Fight Back: Tackling Terrorism, Liddy Style
3/5
()
About this ebook
G. Gordon Liddy has never shrunk from a fight, and in this book he offers individuals and businesses a clear-eyed, proactive, and deeply informed approach to combating criminal and terrorist threats.
Backed by advice from three seasoned professionals who offer military, medical, and personal security perspectives, Liddy addresses:
-How and why terrorists select targets--and how to minimize your chances of becoming one
-Assessing your personal and workplace risks: Do you have a plan to protect yourself? Your employees? Your infrastructure?
-Using defensive landscaping and antiterrorism architecture: how to protect against intruders, truck bombs, and other potential attacks
-How to survive a kidnapping and hostage situation
-Countering chemical, biological, and weapons attacks: An Emergency Response Handbook
Fight Back is an essential book for everyone concerned about home and workplace safety.
G. Gordon Liddy
G. Gordon Liddy is the host of the G. Gordon Liddy Show, which is broadcast in more than two hundred fifty markets. He is the author of books including the #1 New York Times bestseller Will: The Autobiography of G. Gordon Liddy and, most recently, The New York Times bestseller When I Was a Kid, This Was a Free Country. He lives in the Washington, D.C., area.
Related to Fight Back
Related ebooks
54-40 or Fight Rating: 0 out of 5 stars0 ratingsFinding Jefferson: A Lost Letter, a Remarkable Discovery, and Freedom of Speech in an Age of Terrorism Rating: 3 out of 5 stars3/5The Strange Death of Franklin D. Roosevelt: History of the Roosevelt-Delano Dynasty, America’s Royal Family [Revised Edition] Rating: 0 out of 5 stars0 ratingsThe Monkey Handlers Rating: 3 out of 5 stars3/5Hostile Takeover: Resisting Centralized Government's Stranglehold on America Rating: 0 out of 5 stars0 ratingsHitler's Commando: The Daring Missions of Otto Skorzeny and the Nazi Special Forces Rating: 5 out of 5 stars5/5Watergate - The Political Assassination Rating: 0 out of 5 stars0 ratingsGovernment Is the Problem Rating: 0 out of 5 stars0 ratingsPrologue to Annihilation: Ordinary American and British Jews Challenge the Third Reich Rating: 0 out of 5 stars0 ratingsDeviant Behavior: A Novel of Sex, Drugs, Fatherhood, and Crystal Skulls Rating: 3 out of 5 stars3/5Why Was Lincoln Murdered? Rating: 3 out of 5 stars3/5Who Has Buried the Dead?: From Stalin to Putin … The last great secret of World War Two Rating: 4 out of 5 stars4/5A Ferrie Tale Rating: 0 out of 5 stars0 ratingsAct of Treason: The Role of J. Edgar Hoover in the Assassination of President Kennedy Rating: 3 out of 5 stars3/5The Strength of the Wolf: The Secret History of America's War on Drugs Rating: 5 out of 5 stars5/5The Torture Memos: Rationalizing the Unthinkable Rating: 3 out of 5 stars3/5Spies in Congress: Inside the Democrats' Covered-Up Cyber Scandal Rating: 0 out of 5 stars0 ratingsAn Emperor Among Us: The Eccentric Life and Benevolent Reign of Norton I, Emperor of the United States, as Told by Mark Twain Rating: 0 out of 5 stars0 ratingsAndrew Jackson Donelson: Jacksonian and Unionist Rating: 0 out of 5 stars0 ratingsSummary of Paul McGuire & Troy Anderson's Trumpocalypse Rating: 0 out of 5 stars0 ratingsGrey Wolf: The Escape of Adolf Hitler, The Case Presented Rating: 4 out of 5 stars4/5The End of America Rating: 0 out of 5 stars0 ratingsLincoln's Dilemma: Blair, Sumner, and the Republican Struggle over Racism and Equality in the Civil War Era Rating: 5 out of 5 stars5/5Hunting the President: Threats, Plots and Assassination Attempts--From FDR to Obama Rating: 4 out of 5 stars4/5General Grant and the Verdict of History: Memoir, Memory, and the Civil War Rating: 0 out of 5 stars0 ratingsThe Hoffa Wars: The Rise and Fall of Jimmy Hoffa Rating: 4 out of 5 stars4/5Harvest the Vote: How Democrats Can Win Again in Rural America Rating: 5 out of 5 stars5/5Death of the Kingfish! Rating: 5 out of 5 stars5/5This Day in Philadelphia Sports Rating: 0 out of 5 stars0 ratingsAmerican Doom Loop: Dispatches from a Troubled Nation, 1980s–2020s Rating: 0 out of 5 stars0 ratings
Politics For You
