IACSP’s Annual Homeland Security Education Directory
Keep On Sale Until February 21, 2013
Shadow Wars: Past Threats And Present Answers What To Expect In A War With Iran Cyberwar Cyberwar Spotlight: Spotlight: Russia Russia Corporate Corporate Espionage: Espionage: The The Art Art Of Of Elicitation Elicitation Q&A Q&A with with Ambassador Ambassador Henry Henry A. A. Crumpton Crumpton Books, Books, Books Books And And More More Books Books
WINTER Issue Vol. 18, No. 4, 2012 Printed in the U.S.A. IACSP.COM
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
The Australian Graduate School of Policing and Security (AGSPS) is one of Asia’s leading providers of national security and law enforcement education and training. The Master of Arts (Terrorism, Safety and Security) at AGSPS has been developed in consultation with international security professionals and is targeted at practitioners who seek to expand their knowledge and understanding of intelligence, security, and counterterrorism issues. AGSPS courses are ideally suited to professionals working in areas of counterterrorism, intelligence, law enforcement, and the military. The benefits of studying with AGSPS include: • customised education and training packages for public and private sector • internationally recognised postgraduate qualifications • flexible study through the region’s leading provider of online distance education • flexible entry requirements with recognition of current competencies • advanced research programs at Master and Doctoral levels. The elective component in our courses allows for the selection of a range of subjects that best meet your educational needs. Electives can be chosen from fields including:
CRICOS: 00005F (NSW), 01947G (VIC), 02960B (ACT)
F2752A
• Anti Money Laundering and Counter Terrorist Financing • Emergency Management • Intelligence Analysis.
Vol. 18, No. 4 WINTER 2012 IACSP Director of Operations Steven J. Fustero Associate Publisher Phil Friedman
Page 42
Senior Editor Nancy Perry
Shadow War: Past Threats And Present Answers
Contributing Editors Paul Davis Thomas B. Hunter Joshua Sinai
by Stanley I. White
Book Review Editor Jack Plaxe Research Director Gerry Keenan Conference Director John Dew
Page 46
Communications Director Craig O. Thompson
War With Iran
Art Director Scott Dube, MAD4ART International
by Danny Dickerson
Psychological CT Advisors Cherie Castellano, MA, CSW, LPC Counterintelligence Advisor Stanley I. White South America Advisor Edward J. Maggio Homeland Security Advisor Col. David Gavigan
Page 6 Page 8
SITREP
Personal Security Advisor Thomas J. Patire
Cyberwar Spotlight: Russia, by David Gewirtz
Emergency Management Advisor Clark L. Staten
Page 12 Muslims Under The Microscope, by Friedrich Seiltgen
Tactical Advisor Robert Taubert
Page 14 Q&A With Ambassador Henry A. Crumpton, by Paul Davis Page 18 The Growing Threat Of Terrorism In The Sinai, by Leo Labaj & Bill Schaefer Page 22 The Dangers Of Casual Conversation: Targeting Int’l. Business Travelers Through Elicitation,
Security Driver Advisor Anthony Ricci, ADSI Cyberwarfare Advisor David Gewirtz
by Luke Bencie & Katharina Werne
Page 26
Homeland Security: A Case For The Security Profession, by Dr. Paulette Laubsch
Page 34 Homeland Security Education Directory Page 42
Hazmat Advisor Bob Jaffin
Shadow War: Past Threats And Present Answers, by Stanley I. White
Page 46 War With Iran, by Danny Dickerson
Cell Phone Forensics Advisor Dr. Eamon P. Doherty IACSP Advisory Board John M. Peterson III John Dew Thomas Patire Cherie Castellano, MA, CSW, LPC Robert E. Thorn Southeast Asia Correspondent Dr. Thomas A. Marks
Page 50 The Defeat Of The LTTE, by Andrin Raj
European Correspondent Elisabeth Peruci
Page 54 Secure Driver: Eight Speed Transmissions, by Sean McLaine Page 56 Book Review: Ben Macinytre’s Double Cross, review by Paul Davis Page 58 Counter Terrorism Bookshelf, by Dr. Joshua Sinai
Middle East Correspondent Ali Koknar National Sales Representative Phil Friedman, Advertising Director Tel: 201-224-0588, Fax: 202-315-3459 iacsp@aol.com Tactical Sales Representative Scott Dube, MAD4ART International Tel: 757-721-2774, scott@mad4art.com
THE JOURNAL OF COUNTERTERRORISM & HOMELAND SECURITY INT’L is published by SecureWorldnet, Ltd., PO Box 100688, Arlington, VA 22210, USA, (ISSN#1552-5155) in cooperation with the International Association for Counterterrorism & Security Professionals and Counterterrorism & Security Education and Research Foundation. Copyright © 2012. All rights reserved. No part of this publication may be reproduced without written permission from the publisher. The opinions expressed herein are the responsibility of the authors and are not necessarily those of the editors or publisher. Editorial correspondence should be addressed to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA, (703) 243-0993, FAX (703) 243-1197. Membership $65/year, add $10 for overseas memberships. Postmaster: send address changes to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA. Web site: www.iacsp.com
PHOTO CREDITS: Reuters, Army.mil, Navy.mil, istockphoto.com and authors where applicable.
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
SITREP World Trends & Forecasts In Mali, Islamist rebels in the north made further advances, seizing the strategic town of Douentza. The upheaval in Mali threatens to escalate further and endangers regional stability. In Syria the level of violence and the numbers killed and displaced continued to climb. The new UN/Arab League envoy Lakhdar Brahimi met with interlocutors on both sides and Egypt launched a regional initiative aimed at ending the crisis. But amid international deadlock, an end to the escalating civil war still looks remote. The Japanese government’s purchase of the Diaoyu/Senkaku islands in the East China Sea caused a bilateral crisis between Japan and China, which also claims sovereignty over the islands. Beijing struck back by publishing territorial sea baselines encircling the islands, deploying patrol vessels and fishing boats, staging military exercises, threatening economic sanctions and cancelling a high-level event celebrating forty years of Japan-China diplomatic ties. Dozens of Chinese cities saw mass anti-Japan protests. In Colombia, the peace process launched last month seems to be gathering pace, despite persistent hostilities between FARC and the government. Both sides reiterated their commitment to talks, and are expected to meet for a first round of negotiations in October.
6
Third Quarter 2012 TRENDS Deteriorated Situations • China/Japan, Mali, Nagorno-Karabakh (Azerbaijan), Syria Improved Situations • None Unchanged Situations • Afghanistan, Algeria, Armenia, Azerbaijan, Bahrain, Bangladesh, Belarus, Bolivia, Bosnia, Burundi, Cameroon, Central African Republic, Chad, Colombia, Côte d’Ivoire, Cyprus, Democratic Republic of Congo, Ecuador, Egypt, Ethiopia, Georgia, Guatemala, Guinea, Guinea-Bissau, Haiti, India (non-Kashmir), Indonesia, Iran, Iraq, Israel/Occupied Palestinian Territories, Jordan, Kashmir, Kazakhstan, Kenya, Kosovo, Kyrgyzstan, Lebanon, Liberia, Libya, Macedonia, Madagascar, Malawi, Mauritania, Mexico, Moldova, Morocco, Myanmar, Nepal, Niger, Nigeria, North Caucasus (Russia), North Korea, Pakistan, Philippines, Rwanda, Saudi Arabia, Senegal, Serbia, Somalia, South Sudan, Sri Lanka, Sudan, Tajikistan, Thailand, Tunisia, Turkey, Turkmenistan, Ukraine, Uzbekistan, Venezuela, Western Sahara, Yemen, Zimbabwe Fourth Quarter OUTLOOK Conflict Risk Alert • Mali, Venezuela Conflict Resolution Opportunity Colombia Source: CrisisWatch.org
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
Triple Target Terminator Foreign countries have studied U.S. military ac-
tions and are methodically developing strategies and technologies to defeat U.S. Air Dominance. This growing threat is in part attributed to the local numerical advantage many enemy defenses possess. The T3 program seeks to develop a supersonic, long range missile that can engage enemy aircraft, cruise missiles, and surface-toair missiles. The speed, maneuverability, and network-centric capabilities of the Triple Target Terminator (T3) should significantly improve U.S. aircraft survivability and increase the number and variety of targets that could be destroyed on each sortie. The T3 missile should enable an aircraft to rapidly switch between air-to-air and air-to-surface capabilities, and is designed to be carried internally by 5th generation aircraft (F-22 and F-35), as well as externally on 4th generation aircraft (F-15, F-16, and F-18). The enabling technologies are: air-breathing propulsion, advanced data networking, multi-role guidance and control, and advanced thermal and power management.
The program plans to culminate in a live-fire T3 missile demonstration against the three target types in the winter of 2013. Source: www.darpa.mil
No Reports of Shamoon Malware In U.S., Yet The virus that caused what the U.S. secretary of defense called the most destructive attack ever mounted on a private sector computer network hasn’t been detected in U.S. networks, but it could be coming, according to a critical infrastructure network watchdog. The Shamoon virus that secretary of defense Leon Panetta revealed had infected 30,000 computers at Saudi oil giant ARAMCO, was first detected by Kaspersky Lab, Symantec and Seculert on Aug. 16, according to a report on September malware activity released by the Industrial Control System Cyber Emergency Response Team (ICS-CERT). Panetta had also said a similar attack followed in Qatar. “All told, the Shamoon virus was probably the most destructive attack that the private sector has seen to date,” he said. U.S. government officials have said the malware was written and sent out by Iranian hackers that may have connections to the country’s government. A group called “Cutting Sword of Justice” claimed credit for the attack on ARAMCO. The oil company spent a week restoring its computer services. The damage in the ARAMCO attack, though limited to the business network, was “significant,” said the organization. “And a similar destructive attack like this could just as easily have occurred on the control systems networks.” Source: http://www.gsnmagazine.com/
China To Shoot At High Frontier China’s military is set to conduct a test of a new
and more capable anti-satellite missile that United States intelligence agencies say can knock out strategic satellites in high-earth orbit, according to U.S. officials.However, a recent intelligence assessment said the test of the Dong Ning-2 direct ascent anti-satellite (ASAT) weapon was being delayed in an apparent effort to avoid the U.S. November Presidential election. Intelligence reports from October and this month revealed China will test fire the new DN-2 missile from a ground base sometime in early to mid winter. The missile is described by intelligence agencies as a high-earth orbit interceptor designed to de-
stroy satellites by ramming them at high speeds. The intelligence reports called the new missile a strategically significant counterspace weapon, said the officials familiar with the reports. Testing a high-earth orbit anti-satellite missile would represent a major advance in China’s satellite-killing capability, which has been underway for more than a decade. High-earth orbit, also known as geosynchronous orbit, is the location of major communications and navigation satellites, which orbit at a distance of between 12,000 miles and 22,236 miles from earth. China’s last ASAT test in 2007 destroyed a low-earth orbit weather satellite about 558 miles in space, “If the United States loses the strategic high ground of high-earth orbit [from a Chinese highaltitude ASAT missile], we are in real trouble,” said one U.S. official. U.S. Global Positioning System satellites, used for both navigation and precision missile guidance, are located in medium-earth orbit, or about 12,000 miles, and thus would be vulnerable to the new DN-2. Source: freebeacon.com
Laser Pointer Attacks Taking Off: Pose Serious Threat To Aviation Security If you’ve ever thought about pointing a handheld laser at an aircraft of any kind, think again. It’s highly dangerous and a federal crime. The number of laser attacks in the U.S. is on the rise. Incidents are projected to reach 3,700 this year—compared to just 283 in 2005. That’s a rise of more than 1,100 percent. And that doesn’t include the thousands of attacks that go unreported every year. George Johnson, a supervisory federal air marshal who is a liaison officer with the FBI, says the number of attacks is almost reaching an “epidemic level.”
