2012 Executive Summit
p.53
MEMBER SPOTLIGHT: Ruth Cover
p.08
Homeland Volume 10, Issue 1 Spring 2012
INSIDE
★ The land of the free because of the brave ★
Security
®
®
OPERATIONAl
SECURITY Traveling to a
Foreign Country p. 20
Major Islamist
Terrorist
Organizations:
Terrorism
Just Icons, or More?
Violence at our borders:
and the Middle East
p. 56
p. 70
Its Potential Effects on Homeland Security
Helps Foil Hijacking TF Forming TSA’s Highway and Bomb Plots Forming Systems Systems Anti-Terrorism Program
TF
p. 30
See Special Pull-Out Section
ABCHS: America’s Largest and Most Prestigious Homeland Security Organization
$6.50 U.S./$9.50 CAN
Frontpage / Shutterstock.com
p. 10
The American Board for
Certification in Homeland Security
The American Board for Certification in Homeland Security, CHS® is dedicated to professionals working in the field of homeland security from all across the country.
Join today, and take an active role in our nation’s security. Together we can protect what matters most—our families, our communities, our country, and our way of life. This amazing opportunity will expand your horizons and advance your career while enabling you to back-up your experience by being a part of a diverse collection of highly qualified homeland security professionals.
Together we can make a difference.
® Register Now!
Call the Chief Association Officer at 877. 219.2519 or go online to www.abchs.com
®
www.abchs.com | 877.219.2519
volume 10, issue 1
Spring 2012
contents Articles
30 TSA’s Highway Anti-Terrorism Program
10
Helps Foil Hijacking and Bomb Plots
By Mark Messina
Violence at Our Border:
Its Potential Effects on Homeland Security By Todd W. Devoe
56 Major Islamist Terrorist Organizations
Just Icons, or More? Part One
By Ardian Shajkovci
Photo Credit: Jill Johnson/MCT
Columns
in every issue 04 Board Members
27 Grading Bio-Response
05 CAO’s Sign
By Dave McIntyre
Executive Level Education
35 Maintaining Tacit Knowledge
08 Member Spotlight 52 Book Review
Infrastructure Protection By Shawn J. VanDiver
75 New Provisional Members
40 Food Vulnerability
Emergency Management
76 Newly Credentialed
By Michael J. Fagel
80 CE Test Pages
06 Homeland Security as a Field Why Get Certified? 20 Operational Security
Traveling to a Foreign Country By Carlos Barros-Villahermosa
24 Unseen, Unheard, Unmanned
Border Security and Emergency Response By Ed Peaco
38 TSA Pilot Program:
Prescreening Moves Forward
45 Know When to Say When
By Ed Peaco
By David J. Fair
Emergency Services Chaplain Training Seminar
Chaplain’s Column
Executive Summit 2012
Features
47 ABCDEP Update
Dignitary & Executive
42 Q&A with Chaplain Ronny Jernigan By Jenny Davis
By David L. Johnson
70 Terrorism
50 Terrorist Recruitment
By John Didden
and the Middle East
Counterterrorism
By Richard J. Hughbank
Find out more on page 877.219.2519
www.abchs.com
53
www.theexecutivesummit.net/ihs
TF
Forming Systems See Special Pull-Out Section
3
I n e v e r y iss u e
B o a r d M e mb e r s
American Board For Certification in HOmeland Security
ABCHS Executive Advisory Board Chair: Eric White, BS, CHS-V, FABCHS, CPS, ISMA-IV, PIS Vice-Chair: Barbara B. Citarella, RN, BSN, MS, DABCHS, CHS-V Secretary: John Joseph Sullivan, Jr., PhD, CHS-V E. Robert Bertolli, OD, BS, FACFEI, DABFE, DABCHS, CHS-V, CMI-V Robert L. McAlister, BS, CHS-V, DABCHS Jessica M. Cummins, DABCHS, CHS-V Sean Kinney, CHS-V, CMI-III, CFC Henry L. Homrighaus, Jr., DABCHS, CHS-V David L. Johnson, DABCHS, CHS-V David A. Goldschmitt, MD, FACEP, DABCHS, CHS-V Thomas Givens, DABCHS, CHS-V Cathi Marx, DABCHS, CHS-V Janet Schwartz, PhD, FACFEI, DABCHS, CHS-V, CDP-I Andrew Neal, CHS-V, CISM, CIFI, CSC/I John Didden, CHS-III David Joel Fair, PhD, CHS-V, SSI, CMC Steven G. King, MS, MBA, CHS-V, CPP William H. Cummins, CHS-V, CDP-I Wayne M. Morris, DBA, MA, CHS-V, CPP, PSP Brendalyn Val Bilotti, RN, BS, CHS-V Jeffrey S. Hatchew, JD In memoriam, Nick D. Bacon, Senior Advisor to the Board and First Chair of ABCHS American Board for Certification in Dignitary and Executive Protection, ABCDEP Chair: David L. Johnson, CHS-V Vice Chair: Edward Bailor, AA, BS, CHS-III Mark E. Garver, CHS-V Michael C. Cava, CHS-V Robert E. Colliver, CHS-III Michael E. Nossaman, CHS-III Jim Floyd, CHS-III Tony Scotti, CHS-III Marc E. Glasser, MS, CHS-V, CPP, CEM Jerrfey D. Guidry, CHS-III Gerald A. Cavis, CHS-III Dennis C. D’Alessio, CHS-III Clint Hilbert, CHS-III Howard L. Weisman, CIPM, CHS-V, CIPM Michael S. LoFaso, CHS-III American Board for Certification in Infrastructure Protection, ABCIP Chair: Steven G. King, MS, MBA, CHS-V, CPP Vice Chair: John J. Sullivan, Jr., PhD, CHS-V Dale W. Cillian, DABCHS, CHS-V Sherman E. Copeland, Jr., CHS-V, SSI W.D. Fitzgerald, CHS-III, CPP Marc E. Glasser, MS, CHS-V, CPP, CEM Benjamin Nieves, CHS-V, CPP Michael W. Homick, PhD, EdD, CHS-V, DABCHS Peter A. Petch, CHS-V, RPIH, CIPS, CIMT Robert R. Sanders, CHS-V, CPP, CSP Shawn J. VanDiver, MS, CHS-V, CAS-PSM, SSI, CTT+ Cecelia Wright Brown, DEng, MS, BA, CHS-V Kurt J. Klingenberger, CHS-III Robert J. Coullahan, CHS-V, CEM Paul E. Purcell, CHS-V Patrick N. Cowan, MBCDRP, CHS-V, ATM Debra M. Russell, PhD, CHS-III, CMI-V
4
Inside Homeland Security®
Spring 2012
Chair, Vice Chair, Secretary
Chief Association Officer (CAO)
Working Group SME’s Security non-government org
American Board for Certification in Infrastucture Protection (ABCIP)
government law enforcement Emergency management public health
american board for certification in homeland security (abchs)
industry academia infrastructure protection
American Board of Law Enforcement Experts (ABLEE) American Board of Information Security and Computer Forensics (ABISCF) American Board of Intelligence Analysts (ABIA) American Board for Certification in Dignitary and Executive Protection (ABCDEP)
American Board of Intelligence Analysts, ABIA Chair: John W.A. Didden, CHS-III Vice Chair: James C. Sartori, Secretary: Nestor L. Colls-Senaha, MS, CHS-V Janet Schwartz, PhD, FACFEI, DABCHS, CHS-V, CDP-I Marquis L. Laude, CPP, CHS-V Rainer A. Melucci, CFC, CSC, FACFEI, DABFE, CHS-III Jason S. Sprowl, CAS Johnie A. Sullivan, FBI (Ret), MBA, MCS, CHS-IV Bo Mitchell, CHS-V, CPP, CEM Michael E. Chesbro, CHS-III, IAC, SSI, CFC Anthony A. Saputo American Board of Information Security and Computer Forensics, ABISCF Chair: Andrew Neal, CHS-III, CISM, CIFI, CSC/I Eric Svetcov, CISSP, CISA, CHS-III J. Clay Fielding, MCP, MCT, CHFE, RFC, GLFI, CEH, CPS, MSCIS Gabriela Rosu, BS, MS, CHS-V Margaret Bond, MBA, CISM, CHS-V Ron Schmittling, CPA. CITP, CISA, CIA Marie Wright, PhD, CHS-V, Shayne P. Bates, DABCHS, CHS-V, CPP Rocco A. DelCarmine, CSSP, ISSPCS, CHS-III Robert A. Curtis Dr. Jim Kennedy, MRP, MBCI, CBRM, CHS-IV American Board for Certified Master Chaplains, ABCMC Chair: David Joel Fair, PhD, CHS-V, SSI, CMC Leatha Warden, PhD, LPC, ACC-I, CMC Charles V. Singletary, CHS-I, CMC James H. Ballard, DMin, CMC Mary Dobbs, CMC Bruce D. Wright,PhD, CMC, Joseph J. Prudhomme, PhD, CMC Don Howe, PhD William M. Sloane, PhD Rev. Robert L. Fountain, CMC
American Board for Certified Master Chaplains (ABCMC)
American Board of Law Enforcement Experts, ABLEE Chair: Sean Kinney, CHS-V, CMI-III, CFC Vice Chair: E. Robert Bertolli, OD, DABCHS, CHS-V, CMI-V Jonathan D. Rose, PhD Stephen Russell, BS, DABLEE, CMI-II, CHS-III Henry C. Grayson, II, CHS-III, CMI-III Warren L. Shepard, CAPT, SSI, CDP-I, CRC, CHS-V Oscar A. Baez, Sgt.(Ret.) CHS-III William R. Kushner, MS, CHS-IV Dr. Patrick E. Spoerry, PhD, CHS-V, CFC Dr. James Smith, JD, EdD, CHS-III 2012 Editorial Advisory Board E. Robert Bertolli, OD, FACFEI, DABCHS, CHS-V, CMI-V Xavier Stewart, PhD, RRT, NR-EMT, CHS-V, DABFE, DABFM Jody Bissonnette, BA, CHS-III James D. Blair, DPA, FACFEI, CHS-V, DABCHS, FABCHS Kenneth Burkhalter, BS, SSI, CDP-I, CHS-III Patrick Cowan, MBCDRP, CHS-V, SSI, CDP-I Harry Risor, MS, CHS-V James L. Smith Robert D. Boyden, PhD, MS, FACFEI, CHS-III, DACFEI Richard J. Hughbank, MA, MS, CHS-IV Shawn VanDiver, CMAS, MS, CHS-V, SSI, CDP-I, CAS-PSM, CTT+ John J. Wassel, MD, CHS-IV Scott P. Altemose, CHS-IV, CMI-III, HEM, CFC, CRC, CSE, SSI, FIT, CMRC Todd DeVoe, CHS-III Michael G. Oehler, PhD Irwin C. Harrington, PhD,CHS-I, CFPS, CFI James Blair, DPA, DPA, MHA, FACHE, FABCHS, CMAS Kenneth Burkhalter, BS, SSI, CDP-I, CHS-V, CNTA, DABCHS, CRC Brendalyn Val Bilotti, RN, BS, CHS-V
www.abchs.com
877.219.2519
C A O ’ s sig n Greetings from ABCHS/CAO Greetings to All ABCHS Members, As we move into the New Year, things here at ABCHS Headquarters have been quite busy, as we are in the process of working on accreditations! The ABCHS board along with our sub boards, ABIA, ABCDEP, ABCIP, ABLEE, ABISCF are very busy with current certifications and new certifications to provide you credentials that will be accredited. We cannot thank our board members enough for all the long hours they are putting in outside their daily duties to make this happen. Our hats are off to them. ABCHS sponsors certification programs in various homeland security-related areas. The goal of each program is to validate the professional knowledge and skills of certified individuals in a particular area related to homeland security. This is no small task. The Association employs intricate processes for establishing certification program policy, enforcing ethics, developing tests, and operating continuing education programs. These processes align with industry standards (such as those set forth by the American National Standards Institute and the National Commission for Certifying Agencies) and are driven by Subject Matter Experts (SME). In this way, those who hold certifications from ABCHS can be confident that their credentials are credible and relevant to their area of homeland security. The Executive Summit is scheduled for October 17-19, 2012 in Las Vegas at the beautiful Rio All Suite Hotel and Casino. This is the most anticipated ABCHS event of the year. The emphasis of the conference is on promoting “Communication, Collaboration and Cooperation”, between homeland security professionals from the public and private sectors to achieve the maximum level of preparedness to anticipate, prevent and respond to acts of terrorism in order to protect our nation, families, and communities. In preparation for the summit, not only do we have an amazing lineup of great key speakers, but we are featuring 18 different panel presentations, consisting of (5) members per panel with one moderator per session consisting of homeland security topics of the day! We look forward to seeing you at this great event! Thank you to all of you, our dedicated members, for your continued support of the ABCHS program. We do appreciate everything you do to keep our country safe and free! God Bless America and God Bless our Troops!
Inside Homeland Security® is a publication of The American Board for Certification in Homeland Security, CHS®, 2012. ABCHS is dedicated to the credentialing, networking, continuing education, and training of homeland security professionals. The opinions and views expressed by the authors, publishers, or interviewees are their own and do not necessarily reflect those of the ABCHS program, nor does the ABCHS program adopt such opinions or views as its own. The ABCHS program disclaims and does not assume any responsibility of liability with respect to the opinions, views, and factual statements of such authors, publishers, or interviewees, nor with respect to any actions, qualifications, or representations of its members’ or subscribers’ efforts in connection with the application or use of any information, suggestions, or recommendations made by the ABCHS program or any of its boards, committees, publications, resources, or activities thereof. For more information call toll-free 877.219.2519.
Regards, Marianne Schmid Publisher and Founder: Robert L. O’Block
Send Your Comments and Letters to Countersign E-mail IHS at editor@abchs.com or address mail to: IHS, Countersign, 2750 E. Sunshine, Springfield, MO 65804. Letters become the property of the journal, and it owns all rights to their use. IHS may edit letters for content and length.
Inside Homeland Security is published by the American Board for Certification in Homeland Security, 2750 E. Sunshine, Springfield, MO 65804. ABCHS members receive an annual subscription to IHS as part of their benefit package. Nonmembers may subscribe by calling 877.219.2519.
MDiv, PhD, PsyD, DMin
Chief Association Officer: Marianne Schmid
cao@abchs.com
editor: Julie Brooks
julie.brooks@abchs.com
®
Annual subscription rates United States: one year $29.95/ two years $49.95; includes shipping and handling. Internationally: one year $54.95 / two years $74.95; includes shipping and handling. Postmaster: Send address changes to Inside Homeland Security®, 2750 E. Sunshine, Springfield, MO 65804
877.219.2519
www.abchs.com
Art Director: Brandon Alms
brandon@abchs.com
Graphic Designer: Stephanie Lindberg stephanie@abchs.com Advertising: Julie Brooks
julie.brooks@abchs.com
Spring 2012
Inside Homeland Security®
5
Feature
C e rt i f i c at i o n
The American Board for Certification in
HOMELAND SECURITY Homeland Security as a Field The field of homeland security arose in the wake of the incidents on the morning of September 11, 2001. The terrorist attacks on America that day gave rise to a shared understanding that our nation needed increased security to protect our homeland, and many functional areas essential to providing this security were identified soon thereafter. Today the field of homeland security is very broad, encompassing such areas as the more obvious Emergency Management and Transportation Security to those that might not instantly come to mind, like Agriculture and Environmental Science.
✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯✯ Certification Vision Statement:
The American Board for Certification in Homeland Security, CHS®
Our vision is to bridge the gap between government and non-government organizations (NGOs) in facilitation of common standards of knowledge in coordinating various scale responses to homeland security and national disaster events.
Within a couple years of what has come to be known as 9/11, Dr. Robert O’Block had founded a professional membership association dedicated to serving the professional needs of those working in fields related to homeland security. Since its inception, The American Board for Certification in Homeland Security, CHS® (ABCHS) has made significant contributions to homeland security. ABCHS has provided its membership with many Association-sponsored networking opportunities. The Association has also contributed to the homeland security knowledge base through its quarterly, peer-reviewed publication, Inside Homeland Security®, and through its development of training and continuing education activities.
Certification Mission Statement: Our mission is to provide homeland security professionals from government and non-government organizations (NGOs) with certification to assess their knowledge of the current prescribed response frameworks.
ABCHS as Developer and Administrator of Certification Programs Providing an in-place organizational structure for the development and administration of certification programs is another function ABCHS has served. The Executive Committee of the ABCHS Advisory Board has adopted the following statements to clarify the Association’s vision and mission for certification program development and administration.
ABCHS as Developer and Administrator of Certified in Homeland Security, CHS® Program The ABCHS Executive Committee has the authority and responsibility to develop the CHS program, consisting of three levels of certification which recognize the attainment of increasingly difficult homeland security-related knowledge and skills for eligible candidates who successfully complete program assessments, who complete continuing education requirements, and who act in accordance with the ABCHS Code of Conduct (to view the ABCHS Code of Conduct, go to: http://www.abchs.com/pdf/certificationResources_code.pdf). ABCHS awards to certificants the title “Certified in Homeland Security” followed by the level at which the individual is certified and the designation CHS followed by a dash and a Roman numeral indicating the level of certification. For example, a level 5 certificant is a CHS-V.
6
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
877.219.2519 • WWW.ABCHS.COM Certification Programs Sponsored by The American Board for Certification in Homeland Security, CHS® (ABCHS) and Its Sub-Boards ABCHS and its sub-boards sponsor certification programs in various homeland security-related areas. The goal of each program is to validate the professional knowledge and skills of certified individuals in a particular area related to homeland security. This is no small task. The Association employs intricate processes for establishing certification program policy, enforcing ethics, developing tests, and operating continuing education programs. These processes align with industry standards (such as those set forth by the American National Standards Institute and the National Commission for Certifying Agencies) and are driven by Subject Matter Experts. In this way, those who hold certifications from ABCHS can be confident that their credentials are credible and relevant to their area of homeland security.
WHY GET CERTIFIED? Potential Benefits to the Field:
Potential Benefits to Employers:
• Standardizes practices and/or standards within an industry
• Improves customer satisfaction
• Advances the specialty/field
• Increases competence level of employees
• Increases cooperation between organizations in the same discipline
• Useful in making employment decisions
• Provides a means for an industry to self-regulate Potential Benefits to Those with Current Certification: • Grants recognition of knowledge and skills by a third party • Enhances professional reputation • Provides personal accomplishment • Supports continued professional development • Demonstrates a high level of commitment to the field of practice • Demonstrates a specific level of knowledge and skill • Increases opportunities for career advancement and/or increased earnings • Validates skills and knowledge • Communicates credibility • Serves as a differentiator in a competitive job market • Meets employer or governmental requirements
877.219.2519
www.abchs.com
• Provides professional development opportunities for employees • Ongoing enhancement of knowledge and skills • Increases confidence in employees’ abilities • Demonstrates employers’ commitment to competence • Provides means to establish and enforce an ethical code • Provides compliance with industry regulation/ government requirements • Increases safety Potential Benefits to the public: • Provides means to establish and enforce an ethical code • Standardizes practice and/or standards within an industry • Advances the specialty/field and increases cooperation between organizations in the same discipline • Provides a means for an industry to self-regulate • Helps in identifying qualified service providers • Increases confidence in service providers • Provides disciplinary process to follow in case of complaints
Spring 2012
Inside Homeland Security®
7
M e mb e r s p o t l i g h t
member spotlight
I n e v e r y iss u e
Ruth
Cover I
n 2010, Ruth Cover, CHS-III, completed a one-year fellowship with the Interagency Threat Assessment and Coordination Group (ITACG) in the National Capital Region. As the first
health and medical detailee from state, local, and tribal (SLT) government, she worked with seven other SLT first responders and with federal intelligence employees. The detail’s primary mission was to assist the federal intelligence community about the intelligence
... I felt especially honored to contribute to affirming that the public health and medical sector is important to the safety and security of the nation.
8
Inside Homeland SecurityÂŽ
Spring 2012
needs of SLT front line public safety personnel. She helped draft unclassified documents, for official use only (UNCLAS//FOUO), including Roll Call Releases (RCRs), which covered terrorist tactics, techniques, and procedures. Topics covered general possible terrorist scenarios and listed specific things that might indicate pre-operational activities. The documents were then sent through the FBI and Department of Homeland Security secure communication systems to FBI field offices, fusion centers, and local law enforcement.
www.abchs.com
877.219.2519
During 2010, the ITACG detail members contributed to the publication of over 20 RCRs, doubling the number of RCRs that had been published during the previous two years. In addition to drafting the RCRs Ruth and other members of the detail attended intelligence analyst training courses, promoted the ITACG opportunity at conferences, and spoke to FBI analysts in-training about SLT intelligence needs.
What was the value in being a member of the ITACG detail? It was extremely rewarding and humbling to work with so many highly professional members of the federal government, as well as with my SLT law enforcement and fire service members of the detail. The knowledge of how the intelligence process works was certainly valuable, and I felt especially honored to contribute to affirming that the public health and medical sector is important to the safety and security of the nation. My personal project was mapping what types of health-related intelligence exists, where it comes from, and how it is shared in all directions between federal and SLT entities.
How does someone obtain such an interesting position? In my case, Nebraska’s Lieutenant Govenor, Rick Sheehy, as the State’s head of Homeland Security, passed information on the ITACG fellowship to department leaders. Because it would involve an entire year away, I at first dismissed it, but after finding out more about it from the Lieutenant Governor, I decided to take a leap and see what might happen. The first step is to obtain a recommendation from the applicant’s agency and a fingerprint card which are submitted with the application. Over the next year, a telephone interview or in-person interview follows. My 20 years in healthcare, 21 years as a Navy Reserve member, and nearly 20 years as a volunteer with a local emergency man877.219.2519
www.abchs.com
agement agency were all positive factors in continuing the process after the interview. The ITACG Advisory Committee then approves or disapproves the applicant. If approved, a background investigation for a Top Secret-Special Compartmented i formation (TS-SCI) security clearance and a, counterintelligence-scope polygraph test are conducted. Once all steps are completed satisfactorily, a letter is sent to the candidate, and an agreement between the federal government and the candidate’s employing agency is completed. For me, the entire process from application to reporting date took 15 months.
What happened after you returned to Nebraska? Part of the fellowship agreement is that the person must return to the same position they held prior to participation in the detail. For me, that was returning as the Hospital Preparedness Program Coordinator at the Nebraska Department of Health and Human Services (DHHS), my position since 2004. Additionally I’ve been tasked to work with Nebraska Information Analysis Center (NIAC), our fusion center, as a health and medical liaison. Two things we’ve been working on this year are the Department of Homeland Security Data call and implementation of the NIAC’s Homeland Security Information Network (HSIN) Health and Public Health sector portal. This web-based tool is an important means for sharing sensitive information with private-sector healthcare facilities and providers.
What’s your main advice to someone interested in working for ITACG?
First, be patient. Second, know that being selected is a high honor that also carries a concurrent degree of responsibility. ITACG is a fantastic opportunity to learn not only how health ties into intelligence, but also how the federal government works. Spring 2012
Inside Homeland Security®
9
1 CE Credit
Violence
C E A rticle :
At ou r Bo r der :
C E A rticle :
1 CE Credit
Its potential effects on homeland security
10
This article is approved by the following for 1 continuing education credit: The American Board for Certification in Homeland Security, CHS® provides this continuing education opportunity for those individuals Certified in Homeland Security, who are required to obtain 30 Certification Maintenance Unit’s (CMU) per 3-year recertification cycle. After studying this article, participants should be better able to do the following: 1. Discuss the Mexican Cartel network and logistic train from Latin America to Canada. 2. List the potential resources available to international terrorists for crossing the southern United States border unimpaired. 3. Explain the coordinated efforts between United States and Mexican agencies in the opposition to the drug cartels and violence in Mexico. KEYWORDS: Mexico, terrorism, cartel TARGET AUDIENCE: Intended for homeland security professionals at the state and federal intermediate levels. PROGRAM LEVEL: Intermediate DISCLOSURE: The authors have nothing to disclose. PREREQUISITES: None
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
By: Todd W. DeVoe, CHS-III ...The biggest fear is from the numbers of illegal aliens from countries of interest that haven’t been caught.
Photo Credit: Frontpage / Shutterstock.com
I
n Navy Admiral James Winnefeld’s first newspaper interview following his assignment to NORTHCOM in Colorado Springs, CO, he wasted no time in outlining his concern over the Southern border of the United States (Gertz, 2010). His priorities have increased regarding the drug cartels in the area, and he speaks about the levels of drug violence in numerous places along the border, including several spots within the United States itself. Speaking of the drug problem existing in several different areas in both Mexico and the United States, he refers to them as “theaters.” This is a big use of language in both descriptions of the problem as well as in setting a legal precedent by giving the problem a military centric tagline. It allows combined efforts by elements of both the United States and Mexico’s military. Our military at the time of this article, however, is primarily oriented to the training and equipping of Mexico’s military and aligned police organizations. The long-range intent is not just a training solution, but a long term coordinated effort to curtail the violence and hostilities. The two nation-state militaries have begun a very good relationship. The Mexican government has requested help in the form of a joint intelligence center as a tool to move forward along a track of modern warfare intelligence resources including fusion centers, much like what we use today to coordinate intelligence sharing among
different agencies within the United States. Regarding the conversation of drug cartels, Winnefeld includes his concern of terrorists and weapons of mass destruction. At first look, these have the impression of being two separate issues, and in some ways this is true. Out of 919,000 illegal immigrants caught in 2005, over 119,000 of them were non-Mexicans. Some originated in countries known to have ties to recognized terrorist organizations accounting for 644 people apprehended in 2005 (Axlman, 2005). These statistics represent the numbers of persons caught. However, the biggest fear is from the numbers of illegal aliens from countries of interest that have not been caught. This is extremely important information to be aware of. The drug cartels have been smuggling their product to the north for quite some time and have developed a strong logistic network. These methods used to deliver drugs to the markets in the north provide a perfect vehicle for smuggling other contraband as well. This potentially includes materials and/or components for weapons of mass destruction. Although they primarily deal in drugs and human trafficking, criminal organizations have been known in the past to seek out other sources of revenue, and might very well take advantage of an offer they cannot refuse to move these weapons of mass destruction along their established supply lines. Spring 2012
Inside Homeland Security®
11
Gulf Cartel members arrested. From left: Josue Garza, Jaime Nunez, Juan Garza, Cantalicia Garza and Mayra Pedraza Sanchez. Mexican President Felipe Calderon has made combatting the country’s increasingly violent drug cartels the cornerstone of his young administration. (Handout via the Mexican Attorney General’s Office/MCT)
Who are these known drug Cartels?
Alleged drug cartel leader Benjamin Arellano Felix was recently arrested by the Mexican military. Photo Credit: MCT
The BBC for many years has been a great source of global information, and maintains a unique perspective for its audience in that its censorship requirements are much more lax than United States journalism. In 2006, as a push to limit the existing drug cartels, Mexican President Felipe Calderon launched a crackdown (BBC, 2011). In doing so, the retaliation of the cartels has resulted in thousands of people being killed: 34,612 between 2006 and January 2011 (BBC, 2011). These numbers include not only criminals and national security forces, but innocent bystanders too. During Mr. Calderon’s presidency, it is estimated that over 40,000 people lost their lives in the battle (BBC, 2011). The Arellano Felix Organization (AFO) is reported as being North America’s most violent drug Cartel and operates in the western region of the Tijuana – San Diego, CA border (Public Broadcasting Station (PBS), 2011). Using “juniors” as recruited hit-men and runners, the AFO finds men of middle and upper class status on both sides of the border. They are enticed with romantic tales of the gangster life and
wealth. They often torture their victims in ways similar to medieval practices, and they have gained a reputation of cruel and vicious treatment to people opposing their trade. They solicit help from informants in the police departments and high-tech communications systems. Recent arrests of the cartel members have spurred increased violence in Tijuana, and while arresting some of the AFO’s key leadership, the Mexican government caused several setbacks in the organization just before a very controversial presidential election. These events appear to be making progress in a positive way, but, in reality, it is just a trade-off of violence, leaving American agency representatives wondering about their own safety south of the border. Primarily operating within the SouthCentral Mexican state of Morelos, the Cartel Pacifico Sur (CPS) is one of two factions derived from the Beltran Leyva Organization (BLO), now in competition with the other half remnants of BLO (Stratfor Global Intelligence, 2010). Early 2010 found a spike in violence in this region, and it continues to increase dramatically as time goes on. This faction is at a so called war with the remainder of the original BLO organization, and executions
Ismael Zambada is the favorite to take over for alleged
drug cartel Felix. Photo Credit: ® MCT 12 Insideleader Homeland Security Spring 2012
www.abchs.com
877.219.2519
xic Me
Re pú blic a
de M
éxico.
