=eecne cw =nniv=Le. + ie ceec+i=L +c ceLnc +i=+ +ic immicn=+e eicLLo c+ ec = eLnoc
L=c +ic =cc=Lc cv ==Lce+ic =e = wicLc, =o +i=+ +ic- eicLLo c+ oc=nivc =- ecc+ic cv
+ic =ncec+ =c=LL=+ic cv +icin cm=Lc-mc+. i+icn+c +ic immicn=+ic i=e vLLviLLco +icec
ccoi+ice. 1ic Lmecn cv immicn=+e eicc +ic eni+iei cccL==+ic i=e ecc =ecL+ &e,ccc.
+ ie cccee=n- =Lec +c ceLnc +i=+ =cnece wic =nc =cLi+ic=LL- Locein=eLc ec cxcLLoco
vncm ==Lce+ic, =o cvcn- =ncc=L+ic i=e ecc =o wiLL ec +=c e- +ic omiie+n=+ic +c
+i=+ co.
+ ie i+coco +i=+ = e=cci=L ccmmi++cc eicLLo ec ce+=eLieico i ==Lce+ic, cceie+ic c+incL-
cv mcmecne cv +ic cw LccieL=+ivc ccLciL cLcc+co e- +ic =cc=Lc, +c ccvcn wi+i +ic
omiie+n=+ic L=c m=++cne ncL=+ic +c +ic nccLL=+ic cv immicn=+ic. eicLLo =-
oivvcnccc cv c=iic =niec ec+wcc +iie ccmmi++cc =o +ic omiie+n=+ic, +ic m=++cn wiLL
ec ncvcnnco +c ie M=Jce+-'e ccvcnmc+, wic wiLL civc i+ e=cci=L cceiocn=+ic. =ooi+ic,
Locn n+icLc e cv +ic on=v+ ==Lce+ic cnocn i ccLciL, =- ncLicicLe ccmmLi+- cn
cceiocn=eLc ecc+ic cv +ic =c=LL=+ic cv ==Lce+ic wiLL i=vc = cccn=L nici+ +c ===c=L,
+incLci +ic ici ccmmieeiccn =o +ic eccnc+=n- cv e+=+c, +c +ic Lc=cLc cv ~=+ice c =-
m=++cn c wiici +ic- m=- cceiocn +i=+ +ic +cnme cv +ic M=o=+c =nc c+ ecic vLLviLLco e-
+ic ccvcnmc+ cv ==Lce+ic.
vi+i ncvcnccc +c +ic cce+i+L+ic wiici i+ ie cw i+coco +c ce+=eLiei i ==Lce+ic, +ic
on=v+ cv wiici i=e =Lnc=o- ecc =LeLieico, i+ ie ocein=eLc +c m=c ccn+=i =ci+e cLc=n. +ic
vine+ =L=cc, i+ ie c+ +ic c=ec, =e i=e ecc nc=ncec+co e- +ic n=e ccLcc=+ic, +i=+ oLnic
+ic w=n ie M=Jce+-'e ccvcnmc+ c=vc = Locn+=ic +i=+ = ioc=coc+ =+ic=L
ccvcnmc+ eicLLo ec =+ ccc ce+=eLieico i ==Lce+ic. 1iie nc=ncec+=+ic m=iL- nce+e
L=c = Lc++cn o=+co +ic &
+i
cc+cecn, =e, vncm ein cn- McM=ic, +ic ie M=Jce+-'e
ici ccmmieeiccn i &c-=+, +c +ic ei=niv cv Mccc=, cw ic Leeci cv +ic icocm cv +ic
cJ=z. 1i=+ Lc++cn ie cLc+co =e ccvc-ic +ic =ncmiec +c +ic ei=niv cv Mccc= +c ncccciec
=o eL==cn+ +ic ioc=coccc cv +ic n=ee wi+ii +ic +cnni+cnice =nc=ceco e- iim. eL+ +iie
=ncmiec w=e civc eLeJcc+ +c = ncecnv=+ic m=oc i +ic e=mc Lc++cn, wiici cxcLLoco vncm i+e
ecc=c, =mcc c+icn +cnni+cnice, +ic =cn+ice cv e-ni= L-ic +c +ic wce+ cv +ic cie+nic+ cv
c=m=ecLe. 1iie ncecnv=+ic i=e =Lw=-e ecc ncc=noco e- ie M=Jce+-e ccvcnmc+ =e
ccvcnic +ic viL=-c+ cv ecinL+ =o +ic ioc=coc+ e=J= cv ucnLe=Lcm. 1ic wicLc cv
==Lce+ic wce+ cv +ic ucno= w=e +iLe cxcLLoco vncm ein. cn- McM=ice =Lcocc.
~cvcn+icLcee, i+ ie +ic i+c+ic cv ie M=Jce+-'e ccvcnmc+ +c vce+cn +ic ce+=eLieimc+
cv = vLLL mc=eLnc cv ecLv-ccvcnmc+ i ==Lce+ic. eL+ +ic- =nc cv +ic c=iic +i=+, i +ic
e=cci=L cincLme+=cce cv +i=+ ccL+n-, +iie eicLLo ec =cccm=Lieico e- cn=oL=L e+=cce =o
c+ eLoocL-. 1ic vine+ e+c= w=e +=c wic, c +ic ie+i+L+ic cv = civiL omiie+n=+ic, +ic
cmi=+co oviecn- ccLciL, wiici cw cxie+e, w=e ce+=eLieico. + w=e e+=+co =+ +ic +imc e-
+ic ici ccmmieeiccn +i=+ +iie w=e +ic vine+ e+c= i +ic ocvcLc=mc+ cv ecLv-ccvcnic
ie+i+L+ice, =o i+ ie cw =nc=ceco +c +=c = eccco e+c= e- +ic ce+=eLieimc+ cv =
LccieL=+ivc ccLciL cc+=iic = L=ncc =nc=cn+ic cv mcmecne cLcc+co c = wioc vn=ciiec.
+ w=e =nc=ceco i +ic =LeLieico on=v+ +i=+ +incc cv +ic mcmecne cv +iie ccLciL eicLLo ec
c-cvvici=L =cnece cmi=+co e- +ic ici ccmmieeiccn, eL+ nc=ncec+=+ice i=vic ecc
m=oc i c==cei+ic +c +iie =ncvieic, e=eco c cccc+ cceiocn=+ice, +ic eccnc+=n- cv e+=+c
ie =nc==nco +c cmi+ i+. 1ic LccieL=+ivc ccLciL wcLLo +ic cceie+ cv +ic ici ccmmieeiccn
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 532
=e =nceioc+ =o +wcLvc cLcc+co =o +c cvvici=L mcmecne. 1ic eccnc+=n- cv e+=+c ie cv +ic
c=iic +i=+ ecvcnc = vLn+icn mc=eLnc cv ecLv-ccvcnmc+ ie cx+coco +c ==Lce+ic =o +ic
eecmeL- =L=cco i cc+ncL cvcn +ic &xccL+ivc, i+ wcLLo ec wiec +c =LLcw ecmc +imc +c cL==ec.
cLnic +iie =cnico +ic ie+i+L+ice cv +ic ccL+n- wiLL i=vc ecccmc wcLL ce+=eLieico; i+e
vi=ci=L cncoi+ wiLL ec e=eco c vinm vcLo=+ice, =o +ic ==Lce+ii= cvvici=Le wiLL i=vc
ecc c=eLco +c c=i cx=cniccc cv ecLo mc+icoe cv ccvcnmc+. v+cn = vcw -c=ne +ic
ei+L=+ic wiLL ec =c=i ncvicwco, =o iv +ic cx=cniccc cv +ic wcnic cv +ic cce+i+L+ic cw
+c ec ce+=eLieico ec w=nn=+co, = L=nccn ei=nc cv =L+icni+- wcLLo +ic ec cx+coco +c +ic
cLcc+co nc=ncec+=+ivce cv +ic =cc=Lc.
1ic eccnc+=n- cv e+=+c wcLLo =ci+ cL+ +i=+ =Lnc=o- +ic =ncec+ omiie+n=+ic i=e
+n=evcnnco +c = eL=ncmc ccLciL cLcc+co e- +ic MceLcm ccmmLi+- cv ==Lce+ic +ic c+inc
cc+ncL cv MceLcm ncLicicLe cocwmc+e iv=cve), =o cv +ic MceLcm ncLicicLe ccLn+e. 1c
+iie ccLciL +ic omiie+n=+ic i=e =Lec vcLL+=niL- nce+cnco cceiocn=eLc ncvcLce
ocnivco vncm =cic+ cocwmc+e wiici i=vc ecc eccLce+n=+co e- +ic 1Lniei ccvcnmc+.
1ic &oLc=+ic cc==n+mc+ ie =Lec =ovieco e- = ccmmi++cc nc=ncec+=+ivc cv =LL ecc+ice cv
+ic =c=LL=+ic, =o +ic cc==n+mc+ cv ccmmcncc =o oLe+n- i=e +ic eccvi+ cv +ic
ccc=cn=+ic cv +ic ci=mecne cv ccmmcncc wiici i=vc ecc ce+=eLieico i +ic =nici==L
cc+nce. + ie +ic i+c+ic cv +ic omiie+n=+ic +c =eecci=+c i = icnc=eco occncc eimiL=n
nc=ncec+=+ivc ccmmi++cce wi+i +ic v=nicLe cc==n+mc+e cv +ic ccvcnmc+.
1ic eccnc+=n- cv e+=+c ecLicvce +i=+ = =cLic- L=c +icec Lice, ccL=Lco wi+i +ic m=i+c=cc
cv +ic vLLLce+ ncLicicLe Liecn+- i ==Lce+ic =o wi+i ecnL=LLcLe ncc=no vcn +ic nici+e cv
c=ci ccmmLi+- wi+i ncvcnccc +c i+e cL- =L=cce, c=c+ eL+ ccmmco i+ecLv +c +ic v=nicLe
ecc+ice cv +ic =c=LL=+ic, =o +i=+ L=c +iie e=eie m=- ec eLiL+ L= +i=+ = e=ini+ cv
ccc=cn=+ic L=c wiici +ic vL+Lnc =nccncee =o =nce=cni+- cv +ic cL- L=o mLe+ L=nccL-
oc=co.
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 533
British White Paper, l939
+ic e+=+cmc+ c ==Lce+ic, ieeLco c =
+i
~cvcmecn, =ze, ie M=Jce+-'e ccvcnmc+
=cLcco +icin i+c+ic +c ivi+c nc=ncec+=+ivce cv +ic n=ee cv ==Lce+ic, cv ccn+=i
ciciecLnic ccL+nice =o cv +ic ucwiei ccc- +c ccvcn wi+i +icm i Lcoc ncc=noic
vL+Lnc =cLic-. + w=e +icin eiccnc ic=c +i=+, =e = nceLL+ cv vLLL, vncc =o vn= oiecLeeice,
ecmc Locne+=oic mici+ ec nc=cico. ccvcnccce nccc+L- +cc =L=cc wi+i n=e =o ucwiei
ocLcc=+ice, L=e+ic vcn = =cnico cv ecvcn=L wcce, =o ecnvco +ic =Ln=cec cv = ccm=Lc+c
cxci=cc cv vicwe ec+wcc eni+iei Miie+cne =o +ic n=e =o ucwiei nc=ncec+=+ivce. +ic
Lici+ cv +ic oiecLeeice =e wcLL =e cv +ic ei+L=+ic i ==Lce+ic =o cv +ic nc=cn+e cv +ic
nc-=L ccmmieeic =o +ic ==n+i+ic ccmmieeic, ccn+=i =nc=ce=Le wcnc vcnmLL=+co e- ie
M=Jce+-'e ccvcnmc+ =o wcnc L=io ecvcnc +ic n=e =o ucwiei ccLcc=+ice =e +ic e=eie cv
= =cncco ec++Lcmc+. ~ci+icn +ic n=e cn +ic ucwiei ocLcc=+ic vcL+ =eLc +c =ccc=+ +icec
=nc=ce=Le, =o +ic ccvcnccce +icncvcnc oio c+ nceLL+ i = =cnccmc+. cccnoicL- ie
M=Jce+-'e ccvcnmc+ =nc vncc +c vcnmLL=+c +icin cw =cLic-, =o =v+cn c=ncvLL
cceiocn=+ic +ic- i=vc occioco +c =oicnc cccn=LL- +c +ic =nc=ce=Le wiici wcnc vi=LL-
eLemi++co +c =o oiecLeeco wi+i +ic n=e =o ucwiei ocLcc=+ice.
1ic M=o=+c vcn ==Lce+ic, +ic +cnme cv wiici wcnc ccvinmco e- +ic ccLciL cv +ic Lc=cLc
cv ~=+ice i =&&, i=e ccvcnco +ic =cLic- cv eLccceeivc eni+iei ccvcnmc+e vcn c=nL-
&c -c=ne. + cmecoice +ic e=LvcLn cccL=n=+ic =o im=cece c +ic M=o=+cn- vcLn m=i
ceLic=+ice. 1icec ceLic=+ice =nc ec+ cL+ i n+icLce &, e =o z cv +ic M=o=+c. 1icnc ie
c oie=L+c ncc=noic +ic i+cn=nc+=+ic cv cc cv +icec ceLic=+ice, +i=+ +cLciic +ic
=nc+cc+ic cv =o =cccee +c +ic cL- =L=cce =o ncLicicLe eLiLoic cn ei+ce. 1ic c+icn +incc
m=i ceLic=+ice =nc cccn=LL- =e vcLLcwe:
1c =L=cc +ic ccL+n- Locn eLci =cLi+ic=L, =omiie+n=+ivc =o ccccmic ccoi+ice =e wiLL
eccLnc +ic ce+=eLieimc+ i ==Lce+ic cv = =+ic=L icmc vcn +ic ucwiei =cc=Lc. 1c v=ciLi+=+c
ucwiei immicn=+ic Locn eLi+=eLc ccoi+ice, =o +c cccLn=cc, i ccc=cn=+ic wi+i +ic
ucwiei ccc-, cLcec ec++Lcmc+ e- ucwe c +ic L=o.
1c e=vccL=no +ic civiL =o ncLicicLe nici+e cv =LL ii=ei+=+e cv ==Lce+ic innce=cc+ivc cv
n=cc =o ncLicic, =o, wiiLe+ v=ciLi+=+ic ucwiei immicn=+ic =o ec++Lcmc+, +c ceLnc +i=+
+ic nici+e =o =cei+ic cv c+icn ecc+ice cv +ic =c=LL=+ic =nc c+ =ncJLoicco.
1c =L=cc +ic ccL+n- Locn eLci =cLi+ic=L, =omiie+n=+ivc =o ccccmic ccoi+ice =e wiLL
eccLnc +ic ocvcLc=mc+ cv ecLv-ccvcnic ie+i+L+ice.