In recent years, technology has improved the performance and power of handheld lasers; the Internet has also made these gadgets cheaper and easier to purchase. To combat the threat, the FBI last year established a Laser Strike Working Group National Initiative, which includes law enforcement partners and private entity stakeholders. The idea came from the FBI’s Sacramento Division, which created the first Laser Strike Working Group in 2008 to reduce incidents in the area. It worked—the number of attacks against commercial aircraft arriving and departing from the Sacramento International Airport decreased 75 percent. To report a laser attack, dial 911. You can also e-mail the Federal Aviation Administration at laserreports@FAA.gov or contact your nearest FBI field office.
Stop.Think.Connect. More and more, Americans are adopting new and innovative technologies and spending more of their time online. Our thirst for computers, smartphones, gadgets and Wi-Fi seems to have no limits. At home, at work and at school, our growing dependence on technology, coupled with increasing cyber threats and risks to our privacy, demands greater security in our online world. The Stop.Think.Connect. Campaign is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. Cybersecurity is a shared responsibility. We each have to do our part to keep the Internet safe. When we all take simple steps to be safer online, it makes using the Internet a more secure experience for everyone. Get Involved and Informed National Network • Non-profit organizations can join the National Network Cyber Awareness Coalition • Federal agencies and SLTT governments can join the Cyber Awareness Coalition In Your Community • Engage your community in promoting cybersecurity awareness News • Read our blogs and find out about upcoming events. Friends of the Campaign • Individuals can sign up to become a Friend of the Campaign. Tips and Resources • Learn about the main cyber issues and how you can avoid risks online To learn more or get involved in the Campaign, please contact us at stopthinkconnect@dhs.gov.
Cyberwar Spotlight: Russia By David Gewirtz
Eugene Kaspersky, Chairman and CEO of Kaspersky Labs, speaks at a Tel Aviv University cyber security conference June 6, 2012. Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said only a global effort could stop a new era of “cyber terrorism�. REUTERS/ Baz Ratner (ISRAEL
8
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
I
n June 2001, the President of the United States visited Ljubljana, the capital of Republika Slovenija (the nation state we call Slovenia). He met with the President of Russia. Of Vladimir Vladimirovich Putin, George W. Bush said, “I looked the man in the eye. I was able to get a sense of his soul.” Unfortunately, for those of us not possessed of presidential perception powers, Putin’s Russia is a far more complex organism to understand. In fact, the key to understanding the modern Russia is understanding Putin. Putin has ruled Russia as either President or Prime Minister since 1998, and Russia today is a direct reflection of Putin’s policies. Putin spent 16 years in the KGB, leaving the service on August 20, 1991 with the rank of Lieutenant Colonel. Despite Hillary Clinton’s claim back in 2008 that Putin, in fact, “doesn’t have a soul” because of his time as a KGB agent, it’s not Putin’s soul we’re concerned with here. It is, rather, his heart. At his heart, Vladimir Putin is a resource manager, an orchestrator, an expert in logistics. This logistical prowess can be seen in many of Putin’s economic policies and all through today’s Russia. In 1997 (two years before he’d become president), Putin defended his dissertation for Candidate of Science (the equivalent of a PhD) before the G. V. Plekhanov Saint Petersburg State Mining Institute and Technical University (Russia’s oldest engineering school). The thesis was entitled “The Strategic Planning of Regional Resources Under the Formation of Market Relations,” and gives us a far better look into the thinking of the Russian leader than any Mk1 Eyeball inspection.
buying up stock in European, Chinese, Israeli, and American technology companies. Through Chubais and Rusnano, Putin is effectively running his own venture capital firm. In recent years, they’ve invested in a number of U.S. technology companies: a developer of portable power technology, a flexible plastic display maker, and a cancer and radiation treatment biotech firm, among others. Backed with more than $4 billion straight from the Russian Federation’s cash reserves, Rusnano (and, by extension, the Russian government) may well wind up owning a substantial share of the world’s technology innovators. What remains to be seen is how much influence Russian government policy has in the operation of these companies -- many of whom are American. This approach is certainly a lot easier and safer than the old espionage spycraft practiced by the U.S.S.R. Rather than being fought at every level by American counterespionage agencies, American firms -- and even the American government -- are welcoming foreign investment with open arms. Russia may end up controlling a lot more of American technology through
Chubais is doing something no pre-Putin Russian bureaucrat would have ever been comfortable with. He’s buying up stock in European, Chinese, Israeli, and American technology companies. Through Chubais and Rusnano, Putin is effectively running his own venture capital firm.
Under Putin, Russia has become an economic powerhouse -- a centrally controlled economic powerhouse. According to the Associated Press, the GDP of the country multiplied six times over during Putin’s first two presidential terms. But this is not Putin’s grandfather’s central economic control. Spiridon Ivanovich Putin, Vlad’s grandfather, may have cooked for Lenin and Stalin back in the day, but Putin’s recipes for economic control are far more nuanced than the ham-fisted policies of Ioseb Besarionis dze Jughashvili (the man we know as Stalin). Even though the concept of “state capitalism” has been around since the 19th century
and was embraced by Lenin in 1918, Putin’s Russia emphasizes the capitalism far more than the state. Although Putin is a devout consolidationalist, in that he has always optimized for his own power centers, Putin has not generally imposed day-to-day state management on privately-owned companies in Russia. Instead, it’s his approval that matters. For example, as EE Times reports, Anatoly Chubais -- a Russian privatization expert -- is now the head of Rusnano (a firm previously known as Russian Corporation of Nanotechnologies). Rusnano is one of Russia’s so-called “national champion” companies, state-owned and financed
companies that are both expected to make money and advance Russian state interests. And that brings us to the cautionary tale that is Putin’s Russia. America and the USSR may have spent 50 years on the brink back in the Cold War days, with missiles and bombers pointed at each other. That was nothing. Today, Putin is wielding far more dangerous weapons of mass destruction: bankers and lawyers. Worse, he’s aiming them directly at American interests. Chubais is doing something no prePutin Russian bureaucrat would have ever been comfortable with. He’s
Putin’s buy-up program than any of those old Cold War Soviet spymasters could possibly have dreamt of. The problem is that Putin is no fan of America. In February 2007, in what has become known as the “Munich Speech,” Putin complained about the United States. He said the U.S. practices an “almost uncontained hyper use of force in international relations.” He also claimed, “No one feels safe! Because no one can feel that international law is like a stone wall that will protect them.” Of particular interest to our discussion of cyberwar, Putin also said, “Of course such a policy stimulates an arms race.” From a cyberthreat
company’s software on their computers as protection from cybercriminals. perspective, we have to look at Russia from three vectors. The first vector is what we’re now beginning to see as a traditional source of cyberattack: criminals. Russian cybercrime is anything but a small business, according to ABC News. In a report released in April 2012, ABC reported that Russian criminals took in more than $4 billion dollars from illegal cyber activities. According to the report, that number doubled in just one year, from about $2 billion in 2010. Apparently, online fraud was the biggest cybercrime category, sucking in more than a billion dollars. Following that were spamrelated activities. If you’ve ever wondered why people still send out those silly spam messages, you better sit down. Russian criminals netted over $830 million from spam -- or about $300 million more than the total sales of all 16,800 Dunkin’ Donuts and Baskin-Robbins stores across the world. Where’s a cybercop when you need one? The second cyberthreat vector we should look at is what we’d now call traditional cyberwarfare. Although the Russian government denies involvement, there’s a good case to be made that Russia has already deployed at least one effective cyberattack. In 2008, armed conflict arose between the country of Georgia (once a former Soviet republic) and Russia over South Ossetia, a territory that separated from Georgia back in the 1990s. Russia backed South Ossetia’s independence, a fact Georgia didn’t appreciate. The conflict was fought both in the meat-space battlespace and in cyberspace. According to the Wall Street Journal, Russian hackers attacked Georgia, taking down 20 Georgian Web sites including those of the national bank, the prime minister, and news organizations. According to WSJ, the attackers were thought to be Russian cybercriminals who stole U.S. credit card and identity information. The criminals then used those American identities to purchase access to botnet services, which were then aimed at Georgia. While Yevgeniy Khorishko of the Russian embassy in Washington stated, “Russian officials and the Russian military had nothing to do with the cyberattacks on the Georgian Web sites,” it is curious that these cyberattacks began just hours after Russia’s tanks began rolling. The third Russian cyberthreat vector is far more insidious. Russia has a number of well-known companies that play in the global market and provide what they claim is security software for global users. One such example is Kaspersky Labs. Kaspersky develops antivirus software, which means many American users put this
10
Kaspersky has an enormous reach. Market analyst Gartner estimates that Kaspersky ranks third in providing consumer antivirus software. It ranks fifth among those companies providing antimalware software for corporate users. Wired says Kaspersky sold nearly as much antivirus software as Symantec and McAfee -- combined. This may, in fact, be one of the world’s most blatant cases of the fox guarding the hen house. In June 2012, Wired ran an indepth expose of Kaspersky Labs, and, more specifically, of its founder, Eugene Kaspersky. Wired disclosed that prior to forming the commercial entity we know as Kaspersky Labs, Eugene Kapersky was a KGB-trained Soviet intelligence officer. Somehow, during a time in Soviet Russia when one didn’t ever leave military or intelligence service, Kaspersky was allowed to not only retire, but start his own software company in partnership with his former instructor -- a man who used to teach at the KGB’s own crypto academy. Inside the company, Kaspersky has developed a hacker team known as Global Research and Expert Analysis Team (or GREAT). GREAT has regularly teamed up with the FSB, Russia’s successor to the KGB. According to Wired, Kaspersky’s GREAT regularly trains and “assists” the FSB in its investigations. I’ve written previously about Stuxnet, the malware that was allegedly launched by the U.S. and Israel against Iran’s centrifuges. Whether or not it was advisable for the U.S. to launch such an attack, and indeed, whether such an attack was actually launched by the U.S. isn’t directly relevant here. But Kaspersky’s involvement is. Kaspersky’s teams were the ones that investigated and exposed three supposed U.S. cyberattack offenses: Stuxnet, Flame, and Gaus. It’s almost as though the company has a dedicated team tracing the national security efforts of the United States -- and exposing them. Strange, isn’t it? Undoing the United States national security and espionage efforts. That’s what the KGB attempted to do for all those years of the Cold War. It’s stranger still that both Kaspersky and Putin hail from a KGB background. Russia also has considerable access to American software secrets. Both Microsoft and Cisco embed Kaspersky code in their products. And, back in July 2010, I wrote in ZDNet, “Microsoft has turned over all its source code for Windows 7, along with its source for Microsoft Windows Server 2008 R2, Microsoft Office 2010 and Microsoft SQL Server to Russia’s Federal’naya sluzhba bezopasnosti Rossiyskoy Federatsii.”