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5The Essential Chomsky Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5Fear: Trump in the White House Rating: 4 out of 5 stars4/5The Parasitic Mind: How Infectious Ideas Are Killing Common Sense Rating: 4 out of 5 stars4/5Ever Wonder Why?: And Other Controversial Essays Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5The Cult of Trump: A Leading Cult Expert Explains How the President Uses Mind Control Rating: 3 out of 5 stars3/5On Palestine Rating: 4 out of 5 stars4/5The Republic by Plato Rating: 4 out of 5 stars4/5Daily Stoic: A Daily Journal On Meditation, Stoicism, Wisdom and Philosophy to Improve Your Life Rating: 5 out of 5 stars5/5The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5Freedom Is a Constant Struggle: Ferguson, Palestine, and the Foundations of a Movement Rating: 4 out of 5 stars4/5Gaza in Crisis: Reflections on the U.S.-Israeli War on the Palestinians Rating: 4 out of 5 stars4/5The Gulag Archipelago [Volume 1]: An Experiment in Literary Investigation Rating: 4 out of 5 stars4/5Closing of the American Mind Rating: 4 out of 5 stars4/5The Souls of Black Folk: Original Classic Edition Rating: 4 out of 5 stars4/5Unhumans: The Secret History of Communist Revolutions (and How to Crush Them) Rating: 3 out of 5 stars3/5Government Gangsters: The Deep State, the Truth, and the Battle for Our Democracy Rating: 5 out of 5 stars5/5The Great Reset: And the War for the World Rating: 4 out of 5 stars4/5The U.S. Constitution with The Declaration of Independence and The Articles of Confederation Rating: 5 out of 5 stars5/5The Girl with Seven Names: A North Korean Defector’s Story Rating: 4 out of 5 stars4/5The First Conspiracy: The Secret Plot to Kill George Washington Rating: 4 out of 5 stars4/5Speechless: Controlling Words, Controlling Minds Rating: 4 out of 5 stars4/5
Reviews for Fight Back
2 ratings0 reviews
Book preview
Fight Back - G. Gordon Liddy
PART ONE
KNOW YOUR ENEMY
ONE
Understanding the Terrorist Threat
It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change.
CHARLES DARWIN
Ten days ago a seemingly typical Asian family of four departed their recently adopted home of Southampton, England, for a six-day westbound transatlantic cruise aboard the famed Queen Mary II, docking in New York City. The forty-year-old Indonesian engineer, his thirty-five-year-old wife, and their twin sixteen-year-old daughters began exhibiting severe flulike symptoms halfway across the Atlantic.
The daughters were pale with temperatures of 103°F, but the shipboard medical facility’s physical exam results were otherwise normal. The girls were presumed to have a viral infection and were instructed to drink fluids and take aspirin or ibuprofen for muscle aches. The father was also ill, suffering from severe lower backache, headache, shaking chills, and vomiting. He had a temperature of 102°F and a pale rash on his face. A preliminary diagnosis of dengue fever was made, and he was instructed to drink fluids and take ibuprofen.
Every effort was made to comfort them, including being seen by both the ship’s medical officer and a half dozen doctors who happened to be vacationing aboard themselves. Upon reaching New York City all three of the stricken family members were taken to a hospital and by the next day they were exhibiting red, vesicular rashes on their faces and arms and appeared acutely ill. Their temperatures ranged from 102° to 104°F, though their blood pressures remained normal. Another presumptive diagnosis was made, this time for adult chicken pox. Laboratory blood tests were run.¹
Unbeknownst to the family, now distraught with fear over what could be happening to them, the enemy had already accomplished their mission.
The family had been unwittingly infected by the father’s brother, a medical doctor and member of Jemaah Islamiya, a known al Qaida affiliate and radical Islamic faction that had killed 202 westerners by carrying out the Bali bombings in 2002. The brother, who had helped pay for the family’s vacation, had visited them in England just before their trip to America and had insisted on giving the family what he called booster shots
to keep them healthy during their trip.