1ic nc-=L ccmmieeic =o =ncvicLe ccmmieeice cv &cLin- i=vc on=w =++c+ic +c +ic
=meicLi+- cv ccn+=i cx=nceeice i +ic M=o=+c, eLci =e +ic cx=nceeic = =+ic=L icmc vcn
+ic ucwiei =cc=Lc, =o +ic- i=vc vcLo i +iie =meicLi+- =o +ic nceLL+ic Lccn+=i+- =e
+c +ic ceJcc+ivce cv =cLic- = vLo=mc+=L c=Lec cv Lnce+ =o ice+iLi+- ec+wcc n=ee =o
ucwe. ie M=Jce+-'e ccvcnmc+ =nc ccvicco +i=+ i +ic i+cnce+e cv +ic =c=cc =o wcLL-
ecic cv +ic wicLc =cc=Lc cv ==Lce+ic = cLc=n ocvii+ic cv =cLic- =o ceJcc+ivce ie
ceec+i=L. 1ic =nc=ce=L cv ==n+i+ic ncccmmcoco e- +ic nc-=L ccmmieeic wcLLo i=vc
=vvcnoco eLci cL=ni+-, eL+ +ic ce+=eLieimc+ cv ecLv-eL==cn+ic ioc=coc+ n=e =o ucwiei
e+=+ce wi+ii ==Lce+ic i=e ecc vcLo +c ec im=n=c+ic=eLc. + i=e +icncvcnc ecc cccee=n-
vcn ie M=Jce+-'e ccvcnmc+ +c ocviec = =L+cn=+ivc =cLic- wiici wiLL, cceie+c+ wi+i
+icin ceLic=+ice +c n=ee =o ucwe, mcc+ +ic ccoe cv +ic ei+L=+ic i ==Lce+ic. 1icin vicwe
=o =nc=ce=Le =nc ec+ vcn+i ecLcw Locn +incc ic=oe, ecc+ic -1ic cce+i+L+ic," ecc+ic
. mmicn=+ic =o ecc+ic . L=o.
Section I. "The Constitution"
+ i=e ecc Lncco +i=+ +ic cx=nceeic -= =+ic=L icmc vcn +ic ucwiei =cc=Lc" cvvcnco =
=nce=cc+ +i=+ ==Lce+ic mici+ i oLc ccLnec ecccmc = ucwiei e+=+c cn ccmmcwc=L+i. ie
M=Jce+-e ccvcnmc+ occe c+ wiei +c cc+ce+ +ic vicw, wiici w=e cx=nceeco e- +ic nc-=L
ccmmieeic, +i=+ +ic zicie+ Lc=ocne =+ +ic +imc cv +ic ieeLc cv +ic e=LvcLn cccL=n=+ic
nccccieco +i=+ = LL+im=+c ucwiei e+=+c w=e c+ =nccLLoco e- +ic +cnme cv +ic
cccL=n=+ic. eL+, wi+i +ic nc-=L ccmmieeic, ie M=Jce+-e ccvcnmc+ ecLicvce +i=+ +ic
vn=mcne cv +ic M=o=+c i wiici +ic e=LvcLn cccL=n=+ic w=e cmecoico ccLLo c+ i=vc
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 534
i+coco +i=+ ==Lce+ic eicLLo ec ccvcn+co i+c = ucwiei e+=+c =c=ie+ +ic wiLL cv +ic n=e
=c=LL=+ic cv +ic ccL+n-. 1i=+ ==Lce+ic w=e c+ +c ec ccvcn+co i+c = ucwiei e+=+c mici+
ec icLo +c ec im=Lico i +ic ==ee=cc vncm +ic ccmm=o ===cn cv =&& wiici nc=oe =e
vcLLcwe:
-U=L+icnizco e+=+cmc+e i=vc ecc m=oc +c +ic cvvcc+ +i=+ +ic =Ln=cec i vicw ie +c cnc=+c
= wicLL- ucwiei ==Lce+ic. =in=ece i=vc ecc Leco eLci =e +i=+ ==Lce+ic ie +c ecccmc =e
ucwiei =e &cL=o ie &cLiei. ie M=Jce+-e ccvcnmc+ ncc=noe =- eLci cx=cc+=+ic =e
im=n=c+ic=eLc =o i=vc c eLci =im i vicw. ~cn i=vc +ic- =+ =- +imc cc+cm=L=+co ... +ic
oie===c=n=cc cn +ic eLecnoi=+ic cv +ic n=eic =c=LL=+ic, L=cL=cc cn cLL+Lnc i
==Lce+ic. 1ic- wcLLo on=w =++c+ic +c +ic v=c+ +i=+ +ic +cnme cv +ic ie=LvcLn)
cccL=n=+ic ncvcnnco +c oc c+ cc+cm=L=+c +i=+ ==Lce+ic =e = wicLc eicLLo ec ccvcn+co
i+c = ucwiei ~=+ic=L cmc, eL+ +i=+ eLci = cmc eicLLo ec vcLoco ~ =L&e1~&."
eL+ +iie e+=+cmc+ i=e c+ ncmcvco ocLe+e, =o ie M=Jce+-e ccvcnmc+ +icncvcnc cw
occL=nce LccLivcc=LL- +i=+ i+ ie c+ ==n+ cv +icin =cLic- +i=+ ==Lce+ic eicLLo ecccmc =
ucwiei e+=+c. 1ic- wcLLo iocco ncc=no i+ =e cc+n=n- +c +icin ceLic=+ice +c +ic n=ee
Locn +ic M=o=+c, =e wcLL =e +c +ic =eeLn=cce wiici i=vc ecc civc +c +ic n=e =cc=Lc
i +ic ==e+, +i=+ +ic n=e =c=LL=+ic cv ==Lce+ic eicLLo ec m=oc +ic eLeJcc+e cv = ucwiei
e+=+c =c=ie+ +icin wiLL.
1ic =+Lnc cv +ic ucwiei ~=+ic=L cmc i ==Lce+ic w=e vLn+icn ocecnieco i +ic ccmm=o
===cn cv =&& =e vcLLcwe:
-cLnic +ic L=e+ +wc cn +incc cccn=+ice +ic ucwe i=vc nccnc=+co i ==Lce+ic = ccmmLi+-
cw Lmecnic ec,ccc, cv wicm =ecL+ cc vcLn+i =nc v=nmcne cn wcncne L=c +ic L=o.
1iie ccmmLi+- i=e i+e cw =cLi+ic=L cnc=e; = cLcc+co =eecmeL- vcn +ic oincc+ic cv i+e
ocmce+ic ccccne; cLcc+co ccLciLe i +ic +cwe; =o = cnc=ie=+ic vcn +ic cc+ncL cv
i+e eciccLe. + i=e i+e cLcc+co ciicv n=eei=+c =o n=eeiic=L ccLciL vcn +ic oincc+ic cv
i+e ncLicicLe =vv=ine. +e eLeicee ie ccoLc+co i cencw =e = vcn=cLL=n L=cL=cc, =o =
cencw =ncee ecnvce i+e ccoe. + i=e i+e oie+ic+ivc i+cLLcc+L=L Livc =o oie=L=-e
cceiocn=eLc ccccmic =c+ivi+-. 1iie ccmmLi+-, +ic, wi+i i+e +cw =o ccL+n- =c=LL=+ic,
i+e =cLi+ic=L, ncLicicLe =o ecci=L cnc=ie=+ice, i+e cw L=cL=cc, i+e cw cLe+cme, i+e cw
Livc, i=e i v=c+ =+ic=L ci=n=c+cnie+ice. vic i+ ie =eco wi=+ ie mc=+ e- +ic ocvcLc=mc+
cv +ic ucwiei ~=+ic=L cmc i ==Lce+ic, i+ m=- ec =ewcnco +i=+ i+ ie c+ +ic im=cei+ic cv
= ucwiei =+ic=Li+- L=c +ic ii=ei+=+e cv ==Lce+ic =e = wicLc, eL+ +ic vLn+icn
ocvcLc=mc+ cv +ic cxie+ic ucwiei ccmmLi+-, wi+i +ic =eeie+=cc cv ucwe i c+icn ==n+e cv
+ic wcnLo, i cnocn +i=+ i+ m=- ecccmc = cc+nc i wiici +ic ucwiei =cc=Lc =e = wicLc m=-
+=c, c cncLoe cv ncLicic =o n=cc, = i+cnce+ =o =nioc. eL+ i cnocn +i=+ +iie
ccmmLi+- eicLLo i=vc +ic ece+ =nce=cc+ cv vncc ocvcLc=mc+ =o =ncvioc = vLLL c==cn+Li+-
vcn +ic ucwiei =cc=Lc +c oie=L=- i+e c===ci+ice, i+ ie ceec+i=L +i=+ i+ eicLLo cw +i=+ i+ ie
i ==Lce+ic =e cv nici+ =o c+ c eLvvcn=cc. 1i=+ ie +ic nc=ec wi- i+ ie cccee=n- +i=+
+ic cxie+ccc cv = ucwiei ~=+ic=L cmc i ==Lce+ic eicLLo ec i+cn=+ic=LL- cL=n=+cco,
=o +i=+ i+ eicLLo ec vcnm=LL- nccccieco +c nce+ L=c =cic+ iie+cnic cccc+ic."
ie M=Jce+-e ccvcnmc+ =oicnce +c +iie i+cn=nc+=+ic cv +ic ie=LvcLn) cccL=n=+ic cv
= =o ncc=noe i+ =e = =L+icni+=+ivc =o ccm=nciceivc ocecni=+ic cv +ic ci=n=c+cn cv
+ic ucwiei ~=+ic=L cmc i ==Lce+ic. + cvie=cco +ic vLn+icn ocvcLc=mc+ cv +ic cxie+ic
ucwiei ccmmLi+- wi+i +ic =eeie+=cc cv ucwe i c+icn ==n+e cv +ic wcnLo. &vioccc +i=+ ie
M=Jce+-e ccvcnmc+ i=vc ecc c=nn-ic cL+ +icin ceLic=+ic i +iie nce=cc+ ie +c ec vcLo
i +ic v=c+e +i=+, eicc +ic e+=+cmc+ cv =&& w=e =LeLieico, mcnc +i= zcc,ccc ucwe i=vc
immicn=+co +c ==Lce+ic, =o +i=+ +ic =c=LL=+ic cv +ic ~=+ic=L cmc i=e niec +c ecmc
ec,ccc, cn ===nc=ciic = +iino cv +ic c+inc =c=LL=+ic cv +ic ccL+n-. ~cn i=e +ic ucwiei
ccmmLi+- v=iLco +c +=c vLLL =ov=+=cc cv +ic c==cn+Li+ice civc +c i+. 1ic cncw+i cv +ic
ucwiei ~=+ic=L cmc =o i+e =cicivcmc+e i m=- vicLoe =nc = ncm=n=eLc cce+nLc+ivc
cvvcn+ wiici mLe+ ccmm=o +ic =omin=+ic cv +ic wcnLo =o mLe+ ec, i ==n+icLL=n, = ecLncc
cv =nioc +c +ic ucwiei =cc=Lc.
+ic nccc+ oiecLeeice +ic n=e ocLcc=+ice i=vc nc=c=+co +ic cc+c+ic +i=+ ==Lce+ic
w=e icLLoco wi+ii +ic =nc= i wiici ein cn- McM=ic, c eci=Lv cv +ic eni+iei
ccvcnmc+, i cc+cecn, =e, Locn+cc +c ncccciec =o eL==cn+ n=e ioc=coccc. 1ic
v=Lioi+- cv +iie cL=im, e=eco c +ic +cnme cv +ic ccnnce=coccc wiici ==eeco ec+wcc ein
cn- McM=ic =o +ic ei=niv cv Mccc=, w=e +icncLciL- =o c=ncvLLL- ivce+ic=+co e- +ic
eni+iei =o n=e nc=ncec+=+ivce oLnic +ic nccc+ ccvcnccce i Lcoc. 1icin nc=cn+,
wiici i=e ecc =LeLieico, e+=+ce +i=+ ec+i +ic n=e =o +ic eni+iei nc=ncec+=+ivce
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 535
coc=vcLnco +c Locne+=o +ic =ci+ cv vicw cv +ic c+icn ==n+- eL+ +i=+ +ic- wcnc L=eLc
+c nc=ci =cnccmc+ L=c = i+cn=nc+=+ic cv +ic ccnnce=coccc. 1icnc ie c cco +c
eLmm=nizc icnc +ic =ncLmc+e =ncec+co e- c=ci eioc. ie M=Jce+-e ccvcnmc+ nccnc+ +ic
mieLocne+=oice wiici i=vc =niec =e ncc=noe ecmc cv +ic =in=ece Leco. rcn +icin ==n+
+ic- c= cL- =oicnc, vcn +ic nc=ece civc e- +icin nc=ncec+=+ivce i +ic nc=cn+, +c +ic
vicw +i=+ +ic wicLc cv ==Lce+ic wce+ cv ucno= w=e cxcLLoco vncm ein cn- McM=ice
=Lcocc, =o +ic- +icncvcnc c=c+ =cncc +i=+ +ic McM=ic ccnnce=coccc vcnme = JLe+
e=eie vcn +ic cL=im +i=+ ==Lce+ic eicLLo ec ccvcn+co i+c = n=e e+=+c.
ie M=Jce+-e ccvcnmc+ =nc ci=ncco =e +ic M=o=+cn- =L+icni+- -+c eccLnc +ic
ocvcLc=mc+ cv ecLv ccvcnic ie+i+L+ice" i ==Lce+ic. ==n+ vncm +iie e=ccivic ceLic=+ic,
+ic- wcLLo ncc=no i+ =e cc+n=n- +c +ic wicLc e=ini+ cv +ic M=o=+c e-e+cm +i=+ +ic
=c=LL=+ic cv ==Lce+ic eicLLo ncm=i vcncvcn Locn M=o=+cn- +L+cL=cc. + ie =nc=cn +i=+
+ic =cc=Lc cv +ic ccL+n- eicLLo =e c=nL- =e =ceeieLc cJc- +ic nici+e cv ecLv-ccvcnmc+
wiici =nc cxcncieco e- +ic =cc=Lc cv ciciecLnic ccL+nice. ie M=Jce+-e ccvcnmc+ =nc
L=eLc =+ =ncec+ +c vcncecc +ic cx=c+ cce+i+L+ic=L vcnme wiici ccvcnmc+ i ==Lce+ic
wiLL cvc+L=LL- +=c, eL+ +icin ceJcc+ivc ie ecLv-ccvcnmc+, =o +ic- oceinc +c ecc
ce+=eLieico LL+im=+cL- = ioc=coc+ ==Lce+ic e+=+c. + eicLLo ec = e+=+c i wiici +ic +wc
=cc=Lce i ==Lce+ic, n=ee =o ucwe, ei=nc =L+icni+- i ccvcnmc+ i eLci = w=- +i=+ +ic
ceec+i=L i+cnce+e cv c=ci =nc ei=nco.