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
You have to wonder, if Putin was running the United States, if he’d have allowed that to happen? Ah, well. Let’s add all this up. You’ll probably want to be sitting down. Here goes... We’ll start with Putin, the former KGB agent, who rose to almost unlimited power in Russia, and who has no love at all for the United States. We’ll mix in Eugene Kaspersky, trained by the KGB, who now “protects” nearly a third of all our PCs. We’ll add to that Kaspersky’s efforts to uncover and undermine U.S. national security efforts in the cyber arena, while at the same time having access to our operating system source code and having his code embedded in our networking protocols. Next, we’ll toss in the world’s sixth largest economy in terms of GDP (PPP) -- an economy that happens to have grown at an astonishing 6X rate in the space of 8 years. Combine that with an investment fund of over $4 billion that’s buying interest in, and control of, American technology companies. To that, let’s add a $4 billion cybercrime industry (doubling annually) in a country that doesn’t do anything without Putin’s tacit approval. Finally, let’s add Russia’s experience deploying cyberattacks concurrently with traditional battlespace attacks. Is Russia a cyberthreat to Western interests? I’ll answer that with a poster that was popular back during the Cold War era. It depicted a nuclear cloud with instructions on what to do in case of Soviet attack. Although the wording on the poster was a bit more scatological than what I’m about to tell you, the general meaning still rings true today. Is Russia a threat? Stick your head between your legs and kiss your assets goodbye.
About the Author
David Gewirtz is Director of the U.S. Strategic Perspective Institute, Distinguished Lecturer for CBS Interactive, Cyberwarfare Advisor for the International Association of Counterterrorism and Security Professionals, and IT Advisor to the Florida Public Health Association. Author of How To Save Jobs and Where Have All The Emails Gone? Read my blog at CBS Interactive’s ZDNet Government where tech meets politics and government Read my blog at CBS Interactive’s DIYIT for DIY tech projects and small business advice View my David Gewirtz CBSi Lecture Series to explore IT strategy, security, and competitiveness Read my DIY-IT Project Guide for insider secrets about all my projects Watch David Gewirtz TV for in-depth discussions with top newsmakers and innovators Personal site is at DavidGewirtz.com Company site is at ZATZ.com Twitter at @DavidGewirtz http://www.linkedin.com/in/davidgewirtz, Call me at (321) 722-4620 or (202) 642-5627
SAVE 20% OFF standard fees with promo code “IACSP_20” when you register by August 31!
Presents a training conference:
Globalizing Special Operations Forces SOF Aviation Focus Day December 3, 2012
Main Summit December 4-5, 2012
SOF Warrior Focus Day December 6, 2012
US Special Operations Forces are operating within a steadily increasing number of countries across the globe, and the size of its procurement budget shows no sign of slowing down. Now in its third year, IDGA’s flagship Special Operations Summit is THE premier end-of-the-year forum for updates and briefing on the progress of US Special Operations Forces (SOF) over the past year. This year’s main focus will be building and enabling a globalized Special Operations community in order to win the current fight against violent extremism.
Tampa, FL USA
Over
200
attendees in 2011!
Learn and network with 40+ outstanding special operations leaders, including: • Brig Gen Gerald Otterbein, Commander, 193rd Special Operations Wing, Air National Guard • COL Clayton Hutmacher, Commander, USASOC • COL Reginald Bostick, Commander, 4th Military Information Support Group (A), USASOC • Col Frank Donovan, Commanding Officer, 24th Marine Expeditionary Unit • Col Anthony Comtois, Commander, 919th Special Operations Wing, USAF Reserve Command • LTC Richard T Haggerty, Product Manager, SOF Training Systems For the most up-to-date speaker list and keynotes view the 2012 Brochure online or email idga@idga. org and we’ll send you a copy!
FREE ONLINE SPECIAL OPERATIONS DOWNLOAD CENTER
Discover top SOF priorities by going online to the free special operation download center and accessing exclusive interviews with past speakers, including: Look inside for details on the highly anticipated
Human Geography Focus Day!
Presents a training conference:
–
Michael D. Lumpkin, SES Principal Deputy Assistant Secretary of Defense, SO/LIC
–
Rear Admiral Norman Hayes USN Director of Intelligence, US European Command
–
Colonel Richard Samuels USAF Deputy Commander SOCAFRICA, US AFRICOM
Transforming Global “Shoot, Move and Communicate” Capabilities
Human Geography Focus Day: December 12, 2011
Benefit from comprehensive technical briefings on: ✔ Latest SOF needs and requirements for complex threat environments
✔ Irregular Warfare capabilities and strategic planning for SOF operations
✔ Global special operations and low intensity conflict ✔ Latest lessons learned from COIN and stabilizing operations in fragile states
Main Summit Days: December 13 -14, 2011
Wyndham Tampa Westshore Tampa, FL
Featuring distinguished keynote speakers such as: Michael D. Lumpkin, SES Principal Deputy Assistant Secretary of Defense SO/LIC Mr. Brian Detter, SES Deputy Assistant Secretary of the Navy Expeditionary Warfare Colonel Richard Samuels, USAF Deputy Commander SOCAFRICA, US AFRICOM Captain Mark Mullins, USN Deputy Director Navy Irregular Warfare Office Rear Admiral Sean Pybus, USN Commander Navy Special Warfare Command Commander Paul Giberson, USN Maritime Assessments Officer, J8 US Special Operations Command
Plus, hear program updates and reviews from representatives from SOCAFRICA, SOCOM, USASOC, AFSOC, NAVSOC, among others!
Sponsors:
www.SpecialOperationsSummit.com
1-800-882-8684 | info@idga.org www.SpecialOperationsSummit.com/IA
Opinion: IACSP Membership Perspective
Demonstrators are protesting against the reportedly heavy-handedness of New York Police Department (NYPD) and Central Intelligence Agency (CIA) on Muslim communities and neighbourhoods in New York, New Jersey and Pennsylvania, according to media reports. The protesters were joined by people affiliated with Occupy Wall Street. REUTERS/Andrew Burton
Muslims Under The Microscope By Friedrich Seiltgen
I
n New York City and neighboring New Jersey, the controversy continues to grow about the NYPD intelligence unit conducting surveillance on Muslims, their businesses, student organizations, and Masjid’s. New Jersey Governor Chris Christie and Newark Mayor Cory Booker are both angered by the NYPD conducting operations in their jurisdictions without their knowledge. Attorney General Eric Holder stated he’s “disturbed” about what he’s read about the investigations into Muslims and Islamic student organizations in New Jersey. The justice department has initiated an investigation into the tactics of the NYPD. It appears these entities are engaged in an increasingly growing turf war fueled by political correctness. The NYPD’s surveillance program has added fuel to the fire of Muslim mistrust with law enforcement. The Muslim community has already shown its displeasure with the NYPD over its name change investigations. According to
12
interviews and internal police documents obtained by the associated press, The NYPD monitors everyone in the city who changes his or her name. For those whose names sound Arabic or might be from Muslim countries, police run comprehensive background checks
that include reviewing travel records, criminal histories, business licenses and immigration documents. The goal is to find a way to spot terrorists like Daood Gilani and Carlos Bledsoe before they attack. Gilani, a Chicago man, changed his name to David Coleman Headley to avoid
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
suspicion as he helped to plan the 2008 terrorist shooting spree in Mumbai, India.1 Bledsoe, of Tennessee, changed his name to Abdulhakim Mujahid Muhammad in 2007 and, two years later, killed one soldier and wounded another in a shooting at a recruiting station in Little Rock, Ark.2
Muslim Surveillance The little known Demographics Unit of the NYPD was created to identify areas of the city where terrorists might set up shop for planning terrorist attacks. The unit created a reference database about the community, so that suspected terrorists could be more easily located within the community when flagged. The unit’s plain clothes officers would travel to the communities heavily populated with people from “Countries of Interest” and observe individuals. They would then flag subjects engaged in anti-American sentiment or violent rhetoric. At a mayors conference in Chicago, New York Mayor Michael Bloomberg defended the actions of the NYPD stating they have a “Daunting task” and must be perfect every day to prevent terrorism, adding the NYPD has stopped 14 separate attacks since 9/11. Both Bloomberg and Police Commissioner Ray Kelly have staunchly defended the program and the need for NYPD to conduct investigations outside of its jurisdiction. The surveillance program has also damaged the FBI’s ability to gather intelligence information. According to Michael Ward, director of the FBI’s Newark office, the NYPD has harmed the trust between Muslims and the FBI. Ward stated that “Now that trust is being challenged, those relationships (with the Muslim Community)
are being strained” “and the impact of that sinking tide of cooperation means that we don’t have our finger on the pulse of what’s going on in the community as well – we’re less knowledgeable, we have blind spots, and there’s more risk” Perhaps the lack of coordination on this program is a result of the Jose Pimentel investigation. Lone Wolf Terrorist Jose Pimentel was arrested on 11/20/11 as a result of a yearlong investigation and surveillance by the NYPD Intelligence Division.3 With this arrest, the NYPD thwarted another attempt at Jihad on American soil. Pimentel, a Dominican born U.S. citizen exhibited some of the mobilization patterns associated with Lone Wolves/ Homegrown Violent Extremists (HVE) during radicalization. Pimentel was angry over U.S. involvement in the Middle East, and the recent assassination of Anwar al-Awlaki. He converted to Islam in 2009 and went by the name Muhammad Yusuf. He had planned to change his name again to Usama Hussein in Honor of Usama bin Laden and Sadam Hussein. He maintained the website trueislam1.com from his apartment on which he posted articles advocating violence against US citizens. Pimentel reportedly wanted to travel to Yemen to undergo weapons training. In September, 2011, he started manufacturing IED’s from instructions published in the al-Qaeda inter-
net magazine “Inspire”, using components purchased at Home Depot, and local Dollar stores. He stated to an informant that he wished to use the IED’s to attack Police Stations, Police cars, Post Offices, and soldiers returning from the Middle East. Critics of the Pimentel arrest question the lack of involvement in the case by the FBI. The NYPD twice tried to get the FBI involved, but they declined as they felt Pimentel “didn’t have the predisposition or the ability to do anything on his own”.
