A Decade of Homeland security
p.64
Underneath the Rubble
p.16
Homeland Volume 9, Issue 3 Fall 2011
INSIDE
★ The land of the free because of the brave ★
Security
®
Timeline of Terrorism p.32
Preemptive Self Defense
in the Age of International Terrorism
p.40
Bin Laden’s Death
Is the Mastermind Really Dead and Are We Ready for Acceptance? p.33
Special Edition
10 years later $6.50 U.S./$9.50 CAN
Memorial Pays tribute to 9/11 heroes p.14
ABCHS: America’s Largest and Most Prestigious Homeland Security Organization
Protect Your Homeland
Become Certified in
®
Homeland Security, CHS The ABCHS program is dedicated to the credentialing, training, and continuing education of professionals from across the nation who are committed to improving homeland security. At the core of its membership are some of the world’s leading decision-makers who have significant experience and knowledge in homeland security. Join us today as we work together to protect what matters most—our families, communities, country, and way of life.
Call the Chief Association Officer at 877.219.2519 or go online to www.abchs.com. CHS0311IHS
“There is a mysterious cycle in human events. To some generations much is given. Of other generations much is expected. This generation of Americans has a rendezvous with destiny.”
“Victory at all costs, victory in spite of all terror, victory however long and hard the road may be; for without victory, there is no survival.”
—Franklin Delano Roosevelt
—Winston Churchill
Prepareyour&business Protect and family
Natural Disasters Environmental Hazards Critical Infrastructure Failures Terrorist Attacks Na C Ap OOvy pro L ved The American Board for Certification in Homeland Security, CHS速 presents Certified in Disaster Preparedness, CDP-I速 The CDP-I course was designed to help you prepare your home and family for a state of emergency. Discover the best evacuation practices and response plans to use in the event of a fire, hurricane, tornado, or terrorist attack. Learn the critical details, insight, and solutions that could save your life. DP0311IHS
Call Toll-Free 877.219.2519
Course author, Paul Purcell, CHS-V, is the coowner, vice-president, and lead security analyst for InfoQuest Investigators in Atlanta, Georgia. Established in 1998, InfoQuest Investigators, Inc. performs security analysis for corporate and industrial companies. As an investigator, Purcell created Case File, the in-the-field investigative case management system used by private investigators, law enforcement, and attorneys nationwide. Dedicated to community awareness and preparation, Purcell embarked on a personal quest to create a detailed training guide aimed at improving the emergency preparedness and protection of the average civilian.
www.abchs.com/certification/cdp.php
Announcement to Readers
We’re on Kindle! If you’ve already marched into the future of reading, you know about Kindle. Now you can add Inside Homeland Security ® to your e-reading experience using Amazon’s standard-setting device.
Haven’t taken the Kindle leap yet? Here are six reasons why you should not delay: 1. Same IHS, but easier to read: Adjustable type size, high-contrast digital ink, bolder fonts. 2. Contingency planning: Read in bed with no eyestrain. Read at the beach—no glare. 3. Preparedness: Online backup archiving on Amazon. 4. Continuity: Synch your reading to your laptop and wireless devices. 5. Resiliency: Battery life of up to one month. 6. Convenience: Weighs less than a single print issue. Takes up less space in your carry-on.
Editor, Inside Homeland Security®
YOU ONLY HAVE ONE ONLINE REPUTATION‌
DEFEND IT. Visit us today at
www.characterguardians.com or call us at
800-423-9737
Scan this QR code with your smartphone QR reader and it will take you directly to the Character Guardians web site where you can find out more information. CG0311IHS
Check out our book publishing services today! acfeimedia.com High-quality book designs at affordable publishing costs See our booth at ES20 for discounted prices on Acfei Media books. Limited copies available. AM0311IHS
Visit our website at AcfeiMedia.com or e-mail us at media@acfei.com
American Board for Certification in Homeland Security
Continuing Education ONLINE
Online Courses Demonstrate your professional commitment to the homeland security industry. Stay abreast of the latest developments in this rapidly evolving field, improve your skill set, promote leadership, and increase your career advancement opportunities.
Introduction to Military Chaplaincy
School safety and security
Course Code CMC01B • 8 CE Credits
Course Code SSS01 • 8 CE Credits
The U.S. military is a subculture of its own, with its own language, protocols, history, and traditions. This course presents a broad overview of the roles and services military chaplains provide to service members.
Learn how to define and identify an active shooter in various settings. Using case studies, shared professional experiences, and other documented sources, participants will gain a greater knowledge in historical tactical situations directly relating to active shooter scenarios. In defining crisis management as it directly correlates with active shooters, law enforcement personnel will gain a well-rounded skill set necessary to coordinate, educate, and train with local schools and businesses for prevention, reaction, and recovery.
Course learning objectives will include: • Religious Support Environment (RSE) • Unit Ministry Team Operations (UMTO) • Differences in battalion, squadron, brigade, regiment, and group religious support operations • Installation Unit Ministry Team Religious Support Operations (IUMTRS) • Combat and Operational Stress Control (COSC) • Critical Incident Management (CIM) • Critical Event Debriefings (CED)
Course learning objectives will include how to: • Dispel myths that falsely define active shooters. • Identify early warning signs of a potential active shooter. • Define and understand crisis management. • Identify phases of the crisis management cycle. • Define and comprehend officer procedures.
ENROLL TODAY! www.abchs.com • 1-877-219-2519
CE0311IHS
www.abchs.com | 877-219-2519
volume 9, issue 3
Fall 2011
contents feat u r es remembering 9/11 12 Tribute to the Fallen 14 National September 11 Memorial 16 Underneath the Rubble: Interview with Ed Wallace 19 Members’ Memories of 9/11 27 Chaplain David Fair’s 9/11 Diary
32 of Terrorism Timeline
Terrorism 36 The Bombing of U.S.S. Cole (DDG-67)
by Shawn VanDiver
40 Preemptive Self Defense in the Age of International Terrorism
by Herbert S. Mack
48 Behind the Burqa
by Michael A. Torres
in every issue
Columns
08 Board members
33 Killing Bin Laden
09 CAO’s sign
Counterterrorism
By Richard J. Hughbank
82 New members
44 Exploiting
Dignitary and Executive Protection
DHS
83 New credentialed Vulnerabilities
73
Executive Summit
54 Understanding Shari’a Law from American Perspective
by Pat Merriman and Jansen S. Cheek
56 How Far America Has Come Since 9/11 by John Giduck
By David L. Johnson
62 Evolution of DHS
64 A Decade of Homeland Security
68 DHS Center Faith-Based & Neighborhood Partnerships
Executive Level Education By Dave Mcintyre
70 Critical Infrastructure Before & After 9/11 Infrastructure Protection By Shawn J. VanDiver
by Ed Peaco
76 Homeland Security Tactics: Extraordinary Rendition
by Paul France
FreedomView
LED Fiberscope
66
ABCHS Executive Advisory Board CHAIR: Eric White, BS, CHS-V, FABCHS, CPS, ISMA-IV, PIS VICE CHAIR, Col. Andrew J. Jurchenko Sr., US Army (Ret), CHS-V, FABCHS SECRETARY, Robert L. McAlister, BS, CHS-V, DABCHS E. Robert Bertolli, OD, BS, FACFEI, DABFE, DABCHS, CHS-V, CMI-V Barbara B. Citarella, RN, BSN, MS, DABCHS, CHS-V Jessica M. Cummins, DABCHS, CHS-V Sean Kinney, CHS-V, CMI-III, CFC Henry L. Homrighaus, Jr., DABCHS, CHS-V David L. Johnson, DABCHS, CHS-V David A. Goldschmitt, MD, FACEP, DABCHS, CHS-V Thomas Givens, DABCHS, CHS-V Cathi Marx, DABCHS, CHS-V Janet M. Schwartz, PhD, FACFEI, DABFE, DABFM, DABPS, DABCHS, CHS-V, DAPA, NCC, NCP, CDP-I Andrew Neal, CHS-III, CISM, CIFI, CSC/I John W.A. Didden, CHS-III David Fair, PhD, CHS-V, SSI, CMC Steven G. King, MS, MBA, CHS-V, CPP Jeffrey Hatchew, JD In memoriam, Nick D. Bacon, Senior Advisor to the Board and First Chair of ABCHS American Board for Certification in Dignitary and Executive Protection, ABCDEP CHAIR: David L. Johnson, CHS-V Mark E. Garver, CHS-V Michael C. Cava, CHS-V Edward Bailor, AA, BS, CHS-III Robert E. Colliver, CHS-III Michael E. Nossaman Jim Floyd, CHS-III Tony Scotti, CHS-III Marc E. Glasser, MS, CHS-V, CPP, CEM Jeffrey D. Guidry, CHS-III Gerald A. Cavis, CHS-III Dennis C. D’Alessio, CHS-III Clint Hilbert, CHS-III Howard L. Weisman, CIPM, CHS-V Michael S. LoFaso, CHS-III American Board for Certification in Infrastructure Protection, ABCIP CHAIR: Steven G. King, MS, MBA, CHS-V, CPP Vice Chair, John J. Sullivan, Jr., PhD, CHS-V Dale W. Cillian, DABCHS, CHS-V Sherman E. Copeland, Jr., CHS-V, SSI W.D. Fitzgerald, CHS-III, CPP Marc E. Glasser, MS, CHS-V, CPP, CEM Benjamin Nieves, CHS-V, CPP Michael W. Homick, PhD, EdD, CHS-V, DABCHS Peter A. Petch, CHS-V, RPIH, CIPS, CIMT Robert R. Sanders, CHS-V, CPP, CSP Shawn J. VanDiver, MS, CHS-V, CAS-PSM, SSI, CDP-I, CMAS Cecelia Wright Brown, DEng, MS, BA, CHS-V Kurt J. Klingenberger, CHS-III Robert J. Coullahan, CHS-V, CEM Paul E. Purcell, CHS-V Patrick N. Cowan, MBCDRP, CHS-V, ATM Debra M. Russell, PhD, CHS-III, CMI-V American Board of Intelligence Analysts, ABIA CHAIR: John W.A. Didden, CHS-III James C. Sartori, CHS-V Peter Probst
8
Inside Homeland Security®
Fall 2011
Janet Schwartz, PhD, FACFEI, DABCHS, CHS-V, CDP-I Marquis L. Laude, CPP, CHS-V Nestor L. Colls-Senaha, MS, CHS-V James M. Wolfe, CHS-V, CISSP Rainer A. Melucci, CFC, CSC, FACFEI, DABFE, CHS-III Jason S. Sprowl, CAS Johnie A. Sullivan, FBI (Ret), MBA, MCS, CHS-IV Bo Mitchell, CHS-V, CPP, CEM Michael E. Chesbro, CHS-III, IAC, SSI, CFC A. Benjamin Mannes, CHS-III, SSI, CPP Anthony A. Saputo Madeline M. Daniels, PhD, FACFEI, DABFE, DABPS, CMI-V American Board of Information Security and Computer Forensics, ABISCF CHAIR: Andrew Neal, CHS-III, CISM, CIFI, CSC/I VICE CHAIR, Steven W. Wood, MSc, DABFET, CFC, CHS-IV William E. Davis, CHS-IV, MBCI, CGEIT, IDLS Eric Svetcov, CHS-III, CISSP, CISA, CISM, CISA, CGEIT, SCF, COBIT Foundation J. Clay Fielding, MCP, MCT, CHFE, RFC, GLFI, CEH, CPS, MSCIS Eric Lakes, CHS-III, CLWE, MCSE Gabriela Rosu, BS, MS, CHS-V Margaret Bond, MBA, CISM, CHS-V Ron Schmittling, CPA, CITP, CISA, CIA Marie Wright, PhD, CHS-V Shayne P. Bates, DABCHS, CHS-V, CPP Rocco A. DelCarmine, CSSP, ISSPCS, CHS-III Eric Nelson, MBB, CHS-III Robert Curtis Jim Kennedy, MRP, MBCI, CBRM, CHS-IV American Board for Certified Master Chaplains, ABCMC CHAIR: David Fair, PhD, CHS-V, SSI, CMC VICE CHAIR: LZ Johnson, (Special Forces, U.S. Army (Ret.) ,BS, BA, CHS-V, CMC Leatha Warden, PhD,LPC, ACC-I, CMC Charles V. Singletary, CHS-I, CMC James H. Ballard, DMin, CMC Mary Dobbs, CMC Bruce D. Wright, PhD, CMC
Joseph J. Prudhomme, PhD, ThD, BCETS, BCCC, CHS-I, CMC Don Howe William M. Sloane, PhD, JD, LLM Robert F. Fountain, CHS-I, CMC American Board of Law Enforcement Experts, ABLEE CHAIR: Sean Kinney, CHS-V, CMI-III, CFC VICE CHAIR: E. Robert Bertolli, OD, DABCHS, CHS-V, CMI-V Thomas Brady, CHS-V, DABLEE Alan Bock, CHS-V, DABLEE Stephen Russell, BS, DABLEE, CMI-II, CHS-III Henry C. Grayson II, CHS-III, CMI-III William R. Kushner, MS, CHS-IV Oscar A. Baez, Sgt. (Ret.) CHS-III Timothy M. James, CHS-III Patrick E. Spoerry, PhD, CHS-V, CFC Robert Frank Mance, Federal LEO, CHS-III James Smith, JD, EdD, CHS-III Warren L. Shepard, SSI, CDP-I, CRC, CHS-V 2011 Editorial Advisory Board Scott R. Altemose, CHS-IV, CMI-III, HEM, CRC, CFC, CSE, SSI, FIT E. Robert Bertolli, OD, FACFEI, DABCHS, DABFE, CHSV, CMI-V Jody Bissonnette, BA, CHS-III Brendalyn Val Bilotti, RN, BS, CHS-V, CHSEMR, CQM James D. Blair, DPA, MHA, FACHE, FABCHS, CMAS Robert D. Boyden, PhD, MS, FACFEI, DABFE, CHS-III Kenneth Burkhalter, BS, SSI, CDP-I, CHS-V, CNTA, DABCHS, CRC Patrick Cowan, MBCDRP, CHS-V, SSI, CDP-I John J. Wassel, MBA, MBCDRP, CHS-V, SSI, CDP-I Todd DeVoe, CHS-III Irwin Harrington, PhD, CFPS, CFI, CHS-I, CDP-I Richard J. Hughbank, MA, MS, CHS-IV, CMAS Michael G. Oehler, DMIN, CHS-III, CAS, CMAS, CASPSM Harry Risor, MS, CHS-V James Smith, MSS, CHS-III, NREMTP, CPC Shawn VanDiver, MS, CHS-V, SSI, CDP-I, CPP, CMAS, CAS-PSM, CTT+ John J. Wassel, MD, MHS, CHS-IV
www.abchs.com
877.219.2519
C A O ’ s si g n
Greetings from ABCHS/CAO September 11, 2001 This issue of Inside Homeland Security® is dedicated to the men, women, and children who lost their lives that fatal day in New York City, Pennsylvania, and Washington, D.C.—those brave people and heroes that responded to the emergency.
They will never be forgotten. No matter their race, religion, or background, they worked together, around the clock, to help the fallen victims and save as many lives as they could on that fateful day. Our freedom was at stake and how dare the terrorists try to take our great nation down! I want to thank all of the ABCHS members that make a difference daily to keep our freedom. Whether you are active-duty military, retired, law enforcement, security, emergency responders, emergency managers, consultants—whatever your field is—we commend your constant commitment to the homeland security arena by being there when needed, and we salute you for keeping alert so that we may be safe and a free nation! God Bless America and God Bless our Troops! Marianne Schmid Chief Association Officer, ABCHS
They will never be forgotten. Member News
Inside Homeland Security® is a publication of The American Board for Certification in Homeland Security, CHS®, 2011. ABCHS is dedicated to the credentialing, networking, continuing education, and training of homeland security professionals. The opinions and views expressed by the authors, publishers, or interviewees are their own and do not necessarily reflect those of the ABCHS program, nor does the ABCHS program adopt such opinions or views as its own. The ABCHS program disclaims and does not assume any responsibility of liability with respect to the opinions, views, and factual statements of such authors, publishers, or interviewees, nor with respect to any actions, qualifications, or representations of its members’ or subscribers’ efforts in connection with the application or use of any information, suggestions, or recommendations made by the ABCHS program or any of its boards, committees, publications, resources, or activities thereof. For more information call toll-free 877.219.2519.
WANTED: Homeland Security Manuscripts Inside Homeland Security® is looking for original, unpublished, well-researched manuscripts from experts within the field. Please review the publication’s submission guidelines at http://www.abchs.com/ihs/ihs_submission.php. For questions, contact the editor by e-mailing editor@abchs.com or calling (877) 219-2519, ext. 122.
Send Your Comments and Letters to Countersign E-mail IHS at editor@abchs.com or address mail to: IHS, Countersign, 2750 E. Sunshine, Springfield, MO 65804. Letters become the property of the journal, and its owns all rights to their use. IHS may edit letters for content and length.
Inside Homeland Security is published quarterly by the American Board for Certification in Homeland Security, 2750 E. Sunshine, Springfield, MO 65804. ABCHS members receive an annual subscription to IHS as part of their benefit package. Non-members may subscribe by calling 877.219.2519. ®
Annual subscription rates (4 issues per year) United States: one year $29.95/ two years $49.95; includes shipping and handling. Internationally: one year $54.95 / two years $74.95; includes shipping and handling. Postmaster: Send address changes to Inside Homeland Security®, 2750 E. Sunshine, Springfield, MO 65804 877.219.2519
www.abchs.com
Publisher and Founder: Robert L. O’Block
MDiv, PhD, PsyD, DMin
Chief Association Officer Marianne Schmid Team Leader: cao@abchs.com editor: Trysta Herzog
trysta@abchs.com
Art Director: Brandon Alms
brandon@abchs.com
Graphic Designers: Cary Bates cary@abchs.com
Stephanie Lindberg stephanie@abchs.com Advertising: Trysta Herzog
trysta@abchs.com
Fall 2011
Inside Homeland Security®
9
Homeland INSIDE
The land of the free because of the brave
Security
Submission Guidelines Length Continuing Education articles should have a word count between 4,000 and 8,000 words. Longer pieces may be accepted, but may be divided across two issues. Manuscripts with less than 4,000 words may receive a lower publication priority, as they will likely not qualify for continuing education credit. Submissions for columns, opinion pieces, and regularly occurring features should contain 1,200 to 2,000 words.
Format Authors must follow the format guidelines outlined below, with every submission in Microsoft Word format (.doc or .docx), double-spaced and prepared neatly with following items: A title page with the manuscript title and the authors’ names, degrees, affiliations, and contact information. An article abstract of no more than 150 words. A one-paragraph (80 to 100 words) biography about the author at the beginning of the manuscript. State the manuscript’s target audience(s), as well as a program level—use basic, intermediate, or advanced, depending on the nature and scope of the manuscript. In-text citations and references should both strictly adhere to APA style. NO FOOTNOTES. (See Publication Manual of the American Psychological Association, Sixth Edition: 6.11–6.21) CE Required Components These specifications apply only for manuscripts totaling 4,000 or more words (based only on body text, not additional components such as references, bios, or abstracts. A list of three to five key words that express the precise content of the manuscript (used for indexing purposes), positioned immediately following the abstract. A list of at least three measurable and observable learning objectives that cover the main points of the manuscript, positioned immediately following the key words. Longer manuscripts should list additional objectives. 10
A minimum of six multiple-choice test questions that adequately cover the material highlighted in the learning objectives (used to offer continuing education credit through journal learning). Longer manuscripts should include additional questions, up to 10. No more than 25 % of the test questions can be true/ false. Multiple-choice questions should all possess the same number of answers (four or five preferably, but consistency is key); do not use “all of the above,” “none of the above,” or “a and c”-style answers. Please indicate the correct answer to each question.
Writing Style and Grammar
Inside Homeland Security® publishes research articles written in the third person using active voice. Authors should follow the Publication Manual of the American Psychological Association, 6th Edition and, if unfamiliar with Inside Homeland Security®, should refer to back issues to better understand the association and its audience. Check the manuscript for content and style. Ensure that all required sections of the manuscript are completed (abstract, bio, résumé, key words, learning objectives, and continuing education questions). Manuscripts that contain numerous typographical issues or errors or lack any of the required components will be returned to the author for revision before they are submitted for peer review. Authors must supply references when quoting a source directly, citing, or paraphrasing another person’s work or ideas, or referring to information that is generally not well known.
Pictures and graphics A photograph of the author(s) should accompany the manuscript. Authors can submit photographs and illustrations that visually and cognitively enhance and support the text. When e-mailing photographs, ONLY the following extensions are accepted: .jpg, .jpeg, .tif, .tiff, and .pdf.
Submission E-mail your submission to editor@abchs.com. If necessary, accompanying materials, such as photographs, may be mailed to Editor, IHS, 2750 E. Sunshine, Springfield, MO 65804.
www.abchs.com For additional information, contact the editor at 877.219.2519 or e-mail editor@abchs.com
Inside Homeland Security®
Fall 2011
C A LL FOR S UBMISSIONS
SG0311IHS
877.219.2519
Tribute to the Fallen National September 11 Memorial Underneath the Rubble: Interview with Ed Wallace Members’ Memories of 9/11 Chaplain David Fair’s 9/11 Diary
2,987
12 14 16 19 27
Total deaths from 9/11 attacks:
Number of firefighters and paramedics killed:
9/11 Now an iconic image of the World Trade Center collapse on September 11, 2001, these two 70-foot-tall, 90-ton steel trident columns that once supported the
343
110-story south tower will be placed in the new Memorial Museum. As the tower collapsed around them, the pillars, which were the building’s signature architectural element, stood unbowed, becoming a symbol of American resilience.
877.219.2519
www.abchs.com
Fall 2011
Inside Homeland Security®
11
9/11 t r i b u t e
2,596
Deaths toll at the World Trade Center:
Let them never be forgotten On September 11, 2001, 2,987 people gave their lives in a battle they didn’t know existed—a battle that continues to change the face of our nation. Their sacrifice will never be forgotten. These were not soldiers who signed up for fighting in foreign lands. Most
92
were not trained in combat skills, nor were they looking for conflict. They were people who went to work on a bright and sunny September day, never to return home, and their memories remind us to be vigilant yet
Deaths aboard American Airlines Flight 11, from Boston to Los Angeles, after crashing into the WTC North Tower:
resilient, hopeful yet aware, and respectful yet responsible. One person can’t change the world, but after 10 years of reflection, perhaps 2,987 can. Their names might not live on through history books, each person’s individuality lost in the statistics umbrella of 9/11, but together, they represent a collective spirit that survives in all of us. They
September 11, 2001.
Inside Homeland Security® editor
12
Inside Homeland Security®
Fall 2011
Death toll at the Pentagon:
Trysta Herzog
45
one more time, to say good-bye, and to die valiantly for our country on
125 www.abchs.com
Deaths aboard United Airlines Flight 93, from Newark to San Francisco, after crashing in rural southwest Pennsylvania:
rating their struggle to live, to save lives, to speak to family members
1,717
This issue is their tribute. Let us all remember each life today, commemo-
Number of families who received no remains:
have become the symbol of our nation.
877.219.2519
64
stories
Deaths aboard American Airlines Flight 77, from Washington to Los Angeles, after crashing into the Pentagon:
Gerard A. Barbara Last seen running toward the South Tower Lobby, the 53-year-old was an FDNY Assistant Chief of Department and Citywide Tour Commander and had served the department for 31 years. His wife, Joanne: “Jerry, even though he held a very high rank, when he would introduce himself to someone who didn’t know who he was, he always said he worked for the fire department, he was a firefighter. Never boasting about the rank or the responsibilities he had. Jerry took the job extrememly seriously. There was no room for sloppiness or inefficiency. He was a professional. It wasn’t just a job to him.”
Candace Lee Williams The Connecticut native was interning at the Merrill Lynch offices in the World Trade Center. The 20-year-old boarded Flight 11 to Los Angeles, and died after it crashed into the North Tower. Her brother, Corey:
Number of NYPD officers who died at WTC:
Bystanders killed by falling debris:
www.abchs.com
Robert Chin The 33-year-old native New Yorker worked at the Fiduciary Trust Company and was last seen on the 97th floor of the South Tower. His sister, Suk-Tan: “At Fiduciary he was the singing, photo-taking, softball-playing mail clerk who was well known for all his hard work and his willingness to help people. About the singing, I heard from his friends and co-workers that when he went out to sing karaoke with them, he would just get on stage by himself and belt it out. He lost his stutter and he had absolutely no fear.”
3
877.219.2519
Number of victims added to the death toll due to respiratory health problems after the fact:
10
23
“Yellow was Can’s signature color and in her diary there was a yellow butterfly. Shortly after she died, I was mowing the lawn and a yellow butterfly landed on my hip and I called for my mom. She came running outside and I showed her the yellow butterfly and we both knew that the chances of that are too slim. So we looked at it as a sign from Candace as her signature icon.”
Fall 2011
Inside Homeland Security®
13
Deaths aboard United Airlines Flight 175, from Boston to Los Angeles, after crashing into the WTC South Tower:
65
On their Web site, the National September 11 Memorial Museum has a free audio preview of the oral history exhibit, with family members recounting the lives of those lost in the 9/11 attacks. Here are a few of those stories. For more, go to http://newmuseumme.national911memorial.org/preview.php.
9/11 m e m o r i a l
9/11 Memorial opens on 10th Anniversary
200,000
The symbol of American commerce and trade is now transformed into the symbol of American resilience and perseverance. The metamorphosis did not occur overnight, nor did it come without sacrifice, but the National September 11 Memorial stands to remind us that despite great adversity, we will overcome and we will never forget.
Average number of daily visitors before 9/11:
14
Year WTC was opened after more than 6 years construction:
1973
Inside Homeland SecurityÂŽ
Fall 2011
stories
Plaza
110
Two reflecting pools, set within the footprints of WTC’s Twin Towers, feature the largest manmade waterfalls in North America. The names of the 2,982 who died in both the 1993 WTC attack and 2001 9/11 attacks are inscribed in bronze panels along the edges of each one-acre pool. A grove of more than 400 swamp white oak trees serve as a canopy for the entire plaza, which is one of the most eco-friendly to ever be built.
The plaza is a suspended paving system, or series of concrete tables suspended over canals of loose soil for the trees, promoting healthy tree growth while providing a stable walkway for visitors.
Sustainability
With innovative irrigation, storm water, and pest management systems, this is one of the foremost sustainable plazas ever built. Rainwater collected below the surface will be harvested to meet the daily and monthly irrigation requirements.
underground With a train station and other facilities 70 feet below street level, the plaza actually doubles as a green roof, creating an urban forest to complement other nearby green spaces such as Battery Park City and Liberty Plaza. www.abchs.com
Height of each tower:
world trade center
memorial design overview
Jobs lost in New York due to the attacks:
Located at the site of the World Trade Center, where more than 2,500 people lost their lives on September 11, 2011, the memorial will open on the tragic event’s 10-year anniversary, Sunday, September 11, 2011. Construction on the eight-acre tribute began more than eight years ago, working from the winning design by architects Michael Arad and Peter Walker, chosen from more than 5,000 entries in the 2003 international design competition to find a suitable look for the memorial.
146,100
about the memorial
877.219.2519
• Those who were killed in the bombing of the WTC on February 26, 1993.
around the south pool • Those who were killed while working in or visiting 2 WTC (South Tower) or other areas of the WTC complex on 9/11; • The crew and passengers killed on United Airlines Flight 175; • Those who were working in or were visiting the Pentagon on 9/11; • The crew and passengers killed on American Airlines Flight 77; • The crew and passengers killed on United Airlines Flight 93; and • The first responders who received the 9/11 Heroes Medal of Valor awarded by the White House on September 9, 2005.
16
18
25,000 Estimated number of people evacuated from the towers before the collapse:
• The crew and passengers killed on American Airlines Flight 11; and
People who escaped the North Tower from floors above where plane hit:
names Feb. 26, 1993
102
Date of first WTC terrorist attack:
• Those who were killed while working in or visiting 1 WTC (North Tower) on 9/11;
Survivors found in the rubble by Sept. 12: (12 firefighters, 3 police officers, 3 civilians)
around the north pool
People who escaped the South Tower from floors above where plane hit:
Time it took to destroy the towers from the first impact to the final collapse: minutes
The names of victims are arranged as such:
0
additional arrangement info According to the memorial Web site: “Following each heading, the names are arranged so that those belonging to the same affiliation—for example, co-workers of the same company or the crew of each flight—are listed together. The next-of-kin of the victims and surviving colleagues have requested the names of specific individuals next to whom they would like their loved ones’ names inscribed. Some were with relatives, friends, and colleagues; others were with people they barely knew or had just met, but with whom intense bonds were quickly formed as a result of a shared response.”
national september 11 memorial museum
877.219.2519
Number working on average prior to 9/11:
Number of companies housed in the WTC:
430
Also located on the WTC premises is the Memorial Museum, which provides a historical record of the events that unfolded on September 11, 2001 with a series of exhibits, photos, and interactive tributes; however, it will not be fully functional by the time the memorial opens this year.