In 2006, as a push to limit the existing drug cartels, Mexican President Felipe Calderon launched a crackdown. an P
are quite common. As a public service, on April 16th of 2010, CPS members began a marketing campaign including radio announcements, social media messages, SMS notes, and various other banners and posters notifying local residents to stay indoors after 8:00 p.m. in order to not be confused with rival gang members and killed by mistake. One could argue that this might be a psychological operation intended to intimidate the opponent, or it could be just as it seems, a semi-ethical gang protecting the local citizenry from impending danger. Of course in Mexico, law and order seems to still be as it was in the United States Wild West period of the late 19th century. Even with this notification, local security efforts fell short, and the violence continues. The Los Zetas organization is one of the international gangs with close ties in El Salvador (Stratfor Global Intelligence, 2010). Infamous in its transnational gangs, El Salvador experiences criminal control by gangs formed in the United States prison systems, but deported back to their home country after serving their sentences. Now spanning countries in both North and Central America including Guatemala and Honduras, they have commandeered weapons caches and enjoy combat experience from the El Salvador civil war in the 1980s and 1990s. Pushing deeper into Central America, Los Zetas intends to gain greater control over the drug supply line from South America. This supply line is closely aligned with human trafficking of immigrants headed for America. The Reporters Without Borders organization has reported a very dangerous environment in Mexico. Since 2000, 80 journalists have been killed in conjunction with the reporting of violence in the country (Reporters Without Borders, 2011). While investigating the terror and violence in Mexico, these journalists have made their presence quite known by reporting on the events. The Cartels 877.219.2519
www.abchs.com
primarily terrorize the local regions they operate in, but when their exploits are detailed in media reports, their goals are threatened. Killing these professionals sends a strong signal to the international public that Mexico is run by the Cartels; stay out and leave us alone. Masor Arbabsiar allegedly has ties with the Iranian government. He tried to hire Mexican nationals from a perceived drug cartel to assassinate the Saudi Arabian ambassador to the United States (Stratfor Global Intelligence, 2011). Fortunately, his dealings were actually with an undercover agent and not with whom he perceived them to be. This scenario raised numerous questions regarding Mexico as a staging point for terrorist activity targeted at the United States and its resources. Always in the forefront of American security concern is the lack of physical security, specifically at the southern borders of Texas, New Mexico, Arizona, and California. Watchful eyes have been kept on the region for possible intrusion by hostile foreign elements.
res ide n
t Fe
lipe C
t: alderon. Photo Credi
l de ado Sen
a
What is the violence about? The violence in Mexico is nothing short of international terrorism, and the primary root of the problem is drug trafficking from South America to Canada. International terrorism in this case, however, is centric to the drug trade explicitly and not at the overthrow of a government or the way of life of western citizens. When we hear about terrorism and terrorists today, we immediately think about Arab or Southwest Asian influences because of the state of the world. However, terror comes in many forms. The violence in Mexico is targeted toward two social groups: one is the rival cartels, and the other is the regional populace. This terrorism, though it spans across the United States border, is primarily focused toward rival gangs and the drug trade itself. Certain communities, however, are experiencing this terrorism first hand within their popu-
Mexico’s Drug Cartels. Photo Credit: Stratfor Global Intelligence Spring 2012
Inside Homeland Security®
13
lace due to their close proximity to the trade. For instance, in Ciudad Juarez in October of 2010, gunmen walked into a birthday party for a 15-year-old killing 13 and wounding 20 (Julian, 2010). Ciudad Juarez is one of the most violent cities in the world, and this was the second attack at a children’s party targeting security forces and other drug cartels. Statistics are showing a growing relationship between Mexican cartels, trafficking of humans, and United States based and established gangs (House Committee on Homeland Security, 2006). The human smuggling trade, on the other hand, has to offer payment to the drug cartels in order to use sections of the established drug trade corridors. Though much higher for illegal aliens from countries other than Mexico, Mexicans quite often pay $1,200 to $2,500 to venture across the border. Foreign nationals are much more appealing to the cartels when they can demand $45,000 to $60,000 each. This is a multi-billion dollar enterprise in human trafficking each year for the cartels. These tremendous incentives are far more lucrative and often fetch more revenue than the drugs do, and the legal retribution for being caught smuggling human cargo is much lighter than the drug trade (House Committee on Homeland Security, 2006). The established gangs in the United States act as a retail outlet for the drugs
Guadalajara proved to be a test of patience and trust by the world community in October, 2011, when 100,000 visitors traveled to the region to watch 5,500 athletes compete in the events (Stratfor, 2011).
Who is coming over the border? A common misconception is that all illegal aliens are of Mexican origin. Though hands down the vast majority do fit this profile, there are a surprisingly large amount of people who come across the border that are not from Mexico, but from countries known to produce and train Islamic terrorists (Longely, 2010). In the past decades we have found numerous domestic terrorists raised here in our own backyard. International terrorists are historically from the Islamic faith, and many have vowed jihad on Western society. These types of terrorists are the threat to us today, and constitute a percentage of illegal aliens that come across the Mexican border. This often involves being within groups of Mexican immigrants coming to work as laborers and being known as other than Mexicans (OTMs). “Based on U.S. Border Patrol statistics there were 30,147 OTMs apprehended in FY2003, 44,614 in FY2004, 165,178 in FY2005, and 108,025 in FY2006. Most of them were apprehended along the U.S. Southwest border. (Longely, 2010, p. 1)” These OTMs come from many countries such as: Iran, Jordan, Lebanon, Syria, Egypt, Saudi Arabia, Kuwait, Pakistan, Cuba, Brazil, Ecuador, China, Russia, Yemen, Albania, Yugoslavia, and Afghanistan. OTMs, or special interest groups, have shown an increased capture rate, upwards of 41%. In 2006, in Brownsville, Texas, seven Iraqis were discovered, and shortly later, a man from Afghanistan was discovered swimming across the Rio Grande River. Additionally, seven Chinese nationals were found in the Rio Grande Valley region of Texas (Longely, 2010). Profiling terrorism is rapidly becoming part of our fight against international violence and crime. Just because there are
Statistics are showing a growing relationship between Mexican cartels, trafficking of humans, and United States based and established gangs. which move northward through the corridor. These gangs pull double duty by acting as the cartels enforcers in the north and have established a growing presence in cities across America. Mexico has historically been known for its smuggling trades. Liquor was the prevalent trade in the 1920s: drugs and immigrants are the prevalent trade of today. Huge profits have been made from the flow of cocaine from South America since the 1980s. With evolving concerns for dangers in the South, the Pan American Games in 14
Inside Homeland Security®
Spring 2012
immigrants from countries recognized to produce terrorists does not mean that they are all terrorists. Many good people hail from these countries and could very well be coming to the United States in order to find a better life for themselves and their families. However, border patrol agents are routinely finding shocking evidence that supports immigrant’s ties to terrorist activities. In Jim Hogg County, Texas, a Border Patrol agent came across a jacket with patches on it showing an airplane flying over a building and headed towards a tower, clearly in the form of a military badge. Additionally, some of the insignia included writings of ‘martyr’ and ‘way to immortality’ or ‘eternal life’ (Longely, 2010). Neeran Zaia was arrested by Border Patrol agents and was found to have smuggled more than 200 Iraqi, Jordanian, and Syrian nationals into the United States. Mahmoud Youssef Kourani was an illegal alien who was smuggled into the United States and pled guilty to providing materiel support to Hezbollah. He was actually able to obtain a Visa from a Mexican official in Beirut, after bribing him in order to get into Mexico. Likewise, Salim Bughader Mucharrafille smuggled hundreds of people from Lebanon, most of which having had connections to Hezbollah. There is a trend showing in these three individuals with ties to Hezbollah, the terrorist arm of Iran which has recently developed a nuclear program. This program is believed to have capabilities for producing weapons grade nuclear material, which theoretically could be used in a nuclear device (Longely, 2010).
The connection to international terrorism Recently Iran has been much more overt in its operations within the United States, and indication is that it will continue to do so. Historically, the Iranian government has been able to execute operations in countries that are well influenced by its activities. Countries like Iraq, Lebanon, and Syria have experienced these elite operations for some time. Using agents from within the United States is not that hard to understand, and we have seen evidence of this lately on a few occasions (Stewart, 2011). Now a citizen of the United States but originally from Iran, Mohammad Reza www.abchs.com
877.219.2519
A Hide-and-Seek Game At the U.S. Mexico border, drug smugglers engage in an endless shell game, trying to outwit U.S. customs inspectors to sneak their loads into the country. A look at how the battle of wits plays out at the Calexico, California crossing. What Customs Inspectors do: • Tap body panels, listen for solid sound where it should be hollow
What Smugglers do:
• Circulate among cars looking for suspicious signs
• Load car (vehicle carrying drugs in hidden panels) drives into inspection area
• Check driver documents
• Lookout monitors
• Check underneath vehicles for signs of drug storage
• load car’s progress, reporting to smuggling coordinator
2 Lookout car
• If load car makes it through inspection area … • … lookout on U.S. side picks up surveillance; another lookout • follows load car to Los Angeles area
1
3
• Walk drug-sniffing dogs past vehicles
Load car
Detailed below
Carrier of Choice: • Vehicles, such as the Chevrolet Avalanche, have multiple voids where drugs can be hidden
4
• The hollow space between inner and outer bed walls can hold 50 1-kilogram packages of cocaine—about 110 pounds Smugglers remove a plastic panel to access the space between truck bed walls
• Cocaine “bricks” at the rear of the vehicle have a line attached to make them easier to retrieve—the “dope-on-a-rope” technique NOTE: Graphic is schematic | Source: Court documents, Los Angeles Times reporting Photo Credit: MCT | Graphic: Tom Reinken, Richard Marosi, Raoul Ranoa, Los Angeles Times
Sadeghnia was arrested in Los Angeles in 2009 after being recruited by the Iranian government to perform surveillance operations on Jamshid Sharmahad. Sharmahad was supporting the Iranian opposition group Tondor through his radio program and Reza Nourizadah while working in London for Voice of America. Sadeghnia, a painter from Michigan, was not a professional covert operator, and his activities were very clumsy at best. However, when his story unfolded it showed his antics on two continents, surveilling two Iranian dissidents, and eventually led to his conviction of soliciting murder for hire. After being on supervised leave for a 877.219.2519
www.abchs.com
time, he found his way back to the Tehran (Stewart, 2011). Sadeghnia’s story is not an anomaly; it is indicative of a pattern forming within the United States when Iranian citizens obtain employment opportunities here, but are not very fruitful or are disappointing to the individuals when they quickly become unemployed again. For instance, Arbabsiar was an unemployed used car salesman and cousin to a senior Quds Force commander who traveled back and forth across the Mexican border numerous times while performing his surveillance duties for Tehran. These examples, among numerous others, support United States
security concerns over the porousness of the southern borders and the opportunity this creates for individuals from countries with western hatred to move in and out at will (Stewart, 2011). However, it is believed by some that the Mexican government, as well as the leadership within the cartel factions does not support this type of scenario. This is largely in part to the prospect of military retaliation by the United States (House Committee on Homeland Security, 2006). Because of this, support to international terrorists from Mexican elements of either the government or organized crime is considered unlikely to some. In one case, Spring 2012
Inside Homeland Security®
15
a $1.5 million fee was offered to the DEA informant who actually received $100,000 of the fee. The question is still asked, “what if the informant actually had been a cartel member and had taken the money for the service?” We see a very restricted capability of international terrorists to use Mexican resources in this way. There is no empirical data to substantiate the fact that terrorists use the border as a primary means to enter the United States to do their dirty work, and most of the individuals in the recent years including Richard Reid the shoe bomber, the underwear bomber, and many of the perpetrators of 9/11 have flown directly into the United States from their countries of origin. However, with the ease of movement across the border, maybe we are just not catching the people who come up from the south as easily. Intelligence from Mexico is extremely plentiful and accurate through the Defense Intelligence Agency (DIA), Drug Enforcement Agency (DEA), Central Intelligence Agency (CIA), and the Federal Bureau of Investigation (FBI). These agenicies are deeply embedded within the country and its culture. The United States is very concerned and reacts quickly to any Iranian presence within Latin America, with complete support from the Mexican authorities and no involvement to date from the drug cartels. Mexico has shown its loyalty to the United States with its intelligence sharing regarding our enemies and has also shown, in some cases, to be just as unfriendly to members of countries and organizations that oppose the United States. Mexican leadership is very wise on this point, and realizes that if Mexico or elements from within its borders were to support international terrorist programs, they would experience swift retaliation from the United States on many levels, including military action. As it stands now, the United States treats Mexico as a bad neighborhood with the typical crime that goes along with it. We would have no problem cleaning up this neighborhood if we felt it also contained international terrorists (House Committee on Homeland Security, 2006).
Even though most cartels deal with unwanted and illegal prospects for making money, in the long run they are businessbased organizations with long-term goals for profits in which trans-border terrorism does not fit. Aiding a terrorist organization would be a once in a lifetime opportunity, most likely resulting in the termination of the cartel organization.
What can be done to safeguard United States citizens from terrorist attacks across the border? In 2005, the Department of Homeland Security announced its Secure Border Initiative (SBI) (DHS, 2005). This plan was intended to span a few years, and the SBI included components to add more border patrol agents to enforce immigration laws that prevent unlawful movement across the borders. Eliminating catch and release programs now in force, it would expand detention and removal capabilities. Additionally, technological elements existed in the plans to beef up existing systems, while increasing air patrols of both manned aircraft as well as unmanned aerial vehicles (UAVs). The last point included increased efforts for immigration enforcement within our borders. This would be done primarily by increasing investigations and enforcement of workplace laws by providing an employer self-compliance program. However, the SBI did not just include the southern border. The northern border with Canada was also included in this plan. In early 2005, President Bush signed an appropriations bill that increased our physical presence by adding over 1,000 new border patrol jobs and increasing the total number of border agents by over 3,000 between 2001 and 2005. Using stadium style lighting to deter movement across the border is one type of technological improvement. Another improvement is new layers of physical security, like new access roads and video sensors. Boeing won the big
contract for SBI support and has teamed up with Centech Group, DRS Surveillance and Reconnaissance, Elbit Systems’ Kollsman Division, L-3 Communications Government Services, L-3 Communication Systems, Lucent Technologies, Perot Systems, Unisys, and USIS (USBorderPatrol. com). This is a mixed basket of intention, however, because parts of it were to establish a new bureaucracy and parts were to build the new technology systems along with pieces of fence line to show progress. Presidential candidates, even today, are getting into the act as well. In June of 2011, Herman Cain of the Godfathers Pizza chain stated in a news interview: “I just got back from China. Ever heard of the Great Wall of China? It looks pretty sturdy. And that sucker is real high. I think we can build one if we want to! We have put a man on the moon, we can build a fence! Now, my fence might be part Great Wall and part electrical technology...It will be a twenty foot wall, barbed wire, electrified on the top, and on this side of the fence, I’ll have that moat that President Obama talked about. And I would put those alligators in that moat! (King, 2011, p. 2)” Moats with alligators might not be the right answer, but the American people are thrilled to hear anything that will limit illegal crossings, even this type of thinking outside of the box.
Photo Credit: Janet Schwartz/ MCT
16
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
The cartels, which unquestionably provide the biggest influence in the trade movement, control a portal and corridor originating in South America and moving into North America through the United States and eventually as far north as Canada. Conclusion Assessing the information regarding the different cartels and how they go about their business, we see that they are part of a large logistic supply chain of drugs and human trafficking headed north. The violence noted recently is directly related to the different cartels trying to grab and maintain control over the different aspects of the drug enterprise. When looking at international logistic models, there are regulations, laws, and rules that govern the separate pieces of the operations. These rules in a legal enterprise help to regulate activity so the elements of the operation will run smoothly, and responsibilities are divided up fairly. However, since these operations are illegal in nature, there are no governing bodies to provide policy and legal guidance which protects interests and citizenry accordingly. The cartels, which unquestionably provide the biggest influence in the trade movement, control a portal and corridor originating in South America and moving into North America through the United States and eventually as far north as Canada. Picture a large river that flows for thousands of miles, something like the Mississippi, which transgresses many states within North America. This corridor can be compared in some ways to a river concept flowing northward from Latin America to Canada. As in any river, you can put a boat on it and sail to any destination along its path. This corridor, however, allows movement of drugs and human cargo. Again, like a river, the opportunity exists for terrorists to use it themselves in order move directly or to transport their interests. Do the cartels move their product illegally across the border with little effort? Yes. 877.219.2519
www.abchs.com
This drug based logistic train from South America north to the United States moves illegal drugs rapidly and, for the most part, undetected. The system is very capable of moving terrorists from other parts of the world, along with contraband items or materials such as elements for nuclear weapons or other weapons of mass destruction. Even though the cartels down south are not believed to support this type of venture, every man has his price. Do terrorists have these types of materials needed to produce a nuclear weapon? Yes. Iran has developed a nuclear program that can produce the type of material that can be used for the manufacture of a gun-type nuclear weapon like “Little Boy” that was dropped on Japan in 1945. Hezbollah is the recognized terrorist arm of Iran and could easily support this theory with manpower to move the material through the southern desert of the United States if the cartels decided to help them. Instances of recent Iranian influenced operations within the United States by individuals who have used Mexico and the uncontrolled border as a resource have been uncovered, and provide a testament to the opportunities the lax border control provides. Is this an ongoing problem for the United States? Yes, every day. So, logically, the answer is to prevent illegal movement across the border for any reason. What can possibly be done to provide better security at the border? We can get the word out early that the United States will be completely shutting down the borders for illegal aliens with enough resources put into place. This will allow the existing illegal immigrants enough time to return on their own, and thereby head off
an uncomfortable situation of forced deportation. Once these illegal aliens have been deported, only legal immigration can be allowed through the lawful process of coming to the United States as a legal immigrant. The United States has the resources to completely secure the border, if desired. There have been plans drafted and programs funded to do just this. With the two wars in Iraq and Afghanistan winding down, these fiscal and military resources can now be diverted to support the firm closing of the United States borders. Private enterprise may also support this idea with technology advanced enough to patrol and record movement in areas too vast and desolate than a wall or fence is unfeasible. Our current economic state will also get a boost, while providing a capability in technology and other goods that will support the effort. This will include the creation of many needed jobs in the region. The new secured border should prevent most future illegal activity, or restrict it considerably. Doing the best job we can at keeping out other international terrorists set about to the destruction of our way of life will help to prevent the next catastrophic attack on our soil. The World Trade Center was arguably the most destructive terrorist attack in history. However, the opportunity for a terrorist to use a weapon of mass destruction during the next attack does exist, and it is not an inconceivable nightmare but a very realistic concern with Iran’s newly developed nuclear program. Leadership in the United States must take this into consideration when determining how much of our country’s resources should be used in protecting our citizens from the next and most likely devastating terrorist attack. Spring 2012
Inside Homeland Security®
17
References Axlman, C. (2005, July 26). Illegal entry by nonMexicans rises. Retrieved October 3, 2011, from The Christian Science Monitor: http://www. csmonitor.com/2005/0726/p01s01-usfp.html BBC. (2011, August 26). News Latin America & the Caribian. Retrieved october 3, 2011, from BBC: http://www.bbc.co.uk/news/world-latinamerica-10681249 DHS. (2005, November 2). Fact Sheet: Secure Border Initiative. Retrieved october 17, 2011, from Homeland Security: http://www.dhs.gov/ xnews/releases/press_release_0794.shtm Gertz, B. (2010, july 5). Northcoms New Leader Boosts Focus on Mexico. Retrieved September 27, 2011, from The Washington Times: http://m.washingtimes.com/news.2010/july/5/ northcoms-new-leader-boosts-focus-on-mexico House Committee on Homeland Security. (2006). A Line in the Sand: Confronting the Threat at the Southwest Border. Washington, DC: House Committee on Homeland Security. Iranian.com. (2010). Iranian of the Day. Retrieved 11 1, 2011, from Iranian.com: http://www. iranian.com/main/2010/dec/mohammad-rezasadeghnia Julian. (2010, October 23). Gunmen kill 13 at birthday party in Mexico. Retrieved October 12, 2011, from Reuters US edition: http://www. reuters.com/article/2010/10/23/us-mexicoshooting-idUSTRE69M1JY20101023 King, J. (2011, July 11). Herman Cain’s Solution to Immigration Problem: Alligator-Filled Moat and an Electrified Great Wall. Immigration Group Livid. Retrieved October 17, 2011, from Phoenix NewTimes - Blogs: http://blogs. phoenixnewtimes.com/valleyfever/2011/07/herman_cains_solution_to_immig.php Longely, R. (2010, June 7). Terorists: The “other” ilegal aliens. Retrieved October 17, 2011, from
About.com: http://usgovinfo.about.com/od/ defenseandsecurity/a/otmaliens.htm Public Broadcasting Station (PBS). (2011). Frontline - The Arellano Felix Organization. Retrieved October 3, 2011, from PBS: http:// www.pbs.org/wgbh/pages/frontline/shows/ drugs/business/afo/ Reporters Without Borders. (2011, September 2). Murder of two women journalists brings the death toll since 2000 to 80. Retrieved October 4, 2011, from Reporters without Borders: http://en.rsf.org/mexico-murder-of-two-womenjournalists-02-09-2011,40912.html Stewart, S. (2011). Reflections on the i9ranian Assissination plot. Austin, TX: Stratfor. Stratfor Global Intelligence. (2010). Mexico Security Memo. Austin, TX: Stratfor . Stratfor Global Intelligence. (2011, October 12). The Unlikelihood of a Terrorist Attack in the United States from Mexico. Retrieved Octobe 12, 201, from Stratfor Global Intelligence: http://www.stratfor.com/node/203162/ analysis/20111011-unlikelihood-terrorist-attackunited-states-mexico Stratfor. (2012, January 24). Mexico’s Drug Cartels. Retrieved January 27, 2012, from Stratfor Global Intelligence: http://www.stratfor.com/ graphic-of-the-day USBorderPatrrol.com. (n.d.). Secure Border Initiative Part 1. Retrieved October 17, 2011, from USBorderPatrrol.com: http://www.usborderpatrol.com/Border_Patrol770.htm War News Updates. (2011, Sep 1). Is Mexico Becoming Open To The Idea Of U.S. Military Aid In The Drug Cartel WarsÉ. Retrieved Nov 1, 2011, from War News Updates: http://warnewsupdates.blogspot. com/2011/09/is-mexico-becoming-open-toidea-of-us.html
A b o u t t h e Au t h o r Todd W. DeVoe, CHS-III, was raised in Naperville, IL and entered the Navy in 1981, beginning his career in the shipboard nuclear weapons program and eventually retiring from the Explosive Ordnance Disposal (EOD) Special Operations community as a Master EOD Technician and Chief Warrant Officer after 26 years of service. He currently supports the Navy Medicine enterprise as a Camber Corporation contractor in the Emergency Preparedness Directorate, providing program management support to the Emergency Preparedness Training & Exercise programs. Todd is pursuing his Master’s Degree in Homeland Security from the American Military University.
18
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
Announcement to Readers
We’re on Kindle! If you’ve already marched into the future of reading, you know about Kindle. Now you can add Inside Homeland Security ® to your e-reading experience using Amazon’s standard-setting device.
Haven’t taken the Kindle leap yet? Here are six reasons why you should not delay: 1. Same IHS, but easier to read: Adjustable type size, high-contrast digital ink, bolder fonts. 2. Contingency planning: Read in bed with no eyestrain. Read at the beach—no glare. 3. Preparedness: Online backup archiving on Amazon. 4. Continuity: Synch your reading to your laptop and wireless devices. 5. Resiliency: Battery life of up to one month. 6. Convenience: Weighs less than a single print issue. Takes up less space in your carry-on.
Julie Brooks Editor, Inside Homeland Security®
Feature
Security
If your destination is a foreign country, the following steps will assist you in having an enjoyable vacation or productive business trip.
OPERATIONAl
SECURITY Written By
Carlos Barros-Villahermosa, MA, CHS-V
Traveling to a Foreign Country
Passport Protection Operational Security has become a vitally important function that contributes greatly to the success of executives, managers, employees, law enforcement personnel, and the general public in the public or private sector. The practices of operational security also assist their families in keeping alert and maintaining personal security and privacy in their lives. Carlos Barros-Villahermosa, who teaches operational security to professionals in Puerto Rico, is sharing segments from his course. This presentation is based on his segment on visiting a foreign country.
20
Inside Homeland Security®
Spring 2012
Your passport is the most significant identification you will carry. This is your proof of U.S. citizenship while traveling abroad. Passport theft, particularly of American tourist passports, is on the rise. Take extra precautions to protect your passport, since its loss or theft may cause you unnecessary travel complications as well as significant expense. To minimize potential loss or theft, it is recommended that you carry your passport in your front pocket, or in a pouch hidden in your clothes. Do not leave your passport at the hotel’s front desk, as someone could scan the document to commit identity fraud. Some areas use this procedure to register you with the local police as a routine policy. Do not forget to ask for a receipt, and be very sure to retrieve your passport before continuing your trip. Use discretion in displaying your passport, as it could draw undue attention to you. Memorizing your passport number and other essential information will help you avoid flashing your passport around when filing
out items such as landing cards and hotel registration forms. If your passport is lost or stolen abroad, report the situation immediately to the nearest U.S. Embassy or Consulate as well as to the local police authorities. Again, having copies of your passport biography page, along with extra passport photos, will help speed the replacement process. In some countries, you may be required to leave your passport at the hotel reception desk overnight so it can be checked by local police officials. These are normal procedures required by local laws in many countries. Ask the U.S. Embassy or Consulate about your hotel’s security policies before you leave your passport. Be sure to obtain a receipt for your passport and any valuables you leave in the hotel safe. Obtain the new U.S. passport card as a backup security document. Passport card would be the travel document to travel within next 10 years, because it is easy to carry and concealed than Passport Book. Foreign countries such as: Spain with DNI card and Holland with Eye-Scan card are used to enter to their countries. There are card readers in all Air/Seaports around the world. www.abchs.com
877.219.2519
Establish Points of Contact
Arrest
Establishing points of contact is important. Someone should know your whereabouts from the time you depart the U.S. until you return home. Give your contact a detailed copy of your itinerary and provide notice of any changes. If you are traveling on business, you should establish a point of contact in the country you are visiting. Be sure to carry that person’s name and telephone number with you. Depending on your personal circumstances, or if your travel involves an extended stay, it may be advisable to register with the nearest U.S. Embassy or Consulate. This will make it easier should someone at home try to reach you.
If you are arrested for any reason, ask permission to notify the nearest U.S. Embassy or Consulate. In some countries your request may not be honored immediately. Be persistent. A consular officer cannot arrange for free legal aid or provide bail money for you. The consular official can provide you names of English-speaking attorneys and help you find adequate legal representation. The official can contact your traveling companions or relatives in the U.S., or intervene if you are receiving discriminatory treatment.
Local Laws Remember that although you are an American citizen, you are subject to the laws of the country in which you are traveling. Do not assume that what is acceptable in the United States is acceptable abroad. For example, in many countries individuals are prohibited from making derogatory comments about the government or government leaders. Taking photographs of government facilities and religious symbols is also prohibited in many countries. Therefore, be aware of the local laws. As a general rule, do not attempt to take photographs in the vicinity of foreign military bases, buildings, or personnel.
Shun Publicity Avoid inquiries by the local news media. If approached by the media, remember not to disclose any information relating to yourself or other government personnel and to report such contacts. Avoid discussing personal and background information concerning yourself and family members with nationals of the country you are visiting.
Avoid Civil Disturbances Every effort should be made to avoid civil disturbances and disputes with local citizens. Use caution if you come upon a demonstration or a rally. If the speaker is denouncing U.S. policy, the crowd could become hostile to any American bystanders. Should violence break out, arrests are sometimes made indiscriminately. 877.219.2519
www.abchs.com
Keep a Low Profile You need to use common sense and be extra conscious of your appearance and actions so that you do not attract unwanted attention. Take a good look at the items you plan to take with you such as clothing, jewelry, and even religious items. This is especially true for reading materials that may be considered offensive. Keep in mind that certain items may not appropriate in the country you are visiting. Do a little research about the foreign country that you plan to visit. Avoid clothing and other outward vestiges that unnecessarily advertise that you are an American citizen. Wear nondescript, casual apparel that enables you to blend in as much as possible. Leave behind professional sports apparel items, hats, coats, shirts, etc., and western apparel.
Safeguarding your Government, Company, or Personal Laptop Computer You should never leave your laptop computer unattended, especially when traveling overseas. Foreign governments are hungry for U.S. information of any type. Many foreign countries do not have the same laws as the U.S. regarding privacy and freedom from unreasonable searches. If you leave your computer unsecured for a day in your hotel room, assume that the files on it have been copied. If your computer is stolen and returned to you within the day, or within a few days after traveling on a train or staying in a hotel, assume that the files have been copied. In order to minimize the risk of this happening, you can either keep your computer in a safe deposit box at the hotel, or keep it with you at all times. Do not put it down or leave it unattended for any length of time.
Spring 2012
Inside Homeland SecurityÂŽ
21
Medical Problems and Emergencies To help prevent illness while you are abroad, get a medical checkup before your trip and make sure that your immunizations are up to date. Do not hesitate to seek medical assistance if you need it. Should you require medical services due to injury or serious illness, contact the nearest U.S. Embassy or Consulate where a representative is on duty 24 hours a day. This individual can provide the names of reputable physicians and hospitals to help you avoid improper treatment and medical bills. In most cases, hotel personnel also provide good advice, although there have been reports of clerks who have arrangements with unethical physicians.