Conclusion It is unclear as to whether the players involved are more concerned about the actual surveillance or the lack of coordination and notification. Governor Christie, Mayor Booker and their law enforcement chiefs as well as the FBI are right that they should be aware of operations conducted in the garden state. After all, New Jersey homeland security officials are not prone to leak information to terrorists like the Pakistani ISI. However, with the increase in state sponsored terrorism, and Lone Wolf plots, there must be cooperation and coordination between state, local, and federal entities in order to provide security against future incidents. We cannot have public safety jeopardized due to turf battles, politics, or political correctness. We cannot afford to wait until there’s another IED or active shooter incident such as Anders
Breivik or another smoking hole in the ground where a building used to stand before we act.
About the Author Mr. Seiltgen is a Master Police Officer with the Orlando Police Department currently serving in the Patrol Division. He is an intelligence liaison/ subject matter officer regarding officer safety, neo-Nazi, and Lone Wolf/ Islamic radicalization issues.
References: (Endnotes) 1 “A Terror Suspect With Feet in East and West” , New York Times, Ginger Thompson, November 21, 2009 2 NYPD Keeps Close Watch on Muslims Who Change Their Names , Associated Press, Matt Apuzzo and Adam Goldman 10/26/11 3 City Bomb Plot Suspect Is Called Fan of Qaeda Cleric, NY Times, JOSEPH GOLDSTEIN and WILLIAM K. RASHBAUM, 11/20/11
New York Mayor Michael Bloomberg defended the actions of the NYPD stating they have a “Daunting task” and must be perfect every day to prevent terrorism, adding the NYPD has stopped 14 separate attacks since 9/11.
An IACSP Q&A With
Ambassador Henry A. Crumpton:
The author of The Art of War: Lessons from a Life in the CIA’s Clandestine Service
I
U.S State Department’s ambassador-at-large and Coordinator for Counter-terrorism Henry A. Crumpton (R) shake hands with Pakistani Interior Minister Aftab Ahmed Khan Sherpao in Islamabad on May 4, 2006. Crumpton arrived in Islamabad for talks on the overall strategy in the war on terrorism, implementation and intelligence-sharing.
nterview conducted by IACSP’s Paul Davis, frequent contributor to The Journal Of Counterrorism & Homeland Security International Ambassador Henry A. Crumpton’s book recounts his 24-year career in the Central Intelligence Agency, including his efforts at the CIA’s Counterterrorism Center and his spearheading of the CIA’s paramilitary campaign against the Taliban and al Qaeda in Afghanistan after 9/11.
Ambassador Crumpton joined the CIA’s Clandestine Service in 1981 as an operations officer and for most of his career he served overseas, including assignments as Chief of Station. He served in Washington D.C. at the FBI as Deputy Chief of the International Terrorism Operations Section from 1998 to1999. He was Deputy Chief (Operations) of the CIA’s Counterterrorism Center from 1999 to
14
2001 and from 2001 to 2002 he led the CIA’s Afghanistan campaign. From 2003 to 2005 he was the Chief of the CIA’s National Resources Division. He left the CIA in 2005 and became the U. S. State Department’s Coordinator for Counterterrorism with the rank of Ambassador at Large. Ambassador Crumpton retired from government service in 2007 and he is the Chairman and CEO of Crumpton Group LLC, a global business advisory firm.
He received a B.A. in Political Science from the University of New Mexico and a Masters in International Public Policy, with honors, from Johns Hopkins University’s School of Advanced International Studies. Ambassador Crumpton is the recipient of the Intelligence Commendation Medal; the George H.W. Bush Award for excellence in counterterrorism; the Sherman Kent Award, in recognition of an
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
outstanding contribution to the literature of intelligence; the Donovan Award; and the Distinguished Intelligence Medal, the CIA’s highest award for achievement. Ambassador Crumpton was interviewed by Paul Davis, a contributing editor to the journal and an online columnist. Editor’s Note: The below interview took place prior to the attack on the American consulate in Libya
and the killing of the American ambassador and three others, and the mass demonstrations against America in Egypt and other countries in the Middle East. IACSP: Why did you write your book and how would you describe it? Crumpton: I wrote the book because I think the value of intelligence is going to grow and I think not just policy makers, but citizens need to have a better understanding of intelligence and a better understanding and appreciation of those who serve in the intelligence business. That’s fundamentally why I wrote it. I thought I had a responsibility as explained to me by my literary agent and others, including some former colleagues from government service. I would describe the book as a series of historical snapshots, by definition pretty narrow, because it is based on operations that I was directly involved in or people under my command were involved in, because I wanted to make sure that I wrote with a degree of authority and authenticity. But I thought a series of those historical snapshots, if you will, could serve as a way to convey the message and the education of the reader of that intelligence. IACSP: Former CIA director Allan Dulles wrote a book The Craft of Intelligence. Is there a difference between the craft and the art of intelligence in your mind? Crumpton: Yes, I think that art is really in the eye of the beholder
and that is one of the points I made in the book. It is also the responsibility of those, if you can stretch the analogy a little bit, that commission works of art, which is basically what consumers of intelligence have to do. So a lot of responsibility rests on them and that’s why I thought that it’s important and distinct from the craft. The craft in my mind is more operational. It is more about the execution of espionage and covert action, which is what Dulles focused on. I wanted to be able to go broader in terms of concept, because it is also about the consumer of intelligence, and they will increasingly have an important role, I think. IACSP: Considering the explosion in mass communications since Mr. Dulles’ time, do you think this is even more important? Crumpton: I think so. Look at what I described in some talks as the “expanding universe of ignorance,” there is so much out there that we don’t know and every day that universe gets bigger and bigger. One of the key aspects, in fact one of the critical
set, an agent, a foreign spy in this modern age? Is it harder or easier than say 30, 40 or 50 years ago? Crumpton: I think it is tough, but it has always been tough, which is why you have to have the right kind of people, the right kind of training and the right kind of support. But I think today is different, in that you have a greater variety of risks, particularly among non-state actors that are threats. Gaining access to these recruitment targets, if you will, is different. I don’t know if it is harder, but it requires a different skill set certainly. IACSP: Well, you are dealing with the terrorist community and religious fanatics. That has to make it difficult, am I right? Crumpton: Yeah, that’s true, but look at the terrorism and the insurgencies that were part of the Cold War. There was a great deal of risk there also. I think what complicates the target set today is that you have more of these non-state actors. They are operating on what I think is more and more a global battlefield and they
root causes and how do you have enduring solutions? I think that part of that has hindered our efforts. If you look just at stopping a terrorist attack, well, that’s a very tactical approach. I think we need to be much more strategic and I think that is where we’ve fallen short. We have done pretty well, I think, in the tactical, even in the operational, but not at the strategic level. IACSP: Is the strategic role one for the CIA and the military, or is that more for the White House and cabinet secretary level? Crumpton: Well, the White House, the Secretary of State, the Secretary of Defense and other policy makers have the responsibility to not only craft but to demand strategic intelligence. Then it is upon the CIA and others in the community to go and collect and provide the analytical judgments that inform strategic decisions. IACSP: A big part of your book covered an interesting point in history, with your leading the CIA’s fight in Afghanistan
Then it is upon the CIA and others in the community to go and collect and provide the analytical judgments that inform strategic decisions.
aspects of intelligence, is how you frame the questions. What are the requirements levied upon the intelligence collector and analyst? That is going to become harder and harder because there is so much out here and what is relevant to the consumer?
are moving with greater velocity and greater agility, so being able to pinpoint and fix these targets for recruitment or covert action is pretty complicated.
IACSP: Even with the Internet and 24-hour cable news networks there remains a good deal of misconception about intelligence work, partly due to works of fiction as well as nonfiction. How does a case officer recruit an as-
Crumpton: Well, that has been debated and will continue to be debated. Some people define it in narrow terms. How do you stop the next terrorist attack? I’d like to view it in broader terms. How do you get to some of the
IACSP: How do you define the craft or art of counterterrorism?
after 9/11. I interviewed former CIA officer Gary Berntsen, who served under you as commander of the CIA’s paramilitary team in Afghanistan, a while back and he spoke of General Tommy Franks’ refusal to send in U.S. Army Rangers at Tora Bora to capture or kill bin Laden. Do you know why? Crumpton: I talked to Gary and he and his men down range were adamant and very clear about their view of the need of U.S. troops. I passed this on to
people search for new solutions, whether it is Libya, Egypt or what is going on in Syria. the Director of the CIA and General Franks, and in fact I called General Franks the first thing the next morning. It was really a question of timing and resources and General Franks deferred, saying it would take weeks and it would require planning and these types of things. I maintained that we had to go immediately. Now, I can’t speak to the logistics requirements of the military, but it was really a question of more troops or timing. Unfortunately, I didn’t have any other choice but to tell Gary that there would be no troops, not any time in the near future, and we needed to go with what we had, which is what he did and he did a great job, along with some of the JSOC guys there on the ground. IACSP: In your book you write that Tora Bora, despite our not getting bin Laden, was a success. Crumpton: Absolutely. You had just a handful of CIA and military on the ground there, and with terrific and precise airpower, you wiped out hundreds of al Qaeda operatives. We gained an enormous intelligence advantage, pushed them out of their last major command and control center in Afghanistan, with no loss of U.S. life. It was of course blemished by the fact that bin Laden did escape, but overall I see it as a pretty remarkable victory. IACSP: I read that you’re a James Bond fan and count Sean Connery in the film Thunderball as an influence. So basically, like Blofeld in the Bond films, bin Laden got away, but all of his men were killed and the plot was thwarted. Crumpton: But thankfully, in the very last sequel, bin Laden did not get away. I am gratified by that. IACSP: Dropping CIA officers and military special operators behind enemy lines is a page right out of World War II. Were you influenced by World War II British SOE and American OSS operations when you planned your Afghanistan campaign?