50,000 www.abchs.com
According to the museum director Alice Greenwald’s statement on the memorial Web site, “The Museum will be about each of us, about what it means to be a human being, and what it means to live in a complex, global community at the start of the 21st century. It will, we hope, be a place for understanding ourselves and the world in which we live, a place for promising the kind of world we want to bequeath of our children and grandchildren.” plan your visit:
www.911memorial.org Fall 2011
Inside Homeland Security®
15
9/11 i n t e r v i e w
Underneath the Rubble
Aftermath of 9/11 Lives on in New York Crime Scene Investigator By: Trysta Herzog, Inside Homeland Security® Editor
O
n Sept. 11, 2001, people all over the world watched a tragedy unfold on national television as the lives of nearly 3,000 were taken in a very public display. Scenes from that day will live on through the memories and stories of survivors and surviving family members, those who bravely rushed to the scene to give aid, and those who viewed it in horror on their TV screen.
world trade center
For days, the attacks on the World Trade Center and the Pentagon resonated in newspapers and monopolized conversations around the world as we tried to make sense of the atrocities, and quickly attention was diverted from those who remained at the site for more than 18 months, tasked with the dangerous job of cleaning up, recovering the bodies, and investigating the crime scene that had been laid out in the terrorists’ wake.
16
One of those called upon in this monumental endeavor was Ed Wallace, a New York Police Department detective whose 2001 work at the twin towers paralleled his participation in the investigation of the 1993 Trade Center attack. “I didn’t think I’d be back there for another attack in my career,” he said. Unfortunately, a more horrific scene did unfold there and as search-andrescue transitioned into clean-up procedures, Wallace said he and teams of investigators alternated 12-hour shifts, sifting through debris and bodies. “When they’d come across a victim—usually body parts—we would treat it like evidence from the attack. We would move in, document the evidence and collect it, package it, and remove it from the site.” In mid October, he was pulled off his work at Ground Zero and assigned to investigate the anthrax attack. By January, he was back at work at WTC.
Inside Homeland Security®
Fall 2011
Approximate number of injuries in the 1993 bombing:
1,000 www.abchs.com
877.219.2519
Deaths in the 1993 bombing:
6
“People have become complacent and have forgotten these threats that are still out there. Sure, we’ve gotten lucky. But we are in a dangerous mindset. This political correctness has gone too far and it’s killing us.” —Ed Wallace, CHS-V
9/11 Crime Scenes Investigators Revealed
877.219.2519
www.abchs.com
Amount of deposit terrorist Mohammad Salameh sought to reclaim after his rental truck was used in the 1993 attack, resulting in his capture:
$400
“I would have these coughing fits, but when I would remove myself from Ground Zero, it would go away and I wouldn’t have that problem. But then in 2002, it wouldn’t go away and I was experiencing shortness of breath.”
Along with other investigators and emergency responders who processed the scene in the days and months following the attack, Wallace participated in a British documentary that aired in the U.K. September 9, 2010: “9/11 Crime Scene Investigators Revealed.” The documentary, produced by Bristol-based film company Testimony Films, interviewed the CSIs, medical examiners, and police officers in charge of piecing together the last minutes of more than 2,000 lives. Unlike any other crime scene most had ever seen, the film provides a unique perspective of the decade-defining event from the eyes of those who dealt with the aftermath. In the film, Wallace describes the initial scene in New York on 9/11. Seeing this huge pile of smoldering rubble and this whitish-grey ash all over the place. And it was floating through the air and you can see it when the sun reflected off the particles that were in the air. And plus the rancid smell of chemicals and whatever else was in the air. It was very hard to identify what type of smell this was. But you knew it wasn’t good. It just didn’t feel right. Everything about it didn’t feel right. (Humphries, 2010) Under this rubble, CSIs searched for weapons and tools used by the terrorists, any remaining airplane parts—particularly the black box—and bodies which would be taken to the refrigerated trucks that substituted for a morgue. Eventually, debris was carried out to Staten Island’s Fresh Kills Landfill where it would be put on conveyer belts and sorted, Wallace said. If they found human remains—body parts, whether it’s tissue or just bones—they were told to bring it over to the crime scene unit and we would look at it. We had a little table set up and when those investigators would find something, they would bring over to us and we would look at it. They were also instructed if you found any police equipment, guns, any type of police paraphernalia—whether it was NYPD or some other law enforcement agency—to bring that equipment to the crime scene unit, too. (Humphries, 2010) Along with the majority of remains, the two black boxes would never be recovered, likely decimated during the collapse.
“I didn’t thinkFall 2011 I’d Inside beHomeland back there 17 Security for another attack in my career.” ®
Pictured: Ed Wallace (on right)
Days it took to reopen WTC after 1993 attack:
20 Estimated damage of 1993 bombing: Fallout of 9/11
Emergency workers bravely approached the scene on September 11, 2001, knowing that like any disaster, fire, or crime in progress their lives would be in danger. Many did not anticipate, however, the medical consequences they’d endure years later; Wallace included. I would have these coughing fits, but when I would remove myself from ground zero, it would go away and I wouldn’t have that problem. But then in 2002, it wouldn’t go away and I was experiencing shortness of breath (Humphries, 2010). Wallace was rushed to the hospital in August of that year with acute chest pains. “I thought I was having a heart attack. They took X-rays and found what’s called bilateral infiltrate scar tissue built up in my lungs,” he said. Wallace and his doctors agreed the findings were odd since, as a Hazmat technician, he received yearly routine checkups with chest X-rays, and the previous year’s records had been clear. Subsequent tests revealed Wallace had sarcoidosis, an incurable disease in which tiny clumps of inflammatory cells grow most commonly in the lungs, lymph nodes, eyes, and skin. Doctors also diagnosed him with eosinophilic esophagitis, or a build-up of white blood cells in the esophagus causing inflammation. Initially, Wallace said he did not suspect the ailments were from his work at WTC, but after several other 9/11 workers began to get sick as well, there was no mistaking it. “I put in the paperwork to say the illnesses were obtained in the line of duty, and it was initially accepted,” he said. “But in April 2004, I was just about to retire. They reviewed the illnesses again and denied coverage. It was reestablished later, but I still have been denied disability two times. They acknowledge that I’m sick, but not sick enough to not work.” Recently, Wallace said he and several other emergency responders were awarded a settlement in a class-action lawsuit pertaining to the illnesses incurred during their efforts at the World Trade Center. Now, 10 years later, despite frequent health-related illnesses 18
Inside Homeland Security®
Fall 2011
$6 million
and more than a dozen daily medications, would Wallace do it all over again? “I get that question from reporters a lot. And the answer is ‘yes.’ But we could have done it more safely. See, we had the correct equipment to protect us from this, but we were told that we didn’t need it. The Environmental Protection Agency, the EPA, was there conducting testing on the air. They told us the air was safe. I would do it again, but just differently. We were needlessly exposed.”
A different Kind of Commemoration
While the waters have calmed over the last decade and Americans have gone back to their day-to-day lives, Wallace said he hopes this year’s anniversary will remind us of the dangers that still loom over our heads. “People have become complacent and have forgotten these threats that are still out there. Sure, we’ve gotten lucky. We were lucky the ‘Underwear’ bomber’s and the Time Square bomber’s bombs didn’t detonate. There have been other cases where we’ve identified and stopped attacks. But we are in a dangerous mindset. Take the Fort Hood shooting for example. This political correctness has gone too far and it’s killing us. We’re overlooking the blatant signals because we don’t want to offend someone.” And as the anniversary of one of our nation’s most tragic days arrives and Americans mourn the death of loved ones and our country’s innocence, Wallace and his family, however, will be commemorating their own family tragedy—the loss of his brother to brain cancer in the early morning hours of Sept. 11, 2001. “That day is a very traumatic day for my family. We will be doing things in honor of his death, to remember him. We might watch some of the memorial on TV, but that day will be for my brother.”
References Humphries, S. (Producer, Director). (September 9, 2010). 9/11 Crime Scene Investigators Revealed [Motion Picture]. United Kingdom. www.abchs.com
877.219.2519
memories
9/11
Echoes of 9/11
Honoring the Memories of a Nation
I
n the decade since 9/11, much has changed by way of war, policy, homeland security, and how we view the world. We watched in trepidation the collapse of the World Trade Center, the Pentagon burning, and the plane crashing in Pennsylvania; our hearts wrenched for those who lost their lives. Memories, however, are often short, making room for 10 years of fresh traumas and sorrows and the budding happiness that ebbs in and out of our lives.
9/11 statistics
The following are stories shared by various members of the American Board for Certification in Homeland Security, who wanted to take this opportunity to honor the fallen by reminding us of that sunny, disastrous day, September 11, 2001—a day that catapulted the United States into a new era.
Memories Estimated number of people who lost a spouse or partner in attacks: 877.219.2519
www.abchs.com
1,600
Fall 2011
Inside Homeland SecurityÂŽ
19
John W.A. Didden, CHS-III Ohio
9/11 m e m o r i e s
When 9/11 happened, I lived in Riyadh, Saudi Arabia and worked in almost every country in the Middle East. … Just a couple of hours after the attacks, streets were filled with people who were dancing, blowing horns of cars, waiving Saudi flags, firing weapons and fire crackers, and yelling slogans such as “Allah is Great” and “Dead to the Americans— the Infidels.” These “celebrations” went on for some days, not only in Saudi Arabia, but in almost each Arab country. … It is terrible and unbelievable that the United States is so much hated in the Arab world, while many of the country’s girls and boys who did serve in the armed forces gave their lives to liberate Kuwait, brought freedom to Iraq, and are fighting the Taliban and al-Qaeda in Afghanistan.
Chief Walter A. Kimble (Ret.), CHS-III Rockaway Twp., N.J. Police
20
1,506,124 tons
Thinking back to that fateful day, my first thought is what a beautiful day it was—the weather warm, sky vibrant blue. An act of terrorism that would kill 3,000 and change the face of history was far from my mind. I held the rank of Police Captain, Patrol Division Commander at the time. A part of my responsibilities was the management of fleet operations. I was in the city manager’s office to pick up the documents needed to purchase several police vehicles that had arrived for pickup at the local dealership. My department-issued pager had gone off several times, and I returned to the police area of the municipal building. In the Police Chief’s office, the television was on and I viewed Tower One on fire from the strike of the first airplane. At that time, I believed as the majority of America did, it was a horrible accident. As the second airliner came into view on the screen, I looked in disbelief, “What is going on?” The second airliner then struck Tower Two. At that moment, our then Chief of Police stated to the command personnel in the room: “Gentleman, we are at war.” I recall his words as if it were just yesterday. Subsequent to the strike of the second plane into Tower Two, our agency embarked on a number of tasks, including providing assistance to members of the Department of Defense (D.O.D) Police at the U.S. Army military installation, Picatinny Arsenal. Evacuation operations were underway to clear and secure the base to the outside world. Eventually, a list began to emerge as to the identities of those from our municipality who were in the towers that tragic day. The Chief of Police assigned a command level officer to each family of those who were presumed lost in the days after 9/11. I was one of those assigned a family. The officer and his family lived just several streets away from home.Security I met®hisFall wife for the first time. The mood Insidemy Homeland 2011
in the home was somber as one could imagine. The officer had normally worked a different shift; however, he had changed his shift to attend to a family obligation. I saw as the initial hope for him began at, “I hope he is all right and we will hear from him soon;” to “he is probably injured, but we’ll make contact with him soon;” and finally to the dreaded visit from the officer’s police agency indicating he was lost. As time moved onward, I accompanied the family members to a place of remembrance set up for the family of the police and firefighters lost at the Twin Towers. The drive down I-80 showed every highway overpass decorated with flag after American flag. We had come together as a nation. I moved off to allow the family privacy, and after a prayer, walked around the nearby area. There were pieces of paper taped and tacked to anything that would support them with photos of loved ones lost and many with lettering, ”Have You Seen Me?” I then made my way to a makeshift plywood wall with more notes hung upon it and began to read the postings. One in particular stays with me to this day. It was from the boyfriend of a woman who worked in one of the Twin Towers. He had planned to propose to her the evening of 9/11 and in his letter, he recounted to her where they were going to have dinner and what he wanted to say to her. Lastly, he spoke of the ring he had picked out for her. I will never forget that note, as like so many others, it cut across all socio-economic lines and allowed us to see each other as simply Americans. As we all know, time does not stand still, those lost are still missed by family and friends. There are still voids as father, mother, sister, brother, and friend among others forever left unfilled. As we come upon this 10th anniversary of 9/11 and the shameful, cowardly terrorist attacks on innocent people, we seek to find a way to honor their memory. With the death of bin Laden, our government has indeed held someone accountable. We now look forward as an organization for a way to honor the memory of all of those lost in each attack on 9/11. It is my belief that we must collectively continue to teach, learn, and apply our knowledge so that never will such a series of horrific events take place on American soil by any foe of this great country again. We must not rest in our endeavors, as certainly our enemies do not. www.abchs.com 877.219.2519
Amount of debris removed from sites
Now retired from the New Jersey Police Department, Kimble was one of the many officers assigned to a Port Authority officer’s family whose loved one was suspected injured or killed in the World Trade Center collapse. This is his 9/11 story.
Photo by JustASC / Shutterstock.com
John T. McCann, PhD, CHS-III New York
26
Days after 9/11 that U.S. began bombing in Afghanistan David L. Cox Maryland As background, I had just brought my wife, son, and daughter back from our two-year assignment in Bucharest, Romania for “The Firm” in June, to Dallas, Texas. We had brought our things out of storage and had begun the process of adaptation back to America again. I had missed my 5 a.m. flight that morning from Dallas Fort Worth International Airport to see three old friends in 7 World Trade Center’s “The Firm” to discuss my next assignment, so when my son in college called from Chicago telling me to turn on the TV, you can image the sense of shock at what I saw. The next few hours are etched in my mind as they are in many of that day. This nation lost those fine men, among many others that awful day. Somehow, I was spared that fate, for what reason and to what end the pages have not yet been placed in the book of history. By rights I should have been there to ride the building down with them. Simple, swift justice was done recently, while delayed, and the results sent to the sharks. Evil knows no limits, in peace or war. It is up to us in our simple profession to ensure we always keep evil in check for our nation. 877.219.2519
www.abchs.com
Dr. McCann, a former law enforcement professional, is a clinical psychologist. He was interviewed for The Forensic Examiner’s one-year 9/11 anniversary issue. Since September 11, 2011, I have learned that as a professional responding to the unexpected that numerous victims and their families have suffered greatly from that tragic day. From the perspective of people of a democracy, we must cherish our freedom and realize that sometimes it comes at a very high cost. Being assigned to both Ground Zero and the morgue, I personally witnessed the profound impact on thousands of people. I realized that the perception of therapy being provided in a secure environment had a different paradigm. My life has been changed in the sense that the security once felt by all Americans has been taken from us. My initial emotional response was: “What can I do to help?” With my training and background in law enforcement, I immediately went into response mode. But I will never forget—in spite of all the carnage and destruction around me—the sight of an Army vehicle, loaded with soldiers and 50-caliber machine guns in Lower Manhattan on September 12, 2001. It struck me that we were now at war, a war unprecedented in its tactical response and the battlefield was now on our home soil. Many of my patients who were first responders, along with their families, continue to suffer the effects of 9/11. The responders suffer flashbacks, nightmares, poor stress tolerance, an inability to socialize, anger, rage, profound sadness, and the foreboding feeling of “when will this happen again?” In addition to the psychological effects, many suffer from severe medical conditions. One of the hallmarks of this country has been its ability to respond to any external or internal threats. The realigning of our law enforcement agencies and military has fostered better communication and created a single-minded approach to fighting and eradicating terrorism. I continue to be fully confident that we will prevail in our mission. History has shown that we, as Americans, have the ability to do that. I think that all forensic specialists must continue to think outside the box and work more closely with each other. We are in uncharted waters and we must be prepared to respond to unforeseen threats. The biggest mistake we can make is in being complacent. We must take every threat or warning seriously. We must trust our instincts and experience when it comes to dealing with individuals, organizations or countries that despise our way of life.
increase in CIA applications from 2001 to 2002
Fall 2011
Inside Homeland Security®
21
9/11 m e m o r i e s Dr. Marilyn K. Gilbert, PHD, DAPA, CHS-III Michigan
World Trade Center (formerly known as the Freedom Tower) under construction on May 7, 2011 in New York, New York. Photo by Christopher Penler / Shutterstock.com
22
Inside Homeland Security®
Fall 2011
1.4 million
On the morning of September 11, 2001, Maria Conti was busy working at her desk in downtown New York. Although many years have passed, Maria continues to remember that day as if it had just happened. A burning odor, the beeping sound of an emergency vehicle, or a man wearing a red necktie, immediately send Maria back to that morning when she found herself running ankle-deep in gray ash to escape the assailants who were attacking her city. Maria speaks of her experience with bewilderment. “My office was on the 17th floor of a building on Broadway, very near the World Trade Center. It was early morning and we were beginning our workday. Suddenly, the familiar, comfortable hum of the office was interrupted by a horrible noise. Without warning the first plane had hit the North Tower of the Trade Center. Everyone in the office rushed to the windows. We were looking up at a fire high in the sky toward the top of the Tower. We stared, mesmerized by a gaping hole and the billowing clouds of black smoke coming from the tower. At first we thought a small plane or helicopter had accidentally hit the World Trade Center. “Suddenly, I saw something tumbling down. ‘Oh my God!’ Someone shouted. I focused on what I thought was falling debris. It wasn’t debris. It was a man tumbling downward! He was wearing a red necktie, and the tie was like the tail of a comet parachuting over his shoulder. Horrified, I turned away from the window. That poor man! I still can’t get the awful sight out of my head. “It was a numbing experience. As I look back, even after all this time, I still seem to be on hyper-alert. The triggers are everywhere. The sights, sounds, and smells of that day are now frozen in my memory. I still hear the police yelling out orders, the horns honking, and sirens blaring. A loud noise, car backfire, the smell of fire or burning rubber or plastic—it doesn’t take a lot to trigger the memory of 9/11. Not long ago, I passed a man who was wearing a red necktie. I stared at that tie and I remembered that poor man on 9/11 who’d fallen past my window on the way to his death. Each time that happens, I pay a silent tribute to those who lost their lives on that fateful day.”
Number of Americans who changed their 2001 holiday-travel plans from plane to train or car:
The following is an excerpt from Gilbert’s soon-to-be-published book, Voices Left Behind. A clinical psychologist, she will be presenting a workshop on “Grief and Loss” at the 2011 Executive Summit, Oct. 12-14.
Tiffany Clark, E4, CHS-III California
On September 11, 2001, I was a freshman in college in Clinton, Mississippi. I remember the date all too well; I was headed to my chapel class, when all of a sudden class was cancelled and everyone was called into the school’s auditorium. There, we learned about what had happen and that I had classmates with family members who worked either in the World Trade Center or around it. It was a day full of sorrow and sadness; the faces of those who had lost loved ones and thought that they had lost loved ones was enough to make anyone cry. I then began to pray because in a time like that, it is all we can do. My heart is and has always
www.abchs.com
877.219.2519
American flags sold by Wal-Mart on Sept. 11, 2000:
6,400
Dr. Joseph Prudhomme, PhD, THD, CHS-II, CMc California
Photo by Chuck Kennedy / mctdirect.com
gone out to those who have lost loved ones due to a senseless attack. For the troops who were sent to battle, for those who died, I prayed and continue to pray for their well-being. It takes a strong person to be willing to give their life for the freedom of their country, friends, and family. I have since joined the U.S. Navy and I am proud to serve my country and help in ensuring that freedom will continue to be ours. Being reminded of what took place September 11th makes me want to fight even harder and be the best at everything I do. So many families lost their mothers, fathers, children, etc. No one has the right to take the life of another, and for so soulless people to have taken that stand, makes me wonder what kind of a world we are living in. The impact that 9/11 had on me is basically make every moment with friends and family worthwhile. Don’t take the little things for granted or mistreat others because you never know when it may be taken away from you.
877.219.2519
www.abchs.com
As a disaster chaplain for the American Red Cross, I was sent to New York on September 11, 2001. With a search-and-rescue group from Sacramento, I flew a C5 plane from Travis Air Force Base in Fairfield, California, to Maguire Base in New Jersey. I then rented a car and drove to New York City. As I approached the city by car, I could see the black smoke in the sky. It reminded me of Armageddon. The closer I got, the worse the smell was—a smell I could not describe as I had never experienced it before. Someone told me later that it was the smell of dead bodies. Once in New York, the American Red Cross appointed me to the Family Center, which was set up at the armory. The lines outside spanned for several blocks with family members waiting to hear word on their loved ones. Inside, they had long tables set up for the investigators, detectives, and police officers to interview those looking for relatives. Armed with photos, dental records, birth certificates, and even X-ray records, they had to fill out the proper forms with the investigators on the other side of the tables. I remember a woman who was so distraught, she could not remember the color of her husband’s eyes, to whom she had been married for over 40 years. That’s when the investigators called for a chaplain and I went to that table to comfort that lady. Later that day, former President Bill Clinton and his wife Hillary entered the armory from the back door. Mrs. Clinton went on the right side, and President Clinton on the left side, where I was. He stopped and shook hands with a lot of people, including mine, and I saw that his eyes were full of tears. Seeing all those people looking for family members was too much for him. That really moved me. I will never forget that. The President wept.
116,000
American flags sold by Wal-Mart on Sept. 11, 2001 Former President Bill Clinton Photo by Chuck Kennedy / mctdirect.com
Fall 2011
Inside Homeland Security®
23
9/11 m e m o r i e s
Geovani Hernandez, CHS-III Texas
This tragic event changed the way I see the world forever. At that particular time of my life, I was employed as a city police officer. After the event, I wanted to contribute and make a difference and became part of the United Nations International Police Task Force. … This career change gave me the opportunity to travel and conduct police business in Kosovo (Former Republic of Yugoslavia). … After the Kosovo mission, the opportunity to work in Afghanistan as a police instructor, mentor, and advisor presented itself. … A few weeks later, I was in Afghanistan walking the streets side by side with the Afghan Police and Military Police forces, providing advice and instruction.
alan e. williams, CHS-V, dabchs
Total number of U.S. service member fatalities from wars in Afghanistan and Iraq (as of June 2011):
6,026
South Carolina
In September of 2001, I was a detective with a local police department in South Carolina. On September 9, 2001, the city chief fire investigator and I traveled by car to Newark, New Jersey, to pick up a suspect in an arson case for extradition back to our city. I remember traveling north on I-95 and seeing the late afternoon sun reflecting off of the twin towers of the World Trade Center, remarking on how striking it was. The next day, September 10, we spent in Newark interviewing the suspect and making arrangements for the extradition. The local authorities advised us that our suspect would need to go to court on Tuesday, September 11, and we would not be required to be there. Since we were going to have the day off, the chief fire investigator made the suggestion that we should go to the World Trade Center and view the area where the 1993 bombing had occurred. I agreed and we made plans to leave in the morning. We were up early on the morning of September 11, making plans to catch a transit bus into the city. The desk clerk at the hotel told us we should wait a while and take a later bus so we would miss some of the early morning traffic. We missed the first bus we had intended to catch that morning and took another. As we approached the Lincoln Tunnel, people on the bus who were talking on their cellphones were complaining that they had lost service. The bus driver told everyone that he had heard a plane had crashed into the World Trade Center. It was then that we came around a bend and saw the WTC towers on fire and emitting columns of smoke. It was then that we heard the report that the Pentagon had been attacked, too. The bus driver stopped on the side of the road, near the river separating New York and New Jersey, to await instruc-
tions as the Lincoln Tunnel had been closed. We watched the fire in the towers. As trained fire investigators, both of us knew some of the actions being taken and the hazards that both the firefighters and the police in New York City were undergoing in order to save lives and extinguish the fires. As we watched, we both noted the change in the towers and how one was beginning to lean. We shared a look and he turned to me saying, “It’s going to collapse.” And before our eyes, it did just that. We both knew then that perhaps thousands of people had been killed, including some of our firefighter and police brothers and sisters. It was unnerving. To this day, I remember the sights I saw and the reactions of the people on that bus. A father calling his wife to get their kids out of school; a man across the aisle from me who worked in the towers and was going to work late was in shock and scared for his co-workers; another man that had been talking to his secretary on the phone who was in the tower when the phone went dead. All of them put a human face on this tragedy that will never go away. On September 12, 2001, we drove back to South Carolina and we passed the Pentagon and saw the devastation there also. I have driven I-95 many times in my life and it was practically deserted. I noted with pride that every overpass we went under from New Jersey to South Carolina had an American flag or some kind of sign on it. It was both aweinspiring and a signal that, although down, we would never be out of the fight. In the years since, I have been heavily involved in homeland security matters in the police department, becoming the Homeland Security Coordinator in the department before I ended my law enforcement career. Today I teach homeland security, emergency management, and criminal justice courses at a local community college and try to impart to my students—many of them who were very young when 9/11 occurred—the human side of that day.
Estimated number of children who lost a parent in the 9/11 attacks: 24
Inside Homeland Security®
Fall 2011
3,051
www.abchs.com
877.219.2519
Honor
Edward Bailor, CHs-III Maryland
On September 11, 2001, I was teaching a class for the U.S. Capitol Police on Civil Disobedience. I was the Field Force Commander for our 400-man CDU field force. I was going over the First Amendment and demonstrators rights when I learned about the event. I immediately cancelled class and told every body to report back to their divisions. We were training at the Bolling AFB off of Capitol Hill. We were getting ready to do CDU formation drills. On my way back to the Capitol, and inbound on the top of the South Capitol Street Bridge, I saw the plane hit the Pentagon and called it in on our police radios. It was scary; I was told on my secure radio channel that another plane was heading for the Capitol. When I got back to Capitol Police HQ, Senators and members of Congress were running to Police HQ. Funny, seeing them running. They had just evacuated the Capitol. I saw this and had officers secure the perimeter of the Police HQ building and start security sweeps SWAT, K-9 and Bomb Squad and to make the outer perimeter farther out. I placed officers with automatic weapons at the doors to our HQ and was reporting this to the command center. As the Capitol Buildings Emergency Preparedness Coordinator, I then responded to the Command Center for Operations. Shortly thereafter, the plan to relocate our government was instituted and I then went to the meeting place with my CERT- SWAT team to land helicopters for the relocation. After a few hours, I started the planning sessions for the new security posture and manpower requirements for securing the nation’s Capitol. There was a lot of hard work by many fellow officers and command staff for many days. It was days before I was able to return home to be with my family. In just a few short weeks later, I was then the 1st Incident Commander for the Hart Senate Building anthrax attack. My WMD Alert Team was again double taxed and overworked. It was months before any semblance of regularity was returned to police duties. What a historic time to work at the Capitol, and I was honored to be there.
Rev. Ed Shover, DMin, CMC, CHS-I Pennsylvania
877.219.2519
www.abchs.com
Fall 2011
increase in Peace Corps applications from 2001 to 2002
I was 43 at the time I arrived at work around 8:30 a.m. on Tuesday, September 11, 2001. I was a memorial counselor at the Twill Hills Memorial Park in Muncy, Pennsylvania, helping individuals make their final details with burial arrangements. … When I saw the second Tower being hit by the second plane, I was shocked. It felt surreal—this can’t be happening! What is going on here? Now both towers have been hit by planes. I had never witnessed anything like this on American soil. Yes, there had been two bombings before— the prior bombing of the Trade Center and the government building in Oklahoma City, Oklahoma. Nevertheless, nothing like this, on such a grand scale, had happened before! I remember crying a couple of times throughout the morning about the incident.
Inside Homeland Security®
25
9/11 m e m o r i e s Phillip E. Guffey, MS, CPP, CHS-v Indiana
Number of firefighters on leave for respiratory problems by January 2002
My story is not about being a hero, nor is about the loss of a loved one. It is not about how I braved the dangers of that day and/or later the foreign battlefields to ensure our freedoms. In fact, I was far away from the danger on 9/11. So why write this article? I will share with you what I felt on that day and tell it as simple as I can. 9/11 took something away from us all, an innocence of sorts. As the events of that day unfolded, I remember a hush falling over everyone at work. I remember thinking about my family, where they were, and wanting to go home and to be with them, just to be close and to know that they were safe. I remember how the normal workday came to a halt, and everyone gathered around television sets to watch the events unfolding. I remember leaving the office at the end of the day and needing to go home to be with my family. We were all quieter that day; the noise would come later. My story is also about my little girl asking me as I tucked her safely in bed that night, “Daddy, what’s happening?” As I looked into her little worried face and hugged her and reassured her that everything was OK, I remember how that day affected all of us. We were all hurting, and if anyone had asked me why, at the time I would be at a loss for words. We all shared something together on September 11, and we will never forget. There were many heroes that day, but I am not one of them.
300
ASC0311IHS
Are you protected against employee sabotage? Learn how to identify and preventthe greatest threat to government, military, and private sector organizations today.
Anti-Sabotage Certified, ASC
SM
O n li n e m u lti - m edia co u r se
American Board for Certification in Homeland Security
www.abchs.com
26
Inside Homeland Security®
Fall 2011
1-877-219-2519
www.abchs.com
877.219.2519
Certified in Homeland Security: Level 5 (CHS-V), Certified Master Chaplain (CMC)
Go to www.abchs.com to sign up or call 877-219-2519 for more information.
Ground Zero
A Chaplain’s Diary
Photo Credits: Larry Bruce / Anthony Correla | Shutterstock.com
By: Chaplain David J. Fair, PhD
Become a CERTIFIED MASTER CHAPLAIN by enrolling today, to begin to not only provide religious support, but also key responsibilities in Incident Command System (ICS) Operation and Critical Incident Stress Management.