Driving Overseas
Dealing with Travel Problems Money Matters Take most of your money in international travelers checks. Do not carry large amounts of cash. Plan ahead to ensure that you will have enough foreign currency for the expenses you anticipate during your first day in the country. It is advisable to exchange some money to cover such essentials as taxis fares, meals, and tips. Do not rely on currency exchanges at airports being open 24 hours a day. Local banks usually offer the best rates, although hotel money exchanges may be more convenient. Always deal with reputable established currency exchanges; in many countries it is illegal to do otherwise. If you deal with people on the street who offer you an unbelievable deal, you run the risk of getting
22
Inside Homeland Security®
Spring 2012
counterfeit currency, or being arrested for involvement in black market activity. Be sure to keep track of all your transactions. Each time you cash a travelers check, record the serial number, denomination, date, and location of the purchase. Keep this in a separate place so that replacement checks can be issued quickly if they are lost or stolen. Safeguard the credit cards as well as customer copies of each credit card transaction you make. Any credit cards that are unnecessary or invalid overseas (e.g. gasoline or department credit cards) should be left behind. Learn a few phrases in the local language so you can obtain assistance if needed. You should also learn how to use the public telephone and carry the coins necessary to do so.
If you plan to drive while overseas, you need to determine whether you will need an international driver’s license. While some countries do not recognize U.S. driver’s licenses, most do accept international drivers’ licenses, which are often required by foreign car rental agencies. The American Automobile Association (AAA) will assist you in obtaining an international drivers’ license, although non-members will pay a slight additional charge above the cost of the license. If you belong to another automobile association or motor club, check with it to see if it offers this service. Check with your insurance company before you leave to make certain you are covered for driving while overseas. In some instances, supplemental insurance may necessary. If you need to rent a car while overseas, avoid selecting a car that might mark you as an important foreigner. Drive carefully while you are abroad. Many countries deal harshly with foreigners who are involved in traffic accidents. Drivers are often detained in jail while such accidents are investigated. Take care not to speed as some countries impose a speeding fine, which must be paid before leaving the country. Also, in some areas it is unlawful to use insulting language toward another person, or to use abusive gestures while driving. Remember you are not immune to the laws in foreign countries, not even if you are an ambassador or diplomat.
www.abchs.com
877.219.2519
Illness or Medical Emergency • Carry a summary of your medical history, including past illnesses, allergies, and blood type. • Carry an ample supply of any prescription medication you are required to take. It is also recommended that you take along an extra prescription in case you need a refill. Be sure to ask for the generic name of any prescription drug as brand names differ in other countries. • Always leave medicines in the original labeled containers. • Check with your health insurance agent to make sure your medical expenses will be covered if you incur an injury or illness while traveling. For information for English-speaking doctors in foreign countries: International Association for Medical Assistance to Travelers 716-754-4883 For information about diseases and shots needed: Center for Disease Control CDC 404-332-4559
Other Unforeseen Circumstances and Situations During your travels, it will be most unlikely that you will ever be hijacked, kidnapped, held captive, or become a victim of terrorist or criminal activity. The information provided in the following topics is not meant to alarm you, but is simply provided as guidance.
Evading Terrorists and Criminals • Get as much information as you can about the threat in your destination before you leave, especially if traveling to a high-risk area. • Develop and implement a security plan upon your arrival. • Do not become complacent in low-risk areas. Situations sometimes change rapidly. Terrorists and criminals alike strike when and where they sense their targets to be most vulnerable, and they are most successful when security measures are low and daily routines are predictable. • Vary arrival and departure times and routes which you normally take. Be alert to the possibility of surveillance. If you believe that you are being followed, do not challenge your follower. Instead, attempt to mentally note the person’s physical characteristics, car description, license plate, and any other particulars. Promptly report such incidents to security officials.
Hijacking and Hostage Situation
A b o u t t h e Au t h o r Carlos Barros-Villahermosa, MA, CHS-V, specializes in enforcement support activity with his company, ESA Intelligence & Investigations. He has conducted field background investigations in Puerto Rico, the United States Virgin Islands, and elsewhere in the Caribbean on a contract basis for the Departments of Justice and Defense, as well as private companies. He provides immigration counseling, conducts training programs, and performs research and intelligence in the U.S. and abroad. He is a liaison Advisory Board member of i3Global Security, A division of 13GS, LLC, between the Puerto Rico Emergency Management Agency and Fort Buchanan, Puerto Rico (U.S. Army and Navy Reserve). Villahermosa is a member of the U.S. Coast Guard Aux. 7th District-Flotilla 1-12.
877.219.2519
www.abchs.com
• Remain calm and mentally control yourself. • Try to remain alert, and avoid doing anything that might attract undue attention. • Comply with orders and instructions without complaining. Keep in mind that what you say and do could impact what happens to others. • Be as general as possible if questioned, and do not discuss anything that you are obligated to protect. • Be nonthreatening in conversations with your captors, and avoid arguments and physical violence. • Prepare yourself for experiencing depression, boredom, and frustration, since a hostage situation may continue for an indefinite period. • Try to humanize the event as much as possible. If you need anything, ask for it in a reasonable, low-key manner. • Try to establish a program of mental and physical activity if your situation becomes lengthy and drawn out. • Above all, rely on your inner resources and think positively.
Spring 2012
Inside Homeland Security®
23
Feature
U . S . B o r d e r Pat r o l
Unseen, unheard, unmanned
CBP Office of Air and Marine uses Predator aircraft for border security and emergency response By Ed Peaco Inside Homeland Security®
U.S. Customs and Border Protection (CBP) is growing its fleet of unIn late December, the CBP Office of manned aircraft to secure borders and respond to humanitarian Air and Marine (OAM) received its ninth unmanned aircraft and had another one on emergencies. Advanced communications and surveillance order for delivery in December. OAM’s fleet technologies, along with advantages of remote piloting, consists of Predator aircraft and their maritime provide new opportunities to monitor vast landscapes variant, the Guardian. The two recent orders are for the new “Dash 7” configuration that can be equipped and support efforts on the ground, from capturing with either land or maritime radar systems. They are used drug smugglers to analyzing flood damage. primarily to patrol the nation’s southwestern border and
OAM Assistant Commissioner Michael C. Kostelnik (Major General, USAF, retired)
monitor coasts from the Gulf to the Atlantic. The unmanned aircraft are part of a trend at CBP toward using unarmed military equipment for homeland security, said OAM Assistant Commissioner Michael C. Kostelnik (Major General, USAF, retired). “We operate a very high-tech, very capable force with these military-spec type systems — the Predators and the Guardians in particular. We’re working these missions to help our people — our agents and officers on the ground — to secure the border daily with those missions,” Assistant Commissioner Kostelnik said. The fact that the aircraft are being flown daily for border security makes them available for emergency response and other national crises, he said. The new aircraft, based at the CBP’s Corpus Christi, Texas, station, will serve to strengthen the fleet and to provide backup when a unit is grounded for maintenance. The majority of the Predator series aircraft are located along the southwest border and southeast coastal areas, according to OAM fact sheets. Two of the craft are based in North Dakota.
Remote, virtual piloting
We operate a very high-tech, very capable force with these military spec type systems — the Predators and the Guardians in particular. 24
Inside Homeland Security®
Spring 2012
The Predator class of aircraft is especially well suited to flying in the national air space because these remotely-piloted craft are hand-flown by FAA-certified pilots, Assistant Commissioner Kostelnik said. This system is preferable to others in which the aircraft is flown by analysts’ computer keystrokes, he said; the hand-flown system enhances public safety. Furthermore, the Predator system has advanced technology to enhance the pilot’s performance. “I really think about these not as drones or remotely flown, www.abchs.com
877.219.2519
The Predator Performance and Weight • Speed: 240 knots • Altitude: Up to 50,000 feet • Endurance: Up to 20 operational hours • Max Gross Weight: 10,500 pounds Other System Components • Fixed and mobile ground control stations • Electro-optical, Infrared Sensors • Surface Search Radar/Ground Moving Target • Indicator • Line-of-sight Data and Control Link • Ku-band Satcom Data and Control Link
Information provided by U.S. Customs and Border Protection fact sheet. Photo Credit: CBP
but basically you bring the pilot virtually into the mission area — virtually. You give him all the capabilities and a lot more help and information to allow him to make decisions near real time in the mission area,” Assistant Commissioner Kostelnik said. He acknowledged certain challenges for the pilot: “He gets no tactile feedback from what actually is happening. He’s looking at the world around him through flat displays, not in three dimensions as you would if you were sitting there.” The pilot’s decisions unfold after a 1-second delay as signals move through the satellite system, he said. However, the Predator system provides resources that work to the advantage of the pilot. “He’s sitting in a comfortable environment. He has an assistant sitting next to him looking at the sensors. He has unprecedented situational awareness,” Assistant Commissioner Kostelnik said. The system’s equipment gives the pilot not only the view from the aircraft but also views from electrical optical cameras, infrared cameras, and radar systems. “He has a unique capability to see the world around him,” he said.
Synthetic aperture radar
One of the most powerful technologies in the Predator portfolio is a system that creates high-quality images from radar. Conventional radar images typically are blips and fuzzy shapes. Synthetic aperture 877.219.2519
www.abchs.com
radar not only renders clear, sharp images, it also provides the means to capture images of precise locations at different times. OAM uses this capability to perform before-and-after analysis to detect changes in specific areas. “So, if you have a database, and then you have an event, you go back and take another radar shot from the same geospatial location, then you can compare the before and after with analysis in this radar spectrum, and you can determine if something has changed,” Assistant Commissioner Kostelnik said. In recent years, OAM has used this imaging system to support FEMA and the U.S. Army Corps of Engineers during floods in North Dakota, Minnesota, and the Mississippi River Valley, as well as hurricanes in the Gulf of Mexico and the Atlantic coast. The system frequently comes into play for border security, as Assistant Commissioner Kostelnik illustrated: “So, for example, we have fences across the southwest border. The cartels are cutting into the fence and doing damage to the fence, so they can put people or narcotics through. That has to be patrolled and the fence has to be inspected. So one very effective way of inspecting the miles of fence we have is we fly the Predator aircraft across the fence, and using the synthetic aperture radar, we can tell when there’s been a difference to the fence. These images are such high quality that we can tell when there’s been footprints on the
ground. So analysts can take these high definition images and, with analysis, provide intelligence that there’s a problem with the fence, there’s people moving in this area.” In addition to synthetic aperture radar, OAM fact sheets note that Predator aircraft also carry these components, depending on the aircraft’s function and variant: • Fixed and mobile ground control stations • Electro-optical, infrared sensors • Surface search radar/ground moving target indicator • Line-of-sight data and control link • Ku-band Satcom data and control link • Raytheon SeaVue Marine Search Radar
Stealth and endurance
A crucial aspect of the Predator series of aircraft is its ability to fly at high altitudes — typically 19,000 feet — where the aircraft cannot be seen or heard from the ground. On night missions, the aircraft usually are flown unlighted, Assistant Commissioner Kostelnik said. Additionally, the aircraft can be flown up to 20 hours at a time, which allows for long monitoring missions along the length of the southwestern border. “So that gives you the capability overhead over a security mission area for us. It cannot be seen, it cannot be heard,” Assistant Commissioner Kostelnik said. The capability is one “that can talk with all our agents on the ground, that can see Spring 2012
Inside Homeland Security®
25
...We’re doing it not for defense missions; we’re doing it in the homeland
OAM has created the first dedicated homeland security air and marine force in the world at night with the forward-looking infrared system that can take imagery analysis with the radar through weather, through clouds, and interface with agents on the ground using night vision goggles to pinpoint targets. We use these things to our advantage tactically on a routine basis.” He offered an example of a recent border security mission in the Rio Grande Valley along the Texas border with Mexico: “They were flying over and looking at the Mexican side and, lo and behold, a bunch of trucks drive up on the south side. They unload a bunch of boats. They inflate the boats. They load the boats with bales of marijuana. They cross the Rio Grande — all this while the Predator overhead is watching this. Of course the Predator is talking with law enforcement officials in the state of Texas — state and local — working with U.S. Border Patrol on the ground. The Predator stays overhead; it tracks the vehicles. When the vehicles drive into south Texas, the Texas Rangers and the U.S. Border Patrol take down the vehicles, get the dope, apprehend the individuals. That’s typical of how having that capability overhead can result in mission efficiency and effectiveness that you wouldn’t ordinarily get.” Additionally, Assistant Commissioner 26
Inside Homeland Security®
Spring 2012
Kostelnik provided a maritime example. It involves the use of a Predator Guardian (maritime variant) that flew out of Cape Canaveral Air Force Station in a mission to the Turks and Caicos Islands in partnership with the government of Bahamas, the U.S. Drug Enforcement Agency, and other agencies. “We’re routinely flying patrols in the Bahamas and in the areas in and around the approaches to the straits of Florida,” he said. “Based on intelligence, there was some thought that there would be a drug shipment from the Bahamas to south Florida. The Predator, as a result of this intelligence, picked up a boat underway, unlighted, and informed our agents, our mariners, on the ground. That boat was interdicted with some Bahamian nationals and others carrying narcotics — in this case, it was cocaine — toward the straits of Florida.”
Increasing demand
As the CBP continues to fly Predator missions, other agencies are learning about the system’s capabilities and requesting its services. In addition to supporting emergency efforts for floods and hurricanes, the OAM also has assisted the Interior Department and the State of New Mexico during for-
est fires this year, Assistant Commissioner Kostelnik said. He favors a policy of measured growth of the fleet, coordinating the acquisition of aircraft with the training of new pilots. “So increasingly, as these technologies become more available and more understood, there will be more and more use of these things for a wide variety of missions in the future,” he said. The Air and Marine program has developed from the merger of the aviation and maritime legacies of the former Border Patrol mission (primarily humanitarian and immigration concerns) and the former Customs Service mission (primarily narcotics interdiction), Assistant Commission Kostelnik said. He said OAM has created the first dedicated homeland security air and marine force in the world: “We’re a law-enforcement air force. We have law-enforcement entitlements. All our pilots and mariners are federal agents. We carry weapons — handguns and rifles. But increasingly in our aviation and maritime capabilities … we’re operating DOD-like equipment. But we’re doing it not for defense missions; we’re doing it in the homeland.” www.abchs.com
877.219.2519
by Dave Mcintyre
Executive Level Education
Grading Bio-Response
W
hen the Congressional Commission on the Prevention of Weapons of Mass Destruction, Proliferation and Terrorism was established in 2007, members assumed that the greatest threat to the United States was the use of a nuclear weapon on an American city. After interviewing 250 experts, they changed their minds. Their conclusions, published in the 2008 book World at Risk, was that nuclear weapons remain one of the two “WMD categories that have the greatest potential to kill in the most massive numbers.” (p. xv) But “terrorists are more likely to be able to obtain and use a biological weapon than a nuclear weapon” (WMD Center). After a further year of study, the Commission’s Chair and Vice-Chair (Senator Bob Graham and Senator Jim Talent) reestablished the program as the private, not-for-profit Bipartisan WMD Terrorism Research Center (WMD Center). Supported by grants from the Skoll Global Threats Fund and the Smith Richardson Foundation, the center has issued a 2011 Bio-Response Report Card evaluating U.S. bio-response capabilities to the threat of bio-terrorism or natural disaster. It was not a report card anyone would want to take home. Of the 45 categories graded, 15 received an F, 15 received a D, 7 received a C . . . and not 1 received an A.
877.219.2519
www.abchs.com
Spring 2012
Inside Homeland Security®
27
Bio-Response Report Card (Figure 1) Trend
Small-Scale
Small-Scale
Large-Scale
Large-Scale
Large-Scale
Global Crisis
NonContagious
Contagious
NonContagious
Contagious
Drug Resistant
Contagious
Detection & Diagnosis
C
C
D
D
F
F
Attribution
D*
F
F
F
F
F
Communication
B
B
C
C
C
C
Status Quo
Medical Contermeasure Availability
B
B
D
D**
F
F
Declining Trend
Medical Countermeasure Development & Approval Process
Arrows indicate current trajectory toward meeting fundamental expectations (assumes baseline fundings): Improving Trend
D
* D for Anthrax, for all other pathogens and Toxins F
Medical Countermeasure Dispensing
B
B
D
D
F
F
Medical Management
B
C
D
D
F
F
Environmental Cleanup
B
Not Applicable
F
Not Applicable
F
Not Applicable
A
Meets Most Expectations
D
Meets Few Expectations
B
Meets Many Expectations
F
Falls to Meet Expectations
C
Meets Minimal Expectations
Adapted from the Bio-Response Report Card released by the WMD Center in their report of October 2011.
Influenza
28
Killed more people in two years (1918-1919) than died in all of WWI.
15
20 Million
Million
WWI Deaths (1914-1919)
Influenza Deaths (1918-1919)
Inside Homeland Security®
Spring 2012
That being said, it was a better report than many expected. And the in-depth analysis provided by the report as a whole (see http://www.wmdcenter.org/) suggests some positive trends and several ways to make significant progress with relatively modest efforts. The report card began by clarifying the threat—which is continuing to evolve, and worsen. Of course, danger from naturally occurring outbreaks is nothing new. The Black Death killed a higher percentage of Europeans than any war in modern history, and the Spanish Influenza of 1918 killed more American soldiers than all of World War I. Nature can kill efficiently and effectively without the help of man. However, the biotech revolution has spread sophisticated equipment and knowledge far and wide. Non-state actors have clearly announced their intent to use WMD in general, and biological weapons in particular, against the U.S. They may already have the capability to produce sophisticated bio weapons, and ease of production and distribution is growing. Furthermore, because production systems may be easily hidden or disguised, deter-
**B for Smallpox Figure 1: Evaluations from the Bio-Response Report Card released by the WMD Center in their report of October 2011. Used by permission of the Bipartisan WMD Terrorism Research Center.
ring potential enemies from use may be impossible. Consequently, to quote the report, “the primary means of defending the American homeland against bioterrorism is the capability to effectively respond after an attack has occurred” (WMD Center). Thus bio-response is the key to reducing the vulnerability to and consequences from the most likely form of WMD attack. Next, the report identified eight major capabilities that constitute bio-response. • Detection & Diagnosis: recognition of a biological event and identification of the specific agent. • Attribution: identification of the source of a biological event. • Communication: discerning and sharing essential information among stakeholders and actors. • Availability of Medical Countermeasures: provisioning of vaccines, antibiotics, therapeutics, medical devices and diagnostic tools. • Development & Approval of New Medical Countermeasures: ability to develop, produce or acquire essential countermeasures. • Distributing & Dispensing of www.abchs.com
877.219.2519
Medical Countermeasures: transporting from the Strategic National Stockpile and dispensing to the identified population. • Medical Management: aligning resources available with need in order to save as many lives as possible. • Environmental Cleanup: remediating a contaminated area to protect health and welfare. Third, the report clarified the differences in scale of biological events likely to require bio-response. Obviously the challenge posed to the categories of bio-response by a small event is different from the same type of event on a large scale. Think, for example, of the difference in dealing with the anthrax letters in 2001 versus an anthrax attack that contaminates a city. Additionally, the challenge of responding to a contagious disease (like small pox) is quite different from a non-contagious poison (like Ricin). So the Report Card differentiation of biological events includes small and large events, both contagious and non-contagious. A drug resistant disease poses a different type of challenge – likely to be even larger on the scale of events. And a global crisis with a contagious disease (presenting in many locations at once and threatening political and economic institutions) occupies the extreme worst end of the scale. Expressed together, the types of activities required for bio-response and the scale of challenges to these activities describe a matrix (see Figure 1). The report card evaluated each intersection on the matrix, assigned a grade, and then assessed the overall status and trends. The result is a strategic, end-to-end assessment of U.S. bio-response capabilities. The message of the Report Card is complex and deserves detailed review. But here are some of the major conclusions in brief. • For small-scale events, most capabilities have improved and trends are flat or rising. • Progress in communications capabilities is striking – even at the most difficult end of the event scale. • The process of developing medical countermeasures takes too long, is 877.219.2519
www.abchs.com
too expensive, and does not support the response capabilities essential to American bio-preparedness. • The assessment for attribution is even worse. We cannot meet the most fundamental expectations of attribution for any level of bio event. • U.S. capability to meet biochallenges is weakest on the most extreme end of the event scale. • The report card concludes that addressing the worst events is so technically (and financially) challenging that our limited resources should be invested in improving the middle range challenges: large-scale contagious and noncontagious events. No doubt many observers expected a report card that failed the entire enterprise, blasted the current administration, and demanded massive new spending. In fact, the report is more balanced and nuanced than that. For example, it concludes with a set of strategic priorities that include: mobilizing a “whole of nation response capability; educating leaders to set better direction and demand accountability; and focusing investment on countermeasures, environmental remediation and bioforensics. A good report card does more than just grade. It captures the student’s strengths, weaknesses, and potential, while suggesting objectively how to best improve overall performance. That’s what the WMD Center has achieved with its report card. It is worth a closer look.
Variola (a.k.a. Small Pox) Smallpox was an infectious disease unique to humans, caused by either of two virus variants, Variola major and Variola minor. Smallpox bumps are filled with a thick, opaque fluid and often have a depression or dimple in the center. This photo comes from the Centers for Disease Control and Prevention’s Public Health Image Library (PHIL).
Anthrax Anthrax infections can occur in three forms: cutaneous (skin), inhalation, and gastrointestinal. Here the disease has manifested itself as a cutaneous ulceration, which has begun to turn black, hence the origin of the name “Anthrax”, after the Greek name for coal. This photo comes from the Centers for Disease Control and Prevention’s Public Health Image Library (PHIL).
A b o u t t h e Au t h o r Dave McIntyre, PhD is VP for Academic Affairs at the National Graduate School, and a Visiting Fellow at both the Homeland Security Institute and the WMD Center. He is co-editor with Bill Hancock of the book Business Continuity and Homeland Security, recently released by Edward Elgar.
RICIN Ricin is derived from the commonly found castor bean, which comes from the castor plant, Ricinus communis. It is a highly toxic, naturally occurring protein which is sometimes used as an agent of bioterrorism. A dose as small as a few grains of salt can kill an adult. Spring 2012
Inside Homeland Security®
29
Article
TSA A n t i - t e r r o r i s m
TSA’s Highway Anti-Terrorism Program Helps Foil Hijacking and Bomb Plots By TSA Highway and Motor Carrier Security Specialist Mark Messina
30
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
Many think of the Transportation Security Administration (TSA) as the individuals in our airports who prepare us for screening prior to boarding an aircraft; however, with over 200,000 trained First Observers™ contributing to recent success in foiling a February 2011 motorcoach hijacking and a Texas bomb plot linked to terrorism, the Administration’s eyes are clearly focused on the road.
F
irst Observer is the anti-terrorism domain awareness program created by TSA’s Highway and Motor Carrier (HMC) Division to train highway professionals to accurately observe, assess, and report terrorist behavior. The TSA believes First Observer has widespread highway mode application and is a low cost, easy to implement force multiplier. Recent success stories such as the foiled hijacking of a Greyhound motorcoach traveling between Arlington, VA and Durham, NC and the disruption of a Texas bomb plot targeting former President George W. Bush and power plants throughout the West Coast, validate HMC’s belief. Headlines around the time focused on Super Bowl XLV festivities and HMC jumped into the action by training 1,200 new First Observers at or near Cowboys Stadium. Following Green Bay’s victory over Pittsburgh, only minor incidents, with no nexus to terrorism, were reported to the 24-hour First Observer Call Center. The motorcoach hijacking, attempted two days prior to kick-off, did not receive much press amid the hoopla surrounding America’s premier sports extravaganza. Boarding a Greyhound motorcoach bound from Arlington, VA to Raleigh, NC with 35 passengers onboard, alleged hijacker Jose Darwin Flores, 32, of Arlington, VA, approached the driver with a handgun and took control of the bus, according to Warren County, NC, Sheriff Johnny M. Williams. Southbound on Interstate I-85, along the Richmond, VA and Raleigh corridor, Flores told the driver to pull over near exit 223. There, 33 terrified passengers were
877.219.2519
www.abchs.com
allowed to leave the bus while two passengers remained;—one hid in the back of the motorcoach and the other would not leave the driver alone to face the hijacker. Upon release at the exit, many of the passengers contacted police. Flores then forced the driver, a Carey, NC veteran motorcoach operator receiving Greyhound and TSA training when she joined the company, to continue down the road. Following many of the lessons presented in her TSA/First Observer training, she remained calm and convinced the driver she could not continue the trip if she were not allowed to use a restroom. Agreeing to her request, Flores allowed the driver to pull over at a local Sunoco gas station where she and both remaining passengers exited to use the rest room, leaving Flores alone on the bus. Shortly afterward, sheriff deputies, alerted by released passengers, stunned Flores after he refused to leave the bus and took him into custody.
FOILED - Alleged Greyhound bus hijacker Jose Darwin Flores sits behind bars after a TSA First Observer trained driver used her skills to thwart the crime. (Photo Credit: Warren County Sherriff’s Office)
Spring 2012
Inside Homeland Security®
31
A Dallas, Texas home of President George W. Bush was one of many potential targets of alleged terrorist Khalid Ali M Aldasawari, a 20-year-old Saudi student living in Texas. (Bruce Maxwell/MCT)
Today, Flores is in the Warren County Detention Center, held on a $30-million bond and faces multiple kidnapping charges. The Greyhound driver, a mother of three with previous school bus driving experience, credits her TSA training and years of experience for her success: “I tried to keep everything calm and convinced him it would be easier to proceed if we had less passengers and commotion. I explained we had too many babies on board for this to succeed and I could concentrate better if we let passengers off the bus.” Similar TSA training led to the February 2011 FBI bust of Khalid Ali-M Aldawsari, a 20-year-old Saudi student studying in Texas.