All told, the father, mother, and two daughters infected, in just under a week, nearly a fifth of the cruise ships’ 3,251 passengers and crew, who themselves disembarked and boarded planes for dozens of cities in the United States and Canada, not to mention the practicing medical doctors who had been passing the disease on to some of their unsuspecting patients for the following several days. Word of the smallpox outbreak would spread when Americans turned on the evening news and learned about the beginning of the end of life as they knew it.
The government would respond the only way it could, by replacing the now seemingly benign Patriot Act with a new National Safety and Survival Act, which would include the lawfully imposed forcible quarantine of several major American cities and the immediate cessation of all interstate commerce. The Canadian and Mexican borders would be closed, and all air, sea, and international shipments and international travel options would be closed to Americans.
All this makes the abnormalities of the post–9/11 world seem downright genteel and leaves people wondering what more they could have done to prepare themselves for such events in the years that followed September 11, 2001, the wake-up call that all too few understood.
What is smallpox?* Smallpox is a serious disease caused by a virus. It occurs naturally in animals and there is concern that smallpox virus could be obtained and used by terrorists.
How does it spread? Through coughs and sneezes, direct skin contact with an open wound or infected sores, and contaminated bed linens or clothing. People with smallpox are most contagious during the first week of illness, before symptoms appear.
What are the symptoms? Between seven and seventeen days after exposure, an infected person usually develops high fever, fatigue, headache, and backache. A rash usually appears on the mouth, face, and forearms and then spreads to the chest and stomach.
How is it prevented/treated? There is no known cure for smallpox. The immediate vaccination of people exposed to smallpox can prevent the disease or reduce its severity.
What are the government’s response procedures? Patients are isolated, and persons who may have been exposed are quarantined to prevent spread of the disease. Although in most cases isolation and quarantine are voluntary, federal, state, and local governments have authority to compel isolation and quarantine to protect the general public.
*Adapted from Public Health Emergencies: What You Can Do to Prepare by the Rhode Island Department of Health.
FIGHT BACK
In the months and years since that fateful Tuesday morning in 2001, dozens of scenarios like the one above have been discussed in the public domain by experts both inside and outside of government, each frighteningly real and most of them shockingly plausible.² Hundreds more classified scenarios have been studied by intelligence and counterterrorism specialists at the Central Intelligence Agency (CIA); Department of Homeland Security (DHS); Federal Bureau of Investigation (FBI); the Pentagon; and elsewhere. Even Hollywood has gotten into the act with television shows like Fox’s 24, scripting bioterrorism, kidnappings, and nuclear power plant attacks; and HBO films’ excellent 2005 film Dirty War, which chronicles the events of a dirty bomb being set off in downtown London.
Many of the more severe of these threats—the chemical, biological, and nuclear attack scenarios—are also the ones we know al Qaida and others continue to work on, including variants of the smallpox martyr
scenario above and the purchase of so-called suitcase nukes
from the former Soviet Union. The nightmare scenarios of Hollywood have become our reality, and many of us believe the future of the War on Terrorism
is increasingly dark, at least in the near term. Yet these simulations, war games, and screenplays all leave something to be desired, for none of them have had the effect to drive true, aggressive, and sufficient reform of our current security posture.
The Liddy Approach
Every American will continue to be affected by the scourge of international terrorism, as well as a whole host of lesser natural and man-made disasters, including such threats as mad cow disease, avian flu, earthquakes, and hurricanes. This fact is redefining life as we know it, affecting everything from airport security to the government’s budget priorities and relations with other nations, both friend and foe alike. Fortunately the actions one takes in defeating the risks posed by terrorists are in many cases the same actions that reduce the risks of being affected by other threats. Absent the terrorist threat, some of the security measures outlined in this book may not be required; but given the reality of the terrorists’ goals and intentions, these measures are nothing less than essential for protecting yourself and your loved ones.
Contrary to a popular but self-defeatist belief, individuals do have options when it comes to preparing for and dealing with terrorism, including mass-casualty events and attacks employing chemical, biological, or nuclear weapons. The Liddy approach is to FIGHT BACK, a strategy built on the core belief that what makes this country great is that individual Americans can and will act aggressively in defending themselves, their loved ones, and their way of life. Red Cell Associates, a specialized security-and-riskmitigation solutions firm, has identified an approach to individual and collective homeland security that follows two distinct but related paths: Deter, Defend and Respond, Recover.™
Deter, Defend encompasses the whole range of actions that deter terrorists—and, in the process, most other criminals—from targeting you, your company, or your community by improving your defenses to withstand and counter such an event should it occur. This includes improving exterior lighting or using defensive landscaping and design plans to reduce your risk at home or in the office.
