The IACSP’s Counter-Terrorism Journal V18N2

Page 1

The Top 150 Books On Terrorism And Counterterrorism

Keep On Sale Until August 21, 2012

The Many Security Threats Facing

BRAZIL Viktor Bout:

The Rise And Fall Of “The Merchant Of Death” Cyberwar Spotlight: North Korea The DEA’s World Of Narco Terrorists, Drug Lords And Death Merchants Where Will Tomorrow’s Extremists Predominate? Homeland Security Education Directory

SUMMER Issue Vol. 18, No. 2, 2012 Printed in the U.S.A. IACSP.COM


Journal of Counterterrorism & Homeland Security International

Vol.18, No.2



Vol. 18, No. 2 SUMMER 2012 IACSP Director of Operations Steven J. Fustero

Page 26

Associate Publisher Phil Friedman

Demographics Dictate Where Tomorrow’s Extremists Will Predominate

Senior Editor Nancy Perry Contributing Editors Paul Davis Thomas B. Hunter Joshua Sinai

by Lt. Daniel T. Murphy

Book Review Editor Jack Plaxe Research Director Gerry Keenan Conference Director John Dew Communications Director Craig O. Thompson

Page 44

Persistent Security Concerns Make Brazil The Leader In Armored Cars

Art Director Scott Dube, MAD4ART International

by Luke Bencie

Counterintelligence Advisor Stanley I. White

Psychological CT Advisors Cherie Castellano, MA, CSW, LPC

South America Advisor Edward J. Maggio Homeland Security Advisor Col. David Gavigan

Page 6

SITREP

Personal Security Advisor Thomas J. Patire

Cyberwar Spotlight: North Korea, by David Gewirtz

Page 8

Emergency Management Advisor Clark L. Staten

Page 12 Narco Terrorists, Drug Lords And Death Merchants, by Paul Davis

Tactical Advisor Robert Taubert

Page 15 Chasing The Drugs, Guns And Violence, by Paul Davis Page 16 Viktor Bout: The Rise And Fall Of The “Merchant Of Death”, by Leo Labaj & Daniel Levanti Page 20 The Predictive Role Of History In Threat Assessment, by Dr. Joseph A. Devine & Dr. Hebert Pendleton Page 26 Demographics Dictate Where Tomorrow’s Extremists Will Predominate, by Lt. Daniel T. Murphy Page 30 Who Are The Dutch Marines Special Forces Anyhow, by Andrew Balcombe Page 34 Homeland Security Education Directory Amanda Morrow-Jensen, M.S. & Amy DiMaio, Ph.D The IACSP Announces Its’ 20th Annual Terrorism Trends & Forecasts Symposium

Page 44 Persistent Security Concerns Make Brazil The Leader In Armored Cars, by Luke Bencie Page 50 Secure Driver: Police Pursuits, by Anthony Ricci Page 52 Police: Tactical Casualty Care Under Fire, by Rafael Navarro, Jim Weiss & Mickey Davis Page 58 An IACSP Q&A With Joseph C. Goulden Page 60 Terrorism Bookshelf: The Top 150 Books On Terrorism And Counterterrorism, by Dr. Joshua Sinai Page 65 IACSP Reader’s Lounge THE JOURNAL OF COUNTERTERRORISM & HOMELAND SECURITY INT’L is published by SecureWorldnet, Ltd., PO Box 100688, Arlington, VA 22210, USA, (ISSN#1552-5155) in cooperation with the International Association for Counterterrorism & Security Professionals and Counterterrorism & Security Education and Research Foundation. Copyright © 2012. All rights reserved. No part of this publication may be reproduced without written permission from the publisher. The opinions expressed herein are the responsibility of the authors and are not necessarily those of the editors or publisher. Editorial correspondence should be addressed to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA, (703) 243-0993, FAX (703) 243-1197. Membership $65/year, add $10 for overseas memberships. Postmaster: send address changes to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA. Web site: www.iacsp.com

PHOTO CREDITS: Reuters, Army.mil, Navy.mil, istockphoto.com and authors where applicable.

Journal of Counterterrorism & Homeland Security International

Security Driver Advisor Anthony Ricci, ADSI Cyberwarfare Advisor David Gewirtz Cell Phone Forensics Advisor Dr. Eamon P. Doherty IACSP Advisory Board John M. Peterson III John Dew Thomas Patire Cherie Castellano, MA, CSW, LPC Robert E. Thorn

Page 38 Embracing The Core Competencies In Strategic Security Education, by Page 42

Hazmat Advisor Bob Jaffin

Vol.18, No.2

Southeast Asia Correspondent Dr. Thomas A. Marks European Correspondent Elisabeth Peruci Middle East Correspondent Ali Koknar National Sales Representative Phil Friedman, Advertising Director Tel: 201-224-0588, Fax: 202-315-3459 iacsp@aol.com Tactical Sales Representative Scott Dube, MAD4ART International Tel: 757-721-2774, scott@mad4art.com


217-281_HmldSctyAd_7x10_4C_Layout 1 7/11/11 2:08 PM Page 1

B AC H E LO R O F S C I E N C E O R MASTER OF SCIENCE IN

Legal Studies 1 0 0 %

O N L I N E

D E G R E E

• LAW & PUBLIC POLICY TRACK • HOMELAND SECURITY TRACK • CRIMINAL JUSTICE TRACK The 100% online curriculum provides students with a strong foundation in criminal, family, real estate, administrative and business law. It also includes a set of competencies in legal research and writing, litigation, estates and trusts, bankruptcy, ethics and constitutional law. Cal U’s web-based format allows students the opportunity to pursue their interests in a variety of legal topics, preparing them for a host of different career options. To learn more about the 100% online BS and MS in Legal Studies: Law & Public Policy, Homeland Security and Criminal Justice tracks, and other unique online opportunities, visit Cal U’s website at www.calu.edu/go or call 724-597-7400. University in the

#1

country for online degree programs.*

*www.guidetoonlineschools.com

California University of Pennsylvania Building Character. Building Careers. www.calu.edu/go A proud member of the Pennsylvania State System of Higher Education.

CALU GLOBAL ONLINE


SITREP

Mali’s military junta leader Amadou Haya Sanogo (C) looks on after meeting with soon-to-be interim President Diouncounda Traore (not pictured) at a military base in Kati, April 9, 2012. Mali’s President Amadou Toumani Toure resigned, paving the way for the soldiers who ousted him in a coup to stick by a deal to restore civilian rule and hand power to the president of the National Assembly. REUTERS/Joe Penney

W

orld Trends & Forecasts

In Mali military officers overthrew President Amadou Toumani Touré in a coup on 22 March. The takeover followed a mutiny demanding better weapons to fight the Tuareg rebellion advancing across the north. Throughout the month Tuareg rebels defeated government troops and pro-government militias in several northern towns, extending their reach to the key garrison town of Gao and reportedly Timbuktu. Syria’s descent into all-out civil war continued. The Assad regime stepped up military operations on opposition strongholds and repression against civilians, as anti-regime protests spread to new areas. Activists reported massacres committed by security forces, and UN human rights chief Navi Pillay accused the regime of “systematically detaining and

6

torturing children”. The regime has accepted the UN/Arab League special envoy Kofi Annans’ peace plan but serious doubts remain as to its implementation. Crisis Group also identifies a conflict risk for Syria. Relations between Sudan and South Sudan deteriorated further. Their armed forces clashed at the Helgig oil field on the border, sparking fears of a return to war. Thus far attempts to initiate talks between Khartoum and

Juba have met with little success, as each side accuses the other of crossborder attacks. A series of deadly attacks and kidnappings, blamed on al-Qaeda militants, wracked Yemen’s south. The bloodiest episode was the storming of military bases near Zinjibar, where approximately 180 soldiers were killed and 70 abducted. UN envoy Jamal Benomar warned the instability was causing a growing humanitarian crisis, with

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

3 million people needing immediate assistance. The rift between Islamists and secular parties in Egypt deepened. Five parties accused the Muslim Brotherhood and the Salafist al-Nour party of dominating the 100-member panel tasked with drafting a new constitution. Tensions between Ethiopia and Eritrea intensified. Ethiopian troops attacked military bases in Eritrea, claiming they


were being used to train insurgents operating in the Afar region. For its part, Eritrea accused Addis of trying to divert attention from the dispute over their common border, and called on the UN to take action against Ethiopia. A first round of presidential elections in Guinea-Bissau saw Prime Minister Carlos Gomes Júnior take the lead with 49 per cent of votes. Gomes’s opponents, however, including former President Kumba Yala, denounced fraud in the vote, and vow to boycott the run-off, scheduled for 18 April. The assassination of ex-spy chief Samba Djaló just hours after polling, combined with ex-army Chief of Staff Zamora Induta seeking refuge in the EU compound in Bissau, exacerbated fears of growing instability. Crisis Group identifies a conflict risk for Guinea-Bissau. Leaders of Bosnia’s six ruling parties on 9 March reached agreement on the disposition of military and state property. They thus fulfilled the last outstanding condition for the commencement of NATO’s Membership Action Plan, as well as for the closure of the Office of the High Representative. Second Quarter 2012 TRENDS Deteriorated Situations • Afghanistan, Egypt, Eritrea, Ethiopia, Guinea-Bissau, Mali, South Sudan, Sudan, Syria, Yemen Improved Situations • Bosnia, Senegal Unchanged Situations • Algeria, Armenia, Azerbaijan, Bahrain, Bangladesh, Belarus, Bolivia, Burma/Myanmar, Burundi, Cameroon, Central African Republic, Chad, Colombia, Côte d’Ivoire, Cyprus, Democratic Republic of Congo, Ecuador, Georgia, Guatemala, Guinea, Haiti, India, Indonesia, Iran, Iraq, Israel/Occupied Palestinian Territories, Jordan, Kashmir, Kazakhstan, Kenya, Kosovo, Kyrgyzstan, Lebanon, Liberia, Libya, Macedonia, Madagascar, Malawi, Mauritania, Mexico, Moldova, Morocco, NagornoKarabakh (Azerbaijan), Nepal, Niger, Nigeria, North Caucasus (Russia), North Korea, Pakistan, Philippines, Rwanda, Saudi Arabia, Serbia, Somalia, Somaliland, Sri Lanka, Tajikistan, Thailand, Timor Leste, Tunisia,

Turkey, Turkmenistan, Uganda, Ukraine, Uzbekistan, Venezuela, Zimbabwe Conflict Risk Alert • Guinea-Bissau, Mali, Syria

other personal data, are increasingly replacing the old paper ones. For a clandestine field operative, flying under a false name could be a one-way ticket to a headquarters desk, since they’re irrevocably chained to whatever name and passport they used.

obtain on-demand satellite imagery in a timely and persistent manner for pre-mission planning. This is due to lack of satellite overflight opportunities, inability to receive direct satellite downlinks at the tactical level and information flow restrictions.

Afghan Assaults Signal Evolution Of A Militant Foe

The issue is exceedingly sensitive to agency operatives and intelligence officials, past and present. The challenge isn’t just the CIA’s, of course. Every intelligence agency faces it. The problem is especially acute for Israel’s Mossad.

DARPA’s SeeMe program (Space Enabled Effects for Military Engagements) aims to give mobile individual US warfighters access to on-demand, space-based tactical information in remote and beyond- line-of-sight conditions. If successful, SeeMe will provide small squads and individual teams the ability to receive timely imagery of their specific overseas location directly from a small satellite with the press of a button — something that’s currently not possible from military or commercial satellites.

Source: The Crisis Group(www. crisisgroup.org)

WASHINGTON — Western military and intelligence officials have acknowledged they were surprised by the scale and sophistication of the synchronized attacks in Afghanistan last month, seeing it as a troubling step in the evolution of the Haqqani Taliban network from a crime mob to a leading militant force. Even as the Western officials praised the Afghan security forces’ response and sought to play down the attacks’ strategic impact, they privately agreed with the criticism by President Hamid Karzai. He said the assaults — involving dozens of attackers who crossed hundreds of miles to strike at seven different secured targets, represented an “intelligence failure for us, and especially NATO.” The officials said the episode raised two pivotal questions: whether the militants now had the ability to mount such audacious assaults repeatedly, rather than just once every several months, and whether the Afghan government would be able to blunt such plots after 2014, the deadline for Western troop withdrawal, when its access to allied intelligence assistance would be limited. Source: NY Times

CIA’s Secret Fear: HighTech Border Checks Will Blow Spies’ Cover The increasing deployment of iris scanners and biometric passports at worldwide airports, hotels and business headquarters, designed to catch terrorists and criminals, are playing havoc with operations that require CIA spies to travel under false identities. Busy spy crossroads such as Dubai, Jordan, India and many E.U. points of entry are employing iris scanners to link eyeballs irrevocably to a particular name. Likewise, the increasing use of biometric passports, which are embedded with microchips containing a person’s face, sex, fingerprints, date and place of birth, and

Source: Wired

National Guard At Southwest Border Shifting From ‘Boots On The Ground To Boots In The Air’ The National Guard support mission known as Operation Phalanx, which initially deployed as many as 1,200 personnel to fixed ground sites along the U.S.-Mexican border, is now shifting to more of an airborne role, using rotary and fixed wing aircraft to conduct aerial detection and monitoring missions. As two senior CBP officials told a House Homeland Security subcommittee hearing last month, Operation Phalanx is “essentially moving from boots on the ground to boots in the air.” The ongoing transition in the role played by National Guard personnel will include about 200 troops who will provide mobile aerial detection and monitoring across all four southwest border states, Texas, New Mexico, Arizona and California. “These individuals are supporting law enforcement interdiction operations against illicit trafficking in people, drugs, weapons, and money,” said the CBP officials. Source: Government Security News (GSN)

On-Demand Satellite Imagery Envisioned For Frontline Warfighters DARPA seeks expertise from mobile phone, medical pneumatics, industrial machinery, optics and automobile racing communities to build inexpensive, “disposable” satellites for timely overhead imagery Today, the lowest echelon members of the U.S. military deployed in remote overseas locations are unable to

For more information visit: www. DARPA.mil

The FBI’s Child ID App Putting Safety In Your Hands You’re shopping at the mall with your children when one of them suddenly disappears. A quick search of the nearby area is unsuccessful. What do you do? Now there’s a free new tool from the FBI that can help. The just launched Child ID app—the first mobile application created by the FBI—provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide physical identifiers such as height and weight to security or police officers on the spot. Using a special tab on the app, you can also quickly and easily e-mail the information to authorities with a few clicks. The app also includes tips on keeping children safe as well as specific guidance on what to do in those first few crucial hours after a child goes missing. Right now, the Child ID app is only available for use on iPhones and can only be downloaded for free from the App Store on iTunes, but we plan to expand this tool to other types of mobile devices in the near future. Source: www.fbi.gov


Cyberwar Spotlight: North Korea

A Deep Analysis Of The Darkest Nation On The Planet By David Gewirtz

N

Conservative protesters burn mock North Korean missiles and North Korean flags during an anti-North Korea rally denouncing the North’s cyber attacks and demanding a release of U.S. female journalists detained by the North, at a park in Seoul July 10, 2009. Cyber attacks slowing U.S. and South Korean websites could enter a new phase by attacking personal computers and wiping hard disks, a South Korean government agency and Web security firm said. North Korea was originally a prime suspect for launching the cyber attacks, but the isolated state was not named on a list of five countries where the attacks may have originated, the Korea Communications Commission (KCC) said. REUTERS/Jo Yong-Hak

orth Korea is a strange country that almost seems frozen in time -- a bizarre, frozen-in-time, armed-to-theteeth, crazy-dangerous country. The Korean peninsula was one of the many spoils of war taken from the Japanese at the end of World War II. Korea had been occupied by the Japanese since 1910. In 1945, the Allies found themselves in possession of a country both war-torn and leaderless. Since the U.S. and the Soviets (still sort of allies at the time) couldn’t quite figure out what to do about Korea they decided to split it in two, letting the U.S. deal with the southern part of the country and handing over the northern part to Soviet control.

8

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

In a bizarre country filled with bizarre stories, one of the weirdest stories is the one that tells how the two countries came to be divided at the 38th Parallel. Two then-young officers, General Charles Bonesteel and Colonel Dean Rusk (who would eventually become U.S. Secretary of State under both Kennedy and Johnson) were tasked with determining the American


occupation zone for Korea. As the story is told, they were completely unprepared, knew very little about Korean history, and simply used an available National Geographic Magazine map to draft the dividing line between the two nations. Koreans (you know, the actual people living there) were none too thrilled with this division, but they were once again living under the rule of foreign leaders. Although both the Soviets and the U.S. claimed an intention for a united Korea shortly after the end of World War II, that never happened. Instead, North Korea was to begin its long slide into isolationism, and South Korea was to begin the process of becoming the economic giant it is today. Faced with the problem of governing North Korea, Stalin needed to find a leader to run the country. As it turned out, there was a young Soviet Army officer of Korean descent born as Kim Song-ju, but who now called himself Kim Il-sung, which means “become the sun”. There are disputed reports here, but some academics believe there was another man named Kim Il-sung who had been a prominent leader in the Korean resistance and Kim Song-ju coopted the name to increase his own personal legend. Another story by Russian scholar Andrei Nikolaevich Lankov has it that the original “Kim Il-sung” was “switched” with Kim Song-ju when Stalin needed a compliant puppet to run Korea. This all led to some more silliness. On the one hand, the North claimed that its new leader almost single-handedly defeated the Japanese. On the other hand, the South Koreans claimed that Kim was an imposter who’d stolen the good name of a true patriot.

As nutty as Kim Jong-Il may have seemed to Western eyes, there was one thing deadly serious about the man: his “military first” program. Go figure. The man Stalin picked, the man now known as Kim Il-sung, spoke mostly Chinese, spoke no Korean at all, but had been a fighter and anti-Japanese dissident most of his life. After a lengthy vetting process personally conducted by infamous Soviet secret police head Lavrentiy Pavlovich Beria, Stalin decided to appoint Kim as leader of North Korea, sending the young officer back to a country he hadn’t seen since childhood. Even though Kim spoke barely any Korean, the legend he’d built for himself as a fighter against the Japanese helped him establish early support in the new nation. He quickly moved to consolidate power by building up the military with Soviet military gear left in the country after the war. Apparently, Stalin wasn’t particularly excited about Kim attempting to reunify Korea three years later by starting the Korean War. Neither was China. Even so, Kim Il-sung rolled over the 38th parallel, straight into the waiting arms of American troops. The Korean War didn’t go well for Kim. He eventually had to leave the nation, as Americans moved deep into the north. It

was only after the Chinese essentially took over the war from Kim and pushed the Americans back down to the South that Kim was able to return. By this time, Kim had somewhat strained relations with China and the Soviets. He had shown himself to be something of a loose cannon. His country had been pretty much blasted into oblivion, and his economy was in a shambles. He decided that the best approach was a hard-core command economy, centralizing everything and building up the military. He’d seen what cultof-personality had done for his early support as leader and decided to go all out, creating a massive personality cult around himself as “Great Leader”. Kim Il-sung also inculcated in his population the philosophy of Juche (which means “self-reliance”, but could just as easily mean “us against the world”). Kim essentially cut his country off from the world economy, plunged his populace into poverty, and channeled all his country’s resources into building up his military might. This was pretty much North Korea’s story until 1994, when Kim’s son, Yuri Irsenovich Kim, became leader of North

Korea. Oh, what? You’re not familiar with Yuri Irsenovich Kim, the Soviet Union-born child of Kim Il-sung. Perhaps you know him by his adopted name, Kim Jong-Il, the man more popularly known as “Dear Leader”. Stories of young Kim JongIl’s life are as bizarre as those of his father. Shortly after the elder Kim moved back to Korea into the former home of a Japanese officer with a pool, the boy still known as Yuri was suspected of pushing his brother Kim Pyong-Il into a pool, causing him to drown. “Dear Leader” had always been a strange character. He apparently had a fascination with Elvis, and even wore Elvis glasses and an Elvis jump suit. He is said to have amassed a huge collection of western DVDS, and at one point kidnapped South Korean movie stars, putting them to work creating a North Korean film “industry”. As nutty as Kim Jong-Il may have seemed to Western eyes, there was one thing deadly serious about the man: his “military first” program. He continued his father’s Juche program, even further isolating North Korea from the world. Kim Jong-Il also continued the country’s military build-up, making it one of the most dangerous militaries on the planet. According to the U.S. Department of State, North Korea has the fourth largest military in the world, with more than 1.2 million active troops, and the largest military per-capita of any nation. North Korea is also a nuclear-capable state and is reputed to have the ability to place vehicles into Earth orbit. So, now you have a nation that’s not just broke and crazy, but


broke, crazy and armed to the teeth. To say North Korea is dangerous would be a massive understatement. It gets worse. Up until last year, North Korea (and its approximately 1.2 million troops, 4,060 tanks, 2,500 APCs, 17,900 artillery pieces, 11,000 air defense guns, 10,000 man-portable air-defense and antitank guided missiles, 915-ship Navy, 1,748-aircraft Air Force, the world’s largest submarine fleet, and a pile of nukes) were controlled by a crazed fanboy Elvis impersonator. But last year, Kim Jong-Il died and, reportedly, North Korea is now being led by his youngest son, Kim Jung-Un. But here, again, reports are hazy. In fact, it’s not even clear that Kim Jong-Il lived all the way to 2011. There are other reports that Kim Jung-Il died as far back as 2003, and body-doubles were used by other North Korean leaders to convince the outside world that Kim Jong-Il was still in power. Although that theory has been largely discredited, there still remains the question of Kim Jung-Un and his hold on North Korean power. The youngest Kim was reportedly chosen as the “Great Successor” after his older brother, Kim Jongnam, was caught in 2001 using a fake passport trying to sneak into Tokyo Disneyland. His father later declared Kim Jong-nam “too effeminate” to be his successor. Seriously. You can’t make this stuff up. Very little is known of North Korea’s new, 28-year-old dictator, except that he has apparently been willing to carry on his father’s practice of killing off his detractors and political enemies. Of interest to our discussion of cyberwar, though, Kim Jung-Un was educated at the International School of Bern, Switzerland and is reported to have studied computer science. That said, it’s hard to tell his level of technical expertise. After all, his father was once known in 2007 to proclaim himself an “Internet Expert” in a country with barely any Internet connections.

10

While Kim Jong-Il was never able to deploy jets and submarines, he was able, in his last years, to utilize North Korea’s cyberforces with some degree of regularity and see a result that far outstripped the cost.

Conservative protesters holding North Korean flags and portraits of North Korean leader Kim Jong-il’s family salute a South Korean flag during an anti-North Korea rally denouncing the North’s cyber attacks and demanding a release of U.S. female journalists detained by the North, at a park in Seoul July 10, 2009. The portraits are Kim Il-sung (L to R), Kim Jong-il and Kim Jong-un. The yellow banner reads, “Overthrow the military first dictatorship”. REUTERS/Jo Yong-Hak

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

That conveniently leads us to the question of North Korea and the cyber threat. The nation has barely any Internet presence, and barely any of its citizens have access to the Internet (or phones or TV, for that matter). Even so, it appears that cash-strapped North Korea has figured out there’s money to be made in them-thar Internet hills, and is reported to be running a number of rather serious Internet hacking operations -- many of them focused on extracting cash from South Koreans. As far back as 2009, Pyongyang was suspected of being involved in DDoS (Distributed Denial of Service) attacks aimed at the U.S. and South Korea. CBS News reported that the Treasury Department, Secret Service, Federal Trade Commission and Transportation Department Web sites were all attacked and bogged down over the July 4, 2009 holiday. South Korean sites including the presidential Blue House, the Defense Ministry, the National Assembly, Shinhan Bank, Korea Exchange Bank and Internet portal Naver were also pummeled in the attack. Since 2009, it appears North Korea may have been refining its game. In June 2011, two North Korean educators defected to South Korea. In an interview with Aljazeera, North Korean computer science professor Kim Heung-kwang and hacker Jang Se-yul warned of North Korea’s cyberwar infrastructure. Kim Heung-kwang claims North Korea operates cyberwarfare training units at Hamheung Computer College and Hamheung Communist College. He says that North Korea recruits promising students from high school, trains them locally, and then ships them out for advanced hacking training in China and Russia. “After the overseas training, they are placed in various warfare units to serve as cyberwarriors”, Kim Heung-kwang said. As of the interview, he reported that North Korea had nearly 3,000 cyberwarriors. Because of North Korea’s practice of compartmentalization, though, this number is probably inaccurate. It’s highly unlikely that the professor had access to the full extent of North Korea’s activities. Since he has been out of North Korea for years, it’s also likely the program has grown.


At this point, it is highly likely that Pyongyang’s investment in cyberwar is far greater than the 3,000 trained hackers he spoke of to Aljazeera or even the 10,000 hackers I’ll discuss later in this article. If you think about it, cyberwar provides the same asymmetrical warfare benefits to North Korea as it does for other players. Building a cybermilitary force can be incredibly cost effective. It’s far less expensive to house thousands of high-school students and keep them in the Korean equivalent of pizza and Doritos than it is to continue to build and maintain conventional military forces. It must have been frustrating for Kim Jong-Il. For all those years, he had this enormous military force, but nowhere to really use it. Sure, he could dream of attacking South Korea like his father did, but history had already shown he wouldn’t be able to stand against Western forces. More recently, Saddam had tried invading Kuwait, and Kim had the opportunity to see how well that worked out for the Iraqi leader. On the other hand, cyberstrength is a stealthy force. It can be deployed without generating a literally incendiary response. While Kim Jong-Il was never able to deploy jets and submarines, he was able, in his last years, to utilize North Korea’s cyberforces with some degree of regularity -- and see a result that far outstripped the cost.