the Con-way employee realized something “just didn’t look right” when the chemicals passed through the Lubbock hub. Based on the nature of the chemicals shipped and inconsistency regarding the intended use of the chemical, provisions in Con-way’s incident management program triggered a DHS/TSA notification plan. Reacting to reports, the FBI gained entry into Aldawsari’s apartment on Valentine’s Day and found, according to the complaint, “concentrated sulfuric acid, concentrated nitric acid, lab equipment, to include beakers and flasks, wiring, Christmas lights, the HAZMAT suit and clocks.” All of those, the government alleges, could be used to make an improvised explosive device. First Observer trains security professionals The FBI arrested and sometimes the general public how to detect Aldasawsari February 23, 2011 and possible terrorist behavior and report it. charged him with the attempted use Aldawsari was charged with attempting of a weapon of mass destruction. to bomb nuclear power plants and dams “This arrest demonstrates the importance along the West Coast and the home of of vigilance by the public and the willingformer President George W. Bush. An ness of companies to ask questions and employee of Con-way Inc., Ann Arbor, notify authorities when they encounter susMichigan-based transportation and logis- picious activities,” said James T. Jacks, U.S. tics service provider with a hub in Lubbock, Attorney for the Northern District of Texas. TX, quickly initiated the process alerting This same vigilance and notification local law enforcement personnel and the process is the heart of the First Observer FBI to a shipment of Phenol, a chemical program. used in homemade bomb manufacturing. First Observer motorcoach security and Following First Observer principles rolled cargo modules used by the Greyhound out to Con-way associates under the pro- driver and the Con-way logistics associgram’s previous “Highway Watch” moniker, ate clearly define processes enabling users 32
Inside Homeland Security®
Spring 2012
to non-confrontationally and accurately observe, assess, and report terrorist and criminal activity. Eleven training modules endemic to the program cover all national highway modes such as infrastructure, trucking, cargo, HAZMAT, school bus, motorcoach, parking structures, highway workers, port authority operations, vehicle rental, and leasing and law enforcement industries and organizations. “One thing we’d like to stress,” First Observer CEO Charles Hall said, “is we train users to be vigilant reporters but we’re not a substitute for dialing 9-1-1 during an emergency, nor are we attempting to replace an organization’s emergency communications program. Should anyone observe a terrorist or criminal act, dialing 9-1-1 is the first course of action.” “What First Observer works toward is ensuring SOMEONE is in a position to identify and positively act on suspicious activity when it occurs. First Observer trains security professionals and sometimes the general public how to detect possible terrorist behavior and report it. It’s a security empowerment program. It affords a safe opportunity for a trained First Observer to become a trusted agent in our fight against terrorists and criminals,” Hall added. Many Armed Forces commanders may find First Observer to be a cost-effective and time-saving approach to reducing troop and materiel movement risk along the global highway modes. Following the killing of two United www.abchs.com
877.219.2519
States Air Force service members at the Frankfurt, Germany International Airport, it became clear that recent success in training the NFL, NASCAR, MLB, and large metropolitan areas such as the Detroit Central Business District (casinos, colleges, universities, hospitals, entertainment venue, and professional sports) could also serve the Department of Defense (DOD) to protect service members and civilian employees associated with troop and material logistics. In the case of the Frankfurt shootings and similar incidents, “red flags” indicating the possibility of an attack existed which, if detected by a trained observer, may have prevented the attack or mitigated the loss. At Frankfurt, it is likely the attacker, Arid Uka—a 20-year-old Kosovo citizen living in Frankfurt—“flagged” his action as he initiated and completed target selection, surveillance, and security elicitation processes associated with terrorist or active shooter attacks. As detailed in First Observer and many similar counter-surveillance programs, when a user is trained to observe, assess and report these flags or suspicious situations, the reporting and subsequent follow-up process can often disrupt the sequence or “chain” of events leading to an attack. According to the Department of Homeland Security (DHS) and TSA security experts, when links in a terrorist targeting process break, it is likely the attack will be aborted. First Observer also trains participants to identify these links in the terroristtargeting chain, and illustrates to trainees how timely, accurate reports break the chain and reduce risk. At a recent meeting with the DOD Force Protection Working Group (FPWG), HMC security specialists detailed how the program could be used to quickly and easily train military and DOD civilian transportation personnel and integrate the program into existing training doctrine. The question, “could First Observer training have prevented the Frankfurt shooting or similar attacks?” is often posed to HMC security specialists. The short answer, according to the TSA, is perhaps not; however, the Administration knows awareness of the events leading to an attack on a target such as a military motorcoach will heighten after training. Considering the HMC division is receiving an increased 877.219.2519
www.abchs.com
HMC is receiving an increased number of intelligence reports suggesting motor coaches and school buses are becoming attractive targets and weapons for terrorists, so heightened awareness is critical for reducing risk. number of intelligence reports suggesting motorcoaches and school buses may be becoming attractive targets and weapons for terrorists, heightened awareness is critical for reducing risk. Keeping the training time and cost manageable was another part of the TSA training strategy. At a time when every government, public, and private sector agency or organization is “doing more with less,” First Observer training is provided at no cost to stakeholders. Most First Observer training is online (www.FirstObserver.com), but TSA knows the most effective training is classroom-based. That’s why First Observer offers “Train the Trainer” sessions as a significant part of the curriculum. On site and webinar training opportunities exist and are based on specifics of the group; high-level, direct training is available as well. Until now, training was optional for domestic motorcoach and over-the-road bus (OTRB) operators. The 9-11 Act, however, requires OTRB operators to provide antiterrorism domain awareness training such as First Observer to its frontline employees. TSA is currently preparing a rule requiring training of specific passenger carriers. With this requirement in mind, at its presentation to the FPWG, TSA asked the group to consider recommending a DOD acquisitions policy change requiring TSAapproved security awareness training of any motor carrier, bus, or truck wishing to do business with the DOD. Similarly, private contractors conducting safety inspections of commercial motor carriers prior to the award of DOD contracts can be commissioned to review the carrier’s comprehensive security plan. Created to serve the highway mode, TSA found the dynamic message First Observer delivers strikes a welcome chord off the road. After launching the program at Super Bowl XLV and the 2011 Daytona 500, NASCAR asked HMC to launch the Spring 2012
Inside Homeland Security®
33
Photo Credit: Ken Durden/Shutterstock.com
After launching the program at Super Bowl XLV and the 2011 Daytona 500, NASCAR asked HMC to launch the program at all of its affiliated tracks and facilities. program at all of its affiliated tracks and facilities. In Detroit, HMC and City of Detroit Central Business District (DCBD) executives utilized the same First Observer module to train professionals associated with parking structures and lots in and around the city and at major airports. Choosing the Detroit-metro area as a pilot to launch the program was an easy choice for HMC. Having worked with security leaders in the area during Super Bowl XL, the 2006 MLB All-Star Game, and at various emergency management exercises throughout the city, members of HMC had firsthand knowledge of concerns associated with large parking facilities and lots. “We’ve been interested in learning more about First Observer for some time and it was a great opportunity to work with HMC and the TSA to add this training to our current program,” said Ilitch Holdings Vice President – Corporate Security and Parking Operations Richard Fenton. Fenton is not only responsible for all security operations, plans, and policy for the Detroit Tigers and Red Wings but he is also the chief executive in charge of security services for the entire Ilitch Holdings Corporation which includes the Little Caesars Pizza chain and its large, international trucking component. “We believe this training not only benefits Ilitch Holdings but has potential to help the entire Detroit Central Business District as well. It can be a security team
multiplier at the ground level,” Fenton added. At Super Bowl XLV, Gameday Management Group Vice-President of Event Operations Cristine Paull, echoed Fenton’s comments after TSA trained NFL transportation professionals. “This is a great program and it was exciting working with HMC and the TSA to train the people charged with delivering Super Bowl transportation to our clients. First Observer training feedback from our associates was overwhelmingly positive. The training really complimented the plans Gameday Management Group had in place to make this Super Bowl one of the best ever,” Paull said. “This is a government program that not only allows HMC to form true partnerships with other public and private sector highway security professionals but it’s one that makes sense and is easy to integrate into existing security plans and operations.” stated HMC General Manager William H. (Bill) Arrington. Responsible for TSA oversight and administration of the First Observer program, Arrington knows public and private sector security partnerships, along with the possibility to team with the DOD to create a TSA and Armed Forces training coalition creates value for both sides. “Not only do we have a mission to protect the nation’s highway modes and the free travel of citizens and commerce but overarching DHS and TSA goals require us to focus on strengthening the Department and the Administration through solid partnerships and outreach programs,” Arrington notes.
“The possibility of sharing TSA resources with DOD in an effort to protect our troops as they travel on highways across our nation and throughout the world will result in development of united security teams trained to quickly detect signs of terrorism and report it through chains of command and emergency communications networks. If we report quickly and accurately, we may be able to disrupt the attack process and defeat the attack before it’s initiated,” Arrington added. “By continuing to develop and grow nocost programs such as First Observer which are embraced by our stakeholders, we’ll not only achieve many of our overarching national security goals but terrorists will quickly realize hundreds of thousands of trained observers are out in the field ready to detect and report their activity,” Arrington concluded.
A b o u t t h e Au t h o r MARK MESSINA, TSA Highway and Motor Carrier Security Specialist, is responsible for developing programs, plans and processes designed to protect the nation’s highways and highway infrastructure. Mark is the DHS/ TSA point of contact for the First Observer™ program and the motor coach industry. Prior to joining TSA, Mark directed the Chrysler Group LLC emergency management division, led 105 global first responder teams and held executive level manufacturing, engineering and logistic/ supply positions at the company. Mark served as an Operations Manager at the City of Detroit Emergency Operations Center and led commands and small units in Desert Storm and Grenada as an Army Airborne and RANGER trained Field Artillery major. Prior to his selection for Army Officer Candidate School, Mark served as a combat journalist.
Commanders, DOD civilian associates, and other security professionals interested in learning more about the First Observer program and how it can be modified to fit diversified training missions can email TSA’s Highway and Motor Carrier Division at highwaysecurity@dhs.gov. Those interested in becoming a certified First Observer at no cost are encouraged to enroll in the program at the First Observer website (www.FirstObserver.com). Additional information about First Observer and the HMC mission is found on the HMC website (www.tsa.gov/highway). 34
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
Infrastructure Protection
By Shawn J. Vandiver, CHS-V, CDP-I, SSI
Maintaining
Tacit Knowledge: C o n ti n u o u s I m p r o v e m e n t i s t h e K e y Hello and Happy 2012 everyone! This quarter we are going to discuss Chapter 6 of the National Infrastructure Protection Plan (NIPP). This chapter is titled “Ensuring an Effective, Efficient Program Over the Long Term.” I conducted my graduate thesis on the status of critical infrastructure protection education in the U.S. and became intimately familiar with this portion of the NIPP. The three key facets covered by this chapter are generating skilled human capital, developing high-tech systems, and building public awareness. We are going to stick with the first and last facet for this quarter’s column. The Department of Homeland Security has learned many lessons over time. Building sustainable programs allows them to maintain tacit knowledge within the field of infrastructure protection. Tacit knowledge is defined as “That knowledge which is not written down but has been learned through time and experience.” When that knowledge is lost, information gaps tend to occur. The way to ensure that the tacit knowledge is widely distributed throughout owners, operators, and other stakeholders in the field is through a comprehensive training and exercise program, working in conjunction with partnerships with the private sector and academia. The first step in this process is to build national awareness. DHS, in conjunction with the Sector Specific Agencies and other public and private sector CIP partners, is responsible for implementing a comprehensive national awareness program that focuses on developing an understanding of a critical infrastructure all-hazards risk environment, and encourages actions that support the sustainability of critical infrastructure protection, investments, and risk management initiatives. The objectives of that awareness program include the following: • The incorporation of critical infrastructure protection and restoration considerations into business planning and operations, including training and education programs, across all levels of government and the private sector; 877.219.2519
www.abchs.com
• Support public and private sector decision-making, enable relevant and effective strategic planning for critical infrastructure protection and restoration, and inform resource allocation processes; • Foster an understanding of: –– Critical infrastructure dependencies and interdependencies, and the value of cross-sector critical infrastructure protection and restoration planning down to the community level; –– Evolving threats to CIP as assessed by the intelligence community; and –– Efforts to address the threat environment and enhance protection, resiliency, and rapid restoration to normalcy. Since the NIPP was released in 2009, DHS has undertaken several other national awareness campaigns. My favorite program is the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI). The NSI is actually funded by the Department of Justice, with a senior liaison from DHS Office of Infrastructure Protection detailed to help coordinate efforts. NSI is a program that encourages law enforcement and citizens at the individual, local, state, federal, and tribal levels to report suspicious activity. Without getting too far into the NSI, my favorite part about the program is that DoJ and DHS, along with their other federal partners, consulted with the ACLU when developing and implementing the program. By consulting with the ACLU, the agencies and departments showed that they wanted to ensure that the American public retained all of their civil rights while simultaneously working to protect and track potential terrorists and criminals. The NIPP establishes a framework to foster development of tacit knowledge across the breadth of the field. That framework is called the continuum of CIKR Capability Development and consists of 5 blocks: 1. Outreach 2. Awareness 3. Education 4. Training 5. Exercises Spring 2012
Inside Homeland Security®
35
How do I develop all of these competencies so I can become an effective, efficient, and upwardly mobile member of my critical infrastructure protection program team? Parts of the outreach and awareness blocks include press releases, marketing materials, and briefings. DHS, and the agencies under the DHS umbrella, even have text messaging services to update individuals on various items. Just today I received a text containing a press release about DHS and DOD announcing a continued partnership at the border. This service is one of the best ways for anyone with involvement in law enforcement or homeland security to stay abreast of the latest news in the field. The education and training blocks include general awareness/understanding modules (IS-860), webinars, academic and research programs, professional continuing education (like the Critical Infrastructure Protection course that will be released by ABCHS/ABCIP in the coming months), and competency-based skills training courses. Of note, DHS is not responsible for developing all of these courses, but encouraging the development and offering knowledge to those developing products. The objectives of NIPP-related training and education programs are to: • Provide an integrated, coordinated approach to NIPP and CIKR-related education and training that energizes and involves all partners; • Develop and implement grassroots education and training programs that communicate effectively with key audiences; and • Maximize coordination, deepen relationships, and broaden the participation and practices required for implementing the NIPP and the SSPs. Core competencies are also included in the NIPP. The U.S. Office of Personnel Management (OPM) defines a competency as “a measurable pattern of knowledge, skills, abilities, behaviors, and other characteristics that an individual needs to perform work roles or occupational functions successfully.” The Critical Infrastructure Competency Areas are as follows: • Risk Analysis: –– Perform accurate, documented, objective, defensible, transparent, and complete analyses. –– Support executive and managerial decision-making related to CIP. • Protective Measures/Mitigation Strategies: –– Establish critical infrastructure protection program goals and objectives based on risk analysis and risk-reduction return on investment (ROI). The ROI is what executives care about. “How is this benefitting my bottom line?” –– Plan, develop, and implement critical infrastructure projects, measures, and activities. Take advantage of existing, emerging, and anticipated methods and technologies in order to develop effective strategies, projects, and activities. 36
Inside Homeland Security®
Spring 2012
–– Implement continuous feedback mechanisms. (Continuous improvement process CIP) is a buzzword for constantly bettering your business, programs, etc.) • Partnership Building/Networking: –– Understand the roles and responsibilities of all partners. –– Establish mechanisms for interacting with partners and exchanging information and resources (including best practices). • Information Collection & Reporting (Information Sharing): –– Use systems, tools, and protocols to collect, analyze, organize, report, and evaluate information. –– Communicate and share information with sector partners at each tier of governance, including sector-specific, across sectors, and within the private sector. • Program Management: –– Establish sector-specific or jurisdictional critical infrastructure protection goals and plans. –– Identify and prioritize projects, strategies, and activities for a sector or jurisdiction. –– Manage a program on a schedule, within budget, and in compliance with performance standards. –– Design and implement continuous feedback mechanisms (Continuous Process Improvement again) at the program level. –– Develop and implement critical infrastructure protection training plans. • Metrics and Program Evaluation: –– Define and establish CIKR metrics based on goals and objectives. –– Establish data collection and measurement plans, systems, and tools. –– Collect and analyze data. –– Report findings and conclusions. • Technical & Tactical Expertise: –– This area is sector-specific and includes competencies requires to plan, implement, and evaluate technical and tactical activities, measures, and programs. So, the next logical question is, “How do I develop all of these competencies so I can become an effective, efficient, and upwardly mobile member of my critical infrastructure protection program team?” Within the NIPP, on page 83, Figure 6-2 provides a visual representation of the CIKR competency areas (listed above), audiences, and methods of training delivery. The idea is to ensure that each block in the visual representation is filled. The five methods of training delivery that the image lists are: 1. Awareness 2. College-level courses 3. Skills Development 4. Exercises 5. Job Aids/Tools Numbers 3-5 on the list also include gaining that tacit knowledge that I mentioned above through working with those more experienced than you in your office, or interacting with them at conferences, training events, or classes. Most things in the world www.abchs.com
877.219.2519
)
l
-Specific
(Sectortica
hn Experical & tise Tac
Tec
tr Eva ics & lu Progr ati on am
Me
Ma
na ge
me
nt
)
am Progr
t Mi ec tiv tig e Me De atio as velop n S ures t me rateg / nt ies Pa rt n Ne ersh tw or ip Bu kin il g din g/ Infor & R mat epor ion tin Colle g (info ct io sharingn
Pro
kA Ris
Audiences
na
lys i
s
cikr competency areas
State, Local, Tribal, & Territorial Government Officials DHS IP Personnel
SSA & OFA Personnel Job Aids/Tools Exercises Owners & Operators
Skill Development College-Level Courses Awareness
Adapted from Chapter 6, Figure 6-2, of the National Infrastructure Protection Plan (NIPP).
do not require reinventing the wheel. Collaboration and information sharing promote continuous process improvement and can help make you and your colleague’s job much easier.
Conclusion All of the information presented in this column is contained within Chapter 6 of the NIPP. Additionally, I highly encourage the use of social media to help strengthen your network of critical infrastructure professionals. Most professionals in this business are willing to help; all you need to do is ask. Whether you work in local, state, federal, or tribal law enforcement; public or private sector infrastructure protection; emergency management; or any other facet of infrastructure protection, it is important that you build and strengthen your network. That’s all for now, next quarter we will discuss another important facet of infrastructure protection. Until then, take a look around at the critical infrastructure around you and see if you can take note of the protective measures around it. If you work in the industry, think about Continuous Process Improvement and how you can incorporate it into your infrastructure protection program.
Collaboration and information sharing promote continuous process improvement and can help make you and your colleague’s job much easier. 877.219.2519
www.abchs.com
Training Delivery
a b o u t th e a u tho r Shawn J. VanDiver, MS, CHS-V, CPP, CTT+, SSI, CDP-I, CMAS, CAS-PSM, holds the rank of Petty Officer First Class in the United States Navy, operating in support of the Global War on Terror and the War on Drugs and providing sailors in his unit with force protection and anti-terrorism training. He previously served as the Assistant Emergency Management Coordinator for Center for Surface Combat Systems Detachment West, located in San Diego, as well as the lead CPR Instructor, Assistant Safety Officer, and HAZMAT Coordinator for his division. VanDiver spent several months working for the County of San Diego Office of Emergency Services, providing critical disaster preparedness information to and developing relationships with military families in the San Diego area. He also managed the Naval Support Activity South Potomac EOC during hurricane Irene and major flooding response activations. VanDiver attended National University and earned a Master of Science degree in Homeland Security and Safety Engineering and a Bachelor of Science degree in Domestic Security Management (with a minor in criminal justice) in 2011 and 2010, respectively. Currently, he is serving aboard USS CHANCELLORSVILLE (CG-62) as well as holding adjunct faculty positions at two universities. VanDiver is a charter member of the American Board for Certification in Infrastructure Protection and holds several homeland security and anti-terrorism certifications. He has a 3 year old son, Ryan, who would like to be a pirate or a rock star when he grows up. Spring 2012
Inside Homeland Security®
37
Feature
TSA PRES C REENING PROGRA M
TSA Pilot Program:
Prescreening Moves Forward By: Ed Peaco, In s ide Hom elan d S ecu r i ty ®
Frequent travelers surely will be pleased that the Transportation Safety Administration (TSA) is expanding its pilot program to expedite airport security by prescreening qualified flyers.
W
hile passengers may view this initiative as a public service, TSA’s purpose is twofold: to provide security that is more effective and more efficient. By prescreening certain flyers, this arm of the Department of Homeland Security can focus on other passengers who are more likely to pose a risk to transportation.
Individuals who are accepted into the program, called TSA Pre™, will be eligible to skip such procedures as: • Taking off shoes • Removing the 3-1-1 compliant bag from carry-on • Removing a laptop from a bag • Taking off light outerwear, jacket, and belt Since October 2011, TSA has been offering qualified flyers the opportunity for expedited screening at selected checkpoints. The pilot program involves two airlines, Delta and American, and five airports: Atlanta, Dallas, Detroit, Miami, and Las Vegas. TSA has announced plans to expand the program to the international airports of Minneapolis, Salt Lake City, Los Angeles, and John F. Kennedy in New York. The program also has as a partner the U.S. Customs and Border patrol (CBP). Qualified people who want to opt into the program must supply personal information that will be used to assess their risk. Those who are accepted will become eligible for expedited screening but are not assured of it, due to TSA’s practice of always using random and unpredictable security measures.
38
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
Online resources
TSA’s prescreening pilot program: http://www.tsa. gov/what_we_do/escreening.shtm TSA’s Secure Flight Program: http://www.tsa.gov/ what_we_do/layers/secureflight/index.shtm Applying to CBP Trusted Traveler programs: http:// www.globalentry.gov
Scope of the program
Who may participate
When the pilot initiative began operation, TSA Administrator John S. Pistole said it represented a step forward in providing effective, efficient security. “By learning more about travelers through information they voluntarily provide, and combining that information with our other layers of security, we can focus more resources on higher-risk and unknown passengers,” Pistole said. “This new screening system holds great potential to strengthen security while significantly enhancing the travel experience whenever possible for passengers.”
In general: Eligible travelers are drawn from a pool of the program’s partners. American and Delta frequent flyers are eligible, as are certain members of the CBP Trusted Traveler programs who are American citizens. The CBP programs include Global Entry, SENTRI, and NEXUS. Interested travelers who are not eligible through their airlines and are not Trusted Traveler program members may opt in by applying to join one of the CBP programs. Frequent flyers on American and Delta: These airlines have contacted eligible flyers, who then may ask to opt into the initiative. Once travelers are accepted, the airlines identify the individuals as participants when submitting reservation information to TSA’s Secure Flight system. This system is dedicated to improving air-travel security through enhanced matching of watch lists. CBP Trusted Travelers: These participants will enter their CBP-assigned PASS ID number in the “Known Traveler Number” field when booking travel reservations. Additionally, CBP Trusted Traveler participants can add their PASS ID number to their AAdvantage® or Delta member profile to have the number automatically sent to TSA when booking reservations. Approved Trusted Traveler flyers are automatically qualified to participate in the program.
Through 2011, the pilot program operated at these checkpoints: • Atlanta: T-South Checkpoint (Delta only) • Dallas: Terminal C, Checkpoint C30 (American only) • Detroit: Checkpoint 2 on the ticketing level (Delta only) • Miami: D2 Checkpoint (American only) • Las Vegas: D Gates First Class Checkpoint (American and Delta) TSA plans for expansion this year include these measures: • Adding Delta out of Minneapolis and Salt Lake City • Adding American out of Los Angeles and John F. Kennedy in New York • U.S. Airways and United Airlines will offer TSA Pre™ to eligible passengers.
Prescreening details
Due to security concerns, TSA does not provide details about background checks and screening procedures, other than to state that those who opt in must volunteer information that will be used in risk assessment. Once individuals are approved, they As an indication of the pilot program’s will be pre-screened each time they fly; popularity, U.S. Senator Bob Casey, Dem- they will not have a credential or memberocrat of Pennsylvania, in a December 21, ship card to show they have been cleared 2011, statement, called upon the TSA to for expedited screening. Participants will not know in advance bring the program to Philadelphia and that they have been cleared for expedited Pittsburgh international airports. “We must do everything we can to keep screening. An eligible passenger’s boarding air travel safe, reliable and efficient,” he pass will have TSA prescreening informasaid. “Bringing TSA’s pre-screening pro- tion embedded in the barcode. TSA will gram to Philadelphia and Pittsburgh read the barcode at designated checkInternational will do just that.” The pilot points, and the passenger may be steered program would make Pennsylvania a more to an expedited screening lane. Approved participants may choose to opt attractive travel destination and boost the out of the program. They will encounter state’s economy, he said. standard TSA screening.
877.219.2519
www.abchs.com
Spring 2012
Inside Homeland Security®
39
Emergency Management
By Michael J. Fagel, PhD, CHS-IV, CEM
Food Vulnerability From the Farm To the Fork With the recent outbreaks of food threats, as well as some of the largest product recalls in recent history, what can emergency managers learn about the food supply in their community? As we all know, all disasters are local, and food safety is no different. As you scan your community for food facilities, you need not look any further than your grocery store, restaurant, sports venue, college campus, or school lunch program. Our food supply is one of the safest in the world, thanks to good manufacturing practices, responsible producers, and the regulatory agencies that have oversight into the manufacturing of product. A lot of the emergency managers/homeland security people that I speak with do not believe that food threat is a problem in their community. Stop and take a look at what actually is in your community. Schools, hospitals, nursing homes, higher education, county fairs, food festivals, shopping mall food courts, and of course food stores, warehouse clubs, and the myriad of eating and drinking establishments that are everywhere. 40
www.abchs.com
877.219.2519
Knowing that these establishments are in or near your community is important for you to know. As raw materials are harvested from farms and ranches, they are transported to processing facilities. The vulnerabilities that can be exploited at food processing facilities will be featured in an upcoming article. From finished products to a warehouse and distribution network, we then find delivery to those facilities mentioned above. As you look around, you will see more of these food-consuming establishments through a different filter. As we teach food threat risk, we often use the phrase, “Food at rest is food at risk” and that really is a key element for your understanding of the continuum mentioned earlier. At every step of the process, we have risk from various areas of intentional or accidental product tampering or “adulteration,” which is a regulatory term for a food product that is not deemed fit for human consumption. A disgruntled employee may have numerous opportunities for mischief and mayhem. Let us also think about a former employee, co-worker, or someone interested in “proving their point” about the organization or supplier. Additionally, manufacturing and transportation are just a few elements of this equation that must be scrutinized. Warehousing and delivery to the next point of use may also be an area for concern. Trucks moving product from manufacturing to eventual facilities may move product an average of 1,100 miles to their next stop. Distribution to the eventual final preparation area may be from trucks that pick up numerous deliveries or “stops” as the product makes its journey from farm to fork. Up to this point, most foodstuffs have been prepared under the watchful eye of either the USDA (United States Department of Agriculture) if it is a “protein” product, or under the FDA (Food and Drug Administration) if it is not protein (Common items may include cereals, grains, and vegetables). Interestingly enough, some products may fall under joint regulatory scrutiny. For example, a cheese pizza may have inspections and oversight from the FDA, while the same pizza with sausage added now falls under jurisdiction of the USDA jointly. Also of note, an egg in the shell is regulated by one agency, then, when the egg is no longer a “shelled” product, the jurisdiction changes. Take a look at the USDA.gov or FDA.gov websites to determine which agency has jurisdiction of which products. It may surprise you. Once the product leaves the distribution warehouse and heads to the restaurant, hospital, or other establishment, its journey may take several more stops along the way. Finally, it gets to the store or similar location for preparation and delivery to the eventual consumer, you, or your family. During any of the steps listed above, we may have the risk of intentional or accidental disruption of product integrity. At first contact with an event, the public health department may be contacted. The EMS systems may get overwhelmed from a “spike” in calls that are not quite normal. Television crews converge on the community, and all of a sudden your community is in the spotlight. Emergency Operations Centers (EOC’s) may be set up by the local agencies and departmental operational centers may be stood 877.219.2519
www.abchs.com
up. Then the community or organization’s leaders are pulled in several directions at once. Emergency management and homeland security offices are called into play and the tempo increases. We are now in our important roles of coordination, communication, and liaison with the agencies, the public health community, and the consumers, as we will be put into full swing. As emergency planners in homeland security operations, we are available to help our partners in time of need, because that is what we do. This is why it is important to reach out and make those contacts now before an event occurs.
A b o u t t h e Au t h o r Michael J. Fagel, PhD, CHS-IV, CEM has served in the food industry for nearly four decades in corporate risk and safety. He serves as a critical infrastructure Homeland Security Analyst at Argonne National Laboratory. Dr. Fagel was the corporate safety and security manager for a food processing firm, which took him to many states as well as international venues. He serves as an instructor at Northwestern University, Northern Illinois University, and the Benedictine University Public Health Program, LSU’s National Center for Bio Medical Research and Training, and Eastern Kentucky University. He also serves as a presenter and project advisor to Fox Valley Technical College in Appleton, Wisconsin. Dr. Fagel’s second textbook in his Principles of Emergency Management series published by CRC Press (www.crcpress.com) Principles of Emergency Management was published in December 2011. His first textbook, which was on Food Safety Law, was published in 1996. Dr. Fagel can be reached at Michael.Fagel@Gmail.com for more information on food security. Additionally, you can learn more abour Dr. Fagel by visiting his website at: www.aurorasafety.com
Spring 2012
Inside Homeland Security®
41
C h a p l a i n s e rv i c e s
QA
Feature
Emergency Services Chaplain Training SEMINAR
with Chaplain
Robby Jernigan
On October 26th and 27th of 2011, Chaplain Robby Jernigan organized an Emergency Services Chaplain Seminar in Springfield, Missouri, co-sponsored by the Assemblies of God National Chaplaincy Office and the Assemblies of God Theological Seminary. After the training concluded, Chaplin Jernigan was kind enough to answer a few questions about the experience and discuss the upcoming events and training opportunities. How do chaplains/future chaplains benefit from your emergency services program? The students in this class take away a wealth of knowledge about practical ways to serve as a chaplain in an emergency services department. Our classes highlight best practices and advise chaplains on providing ministry to first responders and citizens in both emergency and non-emergency situations. Students obtain knowledge of terms and concepts, equipment, tools, ministry interventions, and general do’s and don’ts. In the class, both instructors and students shared personal stories of actual field experiences. For each story, students describe the actions taken to improve the situation and how they dealt with the challenges they were faced with. Another major benefit to the student is the relationships they developed with their instructors and fellow students from across the country. We encouraged them to maintain and grow these new relationships. The students received an education from an exposure to a wide variety of educational methods. Students were given an opportunity to see ministry interventions acted out and discussed in the classroom. In addition, they were given a chance to practice these ministry interventions with each other. Students were given the opportunity to “experience” a crisis event—the sights, sounds, smells, and feelings—in a safe and controlled setting. Another “take away” was that each student had a chance to share, revisit, and reconsider some of their past traumatic life experiences and
42
Inside Homeland Security®
Spring 2012
www.abchs.com
877.219.2519
Visit www.emergencychaplains.org to learn more about our online chaplain training courses.
Students were given the opportunity to “experience” a crisis event—the sights, sounds, smells, and feelings—in a safe and controlled setting.
request feedback from their classmates and instructor. This exercise helped put these experiences in perspective, in light of their current or future ministry as a chaplain. Students shared traumatic life experiences, ranging from childhood traumas to combat related events.
Who are your students? Our training is specific to individuals who already serve as, or plan to serve as, an emergency services chaplain. We include people who serve as an active chaplain in various settings. The purpose for our training is to prepare chaplains with an evangelical Christian perspective. However, we do accept students from various backgrounds, especially those who are currently serving as a chaplain in an emergency services agency. In our October Emergency Services Chaplain Seminar we had 20 students participate. In addition, we had a for-credit seminary class, consisting of eight students, 877.219.2519
www.abchs.com
In our online training, we have approved students from the following faith traditions: Church of Christ, Baptist, Catholic, Lutheran, Presbyterian, Methodist, Church of God in Christ, Church of God, Charismatic, Assemblies of God, and many more. Our goal is to be inclusive and provide effective and beneficial training to the individuals who make the self-sacrificing decision to serve as a chaplain for their country and for their community.
join us periodically during our two days. During the field training exercise—a simulated violent flash mob—we had approximately 100 participants and observers.