16
Crumpton: Oh, sure. As a boy I grew up devouring the history of World War II, like Merrill’s Marauders in Burma and the exploits of the OSS in Europe. And more recently, if you look at what the CIA did with the Special Forces in Vietnam. There are some pretty remarkable success stories there at the operational level. IACSP: Do you foresee Afghanistan and Iraq becoming huge problems for the U.S. in the future? Crumpton: I’m particularly concerned about the influence of Iran inside Iraq and the lack of liberal institutions within the Maliki government. I see grueling violence and divisions there. Bear in mind, it is not just about democracy, it is about liberal democracy and that requires liberal institutions and they don’t have that in Iraq. The exception is up in the north, where you have some progress in Kurdistan. In Afghanistan, I think it is an issue of leadership, particularly at the grassroots level, and you have some good examples of that working and you have some examples of that not working. How we make that transition, I don’t know. I am concerned and I’m critical of the U.S. Government in their inability to project non-military power. We can secure a village or a valley and we’ve demonstrated that repeatedly in Iraq and Afghanistan. But to secure that with non-military power is a complete failure in my view. IACSP: Do you believe the Arab Spring will be a good thing for the Middle East, America and the world, or will it bring trouble and war? Crumpton: I think long-term it could be a good thing, because you are talking about the empowerment of people, and in time, the people are the grassroots for the liberal institutions that I talk about. However, in the immediate and mid-term, you will see more turmoil in the Middle East because of it. As these autocratic, corrupt regimes are overthrown and the
IACSP: Are we in a new Cold War with adversaries like China, Russia and Iran? Crumpton: I think Iran is in a separate category. I see Iran as an implacable enemy, the regime of Iran, anyway. I think the Iranian people are our best allies, when we think about a strategy. Most of the people, 60 plus percent of the population were born after the 1979 revolution. They are living under a brutal and corrupt and very cynical regime. I think there will be regime change. I just hope it will come soon enough. It will almost certainly be a bloody change. With China and Russia, I see there is much more opportunity than there is risk with either one of those countries. We need to find ways to engage with them and forge even more common ground. We have so many transnational threats and so much economic opportunity, really economic imperative, to work together that I hope we move in the right direction. At the same time, particularly with China, I understand that they are very nationalistic and very aggressive and we have allies in East Asia that depend on us. IACSP: One aspect of a Cold War is espionage, which is your specialty. We are certainly in an espionage war with Russia and China. Don’t you agree? Crumpton: Yes, that never went away, but I don’t see that going away after our Cold War victory. That is just an endemic fact of life in global politics. IACSP: Going back to the movie Thunderball, did you also read Ian Fleming’s darker, more complex spy thrillers as a teenager? Crumpton: Sure, I think I read all of Ian Fleming’s books as a youngster and I probably should go back and read again. IACSP: Are there any spy thrillers that you dislike? John le Carre, for example? Other CIA officers have stated their disagreement with le Carre’s moral ambiguity
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
in his thrillers, with there being no difference between the CIA, the British SIS and the KGB. What do you think of his worldview? Crumpton: I admire his writing ability, his craftsmanship, but I share your criticism about this moral ambivalence that he portrays. I reject that strongly. Another thing I disagree with is this long-term trend that portrays U.S. intelligence as an evil force, like we see in The Borne Identity and other films like that. I don’t understand the public’s fascination with that type of conspiracy mindset. IACSP: Looking back, what would you say were the lessons learned from your years in the CIA and the State Department? Crumpton: There are many. One would be the value of intelligence, particularly local intelligence. The late Speaker of the House, Tip O’Neil, a great politician from Boston, said all politics is local. So is counterterrorism. That is one major lesson. Two, going back to Thucydides in the Pelonnessian War, about the power of pride, prestige and honor, I think that is an enduring truth, and we need to wage war with that in mind. We failed to do that in the invasion of Iraq, as an example. Another lesson is the growing interdependence of state and nonstate actors in building coalitions to have enduring victories against these terrorist enemies. When we have been able to do that, like in Southeast Asia, that is pretty remarkable. Colombia is another good example. There are some case studies out there and we need to learn from them. IACSP: What areas do you see in future conflict? Crumpton: I think several parts of the Middle East, Libya, Syria, look what is going on over there. Look at the narco-insurgents, not only in Mexico, but they are spreading to West Africa. These are very vicious and well-funded - usually by U.S. consumers – and they are a nonstate enemy. I don’t think they get enough attention at a strategic level.
IACSP: Since 9/11, do you see the CIA, the FBI, the military, other government agencies, and even businesses, cooperating more? Crumpton: Oh, absolutely. I’m critical of our government, especially at a strategic policy level, but that does not diminish the great success operationally. Particularly, the CIA and the U.S. military Special Forces. It is more than cooperation or coordination, it really is integration. I would like to think that we contributed to that with our campaign in Afghanistan in 2001. IACSP: What do you think of the larger role Special Operations is playing in the war on terrorism? Crumpton: Yes, they bring skills and the power they can project. Where I am concerned, again, is the overreliance on Special Forces, absence the projection of non-military power. The military, God bless them, are trying to assume bigger roles than they
should because they want to get the job done and other parts of the government are not getting it done. That trend leads to a militarization of not just counterterrorism, but foreign policy. You can argue that the State Department in some cases is not getting the job done, but we need to rethink that. We need to reform the State Department and other agencies in the national security community to take some of that pressure off the covert action guys and the Special Forces. IACSP: Is America safer today because of the drones and the Hellfire missiles? Crumpton: I have no doubt that is the case. Not just in Afghanistan, but in other parts of the world where they have been employed. Particularly against the enemy leadership of al Qaeda and their affiliates. They are exceedingly disruptive and I’m confident that they have saved American lives and the lives of our allies.
IACSP: Towards the end of your government career, you moved from the CIA to the State Department. How did your role change? Crumpton: It was pretty dramatic. I went from a life of 24 years of clandestine operation, working undercover, to a very public role. I traveled all over the world representing the President, the Secretary of State and I engaged in dozens of media events. It was a pretty stark contrast. IACSP: Did you enjoy it? Crumpton: I did. I enjoyed working for Secretary Rice. I enjoyed the mission and I found out how important it was for us to listen to our allies. Also, I saw the challenges of building those networks with state and non-state actors around the world. What struck me was the complexity and the dynamic of the threat environment and the need for more allies. IACSP: Do you see the CIA as a
force of good for America and the world at large? Crumpton: Absolutely. I would not have spent 24 years of my life contributing to the CIA if I did not think so. IACSP: Any final thoughts? Crumpton: I’d like to underscore the growing value of intelligence, whether it serves law enforcement, the military, diplomats, covert action operatives, policy makers, and increasingly, the citizens. I think it is incumbent upon our citizens to understand intelligence, to learn about intelligence and support the intelligence community; much like our military is supported by our citizens. Also let me commend you and thank you for your efforts. You have a good publication and it is valuable. Keep up the good work. IACSP: On behalf of IACSP, thank you for your service and for talking to us.
The Growing Threat Of Terrorism In The Sinai By Leo Labaj and Bill Schaefer
18
The son (C) of Salafi Islamist Hisham al-Saedni sits next to his father’s body during his funeral at a mosque in Bureij refugee camp in the central Gaza Strip October 14, 2012. Two Gaza militants killed by Israel, one of them al-Saedni, were the most senior al Qaeda affiliates in the Palestinian enclave, with links to jihadi networks in Egypt, Jordan and Iraq, sources said. REUTERS/Mohammed Salem
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
S
ince the popular revolution that overthrew Hosni Mubarak in the early months of 2011 the world has witnessed a remarkable up swing in Salafi-Jihadist terrorism in the Sinai border region of Egypt and Israel. This violence has recently come to the attention of the general western media and US foreign policy apparatus which has declared, in the words of Secretary of State Clinton during a visit to Egypt that there is “the potential of jihadists and terrorists taking up an operational base in Sinai.” Salafi-Jihadi groups operating on the Egyptian-Israeli border create violence and destabilization that is debilitating and they are currently the most dangerous threat facing all states in the region — Egypt and Israel continue to be victims of terrorist violence, while Hamas and the citizens of Gaza continue to be delegitimized
Salafi-Jihadism is by no means a new type of Ideology, in fact it is most likely the typeset that one thinks of when thinking about Islamic Terrorism — a push back towards the principles and guidelines of life during the time of the Prophet Muhammed through the means of Jihad bis Saif, or Violent Jihad. Salafi-Jihadism is very similar to the ideology used by groups like Egyptian Islamic
to establish a Palestinian homeland, they are waging an all out International-Cosmic war in the name of Islam — Palestine is just one small battle in a very large war. Also, Salafi-Jihadi groups want to establish Sharia law in all of Palestine, and are completely comfortable using violent force against their own people to achieve these ends. This means the democratic approach taken by Hamas, Fatah,
recent years — since the battle of Gaza in 2007 — Salafi-Jihadi groups began operating completely independent of Hamas, and have now emerged as an alternative to the Movement. Operations like the kidnapping of Alan Johnston and the assassination plot against Tony Blair were conducted without Hamas’ knowledge, and were designed, in fact, to embarrass and delegitimize it. Aside
Since 2009 Hamas has spent a considerable amount of effort targeting and neutralizing Salafi-Jihadi groups — and frankly they have done a relatively good job. However, one group has been able to survive this brutal crackdown; they have remained operational — in fact they have only strengthened in numbers, support and organizational prowess. The group, Jeish Al Islam, has emerged as
However, in recent years - since the battle of Gaza in 2007 - Salafi-Jihadi groups began operating completely independent of Hamas, and have now emerged as an alternative to the Movement.