“Finally, North Korea has recognized the Internet’s inherent weakness from its very inception in the mid-1990s. It realized that, as long as it maintained an attack network, it could easily hack into strategic targets with considerable speed. That’s why they were driven to aggressively engage China in military exchanges to quickly build up a cyberforce of 500 hackers. “Cyberforce is structured around human capital, technology and systemization of the two, and of these three elements North Korea has focused intensely on nurturing computer whizzes,” Kim Heung-kwang said. Of course, there is one other reason why North Korea is interested in cyberwarfare: it can be insanely profitable. The Economist reports that, according to South Korean police, the North operates at least 10,000 trained hackers, many of which are breaking into gamers accounts in the south and stealing money, which they return back to their northern masters.

So what’s the bottom line with North Korea?

There are a number of key factors, but the most important is uncertainty. North Korea has long been a desperately impoverished, anti-social nation that invests almost exclusively in warfighting.

Because we don’t know much about Kim JungUn, including how strongly he holds onto power, we can’t really be sure exactly how North Korea will behave. However, if the country continues to follow both Juche and military-first policies, it’s probable that the country will be putting most of its assets into warfare. Combine that with a proven warfighting modality like cyberwarfare that’s so incredibly inexpensive and demonstrably effective, and it becomes abundantly clear that North Korea will not only continue its cyberwarfare efforts, but also is likely to be stepping it up considerably over the coming years.

About the Author David Gewirtz is the director of the U.S. Strategic Perspective Institute and editor-in-chief of the ZATZ technical magazines. He regularly writes commentary and analysis for CNN’s Anderson Cooper 360, and has written more than 700 articles about technology. David is a former professor of computer science, has lectured at Princeton, Berkeley, UCLA, and Stanford, has been awarded the prestigious Sigma Xi Research Award in Engineering, and was a candidate for the 2008 Pulitzer Prize in Letters. He is the Cyberterrorism Advisor for IACSP. David’s personal Web site is at DavidGewirtz.com Read his blog at CNN Anderson Cooper 360 for politics, policy, and analysis. Read his blog at CBS Interactive’s ZDNet Government where tech meets politics and government. Or Follow him on Twitter at @DavidGewirtz

All Armor. All The Time.

Armored SUVs

Armored Tactical and Riot Trucks

Armored Vehicles - From simple cargo transport to dignitary protection, we have the skills needed to manufacture or acquire the right vehicle for your needs. Military Vehicles and Systems - Whether you are looking for chassis up design and build, or are looking to protect systems on existing platforms, our people and skills will provide a quality solution.

www.heat-armor.com

1.773.938.1030

Armored Buses.

We provide the following products and services: Armored Passenger Vehicles Designed and Engineered Armored Solutions Fleet Management, Parts and Service Contract Production Training and Education

info@heat-armor.com


Narco Terrorists, Drug Lords And Death Merchants: A Look At The DEA And Their Fight Against The Deadly Drug Trade By Paul Davis

O

J e s u s A r t u ro Martinez Gutierrez, a former policeman in Tijuana and alleged member of the Mexican drugs cartel “Arellano Felix”, is escorted by members of Mexico’s Federal Agency of Investigations in Mexico City, July 18, 2007. REUTERS/Henry Romero (MEXICO)

n April 2nd, the Drug Enforcement Administration (DEA) announced that Benjamin Arellano-Felix, the former leader of the Tijuana Cartel/ArellanoFelix Organization (AFO) was sentenced to 25 years in federal prison for racketeering and money laundering. The judge also ordered Arellano- Felix to forfeit $100 million in criminal proceeds. According to the DEA, Arellano-Felix and other AFO members conspired to import and distribute within the United States hundreds of tons of cocaine and marijuana, for which the AFO obtained hundreds of millions in U.S. dollars in profits. The DEA stated that at Arellano-Felix’s direction, members of the AFO bribed law enforcement and military personnel and kidnapped and murdered informants and potential witnesses in order to obstruct justice.

12

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


“The Tijuana Cartel was one of the world’s most brutal drug trafficking networks, but has now met its demise with leader Benjamin Arellano-Felix’s sentencing today,” said DEA Administrator Michele M. Leonhart. “It is a major victory for DEA and Mexico’s Calderon Administration. Together, we will continue our pressure on the Mexican cartels whose leaders, members, and facilitators will be prosecuted and face the justice they fear.” Earlier, on March 13th, another drug lord had his day in court. A federal jury in Washington D.C. convicted Haji Bagcho on drug trafficking and narcoterrorism charges. Bagcho, an Afghan national with ties to the Taliban, was investigated by the DEA, with the cooperation of Afghan authorities, for five years. According to the DEA, Bagcho was one of the largest heroin traffickers in the world. The DEA stated that Bagcho manufactured the drug in clandestine laboratories along Afghanistan’s border region with Pakistan and shipped the heroin to more than 20 countries, including the United States. “One of the world’s most prolific and dangerous drug trafficker’s reign has come to an end,” said Leonhard. “Now Haji Bagcho will serve time behind bars on the same soil he sought to destroy with his drugs, and whose troops he sought to kill through his support to the Taliban. DEA stands committed to stopping narcotraffickers, like Bagcho, and their funding of terror.” Speaking before the House Subcommittee on Terrorism, Nonproliferation, and Trade Committee on Foreign Affairs last November, Derek S. Maltz, the Special Agent in Charge of the DEA’s Special Operations

Division, noted that in the case of narcoterrorism, the illegal proceeds are used to corrupt government officials, under-

pursuant to U .S. request for arrest for purposes of extradition. He was indicted for conspiring to sell a multi-million dollar

known as the “Merchant of Death,” was one of the world’s most prolific arms traffickers. “Before embarking on a ca-

In the case of narcoterrorism, the illegal proceeds are used to corrupt government officials, undermine institutions, and fuel and facilitate terrorism – direct, violent and often deadly attacks on peace keepers, diplomats, government officials, and frequently, innocent victims.

mine institutions, and fuel and facilitate terrorism – direct, violent and often deadly attacks on peace keepers, diplomats, government officials, and frequently, innocent victims. Maltz identified several major narcoterrorists that the DEA has brought to justice, including Syrian national Monzer Al Kassar. “Al Kassar was one of the world’s most significant and notorious criminals, participating in or supporting terrorist acts spanning decades,” Maltz told the committee. “Kassar, also known as “The Prince of Marbella,” amassed considerable wealth from his drugs and arms trafficking activities while living opulently in Marbella, Spain.” Maltz said that Kassar is believed to have supplied weapons to the terrorists that hijacked the Achille Lauro in 1985. The terrorists killed Leon Klinghoffer a wheelchair-bond U.S. citizen in the hijacking. Maltz said that Kassar was arrested by Spanish authorities,

amount of weapons to the Revolutionary Armed Forces of Colombia (FARC). The weapons, Maltz said, would be used to kill Americans in Colombia. Kassar was later convicted and sentenced to 30 years’ incarceration. Maltz also mentioned another notorious criminal the DEA brought to justice: Russian national Viktor Anatolyevich Bout,

reer as an international arms dealer, Bout was a Soviet military officer, retiring in 1993 following the collapse of the Soviet Union,” Matlz said. Bout was arrested in Thailand pursuant to a U.S. request for extradition. He was convicted on November 2, 2011 on various charges, including “Conspiracy to Provide Material Support or Resources to a

Mexican drug baron Ramon Arellano Felix (R) lies dead after a gunfight on the streets of the north western Mexican seaside town of Mazatlan February 10, 2002. Man at left is unidentified. Mexican authorities acknowledged March 9, 2002 that their most wanted drug baron had died in this shoot out [on the same day they announced the capture and alleged fellow cartel member Benjamin Arellano Felix. The dual blow against the Tijuana based Arellano drugs cartel is the biggest anti-narcotics coup of President Fox’s adminsitration.]


Foreign Terrorist Organization.” Bout faces a minimum mandatory sentence of 25 years to life imprisonment. “The nexus between drug trafficking and terrorism is well established,” Maltz said. “DEA has conclusively linked about 39% (19 of 49) of the State Department designated Foreign Terrorist Organizations (FTOs) as having confirmed links to the drug trade… the reason is clear: drug trafficking is the most lucrative criminal enterprise in the world.” Maltz went on to inform the committee that the United Nations Office of Drug Control estimates that narcotic trafficking generates approximately $320 to $350 billion annually. Special Agent Jeffrey Todd Scott, a DEA headquarters spokesperson, offered an overview of the DEA in a recent interview. “The DEA is the premier drug enforcement organization in the world and the only single mission federal

5,000 special agents and about 500 diversion investigators (who oversee the diversion of prescription drugs for illicit sale and abuse), as well as intelligence specialists and chemists who support the agency’s work. Scott said that in Afghanistan the DEA established investigative and intelligence support teams called the Foreign Assistance and Support Teams (FAST).

Scott, a Kentucky native, has been with the DEA for 17 years. Scott, who has a law degree, has served in Los Angeles, Haiti, Kentucky, and as a supervisor on the border in Arizona before being assigned to headquarters.

The FAST members are drawn from agents currently working in domestic field divisions and if accepted into the unique FAST program they have to attend specialized training conducted by the Department of Defense. The teams are deployed to Afghanistan in a rotating fashion.

“We have always worked very well with our state and local counterparts. Most of our offices have task forces that combine DEA agents with sheriff’s detectives or local cops. A key part of DEA’s success is the assistance we give and the assistance we get from state and local cops.”

“The FAST units are designed to advise, train and mentor our Afghan counterparts,” Scott explained. “They also directly support our Kabul office in conducting bilateral investigations to target and dismantle transnational drug organizations in the region. They

In Philadelphia, like most American cities, drugs are a serious problem. In a recent interview with Vito S. Guarino, the Acting Special Agent in Charge of the DEA’s Philadelphia Field Division, he explained how the DEA operated in the field.

“There is violence in the drug trade,” Guarino said. “There is always a potential for danger when dealing with drug criminals, so safety is paramount in the DEA.” agency dedicated to drug law enforcement,” Scott said. “We identify, investigate, disrupt and dismantle major drug trafficking organizations. And we do that in the United States and we also facilitate criminal investigations and support our foreign counterparts in our overseas offices.” Scott said the DEA has roughly 207 offices organized in 21 divisions throughout the United States and they have about 83 offices in 63 countries around the world. The DEA has about

14

“These chemical compounds have been adulterated in a number of ways. There is no quality control over how they are made and there is no way for anyone to know what they have taken,” Scott said. “These represent a real problem, but we have some world-class chemists at the DEA and they are working on it.”

have been successful in working what we consider to be an extremely challenging and difficult environment.” Scott said the DEA was also currently dealing with the abuse of prescription medication. “More people currently abuse prescription drugs than the number of those using, coke, heroin, hallucinogens and inhalants combined,” Scott said. Scott said the DEA is also dealing with synthetic marijuana and stimulants.

The field division is responsible for Philadelphia, the rest of Pennsylvania and the state of Delaware. Guarino said that in Philadelphia the DEA has a task force comprised of DEA special agents, Philadelphia police officers and detectives from the Philadelphia District Attorney’s squad. The task force targets inner-city, violent, streetdealing organizations. “In addition we have an enforcement group that does what we consider traditional drug investigations,” Guarino explained. “We identify the distributors, the source of supply, the financiers, and their transportation network.” Guarino said the DEA field division also has an aggressive diversion group that does regulatory work with pharmaceutical drugs, as well as criminal investigations. “Another program is the OCDETF, the Organized Crime Drug Enforcement Task Force,” Guarino said. “With OCDETF, we once again we marshal the resources from our

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

state and local partners, as well as other federal agencies, to target specific organizations.” Guarino noted that in the past major Colombian organizations transported and distributed narcotics to the United States. Now Mexican organizations are predominately the source of supply for heroin in the Philadelphia area. The distribution networks are made up of varied racial and ethnic groups. Guarino, a 26-year DEA veteran, was a Newark, NJ police officer for seven years prior to becoming a DEA special agent. As a DEA agent he worked in Miami, Florida during the Cocaine Wars in the 1980s. He also worked in Bogotá, Colombia when the DEA and others brought down drug lord Pablo Escobar and the Cali Cartel. He returned home and worked in Atlantic City, the White House and then Puerto Rico. Guarino said he has worked narcotics investigations his entire adult life. “There is violence in the drug trade,” Guarino said. “There is always a potential for danger when dealing with drug criminals, so safety is paramount in the DEA.” Guarino said in the war against drugs the statistics were encouraging. In Philadelphia and the rest of their area of responsibility, the DEA seized more $25 million dollars last year from the drug traffickers. The DEA also took almost a thousand kilograms off the street and made close to a thousand arrests. One notable case Guarino mentioned was last year’s joint FBI- DEA longterm, undercover investigation of prescription drug abuse at the Boeing plant outside Philadelphia. The investigation resulted in the arrest of 23 employees and former employees of the defense contractor. The drugs being distributed were “Xanax,” “Oxycontin” and others. “Drug trafficking causes havoc to families and the community,” Guarino said. “What really drives most, if not all DEA special agents, is service to the community and taking out drug dealers.”

About the Author Paul Davis is a frequent contributor to The Journal of Counterterrorism & Homeland Security Int’l.


Chasing The Drugs, Guns And Violence

“W

By Paul Davis

e have two search warrants set up for today,” Philadelphia Police Officer Theresa

Weaver told her passenger, a writer along for the ride to Southwest Philadelphia to observe the actions of the Philadelphia Police Narcotics Field Unit South. “We will be attempting to make buys with a confidential informant. And if those buys are successful, we’ll be executing the two search warrants on the properties.” Weaver explains that they generally have confidential informants (CIs) make two or three narcotics buys before they execute a warrant. “These are independent, streetlevel drug dealers,” her partner, Officer Greg Barber explained. Barber, who grew up in West and Southwest Philadelphia, said that crack cocaine and heroin were the popular drugs being sold on the street. “Most of your crime is associated with drugs. The stealing and the shootings, the robberies and the home invasions are committed by people trying to get money for drugs,” Barber said. “Drugs lead to confrontations between different neighborhoods and that’s when the shootings come about.” There are ten officers in the squad and they met in the 19th Police District to plan for the first raid on a drug house. The officers are dressed mostly in Dickies work clothing, which allows them to blend in on the street. The officers were given assignments and positions. One officer was equipped with a hand-held battering ram to take down the door and another officer was issued a shotgun. Two uniform officers were assigned to accompany the undercover narcotics officers.

“Because of the way we execute the warrants, we don’t give them an opportunity to fight,” Weaver said. “Planning is everything,” Barber added. The squad parked their unmarked cars in the vicinity of the drug house and waited for the call on their radio that said the confidential informant (CI) made the buy. The buy was made and the officers rushed to the house and quickly placed several young men down on the porch and placed them in handcuffs. A couple of young men ran and some of the officers chased them down the street. The remaining officers searched the house for drugs and guns. The officers found crack and marijuana and they found two guns hidden in the ceiling. Lt Robert Otto, the unit’s commander, explained that the narcotics unit requires a tremendous amount

of personal sacrifice from the officers, aside from the fact that they are putting their lives on the line. “Crack and heroin are the most addictive drugs I’ve seen in my career and with that I see a lot of violence,” Otto said. “Recently, there has also been a surge in the abuse and sale of prescription pills.” Otto said that close to 50% of their investigations now deal with prescription drugs, which are extremely addictive. “We also get involve with chasing the violence,” Otto explained. “A lot of violent crime happens as a result of narcotics.” Sgt Berle “Chico” Brereton, a 24-year narcotics veteran and the son of a retired narcotics officer, explained that the squad attacks the mid-level to lower-level drug traffickers on the street. “We’ve hit this house before and we’ve gotten guns and drugs out of this house before. This is one of the problem houses in the district. They had a homicide here last year,” Brereton said. Brereton said they put in a call to have the city “seal” the house so the drug dealers can’t return to operate there. “We’ll shut this nuisance

down, get the guns off the street and maybe no one will get shot here.” Brereton said the people who are buying drugs at this level are users who break into cars, break into people’s houses, and rob people on the street to get money to buy drugs. “There are decent people here who can’t move. We’re the only people who are going to help them,” Brereton said. “We’re proactive. We come out here every day and lock people up. We call the Southwest detectives and they come and debrief the people we locked up and then follow up on shootings, homicides and crimes like that.” “My squad is predominantly black,” Brereton said. “We try to preach to the young black kids involved with drugs.” Otto said that one of the main objectives was to get into a house like this and remove the guns that normally go with drugs and violence. He said that the two recovered guns might be responsible for countless murders. “I tell my guys all of the time; you’re never going to know until you meet your Maker just how many people you have saved by getting these guns off the street,” Otto said.


Viktor Bout:

The Rise And Fall Of The “Merchant of Death” By Leo Labaj and Daniel Levanti

T

Suspected Russian arms dealer Viktor Bout arrives at a Bangkok criminal court October 5, 2010. A Thai court dismissed charges of money-laundering and wire fraud against Bout, bringing him a step closer to extradition to the United States. The 43-year-old former Soviet air force officer known as the “Merchant of Death” faces U.S. accusations of trafficking arms since the 1990s to dictators and conflict zones in Africa, South America and the Middle East . REUTERS/Sukree Sukplang

he gray arms market consists of untrustworthy deals between governments, rebel groups, or brokers, sometimes supported by legal contracts, but often blurring the line between legal and illegal. The United Nations, as well as many independent state commissions, has attempted to investigate this shadow world of illegal arms distribution, which includes the infamous Viktor Bout and the network of dictators in need of his munitions. These countries and international bodies have placed embargoes and gathered public support to shut down this dangerous operation, but they have rarely gathered enough support or traction for meaningful legislation to lend teeth to enforce such sanctions.

16

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

Viktor Bout, aka the “Merchant of Death”, who was recently sentenced to 25 years in jail by a New York federal judge, epitomizes the underworld opportunities presented in the transition from Soviet socialist society to a post-Cold War free market illiberal democracy. With access to transit lines across the third world, Bout helped fuel the decade’s worst atrocities in Africa by supplying weapons to dictators that would murder anyone in their path. He is hardly the only weapons facilitator in the world; indeed, the United States itself is the leading global exporter of weapons. The U.S. would do little to help the enforcement or flow of intelligence on Viktor Bout but instead unknowingly hired him as one of the numerous contractors to supply the war in Iraq and Afghanistan in the early part of the decade. An analysis


of Viktor Bout’s operations and his eventual conviction can shed light on the gray arms market, and on possible steps to be taken to stem arms smuggling.

Background: Viktor Bout’s Convoluted Operations Viktor Bout’s past is murky, to say the least. Most likely born in Tajikistan, Bout graduated from the Soviet Union’s Military Institute of Foreign Language and became fluent in six languages, which he used in the service of the Soviet Union military to interpret in Africa. He earned the rank of Lieutenant in the Soviet Military and there is strong evidence that he was a

education in economics enabled him to devise a business model that would maximize profits at every turn. Thus began his long-standing venture into the gray arms market. Bout was able to purchase a small force of surplus Soviet Antonovs and Ilyushin planes that could sustain rough landings on demanding dirt runways in many of the African countries he delivered to. Bout paid so little for the planes in fact that he was able to recover his cost after only a few runs; aiding his bottom line, it also did not hurt that the aircraft were not insured and were registered in countries with the most laissezfaire regulations.

Massoud in 1992. The turbulence of Afghanistan’s militia politics resulted in the opposing Taliban taking one of Bout’s flight crews and arms shipments hostage in 1995, but the latter’s escape the following year led many investigators to believe that a deal had been struck between Bout and the Taliban. Throughout the 1990s Bout also armed the inner circle of ruthless African dictators including Mobuto Sese Seko and JeanPierre Bemba in the Democratic Republic of the Congo, Jonas Savimbi’s UNITA force in Angola, Charles Taylor in Liberia, Bockarie in Sierre Leone, and Paul Kagame in Rwanda. Bout and Taylor were even friends beyond the supply of arms.

operation was a hub for Bout to facilitate his weapons smuggling to Africa, Afghanistan and the Bosnia. The Emirates staging area also offered protection from the prying eyes of investigators who were targeting the network of planes Bout ran through his shell corporations and sister companies. Viktor Bout and his brother Sergei, involved in many of his operations, made hundreds of millions of dollars from the transport and sale of weapons to embargoed nations in turmoil from Persian Gulf. In the end though, there was no denying this business had grown invaluable in the third world transit of arms. Despite being the target of investigations and

Both the success of Bout’s network, and the intensity with which international organizations and individual agencies alike pursued him, changed the face of arms control and conflict resolution. member of the GRU – Soviet Special Forces – which offered him a wide range of contacts which were likely instrumental in starting his international arms endeavors. In the Russian post-Cold War economy, anything and everything was for sale. Much of the Soviet military stock fell into the hands of the senior officers in charge, who would sell poorly documented weaponry on the international market in order to cover patronage that was no longer forthcoming. Thousands of pilots and aircrews were out of work with the collapse of the Soviet military; they were easy targets for gray arms dealers who were easily able to replace their previous salaries. Under these conditions, an abundance of products and military grade employees, Bout’s additional

Viktor Bout’s planes never flew empty, a stream of Soviet-era craft continuously carrying arms into warring countries. Complicating the tracking of such material, his shell companies would often fly legitimate cargo such as food and appliances into these same markets, along with illegitimate nonmilitary cargo such as diamonds out of them. Bout’s honed business mind manipulated these decoy shell corporations and his numerous bank accounts, as well as utilized the remoteness of the locations he operated in, to evade investigation and elude the law. Viktor Bout’s small fleet acquired increasingly dangerous customers as his reputation grew, and began arming the Afghan Northern Alliance Resistance led by Ahmad Shah

Bout would at times use this friendship for everything from hunting with friends in the bush, evading arrest, and registering his planes in Liberia (among many other African nations). Bout played a shell game of operations between nations, often flying two planes with the same registrations, changing flight plans or not following the ones filed, and forging documents such as End-User Certificates (EUCs). With vast corruption and ample natural resources, the continent of Africa was a prime target for Bout’s weapons the trade. In 1993, Bout moved his business, known as Transavia Travel Agency, to Sharjah, United Arab Emirates, where he partnered with Sultan Hamad Said Nassir al Suwaidi to gain access to the Sharjah airport. This new

having supposed assets frozen throughout the Clinton and Bush administrations, he was nevertheless hired as one of the thousands of subcontractors transporting military goods into Afghanistan and Iraq. Bout’s cargo fleets were so successful at delivering their payload that even after his companies were proven to be involved in illicit arms movement, it would be years before the American government would cease using his services. Both the success of Bout’s network, and the intensity with which international organizations and individual agencies alike pursued him, changed the face of arms control and conflict resolution. His operations throughout Africa changed the way investigators looked into containing failing states, even-


tually learning that restricting the arms flow from actors such as Bout was essential to favorable outcomes. Yet for nearly two decades, in spite of his obvious ties with known war criminal and the tremendous energy focused on understanding his operation, Bout remained at large and in business. Finally in 2008, Bout was arrested in Thailand at the culmination of a DEA sting investigation involving agents

surgency, Arms Interdiction and Special Operations, I have managed and directed mobile arms interdiction teams throughout El Salvador to prevent the spread of contraband and arms smuggling in Central America. The latter, smuggling, is a major business in Central America, offering intermediaries an opportunity to both fuel the inflow of arms across the Western hemisphere and make a considerable amount of money doing so. Those in need of these

gling is the ATF Fast and Furious “gunwalking” operation. Those arms were traveling through the Southwest United States to notorious drug cartels in Mexico. The operation’s legality was dubious, though it allegedly had the complicity of the U.S. Justice Department, making it a good example of the legal confusion involved in gray market trade. Still, while operating closer to the States and lacking certain clarity in the chain of command, the concept of Fast and Furious was nevertheless similar to my operations in Central America during the 1980s. There was also some level of success in

tors, fueling conflicts across the African and Asian continents, and illegally transporting weapons – Viktor Bout and the likes of his network will inevitably disappear from prominence. However his legacy, for better or likely for worse, will remain, this time in the form of more ‘legitimate’ private companies providing weapons, training, medical, and security services for the U.S. troops operating in the region. What is perhaps most disturbing of all though, is that these private security firms, known to many simply as mercenaries, have not been held more responsible for their actions in exchange for their

Another more contemporary example of illegal arms smuggling is the ATF Fast and Furious “gunwalking” operation. Those arms were traveling through the Southwest United States to notorious drug cartels in Mexico. intermediaries, who cannot buy weapons wholesale, include drug cartels, insurgents, and terrorists. Still, while it may help take some small measure of arms out of combatant control, interdicting a shipment is not particularly effective in identifying and disbanding a smuggling network—just as arresting a drug mule is not a very efficient A Closer Look way to dismantle a cartel. To At The Solution do this, tandem intelligence and This case study of the gray arms law enforcement operations are market should be carried one required in order to identify both step further. As stated, gray arms the origins and destinations of trade borders on legality and, in a smuggled shipment, often many cases, crosses that line. by incorporating some form of Often this process of weapons electronic tagging or surveilpurchases also results in smug- lance, and tracing the shipment gling, generally to a tertiary throughout the criminal network. consumer who cannot acquire This was in fact done quite efmaterial directly from the dealer fectively in the early 1980s to reduce the flow of arms from Nifor any number of reasons. caragua to El Salvador through Having worked for the Central the Gulf of Fonseca. Intelligence Agency (CIA) for 22 year (1971-1993) in Another more contemporary Counterterrorism, Counterin- example of illegal arms smugposing as FARC (Revolutionary Armed Forces of Columbia) militia members. It was not until 2010, after much deliberation by Thai Courts, that Bout was eventually extradited to the U.S. and charged with supplying and supporting a known terrorist organization.