What were the primary topics covered in the seminar? This particular course was open to any individual serving as a chaplain in fire, law enforcement, EMS, emergency dispatch, or to those who felt that God was calling them to serve as a chaplain in these areas of service. Our training is a great way to begin the journey of a chaplain. In this course, as well as future courses, we welcome pastors, associate pastors, mature lay leaders, and existing emergency services chaplains. The topics covered were beneficial to all types of individuals serving as a chaplain. The issues and areas we addressed included: • History & Basics of Chaplaincy • Introduction to Emergency Services • Ministry to a Suicidal Subject • Psychological First Aid
• Ministry on an Emergency Scene • Developing Departmental Standard Operating Guidelines (SOGs) • National Incident Management System (NIMS) • Critical Incident Stress Management • Emergency Services Funerals • Death Notifications • Chain-of-Command • Field Training Exercise—Simulated Violent Flash Mob • Ethics & Self-Care
What are common misconceptions about chaplains and the role they play? One of the greatest misconceptions is that the only time a chaplain is needed is when someone dies. More accurately, chaplains often play a vital role ministering to first responders and citizens who experience a major crisis. Another major misconception is that all a chaplain does is “push” religion. A well-trained, effective chaplain is there Spring 2012
Inside Homeland Security®
43
A chaplain’s duty is to do whatever they reasonably can to make the situation better for those affected. in times of crisis to provide “a ministry of presence.” A chaplain’s duty is to do whatever they reasonably can to make the situation better for those affected. Making it better, or easing the burden, might include getting someone a cup of cool water, finding a blanket to keep them warm, offering basic words of encouragement, or simply extending a hand to hold or placing an arm around their shoulder. Chaplains also take part in funeral services, offer counseling, recommend literature and online information, and are available to pray with individuals and families in
crisis. Sometimes what makes a situation better, especially on an emergency scene, is for the chaplain to say nothing. Effective and caring chaplains will do whatever is in their power to meet the felt needs of their ministry recipient, and there are times when this may mean simply walking away. Another misconception is that when a chaplain arrives on scene, someone is dead or is going to die. Much of the work of an effective chaplain is just “being there.” This responsibility can be met without words, and especially without preaching. Effective chaplaincy often means waiting until the ministry recipient asks the question before they give “the answer.” Our students are taught to avoid providing “the answer” before the question has been formulated in the mind and in the heart of the listener.
What are the upcoming events our readers may be interested in? We provide a variety of online chaplain
training courses available to students anywhere in the world. Interested individuals can learn more from our website, www. emergencychaplains.org. I also welcome them to contact Robby Jernigan at robbyj@ ipa.net, for information regarding qualifications for enrollment, or to ask about our program. We hope to make our October seminar an annual event. Next year, we plan to have the simulated field training exercise center around a natural disaster, a terrorist attack, or a multi-casualty incident. Anyone who is interested in learning more about our masters or doctorate degree programs is encouraged to contact the Assemblies of God Theological Seminary at 417.268.1000. Students are not required to be affiliated with the Assemblies of God to enroll in our classes or attend the seminary. Chaplains and future chaplains may be interested to know that the students who participated in the training this year represented the following faith traditions: Assemblies of God, Baptist, and Church of Christ.
ASC0112IHS
Are you protected against sabotage? Identify and prevent the greatest threat to government, military, and private sector organizations today.
Anti-Sabotage Certified, ASC
SM
American Board for Certification in Homeland Security
www.abchs.com
44
Inside Homeland Security®
Spring 2012
1.877.219.2519
www.abchs.com
877.219.2519
By David J. Fair, PhD, CHS-V, CMC
Chaplain’s Column
“There is an appointed time for everything under heaven and there is time for every event under heaven.” – Ecclesiastes 3:1
Know When to Say When
O
ne thing we known for sure: time marches on and things change, many times for the better. Someone once said the only thing that is certain is change. As a crisis chaplain I have worked the streets responding to rapes, murders, child abuse, horrific accidents, and a long list of tragedies. As a hospital chaplain I have been called to SID deaths, traumatic codes, massive heart attacks, and strokes. Serving as a Fire/Rescue/EMS Chaplain I have answered calls to towering infernos, drownings, car pedestrian accidents, lost children, and many other types of search and rescue. As a military chaplain I have delivered killed in action notifications, sat countless hours with our men and women returning from Afghanistan and Iraq, and even Vietnam veterans, many suffering from PTSD. For almost thirty years I carried a pager, then a cell phone. I have been on call sometimes 24 hours a day. Rain, snow, heat, it didn’t matter. If there was a call and my number was up I went. A few years before turning 65 I began to sense that my time on the streets was lessening, and that I would soon be spending more time mentoring, training, speaking, and writing about my experiences. A minister/counselor friend of mine said 20 years into his career, “I spent the first 10 years praying they would call me, and the next 10 praying they wouldn’t.” In our careers that touch homeland security, we sometimes need to follow the advice of a song by Kenny Rogers, “You gotta know when to hold them and know when to fold them.” Those of us who have spent years on the streets must know and understand when it is time to change hats. There is a time in life many of us can do more good teaching what we have learned to others.
877.219.2519
www.abchs.com
I was talking to an acquaintance the other day and he asked me, “Dave, what do you want next in life? What do you want to do? Where do you want to be?” I had to think about that for a while. My friend stated, “I want to finish strong.” What his words meant to me was that whatever he did in the field of chaplaincy, he wanted to finish strong. We are about the same age. I caught on to what he was saying. He had started strong. He had worked as a pastor, as a counselor, planted churches, and a number of other ministry-related matters. Yet following a stroke a few years prior, he realized that his priorities had to change. He would begin to mentor, and change the focus in some ways on his ministry. And even though there was going to be change he could still be strong, or in his words “finish strong.” I believe the key is to know when to make the change. Those of us who have served in law enforcement, fire/rescue, EMS, and military may have mandatory retirement ages. Some of us may not. But there comes a time in life that we can take the things we have learned, as my friend and I have, and pass them on to others. I think it is a worthy goal to say that no matter what stage of our career we are in, we all want to finish strong.
A b o u t t h e Au t h o r David J. Fair, PhD, CHS-V, CMC, is a member of the ABCHS Executive Advisory Board and chair of the American Board for Certified Master Chaplain (ABCMC). Fair is president and CEO of Homeland Crisis Institute and has served at dozens of disasters, including Ground Zero following 9/11, hurricanes Katrina and Ike, the NASA space shuttle disaster, the Fort Hood shootings, and the Haitian earthquake. Spring 2012
Inside Homeland Security®
45
Are You Prepared to Answer a Cry for Help?
CMC0112IHS
Certified Master Chaplain, CMC ® The American Board for Certified Master ChaplainsSM (ABCMC)
Coming Soon:
More Certificate Programs Medical Services Fire and Rescue Mental Health Emergency Hospice Hospital
Created by The American Board for Certification in Homeland Security, CHS®, the ABCMC is an educational-based, multidisciplinary, professional network of chaplains who support homeland security. ABCHS’s diverse membership includes over 200 specialty fields within the local, state, federal, and private sectors of the homeland security arena. Identified and recognized as chaplains with specialized expertise and experience, these active practitioners and professionals are committed to providing critically needed ministerial, psychological, and spiritual support and intervention services to homeland security fields and victims of crisis and traumatic events.
For more information, please call: 877.219.2519
By David L. Johnson, DABCHS, CHS-V
Dignitary & Executive
ABCDEP
Update
American Board for Certification in Dignitary and Executive Protection
T
he Advisory Board of the American Board for Certification in Dignitary and Executive Protection (ABCDEP) has achieved a major milestone toward establishing the first professional certification for dignitary and executive protection practitioners in the U.S. In August, the 15 member board unanimously adopted a list of tasks critical to performing successfully as a dignitary and executive protection professional. The tasks reflect the doctrine and essential elements of knowledge for dignitary and executive protection. Since adopting the list of tasks, the board has been working to develop other components of the certification program. 877.219.2519
www.abchs.com
Background of the ABCDEP Certification From its inception in late 2010, the initiative to establish an American certification standard in dignitary and executive protection was based on the foundational principle of credibility. This means that from the start, the certification program had to be based on a sound doctrine and essential elements of knowledge; that certification candidates command that knowledge; that they have experience; and they pass a rigorous examination sanctioned by an objective third-party entity. This was not to be a “pay to play” exercise. The first task was to engage an organization that had a demonSpring 2012
Inside Homeland Security®
47
strated ability to guide and facilitate the creation of a bona fide professional certification process and methodology. The organization selected to provide this function is the American Board for Certification in Homeland Security, CHS® (ABCHS). ABCHS is a non-biased provider of professional certification and independent testing services. The Association does not offer protection services or training. Subsequently, an Advisory Board needed to be assembled. ABCHS was careful to represent the spectrum of dignitary and executive protection on the Board. The relevant experience and skills embodied by ABCDEP Advisory Board members assures a comprehensive view of the profession. The 15 Board members – all volunteers who serve at their own expense – are active practitioners in one way or another with backgrounds from the corporate and private sector, the U.S. Secret Service, the U.S. State Department Bureau of Diplomatic Security Services, the U.S. Army Protective Services Unit, training and educational organizations, associations, other government agencies, and law enforcement. Together, the board has more than 325 years of experience in the profession. A list of board members is on the ABCDEP website. With an Advisory Board established, ABCDEP began work on a certification exam that would be recognized by peers and end-users as evidence of attainment of professional competencies. The first step in constructing such an exam is a job task analysis (JTA) study. The ABCDEP Advisory Board members identified a comprehensive description of what is required to succeed as a professional provider of dignitary and executive protection. The product of this effort is the adopted list of job tasks - a 150+ page document that details the essential elements of providing protective services. The adopted list will serve as the foundation for the job analysis study which will result in a defensible outline of content to be covered on the certification exam. Once this outline is identified, ABCDEP will write and adopt questions for the exam in compliance with the “ASC Item Writing and Review Guide” published by Assessment Systems Corporation (the instrument used to ensure that test items meet the industry standard for validity, clarity, content conformity), set a passing score for it using the Modified Angoff Method (a popular, criterion-referenced approach), monitor its performance, and periodically make improvements to it. In the mean time, ABCDEP Board members are engaged in various related tasks. The ABCDEP Advisory Board has established the baseline requirements that all candidates for certification must achieve: 1. Evidence of training and education in dignitary protection that is consistent with the doctrine and knowledge enumerated in the JTA; 2. A documented minimum of two years of cumulative protection experience; 3. Successful completion of the ABCDEP certification examination. The Board is creating a framework and guidelines for accepted 48
Inside Homeland Security®
Spring 2012
Want to enhance your skills in executive security operations, methodology, goals, and more? See our ad for Establishing Executive Security on the next page or call 877.219.2519. Also enroll online at www.abchs.com
training and education. The baseline for acceptable training and education is that it comports with the JTA. The board will also devise a method and procedure for evaluating training providers, and create a process for approving training providers whose training curriculum meets the JTA criteria. An applicant for certification who has successfully completed training from an approved training provider will have satisfied the ABCDEP training and education requirement. ABCDEP board members are also developing a method for evaluating candidate experience in light of eligibility requirements relating to professional experience. In addition to these activities, Board members are planning work to identify landmark texts in the field of dignitary and executive protection to serve as reference materials for questions on the exam.
The Certification Standard & Process The operations of the ABCDEP certification program will adhere to the National Commission for Certifying Agencies (NCCA) Standards for the Accreditation of Certification Programs. To be eligible for NCCA accreditation, the ABCDEP certification exam must be administered to 500 candidates or for a calendar year, whichever comes first. The ABCHS will employ a third-party provider of proctored examination services to administer the ABCDEP examination. This provider has testing facilities in most states. Several states, particularly larger ones, have multiple testing locations in them. For instance, California has 24 testing centers. Candidates will be able to select the testing facility most convenient to them, and will not be required to attend an ABCHS event in order to take the exam. Once the certification program is eligible, ABCDEP will submit an accreditation application and documentation of standards compliance to the NCCA. The accreditation standards allow for a simple mechanism by which those who attain certification prior to the accreditation of the program can maintain their credentials. ABCDEP will issue amended certificates that recognize the change in accreditation status to all initial certificants.
Training Certificate Versus Certification The purpose of certification is to provide recognition to one’s knowledge, skills, and abilities. This recognition is usually considered more credible when it is provided from a third party organization independent of candidates’ training and education. www.abchs.com
877.219.2519
To follow best practices in the certification industry and the NCCA standards, ABCDEP certification candidates will first obtain their training and education and then sit for the examination administered by an independent entity. Using an independent testing provider to administer an accredited examination reinforces the separation between candidates’ training and exam administration. It assures that a candidate actually possesses the knowledge necessary to meet the standard established for the certification exam. As stated previously, in order to maintain an objective separation and avoid conflict of interest issues that would degrade the credibility and high-value of the certification, neither the ABCHS nor the ABCDEP will offer any training in the field of dignitary and executive protection. As a further measure of non-bias, no member of the ABCDEP Board who offers for-profit training is allowed to serve on the committee that establishes training and education requirements, and approves training providers.
An Industry Community Initiative This certification program development process is not the product of a single entity or individual. It transcends limiting and narrow perspectives by engaging diverse resources. Currently, it involves several independent organizations, and the combined effort of 15 professionals with varied backgrounds, education and
training, and experience who have devoted considerable time and energy at their own expense to create a credible certification in dignitary and executive protection that will benefit not only the practitioners, but the end-users of protective security services. For more information about the ABCDEP and the ABCHS and board members, please visit the ABCDEP website at www. abchs.com/about/boards/abcdep/.
A b o u t t h e Au t h o r
David L. Johnson, DABCHS, CHS-V, is President of ITG Consultants, Inc., providing consulting, training, and protective services. In 30 years of providing protective services, he has coordinated presidential, Cabinet, ambassadorial, and senior executive level protective programs in threat environments ranging from negligible to that of imminent assassination attempts by state-sponsored terrorist organizations; conditions of conflict and coup d’etat during multiple high-threat or politically sensitive assignments including Somalia, Haiti, Bosnia-Herzegovina; and management of contracts in Afghanistan and Iraq. He is a member of the ABCHS Executive Advisory Board and chairman of the American Board for Certification in Dignitary and Executive Protection.
Protecting executives For more information or to register online, visit www.abchs.com or call 800.592.0960
PE0112IHS
Establishing Executive Security presents a threatassessment-based method of determining resource requirements necessary to establish or modify an executive security program. Executive security operations, methodology, and goals, as well as the conduct of threat assessments and application of such assessment results to the design of the security program are part of the knowledge, skills, and abilities required in this field. This online course, which qualifies for 15 ABCHS Continuing Education Units, has been designed to equip security and law enforcement managers with an understanding of personal security programs that can be established to provide safety and security support to a range of individuals, and is available to all ABCHS members at the rate of $124.95
This online course is available to all ABCHS members at the rate of
By Richard J. Hughbank, CMAS, CHS-IV
Photo Credit: ZouZou/Shutterstock.com
Counterterrorism
W here I t A ll B egins :
Terrorist Recruitment
M
y last few columns have been of a more personal nature and have not offered as much education as I would like to provide, so I am shifting the focus in this column to a more academic approach. Therefore, you might want to buckle in and dust off your thinking cap. I believe terrorism recruiting is an extremely relevant piece of the counterterrorism puzzle. For the purposes of this discussion, recruiting is defined as: ‌ to engage persons for military service; to strengthen or raise an army through enlistment; to supply with new members or employees; to enroll; to replenish; to renew or restore the health, vitality or intensity of; to obtain replacements for something lost, wasted or needed; to regain health or recover; NOUN: a new member of
50
Inside Homeland SecurityÂŽ
Spring 2012
an organization or body (American Heritage, 2002). There are many facets of terrorism we can research and study in an effort to better understand our enemy in the form of terrorism (both domestic and international). While this presents a strong and healthy interest for academics and researchers, it poses some issues with professionals who are attempting to carefully identify a potential threat and put together the collective terrorism puzzle. So it begs the question: how do we peel this onion in an effort to clearly analyze this critical piece of terrorism? I believe we must start at the
genesis of an organization, which involves the recruitment of its perpetrators. The process of recruiting represents the first stage of socialization into any organization, even those whose mission is related to terrorist activity. The stage is called anticipatory socialization and involves recruitment, selection, and placement (Gibson, Ivancevich, Donnelly, & Konopaske, 2006). An in-depth analysis of terrorist community network recruiting requires integration of several theoretical frameworks from an interdisciplinary and multi-level perspective: the individual, the social environment, and the organizational network.
Global terrorism is extreme both in its lack of realistic goals and in its cynical exploitation of the vulnerability of complex systems. ~ Jurgen Habermas, German Philosopher www.abchs.com
877.219.2519
The rich history of criminological theory tells us why an individual would choose one behavior over another (in this case, the decision to join or not join a terrorist organization), based upon their moral development, the values and beliefs that comprise their social and learning environment, the culture, and the consequences of their actions. This interdisciplinary approach integrates individual choice, community theory, and sociological influence, merging the potential recruit with the terrorist organizations that need these recruits to continue their perpetuation and mission within an environmental context. Very important to both the individual and the terrorist organization are values and beliefs. Travis Hirschi (1969) codified a theoretical framework of social control in which social bonds were central to behavior through four key areas: attachment, commitment, belief, and idea, all of which are more developed in “gemeinschaft” or “mechanical” communities (Durkheim, 1857; 1952). As social controls weaken or stronger subcultural bonds develop, a potential recruit would theoretically “drift” (Matza, 1964) toward the decision of joining or rejecting a terrorist group as an active participant. Those that have some social bond elements (ex. attachment and belief ) but are more involved or committed to broader social goals may be sympathizers of terrorist organizations and have contact with terrorists. However, they would likely not join as active participants without some external intervention. Humphrey (2006) discussed terrorism as a “form of social control,” supporting the application of this perspective. Social structure provides the environmental rationale for why some youths would be susceptible to terrorist organization recruiting. Certain environments impact the social bonds that youth experience as they develop. They have more of an affection for (ex. bonding) their culture than they have a capacity to be sensitive to others (ex. bridging), making them vulnerable to organizations offering attachment, commitment, involvement and belief in a way that upholds their traditions, values, and norms. But social processes cannot be 877.219.2519
www.abchs.com
Learn more about Certified National Threat Analyst, CNTASM, where homeland security professionals enhance their knowledge and skills regarding the intricacies of the international terror network. For more information on the program, see our ad or call 877.219.2519. Enroll online at www.abchs.com
ignored either, as recruiting is not only an organizational structure, but also a social process. Social process theories enhance the understanding of when and how this decision occurs once the environment is fertile for the recruiter (also known as a handler). One of the goals of terrorist recruitment is to play on human emotions, whether they are arrived at internally (the individual) or externally (the social being). Accordingly, human nature is at the very core of their desire to be recruited and their decision to join. Human nature is a set of logical characteristics, including ways of thinking, feeling, and acting that all normal human beings have in common (Buller, 2005). Through the understanding of psychosocial aspects of a potential recruit, we can begin to postulate the key motivators leading to their recruitment. At the heart of this theory are sociological concepts. Social environments set the foundation for an individual’s personal emotional growth and establish any organizational environments. This is at the core of cultural values and beliefs. Recruitment is the most important aspect of any terrorist organization, because without the recruitment process, an organization will die a slow – and inevitable – death.
Author’s note: Portions of this column were taken from a previous publishing on terrorist recruitment titled “Psychology for Recruiting Terrorists.” You may read the entire chapter at http://www.tracterrorism.org/article/ psychology-recruiting-terrorists.
Citation: Khan, V. (Editor). (December 2011). Beacham’s Encyclopedia of Terrorism [Two
Volumes] (Online Publication). Richard J. Hughbank & Joseph Ferrandino, Chapter titled “Psychology for Recruiting Terrorists.” Beacham Publishing.
References Buller, D. J. (2005). Adapting Minds: Evolutionary Psychology And The Persistent Quest For Human Nature. Cambridge, MA: MIT Press. Durkheim, E. (1857; 1952). Suicide. London: Routledge and Kegan Paul. Gibson, J.L., Ivancevich, J.M., Donnelly, J.H., & Konopaske, R. (2006). Organizations: Behavior, Structure, Processes (12th Ed.). Boston, MA: McGraw Hill. Hirschi, T. (1969). Causes of Delinquency. Berkeley, CA: University of California Press. Humphrey, J.A. (2006). Deviant Behavior. Pearson Prentice-Hall. Matza, D. (1964). Delinquency and Drift. New York, NY: John Wiley. The American Heritage College Dictionary (4th Ed.). (2002). p. 1164.
A b o u t t h e Au t h o r Major Richard J. Hughbank, U.S. Army (retired) is an assistant professor in the Criminal Justice Department at Northwestern State University teaching graduate homeland security studies. He is also the President of Extreme Terrorism Consulting, LLC. Hughbank has over 21 years experience in the Military Police Corps, is a combat veteran in the War on Terror, and a published author in the fields of security, active shooters, terrorism, and homeland security. Hughbank is currently a doctoral candidate in management and homeland security. He can be contacted through his company website www.understandterror.com, rhughbank@understandterror.com or on his professional blog on Facebook – Understand Terror. Spring 2012
Inside Homeland Security®
51
I n e v e r y iss u e
Book Review
Book Review When Terror Returns
The History and Future of Terrorist Mass-Hostage Sieges Author: John Giduck
John Giduck has done it once again. He has researched and written another book on the subject of terrorism that can only be described as dynamic and cutting-edge.
I
n his fourth book, When Terror Returns, John Giduck probes the terrorist mindset in a two-pronged approach - informational and educational - that has been carefully articulated for all audiences. He has meticulously identified and outlined four types of terrorist attacks at the strategic level: Decimation Assaults; Mass-Hostage Sieges; Hybrid or Synergistic Attacks; and Symphonic Attacks, which forces his readers to rethink current hostage-taking situations. Additionally, John has set the stage for future understanding of terrorist mass-hostage tactics using historical case studies that prove extremely relevant in the overall development of a terrorist and, more importantly, how we might find ways to mitigate and respond to these types of attacks. The book includes the detailed analysis of five mass-hostage sieges in Russia: (1) Budyonovsk, (2) Kizlyar, (3) Pervomais52
Inside Homeland Security®
Spring 2012
koye, (4) The Nord-Ost Theater Siege in Moscow, and (5) The Beslan School, which decidedly demonstrates a terrorist’s capabilities to conduct such operations with precision and deadly results. Additionally, John meticulously addresses the school siege in Ma’a lot, Israel, those in the Netherlands, and the Japanese Ambassador’s residence siege in Lima, Peru. Each case study is carefully analyzed to present the ongoing evolution of terrorist tactics in mass-hostage sieges. After establishing the terrorist’s tactics, John has methodically approached and designed a predictive modeling theory for future attacks. His “Six-Phase Mass-Hostage Siege Model” provides critical insight into tactics and strategies leading his readers, and rightfully so, to “believe that a Beslan-style attack on a U.S. school is virtually inevitable in the foreseeable future.” This book will prove to be an invaluable
tool in my future teachings as a professor of homeland security studies.
A b o u t t h e R e vi e w e r Major Richard J. Hughbank, U.S. Army (retired), served as a military police officer for nearly 22 years and has had three combat deployments in the War on Terror. He is currently a doctoral candidate with an emphasis in homeland security, and is a full-time Assistant Professor at Northwestern State University in Louisiana where he teaches graduate homeland security courses and undergraduate criminal justice and emergency management courses. Prior to this job, Richard was an adjunct for the Center for Homeland Security at the University of Colorado at Colorado Springs as a graduate course instructor in terrorism and homeland security studies where he taught other professionals in Understanding the Threat. Richard is the coauthor of The Dynamics of Terror and Creation of Homegrown Terrorists. www.abchs.com
877.219.2519
TO DA Y
RE GI ST ER
Join the top professional leaders who specialize in Forensics, Homeland Security, Psychotherapy, Integrative Medicine, and Behavioral Sciences.
Networking • Continuing Education • Valuable Resources • General Sessions
AT T E N D T H E A N N U A L
IV EXECUT
E SUMMIT 201 2
S AV E T H E D AT E !
October 17-19, 2012 877.219.2519 | www.theexecutivesummit.net/ihs
American College of Forensic Examiners InstituteSM | American Psychotherapy Association® American Board for Certification in Homeland SecuritySM | American Association of Integrative MedicineSM
2012 4 Easy Ways to Register:
ES-21
EXECUTIVE SUMMIT
1
AMERICAN COLLEGE OF FORENSIC EXAMINERS INSTITUTE • AMERICAN ASSOCIATION OF INTEGRATIVE MEDICINE AMERICAN BOARD FOR CERTIFICATION IN HOMELAND SECURITY • AMERICAN PSYCHOTHERAPY ASSOCIATION
OCTOBER 17-19, 2012 • LAS VEGAS, NV • RIO ALL-SUITE HOTEL
2
ONLINE www.theexecutivesummit.net
FAX (417) 881-4702
3
PHONE (800) 423-9737
4
MAIL 2750 E. Sunshine Springfield, MO 65804
ATTENDEE INFORMATION (please print) Name
Member ID #
Address City Phone (
State )
Fax (
Zip
)
Name of Emergency Contact:
Relation:
Emergency Contact Phone: (
)
EXECUTIVE SUMMIT REGISTRATION Wednesday, October 17–Friday, October 19 All registration rates include one ticket to the Annual Banquet. Registration with one association grants you full access to all conference sessions. Student and group pricing is available; please call for details. Please check the primary association with which you wish to be affiliated (Check only one): ❑ American College of Forensic Examiners Institute (ACFEI) ❑ American Board for Certification in Homeland Security (ABCHS) ❑ American Psychotherapy Association ❑ American Association of Integrative Medicine (AAIM)
❑ One-Day Conference Pass $299 ❑ Thursday, October 18 ❑ Friday, October 19 ❑ Additional Banquet Ticket $100
REGISTRATION FEES: Advanced Member Loyalty (before 12/31/11)
Member Loyalty (before 2/1/12)
Early Early Bird (before 4/1/12)
In Advance Early Bird (before 6/1/12)
Early Bird (before 8/1/12)
Advanced Registration (before 10/1/12)
Late/On-site (10/1/12-10/19/12)
Member
$449
$499
$569
$639
$709
$779
$849
Life Member (save 10%)
$400
$449
$512
$575
$638
$702
$764
Active Duty Military Member
$399
$449
$519
$589
$659
$729
$799
Please circle the appropriate registration rate.
PAYMENT PROCESSING
❑ Check enclosed (payable to ACFEI, ABCHS, AMERICAN PSYCHOTHERAPY ASSOCIATION, or AAIM) ❑ Purchase Order ❑ MasterCard/Visa ❑ American Express ❑ Discover
Total Amount Due: $ ___________
Card Number __________________________________ Name (as it appears on card)
Exp ____________
_______________________________________
Signature _________________________________________________________
CANCELLATION POLICY: All requests for cancellation of conference registration must be made to Association Headquarters in writing by fax, mail, or e-mail. Phone cancellations will not be accepted. All cancelled/refunded registrations will be assessed a $75 administrative fee. All refunds will be issued in the form of credit vouchers and are pro-rated as follows: cancellations received 4 or more weeks prior to the conference=100% refund (less $75 administrative fee); cancellations received less than 4 weeks but more than 1 week prior to the conference=50% refund (less $75 administrative fee); cancellations received 1 week or less prior to the conference=no refund. For more information on administrative policies, such as grievances, call (800) 423-9737. The performance of this conference is subject to acts of God, war, government regulation, disaster, strikes, civil disorder, curtailment of transportation facilities, or any other emergency that makes it impossible to hold the conference. In the event of such occurrences, credit vouchers will be issued in lieu of cash. Conference schedule is subject to change. Please be prepared to show photo identification upon arrival at the conference. A $20 NSF fee will be assessed for each returned check.
Special Services: ❑ Please check here if you require special accommodations to participate in accordance with the Americans with Disabilities Act. Please attach a written description of your needs.
MEDIA0112AN
NE W
What’s on Our Bookshelf? Who, When, Where, What, and Why comes last
Julia a. Mayo, PH.D.
Stuck on Me Missing You... Getting Past Self-Absorption to Find Love By Larry A. Bugen, Ph.D. Sometimes our love for others becomes blurred by a preoccupation with oneself. Carried too far, this self-absorption jeopardizes the love bonds we need to survive. Bugen critiques the pervasive narcissism of our contemporary culture, reveals the true nature of love, and presents Six Gifts that ensure its survival among the fittest. Paperback. 9780982212134 | 307 pages | $19.95
Culture Notes:
Mayo’s Way Who, When, Where, What, and Why Comes Last By Julia A. Mayo, Ph.D.
Essays on Sane Living By Irene Rosenberg Javors
Julia A. Mayo, Ph.D., is a Master Therapist and Diplomate of the American Psychotherapy Association. Her book of remedies and recipes for life are brought together by her own personal experiences as a wife, mother, and therapist. Dr. Mayo believes strongly in full pursuit of life, liberty, and laughter. Paperback. 9780983260134 | 112 pages | $12.99
Have we all lost our minds? It’s a question we have all asked ourselves as we ponder such modern occurrences as “reality” TV, road rage, and terrorism. Javors’ collection of her columns from the Annals of the American Psychotherapy Association offers prescriptions for “sane living” in the face of life’s challenges. Paperback. 978098221141 | 144 pages | $14.95
Your Book Goes Here. Psychological Autopsy of Elvis Presley
In the Practice of Health Care
Check us Out!