Jihad, and more famously AlQaeda. But, only since 2005 have we seen Salafi-Jihadi groups emerge as factors in the Palestinian struggle for statehood, as the Struggle has been dominated by Secular-Nationalist groups (PLO), MarxistNationalist groups (PFLP), and Islamic-Nationalist groups (Hamas). This is what differentiates Salafi-Jihadi groups from mainstream Palestinian statehood movements; they are not fighting Israel in order
and Egypt is seen by these groups as un-Islamic. To them Egypt, Hamas, Fatah, and Israel are all the same enemy. The first Salafi-Jihadi groups emerged around 2005 after the Israeli withdrawal of Gaza, and worked side by side with Hamas on operations, like the kidnapping of Gilad Shalit, but these groups were small, fractured and remained on the sidelines — perfectly happy to follow the lead of Hamas. However, in
from targeting the West and Israel, the Salafi-Jihadi groups attacked Palestinian business inside Gaza they deemed as too western. The schism between Hamas and the Salafi-Jihadi groups came to a point in 2009 when Jund Ansar Allah, a Salafi-Jihadi group, declared Rafah to be an Islamic Emirate. This prompted a violent crack down by Hamas that included an attack on a Mosque that held spiritual leaders of the SalafiJihadi movement.
the most dangerous terrorist group operating in Gaza. Jeish Al Islam was one of the first Salafi-Jihadi groups to emerge on the scene in 2006. A small team most likely lead by the group’s founder Mumtaz Dughmash infiltrated into Israel by way of underground tunnels and emerged above ground just across the the border from the Karem Shalom crossing. They attacked an IDF post from the rear, during the fire-fight two
members of the attack team were killed along with two members of the IDF. The team managed to grab one of the wounded IDF soldiers and drag him back across the Israeli border. The group from Jeish Al Islam then turned over the solider, Gilad Shalit over the Hamas authorities who held him until his release in 2011. Several weeks after the kidnapping, after announcing their establishment on online Jihadi forums, they struck again kidnapping two journalists. Within a matter of weeks
have dominated for decades. The Dughmash clan made its money and power through various activities both legal and illegal; they raised livestock and traded and controlled a lucrative transportation business. On the side, they extorted local businesses and smuggled arms and drugs, and were involved in enough illegal activities to earn them the nickname “The Sopranos of Gaza City”. Mumtaz started out working in a prison under Muhammed Dahlan in Preventative Security. After reaching the
The son of Salafi Islamist Hisham al-Saedni mourns during his father’s funeral in Bureij refugee camp in the central Gaza Strip October 14, 2012. Two Gaza militants killed by Israel, one of them al-Saedni, were the most senior al Qaeda affiliates in the Palestinian enclave, with links to jihadi networks in Egypt, Jordan and Iraq, sources said. REUTERS/Mohammed Salem
they had become a major player in the Gaza resistance landscape. Little is know about the founder of the group Mumtaz Dughmash, and much of what is available is riddled with rumors and hearsay. However, he was born in Gaza City in the neighborhood of Sabra. A neighborhood his family, the Dughmash clan,
20
rank of First Sargent, he left to join Hamas. He soon left Hamas as well in order to work for the Popular Resistance Committees. He first drew attention to himself after an attempted assassination of the Gaza Police chief. After quickly working through the ranks, he gathered a large following of members and the trust of his leaders. Anonymous
sources claim that he personally carried out the assassination of Moussa Arafat and the kidnapping of Manhal Arafat. Shortly before the kidnapping of Gilad Shalit, he left the PRC to establish his own group, drawing recruits from his time in PRC, Hamas, and from his relatives in the Dughmash clan. After the Battle of Gaza, Jeish Al-Islam moved to take advantage of a weakened Hamas, the result was all out gun fights throughout the streets of Gaza City. In addition, Jeish Al-Islam kidnapped BBC journalist Alan Johnston. This operation was designed to embarrass Hamas and show the true loyalties of the Jeish; as the ransom was not a demand for the release of Palestinian prisoners, but rather the release of an Al-Qaeda affiliated cleric held in London. The Jeish continued their activities focusing mostly inward —attacking a co-ed school and bombing a YMCA. But their constant fighting with Hamas led them to become it’s number one target, and the subsequent crackdown decimated Jeish Al-Islam’s ranks. Only a year and a half ago did Jeish Al-Islam finally make a resurgence. On New Year’s Eve 2011 they bombed a Coptic church in Alexandria that left 23 people dead. A few months later they kidnapped and murdered Italian peace worker Vittorio Arrigoni. Then, the revolution in Egypt and Libya created the perfect situation for a terrorist group. The already lawless Sinai region became a security vacuum, the police abandoned their posts, and because of treaties between Egypt and Israel the Egyptian military cannot patrol the Sinai. The bedouin of the Sinai have long been marginalized in Egyptian society and exposed the Salafi ideas. And with the
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
Sinai’s vast desert and cave filled mountains it provides a perfect place to headquarter a SalafiJihadi terrorist cell. On top of that, the influx of weapons from the Libyan revolution has spilled over into Egypt where one can buy a AK-74 for a few thousand Egyptian Pounds, has allowed Salafi groups to arm themselves to the teeth. It was only a matter of time for this perfect storm to hit land, and it did this summer. On August 6th, militants from Jeish Al-Islam attacked the Rafah border crossing manned by the Egyptian military, they killed 16 Egyptian soldiers before trying to cross the border into Israel. The Egyptian military quickly moved to neutralize any remaining Salafi-Jihadi cells in the Sinai. But reports by journalists un-affiliated with state run newspapers claim the security sweep was poorly run and did little to stop terrorist operations. The Sinai is still the perfect storm for terrorist operations, as discontent with Hamas and Israel grow and as the Bedouins of the Sinai continue to be marginalized in society the strength and influence of Jeish Al-Islam will grow as well. And they will remain one of the most dangerous terrorist groups in the Middle East.
About the Authors Leo Labaj is Director of Critical Infrastructure Protection at Security Management International, LLC. Retired from the Central Intelligence Agency, Mr. Labaj spent his career conducting counterterrorism operations throughout the Middle East. He can be reached at llabaj@smiconsultancy.com. Bill Schaefer is a Research Associate at Security Management International, LLC. He previously lived in Egypt and is a student at The George Washington University’s Elliott School of International Affairs. He can be reached at bschaefer@smiconsultancy.com
The Dangers of Casual Conversation: Targeting International Business Travelers through Elicitation By Luke Bencie and Katharina Werne
22
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
E
l i c i t a t i o n . A p l o y How It Works w h e r e a s e e m i n g l y The elicitation process starts normal conversation with the “elicitation operative” assessing the target. By asking is contrived to extract direct, yet subtle, open-ended information about the questions, the operative will usually assess the target in order individual, their work, or to determine if the target has actheir colleagues that is cess to valuable information and whether or not they can be comnot readily available to the public. promised. In some instances the casual encounter may actually
ourselves feel more important. In another scenario, the operative might tell us about himself or herself (women can actually be more effective than men) and we may feel the need to reciprocate out of politeness. We might feel the need to vent about our job or the people we work for. Whatever drives us to open up about our professional lives can have serious and unexpected consequences, which
Ask any Fortune 500 security director what keeps him or her up at night and most answers will entail corporate espionage and the difficulty of safeguarding business intelligence and intellectual property.
“So, what do you do?” How often have you been asked this seemingly innocent question on an airplane, at a dinner party, or some other random location where strangers might engage in conversation? You’ve probably even asked it to someone, yourself. Believe it or not, these five words have been the catalyst, which have derailed million dollar research and development projects, provided an increase in market share to business competitors, and even been instrumental in the financial success or failure of hundreds of corporations. The reason the question “So, what do you do?” is so powerful, is that it opens up a Pandora’s Box for business executives (particularly during travel) to disclose information that is of some intrinsic value to the person asking. Simply put, it is an invitation from business competitors, government intelligence services, and/or other types of nefarious individuals to get inside your head without
you realizing it. It is all part of the subtle technique for extracting information known as elicitation. Elicitation may seem like something out of a spy movie but it is actually more prevalent in the corporate world than one would imagine. In today’s hyper-competitive global business environment, any sliver of knowledge regarding a competitor’s intentions can be of extreme value. Ask any Fortune 500 security director what keeps him or her up at night and most answers will entail corporate espionage and the difficulty of safeguarding business intelligence and intellectual property. As a result, counter-espionage training courses for business executives have been steadily on the rise for the past decade. And don’t be fooled into thinking that it is just the international sales force or R&D scientists and engineers that require training… there are plenty of secretaries, administrative staff and field operations personnel who are equally targeted (often time with more success!)
be pre-planned. For example, the operative may learn that a business competitor is flying overseas on a certain date and will try to clandestinely reserve the seat next to him. Other times, the operative may just be canvassing a room – such as a trade show or convention floor – in an attempt to find an unsuspecting victim. The elicitation method exploits several fundamental aspects of our human nature. Most of us want to be polite and helpful, so we usually respond to questions honestly, even when posed by complete strangers. When presented to us, we tend to take the opportunity to show off what we know and we are usually tempted to say more than we should. Many other factors may be reasons for us to say something. We might want to retaliate when our opinion is being challenged - in order to convert the other person’s stance, or we may be working on something important and feel the need to share that information to make
can be hard to avoid unless one knows exactly what to look for.