Respond, Recover describes the solutions that prepare you for absorbing, surviving, and recovering from those events that do inevitably take place, such as obtaining personal protective equipment; preparing a bag with food, water, and clothing; rehearsing emergency preparedness plans; and developing and testing rigorous business-continuity strategies.
This approach is derived from the process used to secure military and key private-sector critical infrastructures against terrorist threats. The same approach, with adjustments made for lesser threat conditions and more limited resources, applies to all individuals and businesses. It begins with assessing the threats that we all face and determining precisely how and why the threats are relevant to you. This requires understanding what the enemy is doing, how the U.S. government is responding, and how and why these factors affect you, your community, and your way of life. Next, the Liddy approach assesses certain protective measures you can take to reduce your risks at different relative costs in money and effort. Finally, it identifies and implements risk-reduction strategies to achieve one’s optimal balance for accepting certain risks while lessening or eliminating others.
What the Enemy Is Doing
What we are witnessing through the growth of International Islamic Fundamentalist jihadi terrorism is a significant shift in the ability of a numerically insignificant number of people to challenge the established world order by harnessing the full potential of modernity and technology. The roots of terrorism and the specifics of some of the primary known groups are discussed more fully in chapter two, but two essential elements about the nature of the terrorist threat to America must be understood at the very outset:
• The threat to our collective well-being from newly empowered substate terrorist groups goes well beyond just al Qaida, and includes everything from other radical Islamic extremist groups to multinational gangs like MS-13, environmental extremists, and domestic hate groups.
• The nature of the attacks we experience will change into new and ever more challenging forms, including not only more mass-casualty chemical, biological, and nuclear attacks but also much more frequent but lower-level suicide and car and truck bombings aimed at the softest available targets.
It is clear that al Qaida is not the only threat to American interests. Prior to 9/11 the Iranian-sponsored Hizbollah had killed more Americans than al Qaida, and all of those deaths were overseas and none involved WMD (weapons of mass destruction) or using airplanes as missiles. Our greatest domestic threat was from American citizens like Timothy McVeigh and millennial and other apocalyptic cults operating right here at home. Today, with the justifiable concentration on the direct al Qaida threat, we have fewer resources to devote to monitoring these other threats.
Similarly, it is clear from enemy interrogations, media leaks of classified intelligence, and public pronouncements by the terrorists themselves that al Qaida and certain affiliates continue to plan to carry out spectacular
attacks in the mold of 9/11. But historically terrorists have relied on much more modest—albeit more frequent—conventional attacks using explosive-laden cars, trucks, or even people. The weapons of choice for the hate groups and most other terrorist organizations are fully automatic rifles and truck bombs. As a result it is only sensible to conclude that our collective future will be shaped by two terrorist threats, not just one: the first will follow the scale, if not the specifics, of the mass casualty 9/11 attack or of the WMD scenario with which this book opens. If history is any guide, such attacks will be carried out every four to six years (and yes, that means that as of the writing of this book we are just about due for the next major attack!). At the same time a secondary method of attack will also migrate to America’s shores—that of the suicide bomber or small group of gunmen, who could easily conceal themselves in the midst of the hundreds of thousands of illegal aliens overrunning our southern border annually.
This second branch of the terrorist threat, which is less sophisticated in its execution but still quite deadly and with potentially devastating economic and civil liberty repercussions, requires none of the college education, flight training, or ability to patiently assimilate displayed by Mohammed Atta and the rest of the 9/11 killers. Instead, its practitioners resemble the HAMAS and Hizbollah suicide bombers more familiar to Israel, Lebanon, and, more recently, Iraq. These attacks require only knowledge of the techniques being developed today in each of the above countries (and those that support them) and access to a cache of fully automatic rifles or to a cell-phone trigger device coupled with an explosives-laden vehicle. The government, much as it is trying to defeat this threat, simply will not be able to stop the waves of multiple, near-simultaneous, low-signature suicide attacks. It can’t be prepared everywhere and all times, and therefore at least some of these smaller attacks are likely to