18

Central America and in other related counterterrorist operations worldwide, which helps make a stronger case for the idea of Fast and Furious. However, a major problem with these operations is the high penalty both law enforcement and civilians face if the operation fails, as it may have in Fast and Furious.

Conclusion The post-9/11 world of privatized military contracts is likely a looking glass at the future of the American Defense System. The military industrial complex, with a strong lobby and considerable political support, will not allow the defense budget to be cut substantially, and will continue to result in the trade of superfluous military equipment. And although for twenty years Viktor Bout epitomized the gray arms trade – forging EUC’s, flight plans, and flight manifests, befriending ruthless dicta-

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

legitimate contracting. They are running lawless through warring areas, often held less accountable for their actions than Bout’s networks ever were. The face of arms dealing may have changed from former Soviet strongmen to businessmen in pinstripe suits, but the problems they cause manage to persist across time.

About the Authors Leo Labaj is Director of the Infrastructure Protection Division at Security Management International, LLC (SMI). He is retired from the Central Intelligence Agency and has worked weapons interdiction cases throughout his distinguished career. He can be reached at llabaj@smiconsultancy.com. Daniel Levanti is a Research Associate at SMI and recently graduated from the University of Central Florida with a degree in “Political Science.” He can be reached at dlevanti@ smiconsultancy.com.



The Predictive Role of History in Threat Assessment

A Case Study: The 1916 Attack on “Black Tom Island” and the American Homeland (The following is a brief synopsis of a presentation made at The Hague, Netherlands in March 2010)

By Dr. Joseph A. Devine and Dr. Hebert Pendleton 20

T

he attacks of September 11, 2001 were not the first such attacks on the American Homeland. Nor were they the first attacks within the New York Metropolitan region. The 9/11 Commission Report concluded in 2004 that, “We believe the 9/11 attacks revealed four kinds of failures; in imagination, policy, capabilities, and management”. In risk analysis and threat assessment, imagination and an understanding of relevant history are prerequisite to the successful protection of lives and critical infrastructure. Consequently, it is clear that the lessons of history had been taught but not learned.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


In the years prior to America’s entry into the First World War, the German government engaged in multiple acts of espionage and sabotage within the United States. These acts included; intelligence gathering, bribery, homicide and the destruction of millions of dollars of property. German espionage against America through these years was intended to mitigate the ability of American industry to assist America’s allies in Europe. Although the United States had declared neutrality, German agents systematically attacked America’s ability to ship artillery, ammunition, weapons, food, fuel, horses, mules and ambulances to Germany’s enemies. Great Britain, France, Italy and Russia were America’s allies and Germany’s enemies through this period. These allies were desperate for America’s industrial power. Germany was equally desperate to stem the

ern New Jersey. Those along the Jersey side of the Hudson River were preoccupied with the heat, humidity and the mosquitoes that epitomize summer in New Jersey. The problems of Europe seemed a world away as the Atlantic Ocean continued to insulate America from the chaos evolving throughout Europe. Much like September 11, 2001, Americans of many ethnicities went about their lives aware but not alarmed by the emerging threat. The strength of “the melting pot” and a culture prefaced upon assimilation would provide cover to a well-trained and well-financed group of German saboteurs. The summer of 1916 would be interrupted at 2:08am on July 30th,when as J. Witcover writes:” “Most of the city, and residents of Jersey City, Hoboken and other ethnic communities along the Hudson River in New Jersey were bedded down for the night…when with a terrifying,

operatives exploited the very nature of democracy as they operated with impunity throughout the ports of New York and New Jersey. Their clandestine network also operated in Halifax, Nova Scotia, New Orleans, and along the Mexican border. The Zimmerman Telegram would prove that Germany was working to instigate conflict on the border between Mexico and the United States. The attack on Black Tom Island; “The Arsenal of Democracy”, occurred with the impact of 1,000,000 pounds of TNT combined with the explosion of two million pounds of ordnance stored within warehouses, rail cars and barges on Black Tom Island. Newspaper articles and historic accounts consistently report that that the explosion forced hundreds of thousands of people into the streets and was heard and felt as far away as Camden, Philadelphia and

widespread damage as courtroom ceilings collapsed; stained glass windows at St. Patrick’s Church were shattered. The force of the explosion would propel ten-week-old Arthur Tosson, from his crib and to his death. In Hackensack, the explosions, reportedly panicked prisoners incarcerated within the Bergen County Jail. J Castagnera reports the following account from Jersey City, where; “ And as if to record the blast for history, a chunk of metal hit the Jersey Journal’s clock tower, stopping it at exactly 2:12am”. Newspaper accounts report that shrapnel and artillery shells rained down over the region for several hours. The financial impact of these attacks is varied with different corporations reporting their respective loss. The damage to infrastructure, rail yards, trains, barges, ships, warehouses, contents and gen-

“when with a terrifying, ear splitting explosiveness the Great War of Europe suddenly came to America.” covert tide of these supplies. Unable to directly challenge America diplomatically or militarily, German agents attacked American infrastructure from within. These attacks involved explosives, coordinated submarine attacks on American commercial shipping and the use of anthrax as a biological weapon. The most significant of these attacks would occur on Black Tom Island. This small island located just several miles from “ground zero” of the attacks September 11, 2001 would be the epicenter of terror for America in 1916. Sunday, July 30, 1916 began a typical summer night throughout New York City and North-

ear splitting explosiveness the Great War of Europe suddenly came to America.” On this night New York and New Jersey would be targets of systematic attacks intended to mitigate America’s ability and motivation to supply Germany’s enemies with arms. An entrenched German espionage network operating throughout North America spearheaded these attacks. Operatives directed and financed by the German government would spread propaganda, agitate the American labor movement, exploit anarchist activity, coordinate the sinking of the Lusitania, and attack infrastructure in Halifax and Washington State. German

Maryland. The explosive impact had the reported equivalent impact of 5.0- 5.5 earthquake on the Richter scale. This impact inflicted widespread damage to infrastructure, interrupting communications between cities; adding to widespread panic. The Statue of Liberty sustained shrapnel damage estimated at $100,000.00 in 1916 dollars. Ellis Island sustained $500,000.00 in damage as flaming barges, torn from their berth at Black Tom drifted downriver as ammunition and explosives discharged wildly. Newspaper accounts report that some 500 European immigrants were evacuated from Ellis Island to southern Manhattan. Jersey City, New Jersey would sustain

eral damages were estimated by Chad Millman in The Detonators (p26) at 350 million dollars; 2005 value. The reported loss of life was as low as six, but as The History Detectives reports; “there were hundreds of people living in boats and barges in the harbor here who police speculate literally turned to dust.” Thus an accurate accounting was never established. The panic, the damage to infrastructure, and the violation of domestic tranquility are the ultimate goals of saboteurs, terrorists and anarchists alike. The chaos of the night of July 30th, 1916 would ultimately define the consequence management and the in-


vestigation that followed. The resulting “fog of war”, rumors, lack of federal investigative capacity combined to confuse the preliminary investigation. Some thought that the explosions were accidental, possibly ignited by smudge pots used by security guards to stem the tide of mosquitos. Bomb Squads within the New York City Police Department and the Jersey City Police Department led the initial investigation. The United States Secret Service would lead the federal investigation. Intelligence components within the U.S. Army and Navy and their British counterparts devel-

highest levels of the German Government. The involvement of diplomats, military liaison officers, consulate officers and naturalized German-American citizen’s provided a vast network of motivated spies and saboteurs. These embedded German sympathizers were supplemented and led by reserve and active duty German military officers stranded within the United States by the Neutrality Act of 1914. German Ambassador to the United States, Count Johann von Bernstoff would coordinate the, finances and operations of German espionage within America.

of war supplies, dates when vessels were sailing and their cargo. This intelligence was conveyed to German radio transmitters on Long Island where it was radioed to German submarines off the American coastline. It is believed that this system of communication was responsible for the sinking of the Lusitania. The Lusitania sailed from New York on May 1, 1915 with 1,959 people on board. On May 7th, 1915 German submarines sank the Lusitania. A German trained Doctor, who was born in America of German decent, was instrumental in the production and delivery of Anthrax. Dr. Anton Dilger, was the son of a German immigrant who served in the

for bombs that were later loaded onto cargo ships heading for Europe. The German operatives had conducted extensive surveillance of the port facility, and had compromised all dimensions of the port operations. Systematic attacks with explosives, anthrax and submarines served to interdict American war and humanitarian supplies to Europe. The German Government exploited inherent weaknesses in the American immigration procedures. Dockworkers and German-American’s residing within the region were paid to secure American passports for the German agents and saboteurs. Through this period, photographs were not required for

Upon arriving in America, the newly transplanted saboteurs took up residences in the New York City and northern New Jersey. They were easily assimilated into local communities. oped national and international leads. These leads would soon reveal that the attack on Black Tom Island was the tip of a German espionage operation throughout North America. German saboteurs had infiltrated critical infrastructures and vital industries throughout America. German infiltration of the shipping industry in New York City would prove devastating to the United States. These workers, gathered intelligence, transmitted shipping related intelligence to off shore German submarines, planted explosives within the cargo hull. These attempts by Germany to keep American power out of the war would prove counter intuitive as it accelerated America’s entry into the war in Europe. The manner and mode of these attacks were hatched at the

22

Under the direction of German Ambassador Count Johann von Bernstoff and his military attaches in the United States, plots including the attack on Black Tom Island would be formulated. The location was an active deep-water port, complete with rail lines, warehouses, stables and a thriving manufacturing district on both sides of the Hudson River. The explosion of the munitions warehouse located in Jersey City, New Jersey would result in damages in the tens of millions of 1916 dollars.

American Civil War and was awarded the Congressional Medal of Honor. Dr. Dilger’s loyalty was to Germany and he produced sufficient quantities of Anthrax for injection into livestock at the Black Tom Island. The infection of livestock prior to shipment to Europe was intended to destroy the cargo while spreading the infection. The sinking of these ships by German submarines precluded the spread of anthrax infection to other animals and eventually to humans.

This was only the final act is a series of incidents that the German Government set into motion at this facility. For months, agents of the German Government had infiltrated the port facility using day laborers who were bribed or German sympathizers. These workers gathered information regarding shipments

German agents also found willing workers on vessels interned as a result of The Neutrality Act. These German reservists were not restricted to their ships; therefore, they were free to enjoy the hospitality of the New York metropolitan area. Several of these individuals were recruited to produce parts

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

passports. Two vouchers from American citizens sufficed for issuance. The German operatives selected individuals who fit the general physical description of their operatives and easily neutralized the system. Upon arriving in America, the newly transplanted saboteurs took up residences in the New York City and northern New Jersey. They were easily assimilated into local communities. German Reserve Navy Captain Franz von Rintelin ensured the financial success of this well funded operation. Captain Rintelin , an international banker by profession was well known in Europe. One account indicated that he spoke English with a slight British accent. Rintelin used his connections in the international banking industry to determine when large sums of money were being



transferred to American companies for war materials. He then alerted his network of saboteurs embedded within American factories and ports to be prepared to interdict shipments. His network would then target the specific ships with incendiary bombs designed to ignite the cargo and destroy the ship. Shipping times and convoy information would be radioed to German submarines. Rintelin was subsequently captured while traveling to Europe on a Swiss passport in 1915 and was initially held in British custody before being turned over to the United States. He would freely admit to his espionage activities and would later publish two books detailing his operations. The Dark Invader (1933) and The Return of the Dark Invader (1935)

tives in America had succeeded in systematically obstructing the shipment of war supplies to Europe. They methodically penetrated every dimension of war production including, labor, food distribution, international banking, humanitarian aid and the shipping industry. The goal of the German Government was to deprive their opponents of the materials to wage war and thus force them to sue for peace. In his work entitled Woodrow Wilson and The World War (1921), Charles Seymour indicates that after a significant German Military setback, that Ambassador von Bernstorff was seeking the assistance of President Wilson to secure a peace settlement. However, a German representative did not

Police and the Jersey City Police would play leading roles in the investigation. The Bomb Squads of these departments, honed by the anarchist movements of the early 1900’s would be exceptionally effective. The Bayonne, New Jersey Police Department would make the first arrests. The United States Secret Service was the only federal law enforcement agency to actively investigate Black Tom. Although effective they too would struggle with limited resources as war dawned on America. The United States would pursue restitution from Germany through the Mixed Claim Commission. The Commission would struggle with German obfuscation, witness tampering as part of a well-organized conspiracy to protect German assets. In October 1939 The Mixed Claims Commission ruled in favor of the American corporations, which sus-

future behavior is past behavior”. This tenet applies not only to the criminal psyche but also to the mind of the terrorist. The attacks upon the World Trade Center in 1993 were not unlike the bombings of anarchists throughout the 19th and 20th centuries. The fixation on the World Trade Center remained predictable from 1993 through the attacks of September 11th, 2001. While the manner and mode of attacks were adapted, the predictive validity of relevant history remained constant. As our enemies adapted, the American intelligence and defense communities experienced a sustained failure to understand relevant history. This combined with a “failure of imagination” provided our enemies with easy targets in the American homeland. As George Santayana wrote, “ Those that fail to learn from history are doomed to repeat it.”

It would be these attacks on America; from within America as well as attacks upon American-British shipping that would awaken the American public and the power of American industry. detail his operations and attest that financing came directly from the German Government. Much of his information was supplied to the Mixed Claims Commission, which was responsible for securing financial restitution from Germany after the War. In 1921, President Woodrow Wilson issued a pardon for Captain Rintelin. Another German agent committed arson and set the Shell Assembling Plant at Kingsland (later renamed Lyndhurst), New Jersey ablaze on January 11, 1917. According to Captain Henry Landau’s account in his 1937 book entitled, The Enemy Within, The Inside Story of German Sabotage in America, the fire and subsequent explosion caused $18,000,000 dollars in damage (p.167). This facility at Kingsland was attached to a rail line that transported their munitions products to New Jersey waterfront warehouse facilities for transportation to Europe. It is evident that the German Government acting through its opera-

24

follow through with this attempt to negotiate a diplomatic settlement. Germany’s secret War in America was already in motion. Germany’s strategy of precluding the tools of war from reaching the allied forces, and the perception that this would strengthen Germany’s position would prove ill advised. It would be these attacks on America; from within America as well as attacks upon American-British shipping that would awaken the American public and the power of American industry. The United States would enter “The Great War” in 1917. As the war in Europe escalated Germany would focus its intelligence and military resources closer to German borders. The espionage operations within North America worked to destroy evidence of prior operations. These operations relocated operatives, destroyed evidence and paid others to ensure their silence. American intelligence and law enforcement would continue to struggle across jurisdictional boundaries within the United States. The New York City

tained loss from German espionage. Enforcement of the ruling would prove elusive as Germany, under the leadership of Adolph Hitler would invade Poland in September 1st, 1939. Civil litigation would resume after World War II and would play out in the Superior Courts of Hudson County New Jersey through the 1950’s. The final payments for the damages perpetrated by German agents in 1916 were made in 1979.

About the Authors Dr. Joseph A. Devine is an Assistant Professor at Fairleigh Dickinson University. He graduated with a Doctorate in Leadership, Management and Policy from Seton Hall University in 2007 and is currently completing an additional Doctorate at Drew University. He also holds three masters degrees. He is a graduate of the FBI National Academy, Quantico and FBI LEEDS at Princeton University.

Dr. Herbert Pendleton retired in 2007 Quo Vadis

An understanding of history is vital to America’s ability to adapt to the security challenges of the 21st century. While the study of technology, weaponry, tactics, threat assessment, risk assessment, profiling, interoperability of communication, information and intelligence gathering and leadership are critical they all wane in relationship to the value of history. Behavioral sciences at the FBI Academy in Quantico, teaches, “The best predictor of

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

after a law enforcement career of 25 years, which began as a municipal police officer in Montclair, New Jersey. After eight years in various assignments, Dr. Pendleton transferred to the Essex County Prosecutor’s Office, in Newark, New Jersey. During the course of more than 17 years as a criminal investigator, Dr. Pendleton has worked hundreds of cases covering the full spectrum of the criminal investigation, including arson, robbery and homicide. Specializing in fingerprint identification, Dr. Pendleton has testified as an expert over 40 times at the State Superior Court level.


Singapore

Stockholm

05 - 08 June 2012

26 - 29 November 2012

The IACSP, in cooperation with the S2 Safety & Intelligence Institute, will be presenting a series of four-day Anti-Terrorism Officer (ATO) Courses in select cities. The ATO course is a 32-hour training program designed to prepare security and law enforcement professionals for assignments involving the protection of facilities against terrorist attack. The ATO course provides a detailed exploration of contemporary terrorist methods and essential skills and knowledge that all anti-terrorism personnel should possess.

What will you learn? How to recognize risks associated with contemporary terrorism How to identify security requirements essential to reducing terrorism related risk n How to design protective counterintelligence strategies n How to design performance-based physical security programs as applicable to anti-terrorism n How to identify hazardous devices and associated risks n How to recognize indications of chemical or biological attack n How to safely respond to terrorist incidents and design facilitylevel security response plans n n

What will you receive? In addition to 32-hours of instruction, all students attending the IACSP Anti-Terrorism Officer Course will receive the following:

Tuition: $1,900 USD*

· Certificate of Training suitable for framing · Course notebook including over 250 pages of slides and reference material · 1-Year Membership in the International Association of Counterterrorism and Security Professionals (IACSP), including one-year subscription to Counterterrorism & Homeland Security International magazine. (Existing IACSP members will receive one-year renewal of membership) · 1-Year S2 Institute Membership · S2 Institute Anti-Terrorism Officer Challenge Coin

Audience: Security Officers, Security Direc-

Instructor: Craig S. Gundry, CPS, CHS-III tors, Force Protection Personnel, Police Officers Assigned to Anti-Terrorism Activities

Days/Time: Mon-Thurs / 08:30-17:00 Restrictions: Restricted to verified security and law enforcement professionals *Tuition discounts are available for group enrollment. Contact us for details.

Enrollment in the S2/IACSP Anti-Terrorism Officer Course also includes catered lunches on each day of the program.

For more information, visit us on the web: www.iacsp.com


Demographics Dictate

Where Tomorrow’s Extremists Will Predominate By Lieutenant Daniel T. Murphy

Two muslim women w e a r i n g m a s k s a re pictured during a protest against the air strikes on Gaza outside the Israeli Embassy in Buenos Aires, December 29, 2008. REUTERS/ Marcos Brindicci (ARGENTINA)

26

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


S

ince 2001, the weight-of-effort of the Global War on Terror has been fought largely on faraway shores, specifically in Southwest Asia. Is that where the fight will continue, or will it migrate elsewhere in the world? Should we plan to fight long-term in the villages of Pakistan, or should we focus on the cities of the U.S., Europe and Asia? How will the complexion of the Global War on Terror change in the coming decades? Will it remain mostly Islamic? Or, will it evolve to a clash of civilizations on a more worldwide scale?

Demographics will dictate where tomorrow’s extremists will predominate. And, demographics must dictate where the U.S. and western nations should invest our finite intelligence resources to deter, detect and defeat emerging terrorist entities. Demographics tell us that our problem will not only be with Islamic extremists and our problem will not only be limited to Southwest Asia and Europe. Demographics tell us that we are likely to have challenges in some unexpected geographies. As an ex-

percent in 2005. The net result is that the South American populace is currently larger and younger than ever before. However, in the coming years, population growth will slow and the populace will become older.1 There will be two net results of these trends. The short term result for South America will be a boom in available economic resources. In his Partnership for the Americas: Western Hemisphere Strategy and U.S. Southern Command, Admiral Stavridis calls this a

percentage of the population growing tax revenues, and a greater percentage of the population spending those revenues. Let’s address the short-term trend first. While South American economies in the last two decades have experienced significant growth, relatively low unemployment, and increased stability, it is important to remember that most of these countries share at least some demographic features with countries that are considered weak states. Some countries, like Colombia, have very visible weaknesses. Others have weaknesses that are more subtle. For example, it was less than ten years ago that an economic recession drove Argentina’s unemployment rate above twenty percent and caused significant political instability in that country. And crime and corruption continues to plague every South American country. The Inter-American Development Bank (IDB) estimates the loss of GDP due to crime in Central and South America at fifteen percent, compared to an average of five percent among industrialized countries. IDB calls this “an economic drain that inhibits efforts to alleviate the underlying conditions of poverty and equality that could erode governments into failed states.” Crime erodes economic growth

Crime erodes economic growth because foreign investors avoid the risk of investment in places that cannot guarantee the rule of law, and because skilled workers and managers will leave a region when the government cannot guarantee basic physical safety.2 ample, let’s look at a part of the world that has thus far not been a significant battle space in the war on terror. Let’s look at South America. South America experienced significant population growth through the middle of the twentieth century due to two demographic trends: (a) Birth rates increased consistently until the early 1970s, and (b) The longevity rate has steadily increased. As a result, Latin America’s population tripled between 1950 and 2000. Today, while the longevity rate continues to increase, the birth rate is declining. Children aged 15 and under comprised 40.2 percent of the population in 1950, 43.2 percent in 1965, and 29.9

“window of opportunity for countries to be able to invest in their future population by maximizing resources per capita on youth services such as education, pediatric health care, and vocational/technical training.” Because South American countries will have a greater percent of the population working (and growing tax revenues), and a lesser percent of the population spending those revenues, there is a short-term opportunity to combat poverty, increase the level of education, and reform health systems. In the long-term, the lower birth rates combined with the increased longevity rate will result in a growing percentage of South Americans joining the over-sixtyfive age group. Thus, there will be a lesser

because foreign investors avoid the risk of investment in places that cannot guarantee the rule of law, and because skilled workers and managers will leave a region when the government cannot guarantee basic physical safety.2 South America also faces vast and growing disparities in wealth. Today, the richest one tenth of the population in Latin America earns forty-eight percent of the total income. In industrialized countries, the richest ten percent earn twenty-nine percent of the total income.3 The gap between the haves and the have-nots in Latin America countries resembles the gap between the haves and the have-nots in Middle Eastern


countries. Rather than joining the Islamic jihad and building road-side bombs, disenfranchised youths in South America join increasingly sophisticated gangs and terrorist organizations like the FARC, ELN

loss. When the aging South American population causes the equation to flip upside down, there will be no cushion. South American governments will become significantly less able to combat poverty, fund educa-

A policeman looks at a sniffer dog searching for arms and drugs in Rocinha Slum during an operation to find a man, who killed a policeman during a shootout at one of the slum’s alleys in Rio de Janeiro April 4, 2012. According to local media, nine people were killed in Rocinha in the last two months during a dispute on the control of the drug traffic. Three thousand troops, backed by helicopters and armored vehicles, occupied Rio de Janeiro’s largest slum without firing a shot on November 13, the biggest step in the Brazilian city’s bid to improve security and end the reign of drug gangs. The occupation of Rocinha, a notorious hillside “favela” that overlooks some of Rio’s swankiest areas, is a crucial part of the city’s preparations to host soccer’s World Cup in 2014 and the Olympics two years later. REUTERS/Ricardo Moraes BRAZIL

In fact, the U.S. Southern Command Strategy reads like it was written for CENTCOM: “Areas with lower levels of economic investment, development and growth, provide a breeding ground for terrorism and the full range of criminal activities. and Sendero Luminoso. In fact, the U.S. Southern Command Strategy reads like it was written for CENTCOM: “Areas with lower levels of economic investment, development and growth, provide a breeding ground for terrorism and the full range of criminal activities. Poverty, inequality, and corruption create permissive environments within our own Western Hemisphere that could become launching points for devastating attacks. Today, the fifteen percent loss of South American GDP due to crime can be absorbed in an economy where the revenue generators far outweigh the revenue spenders, because the current cushion can absorb the

28

tion, and provide healthcare. Unless these countries make smart policy decisions today to reduce crime and corruption, or significantly increase government revenues, an increasingly larger percentage of the populace will become disenfranchised. Ultimately, they will increasingly affiliate with criminal gangs and terrorist organizations and further deteriorate wealth and stability. So, do aging populations cause economic conditions that drive instability? Similar to the situation in South America, the Australian Government’s Intergenerational Report (IGR) projects that over the next forty years, the over-sixtyfive population will almost double

to around twenty five per cent, while the growth of the working population will slow to almost zero. The IGR reports that the ageing of Australia’s population will result in a greater demand for government pensions and health care spending and spending on senior care. And the need to keep up with changing technology and community expectations for access to newly available diagnostic tests and medical treatments will result in even greater demands on health spending. The net result is that Australia will exceed the amount it raises in taxes by five per cent of GDP by 2041. So, do we need to worry about Australia like we worry about South America?