Common Elicitation Scenarios There are several scenarios the elicitation operative may use to convince you that he or she is a reliable or acceptable source to share the information with. They may pose as a reporter desiring to write a story about you or your company. This might seem like a senseless reason to disclose information, but a surprising number of people have fallen for this trick… most in an attempt to have their fifteen minutes of fame! Often times, the only way people may notice that they have been “conned” is if time passes and there is nothing in print. By this point it is certainly too late. Another tactic may involve the operative pretending to be a government agent, running an investigation on either the company or a specific employee. Questioning from a government
official often times evokes fear (think IRS) in people to come
clean. Similarly, elicitation operatives may also often pretend to have their own business. They may ask to get to know you better for a potential partnership or better employment opportunity. When the potential to make money presents itself, the majority of people drop their guard. Another problem is that we tend to
more details about the project. One such method involved elicitation operatives, claiming to be college students, needing more information on the machine for their term papers. One employee received a phone call from an operative claiming to be an employee from another branch who needed the names of the people working on the project. Additionally, someone claiming to be from the local waterworks vis-
sessed for suspect reasons. Look for these tactics in the elicitation operative: • Flatters you into revealing things that should make you suspicious about why a complete stranger would take so much interest in you, your family and your work • Agrees with everything you say to a fault, always complimenting or sympathizing with you, or saying how interesting or intelligent you are • Engages in active listening and sustained eye contact that makes you feel like you are the
Conclusion When engaged in a conversation with a stranger (or even someone who is not a stranger), you should always ask yourself, “Am I being elicited? What is this person’s need to know?” Instead of handing out any specific answers you should resort to vague responses or try to change the subject. You can turn the conversation on the person by saying you “do not know”, or suggest that he or she “look it up online.” Ultimately, if you are not afraid to be honest or the operative is not giving up, be up front and say you “do not wish to discuss the sub-
One of the students ended up contacting the FBI, after the professor had asked her three times to expand her writing on the details of the company, including details about sensitive information.
weed out potential elicitators based on their ethnicity or gender. Take Ann Chapman for example. It is unlikely that anyone who saw the attractive redheaded model would have assumed that she was actually a spy for the Russian Foreign Intelligence Service. However, she was arrested in 2010 along with nine others and charged with conspiracy to act as an agent of a foreign government. It is this preconceived notion that a certain gender or ethnicity cannot possibly be a spy that has caused so many people to begin trusting and forming relationships with others when they were really being used for ulterior motives. Another notable incident was the Maytag case in the late 90’s where elicitation played a major role in the intellectual property theft that cost Maytag millions of dollars. Maytag had been planning to come out with a washing machine that was more environmentally friendly and, unlike previous washing machine models, would be designed so the loading door would be on the front instead of on the top to be more energy efficient. Rival companies used various elicitation techniques in an attempt to gather
24
ited a test subject, who was using the washer at his home. The supposed waterworks employee asked to take a look at the man’s laundry room but never got the chance due to suspicious behavior. Sometimes, elicitation doesn’t even have to be verbal… it can be written. One incident involved a university professor from a Southeast Asian country who taught a night class in Maryland. He asked his business administration students to write a paper on the company that they had worked for. One of the students ended up contacting the FBI, after the professor had asked her three times to expand her writing on the details of the company, including details about sensitive information.
How to Protect Yourself Well-trained operatives can effectively utilize elicitation as a probing technique by playing on human traits. They are expert at getting you to drop your guard and unwittingly divulge information you should not, while leaving you thinking, “Wow, what a nice guy.” Here are some telltale signs you’re being elicited and as-
only person in the room, and what you are saying is of the utmost importance Avoids answering questions or talking about themselves Repeats and summarizes what you’ve said as if studying or learning from you, rather than engaging in a simple, casual back-and-forth conversation Puts you on the defensive from time to time, compelling you to prove you are well-informed Poses leading questions or summations, or intentionally misunderstands, a topic in which you are more knowledgeable or expert, in an attempt to elicit proprietary intelligence Takes their time to thoughtfully respond after you have spoken Offers to pay for the drinks, perform a small favor, or even promises to send you a gift Asks for another get-together
ject at hand.” If an operative realizes you are not budging, you will most likely be left alone.
This is not to say that everyone with exceptional interpersonal skills is trying to elicit business intelligence and intellectual property from you, but it is important to remember that regardless of their motives, it doesn’t make a lot of sense to confide in a complete stranger.
Katharina Werner is a Research Associate at Security Management International, LLC and a current student at The George Washington University’s Elliot School of International Affairs. She can be reached at kwerner@smiconsultancy.com
• •
• •
• • •
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
So the next time you’re on an airplane and the person sitting next to you asks, “So, what do you do?” pause for a moment and reflect on how you are going to answer. You never know if they could be an elicitation operative out to steal your secrets.
About the Authors Luke Bencie is the Managing Director of Security Management International, LLC. He regularly teaches courses on corporate espionage and his new book Among Enemies: The Business Travelers Guide to Counter-Espionage is due out this year from Mountain Lake Press. He can be reached at luke.bencie@smiconsultancy.com
Homeland Security:
A Case For The Security Profession By Dr. Paulette Laubsch
26
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
T
he events of 9/11 changed the way Americans think about their safety and security. The terrorists brought to the country a feeling that we as a nation had not felt since the attacks on Pearl Harbor. Citizens mobilized to provide recovery efforts where the terrorist struck, the military was on alert and flying over the country as well as being ready to deploy personnel at a moment’s notice, and other sectors of the country were turning from operations as normal to a new sense of awareness that the world was not the same. A new term became part of the national lexicon … homeland security … that was on everyone’s mind. Although this term had been used in other places throughout the world, it was new to Americans who up until that time felt secure in their country. In the past decade, our fixation on the attacks has changed, but the emphasis on homeland security remains. The question presented is whether the field of homeland security can be classified as a profession. If it can be a profession, it is important to outline what steps need to be taken to move the field from a collection of diverse occupations to a classification of a profession. Both an institutional and individual view is needed to ensure the field moves toward a profession.
Background:
The first step is to determine what occupations are included in the homeland security field. The government publication “Many Jobs, One Mission” states that “people who work in homeland security anticipate, prepare for, prevent, and react to everything from pandemics to hurricanes to terrorism” (Jones, Summer 2006, p. 3). It is easy to state that the military is part of homeland security since individuals in the military are generally engaged in security issues outside the borders of the U.S. to
ensure our safety. The National Guard members have been more frequently deployed overseas and have also provided essential services to respond to natural disasters or security issues within and on our borders. First responders – law enforcement, firefighters, and emergency management personnel – have historically been called on to assist in periods of natural disasters. Major issues with illegal immigration have placed individuals employed in the Immigration and Customs Enforcement (ICE), including the Border Patrol, within the homeland security field. Less clearly defined are health care workers, especially those in hospitals and medical centers, who may need to react when bio-terrorism occurs or when residents are injured as a result of a disaster. There are also those who are responsible for the safety of our food and water supplies. In a world that has come to rely on computer technology, another significant area includes those who are responsible for ensuring the computer infrastructure is secure. There is also the transportation infrastructure that needs to be safe. This list
could be expanded to include private and other public occupations that work towards ensuring that we are safe and secure as a country. With such a diverse group of occupations, is there a way to develop the field of homeland security into a profession? To do this, we need to define what a profession is, that is to say what are its characteristics? We may want to start with describing the attributes of a profession. In 1957, Greenwood provided attributes of a profession when he stated that “all professions seem to possess: (1) systematic theory, (2) authority, (3) community sanction, (4) ethical code, and (5) a culture” ( p. 45). Schott (1976) focused the definition further to provide the characteristics in the public sector as “(1) lengthy training in a body of specialized abstract knowledge, and (2) a service ideal or orientation” (p. 253). Little needs to be explained about service ideal or orientation since in this area, there can be no doubt that individuals involved in the field are dedicated to providing services. When an emergency arises, these individuals
With such a diverse group of occupations, is there a way to develop the field of homeland security into a profession?
forsake their own safety to take care of the general population. They attempt to provide a level of service expected of the public even when the conditions are difficult. It is important to look at occupations and professions and how these can be related to the field of homeland security. According to Palin (2010), there are differentiations between occupations and professions. Professions have long period of education and apprenticeship. This is based on a common body of
those who use a specific designation, and the process for attaining that designation as well as methods for examining competency are the purview of such a body. These bodies are frequently called boards, and such a board may be charged with ensuring there is a code of ethics, conduct, or practice that is expected of all possessing that designation.
Accreditation: Within the field of homeland security, there have been efforts to increase professional-
specific standards that need to be met, and organizations seeking accreditation must assess their operations and ensure they are compliant with the applicable standards. Thus, the accreditation process reinforces a sense of community as well as appropriate behavior (www.calea.org). On an individual level, professional organizations have implemented certification programs for those in the area. An organization for security professionals, ASIS International, offers certificate programs as well as standards of behavior. In order to standardize the knowledge, there are numerous courses offered worldwide. The organization has a commission that oversees the expansion of the guidelines throughout the security profession. In addition, there is
The events have resulted in a collaborative process that has led to an interdisciplinary academic approach to the topic. The sciences and the humanities have worked together to develop integrated academic curricula for institutions of higher education.
knowledge and a way of thinking. Individuals also profess a self-sacrificing commitment to serving society, have shared ethical behavior, and are free to self-organize and self-regulate as a community. We may want to classify something as a profession when an occupation uses education and knowledge along with some regulatory processes to admit individuals into the field or to discipline them. The existence of community sanctions and a code of ethics is beyond the individual occupations. Occupations in question need to have some manner for authorizing appropriate behaviors and imposing penalties for behaviors that violate the norms of the community. Within some professions, there are statutes that govern professional activities. These are enforced by a professional body that possesses the responsibility for defining the standards that need to be met in order to be part of that profession. In some circumstances, the body licenses
28
ism within the various occupations included in that field. Some have developed an accreditation process. Various certificate programs are offered for individuals who may be in homeland security occupations. These programs are offered at the graduate and undergraduate levels through various colleges as well as through related associations. For college programs, courses are offered for credit through various schools, and in many instances, the certificates can be taken as stand alone course work or as part of a degree program. Other examples of certifications and a certificate process occur within the field. Associations and organizations have developed certificate or credentialing for organizations within their area. One of the most known example is the Commission on Accreditation for Law Enforcement (CALEA), a national body that has undertaken the accreditation of law enforcement agencies, public safety communication accreditation, public safety training academies, and campus security agencies. CALEA establishes
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
an Academic and Training Program Council that works to develop academic education and training in the field of security. It works with academic institutions and professional associations as well as government to develop programs and curricula in the area of security (www.asusonine.org). When conducting an online search for certifications in homeland security, there are different organizations that have undertaken the development of such certificates. The National Sheriffs’ Association, for example, has partnered with the National Domestic Preparedness Coalition to offer the Certified Homeland Protection Professional (CHPP) and the Certified Homeland Protection Associate (CHPA). A board with representatives from various first responder occupations as well as health care and medical professionals is responsible for review of requirements and ensuring those awarded the designation have completed a rigorous program and met the testing requirements (www.sheriffs.org).