Z e ro. d n u o r G ht s at ig l e e r lig ht, h h t t e o e n s a d l w e r I sa e, I cou t a m w d e n i h h t a n di n g e t s s s “B o y r t r c e a b i d lo o k e e of L o me But a s I . I s a w t h e St at u God wa s sa y i n g t ll.” if it e it wi e v e i l e b a n ot h e r s a rbo r, a n d it wa s I f u lly d h n e A h t ’ . Fa i r, t n h e i v ig a r l D a t a ll n e i b a Ch a pl g on n a — ’s it HS-V C , e , v C a ‘D M C r Ch a i
877.219.2519
www.abchs.com
Fall 2011
Inside Homeland Security®
27
I was honored to be called to deploy to Ground Zero as a police chaplain 10 days after the attack on the Twin Towers. I captured my experiences and thoughts in diary form. I delivered these thoughts in a Patriot’s Day speech to a group of citizens in Brownwood, Texas in 2002.
I
t was a great honor to be chosen to respond to New York last year following the 9/11 World Trade Center collapse. I went as a Police Chaplain attached to the New Jersey Critical Incident Stress Management Team, assigned to the Port Authority who operated the World Trade Center. A Stress Management Team helps emergency workers such as police, fire, and EMS deal with their emotional response so they don’t burn out or have a nervous breakdown. While in New York, I worked at ground zero, at Belleview Hospital and morgue, and assisted in the command center. I talked to dozens of emergency workers, visited with surviving family members, and visited some of those hospitalized after being pulled from the collapsed towers. At Ground Zero we were required to wear the same dress as the rescue workers—hard hats, gloves, and masks—to filter out the dust and smoke. It was still burning at 1,600– 2,000 degrees. My first day there was actually night. The scene was lit with portable stadium lights giving it the look of day. It was all so surrealistic. I stood there not fully believing I was actually there. If anyone had told me a month before I would be standing where the World Trade Center once stood, I would have said they were crazy. There was just so much devastation piled five or six stories high. It looked like the world’s largest trash heap. There were two kinds of work going on. First there was the rescue effort—firemen and policemen digging by hand to try to find survivors or recover bodies. The second effort was large construction equipment moving the huge steel beams and other debris. Certain areas were
28
Inside Homeland Security®
Fall 2011
given specific names. There was “the pile,” where the debris was heaped; there was “the pit”, where workers were digging by hand. Ground Zero became known as Ground Hero in honor of those who lost their lives saving others. As sad and devastating as the loss of over 3,000 lives was, we must remember there were many thousands more in the towers. That means over thousands of people made it to safety. Police, fire, and EMS workers risked and many lost their lives guiding these survivors to safety. Some actually carried or drug them out. Of the dead, over 300 were New York City firemen, with over 50 New York and Port Authority police officers. The FBI lost one agent, and as a side note, that agent who had just retired from the FBI, had started work for the Port Authority two weeks prior and was killed in the collapse. A friend of his told me that if he hadn’t retired, he would have been heading up the federal investigation. Less than a week after the tragedy, no other survivors were found. However, rescue workers hoped against hope they would still find someone alive. Firefighters have a saying: “No one goes home until the last man goes home,” referring to their fallen brothers. So they continued to dig by hand until they were forced to stop and the operation was ended. Sadly, many bodies will not be found, hampering closure for many friends and family. The heat incinerated many of the bodies. Some police officers were identified only by the serial number on their gun. The City of New York amassed tremendous resources. An entire school gym was filled with rescue supplies, rain gear, lights, and everything else that was needed by rescue workers. Food was never in short supply. Because the Port Authority operates LaGuardia, JFK, and the Newark airports, they contracted with Marriott for food service, so food was delivered to a number of places for rescue workers and support staff. Because there was fear of contamination, there were hundreds of portable hand-wash stations. There were even places where they washed your boots before we left certain areas. There were hundreds of portable toilets to meet the needs of workers. The Red Cross brought in a three-deck cruise ship, docking it near Ground Zero. Two decks were used to feed us; the third deck had cots to rest and volunteer chiropractors and massage therapist helped get workers back in the recovery effort. The attitudes of the workers, and even the survivors www.abchs.com
877.219.2519
Photo Credit: Vladimir Korostyshevskiy | Shutterstock.com
were much better than I expected. They seemed to have a purpose. If they could recover bodies, they would be content. Each time a body, or even body parts, were found there was a sense of relief. If the body was a fireman or policeman, a color guard accompanied it to the temporary morgue. I went there to help them, but they helped me to come back with their high spirits and gratitude. I expected to come back devastated, but instead came back blessed. God keeping me above the cloud of total despair. Rescue workers were working 12 hours on and 12 hours off, seven days a week to start, and then reduced to six days a week. The chaplains worked the same schedules. There was a makeshift canteen at Ground Zero where food was served, and each night some celebrity would come to help serve. I met Brook Shields, and there was also some pro wrestlers, the mayor, and then New York Senator Hillary Clinton. Everyone had a story. At Belleview Hospital, there was an area called the “Blue Wall,” where—during construction earlier in the month—workers put up a plywood fence and painted it blue. Survivors now put up pictures of their missing friends and relatives on that wall, in hopes someone would find them among the injured or recovered. A makeshift memorial was started along the wall with flowers and candles. Other memorials were at Fire Station 10 across from the World Trade Center that lost 14 men, and at the Port Authority Headquarters, as well as existing police and fire memorials near the river. There were stories of those who survived the 1993 WTC bombing only to perish in this attack. Others survived both terrorist acts. Every cloud has a “Silver Lining.” To me there are four very positive things that came out of the 9/11 tragedy: • Patriotism. This is still seen nationwide. Everywhere you go, even today, there are flags and plenty of red, white, and blue on T-shirts, caps, and bumper stickers. And of course now 9/11 is called Patriot’s Day. • People came together in time of need. I saw rescue teams from Mexico, Colorado, California, Illinois, Texas, and many more. One officer I visited in the hospital, though in great pain, told me to thank everyone who came. He couldn’t believe how much help was there. On September 10, people on the streets of New York wouldn’t even make eye contact. But after the attack, as I was walking in downtown New York City, I saw a man drop something on the sidewalk and people stopped and helped him look for it. • There is also increased awareness of God, in a positive way. Not where was God, but rather God was there, with us. 877.219.2519
www.abchs.com
Because I work as a chaplain around so much death and trauma, let me give you my insight as to why “Bad Things Happen To Good People.” I don’t believe tragedy is caused by God. There are, in fact, laws that are in effect. First is the law of gravity. A wheel comes off a car, it is apt to wreck. A wing breaks off a plane, it will crash. The second law is, “Man’s Free Will.” We are free will moral agents. Man makes bad choices and suffers the consequences. God will not override a man’s free will. In the Garden of Eden, God told Adam and Eve not to eat the apple, the fruit of the forbidden tree. Yet they did any way. God didn’t stop them. He allowed them to make a choice, even a bad choice, and to suffer the consequences: Banished from the Garden forever. In the Old Testament, God says, “I set before you today, life and death, blessings and cursing. I want you to choose life.” But God says you must choose. Man chooses and God lets him live with even the bad choices, although it breaks His heart. • The final positive thing I saw was a renewed respect for law enforcement. Even crime in New York was down— it affected even the criminals. I want to begin to wrap up on this note: one night I was standing on the deck of the Red Cross ship. I had been at Ground Zero. I was hot and tired. Behind me, I could see the lights at Ground Zero. But as I looked across the water I saw another light, another site. I saw the Statue of Liberty standing tall in the harbor, and it was if God was saying to me ‘Dave, it’s gonna be alright.’ And I fully believe it will. Here we are at 9/11 2002 Patriot’s Day. We live in the greatest country on earth. We have a choice to be either victims or survivors. It’s time now, a year later, to be survivors. We need to keep on praying, keep on loving, and keep being faithful to do what we know in our heart is right, just, and moral. God is with us in the storms of life. The Bible tells us that He will never leave or forsake us. Thank you and may God Bless the United States of America.
A b o u t t h e Au t h o r David J. Fair, PhD, CHS-V, CMC, is a member of the ABCHS Executive Advisory Board and chair of the American Board for Certified Master Chaplain (ABCMC). Fair is president and CEO of Homeland Crisis Institute and has served at dozens of disasters, including Ground Zero following 9/11, hurricanes Katrina and Ike, the NASA space shuttle disaster, the Fort Hood shootings, and the Haitian earthquake. Fall 2011
Inside Homeland Security®
29
Are You Prepared to Answer a Cry for Help?
CMC0311IHS
Certified Master Chaplain, CMC ® The American Board for Certified Master ChaplainsSM (ABCMC)
Coming Soon: More Specialty Courses Medical Services Fire and Rescue Mental Health Emergency Hospice Hospital
Created by The American Board for Certification in Homeland Security, CHS®, the ABCMC is an educational-based, multidisciplinary, professional network of chaplains who support homeland security. ABCHS’s diverse membership includes over 200 specialty fields within the local, state, federal, and private sectors of the homeland security arena. Identified and recognized as chaplains with specialized expertise and experience, these active practitioners and professionals are committed to providing critically needed ministerial, psychological, and spiritual support and intervention services to homeland security fields and victims of crisis and traumatic events.
Military Online
Law Enforcement Online
T
$500,000
877.219.2519
www.abchs.com
32 36 40 44 46 47 56
Terrorism 9 years, 7 months, & 20 days
Bin Laden’s age when killed:
Fall 2011
Killing Bin Laden The Bombing of U.S.S. Cole Preemptive Self Defense in the Age of International Terrorism Exploiting Vulnerabilities Timeline of Terrorism Special Report: Behind the Burqa & Sharia vs. American Law How Far America Has Come Since 9/11
Estimated cost to plan and carry out 9/11 attacks:
Time it took, following 9/11, to find and execute bin Laden:
54
Inside Homeland SecurityÂŽ
31
Distinguish Yourself as a
CERTIFIED INTELLIGENCE ANALYST EXPERT Intelligence Analyst Certified, IAC ® in Homeland Security This course offers a study of best practices, tactics, operation, and organization structure, mind set, and leadership in the analysis of intelligence. Please call (877) 219-2519 or visit www.abchs.com or e-mail Chief Association Officer Marianne Schmid at cao@abchs.com
The American Board of Intelligence Analysts® (ABIA) CIA0311IHS
www.abchs.com • 877.219.2519
Nav COOyL Approved
You Are at Risk Become Certified in Sensitive Security Information The Sensitive Security Information, Certified® (SSI) program has been created to teach you how to protect critical information for both your organization and personal security. This course will provide the tools you need to strengthen your credentials and enhance your career. SSI0311IHS
®
Sensitive security information is stolen every 3 seconds.
Are YOU
protected?
c o u n t e rt e r r o r i s m
terrorism
Year al-Qaeda was founded by Saudi-born Osama bin Laden along with Palestinian Abdullah Azzam:
1988
1998
Approximate year al-Qaeda began planning aircraft assault
877.219.2519
www.abchs.com
Fall 2011
Inside Homeland Security速
33
terrorism
c o u n t e rt e r r o r i s m
Cursed is the man who dies, but the evil done by him survives. - Abu Bakr
Killing Bin Laden:
Is the Mastermind Really Dead and Are We Ready for Acceptance?
By Richard J. Hughbank, CMAS Certified in Homeland Security, CHS-IV here are eight stages to what is more commonly referred to as the “Grief Cycle,” introduced by Dr. Elizabeth Kübler-Ross in her book titled On Death and Dying. While this is not an article on grief, or how to recover from grief, I believe Americans have significantly suffered through this emotional cycle since 9/11. We have run the course of this cycle during the past 10 years, and most are inclined to believe that we are in the final stage of “Acceptance” after learning of the death of Usama bin Laden. But, is this the case and are we ready for the acceptance of the 9/11 terrorist attacks as a direct result of bin Laden’s death? Since the 9/11 attacks, Americans have been looking for closure—to end the cycle of grief. For some, closure comes with time, while others were seeking the death of the man whom they believe masterminded the deadliest terrorist attack on U.S. soil in the history of our nation. After nearly 10 years of actively pursuing bin Laden in an effort to bring him to justice, Americans believe that have finally begun the final stage of the much-needed healing process. On Sunday, May 1, 2011, Navy Seal Team 6 closed in on bin Laden’s compound in Abbottabad, Pakistan—located in the Hazara region of the Khyber Pakhtunkhwa province, approximately 31 miles northeast of capital Islamabad. During their tactical assault on the million-dollar compound, bin Laden was finally found and subsequently eliminated as the head of al-Qaeda. Now, should his death propel Americans into the final stage of the grief cycle and allow us to finally put the events of 9/11 behind us and move forward? As hundreds of news agencies began reporting on the assault of the compound and subsequent death of bin Laden, Americans found themselves exhaling in an explosive sense of rejoice and relief. Most Americans, I believe, were finally able to experience some sort of satisfaction in the form of retribution. The leader of the notorious terrorist organization known as al-Qaeda had been brought to justice in the only way that could have provided
complete satisfactory closure—with his life. The Latin phrase Lex Talionis—an eye for an eye (also known as the Law of Retaliation)—comes to mind. However, I believe another important question remains to be answered to ensure our sadness and rage has been fulfilled and satisfied, leading to a complete emotional healing process. Was bin Laden the real mastermind and perpetrator of the 9/11 attacks? To this end, we must identify who was truly behind the plans and attacks to find solace as a nation. There are some scholars, investigative reporters, and professionals who believe bin Laden is not the person who planned and executed the attacks on the World Trade Center and Pentagon. So, who is the other possible candidate? I believe it is Khalid Sheikh Mohammed (KSM), who has also taken responsibility for the 2002 capture and beheading of the U.S. reporter, Daniel Pearl. Allegedly, KSM met with bin Laden in January 1996. It was during this meeting that KSM was asked to join al-Qaeda and its social movement in which KSM declined (Emerson, 2006). Upon his return to the United States, KSM initiated his plans to commit to hijacking four planes with 19 terrorists and use them as vehicle-borne improvised explosive devices (VBIEDs). KSM was captured in Quetta, Pakistan, on March 1, 2003 (Emerson, 1996; Thomas, 2007; Taylor & Wittes, 2009) before the execution of these plans. During his incarceration and various interrogations, KSM spoke of his involvement in the September 11 attacks and other important information pertaining to a number of various terrorist attacks around the world. If Khalid Sheikh Mohammed is the mastermind behind the 9/11 attacks and the executor of Daniel Pearl, then Americans should still feel a sense of emptiness from that horrific day. KSM is currently imprisoned at the detention facility in Guantanamo Bay, Cuba, and, thanks to President Barack Obama’s March 17, 2011 Executive Order, he will be tried by a military commission where I believe justice has a greater chance of being served. Based
Year 9/11 architect Khalid Sheikh Mohammad (KSM) graduated from North Carolina Agricultural and Technical State University in Greensboro with a degree in mechanical engineering: 34
Inside Homeland Security®
Fall 2011
1986
www.abchs.com
877.219.2519
T:4.625 in
on the Ahmed Khalfan Ghailani trial for his role in the two U.S. Embassy bombings in Africa, the Federal Court system proved a tremendous failure as seen in the final verdict and subsequent punishment. For those of us who are waiting for a reason to rejoice and champion the cause of retribution for the despairing events occurring on September 11, 2001, our time is nearing. Bin Laden’s death, while eagerly awaited by millions of Americans, did not truly mark the end of an era. However, the adjudication and conviction of KSM will provide us with that much anticipated satisfaction for the mass murder and economic destruction that occurred in Pennsylvania, New York City, and Washington D.C. An emotional fulfillment that is long overdue if you ask me.
References
Emerson, S. (2006). Jihad Incorporated: A Guide to Militant Islam in the US. Amherst, NY: Prometheus Books. Taylor, S. & Wittes, B. (2009, May 10). Looking Forward, Not Backward: Refining American Interrogation Law. A Working Paper of the Series on Counterterrorism and American Statutory Law, a joint project of the Brookings Institution, the Georgetown University Law Center, and the Hoover Institution. Retrieved July 22, 2011, from http://www.brookings.edu/~/media/Files/rc/papers/2009/0510_ interrogation_law_wittes/0510_interrogation_law_wittes.pdf. Thomas, E. (2007, September 03). Into Thin Air. Newsweek. Retrieved on July 22, 2011, from http://www.nps.edu/programs/ccs/Docs/ Pubs/Newsweek_Into_thin_Air.pdf.
99% of Americans have seen combat on TV. 1% of Americans have seen combat in Iraq or Afghanistan.
Learn from terrorism experts today and become a Certified National threat analyst, cnta, where homeland security professionals will be taught the intricacies of the international terror network. For more information on the program, see our ad or call 877-219-2519. Enroll online at www.abchs.com.
877.219.2519
Photo by Petty Officer 2nd Class Sandra M. Palumbo, U.S. Navy - Bahrain, November 6, 2007
ab o u t t h e au t h o r Major Richard J. Hughbank, U.S. Army (retired), CHS-IV, is an assistant professor in the Criminal Justice Department at Northwestern State University teaching graduate homeland security studies. He is also the President of Extreme Terrorism Consulting, LLC. Hughbank has over 21 years experience in the Military Police Corps, is a combat veteran in the War on Terror, and a published author in the fields of security, active shooters, terrorism, and homeland security. Hughbank has a graduate degree in mental health counseling and is currently a doctoral candidate in management and homeland security. He can be contacted through his company website www.under standterror.com, rhughbank@understandterror.com, or on his professional blog on Facebook—“Understand Terror.”
We know where you’re coming from. If you’re a veteran of Iraq or Afghanistan, you’re not alone. We’ve been there. Join us at CommunityofVeterans.org
www.abchs.com
Fall 2011 This advertisement was prepared by BBDO
Inside Homeland Security®
35
terrorism
Bombing
The Bombing of U.S.S. Cole (DDG
By Shawn VanDiver MS, CPP, CTT+, CMAS, CAS-PSM
Prior to the Attack
I
n February 1998, Osama bin Laden issued and endorsed a fatwah, or Islamic Rule of Law, under the banner of the “International Islamic Front for Jihad on Jews and the Crusaders.” The fatwah was published in the pan-Arab daily newspaper Al-Quds al-‘Arabi on February 23, 1998, stating that Muslims should kill Americans—including civilians—anywhere in the world where they can be found (United States vs. Jamal al Badawi and Fahd al Quso, 2003). The planning for the attack began in Spring 1999. Tafiq Muhammed Saleh bin Roshayd bin Attash, a.k.a. “Khallad,” delivered a letter to Jamal aal Badawi in Yemen enlisting him to assist Abd al-Rahim al-Nishri in an operation (United States vs. Jamal al Badawi and Fahd al Quso, 2003). It is widely believed that Jamal al Badawi was the chief coordinator in Yemen. In summer of 1999, Badawi and Nashiri located and leased a property in the Madinat al Sha’ab area in Aden, Yemen, for an initial six-month term. Around this time Nashiri also directed Badawi to locate and procure a boat and a truck to tow said boat to Aden Harbor (Mockaitis, 2007). Nashiri also requested that the landlord of the Madinat al Sha’ab property install a gate in the entrance to the wall surrounding the property so that they could store and secure a boat there (United States vs. Jamal al Badawi and Fahd al Quso, 2003). In accordance with Nashiri’s requests, Badawi, by the fall of 1999, secured a white boat with a red velvet deck cover within the premises of their rented property in Madinat al Sha’ab (United States vs. Jamal al Badawi and Fahd al Quso, 2003). In the fall of 1999, Nashiri and others transport-
Since September 11, 2001 terrorism has been a front-running issue in the United States and, in reality, all over the world. About a year prior, on October 12, 2000, Islamic Fundamentalist terrorists attacked the U.S.S. Cole while it was visiting Aden, Yemen for a brief stop for fuel (BSF) during its 2000 Western Pacific Deployment (Historian, 2004). This attack killed 17 sailors and injured 39 others. The explosives detonated outside the hull precisely at the galley/messdecks where the crew was lining up for lunch (Sageman, 2008). ed explosives from Sa’dah, Yemen, to their property in Madinat al Sha’ab in a 1979 Shaus truck (United States vs. Jamal al Badawi and Fahd al Quso, 2003). On January 3, 2000, Nashiri and others transported the previously purchased boat, now laden with explosives, from the Madina al Sha’ab location to the Aden Harbor and launched it to attack the U.S.S. The Sullivans (DDG-68), which was refueling in the harbor. Luckily for the officers and crew of that ship, the explosives-laden boat sank in the harbor within sight of the ship. On January 4, 2000, Nashiri and others returned to the beach area of the Aden Harbor to recover the sunken boat and explosives. After the aborted attack on The Sullivans, Badawi and Nashiri discussed the ongoing plot to drive American forces from the Arabian peninsula by complying with bin Laden’s edicts and attacking a United States naval vessel (United States vs. Jamal al Badawi and Fahd al Quso, 2003). Later in January 2000, having shaven and donned western clothing to avoid attracting suspicion from law enforcement, Fahd al Quso and Ibrahim Al-Thawar traveled to Bangkok, Thailand, to meet with Khallad. Al-Thawar would later become one of the suicide bombers that perpetrated the actual attack on the U.S.S. Cole. They delivered approximately $36,000 to Khallad when they arrived in Bangkok (United States vs. Jamal al Badawi and Fahd al Quso, 2003).
U.S.S. Cole (DDG-67) prior to the bombing on October 12, 2000. Photo Credit: NHHC Photograph Collection | www.history.navy.mil
Certified in Homeland Security: Level 5 (CHS-V), Certified in Disaster Preparedness: Level 1( CDP-1), Sensitive Security Information (SSI)
DDG-67) During the summer of 2000, the other suicide bomber, Hassan Awadh Al-Khamri, leased a safehouse in the AlBurayqat Kud Al-Namer area of Aden. He also leased an apartment perched in the hills of the Al-Tawahi area of Aden overlooking Aden Harbor where U.S. ships routinely berthed for fuel (United States vs. Jamal al Badawi and Fahd al Quso, 2003). In the spring and summer of 2000, Khallad and Nashiri met with bin Laden in Qandahar, Afghanistan. Nashiri and several others also tested explosives at an al-Qaeda training camp during this time period. Upon Nashiri’s return to Aden, he and others successfully tested the explosives that had sunk during the attempted attack on The Sullivans in January 2000. Upon successful testing, Nashiri and others refitted the boat that sank in January 2000 to strengthen the hull and increase the number of fuel tanks (United States vs. Jamal al Badawi and Fahd al Quso, 2003). Departing Norfolk, Virginia, on August 8, 2000, for a Western Pacific Deployment, or WESTPAC (Lumpkin, 2006), the Cole was heading east under command of U.S. Navy Cmdr. Kirk S. Lippold, stopping in Aden, Yemen, for a BSF. Prior to pulling in, the Cole received the NCIS port security assessment, which gave Yemen a “high” threat level, the fourth highest of a five-level threat alert system (Lumpkin, 2006). It can be reasonably assumed that Nashiri and/or Badawi received intelligence about the date that U.S.S. Cole would be entering port for fuel (Lumpkin, 2006). In September or October 2000, Badawi enlisted and trained Quso to film the proposed attack on a United States naval vessel from the Tawahi apartment. He also provided him a pager and advised him that he would receive a predetermined code on the pager that indicated an imminent attack on the naval ship and that he should depart for the Tawahi apartment to begin filming (United States vs. Jamal al Badawi and Fahd al Quso, 2003). At various times throughout the planning process of this attack, Khallad traveled between Afghanistan and Yemen to engage in activities and coordination on behalf of al-Qaeda. In late September or early October 2000, Osama bin Laden arranged for Khallad to return to Afghanistan from Yemen (United States vs. Jamal al Badawi and Fahd al Quso, 2003).
The planning for the attack began in
Spring 1999
877.219.2519
www.abchs.com
Fall 2011
Inside Homeland Security®
37
Day of the Attack On the morning of October 12, 2000, Ibrahim Al-Thawar and Hassan Awadh Al-Khamri launched the 35-foot boat, laden with the explosives TNT and RDX, from the trailer on a truck at the Al-Burayqat Kud Al-Namer location in Aden Harbor. At about 11 a.m., Quso departed his residence in Aden for the apartment in Tawahi after receiving the predetermined code on his pager purchased by Badawi. Around that same time AlKhamri and Al-Thawar boarded the boat in Aden harbor and launched in the direction of the Cole, which was berthed and refueling in Aden Harbor (United States vs. Jamal al Badawi and Fahd al Quso, 2003). Approximately 22 minutes later, Al-Khamri and Al-Thawar approached the U.S.S. Cole, which was being serviced at the pier, offered friendly gestures to several crew members, and came up right alongside port side midships. They detonated the explosives, ripping a hole approximately 40 feet in diameter in the side of the Cole, murdering 17 crew members and wounding at least 40 others (United States vs. Jamal al Badawi and Fahd al Quso, 2003). Al-Khamri and Al-Thawar also died in the attack. At the time, it was speculated that over 1,000 pounds of explosives were used. Divers inspected the hull of the ship and determined that the keel was not damaged. The crew fought flooding and damage to engineering spaces, getting the damage under control by early evening. Shortly after the attack, Badawi contacted Quso and requested that he retrieve and conceal the car and trailer used to tow the explosives-laden boat to Aden Harbor (United States vs. Jamal al Badawi and Fahd al Quso, 2003).
Photo Credits: US Navy News / MCT
AFTERMATH The first naval ship on the scene to assist the Cole was H.M.S. Marlborough, a type 23 Royal Navy Frigate. She sent medical and damage control teams to Cole and assisted in all rescue efforts. Injured sailors were sent to a U.S. military hospital in Germany. U.S.S. Donald Cook and U.S.S. Hawes, both U.S. Navy Oliver Hazard Perry FFG-7 class ships, arrived shortly thereafter to provide repair and logistical support. U.S.S. ships Catawba, Camden, Anchorage, Duluth, and Tarawa arrived in Aden a few days later to provide watch relief, harbor security, damage control equipment, billeting, and food service for the officers and crew of Cole. Ten days after the attack, on October 22, 2000, M.V. Blue Marlin towed Cole to Pascagoula, Mississippi, arriving on December 24, 2000. The day they were supposed to leave Aden under tow, Capt. Lippold ordered a medley of patriotic songs to be played as the crew stood at attention. The first song to be played was the “Star Spangled Banner.” Then, to the captain’s surprise, the loudspeakers began to blare “American Badass” by Kid Rock. He took one look at the executive officer and said, “Fix it.” The XO ran off to find the crewmember responsible, then stopped and let the song of defiance and American pride play on for all the potential terrorists in Yemen to hear (Thomas & Squassoni, 2007). The damage from the attack took 18 months and $250 million to repair (Lumpkin, 2006).
LESSONS LEARNED A U.S. Navy investigation found that the ship’s officers and crew failed to take a number of security measures that would have possibly prevented the attack (Lumpkin, 2006). Petty Officer John Washak said that right after the blast, a senior chief petty officer ordered him to turn an M-60 machine gun on the Cole’s fantail away from a second small boat approaching. “With blood still on my face,” he said, he was told: “That’s the rules of engagement, no shooting unless we’re shot at.” He also stated, “In the military, it’s like we’re trained to hesitate now. If somebody had seen something wrong and shot, he probably would’ve been court-martialed” (Department of Defense, 2001). One of the other crewmembers stated that if the sentries had fired upon the suicide craft, “we would have gotten in more trouble for shooting two foreigners than losing 17 American sailors” (Cosmopolitan Magazine, 2001). Several lessons were learned from the U.S.S. Cole bombing. I believe the most important of which is that regarding Anti-Terrorism/Force Protection (AT/FP) training be updated to a level that produces a unit that is clearly and visibly ready, alert, and capable of defending itself against terrorist attacks (Department of Defense, 2001). The level of competence with which units execute force protection must be the same level for which primary combat skills are executed; we must develop and resource credible deterrence standards, as well as deterrence specific tactics, techniques, and procedures; and defensive equipment packages (Department of Defense, 2001). First, we must get out of the purely defensive mode by proactively applying AT/FP techniques and assets to detect and deter terrorists. Second, transfer of transiting units between and within theaters must be better coordinated. Third, a discrete operation risk management model should be adopted and utilized in AT/FP planning and execution (Department of Defense, 2001). The DoD Cole Commission Report resulted in several changes that the author has personally witnessed, been through, and taught during his tenure in the Navy. Anti-Terrorism and Force Protection is taken very seriously nowadays, and for good reason. The Navy’s Unit Level Training and Readiness Assessment (ULTRA) training program, described within the Surface Force Training Manual (SURFORTRAMAN) ensures that leadership at all afloat units maintains a self-assessment capability to train their crew. Anti-Terrorism Training Teams (ATTTs) are responsible for training the crew of each ship. Sailors are trained to recognize hostile intent, and if they feel that they, their shipmates, or their ship are being attacked, they will act to mitigate or eliminate the threat. 877.219.2519
www.abchs.com
Photo by John Sidoriak Jr., USAF Civ. DOD Still Media Photograph
These measures, and other measures gleaned from the dynamic, constantly developing world of AT/FP have helped prevent another attack like the one that occurred on U.S.S Cole. Sailors, and others responsible for protection of assets whose destruction is attractive to terrorists, must remember to remain vigilant in order to remain hard targets and discourage attacks from those with ill intent. Physical security watches can be boring, and often seem routine, but complacency could mean the death of friends and family.