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

The answer to the question is a resounding “completemente no”, for many reasons. Here are just a few. When evaluating Australian state performance using the World Bank’s “Governance Matters” data set, Australia exhibits exactly “zero” of the symptoms of a weak state.4 Australia has had effective governance and consistent economic prosperity for two centuries. Australia has half the population of Argentina, half the population of Colombia, and eleven percent of the population of Brazil. Since Australia has no neighbors, there is no opportunity for “spillage” of instability from a weak or failed neighbor. While there is some growth trend toward economic inequality in Australia (the richest ten per cent of


households in Australia receive 4.3 times the income of the poorest households), Australia has nowhere near the wealth disparity of South America. In fact, like the U.S., Australia provides economic assistance, military assistance, training, etc., to many of the world’s weak and failed states. Bottom line, while Australia does have a demographic challenge on the horizon, they are already dealing with that challenge with policies designed to grow and extend the economy. Here is one additional important demographic trend to consider. Analysts are learning that weak and failing states do not necessarily create havens for the development of terrorist organizations. However, certain attributes of weak and failing states are appealing to terrorist organizations. According to Brea, in recent years, the majority of population growth in South American countries has been in the urban areas (4.5 percent per year). The flow of the population from rural areas to the cities has been fast and furious (unlike Australia, which has been relatively slow and regular). South American

government infrastructures have struggled to meet the demand, and the poorest of the population have become increasingly disenfranchised. Today’s terrorist organizations increasingly seek to operate from such urban environments where they can blend in to the landscape, leverage modern communications architectures, exploit corrupt or overwhelmed governments, and recruit from a young disenfranchised populace. In other words, the cities of South America, where political, social and economic systems are only “partially” broken, may be more permissive staging environments than Afghanistan and Somalia. Understanding the demographic trend is a good start. Now, the key question for U.S. policy makers is: How to leverage all dimensions of national power to help our southern neighbors achieve political, social and economic stability that enhances our own national security. The good news is that our national security strategy documents are already focusing in on the right things. For example, SOUTHCOM’s objective

3.1.1 reads “Assist (South American) militaries to develop additional capabilities that ensure effective governance of their territories, specifically in under-governed territory.” As a result of sound fact-based strategy, the U.S. military has been cooperating and interoperating with South American militaries and security agencies more than ever before. And we have had some significant recent successes – For example, in Colombia, which is experiencing a surprising economic boom. The war on terror is no longer being fought in the mountain ravines and caves of Tora Bora. Where will the struggle go next? U.S. and western militaries and intelligence and law enforcement agencies must reflect on how the war will evolve both geographically and ideologically. The geography of the fight will continue to change. The brand of the struggle may shift from Islamic to some other flavor. And, it may evolve to a banding together of extremist groups that are culturally, ethnically and ideologically diverse, but see themselves as having a common struggle

against the West. Geographies that we believe are relatively immune to violent extremism could potentially become key battlegrounds. There are many “what ifs” in the equation. Demographics are the factors.

About the Author Lieutenant Daniel Murphy is a U.S. Navy intelligence officer and graduate student at the National Intelligence University in Washington, DC.

Reference James G. Stavridis, Partnership for the Americas: Western Hemisphere Strategy and U.S. Southern Command, National Defense University Press, Washington, DC, 2010, page 211. Stavridis, page 205. Jorge A. Brea, “Population Dynamics in Latin America,” Population Bulletin, Population Reference Bureau 58, no. 1, Washington DC, 2003, page 4. Also, United States Southern Command Strategy 2018: Partnership for the Americas, 2008, page 8. Stewart Patrick, “Weak States and Global Threats: Fact or Fiction,” The Washington Quarterly, Washington DC, 2006, page 27. Note: The views expressed in this paper are those of the author and do not reflect the official policy or position of the Department of Defense, the U.S. Navy, or the U.S. Government

Get Involved With The IACSP And Our International Chapters!

Get Involved Today!

We have opened a new chapter in Japan. IACSP member Terrence Noonan will be heading up the effort. He can be reached at: dir@iacspjapan.org Chapter involvement means networking opportunities.

Get Involved Today!

In addition, our SE Asia Chapter Director, Andy Raj wants to encourage all IACSP members in SEASIA to contact him and sign up with the chapter. He can be reached at: andrin.raj@stratad.net Chapter involvement means networking opportunities.

Not Receiving IACSP’s Monthly ENewsletter?

Earlier this year the IACSP began a monthly ENewsletter for its members. If you are a member and are not receiving our ENewsletter, please contact me at the IACSP office: iacsp1@aol.com and we will be happy to put you on our Elist. Thank you. Steven J. Fustero/Dir. of Ops/IACSP

IACSP.COM

Japan

NEW Chapter!

SE Asia Chapter

E-News


Who Are The Dutch Marines Special Forces Anyhow?

By Andrew Balcombe

30

Dutch Marines look on as their teammates are hoisted i n t o a h o v e r i n g Ly n x helicopter during a visit, board, search and seizure (VBSS) training evolution aboard Dutch fast combat support ship HNLMS Amsterdam (A 836). Amsterdam is currently deployed as part of Combined Task Force One Five Zero (CTG-150), conducting maritime security operations (MSO). U.S. Navy photo by Photographer’s Mate 1st Class Curt Cooper (RELEASED)

T

he Royal Netherlands Navy’s Special Operations Forces unit is the Netherlands Marines Maritime Special Operations Forces (MARSOF). Within this group, is a smaller elite Special Forces (SF) unit that specializes in Counter Terrorism (CT) operations. This group is called the Unit Interventie Mariniers (UIM) and number roughly 130 operators. The Royal Netherlands Marine Corps first elite CT unit was called the Bijzondere Bijstandseenheid (BBE-M), which was formed in 1973 in response to the Munich Olympics terrorist incident. The BBE-M first earned widespread recognition in the 1970s, when they assaulted a Dutch train hijacked by Malaccan extremists and freed their hostages.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


The Hague Siege 2004 The BBE-Ms skills were again put to the test when four policeman of an Arrest Team in The Hague, were injured by a hand grenade thrown by homegrown terrorists cell called the Hofstadgroep. The BBE-M was called in to help.

ment of those units occurs under the supervision of the Openbaar Ministerie (OM). The DSI can deploy three different units depending on the threat level. The first level units are the Arrest Teams (ATs). ATs consist of KLPD and BSB personnel.

MARSOF Since 2008 the two elite-units of the Netherlands Marine Corps, the Unit Interventie Mariniers (UIM) and the Maritieme Speciale Operaties Company (MSO) operate closely together within the Maritime Special Operations Forces, the MARSOF. MAR-

zone by any means including parachute, submarine or submersible and also conduct ship sinking operations. The divers attached to the UIM also work with the British Royal Marines Special Boat Service (SBS) and are known as 7 Troop. 2. Breachers: (using explo-

During special operations abroad, members of the MARSOF have been deployed to capture suspected war criminals in hostile territory and bring them into custody of the UN War Tribunal. After a BSB sniper shot one of the terrorists in the shoulder, the BBE-M breached the house using frame charge and made a successful arrest.

DSI In 2006, the BBE-M was renamed into the UIM. During domestic CT operations, the UIM operate under the Dienst Speciale Interventies (DSI). DSI is a combined military/ police unit, which consists of marines, the National Police (KLPD) Arrest Teams (ATs) and Koninklijke Marechaussee border guard/military police Brigade Speciale Beveiligingsopdrachten(BSB) ATs and snipers. Under special circumstances in the Netherlands, it is possible to deploy special units of the police and the Ministry of Defense. (e.g. to end life threatening situations or to arrest fire arm dangerous suspects and/or suspects of terrorism and severe violence.) For this purpose the Dienst Speciale Interventies (DSI) under the Korps Landelijke Politiediensten (KLPD) is raised. This service has the lead in deploying special units in terrorism or high-level threat situations. The deploy-

Their aim is to arrest fire-arm dangerous suspects in order to end a regular criminal situation. The second level units are composed of two thirds marines or BSB and one-third KLPD police personnel. This unit is called the Unit Interventie (UI) and specializes in medium threat situations. This unit is specialized in small-scale high-risk operations, in which explosives/heavy weapons and an intention for sacrifice by the suspects may be involved. The third unit, Unit Interventie Mariniers (UIM) is composed completely of specialized CT operators of the Royal Netherlands Navy’s Special Forces. They are called in for largescale, offensive and/or complex operations. UIM handles all large scale and complex counter terrorism operations inside the Netherlands including those taking place in: • Large, complex buildings like football stadiums, theaters and Ministry buildings, Aircraft, Ships, Oil rigs, Trains In case of a national deployment, the UIM is lead by the DSI, but the Ministry of Defense provides essential specialist support and expertise.

SOF is the special forces unit of the Royal Netherlands Navy. Their focus is CT-operations (UIM), special operations from the sea, under extreme climateand terrain circumstances and in urban environment. Qua Patet Orbis (As long as the world lasts.) is the motto of the Dutch Marine Corps. During special operations abroad, members of the MARSOF have been deployed to capture suspected war criminals in hostile territory and bring them into custody of the UN War Tribunal. But these specialist marines have also been deployed together with commandos of the Korps Commando Troepen in Iraq and in Afghanistan, for long-distance reconnaissance and other Special Forces operations. Another example is the deployment of boarding teams in anti-piracy operations, like the liberation of the German containership Taipan.

Organization The UIM’s 130 members belong to three platoons. Each man is specialized in ‘Black’ CT work. In addition, each member has an individual specialization, like: 1. Diving: The dive team was established in 1959 and can insert into a hostile

sives, crowbars or rams) 3. Climbing: (specializing in an urban environment) 4. Silence: (using silenced weapons and equipment, entering buildings using lock picks and other methods.)


Joint Exercises The UIM regularly cross trains with several foreign forces including the British Police Central Operations Specialist Firearms Command (CO19), the US FBI Hostage Rescue Team (HRT), the French GIGN, Czech URNA, German GSG-9, KSK and the SDU of Hong Kong.

UIM operators. On the second day of Easter, a German cargo ship called the Taipan, had sent out a distress call saying pirates were attacking it. The Taipan’s 15 crew were trapped in a safe room.

Weapons

The Tromp was closest to the ship and soon had the vessel within range. Its captain attempted to make contact with the pirates by using a mariphone and then a special megaphone to tell the pirates to hand the ship over.

Currently the MARSOF main assault weapon is the Canadian Diemaco C8A1GD 5.56mm carbine .

When they received no reaction, the Captain gave the green light to send in the UIM operators.

accurate the covering fire had been as all of the windows were riddled with bullet holes. The 3-pack went below to the accommodation quarters to locate any further pirates. During the search they noticed in the accommodation quarters that laptops were scattered all over the floor. Doors were kicked in and shot full of holes and weapons were also found. These included RPG 7 rocket propelled grenade launchers, AK47s assault rifles and Tokarov pistols. The Taipan’s captain and his crew were then located and told it was safe to come out. The ship had been liberated. When they emerged they started singing to the marines. The operation had been a complete success with only one UIM operator slightly injured.

The pilot positioned the helicopter near the bow of the Taipan where a number of containers provided cover for the team to use a fast rope. The MAG door gunner on the helicopter gave constant covering fire... The C8 is around 12 years-old and is being replaced by the improved HK416. The main advantage the HK has over the C8, is that it has more barrel variants including a 10-inch version for Close Quarter Battle (CQB) and fewer malfunctions when submerged in water. Other weapons used by the UIM include the 5.7x28 FN P90 bull pup assault carbine, 9mm HK MP-5 submachine gun and the Sig P226 9mm handgun.

Somalia April 5, 2010. Hostage rescue of the German crew of the Cargo ship Taipan, 500 nautical miles off the coast of Somalia.

The pilot positioned the helicopter near the bow of the Taipan where a number of containers provided cover for the team to use a fast rope. The MAG door gunner on the helicopter gave constant covering fire in the direction of the ship’s bridge as the team deployed. They were certain that none of the Taipan’s crew were in danger, as they knew they had all retreated to the safe room.

The Dutch Navy frigate Hr. Ms. Tromp was patrolling an area 500 nautical miles from the Somali coast as part of the EU’s anti piracy operation Atalanta. Their primary task was to protect shipping in the area.

An assault was made on the bridge and one by one the pirates were ordered out of cover by the marines and told to ‘come to me’. After only a few minutes 10 unarmed pirates had surrendered.

The Tromp was manned by a Maritieme Special Operations Forces (MARSOF) team, which included

A three-man team went up to the upper level of the bridge. The interior of the bridge indicated how

MARSOF/UIM Operations

32

A small boarding team of six men was assembled and lifted off in a Lynx helicopter, piloted by a female member of the Dutch Royal Navy. The pirates then opened fire in the direction of the frigate and the Dutch returned fire from the Tromp and the door MAG of the helicopter.

Anti-Piracy Protocols One of the reasons why the marines were able to safely intervene on this occasion was because the Taipan crew followed the EU mission Atalanta’s protocols for a ship under attack from pirates. They immobilized the vessel by turning off all engines and machinery, radioed the warships patrolling the Gulf of Aden to call for help, and then locked themselves away in a secure part of the ship to await rescue. Two of the 15-member crew were German. After some minor repairs to the bridge, were made the crew of the Taipan were able to continue on their voyage. The captured pirates were transported to Djibouti by the Dutch and then sent to Germany to face trial. The MARSOF force operating off Somalia has warded off many attempts by pirates to hijack vessels. The Dutch also operate an amphibious operation, which raids coastal pirate camps and confiscates their skiffs.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

MARSOF/UIM Hostage Rescue Drill On Forteiland Forteiland (Fort Island) is in the mouth of the port of Ijmuiden. It is Amsterdam’s gateway to the North Sea. The fort was built in 1876 for its strategic position of protecting the harbour and canal network running inland and linking many cities and towns. In 1941, the Germans used the island as part of their Atlantic Wall defence system. In total, there are 37 reinforced bunkers in the fort complex, during this exercise, the Marines Special Operations Force (MARSOF) have the job of clearing it of a number of terrorists and rescuing 21 hostages.

Threat The hostages are all members of an international atomic agency. They were kidnapped earlier in the day from a bus and then transported to the island. The exercise is simulating communications conditions that were similar to the


New Orleans hurricane disaster, in that all systems were down. Intelligence indicates that the leader of the terrorist cell is also experienced in using explosives. Earlier in the day aircraft and satellite imaging was used to provide visual intelligence on the island and any human activity-taking place on it.

Plan The assault is to take place at night and involve two lynx helicopters, a number of Rigid Hull Inflatable Boats (RHIB) and smaller Zodiacs. The UIMs elite dive teams have already been inserted ahead of the main assault force to cover the helicopters and boat teams approaching the target area. The helicopters will drop two assault teams by fast rope. RHIBs will then follow soon after and deploy larger support teams. In total, six teams are to be inserted, including members of the Explosives Clearance Team (Explosieven Opruimingsdienst (EOD)) to deal with IED threats. Dock lights and the rotating beam of a lighthouse punctuate the pitch-black night of

the harbor. Overall, it is not an easy task for the Lynx pilots who are flying with night vision goggles. At midnight, the first lynx swoops in low and a team of six UIM operators fast rope to the ground. Moments later, a second team deploys and they make their way into the complex. The first door is blown with explosives. There is shouting, shots and smoke. Minutes later, the assaulters locate the main group of hostages. They kill and capture the Tangos (terrorists) holding the hostages.

IEDs One female hostage is tied to a chair with an IED attached to it. An EOD-member safely releases her from the chair. She is then searched for any further devices. The rest of the hostages are secured as the operators are joined by elements of the dive team and they make their way deeper into the complex. Each operator has a map of the area attached to their arm so they can stay on track.

While the clearing action goes ahead, the hostages are brought under cover of ballistic shields, to a safe area by other members of the team. Rooms are cleared at a high tempo with flash bang grenades and torches attached to the operators FN P90 assault carbines and HK MP-5 submachine guns. Certain colour glow sticks are left at the entrances of cleared rooms that are safe to cross. The terrorists had carried out on their threat of planting IEDs and one element of the assault force feels the full brunt of the IEDs explosion, (a number of flash bang grenades connected together). Once the fort is declared cleared of all threats, Tangos and hostages alike are questioned and identified. Tangos are questioned further about their numbers and the location of any more IEDs. The Tango is brought back into the complex by a UIM six man team and an EOD member. He leads them to a suspected IED and

the EOD assesses it then disarms it. No further IEDs are detected but if any object looks suspicious, it was illuminated with another colour glow stick until the EOD personnel can investigate. Intelligence had provided a number of photos of the suspects so each one could be matched for their identity. Overall, the exercise was deemed as a success said Jan, the UIM’s commanding officer. ‘The fact that the team sustained casualties, provided a valuable lesson which each operator was able to take on board,’ he said.

About the Author Andrew Balcombe is an Australian freelance journalist and cameraman based in the Netherlands. He writes about international, defence, justice and security issues, particularly on Dutch and Australian forces in southern Afghanistan. Andrew has contributed stories for officiere.ch, World Politics Review and writes for several international magazines including Australian Defender.

“IntellIgence Is vItal to National Security.”

James Green, Jr. | Intelligence and National Security Outreach Spanning an impressive 38-year career with the Central Intelligence Agency and the National Geospatial-Intelligence Agency, James Green is a respected leader and mentor. Having served as an intelligence officer, branch chief, senior recruiter and project manager, James knows about American Military University’s academic reputation. That’s why he joined AMU.

Learn More at www.amuonline.com/JOC Art & Humanities | Business | Education | Management | Public Service & Health | Science & Technology | Security & Global Studies AMU_JournalofCounterterrorism_0412.indd 1

4/12/12 10:17 AM


Directory of Organizations

Offering Homeland Security and Counter Terrorism Curriculae. American Board for Certification in Homeland Security The ABCHS serves a diverse membership of professionals dedicated to the important mission of protection our nation. To become a member call 877-219-2519, email us at info@abchs.com or visit our website at http://www.abchs.com American Military University 111 West Congress St., Charles Town, WV, 25414 http://www.amu.apus.edu/public-safety BA & MA in Homeland Security; BA & MA in Emergency and Disaster Management; BA & MA in Intelligence Studies; BA & MA in Security Management; BS in Fire Science Management; BS in Information Systems Security.

34

Bellevue University 1000 Galvin Road South, Bellevue, NE, 68005 http://www.bellevue.edu University offers more than 20 accelerated bachelor’s degree completion majors online, including Bachelor of Science degrees in Security Management, Criminal Justice Administration, Investigations, and Corrections Administration and Management.

California University of Pennsylvania 250 University Ave., California, PA , 15419 www.calu.edu/go or call 724-597-7400 Master’s in Legal Studies/Homeland Security, Certificate in Homeland Security. Capella University 225 South 6th Street, 9th Floor, Minneapolis, MN 55402 http://www.capella.edu Pursue a homeland security career and help protect your country’s citizens, lands, and property. This specialization focuses on managing public security in conjunction with federal resources. Canadian Defence Academy PO Box 17000, Kingston, ON, K7K 7B4, CAN http://www.cda.forces.gc.ca Military education, defense and security. Center for Homeland Security University of Colorado at Colorado Springs UCCS Center for Homeland Security, Colorado Springs, CO www.chs.uccs.edu Graduate Certificate in Homeland Defense, Undergraduate Certificate in Homeland Defense.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

Center for National Security Law University of Virginia School of Law 580 Massie Rd., Charlottesville, VA, 22903-1789 http://www.virginia.edu/cnsl/ Various course on National Security Law; summer National Security Law Institute for law professors and government attorneys. Center for Terrorism Law St. Mary’s University School of Law One Camino Santa Maria, San Antonio, TX, 78228 http://www.stmarytx.edu Terrorism Law Central Georgia Technical College 3300 Macon Tech Drive, Macon, GA, 31206, US http://www.centralgatech.edu Public/Private Crisis Manager Certificate, iploma and/or Associate of Applied Science Degree. CHDS http://www.chds.us/ The Naval Postgraduate School Center for Homeland Defense & Security (CHDS) has been the nation’s premier provider of homeland security graduate and executive level education


since 2002. NPS and the U.S. Department of Homeland Security are partnering to pioneer the development and delivery of homeland security education programs for governors, mayors and senior homeland security leaders from across a wide spectrum of disciplines. Everest University http://www.everest.edu The Homeland Security program includes: Civil & criminal justice, Emergency planning and security measures, Principles, planning and procedures of safety, Tactical communications, Domestic and international terrorism, Emergency medical services and fire operations, Business and ethics for security specialists. Command & General Staff College 100 Stimson Ave., Ft. Leavenworth, KS, 66027-2301 Command and General Staff College incorporates various aspects of homeland security and homeland defense into its core curriculum. richard.berkebile@us.army.mil Delaware Technical and Community College 100 Campus Drive, Dover, DE , 19904 www.dtcc.edu Associate Degree in Criminal Justice, Homeland Defense and Emergency Management. East Carolina University A-124A Brewster Bldg., Greenville, NC, 28758-4353 http://www.ecu.edu/cs-cas/securitystudies/ index.cfm Graduate Certificate in Security Studies, Harriot College of Arts & Science, Department of Political Science; Undergraduate Minor in Security Studies (Interdisciplinary) Emergency Administration and Planning University of North Texas 1155 Union Circle #310617, Denton, TX, 76203-5017 http://www.unt.edu/eadp UNT offers a bachelor’s degree in Emergency Administration and Planning. It also offers a Master’s and Ph.D. in Public Administration and Management (with a concentration in emergency management). Courses include Homeland Security, Disaster Response and Recovery, Hazard Mitigation and Preparedness. Fairleigh Dickinson University 1000 River Rd., H-DH2-13,

Teaneck, NJ, 07666 http://fdu.edu/mas Undergraduate certificate programs: Disaster & Emergency Management; Security & Terrorism Management; and Transit Safety & Terrorism Studies. Graduate certificate programs: Computer Security & Forensic Administration; Global Security & Terrorism Studies.

Jones International University 9697 East Mineral Avenue, Centennial, Colorado 80112 http://www.jonesinternational.edu Secure a better future. The four ISM courses in our MBA specialization are designed to provide realistic recommendations for improving the information security of an organization.

George Mason University Dept. of Public and International Affairs, MS 3F4, 4400 University Dr., Fairfax, VA, 22030 http://pia.gmu.edu/grad/biod PhD Biodefense, MS Biodefense George Washington University 121 I Street, N.W., Washington, D.C. 20052 http://nearyou.gwu.edu/hs/index1.html Graduate Certificate in Homeland Security Emergency Preparedness

Kaplan University 888 7th Avenue, New York, NY 10106 http://www. Kaplan.edu Kaplan University offers nine emphasis areas in the Bachelor of Science in Criminal Justice program: Forensic Psychology, Law Enforcement, Private Security, Fraud Examination and Investigation, Corrections, Crime Analysis, Crime Scene Investigation, Computer Crime and Homeland Security and Counterterrorism.

This part-time graduate certificate program provides crisis, disaster and risk management expertise for persons engaged in or seeking professional careers in crisis, disaster and emergency management in the public, private and not-for-profit sectors. Goodwin College 745 Burnside Ave., East Hartford, CT, 06108 http://www.goodwin.edu Homeland Security Greenville Technical College Critical Incident Management Institute (CIMI) 216 S. Pleasantburg Dr., Greenville, SC, 29607 http://www.gtbmc.com Professional Education and Associate Degree programs in various Public Safety, Emergency Healthcare, and Incident Response disciplines. Henley-Putnam University 25 Metro Drive, Suite 500, San Jose, CA 95110 http://www.henley-putnam.edu Henley-Putnam University is the only accredited (DETC) university that specializes exclusively in intelligence, counterterrorism and protection. We offer over 100 courses on topics such as covert actions, counterintelligence, counterterrorism and intelligence collection management. Iowa Central Community College 330 Ave M, Fort Dodge, IA, 50501 http://www.iccc.cc.ia.us Associate of Science/Arts in Criminal Justice, Diploma Certificate

Keiser University 1900 West Commercial Blvd., Fort Lauderdale, Florida 33309 http://www.keiseruniversity.edu/ Keiser University’s Bachelor of Arts degree in Homeland Security focuses on management-level skills needed in the critical field of Homeland Security. The program provides an understanding of essential management skills and addresses unique proficiencies needed to understand Homeland Security at the Local, State, and Federal levels. Topics include cross cultural management, emergency management planning and critical infrastructure protection. Long Island University 121 Speonk-Riverhead Road LIU Bldg, Riverhead, NY 11901-3499 http://www.liu.edu/homeland The Homeland Security Management Institute offers an accredited, 36-credit Master of Science degree in Homeland Security Management and a 15-credit graduate-level Advanced Certificate in Homeland Security Management, both delivered entirely online, with no in-residence component. Our rigorous curriculum focuses on the complexities of the homeland security enterprise, providing executives, managers and practitioners with exceptional professional education. Midway College 512 E. Stephens Street, Midway, KY, 40347 http://www.midwaycolleges.com Bachelor of Arts in Homeland Security Corporate Management and Assessment.