1ic ce+=eLieimc+ cv = ioc=coc+ e+=+c =o +ic ccm=Lc+c ncLicLieimc+ cv M=o=+cn-
cc+ncL i ==Lce+ic wcLLo nccLinc eLci ncL=+ice ec+wcc +ic n=ee =o +ic ucwe =e wcLLo
m=c ccco ccvcnmc+ =ceeieLc. Mcnccvcn, +ic cncw+i cv ecLv-ccvcnic ie+i+L+ice i
==Lce+ic, =e i c+icn ccL+nice, mLe+ ec = cvcLL+ic=n- =ncccee. +n=ei+ic=L =cnico wiLL
ec nccLinco ecvcnc ioc=coccc ie =ciicvco, +incLcicL+ wiici LL+im=+c nce=ceieiLi+- vcn
+ic ccvcnmc+ cv +ic ccL+n- wiLL ec nc+=ico e- ie M=Jce+-e ccvcnmc+ =e +ic
M=o=+cn- =L+icni+-, wiiLc +ic =cc=Lc cv +ic ccL+n- =nc +=ic = icnc=eic ei=nc i +ic
ccvcnmc+, =o Locne+=oic =o ccc=cn=+ic =mcce+ +icm =nc cncwic. + wiLL ec +ic
cce+=+ coc=vcLn cv ie M=Jce+-e ccvcnmc+ +c =ncmc+c ccco ncL=+ice ec+wcc +ic
n=ee =o +ic ucwe.
+ic Lici+ cv +icec cceiocn=+ice ie M=Jce+-e ccvcnmc+ m=c +ic vcLLcwic
occL=n=+ic cv +icin i+c+ice ncc=noic +ic vL+Lnc ccvcnmc+ cv ==Lce+ic:
1ic ceJcc+ivc cv ie M=Jce+-e ccvcnmc+ ie +ic ce+=eLieimc+ wi+ii c -c=ne cv =
ioc=coc+ ==Lce+ic e+=+c i eLci +nc=+- ncL=+ice wi+i +ic Ui+co icocm =e wiLL =ncvioc
e=+iev=c+cniL- vcn +ic ccmmcnci=L =o e+n=+ccic nccLincmc+e cv ec+i ccL+nice i +ic
vL+Lnc. 1ic =nc=ce=L vcn +ic ce+=eLieimc+ cv +ic ioc=coc+ e+=+c wcLLo ivcLvc
cceLL+=+ic wi+i +ic ccLciL cv +ic Lc=cLc cv ~=+ice wi+i = vicw +c +ic +cnmi=+ic cv +ic
M=o=+c.
1ic ioc=coc+ e+=+c eicLLo ec cc i wiici n=ee =o ucwe ei=nc ccvcnmc+ i eLci =
w=- =e +c ceLnc +i=+ +ic ceec+i=L i+cnce+e cv c=ci ccmmLi+- =nc e=vccL=noco.
1ic ce+=eLieimc+ cv +ic ioc=coc+ e+=+c wiLL ec =ncccoco e- = +n=ei+ic=L =cnico
+incLcicL+ wiici ie M=Jce+-e ccvcnmc+ wiLL nc+=i nce=ceieiLi+- vcn +ic ccL+n-.
cLnic +ic +n=ei+ic=L =cnico +ic =cc=Lc cv ==Lce+ic wiLL ec civc = icnc=eic ==n+ i +ic
ccvcnmc+ cv +icin ccL+n-. ec+i ecc+ice cv +ic =c=LL=+ic wiLL i=vc = c==cn+Li+- +c
==n+ici==+c i +ic m=ciicn- cv ccvcnmc+, =o +ic =ncccee wiLL ec c=nnico c wic+icn cn
c+ +ic- ec+i =v=iL +icmecLvce cv i+.
e ecc =e =c=cc =o cnocn i=vc ecc eLvvicic+L- nce+cnco i ==Lce+ic e+c=e wiLL ec +=c
+c c=nn- cL+ +iie =cLic- cv civic +ic =cc=Lc cv ==Lce+ic = icnc=eic ==n+ i +ic
ccvcnmc+ cv +icin ccL+n-, +ic ceJcc+ivc ecic +c =L=cc ==Lce+ii=e i ci=ncc cv =LL +ic
cc==n+mc+e cv ccvcnmc+, wi+i +ic =eeie+=cc cv eni+iei =oviecne =o eLeJcc+ +c +ic
cc+ncL cv +ic ici ccmmieeiccn. n=e =o ucwiei nc=ncec+=+ivce wiLL ec ivi+co +c ecnvc
=e ic=oe cv cc==n+mc+e ===ncxim=+cL- i =nc=cn+ic +c +icin nce=cc+ivc =c=LL=+ice. 1ic
Lmecn cv ==Lce+ii=e i ci=ncc cv cc==n+mc+e wiLL ec icnc=eco =e cincLme+=cce =cnmi+
L+iL =LL ic=oe cv cc==n+mc+e =nc ==Lce+ii=e, cxcncieic +ic =omiie+n=+ivc =o =oviecn-
vLc+ice wiici =nc =ncec+L- =cnvcnmco e- eni+iei cvvici=Le. vic +i=+ e+=cc ie nc=cico
cceiocn=+ic wiLL ec civc +c +ic cLce+ic cv ccvcn+ic +ic &xccL+ivc ccLciL i+c =
ccLciL cv Miie+cne wi+i = cceccLc+i=L ci=cc i +ic e+=+Le =o vLc+ice cv +ic
==Lce+ii= ic=oe cv cc==n+mc+e.
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 536
ie M=Jce+-e ccvcnmc+ m=c c =nc=ce=Le =+ +iie e+=cc ncc=noic +ic ce+=eLieimc+ cv
= cLcc+ivc LccieL=+Lnc. ~cvcn+icLcee +ic- wcLLo ncc=no +iie =e = ===nc=ni=+c
cce+i+L+ic=L ocvcLc=mc+, =o, eicLLo =LeLic c=iic i ==Lce+ic icnc=v+cn eicw i+ecLv
i v=vcLn cv eLci = ocvcLc=mc+, +ic- wiLL ec =nc==nco, =ncvioco +i=+ Lcc=L ccoi+ice
=cnmi+, +c ce+=eLiei +ic cccee=n- m=ciicn-.
+ +ic co cv vivc -c=ne vncm +ic nce+cn=+ic cv =c=cc =o cnocn, = ===nc=ni=+c eco-
nc=ncec+=+ivc cv +ic =cc=Lc cv ==Lce+ic =o cv ie M=Jce+-'e ccvcnmc+ wiLL ec ec+ L= +c
ncvicw +ic wcnic cv +ic cce+i+L+ic=L =nn=ccmc+e oLnic +ic +n=ei+ic=L =cnico =o
+c cceiocn =o m=c ncccmmco=+ice ncc=noic +ic cce+i+L+ic cv +ic ioc=coc+
==Lce+ic e+=+c.
ie M=Jce+-'e ccvcnmc+ wiLL nccLinc +c ec e=+ievico +i=+ i +ic +nc=+- cc+cm=L=+co e- eLe-
==n=cn==i ie) =occL=+c =ncvieic i=e ecc m=oc vcn:
+ic eccLni+- cv, =o vnccocm cv =cccee +c +ic cL- =L=cce, =o =nc+cc+ic cv +ic i+cnce+e
=o =nc=cn+- cv +ic v=nicLe ncLicicLe ecoice;
+ic =nc+cc+ic cv +ic oivvcnc+ ccmmLi+ice i ==Lce+ic i =cccno=cc wi+i +ic ceLic=+ice
cv ie M=Jce+-e ccvcnmc+ +c ec+i n=ee =o ucwe =o vcn +ic e=cci=L =cei+ic i
==Lce+ic cv +ic ucwiei ~=+ic=L cmc;
eLci nccLincmc+e +c mcc+ +ic e+n=+ccic ei+L=+ic =e m=- ec ncc=noco =e cccee=n- e- ie
M=Jce+-e ccvcnmc+ i +ic Lici+ cv +ic cincLme+=cce +ic cxie+ic. ie M=Jce+-e
ccvcnmc+ wiLL =Lec nccLinc +c ec e=+ievico +i=+ +ic i+cnce+e cv ccn+=i vcncic ccL+nice
i ==Lce+ic, vcn +ic =ncecnv=+ic cv wiici +ic- =nc =+ =ncec+ nce=ceieLc, =nc =occL=+cL-
e=vccL=noco.
ie M=Jce+-e ccvcnmc+ wiLL oc cvcn-+iic i +icin =cwcn +c cnc=+c ccoi+ice wiici wiLL
c=eLc +ic ioc=coc+ ==Lce+ic e+=+c +c ccmc i+c ecic wi+ii c -c=ne. v, =+ +ic co cv
c -c=ne, i+ ===c=ne +c ie M=Jce+-e ccvcnmc+ +i=+, cc+n=n- +c +icin ic=c,
cincLme+=cce nccLinc +ic =ce+=ccmc+ cv +ic ce+=eLieimc+ cv +ic ioc=coc+ e+=+c, +ic-
wiLL cceLL+ wi+i nc=ncec+=+ivce cv +ic =cc=Lc cv ==Lce+ic, +ic ccLciL cv +ic Lc=cLc cv
~=+ice =o +ic ciciecLnic n=e e+=+ce ecvcnc occioic c eLci = =ce+=ccmc+. v ie
M=Jce+-e ccvcnmc+ ccmc +c +ic cccLLeic +i=+ =ce+=ccmc+ ie L=vcio=eLc, +ic- wiLL
ivi+c +ic ccc=cn=+ic cv +icec ==n+ice i vn=mic =L=e vcn +ic vL+Lnc wi+i = vicw +c
=ciicvic +ic oceinco ceJcc+ivc =+ +ic c=nLice+ =ceeieLc o=+c.
cLnic +ic +n=ei+ic=L =cnico e+c=e wiLL ec +=c +c icnc=ec +ic =cwcne =o
nce=ceieiLi+ice cv mLici==L ccn=cn=+ice =o Lcc=L ccLciLe.
Section II. Immigration
Uocn n+icLc e cv +ic M=o=+c, +ic omiie+n=+ic cv ==Lce+ic, -wiiLc ceLnic +i=+ +ic
nici+e =o =cei+ic cv c+icn ecc+ice cv +ic =c=LL=+ic =nc c+ =ncJLoicco," ie nccLinco +c
-v=ciLi+=+c ucwiei immicn=+ic Locn eLi+=eLc ccoi+ice." ec-co +iie, +ic cx+c+ +c wiici
ucwiei immicn=+ic i+c ==Lce+ic ie +c ec =cnmi++co ie cwicnc ocvico i +ic M=o=+c. eL+
i +ic ccmm=o ===cn cv =&& i+ w=e L=io ocw +i=+ vcn +ic vLLviLmc+ cv +ic =cLic- cv
ce+=eLieiic = ucwiei ~=+ic=L cmc:
-i+ ie cccee=n- +i=+ +ic ucwiei ccmmLi+- i ==Lce+ic eicLLo ec =eLc +c icnc=ec i+e
Lmecne e- immicn=+ic. 1iie immicn=+ic c=c+ ec ec cnc=+ i vcLLmc =e +c cxccco wi=+cvcn
m=- ec +ic ccccmic c===ci+- cv +ic ccL+n- =+ +ic +imc +c =eecne cw =nniv=Le. + ie
ceec+i=L +c ceLnc +i=+ +ic immicn=+e eicLLo c+ ec = eLnoc L=c +ic =cc=Lc cv ==Lce+ic
=e = wicLc, =o +i=+ +ic- eicLLo c+ oc=nivc =- ecc+ic cv +ic =ncec+ =c=LL=+ic cv +icin
cm=Lc-mc+."
=n=c+icc, vncm +i=+ o=+c cw=noe L+iL nccc+ +imce, +ic ccccmic =eecn=+ivc c===ci+- cv
+ic ccL+n- i=e ecc +nc=+co =e +ic ecLc Limi+ic v=c+cn, =o i +ic Lc++cn wiici Mn. n=me=-
M=ccc=Lo, =e =nimc Miie+cn, ec+ +c cn. vcizm= i rcenL=n- =z i+ w=e L=io ocw =e =
m=++cn cv =cLic- +i=+ ccccmic =eecn=+ivc c===ci+- w=e +ic ecLc cni+cnic. 1iie
i+cn=nc+=+ic i=e ecc eL==cn+co e- ncecLL+ice cv +ic =cnm=c+ M=o=+ce ccmmieeiccn.
eL+ ie M=Jce+-e ccvcnmc+ oc c+ nc=o ci+icn +ic e+=+cmc+ cv =cLic- cv =&& cn +ic
Lc++cn cv =z =e im=L-ic +i=+ +ic M=o=+c nccLince +icm, vcn =LL +imc =o i =LL
cincLme+=cce, +c v=ciLi+=+c +ic immicn=+ic cv ucwe i+c ==Lce+ic eLeJcc+ cL- +c
cceiocn=+ic cv +ic ccL+n-e ccccmic =eecn=+ivc c===ci+-. ~cn oc +ic- vio =-+iic i
+ic M=o=+c cn i eLeeccLc+ e+=+cmc+e cv =cLic- +c eL==cn+ +ic vicw +i=+ +ic
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 537
ce+=eLieimc+ cv = ucwiei ~=+ic=L cmc i ==Lce+ic c=c+ ec cvvcc+co LLcee immicn=+ic
ie =LLcwco +c cc+iLc iocvii+cL-. v immicn=+ic i=e = =ovcnec cvvcc+ c +ic ccccmic
=cei+ic i +ic ccL+n-, i+ eicLLo cLc=nL- ec nce+nic+co; =o ccL=LL-, iv i+ i=e = ecnicLeL-
o=m=cic cvvcc+ c +ic =cLi+ic=L =cei+ic i +ic ccL+n-, +i=+ ie = v=c+cn +i=+ eicLLo c+
ec iccnco. L+icLci i+ ie c+ oivvicLL+ +c cc+co +i=+ +ic L=ncc Lmecn cv ucwiei
immicn=+e wic i=vc ecc =omi++co ec v=n i=vc ecc =eecneco ccccmic=LL-, +ic vc=n cv +ic
n=ee +i=+ +iie ivLLx wiLL cc+iLc iocvii+cL- L+iL +ic ucwiei =c=LL=+ic ie i = =cei+ic
+c ocmi=+c +icm i=e =ncoLcco cceccLccce wiici =nc cx+ncmcL- cn=vc vcn ucwe =o n=ee
=Lic =o vcn +ic =c=cc =o =nce=cni+- cv ==Lce+ic. 1ic L=mc+=eLc oie+Lne=cce cv +ic ==e+
+incc -c=ne =nc cL- +ic L=+ce+ =o mce+ eLe+=ico m=ivce+=+ic cv +iie i+cec n=e
===nciceic. 1ic mc+icoe cm=Lc-co e- n=e +cnncnie+e =c=ie+ vcLLcw n=ee =o ucwe =Lic
mLe+ ncccivc LcL=Livico ccocm=+ic. eL+ i+ c=c+ ec ocico +i=+ vc=n cv iocvii+c ucwiei
immicn=+ic ie wioce=nc=o =mcce+ +ic n=e =c=LL=+ic =o +i=+ +iie vc=n i=e m=oc =ceeieLc
oie+Lne=cce wiici i=vc civc = ecnicLe ec+e=c +c ccccmic =nccncee, oc=Lc+co +ic
==Lce+ic cxciccLcn, ncocnco Livc =o =nc=cn+- ieccLnc, =o =ncoLcco = ei++cncee
ec+wcc +ic n=e =o ucwiei =c=LL=+ice wiici ie oc=Lcn=eLc ec+wcc ci+izce cv +ic e=mc
ccL+n-. v i +icec cincLme+=cce immicn=+ic ie cc+iLco L= +c +ic ccccmic =eecn=+ivc
c===ci+- cv +ic ccL+n-, ncc=noLcee cv =LL c+icn cceiocn=+ice, = v=+=L cmi+- ec+wcc +ic
+wc =cc=Lce wiLL ec =cn=c+L=+co, =o +ic ei+L=+ic i ==Lce+ic m=- ecccmc = =cnm=c+
ecLncc cv vnic+ic =mcce+ =LL =cc=Lce i +ic ~c=n =o MiooLc &=e+. ie M=Jce+-e
ccvcnmc+ c=c+ +=c +ic vicw +i=+ ci+icn +icin ceLic=+ice Locn +ic M=o=+c, cn
cceiocn=+ice cv ccmmc ecec =o JLe+icc, nccLinc +i=+ +ic- eicLLo iccnc +icec
cincLme+=cce i vn=mic immicn=+ic =cLic-.