References Cosmopolitan Magazine. (2001, September 1). I Survived a Terrorist Attack. Cosmopolitan Magazine. Department of Defense. (2001). DoD U.S.S. Cole Commission Report. Washington D.C.: Department of Defense. Gupta, D. K. (2005). Root Causes of Terrorism: Myths, Reality and Ways Forward. London: Routledge. Historian, S. D. (2004, March). Significant Terrorist Incidents, 1961-2003: A Brief Chronology. Retrieved October 14, 2009, from State Department Web site: www.state.gov/r/pa/ho/pubs/fs/5902.htm Lumpkin, J. (2006, October 11). U.S.S. Cole Bombing: Suicide Attack. Retrieved October 14, 2009, from GlobalSecurity.org: www.globalsecurity.org/profiles/ uss_cole_bombing.htm Mockaitis, T. R. (2007). The “New” Terrorism: Myths and Reality. Westport: Praeger Security International. Sageman, M. (2008). Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press. Sheehan, I. S. (2007). When Terrorism and Counterterrorism Clash. Youngstown: Cambria Press. Thomas, E., & Squassoni, S. (2007, December 17). The Blast Claimed 17 lives and Crippled a Destroyer. The Inside Story of the Heroic Bid to Save the U.S.S. Cole. Newsweek. United States vs. Jamal al Badawi and Fahd al Quso, S12 98 Cr. 1023 (United States District Court Southern District of New York May 15, 2003).
A b o u t t h e au t h o r Shawn J. VanDiver, MS, CPP, CTT+, CHS-V, SSI, CDP-I, CMAS, CAS-PSM, holds the rank of Petty Officer Second Class in the United States Navy, operating in support of the Global War on Terror and the War on Drugs and providing sailors in his unit with force protection and anti-terrorism training. He previously served as a Assistant Emergency Management Coordinator, as well as the lead CPR Instructor, Assistant Safety Officer, and HAZMAT Coordinator for his division. VanDiver is currently attending AEGIS SPY-1B/B(V)/D school. Fall 2011
Inside Homeland Security®
39
terrorism
N at i o n a l S e c u r i t y
U.S. Navy photo by Mass Communication Specialist 2nd Class David A. Brandenburg
Preemptive Self Defense in the Age of International Terrorism
The advance of human freedom—the great achievement of our time, and the great hope of every time—now depends on us. Our nation—this generation—will lift the dark threat of violence from our people and our future. We will rally the world to this cause by our efforts, by our courage. We will not falter, and we will not fail. — George W. Bush
By Herbert S. Mack, Certified in Homeland Security, CHS-III
The role of national interest in U.S. foreign policy is often measured in the constraints of international law. As we analyze the war on terror, we are able to witness the preemptive spirit of American democracy. Although the unilateral approach to national security is often criticized, the assertion of international customary law is often injected in U.S. ideology. This paper will explore the complex ideals of customary law and the preemptive visions of American democracy. Introduction An important step in the defense of any nation is to create and implement preemptive security measures that embrace international statutes. As we analyze societal trends relative to the War on Terror, we are able to witness the distinct manifestations of political ideals that revolved around American interests. The unilateral tactics that fundamentally made the U.S. a superpower are now being transformed and absorbed by society as a whole. Though the end result of preemption essentially equates to the disseverment of sovereignty, the safety and prosperity of one’s nation is more critical than the universal constraints of international law. More importantly the question then becomes, is the United States justified in conducting preemptive strikes or should the U.S. reserve its use of force as a reactive mechanism? The long-standing rule of international customary law is often used to rationalize the individualized implementation of preemption. The ability to successfully enforce security mechanisms particularly in the international community, involves two ideological components: constitutional authority and international law. Although the United States was founded on a platform that limits international authority, it has become apparent that the proliferation of America’s unique position in the international community is crucial to the security of its borders. In response to the 9/11 terrorist attacks, President George W. Bush consequentially introduced a unilateral approach know as Bush Doctrine which transformed the political agenda of American society. On September 20, 2001, he said: The advance of human freedom—the great achievement of our time, and the great hope of every time—now depends on us. Our nation—this generation—will lift the dark threat of violence from our people and our future. We will rally the world to this cause by our efforts, by our courage. We will not falter, and we will not fail (Dobriansky, 2005). In the attempt to promote world stability and ultimately prevent such debilitating acts of terrorism as 9/11, national security became a top political priority. The articulated goals of the Bush administration maintained the option of preemption through policy changes and increased involvement with the United Nations. In a desperate attempt to secure America’s borders with regard 877.219.2519
www.abchs.com
to 9/11, the 1949 implementation of Article 51 of the United Nations charter was revisited. Article 51 of the United Nations charter essentially reserves the right of every nation to defend itself. In order to establish democratic conditions where preemption was an acceptable means of self-defense, the United Nations created a comprehensive set of provisions. These provisions not only provided suggestive means for settling conflict, but it also created an ideal environment where a nation can preemptively strike against another when national security is threatened. Article 51 of the United Nations Charter states: Nothing in the present Charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by Members in the exercise of this right of self-defense shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security (Westphal, 2003, p. 4). The 2002 National Security Strategy effectively projected America’s War on Terror. President Bush’s strategy maintained America’s ability to implement national security measures through its military forces. On September 12, 2002, Bush addressed the United Nations General Assembly. The first time we may be completely certain [Saddam Hussein] has a nuclear weapon is when, God forbid, he uses one. We owe it to all our citizens to do everything in our power to prevent that day from coming (Best, 2005). Protecting our nation against threats and deterring terrorism is crucial in preserving American freedoms. A sovereign nation does not wait for an attack to occur before it implements actions to protect itself. In order to keep America and its citizens safe, it is important that enemies are actively defined and vulnerabilities properly addressed. In order to accomplish the task of defending America in a manner consistent with democracy, both internal and external security mechanisms must be strategically implemented. The resistance to international imposition has a long history in American ideology; this is particularly the case with organizations such as the U.N. The U.N. has fundamentally questioned American sovereignty and its reluctance to embrace every aspect of international law. Often times it is asserted that the U.S. isn’t subject to the same laws of the international community. In addiTo learn and practice your intelligence gathering and analyzing skills, become INTELLIGENCE ANALYST CERTIFIED. For more information on the program, see our ad on page 35 or call 877-219-2519. Enroll online at www.abchs.com.
Fall 2011
Inside Homeland Security®
41
terrorism
NATIONAL SECURITY
tion to the U.N., organizations such as the International Criminal Court (ICC), which deals with war crimes, are often at odds with the United States. The Bush administration did not embrace the ICC and in May 2002, formally renounced any U.S. obligations to them, claiming the ICC may initiate politically motivated prosecutions against U.S. nationals (Dobriansky, 2005). Although American sovereignty is essentially based on the Constitution and ultimately has no room for the statutory implementation of international law, the paradigm for defending America against threats both foreign and domestic fundamentally revolves around the notion of national power through effective regulation and diplomacy through foreign policy. In the 2005 inaugural address, President Bush effectively states: It is the policy of the United States to seek and support the growth of democratic movements and institutions in every nation and culture, with the ultimate goal of ending tyranny in our world. This is not primarily the task of arms, though we will defend ourselves and our friends by force of arms when necessary (Bush, 2006). From a fundamental and nationalistic standpoint, the U.S. is committed to the safety of its citizens. With support of the United Nations, the United States has not only successfully prohibited nation states from developing nuclear technologies, but equally secured critical infrastructure, which essentially increased the security of America’s borders. When national security is threatened, America will discern and strategically interpret international law in the ability to support political agenda. The Bush administration’s response to 9/11 integrated the principles of justice with preemptive superiority. This combination embraces a national security policy that supports Article 51 of the U.N. charter. The U.S. not only displays military superiority through preemptive strikes, but equally engages in an aggressive form of diplomacy. The 1986 preemptive air strikes against Libya is a perfect example of the United States’ attempt to deter terrorism. These air strikes were ultimately intended to force Col. Muammar Gaddafi to cease in sponsoring terrorist activities against American targets in Europe. Another example can be seen in the 1998 bombing of a Sudanese pharmaceutical plant. Because this plant was believed to be a chemical weapons factory and posed a serious threat to national security, it was preemptively destroyed (Westphal, 2003). Preemptive military superiority can also be seen with the increased development in airstrike technologies. In the United States’ attempts to combat terror organizations, unmanned aerial vehicles such RQ-7 Shadow have successfully dropped munitions on suspected terror cells. On May 2, 2011, President Barack Obama announced the killing of al-Qaeda leader and mastermind Osama bin Laden. Though the fundamental right to self-defense is evident in Article 51 of the United Nation Charter, the United Nations is committed to maintaining international peace and security through diplomacy. The War on Terror extends beyond the current armed conflict that arose out of the attacks of September 11, 2001, from 42
Inside Homeland Security®
Fall 2011
a historical standpoint; disruption and deterrence are two key components in our efforts to suppress acts of aggression against the United States. The fundamental tactic for combating terrorism and securing American borders essentially revolves around the idea of deterrence. Deterrence is measured through the ability to either physically stop a terrorist’s event from occurring, prohibiting technological advances through the development of international treaties, or disrupting the effectiveness of terror organization through institutional and ideological changes (Anderson, 2003). The effectiveness of deterrence ultimately begins with well-crafted preemptive agreements and the ability to create treaties that exclusively allow the United States to strike first against any nation violating those treaties. The primary objective of deterrence is to prevent potential enemies from initiating acts of aggression. One method that is often used to prevent imminent threats is to reduce vulnerabilities through mitigation and enhanced security of our national borders. Increased border security creates harder targets, which ultimately inhibit the mobility of terror organizations. U.S. Customs and Border Control have significantly increased resources for border security at and between ports of entry and have reported some success in interdicting illegal cross-border activity (Stana, March 2011). Organizations such as the Transportation Security Administration (TSA) were created to strengthen the security of America’s transportation system, using biometric and explosive detection systems to significantly reduce the vulnerabilities of air travel (National Border Patrol Strategy). The deployment of imaging technology to detect known terrorist has increased identification constraints. Another method of deterrence involves the idea of targeted killing. Because terrorist organizations justifiably operate by avoiding contact with superior forces, it has become evident and relatively clear that terrorism is transnational and generally conducted by non-state actors (Bryan, 2010). Basically, this means that the combatant members of terrorist organizations are mixed with civilian populations. Rather than combatants strategically operating to attack military forces on the battlefield, often times terrorist organizations seek to wreak havoc on the civilian populations in non-combative environments by non-conventional means. In an effort to combat this type of evolving terrorist threat, American officials have ultimately decided it more effective to disrupt the flow of information by not only strategically disrupting organizational command, but equally disrupting all financial capabilities. By targeting top organizational leaders and their finances, we are essentially disrupting operational decision-making and operational abilities. The use of prevention is demonstrated though the creation of preemptive operational policies.
Conclusion The role of national interest in U.S. foreign policy is often measured in the constraints of international law. An important step in the defense of any nation is to create and implement preemptive security measures that embrace international statutes. The unilateral tactics that fundamentally made the U.S. a superpower are www.abchs.com
877.219.2519
now being transformed and absorbed by society as a whole. Every nation has the right to defend itself. Conducting preemptive strikes are key to the security of America’s borders.
References Anderson, Richard C. (2003). Redefining Just War Criteria in the Post 9/11 World and the Moral Consequences of Preemptive Strikes. United States Military Academy. January 2003. Retrieved from: http://isme.tamu. edu/JSCOPE03/Anderson03.html Best, Richard A. (2005). U.S. Intelligence and Policymaking: The Iraq Experience. CRS Report for Congress. Retrieved from: http://www.fas.org/sgp/crs/intel/ RS21696.pdf Bryan, Ian (2010). Sovereignty and the Foreign Fighter Problem. Program of National Security at the Foreign Policy Research Institute. January 2010 Retrieved from: http://www.fpri.org/pubs/2010/ForeignFightersSovereignty CounterTerrorism.pdf Bush, George W. (2006). National Strategy for Combating Terrorism. Retrieved from: The White House Web site: http://georgewbush-whitehouse.archives. gov/nsc/nsct/2006/ Bush, George W. (2007). National Strategy for Homeland Security. Retrieved from: The White House Web site: http://www.whitehouse.gov/homeland/ book/nat_strat_hls.pdf Combating Terrorism Center at West Point (CTC). (2008). Web site: Terrorism, Deterrence and Nuclear Weapons. Retrieved from http://ctc.usma.edu/ publications/publications.asp Dobriansky, Paula (2005). Promoting Democracy through Diplomacy. Web site: U.S. Department of State. Retrieved from http://merln.ndu.edu/archivepdf/ nss/state/46358.pdf National Border Patrol Strategy (CBP). (n.d.). Web site: U.S. Customs and Border Patrol. Retrieved from: http://www.cbp.gov/linkhandler/cgov/ border_security/border_patrol/border_patrol_ohs/national_bp_strategy.ctt/ national_bp_strategy.pdf
Author: Michael J. Fagel, Ph.D. CEM List Price: $79.95 Trim Size: 6-1/8 x 9-1/4 Available: December 2010
Obama, Barak H. (2010). National Security Strategy. Retrieved from: The White House Web site: http://www.whitehouse.gov/sites/default/files/rss_viewer/ national_security_strategy.pdf Stana, Richard M. (2011). Preliminary Observations on the Status of Key Southwest Border Technology Programs. Retrieved from: Homeland Security and Justice Issues: http://homeland.house.gov/sites/homeland.house.gov/files/ Testimony%20Stana_0.pdf Stana, Richard M. (2011). DHS Progress and Challenges in Securing the U.S. Southwest and Northern Borders. Retrieved from: http://www.gao.gov/new. items/d11508t.pdf UN Action to Counter Terrorism (UN). (n.d.). Web site: International Legal Instruments to Counter Terrorism. Retrieved from http://www.un.org/ terrorism/instruments.shtml Westphal, Steven D. (2003). Counterterrorism: Policy of Preemptive Action. U.S. Army War College. April 2003. Retrieved from: http://www.au.af.mil/au/awc/ awcgate/army-usawc/westphal.pdf
A b o u t t h e Au t h o r Herbert S. Mack currently works for the U.S. Department of Labor Occupational Safety and Health Administration, but has an esteemed background in analyzing national security threats. Mack is an Iraq war veteran and gained extensive knowledge and training with the U.S. Army Chemical Corp. He continues to develop his expertise in addressing strategic innovative challenges facing homeland security as he pursues a Master of Science degree in Homeland Security Management at Long Island University’s Homeland Security Institute.
New! From CRC Press… Principles of Emergency Management and Emergency Operations Centers (EOC)
The culmination of more than four decades of experience, Principles of Emergency Management and Emergency Operations Centers (EOC) provides time-tested tips for those developing and revising emergency preparedness plans. It details the requirements for appropriate training and planning— through a well-designed exercise program—as well as the understanding of how an up-to-date EOC plan should operate. Stressing the importance of consistency with the various national preparedness initiatives, the book covers the latest developments and best-practices in the evolving field of emergency management. Available now from CRC Press at www.crcpress.com or
other respected online resellers.
877.219.2519
www.abchs.com
Fall 2011
Inside Homeland Security®
43
terrorism
Dignitary and executive protection
Exploiting
Vulnerabilities: Terrorist Infiltration into the United States
“There is every reason to believe that terrorists are exploiting the illegal immigration issue along our southern border and are actively infiltrating the United States, using the same transportation channels as used by other illegal immigrants in this area.”
By David L. Johnson, Certified in Homeland Security, CHS-V Diplomate of American Board for Certification in Homeland Security (DABCHS)
H
ere’s a statement of the obvious: Terrorists look for and exploit vulnerabilities within the societies or entities that they target. In fact, I think that is so widely known that I’m absolutely confident that every reader of this association’s magazine already knows that. Sometimes, the exploitation of vulnerabilities can take a very distasteful path—in fact, that’s often the case. Consider this excerpt from an article written and posted on the Web site, Arab Reporters for Investigative Journalism.
exploiting illegal immigration along our southern border and are actively infiltrating the United States, using the same transportation channels utilized by other illegal immigrants in this area. This is not just my opinion; this issue has been actively investigated by various agencies and news media outlets. One report of note is A Line in the Sand: Confronting the Threat at the Southwest Border, prepared by the Chairman Michael T. McCaul, Majority Staff of the House Committee on Homeland Security. The following excerpts are taken from this 2006 report:
Dirgham, a mongoloid child, was booby-trapped by elements from Al-Qa’eda after he was tempted to buy sweets from a shop near a security center where elements from the police force shop during their break. The child was killed, and with him a number of policemen and shoppers. Despite this, the child’s father refuses to criticize Al-Qa’eda in fear that they might return one day (AlJabbouri-Alhayat, 2010).
During 2005, Border Patrol apprehended approximately 1.2 million illegal aliens; of those 165,000 were from countries Other Than Mexico (OTM). Of the non-Mexican aliens, approximately 650 were from special interest countries. Special interest countries are those “designated by the intelligence community as countries that could export individuals that could bring harm to our country in the way of terrorism (McCaul, p. 2). In addition to the criminal activities and violence of the cartels on our Southwest border, there is an everpresent threat of terrorist infiltration over the Southwest border. Data indicates that there are hundreds of illegal aliens apprehended entering the United States each year who are from countries known to support and sponsor terrorism (McCaul, pp. 4-5). Since September 11, 2001, DHS has reported a 41% increase in arrests along the Texas/Mexico border of Special Interest Aliens from countries such as Iran, Jordan, Lebanon, Syria, Egypt, Saudi Arabia, Kuwait, Pakistan, Cuba, Brazil, Ecuador, China, Russia, Yemen, Albania, Yugoslavia, and Afghanistan. Hundreds have been apprehended within the South Texas region alone. (McCaul, pp. 27, 28).
Now that’s an example of exploiting vulnerabilities on many levels. Taking advantage of some of the most vulnerable people in any society and of a society’s compassion for the disabled is a cowardly act that is so distasteful that it nearly defies description. As dignitary and executive protection agents, this example serves as a reminder that we cannot simply rely on established, pre-conceived notions while we work. At times, we must set aside our compassion and we must stay in a constant mode of evaluating our environment. But there’s another vulnerability that I want to bring more attention to that is currently going on right here at home, impacting both homeland security issues and all dignitary and executive protection operations. There is every reason to believe that terrorists are 44
Inside Homeland Security®
Fall 2011
www.abchs.com
877.219.2519
A jacket with patches from countries where al-Qaeda is known to operate was found in Jim Hogg County, Texas, by Border Patrol, indicating possible ties to a terrorist organization or member of military units of Mexico. One patch depicts an airplane flying over a building and heading towards a tower. Another reads: “martyr,” “way to eternal life,” or “way to immortality” (McCaul, p. 28).
In addition, Federal Bureau of Investigation (FBI) Director Robert Mueller has confirmed in testimony “that there are individuals from countries with known al-Qaeda connections who are changing their Islamic surnames to Hispanic-sounding names and obtaining false Hispanic identities, learning to speak Spanish and pretending to be Hispanic immigrants” (Federal Bureau of Investigations, FBI, 2005). More recently, the U.S. Border Patrol released a list of OTM individuals that were arrested. Atlanta’s WSBTV, Channel 2, did an insightful investigative report with their news anchor Justin Farmer traveling to Arizona to view a detention center near Phoenix, subsequently viewing records that show illegal immigrants in custody from Afghanistan, Egypt, Iran, Iraq, Pakistan, Sudan, and Yemen. The news agency posted two videos to their site on the investigation (WSBTV, Channel 2, 2010). Now, one might ask: what are the benefits to them for attempting to exploit this vulnerability and why is it important to dignitary and executive protection professionals? I think the answers here are easy. If an al-Qaeda operative with an Arabic identity was arrested during an attempt to infiltrate the U.S. illegally, they’d spend an extended period of time at Guantanamo Bay and never have a chance to carry out their mission. However, with an Hispanic identity, they will likely be sent back to Mexico in a fairly quick fashion, where they then have a greater chance to be successful at their mission, no matter what it is. I think that there are other benefits as well. In addition to relying on sleeper cells and other networks, they now have the opportunity to exploit unwitting Hispanic support systems, as well. Once they gain entry to the U.S., it is likely that all they have to do is set up shop in a sanctuary city, or one of the 31 U.S. cities that “have adopted ‘sanctuary’ ordinances banning city employees and police officers from asking people about their immigration status,” according to the Web site Wikipedia, including Washington, D.C., New York City, Los Angeles, and Chicago (Wikipedia, 2011). At this point, the benefits seem self-evident. By exploiting the vulnerabilities of our southern border, the illegal immigrant support networks, and the policies of our sanctuary cities, terrorists are increasing their chances of success. And the mere fact that our 877.219.2519
www.abchs.com
Check out David L. Johnson’s ESTABLISHING EXECUTIVE SECURITY course where participants learn more about executive security operations, methodology, goals, and more. For more information, see our ad on page xxx or call 877-219-2519. Also enroll online at www.abchs.com.
nation’s capitol has been identified as a sanctuary city has to be an appealing factor to them! Why is it important for those of us in the dignitary and executive protection trade to be aware of this issue? For exactly the same reason that I cited at the beginning of this article. We cannot trust our senses, cannot judge a book by its cover, and we must set aside our personal opinions, beliefs, and compassion, and realize that we cannot profile based upon any physical characteristic and must constantly evaluate our environment for attack recognition factors and early warning signs that something bad is about to happen while we’re working. And we must stay abreast of current events and emerging tactics, techniques and procedures, including those exploiting vulnerabilities such as these.
References Al-Jabbouri-Alhayat, M. (2010, December 5). “Children Indulging in Iraqi Violence to the Level of Suicide”. Retrieved June 24, 2011, from Arab Reporters for Investigative Journalism: http://arij.net/en/?p=570 Federal Bureau of Investigations, FBI. (2005). FBI FY 2006 Budget Request: Hearing Before the House Comm. on Appropriations. 108th Congress. Washington: U.S. Congress. McCaul, M. T. (2006). A Line in the Sand: Confronting the Threat at the Southwest Border. Subcommittee on Investigations. Washington: The House Committee on Homeland Security. Wikipedia. (2011, June 13). Sanctuary City. Retrieved June 24, 2011, from Wikipedia: http://en.wikipedia.org/wiki/Sanctuary_city WSBTV, Channel 2. (2010, May 3). Terrorist Threat On Border With Mexico. Douglas, AZ, USA.
A b o u t t h e Au t h o r
David L. Johnson, DABCHS, CHS-V, is President of ITG Consultants, Inc., providing consulting, training, and protective services. In 30 years of providing protective services, he has coordinated presidential, Cabinet, ambassadorial, and senior executive level protective programs in threat environments ranging from negligible to that of imminent assassination attempts by state-sponsored terrorist organizations; conditions of conflict and coup d’etat during multiple high-threat or politically sensitive assignments including Somalia, Haiti, Bosnia-Herzegovina; and management of contracts in Afghanistan and Iraq. He is a member of the ABCHS Executive Advisory Board and chairman of the American Board for Certification in Dignitary and Executive Protection. Fall 2011
Inside Homeland Security®
45
46
Inside Homeland Security速
Fall 2011
www.abchs.com
877.219.2519
terrorism
Special Report
Fall 2011 Inside Homeland Security
pages 47–58
Understanding Islamic extremist culture:
Information for the homeland security professional’s toolbox hen speaking to a person of a different gender, ethnicity, or religion, we often communicate based on the information we know about their cultural background. If little is known about that, the chances of relating to them are slim. For example, we use cultural and societal guidance when determining what type of food to serve to guests, how to speak to foreign business partners, and effective ways to teach ESL students. For those in the homeland security field, however, understanding the cultural differences of other nations will aide law enforcement officials in tracking down possible terror
877.219.2519
www.abchs.com
suspects within our borders; help soldiers relate to those that live in towns they are helping to rebuild; and assist politicians shape U.S. foreign policy. The following articles examine two complicated issues surrounding beliefs widely practiced in Islam which have spilled over into our own culture: oppression of women through honor killings, child marriages, etc., and the strict following of shari’a law and what that means to Americans. The respective authors have chosen this avenue to bring to light issues they believe homeland security professionals can benefit from further research.
Fall 2011
Inside Homeland Security®
47
terrorism
s p e c i a l r e p o rt
Behind the
BurQa: An Exploration into the Treatment of Women in Portions of the Islamic World
By First Sgt. Michael A. Torres, (Ret.), BS, CHS-III, CAS, CFS
48
Inside Homeland Security速
Fall 2011
Abstract The purpose of this article is to provide a detailed overview on the issue of oppressed women in Islam. Three topics will be introduced: 1) child marriages; 2) wife beatings; and 3) honor killings. This article will also introduce passages from the Koran, hadith, and the Tabari in which many devout Muslims use as a means to legitimize the treatment of women in the Middle East, Europe, and North America.
Introduction
In an Inside Homeland Security速 article titled Female Terrorists: The X-Factor, Richard Hughbank (2010) provides a description of the dichotomous role of many women within the world of devout Muslims. On one hand, they portray strength in their roles as suicide
www.abchs.com
877.219.2519
bombers, while on the other hand subservient in their everyday roles as wives, mothers, daughters, and sisters within Islam. As Hughbank’s primary focus was women’s roles as suicide bombers, the purpose of this paper is to explore a particular facet of the Islamic culture, providing members of the intelligence community and homeland security professionals a broader understanding of the people and the religion of those who follow Islam. This particular facet—the treatment of women in Islam—will be articulated by the following three topics: 1) child marriages 2) wife beating, and 3) honor killings.
Historical Perspective The correlation between women and Islam is defined by both Islamic text and the culture of the Muslim world. The Koran and hadith, or narrative record of sayings and actions of the prophet Muhammad, are filled with verses that provide orders on how Muslim men must conduct themselves when dealing with women. Tabari, a collection of Koran verses and hadith quotes, illustrates how Allah allows the abusive treatment of women, likening them to animals and sex objects (Gabriel, 2010). Allah permits you to shut them in separate rooms and to beat them, but not severely. If they abstain, they have the right to food and clothing. Treat women well for they are like domestic animals and they possess nothing themselves. Allah has made the enjoyment of their bodies lawful in his Koran (Tabari IX:113). On the other hand, the Koran and other Islamic texts provide examples in which women are seen as equal, considering the love between men and women to be a Sign of God. Husbands are asked to be kind to their wives and wives are asked to be kind to their husbands. The Koran also encourages discussion and mutual agreement in family decisions (Koran 30:21). Furthermore, on the issue regarding women and politics, the only hadith relating to female political leadership comes from Sahih al-Bukhari, 5:59:709, also known as Imam Bukhari, a male Sunni Islamic scholar. Sunni Muslims regard the hadith collection named Sahih Bukhari the most authentic of all hadith compilations (Wikipedia, 2011), in which Muhammad is recorded as saying that people with a female ruler will never be successful. Referring to the Persian people, Muhammad said, “such people as ruled by a lady will never be successful.” Despite the findings within Sahih Bukhari, there have been many classical Islamic scholars, such as al-Tabari—author of enormous compendiums of early Islamic history and Koranic exegesis—who made a distinct contribution to the consolidation of Sunni thought during the 9th century and supported women in leadership roles (Encyclopedia Britannica, 2011). In early Islamic history, women—including Aisha, Ume Warqa, and Samra Binte Wahaib—took part in political activities. Other historical Muslim female leaders include Razia Sultana, who ruled the Sultanate of Delhi from 1236 to 1239, and Shajarat ad-Durr, who ruled Egypt from 1250 to 1257. Moreover, the late Benazir Bhutto, former prime minister of Pakistan, was the first woman elected to lead a Muslim state. In addition, Al-Tirmidhi notes in hadith 217 that the Prophet Muhammad once said: “The best among you are those who treat their wives in the best manner” (Islam Awareness , 2011). Al877.219.2519
www.abchs.com
though the Koran and some Islamic texts provide information regarding women as equal and leaders within the Islamic community, there are some who follow Islam in portions of the Islamic world who interpreted those texts in a different light and believe that within the Muslim culture women should be the property of men and treated as such.
One of the many hallmarks of any modern society and maturity of its culture is equality under the law which guarantees that everyone, including women, have the right to personal liberty and freedom of choice.
Child Marriage One of the many hallmarks of any modern society and maturity of its culture is equality under the law which guarantees that everyone, including women, have the right to personal liberty and freedom of choice. However, some who follow Islam fail to recognize some of these freedoms as they relate to women. Therefore, what sets this portion of the Islamic world apart from the West is the so-called “given teachings” concerning the abuse and sometimes murder of women (Gabriel, 2010). According to the hadith, as reported by Bukhari, the Prophet of Islam “married Aisha when she was a girl of six years of age, and he consummated that marriage when she was 9 years old” (Spencer, 2006, p.170). The Prophet Muhammad at the time was in his early 50s. Despite this belief, many Islamic theorists claim that Aisha was actually older. According to Islamic scholar Muhammad Ali Al-Hanooti, the Prophet’s marriage to Aisha was the will of Allah, and he points to a passage in the Koran that defends Muhammad. “He is not questioned for what he does but [the people] are questioned for what they do” (p. 170). Furthermore, in ascribing to the writing of the Prophet of Islam, many Muslims in modern times have also taken children as brides. Some nations even made it lawful. For example, in the Islamic Republic of Iran, Article 1041 of the Civil Code states that girls can be engaged before the age of nine and married at nine. Moreover, the Ayatollah Khomeini himself married a 10-year-old girl when he was 28, calling marriage to a prepubescent girl “a divine blessing” and advised the faithful: “Do your best to ensure that your daughters do not see their first blood in your house” (Spencer, 2006, p. 172). Fall 2011
Inside Homeland Security®
49
terrorism
s p e c i a l r e p o rt
The United Nations Children’s Fund reports that over half of the girls in Afghanistan and Bangladesh are married before they reach the age of 18 (UNICEF, 2011). In early 2002, research conducted in refugee camps in Afghanistan and Pakistan found the girls married by age 13. Furthermore, in an Afghan refugee camp, more than two out of three second-grade girls were either married or engaged, and virtually all the girls who were beyond second grade were already married. UNICEF also reported a 10-yearold girl was engaged to a man of 60. Another recent example of this occurred in 2009, where a 12-year-old Yemeni girl, Fawziya Abullah Youssef, died after trying unsuccessfully for three days to deliver the child of her 24-year-old husband. Youssef was married off to her husband by her father by the age of 11 (Huffington Post, 2009). Although marrying underage girls is legal in conservative Islamic Circles, in the United States we would label this type of man who would do so a pedophile and incarcerate him (Gabriel, 2010). As easy as it is for older men to marry child brides, it is just as easy to divorce them. Therefore, to divorce a wife in most Muslim countries, all a Muslim man needs to say is “I divorce you” three times, which leaves the women with no income and the status of an outcast (Hamid, 2008).