Montgomery County Community College 340 Dekalb Pike, Blue Bell, PA, 19422 www.mc3.edu AAS degrees in CJS, FSC, & EMP; Certificates in FSC and EMP; Individual courses. Also Police Academy and Fire Academy at Montgomery County Public Safety Training Campus. Naval Postgraduate School Center for Homeland Defense and Security 1 University Circle, Monterey, CA, 93943 http://www.chds.us Master of Arts Degree Program, Executive Leadership Program, Mobile Education Team (MET) Seminars. Northcentral University Center for Law Enforcement and Security 10000 E. University Drive, Prescott Valley, AZ, 86314 http://www.ncu.edu Bachelor’s, master’s and doctoral degrees, as well as certificates of advanced graduate study, in business and technology management, education and psychology. Specializations include Homeland Security, Criminal Justice, Public Administration, Organization. Norwich University 158 Harmon Drive, Northfield, VT 05663 Northfield, VT 05663 http://www.norwich.edu At Norwich, you’ll develop traits common among leaders in every profession discipline, integrity, confidence, critical thinking, adaptability, loyalty, and honor through a wide range of opportunities that will empower you in lasting ways you never imagined. Notre Dame College 4545 College Rd., South Euclid, OH, 44121-4293 www.notredamecollege.edu/professional_development Certificate in Intelligence Analysis (Homeland Security) Certificate in Competitive (Business) Intelligence Penn State 222B Outreach Bldg. Penn State,University Park, PA, 16802 http://www.worldcampus.psu.edu Bachelor’s Degree in Forensic Science; Bachelor’s Degree in Security and Risk Analysis;

36

Master of Geographic Information Systems; Master of Homeland Security in Public Health Preparedness; Master of Professional Studies in Forensic Science. Purdue University Purdue Homeland Security Institute (PHSI) Gerald D. and Edna E. Mann Hall Room 166, 203 S. Intramural Drive, West Lafayette, IN, 47907-1971 http://www.purdue.edu/DiscoveryPark/phsi/ Homeland Security Masters Area of Specialization Rochester Institute of Technology 31 Lomb Memorial Drive, Building 1, Suite 2210, Rochester, NY, 14623 http://www.rit.edu/cms Security Technology Management; Security Technology Policy, Law and Ethics; Managing Cyber Threats and Critical Information; Internal Organization Security Management; Examining Terrorist Groups. S2 Safety & Intelligence Institute 1261 South Missouri Ave., Clearwater, Florida 33756 http://www.s2institute.com/ Since 1998, the S2 Safety & Intelligence Institute has trained thousands of security, intelligence, and law enforcement professionals in critical public safety topics. With a staff of world-class instructors, S2 has earned a reputation as one of the nation’s premier sources for security and public safety training. We provide traditional classroom instruction and hands-on training at our two locations in Florida and at host locations throughout the United States. Through our sister company, the S2 Online Academy, we also deliver high quality distance education to students throughout the world. Saint Leo 33701 State Road 52, PO Box 6665, Saint Leo FL 33574-6665 http://www.saintleo.edu Founded in 1889, Saint Leo University offers one of the largest online undergraduate degree programs and was recently named a “Leading Southern University” by U.S. News and World Report. Saint Leo is also proud to be a leading participant in eArmyU.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

SIG Homeland Security 184 Columbia Turnpike, Suite 4 #103, Florham Park, NJ 07932 http://www.sighls.org The Certified Homeland Security Professional [CHSP] courses and certifications are designed to prepare and certify the next generation of homeland security professionals in both the physical and digital spectrum of the business. Southwestern College 2040 South Rock Rd., Wichita, KS, 67207 www.southwesterncollege.org Master of Science in Security Administration, Bachelor of Science in Security Management, Bachelor of Science in Criminal Justice, Certificate in Homeland. Stanford University Center for International Security and Cooperation Encina Hall, Stanford, CA, 94305-6165 http://cisac.Stanford.edu Fellowships in Science, Technology, and International Security; Pre-doctoral and Postdoctoral Fellowships in International Security; Interschool Honors Program in International Security. St. Clair County Community College 323 Erie St., Port Huron, MI, 48061-5015 www.sc4.edu/homelandsecurity Series 100-Understanding and Combating Terrorism; Series 200-Preventing, Identifying and Investigating; Series 300-WMD: Anticipation, Preparation, and Prevention for First Responders and Medical Personnel; Series 400-Investigating. St. Petersburg College 3200 34th Street South, St. Petersburg, FL, 33733 http://www.spcollege.edu/ac/ Associate in Science in Emergency Administration & Management; Bachelor in Applied Science in Public Safety Administration; Certificate in Emergency Administration & Management; Certificate of Homeland Security. Stanford University Center for International Security and Cooperation Encina Hall, Stanford, CA, 94305-6165 http://cisac.Stanford.edu Fellowships in Science, Technology, and International Security; Pre-doctoral and Postdoctoral Fellowships in International Security; Interschool Honors Program in International Security.


Enroll Now in FDU’s

Master of Science in

Homeland Security Flexible class formats and locations — including online and in-person at several NJ locations — let you earn your degree without career interruption. In the complex world of homeland security preparedness, experience counts. But when it comes to career advancement, your credentials make the difference. Our 36-credit Master of Science in Homeland Security is for law, public safety, emergency management and other homeland security professionals who want to advance in this fast-growing field. • Practical and theoretical focus on aspects of homeland security with an emphasis on leadership. • Network and learn with faculty and peers experienced in homeland security. • Choice of concentrations — Terrorism and Security Studies, Emergency Management and Leadership — to tailor the program to meet your career goals. • No GRE requirement.

Call today! Classes begin year-round.

For more information or to request an application, contact: Paulette Laubsch, DPA Program Director, MS in Homeland Security Phone: 201-692-6523 Email: plaubsch@fdu.edu Website: www.fdu.edu/mshs


Henley Putnam University:

Indonesian anti-terror policemen hold their rifle as they stand guard at the business district in Jakarta, September 11, 2011. REUTERS/Beawiharta

Embracing The Core Competencies In Strategic Security Education By Amanda Morrow-Jensen, M.S. and Amy DiMaio, Ph.D.

H

enley-Putnam University specializes in the field of strategic security education, including the sub-disciplines of counterterrorism, intelligence, and protection management. Our University targets a specific niche in these professional fields, preparing students for direct entry in these career fields through an intense education in a fusion of the more traditional academic disciplines such as history, foreign affairs, area studies, political science, economics, management, and homeland security. Our faculty all come from the strategic security professions themselves, and thus teach these courses with a focus on exactly what, for example, an FBI agent, a corporate security executive, or a counterterrorism analyst would need to know in order to succeed in their jobs.Â

38

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


Such a description of our curriculum and goals sounds exciting, but we also strive hard to ensure that the curriculum delivers on these goals. We do so by incorporating some of the best practices in higher education throughout our degree programs while maintaining a firm focus on our University mission and objectives: to prepare students and professionals to further be successful in strategic security careers. In higher education right now, measuring education by its successful use post-graduation in a career is a growing trend: “Never before has there been so great a need for learned and adaptable citizens capable of taking apart and understanding complex problems, of identifying reliability and authority among the many sources of information, of appreciating the quantitative realities that may lie beneath the surface, of thinking creatively about solutions, of communicating to others the emerging results of their work, and of working with others to bring solutions to practice.” Active and experienced practitioners in their fields, the faculty at Henley-Putnam not only teach these skills in course content, they live them professionally and apply them academically—facilitating the evolution of students and professionals alike into successful, capable, adaptable and developing practitioners themselves. Because of the existential nature of our disciplines and coursework, Henley-Putnam University has been focused on professional and practical outcomes since the school’s inception. Here are two insights into how we do it: 1) We embrace the core competencies. Core competencies, you might ask? Yes. Most undergraduate degree programs these days tie their learning outcomes back to the general education core competencies of oral communication, written communication, information literacy, critical thinking, and qualitative and quantitative analysis. While the core competencies may vary from school to school, they focus on these fundamental skill sets. So do we. These skills are the foundation for a student in our disciplines, and all of our courses and degree programs connect in some way to building the students’ strengths and fluency in these competencies as they progress through the degree. In this way, we ensure that no matter where students end up in their careers, these skill sets will help them transition to handle work in any subject matter: the transferability of these core competencies makes them an invaluable asset in any professional arena. 2) We make the core competencies relevant to our mission. At Henley-Putnam University,

our goal “is to serve both new students and professionals in the strategic security industry, especially within the law enforcement, military and the intelligence community, by increasing their opportunities for advancement in the fields of intelligence management, counterterrorism studies, and strategic security and protection management.” One of the ways we accomplish this goal is to start the learning process early. A student might need

learning process, connects the means to the end, and has a chance to engage in the focus of the major earlier in the degree program. Finally, by embracing the general education core competencies and folding them into our long-standing tradition of outcome-focused education, we engage undergraduate students at several points in their academic careers. Because our degrees tend to attract

Crime erodes economic growth because foreign investors avoid the risk of investment in places that cannot guarantee the rule of law, and because skilled workers and managers will leave a region when the government cannot guarantee basic physical safety.2 to work through a philosophy course as part of mastering the core competencies and to build a foundation for coursework in a specific degree program. As part of our Introduction to Ethics course, students read articles like Cook’s “Ethical Issues in Counterterrorism Warfare” and discuss their implications in the context of the course, considering what that might mean in the context of the field. Likewise, a discussion in our Fundamentals of Biology course explores the use of biological agents as weapons and what that might mean concerning society, government, and bioterrorism. In the near future, students will be able to take “Introduction to Literature: Conflict, War, and Espionage” to meet core General Education requirements, instead of a generic literature course. In our General Education courses, we weave strategic security material, themes, and concepts throughout psychology classes, biology classes, philosophy classes, history classes, and general education electives. This unique approach of blending general education skills sets (including the core competencies) with aspects of strategic security aims to give students a firm basis in the subject matter, while also demonstrating to them the vitality of the core competencies in creating a successful career in strategic security. The general education skill sets and core competencies become clearly relevant and practical when presented in this context. Integrating core competencies with subject matter content helps to ensure that the student stays more engaged in the

students with backgrounds in the military, government work, law enforcement, and the corporate security sector, we often have students with extensive training and professional expertise. However, as a program outcomes-based University, we easily evaluate and assess this prior learning, connect it to the Henley-Putnam degrees, and allow the student to step into the program at the appropriate point of academic development and maturity. At the same time, students straight out of high school can enter the undergraduate program and start immediately building a skill set and subject matter expertise that moves them towards a first career in strategic security. In short, we can “catch” students at whatever point they are at academically, and engage them into our degrees and courses precisely because the program is continuously structured around the core competencies.

About the Authors Amanda Morrow -Jensen is the Dean of HenleyPutnam University’s Terrorism and Counterterrorism Studies Program and Director of the Foreign Language Program. Dr. Amy DiMaio serves as the Dean of General Education for Henley-Putnam University. Gaston, Paul L. General Education and Liberal Learning: Principles of Effective Practice. Washington: Association of American College and Universities, 2010. P. 10.


Syracuse University College of Law, Syracuse, NY, 13244 http://insct.syr.edu/ Institute for National Security and Counterterrorism Texas A&M University 200 Discovery Drive, College Station, TX, 77845-1185 http://homelandsecurity.tamu.edu Graduate Certificate in Homeland Security The Center for Continuing Studies, (UCONN) One Bishop Circle, Unit 4056, Storrs, CT 06269-4056 http://continuingstudies.uconn.edu/mps/ programs/hsl.html In partnership with the Naval Postgraduate School (NPS) in Monterey, California, is offering a Master of Professional Studies degree with a Homeland Security Leadership concentration (MPS HSL). The New York Times Knowledge Network and Fairleigh Dickinson University 620 Eighth Avenue, New York, NY 10018 (212) 556-8300 www.nytimes.com/fdu Course: Business, Technology & Communication, Global Leadership, Cybercrime & Computer Forensics, Security, Safety, & Terrorism Studies, US Homeland Security Thomas Edison State College 101 West State Street, Trenton, NJ, 08608 http://military.tesc.edu Bachelor of Science in Homeland Security and Emergency Preparedness (approval pending, Oct. 2008); BSHS in Administration of Justice; BA in Criminal Justice; BSHS in Emergency Disaster Services; Graduate certificate in Homeland Security. Tiffin University 155 Miami Street, Tiffin, OH, 44883 http://www.tiffin.edu Bachelor’s in CJ; Associate’s in CJ; Master’s of Science in CJ. Towson University 8000 York Road, Towson, MD, 21252-0001 www.new.towson.edu/hsm Integrated HS Management Program. Tulane University School of Continuing Studies 125 Gibson Hall,

40

New Orleans, LA, 70118-5698 scs.tulane.edu/degrees_programs/homeland.htm Bachelor’s degree, minor, or post-baccalaureate certificate in Homeland Security Studies. A Masters in Professional Studies (MPS) in homeland Security Studies is currently under development. University of Denver 2201 South Gaylord, Denver, CO, 80208 du.edu/gsis/areas/homelandsecurity.html Master’s and graduate level certificate in Homeland Security. University of Hawaii West Oahu 96-129 Ala Ike, Pearl City, HI, 96782 http://www.uhwo.hawaii.edu Disaster Preparedness and Emergency Response (DPEM), Justice Administration, Public Administration, Health Care Administration, Forensic Anthropology, Security Administration. University of Idaho 1776 Science Center Dr., Idaho Falls, ID, 83402 http://www.uidaho.edu Emergency Management and Planning Certificate University of Maryland College Park, MD, 20742 www.start.umd.edu/education/ or www. publicpolicy.umd.edu/Int... Graduate Certificate in Intelligence Analysis; Graduate Certificate in Terrorism Analysis; Undergraduate Minor in Terrorism Studies; Critical languages study. University of Maryland University College 3501 University Blvd. East, Adelphi, MD, 20783 http://www.umuc.edu/homelandsecurity Homeland Security Management Program. University of New Haven 300 Boston Post Road, West Haven, CT, 06516 http://www.newhaven.edu/5924/ Undergraduate Programs -Criminal Justice (B.S.) (A.S.) -Forensic Science (B.S.) -Fire Science (B.S.) -Fire Protection Engineering (B.S.) -Fire & Occupational Safety (A.S. -Legal Studies (B.S.) (A.S.) Graduate Programs -Criminal Justice.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

University of Southern California 3710 McClintock Avenue, Los Angeles, CA, 90089-2910 http://www.usc.edu/create National Center for Risk & Economic Analysis of Terrorism Events (CREATE) Executive Program in Counter-Terrorism. University of St. Andrews Certificate in Terrorism Studies Contact: Bob Sherwood, Terrorism Studies Consultant to The University of St Andrews St Andrews, Fife KY16 9AJ, Scotland Ph: +44 (0) 20 7017 5263 Robert.Sherwood@informa.com The University of St. Andrews, Centre for the Study of Terrorism and Political Violence, is offering a Certificate in Terrorism Studies. The Certificate is a transnational e-leaning course that provides individuals, the military, the police, as well as public or private sector organizations with an understanding of the latest terrorist thinking. Virginia Commonwealth U Room 301B Scherer Hall, Richmond, VA, 23284-2028, US http://www.pubapps.vcu.edu/gov/academics/default.asp?ID=134 Bachelor’s of Arts in Homeland Security and Emergency Preparedness, Master’s of Arts and Graduate Certificate in Homeland Security and Emergency Preparedness. Walden University Phone: 1-866-492-5336 http://www.waldenu.edu Designed for professionals in the public, nonprofit, and private sectors, Walden’s online M.P.A. program offers collaborative online courses. You’ll interact with peers and faculty members who are active in government and nonprofit agencies. West Kentucky Community and Technical College 4810 Alben Barkley Drive, Paducah, KY, 42001 http://www.westkentucky.kctcs.edu/ West Kentucky Community and Technical ¬College offers two programs in Homeland Security/Emergency Management. One leads to a Certificate and the other to an Associate in Applied Science in Homeland Security/ Emergency Management. Wilmington University 320 N. DuPont Highway, New Castle, DE, 19720 http://www.wilmu.edu Criminal Justice Program


THINKING ABOUT

A DEGREE IN COUNTERTERRORISM OR INTELLIGENCE? THINK ABOUT

HENLEY-PUTNAM UNIVERSITY TERRORISM AND COUNTERTERRORISM STUDIES AT HENLEY-PUTNAM UNIVERSITY Sample of Available Courses: • Terrorist Techniques • Analysing the Terrorist Mind • Counterterrorism • Threat Assessment • Counterintelligence • Chemical, Biological, Radiological and Nuclear Weapons • Extremist and Terrorist Groups • Open Source Research • Ethics • Terrorist Operations • Terrorism and Society • Cyber/Information Security • Clandestine Communications • The Psychology of Fear

EARN YOUR B.S. OR M.S. ONLINE, LEARN FROM FACULTY WITH ACTUAL FIELD EXPERIENCE. Henley-Putnam faculty members have worked in strategic security positions in the military and/or in government agencies for an average of 22 years, making them uniquely equipped to share practical field expertise with their students. VETERAN CIA OFFICER … WMD TERRORISM SPECIALIST … DIRECTOR OF CORPORATE SECURITY, WORLD-WIDE SECURITY OPERATIONS … CHIEF OF INTELLIGENCE, GROUND FORCE DIVISION, OPERATION DESERT STORM … NATIONAL PROGRAM MANAGER FOR FBI COUNTERTERRORISM INVESTIGATIONS … STATE DEPARTMENT ANTITERRORISM SURVEILLANCE DETECTION TEAM…CLANDESTINE COLLECTION IN KOREA…HUMAN INTELLIGENCE AND COUNTERINTELLIGENCE ... ALL-SOURCE SENIOR INTELLIGENCE ANALYSIS, DEFENSE INTELLIGENCE AGENCY … NUCLEAR, PETROCHEMICAL, K-9 AND PERSONAL PROTECTION … PORT SECURITY SPECIALIST … FBI SUPERVISORY SPECIAL AGENT … THEATER SECURITY COOPERATION FOR SOUTH AND CENTRAL AMERICA … CIA CASE OFFICER ON COUNTERTERRORISM MISSIONS … FIELD WORK ON BOMBING, KIDNAPPING, AND MONEY LAUNDERING … TERRORISM INVESTIGATIONS AGAINST OSAMA BIN LADIN … FOREIGN SERVICE OFFICER … DIGNITARY PROTECTION OF AFGHAN PRESIDENT KARzAI … INTELLIGENCE OFFICER, DIA IRAq SURVEY GROUP … VETERAN UNITED STATES SECRET SERVICE … SECURITY SPECIALIST FOR THE DEFENSE LOGISTICS AGENCY PACIFIC … RESIDENT SPECIAL AGENT AT ANTITERRORISM OPERATIONS AND INTELLIGENCE CELL … SECURITY SPECIALIST FOR THE DEFENSE LOGISTICS AGENCY PACIFIC ... to

Get started today! Find out more:

Or call:

HENLEY-PUTNAM.EDU

+1

Accredited Member DETC www.detc.org

name a few.

(888) 852 8746 +1 (408) 453 9900


The IACSP Announces Its’

20th

Annual Terrorism Trends & Forecasts Symposium The IACSP will be presenting its 20th Annual Terrorism, Trends & Forecasts Symposium on Thursday, September 20th, 2012. It will be held at the prestigious Bergen County Law & Public Safety Institute in Mahwah, New Jersey. Who Should Attend? • • • • • • • • •

42

First Responders Military Law Enforcement Security Directors Emergency Management Government Intel Professionals Emergency Preparedness Homeland Security

When:

• Thursday, September 20th, 2012

Where:

• Bergen County Law & Public Safety Institute: Hall of Heroes: • 281 Campgaw Road, Mahwah, New Jersey, Just 45 minutes from New York City.

Directions:

• For directions to Bergen County Law & Public Safety Institute from your particular location please visit: www.co.bergen. nj.us/bclpsi/Directions.html • From New York, New Jersey area go to McCarthur Blvd. exit about 20 minutes on Rte 17 Turn left at Light On to McCarthur. Go to end Road about 1/2 Mile Turn Right on to Darlington Ave. make first left on to Seminary Road. Take Seminary Road about 1/2 mile to Campgraw Rd. Institute is about 1/2 mile on left. Enter building on left BC Bergen Law * Public Safety Institute

Dress Code:

• Casual Business

Rates:

Rates for this conference are as follows: Early Bird Rates: • Current IACSP Member, please sign up before Aug 10th: $139 • Non-Member, please sign up before Aug 10th: $169 Standard Rates: • Current IACSP Member after Aug 10th: $169 • Non-Member after Aug 10th: $199 • Vender Table Rates: Limited Availability • IACSP Members: $495 • Non-Members: $595 6 Ft Tables / Hand out Brochures / 2 people per table / Includes Free Lunch

Go to www.iacsp.com To Register Today! Or Call The IACSP Office At: Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


Symposium Agenda: Moderator: John Dew 07:00 - 08:30 Registration/Coffee Continental Breakfast 08:30 - 08:45 Opening Remarks by Director Brian Higgins 08:45 - 09:45 Speaker: J M Peterson

Topic: Antiterrorism for Law Enforcement & Security - News You Can Use and what you can do about the threat. Currently serves as the Special Projects Director of the Counterterrorism & Security Education and Research Foundation. As a long-time IACSP member and periodic contributor to our journal, he has served on the Advisory Board as General Advisor since being appointed in 1997. He has spent all of the past 10+ years supporting the war effort, with positions including deployed on the ground as an Army Special Forces soldier, as a government civilian at the U.S. Department of Homeland security, and as government contractor in a variety of roles both domestically and overseas. He is an annual member of ASIS, NTOA, IALEFI, ILEETA, ITOA, IDPA, AFCEI/CHS, and the Nine Live Associates. He is a life member of all of the following: the Academy of Security Educators & Trainers, Special Operations Association, Special Forces Association, AFCEA, IACSP, NRA, and the Veterans of Foreign Wars. Since the mid 1990’s, Mr. Peterson has donated much of his time to the IACSP, to include teaching at 5 of its symposia and representing the association at most of the 51 professional conferences that he has presented at, including the 3 largest law enforcement conferences. As one of our ‘true believ-

ers,’ he plans to continue helping the association for as long as there is a threat of terrorism. 09:45 - 10:15 Coffee/Networking Table Viewing 10:15 - 11:15 Speaker Luke Bencie

Topic: “CounterEspionage and the International Traveler.” This presentation is designed to educate those individuals in an organization who may become targets of espionage, whether knowingly or unknowingly, from an economic competitor or a hostile intelligence service. This highly informative lecture will open the audience’s eyes as to how vulnerable intellectual property actually is while traveling, and the lengths others will go through to steal it. A small sample of the topics covered include: Economic vs. Industrial Espionage. Foreign Intelligence Collection Methods, How to Recognize Elicitation and Recruiting Techniques, Operational Security (OPSEC) Awareness, Communication Security (COMSEC) Awareness, Data Attack and Intrusion Methodologies, How to become an “Invisible Traveler”, Surveillance Detection Techniques, Plus much more… 11:30 - 12:30 Speaker: Amery E. Vasso

Topic: Content at the Edge: From City Streets to the Combat Outpost Accompanying significant advances in communication technology is the capability for an individual to receive a breathtaking amount of content. The volume of information available to homeland security professionals and dismounted Soldiers provide similar benefits and creates new challenges. An understanding of these factors is critical to reaping the benefits technology can provide. With the advent of Long Term Evolution (LTE) networks for law enforcement and emergency services

and a variety of military networking solutions under consideration for the dismounted Soldier the availability content at “the edge” is here now. There is considerable debate surrounding this information capability. How to secure the information? Who receives what? Who needs what? What is the cognitive burden imposed by this technology? When does the amount of information impair intuition and diminish the value of experience? Answering these challenges is essential in maximizing the benefits of this technology and enabling optimum human performance. 12:30 - 01:30 Lunch/Networking 01:30 - 02:30 Speaker Todd McGee

Topic: Behavior Analysis and Recognition Training This presentation will cover topics such as the Current Threat, a timeline of domestic terrorism case studies in U.S. Tradecraft of the Lone Wolf Domestic Terrorist, and Behavior Analysis Continuum. Participants will learn the limitations of the lone wolf Tradecraft and how P.A.T.R.I.O.T. Training System® methodology can identify high risk behavior indicators commonly associated with criminal activity. By the use of techniques taught in the presentation, participants will be able to better secure critical infrastructure and increase their situational awareness while on patrol. 02:30 - 03:00 Coffee/Networking Table Viewing 03:00 - 04:00 Speaker: David Opderbeck

Topic: Cybersecurity and Cyberterrorism: New Threats, New Responsibilities

The Internet pervades every aspect of American life. Financial markets, news outlets, public utilities, telecommunications industries, education, government - name any sector of public infrastructure and

you will find that it is “wired.” But the characteristics that made the Internet successful - its accessibility, open architecture, and scalability - also make it vulnerable. Cyberspace is ripe for exploitation, and in fact is already being exploited, by organized criminals, terrorists, and other enemies of the State. In this talk, Prof. Opderbeck will discuss these and other challenging legal and policy issues surrounding cybersecurity and cyberterrorism. 04:00 - 05:00

Cyber Operations: Target Access, Location & Intelligence Identification Revelations from Osama bin Laden’s capture and death have exposed the use of a networking concept known as airgap to “sneaker-net” communications to the appropriate channels. Chances are likely that other high-profile terrorists are using this same concept to send and receive communications. Forensic exploitation operations can reveal potential location data, nearby access points, thumb drive transactions, files accessed, communication attempts, etc. Efforts need to be focused on the use of cyber collection opportunities to target adversarial information systems in order to develop and identify current tactics, techniques and procedures. Topics covered will include methods of exploitation used to obtain access to computer or mobile devices. Attendees will learn specific cyber collection opportunities, as well as techniques for target footprinting and geo-location. The presentation will culminate with discussion concerning mitigation strategies to counter the operations detailed within this presentation. 05:00 - 05:30 Awards Drawing: You must be present to receive an award. Conference Wrap - Up ...

Again, seating is limited. Register today at www.iacsp.com See you there!

201-224-0588 or 571-216-8205. Special “Bring A Colleague” Prices Available.


Persistent Security Concerns Make Brazil The Leader In Armored Cars By Luke Bencie Research by KatieMikalnik and Josh Tallis

Ask any American what they know about Brazil, and more often than not their answer will include one, if not all, of the following: •

Beautiful beaches

Colorful samba shows during Carnival

Lush tropical rain forests

An emerging economy

Great soccer teams

The place where Victoria’s Secret models hail from

A car with bullet holes is seen during a test at the headquarters of Brazil’s Dupont laboratory in Paulinia, 120 km (75 miles) southwest of Sao Paulo April 13, 2012. Armor plating isn’t just for aristocrats anymore as Brazil grapples with high rates of kidnapping, murder and robbery. DuPont, widely known as a chemical maker, introduced its bulletproof Kevlar fiber and SentryGlas car kit Armura in 2008 to middle class Brazilian families with Chevrolets, Hondas and even low-cost Kias.