The Search for Satisfaction By Ronald Hixson
On Demand Book Publishing By ACFEI Media
Ronan examines the facts of Elvis Presley to reveal the truths of the legendary rocker’s life—and the root causes of his death. It is pragmatic, highly logical, exhaustively researched and well worth your attention. Hardcover. 9780983260103 | 349 pages | $24.95
Hixson, a psychotherapist, provides applicable insight into all aspects of practice management, from economics to ethics. Paperback. 9780983260110 | 190 pages | $14.95
Do you have a book about Psychotherapy, Homeland Secuirty or Forensics? Give us a call to find out how ACFEI Media can help you can get your book published and sold by the top book seller. contact us today | FREE
By William J. Ronan
High-quality book designs at affordable publishing costs 877.219.2519
www.abchs.com
www.AcfeiMedia .com Spring 2012 Inside Homeland Security 1.800.423.9737 | media@acfei.com
®
55
1 CE Credit C E A rticle :
Major Islamist Terrorist Organizations:
Just Icons, or More?
56
Inside Homeland Security速
Spring 2012
www.abchs.com
877.219.2519
Part 1
As various research findings on the subject of Islamist terrorism continue to report an alarming number of unaffiliated “jihadists,” we inquire: Is al-Qaeda still an important force on the ideological battlefield?
C E A rticle :
1 CE Credit
This article is approved by the following for 1 continuing education credit: The American Board for Certification in Homeland Security, CHS® provides this continuing education opportunity for those individuals Certified in Homeland Security, who are required to obtain 30 Certification Maintenance Unit’s (CMU) per 3-year recertification cycle. After studying this article, participants should be better able to do the following: 1. Explain the current [growing] level of “homegrown” Islamist terrorist threat in the United States and Europe 2. Discuss the current [growing] level of Islamist threat worldwide 3. List possible sources of motivations of “homegrown” Islamist terrorists in the U.S. KEYWORDS: terrorism, al-Qaeda, homegrown terrorism, jihad, “lone wolf ” terrorism TARGET AUDIENCE: Members of the field of homeland security PROGRAM LEVEL: Basic DISCLOSURE: The author has nothing to disclose. PREREQUISITES: None
877.219.2519
www.abchs.com
T
he events of September 11, 2001, changed the social and political outlook of many individuals around the world. On that day, Mohammad Atta and his 18 co-conspirators were determined to unleash the potent venom of their Islamist ideology and demonstrate loyalty to the architects of such design. Their carefully planned attacks were not only designed to undermine the democratic principles that underpin the American way of life, but also unleash the dark impulses of violence, hatred, and war. Undoubtedly, this event—of almost no historical precedent or point of comparison—reminded us of our vulnerability to a deadly enemy (foreign) force. America was not the only target, however. Terrorists struck Europe as well. Madrid, Spain, was hit in 2004, and London, Great Britain was hit in 2005. Following the attacks, Europe became a maelstrom of planned Islamist terrorist operations. Most of the attackers resided in Europe and North Africa. Some of them were political refugees and others illegal immigrants and European citizens. They were of Algerian, Moroccan, Tunisian, and South Asian origin. Some were affiliated with a major terrorist organization, and some were not. There are many who claim that the memory of epochal events fades with time. While such claims might hold true, the central themes of the horrors of 9/11 and the attacks in Madrid and London remain with us. As various research findings on the subject of Islamist terrorism continue to report an alarming number of unaffiliated “jihadists,” we inquire: Is al-Qaeda still an important force on the ideological battlefield? More importantly, albeit counterterrorism efforts during the last few years have proven to be very successful in terms of thwarted plots emanating from “new jihadists,” we inquire: Are these “new jihadists” grassroots operatives or militants dispatched by al-Qaeda central? Is there an indication of the existence of Islamist groups or individuals unaffiliated with a terrorist group but adhering to a common ideology of “global jihad,” as promoted by al-Qaeda? Is there an indication that the role of major terrorist organizations, such as alQaeda, is rather diminishing—acting only as a point of reference for independent terrorist groups and individuals? This research clearly shows that answers to such questions are rather complicated. More precisely, the findings of this research indicate that terrorist threats today may be perceived as having the following sources and demonstrating the following trends: • Al-Qaeda and its affiliates, including other extremist Islamist groups located abroad, continue to pose a serious threat. • A growing number of radicalized individuals living inside the United States and Europe are ready to initiate attacks, at the direction of foreign groups or on their own. • The possible motivations of unaffiliated jihadists should not be understood primarily within the context of al-Qaeda’s global jihad. On the contrary, motivations of such individuals and groups are rather part of a much more complex equation.
Spring 2012
Inside Homeland Security®
57
Homegrown Terrorism
Aftermath of the Oklahoma City bombing in 1995
Throughout this research, we will be referring to homegrown terrorism as violent acts against a government and its population by groups or individuals—either born or residing in the United States for a long period—to intimidate or coerce. This is not to be confused with individuals or groups exhibiting similar forms of violence (i.e. street gangs). Additionally, we will utilize the definition of homegrown terrorism by Brian Jenkins of the RAND Corporation. Jenkins defines homegrown terrorism as product of individuals, unaffiliated with a known terrorist group or organization, planning to provide material support to foreign terrorist organizations and leave their home country to join jihad abroad (Jenkins, 2010, p.1).
Photo Credit: Arindambanerjee/Shutterstock.com
Islamism Islamism refers to an ideology and movement that calls for creation of an Islamic State(s) governed by the principles of Islamic Law or al-Shariah. Implementing al-Shariah implies the process of replacing jahiliyya (paganism) with hakamiyya (the rule of Allah) (Hasan, 2006, pp.139-143). Since the early seventeenth century, several names were associated with the ideology of Islamism. The more recent and more radical formulations were those of Hassan al-Banna (1906-1949) of the Egyptian Muslim Brotherhood; Sayed Maududi (1903-1979) of the Pakistani Jamaat-e-Islami; Sayyid Qutb (19061966), leader of the Muslim Brotherhood of Egypt; and Ayman Zawahari, founder of the Egyptian Islamic Jihad (1980) and theological mentor of al-Qaeda’s leader, Osama bin Laden, and Ayatollah Khomeini of Iran (Lechner, 2009, p. 183).
Methodology and Research Design This research is divided into three sections. The first part examines global Islamist terrorism trends. An insight into non-Islamist terrorist attacks and incidents will be given as well. The focuses of our research are both global and U.S. domestic year-toyear terrorism trends. The measurements of such trends are framed in terms of incidents and attacks. In order to generate such information, this research utilizes the National Counterterrorism Center’s database of terrorist incidents, the Worldwide Incidents Tracking System (WITS), and RAND’s Database of Worldwide Terrorism Incidents. In the second stage of our research—given the relatively few terrorist attacks in the United States and Europe—we make an attempt to analyze another terrorism variable that measures structural and operational capacity of Islamist terrorists: terrorism-related indictments. We must caution that this unit of analysis has limited utility. Specifically, it 58
Inside Homeland Security®
Spring 2012
considers only those who have been caught: perhaps the most capable terrorists avoid arrest. In this section, we analyze 164 terrorism-related indictments brought against Islamist terrorists from 2002 through 2010, involving over 300 defendants. We also explore the nature of Islamist terrorism related offenses brought before European courts. The categories of cases include violations of federal statutes that are directly related to terrorism and are applied regularly in such matters. It includes defendants who have been charged with violations related to domestic and international Islamist terrorism only. Once categories of such offenses are compiled and adequately structured, we create a chronological table of such offenses. The tables shed additional light on the nature of current homegrown Islamist terrorism in the United States. They offer data on demographic composition, affiliation, and overall activities of Islamist homegrown terrorists in the United States.
We first organized a table that starts with an indictment/arrest date, with the most recent ones starting first, followed by defendant’s name, race/ethnicity, citizenship status, affiliation, legal status of the case, the location of activities taking place, and final target of a terrorist activity. In some cases when we lack an exact indictment date, we use the arrest date instead. The chronological list includes both pending cases and those that have resulted in conviction. Additionally, the list in question includes the following: indictments by foreign nationals ready to carry out attacks in the United States, individuals arrested in the United States for engaging in criminal activity to provide financial aid to jihadi groups such as Hamas and Hezbollah, and those radicalized in their home country, or homegrown terrorists. In the second table, we group terrorist cases based on the number of defendants per terrorist offense. More precisely, the table starts with the case name www.abchs.com
877.219.2519
Research Design
Petter Nesser, Author of Jihad in Europe Research Fellow at Norwegian Defense Research Establishment
Do terrorists emphasize social problems in the United States as a source of motivation?
and is followed by year of indictment, affiliation, number of defendants involved, the location of activities taking place, and the final target of a terrorist activity. In the third section, we move beyond mere description and quantification of the problem and make an attempt to survey possible motivations behind some acts of Islamist terrorism. In this section, we analyze nine Islamist terrorism-related cases (failed, foiled, or successfully carried out) brought before U.S. courts. Through this analysis, we make an attempt to determine whether the possible motivations of individuals involved in such cases should be understood based primarily within alQaeda’s global jihad or on other sources of motivation. For this part of the research, court documents were considered as the most reliable source of information. They offered a comprehensive summary of terrorism-related cases, identified the backgrounds of the actors involved in 877.219.2519
www.abchs.com
Understanding individual motivations of terrorists is a key to understanding the nature of terrorist recruitment today. In Jihad in Europe author Petter Nesser (2004), a research fellow at the Norwegian Defense Research Establishment, studied motivational elements, recruitment, and radicalization processes of Salafi terrorists in Europe. According to the author, motivational sources of Salafi jihadists in Europe could be explained within the following theoretical concepts: “local motivation,” “global motivation,” “diaspora motivation,” and “complex motivation.” More precisely, when addressing the question of how terrorists justify attacks against targets in Europe, the author asked the following questions: Do terrorists emphasize social problems in Europe as a source of motivation? Do they bring in political and social events from their country of origin? Is United States-led “neo-imperialism” a driving force behind such actions? Or is it one or more of these contexts? To measure such motivational factors, the author conducted a multiple case study research design, also known as analytical generalization. To address
them, as well as helped to identify their modus operandi and affiliations. The Department of Justice’s case documents, such as DOJ press releases, as well as terrorism case documents compiled by the Investigative Project on Terrorism, FindLaw and the Transnational Records Access Clearinghouse (TRAC) on convictions and ongoing investigations gave invaluable insight into the possible nature of motivations of Islamist radicals, and constituted a promising departure point for our research. The very same sources are utilized to analyze terrorism trends through terrorism-related indictments. This is not to say, however, that this part of the research lacked insight from press coverage or other sources of reliable information. Additionally, at times, tackling such a complex dimension of terrorism required us to move beyond observable facts and employ historical narratives and ideological understanding of the actors involved in the plots.
the motivational factors surrounding his cases the author studied the type and the nationality of the target chosen for operation, the backgrounds of the militants profiles and organizational affiliation, the militants’ own justifications for attacking, target selection and justification, and the broader political contexts that might have motivated militants. Utilizing the same theoretical models developed by the author, in the third part of our research, we will make an attempt to explore possible sources of terrorist motivation in the United States through case analysis of nine well-documented Islamist terrorism cases. Chiefly, when addressing the question of how homegrown terrorists justify attacks against targets in the United States— its citizens and its interests both locally and internationally—this research asks the following: Do terrorists emphasize social problems in the United States as a source of motivation? Do they emphasize political and social events from their country of origin? Is U.S. led “neo-imperialism” a driving force behind such actions? Or is it one or more of these contexts? We must note, however, that the overall aim of this part of the research is not to explore possible causal relationships between cases, as it would require a larger number of cases, but rather conduct pattern-matching analysis among nine cases.
The cases under examination include: • USA vs. Hammami, Omar. • USA vs. Cromitie, James, et al. • USA vs. Shnewer, Mohamad Ibrahim, et al. • USA vs. Batiste, Narseal, et al. • USA vs. Michael Finton • USA vs. Alkaramia, Mohammad • USA vs. Boyd, et al. • State of Washington vs. Haq • State of North Carolina vs. Taheri-Azar
Spring 2012
Inside Homeland Security®
59
Understanding Local, Diaspora, Global, and Complex According to Petter Nesser (2004), “local jihad” refers to jihad sparked by political developments in an Islamists’ country of origin. For instance, cooperation of their government with the U.S., establishment of a U.S. military base, political assassinations of Islamist leaders, or mass arrests in Islamists’ country of origin may be considered “local motivations” for jihad. Moreover, followers of local jihad view Middle Eastern, North African, and Central and South Asian regimes as corrupt and authoritarian. These regimes have failed to implement the legal system of al-Sharia and are puppet states of Western imperialist powers. The U.S. deployment in the Middle East (Saudi Arabia in particular), its support of Israel with respect to Palestine, conflicts in Chechnya and Kashmir, and the former President Bush’s “global war on terrorism” are some of the possible motivational sources of global jihadists. It is waged by those who adhere to the Salafi ideology of global jihad as promoted by al-Qaeda and its core leadership. High levels of unemployment, discrimination, alienation, problems of integration, racism, or the lack of respect for Islamic traditional values in the West are some examples that might be considered as sources of diaspora motivation. In addition, this possible source of motivation also includes any counterterrorism campaign or arrests against prominent Islamic clerics or leaders, or to avenge crackdowns on support networks in Europe that are considered crucial to an insurgency in the Islamists’ country of origin. We must also note that under this category we will include poverty as another indicator of diaspora motivation. The use of poverty as an indicator of diaspora motivation is limited to our research only. The literature on the terrorism-rooted in poverty hypothesis is vast and largely disputed. In this research, we test the utility of such hypothesis in the context of our cases only. Equally important, although the author defines diaspora motivation as perceptions of injustice against Muslims living abroad (a Muslim’s host-state), we will utilize the term to reflect perceptions of injustice against Muslims living in the United States. The complex motivation includes at least two of the one-level motivations.
ANALYTIC GENERALIZATION Robert Yin (2003) describes analytic generalization as a qualitative research methodology that is not used to generalize to some defined population that has been sampled, but to a theory of the phenomenon being studied. This qualitative research methodology is used to test a hypothesis empirically, but not to generalize the findings to all homegrown Islamist terrorists. In other words, the empirical pattern generated through this qualitative research methodology is compared with a predicted one or several
60
Inside Homeland Security®
Spring 2012
There are many who claim that the memory of epochal events fades with time. While such claims might hold true, the central themes of the horrors of 9/11 and the attacks in Madrid and London remain with us.
predicted ones, and should the patterns coincide, it strengthens the study’s hypothesis. In the context of our research, the main hypothesis is to determine the relative importance of socio-economic and political grievances at the global, local, and diaspora levels in motivating U.S. Islamist homegrown terrorists. Our main hypothesis is that due to the globalized nature of Islamism today, the motivations of homegrown terrorists in the United States are complex. Moreover, our hypothesis further implies that global and local motivations are increasingly impor-
tant compared to diaspora motivations. The theoretical framework utilized in this research has very limited utility. Primarily, conclusions reached in this part of the research may be misleading due to the fact that we might have been unable to locate sufficient information on possible terrorist motivations or misinterpreted the existing ones. The significant contribution of such a framework in the context of our research, however, is that it represents a promising point to further contextualize the problem of homegrown Islamist terrorism in the United States.
www.abchs.com
877.219.2519
THE CASES AND JUSTIFICATION FOR THEIR SELECTION On March 11, 2004, ten bombs went off virtually simultaneously in trains carrying commuters into Madrid. One hundred ninety people died in the attacks, with approximately 2,000 people wounded. (Photo on left: Larry Mangino/MCT) A train damaged during bombings of the London, England, transit system sits in a tunnel on July 7, 2005. Four explosions occured in the attack. (Photo below: Mike Partridge/MCT)
CASE
All nine cases included in this research were analyzed utilizing the theoretical framework developed by the author. In this research, we will present a fully developed analysis of the case of Omar Hammami only. Although not fully developed, the results of the analysis of the remaining eight cases were recorded in Table 1. The research examines diverse cases brought before the United States courts since 2002, and includes both single and multiple defendants per case. In order to avoid bias, the cases included in this research are randomly selected from the available public sources. Although randomly selected, they are sufficiently documented to be used as Omar Hammami a source of possible motivation. AdditionPhoto Credit: www.fbi.gov ally, with the exception of the case of Omar Hammami, we have only included those cases on which a final verdict has been reached; we have fully respected one’s right to be presumed innocent until proven guilty. Equally important, while it is true that there is an alarming number of U.S. citizens of Somali descent traveling to Somalia and joining al-Shabaab, attempting to assess terrorists’ motivational factors from the Somali perspective could only be misleading. In this context, we have omitted cases involving Somali-Americans. For instance, the fact that many of them have joined al-Shabaab in Somalia could be interpreted by many within the local context only. More precisely, they could be interpreted as motivations not necessarily inspired by global jihad, but a mere nationalist fervor of the U.S. citizens of Somali ethnicity. Additionally, not all fighting in Somalia should be considered as terrorism. This is not to say, however, that al-Qaeda’s ideology of global jihad should be considered as irrelevant in the context of the cases involving recruitment of U.S. citizens of Somali ethnicity who return to fight in Somalia.
“Local”
“Diaspora”
“Global”
“Complex”
Omar Hammami USA vs. Cromitie, et al. USA vs. Shnewer, et al. USA vs. Batiste, et al. USA vs. Michael Finton USA vs. Alkaramia, Mohammad State of Washington vs. Haq State of North Carolina vs. Taheri-Azar
Table 1: Islamist Homegrown Terrorist Motivations in the United States 61 Inside Homeland Security® Spring 2012 877.219.2519 www.abchs.com
Spring 2012
Inside Homeland Security®
61
Limitations of the Research The generation of complete and unambiguous data has been a real challenge throughout this research. Although the National Counterterrorism Center’s database offered comprehensive data on global terrorism incidents and was helpful in expanding our understanding of terrorism trends, it remained incomplete. For instance, 65% of the incidents in 2006 had an unknown perpetrating group. Similarly, in 2007, perpetrators in more than 64% of the cases could not be identified. Some have attributed such an increase in the number of unidentified terrorist perpetrators to the possibility that Western counterterrorism efforts have successfully diverted centralized organizations from terrorist success. In the following years, however, the numbers of unidentified terrorist incidents have dropped to 28% in 2009 and 24% in 2010, respectively. While NCTC’s database was helpful in generating statistics on the number of annual incidents of terrorism, it lacked the ability to track specific groups responsible
the fact that there was a decline in open source reporting in many provinces of the countries in question. In the second section, we analyze the nature of Islamist terrorism-related offenses through cases brought before European and U.S. courts. Given the lack of complete and available information, our research has been limited to the U.S. and Europe only. When addressing terrorismrelated cases brought before a U.S. court, the amount and quality of data regarding such terrorism cases has been both ample and satisfactory. That being said, there was no reliable Department of Justice (DOJ) database for these cases, and there is no guarantee that every relevant terrorism case has been included in our research. We must also note that our analysis in this section has been primarily drawn from the pool of available public records and analysis of court documents. In some instances, we have omitted certain cases even when available. For instance, civil lawsuits against terrorist
In the context of our analysis, all nine cases examined in this research involve global motivation, indicating that the idea of global jihad has become increasingly important as a source of possible motivation for homegrown terrorists in the United States. for such incidents. Such a task proved to be significantly limited by the availability of reliable open source information, particularly for those events that occur in remote regions of the world and involve small numbers of casualties. The database was also incomplete as it relied on information from open sources, which often exclude information on perpetrators, victims, and other elements of a terrorism offense. RAND’s Database of Worldwide Terrorism Incidents offered more data on perpetrators, however. Equally important, as was the case in Iraq and Afghanistan, the database lacked the ability to present comprehensive information on all attacks and distinguish them from other forms of violence, such as crime and sectarian violence (although terrorism can be sectarian in nature as well). This is also coupled with 62
Inside Homeland Security®
Spring 2012
groups, Islamic charities, states, and individuals have been purposely omitted from this research. Such cases were omitted only when we lacked evidentiary substance for their inclusion into our research. Additionally, terrorism related criminal referrals to the prosecutors or ongoing investigations past October 2010 were not included. We must also note that we searched deeply into public records for information about terrorism cases in which arrests were either announced or disclosed to media. We continued to follow the cases to their conclusion, including those with a pending status, even when the media spotlight moved away from them. In the case of terrorism related indictments in Europe, on the other hand, we had to rely on EUROPOL’s published data only. They provided important ter-
rorism data and were instrumental in understanding terrorism trends in the European Union. We must caution, however, that EUROPOL’S TE-SAT reports were based mainly on the information provided by member states concerning and resulting from criminal investigations related to terrorism. It is also not a guarantee that all member states have reported reliable and required data to EUROPOL. In addition, there is no guarantee that findings are based on a uniform definition of Islamist terrorism and not on the definitions of individual member states, which often greatly differ. Also, reports do not include any classified information or any information that is a part of an ongoing investigation. The reader must interpret the findings with caution, as our inability to access primary sources of information might have prevented us from offering a more accurate depiction of the current terrorism trends in Europe. In the third section of this research, we made an attempt to analyze possible motivations of Islamist terrorists based on well-documented terrorist cases. The focus of our research has been limited to cases from the United States only. In the context of our analysis, all nine cases examined in this research involve global motivation, indicating that the idea of global jihad has become increasingly important as a source of possible motivation for homegrown terrorists in the United States. Additionally, the research also indicates the presence of local and diaspora sources of motivation. The findings of this part of the research must be considered tentative, however. Although cases under examination are very well documented by many reliable sources, they do not allow us to make generalizations regarding terrorists’ possible motivations. In order to achieve more scientific results, similarly oriented research endeavors must have access to more complete information. Additionally, the lack of sufficient and well-documented cases has not allowed us to delve deeper into the research and create a study of statistical significance of such cases over time. Finally, access to more reliable sources would have allowed us to more systematically compare and contrast various cases over time. www.abchs.com
877.219.2519
Pakistan experienced a significant increase in terrorist attacks; from a low of 890 recorded attacks in 2007, to a high of 1,917 in 2009. KEY FINDINGS The frequency of international terrorist attacks perpetrated by Islamists continues to drop. In 2009, for example, our sources documented 11,009 attacks, down from a high of 14,432 in 2007, a significant drop of 24%. Despite such encouraging figures, however, our research clearly indicates the following: Iraq, Pakistan, and Afghanistan remain major targets of terrorist activities. In 2009 in Afghanistan, there were a total of 2,126 attacks; an increase of 47% compared to year 2007. Pakistan had also experienced a significant increase in terrorist attacks; from a low of 890 recorded attacks in 2007, to a high of 1917 in 2009. In contrast, in Iraq, attacks have dropped by 60%; attacks have dropped from 6,213 recorded attacks in 2007, to a low of 2,468 in 2009. The majority of the terrorist attacks in these countries were attributed to Sunni extremists. Despite the decrease in terrorist attacks in Iraq, these countries still accounted for 59% of all terrorist attacks recorded worldwide in 2009. Specifically, Afghanistan accounted for 19% of all terrorist attacks worldwide. Iraq accounted for 22% and Pakistan 17%.
As stated earlier, in the cases of Afghanistan and Iraq in particular, it is difficult to obtain data on all terrorist attacks and distinguish them from other forms of violence, such as crime or sectarian violence. Having said that, as documented by the number of executed and planned attacks, these countries remain highly fragile and vulnerable to principal threats emanating from groups such as al-Qaeda Central, al-Qaeda in Iraq, Taliban in Pakistan, Taliban in Afghanistan, and Lashkar-eTaiba, among others. As our data indicates, Pakistan and Afghanistan have pushed South Asia past the Middle East as the most terrorism-infested region in the world. The increase in terrorist attacks in these two countries may be a reflection of where the enemy is reorganizing and re-congregating. More precisely, such trends may reflect a strategic shift by terrorist groups (i.e. al-Qaeda) and foreign jihadists to concentrate in those countries where they believe they are more effective, in this case, Afghanistan and Pakistan. The overall decrease in terrorist attacks in Iraq, on the other hand, could be attributed to the direct military action by the United States and its allies. Conversely, it may also echo a tactic whereby salafi-jihadists (i.e.al-
Qaeda) are reorganizing, reestablishing a new foothold, or simply maintaining a subtle presence. Africa has emerged as a continent highly vulnerable to terrorist attacks and has turned into a safe haven for international terrorist groups. In 2009, Africa accounted for 8.5% of all terrorist attacks worldwide. While such figures remain relatively low compared to other regions such as South Asia or the Middle East and Persian Gulf, they represent a significant increase of 17% compared to the number of attacks in Africa in 2008. Of the 931 recorded terrorist attacks in 2009, the majority of them (501) occurred in Somalia. The situation is relatively alarming in Russia and its republics. Russia’s military retaliation against various Islamist elements in the past had been dubbed as largely successful by many media and political figures. Chiefly, President Putin’s battle against the Chechens in Russia’s heartland in the late 90s—often described in terms of realpolitik—had been portrayed by the Russian media and political figures as dazzling and decisive (Sakwa, 2007, p. 229). However, closer examinations of data from the region today indicate a rather significant increase in the number
In 2009 in Afghanistan, there were a total of 2,126 attacks; an increase of 47% compared to year 2007. Suicide bombers targeted Shiite Muslim worshippers in three Afghan cities, including the Abu Fazlul Abbas shrine in Kabul, Afghanistan, killing at least 58 people and injuring more than 100 in the first major sectarian attack in Afghanistan in the decade-long war here. (Photo Credit:Ali Safi/MCT) 877.219.2519
www.abchs.com
Spring 2012
Inside Homeland Security®
63
Although al-Qaeda central’s attacks have considerably diminished—with only 150 attacks recorded in 2008—its affiliates al-Shabaab and al-Qaeda in Iraq continued to claim credit for the largest number of attacks, second only to the Taliban.
A man scavenges atop a trash heap in Eastleigh, a poor, predominantly Somali neighborhood in Nairobi, Kenya. Families say that scores of young ethnic Somalis have left Eastleigh to join al-Shabaab, a Somali Islamist group that’s allegedly tied to al-Qaeda. (Photo Credit: Shashank Bengali/MCT)
of Islamist terrorist attacks. In 2009 alone, a total of 429 attacks took place in Russia; the majority of which (406) were attributed to Sunni extremists. Lastly, al-Qaeda central and its newly emerging affiliates continue to pose a serious threat both locally (U.S. and Europe) and internationally. Although al-Qaeda central’s attacks have considerably diminished—with only 150 attacks recorded in 2008—its affiliates al-Shabaab and al-Qaeda in Iraq continued to claim credit for the largest number of attacks, second only to the Taliban. The battles against terrorists in the past were mostly fought in the shadows and far away. Unfortunately, they have not remained there. As documented by a growing number of court cases involving homegrown terrorists, al-Qaeda and Islamist extremism continues to sway the hearts and minds of our citizens both in Europe and the United States. From 2002 through 2010, a total of 164 terrorism related indictments—or an average of 18 cases per year—were brought against groups and individuals in the Unit-
64
Inside Homeland Security®
Spring 2012
ed States. Of the 164 cases examined in this research, a total of 42 cases have been brought against al-Qaeda central affiliated individuals or groups. Additionally, a total of 39 cases were brought against groups and individuals that could not be linked to a particular terrorist organization. Moreover, a total of 20 cases were brought against groups or individuals affiliated with al-Shabaab. A total of 329 individuals have been indicted in these cases. Of these, 284 have been arrested, 34 are not in custody, and 11 have been killed. Moreover, 198 individuals have been convicted, whereas 70 of them are still awaiting trial. Seventynine indicted individuals were unaffiliated perpetrators and could not be linked to a particular terrorist organization. Additionally, 41 individuals were arrested for their affiliation to the Somalia operating terrorist group, al-Shabaab, and 66 to al-Qaeda. The majority of those indicted (75%) were U.S. citizens. We must note, however, that we did not make a distinction between permanent residents and U.S. citizens. We used a single category (U.S. citizen) to
present their status. From 2008-2010, of the 17 individuals indicted for their affiliation with al-Qaeda, 13 of them were U.S. citizens. During the same time period, of the 48 indicted individuals unaffiliated with a particular terrorist group, 47 were U.S. citizens. Also, of the 29 individuals indicted for their affiliation with the Somali group al-Shabaab, 28 were U.S. citizens. However, we must caution that these findings are tentative. The final verdict for many of these indictments is still pending. Therefore, we must respect everyone’s right to be presumed innocent until proven guilty. Furthermore, there is an increase in the number of single defendant per case indictments. Although there was a considerable drop in the number of single defendant per case indictments in 2004, that number has increased significantly since 2005, indicating an increase in lone wolf terrorism. In terms of the target selection, a thorough examination of the cases indicates that the majority of those indicted had aimed at targets abroad and not in the United States. For instance, although the
www.abchs.com
877.219.2519
As documented by a growing number of court cases involving homegrown terrorists, al-Qaeda and Islamist extremism continues to sway the hearts and minds of our citizens both in Europe and the United States.
number of defendants targeting outside the United States had decreased in 2010 to only 21, in 2009 that number had reached 53, a 194% increase compared to 2008. Since 2005, however, there has been an increase in the number of defendants who declared U.S. as their final target. Equally important, there is a growing number of defendants who, in planning their actions, have not been involved in any overseas operations. Their activities were confined solely to U.S. territory and did not indicate any overseas activities In Europe, in 2009, of the 294 failed, foiled, or successfully carried out attacks, only one could be attributed to Islamist terrorism. Additionally, of the 587 terrorism related offenses in Europe, only 110 were Islamist in nature, a significant drop compared to 188 arrests in 2008 and 201 in 2007, respectively. This indicates a possible decrease in overall Islamist terrorist activities in Europe. Despite the decrease in the frequency of terrorist attacks and arrests, Europe remains highly vulnerable to homegrown terrorists. Around one-fifth of all arrestees were homegrown.