Wife Beating In addition to the child marriages, it is estimated that over 90% of Pakistani wives have been struck, beaten, or abused sexually, and although the plight of women in Islamic societies can be viewed as troublesome by outside cultures, it should be noted that this treatment is engrained within those societies (Hamid, 2008). Muhammad was once told that “women have become emboldened towards their husbands,” whereupon he (Muhammad) “gave permission to beat them” (Spencer, 2005, p. 69). When some women complained, Muhammad noted: “Many women have gone ’round Muhammad’s family complaining against their husbands. They are not the best among you.” Muhammad was unhappy with the women who complained, not their husbands who beat them (Spencer, 2005). On a video available online, Saudi Imam Muhammad Al-Arifi was explaining the “humane” technique for beating a wife (AlArifi) (The Middle East Media Research Institute, 2007). Doing so is sanctioned by a frequently cited passage in the Koran: Men have authority over women because God has made the one superior to the other, and because they spend their wealth to maintain them. Good women are obedient. They guard their unseen parts because God has guarded them. As for those from whom you fear disobedience, admonish them and send them to beds apart and beat them. Then if they obey you, take no further action against them. Surely God is high, supreme (Koran 4:34). There is contention within the Islamic schools of thought as to whether this verse instructing men to beat their wives truly says “beat,” “leave,” or something less demeaning toward women. The argument that is offered regarding this is that some Arabic words have different meanings and interpreting them is up to the reader. This is a red herring, according to Brigitte Gabriel. In her book, They Must Be Stopped, Gabriel noted that the word in verse 4:34: 50
Inside Homeland Security®
Fall 2011
“Tad-ru-bu-hunna,” means “beat them” (p. 176). Here are a few translations of the section in verse 4:34 from the Koran that address the beating issue: Ali translation: Refuse to share their beds and beat them lightly. Pickthall translation: Admonish them and banish them to beds apart and scourge them. Shakir translation: Leave them alone in their sleeping places and beat them. Furthermore, Muhammad emphasized that women were possessions of their husbands: “Allah’s Messenger said, ‘If a husband calls his wife to his bed (i.e. to have sexual relations) and she refuses and causes him to sleep in anger, the angels will curse her till morning.’” This has become enshrined in Islamic law: “The husband is only obliged to support his wife when she gives herself to him or offers to, meaning she allows him full enjoyment of her person and does not refuse him sex at any time of the day or night” (Spencer, 2005, p. 71). This is an offer the wife cannot refuse. According to the Pakistan Institute of Medical Sciences, some women have been beaten for things such as cooking an unsatisfactory meal, while yet others were punished for failing to give birth to a male child (Spencer, 2005). Moreover, some Muslims clerics have endorsed some form of domestic violence, with limits. For example, Lebanese cleric Zakariyya Ghandur provided specific advice for wife beaters, saying on television that disciplining by beating occurs as a reprimand, not brutal beating. Brutal beating is forbidden, while use of a ruler or beating on the hand, the shoulder, the buttocks, or anything like that [is permitted] as a reprimand of a woman when all methods of guidance have failed. [This should be] like a mother or father who beat their son or daughter to prevent them from wrongdoing, not out of hatred or animosity (Rubin, J., 2007). In 2009, Harry Potter movie co-star Afshan Azad was badly beaten by her Muslim father and brother because of her relationship with a Hindu man. In another case of a brutal disfigurement, Rojda, a 13-year-old girl from Turkey, was raped and then forced to marry her rapist under Islamic Law. Her face was mutilated by her husband’s family when she refused to prostitute herself after he was imprisoned for raping another child (Geller, P., 2009). According to Dr. Tawfik Hamid (2008), once a member of the terrorist group Jamaa Islamiya—the Southeast Asia-based extremist group that seeks the establishment of an Islamic caliphate spanning Indonesia, Malaysia, southern Thailand, Singapore, Brunei, and the southern Philippines—wife beating leads to the third phase of jihadist indoctrination: the acceptance of violence.
Honor Killings Islam’s systematic oppression and humiliation of women denigrates the integrity and social position of females in the eyes of devout Islamic cultures and societies. Feeding on this poisonous thinking from child to adulthood programs not only affects men, but also women in Islamic culture; therefore, it creates an elitist attitude in men toward women and gives women a feeling of inferiority in society. Sadly, these principles are the reason some Muslim men can perform the ultimate crime against women or www.abchs.com
877.219.2519
young girl(s) if she is deeded to have brought shame or dishonor to her family (Gabriel, 2010). Honor killings, which occur with shocking regularity in certain parts of the Middle East and South Asia, and in some cases North America and Europe as well, target women whose actions—actual or suspected—violate the honor of their family, an honor which is thought to depend on the sexual purity of its female members. Anything from speaking with an unrelated man, to rumored premarital loss of virginity, to an extra-marital affair, can be cause for an attack, often carried out by a father, brother, uncle, nephew, or husband. In some especially tragic instances, even women and
girls who have been raped are slain to remove the stain from the family honor. As with other forms of intimate violence against women, perpetrators are seldom punished (Ali, K. 2003). According to Gabriel (p.177), honor killings are executed by “slitting the victim’s throat, hatching them, stabbing, burning them to death, decapitation, bullets to the head and chest, or by any other means imaginable.” In Jordan Article 341 of Jordanian law stipulates that murder is a legal act of defense when “the act of killing another or harming another was committed as an act in defense of his life, or his honor, or somebody else’s life of honor.” Furthermore, the Independent Human Rights
Table 1:
Differing Characteristics of Honor Killings and Domestic Violence Honor Killings
Domestic Violence
Committed mainly by Muslims against Muslim girls/young adult women.
Committed by men of all faiths usually against adult women.
Committed mainly by fathers against their teenage daughters and daughters in their early 20s. Wives and olderage daughters may also be victims, but to a lesser extent.
Committed by an adult male spouse against an adult female spouse or intimate partner.
Carefully planned. Death threats are often used as a means of control.
The murder is often unplanned and spontaneous.
The planning and execution involve multiple family members and can include mothers, sisters, brothers, male cousins, uncles, grandfathers, etc. If the girl escapes, the extended family will continue to search for her to kill her.
The murder is carried out by one man with no family complicity.
The reason given for the honor killing is that the girl or young woman has “dishonored” the family.
The batterer-murderer does not claim any family concept of “honor.” The reasons may range from a poorly cooked meal to suspected infidelity, to the woman’s attempt to protect the children from his abuse or turning to the authorities for help.
At least half the time, the killings are carried out with barbaric ferocity. The female victim is often raped, burned alive, stoned or beaten to death, cut at the throat, decapitated, stabbed numerous times, suffocated slowly, etc.
While some men do beat a spouse to death, they often simply shoot or stab them.
The extended family and community valorize the honor killing. They do not condemn the perpetrators in the name of Islam. Mainly, honor killings are seen as normative.
The batterer-murderer is seen as a criminal; no one defends him as a hero. Such men are often viewed as sociopaths, mentally ill, or evil.
The murderer(s) do not show remorse. Instead, they experience themselves as “victims,” defending themselves from the girl’s actions and trying to restore their lost family honor.
Sometimes remorse or regret is exhibited.
877.219.2519
www.abchs.com
51
terrorism
s p e c i a l r e p o rt
Table 2:
North American Honor Killings, Successful and Attempted Victim Name (age) Palestina Isa (16)
Year, Location 1989 St. Louis, MO
Perpetrators’ Name, Origin Maria & Zein Isa (parents), sisters also encouraged it / West Bank. (M)
Methal Dayem (22)
1999 Cleveland, OH
Yezen Dayem, Musa Saleh (cousins) / West Bank. (M)
Motive “Too American,” refused to travel with her father, a member of the Abu Nidal Palestinian terrorist group, as “cover.” Refused to marry her cousin; attended college; sought independent career as elementary school teacher; drove her own car; too independent; turned back on her culture. Filed for divorce.
Method Stabbed 13 times by father as her mother held her down.
Two cousins allegedly shot her, choked on own blood.
Lubaina Bhatti Ahmed 1999 (39) St. Clairsville, OH
Nawaz Ahmed (estranged husband) / Pakistan (M)
Farah Khan (5)
1999 Toronto, Canada
Jawinder “Jassi” Kaur (25)
2000 Pakistan
Muhammed Khan (father), and Kaneez Fatma (stepmother) / unknown region. (M) Gang of men hired by Malkiat Kaur (mother), and Surjit Sing Badesha (uncle)/ Canada/ Pakistan (S)
Shahpara Sayeed (33)
2000 Chicago, IL 2002 Jersey City, NJ
Mohammad Harroon (husband) / Pakistan (M) Alim Hassan (husband) / Guyana (Hindu wife) (M)
2003 British Columbia, Canada 2004 Scottsville, NY
Rajinder Singh Atwal (father) / Wanted daughter to end East Indies (S) relationship with non-Sikh classmate, Todd McIsaac Ismail Peltek (husband) / Had been molested by brother- Stabbed, bludgeoned Turkey (M) in-law with hammer, along with daughters. Muhammad Parvez (father), Refusing to wear hijab. Strangled Waqas Parvez (brother) / unknown region (M) Yaser Said (father); mother Upset by her “Western” ways. Shot assisted / Egypt (M) Yaser Said (father); mother Upset by her “Western” ways. Shot assisted / Egypt (M) Goaded by mother, Waheed Too “Western,” immodest Stabbed Allah Mohammed (brother) / clothing, planned to attend Afghanistan (M) college in New York City Chaudry Rashid (father) / Filed for divorce after arranged Strangled Pakistan (M) marriage
Marlyn Hassan (29)
Amandeep Singh Atwal (17) Hatice Peltek (39)
Aqsa Parvez (16)
2007 Toronto, Canada
Amina Said (17)
2008 Irving, TX 2008 Irving, TX 2008 Henriettta, NY
Sarah Said (18) Fauzia Mohammed (19) Sandeela Kanwal (25)
2008 Atlanta, GA
Suspected Farah was not his child biologically. Against her wealthy, farming parents’ wishes, married a man who was of inferior financial status, a Pakistani rickshaw driver. Motive is unclear, but they had been fighting for months. His wife refused to convert from Hinduism to Islam.
Throat cut; her father, sister and sister’s young child’s throat also cut. Father and step-mother cut her throat, dismembered her body. Kidnapped, throat slashed
Burned alive Husband, an auto mechanic, stabbed wife (and the twins in her womb), the wife’s sister, and the wife’s mother. Father stabbed daughter 11 times.
Legend: M = Muslim; S=Sikh 52
Inside Homeland Security®
Fall 2011
www.abchs.com
877.219.2519
Commission for Pakistan cited government figures in a 2006 report, stating that approximately 1,000 women die annually in honor killings (Gabriel, 2010). The following two examples show current (what some might call) honor killings that occurred in United States. In March 2010, Muzzammil Hassan, the founder of a Muslim TV network was convicted of the 2009 beheading of his wife Aasiya Zubair. Prior to her murder, Zubair sought an order of protection against Hassan and filed for divorce. However, according to court records, he approached her in a dark hallway from behind and stabbed her more than 40 times with a hunting knife and then cut her head off (Ali, A., 2011). In another case on January 2008, Amina Said and her sister Sarah Said were shot and killed to death in their home. The murders shocked their home town of Irving, Texas. But what shocked the community and the nation even more was that their father was identified as the suspected killer. “He treats me like a whore,” Sarah Said wrote in an instant message conversation with her friend Zohair (Geller, P., 2009). When a husband murders a wife or daughter in the United States and/or Canada, too often law enforcement chalks the matter up to a domestic violence issue. Murder is murder; religion is irrelevant. Honor killings are, however, distinct from wife battering and child abuse. According to the Middle East Quarterly, Volume XVI, Spring 2009, analysis of more than 50 reported honor killings shows they differ significantly from more common domestic violence. The frequent argument made by Muslim advocacy organizations that honor killings have nothing to do with Islam and that it is discriminatory to differentiate between honor killings and domestic violence is wrong (Chesler, P., Spring 2009). The previous tables illustrate the difference between honor killings and domestic violence (Table #1), and the North American honor killings that were successful and attempted (Table #2) (Chesler, P., Spring 2009). Tables 1 and 2 indicate that the reported number of honor killings in North America and Europe are primarily a Muslimon-Muslim crime. Furthermore, the victims are largely teenage daughters or young women. Moreover, wives are victims as well, but to a lesser extent. And, unlike most Western domestic violence, honor killings are carefully planned. The perpetrator’s family may warn the victim repeatedly over a period of time that she will be killed if she dishonors her family by refusing to wear the veil, rebuffing an arranged marriage, or becoming too westernized (Middle East Quarterly, 2009).
Conclusion The treatment of women in the Muslim world has been a hotly contested issue for many years. The mixture of religion and the law makes it difficult for non-Muslims to understand the culture and the treatment of women within that culture. As such, learning about intricacies of the Muslim culture, and even those intricacies that might not have a direct effect on the mission at hand, therefore, by exploring these issues the intelligence community and homeland security professionals can have a better understanding of the treatment of Muslim women within portions of the Muslim community. 877.219.2519
www.abchs.com
A b o u t t h e Au t h o r First Sergeant Michael A. Torres, U.S. Army (Ret.), served 20 years in the infantry and is a combat decorated veteran of the Gulf War. He is currently a sergeant/criminal investigator with the Texas Office of the Attorney General. He has over 15 years in law enforcement with an extensive background in white-collar crime, undercover operations, gangs, narcotics, and human trafficking investigations, and has attended Executive Security Training in Israel. Torres holds the following certifications: Texas Master Peace Officer, Texas Certified Police Instructor, Certified Fraud Specialist, Certified Anti-Terrorism Specialist, and Certified in Homeland Security-III. He also has a certificate in Financial Crimes Investigations from Utica College, and a Bachelor of Science degree in Criminal Justice Administration from the University of Phoenix.
References
Al-Arifi, M., Explaining the “Humane” Technique for Beating a Wife. Retrieved from http://www.memritv.org/clip/en/1594.htm Al-Bukhari, M., (2011) In Wikipedia. Retrieved from http://en.wikipedia.org/ wiki/Muhammad_al-Bukhari Al-Haj, A., (2009, September 12) 12-Year-Old Girl Dies While Giving Birth in Yemen. Huffington Post. Retrieved From http://www.huffingtonpost. com/2009/09/12/12yearold-girl-dies-while_n_284763.htmlAli, A., (2011, March 9) Man convicted of beheading wife gets 25-years-to-life sentence. Reuters. Retrieved from http://www.zimbio.com/Aasiya+Hassan/articles/bSZ vxwQ85eW/Man+convicted+beheading+wife+gets+25+years Ali, K. (2003) Honor Killings, Illicit Sex, and Islamic Law. Retrieved from http://www.brandeis.edu/projects/fse/Pages/honorkillings.html Chesler, P., (Spring 2009) Are Honor Killings Simply Domestic Violence? The Middle East Quarterly, Volume XVI, Number 2. Retrieved from http://www. meforum.org/2067/are-honor-killings-simply-domestic-violence Encyclopedia Britannica. (2011). al-Tabari. Retrieved June 29, 2011, from Encyclopedia Britannica: http://www.britannica.com/EBchecked/ topic/579654/al-Tabari Gabriel, B., (2010). They Must Be Stopped: Why We Must Defeat Radical Islam and How We Can Do It. St. Martin’s Press, New York Geller, P., (2009) Honor Killings: Islam’s Gruesome Gallery. Retrieved from http://atlasshrugs2000.typepad.com/atlas_shrugs/2009/03/honor-killing islams-gruesome-gallery.html Hamid, T., (2007). Inside Jihad: Understanding and Confronting Radical Islam. Self-published. Islam Awareness. (2011). Hadith: Treatment of Women. Retrieved June 29, 2011, from Islam Awareness : http://www.islamawareness.net/Hadith/treatment women_hadith.html The Middle East Media Research Institute. (2007). Saudi Cleric Muhammad Al-’Arifi Explains Wife Beating. Retrieved 2011, from The Middle East Media Research Institute: http://www.memritv.org/clip/en/1594.htm Rubin, J., (2007) Lagging Far Behind: Women in The Middle East. The Middle Eastern Review of International Affairs. Retrieved from http://meria.idc.ac.il/ journal/2007/issue2/jv11no2a2.html Spencer, R., (2005). The Politically Incorrect Guide to Islam (And The Crusades). Regnery Publishing Inc., Washington, DC Spencer, R., (2006). The Truth About Muhammad: Founder of the World’s Most Intolerant Religion. Regnery Publishing Inc., Washington, DC UNICEF. (2011, February). Monitoring the Situation of Children and Women. Retrieved July 26, 2011, from ChildInfo: http://www.childinfo.org/ marriage_countrydata.php Wikipedia. (2011, June 24). Muhammad al-Bukhari. Retrieved June 29, 2011, from Wikipedia: http://en.wikipedia.org/wiki/Muhammad_al-Bukhari
Fall 2011
Inside Homeland Security®
53
terrorism
s p e c i a l r e p o rt
alike. Many Muslims believe Sharì’a encompasses more than “law”—as we understand that concept—and because it is based on the Koran, it must be obeyed for the good of Islam. By that definition, then, any Muslim country is a theocracy run solely by sharì’a, not to be separated from Islam, the individual Muslim, or their government. Interpretations of sharì’a largely falls to the ulema, a group of Muslim scholars, but varies by region and is typically couched in the Shura Council or a “consultative” group of elders in that region. These mysterious ulema claim one of the following camps: • Secularists (westernized), who believe secular law should not be based on religion. Few Muslims adhere to this point of view (Ahmad, 2009). • Traditionalists, who believe secular laws should be based on sharì’a, particularly in the area of women’s rights and slavery. These groups, such as the Wahabbi of Saudi Arabia, believe that any departure from the Koran has no place in Islam and typically represents what Westerners believe are the “mainstream” Muslim. • Reformers, who believe that a “modernized” Islam can coexist with modern, secular doctrine. On August 22, 2010, demonstrators gathered in New York City to protest the building of a mosque near Ground Zero.
Understanding Sharì’a Law from American Perspective By Pat J. Merriman, Attorney at Law, & Jansen S. Cheek
54
Inside Homeland Security®
Fall 2011
Specific Legal Issues Principles of sharì’a law differs acutely from Western justice. According to the article, Crime & Punishment in Islamic Law, presented in the Canada Free Press, in comparison to Western laws, “the Shari’ah presents a disorganized and incomplete description of Criminal Law” (O’Connell, 2010). Rules of Practice & Procedure: Because Islam believes Allah revealed sharì’a to the people, presumably violations of it would be a sin against God. Therefore, it is not a secular form of governing and the law relies on collections of non-binding legal precedent— the hadith or Sunnah—to be used solely at the discretion of the individual qadi (trial judge), without formal written statutes or ordinances, pre-trial discovery, cross-examination, or any prior, binding judicial precedent. Islam charges the fiqih (Muslim jurist) www.abchs.com
877.219.2519
Photo Credit: Wikimedia Commons
M
any Americans are not versed in the codes of Islam and how they differ from Western ideals, including the moral set of guidelines of sharì’a law, followed by Muslims under the teachings of Muhammad. Not only considered a code of conduct, but also that of punishment, sharì’a has been integrated into the laws of some Middle Eastern countries, sparking debate around the world as to whether it is an objective justice system or an archaic religious fundamentalist approach to a way of living. In his book, In the Spirit of Islamic Law, Bernard Weiss (1998) says the ancient Arabic word shari’a translates into English as “the path to the watering hole.” Some translations of the Islamic code suggest it is not merely the Muslim rule of law, but rather the “path” that must be followed by all—Muslim and non-Muslim
with determining what is wajib (mandatory duties of the good Muslim), haraam (that which is forbidden), mandub (recommended), makruh (disapproved), and mubah (merely permitted). Because interpretations of sharì’a vary depending on the individual Muslim sects, conflicts sometimes arise between the respective adherents. For example, the Sunni have four prominent madh’hab (schools of fiqh, or ways of observing daily rituals and social mores), whereas the more moderate Shi’a have two. In another example of how sharì’a remains differ from Western notions, a minimum of two Muslim male witnesses (unrelated to the parties and of sound mind and good character) are required to an offense, or in the case of rape and other sex crimes, four are required (Little, 2003). Circumstantial evidence is never allowed; female testimony is given only half the weight of a man’s; and non-Muslims are typically excluded altogether. Right to Counsel, Evidence & Burden of Proof: Sharì’a civil and criminal trials are conducted solely by a judge, while plaintiffs and defendants represent themselves in court. They can present only oral testimony, by oath or confession, to the exclusion of any physical evidence. Unlike Western courts that prize written documents as the best evidence, a writing is only admissible when arbitrarily allowed by the judge. Any other forensic or documentary/ circumstantial evidence—including DNA—are rejected. Criminal Law: Sharì’a lists three classes of crimes: Qisas, or personal injury, Hudud (also referred to as Hadd), or offenses against Allah, and Tazir, or all other minor crimes. Qisas includes murder or battery (intentional/unintentional) and is considered a civil matter. If the defendant is found guilty, the victim or family of the deceased determines the punishment, ranging from retribution to imprisonment, amputation, death, or diyya (blood money), as compensation. The judge may not punish Qisas ex parte. However, the state may prosecute crimes committed “alongside” the Qisas (i.e., disturbance of the peace) and impose even a much harsher sentence than requested by the victim. Hudud crimes include adultery, fornication, incest/pedophilia, rape, sodomy, homosexuality, waging war against Allah/Islam, theft, use of intoxicants, apostasy (renouncing Islam), blasphemy, and defamation. These offenses are punished not as deterrents, but to set an example for the general public. Tazir is a claim by the state and the sentence is wholly discretionary with the judge. Punishment can range from community service to death and is meant to fit the crime in an eye-for-an-eye retribution model (Ostien, 2000). Day-to-Day Life Under Sharì’a: Sharì’a proscribes not only a Muslim’s interaction and/or religious duties, but also their daily activities. Halal (lawful/legal conduct) and dhabiha (ritual preparation of food) deal with the Muslim diet, with sharì’a dictating the everyday rituals, habits, and customs, including dress codes, sexual intercourse, menstruation, ritual purification, circumcision, nail clipping, and personal hygiene.
Affects on Non-Muslims The American legal system uses a jury of peers to interpret the black letter of the law (i.e., common, statutory, and precedent) in 877.219.2519
www.abchs.com
a unique, fact situation. Unlike sharì’a, which has been relatively unchanged since its inception, our system, both legislative and judicial, has continued to evolve over the last 250 years and is based on one core concept—personal responsibility—focusing on how a single actor personally participated in a situation or crime. To the contrary, sharì’a is a form of ancient tribal law, whereas if one member of a tribe offends you, seek recompense from another member. Simply put, Islamic sharì’a encodes an ideological system. As Western countries like Great Britain establish sharì’a courts, allowing civil matters like marriage contracts to be determined according to Muslim custom, the key differences in legal decisionmaking between sharì’a law and the American justice system have seen much U.S. debate in recent years. States such as Oklahoma seek to ban the use of these Muslim codes and other foreign laws (i.e. canon or Orthodox Jewish) currently considered in cases, asserting that court rulings in the United States should concur only with the laws set within the United States.
References
Ahmad, A. (1999, April 22). Muslim Activists Reject Secular Fundamentalism. Retrieved July 28, 2011, from A Christian Review of Bad Religions and Beliefs: http://www.truthandgrace.com/muslimhateforsecularism.htm. Little, J. (2003, June 11). Debate rages over women and Sharia. Retrieved July 28, 2011, from BBC News: http://news.bbc.co.uk/2/hi/2977446.stm. O’Connell, K. (2010, September 26). Crime & Punishment in Islamic Law. Canada Free Press. Ostien, P. (2000). Islamic Criminal Law: What it Means in Zamfara and Niger States. Journal of Public and Private Law 4, 1-18. Weiss, B. G. (1998). In the Spirit of Islamic Law. Alta Mira Press. Wikipedia. (2001, November 8). Sharia . Retrieved July 28, 2011, from Wikipedia: http://en.wikipedia.org/wiki/Sharia.
A b o u t t h e Au t h o r s Pat Merriman is an attorney, admitted to the federal and Missouri Bar since 1986. His work at the Justice Department, Missouri Attorney General’s office, defense counsel, and as a drug czar in two Missouri jurisdictions span a 25-year career in interdicting, prosecuting, analyzing, and writing about narcotics enforcement in the United States. A newcomer to the study of Islamic Jihad, he now takes aim at the No. 1 threat to the United States.
J.S. Cheek holds a Bachelor of Science degree from Columbus State University and presents a combined 31-year of history of training, education, and federal/state law enforcement. He has served in various Special Operations capacities, is an accomplished marksman, and specializes in countering the terrorist threat. A long-time expert on Islam and shari’a law, Cheek is a close friend and collaborator with Merriman. Threat to Non-Muslims Fall 2011
Inside Homeland Security®
55
terrorism
F r o m t h e e x p e rt s
BETTER LUCKY THAN GOOD? By John Giduck, JD, MSS, PhD
How Far America Has Come Since 9/11, and Who It Is We Are Relying On 56
Inside Homeland Security速
Fall 2011
www.abchs.com
877.219.2519
As America pauses to remember and reflect on the devastation that was wreaked on our nation on the decennial anniversary of the Islamist attacks on September 11, 2001, it is fitting to contemplate just where we were on that day and where we have come. Since 9/11, the second day in American history to which President Franklin Delano Roosevelt’s resounding words—“a date which will live in infamy”—can be so aptly applied, we have come a long way. We have come a long way in the marshalling of military might and seen that might applied around the world to great success in the ultimate goal of keeping America safe from what Orwell called “those who would do us harm” in the night. We have come a very long way in the expansion and application of our peerless intelligence agencies and their brave men and women who work clandestinely—often in the dark recesses of the sanctuaries of evil—for the purposes of preventing another date of infamy coming to our shores. We have, as well, come a long way in expending many times a king’s ransom in developing new technology and weapons. And we have created and reconstituted enormous aspects of our federal government because of what a small, platoon-sized element of enemy operators, armed merely with tiny blades, managed to do to us. Indeed, we have come a long way. Or have we?