44

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


O

f course, Brazil’s rapidly developing economy has done much for its appeal to international business executives and leisure travelers alike. In particular, as the economic hub of Latin America, the city of São Paulo has grown to become the third largest metropolitan area in the world, triple the size of New York City. As summarized in a World Economic Forum session “Rebalancing the Global Economy,” “The world of risk has been turned on its head and traditional ideas about greater risks located in developing markets no longer hold true.” The result is that increasingly, foreign investors, particularly from the United States, are making their way south. In 2009, the U.S.-Brazil commercial relationship was worth $46.3 billion in bilateral trade of goods and services.

Complementing this economic growth, Brazil now boasts improving national crime rates, including a decline in the rate of kidnapping of foreigners. At first glance then, it would seem excessive that armored car sales to São Paulo citizens are now over 7,300, with the number of armored car companies surpassing 120. Still, like lipstick in a recession or the Big Mac Index, this statistic provides an important and useful anecdotal insight into the world of protection, an obvious measure of safety that city residents have adopted. What it suggests to us is that, to a great extent, a true sense of security among Brazilians remains elusive. Understanding this paradox warrants a more in depth analysis of the security threats facing Brazil, with special attention focused on crimes that target vehicles and their passengers.

Examining The Security Threats Indeed, despite making swift strides in the right direction, Brazil as a whole, and São Paulo in particular, suffers from persistent and significant security concerns. The U.S. Department of State has labeled São Paulo a “high threat” city for criminal activity for the past several years, a label

corroborated by a myriad of crime-related statistics: there is one gun for every 74.5 city residents, 95% of these guns being illegal; São Paulo’s homicide rate was 17.4%, more than four times higher than that of the United States; and São Paulo is the number one city in the world for “express” or “lightning kidnappings” – with dozens occurring daily. And although murder rates have declined, it was reported that in 2005, some 55,000 Brazilians died of homicide, a few thousand more civilians than three years of war killed in Iraq. Most crime in Brazil comes from mobile street gangs and organized crime groups operating throughout the state. According to the United Nations Office on Drugs and Crime (UNODC), Brazil has the highest number of cocaine users in South America, and in 2009 Brazil was the most significant transit country for cocaine destined for import into Europe. This is indicative of cartels, the existence of which leads invariably to major clashes. The violence is usually directed against rival groups, local security forces, local government authorities, and occasionally civilians, but U.S. employee travel is restricted in favelas (shantytowns usually operated by gangs) because of the general degree of lawlessness. An additional problem compounding this high level of organized violence in Brazil is that law enforcement is not A drug user smokes crack on a can of soft drink under a viaduct in the Consolacao neighborhood of Sao Paulo February 4, 2012. Brazil’s surging crack cocaine epidemic prompted officials of Latin America’s biggest country to launch a $2.3-billion dollar plan to curb the spread of drug abuse and trafficking by 2014. Crack users dispersed to several parts of Sao Paulo city after military police occupied the area known as “Cracolandia” (crackland). Picture taken February 4, 2012. REUTERS/Nacho Doce

São Paulo is the number one city in the world for “express” or “lightning kidnappings” - with dozens occurring daily.


always particularly reliable. This was most recently made clear by the February 2012 police and firefighter strikes, which threatened the Carnival celebrations and resulted in widespread looting, vandalism, assault and general instability. According to the Overseas Security Advisory Council’s 2011 Crime and Safety Report on São Paulo, armed robberies are common in affluent residential sections of the city such as Jardins, Morumbi, Itaim Bibi, and Santo Amaro, where a number of gov-

armed robbery involving pedestrians and drivers at stoplights and during rush hour traffic, particularly in the Praca da Se section and in the eastern and northern parts of the city. The “red light district” of São Paulo, located on Rua Augusta north of Avenida Paulista and the Estacao de Luz metro areas, is especially dangerous. Stop-and-go traffic in much of the city provides the opportunities for this type of crime, and the persistent gap between rich

That rate is four times that of car thefts in the U.S. Grand theft has evolved into a highly organized crime all its own, employing thieves and their lookouts all the way up to distributors and vendors, and many of the networks extend beyond Brazil’s territory into neighboring countries. Police attention is usually focused on violent crimes, so vehicle theft is often not thoroughly addressed or investigated. And the danger is not just having a smashed car window and a wallet stolen out of your sedan. According to the Bureau of Consular Affairs, “Demonstrations and political or labor strikes can occur in

to a dangerous part of town and simply proceed to rob him or her.

The Solution: Armored Vehicles It comes as no surprise then, that according to the Brazilian Association of Bulletproof Manufacturers, more than 7,000 vehicles were armored for civilian use in Brazil in 2008, up from 1,782 a decade earlier, and the pace has continued to date. Evidently, the ever-present threats of stray bullets hitting passing cars, of robbers breaking into stopped vehicles, and of law enforcement neglecting to address less violent offenses have compelled

In 2005, some 55,000 Brazilians died of homicide, a few thousand more civilians than three years of war killed in Iraq. ernment and business leaders and a majority of the U.S. Consulate employees reside. However, armed robberies do not just stop with homes – road robberies are especially rampant in Brazil as well, and for the typical “Paulista” (the nickname

and poor is commonly cited as an underlying cause. However, even ignoring roadside robberies, the aforementioned gang clashes and law enforcement protests naturally imply the persistent danger and reality of stray bullets, police batons, various forms of vandalism and other harm that

urban areas and may cause temporary disruption to public transportation.” Said more directly, in 2006 and 2010, violent gang clashes actually resulted in bus hijackings, further demonstrating the dangers surrounding travel – even on public transportation. Opting for a taxi may seem like a safe solution amid

Brazilians to take security for themselves and their families into their own hands. As a result, the armored car business is booming. According to recent security figures, armored car sales to private citizens have increased by almost

More than 7,000 vehicles were armored for civilian use in Brazil in 2008 of a person from São Paulo), being assaulted, particularly while traveling in his/her vehicle, is not a question of if, but when. Perpetrators target passing and stopped vehicles, especially on the busy road leading to the airport, as criminals seek out potentially wealthy and influential targets. Of course, all areas of Greater São Paulo have a high rate of

46

can unexpectedly affect civilians while in their vehicles. Furthermore, this violence is not strictly related to highway robbery or cartel clashes. According to the São Paulo Secretariat of Public Safety, 583 vehicles are stolen daily in the state; in two days, car thieves in São Paulo steal more automobiles than are produced in the local Volkswagen factory.

all this concern, but it is important to understand that taxis in Brazil are also not as reliable as those in more developed countries. Unauthorized taxi drivers commonly try to solicit confused “gringos” into employing their services. It is ill-advised to go with any of these drivers, as many are unlicensed. In some instances, the ride may even be a set-up for a mugging; the driver may take the passenger

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

60% (from 3,045 to 7,332) in just the last five years. Additionally, where there were just a handful of armored car companies in Brazil in the early 2000s, there are now over 120. With tens of thousands of commercial vehicles being “uparmored” each year, São Paulo now ranks as the world’s largest market for such retrofitting, with Brazil’s Rio de Janeiro being the second largest.



What may seem unexpected, however, is that the types of vehicles being refitted with armor are not necessarily “VIP brands” such as Mercedes, BMW, or Land Rover. Although those models are all available for executives to rent, the more popular vehicle styles for the everyday “Paulista” or “Carioca” (a person from Rio de Janeiro) are Toyota, Volkswagen, and Chevrolet. In fact, one of the most popular armored vehicles in 2011 was

of vehicle armoring could vary significantly in terms of protection and price; not all armoring is created equal. Typically, most armored cars in Brazil are certified to a Level 3 standard. This means that the windows and doors are strong enough to withstand the impact of a 9mm handgun fired at close range. At this level, it certainly would not be able to withstand sustained, close range fire from a heavier automatic rifle or shotgun; in this situation, a vehicle would

citizens – in fact, it is absolutely crucial for business travelers to make the same smart and economic preparations while planning their next trip to Brazil. For this reason, the executive protection business is quickly on the rise. Yet even that can leave unassuming travelers in trouble. For businessmen and women traveling to Brazil, careful consideration should be taken when choosing a private armored car service. Always confirm that the car company is fully insured, has the proper operating licenses/permits, and provides passenger coverage in

In the meantime, car break-ins and gang violence persist and one cannot necessarily rely on Brazilian law enforcement. Cartel warfare, police protests and high crime rates are the strongest justification for executives traveling to Brazil to follow the example set by Brazilian citizens themselves – many of whom unfortunately have had firsthand experience with these kinds of crime – and ensure that their mode of transportation is completely secure. Brazil can be an amazing travel destination, both for business and pleasure. With the right

Still, for the requirements of the average Brazilian, the more likely threats to protect yourself from come from the country’s unique crime problems: stray bullets from gang shootouts; random car-jackings, typically conducted by individuals on motorcycles; and window “smashand-grabs,” carried out by thieves while the car is at a traffic stop. the Ford Fusion! More affordable, targeted at middle class Brazilians, and less flashy then high-end models, it seems that the armored car market in Brazil has dialed in to the demands of its expanding clientele. Most armored vehicles are actually refitted aftermarket, and not necessarily by the manufacturer (although Mercedes and BMW will provide this service for a significant price). The typical cost for “up-armoring” in Brazil is about $20,000 - $30,000 USD for a modest-sized sedan. This price increases substantially for larger vehicles, where a new suspension system may be required to support the additional load, which can be almost triple the original manufactured weight. It should be noted that the level

48

need to be armored to the highest level, Level 7. This is far more expensive however, as it is the standard used by U.S. personnel in the war zones of Iraq and Afghanistan. Still, for the requirements of the average Brazilian, the more likely threats to protect yourself from come from the country’s unique crime problems: stray bullets from gang shootouts; random car-jackings, typically conducted by individuals on motorcycles; and window “smash-and-grabs,” carried out by thieves while the car is at a traffic stop. The most important thing to remember is that the precautions and tips listed in this article are not just a good idea for Brazilian

the event of an accident. Also, if required, ensure that the drivers actually speak English. Many companies claim to be bilingual, however communication issues often arise once the passenger gets in the car.

Conclusion With the approaching 2014 Olympics and 2016 World Cup, the Brazilian government has been ramping up security. The Favela Pacification Program and its military-style police occupation of drug gang havens is predicted to be effective in driving out many of the gangs and their arms, and it is hoped that the frequency of crimes such as car robberies and kidnappings will decline as the country continues to develop.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

knowledge, a trip to São Paulo or Rio de Janeiro can be rewarding, entertaining and lucrative. Follow the advice in this article and you will be well on your way to becoming an educated and safe patron of all the opportunities the developing world has to offer.

About the Author Luke Bencie is President and Managing Director of Security Management International, LLC (SMI) and is also responsible for overseeing operations of SMI’s Brazil Security Division (SMI-BSD), located in São Paulo, Brazil. He can be reached at luke.bencie@smiconsultancy.com. Katie Mikalnik and Josh Tallis are Research Associates at SMI and are both graduates of the “Elliott School of International Affairs” at The George Washington University. They can be reached at kmikalnik@ smiconsultancy.com and jtallist@smiconsultancy.com, respectively.



Secure Driver:

Police Pursuits By Anthony Ricci

M

any Law Enforcement Officers live for that moment when the suspect runs or the call comes in for a fellow officer in pursuit. It may be the adrenaline, lack of training, the thrill or just pure determination that the bad guy must be caught, but more times than not the chase goes on. Due to the various legal issues and the pure dangers involved for the police and more importantly the innocent bystanders and road users many departments have a no chase policy. While I tend to be more on the side of no chase, mostly because innocent people can be involved and hurt, the fact is pursuits will continue to happen. This is at no fault of the police. There are some people that need to be off the street and may cause much more harm if they were not stopped immediately. However this article is not intended to take a stand on whether pursuits should or shouldn’t take place, but rather, cover the mindset and some of the dynamics that are necessary to keep your vehicle on the road.

50

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

As you become focused in on the car that is speeding through town, it is natural to begin going faster and faster, unless you keep a conscious mind of the big picture and your department’s pursuit policy and training. As speed increases, your peripheral vision decreases and the less you can see from the sides. Therefore, you are significantly reducing your ability to sense motion and the necessary information input (details) that you will need to avoid potential hazards. You will feel like you have total control of your vehicle until an unforeseen obstacle enters your path about 100 feet away and you’re doing 70 to 100 MPH. At that moment you will realize why every department has a pursuit policy and why so many chases are called off so early. At that speed and distance you have no control over your vehicle and there is no space to stop or turn away from the innocent person that has taken a turn into your path. In fact your brain will have barely enough time to recognize the hazard in the first place. It is very hard to defend against the fact that your cruiser has entered the side of a family minivan


at 30 MPH over the speed limit. Never mind the suspect that you are chasing, who has no high speed driver training, and is keeping their car on the road by pure luck. More times than not it is the person being chased that kills or seriously hurts another uninvolved person. Half way through writing this article, I changed the story line because of three recent separate chases in my surrounding area. One ended with the suspect’s car hitting a telephone pole resulting in head injury of the driver and loss of electricity for part of the city. The next was called off and the suspect was caught up with later, however the third resulted in the passenger losing her life and the driver having massive injuries after losing control and hitting a bridge abutment. Although the report read that the officer acted in accordance to the state’s General Law and the towns Pursuit Policy, there was unfortunately loss of life. This officer was able to follow at a safe distance, utilizing his radio as well as record radar speeds which shows he was able to

maintain his calm and composure. From the time the chase began, it lasted 1:20 over approximately two miles. Recorded speeds obviously varied but the suspect reached triple digits in places and the slowest recorded speed was 17 MPH over the posted speed limit and the driver never even got on the highway. This pursuit could have had a much worse ending if it was not handled correctly. If the driver was willing to reach these speeds and the police were not even following closely, imagine what the driver would have done if they were closing in. You can almost guarantee that innocent road users would have been involved in a collision of some sort. So how can the officer maintain her/his calm while in a highly adrenaline pumping chase. First of all drive your drive not theirs. Even though your adrenaline is high and you are beginning to fixate on their car, you really need to take a step back and only drive fast enough to follow at a safe distance. This will give you more time and distance to react to

their mistakes and also allow you to select the proper lines through every turn. It is very important to keep a wide sight pattern, enabling you to know where the suspect’s car is without fixating on it. You will need to stay in control mentally because as you navigate your vehicle, selecting the correct line through the turn as well as your car’s proper brake points and steering inputs, you will also be thinking about where the chase began, knowing your speed as well as tracking theirs and keeping your supervisor up to date with what’s going on. If you are driving too fast and fixating on their car it is impossible to be successful since your brain can not possibly handle the details of each of these tasks while under a heightened stress level. While over taxing your mental capability, you still have to think about your vehicle positioning and premeditate where they are about to lose control. If they drive into a turn to fast and start to slide, you will need to have enough control to stop your car in the right position. If not, you will also drive into the

car that is spinning out of control in front of you. Concentrate on keeping them in the line of sight and at a safe distance. When they overdrive their vehicle it will be time to close the gap and take control of the situation. However, when speeds get high and adrenaline levels are rising nothing good can come of it and people can get hurt. Pursuit is a big liability and sometimes much better being stopped before it starts. If you can drive the correct line and concentrate on just keeping the same amount of space between the suspect and your car rather than trying to catch them, you will find yourself in control sooner than you think and at a lot less of a cost. They usually outdrive the car and crash since they are usually not trained in driving and usually have an altered mindset based on the situation.

About the Author Anthony Ricci is the President of ADSI and an active IACSP member. For more information about ADSI, please visit their website at: www.1adsi.com

" % # " "

# & & ( # ( * '& ( ) # $$ '# &+ # ( # + ' # # $ # (

ADSI

# & & ( '# &+ # & $ # & & & + # ( '# &+ ) # $$

# # $ # # $ Please make sure this ad and all other non-bleeding ads are centered in the page accordingly and/or blue border lines that # # & & # ( # # surround the page, Thanks! #& & &+ ! #

* # #. )# . %# !!4 ) % # 5 1 # ) 1 # * %%! *' ! 5 # # .) # # 0) .4 ) 1 )* 3 0. 1 )%. . %# "* # %*. # " #4 %)'%) . ! . .4 ')% ) "*( 1 . ! .4 .% * # # "'! " #. %0)* * %) 2 0 # *' ! 5 # # %)'%) . 0) .4 # 2 # %) " #. .) # # (

( # ( '# &+ "

/&6 )'%). .( 0 . &6 %). # *.%2# 6/ / ! 6& /$ &,66 3 6& /$ +,66 ! # % & * ( %"

!

$$$


Police:

Tactical Casualty Care Under Fire By Rafael Navarro, Jim Weiss and Mickey Davis

TCC50. The simplest and most efficient method to move a downed person to cover is the drag -- simply to grab an arm or leg and drag him. It’s the immediate response to an ambush, when a police officer’s partner is not responding and is in the line of fire.

52

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


W

hen a law enforcement officer engaged in a deadly force situation is shot or otherwise injured, he or she can’t call for a time out.

Patrolman Jim Simone of the Cleveland Police Department was involved in the fatal shootings of three opponents and the wounding of ten. Later, he was involved in additional police shooting incidents. The incident that remains the most vivid in his mind is “The Church Basement Shootout,” which took place before police officers commonly wore ballistic protection. He and two other officers were moving through a church basement in search of an armed robber, but in a Kamikaze-type attack, the bad guy surprised them and shot all three officers. He had put a gun to Officer Simone’s face. Simone saw a flash, and felt tremendous pain and surprise at being shot.

The Difference Between Tactical Casualty Care (TCC) And Tactical Combat Casualty Care (TCCC) When police officers are shot, the fight has to continue, and if the officer is able, he/she must begin Tactical Casualty Care on himself or others. As an example, Pinellas County Sheriff’s Office Corporal Terry Metts, an Army veteran, was dispatched to a “shots fired” call. Upon arrival, he was severely wounded by a bad guy with a high powered rifle. He bled profusely. Rescue efforts were hampered by gunfire that pinned down the responding

The robber clicked on an empty gun. Simone’s revolver was also empty. Simone reloaded. One of his bullets hit the bad guy in the chest. It turned out to be fatal and he fell. He was angry that his aggressor had killed him before his life was complete. He wanted to kill his shooter before his eyes closed. Simone, a decorated, former Vietnam War Army paratrooper, had trouble seeing, his face was burned, and his aggressor had all of the advantages. The bad guy fired a second time, which made Simone even angrier. Simone got up shooting and figured that he “threw his first two rounds.” The robber clicked on an empty gun. Simone’s revolver was also empty. Simone reloaded. One of his bullets hit the bad guy in the

chest. It turned out to be fatal and he fell. Simone remembers that he had a difficult time moving, and was glad when help came. He remembers thinking: The kids are in school. Someone will have to tell them their father is dead. Fear, he says, is when you’re laid up, shot in the head, and your kids are taken out of school and brought to your hospital bed. You have tubes all over and a priest gives you last rites. Your ex-wife shows up and a departmental investigator is there to take a deathbed statement. However, all of this wasn’t necessary in this case. Simone survived and is still an active police officer.

TCC56. Cardiopulmonary resuscitation (CPR) on a downed officer needs to be performed after his or her ballistic vest has been removed from the downed officer’s chest.


is more basic and police first responder-based. deputies. Cpl. Metts was able to apply direct pressure to his wounds, and despite severe blood loss, was able to shoot out the street light overhead, something that aided his rescuers. Cpl. Metts also recognized the onset of shock and was able to combat that as well. This involved toughness, an immediate response, focus, a warrior mindset, and self-first aid prior to the arrival of medics or other medical personnel. What Cpl. Metts accomplished fell in line with Tactical Casu-

The three goals of TCCC are to treat casualties, prevent additional casualties, and complete the mission. Another concept passed from military medics and doctors is that of the Golden Hour, which says that if a medic can work on a life-threatening wound or injury within the first hour after the injury occurs, the victim’s survival chances increase dramatically. Some law enforcement agency administrators do not like to use the military term Tactical Combat Casualty Care, as

Tactical Casualty Care Tactical Casualty Care is the pre-hospital care given to a police officer by him or herself or another officer in a use of force or deadly force environment. These principles are different from the traditional civilian trauma care because of both the unique types of wounds which are suffered and the tactical conditions faced. Fact: The unique wounds, like gunshot wounds, and the tactical conditions can make it difficult to determine which

prevention of additional injuries is dependent on the rate and accuracy of the bad guy’s fire, the police ability to defend and return fire, current equipment, surroundings, mobility, and the decision of when and where to address injuries. The three stages of TCC during a critical incident and the factors that influence this care are: 1) how to distinguish between life threatening and non-life threatening injuries; 2) the application and use of field and pressure dressings and tourniquets; recommendations for assembling a gunshot kit; techniques for moving casualties; and 3) realistic training.

Arterial bleeding is less common and the most dangerous type. This involves bright red blood that comes out in large volumes and spurts that correspond with each beat of the heart. Treatment is direct and extremely firm pressure on the wound. If direct pressure is not applied, a severe arterial wound can cause death within a few minutes. alty Care (TCC). Tactical Casualty Care is related to Tactical Combat Casualty Care (TCCC) which is based upon proven, practical knowledge, experience, and American military lessons of the World Wars, Korean, Vietnam, and the Gulf Wars. Such medical techniques used are influenced by teachings of modern day, key pioneers in tactical medicine, including the former United States Surgeon General Vice Admiral Richard Carmona, M.D., and the former United States Special Operations Command Surgeon, Captain (retired) Frank Butler, M.D.

54

there is resistance to referring to police tactics using the word “combat.” They favor the concept of Tactical Casualty Care, TCC, which is a child of TCCC. However, the greatest difference between TCCC and TCC is that TCCC is more related to the care given by military doctors, medics, and police tactical medics, who are also paramedics and EMS. TCCC generally addresses the advanced treatment that these medical professions can provide, which is above and beyond what police first responders are taught. TCC

intervention to perform at what time. TCC under fire is rendered at the risk of additional injuries for both the casualty and the rescuer. Performing a life-saving technique at the wrong time or place, may be worse for both the victim and rescuer. Major considerations are 1) suppression of the suspect’s fire, 2) moving of the rescuer and casualty to a safe position, and 3) treatment of immediate, lifethreatening bleeding. Treatment is dependent upon the skills and equipment to which the person administering has access. The

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

Non-life threatening injuries do not require immediate attention, while life-threatening injuries do. One factor involved is the identification and treatment of three types of bleeding. Capillary bleeding occurs when a minor scrape or cut opens capillaries; it is almost always slow bleeding and small in quality. In most cases the victim’s body’s natural clotting system will be able to stop this. Venous bleeding involves one or more deep cuts capable of opening veins. This typically


results in a steady but relatively slow flow of dark red blood. Commonly, the best way to stop this is to put direct pressure on the wound. Arterial bleeding is less common and the most dangerous type. This involves bright red blood that comes out in large volumes and spurts that correspond with each beat of the heart. Treatment is direct and extremely firm pressure on the wound. If direct pressure is not applied, a severe arterial wound can cause death within a few minutes. Extremity injuries can vary from a complete amputation to a small puncture wounds. The key is to focus upon the type of bleeding and treat accordingly.

Some agencies provide their officers with field dressings, while other officers buy them for themselves. Field dressings and pressure dressings are usually kept in some kind of gunshot kit. These kits do save lives. With a warrior mind set, some inexpensive equipment and a little know-how, officers can increase survival rates significantly. For example, if a police officer encounters gunfire and is injured and sustains a venous bleed – minor or slow flow – he should return fire and take cover (in no specific order). He should remain engaged in defending himself or taking action against the bad guy(s) if appropriate, and avoid additional wounds. If able, he should control the bleeding by

TCC73. The prevention of additional injuries is dependent on the rate and accuracy of the bad guy’s fire, the police ability to defend and return fire, current equipment, surroundings, mobility, and the decision of when and where to address injuries.

People who are fatally shot typically die from injuries such as severe blood loss caused by a severed artery or damage to a vital organ. Shooting victims also succumb to collapsed lung, spinal cord injuries, or severe brain damage.

TCC In The Field In a TCC situation, police officers can’t be expected to know what kind of injury the person is suffering from. The settings for police violent encounters also limits what police can do.

self-administering first aid. If the threat is still present and engaging, one-handed direct pressure or the quick application of a tourniquet can be used to control blood loss. He should continually assess, move if needed, and communicate with dispatch. While under fire, the application of life saving technique(s) may have to wait until the police officer and any casualties are out of the line of fire. If two officers are engaged and one is hit, it’s easier to grab the injured person and remove him

to safety rather than retreat and try to rescue him later. The risks of making a rescue include the time and distance needed to penetrate a kill zone, the time spent in the kill zone under direct threat of fire while assessing and performing primary care, and the extraction from the kill zone to a position of relative safety where further medical care can be provided and a definitive evacuation can be made. Unnecessary casualties may be avoided in dealing with a downed officer rescue if a hands-on assessment isn’t possible by looking for indirect signs of life. Once injured, some officers may simply shut down. Remind them that they need to fight; they are not allowed to give up. Abdominal bleeding is of greater concern. In addition, heavy bleeding can occur with little visual confirmation. The sooner the downed officer can be taken to emergency medical care, the better. Direct pressure and a haemostatic agent such as QuikClot® are appropriate. Heavy chest bleeding can come from blood vessels that run from the center of the chest cavity up to the head and down to the abdomen; the heart and lungs can also be involved which will bleed heavily. Bleeding from the blood vessels underneath each rib tends to be slower. Chest Wounds: A partially airtight seal should be applied to chest injuries as soon as possible to help prevent a collapsed lung. Vaseline gauze, the inside of a bandage wrapper or any airtight material can be used. Apply the airtight bandage on three sides of the wound but do not close it on the fourth

side. This will create a natural valve that will allow the chest to achieve its usual negative pressure state, allowing air to escape through the valve during exhalation. Field Dressings: To apply a field dressing, if the situation allows, hold the dressing above the exposed wound with the

TCC9. If a police officer encounters gunfire, is injured, and sustains a venous bleed – minor or slow flow – he should return fire and take cover (in no specific order). He should remain engaged in defending himself or taking action against the bad guy(s) if appropriate, and avoid additional wounds. If able, he should control the bleeding by selfadministering first aid.

white, sterile side of the material toward the wound; do not touch the white side. Pull on the tails so that the dressing opens and flattens. Place the white side onto the wound. Ask the wounded officer or someone else to place one hand on top of the dressing to hold it in place while the applying officer secures it. Tie the tails into a nonslip knot beyond the outer edge of the dressing, not over the wound itself. The bandage should to be tight enough to keep the dressing from slipping, but not tight enough to interfere with blood circulation.