+ic vicw cv +ic nc-=L ccmmieeic +ic =eecci=+ic cv +ic =cLic- cv +ic e=LvcLn cccL=n=+ic
wi+i +ic M=o=+c e-e+cm im=Lico +ic ecLicv +i=+ n=e ice+iLi+- +c +ic vcnmcn wcLLo ecccn
cn L=+cn ec cvcnccmc. + i=e ecc +ic ic=c cv eni+iei ccvcnmc+e cvcn eicc +ic e=LvcLn
cccL=n=+ic w=e ieeLco +i=+ i +imc +ic n=e =c=LL=+ic, nccccieic +ic =ov=+=cce +c ec
ocnivco vncm ucwiei ec++Lcmc+ =o ocvcLc=mc+ i ==Lce+ic, wcLLo ecccmc ncccciLco +c
+ic vLn+icn cncw+i cv +ic ucwiei ~=+ic=L cmc. 1iie ic=c i=e c+ ecc vLLviLLco. 1ic
=L+cn=+ivce ecvcnc ie M=Jce+-e ccvcnmc+ =nc ci+icn ii) +c ecc +c cx==o +ic ucwiei
~=+ic=L cmc iocvii+cL- e- immicn=+ic, =c=ie+ +ic e+nccL- cx=nceeco wiLL cv +ic n=e
=cc=Lc cv +ic ccL+n-; cn iii) +c =cnmi+ vLn+icn cx==eic cv +ic ucwiei ~=+ic=L cmc e-
immicn=+ic cL- iv +ic n=ee =nc =nc==nco +c =ccLicecc i i+. 1ic vcnmcn =cLic- mc=e nLLc
e- vcncc. ==n+ vncm c+icn cceiocn=+ice, eLci = =cLic- eccme +c ie M=Jce+-e ccvcnmc+
+c ec cc+n=n- +c +ic wicLc e=ini+ cv n+icLc && cv +ic ccvc=+ cv +ic Lc=cLc cv ~=+ice,
=e wcLL =e +c +icin e=ccivic ceLic=+ice +c +ic n=ee i +ic ==Lce+ic M=o=+c. Mcnccvcn, +ic
ncL=+ice ec+wcc +ic n=ee =o +ic ucwe i ==Lce+ic mLe+ ec e=eco ecccn cn L=+cn c
mL+L=L +cLcn=cc =o cccowiLL; +ic =c=cc, eccLni+- =o =nccncee cv +ic ucwiei ~=+ic=L
cmc i+ecLv nccLince +iie. 1icncvcnc ie M=Jce+-e ccvcnmc+, =v+cn c=nce+ cceiocn=+ic,
=o +=ic i+c =cccL+ +ic cx+c+ +c wiici +ic cncw+i cv +ic ucwiei ~=+ic=L cmc i=e
ecc v=ciLi+=+co cvcn +ic L=e+ +wc+- -c=ne, i=vc occioco +i=+ +ic +imc i=e ccmc +c =oc=+
i =nici=Lc +ic eccco cv +ic =L+cn=+ivce ncvcnnco +c =ecvc.
+ i=e ecc Lncco +i=+ =LL vLn+icn ucwiei immicn=+ic i+c ==Lce+ic eicLLo ec e+c==co
vcn+iwi+i. ie M=Jce+-e ccvcnmc+ c=c+ =ccc=+ eLci = =nc=ce=L. + wcLLo o=m=cc +ic
wicLc cv +ic vi=ci=L =o ccccmic e-e+cm cv ==Lce+ic =o +iLe cvvcc+ =ovcnecL- +ic
i+cnce+e cv n=ee =o ucwe =Lic. Mcnccvcn, i +ic vicw cv ie M=Jce+-e ccvcnmc+,
=enL=+L- +c e+c= vLn+icn immicn=+ic wcLLo ec LJLe+ +c +ic ucwiei ~=+ic=L cmc. eL+,
=ecvc =LL, ie M=Jce+-e ccvcnmc+ =nc ccecicLe cv +ic =ncec+ Li===- =Lici+ cv L=ncc
Lmecne cv ucwe wic ecc ncvLcc vncm ccn+=i &Lnc=c= ccL+nice, =o +ic- ecLicvc +i=+
==Lce+ic c= =o eicLLo m=c = vLn+icn cc+nieL+ic +c +ic ecLL+ic cv +iie =nceeic wcnLo
=nceLcm. =LL +icec cincLme+=cce, +ic- ecLicvc +i=+ +ic- wiLL ec =c+ic cceie+c+L- wi+i
+icin M=o=+cn- ceLic=+ice +c ec+i n=ee =o ucwe, =o i +ic m=cn ece+ c=LcLL=+co +c
ecnvc +ic i+cnce+e cv +ic wicLc =cc=Lc cv ==Lce+ic, e- =oc=+ic +ic vcLLcwic =nc=ce=Le
ncc=noic immicn=+ic:
ucwiei immicn=+ic oLnic +ic cx+ vivc -c=ne wiLL ec =+ = n=+c wiici, iv ccccmic =eecn=+ivc
c===ci+- =cnmi+e, wiLL enic +ic ucwiei =c=LL=+ic L= +c ===ncxim=+cL- cc +iino cv +ic +c+=L
=c=LL=+ic cv +ic ccL+n-. 1=ic i+c =cccL+ +ic cx=cc+co =+Ln=L icnc=ec cv +ic n=e
=o ucwiei =c=LL=+ice, =o +ic Lmecn cv iLLcc=L ucwiei immicn=+e cw i +ic ccL+n-, +iie
wcLLo =LLcw +ic =omieeic, =e vncm +ic ecciic cv =niL +iie -c=n, cv ecmc e,ccc
immicn=+e cvcn +ic cx+ vivc -c=ne. 1icec immicn=+e wcLLo, eLeJcc+ +c +ic cni+cnic cv
ccccmic =eecn=+ivc c===ci+-, ec =omi++co =e vcLLcwe:
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 538
rcn c=ci cv +ic cx+ vivc -c=ne = cLc+= cv c,ccc ucwiei immicn=+e wiLL ec =LLcwco c +ic
Locne+=oic +i=+ = eicn+=cc cc -c=n m=- ec =ooco +c +ic cLc+=e vcn eLeeccLc+ -c=ne,
wi+ii +ic vivc -c=n =cnico, iv ccccmic =eecn=+ivc c===ci+- =cnmi+e.
=ooi+ic, =e = cc+nieL+ic +cw=noe +ic ecLL+ic cv +ic ucwiei ncvLccc =nceLcm, &e,ccc
ncvLccce wiLL ec =omi++co =e ecc =e +ic ici ccmmieeiccn ie e=+ievico +i=+ =occL=+c
=ncvieic vcn +icin m=i+c=cc ie ceLnco, e=cci=L cceiocn=+ic ecic civc +c ncvLccc
ciiLonc =o oc=coc+e.
1ic cxie+ic m=ciicn- vcn =eccn+=iic ccccmic =eecn=+ivc c===ci+- wiLL ec nc+=ico, =o
+ic ici ccmmieeiccn wiLL i=vc +ic LL+im=+c nce=ceieiLi+- vcn occioic +ic Limi+e cv
ccccmic c===ci+-. ecvcnc c=ci =cnicoic occieic ie +=c, ucwiei =o n=e nc=ncec+=+ivce
wiLL ec cceLL+co.
v+cn +ic =cnico cv vivc -c=ne, c vLn+icn ucwiei immicn=+ic wiLL ec =cnmi++co LLcee +ic
n=ee cv ==Lce+ic =nc =nc==nco +c =ccLicecc i i+.
ie M=Jce+-e ccvcnmc+ =nc oc+cnmico +c cicc iLLcc=L immicn=+ic, =o vLn+icn
=ncvc+ivc mc=eLnce =nc ecic =oc=+co. 1ic Lmecne cv =- ucwiei iLLcc=L immicn=+e wic,
oce=i+c +icec mc=eLnce, m=- eLcccco i ccmic i+c +ic ccL+n- =o c=c+ ec oc=cn+co wiLL
ec ocoLc+co vncm +ic -c=nL- cLc+=e.
ie M=Jce+-e ccvcnmc+ =nc e=+ievico +i=+, wic +ic immicn=+ic cvcn vivc -c=ne wiici ie
cw cc+cm=L=+co i=e +=c =L=cc, +ic- wiLL c+ ec JLe+ivico i v=ciLi+=+ic, cn wiLL +ic- ec
Locn =- ceLic=+ic +c v=ciLi+=+c, +ic vLn+icn ocvcLc=mc+ cv +ic ucwiei ~=+ic=L cmc e-
immicn=+ic ncc=noLcee cv +ic wieice cv +ic n=e =c=LL=+ic.
Section III. Iand
1ic omiie+n=+ic cv ==Lce+ic ie nccLinco, Locn n+icLc e cv +ic M=o=+c, -wiiLc ceLnic
+i=+ +ic nici+e =o =cei+ic cv c+icn ecc+ice cv +ic =c=LL=+ic =nc c+ =ncJLoicco," +c
cccLn=cc -cLcec ec++Lcmc+ e- ucwe c +ic L=o," =o c nce+nic+ic i=e ecc im=ceco
ii+icn+c c +ic +n=evcn cv L=o vncm n=ee +c ucwe. 1ic nc=cn+e cv ecvcn=L cx=cn+
ccmmieeice i=vc ioic=+co +i=+, cwic +c +ic =+Ln=L cncw+i cv +ic n=e =c=LL=+ic =o
+ic e+c=o- e=Lc i nccc+ -c=ne cv n=e L=o +c ucwe, +icnc ie cw i ccn+=i =nc=e c nccm
vcn vLn+icn +n=evcne cv n=e L=o, wiiLe+ i ecmc c+icn =nc=e eLci +n=evcne cv L=o mLe+
ec nce+nic+co iv n=e cLL+iv=+cne =nc +c m=i+=i +icin cxie+ic e+=o=no cv Livc =o =
cceiocn=eLc L=oLcee n=e =c=LL=+ic ie c+ ecc +c ec cnc=+co. +icec cincLme+=cce,
+ic ici ccmmieeiccn wiLL ec civc cccn=L =cwcne +c =nciiei+ =o nccLL=+c +n=evcne cv
L=o. 1icec =cwcne wiLL o=+c vncm +ic =LeLic=+ic cv +iie e+=+cmc+ cv =cLic- =o +ic ici
ccmmieeiccn wiLL nc+=i +icm +incLcicL+ +ic +n=ei+ic=L =cnico.
1ic =cLic- cv +ic ccvcnmc+ wiLL ec oincc+co +cw=noe +ic ocvcLc=mc+ cv +ic L=o =o +ic
im=ncvcmc+, wicnc =ceeieLc, cv mc+icoe cv cLL+iv=+ic. +ic Lici+ cv eLci ocvcLc=mc+ i+
wiLL ec c=c +c +ic ici ccmmieeiccn, eicLLo ic ec e=+ievico +i=+ +ic -nici+e =o =cei+ic"
cv +ic n=e =c=LL=+ic wiLL ec oLL- =ncecnvco, +c ncvicw =o mcoiv- =- cnocne ==eeco
ncL=+ic +c +ic =nciiei+ic cn nce+nic+ic cv +ic +n=evcn cv L=o.
vn=mic +icec =nc=ce=Le ie M=Jce+-e ccvcnmc+ i=vc eiccncL- coc=vcLnco +c =c+ i
e+nic+ =cccno=cc wi+i +icin ceLic=+ice Locn +ic M=o=+c +c ec+i +ic n=ee =o +ic ucwe.
1ic v=cLccee cv +ic =in=ece cm=Lc-co i ecmc ie+=cce +c ocecniec +icec ceLic=+ice i=e
Lco +c cc+ncvcne- =o i=e m=oc +ic +=e cv i+cn=nc+=+ic oivvicLL+. ie M=Jce+-e
ccvcnmc+ c=c+ ic=c +c e=+iev- +ic ==n+ie=e cv cc ==n+- cn +ic c+icn i eLci
cc+ncvcne- =e +ic M=o=+c i=e =ncLeco. 1icin =Ln=cec ie +c ec JLe+ =e ec+wcc +ic +wc
=cc=Lc i ==Lce+ic wicec oce+iice i +i=+ ccL+n- i=vc ecc =vvcc+co e- +ic cnc=+ cvc+e
cv nccc+ -c=ne, =o wic, eicc +ic- Livc eioc e- eioc, mLe+ Lc=n +c =n=c+icc mL+L=L
+cLcn=cc, cccowiLL =o ccc=cn=+ic. Lccic +c +ic vL+Lnc, ie M=Jce+-e ccvcnmc+ =nc
c+ eLio +c +ic v=c+ +i=+ ecmc cvc+e cv +ic ==e+ m=c +ic +=e cv cnc=+ic +icec ncL=+ice
oivvicLL+; eL+ +ic- =nc cccLn=cco e- +ic cwLcocc +i=+ =+ m=- +imce =o i m=- =L=cce
i ==Lce+ic oLnic nccc+ -c=ne +ic n=e =o ucwiei ii=ei+=+e i=vc Livco i vnicoeii=
+ccc+icn. &=ci ccmmLi+- i=e mLci +c cc+nieL+c +c +ic wcLv=nc cv +icin ccmmc L=o, =o
c=ci mLe+ c=nce+L- oceinc =c=cc i wiici +c =eeie+ i icnc=eic +ic wcLL-ecic cv +ic wicLc
=cc=Lc cv +ic ccL+n-. 1ic nce=ceieiLi+- wiici v=LLe c +icm, c Lcee +i= L=c ie
M=Jce+-e ccvcnmc+, +c ccc=cn=+c +ccc+icn +c ceLnc =c=cc ie =LL +ic mcnc ecLcm
ecc=Lec +icin ccL+n- ie ncvcnco e- m=- miLLice cv MceLcme, ucwe =o cinie+i=e
+incLcicL+ +ic wcnLo wic =n=- vcn =c=cc i ==Lce+ic =o vcn +ic i===icee cv icn =cc=Lc.