Up until 8:46 a.m. on the East coast on September 11, 2001, there were large contingents of Americans who vilified those prescient few who warned that we were vulnerable to attack by weaponized aircraft hijacked by Islamist terrorists. They were accused of exaggeration, the fomenting of fear and—that most heinous of all the condemnatory invectives we must fend off to this day—being racist and bigoted. These decriers were the “Nine-Tenners,” for up to and including 9/10, they insisted that America was safe from terror attack and that anyone who spoke against that chauvinistically-held belief simply hated Muslims. Then 9/11 came and the harsh truth of Islamist extremists smote them with their very words. But 10 years on, where are we? The financial devastation to the United States of 9/11 is incalculable. Many experts refuse to hazard a guess, so difficult is it to assess the ceaseless ripple effect to both America’s economy and that of the world. People forget that the U.S. economy and stock market have stumbled along uncertainly since those planes slammed into the World Trade Center Towers and Pentagon. Those financial institutions were wounded, and the full effect of those wounds would not be seen for some time—not until they came crashing down almost three years ago. They were not un877.219.2519
www.abchs.com
like the Towers themselves, damaged, smoldering and on fire, yet remained standing until the consequential effects of that damage gained enough momentum to bring them down. And in the midst of that avalanche of economic destruction—gaining speed, racing toward a devastating recession—we went to work to ensure it never happened again. But going to work costs money. Since September 11, 2001, the U.S. has spent a reported $1.3 trillion in the Global War on Terror (GWOT), including the creation of whole governmental institutions, the reorganization of others, the expansion of still more, and the conscription into our organizational armor of many at the state and even the local levels. Police have been not only trained up but also freed up to assist in tasks that were not within the purview of American law enforcement before. We have JTTCs, ATACs, fusion centers, intelligence divisions, counter-terror units and specialists. We have FBI special agents doing “tours of duty” with CIA, and the same with agents from the Department of Homeland Security (DHS). We have a new special-forces-type commando school for agents from “the Bureau,” and CIA Special Activities Division (SAD) warriors have been turned loose throughout the world. We have torn down communications fire walls, forced bickering agencies to work with Fall 2011
Inside Homeland Security®
57
terrorism
f r o m t h e e x p e rt s Since September 11, 2001, the U.S. has spent a reported $1.3 trillion in the Global War on Terror.
each other, locked people away in Guantanamo Bay and other distant places, wrung our hands over the legality and morality of torturing human beings, and debated endlessly what actually constitutes torture. online to use in explosive attacks against various targets in the We have eavesdropped, litigated, legislated, imprisoned, tried, United States. In this instance, federal investigators would priand convicted. According to the Rand Corporation, we now have vately admit that he was “not on anybody’s radar screen,” and that over 800,000 U.S. citizens with top-secret security clearances, his plot was prevented through sheer luck. many of them staffing the 17 intelligence agencies involved in the Thus, in little more than the past year alone, we have seen terGWOT. The list of what we have done is endless. And we have ror plots either reach the execution stage—yet fail to kill scores spent a fortune doing it. of innocents due solely to the incompetence of the terrorists—or Yet how effective have our efforts been? A recent report from be prevented by either blind luck or the intervention of the very Heritage.org cites fully 39 terror plots against the United States citizens who were the targets of the attacks. In the case of the that have been prevented since 9/11. A review of the entire list Underwear Bomber, a slightly misquoted statement earned DHS yields an inordinate number that failed through terrorist in- Secretary Janet Napolitano the derision of many when she was competence, citizen intervention, and luck. And many of them cited as saying that “the system worked.” Yet a review of the enoccurred, or were thwarted, long before we reached anywhere near tire list of “prevented” terror attacks actually yields a surprisingly the level of spending and reorganizing we are at today. small number that were prevented entirely by our counter-terror They include Richard Reid the “Shoe Bomber,” Jose Padilla security apparatus. the “Dirty Bomber,” the Lackawanna Six, the 13 members of the Virginia Jihad Network called the A recent report cited more than 25,000 security Paintball Jihad—which had connections to Virginia Tech, the same school that would produce both breaches at the nation's airports since TSA was created. Seung-Hui Cho and Maj. Nidal Hasan of Ft. Hood infamy. Interestingly, Hasan is left off the list. Despite seemingly overwhelming evidence and his own statements, In all of this we have been slaves to the cultural obsessions of us our government refuses to acknowledge his allegedly success- as Americans, that when we confront a perceived problem we do ful attack as an act of terrorism. Rand’s Brian Jenkins expands several things: (1) pass legislation making something a crime; (2) this report dramatically, citing fully 82 instances of American allocate a lot of money; and (3) spend that money on the latest domestic terrorism, including U.S. citizens going overseas to technology. From there we assume we have solved a problem and engage in jihad. move on, ignoring contrary evidence. The simple reality is that all But in examining several of the most recent attacks of signifi- passengers on board commercial aircraft on 9/11 were legally percant magnitude, the efficacy of U.S. counterterrorism efforts may mitted to carry knives with blades up to three-and-a-half inches. be deserving of some scrutiny. For going back little more than a Had 10 passengers on those planes gotten up with their own weapsingle year demands the question of whether we have been safe ons the moment the threat was revealed, that day might have very from terror attack not so much because of all that we have done, well ended differently. And when we realized the threat of a handful but in spite of what we have done and all the money we have of men armed with small knives, would it have solved the probspent. On Christmas Day 2009, Nigerian student Umar Farouk Abdulmutallab allegedly attempted to detonate explosives on a Detroit-bound flight, earnWe know that on 9/11 there were only a dozen ing him the sobriquet of the “Underwear Bomber.” extremist Islamist Web sites, but within five years Only the rapid response of other passengers seemed to have stopped him. In May 2010, Faisal Shahzad there were 2,400. was stopped from detonating his car bomb at Times Square in Manhattan through the intervention of another citizen. Then on October 31, 2010, two packages of bombs lem— and saved a fortune— to simply encourage all passengers to were found, having been shipped from Yemen to Chicago-area ensure they were armed with the tools that the law permitted them synagogues in printer cartridges. These explosive devices made already? Instead, we made it illegal for people to have those knives, it safely onto American soil without detection. Just days later, and to dare travel with deodorant, toothpaste, food, water bottles, 19-year-old Somali Mohamed Osman Mohamud was arrested medication, makeup, and countless children’s toys. after he attempted to detonate a car bomb at a Christmas treeFor all our efforts and investment, the stories of people surpasslighting ceremony in Portland, Oregon. Then, in February 2011, ing security are myriad. A recent report cited more than 25,000 Khalid Ali Aldawsari was arrested after buying toxic chemicals security breaches at the nation’s airports since TSA was created. 58
Inside Homeland Security®
Fall 2011
www.abchs.com
877.219.2519
And the inconsistency of our security practices is frustrating to all. You cannot carry nail clippers on the plane, but elderly women can be seen happily working away with 10-inch knitting needles. And a first-class ticket—the same seats occupied by the 9/11 murderers—will still get you a metal fork and knife with a serrated edge, within scant feet of the cockpit door. We drive people to airline rage with the fondling of their children, virtual prison searches of ourselves if we dare to commit the unpardonable sin of having a replaced knee or hip, and the stripping of our elderly of undergarments designed merely to prevent them the embarrassment of their own failing bodies. We drag nuns from wheelchairs and demand recent surgery patients remove bandages holding them together. Yet terrorists can board any train or subway with steam trunks full of explosives and wait for it to arrive alongside a strategic-level terror target, and the private commercial airline industry goes completely unregulated and unsecured. In our efforts to do those things we can do easily with legislation and the spending of money on technology, we are, once again, where we were on 9/10. That is, we are once again ignoring the obvious in lieu of the comfortable. We know there are terror plots in the offing that take advantage of strategic weaknesses in our defenses, and yet we refuse to act on that recognition until after another 1,000 innocent people lay dead. We know that on 9/11 there were only a dozen extremist Islamist Web sites, but within five years there were 2,400. Recently, a commander of an elite SOCOM unit told me that that number is now double that, and the majority of them are reaching out to Muslims throughout the world and in America. On these sites they not only seek to conscript them into the jihad, but give them the intelligence and tactics to devise their own plots. They pass on information about SWAT and Special Forces, detailing their weaknesses with regard to each type of strategiclevel attack methodology and target. The World Almanac cites 5.8 million Muslims in America, and al-Qaeda and related groups are trying to get every one of them to join the global jihad. It is the goal of these groups to inspire every single Muslim in America to think up his own attack and execute it. Up to this point, the “homegrown” or “lone wolf ” terrorists have proven too incompetent at their tasks to successfully kill scores of innocent people. But sooner or later these would-be terrorists—what Rand’s Brian Jenkins calls “Do It Yourself Terrorism”—will succeed. And with a very few initial successes, America will be consumed by a veritable tsunami of attacks by newly inspired individuals, making the paralysis of a several state area by two untrained murderers, known as the Beltway Snipers, look like pedestrian-level street crime.
Learn and practice your intelligence gathering and analyzing skills by becoming INTELLIGENCE ANALYST CERTIFIED, IACSM, see our ad on page 35 or cal 877-219-2519. Enroll online at www.abchs.com.
877.219.2519
www.abchs.com
We know all this. We know what targets the terrorists have been assessing and gathering intelligence on, yet we do nothing to secure them. Schools rank among the most prolific terror targets in the world —attacked in the thousands—yet the federal government has left it up to local law enforcement to secure our schools. Our federal agencies know that dozens of schools in America have been the target of intelligence-gathering by foreign nationals, invariably from Arabic countries and virtually always on the FBI terror watch list, yet we continue to publish reports saying that we have no evidence that an American school has ever been targeted. We know the devastation that could be wreaked by an attack on any of our nuclear power plants by no more than three poorly trained terrorists. Yet the security at such facilities would be comedic if the ultimate consequences were not so deadly, all of which has been well documented by the CIA’s top expert in such matters, Charles S. Faddis, in his book Willful Neglect. We know all this, and yet we do nothing. America is a nation possessed of the greatest, bravest people on the planet. At the operational level, we have phenomenal professionals working diligently to keep our people safe. Yet at the strategic level we have stumbled, falling back on old habits and hope. And as retired marine colonel Joe Bierly often teaches, “Hope is never a strategy.” We cannot allow political correctness to dictate our security practices, for the enemy realizes this and will once again exploit our weaknesses. We cannot continue to spend excessive amounts of money on technology when better “qualitative” approaches— rather than our obsessively “quantitative” ones—would be more effective and much cheaper. We cannot defend the immoral spending of vast fortunes of taxpayer dollars when, in reality, we find ourselves 10 years later still turning to the common citizens to respond to terror attacks in the moment, when our highpriced security measures have failed. And we cannot continue to disenfranchise those citizens, keeping them in the dark rather than telling them of the dangers that lurk within and without. We have continued to rely on the American people and they now must be conscripted into our Global War On Terror. As they have shown, they can make all the difference. Just as they did on United Flight 93 on 9/11. And as they will prove again and again in the future.
A b o u t t h e Au t h o r John Giduck has a master’s degree in Russian Studies, a law degree and a Ph.D. in Middle East Studies from Kings College London. He is the president of Archangel Group, Ltd. (archangelgroup.org), a private government contract consulting and training concern, and is the author of Terror at Beslan, and co-author of The Green Beret In You and Shooter Down! The Dramatic, Untold Story of the Police Response to the Virginia Tech Massacre. He is currently working on two books, one on the evolution of terrorist mass-hostage siege tactics throughout the world, and the other on the Mumbai terror attack in 2008. Fall 2011
Inside Homeland Security®
59
Top 10 websites!
Visit us at one of our Go to page 68
acfei.com abchs.com acfeimedia.com aaimedicine.com timelineofterrorism.com theforensicexaminer.com thenationalconference.com annalsofpsychotherapy.com insidehomelandsecurity.com americanpsychotherapy.com
For the complete coverage see Inside Homeland Security’s special Winter 2011 issue, centered on Disaster Preparedness.
Writer Ed Peaco will take you inside Commu-
IN O C E G LEN tion L A ollabera H C C n io S t CH munication Coopera Co m
Be among the first to obtain this beautiful gold and nickel coin featuring a 3D mold of an eagle and the Statue of Liberty.
nities Organized to Respond in Emergencies (C.O.R.E.) in Miami Dade County, Florida, the aftermath of the Tucson shootings, military and non-military chaplaincy, and Dave Fair’s take on the Annual National Capitol Region
Don’t wait, order now!
Interagency Chaplain Conference.
This beautifully detailed coin representing the CHS program is now available to you at the low cost of only $14.95
877.219.2519 CC0211IHS
60 Evolution of DHS A Decade of Homeland Security DHS Center Faith-Based & Neighborhood Partnerships Critical Infrastructure Before and After 9/11 Homeland Security Tactics: Extraordinary Rendition
Days it took for DHS to become operational after the Homeland Security Act was passed:
62 64 68 70 76
DHS Department of Homeland Security
2,000
Number of homeland security Congressional committees and accounts before 9/11:
877.219.2519
www.abchs.com
11
Days after 9/11 before President George W. Bush committed to creating DHS:
Fall 2011
Inside Homeland Security速
61
DHS
evolution
n o i t u l d o n v a l E e m o H f o rity u c Se
al ation n , 1 200 ly efore y typical g rit secu gatherin d t n broa a e mea c ligen tion intel ntempla orb ch co ur own u m ntil in o out with cks with course, u of tta ng a i t on a hat was, p prom and .T n ders ppened, zatio an a i h n a 1 1 rg th 9/ e reo of more v i s s t on ma idati pread ou l o s con ies s federal c n e 40 ag hout the was s g i u h o T t. thr men n f the r o e v g o n g ni egin nt of b e e m th t . ar Dep Security U.S. d elan m o H 62
40
Inside Homeland Security®
Fall 2011
Office of Homeland Security
Pre-9/11 According to the Department of Homeland Security Web site, www.dhs.gov, the Hart-Rudman Commission determined there was an abundance of weak areas in the national security arena. In February 2001, it was suggested that the creation of the National Homeland Security Agency could bring many departments and agencies together to close the gaps presented in their four-year study. By March 2001, Rep. Mac Thornberry, R-TX, proposed House bill 1158, National Homeland Security Agency Act, to combine the Federal Emergency Management Agency (FEMA), the U.S. Customs, and Border Control. Although hearings had been held, by September 11, 2001, Congress had taken other action on the bill.
The bill’s propositions were fast-tracked 11 days after 9/11 when President George W. Bush swore in former Pennsylvania governor Tom Ridge as the White House Homeland Security Advisor, who would eventually move on to become the first Secretary of Homeland Security. Executive Order 13228 established the Office of Homeland Security, an entity that would develop and implement a national strategy promoting the coordination of federal, state, and local organizations in counterterrorism efforts. Another component of the order included the formation of the Homeland Security Council, which—much like the National Security Council—was comprised of Cabinet members who would advise the president on homeland security issues.
www.abchs.com
Number of federal agencies in charge of homeland security before 9/11:
877.219.2519
18 Department of Homeland Security
Homeland Security Advisory System
servere
www.abchs.com
High
Elevated
877.219.2519
guarded
LOW
The following year, in March 2002, Homeland Security Presidential Directive-3 brought about a warning tool—the Homeland Security Advisory System (HSAS)—which would allow authorities to alert the American public of suspected attacks, or increased terrorism activity. The color-coded addressed five Threat Conditions: Low, or Green; Guarded, or Blue; Elevated, or Yellow; High, or Orange; and Severe, or Red.
Once the Homeland Security Act of 2002 was signed into law, the Department of Homeland Security became operational on January 24, 2003, with five original directorates: • Border and Transportation Security • Emergency Preparedness and Response • Information Analysis and Infrastructure Protection • Management • Science and Technology Tom Ridge was sworn in as its secretary and by March 1, 2003, FEMA, TSA, the Coast Guard, Customs, and the U.S. Secret Service had all been transferred over to DHS. A year later, the Office for Domestic Preparedness and the Office of State and Local Government Coordination consolidated to form the Office of State and Local Government Coordination and Preparedness. In 2005, federal judge Michael Chertoff took over as Secretary of Homeland Security and began to evaluate the operations and policies of DHS, developing his six-point agenda as a result, to increase preparedness, improve transportation systems, strengthen border security, enhance information sharing, amend financial management, and realign DHS organization.
Arizona Gov. Janet Napolitano was sworn in as the third DHS secretary on January 20, 2009. Since her appointment, she has conducted the most comprehensive assessment of homeland security with the Quadrennial Homeland Security Review and the Bottom Up Review, and has since worked to improve and strengthen the department, its operations, and its mission. One of the major changes seen has been to the advisory system, which was replaced with the National Terrorism Advisory System (NTAS) on May 5, 2011. With NTAS, only the secretary, who will decide if the message will be disseminated to the media or just to law enforcement, will issue alerts when credible information presents itself. One of two levels will be chosen—Imminent Threat or Elevated Threat—and a brief summary of the threat included, along with the actions and recommended steps to take in order to mitigate the threat. A sunset provision will also be issued to indicate a specific expiration date of the alert.
Fall 2011
Inside Homeland Security®
63
Number of sectors included in DHS’ critical infrastructure protection:
Secretary Napolitano
e x e c u t i v e l e v e l e d u c at i o n
U.S. Navy photo by Mass Communication Specialist 3rd Class Adam Henderson
DHS
10 Years in the Making: Recognizing Quality in Homeland Security Training, Education By Dave McIntyre
On September 11, 2001, there were no educational or training programs that offered degrees or certifications in homeland security. That’s because the academic field of homeland security did not exist.
T
o be sure, there were a number of excellent programs in the individual skills and disciplines that are now part of what many call Homeland Security (HSL) or—recognizing the somewhat different contribution of the Department of Defense—Homeland Security and Defense (HSD). These ranged from the techniques of emergency management and law enforcement, to the studies and theories of terrorism and national security. 64
Inside Homeland Security®
Fall 2011
But the term homeland security was not itself widely known before the publication of Transforming Defense, a report by the National Defense Panel in late 1997. And on 9/11, the only graduate course in HSD in the United States was at the National War College. After 9/11, many schools scrambled to sell new offerings, and the result for a while was an “intellectual Wild West,” where almost anyone could ride into town and hang out his single as www.abchs.com
877.219.2519
a “homeland security expert.” But a number of organizations worked hard to create academic discipline. For example, the Federal Emergency Management Agency (FEMA) Higher Education program created course material; the American Board for Certification in Homeland Security (ABCHS) set standards for certification programs; Northern Command helped to create the Homeland Security and Defense Education Consortium Association (HSDECA); and the Naval Postgraduate School set the gold standard for graduate education with the Center for Homeland Defense and Security (CHDS). Today there are hundreds of organizations offering education and training in this field. Standards are better established, but prospective students still face the challenge of identifying quality programs before they invest. Here are some things to look for when you shop. • Training programs should offer some sort of certification, like American National Standards Institute (ANSI) certification, or Continuing Education Credits through a college or university. • Education programs (bachelors, masters, PhD or DBA) should demonstrate accreditation by a regional accrediting body, like the North East Association of Schools and Colleges, or the Middle States Association. (State licensing can be important, but programs taught on-line or on federal facilities may not require state permission.) • Faculty qualification is important but hard to judge. Academic accomplishment does matter, but so does practical experience. Because the field is new, a record of highlevel presentations may be as important as a record of publication. Perhaps the best approach is to look for a good balance of the practical and the academic from the faculty as a whole. • Benchmarking of curriculum is important and not usually evident from a Web site or brochures. But partnership with well-respected organizations is a good indicator of an outward looking faculty and program. • Program design is a subject few students question until they have spent a good deal of money and are well into course work. Homeland security is a very broad discipline. A good program should offer a wide range of study in the field, but also some sort of focus. What do you expect to do with your certification or degree? Work? Teach? Move up in your current job? Well, what does the program you are considering offer that would help you achieve that goal? There is no right or wrong here. Some programs may be more focused on emergency management or business, other grounded in political science or law enforcement. What is right or wrong for you? What do you want to do with the material after you learn it? • Program and course objectives are usually available from course summaries. Objectives should be matched with the level of instruction. Training courses should emphasize understanding, remembering and applying material taught. Bachelors programs require applying this knowl877.219.2519
www.abchs.com
edge to some research. Masters level programs should teach how to analyze and evaluate issues – understanding cause and effect and prioritizing best courses of action. At the PhD or DBA level, programs should encourage creation of new ideas and approaches. Objectives might also include special issues like teamwork or persuasive communication. The point is that course and program summaries should explain what students learn to do, not just what the courses are about. • Program requirements are very important. One that demands little from the students will provide little quality in return. On the other hand, working students can rarely afford to spend five years full time in the library. A good program will explain clearly to prospective students what time and effort they should expect to expend per week, per course in order to graduate. • A really first-class education program will offer research assistance—such as a good online library, links to a wealth of information, and an accessible librarian. Faculty should be reasonably available. Note, however, that good faculty will also be busy with their own projects in the field, and students should not expect to be spoon-fed. Homeland security education and training is for responsible adults who seek help after they have tried their best to solve problems on their own. • Financial help is a complicated issue not to be summarized in two sentences. A good program will be ready to assist students with sorting through available financial assistance. But if all the advisors are interested in is who pays and how much, watch out. They should be interested in you. If there is a single “bottom line” to training and education in this new and interdisciplinary field of study, it is customer satisfaction. A high-quality program is proud of its graduates and they are proud of what they achieved. The program will advertise endorsements from graduates and their employers and perhaps even offer contacts with selected students and faculty. A decade after 9/11, finding the right balance in public and private homeland security efforts remains something of a mystery. But recognizing quality in training and education programs is no mystery at all.
A b o u t t h e Au t h o r
Dr. Dave McIntyre is vice president for academic affairs at the National Graduate School and a Visiting Fellow at both the Homeland Security Institute and the National WMD Commission. He assisted then-Col. Randy Larsen in creating the first graduate course in homeland security in the United States in 1999, and has been teaching national and homeland security for more than 18 years. Fall 2011
Inside Homeland Security®
65
T H I S I S A N A DV E RT I S E M E N T
‘Just give us an opening and
we’ll light the way’
FreedomView
Produc t of the Year! 66
Inside Homeland Security®
Fall 2011
www.abchs.com
877.219.2519
T H I S I S A N A DV E RT I S E M E N T
Pencil-sized LED scope provides access to small spaces Whether you’re looking for survivors under the rubble caused by a natural or manmade disaster or drugs located in a gas tank, Optim’s FreedomView® LED fiberscope is the premier homeland security product on the market. Used by U.S. and Canadian border patrol and customs agents at ports, airports, and border crossings, as well as law enforcement across the country, the pencil-sized, flexible hand-held device provides fast and accurate remote imaging, enabling visual inspections in hard-to-reach places. Incorporating a patented LED lighting system with light intensity control, power on/off switch, two-way end tip articulation and rechargeable lithium-ion battery compartment, it can be fully immersed in water, gasoline, and diesel fuel. While other products in the market need an external light source, reducing resolution, and few have two-way articulation and are intrinsically safe, the FreedomView is ideal for a variety of settings. Canadian Border Services Senior Program Officer Andre Cote said an uncomplicated device that requires no assembly or outside power source is ideal when border officers are searching through car doors and fuel tanks, looking mainly for cash being smuggled by money launderers. Corporal Andy Martin, division commander of the Vice and Intelligence Unit of the Dothan Police Department, Dothan, Alabama, said his police officers have found the FreedomView particularly effective in finding illegal drugs in private residences. “We’ve found crystal meth in air conditioning vents and marijuana behind kitchen counters,” Martin said. “The FreedomView is enabling us to look in places that we’d never be able to see otherwise, since it’s as thin as a pencil. We’ve been able to find illegal drugs that would have been out on the streets.” Eliminating a separate light source, light guide cables, and lamps makes the unit fully portable and optimal for inthe-field use, allowing agents to move freely. The unit’s unmatched integral LED light permits security personnel to examine interior compartments of automobiles, trucks, buses, and large and small airplanes, seeing inside gas tanks, car vents, door panels, and other concealed areas. Optim’s President Thomas Root said the device’s applications are virtually limitless. “With heightened security in the U.S., we’ve been able to demonstrate how the FreedomView can assist state and local law enforcement professionals with protecting our borders, detecting explosives and increasing the number of drug arrests,” he said. Optim, a manufacturer of optical imaging tools for both the medical and industrial sectors, has made the product advantageous for industrial inspections as well, making the product’s use across a variety of industries—combined with its cutting-edge technology—spell a future for Optim that’s as bright as the light source it provides to its customers. “As its name suggests, FreedomView was designed to easily bring the inside…out,” Root said. “I tell our customers ‘Just give us an opening, and we’ll light the way.’” 877.219.2519
www.abchs.com
uct Profdthe o
Year
FreedomView
was awarded “Product of the Year” by peers in Photonics Tech Briefs, the only major photonics publication targeting design engineers. It is selectively bound into NASA Tech Briefs, the world’s largest circulation design engineering magazine. From the original launch of the product, the response has been overwhelmingly enthusiastic. The FreedomView is also listed with the Department of Homeland Security’s commercial and local agencies to purchase technology equipment that enhances public safety efforts, and it is listed on the U.S. General Services Administration schedule for government purchases.
Fall 2011
Inside Homeland Security®
67
DHS
Disaster Preparedness
Disasters don’t discriminate:
Engaging the whole community in preparedness, response, and recovery
By Ed Peaco For Inside Homeland Security®
D
isasters don’t play favorites. They strike anyone in their way. Disasters are always local. They begin locally, and they end locally. Our response to these powerful, seemingly random forces requires an equally powerful yet organized effort among all ranks and kinds of citizens. These themes bubble to the top of conversations with Dr. Jannah Scott, Deputy Director of the Department of Homeland Security Center for Faith-Based & Neighborhood Partnerships. “Whatever the source of the disaster is—a terrorist attack, another man caused disaster, or indeed Mother Nature—these things don’t discriminate. When incidents occur, people naturally come together across all faiths and walks of life to help their families, friends and neighbors,” she says. “We’re coming up on the 10-year commemoration of 9/11, and September is also National Preparedness Month. The urgency of the times necessitates that we engage, promote and highlight what FEMA Administrator Fugate calls a ‘whole community’ approach in preparedness, response, and recovery—and the whole community includes people of faith and of goodwill.” In an interview with Inside Homeland Security®, Scott spoke with Dr. David J. Fair, Chair of the American Board for Certified Master Chaplains, along with Ed Peaco, writing for IHS. The Center’s Executive Officer, Terry Monrad, joined the conversation. In a year already heavily pockmarked with manmade and natural disasters, the interview unfolded against the backdrop of a fresh emergency. All participants acknowledged their concerns about the urgent business they could not entirely set aside: the tornado that destroyed a swath of Joplin, Missouri, and killed more than 150 people on May 22, 2011. The interview took place on the Tuesday morning after the disaster of late Sunday afternoon, still at a stage of information gathering. Monrad received a cell-phone update. Fair, in his capacity in the International Conference of Police Chaplains, had alerted chaplains in the Joplin region for possible call-up.
68
Inside Homeland Security®
Fall 2011
The disaster in Missouri led to a discussion of the Center’s mission. Scott described two pivotal experiences in her work that epitomize the preparedness and response functions of the Center. While planning for a regional Faithful Readiness conference in Tucson, Arizona, she found herself in the heat of the faith-based and community response to the mass shootings of January 8, 2011. For the past year, she has been working on the Center’s largest undertaking—a research and practice initiative to promote greater involvement of diverse faith-based and community groups in disaster preparedness, response and recovery in Miami-Dade County. With examples such as the DHS Center’s involvement in the Miami-Dade initiative, along with repeated references by senior leadership, Monrad observed that the Center’s work is becoming increasingly significant and recognized by DHS, faith-based, voluntary organizations and emergency management communities. “More and more people are recognizing the role of faith-based groups and the importance of their involvement in these issues,” he said.
From left to right, Ed Peaco, Dr. Jannah Scott, Dr. David J. Fair.
www.abchs.com
877.219.2519
Become
CERTIFIED IN DISASTER PREPAREDNESS, CDP-I®
Police Chaplains: Ministry of Presence
By Ed Peaco For Inside Homeland Security®
P
olice chaplains face the special challenge of delivering spiritual first aid to the law enforcement community during times of crisis. Dr. David J. Fair and fellow Master Chaplain Bob Johnson discussed these challenges on May 24, the evening before the National Capital Region Interagency Chaplains Conference in Washington, D.C., which they were attending. Fair, Chair of the American Board for Certified Master Chaplains (ABCMC), and Johnson have leadership roles in the International Conference of Police Chaplains (ICPC). Johnson is Chair of the ICPC Disaster Response Team. ICPC trains and credentials chaplains and deploys them when disaster events occur when invited. Dr. Fair, who has served the organization in many capacities, is Deputy Director for the region that includes Missouri. When police chaplains are deployed, their first responsibility is to serve as a ministry of presence. Beyond that, they must be prepared for anything, the two chaplains agreed. “It’s the ministry of presence, just being there,” Fair said. “Now, if a person asks a question, or asks me to pray, certainly I’m going to do that. But I’m not going to force that on them because that’s not what I’m there to do.” Johnson said that his service after Katrina, in which he rode along with officers, often involved long periods of silence. He recalled meeting police officers in small cities. 877.219.2519
www.abchs.com
Enroll by calling 877-219-2519 or visiting our Web site, www. abchs.com.
“We said, ‘Hey, we’re here if you need us.’ And they said, ‘Ah, we’re glad you’re here.’ Just that, they said, was a big help, because it represents their spiritual needs. We represent God. And they were glad we were there, only for that reason, even if we didn’t have to do anything.” Johnson also related a time when he was called upon to fight a fire in Gulfport, Mississippi. “I was riding with an officer, and he responded with the fire truck,” Johnson said. “And guess what I was doing? Pulling hoses in the woods. I wasn’t talking about their problems. We were just fighting a fire, and they asked me to help.” “It’s a situation where you have to become all things to all people,” Fair said, from traffic control to death notification. Likewise, police chaplains must be ready to serve people of all faith traditions, including no faith tradition, Fair said. “It’s always about them; it’s never about us,” he said. ABCMC is a training and credentialing association. ICPC has a credentialing process and deploys chaplains, Johnson said. Fair noted that each organization augments the other. “There are certain things that each organization brings to the table that help chaplaincy in general do a better job of what we do, and that’s helping others,” Fair said.
In the Winter 2011 issue, find out more about the role of police chaplains in emergencies, see
Dr. David Fair’s Chaplaincy Column
Fall 2011
Inside Homeland Security®
69
DHS
infrastructure Protection
Night & Day U
ntil a little over a decade ago, critical infrastructure protection was not something that Congress or the executive branch of our federal government took very seriously. Today, infrastructure is in the news every day. In previous columns, we have discussed what critical infrastructure is and the guidelines that the Department of Homeland Security (DHS) has promulgated regarding the protection thereof. Because this is our 10-year memorial edition for 9/11, this quarter’s column will discuss how the attacks of that day propelled critical infrastructure protection into the mainstream. Before 9/11 September 11, 2001, was not the first time someone decided they wanted to harm people using explosives on American soil, even though it is the most often referred-to event. In 1995, two right-wing extremists, Timothy McVeigh and Terry Nichols, were angry at the federal government, specifically the FBI, for its handling of the raids at Ruby Ridge and Waco, Texas; they decided it was up to them to retaliate. On April 19, 1995, McVeigh parked a yellow moving truck in front of the nine-story Alfred P. Murrah
70
Inside Homeland Security®
Fall 2011
Critical Infrastructure Protection Before and After 9/11 By Shawn J. VanDiver, MS, CPP, CTT+, CMAS, CAS-PSM Certified in Homeland Security (CHS-V), Certified in Disaster Preparedness (CDP-I), Sensitive Security information (SSI)
Federal Building, after lighting the five-minute and two-minute delay fuses, and then got into his getaway car before the bomb exploded, causing approximately $652 million in damage. The explosion was heard almost 60 miles away, but the aftermath affected the entire country. Information systems housed at the federal building affected agencies across the country and exposed vulnerabilities that had previously been largely unnoticed. President Bill Clinton signed Presidential Decision Directive 39 (PDD 39), “The U.S. Policy on Counterterrorism,” on June 21, 1995, only two months after the bombing. PDD 39 directed the Department of Justice (DOJ) to examine vulnerabilities to the country’s critical infrastructure and come up with a plan for reducing or eliminating those found. Another DOJ responsibility was to create a Cabinet-level, interagency panel with the goal of addressing critical infrastructure protection. That panel came to be called the Critical Infrastructure Working Group. In 1996, the CIWG issued a report that emphasized that threats came in two forms—physical and cyber. The report made two key recommendations: the FBI should immediately stand up an Infrastructure Protection Task Force (IPTF); and the most important recommendation, establish a full-time presidential commission devoted to critical infrastructure issues. The result was the President’s Commission on Critical Infrastructure Protection (PCCIP). Although the PCCIP focused mainly upon the cyber threat, the message was clear: the nation’s critical infrastructure was unacceptably vulnerable to natural and man-made disasters, both physical and cyber. The PCCIP recognized that the private sector would be an integral part of the problem and made several recommenwww.abchs.com
877.219.2519
dations to the President and the result was PDD 63, “Protecting America’s Critical Infrastructures.” PDD 63 said that by 2003, “the United States shall have achieved and shall maintain the ability to protect the nation’s critical infrastructures from intentional acts that would significantly diminish the abilities of: the Federal Government to perform essential national security missions and to ensure the general public health and safety; state and local governments to maintain order and to deliver minimum essential public services; and the private sector to ensure the orderly functioning of the economy and the delivery of essential telecommunications, energy, financial, and transportation services.” Although PDD 63 adopted several recommendations from the PCCIP, little funding was appropriated and CIP again became an afterthought.