877.219.2519
www.abchs.com
The years 2008, 2009, and 2010, appear to be the years with a greater number of homegrown Islamist-related indictments in the United States. Although such spikes in indictments of homegrown Islamist terrorists in the United States are alarming, one must be careful when interpreting the results. Chiefly, the spike in the number of cases involving U.S. Islamist homegrown terrorists can be interpreted both as an increase in terrorist activities and as evidence that more terrorists are getting apprehended. Equally important, the spike that occurred during the last three years may represent investigations into U.S. Islamist homegrown terrorists that went on for several years before indictments were issued. For instance, the case of U.S.A. vs. Daniel Boyd, et.al, shows that even though the defendants were indicted in 2009, their terrorist activities began as early as 2006. Equally important, despite the fact there is an increase in the number of U.S. Islamist homegrown terrorists, we must be careful when addressing the question of radicalization of the U.S. Muslim population. Although there is an increase on
average of 7 cases per year since 2002, we must not assume any large-scale radicalization of U.S. Muslim community. More specifically, the number of cases of Muslims in the United States involved in Islamist terrorism represents a small minority of the entire Muslim community in the United States; the number of Muslims in the United States today is estimated to be between 5-8 million. The methodology of analyzing terrorism in terms of year-to-year terrorist attacks/incidents and number of defendants indicted can be misleading. In order to move beyond mere description and quantification of the problem, as well as avoid inaccuracies that might arise from any ambiguous and lack of complete data, this research will further make an attempt to survey the possible motivations behind some of the terrorist activities as documented by the courts and open source information in the United States. The aim of such analysis is to try to determine whether possible motivations behind such actions should be understood primarily within al-Qaeda’s global jihad, or some other source of motivation.
Spring 2012
Inside Homeland SecurityÂŽ
65
References:
Anti-Defamation League. (2010). Profile: Omar Hammami. Retrieved January 12, 2010 from: http://www.adl.org/main_Terrorism/omar_hammami.htm?Multi_page_sections=sHeading_3 Cohn, J. (2010, June). Terrorism Havens: Somalia. Council on Foreign Relations. Retrieved from: http://www.cfr.org/publication/9366/terrorism_havens.html Elliott, A. (2010, January 27). The Jihadist Next Door . The New York Times. Retrieved from: http://www.nytimes. com/2010/01/31/magazine/31Jihadist-t.html?_ r=1&scp=1&sq=the%20jihadist%20next%20 door&st=cse EUROPOL.(2010). EU Terrorism Situation and Trend Report TE SAT. Retrieved from: http:// www.europol.europa.eu/publications/EU_Terrorism_Situation_and_Trend_Report_TE-SAT/ Tesat2010.pdf EUROPOL.(2009). EU Terrorism Situation and Trend Report TE SAT. Retrieved from: http:// www.europol.europa.eu/publications/EU_Terrorism_Situation_and_Trend_Report_TE-SAT/ TESAT2009.pdf Find Law. (2010). Cases & Codes. Retrieved from http://www.findlaw.com/casecode/ Hasan, N. (2006). Laskar Jihad: Islam, Militancy, and the Quest for Identity in Post-New Order Indonesia. Ithaca: Cornell South Southeast Asia Program Publications. Investigative Project on Terrorism (2010). Court Cases. Retrieved from: http://www.investigativeproject.org/cases.php Jenkins, B. M. (2010). Would-Be Warriors. Santa Monica: The RAND Corporation. Lechner, J. F. (2009). Globalization: The Making of World Society .Hoboken: Wiley-Blackwell National Counterterrorism Center. (2010). Worldwide Incidents Tracking System [Data file]. Retrieved from https://wits.nctc.gov/FederalDiscoverWITS/index.do?N=0 Nesser, P. (2004). Jihad in Europe: Exploring the Sources of Motivations for Salafi-Jihadi Terrorism in Europe Post-Millennium (Master’s thesis). The University of Oslo & Norwegian Defense Research Establishment (FFI), Oslo, Norway. Patel, F.(2011). Rethinking Radicalization. New
York, NY: Brennan Center for Justice Putzel, Ch. (Producer), (2010). American Jihadi [Video file]. United States. Current TV. RAND. (2010). Rand Database of Worldwide Terrorism Incidents [Data file]. Retrieved from http://smapp.rand.org/rwtid/search_form.php Sakwa, R. (2005). Chechnya: from past to future. London: Anthem Press. Transnational Records Access Clearinghouse. (2010). Trac Reports on Terrorism. Retrieved from: http://trac.syr.edu/tracreports/terrorism/ U.S. Department of Justice.( 2010, October 18). Four men found guilty in Manhattan Federal Court of plotting to bomb synagogue and Jewish community center and to shoot military planes [Press release]. Retrieved from: http://www. justice.gov/usao/nys/pressreleases/October10/ cromitieetalverdictpr.pdf U.S. Department of Justice.(2009, April, 29). One Plotter Sentenced to Life plus 30 years; Second Gets 33 Years in Prison for Conspiring to Kill U.S. Soldiers [Press release]. Retrieved from http://www.justice.gov/usao/nj/press/press/files/ pdffiles/shne0429%20rel.pdf U.S. Department of Justice.(2010, August, 5). Fourteen Charged with Providing Material Support to Somalia-Based Terrorist Organization Al-Shabaab [Press release]. Retrieved from http://www.justice. gov/opa/pr/2010/August/10-ag-898.html United States Attorney Office, Southern District of Florida.( 2009, May 12). Leader of Liberty City six convicted on all counts, four others convicted on multiple counts, and one defendant acquitted on charges of conspiring to support Al-Qaeda attacks targets in the United States[Press release]. Retrieved from http://www.investigativeproject. org/documents/case_docs/886.pdf United States vs. Omar Hammami, 18 USC 2339, 2339 B9 (a) (1) (2009). United States vs. James Cromitie, et al. 18 USC 2332a and 2332g (2009). United States vs. Shnewer et al. 18 USC 9229(g) (5), 922(0), 1117 & 2 (2007) United States vs. Batiste Narseal, et al. 18 USC 2339A, 2339B, 844(n), 2384(2006). Yin, R. (2003). Case Study Research, 3rd edition. Thousand Oaks: Sage
I would like to express my gratitude to my thesis mentors, Dr. Michael J. Fagel and Dr. Jonathan Schachter. Without their expertise, understanding, and patience, this research paper would not have been possible.
Look for Part II in our Summer 2012 issue. A b o u t t h e Au t h o r
Ardian Shajkovci, CHS-I, began his career in the Balkans, where he was employed as a language assistant with the United Nations Interim Administration Mission in Kosovo. He has also worked as a research assistant for several European TV stations and senior university researchers. He received his B.A. in International Relations and Diplomacy from Dominican University, River Forest, IL, and a MA degree in Public Policy and Administration from Northwestern University, Chicago, IL. He is currently pursuing a PhD in the same field. His research interests are in the area of International Security and Conflict Resolution. Specifically, issues of war and peace, nationalism, human rights, terrorism, and ethnic hostility as they impact international security. Ardian is a member of the American Board for Certification in Homeland Security.
66
Inside Homeland SecurityÂŽ
Spring 2012
www.abchs.com
877.219.2519
Make sure your family has a plan in case of an emergency. Fill out these cards, and give one to each member of your family to make sure they know who to call and where to meet in case of an emergency. For more information on how to make a family emergency plan, go to ready.gov
✁
✁ Family Emergency Plan
Family Emergency Plan
EMERGENCY CONTACT NAME: TELEPHONE:
EMERGENCY CONTACT NAME: TELEPHONE:
OUT-OF-TOWN CONTACT NAME: TELEPHONE:
OUT-OF-TOWN CONTACT NAME: TELEPHONE:
NEIGHBORHOOD MEETING PLACE: TELEPHONE:
NEIGHBORHOOD MEETING PLACE: TELEPHONE:
OTHER IMPORTANT INFORMATION:
OTHER IMPORTANT INFORMATION:
DIAL 911 FOR EMERGENCIES
DIAL 911 FOR EMERGENCIES
✁
✁ Family Emergency Plan
Family Emergency Plan
EMERGENCY CONTACT NAME: TELEPHONE:
EMERGENCY CONTACT NAME: TELEPHONE:
OUT-OF-TOWN CONTACT NAME: TELEPHONE:
OUT-OF-TOWN CONTACT NAME: TELEPHONE:
NEIGHBORHOOD MEETING PLACE: TELEPHONE:
NEIGHBORHOOD MEETING PLACE: TELEPHONE:
OTHER IMPORTANT INFORMATION:
OTHER IMPORTANT INFORMATION:
DIAL 911 FOR EMERGENCIES
DIAL 911 FOR EMERGENCIES
✁
✁ Family Emergency Plan
Family Emergency Plan
EMERGENCY CONTACT NAME: TELEPHONE:
EMERGENCY CONTACT NAME: TELEPHONE:
OUT-OF-TOWN CONTACT NAME: TELEPHONE:
OUT-OF-TOWN CONTACT NAME: TELEPHONE:
NEIGHBORHOOD MEETING PLACE: TELEPHONE:
NEIGHBORHOOD MEETING PLACE: TELEPHONE:
OTHER IMPORTANT INFORMATION:
OTHER IMPORTANT INFORMATION:
DIAL 911 FOR EMERGENCIES
DIAL 911 FOR EMERGENCIES
877.219.2519
www.abchs.com
Spring 2012
Inside Homeland Security®
67
Distinguish Yourself as a
CERTIFIED INTELLIGENCE ANALYST EXPERT Intelligence Analyst Certified, IAC ® in Homeland Security IAC offers a study of best practices, tactics, operation, and organization structure, mind set, and leadership in the analysis of intelligence. Please call 877.219.2519 or visit www.abchs.com or e-mail Chief Association Officer Marianne Schmid at cao@abchs.com
The American Board of Intelligence Analysts® (ABIA) CIA0112IHS
Online CE Credits The American Board for Certification in Homeland Security offers FREE CE credits to all members in good standing. To receive free credits, read an Inside Homeland Security® CE article and take the online examination.
IN O C E G LEN tion L A ollabora H C C n S io t CH munication Coopera Co m
Be among the first to obtain this beautiful gold and nickel coin featuring a 3D mold of an eagle and the Statue of Liberty.
Don’t wait, order now!
877.219.2519
CE0112IHS
Only Online Journal-Learning CEs qualify for this free offer. Visit www.abchs.com
This beautifully detailed coin representing the CHS program is now available to you at the low cost of only $14.95
CC0112IHS
Prepareyour&business Protect and family
AD
Natural Disasters
Environmental Hazards
Critical Infrastructure Failures Terrorist Attacks
Na C Ap OOvy pro L ved The American Board for Certification in Homeland Security, CHS速 presents Certified in Disaster Preparedness, CDP-I速 CDP-I was designed to help you prepare your home and family for a state of emergency. Discover the best evacuation practices and response plans to use in the event of a fire, hurricane, tornado, or terrorist attack. Learn the critical details, insight, and solutions that could save your life. DP0112IHS
Call Toll-Free 877.219.2519
Author, Paul Purcell, CHS-V, is the co-owner, vice-president, and lead security analyst for InfoQuest Investigators in Atlanta, Georgia. Established in 1998, InfoQuest Investigators, Inc. performs security analysis for corporate and industrial companies. As an investigator, Purcell created Case File, the in-the-field investigative case management system used by private investigators, law enforcement, and attorneys nationwide. Dedicated to community awareness and preparation, Purcell embarked on a personal quest to create a detailed training guide aimed at improving the emergency preparedness and protection of the average civilian.
www.abchs.com/certification/cdp.php
Feature
middle Eastern Terrorism
Terrorism and the Middle East
A
Anti-American protesters in Pakistan. (Photo Credit: Peter Daniels / MCT)
s the West takes its interests and forces increasingly into the countries of the Middle East, there is an inevitable backlash from the mostly Islamic populations there, many of which espouse the extreme views of terrorist organizations such as al-Qaeda, Hezbollah, the Muslim Brotherhood, Hamas, and others. Pakistan, Yemen, Egypt, Syria, Saudi Arabia, and Bahrain particularly face a difficult challenge in repelling these groups, as anti-western sentiment there is widespread and growing. This article investigates these issues, and the increasing likelihood of a real civil war in Iraq now that the U.S. troops have left. Such a new civil war will further destabilize the entire region. 70
Inside Homeland Security速
Spring 2012
The tactics and strategies of terrorist organizations and individuals are changing, as they try to stay ahead of the operating methods of intelligence and security forces to avoid leaking information about their plans and actions. There have been many successful operations against terrorist groups and individuals conducted by government intelligence and security forces, as well as individuals assisting government institutions. However, the war on terrorism has just started, and this is only the beginning of a long fight, which will require even greater efforts, especially from certain governments in the Middle East. Though there are positive reports about cooperation between governments in the Middle East and those in the West, some Middle Eastern countries are not truly cooperating, because there is a lot of support for the ideas of certain terrorist organizations in those countries, including in some government institutions (i.e. Pakistan). Nonetheless, the fight against terrorism must be maintained, even intensified, and those governments involved must be assisted as much as possible. www.abchs.com
877.219.2519
Anti-American protestors in Pakistan. MCT
By John Didden, CHS-III
Terrorist Support How has Al-Qaeda, for example, won so much support in the Islamic world? Why are so many young people willing to support and participate in terrorist ideas and actions? The answers to these questions are not simple. Complex cultural aspects, social economics, and education in some of the Arabic countries all have an influence. The educational centers in some of these countries constitute one of the most important foundations of terrorism. The fundamental principles some teach, of hating all that is non-Muslim, the so-called “non-believers,” is poisoning the minds of young people and making them blind to the good qualities of these non-believers. Conversations with numerous youths 877.219.2519
www.abchs.com
and many of their parents demonstrated repeatedly that they have been taught in schools which impress that Jews, Christians, and atheists are the real enemies of Islam, and that they are trying to destroy the Islamic principles and rules of life. Any similarities between the Islamic and Christian religions they simply refuse to believe, in favor of repeating their dogmatic principles and statements about the negative way of life of these Christians, and that the ultimate goal of Christianity is to destroy Islam. This approach and attitude apply particularly to students of certain Arabic universities. There are also anti-Christian and anti-Jewish books and brochures in specific Islamic Youth Centers, positively highlighting the Islamic religion and attacking the Christian and Jewish religions. When older leading personalities, such as Imams and senior operatives of terrorist groups manipulate the young with their hatred of almost everything non-Muslim and Western, it is obvious that support for al-Qaeda and other terrorist groups will grow. Furthermore, unemployment adds to the support for terrorist groups. A large number of young unemployed spend their days on the streets, gathering together and complaining about the many expatriates functioning in the private sector. There is resentment among them because they believe the foreigners are taking their jobs. The private sector must understand this problem and help to solve it by being willing to hire young nationals and to provide them with additional training and motivation. The ideas of al-Qaeda and other radical groups in the Middle East are simply to promote extreme Islamic principles, create hate against Westerners who are mainly non-Muslim, create hate against the national rulers, because they are perceived to support Western interest and betray Islam, and finally to remove the rulers and establish a real Islamic regime. So how are governments fighting against terrorism? Having first denied that such elements exist in their country, now they admit that there are “deviant groups” in their country. Several governments in the Middle East have increased their commit-
ment to fight terrorism during the past years and to cooperate with Western intelligence and security forces. As an example: of the Saudi Arabian government’s list of the twenty-six most wanted, only four are still free. This is a positive development. However, since the publication of that particular list, many other individuals have come forward to fill the leading and operational positions within the al-Qaeda organization in Saudi Arabia, and a number of Saudis have returned from Iraq and Afghanistan to support their brothers at home. During the past several years, the Saudi government has successfully taken weapons and other items, including the discovery of so-called safe houses of al-Qaeda. More than 2,000 pieces, including weapons and ammunition, RDX explosives, rocket propelled grenades, homemade bombs, telecommunication devices, chemicals, passports, and cash. However, security specialists, including some from the government, are convinced that much more of this type of weaponry remains in the hands of terrorists. The smuggling of weapons from mainly Yemen but also Iraq into Saudi Arabia is still a profitable and thus ongoing activity. The biggest problem the Saudi government faces in the fight against terrorism is the disbelief held by a great part of the Saudi population that real Muslims could be terrorists. Moreover, there is considerable support for the ideology of al-Qaeda in the population, and, even worse, within Saudi government institutions as well. As long as certain authorities within the Arab society openly support terrorist ideology and are not corrected by their government, the problem will remain. It is a justified statement that hatred against the West and non-Muslims exist, and is increasing rapidly. It is a fact too that terrorist attacks will continue, despite all the efforts of well-willing governments.
Economic Effects
Many Western companies operating in Arab countries have problems with employees who refuse to return there, while skilled Western manpower is difficult to find because of security concerns. Despite the incentive of large bonuses, the companies still face extreme difficulties. Spring 2012
Inside Homeland Security®
71
Anti-American protesters demonstrate in the Aabpara Market in Islamabad, Pakistan. (Photo Credit: Peter Tobia/MCT)
Obviously, these factors will have an input on the economy in the medium-term. This scenario fits well with the strategy of al-Qaeda. Basically, al-Qaeda has three main aims. First, to reduce or remove the influence of the West and Western interest in the region, resulting in a downturn in the economy. Second, most rulers/governments are betraying Islam through its cooperation with the West and its Western interest, which will create a more open demonstration of anti-rulers/government culture, which will most likely be manifested on the streets. The third goal is to oust the rulers/government, and to replace it with an extreme Islamic government to rule the country. 72
Inside Homeland Security速
Spring 2012
In order to increase anti-rulers/government and anti Western feelings, the al-Qaeda organization has a well-prepared doctrine. This involves the spread of their ideas in schools and Mosques to indoctrinate young people and especially the unemployed. It also requires the recruitment of clerics to their cause to ensure that their ideas are accepted and spread to the population, and the use of mass media such as TV to infiltrate and promote the strategy and recruit young nationals to become actively involved in al-Qaeda operations. What can be expected in the near future? The answer to this question is not difficult, nor is it positive, but it is realistic. Anti-Western sentiments will grow rapidly,
and not the least through the incitement in schools and Mosques. More terrorist attacks, be they towards rulers/government interests, Western interests or Western individuals, will be executed by al-Qaeda and other radical organizations, resulting in a larger exodus of Western expatriates. It is to be expected that these terrorist groups will do everything possible to make future attacks more spectacular than previous ones.
Iraq Unrest
One other aspect that should be considered here is the situation in Iraq. We already can see that Shiites, Sunnis, and Kurds do not work together as the Western world would like it to happen. The poswww.abchs.com
877.219.2519
sibilities of an all-out civil war in Iraq are real. Certain indications are already visible. Sunnis and Shiites have been fighting each other for over twelve centuries, a situation that will not change in the foreseeable future. It is expected that their fight will “re-open” again after the U.S. troops move out. The current Iraqi government will be powerless, and will most probably ask their “brothers” in Iran to assist in restoring the order. When that happens, it will affect the surrounding countries and those effects will definitely not be positive, considering terrorist developments. It should be realized that Iraq is basically a training area for terrorist operations. Once there is a civil war, numerous socalled insurgents could return to their home country or to any other Arab country to support and increase al-Qaeda activities or associated terrorist groups. It must be recognized that most of these insurgents are deeply motivated, and have a lot of experience in sophisticated bomb making, preparing ambushes, attacks, and so forth. They are well trained and experienced in organizing terrorist cells as well as use of specific communications methods, which are hard to discover or be intercepted by intelligence and security forces. The governments of the surrounding countries must prepare themselves by modernizing their intelligence-gathering information. They must increase border controls now, not when a civil war starts, and they must be more open and cooperative with the intelligence and security forces of Western countries. Only then can al-Qaeda and other terrorist groups’ activities be limited.
Pakistan
In general terms, Pakistan is marked as an alien of the Western fight against terrorism. However, certain governmental institutions, especially a number of members of the Pakistani Intelligence Services, are supporting the Taliban with advice, information, and supplies. Western intelligence and security forces have hard proven facts of these developments. Evaluating subject-related developments during the past three years can only lead to the conclusion that these people are increasing their support for the Taliban. It is obvious that such develop877.219.2519
www.abchs.com
ments are unacceptable, and that Western governments, especially the United States, should seriously consider stopping their financial and material assistance for Pakistan. These governments should increase their relationship with India, which has proven to be a trustworthy partner of the West, while it will create a situation whereas Pakistan, being afraid of India’s influence in the region, will most probably start to control and correct their intelligence services.
Egypt – Libya – Syria
The so-called “democratic movements” in these countries will end up causing more hatred towards the Western world and increasing the support for Islamic terrorist organizations. Of course, the people in these countries have the right to stand for democracy and a more open society, less controlled by their rulers and intelligence and security forces. However, these democratic movements are heavily infiltrated and manipulated by Islamic radical/ extreme organizations, such as Hezbollah and the Muslim Brotherhood. The West should be aware that once the democratic movements are growing and find increasing support of the population, these movements will be used by i.e. Hezbollah and the Muslim Brotherhood as “tools” to create an extreme Islamic regime, living by Sharia Laws. We are currently confronted with such a situation in Egypt and Libya while the current situation in Syria will most likely be following these developments soon. It is obvious that these countries will rapidly increase the antiWestern sentiments in the region, with all consequences thereof. Besides the aforementioned, there is an even bigger threat as a result of the above. The only real friend of the West in the Middle East, being Israel, will be more and more isolated and surrounded by only enemies. It is the moral and human duty of the Western world, and more specifically the United States, to make it clear to the Middle Eastern countries that Israel is the closest friend in the region and will be supported at all costs. One has to realize that only straight forward and clear language will have its effects on the Arab countries, so let the Western world stop by trying to be “friends” with all parties! Spring 2012
Inside Homeland Security®
73
An unruly crowd of 4,000 anti-American demonstrators are kept from climbing on a truck that was leading the protesters in Rawalpindi, Pakistan. (Photo Credit: Peter Tobia/MCT)
IRAN THE threat to the Middle East and the rest of the world. The only ambitions of the Iranian regime is to establish a world Caliphate using Hezbollah as their forwarded troops, starting in the Middle East and soon joined by the rest of the world. An important phase of this process is the destroying of the State of Israel and its people. The author, and for sure many others, urges the Western world not to jump in to the trap of the Iranian regime. The Europeans negotiated with the Iranian rulers for many years without any success. Now the United States has demonstrated several times that they are willing to negotiate (again) with the Iranian regime. How in the world do some people in the United States government not recognize the fact that Iran just wants to create more time? One has to recognize that Arabs are “masters” in negotiations. They give a little first and take back more later. It is clear that the Iranian regime wants nuclear weapons, and is working hard to reach that goal as soon as possible. It should not surprise the world that such weapons will be used to attack and destroy Israel. It is a justified statement that Iran currently has enough nuclear material to produce at least two nuclear weapons.
74
Inside Homeland Security®
Spring 2012
Americans need to wake up: Iran is the greatest threat to peace in the Middle East, as well as democracy and freedom in the rest of the world.
Remarks
Notwithstanding the fact that this article is just a summary of the terrorist developments in the Middle East, the author hopes that he was able to highlight the most important subject-related issues.
One Last Remark
After 23+ years living and working in the Middle East, I returned to the United States. Watching several different T.V. stations and listening to several different radio stations since my entry into the states, I am surprised by how many people in this wonderful country are careful
when talking about Muslims and terrorist threats. The so-called “political correctness” is the guideline for many when the subject of Muslims and extremism/terrorism jumps up during a conversation. Are we afraid to tell the truth, or is it that we are afraid of “looking bad” in the eyes of others? The truth is very simple and has to be recognized and openly mentioned. “There is a Muslim problem in the world!” See what is currently going-on in a great number of Middle Eastern countries. Of course, people want democracy and they do deserve it, but many do not realize that behind the scenes Iran’s rulers and the Muslim Brotherhood are orchestrating and manipulating them, which finally could result in a similar rule of living as currently in Iran: the Sharia Law!
A b o u t t h e au t h o r John Didden, CHS-III has worked in the intelligence and security arena for forty years, many of which were dedicated to the fight of terrorism, particularly against Baader-Meinhoff, IRA, al-Qaeda, Hezbollah, Hamas, the Muslim Brotherhood etc. He has over two decades of security experience in the Middle East.