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 539
The Palestine Mandate, 2+
th
]ul, l922
The Council of the Ieague of Nations:
vicnc=e +ic =nici==L LLico =cwcne i=vc =cncco, vcn +ic =Ln=cec cv civic cvvcc+ +c +ic
=ncvieice cv n+icLc && cv +ic ccvc=+ cv +ic Lc=cLc cv ~=+ice, +c c+nLe+ +c =
M=o=+cn- ecLcc+co e- +ic e=io =cwcne +ic =omiie+n=+ic cv +ic +cnni+cn- cv ==Lce+ic,
wiici vcnmcnL- ecLccco +c +ic 1Lniei &m=inc, wi+ii eLci ecLo=nice =e m=- ec vixco e-
+icm; =o
vicnc=e +ic =nici==L LLico =cwcne i=vc =Lec =cncco +i=+ +ic M=o=+cn- eicLLo ec
nce=ceieLc vcn =L++ic i+c cvvcc+ +ic occL=n=+ic cnici=LL- m=oc c ~cvcmecn &
o
, =,
e- +ic ccvcnmc+ cv ie eni+=ic M=Jce+-, =o =oc=+co e- +ic e=io =cwcne, i v=vcn cv +ic
ce+=eLieimc+ i ==Lce+ic cv = =+ic=L icmc vcn +ic ucwiei =cc=Lc, i+ ecic cLc=nL-
Locne+cco +i=+ c+iic eicLLo ec occ wiici mici+ =ncJLoicc +ic civiL =o ncLicicLe nici+e
cv cxie+ic c-ucwiei ccmmLi+ice i ==Lce+ic, cn +ic nici+e =o =cLi+ic=L e+=+Le cJc-co
e- ucwe i =- c+icn ccL+n-; =o
vicnc=e ncccci+ic i=e +icnce- ecc civc +c +ic iie+cnic=L cccc+ic cv +ic ucwiei
=cc=Lc wi+i ==Lce+ic =o +c +ic cncLoe vcn nccce+i+L+ic +icin =+ic=L icmc i +i=+
ccL+n-; =o
vicnc=e +ic =nici==L LLico =cwcne i=vc ecLcc+co ie eni+=ic M=Jce+- =e +ic M=o=+cn-
vcn ==Lce+ic; =o
vicnc=e +ic m=o=+c i nce=cc+ cv ==Lce+ic i=e ecc vcnmLL=+co i +ic vcLLcwic +cnme =o
eLemi++co +c +ic ccLciL cv +ic Lc=cLc vcn ===ncv=L; =o
vicnc=e ie eni+=ic M=Jce+- i=e =ccc=+co +ic m=o=+c i nce=cc+ cv ==Lce+ic =o
Locn+=c +c cxcnciec i+ c eci=Lv cv +ic Lc=cLc cv ~=+ice i ccvcnmi+- wi+i +ic
vcLLcwic =ncvieice; =o
vicnc=e e- +ic =vcnc-mc+icco n+icLc && i==n=cn==i e), i+ ie =ncvioco +i=+ +ic occncc cv
=L+icni+-, cc+ncL cn =omiie+n=+ic +c ec cxcncieco e- +ic M=o=+cn-, c+ i=vic ecc
=ncvicLeL- =cncco L=c e- +ic Mcmecne cv +ic Lc=cLc, ei=LL ec cx=Lici+L- ocvico e- +ic
ccLciL cv +ic Lc=cLc cv ~=+ice;
ccvinmic +ic e=io M=o=+c, ocvice i+e +cnme =e vcLLcwe:
AFT. l.
1ic M=o=+cn- ei=LL i=vc vLLL =cwcne cv LccieL=+ic =o cv =omiie+n=+ic, e=vc =e +ic- m=-
ec Limi+co e- +ic +cnme cv +iie m=o=+c.
AFT. 2.
1ic M=o=+cn- ei=LL ec nce=ceieLc vcn =L=cic +ic ccL+n- Locn eLci =cLi+ic=L,
=omiie+n=+ivc =o ccccmic ccoi+ice =e wiLL eccLnc +ic ce+=eLieimc+ cv +ic ucwiei
=+ic=L icmc, =e L=io ocw i +ic =nc=meLc, =o +ic ocvcLc=mc+ cv ecLv-ccvcnic
ie+i+L+ice, =o =Lec vcn e=vccL=noic +ic civiL =o ncLicicLe nici+e cv =LL +ic ii=ei+=+e
cv ==Lce+ic, innce=cc+ivc cv n=cc =o ncLicic.
AFT. 3.
1ic M=o=+cn- ei=LL, ec v=n =e cincLme+=cce =cnmi+, cccLn=cc Lcc=L =L+ccm-.
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 540
AFT. +.
===nc=ni=+c ucwiei =ccc- ei=LL ec nccccieco =e = =LeLic eco- vcn +ic =Ln=cec cv
=ovieic =o ccc=cn=+ic wi+i +ic omiie+n=+ic cv ==Lce+ic i eLci ccccmic, ecci=L =o
c+icn m=++cne =e m=- =vvcc+ +ic ce+=eLieimc+ cv +ic ucwiei =+ic=L icmc =o +ic
i+cnce+e cv +ic ucwiei =c=LL=+ic i ==Lce+ic, =o, eLeJcc+ =Lw=-e +c +ic cc+ncL cv +ic
omiie+n=+ic, +c =eeie+ =o +=c ==n+ i +ic ocvcLc=mc+ cv +ic ccL+n-.
1ic zicie+ cnc=ie=+ic, ec Lcc =e i+e cnc=ie=+ic =o cce+i+L+ic =nc i +ic c=iic cv
+ic M=o=+cn- ===nc=ni=+c, ei=LL ec nccccieco =e eLci =ccc-. + ei=LL +=c e+c=e i
cceLL+=+ic wi+i ie eni+=ic M=Jce+-e ccvcnmc+ +c eccLnc +ic ccc=cn=+ic cv =LL ucwe
wic =nc wiLLic +c =eeie+ i +ic ce+=eLieimc+ cv +ic ucwiei =+ic=L icmc.
AFT. 5.
1ic M=o=+cn- ei=LL ec nce=ceieLc vcn eccic +i=+ c ==Lce+ic +cnni+cn- ei=LL ec ccoco
cn Lc=eco +c, cn i =- w=- =L=cco Locn +ic cc+ncL cv +ic ccvcnmc+ cv =- vcncic
=cwcn.
AFT. 6.
1ic omiie+n=+ic cv ==Lce+ic, wiiLc ceLnic +i=+ +ic nici+e =o =cei+ic cv c+icn
ecc+ice cv +ic =c=LL=+ic =nc c+ =ncJLoicco, ei=LL v=ciLi+=+c ucwiei immicn=+ic Locn
eLi+=eLc ccoi+ice =o ei=LL cccLn=cc, i ccc=cn=+ic wi+i +ic ucwiei =ccc- ncvcnnco +c
i n+icLc , cLcec ec++Lcmc+ e- ucwe c +ic L=o, icLLoic e+=+c L=oe =o w=e+c L=oe
c+ nccLinco vcn =LeLic =Ln=cece.
AFT. .
1ic omiie+n=+ic cv ==Lce+ic ei=LL ec nce=ceieLc vcn c=c+ic = =+ic=Li+- L=w. 1icnc
ei=LL ec icLLoco i +iie L=w =ncvieice vn=mco ec =e +c v=ciLi+=+c +ic =ccLiei+ic cv
==Lce+ii= ci+izceii= e- ucwe wic +=c L= +icin =cnm=c+ nceioccc i ==Lce+ic.
AFT. 8.
1ic =niviLccce =o immLi+ice cv vcnciccne, icLLoic +ic eccvi+e cv cceLL=n JLnieoic+ic
=o =nc+cc+ic =e vcnmcnL- cJc-co e- c==i+LL=+ic cn Le=cc i +ic c++cm= &m=inc, ei=LL
c+ ec ===Lic=eLc i ==Lce+ic.
ULcee +ic =cwcne wicec =+ic=Le cJc-co +ic =vcnc-mc+icco =niviLccce =o immLi+ice
c LcLe+ e+, =, ei=LL i=vc =ncvicLeL- nccLcco +ic nici+ +c +icin nc-ce+=eLieimc+,
cn ei=LL i=vc =cncco +c +icin c-===Lic=+ic vcn = e=ccivico =cnico, +icec =niviLccce =o
immLi+ice ei=LL, =+ +ic cx=in=+ic cv +ic m=o=+c, ec immcoi=+cL- ncce+=eLieico i +icin
c+inc+- cn wi+i eLci mcoivic=+ice =e m=- i=vc ecc =cncco L=c ec+wcc +ic =cwcne
ccccnco.
AFT. 9.
1ic M=o=+cn- ei=LL ec nce=ceieLc vcn eccic +i=+ +ic JLoici=L e-e+cm ce+=eLieico i
==Lce+ic ei=LL =eeLnc +c vcnciccne, =e wcLL =e +c =+ivce, = ccm=Lc+c cL=n=+cc cv +icin
nici+e.
nce=cc+ vcn +ic =cnec=L e+=+Le cv +ic v=nicLe =cc=Lce =o ccmmLi+ice =o vcn +icin
ncLicicLe i+cnce+e ei=LL ec vLLL- cL=n=+cco. ==n+icLL=n, +ic cc+ncL =o =omiie+n=+ic
cv v=ve ei=LL ec cxcncieco i =cccno=cc wi+i ncLicicLe L=w =o +ic oie=cei+ice cv +ic
vcLocne.
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 541
AFT. l0.
=coic +ic m=ic cv e=cci=L cx+n=oi+ic =cnccmc+e ncL=+ic +c ==Lce+ic, +ic cx+n=oi+ic
+nc=+ice i vcncc ec+wcc +ic M=o=+cn- =o c+icn vcncic =cwcne ei=LL ===L- +c ==Lce+ic.
AFT. ll.
1ic omiie+n=+ic cv ==Lce+ic ei=LL +=c =LL cccee=n- mc=eLnce +c e=vccL=no +ic
i+cnce+e cv +ic ccmmLi+- i cccc+ic wi+i +ic ocvcLc=mc+ cv +ic ccL+n-, =o, eLeJcc+
+c =- i+cn=+ic=L ceLic=+ice =ccc=+co e- +ic M=o=+cn-, ei=LL i=vc vLLL =cwcn +c
=ncvioc vcn =LeLic cwcneii= cn cc+ncL cv =- cv +ic =+Ln=L ncecLncce cv +ic ccL+n- cn
cv +ic =LeLic wcne, ecnvicce =o L+iLi+ice ce+=eLieico cn +c ec ce+=eLieico +icnci. + ei=LL
i+ncoLcc = L=o e-e+cm ===nc=ni=+c +c +ic ccoe cv +ic ccL+n-, i=vic ncc=no, =mcc
c+icn +iice, +c +ic ocein=eiLi+- cv =ncmc+ic +ic cLcec ec++Lcmc+ =o i+ceivc cLL+iv=+ic
cv +ic L=o.
1ic omiie+n=+ic m=- =nn=cc wi+i +ic ucwiei =ccc- mc+icco i n+icLc +c cce+nLc+
cn c=cn=+c, L=c v=in =o ccLi+=eLc +cnme, =- =LeLic wcne, ecnvicce =o L+iLi+ice, =o +c
ocvcLc= =- cv +ic =+Ln=L ncecLncce cv +ic ccL+n-, i ec v=n =e +icec m=++cne =nc c+
oincc+L- Locn+=c e- +ic omiie+n=+ic. - eLci =nn=ccmc+e ei=LL =ncvioc +i=+ c
=ncvi+e oie+nieL+co e- eLci =ccc-, oincc+L- cn ioincc+L-, ei=LL cxccco = nc=ec=eLc n=+c
cv i+cnce+ c +ic c==i+=L, =o =- vLn+icn =ncvi+e ei=LL ec L+iLieco e- i+ vcn +ic eccvi+ cv
+ic ccL+n- i = m=cn ===ncvco e- +ic omiie+n=+ic.
AFT. l2.
1ic M=o=+cn- ei=LL ec c+nLe+co wi+i +ic cc+ncL cv +ic vcncic ncL=+ice cv ==Lce+ic
=o +ic nici+ +c ieeLc cxccL=+Lne +c cceLLe ===ci+co e- vcncic =cwcne. c ei=LL =Lec
ec c+i+Lco +c =vvcno oi=Lcm=+ic =o cceLL=n =nc+cc+ic +c ci+izce cv ==Lce+ic wic
cL+eioc i+e +cnni+cni=L Limi+e.
AFT. l3.
LL nce=ceieiLi+- i cccc+ic wi+i +ic cL- =L=cce =o ncLicicLe eLiLoice cn ei+ce i
==Lce+ic, icLLoic +i=+ cv =ncecnvic cxie+ic nici+e =o cv eccLnic vncc =cccee +c +ic
cL- =L=cce, ncLicicLe eLiLoice =o ei+ce =o +ic vncc cxcnciec cv wcneii=, wiiLc ceLnic
+ic nccLincmc+e cv =LeLic cnocn =o occcnLm, ie =eeLmco e- +ic M=o=+cn-, wic ei=LL ec
nce=ceieLc ecLcL- +c +ic Lc=cLc cv ~=+ice i =LL m=++cne cccc+co icncwi+i, =ncvioco
+i=+ c+iic i +iie =n+icLc ei=LL =ncvc+ +ic M=o=+cn- vncm c+cnic i+c eLci
=nn=ccmc+e =e ic m=- occm nc=ec=eLc wi+i +ic omiie+n=+ic vcn +ic =Ln=cec cv c=nn-ic
+ic =ncvieice cv +iie =n+icLc i+c cvvcc+; =o =ncvioco =Lec +i=+ c+iic i +iie m=o=+c
ei=LL ec cce+nLco =e ccvcnnic L=c +ic M=o=+cn- =L+icni+- +c i+cnvcnc wi+i +ic v=enic
cn +ic m==ccmc+ cv =LncL- MceLcm e=cnco einice, +ic immLi+ice cv wiici =nc cL=n=+cco.
AFT. l+.
e=cci=L ccmmieeic ei=LL ec ===ci+co e- +ic M=o=+cn- +c e+Lo-, ocvic =o oc+cnmic +ic
nici+e =o cL=ime i cccc+ic wi+i +ic cL- =L=cce =o +ic nici+e =o cL=ime ncL=+ic +c
+ic oivvcnc+ ncLicicLe ccmmLi+ice i ==Lce+ic. 1ic mc+ico cv cmi=+ic, +ic ccm=cei+ic
=o +ic vLc+ice cv +iie ccmmieeic ei=LL ec eLemi++co +c +ic ccLciL cv +ic Lc=cLc vcn
i+e ===ncv=L, =o +ic ccmmieeic ei=LL c+ ec ===ci+co cn c+cn L=c i+e vLc+ice wi+icL+
+ic ===ncv=L cv +ic ccLciL.
AFT. l5.
1ic M=o=+cn- ei=LL ecc +i=+ ccm=Lc+c vnccocm cv cceciccc =o +ic vncc cxcnciec cv =LL
vcnme cv wcneii=, eLeJcc+ cL- +c +ic m=i+c=cc cv =LeLic cnocn =o mcn=Le, =nc ceLnco
+c =LL. ~c oiecnimi=+ic cv =- io ei=LL ec m=oc ec+wcc +ic ii=ei+=+e cv ==Lce+ic c
+ic cncLo cv n=cc, ncLicic cn L=cL=cc. ~c =cnec ei=LL ec cxcLLoco vncm ==Lce+ic c
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 542
+ic ecLc cncLo cv iie ncLicicLe ecLicv.