After 9/11
FBI mugshot of Timothy McVeigh, a security guard who detonated a truck bomb in front of the Alfred P. Murrah building in Oklahoma City in 1995. Also pictured is the aftermath of the explosion.
Osama Bin Laden, a major target of the War on Terror, due to his involvement with the attacks on September 11, 2001. 877.219.2519
www.abchs.com
Before September 11, Congress had a hard time finding ways to fund CIP initiatives and projects. After the attacks, President George W. Bush established the Office of Homeland Security, which later became the Department of Homeland Security. DHS took several agencies under its purview and became responsible for critical infrastructure protection. In December 2003, President Bush signed HSPD 7 “Critical Infrastructure Identification, Prioritization, and Protection,” which basically spelled out the nation’s policy for federal agencies and departments to identify and prioritize our critical infrastructure and to protect them from terrorist attacks. HSPD 7 also called for coordination between federal agencies and the private sector, which seems to be a recurring theme with regard to protecting our critical infrastructure. An interesting fact, also stated in a previous column, is that roughly 85% of the nation’s critical infrastructure is owned by the private sector. It seems as though the PCCIP, CIWG, and presidents Clinton and Bush knew that we needed the cooperation of the private sector in order to effectively accomplish the goals stated by PDD 63 and HSPD 7. In July 2004, the 9/11 Commission made publically available its final report, making several recommendations regarding the protection of critical infrastructure and paying special attention to the transportation sector. As a result of HSPD 7 and (indirectly) the 9/11 Commission Report, the National Infrastructure Protection Plan (NIPP) was published in 2006. Because we don’t like to reinvent the wheel when starting up new programs, the NIPP adopted many of the recommendations of the PCCIP report, Critical Foundations. In my opinion, there are three major takeaways from the NIPP: 1. The NIPP Risk Management Framework: It provides the basic path for identifying, measuring, analyzing, prioritizing, and reducing vulnerability for critical infrastructure. While there is no standard methodology for assessing risk in each sector, the risk management framework provides a basic structure for each sector to follow when determining the methodology or methodologies they intend to employ for measuring risk in their sector. 2. Public / Private partnerships: Between the 18 Sectors, the Sector-Specific Agencies (SSAs), the 18 Sector-Specific Fall 2011
Inside Homeland Security®
71
DHS
infrastructure Protection
Plans (SSPs) developed by the 18 Sector-Coordinating Councils (SCCs), 18 Government-Coordinating Councils (GCCs), the Government- and CIKR- Cross-Sector Councils, and so on and so forth, the overarching theme is cooperation between the federal, state, local, tribal, and regional governments, and the private sector. 3. Sustainability: Chapter 6 of the NIPP delineates the way that the nation can ensure an effective, efficient infrastructure protection program over the long term. The continuum of CIKR capability development includes outreach, awareness, education, training, and exercise. By following the basic outline of the continuum, critical infrastructure key stakeholders can rest assured that their capabilities will continue to progress over time, with minimal loss of tacit knowledge. In the wake of 9/11, funding for homeland security became quite abundant, and resources were made available to help secure our infrastructure against attack, natural and man-made, foreign and domestic. That said, there is not enough money in the world to make sure that all of our critical infrastructure is impervious to every possible scenario. The NIPP recognizes this and therefore calls for prioritization to be a key facet of critical infrastructure protection. Each sector prioritizes their vulnerabilities and makes moves to secure the most important assets from the most likely threats.
Today Today, our critical infrastructure is far more protected than it has ever been. Citizens in the U.S. know what the term “infrastructure” means because they hear it on the news regularly. President Barack Obama declared December 2009 “Critical Infrastructure Protection Month” and regularly asserts interest in protecting our critical infrastructure. Several universities offer courses in critical infrastructure protection and the ABCIP is working on a comprehensive certification for employees in any of the 18 critical infrastructure sectors, as well as the sector-specific agencies. DOJ and DHS have rolled out the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI), allowing law enforcement agencies at every level to share information in a manner unheard of prior to 9/11. NSI uses a system called eGuardian which any sworn law enforcement officer with access to the Internet can view and report suspicious activity. NSI is also an integral part of the FBI fusion centers that have been opening up all across the country, for the purpose of sharing information amongst law enforcement and intelligence agencies. The DHS Office of Infrastructure Protection has established a very effective partnership between federal infrastructure protection agencies and local, state, tribal, and private sector stakeholders. Many of the tools are described in the DHS Private Sector Resources Catalog. One of the programs that DHS, through FEMA, has recently rolled out is the Voluntary Private Sector Preparedness Accreditation and Certification Program (PS‑Prep). PS-Prep is a voluntary program implemented by DHS in which organizations can become certified if they comply with one of three 72
Inside Homeland Security®
Fall 2011
Check out the Certified in Homeland Security—Level 2 (CHS-II) course for a more in-depth look on the protection of our nation’s critical infrastructure. Students will glimpse what resources are available to them through DHS. Enroll online today at www.abchs.com, or call 877-219-2519 for more information.
standards. The purpose of the PS-Prep Program is to enhance nationwide resilience in an all-hazards environment by encouraging private sector preparedness. More info on PS-Prep can be found on the Web site. So much of the above paints a very pretty picture for infrastructure protection in our nation. That is only half-true, as some sectors remain very vulnerable. Much of the problem is budget related, but some things just haven’t been brought up yet. What can you do if you work in a sector with glaring discrepancies? One of my favorite sayings is “the squeaky wheel gets the grease.” DHS has its ears and eyes open. They want to hear about those vulnerabilities. Get involved with FBI InfraGard; find out when your sector coordinating council is meeting and give some input. Being an agent of change feels good and can help your sector, and your community, remain resilient in the face of man-made or natural disaster.
about the author
Shawn J. VanDiver, MS, CPP, CTT+, CHSV, SSI, CDP-I, CMAS, CAS-PSM, holds the rank of Petty Officer Second Class in the United States Navy, operating in support of the Global War on Terror and the War on Drugs and providing sailors in his unit with force protection and anti-terrorism training. He previously served as the Assistant Emergency Management Coordinator for Center for Surface Combat Systems Detachment West, located in San Diego, as well as the lead CPR Instructor, Assistant Safety Officer, and HAZMAT Coordinator for his division. VanDiver spent several months working for the County of San Diego Office of Emergency Services, providing critical disaster preparedness information to and developing relationships with military families in the San Diego area. He attended National University and earned a Master of Science degree in Homeland Security and Safety Engineering and a Bachelor of Science degree in Domestic Security Management (with a minor in criminal justice). in 2011 and 2010, respectively. Currently, he is attending AEGIS SPY-1B/B(V)/D school in Dahlgren, VA as well as holding adjunct faculty positions at two universities. VanDiver is a charter member of the American Board for Certification in Infrastructure Protection and holds several homeland security and anti-terrorism certifications. He has a 3 year old son, Ryan, who would like to be a pirate or a rock star when he grows up. www.abchs.com
877.219.2519
Branson, Missouri | October 12-14 | 1-800-423-9737 | www.thenationalconference.com
The 2011 Executive Summit is a unique multi-disciplinary event that brings together professionals with the common goal of learning. By attending you will have the opportunity to: • Earn new continuing education credits and credentials • Discover the latest issues, news, and threats affecting your field • Engage in unlimited professional networking opportunities with many of the most influential leaders in the fields of forensics, law enforcement, and homeland security
Follow us on Twitter Facebook LinkedIn
On Wednesday, October 12, ABCHS will offer these credentialing courses and exams:
Register Online thenationalconference.com
• Certified in Disaster Preparedness-I • Certified Master Chaplain • Information Security Computer Forensics, Level I • Certified Homeland Security-Level V Exam
Schedule-at-a-Glance Wednesday, October 12, 2011 Credential Courses
8:00am – 12:00pm
Certification/Credential Exams
2:00pm – 5:00pm
Executive Summit Registration and Exhibits
12:00pm – 8:00pm
ABCHS Pre-Summit Session
3:00pm - 5:00pm
Networking Reception
5:00pm – 8:00pm
Thursday, October 13, 2011 Tai Chi Interactive Session
7:00am – 7:30am
General Session: Grand Opening
8:00am – 10:00am
Exhibitor Networking Break
10:00am – 10:30am
Concurrent Breakout Sessions
10:30am – 12:00pm
Networking Lunch
12:00pm – 1:30pm
Concurrent Breakout Sessions
1:30pm – 4:45pm
Networking and Exhibitor Time
4:45pm – 7:00pm
Annual Banquet
7:00pm – 9:00pm
Friday, October 14, 2011
74
Tai Chi Interactive Session
7:00am – 7:30am
General Session
8:00am – 9:00am
Exhibitor Networking Break
9:00am – 9:30am
Concurrent Breakout Sessions
9:30am – 11:00am
Lunch on Your Own (Free Time)
11:00am – 12:30pm
Concurrent Breakout Sessions Inside Homeland Security® Fall 2011
12:30pm – 5:30pm877.219.2519 www.abchs.com
Branson, Missouri | October 12-14 | 1-800-423-9737 | www.thenationalconference.com Photo credit: Brenau University
Featured Speakers Dr. J. Ronald “Star” Carey, Brigadier General, U.S. Army (Ret.), CHS-V Dr. Carey began his career as the clerk of the Headquarters Company of the Ohio National Guard’s 107th Armored Cavalry Regiment. He distinguished himself by being the only soldier in the unit able to run the mimeograph machine without getting blue ink on his hands. In those five years he made PFC. Three times. He then went to Bucknell University where he was in the ROTC and graduated last in his class. Following that he had eight years of active duty. One of his assignments was Commanding Officer of the Army’s European Mortuary System. This was an ideal tour to prepare for future work in the Pentagon. He then earned a Ph.D. in marketing at the University of Texas at Austin. His military schooling includes being the honor graduate of both the Quartermaster and Military Police Advanced Courses. He also is a graduate of the Air War College and the Industrial College of the Armed Forces. Upon his promotion to Brigadier General, he became the Program Manager of the Reserve Component Automation System. During his time with the program, it was the Army’s only major procurement that was always on schedule and on budget. In those four years he received two Legions of Merit—and two letters of reprimand. He is uniquely qualified to discuss the ups and downs of project management.
Lt. Col. Dave Grossman, U.S. Army (Ret.) Lt. Col. Grossman is an internationally recognized scholar, author, soldier, speaker, and one of the world’s foremost experts on human aggression, the roots of violence, and violent crime. As an Airborne Ranger infantry officer and a prior-service sergeant and paratrooper, he has over 23 years of experience leading U.S. soldiers worldwide. Grossman retired from the Army in 1998 and has since devoted himself to research, speaking, teaching, and writing. He has combined his experiences as a former Army Ranger, former West Point psychology professor, and professor of military science to found a new scientific endeavor, “killology.” In this field, he has made revolutionary contributions to our understanding of killing in war, the psychological costs of war, the causes of the current “virus” of violent crimes raging around the world, and in helping victims of violence heal. Grossman is the author of On Killing, which was nominated for a Pulitzer Prize and is on the required reading list of the U.S. Marine Corps Commandant and the FBI Academy. He also wrote Warrior Mindset and coauthored Stop Teaching Our Kids to Kill: A Call to Action Against TV, Movie and Video Game Violence. His most recent book, On Combat, has also been placed on the U.S. Marine Corps Commandant’s required reading list. On the Web, he maintains www.killology.com and www.WarriorSci.com.
Steven G. King, Senior Advisor, Nationwide SAR Initiative, CHS-V Steven G. King was appointed to the NSI by the DHS Under Secretary for Intelligence and Analysis based on his experience protecting critical infrastructure since the founding of the U.S. Department of Homeland Security in 2003. The NSI works to bring together suspicious activity reporting (SAR) from local law enforcement agencies, state and local fusion centers, and federal agencies into a single information-sharing environment. King is leading the effort to bring critical infrastructure owners and operators across the country into this initiative. Prior to joining DHS, he taught explosives for the Department of Justice and conducted vulnerability assessments and developed emergency response plans for the Pentagon, U.S. House of Representatives, U.S. Capitol Police Board, and critical infrastructure across the nation. King has over 20 years of experience and remains active as a firefighter and EMT-Paramedic. King holds a Master of Science degree in Biodefense, a Master of Business Administration, and an undergraduate degree in Emergency Services Administration. He is currently a doctoral candidate researching the efficacy of geospatial analysis/GIS for emergency management at Robert Morris University. He completed the Harvard University Senior Executive Fellows program, the Naval Postgraduate School’s Homeland Security Executive Leaders’ program, and the Federal Executive Institute’s flagship course, Leadership for a Democratic Society. King is currently the Chair of the American Board for Certification in Infrastructure Protection.
877.219.2519
www.abchs.com
Spring 2011
Inside Homeland Security®
75
DHS
U.S. Policy
homeland security tactics:
Extraordinary Rendition An aerial view of Naval Base Guantanamo Bay’s windward side, looking northeast, showing the Navy Exchange and the Bachelor Enlisted Quarters (BEQ) area. Photo taken by PH2 James Schoole
By Paul France, PhD (ABD), MA, MEP, CEM, CLE Certified in Homeland Security (CHS-V)
H
omeland security policies and initiatives estab-
torture; however, it is the policy of the U.S. to turn a blind
lished in the direct aftermath of 9/11 expedited
eye and essentially “outsource” physical and psychologi-
procedures that have compromised American core
cal torture. “Extraordinary rendition is a hybrid human
values and the very foundation of the nation. One such
rights violation, combining elements of arbitrary arrest,
policy is the practice of extraordinary rendition, which al-
enforced disappearance, forcible transfer, torture, deni-
lows the U.S. government the ability to essentially abduct
al of access to consular officials, and denial of impartial
suspect individuals in other nations and transport them
tribunals” (Weissbrodt & Bergquist, 2006, p.2). Extraordi-
to third-party nations—usually those in which torture is a
nary rendition has been a hotly debated issue for years
standard form of interrogation. The basis of this process
and has transformed markedly from the rendition policy
deals with the principle that the U.S. does not practice
of each U.S. president since George H.W. Bush.
76
Inside Homeland Security®
Fall 2011
www.abchs.com
877.219.2519
The entrance to Camp 1 in Guantanamo Bay’s Camp Delta. The base’s detention camps are numbered based on the order in which they were built, not their order of precedence or level of security. Photo by Kathleen T. Rhem
Although the use of torture is undeniably illegal, many argue that while it is disturbing, it is a reality and necessary consequence to protecting American lives in the 21st century against individuals who are utilizing unconventional means of warfare. In order to take a deeper look at the U.S. rendition policy, this article will present both proponent and opponent views on rendition and the legal and moral implications of the policy. Furthermore, the article will discuss the disastrous consequences that have stemmed from this policy and outline possible alternative actions and recommendations.
Roots of rendition Before exploring the arguments for and against extraordinary rendition, it is necessary to fully analyze the policy of rendition in the U.S. and look at the historical roots of rendition that have led to a dilution of the policy’s original usage and intent. Taking an individual who has an active warrant in another nation into custody in order to deport and extradite them in the nation where they are wanted for crimes is considered legal rendition. “Renditions are considered legal when they coincide with internationally accepted rules of the law and are performed within the bilateral framework of nation states. Extraordinary renditions are when suspects are transferred between nations without formal legal proceedings” (Future of European Foreign Policy, 2007, p.1). Extraordinary renditions are quite different from legal renditions because the individuals that are arbitrarily arrested do not necessarily have any warrant out for their arrest and they are not returned to their country of origin. Instead, the individuals are taken, without consent, legal representation, or even a phone call to nations that are known for implementing physical and psychological torture in interrogation methods. 877.219.2519
www.abchs.com
The individuals are taken, without consent, legal representation, or even a phone call to nations that are known for implementing physical and psychological torture in interrogation methods. Although the topic of extraordinary rendition became highly controversial and discussed in the wake of 9/11 and under the Bush administration, the U.S. policy of rendition has been around for decades. The most notable difference between the Bush administration and previous administrations was the increased oversight and strict procedures present during the presidencies of George H.W. Bush and Bill Clinton. Specifically under the Clinton administration, individuals who were extraordinarily rendered had to have an outstanding arrest warrant filed, the case was required to go through administrative scrutiny, the case had to be approved by a senior government official and the government the individual was sent to had to be notified. “Under both the administrations of President George H.W. Bush and President Clinton, the United States used kidnapping and forcible abductions where the normal extradition process was unavailable to bring fugitives to a country where they would stand trial for the crimes of which they were accused” (Lobel, 2008, p.487). This type of rendition is in stark contrast compared to the rendition program promoted by the Bush administration. Lobel goes on to state, “The [Bush] Administration’s extraordinary rendition program has resulted in condemnation and litigation abroad and in the United States courts” (p.2). Individuals transferred to different countries are not being sent to stand trial; it is for the sole purpose of intelligence gathering. Fall 2011
Inside Homeland Security®
77
DHS
U.S. Policy
Guantanamo Bay The Obama administration has taken a drastically different approach to homeland security compared to the previous administration. President Obama has said: [Brutal methods] undermine the rule of law. They alienate us in the world. They serve as a recruitment tool for terrorists, and increase the will of our enemies to fight us, while decreasing the will of others to work with America. They risk the lives of our troops making it less likely that others will surrender to them in battle, and more likely that Americans will be mistreated if they are captured. In short, they did not advance our war and counter-terrorism efforts—they undermine them (Hajjar, 2009, p.333). Directly after being sworn into office, President Obama signed an executive order to close Guantanamo Bay and unequivocally stated that the United States was adamantly opposed to the use of torture, even in cases of extraordinary rendition in other nations.
The process of extraordinary rendition involves first picking up an individual and detaining them in temporary facilities in order to question them. After they have been held in the country where they were taken into custody, the originating nation will fly or ship the individual to a second nation usually on secret flights while the individual is blind folded and disoriented. This secondary nation is generally located in a nation in Europe and is used to transfer flights. Lastly, the individual in question is shipped to a third nation, usually one that is publicly known for using torture techniques, and the individual is held at these “black sites” for as long as the interrogators feel necessary.
“Although the new Obama administration has pronounced the intention to recommit to an official anti-torture position, the legacy of torture-permissive policies is proving enormously difficult to resolve” (Hajjar, 2009, p.316). This is most notably evident by the inability of the Obama administration to close Guantanamo Bay on schedule. The United States’ stance on extraordinary renditions during the Bush administration was an unwavering belief that it falls 78
Inside Homeland Security®
Fall 2011
within the framework of the war on terrorism. In order to sell this policy to the American public, the Bush administration rhetoric was based on fear and stated that the administration would do everything in its power to protect American lives. Former Secretary of State Condoleeza Rice once stated, “The U.S. does not transport, and has not transported, detainees from one country to another for the purpose of interrogation using torture” (Future of European Foreign Policy, 2007, p.2). Using this wording, the U.S. was able to essentially play naïve in order to avoid accountability stating that they were not aware that torture would be used in the interrogation of “illegal combatants” or “detainees” in nations such as Egypt, Syria, Jordan, and Morocco where torture is systematic and accepted.
How it works The process of extraordinary rendition involves first picking up an individual and detaining them in temporary facilities in order to question them. After they have been held in the country where they were taken into custody, the originating nation will fly or ship the individual to a second nation usually on secret flights while the individual is blind folded and disoriented. This secondary nation is generally located in a nation in Europe and is used to transfer flights. Lastly, the individual in question is shipped to a third nation, usually one that is publicly known for using torture techniques, and the individual is held at these “black sites” for as long as the interrogators feel necessary. “United States extraordinary renditions utilize a network of military facilities, air bases, and pre-existing legal arrangements for operating in foreign countries” (Future of European Foreign Policy, 2007, p.3). Secret prisons and detainment centers are located in different nations for different reasons. Intelligence facilities in the Middle East and European prisons in nations such as Romania and Poland are a reality. After World War II, the international community established legislation to unequivocally prohibit core crimes such as genocide, war crimes, and torture. In 2006 the Council of Europe created a report titled, “Alleged Secret Detentions and Unlawful Intern-state Transfers involving Council of Europe Member States,” which documented and labeled 14 European nations as facilitating the U.S. in extraordinary rendition cases. The nations implicated were said to have participated in human rights violations. “The rule of law, right to a fair trial, protection of life, liberty, and security are the fundamental foundations of European norms enshrined in national constitutions and EU treaties” (Future of European Foreign Policy, 2007, p.5). Critics of extraordinary rendition programs claim several international human right treaties that have been breached including the U.N. Declaration on Human Rights, Geneva Convention relative to the treatment of prisoners of war, and Geneva Convention relative to the protection of civilian persons” (Future of European Foreign Policy, p.5). “The Universal Declaration of Human Rights is the authoritative interpretation of the human rights obligations contained in the United Nations Charter [and] many of its provisions has attained the statues of international customary law” (Weissbrodt & Bergquist, 2006, p.3). www.abchs.com
877.219.2519
The ticking-time-bomb scenario is widely used by advocates for torture resulting from extraordinary rendition. The idea that there is an eminent terrorist attack and that there is an individual in custody that has knowledge of the attack which would aid officials in preventing it from occurring. Unfortunately, the individual may refuse to aid the authorities in preventing the attack by withholding valuable information. Therefore, proponents of extraordinary rendition and torture claim that physical force and psychological manipulation are the only methods left available in order to stop an attack on American soil and/or interests.
Problems in the system While this line of reasoning appears to support the basis that torture and arbitrary arrest are sometimes necessary, the truth is that the situation presented is rarely, if ever, the actual scenario. “A public debate on the moral philosophy of national security became a preoccupation of pundits and academics who opined and disagreed about whether torture should be used to extract innocent life-saving information from a recalcitrant terrorist in order to avert a catastrophic attack” (Hajjar, 2009, p.312). In addition, there have been many innocent individuals tortured under the guise of extraordinary rendition. Moreover, if an individual did have knowledge of an imminent attack on the U.S., it is doubtful that the individual would disclose information in time to prevent the attack and the truth of the matter is that more often than not individuals will say whatever they can to prevent pain and suffering unto themselves. One of the problems with this line of reasoning is that intelligence is not always correct and many individuals have been sent to be tortured in foreign nations at “black sites” when they are innocent. One such example is the case of Khaled El-Masri. El Masri’s case exposes the dire conditions afforded individuals in extraordinary rendition; “El-Masri was abducted, ill-treated, and interrogated for several months because U.S. intelligence confused him with Khalid Masri, who was believed to have an important role in the Hamburg cell of al Qaeda” (Weissbrodt & Bergquist, 2006, p.4). Such a mistake is an utter failure on the part of American intelligence and all precautions should be taken in order to prevent such serious errors from occurring in the future. The amount of resources allocated to the interrogation of El-Masri and the irreparable harm afforded to an innocent man could never be remedied.
Role of 9/11 Many supporters of extraordinary rendition use the 9/11 terrorist attack as an argument for coercive interrogation methods claiming the devastating attacks could have been averted. Memos pertaining to CIA interrogations “exposed a policy of torture built on an elaborate set of legal interpretations and security rationales circumventing the black-letter prohibition in order to authorize violent and painful interrogation tactics and negating the risk of criminal liability for doing so” (Hajjar, 2009, p.314). The interpretations and word play used mainly by the Bush administration to support the use of torture and il877.219.2519
www.abchs.com
After analyzing the practice of extraordinary rendition, which inevitably leads to coercive interrogation practices, it is evident that the U.S. must only engage in such behavior once the intelligence community exhausts all possible alternatives. legal rendition are based on the belief that the executive branch should possess the authority to protect the American people at all costs, regardless of whether or not such practices impede on civil liberties. The memos seemed to interpret the Constitution as allowing the president the means to ignore laws against torture in the name of national security. In labeling possible terrorists suspects as “unlawful combatants” the Bush administration effectively bypassed rights entitled to prisoners of war classified under the Geneva Conventions. Vice President Dick Cheney “insisted repeatedly that water boarding and other forms of torture worked exceedingly well to extract valuable information, as proven by the fact that there had been no mass-casualty attacks in the United States since 9/11” (Hajjar, 2009, p.314). This line of reasoning may support the mentality that torture is an appropriate mode of interrogation if the information gathered prevents a terrorist attack, but the reasoning is also inherently flawed. It is difficult, if not impossible, to prove that coercive measures have indeed prevented possible terrorist attacks. Terrorist attacks tend to occur after years of planning and it is possible that no terrorist attacks could occur if torture or “rough” interrogation methods were not executed.
Opposition Many individuals oppose extraordinary rendition and torture under any and all circumstances for a variety of reasons. One of the most popular arguments against rendition and torture is the idea that illegally detaining an individual, denying them basic rights, and sending them to nations that regularly use torture to obtain information is inherently against the fundamental values and beliefs of the American people and is against both national and international laws. “The Constitution absolutely forbids the U.S. government from engaging in torture or sending someone to be tortured, and that prohibition ought to apply whenever and wherever the government acts” (Lobel, 2008, p.500). One question that many Americans debate is: Do individuals detained outside of the U.S. have the same protection against torture as someone held within the U.S. for questioning. The Fifth and Fourteenth Amendment rights to due process do not apply to non-U.S. citizens located outside of the U.S. “Arguably, secret renditions to and from countries in which the U.S. government does not exercise control do present practical problems and diplomatic and national security concerns, which the government could argue might make the Fifth Amendment’s protections against torture unavailable to aliens subject to such rendition” (Lobel, p.495). Fall 2011
Inside Homeland Security®
79
DHS
U.S. Policy
The case of Maher Arar illustrates the problems that arise when individuals are illegally abducted and tortured outside of the U.S., but with the knowledge and direction of the U.S. intelligence community and administration. In order to better explain the United States previous policy of extraordinary rendition, the case of Maher Arar will be discussed. “For more than ten months, he was locked in a damp, cold, underground cell that Arar termed a ‘grave’ cell because it measured only three feet wide, six feet long, and seven feet high” (Lobel, 2008, p.484). It is undeniable that Arar was physically and psychologically tortured. The U.S. government was fully aware of Syria’s infamous reputation of practicing torture. Arar “alleged that by conspiring with Syrian officials to subject Arar to torture and arbitrary detention in Syria, defendants are liable under the Torture Victims Protection Act of 1991 (TVPA) and violated Arar’s substantive due process rights under the Fifth Amendment” (Lobel, p.485). Canada apologized and paid millions in retribution; the U.S. has not apologized and even continues to have his name on the no-fly list. Lisa Hajjar states, “international law, constitutional law, and the U.S. government all agree that torture is always illegal, irrespective of the purposes for which it is used” (Lobel, p.492). Yet, while the U.S. government states that it is opposed to any form of torture, when it is evident that the U.S. was involved in the torture of individuals, as in the case of Arar, remunerations should be made.
Do individuals detained outside of the U.S. have the same protection against torture as someone held within the U.S. for questioning. When hearing cases such as Arar’s and El-Masri’s, many inevitably wonder how individuals can perform such horrific acts on their fellow man. While many Americans can write off the torture of individuals sent to nations such as Syria and Egypt due to the nature of the established interrogations, it is hard to understand how individuals within the American military are able to perform such cruel acts such as those that took place at Abu Ghraib. How can individuals in the military perform such horrific and violent acts on possibly innocent individuals? Lisa Hajjar (2009) answers this question stating, “dehumanization of the enemies; norms of obedience within the military and militarized institutions; and competitiveness among individuals and units for professional success (e.g. breaking prisoners, eliciting information),” allow individuals to torture possibly innocent people (p.329). Even if there are specific regulations and rules established when conducting torture, they are not always followed by the individuals actually conducting the torture.