www.abchs.com
877.219.2519
Provisional New Members
Provisional New Members Dylan Adams Brian Adamson Michael Adams-Valerio Guerlinz Affriany Nicholas Alford Jenvia Allen Daniel Alvia Cody Anderson Michael Anderson Ronald Armstrong Christopher Arnold Jesus Arroyo Luis Arroyo Thomas Ashley Marcus Avina Jamie Bacchas Michael Barker Michael Bernard Katelynn Bigham Luis Bispo John Blake John Boeglin Candice Boyd Charles Bradford Thomas Breitfeller Timothy Bridgeman Danny Brooks Loren Brown Troy Brown Marshall Button Robert Buxton Mark Byers Vincent Campolo Francisco Cancel Louwarren Canton John Caole Kathi Carmack Kristopher Carmody David Carroll 877.219.2519
www.abchs.com
Keith Carson Bryon Carter Ronald Casas Adam Cerri Ranae Chavez Thomas Christensen Robert Claflin Casey Clark Kenneth Clark Jimmy Combs Christine Conley Nathan Connor Timothy Cooper Yolanda Corro Derrick Cote Eric Cothran Christopher Cox Marques Crockett Fredrick Cuffy Corbee Curlee Michael Daley Seaen Danyus Michael Davidson Brian Day Maurice Deenihan Osmany Delbrey Cesar Diaz Keesha Dixon Kevin Doby David Domonkos Daniel Drury Mark Durand Justin Dutton Benjamin Eastman Christopher Edge Nicholas Ellis Bill Fahlsing Christopher Fajkus Kenneth Farnham Steve Fernandez
Daniel Fillmon Randolf Foronda Christopher Frantz Matthew Fridley Spencer Frink Alexander Frost Christina Gallegos Anthony Garcia Jeffrey Garry Kathleen Garza Marc Gerhart Mark Geri Jonathan Gil Burgos Bryan Gilham Phillip Girondi Brandee Goldsberry Melvin Golmond Randal Gossert Eric Gross Donald Grothe Christopher Haas Trevor Hadley Jason Haka Joshua Hartigan Everett Hatch Robert Hayhurst Christopher Hernandez Gonzalo Hernandez Raymond Hershey Stephen Hippelheuser Andrew Hobbs Eric Hodgson Damien Holmes Ernst Holzhausen Michael Hopkins Mitchell Horn Jason Horne Jacob Hubbard Jesus Huertas Robert Hughbank Taurean Hunt Jordan Hunter Natisha Iheanachor Benhur Jacob Donald Jacobs Edward Jacobs William James Thomas Jensen Jerrod Jerrolds Patrick Jessee Natasha Johnson Paul Johnson Shelita Johnson
Howard Johnston Aaron Jones Amy Jones Norman Jones Aldwin Joseph Frederick Joshua Fahmi Kaddour Ervin Kelly Heston Killip Billy Kingry Steffen Kingsley Corey Kozera Emerson Kraus George Kraynak Bretton Kulin Justin Laferriere Miguel Laines James Lamb Kelly Lawall Joseph Lee Marc Levine Donnell Lewis Jeff Lichtfuss Anthony Lomboy Joshua Lopez Matthew Lundeen Christal Madison Kenneth Maher John Malloy Jon Malone Robert Manyak Bianca Manzanero Courtney Marr George Marsinko Eric Martin Bryan Martinez Santos Mark Mather Jonathan Maurer James May Brendan Mcavoy Latashia McGee Megan McKee Nathan McKoy Jalyn McMurry Harry Medinger Kevin Meeks Brandon Meinbresse Alton Merricks Carol Merricks Jermaine Milford Douglas Molokken Colton Moser J Moua Spring 2012
Inside Homeland Security速
75
Provisional New Members and Newly Credentialed Benjamin Murray Ken Musick David Musil Michael Mutz Nicole Nash Allan Navarro Lee Neutzling William Nuesse Shon O Connell Peter O’Brien Joseronaldo Ocampo Randolph Oden George Oldroyd Mario Olivarez Dale Oliver Jason Oliver Benjamin Olney Stan Ortega Thaddeus Osbourne Jeffery Ottah Phil Owen Gregory Pearce Brian Percle Jeffney Peterman Malcolm Peterson Christopher Pilgrim Sergio Pina William Pittman Keith Posson Leon Poulson Kenneth Pratt David Prieto James Puncel Roden Quibuyen Julian Quintero Adam Reed Alexandria Reid Richard Rengifo Joshua Reynolds Gincie Rhodes Nathan Richards Justin Ricks Nicholas Rios Gene Rivera Luis Rivera Michael Rivera Melinda Rockwell William Rogacki Christina Rojo Michael Ronga JT Rose Ariel Rosemond Steve Ross 76
Inside Homeland SecurityÂŽ
Cecilia Rowland Tabatha Royston John Rudolph Edward Ruiz Charles Runner Arnel Salapantan Sean Paul Salas David Scardino Jeremiah Schexnayder Jason Schneider Ian Scholz LeeAnn Schott Christopher Scott Randall Searls Jashir Setias Ronald Simpson David Sitone Lorenzo Smith William Spring Jerry Spude Jacob Stampfli John Stankiewicz Jason Sterrett Jason Stewart Shawn Stewart Nicholas Stonehocker Sarah Surprenant Monique Tate Daniel Tellez Kenton Thomas Walter Thomas Jessicarose Thurber Justo Victorio Torres Carlos Trabanco Christopher Trantas Andrew Trout Andrew Trush Adam Turner Eric Turner Lance Tyree Jonathan Vacho Paul Van Raemdonck Nicholas Venzke Tomas Villarreal Charles Vinson Mitchell Vizcainoruiz Gregory Waite Miguel Wallace Milton Walters David Waltz Rick Wangen Amber Wanner Joe Wanner Spring 2012
Gary Warren Brandon Waters Michelle Watson Jessica White Mark White Shanicca White Nicholi Whitter Austin Wilchek Ryan Williams Latoya Willis William Wilson David Wimberly Adam Winebarger Samual Wolfram Daniel Woolman Krystal Yagovane Jerry Young Matthew Young Steven Young Habib Zaiden Crisogono Zavalapena Francisco Zepeda Roberto Zule Newly Credentialed Dominic Abano Enrique Acosta-Gonzalez Paul Adkins Guerlinz Affriany Rufino Aguinaldo Virgilio Alcozar Elizabeth Alexander Mikel Alford Jose Alire Jason Allen Joseph Alvarez Daniel Alvia Jason Anastos Jennifer Andrews Christopher Arnold Thomas Ashley Marcus Avina Jamie Bacchas Alan Baker David Barber Stephen Barber Ronnie Barnett Peter Barreto Lee Barrick Alexander Bates Justin Bates Jarvis Battle Dwana Bellamy
Richard Bennett Vena Berry Garett Birnbaum Lahue Bishop John Blake Michael Boldizsar Jamal Borden Ryan Boudreau Joseph Bougie Jason Boutwell John Bowman Brian Breeding Kourtney Breen Patrick Bridges Danny Brooks Jacob Brooks Kevin Brooks Erik Brown Kent Brown Marcus Brown Misty Brown Troy Brown Jerry Brumley Cory Brun Marion Bryan Dustin Buchanan Joseph Burchfield Kenneth Burkhalter Terry Bush Joshua Butterfield David Byrd Thomas Byrd Kyle Callahan Rey Canonizado Kenny Caraballo Jimmy Caritativo Kathi Carmack Jason Carpenter Keith Carson Bryon Carter Ronald Casas Leroy Caswell Garret Chadek Phillip Channer Dion Charles Ricardo Charles Brian Chase Antonio Chavezplata James Cheney Joseph Chiaffino Scott Chilko Luke Chima Justin Chinana www.abchs.com
877.219.2519
Newly Credentialed Rafael Cisneros Robert Claflin Casey Clark Jason Clark Thomas Clark Jacob Clarke Margaret Clay William Clements Cruz Cline Jennifer Conger Eduardo Contreras Dustin Cooke Charles Copeland Ernesto Cortez Daniela Cossio Edmund Costigan Derrick Cote Eric Cothran Richard Crowell Sara Crusade Vincent Curci George Currier Andres Custodio Kurt Daesch Marcus Darling Jamal Davis Jason Davy Douglas Dawson Brian Day Maurice Deenihan Rey Delacruz Donald Delomba Amanda Demarest Tabatha Dennis-Byrd Joshua Dietrich Kevin Doby Dennis Doherty Alex Dorais James Douglass Sean Downey Amie Downing Kerith Drummond James Dunston Benjamin Eastman Christopher Edge Sumiyyah El-Ansari James Elgin Claude English Ronald Eusebio Robert Faber Christopher Fajkus Juan Fimbres Daniel Formichelli 877.219.2519
www.abchs.com
Jerry Foster John Franklin Robert Franklin Jamie Frantz Matthew Fridley Spencer Frink Lawrence Fuller Francisco Garcia Hope Garcia Jose Garcia Shawn Garcia Randy Gardner Kathleen Garza Joseph Gatto Javier Gaulden Marc Gerhart Mark Geri Sean Gerloff Franklin Gibbs Thelma Gibson Anthony Glinke Joshua Gooch Joseph Goodwin Richard Gregg Jason Grey Eric Gross Jeffrey Guidry Denise Gutierrez Trevor Hadley Jason Haka Bradley Hale Steven Hall Kuamaine Hamiter Rosalind Harris Joshua Hartigan Le Hastings Timothy Hasty Jeremy Healey Eric Heiden Christopher Helmer Wade Hemry Nick Henley Edward Henriksen Karvarees Herman Christopher Hernandez Javier Hernandez Raymond Hershey Brian Hickman Mark Hicks Kevin Hill Stephen Hippelheuser Joshua Hitz Ryan Hodges
David Holcomb Richard Holman Brandon Hooks Michael Hopkins Mitchell Horn Michael Housley Namon Houston Justin Howerton Jesus Huertas Robert Hunter Benhur Jacob William James Larry Janssen Michael Jarrell Tracy Jenkins Patrick Jessee Vincent Jiordano Alvin Johnson Joseph Johnson Richard Johnson Vandeaven Johnson Howard Johnston Amy Jones Kendall Jones Terrence Jordan Paul Joya Fahmi Kaddour Albert Kalber Jordan Kalter Scott Kanerva Ervin Kelly Thomas Kelly Yusuf Kezala Steven Kile Joseph King Wilkinson Kinyon Philip Klevze Ryan Knepshield Charles Knurek Emerson Kraus Christina Krause George Kraynak Bretton Kulin Levi Kvande Humberto Laguna James Lamb Calvin Lambrix Kelly Lawall Brian Lee Brent Leffel Tad Lefor Christopher Lester Stacy Leverett-O’Leary
Adam Levine William Lewis Jeff Lichtfuss Mark Lindert Antwaun Lindsey Joseph Lisondra Jason Loughran Antonio Lucero David Ludlow Matthew Lundeen Zachary Lyons Andrew Macdonald Kenneth Maher Jamie Makowka Miguel Maldonado John Malloy Robert Mance James Marchese Louis Marks William Markson Eric Marsh George Marsinko Genevie Marston Eric Martin Nora Martin Vincent Martin Benjamin Martinez Xavier Martinez Mark Mather Dennis Mattingly Kristen Maxwell Thorson Maye Latashia McGee Stephen McGovern William Mcgrath Alfred McGuire Chad Meadows Steven Meakins James Meares Constance Mention-Williams Carol Merricks Jermaine Milford Benjamin Miller James Miller Paul Minix Travis Mitchell Demetrick Mixon Douglas Molokken Benjamin Monnin Paul Morford John Morgan Stephen Morgan J Moua Spring 2012
Inside Homeland SecurityÂŽ
77
Newly Credentialed Rachel Mumpower Dennis Murphy Benjamin Murray David Musil Ryan Nasworthy Allan Navarro Barbara-Anne Nealon Leslye Nelsen Matthew Neumann Eldukl Ngiraingas John Nitti Sanchito Noveno Randolph Oden Onoriode Ohwevwo Korey Oleson Jason Oliver Benjamin Olney Tattianna Olvera Gerald Orehosky Arnel Ortega Manuel Ortiz Jeffery Ottah Stephen Oubre Christopher Owens John Patterson John Paul Gregory Pearce John Pelazza Ketia Pickett Craig Pierce Darren Pierson Christopher Pilgrim Susan Piscator Cody Plihal Matthew Poland Luisito Pontigon Keith Posson Lawrence Priester David Prieto James Puncel Manoj Ram Melvin Ramos Daniel Randall Louis Raniszewski Marcus Raschke Stephen Rasmussen Joseph Rector Adam Reed Brian Rhodus Ronald Richards Stephanie Richards Aaron Ricker Justin Ricks 78
Inside Homeland Security速
Clint Riddle Teddy Ripley Lokelani Rivera Damian Robinson Juli Robison Emilio Rodriguez William Rogacki Nicolasa Roman Nelson Romeu Michael Ronga Jonathan Rose Kelly Rose Ariel Rosemond Erica Roten Cecilia Rowland Billy Ryan Arnel Salapantan Sean Paul Salas Christopher Salisbury Robert Sanchez Andria Sanders Anthony Saranchak James Sartori Keith Sawyer Dynesha Scantling Ian Scholz Matthew Schwantz Christopher Scott Randall Searls Sandra Shannon Brandon Sharman James Sharpe Nicholas Sharpe Jerry Shenefield Bryan Silveri Joaquin Silvia David Simpson Brandon Small Jeremy Smith Jason Snellings Charles Soos Arturo Soria Carlos Soto Charles Southern Russell Spoon Pamela Spring James Sprools Lester Stahli Christopher Stewart Shawn Stewart Bryan Stith Demetrius Stitmon Matthew Stone Spring 2012
Sarah Surprenant Mark Svatek Bradley Swetland Purcell Tabron Travis Tackett Dennis Tadlock Mohamad Tarabah Dina Taylor Edison Taylor Jerome Taylor Misty Taylor Steven Theiss Paul Thibodeaux Gregory Thomas Jonathan Thomas Victoria Thompson Roger Tice Corveno Tobler Elyana Torres Justo Victorio Torres Allen Trojanowski Matthew Tubolino Kristen Tucker Rocky Tumaneng Robert Turner Thomas Twigg Lance Tyree Matthew Tyson Michael Urban Salvador Vargas John Vautour David Vest Francisco Villalon Oscar Villarreal Randall Wagner Michael Waiters Brett Wallace Veatra Walter Rick Wangen Gary Warren John Wassel Michelle Watson Shawn Watson Preston Watts Gregory Waymaster Ronald Weeden Frederick Whiting Nicholi Whitter Harry Wickhorst Cody Williams Richard Williams Robert Williams David Wimberly
Rodney Winch Susan Woerner Matthew Woods Daniel Woolman Erica Wright Phillip Wright Simon Wyant James Wydra Teri Zehnacker Michael Zicopula Ryan Zollicoffer
New Diplomates Eric R. Alberts Marc E. Glasser Joseph L. Rector New Fellows Shayne Bates George Breed, Jr. Angel Garrido Emmanuel Godinez Raymond Hamden James Saffold
www.abchs.com
877.219.2519
Order your ABCHS logo products today! Logo products that state “Certified in Homeland Security” are available only to those individuals who currently hold the credential(s) CHS I, II, III, IV, or V. B A
A. ABCHS WOMEN’S DRESS SHIRT
$55
D
COLORS: light blue, sage, or cream • SIZES: S to XXL
B. ABCHS MEN’S DRESS SHIRT $55
COLORS: gray, sage or black • SIZES: S to 3XLT
C. ABCHS PATCH $5
F C
D. ABCHS LAPEL PIN $5
E
E. ABCHS MEN’S FLEECE JACKET $60 COLOR: black • SIZES: S to 3XL
F. ABCHS MEN’S POLO SHIRT $48
COLORS: black, red, tan, seafoam green • SIZES: S to 3XL
E
ABCHS WOMEN’S POLO SHIRT $48
COLORS: black, red, seafoam green • SIZES: S to XXL
H
G. ABCHS MEN’S T-SHIRT $24 COLOR: black • SIZES: S to 3XL
H. ABCHS MEN’S CAMP SHIRT $55 COLOR: black • SIZES: S to 3XL
G
I. ABCHS MEN’S ALL-WEATHER JACKET* $60 COLOR: black • SIZES: S to 3XL *Please circle one: with or without back imprint)
J. ABCHS PADFOLIO $20 K. ABCHS HAT $15
COLOR: black • SIZES: one size fits all
I K BACK
2750 E. Sunshine, Springfield, MO 65804
J
Phone: 877.219.2519 • Fax: 417.881.1865 • Web: www.abchs.com Item
Name
Size
Quantity
Total
I.D. Number Deliver To (Street Address Only) Address
Sub-Total
City/State/Zip Please DO NOT send cash
Shipping & Handling (see chart on the left)
Total r Mastercard/Visa
r Am. Express
r Discover Exp. Date
LOGO0311IHS
Rush Delivery SHIPPING COSTS: • Lapel pin $5.00 • 1 item (other than above) $12.00, 2 items $13.00, 3 items $14.00, 4 items r Check/Money Order $15.00, 5 items $16.00, 6 items $17.00, 7 items $18.00, 8 items $19.00, 9 items $20.00, add $1.75 for each additional item. Credit Card Number • Standard overnight add $30.00 to number of items cost. • International shipping add $50.00 to number of items cost. Signature • Allow 4-6 weeks for delivery.
CE ARTICLE 1: (Pages 10–18)
Violence at Our Border: Its Potential Effects on Homeland Security ATTENTION ABCHS MEMBERS: Journal-Learning CEs are FREE when taken online. Visit www.abchs.com.
TO RECEIVE CE CREDIT FOR THIS ARTICLE
LEARNING OBJECTIVES
In order to receive 1 CE credit, each participant is required to
After studying this article, participants should be better able to do the following:
1. Read the continuing education article.
1. Discuss the Mexican Cartel network and logistic train from Latin America to Canada.
2. Complete the exam by circling the chosen answer for each question. Complete the evaluation form. 3. Mail or fax the completed form, along with the $15 payment for each CE exam taken to: ABCHS, 2750 East Sunshine, Springfield, MO 65804. Or Fax to: 417-881-4702. Or go online to www.abchs.com and take the test for FREE. For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing education credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do not pass the exam are notified and will have a second opportunity to complete the exam. Any questions, grievances or comments can be directed to the Registrar at (877) 2192519, fax (417) 881-1865, or e-mail: registrar@abchs. com. Continuing education credits for participation in this activity may not apply toward license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state licensing board(s). Continuing education activities printed in the journals will not be issued any refund.
CE ACCREDITATIONS FOR THIS ARTICLE This article is approved by the following for 1 continuing education credits: The American Board for Certification in Homeland Security, CHS® provides this continuing education opportunity for those individuals Certified in Homeland Security, who are required to obtain 30 Certification Maintenance Unit’s (CMU) per 3-year recertification cycle. KEYWORDS: Terrorism, cartel, Mexico TARGET AUDIENCE: Homeland Security Professionals
2. The Cartel Pacifico Sur (CPS) primarily operates in what region? a. The South-Central Mexican state of Morelos b. Northern Chuahua c. Independence Blvd in Tijuana d. Mexico City
2. Identify the potential resources available to international terrorists for crossing the southern United States border unimpaired. 3. Explain the coordinated efforts between United States and Mexican agencies in the opposition to the drug cartels and violence in Mexico.
3. What is considered North America’s most violent drug cartel? a. Cartel Pacifico Sur (CPS) b. The Arellano Felix Organization (AFO)
Abstract
c. La Lupita
Today the Department of Homeland Security maintains its initiatives in keeping our country safe, but on the global stage there are still idealistic people numbering in the millions who despise the way of life of the westerner, and plan continuously for our demise. Opportunities, however, still exist which provide a means for the bad guys to create havoc and attempted destruction here in our country. There is still a question which still looms over our heads: even after ten years of planning and action to prevent more attacks here, how do we prevent access to our lands by our foes who want to attack us again? This paper will delve into the reasons that Mexico, especially along its northern border, has gone from a romantic and mystic get-away to a violent and evil domain of drug and human traffickers and domestic and international terrorists.
d. The Los Zetas organization 4. What organization has reported a very dangerous environment in Mexico, since 2000, where 80 of its members have been killed? a. The Mexico City Police Department b. World Health organization c. The Reporters Without borders d. The Drug Enforcement Agency 5. The Iranian government has been identified as trying to use Mexican drug cartel resources to affect an assignation in the United States. a. True b. False 6. What does the acronym SBI stand for? a. Secure Border Initiative
POST CE TEST QUESTIONS (Answer the following questions after reading the article)
1. During Mr. Calderons’ presidency of Mexico, how many people have lost their lives in the battle against the drug cartels?
PROGRAM LEVEL: Intermediate
a. 644
DISCLOSURE: The authors have nothing to disclose.
b. Over 119,000
b. Secret Border Independence c. Second Biggest Incident d. Standard Bail Initiative
c. Over 40,000 d. 34,612
Course Code: IHSSP0112 EVALUATION:
PAYMENT INFORMATION:
Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent)
Member $15 per test /FREE ONLINE
If you require special accommodations to participate in accordance with the Americans with Disabilities Act, please contact the Registrar at (877) 219-2519.
Name:
State License #
Phone Number:
Member ID #
Address:
City:
State:
E-mail:
1. Information was relevant and applicable. ........................................................1 2 3 4 5 2. Learning objective 1 was met...........................................................................1 2 3 4 5 3. Learning objective 2 was met...........................................................................1 2 3 4 5 4. Learning objective 3 was met...........................................................................1 2 3 4 5 5. You were satisfied with the article....................................................................1 2 3 4 5 6. ADA instructions were adequate......................................................................1 2 3 4 5 7. The author’s knowledge, expertise, and clarity were appropriate......................1 2 3 4 5 8. Article was fair, balanced, and free of commercial bias. ...................................1 2 3 4 5 9. The article was appropriate to your education, experience, and licensure level........ 1 2 3 4 5 10. Instructional materials were useful............................................................................1 2 3 4 5
80
Inside Homeland Security®
Spring 2012
Zip:
Credit Card # Circle one: r check enclosed r MasterCard r Visa r American Express r Discover Name on card:
Exp. Date:
Signature
Date
Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your payment for each test taken. Fax: (417) 881-1865, or mail the forms to ABCHS Continuing Education, 2750 E. Sunshine, Springfield, MO 65804. If you have questions, please call (417) 823-2519 or toll free at (877) 219-2519.
www.abchs.com
877.219.2519
CE ARTICLE 2: (Pages 56–66)
Major Islamist Terrorist Organizations: Just Icons, or More? Part One ATTENTION ABCHS MEMBERS: Journal-Learning CEs are FREE when taken online. Visit www.abchs.com.
TO RECEIVE CE CREDIT FOR THIS ARTICLE
LEARNING OBJECTIVES
In order to receive 1 CE credit, each participant is required to
After studying this article, participants should be better able to do the following:
1. Read the continuing education article.
1. Explain the current (growing) level of “homegrown” Islamist terrorist threat in the United States and Europe
2. Complete the exam by circling the chosen answer for each question. Complete the evaluation form. 3. Mail or fax the completed form, along with the $15 payment for each CE exam taken to: ABCHS, 2750 East Sunshine, Springfield, MO 65804. Or Fax to: 417-881-4702. Or go online to www.abchs.com and take the test for FREE. For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing education credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do not pass the exam are notified and will have a second opportunity to complete the exam. Any questions, grievances or comments can be directed to the Registrar at (877) 2192519, fax (417) 881-1865, or e-mail: registrar@abchs. com. Continuing education credits for participation in this activity may not apply toward license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state licensing board(s). Continuing education activities printed in the journals will not be issued any refund.
CE ACCREDITATIONS FOR THIS ARTICLE This article is approved by the following for 1 continuing education credits: The American Board for Certification in Homeland Security, CHS® provides this continuing education opportunity for those individuals Certified in Homeland Security, who are required to obtain 30 Certification Maintenance Unit’s (CMU) per 3-year recertification cycle. KEYWORDS: terrorism, al-Qaeda, homegrown terrorism, jihad, “lone wolf ” terrorism
2. Discuss the current (growing) level of Islamist threat worldwide 3. List possible sources of motivations of “homegrown” Islamist terrorists in the U.S.
b. Social inequalities in their host country c. Social and political events in their country of origin d. The War on Terror 3. The majority of the U.S. homegrown jihadi terrorists had: a. Aimed at targets in the United States b. Aimed at targets in Europe
This research will explore the nature of Islamist terrorism today. More specifically, the goal of this research is to answer the following questions: Is there an indication of the existence of Islamist groups or individuals unaffiliated with a terrorist group but adhering to a common ideology of “global jihad,” as promoted by al-Qaeda? Is there an indication that the roles of major terrorist organizations, such as that of al-Qaeda, are rather diminishing—acting as a point of reference for independent terrorist groups and individuals only? To address these questions, this research will utilize both qualitative and quantitative analytic methods, as well as current literature on the topic. In the context of our research, we will argue that 1) al-Qaeda continues to pose a serious threat both locally and internationally and 2) there is a growing number of radicalized individuals and groups living inside the United States and Europe ready to initiate attacks, at the direction of foreign groups or on their own. Additionally, this research will explore the possible motivations of some of the “homegrown” terrorists in the United States. The point will be made that the possible motivations of “homegrown” terrorists should not be understood primarily within the context of “global jihad.”
POST CE TEST QUESTIONS (Answer the following questions after reading the article)
PROGRAM LEVEL: Basic
1. Since 2001, there is an increase in the number of U.S. homegrown jihadi terrorists
PREREQUISITES: None
a. Al-Qaeda’s “global jihad”
Abstract
TARGET AUDIENCE: Professionals in the field of homeland security DISCLOSURE: The authors have nothing to disclose.
2. The U.S. homegrown jihadi terrorists are primarily motivated by:
c. Aimed at targets in the Middle East and South Asia d. Aimed at targets in South America 4. The examination of nine cases involving US homegrown Islamist terrorists suggests: a. A single process that leads to extremism b. Terrorists follow a definite ethnic/socio-economic pattern c. One should base threat assessment on ethnicity, citizenship or group affiliation only d. Each case is unique and not all share the same identifiable markers. 5. The majority of the individuals arrested for Islamist-related terrorism in the United States were: a. Linked to al-Qaeda central b. Linked to Al-Shabaab c. Linked to Hizballah d. Unaffiliated with a particular terrorist group
6. Since 2007, this region is considered to be the top terrorism-infested region in the World: a. South Asia b. The Middle East
a. True
c. Africa
b. False
d. South America
Course Code: IHSSP0212 EVALUATION:
PAYMENT INFORMATION:
Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent)
Member $15 per test /FREE ONLINE
If you require special accommodations to participate in accordance with the Americans with Disabilities Act, please contact the Registrar at (877) 219-2519.
Name:
State License #
Phone Number:
Member ID #
Address:
City:
State:
E-mail:
1. Information was relevant and applicable. ........................................................1 2 3 4 5 2. Learning objective 1 was met...........................................................................1 2 3 4 5 3. Learning objective 2 was met...........................................................................1 2 3 4 5 4. Learning objective 3 was met...........................................................................1 2 3 4 5 5. You were satisfied with the article....................................................................1 2 3 4 5 6. ADA instructions were adequate......................................................................1 2 3 4 5 7. The author’s knowledge, expertise, and clarity were appropriate......................1 2 3 4 5 8. Article was fair, balanced, and free of commercial bias. ...................................1 2 3 4 5 9. The article was appropriate to your education, experience, and licensure level........ 1 2 3 4 5 10. Instructional materials were useful............................................................................1 2 3 4 5
877.219.2519
www.abchs.com
Zip:
Credit Card # Circle one: r check enclosed r MasterCard r Visa r American Express r Discover Name on card:
Exp. Date:
Signature
Date
Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your payment for each test taken. Fax: (417) 881-1865, or mail the forms to ABCHS Continuing Education, 2750 E. Sunshine, Springfield, MO 65804. If you have questions, please call (417) 823-2519 or toll free at (877) 219-2519.
Spring 2012
Inside Homeland Security®
81
The american board for Certification in Homeland Security, CHS速
Check out these additional certificates at www.abchs.com
Certified National Threat Analyst, CNTATM: Enhance your skills and abilities in identifying and analyzing terrorist threats in diverse settings and applications Intelligence Analyst Certified, IAC速: Develop capacity to analyze information to assist local, regional, and national security and first responders make crucial decisions impacting security and public safety. Anti-Sabotage Certified, ASCSM: The greatest threat to government, military, and both corporate and small businesses today is sabotage! Identification and prevention experts are highly valued in corporate, business, military, and government contexts. Sensitive Security Information Certified, SSI速: Demonstrate that you can actualize and implement concrete strategies to keep sensitive information safe at home and at work, protecting and preventing compromise.
Certified National
Threat Analyst
82
Inside Homeland Security速
Spring 2012
www.abchs.com
877.219.2519
Certificate
Programs Homegrown Terrorism (required)
Agro Terrorism
Funding Terrorism
Terrorism Trauma Syndrome
Author: Richard Hughbank, MA, MS, CMAS, CHS-IV Analyze why 21st century terrorists use religion and politics as motivational factors to draw Utopian followers toward their distorted beliefs against non-Muslim and anti-American convictions. 4 CMU Author: Col. Andrew Jurchenko, Sr., U.S. Army (Ret.), CHS-V, DABCHS, ABIT, BLSI, CFI, DTI, IT, MMA-HRD, OCI/LLIT, PD/I, RCI Follow the terrorism money trail from the source of funding until the money reaches the hands of the terrorists who carry out their evil and dark tirade. Acts of terrorism not only require planning, but also crucial amounts of financial support. 3.5 CMU
Narco Terrorism
Author: Kevin Smith, CHS-IV Examine the threat of narco terrorism beginning with the origins in Mexico, Colombia, Afghanistan, and Pakistan, specifically looking at the nexus between opium trafficking and the radical Islamic terrorism, and the Mexican drug cartels’ hierarchy, rivals and alliances, and territorial influence. 2.5 CMU
Radical Islamic Terrorism: The Threat to the U.S.
Author: Kevin Smith, CHS-IV Trace the historical development of radical Islam, and examine al-Qaeda’s origins, goals, major attacks, its future as a threat to U.S. security, and their affiliates. Review case studies of major attacks illustrating terrorist tradecraft, such as recruitment and radicalization, training, and target selection. 2 CMU
Author: Mike Fagel, CHS-III By providing information on counterterrorism methods such as the use of bio-security measures, port inspections, potential threat recognition, and the use of proper response protocol, first responders will be able to counter threats and detect and report agro terrorism quickly. 3 CMU Authors: Chaplain Leatha S. Warden, MS, PhD, LPC, CHS-III and Chaplain Dave Fair, PhD, CHS-V, ACMC-III Employ methods of chaplaincy and counseling for police and citizens soldiers who now have to be trained to face and repel potential terrorist attacks, and recognize necessary coping skills for individuals in need.
Understand the Threat: 21st Century Terrorism
Author: Richard Hughbank, MA, MS, CMAS, CHS-IV Prepare for the possibility of a terrorist attack within our nation’s borders by gaining a greater knowledge of the movement of terrorist organizations towards recruiting and waging Jihad against the U.S. and other Western countries, while also discussing the recruitment of Americans into terrorist organizations.
School Safety and Security
Author: Richard Hughbank, MA, MS, CMAS, CHS-IV Use case studies and share professional experiences to analyze historical tactical situations relating to the dealings and outcomes of activeshooter scenarios, while gaining a well-rounded skill set to help local schools and businesses prevent, react, and recover from future incidents.
“Each [certificate program] contains information on the history/background of the groups and individuals that dictate to their followers that the U.S. and its allies are the evil axis. In reviewing that history, it becomes clear that—just like weeds—unless you can plant a better seed, the weeds will come back just as strong but in a different place. … We will never be able to eradicate all of the terrorists so we need to protect against becoming complacent. CNTA will serve to bring the homeland security picture into better focus and re-awaken the need to stay aware of the potential danger from inside and outside of the United States.” — Harry E. Wickhorst CHS-V, CNTA “If we know the source or sources of terrorist funding, we can then aggressively pursue their life blood—their “Blood Money,” or resources that fund death and destruction—and accordingly turn them off. Therefore, I am most proud to have contributed to the development and preparation of this module of the entire CNTA Program of Instruction.” — Col. Andrew J. Jurchenko, Sr., U.S. Army (Ret.), CHS-V, DABCHS, ABIT, BLSI, CFI, DTI, IT, MMA-HRD, OCI/LLIT, PD/I, RCI
877.219.2519
www.abchs.com
To apply, please visit us at www.abchs.com (click on Course Catalog, Homeland Security, scroll to CNTA) or call 877.219.2519 for more information. 877.219.2519
www.abchs.com
Spring 2012
Inside Homeland Security®
83
Inside Homeland Security® Journal The American Board for Certification in Homeland Security, CHS® 2750 East Sunshine Street Springfield, MO 65804 www.abchs.com Toll-Free 877.219.2519 • Fax 417.881.1685
TOREGIS D TER AY
AMERICAN BOARD FOR CERTIFICATION IN HOMELAND SECURITY ANNUAL MEETING
AT T E N D T H E A N N U A L
SUM
E XE EX C M II TT E CU UT TI IVVEE S U M M
22001 12 2
October 17-19, 2012
To Register: call toll-free 877.219.2519 | or visit www.theexecutivesummit.net/ihs