1ic nici+ cv c=ci ccmmLi+- +c m=i+=i i+e cw eciccLe vcn +ic coLc=+ic cv i+e cw
mcmecne i i+e cw L=cL=cc, wiiLc ccvcnmic +c eLci coLc=+ic=L nccLincmc+e cv =
cccn=L =+Lnc =e +ic omiie+n=+ic m=- im=cec, ei=LL c+ ec ocico cn im==inco.
AFT. l6.
1ic M=o=+cn- ei=LL ec nce=ceieLc vcn cxcncieic eLci eL=cnvieic cvcn ncLicicLe cn
cLccmce-=n- ecoice cv =LL v=i+ie i ==Lce+ic =e m=- ec nccLinco vcn +ic m=i+c=cc cv
=LeLic cnocn =o ccco ccvcnmc+. eLeJcc+ +c eLci eL=cnvieic, c mc=eLnce ei=LL ec +=c
i ==Lce+ic +c cee+nLc+ cn i+cnvcnc wi+i +ic c+cn=niec cv eLci ecoice cn +c oiecnimi=+c
=c=ie+ =- nc=ncec+=+ivc cn mcmecn cv +icm c +ic cncLo cv iie ncLicic cn =+ic=Li+-.
AFT. l.
1ic omiie+n=+ic cv ==Lce+ic m=- cnc=iec c = vcLL+=n- e=eie +ic vcncce cccee=n- vcn
+ic =ncecnv=+ic cv =c=cc =o cnocn, =o =Lec vcn +ic ocvccc cv +ic ccL+n-, eLeJcc+,
icwcvcn, +c +ic eL=cnvieic cv +ic M=o=+cn-, eL+ ei=LL c+ Lec +icm vcn =Ln=cece c+icn
+i= +icec =ecvc e=ccivico e=vc wi+i +ic ccec+ cv +ic M=o=+cn-. &xcc=+ vcn eLci
=Ln=cece, c miLi+=n-, =v=L cn =in vcncce ei=LL ec n=ieco cn m=i+=ico e- +ic omiie+n=+ic
cv ==Lce+ic.
~c+iic i +iie =n+icLc ei=LL =nccLLoc +ic omiie+n=+ic cv ==Lce+ic vncm cc+nieL+ic +c
+ic cce+ cv +ic m=i+c=cc cv +ic vcncce cv +ic M=o=+cn- i ==Lce+ic.
1ic M=o=+cn- ei=LL ec c+i+Lco =+ =LL +imce +c Lec +ic nc=oe, n=iLw=-e =o =cn+e cv
==Lce+ic vcn +ic mcvcmc+ cv =nmco vcncce =o +ic c=nni=cc cv vLcL =o eL==Lice.
AFT. l8.
1ic M=o=+cn- ei=LL ecc +i=+ +icnc ie c oiecnimi=+ic i ==Lce+ic =c=ie+ +ic =+ic=Le
cv =- e+=+c Mcmecn cv +ic Lc=cLc cv ~=+ice iicLLoic ccm==ice iccn=cn=+co Locn i+e
L=we) =e ccm==nco wi+i +icec cv +ic M=o=+cn- cn cv =- vcncic e+=+c i m=++cne
ccccnic +=x=+ic, ccmmcncc cn =vic=+ic, +ic cxcnciec cv ioLe+nice cn =ncvceeice, cn
i +ic +nc=+mc+ cv mcnci=+ vceecLe cn civiL =incn=v+. eimiL=nL-, +icnc ei=LL ec c
oiecnimi=+ic i ==Lce+ic =c=ie+ cccoe cnici=+ic i cn oce+ico vcn =- cv +ic e=io
e+=+ce, =o +icnc ei=LL ec vnccocm cv +n=ei+ Locn ccLi+=eLc ccoi+ice =cncee +ic
m=o=+co =nc=.
eLeJcc+ =e =vcnce=io =o +c +ic c+icn =ncvieice cv +iie m=o=+c, +ic omiie+n=+ic cv
==Lce+ic m=-, c +ic =ovicc cv +ic M=o=+cn-, im=cec eLci +=xce =o cLe+cme oL+ice =e i+
m=- cceiocn cccee=n-, =o +=c eLci e+c=e =e i+ m=- +ii ece+ +c =ncmc+c +ic ocvcLc=mc+
cv +ic =+Ln=L ncecLncce cv +ic ccL+n- =o +c e=vccL=no +ic i+cnce+e cv +ic =c=LL=+ic.
+ m=- =Lec, c +ic =ovicc cv +ic M=o=+cn-, cccLLoc = e=cci=L cLe+cme =cnccmc+ wi+i =-
e+=+c +ic +cnni+cn- cv wiici i = w=e wicLL- icLLoco i ei=+ic 1Lnc- cn n=ei=.
AFT. l9.
1ic M=o=+cn- ei=LL =oicnc c eci=Lv cv +ic omiie+n=+ic cv ==Lce+ic +c =- cccn=L
i+cn=+ic=L ccvc+ice =Lnc=o- cxie+ic, cn wiici m=- ec cccLLoco icnc=v+cn wi+i +ic
===ncv=L cv +ic Lc=cLc cv ~=+ice, nce=cc+ic +ic eL=vc +n=vvic, +ic +n=vvic i =nme =o
=mmLi+ic, cn +ic +n=vvic i onLce, cn ncL=+ic +c ccmmcnci=L ccL=Li+-, vnccocm cv +n=ei+
=o =vic=+ic, =cni=L =vic=+ic =o =ce+=L, +cLccn==iic =o wincLcee ccmmLic=+ic cn
Li+cn=n-, =n+ie+ic cn ioLe+ni=L =nc=cn+-.
AFT. 20.
1ic M=o=+cn- ei=LL ccc=cn=+c c eci=Lv cv +ic omiie+n=+ic cv ==Lce+ic, ec v=n =e
ncLicicLe, ecci=L =o c+icn ccoi+ice m=- =cnmi+, i +ic cxccL+ic cv =- ccmmc =cLic-
=oc=+co e- +ic Lc=cLc cv ~=+ice vcn =ncvc+ic =o ccme=+ic oiec=ec, icLLoic oiec=ece
cv =L=+e =o =im=Le.
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 543
AFT. 2l.
1ic M=o=+cn- ei=LL eccLnc +ic c=c+mc+ wi+ii +wcLvc mc+ie vncm +iie o=+c, =o ei=LL
ceLnc +ic cxccL+ic cv = L=w cv +icLi+ice e=eco c +ic vcLLcwic nLLce. 1iie L=w ei=LL
ceLnc ccL=Li+- cv +nc=+mc+ i +ic m=++cn cv cxc=v=+ice =o =nci=ccLccic=L ncec=nci +c
+ic =+ic=Le cv =LL e+=+ce Mcmecne cv +ic Lc=cLc cv ~=+ice.
i) -+icLi+-" mc=e =- cce+nLc+ic cn =- =ncoLc+ cv iLm= =c+ivi+- c=nLicn +i= +ic
-c=n cc . c.
i&) 1ic L=w vcn +ic =nc+cc+ic cv =+icLi+ice ei=LL =ncccco e- cccLn=ccmc+ n=+icn +i=
e- +inc=+.
- =cnec wic, i=vic oieccvcnco = =+icLi+- wi+icL+ ecic vLnieico wi+i +ic
=L+icnie=+ic ncvcnnco +c i ==n=cn==i e, nc=cn+e +ic e=mc +c = cvvici=L cv +ic ccm=c+c+
cc==n+mc+, ei=LL ec ncw=noco =cccnoic +c +ic v=LLc cv +ic oieccvcn-.
iz) ~c =+icLi+- m=- ec oie=ceco cv cxcc=+ +c +ic ccm=c+c+ cc==n+mc+, LLcee +iie
cc==n+mc+ nccLcce +ic =ccLiei+ic cv =- eLci =+icLi+-.
~c =+icLi+- m=- Lc=vc +ic ccL+n- wi+icL+ = cx=cn+ Licccc vncm +ic e=io cc==n+mc+.
i) - =cnec wic m=LicicLeL- cn ccLicc+L- oce+nc-e cn o=m=cce = =+icLi+- ei=LL ec
Li=eLc +c = =c=L+- +c ec vixco.
ie) ~c cLc=nic cv cncLo cn oiccic wi+i +ic ceJcc+ cv vioic =+icLi+ice ei=LL ec =cnmi++co,
Locn =c=L+- cv vic, cxcc=+ +c =cnece =L+icnieco e- +ic ccm=c+c+ cc==n+mc+.
ie) &cLi+=eLc +cnme ei=LL ec vixco vcn cx=nc=ni=+ic, +cm=cn=n- cn =cnm=c+, cv L=oe wiici
mici+ ec cv iie+cnic=L cn =nci=ccLccic=L i+cnce+.
i) L+icniz=+ic +c cxc=v=+c ei=LL cL- ec cn=+co +c =cnece wic eicw eLvvicic+
cL=n=+cce cv =nci=ccLccic=L cx=cniccc. 1ic omiie+n=+ic cv ==Lce+ic ei=LL c+, i
cn=+ic +icec =L+icnie=+ice, =c+ i eLci = w=- =e +c cxcLLoc ecicL=ne cv =- =+ic
wi+icL+ ccco cncLoe.
ie) 1ic =nccccoe cv cxc=v=+ice m=- ec oivioco ec+wcc +ic cxc=v=+cn =o +ic ccm=c+c+
cc==n+mc+ i = =nc=cn+ic vixco e- +i=+ cc==n+mc+. v oivieic eccme im=ceeieLc vcn
ecic+ivic nc=ece, +ic cxc=v=+cn ei=LL ncccivc = v=in iocmi+- i LicL cv = ==n+ cv +ic vio.
AFT. 22.
&cLiei, n=eic =o cencw ei=LL ec +ic cvvici=L L=cL=cce cv ==Lce+ic. - e+=+cmc+ cn
iecni=+ic i n=eic c e+=m=e cn mcc- i ==Lce+ic ei=LL ec nc=c=+co i cencw =o =-
e+=+cmc+ cn iecni=+ic i cencw ei=LL ec nc=c=+co i n=eic.
AFT. 23.
1ic omiie+n=+ic cv ==Lce+ic ei=LL ncccciec +ic icL- o=-e cv +ic nce=cc+ivc ccmmLi+ice
i ==Lce+ic =e Lcc=L o=-e cv nce+ vcn +ic mcmecne cv eLci ccmmLi+ice.
AFT. 2+.
1ic M=o=+cn- ei=LL m=c +c +ic ccLciL cv +ic Lc=cLc cv ~=+ice = =L=L nc=cn+ +c +ic
e=+iev=c+ic cv +ic ccLciL =e +c +ic mc=eLnce +=c oLnic +ic -c=n +c c=nn- cL+ +ic
=ncvieice cv +ic m=o=+c. cc=ice cv =LL L=we =o nccLL=+ice =ncmLLc=+co cn ieeLco oLnic
+ic -c=n ei=LL ec ccmmLic=+co wi+i +ic nc=cn+.
ANNEX R/ Balfour Declaration/White Papers/League of Nations Palestine Mandate 544
AFT. 25.
+ic +cnni+cnice L-ic ec+wcc +ic ucno= =o +ic c=e+cn ecLo=n- cv ==Lce+ic =e
LL+im=+cL- oc+cnmico, +ic M=o=+cn- ei=LL ec c+i+Lco, wi+i +ic ccec+ cv +ic ccLciL cv
+ic Lc=cLc cv ~=+ice, +c =ce+=cc cn wi+iicLo ===Lic=+ic cv eLci =ncvieice cv +iie
m=o=+c =e ic m=- cceiocn i===Lic=eLc +c +ic cxie+ic Lcc=L ccoi+ice, =o +c m=c eLci
=ncvieic vcn +ic =omiie+n=+ic cv +ic +cnni+cnice =e ic m=- cceiocn eLi+=eLc +c +icec
ccoi+ice, =ncvioco +i=+ c =c+ic ei=LL ec +=c wiici ie icceie+c+ wi+i +ic =ncvieice
cv n+icLce e, e =o e.
AFT. 26.
1ic M=o=+cn- =cncce +i=+, iv =- oie=L+c wi=+cvcn eicLLo =niec ec+wcc +ic M=o=+cn- =o
=c+icn mcmecn cv +ic Lc=cLc cv ~=+ice ncL=+ic +c +ic i+cn=nc+=+ic cn +ic ===Lic=+ic
cv +ic =ncvieice cv +ic m=o=+c, eLci oie=L+c, iv i+ c=c+ ec ec++Lco e- ccc+i=+ic, ei=LL
ec eLemi++co +c +ic =cnm=c+ ccLn+ cv +cn=+ic=L uLe+icc =ncvioco vcn e- n+icLc cv
+ic ccvc=+ cv +ic Lc=cLc cv ~=+ice.
AFT. 2.
1ic ccec+ cv +ic ccLciL cv +ic Lc=cLc cv ~=+ice ie nccLinco vcn =- mcoivic=+ic cv +ic
+cnme cv +iie m=o=+c.
AFT. 28.
+ic cvc+ cv +ic +cnmi=+ic cv +ic m=o=+c icnce- ccvcnnco L=c +ic M=o=+cn-, +ic
ccLciL cv +ic Lc=cLc cv ~=+ice ei=LL m=c eLci =nn=ccmc+e =e m=- ec occmco cccee=n-
vcn e=vccL=noic i =cn=c+Li+-, Locn cL=n=+cc cv +ic Lc=cLc, +ic nici+e eccLnco e-
n+icLce z =o , =o ei=LL Lec i+e ivLLccc vcn eccLnic, Locn +ic cL=n=+cc cv +ic
Lc=cLc, +i=+ +ic ccvcnmc+ cv ==Lce+ic wiLL vLLL- iccLn +ic vi=ci=L ceLic=+ice
Lcci+im=+cL- icLnnco e- +ic omiie+n=+ic cv ==Lce+ic oLnic +ic =cnico cv +ic m=o=+c,
icLLoic +ic nici+e cv =LeLic ecnv=+e +c =ceice cn cn=+Li+ice.
1ic =ncec+ ie+nLmc+ ei=LL ec oc=cei+co i cnici=L i +ic =nciivce cv +ic Lc=cLc cv
~=+ice =o ccn+ivico cc=ice ei=LL ec vcnw=noco e- +ic eccnc+=n--cccn=L cv +ic Lc=cLc cv
~=+ice +c =LL mcmecne cv +ic Lc=cLc.
ccc =+ Lcoc +ic +wc+--vcLn+i o=- cv uLL-, cc +icLe=o ic iLonco =o +wc+--+wc.
Annex S/ Further Reading 545
Annex S: Further Reading
NAME AUTHOR PUBL. ISBN /
REF.
REMARKS
The Operators
James
Rennie
Century 0712677305 About 14 Intelligence Company:
UKs top secret army elite
(counter-terrorism intelligence
gathering).
Dark Nature
Lyall
Watson
Hodder
&
Stoughton
034061787X Bio-Philosophical view of
anthropology, especially human
nature, survival and evil.
Witch Craze
Anne Barstow Harper Collins 006250049X A history of the Witch killings.
Birth of a Tragedy
Alastair Lamb Roxford Books 0907129072 History of the Kashmir dispute.