Pressure Dressings: Bleeding from wounds can be controlled by a pressure dressing which is appropriate if blood continues to seep from the first dressing. Applying a Tourniquet: A tourniquet may be needed if the bleeding from a limb is severe and cannot be controlled by a pressure dressing, manual pressure, field dressing, or elevation. If bleeding does not stop, the tourniquet is placed around an arm or thigh and then tightened to stop the flow of blood below the band. It should only be applied to an arm or leg. It is also needed when a limb has been completely severed. Do not apply a tourniquet for the amputation of a part of the hand or foot. Warning: a tourniquet is a subject of controversy; some agencies forbid its use. However, if there is a situation where a tourniquet is needed to stop the bleeding and the options are either bleed to death or risk the slim possibility of having a part of the body amputated, a tourniquet may be necessary. If the officer does not have a tourniquet with him, fold a pliable material like a T-shirt, belt, seat belt, etc., into one. It should be at least two inches wide. The casualty’s shirt sleeve or trouser leg can also be used. Do not use wire or shoestrings. A rigid object, like a baton or stick, is used to tighten the tourniquet. If needed, additional strips of cloth or other similar material may be used to secure the stick firmly in place if the tourniquet material itself is not long enough to do this. ‘ Put padding such as soft, smooth material between the limb and the tourniquet band. Place the tourniquet two to four inches above the wound or amputation site, but do not apply over a joint or fracture. Twist the rigid object until the tourniquet is tight and the bright red bleeding has stopped. (Generally,

56

darker vein blood may continue to ooze.) There should be no pulse below the tourniquet. Wrap the tails of the tourniquet around the end of the rigid object so it will not untwist. Bring the tails under the limb, and tie them in a nonslip knot. Do not remove the tourniquet. Rather, transport the officer to a medical life support unit where they will remove it.

Extraction Considerations When deciding whether to extract the wounded person, several things should be considered: Who made the assessment? Where is the downed officer? Will the rescuers run into an ambush? Know the rating of ballistic protection of the vest and shield of the rescuing officer(s). Don’t move the victim farther than necessary. The simplest and most efficient method to move a downed person to cover is the drag -- simply to grab an arm or leg and drag him.

It’s the immediate response to an ambush, when a police officer’s partner is not responding and is in the line of fire. It is slow, and requires brute strength. A drag extraction is usually conducted one handed, with the rescuing officer’s gun drawn and assuming tactical responsibility. There are also harness systems consisting of a strap and two handles that can be utilized as a dragging tool. In addition, the ground can be a perfect dragging platform. Using drags leads to less chance of spinal injury to the rescued person than carrying him because there is better spinal motion restriction. Depending on the circumstances, other options include the drag carry, blanket drag, pick-a-back, removal down stairs, human crutch, and tworescuer methods.

Training Must be Scenario Based, Realistic, and Dynamic In short, there are only two ways a police officer will experience such an event. One is by actually being on a live call, and the second is through training.

When deciding whether to extract the wounded person, several things should be considered: Who made the assessment? Where is the downed officer? Will the rescuers run into an ambush?

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

TCC training objectives are: 1) Officers must understand what TCC (Under Fire) is and how the Warrior Mindset plays an important role. 2) Officers will become better prepared to identify what types of injuries are life threatening and non-threatening. 3) Officers will quickly assess and treat any life-threatening injuries at the appropriate time and avoid further causalities. 4) Officers will be familiar with a trauma pack as well as the recommended contents -QuikClot®, Israeli Field Dressing, 4x4 bandage, and Vaseline gauze. Officers will also become familiar with Tactical Field Care and Casualty Evacuation concepts. Through training and familiarity, officers can be prepared for injuries that might happen while they are on duty. For additional information, consult -- https://www. createspace.com/3609958

About the Authors Sheriff ’s Deputy Rafael Navarro is currently serving in the Law Enforcement Training Division of the Pinellas County Sheriff’s Office. He served four years on the SWAT team and three years in the Community Policing Unit. He is a certified evaluator/instructor for defensive tactics, basic submachine gun certification, basic SWAT school, and a number of other law enforcement tactical subjects. He is also a retired Sergeant First Class, having served 21 years with the United States Army, Military Police Corps, and 24 months in Afghanistan in support of combat operations during Operation Enduring Freedom. Lieut. Jim Weiss (Retired) is a former Army light infantryman, school-trained Army combat engineer, a former schooltrained (regular Army) Army military policeman, former State of Florida Investigator, and a retired police lieutenant from the Brook Park (OH) Police Department. He has written and co-written hundreds of articles for law enforcement and safety forces magazines, most notably Law and Order. Mickey (Michele) Davis is an awardwinning, California-based writer and author. Her young adult novel, Evangeline Brown and the Cadillac Motel, won the Swiss Prix Chronos for the German translation. Mickey is the wife of a Vietnam War veteran officer.


CRC_DWL11 IACSP Ad_Layout 1 4/9/12 4:16 PM Page 1

Save Now on These Counterterrorism and Security Management Books

Visit www.crcpress.com to see our complete selection of titles and use promo code DWL11 to receive a 25% DISCOUNT.

CRC Press is a premier publisher of books on Counterterrorism and Security Management.


An IACSP Q & A With

Joseph C. Goulden,

Author of ‘The Dictionary Of Espionage: Spyspeak Into English’

J

oseph C. Goulden (pronounced “Golden”) has enjoyed varied careers as a prize-winning newsman, a best-selling author of non-fiction books, a media critic, and as a consultant and commentator on intelligence, national security and public affairs. Before he became a writer, Goulden worked as an underground minor and in military counterintelligence. A native Texan, Goulden worked as a reporter for the Dallas Morning News and later the Philadelphia Inquirer, where he was the newspaper’s chief of the Washington bureau.

As a newsman, Goulden said he played softball with Fidel Castro and dodged bullets from Castroist guerillas in Guatemala. He has written 18 books, including two highly regarded books on intelligence – “Truth Is The First Casualty” on the Gulf of Tonkin incident; and “The Death Merchant” on rogue intelligence officer Edwin P.Wilson. Goulden’s updated “The Dictionary of Espionage: Spyspeak Into English” was recently published by Dover Publications. Peter Earnest, a retired CIA officer and now the executive director of the International Spy Museum, wrote the forward to the updated “Dictionary of Espionage.” Joseph C. Goulden was interviewed by Paul Davis, an online

58

columnist (Threatcon) and a contributing editor to the Journal. IACSP: Your updated “The Dictionary of Espionage” was recently published. Why did you write the book originally and why update it? Goulden:Well, I’ve always read spy nonfiction and I’m a chronic note taker. I started a file of these terms way back, 30, 40 years ago. And suddenly I said to myself there might be a little book here. At the time there was no good dictionary of these terms. The terms were thrown around and made familiar by the Church Committee, and anybody who goes to a James Bond movie knows about them. So I thought I’d check out where these words came from and how they are used and give some anecdotes. It did quite well.

IACSP: Who is your target audience? Goulden:First of all, people in the intelligence community who want some of these things available in a nonclassified form. The CIA, the FBI and other government agencies put out their internal glossaries, but usually those are classified at least Confidential. Secondly, the book is for anybody who is just interested in espionage. That’s a lot of people. IACSP: That includes me. Goulden: The way this new edition came about was the acquisition editor for Dover Books, which specializes in out of print books, was in Washington last summer and he went by the International Spy Museum and talked to Peter Earnest, who is the executive director, and by coincidence, a good

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2

friend of mine. He asked him what book he would like to see back in print. And the way Peter tells me, he turned around and pulled the “The Dictionary of Espionage” off the shelf and said they could sell this book by the hundreds. So this gave me a chance to do an update on it, correct some errors, flesh it out a bit and put in some spy trivia. This is a book where you can sit down and pick any page and find something, I hope, of interest. IACSP: Peter Earnest notes in his forward to the book that you’ve known more spies and more about clandestine operations than many of the real spies he writes about. As a journalist you’ve written a good bit about espionage and the intelligence world, am I right? Goulden:My main exposure came about in the 1960s. I had an Alicia


Patterson fellowship in Guatemala and Mexico. There was a strong insurgency going on in Guatemala supported by the Cubans. I wrote quite a bit about that and I got to know quite a few of the CIA and special ops people on the ground. By the time I got to Washington for the Philadelphia Inquirer, I wrote excessively about the Pueblo, the U.S. Navy spy ship taken in by the North Koreans. And for the last 20 years, I’ve reviewed books on intelligence and espionage for the Washington Times. IACSP: Can you tell us a bit more about your background? Goulden: I had three ambitions as a kid. I wanted to be a reporter for a big city paper, I wanted to have the Washington bureau for a big paper and I wanted to work aboard. And by the time I was 34 years old, I’d done it all. I had written a couple of books on the side when I was with the Philadelphia Inquirer and I had a little money saved and I had some comp time coming from the Inquirer, so I thought I could make it. If I didn’t I could always go

to slow down, when he looked up and saw jets going overhead to Haiphong. IACSP: Is there any one espionage story in particular that you’ve covered over the years that most interest you, even today? Goulden: The Alger Hiss case, which I’ve made a long study of. My interest goes back to when Nixon ran for governor of California. He was beaten and ABC News put out a so-called documentary called “The Political Death of Richard Nixon.” Included in the people interviewed was Alger Hiss. Now by happenstance my publisher at the Philadelphia Inquirer, Walter Annenberg, was a director of ABC and owned the ABC outlet in Philadelphia. He raised hell at corporate management and refused to let the outlet air the documentary. There was a great hubbub about censorship and Walter called me up to his office and said OK, it is obvious by some of the mail we’ve been getting that these people don’t have any idea who Alger Hiss was and why this was an important case. I want you to go back and

Goulden: That’s the whole thing! By happenstance, this general was working on POW issues and he was in Washington testifying. I was there with another old red-baiter, a guy named Herb Romerstein, and we looked across from one another and as soon as the testimony ended he was coming out and we hit him - one on one side, one on the other. Here are two former PFCs in the U.S. Army cross-examining a three-star general in the Red Army, with a four-star U.S. general acting as an interpreter. We told him Hiss didn’t work for the KGB he worked for the GRU and the Comintern. Did you check their records? No, he didn’t, as he was asked to check the KGB. He went back to Moscow and said the GRU was not releasing information on Hiss. And he retracted what he said about Hiss. Now the New York Times had run the thing on the front page when they said Hiss was innocent. The retraction? What do you think? Way inside. IACSP: I believe there are intercepts that absolutely prove that Hiss was a Soviet spy, am I right?

and said, you know I work for you. Bobby said, yeah, tell me more. They went to lunch and this guy said, look I know the Navy needs some influence with senators and I can certainly handle that for you. Bobby didn’t say much, just said thanks, I’ll think about it. He went back to the office and checked him out and sure enough he had these Navy contracts. So Bobby burned him on the spot. He kicked him out. Wilson then gets contracts with Kaddafi and he wants Special Forces, DoD men and others to come to Libya to work for him. First thing, the Libyans took their passports. There are three ways to get out of the country; you leave legitimately on a passport, you swim out, or you walk across the desert. Hell, they were trapped. The Libyans start doing all sorts of nefarious things and they could not do a damn thing about it. The irony is, Wilson was making millions of dollars on legitimate military contracts, uniforms and boots and things like that, but he couldn’t resist the dirty part. Things started rolling up on him and people who worked for him went

The skipper of the USS Maddux told me that he was still sending flash messages off to Washington, trying to get them to slow down, when he looked up and saw jets going overhead to Haiphong. back into newspapering. My book “The Superlawyers” was published in 1972 and the second week out it was on the New York Times best-seller list and it stayed there for 23 weeks, getting up to number three. That gave me the cushion and the courage I needed to keep on doing it full time. IACSP: As a Navy veteran who served on an aircraft carrier in the Tonkin Gulf on “Yankee Station” during the Vietnam War, I thought your book on the Tonkin Gulf incident that started the war was interesting. Can you tell us a bit about that book? Goulden: The basic story is President Johnson wanted a pretext to go to war in Vietnam and he seized upon the pretext even when the Navy said hold off, let us figure out exactly what happened out there. We’re still trying to do an after action report. The skipper of the USS Maddux told me that he was still sending flash messages off to Washington, trying to get them

write me a long piece and if it runs two pages of type, that’s OK with me. The Philadelphia Inquirer library had copies of transcripts of both of his trials, which was one hell of a lot of paper. I holed up in an office and I read that stuff nonstop for two weeks and took notes. I wrote an exhaustive study of the Hiss case, which ended with his being found guilty by a federal court jury and sent to prison. We made a big splash out of that piece and I got a very nice note from none other than Richard Nixon. The Nation magazine wrote that Hiss was framed and I wrote several long rebuttal pieces. The Nation later got some Russian general to look at the KGB files during the period the Russians were opening up some of their files. The general reports back that the KGB had nothing about Alger Hiss in their files, therefore he is innocent. IACSP: That’s because Hiss was a spy for the GRU, Soviet military intelligence.

Goulden: Yes, the Venona intercepts. But the GRU has still not released anything on him. IACSP: But it is beyond doubt that Hiss was in fact a Soviet spy. Goulden: Case closed. IACSP: I’d like to ask about your book “The Death Merchant.” I believe it was the first book of yours I read. In light of the death of Kaddafi in Libya, please tell us about how you came to write the book about Edwin Wilson, the illegal arms dealer? Goulden: Edwin Wilson was working as a contract officer for a naval intelligence task force that did reporting on foreign ship movements and such. Admiral Bobby Ray Inman, then the director of naval intelligence, told me that he was down at some senator’s office and there was a weird guy there, a big, strapping fella, and he came over to Bobby

before Grand Juries, and they talked to the FBI, the CIA and all that. The U.S. Attorney’s Office in D.C. had a whole platoon of those guys. The U.S. Attorney allowed me to talk to these guys after they were debriefed. They had a lot they wanted to get off their chest and it was fascinating to listen to them. One person I tried to get to was Wilson, but he ignored me. So he finally gets out of jail and calls me and raises hell for my not getting his side of the story. I said I asked you for an interview and you had a chance to testify, but didn’t. What am I supposed to do, make up your side of it? He called me a dirty name and hung up. IACSP: Well, he may not have liked the book, but we did. Thanks for talking to us. Paul Davis is a contributing editor to the Journal. H e c a n b e re a c h e d a t PaulDavisOnCrime@aol.com


Terrorism Bookshelf

Top 150 Books

On Terrorism And Counterterrorism By Dr. Joshua Sinai

T

errorist rebellions, in all their configurations, constitute first order national security threats facing the international community. To gain an analytical understanding of the origins, magnitude, and evolution of the terrorist threats around the world and how to counteract them, the academic and public policy communities have published a plethora of books on terrorism in general, the groups that engage in terrorist warfare, the extremist religious movements that drive individuals to join terrorist groups and employ terrorist tactics on their behalf, the conflict zones where such warfare is being waged, and the types of counteractions that governments are employing in response. 60

The books listed in this article are organized into seventeen sections, which are not intended to be mutually exclusive. Within each section, the nominated books are listed in order of their publication date. Although the most recently published books obviously merit the most attention, the earlier published books still retain sufficient importance for inclusion in the listing. Every effort was made to list the most updated and revised editions of earlier published books. Also, please note that the prices listed are the publishers’ official prices, with many of the books available for purchase at discounted rates at bookseller sites such as Amazon.com. This listing of top 150 books is intended to provide an overview of many of the discipline’s preeminent books, but space considerations limit coverage of additional topics and the dozens of worthy books that cover all these topics. Readers are encouraged to nominate additional topics and books for inclusion in future lists. Encyclopedias and Reference Resources 1.

2.

3.

James Ciment, editor, World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post-9/11 Era [Three Volumes] [Second Edition] (Armonk, NY: Sharpe Reference, 2011), 1016 pages, $349.00. [Hardcover] Edward E. Mickolus and Susan I. Simmons, The Terrorist List [Five Volumes: Volume 1: Asia, Pacific and Sub-Saharan Africa; Volume 2: Western Europe; Volume 3: Eastern Europe; Volume 4: North America; and Volume 5: South America] (Santa Barbara, CA: Praeger, 2011), 1333 pages, $464.95. [Hardcover] Alex P. Schmid, editor, The Routledge Handbook of Terrorism Research (New York: Routledge, 2011), 736 pages, $210.00. [Hardcover]

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


4. 5.

Gus Martin, editor, The SAGE Encyclopedia of Terrorism [Second Edition] (Los Angeles, CA: SAGE Reference, 2011), 720 pages, $135.00. [Hardcover] Paul B. Rich and Isabelle Duyvesteyn, editors, The Routledge Handbook of Insurgency and Counterinsurgency (New York: Routledge, 2012), 400 pages, $200.00. [Hardcover]

Textbooks and General Histories 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16.

Bruce Hoffman, Inside Terrorism [Second and Expanded Edition] (New York: Columbia University Press, 2006), 456 pages, $24.95. [Paperback] Peter R. Neumann, Old & New Terrorism (Malden, MA: Polity Press, 2009), 204 pages, $22.95. [Paperback] Adrian Guelke, The New Age of Terrorism and the International Political System (London and New York: I.B. Tauris, 2009), 256 pages, $29.00. [Paperback] Michael Burleigh, Blood & Rage: A Cultural History of Terrorism (New York: Harper Collins Publishers, 2009), 592 pages, $29.99. [Hardcover] Martha Crenshaw, Explaining Terrorism: Causes, Processes and Consequences (New York: Routledge, 2011), 268 pages, $43.95. [Paperback] John Horgan and Kurt Braddock, editors, Terrorism Studies: A Reader (New York: Routledge, 2011), 504 pages, $44.95. [Paperback] Brigitte L. Nacos, Terrorism and Counterterrorism [Fourth Edition] (Boston, MA: Longman, 2011), 352 pages, $64.40. [Paperback] Richard Jackson, Lee Jarvis, Jeroen Gunning, and Marie Breen Smyth, Terrorism: A Critical Introduction (New York: Palgrave Macmillan, 2011), 352 pages, $40.00. [Paperback] Gus Martin, Essentials of Terrorism: Concepts and Controversies [Second Edition] (Los Angeles, CA: SAGE, 2011), 440 pages, $56.00. [Paperback] Gus Martin, Understanding Terrorism: Challenges, Perspectives, and Issues [Fourth Edition] (Los Angeles, CA: Sage, 2012), 616 pages, $80.00. [Paperback] Richard Jackson and Samuel Justin Sinclair, editors. Contemporary Debates on Terrorism (New York: Routledge, 2012), 240 pages, $42.95. [Paperback]

Using the Social, Behavioral, and Economic Sciences to Study Terrorism 17. Ely Karmon’s Coalitions Between Terrorist Organizations: Revolutionaries, Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers, 2005), 426 pages; $206.00. [Hardcover] 18. John Horgan, The Psychology of Terrorism (New York: Routledge, 2005), 224 pages, $49.95. [Paperback] 19. James J.F. Forest, editor, The Making of a Terrorist: Recruitment, Training, and Root Causes [Three Volumes] (Westport, CT: Praeger Security International, 2006), 1280 pages, $315. [Hardcover] 20. Walter Enders and Todd Sandler, The Political Economy of Terrorism (New York: Cambridge University Press, 2006), 294 pages, $29.99. [Paperback] 21. Magnus Ranstorp, editor, Mapping Terrorism Research: State of the Art, Gaps and Future Direction (New York: Routledge, 2007), 352 pages, $160.00. [Hardcover] 22. Bruce Bongar, et al., editors, Psychology of Terrorism (New York: Oxford University Press, 2007), 512 pages, $85.00. [Hardcover] 23. Adam Dolnik, Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge, 2007), 224 pages, $39.95. [Paperback] 24. Ekaterina Stepanova, Terrorism in Asymmetrical Conflict: Ideological and Structural Aspects (New York: Oxford University Press, 2008), 200 pages, $74.00. [Hardcover] 25. Paul K. Davis, et al, Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND, 2009), 540 pages, $59.50. [Paperback] 26. Jeffrey Kaplan, Terrorist Groups and the New Tribalism: Terrorism’s Fifth Wave (New York: Routledge, 2010), 256 pages, $130.00. [Hardcover]

27. Jean E, Rosenfeld, editor, Terrorism, Identity and Legitimacy: The Four Waves Theory and Political Violence (New York: Routledge, 2011), 272 pages, $130.00. [Hardcover] Journalistic Case Studies 28. Ed Moloney, A Secret History of the IRA (New York: W.W. Norton & Company, 2003), 640 pages, $18.95. [Paperback] 29. Steve Coll, Ghost Wars: The Secret History of the CIA, Afghanistan, and bin Laden, from the Soviet Invasion to September 10, 2001 (New York: Penguin Books, 2004), 720 pages, $18.00. [Paperback] 30. Alston Chase, A Mind for Murder: The Education of the Unabomber and the Origins of Modern Terrorism (New York: W.W. Norton & Company, 2004), 448 pages, $15.95. [Paperback] 31. Stewart Bell, The Martyr’s Oath: The Apprenticeship of a Homegrown Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons, 2005), 288 pages, $36.95. [Hardcover] 32. Samuel M. Katz, Jihad in Brooklyn: The NYPD Raid that Stopped America’s First Suicide Bombers (New York: New American Library, 2005), 336 pages, $13.95. [Paperback] 33. Lawrence Wright, The Looming Tower: Al-Qaeda and the Road to 9/11 (New York: Vintage, 2007), 553 pages, $17.00. [Paperback] 34. Stewart Bell, Cold Terror: How Canada Nurtures and Exports Terrorism Around the World (Mississauga, Ontario, Canada: John Wiley & Sons, 2007), 304 pages, $32.95. [Hardcover] 35. Dina Temple-Raston, The Jihad Next Door: The Lackawanna Six and Rough Justice in the Age of Terror (New York: Public Affairs, 2007), 304 pages; $26.00. [Hardcover] 36. Sally Neighbour, The Mother of Mohammed: An Australian Woman’s Extraordinary Journey into Jihad (Carlton, Victoria, Australia: Melbourne University Press, 2010), 304 pages, $26.50. [Paperback] 37. Ian Johnson, A Mosque in Munich: Nazis, the CIA, and the Rise of the Muslim Brotherhood in the West (Boston: Houghton Mifflin Harcourt, 2010), 336 pages, $27.00. [Hardcover] 38. Andrew Welsh-Huggins, Hatred at Home: Al-Qaida on Trial in the American Midwest (Athens, OH: Swallow Press/Ohio University Press, 2011), 196 pages, $26.95. [Hardcover] 39. Joby Warrick, The Triple Agent: The Al Qaeda Mole Who Infiltrated the CIA (New York: Doubleday, 2011), 272 pages, $26.95. [Hardcover] 40. Catherine Herridge, The Next Wave: On the Hunt for Al Qaeda’s American Recruits (New York: Crown Forum, 2011), 272 pages, $25.00. [Hardcover] 41. Eric Schmitt and Thom Shanker, Counterstrike: The Untold Story of America’s Secret Campaign Against al Qaeda (New York: Times Books/ Henry Holt & Company, 2011), 336 pages, $27.00. [Hardcover] 42. Andrew Gumbel and Roger Charles, Oklahoma City: What the Investigation Missed – and Why It Still Matters (New York: William Morrow, 2012), 448 pages, $27.99. [Hardcover] 43. Terry McDermott and Josh Meyer, The Hunt for KSM: Inside the Pursuit and Takedown of the Real 9/11 Mastermind, Khalid Sheikh Mohammed (Boston, MA: Little Brown and Company, 2012), 368 pages, $27.99. [Hardcover] Case Studies of Terrorist Groups 44. Zachary Abuza, Militant Islam in Southeast Asia: Crucibles of Terror (Boulder, CO: Lynne Rienner, 2003), 281 pages, $22.50. [Paperback] 45. Daniel Levitas, The Terrorist Next Door: The Militia Movement and the Radical Right (New York: Thomas Dunne Books/St. Martin’s Press, 2004), 544 pages, $23.99. [Paperback] 46. Donald R. Liddick, Eco-Terrorism: Radical Environmental and Animal Liberation Movements (Westport, CT: Praeger, 2006), 200 pages, $39.95. [Hardcover] 47. Matthew Levitt, Hamas: Politics, Charity, and Terrorism in the Service of Jihad (New Haven, CT: Yale University Press, 2007), 336 pages; $17.00. [Paperback]