National security The torture program established by the U.S. to interrogate suspected terrorists has actually hurt American forces in the Middle 80
Inside Homeland Security®
Fall 2011
East and is one of the primary recruiting tools for terrorist organizations such as al Qaeda. Matthew Alexander, a retired Air Force major, reported that “at least hundreds but more likely thousands of American lives are linked directly to the policy decision to introduce torture and abuse of prisoners as accepted tactics” (Hajjar, 2009, p.335). In the case of Abu Ghraib, the blame for the torture of the detainees was placed on a few individuals who were said to have attacked prisoners in an autonomous way; yet, the individuals higher up in the chain of command were never investigated so that the issue was never looked into further. This effectively removed any accountability and reprimand that should have been present in the instance of Abu Ghraib. Looking at the U.S. national security of extraordinary rendition in terms of ethics may better explain the different viewpoints of this highly controversial issue. From a deontological standpoint, the very action of torturing and individual is unethical regardless of the reasoning or consequences that may result if the coercive methods were not utilized. This standpoint is mired in the belief that any action should be looked at on principle, not the costs that may stem from the action. The second ethical framework used by proponents of extraordinary rendition and torture believe in a teleological or utilitarianism school of thought. This ethical mentality promotes the idea that the consequences of an action are more important than the actual action itself. Some may argue that by torturing an individual, regardless of whether or not they are innocent, is a necessary evil if it will prevent a devastating terrorist attack. Based on the ethical view that the best decision promotes the greatest good for the greatest number of people, some feel that the detainment and torture of a minority of innocent individuals is an unfortunate consequence of a policy that should continue. It is also necessary when contemplating ethics in the context of extraordinary rendition and torture to look at the “slippery-slope” possibility. Where the very implementation of torture and illegal abduction may create a policy where no one is protected from military detainment and American liberties are eroded and interpreted in a dangerous manner to fulfill the agenda of individuals in power. How reliable and accurate is the information gathered from suspected terrorists under duress? “The overwhelming majority of prisoners were innocent or had no meaningful intelligence but remained in custody, continuing to be interrogated, long after their innocence or intelligence valuelessness was known” (Hajjar, 2009, p.330). If being tortured, most sane individuals would say whatever they thought would stop the pain and suffering inflicted, even if they were innocent of any crime. “German Jesuit Friedrich von Spee in 1631 stated, ‘It is incredible what people say under the compulsion of torture, and how many lies they will tell about themselves and about others;’ in the end, whatever the torturers want to be true, is true” (Hajjar, p.336). It is a waste of human and financial resources when innocent individuals are confessing to crimes they have not committed or disclosing information that is not correct in order to end the harm being inflicted. The United States has always been seen as the embodiment and pillar of protecting and supporting civil liberties and basic rights. www.abchs.com
877.219.2519
Nations around the world have consistently looked to the United States as a prototype for liberties which makes it particularly concerning that the U.S. is eroding its most prized practice. “The consequences of human right abuses from extraordinary renditions threaten diplomatic relations and erode public support for counterterrorism activities” (Future of European Foreign Policy, 2007, p.1). Why should other nations practice torture with little international denunciation, but if the U.S. is implicated in third-party torture, there is widespread condemnation? Other nations look at the policies and practices of the U.S. for guidance. “The global power and influence of the United States make American torture more deleterious than torture by less powerful regimes because of its capacity to influence international legal norms and standards of treatment for prisoners” (Hajjar, 2009, p.315). Whether the U.S. likes it or not, the international community looks to the American people to set global standards of conduct and influence, so it is necessary for the U.S. to follow international and national laws.
Conclusion So, what can be done by the United States in response to extraordinary rendition and torture that results from such a policy? One possible solution just touched on is the idea of the international community publicly embarrassing the U.S. policy of illegal renditions through exposing human rights violations. “By revealing that governments are acting in flagrant violation of customary international law and human rights instruments to which they are parties, the international community can exert pressure on the offending governments to halt their practices” (Weissbrodt & Bergquist, 2006, p.12). Governments must uphold human rights standards in order to maintain legitimacy. A second alternative to extraordinary rendition would be the use of International Criminal Courts (ICC) or military tribunals. With the current debate over the legitimacy of Khalid Sheik Mohammed’s trial in New York City, the majority of Americans do not believe terrorist suspects should be tried in the American judicial system, but that does not mean they should be denied even the most basic rights attributed to Americans. There needs to be entities established where jurisdiction is not questioned during trials concerning terrorist suspects. Furthermore, what would be the largest benefit to the unethical practice of extraordinary rendition, which was drastically transformed during the Bush administration? To revert back to the practice and policies of rendition during the Clinton administration. First, if an individual is sent to a nation that regularly practices torture in order to gather intelligence, said individual must have an active warrant out for their arrest and return to the nation. Moreover, if an individual is denied basic rights and civil liberties, there must be definitive evidence implicating the individual in terrorist activities. Many individuals who oppose torture would give a green light to coercive interrogations if the individual in question definitively possessed information that would without a doubt prevent a terrorist attack and there was only a limited amount of time. The reality of the situation is that these ticking-time bomb scenari877.219.2519
www.abchs.com
Check out ABCHS’ Establishing Executive Security, course where participants learn more about executive security operations, methodology, goals, and more. For more information, call 877-219-2519. Also enroll online at www.abchs.com. os are rarely, if ever, the case. The real situation boils down to: “Counterterrorism operations involving extraordinary rendition yield valuable intelligence capable of preventing potential terrorist attacks at the expense of infringing on international legal norms, national sovereignty and individual human rights” (Weissbrodt & Bergquist, 2006, p.10-11). Regardless of the reasons, the legal and moral implications of the U.S.’s practice of extraordinary rendition are too great. The main difficulty in even debating the issue of extraordinary rendition poses challenges because the act itself is concerned with national security and is classified so that the actual statistics on extraordinary rendition are not disclosed to the general public. After analyzing the practice of extraordinary rendition, which inevitably leads to coercive interrogation practices, it is evident that the U.S. must only engage in such behavior once the intelligence community exhausts all possible alternatives.
References
Counterterrorism: Extraordinary Renditions and Human Rights Abuses. (2007, November 6). Retrieved December 7, 2009, from file://D:FEFPbriefings%20 Ballas.htm Hajjar, L. (2009). Does Torture Work? A sociological Assessment of the Practice in Historical and Global Perspective. Annual Review of Law and Social Sciences, 311-345. Homeland Security. (n.d.). Retrieved November 17, 2009, from http://www. whitehouse.gov/issues/homeland-security/ Lobel, J. (2008). Extraordinary Rendition and the Constitution: The Case of Maher Arar. The Review of Litigation, 28(2), 480-500. Purpura, P. P. (2007). Terrorism and Homeland Security. Burlington, MA: Butterworth-Heinemann. Weissbrodt, D., & Bergquist, A. (2006). Extraordinary Rendition: A Human Rights Analysis. Retrieved September 2, 2009, from EbscoHOST.
A b o u t t h e Au t h o r Paul France, PHD (ABD), MA, MEP, CLE, CEM, CHS-V, has over 20 years of extensive experience in the public safety sector, law enforcement and homeland security. He is the SW director of the Wisconsin Department of Military Affairs-Emergency Management and is currently assigned to the State Intelligence Fusion Center. France has played a key role in developing the state of Wisconsin’s homeland security program. He completed his M.S. in homeland security at the Naval Postgraduate School Center for Homeland Defense & Security, the nation’s premier program in homeland security and executive-level education. Fall 2011
Inside Homeland Security®
81
New Members Gregory J. Coram
Hope A. Garcia
Stacy R. Cortinas
David J. Garrett
Norman A. Cote, D.D.S.
Michele Germain
William H. Covington, Jr.
Daniel J. Girgan
Randall C. Creech
Candice C. Godinez
Jeffrey A. Cuevas
Spencer L. Golden
Edwin C. Dabney
Joshua M. Gooch
Phillip E. Darity
Jeffrey Grant
Glenn E. Davis
Michael L. Graven
Shon C. Davis
Joel W. Gray
Michael M. Dayem
Corey W. Green
David J. Decker
Tiara C. Greene
New Members
Ricky G. Boyd, Jr.
Andrew J. Detwiler
Allan R. Guess
Anthony A. Adeleye
Bryce A. Bradford
Michael D. Dick
Spenser J. Guilliams
Olufemi A. Adepoju
Ray D. Braimer, Jr.
Thomas Dilallo
Rafie Hamidpour
David R. Adkins
Vanessa D. Braimer
James V. Dominguez
Curtis D. Hampton
Parveen N. Afridi
Leopold R. Brandenburg
Grant T. Dotson
Garrison A. Hardisty
Grace Entan-Olufunke Ajao
Kourtney R. Breen
Isiah Douglas
Justin S. Harman
Virgilio M. Alcozar, Jr.
George W. Brooks, Jr.
James L. Douglass
Kael F. Harmon
Gerald K. Allchin
David D. Broussard
Kevin G. Doyle
Chad E. Harpine
Peter A. Alvarez
Erik Brown
Colter S. Drew
Michael D. Harris
Roy A. Alvarez
Jarvis Brown
James E. Dunston, Jr.
David K. Hayes
Shivraj Anand
Lavetrice D. Brown
Stephanie M. Durazo
Jeremy S. Healey
Ronald E. Anderson
Jerry L. Brumley
Faith A. Easley
Terrell A. Heard
Janette B. Arencibia
Cory S. Brun
Brett M. Ebersole
Andrew J. Herrmann
Abdiel E. Arosemena
Andrew S. Brunsting
Jason K. Edwards
Thomas A. Hodges
Chester S. Arucan
Terry H. Bush
James B. Elgin
Trevor W. Hoehn
Eric R. Bacher
Nicholas W. Butcher
Geovanne Torres Elias
David L. Holmes
Angel D. Baez
David R. Byrd
Craig L. Elliott
Raymond D. Hotson
Nadir Baksh
Lyndsi M. Caldwell
Shannon L. Ellis
Edward Hourican
Richard U. Baldwin
Christopher P. Campbell
Cecilia M. Emmanuel
Dana M. Hutchins
Bryan J. Barnett
Michael S. Campbell
Claude J. English, Jr.,
Benjamin R. Iverson
Marguerite P. Barnett
Bobby R. Cannon
Robert D. Erickson
Serena N. Jackson
Vickie A. Bartels
Allen P. Carder
Alexander Espinoza
Daniel N. Jarvis
Bonnie L. Barton
Rita N. Carman
Woody L. Evans
Terrill D. Jenkins
Robyn R. Bates
Carlo T. Casares
Paul T. Farlett
Tracy L. Jenkins
Daniel W. Bell
Erick G. Castillo
Tyler R. Farmer
Amanda L. Jimmerson
Dwana M. Bellamy
John A. Castro
Daniel A. Farnsworth
Aaron E. Johnson
Matthew R. Benson
Victor I. Castro
Michael P. Ficken
Arusha L. Johnson
Randahl S. Benson
Carrie K. Cellilo-Garcia
Shane A. Figueroa
Clarence Jones
Francisco R. Berrios
Garret K. Chadek
David M. Fincham
Kendall N. Jones
Vena S. Berry
Melanie S. Chesonis
Therese E. Finn
Paul E. Jones
Travis L. Betterton
Brandon H. Cheyney
Molly M. Fischer
Rusiane L. Jones
Robert E. Beverly
Allen Chiu
Amanda N. Fitzgerald
Casie M. Jude
Shawn M. Biddle
David S. Clark
Roger Flores
Ian B. Jungling
Michael P. Biron
Christopher S. Clay
Abdulah S. Forest
Robert L. Kamp
Sidney P. Blum
Charles G. Clifton
Stacy S. Frazier
David G. Kastl
Steven R. Booker
Lawrence P. Clinton, M.D.
Rachel C. Fuller-Mumpower
Bruce D. Kaufman
Ricky G. Boudreaux, Jr.
Brian W. Colangelo
Charles J. Galdino
John R. Kearns
Jon R. Bouffard
Joseph R. Cook
Edward J. Galvan
Matthew P. Keosouphanh
82
Inside Homeland Security速
Fall 2011
www.abchs.com
877.219.2519
New Members and New Credentialed Dusty G. Kitzmiller
Brian V. Pakidis
David K. Waggoner
Cameron V. Blount
Leroy K. Krapfl
Ji Ho Park
Matthew D. Wagoner
Jason O. Bluhm
Jeremy N. Krieg
Matthew G. Parker
Jeffery W. Wair
Edgar L. Blynn
Christopher M. Krzos
Ricardo V. Parras
Brett R. Wallace
Michael G. Boldizsar
Matthew E. Kull
Michael D. Peltzman
Abbey L. Washlack
Kylee W. Bolibrzuch
Krishna Kumar
Martino V. Peoples
Gregory M. Watson
James R. Bolibrzuch
Peter J. Lauman
Dario Perito
Preston A. Watts
Robert C. Borders
Ben W. Laverty
Izorrie Petrus
Ray T. Weeks
Derek A. Bosecker
Kenneth A. Levin
Isreal Pineda
Todd E. Wende
Ricky G. Boudreaux
Shannon E. Lewis
Rose M. A. Pitt
James R. Weston
John C. Bowman
Jason G. Loughran
Carl W. Plum
Justin C. White
Ricky G. Boyd
Nicholas A. Lucarella
Marci L. Pollard
Bruce L. Whitney, Ph.D.
Hector L. Boyrie Gonzalez
Veronica A. Mahan
Pamela S. Posey
Antoine C. Williams
Ray D. Braimer
Ruby A. Manjarrez
Shannon C. Pretty
Franklin D. Williams
Vanessa D. Braimer
Eric R. Marcotte
Melanie R. Prevot
Amanda N. Willie
Kourtney R. Breen
Ross A. Markajani
Valerie N. Pugh
Trang Duong Wood
Lesha M. Brenek
Genevie K. Marston
James Pulliam
Giannina Zapatero
Brandon K. Bristor
Keenan D. Martin
Lavendar A. Quintana
Michael G. Zicopula
Kyle T. Bromelia
John W. Mason
Juan M. Ramirez
Stephanie G. Matthews
Robert J. Ramirez
Billy L. Mccall
Jorge R. Rangel
New credentialed
Bryan J. McCarthy
Kim D. Ray
Joseph L. Achilles
Jarvis Brown
Clayton R. Mccollum
Andrew S. Reischauer
Olufemi A. Adepoju
Christopher J. Brown
Matthew S. McGarvey
Daniel D. Ribacoff
Grace Entan-Olufunke Ajao
John M. Brubaker
Nathan J. Mckeeth
Kenneth R. Rice
Virgilio M. Alcozar
Marion D. Bryan
Judith K. Medrano
Jay P. Rio
Michael Alfaro
Dustin D. Buchanan
Daniel W. Messick
Esmeralda Rios
Gerald K. Allchin
Stacey L. Buck
Corey D. Mickens
Teddy J. Ripley
Bryon E. Allen
Jessica C. Buffum
Deryl Miles
Joseph A. Rivette
Christopher D. Amabile
Jameah S. Burke
Bradlee N. Miller
Deaven C. Robins
Ramon Andrade
Terry H. Bush
Stacey S. Mirinaviciene
Antonio Robinson
Ashleigh Arnold
Nicholas W. Butcher
Kevin S. Moore
Juli S. Robison
Chester S. Arucan
Christopher E. Butler
Meghan C. Moroney
Kyle A. Roff
Robert L. Ault
Leon O. Byrd
Brian T. Morris
Gilbert R. Roman
Geoffrey Aus
Michael A. Cabrera
Ballard E. Moxley
Mark W. Rudes
Jason T. Ayres
David Thomas J. Cabucana
Heather I. Mundlin
Mark A. Taylor
Amber A. Ball
James A. Cade
Shuntaye M. Murer
Ray B. Thomas, Jr.
James D. Barker
Stephen J. Caezza
Arvind K. N. Nandedkar
Sarah E. Thomas
Steven M. Barnaby
Michael S. Campbell
Frank L. Nelson
Sean J. Thomas
Patrick R. Barnes
Christopher P. Campbell
Kendal A. Nichols
Kelly E. Tolbert
Bryan J. Barnett
Bobby R. Cannon
Annaliza O. Nilo
Nhatnguyen Hoangvy Tran
Brittany N. Bennett
Joel Caraballo
Sanchito C. Noveno
Manuel A. Trianadiaz
Steven H. Benson
Cory J. Carlson
Dan P. O’Brien
Carrie M. Tudor
Matthew R. Benson
Rita N. Carman
Steven Oliveira
Rodney J. Turner
Randahl S. Benson
Nicholas J. Carter
Heather L. Olsen
Trayvon T. Turner
Rebecca L. Bentley
Erick G. Castillo
Barbara A. Ouellette
Jonathan E. Vargo
Nestor P. Bernardo
William A. Caviness
Dominic E. Outlaw
Derek M. Vasko
Anthony M. Berry
June G. Centeno
Charles F. Owens, Jr.
Carmen I. Vega
Joseph J. Bizak
Roxanna V. Chacon
Bruno J. Pagliai
Natasha R. Vincent
Samantha B. Blackwell
Garret K. Chadek
Jameason R. Ezeki Paige
Christopher A. Voge
Stephen N. Blevins
Jackson K. Chambers
877.219.2519
www.abchs.com
David D. Broussard Kent A. Brown Marcus C. Brown
Fall 2011
Inside Homeland SecurityÂŽ
83
New Credentialed Ricardo Charles
Kenneth P. Engelhardt
Steven B. Hall
Brianne E. Killip
Dion Charles
Claude J. English
Alonzo D. Hall
Joseph M. C. King
Jacob T. Chase
Michael A. Eno
Christine E. Hanley
Shawn M. Kish
Brandon H. Cheyney
Eddie R. Estrella
Garrison A. Hardisty
Dusty G. Kitzmiller
Joseph W. Chiaffino
Troy E. Fairchild
Justin S. Harman
Charles R. Knurek
Allen Chiu
Paul T. Farlett
Kael F. Harmon
Donald L. Krebs
David S. Clark
John M. Farmer
Gregory S. Hart
Jeremy N. Krieg
Tamika C. Clay-Jefferson
Daniel A. Farnsworth
Jeffrey S. Hasley
Christopher M. Krzos
Natalie Collazo
Michael H. Ferguson
Le A. Hastings
Calvin C. Kukert
Sherita M. Collins
Juan B. Fimbres
Mathieu A. Hauser
Matthew E. Kull
Victor M. Colon
David M. Fincham
Jeremy J. Hawkins
Krishna Kumar
Casey I. Combes
Roger Flores
Terrell A. Heard
Christie M. Kunkel
Joseph R. Cook
Jim U. Floyd
Nathan M. Hebert
Neil Lakin
Tennerson Z. Corbin
Michael R. Foster
Cruz P. Hernandez
Auston J. Landry
Ignacio R. Coria
Brandon D. Fowler
Jose A. Hernandez
Brittany L. Lano
Stephany P. Cornejo
Jamie L. Frantz
Eugene M. Hill
Scott R. Laroe
Stacy R. Cortinas
Clifford B. Gabriel
Jeremy H. Hines
Daniel J. Latta
Alvin I. Council
Ervin J. Gains
Michael L. Hodosky
James R. Lee
Michael L. Crespo
Manuel Gallegos
Kaleb A. Hopper
Stephen E. Leist
Thomas M. Croad
Kurt M. Gamache
Edward Hourican
Alexander Lennon
Mary S. Cruz
William S. Garcia
Gregory T. Howard
William H. Lewis
Andreas I. Cueto
Julio C. Garcia
Jerry L. Howie
Shannon E. Lewis
Nicholas G. Culver
Gene L. Garland
Dana M. Hutchins
Qing Luo Liang
Justin D. Cummings
David J. Garrett
Justin N. Hutson
Michael S. Libby
Jessica D. Cummins
Jonathan L. Garrick
James D. Jackson
Micky L. Libhart
Kenneth W. Cureton
Michael D. Garzon
William T. Jackson
John B. Linstrom
Edwin C. Dabney
Juston R. Geigley
Olanda James
Pedro C. Lira
Gerrardo C. Daniel
Thelma Y. Gibson
Michael Lee Jameson
Diana M. Loepke
Defonsio L. Daniels
Christopher J. Gillen
Tracy L. Jenkins
Walberto Lucio
Matthew B. Davis
Daniel J. Girgan
Terrill D. Jenkins
Dax J. Lynch
Thomas A. Davis
Dimitry L. Givans
Eric B. Johnson
Herbert S. Mack
Jacquelyn A. Decker
Adam L. Glasby
Joshua G. Johnson
Veronica A. Mahan
Ralph A. Deines
David G. Glazebrook
Arusha L. Johnson
Tammy L. Malfatti
Donald A. Delomba
Candice C. Godinez
Darrell C. Johnson
Joshua L. Mantooth
Wesley W. Demarest
Spencer L. Golden
Vandeaven P. Johnson
Elbert K. Maravilla
Tabatha J. Dennis-Byrd
Robert L. Goldinger
Brian E. Johnson-Farrell
Eric R. Marcotte
Bradley W. Dickey
Patrick E. Goldsmith
William C. Jones
Ross A. Markajani
John D. Dixon
Edith C. Gonzalez
Latasha Jones
Stephanie G. Matthews
James V. Dominguez
Joshua M. Gooch
Terrell Jones
Johnathan C. McCord
John C. Dooney
Michael L. Graven
Timothy T. Jones
Brandon M. McKnight
Joseph R. Doti
James C. Green
Kimberly A. Kadish
Desirae D. Mears
Grant T. Dotson
James L. Green
John T. Kalafatis
Christopher A. Medick
Pierre D. Douglas
Daphane M. Green
Albert G. Kalber
Edward T. Mendoza
Joseph G. Dunka
Corey W. Green
Robert L. Kamp
Michael H. Messer
James E. Dunston
Todd M. Green
Kevin J. Kannewurf
Daniel W. Messick
Brett M. Ebersole
Vanessa Griffin
Michael P. Karas
Deryl Miles
Thomas P. Ehrenkranz
Jeffrey L. Grimes
John R. Kearns
Russell T. Miller
James B. Elgin
Allan R. Guess
Eric L. Keating
Nicholas A. Miller
Geovanne T. Elias
Spenser J. Guilliams
Dustin A. Kentzell
Roy A. Miller
Shannon L. Ellis
Leonel Gutierrez
Shaun L. Kestner
Randolph F. Miller
84
Inside Homeland Security速
Fall 2011
www.abchs.com
877.219.2519
New Credentialed Jason S. Mitchum
Andrew S. Reischauer
Ernest L. Smith
Drew C. Vitale
Benjamin J. Moate
Ray S. Rellamas
Jonathan D. Smith
Christopher A. Voge
Christopher J. Morales
Arthur P. Repko
Victoria L. Snyder
David K. Waggoner
Casey B. Morgan
Juan A. Reyes
Jeffrey A. Snyder
Thomas P. Ward
Joseph A. Morgan
Elizabeth R. Reynolds-Wilkerson
Edgar A. D. Soriano
Starr Ward
Meghan C. Moroney
Brian K. Rhodus
Carlos M. Soto
Kelson L. Warford
Ballard E. Moxley
Jay P. Rio
Harry St. Felix
Abbey L. Washlack
Michael D. Muller
Teddy J. Ripley
Daniel St. Louis
Hershel L. Watson
Heather I. Mundlin
Ann-Marie L. Rippentrop
Betty Stanton
Henry E. Weigand
Shuntaye M. Murer
Orlando D. Rivera
John S. Starkey
Adonis L. Weldon
Christian M. Myers
Edward Rivera
Larissa R. Steinmacher
Jenna L. West
Christopher T. Nash
Joseph A. Rivette
Ronald T. Stevenson
James R. Weston
Nicholas J. Nelsen
Antonio Robinson
Deon L. Stewart
Adam Weycker
Kendal A. Nichols
Raymond Robles
Martha B. Stokes
Clifford D. Williams
Annaliza O. Nilo
Jesus Rodriguez
Brian M. Strahl
Richard C. Williams
Adam C. Norman
Dkendrick M. Roebuck
Terry L. Street
Justin R. Williams
Dan P. O’Brien
Gilbert R. Roman
Henry E. Stueve
Christopher A. Williams
John J. O’Connor
Nelson L. Romeu
Philip A. Suchowski
Timothy D. Willis
Onoriode O. Ohwevwo
Michael S. Rose
Theodore Svoronos
Mark R. Willitts
Olga M. Olivo
Brandon D. Rowlett
Allen G. Swanson
Adam C. Wiltrout
Christopher M. Olsen
Ryan C. Ruch
Megan C. Syverson
Edward W. Witt
Steven M. Olson
Mark W. Rudes
Jerome N. Taylor
Thomas E. Wollney
Sierra M. Orrick
Andrea M. Rudolph
Robert A. Taylor
Detra L. Works
Billy R. Pack
John F. Russaw
Lisa M. Taylor
Jason B. Yarbrough
Bruno J. Pagliai
Shelly R. Safriet
Amanda E. Tedford
Todd O. Yates
Bryan K. Papillion
Benjamin V. Salvania
Douglas A. Terou
George D. Yonitch
Michael J. Parascandolo
Elston L. Samuels
Tiffani N. Theisen
Billy M. Young
Brentwood O. Paris
Mathieu Sanders
Steven H. Theiss
Nicholas E. Youngstrom
Ji Ho Park
Yermie S. Santiago
Joseph R. Thibodeaux
Waldemar Zapata
Josemaridennis S. Pascual
Robert-Francis C. Santos
Jeffrey M. Thoennes
Joel L. Zeiler
Jeremy K. Patrick
Jason C. Sapp
Richard D. Thomas
Oscar Perez
Edward R. Sarvis
Susan E. Tibbs
Stephanie A. Petitt
Terrence D. Savala
Bobby G. Toal
Carl W. Plum
Carl L. Savard
Hanh Buu Tong
Naomi M. Poe
Tricia L. Scanlon
Luz A. Torojaramillo
Melanie R. Prevot
Timothy W. Scarbrough
Vanessa Townsend
Margaret F. Price
Stacy D. Schectman
Jesse J. L. Trail
new LIFe Member
Bobby Price
Robert B. Schwartz
Nhatnguyen H. Tran
David Puckett
Stephen F. Proctor
Derrick R. Scott
Christopher A. Triplett
Diego Quinones
Russell A. Scott
Rodney J. Turner
Glen A. Quintos
Eric D. Self
Carol A. Turner
Ramil L. Quiroz
Ardian Shajkovci
Jose F. Valdez
Eric D. Raby
Brandon W. Sharman
Jonathan O. Valdez
Ralph L. Raimond
Matthew J. Siemienski
Jonathan E. Vargo
Melvin M. Ramos
Tamica R. Simon
Derek M. Vasko
Nicholas A. Ratajski
Christopher M. Simpson
Jason E. Vaught
Kim D. Ray
Gayle G. Small
Jason D. Vedder
Dennis P. Raymundo
Jeffrey M. Smith
Marco Velez
Ashley R. Rehberg
Coleton W. Smith
Joshua D. Vickers
Timothy D. Reinke
Gregory T. Smith
Natasha R. Vincent
877.219.2519
www.abchs.com
New Diplomates Clyde Banks
Fall 2011
Inside Homeland Security®
85
United for Truth a h i s t o ry
UFT0311IHS
All New Edition — Available Now The inside story of how the nation’s foremost experts in forensic science, mental health, and homeland security united for truth— forming the world’s largest, most prestigious network of associations for the advancement of education, training, and standards of excellence in professional credentials.
Only $19.95 +S&H
For more information or to register online, visit www.abchs.com or call (800) 592-0960
Save 10% order your copy today! 877-219-2519
The Establishing Executive Security course presents a threat-assessment-based method of determining resource requirements necessary to establish or modify an executive security program. Executive security operations, methodology, and goals are discussed and the conduct of threat assessments are outlined; sources of information and other resources are identi fied; and adult learners gain an understanding of how to apply the results of such assessments to the design of the security program. This online course, which qualifies for 15 ABCHS Continuing Education units, has been designed to equip security and law enforcement managers with an understanding of personal security programs that can be established to provide safety and security support to a range of individuals.
This online course is available to all ABCHS members at the rate of PE0311IHS
Toll Free
Order your ABCHS logo products today! Logo products that state “Certified in Homeland Security” are available only to those individuals who currently hold the credential(s) CHS I, II, III, IV, or V. B A
A. ABCHS WOMEN’S DRESS SHIRT
$55
D
COLORS: light blue, sage, or cream • SIZES: S to XXL
B. ABCHS MEN’S DRESS SHIRT $55
COLORS: gray, sage or black • SIZES: S to 3XLT
C. ABCHS PATCH $5
F C
D. ABCHS LAPEL PIN $5
E
E. ABCHS MEN’S FLEECE JACKET $60 COLOR: black • SIZES: S to 3XL
F. ABCHS MEN’S POLO SHIRT $48
COLORS: black, red, tan, seafoam green • SIZES: S to 3XL
E
ABCHS WOMEN’S POLO SHIRT $48
COLORS: black, red, seafoam green • SIZES: S to XXL
H
G. ABCHS MEN’S T-SHIRT $24 COLOR: black • SIZES: S to 3XL
H. ABCHS MEN’S CAMP SHIRT $55 COLOR: black • SIZES: S to 3XL
G
I. ABCHS MEN’S ALL-WEATHER JACKET* $60 COLOR: black • SIZES: S to 3XL *Please circle one: with or without back imprint)
J. ABCHS PADFOLIO $20 K. ABCHS HAT $15
COLOR: black • SIZES: one size fits all
I K BACK
2750 E. Sunshine, Springfield, MO 65804
J
Phone: 877.219.2519 • Fax: 417.881.1865 • Web: www.abchs.com Item
Size
Quantity
Total
Name I.D. Number Deliver To (Street Address Only)
Sub-Total
Address
Shipping & Handling (see chart on the left) Rush Delivery
Please DO NOT send cash
Total SHIPPING COSTS: r Check/Money Order • Lapel pin $5.00 • 1 item (other than above) $10.00, 2 items $11.50, 3 items $13.00, Credit Card Number add $1.50 for each additional item. • Overnight and International shipping may be available. Call for pricing. Signature • Allow 4-6 weeks for delivery.
r Mastercard/Visa
r Am. Express
r Discover Exp. Date
LOGO0410IHS
City/State/Zip
Inside Homeland Security® Journal The American Board for Certification in Homeland Security, CHS® 2750 East Sunshine Springfield, MO 65804 www.abchs.com Toll-Free 877.219.2519 • Fax 417.881.1685
CON0211IHS