Before Their Diaspora
Walid
Khalidi
Institute for
Palestine
Studies,
Washington DC
0887282288 Photographic history of the
Palestinians 1876-1948.
The Killing of SS
Obergruppenfhrer
Reinhard Heydrich
Callum
MacDonald
Papermac 0333540263 Operation Anthropoid - the
assassination of the head of the
Nazi security police and
Governor of occupied Bohemia
and Moravia.
Dirty Tricks or Trump
Cards?
Roy
Godson
Transaction
Publishers
076580699 US Covert Action and Counter-
Intelligence. The author was
l ar gel y r esponsi bl e f or
institutionalising the teaching of
I nt el l i gence St udi es at
University-level in the English-
speaking world.
The Knights of Bushido
Lord Russel
of Liverpool
Cassell 1
st
print 1958 Imperial Japanese War Crimes.
The Scourge of the Swastika
Lord Russel
of Liverpool
Cassell 1
st
print 1954 Nazi War Crimes.
Encyclopaedia of Espionage
Norman Polmar;
Thomas Allen
Gramercy 051720269 A comprehensive work.
A Touch of Genius
Malcolm Brown;
Julia Cave
Paragon
House
1557782032 Life of Lt/Colonel T. E.
Lawrence.
The Nazis and the Occult
Dusty Sklar Dorset 0880294124 The foundation of the 3
rd
Reich.
Terrorism Today: The Past,
The Players, The Future
Clifford Simonsen;
Jeremy Spindlove
Prentice
Hall
0023017317 The history of contemporary
terrorism. Well presented in a
learning format.
Course Epilogue 546
COURSE EPILOGUE
Most of the terrorism in the world is under control or at least manageable by governments.
Given the limited resources spent on suppressing (pre-9/11) terrorism (which were certainly nowhere
near approaching what security forces would ideally desire), vis vis the sometimes enormous sums
spent on trivia, most governments clearly viewed the status quo, as the solution to terrorism; as a
type of low intensity conflict in which some casualties would inevitably be taken.
In a few locations, terrorism is at a dangerous level, such as Algeria, Kashmir, Sudan and the
Middle East, where a significant number of victims are regularly generated. In the Middle East and
Kashmir, terrorism has the clear potential to threaten regional peace between those [nuclear] nations.
In most other countries suffering terrorist campaigns, death and injuries from terrorism are
a tiny fraction of those caused by conventional criminal murder and wounding; and this is the
political crux of the issue - loss of life by political and unlawful violence. Most countries have
suffered intermittent terrorism for decades now (as conventional crime went on to outpace it) and
are conditioned by the absence of effective preventative political action, to almost accept it as a
hazard of modern life.
The real challenge (or danger) comes from Osama bin Laden and Al Qaida. Afghanistan was
taken over and run by what are indisputably terrorists (in a modern, widely accepted understanding
of the word, in which random innocent civilian victims are murdered for what are clearly not
conventional criminal motives). The first terrorist state came into existence in Afghanistan, until it
was eventually invaded and toppled in 2001.
If the free world responds to bin Laden and Al Qaida with traditional anti- and counter-
terrorist responses alone, it will confine itself to an everlasting present, always one step behind, and
will not be in a position to pre-empt the future.
The West will scrutinise bin Ladens demands and try to undermine or circumnavigate them.
Strategies to achieve this might include removing the potential Iraqi military threat to Saudi Arabia
and its oil, which by extension, might permit a withdrawal from the gulf, undermining the primary
grievance and rallying point of bin Laden: Christians near Holy sites in Saudi Arabia.
This does not detract from the indictments against him for terrorist offences, for which he
should naturally be punished (if or when convicted, to the harshest possible extent under the law, to
satisfy the sense of justice for the US and other 80 or so nations whose citizens he is responsible for
murdering), but it would deflate his popular and inflammatory grievance, his main war-cry. This is
not giving in to terrorism, it is defusing the threat of terrorism, the primary and overriding objective
being to avoid loss of innocent lives.
Another strategy to undermine bin Laden, would be in establishing the Palestinian State. The
cheering seen in the Palestinian territories on and about 11
th
September 2001, was not because
innocent US and other nationals lives were lost, but because of the political blow dealt by 9/11, to
the US, West and free world.
It is unpalatable, but unfortunately true that the common, popular perception in the Muslim
and Arab world is one of covert domination by the West and other non-Muslims; to subordinate
them and acquire their natural resources through use of political intrigue and subornation of their
leaders by intelligence services and transnational corporations. Bin Laden propagates and capitalises
on these notions, exploiting the anxieties they create. Those masses (rightly or wrongly) view the
West as the main cause behind continued suffering and humiliation of Palestinians, Kashmiris and
others.
It would be a major political and tactical error to underestimate this or to dismiss it. But more
importantly, with 9/11, bin Laden provided the free world, especially the Western nations, with an
unprecedented political opportunity; a tremendous chance to coerce by force, just settlements in the
Middle East and Kashmir (with attendant security) disputes, and be fully justified in so doing in the
wake of not only the events of 11
th
September 2001, but the continued threat of their being repeated
in the West and at other locations, probably on a growing scale and perhaps one day in the
foreseeable future, involving chemical, biological and even nuclear or radiological weapons.
Not only would coercing just settlements be good for business, from the viewpoint of the
transnational corporations (which go hand in glove with governmental economic and national
security pursuits), but it would demonstrably lift Western nations up to the politico-moral point they
(most, not all) held at the close of the Colonial era. At that time of implementing the painful and
Course Epilogue 547
final stages of de-colonialism, the West clearly expressed by its actions that it was driven in the final
analysis, not by politics per se or a redundant appetite for foreign possessions (in an age when
Empires had clearly run their due course), but by morality, in withdrawing from lands that could
plainly if desired, have been retained by use of force, albeit at considerable cost.
What has changed that the West should now intervene and impose political settlements? The
first reason is that Terrorism changed with 9/11, in that the West began to sustain large numbers of
innocent victims [Mass Casualty Incidents] for the first time, murdered by Al Qaida terrorists. The
second reason is that [alleged] oppression of populations in the Middle East and Kashmir (where no
Western populations are located) is resulting in terrorism inside Western nations.
The West therefore has every moral (and legal) right to intervene, not merely to ruthlessly
pursue, try and punish the terrorists, but to ensure the alleged root of the problem (which is not
oppression by the West, but for which it is nevertheless being attacked) is rectified, if found to be
substantiated.
What is certain following the events of 9/11, is that to sustain attacks from large transnational
terrorist networks spread across the world, without seeking a political solution in tandem with the
full use of counter-terrorism force, will expose many more innocent victims than need be.
The hidden agenda of bin Laden and senior Al Qaida figures, is to split the Muslim world
from the West. Only after ejecting all Western presence and influence (with related military and
intelligence aid), do they stand any chance of overthrowing and replacing the existing governments
of Arabic and Islamic countries (most of which, they condemn as either corrupt or as Western
surrogates) with a single Islamic ruler of their brand. This is their [very] long term objective; their
hidden agenda.
We have already had a preview of the brand of government that bin Laden and his followers
would provide once they seize power, from their activities in Afghanistan (see Lesson 11: 9/11 Case
Study prologue, concerning the Taliban torture and crucifixions).
As a result of 9/11, bin Laden was successful in causing some rifts between the Muslim and
Western (or non-Muslim) worlds. Fortunately, most (in both spheres) are well able to imagine bin
Ladens agenda. At this point in time, the most important overall anti-terrorist goal of the free world
(to defeat bin Ladens tactical campaign of winning hearts and minds, and trying to divorce East
from West), is to ensure that neither bin Laden, nor any other entity can further damage relations
between the Muslim and Western worlds.
The most important practical anti-terrorist step for the West to take, is to insist on not the
implementation of national, regional or partisan policies, but outstanding UN resolutions, which are
internationally agreed upon and legally binding. Selective, partial implementation of UN
Resolutions has resulted in armed conflict and terrorism in the Middle East and Kashmir for over
fifty years.
It has not escaped anyones notice that UN Resolutions in favour of Palestinians are
frequently unimplemented, defied or ignored, but that for example, UN resolutions (sanctions)
against Iraq (affecting the civilian population, not the tyrannical ruler), are promptly and vigorously
applied.
There is a price to this partiality: The masses in the Middle East have long concluded that
there are double standards within some sectors of the international community, which the UN has
been powerless to remedy. It therefore, really can come as no surprise that masses of people who are
persistently denied legal redress and the security of UN Resolutions, lose hope and a small number
of fanatics among them become ruthless murderers or terrorists. A poignant fact in the War on
Terrorism, is that innocent Western (mostly) victims are paying the price and being murdered, for
events and disputes occurring in lands thousand of miles away.
The most difficult challenge ahead for the West, is not to deploy counter-terrorist and
intelligence personnel to suppress terrorism, which is relatively easy (largely a matter of funding),
but to politically subdue the [alleged] injustice which generated this terrorism in the first instance.
Fortunately, with the declaration by the US in June 2002, of a Palestinian State in being
within three years (if Chairman Arafat steps down), the West seems well up to the challenge or duty.
If the US is recorded in Middle East history as a liberator [of an Arab or Muslim nation], it would
be a major political and practical setback for Osama bin Laden, apart from exemplifying the very
best of time-honoured American traditions.
Notes 548
http://www.unitarpoci.org
NOTES
Illustration Copyright Acknowledgments 549
ILLUSTRATION COPYRIGHT ACKNOWLEDGMENTS
(Numbers denote page number. Letters denote illustrations: left to right in descending order)
Al Hayat: 225.
Albania Net. E. Bardhi: 4c, 10a, 24c, 217, 220a, 528a, 528b, 528c, 528d, 528e, 528f, 528g, 528h, 528i.
Armenian National Institute (Elder/Wegner /Stevens collections): 3b, 24a, 35b, 153, 514a, 514b, 514c, 514d, 514e, 514f, 514g.
Author / UNITAR: charts, maps, tables, photographs, posters, prints, work, collection, property: 2b, 8a, 18, 23, 26a, 26b, 28a, 28b, 31b,
34b, 37b, 40b, 43a, 47b, 49b, 51a, 51b, 52a, 52b, 54b, 61a, 61b, 61c, 61d, 61e, 61f, 65, 71b, 71c, 74a, 74b, 75, 80a, 80b, 80c, 93a,
93b, 100, 101, 106, 119a, 119b, 121, 125a, 125b, 135, 149, 156, 161a, 161b, 161c, 162a, 162b, 163a, 163b, 168, 172a, 172b, 177,
178a, 178d, 178e, 178f, 178g, 178h, 179b, 180a, 180b, 180c, 181a, 182, 184c, 187a, 187b, 187c, 188a, 188b, 189b, 190b, 190c, 201,
203 (data from India media), 204, 205, 206, 207, 208, 209, 212a, 212b, 218, 221b, 239, 240, 253a, 253b, 262a, 263, 264, 265, 266a,
266b, 273b, 281a, 289, 291a, 291b, 299, 302, 304, 312a, 312b, 329, 330, 331, 332, 334, 347a, 347b, 348, 360a, 360b, 383-390, 391-
402, 403-464, 465 (data from UN), 466-470 (data from UN), 471 (blank template supplied. Data US State Dept.), 472-476, 477-486,
487-490, 491-507 (data US State Dept.), 508-510 (data from US State Dept., UK Home Office and European Union), 511 (blank
template supplied), 512 (blank template supplied).
Azad Kashmir Government: Kashmir Liberation Cell: 98, 169a, 284a.
British Home Office: 343.
British Museum: 32b.
Chicago Historical Society, IL, US: 281b, 283a.
China News Digest: 38, 39a, 39b, 525a, 525b, 525c, 525d, 525e, 525f, 525g, 525h, 525i, 526e.
Crown: UK Ministry of Defence; British Army Picture Library: 1a, 7b, 14a, 14b, 50, 53a, 54a, 63, 64, 72a, 95, 103, 104, 115, 178b, 178c,
183a, 183b, 219a, 219b, 222a, 222b, 226b, 261a, 261b, 325, 344a, 352d, 352e, 354a, 354e, 354f, 355a, 355c, 355d, 355e, 356a, 356d,
356e.
Federal & Islamic Republic of Comoros: 32a.
Fotolab, Wien: 48b.
Freestock Photos com: 276.
Finnish University Research Network (Funet): 11b, 13a, 36, 196, 341b.
Gode Cookery com: 29b, 30, 31a, 96, 122a, 131a, 167b, 228, 237, 274b, 277, 310, 327.
Imperial War Museum, London, UK: 45b, 46a, 70, 71a, 525b.
Institute for Palestine Studies, Washington DC, USA: 9a, 53b, 55a, 55b, 56a, 56b, 58b, 118b, 262b, 273a.
Liberation Magazine: 120a, 120b.
Liddell-Hart Centre for Military Archives, Kings College, London: 5a.
Lion, UK: 45.
MPLA (FAPLA) Government, Angola: 5b.
NASA, US: 193.
National Maritime Museum (UK): 33a, 33b, 34a, 35a.
NATO: 227b.
Palestinian Academic Society for the Study of International Affairs, Jerusalem: 60.
Palestinian National Authority (Beirut): 116.
Pallasweb: 37a.
Police: Australian Federal Police: 165. Police: Boston, MA, US: 141c. Police: Bogot, Colombia: 141f. Police: Budapest, Hungary: 26a.
Police: Caracas, Venezuela: 139. Police: Chicago, IL, US: 282a. Police: Bundespolizei Wien (Vienna), Austria: 27a. Police: Dusseldorf,
Germany: 141a. Police: Florence, SC, US: 141b. Police: Guardia Civile, Madrid, Spain: 170. Police: Grenzschutzgruppe 9, Germany
(GSG-9): 7a, 15a, 377a, 377b, 377c, 377d, 377e, 377f, 377g, 377h, 377i. Police: Interpol (RP 5): 102. Police: Lima, Peru: 118a. Police:
Los Angeles, CA, US: 141d. Police: Milwaukee, WI, US: 141g. Police: National Police Agency, Tokyo, Japan: 123, 185, 190a. Police:
New Scotland Yard, UK: 98, 140, 141i, 266f. Police: New York City, NY, US: 163a, 163b, 266a. Police: Rio de Janeiro, Brazil: 74b.
Police: Rostov-on-Don, Russia: 141h. Police: Salt Lake City, UT, US: 141e.
Private Individuals: A. Joundurian: 145, 233, 278, 307. Alexei Chouprygin: 37b, 230a. Dr. Charles Roland: 8b. G. Hanif: 283b. G. Azam:
59b. Havildar (Sgt.) M. Lahorgul Khan: 226a. Jim MacMillan Murphy: 275b. M. Doummar: 29a. Marcus Wendel [www.Skalman.nu]: 73.
Mrs. Robin Higgins, Lt. Col. USMC retired: 235.
Think Quest Library: 16a, 16b, 17, 48a, 49a.
UN: Secretariat: 27b, 142, 188c, 189a, 189c, 227a, 230b, 236. UNIFIL: 274a, 275a. UNMOGIP: 131b. 231. UNWRA: 57a, 57b, 58a,
62.
US Air Force: 370a. US Air National Guard: 352c. Air War College: 117, 368a, 368b.