48. Daniel Byman, Deadly Connections: States that Sponsor Terrorism (New York: Cambridge University Press, 2007), 380 pages, $44.00. [Hardover] 49. Stefan Aust, Baader-Meinhof: The Inside Story of the R.A.F. (New York: Oxford University Press, 2009), 480 pages, $29.95. [Hardcover] 50. Alessandro Orsini, Anatomy of the Red Brigades: The Religious Mind-Set of Modern Terrorists [Translated by Sarah Nodes] (Ithaca, NY: Cornell University Press, 2009), 296 pages, $29.95. [Hardcover] 51. Zachary Abuza, Conspiracy of Silence: The Insurgency in Southern Thailand (Washington, DC: United States Institute of Peace Press, 2009), 172 pages, $16.95. [Paperback] 52. Beverly Gage, The Day Wall Street Exploded: A Story of America and Its First Age of Terror (New York: Oxford University Press, 2009), 416 pages, $27.95. [Hardcover] 53. Ami Pedahzur and Arie Perliger, Jewish Terrorism in Israel (New York: Columbia University Press, 2009), 264 pages, $22.50. [Paperback] 54. Anna Geifman, Death Orders: The Vanguard of Modern Terrorism in Revolutionary Russia (Santa Barbara, CA: Praeger, 2010), 229 pages, $34.95. [Hardcover] 55. J. Todd Reed and Diana Raschke, The ETIM: China’s Islamic Militants and the Global Terrorist Threat (Santa Barbara, CA: Praeger, 2010), 244 pages, $49.95. [Hardcover] 56. Robert W. Schaefer, The Insurgency in Chechnya and the North Caucasus: From Gazavat to Jihad (Santa Barbara, CA: Praeger, 2011), 303 pages, $59.95. [Hardcover] 57. Eitan Azani, Hezbollah: The Story of the Party of God From Revolution to Institutionalization (New York: Palgrave Macmillan, 2011), 308 pages, $31.00. [Paperback] 58. Daniel Baracskay, The Palestine Liberation Organization: Terrorism and Prospects for Peace in the Holy Land (Santa Barbara, CA: Praeger, 2011), 225 pages, $44.95. [Hardcover] 59. Stephen Tankel, Storming the World Stage: The Story of Lashkar-eTaiba (New York: Columbia University Press, 2011), 288 pages, $35.00. [Hardcover]

pages, $24.95. [Paperback] 69. Allison Pargeter, The New Frontiers of Jihad: Radical Islam in Europe (Philadelphia, PA: University of Pennsylvania Press, 2008), 256 pages, $34.95. [Hardcover] 70. Shmuel Bar, Warrants for Terror: The Fatwas of Radical Islam and the Duty to Jihad (Lanham, MD: Rowman & Littlefield, 2008), 152 pages, $18.95. [Paperback] 71. Brynjar Lia, Architect of Global Jihad: The Life of Al-Qaida Strategist Abu Mus’ab al-Suri (New York: Columbia University Press, 2008), 256 pages, $22.50. [Paperback] 72. Kumar Ramakrishna, Radical Pathways: Understanding Muslim Radicalization in Indonesia (Westport, CT: Praeger Security International, 2009), 292 pages, $75.00. [Hardcover] 73. Thomas Hegghammer, Jihad in Saudi Arabia: Violence and Pan-Islamism Since 1979 (New York: Cambridge University Press, 2010), 302 pages, $31.99. [Paperback] 74. Youssef H. Aboul-Enein, Militant Islamist Ideology: Understanding the Global Threat (Annapolis, MD: Naval Institute Press, 2010), 288 pages, $37.95. [Hardcover] 75. J.M. Berger, Jihad Joe: Americans Who Go to War in the Name of Islam (Washington, DC: Potomac Books, 2011), 280 pages, $29.95. [Hardcover] 76. 77. Patrick T. Dunleavy, The Fertile Soil of Jihad: Terrorism’s Prison Connection (Washington, DC: Potomac Books, 2011), 160 pages, $22.00. [Hardcover] 78. Rik Coolsaet, editor, Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences [Second Edition] (Burlington, VT: Ashgate, 2011), 340 pages, $49.95. [Paperback] 79. Daniela Pisoiu, Islamist Radicalisation in Europe: An Occupational Change Process (New York: Routledge, 2011), 216 pages, $130.00. [Hardcover] 80. Assaf Moghadam and Brian Fishman, editors, Fault Lines in Global Jihad: Organizational, Strategic, and Ideological Fissures (New York: Routledge, 2011), 288 pages, $138.00. [Hardcover] 81. Mitchell D. Silber, The Al Qaeda Factor: Plots Against the West (Philadelphia: University of Pennsylvania Press, 2011), 368 pages, $39.95. [Hardcover] 82. Robert S. Leiken, Europe’s Angry Muslims: The Revolt of the Second Generation (New York: Oxford University Press, 2012), 337 pages, $27.95. [Hardcover]

Root Causes of Terrorism

Funding Terrorism

60. Tore Bjorge, editor, Root Causes of Terrorism: Myths, Reality and Ways Forward (New York: Routledge, 2005), 288 pages; $47.95. [Paperback] 61. Alan B. Krueger, What Makes a Terrorist: Economics and the Roots of Terrorism [New Edition] (Princeton, NJ: Princeton University Press, 2008), 216 pages, $19.95. [Paperback] 62. Louise Richardson, What Terrorists Want: Understanding the Enemy, Containing the Threat (New York: Random House, 2007), 336 pages, $17.00. [Paperback] 63. Jason Franks, Rethinking the Roots of Terrorism (New York: Palgrave Macmillan, 2006), 26 4 pages, $107.00. [Hardcover] Radicalization and Recruitment into Terrorism

83. Jeanne K. Giraldo and Harold A. Trinkunas, editors, Terrorism Financing and State Responses: A Comparative Perspective (Stanford, CA: Stanford University Press, 2007), 384 pages, $24.95. [Paperback] 84. Thomas J. Biersteker and Sue E. Eckert, editors, Countering the Financing of Terrorism (New York: Routledge, 2008), 360 pages, $44.95. [Paperback] 85. Gretchen Peters, Seeds of Terror: How Heroin Is Bankrolling the Taliban and Al Qaeda (New York: Thomas Dunne Books, 2009), 300 pages, $25.95. [Hardcover] 86. Jodi Vittori, Terrorist Financing and Resourcing (New York: Palgrave Macmillan, 2011), 240 pages, $85.00. [Hardcover] 87. Timothy Wittig, Understanding Terrorist Finance. New York: Palgrave Macmillan, 2011), 256 pages, $85.00. [Hardcover]

64. Quintan Wiktorowicz, editor, Islamic Activism: A Social Movement Theory Approach (Bloomington, IN: Indiana University Press, 2004), 328 pages, $25.95. [Paperback] 65. Marc Sageman, Understanding Terror Networks: (Philadelphia, PA: University of Pennsylvania Press, 2004), 232 pages, $29.95. [Hardcover] 66. Quintan Wiktorowicz, Radical Islam Rising: Muslim Extremism in the West (Lanham, MD: Rowman & Littlefield Publishers, 2005), 264 pages, $32.95. [Paperback] 67. Elena Mastors and Alyssa Deffenbaugh, The Lesser Jihad: Recruits and the Al-Qaida Network (Lanham, MD: Rowman & Littlefield Publshers, 2007), 174 pages, $28.95. [Paperback] 68. Marc Sageman, Leaderless Jihad: Terror Networks in the Twenty-First Century (Philadelphia: University of Pennsylvania Press, 2008), 208

62

Suicide Terrorism 88. Diego Gambetta, editor, Making Sense of Suicide Missions (New York: Oxford University Press, 2006), 432 pages, $39.95. [Paperback] 89. Ami Pedahzur, editor, Root Causes of Suicide Terrorism: The Globalization of Martyrdom (New York: Routledge, 2006), 224 pages, $43.95. [Paperback] 90. Cindy D. Ness, editor, Female Terrorism and Militancy: Agency, Utility, and Organization (New York: Routledge, 2008), 242 pages, $39.95. [Paperback] 91. Anat Berko, The Path to Paradise: The Inner World of Suicide Bombers and Their Dispatchers (Washington, DC: Potomac Books, 2009), 196 pages, $19.95. [Paperback]

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


92. Ariel Merari, Driven to Death: Psychological and Social Aspects of Suicide Terrorism (New York: Oxford University Press, 2010), 328 pages, $42.95. [Hardcover] 93. Paul J. Murphy, Allah’s Angels: Chechen Women in War (Annapolis, MD: Naval Institute Press, 2010), 320 pages, $34.95. [Hardcover] 94. Mordecai Dzikansky, Gil Kleiman, and Robert Slater, Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response (Boca Raton, FL: CRC Press, 2011), 342 pages, $79.9 5. [Hardcover] 95. Mia Bloom, Bombshell: Women and Terrorism (Philadelphia, PA: University of Pennsylvania Press, 2011), 320 pages, $29.95. [Hardcover] 96. Assaf Moghadam, The Globalization of Martyrdom: Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks [Reprint Edition] (Baltimore, MD: The Johns Hopkins University Press, 2011 [originally published in December 2008]), 360 pages, $30.00. [Paperback] 97. Tamara Herath, Women in Terrorism: Case of the LTTE (Los Angeles, CA: Sage, 2012), 264 pages, $40.00. [Hardcover] International Law and Terrorism 98. Emanuel Gross, The Struggle of Democracy against Terrorism: Lessons from the United States, the United Kingdom, and Israel (Charlottesville, VA: University of Virginia Press, 2006), 320 pages, $35.00. [Hardcover] 99. Ben Saul, Defining Terrorism in International Law (New York: Oxford University Press, 2008), 408 pages, $65.00. [Paperback] 100. Clive Walker, Terrorism and the Law (New York: Oxford University Press, 2011), 720 pages, $300.00. [Hardcover] 101. Amos N. Guiora, Global Perspectives on Counterterrorism [Second Edition] (Austin, TX: Wolters Kluwer, 2011), 432 pages, $68.00. [Paperback] 102. Norman Abrams, Anti-Terrorism and Criminal Enforcement [Fourth Edition] (St. Paul, MN: West, 2012), 848 pages, $176.00. [Hardcover] 103. Stephen Dycus, William C. Banks, and Peter Raven-Hansen, Counterterrorism Law [Second Edition] (New York: Wolters Kluwer, 2012), 816 pages,

$157.00. [Hardcover] 104. Maria O’Neill, The Evolving EU Counter-Terrorism Legal Framework (New York: Routledge, 2012), 328 pages, $145.00. [Hardcover] 105. Ana Maria Salinas De Frias, et al, editors, Counter-Terrorism: International Law and Practice (New York: Oxford University Press, 2012), 1120 pages, $290.00. [Hardcover] Terrorism on the Internet 106. Gabriel Weimann, Terror on the Internet (Washington, DC: Potomac Books, 2006), 256 pages, $19.96. [Paperback] 107. Boaz Ganor, et al, editors, Hypermedia Seduction for Terrorist Recruiting (Amsterdam, Holland: IOS Press, 2007), 289 pages, $155.96. [Hardcover] 108. Yaakov Lappin, Virtual Caliphate: Exposing the Islamist State on the Internet (Washington, DC: Potomac Books, 2011), 212 pages, $21.56. [Hardcover] 109. Philip Seib and Dana M. Janbek, Global Terrorism and New Media: The Post-Al Qaeda Generation (New York: Routledge, 2011), 146 pages, $$43.95. [Paperback] Terrorism and WMD 110. Brian Michael Jenkins, Will Terrorists Go Nuclear? (Amherst, NY: Prometheus Books, 2008), 457 pages, $26.95. [Hardcover] 111. Stephen M. Maurer, editor, WMD Terrorsim: Science and Policy Choices (Cambridge, MA: The MIT Press, 2009), 619 pages, $38.00. [Paperback] 112. Gary Ackerman and Jeremy Tamsett, editors, Jihadists and Weapons of Mass Destruction (Boca Raton, FL: CRS Press, 2009), 494 pages, $82.95. [Hardcover] 113. Magnus Ranstorp and Magnus Normark, editors, Unconventional Weapons and International Terrorism (New York: Routledge, 2009), 224 pages, $140.00. [Hardcover] 114. Benjamin Cole, The Changing Face of Terrorism: How Real is the Threat

COUNTER TERRORISM

SECURITY NEWS YOU NEED TO KNOW

Aviation, Corporate, Cyber, Global, Homeland, Maritime, Law Enforcement, Intelligence Photo credit U.S. Department of Defense.

IACSP and PlanetData present a new website bringing you counterterrorism news, articles, events, and more.

www.planetdata.net/ct


from Biological, Chemical and Nuclear Weapons? (New York: I.B. Taurus, 2011), 320 pages, $25.00. [Paperback] 115. Todd M. Masse, Nuclear Jihad: A Clear and Present Danger? (Washington, DC: Potomac Books, 2011), 360 pages, $27.96. [Hardcover] 116. Russell D. Howard and James J.F. Forest, editors, Weapons of Mass Destruction and Terrorism [Second Edition] (New York: McGraw Hill, 2012), 821 pages, $77.33. [Paperback] Counterterrorism 117. Boaz Ganor, The Counter-Terrorism Puzzle: A Guide for Decision Makers (New Brunswick, NJ: Transaction Publishers, 2007), 317 pages, $29.95. [Paperback] 118. Paul Wilkinson, editor, Homeland Security in the UK: Future Preparedness for Terrorist Attacks Since 9/11 (New York: Routledge, 2007), 432 pages, $44.95. [Paperback] 119. Robert J. Art and Louise Richardson, editors, Democracy and Counterterrorism: Lessons From the Past (Washington, DC: United States Institute of Peace Press, 2007), 481 pages, $35.00. [Paperback] 120. James J.F. Forest, editor, Countering Terrorism and Insurgency in the 21st Century: International Perspectives [Three Volumes] (Westport, CT: Praeger Security International, 2007), 2016 pages, $400.00. [Hardcover] 121. Amos N. Guiora, Fundamentals of Counterterrorism (Austin, TX: Wolters Kluwer, 2008), 208 pages, $44.00. [Paperback] 122. Daniel Byman, The Five Front War: The Better Way to Fight Global Jihad (Hoboken, NJ: John Wiley & Sons, 2008), 320 pages, $27.95. [Hardcover] 123. James J.F. Forest, editor, Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas (Westport, CT: Praeger Security International, 2009), 392 pages, $59.95. [Hardcover] 124. Stewart Baker, Skating on Stilts: Why We Aren’t Stopping Tomorrow’s Terrorism (Stanford, CA: Hoover Institution Press, 2010), 375 pages, $19.95. [Hardcover] 125. David Omand, Securing the State (New York: Columbia University Press, 2010), 320 pages, $29.50. [Hardcover] 126. Christopher Paul, et al., Victory Has a Thousand Fathers: Sources of Success in Counterinsurgency (Santa Monica, CA: RAND, 2010), 188 pages, $18.00. [Paperback] 127. Paul Wilkinson, Terrorism Versus Democracy: The Liberal State Response [Third Edition] (New York: Routledge, 2011), 238 pages, $39.95. [Paperback] 128. Andrew Silke, editor, The Psychology of Counter-Terrorism (New York: Routledge, 2011), 216 pages, $39.95. [Paperback] 129. Nadav Morag, Comparative Homeland Security: Global Lessons (Hoboken, NJ: John Wiley & Sons, 2011), 400 pages, $89.95. [Hardcover] 130. Beatrice de Graaf, Evaluating Counterterrorism Performance: A Comparative Study (New York: Routledge, 2011), 376 pages, $138.00. [Hardcover] 131. Brian Michael Jenkins and John Paul Godges, editors, The Long Shadow of 9/11: America’s Response to Terrorism (Santa Monica, CA: RAND, 2011), 218 pages, $19.95. [Paperback] 132. Michael B. Kraft and Edward Marks, U.S. Government Counterterrorism: A Guide to Who Does What (Boca Raton, FL: CRC Press, 2012), 407 pages, $69.95. Intelligence in Counterterrorism 133. Sundri Khalsa, Forecasting Terrorism: Indicators and Proven Ana-

64

lytic Techniques (Lanham, MD: Scarecrow Press, 2004), 103 pages; $40.00. [Paperback] 134. Kim Cragin and Sara A. Daly, The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World (Santa Monica, CA: RAND, 2004), 126 pages, $20.00. [Paperback] 135. Ronald V. Clarke and Graeme R. Newman, Outsmarting the Terrorists (Westport, CT: Praeger Security International, 2006), 316 pages, $49.95. [Hardcover] 136. Hsinchun Chen, et al, editors, Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (New York: Springer, 2008), 640 pages, $169.00. [Hardcover] 137. Malcolm W. Nance, Terrorist Recognition Handbook: A Practitioner’s Manual for Predicting and Identifying Terrorist Activities (Boca Raton, FL: CRC Press, 2008), 480 pages, $64.95. [Paperback] 138. Gregory F. Treverton, Intelligence for an Age of Terror (New York: Cambridge University Press, 2009), 328 pages, $19.99. [Paperback] 139. Michael R. Ronczkowski, Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations [Third Edition] (Boca Raton, FL: CRC Press, 2012), 417 pages, $89.95. [Hardcover] Deradicalization and Disengagement from Terrorism 140. Tore Bjorgo and John Horgan, editors, Leaving Terrorism Behind: Individual and Collective Disengagement (New York: Routledge, 2009), 327 pages, $39.95. [Paperback] 141. John Horgan, Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements (New York: Routledge, 2009), 216 pages, $36.95. [Paperback] Peace Negotiations With Terrorists 142. John Bew, Martyn Frampton, and Inigo Gurruchaga, Talking to Terrorists: Making Peace in Northern Ireland and the Basque Country (New York: Columbia University Press, 2009), 256 pages, $27.50. [Paperback] 143. Carolin Goerzig, Talking to Terrorists: Concessions and the Renunciation of Violence (New York: Routledge, 2010), 192 pages, $130.00. [Hardcover] 144. Guy Olivier Faure and I. William Zartman, editors, Negotiating with Terrorists: Strategy, Tactics, and Politics (New York: Routledge, 2010), 256 pages, $138.00. [Hardover] 145. William Zartman and Guy Olivier Faure, editors, Engaging Extremists: Trade-Offs, Timing and Diplomacy (Washington, DC: United States Institute of Peace Press, 2011), 300 pages, $19.95. [Paperback] 146. Judith Renner and Alexander Spencer, editors, Reconciliation after Terrorism: Strategy, Possibility or Absurdity? (New York: Routledge, 2012), 248 pages, $130.00. [Hardcover] How Terrorist Conflicts End 147. Audrey Kurth Cronin, How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns (Princeton, NJ: Princeton University Press, 2009), 432 pages, $22.95. [Paperback] 148. Seth G. Jones and Martin C. Libicki, How Terrorist Groups End: Lessons for Countering al Qa’ida (Santa Monica, CA: RAND, 2008), 250 pages, $33.00. [Paperback] 149. Ben Connable and Martin C. Libicki, How Insurgencies End (Santa Monica, CA: RAND, 2010), 268 pages, $32.80. [Paperback] 150. Leonard Weinberg, The End of Terrorism? (New York: Routledge, 2011), 168 pages, $41.95. [Paperback] About the Author Joshua Sinai is an associate professor/research, specializing in counterterrorism studies, at a Virginia Tech center in Arlington. He can be reached at: jbsinai@vt.edu.

Journal of Counterterrorism & Homeland Security International

Vol.18, No.2


IACSP Reader’s Lounge Continued Terrorism and WMDs: Awareness and Response

US Government Counterterrorism: A Guide to Who Does What

Terrorists continue to enhance their technical sophistication in constructing weapons of mass destruction (WMDs) with devastating effects. Chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons now pose a greater threat than ever before. Emphasizing basic chemistry and biology, including microbiology and human health, Terrorism and WMDs: Awareness and Response is an introductory manual on CBRNE weapons that helps prepare emergency response, counterterrorism, and security professionals to respond to a WMD attack quickly and effectively. • Provides a non-technical approach to technical concepts • Presents boxed sections for focused explanations • Covers a variety of threat modalities • Contains end-of-chapter questions to test comprehension • Includes more than 170 figures and illustrations • Instructor’s guide with test bank available with qualifying course adoption

U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government’s counterterrorism efforts, present a rare insider’s view of the counterterrorism effort, addressing such topics as government training initiatives, weapons of mass destruction, interagency coordination, research and development, and the congressional role in policy and budget issues. • Provides the first road map available to the public describing the U.S. government’s structure, history, development, and current programs that protect against terrorism at home and overseas • Describes efforts to counter terrorism finance and train law enforcement officials of the U.S. and other countries, as well as the research and development of counterterrorism technology • Examines current and developing federalstate government counterterrorism working relations • Demonstrates how specific events such as 9/11 and the 1998 East Africa bombings prompted the development of various programs • Includes a Foreword by Brian Michael Jenkins, Senior Advisor RAND Corporation

John Pichtel

Catalog no. K12376 April 2011 456 pp. ISBN: 978-1-4398-5175-3 $79.95

Michael Kraft, Edward Marks

Catalog no. K12355 December 2011 407 pp. ISBN: 978-1-4398-5143-2 $69.95

Homeland Security: An Introduction to Principles and Practice Charles P. Nemeth

Homeland Security: An Introduction to Principles and Practice provides students and practitioners alike with the latest developments on the makeup, organization, and strategic mission of DHS. Homeland security involves a complex network of government agencies and private organizations collaborating to ensure the safety and security of the United States, its domestic and global interests, and its citizens. As such, this book offers valuable insights into the roles of multi-jurisdictional agencies and various stakeholders at all levels of government including law enforcement, the military, the intelligence community, emergency managers, and the private sector. • Reviews the creation, organization, and recent policy developments at the Department of Homeland Security • Provides an objective, balanced perspective on the priorities and challenges in counterterrorism, emergency management, and the protection of critical infrastructure • Offers insight into multi-jurisdictional agencies and stakeholder roles • Introduces new and emerging ideas on the role homeland security should play in national security, disaster preparedness, and infrastructure security • Chapter PowerPoint® slides and an instructor’s manual with a bevy of test bank questions are also availabe upon qualified course adoption • An instructor’s manual with exam questions, lesson plans, and chapter PowerPoint® slides are available upon qualified course adoption. Catalog no. AU8567 December 2009 542 pp. ISBN: 978-1-4200-8567-9 $75.95


Critical Incident Management: A Complete Response Guide, Second Edition Vincent Faggiano, John McNall, Thomas T. Gillespie

Terrorism threats and increased school and workplace violence have always generated headlines, but in recent years, the response to these events has received heightened media scrutiny. Critical Incident Management: A Complete Resource Guide, Second Edition provides evidence-based, tested, and proven methodologies applicable to a host of scenarios that may be encountered in the public and private sector. • Filled with tactical direction designed to prevent, contain, manage, and resolve emergencies and critical incidents efficiently and effectively, this volume explores: • The phases of a critical incident response and tasks that must be implemented to stabilize the scene • Leadership style and techniques required to manage a critical incident successfully • The National Incident Management System (NIMS) and the Incident Command System (ICS) • Guidelines for responding to hazardous materials and weapons of mass destruction incidents • Critical incident stress management for responders • Maintaining continuity of business and delivery of products or services in the face of a crisis • Roles of high-level personnel in setting policy and direction for the response and recovery efforts Catalog no. K13455 November 2011 246 pp. ISBN: 978-1-4398-7454-7 $79.95

66

Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response

Mordecai Dzikansky, Gil Kleiman, Robert Slater Urban environments are prime targets for suicide bombings over the next decade. While the threat may be ever-present, measures are available that can empower law enforcement personnel to thwart attacks, or at least mitigate the effects by reducing casualties. Written by professionals with first-hand experience, Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response helps first responders, law enforcement, and homeland security professionals grapple with this increasing threat, offering best practices in the field and lessons learned. • Describes what suicide bombings look like • Examines the advantages, limitations, and effectiveness of suicide bombing as a terror tactic • Looks at the bombers’ motives, tactics, agendas, and tools of their trade • Explores 9/11 and how it has shaped perceptions and counterterror strategies toward suicide bombers in the decade after the attack • Presents ways of defending against suicide bombings to reduce casualties • Includes case studies and photos Catalog no. K13266 October 2011 342 pp. ISBN: 978-1-4398-7131-7 $79.95

Journal of Counterterrorism & Homeland Security International

Handbook of Surveillance Technologies, Third Edition J.K. Petersen

From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies—offering the latest in surveillance and privacy issues. • Cutting-Edge—updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS systems, Google street-viewing technology, satellite surveillance, sonar and biometric surveillance systems, and emerging developments • Comprehensive—from sonar and biometric surveillance systems to satellites, it describes spy devices, legislation, and privacy issues—from their historical origins to current applications—including recent controversies and changes in the structure of the intelligence community at home and abroad • Modular—chapters can be read in any order— browse as a professional reference on an asneeded basis—or use as a text for Surveillance Studies courses • Covers the full spectrum of surveillance systems, including: • Radar • Sonar • RF/ID • Satellite • Ultraviolet • Infrared • Biometric • Genetic • Animal • Biochemical • Computer • Wiretapping • Audio • Cryptologic • Chemical • Biological • X-Ray • Magnetic Catalog no. K13389 January 2012 1,040 pp. ISBN: 978-1-4398-7315-1 $139.95

Vol.18, No.2


G4S International Training Inc.

has been a quality training provider for over 20 years. All of our instructors are prior military or law enforcement professionals. We specialize in Driving, Firearms, CounterTerrorism, Protective Services, Combatives and Medical Courses. Go to www.g4siti.com to find out more about classes offered by G4S International Training Inc. or call us 804-785-6000. M/D/F/V


“toknowledge is critical deter the threat of terrorism.� Elena Mastors, Ph.D. | Dean, School of Security & Global Studies Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network.

Learn More at www.amuonline.com/JOC

Education | Journal Management | Public& Service Health | Science & Technology | Security & Global Studies of Counterterrorism Homeland & Security International Vol.18, No.2


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.