US Army: 4b, 22b, 24d, 40a, 41b, 42a, 42b, 44b, 86a, 97, 137, 166, 167a (MRDU), 221a, 300, 345, 370b, 371a, 371b, 371c, 371d, 516b,
516g, 517a, 517c, 517e, 517f, 517g, 518e, 518h, 520a, 520b, 520c, 520f, 520g, 520h, 520a, 520b, 520c, 520d, 520e, 520f, 522a, 526a,
526c, 526d.
US Bureau of Alcohol, Tobacco and Firearms: 282b.
US Central Intelligence Agency: 291b.
US Department of Defense: 191a, 191b, 223, 244, 246, 284b, 342, 351b, 351c, 351e, 35f, 352f, 353a, 353b, 353c, 354b, 354c, 354d,
355b, 355f, 356b, 356c, 356f, 357, 368c.
US Department of Energy: 303.
US Department of State: 11a, 12b, 13b, 15b, 22a, 59, 77, 154, 181b, 184b, 186d, 186e, 186f, 210, 242, 243, 245, 250, 251b, 320, 333,
341a, 344b, 349a, 349b, 351a, 351d, 352a, 352b, 471 (data), 491-507 (data).
US Environmental Protection Agency: 6b.
US Federal Bureau of Investigation: 3a, 9b, 68, 133, 184a, 192, 220b, 224, 241a, 241b, 251a, 251c, 251d, 251e, 251f, 251g, 251h, 251i,
251j, 251k, 251l, 251m, 251n, 251o, 266b, 266c, 266d, 266e, 266f, 353f.
US Holocaust Memorial Museum: 24b, 43b, 47a, 101, 516a, 516c, 516d, 516e, 516f, 516h, 517b, 517d, 517h, 518a, 518b, 518c, 518d,
518f, 518g, 519, 520d, 520e, 521a, 521b, 521c, 521d, 521e, 521f, 522b, 522c.
US National Oceanic and Atmospheric Administration: 6a.
US National Archives: 1b, 11c, 12a, 41a, 46b.
US Navy: 10b, 306, 336, 353d, 353e.
US Public Affairs Office, Pristina, Kosovo: 372.
Veterans with a Mission (VWAM / US Army), US / Vietnam: 2a, 72b, 86b.
Washington State Military Department: Emergency Management Department, US: 4a, 169b, 179a, 186a, 186b, 186c.
Yad Vashem: 44a.
UNITARPOCI Global Terrorism 550
Page Intentionally Left Blank
End-of-Course Examination 551
End-of-Course
Examination
The End-of-Course Examination questions cover the
material in all the Lessons of this UNITAR Course.
Read each question carefully
and
mark your answers on the Examination Answer Sheet
or
fill in your answers on the UNITAR Internet home-page
( http://www.unitarpoci.org)
End-of-Course Examination 552
The End-Of-Course Examination Answer Sheet is designed to:
1. Formally record your answers to the questions of the Final Examination.
2. Be returned by you to UNITAR-POCI for review and grading*.
*Alternatively, it may also be found on UNITARs home-page and sent in electronically:
(http://www.unitarpoci.org) or faxed to 757 253 6954 (use codes to reach the US).
INSTRUCTIONS FOR FILLING OUT THE ANSWER SHEET
Format of Questions
There are 50 Examination Questions. The Answer Sheet has numbered blocks and each block
corresponds to a similarly numbered question on the End-of-Course Examination.
First, read a question through carefully. Then, mark your answer on the Answer Sheet in the space
where the answer number corresponds to the question number.
Throughout the examination, for each question, check that the answer sheet number you are filling
in, is the same as the question number.
Exam questions generally give you a choice of answers, marked as A, B, or C; or, they may be True
or False questions that give you two choices, A (True) or B (False).
Choose only one response and mark only one choice on your answer sheet. If you mark more than
one answer for a question, it will be graded as incorrect.
End-of-Course Examination 553
Depending on the type of question, the following responses are appropriate for the End-Of-Course
Examination Answer Sheet:
True / False questions : A = True , B = False
Multiple-choice questions : A, B, or C
Use a Dark Pencil
Mark your responses on the Answer Sheet using a dark lead pencil, unless submitting electronically.
Time Limit to Complete Exam
Because your enrollment in the course is valid for one year only, the Examination must be submitted
before your enrollment expires.
Passing Grade
A score of 75% is the minimum score required for a passing grade.
If you pass you will be sent a letter indicating your score along with your signed Certificate-of-
Completion.
If your score is less than 75%, you will be sent a letter indicating that you have received a failing
grade.
At that time, you will be provided with an alternate version of the End-Of-Course Examination,
which you may complete when you feel you are ready.
If you pass the second version of the examination, a grade report and a Certificate-of-Completion will
be sent to you.
If you fail the second time, you will be informed and dis-enrolled from the course.
End-of-Course Examination 554
Global Terrorism
FINAL EXAMINATION
1. Terrorism has occurred
a) Since the beginning of the 20
th
century
b) Throughout history
c) Since the late 1960s
2. The Four Pillars of terrorism are
a) Motivation, Target, Victim and Damage
b) Motivation, Objective, Target and Asset Harm
c) Motivation, Objective, Planning and Execution
3. Terrorism is committed by members of
a) Different religious and political groups
b) Different social and ethnic groups
c) a and b
4. Domestic terror has killed approximately how many people in the 20
th
century?
a) 42 million
b) 9 million
c) 6 million
5. Single international terrorist attacks occurred most frequently in the
a) 1970s
b) 1980s
c) 1990s
6. One reason why there is no universal definition for terrorism is that
a) Some governments support terrorism as freedom fighting
b) There has never been a convention to define it
c) No government needs a universal definition
End-of-Course Examination 555
7. Terrorists always justify the acts (means) they use by their objectives (ends).
a) True
b) False
8. The amount of publicity generated by a terrorist act is proportionate to
a) The type of weapons used
b) The scale of the terrorist act
c) The reputation of the terrorist group
9. Terrorists always present their cause and acts as
a) Political alternatives
b) Unavoidable and sometimes accidental
c) Reasonable and justified
10. De-population (ethnic cleansing) and genocide are
a) Criminal and civil law offences
b) Military court martial offences
c) Terrorism, war crimes and crimes against humanity
11. Terrorists who commit conventional crimes are different from conventional criminals who
commit terrorist acts.
a) True
b) False
12. Terrorism is a violation of human rights.
a) Never
b) Always
c) Sometimes
13. Victims and Targets of terrorism
a) Are the same
b) Are different
c) Can be the same or different
End-of-Course Examination 556
14. Terrorists who commit acts and those who plan acts share the same motives.
a) Never
b) Always
c) Sometimes
15. Terrorists may have
a) A single motive
b) A single or several motives
c) No motive - most only obey orders
16. Sawab and Kafil mean
a) Divine credit and sponsor
b) Holy war and divine credit
c) Sponsor and holy struggle
17. Some terrorists are opportunists, who commit terrorism
a) For religious and political reasons
b) To create anarchy
c) For wealth and power
18. Terrorism is often rooted in
a) Political misunderstandings
b) Poverty, oppression and hopelessness
c) Accidental conflicts
19. The 1994 Rwandan genocide and de-population was caused by
a) Suspension of democracy and ethnic hatred
b) Religious and ethnic hatred
c) Political and ethnic hatred
20. The NSDAP genocide was caused mainly by
a) Racial and ethnic hatred
b) Political hatred
c) Communism
End-of-Course Examination 557
21. How many people were killed by war, purges and other persecution in the 20
th
century?
a) Approximately 150 million
b) Approximately 50 million
c) Approximately 15 million
22. Contemporary terrorism emerged from 20
th
century guerrilla warfare.
a) True
b) False
23. All terrorism includes the essential elements of
a) Motive, ends and means, ability, calculation, terror, victims, targets
b) Publicity, political demands, murder, victims, hatred, terror
c) Use of weapons, calculation, terror, political demands, murder
24. Terrorists generally prefer committing acts in democracies because of
a) Easy availability of terrorist weapons and political sympathy
b) Victims not expecting terrorism, and rewards being greater
c) Greater publicity, less chance of apprehension and easier penalties
25. Sub-conflict terrorists carry out terrorism generally for
a) Ransom money
b) Vengeance or punishment
c) Religious or social reasons
26. Unemployment amongst the 21 to 25 years age group is the main reason for recruitment of
guerrillas and terrorists in the Jammu & Kashmir conflict.
a) True
b) False
27. Terrorists carry out reconnaissance before committing an act, in order to
a) Conceal bombs and select secondary targets
b) Warn other terrorists in the locality and note security forces
c) Ensure a smooth operation and avoid apprehension
28. Some terrorist groups use several different names for their groups in order to
a) Recruit more terrorists
b) Obtain more sponsoring and funds
c) Overburden the intelligence machinery of the security forces
End-of-Course Examination 558
29. The bomb is the preferred weapon of contemporary terrorists.
a) True
b) False
30. Preferred terrorist IED explosives are
a) Semtex, TNT, P4, fertiliser-base
b) Semtex, C4, RDX, fertiliser-base
c) RDX, RDD, Semtex and C4
31. Some suicide bombers are victims who are compelled to commit terrorism, because if they
refuse, their hostage families are murdered.
a) True
b) False
32. A secondary bomb is sometimes used to
a) Kill even more victims assembled together after the first detonation
b) Make certain that at least one bomb detonates
c) Gain more publicity and establish a hard-line reputation
33. Weapons of mass destruction (WMD) are generally
a) Nuclear, radiological, chemical
b) Nuclear, biological, chemical
c) Explosive and radiological
34. A radiological dispersal device (RDD) produces more radiological contamination than equivalent
amounts of weapons grade nuclear material in conventional nuclear weapons.
a) True
b) False
35. Governments sometimes secretly negotiate with terrorists and make concessions, without
informing their populations.
a) True
b) False
36. Diplomatic immunity provides Diplomats who commit terrorism with freedom from arrest and
immunity from prosecution.
a) Never
b) Always
c) Sometimes
End-of-Course Examination 559
37. Terrorists view negotiation as
a) A resource
b) A last resort
c) Full of dangers
38. Some government intelligence and security officers carry out assassinations.
a) Never
b) Only in wartime
c) Occasionally
39. To suppress terrorism by attacking its roots, what would be the most effective strategies?
a) Capital and corporal punishment for convicted terrorists, rewards for informants
b) Addressing oppression, global poverty, adequate and even enforcement of human rights,
democracy and UN resolutions
c) Establishment of global intelligence and counter-terrorist forces to target all terrorist organisations
40. The international tribunals in the Hague and Rwanda have been a defacto deterrent to some
leaders contemplating genocide and de-population (ethnic cleansing).
a) True
b) False
41. Anti-terrorism generally means
a) Anything opposing terrorism
b) Passive and defensive measures against terrorism
c) Special forces assaults upon terrorists
42. Counter-terrorism generally means
a) Active and offensive measures against terrorists
b) Analysing intelligence on terrorists
c) Repairing the damage after a terrorist bombing
43. Threat assessments concerning potential terrorism involve establishing, increasing or maintaining
a level of alertness in a security plan.
a) True
b) False
End-of-Course Examination 560
44. Security intelligence means
a) Academic security measures
b) Intelligence that enhances security, or what terrorists know about security arrangements
c) An agent dealing with both intelligence and security
45. Intelligence security means
a) Combining security and intelligence for efficiency
b) Protecting intelligence officers
c) Protecting intelligence and sources (how it was come by)
46. Evidence for the attacks on 11
th
September 2001 established responsibility on
a) Osama bin Laden and terrorists from the Al Qaida network
b) Taliban
c) Afghan Mujahideen
47. Some members of guerrilla groups that originally fought to end the Soviet occupation of
Afghanistan have since attacked the United States and several other countries.
a) True
b) False
48. The most dangerous terrorist groups (with fixed bases) in the world are in
a) Colombia, Rwanda, Peru
b) Algeria, Egypt, Afghanistan
c) East Timor, Kosovo, Jammu and Kashmir
49. A Fatwa is
a) An injunction for holy war
b) A contract for assassination with financial reward
c) A legal religious opinion or edict
50. The most hazardous duty against terrorists is undertaken by
a) Military counter-terrorist forces
b) Police anti-terrorist units
c) Professional regular army troops
End-of-Course Examination 561
END OF EXAMINATION
PLEASE IMMEDIATELY SUBMIT
YOUR ANSWER SHEET
You are advised to double-check that the End-of-Course Examination Answer Sheet is
properly filled out, and that your answer numbers correspond exactly to the question
numbers.
Please see the Answer Sheet for submission instructions
UNITARPOCI Global Terrorism 562
Page Intentionally Left Blank
About the Author
Paul Medhurst was educated at the Kings School Canterbury, UK, following which he
became a UK Police Officer, serving a number of years in B and D divisions of the Surrey Police,
then A and W districts of the London Metropolitan Police (whose Headquarters is New Scotland
Yard). It was while serving in London that he first encountered a terrorist, held in a high-security
police station, awaiting trial. In 1980, he was on duty at the Iranian Embassy Siege at Princes Gate,
London.
Following his police service, he volunteered as an Infantry Officer Cadet with E Company,
5th (V) Battalion of the Queens Regiment, during which time he lectured on the detection of
terrorists, improvised explosive devices (IEDs) and anti-handling devices. He later served in 63
Squadron (V), Corps of Royal Military Police, from which he took up an appointment with the
United Nations Secretariat.
In addition to UN postings in New York, Geneva, Vienna, Jerusalem, Damascus, Naqoura,
Luanda, Rawalpindi and Srinagar, he has undergone short tours of duty at several other stations.
His UN assignments have mostly been in the areas of security and administration, as part of the
Field Administration and Logistics Division, within the Department of Peace-Keeping Operations
(DPKO).
While attached to the United Nations Military Observer Group in India and Pakistan
(UNMOGIP), he was appointed as a Political Assistant by the Chief Military Observer and authored
a 570-page guide (with campaign maps) to the dispute in the former Princely State of Jammu &
Kashmir.
During his service with the UN, he enrolled with the Pacific Western University in
California, studying terrorism towards a degree in Criminal Justice and attaining a Doctoral degree
with honours, in Political Science.
He was based in several locations of the world where terrorism is endemic, and has personal
experience of being held for a short while by irregular armed elements, negotiating release, and
being under fire and bombardment. When head of the Security Unit of UNAVEM II in Angola, he
twice operationally commanded a local army platoon in short fire-fights involving automatic
weapons, repelling night raiding parties of renegade soldiers and looters from the Headquarters
camp area.
Paul Medhurst passed the UN Competitive Professional Examination in Security and was
appointed as the Deputy Chief of the United Nations Security & Safety Section in Geneva and later
Vienna. He is the author of the UNITAR-POCI course: Security for UN Peacekeepers.
The American Military University appointed him as an Adjunct Professor, for the
Departments of Unconventional Warfare and Criminal Justice, while UNITAR-POCI appointed him
as a Consultant for Counter-Terrorism, Low Intensity Conflict, Security Management, and as a
Thesis Advisor for the Peace Support Operations Training Programme (jointly conducted by UN
DPKO, UNITAR-POCI, several world renowned Universities and National Peacekeeping Training
Centres). In the UN DPKO project for global standardisation of peacekeeping training modules, he
was appointed as a Terrorism Expert.
040326