Education and Training Systems: Training and education play an important part in developing a common base of knowledge within the homeland security field. Regardless of the level of study, from a practitioner’s view, there are some topics that are essential for a homeland security program. At the lowest levels of the occupations, training in specific operations is essential. This is where institutions such as police and fire academies provide the “nuts and bolts” of the operations. Individuals new to the occupation are acclimated to the basics of the job. Then, many move into the position with some on-the-job training. This period of time serves as their apprenticeship, which also indoctrinates them to the culture. A white paper, “Homeland Security Professional Education,” published in September 2004 for the Department of Homeland Security, offered comments on the Department’s professional education system that included “Homeland
Security should be thought of as a new, innately multidisciplinary profession” (p. 2). The study stated that the area of homeland security has risen to a distinctive academic discipline based on the attacks of 9/11. The events have resulted in a collaborative process that has led to an interdisciplinary academic approach to the topic. The sciences and the humanities have worked together to develop integrated academic curricula for institutions of higher education. Historically, the area of emergency management has been becoming more professional during the past three decades with a high growth in higher education programs related to knowledge needed by emergency managers (Blanchard, 2006). The curricula changed with the 9/11 attacks to include the broader homeland security issues. When any type of disaster occurs, it is at a local level. Although responses come initially from that area, disasters may require various levels of government to interact to address the issues. This collaborative process requires
an understanding of various governmental systems as well as how roles and responsibilities are established. Emergency management personnel see their roles as being response and recovery, whereas other homeland security personnel focus on the investigation of the scene and collect intelligence to capture those who are responsible. Each facet is important, but there is a need to immediately address the needs of the citizens. This involves developing a collaborative approach to dealing with such issues. This type of focus can be developed through a curriculum that includes academic theory and practical application. A historical perspective of coursework is also important within the area of emergency management. Without a road map of where we have been and the pitfalls that we encountered, we are likely to make the same mistakes. This historical perspective is generally multi-faceted, where we can look at different conflicts and their origins, or we can examine different legal and procedural changes made
All Armor. All The Time.
Armored SUVs
Armored Tactical and Riot Trucks
Armored Vehicles - From simple cargo transport to dignitary protection, we have the skills needed to manufacture or acquire the right vehicle for your needs. Military Vehicles and Systems - Whether you are looking for chassis up design and build, or are looking to protect systems on existing platforms, our people and skills will provide a quality solution.
www.heat-armor.com
1.773.938.1030
Armored Buses.
We provide the following products and services: Armored Passenger Vehicles Designed and Engineered Armored Solutions Fleet Management, Parts and Service Contract Production Training and Education
info@heat-armor.com
as a result of some type of disaster. For example, the Hindenburg crash eliminated hydrogen as a fuel source, and fires in some factories and public places changed fire codes. The biggest event in our minds – 9/11 – demonstrated construction issues, evacuation procedures, and
association as professionalization moves forward (Schott, 1976). Those in favor of learning through a defined curriculum as opposed to learning through experience start to form into professional associations. As this happens, there is tension between those who are
programs. There also are civilian education models within the Department of Defense, but these are not as comprehensive as the military or CBP (DFI International and MIPT, 2004). The discipline of homeland security is becoming more legitimized, and it has been divorcing itself from the previous studies of mainly political science and international affairs. As its own field of study, it is
needed for many of the positions included in the homeland security arena, and in some locations, community colleges partner with police and other first responder schools to share space. Assessment of the training programs required for the participants in these training programs has led to the awarding of college credit for such coursework. With this additional incentive, these efforts have resulted in higher numbers of first respond-
The training aspects provide the individual with how that person should act in a given situation, whereas the education develops the individual’s capacity to think about the questions or issues that should be identified relative to the situation.
firefighting processes. We can learn from these mistakes and continually improve what we do. Occupations within the area have various training programs. Law enforcement and firefighters, for example, have academies that teach specific skills needed for entry level positions as well as supervisory and management positions. The military has basic training for every inductee, and it also conducts training for specializations. From a historical perspective, occupations transform to a profession through specific stages. The initial step is the development of training programs and schools that focus on the needs of practitioners. Although initially established outside the framework of colleges and universities, there is a movement toward such an
30
progressive and desire this move and those who want to maintain the status quo. These associations clarify the boundaries for themselves, and then they push for recognition and possible licensing. The end of the process is the development of a code of ethics and a process to enforce such behaviors. With specific homeland security agencies, there are examples of professional development. For example, the U.S. Bureau of Customs and Border Patrol (CBP) has programs that provide training and education as part of employee and supervisory development. Different levels of training are also provided that span from new front line supervisors to upper level management and leadership. Similar training is found within the different branches of the military in their personnel development
important that the education of homeland security personnel and other collaborators help the participants to become better equipped intellectually to meet the goals of homeland security agencies, at whatever level they may be. Many in the field have had training that develops their skills, and formal education should build on such training. The training aspects provide the individual with how that person should act in a given situation, whereas the education develops the individual’s capacity to think about the questions or issues that should be identified relative to the situation. Thus homeland security education and training can be thought of as both an art and a science. In the field of homeland security, many community colleges throughout the country have as their mandate some occupational training. These schools provide the skill sets
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
ers completing associates degrees. Four-year colleges and universities tend to focus on education and not skill development, and in many areas, have developed articulation agreements with community colleges that transfer credit taken at the associate’s degree level toward a four-year degree. This means that the four-year institutions also recognize the completion of some skill training programs, such as the basic police training or fire academy courses. Many traditional undergraduate students may not find homeland security an area of interest, but there are large numbers of adult learners who may seek an undergraduate degree in a field in which they work. Some colleges that focus on this non-traditional group of students have found sufficient students to offer such coursework. Applied programs are best since they
provide theoretical linked with practical applications. When programs at the undergraduate level can feed into graduate programs in this area, students find intellectual stimulation as they are adding to their knowledge base. In the decade following 9/11, there was a significant increase in the number of college degree programs offered in areas related to homeland security. Some of these include areas of specialization or possible minors in the associates or bachelors degree levels. Additional offerings have been implemented that provide a bachelors or masters degree with homeland security as its major or concentration. A review of the curricula indicates a lack of core content across all programs. This needs to be addressed.
Recommendations: Once individuals become part of the organization, they get to obtain other knowledge. Although this can be part of the information process, community colleges and four-year colleges with bachelor’s degrees provide the theoretical basis for what is done and why. Here is where the common knowledge of the field is systematized, and to do this, we should add to our studies “The Commission on Terrorism Attacks upon the United States: The 9/11 Commission Report” (2004), which provides an assessment of the terrorists, and it also provides recommendations for the homeland security field. The 9/11 Commission Report (2004) indicated the lack of imagination and “thinking
out of the box” as related to possible scenarios. Many public agencies enforce programmed decision making processes, and failure to think of all of the alternatives is generally frowned upon. Katrina occurred because the levees were planned for hurricane forces less than a level 4 storm. There is a need to develop individuals thinking about different scenarios or alternatives to a situation. This “what if” type of thinking can be incorporated into a wide range of courses, but it is essential that critical thinking skills are included in future studies. The wide scope of homeland security means that executives in each specific occupation should become familiar with different disciplines that are included in this field.
There is a need to know some basic concepts in each area, and executives should be able to develop short term and long terms plans as well as be able to react to any crisis situation in which they find themselves. Since we are a nation of laws, these individuals need to have an understanding of the basis for our freedoms and laws, which includes the framework of our government, federalism, and our constitutional rights (Carafano, 2006). The U.S. Constitution is the basis for all of our laws, and although it has been in existence for over 200 years, it still guides what we do. Therefore, the study of the Constitution and how our laws and policies are implemented in relation to that document is essential. Of course, we do not live in isolation, so some knowledge
“IntellIgence Is vItal to National Security.”
James Green, Jr. | Intelligence and National Security Outreach Spanning an impressive 38-year career with the Central Intelligence Agency and the National Geospatial-Intelligence Agency, James Green is a respected leader and mentor. Having served as an intelligence officer, branch chief, senior recruiter and project manager, James knows about American Military University’s academic reputation. That’s why he joined AMU.
Learn More at www.amuonline.com/JOC Art & Humanities | Business | Education | Management | Public Service & Health | Science & Technology | Security & Global Studies AMU_JournalofCounterterrorism_1012.indd 1
10/16/12 9:46 AM
of international relations also should be included as part of the education of the homeland security executives. Educational institutions need to consider the needs of the homeland security agencies as well as the individuals who are involved in the process. Academic institutions need to collaborate with governmental agencies responsible for ensuring our safety and security and develop appropriate curricula. The agencies should serve as stakeholders of the institutions and provide input as to courses that should be considered. It is important that government does not dictate
course content, however. The need to introduce students to the practical workings of the occupations is paramount. Therefore, the implementation of internship opportunities that link the academic to experiential exercises would be beneficial. Individuals within the homeland security field need to ensure they are always employable and not just employed. This requires them to attain levels of proficiency that is proven through the awarding of a certification or designation and finally, a degree. It is important that these indi-
become part of the further education of those involved. Further training will be needed to hone the skill sets of those in the field. It is important that those who consider themselves as homeland security professionals think of the concept of continuous improvement as something they should consider for themselves. An indication of this is being awarded additional certifications or degrees that indicate that the individuals attained a level of knowledge essential for the profession.
About the Author Dr. Paulette Laubsch, Associate Professor of the School of Administrative Science, Fairleigh Dickinson University, is Director of the Master of Science in Homeland Security program. She has taught at the University for over 10 years. Prior to her University employment, she worked in the area of employment security, training, and education in New Jersey state government.
References • •
ASIS International. (www.asusonine.org). Blanchard, W. (June, 2006). FEMA emergency management higher education project update. Remarks made at the Emergency Management and Homeland Security/Defense Higher Education Conference. Emmitsburg, MD.
The need to introduce students to the practical workings of the occupations is paramount. Therefore, the implementation of internship opportunities that link the academic to experiential exercises would be beneficial.
viduals seek appropriate programs that will help them stay on top of the changing issues that are part of homeland security. As homeland security is becoming more of a professional, it is important for the field to continue to assess what is needed to maintain currency of knowledge for all those involved. This can only be accomplished through a collaborative process that involves agencies, associations, and the academic community. The theory linked with practical application can
32
• • • • • • • •
CALEA. The Commission on Accreditation for Law Enforcement Agencies. (www.calea.org). Carafano, J. (October 16, 2006). Missing pieces in homeland security: Interagency assignments, and professional accreditation. The Heritage Foundation, Executive Memorandum, No. 1013. DFI International and MIPT. (September 15, 2004). Homeland security professional education. A DFI-MIPT White Paper prepared for DHS Integration and Operational Staff. Greenwood, E. (July 1957). Attributes of a profession. Social Work, pp. 45-55. Jones, E. (Summer 2006). Careers in homeland security: Many jobs, one mission. Bureau of Labor Statistics: Occupational Outlook Quarterly. Palin, P. J. (May 2010). Homeland security: An Aristotelian approach to professional development. Homeland Security Affairs, 6(2), pp. 1-13. (www.hsaj.org). Schott, R. L. (1976). Public Administration as a Profession: Problems and Prospects. Public Administration Review, 36(3), pp. 253-259. National Sheriffs’ Association (www.sheriffs.org).
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
FLR2324AA2H1 178x254_Layout 1 24/09/2012 11:53 Page 1
Over 3900 students enrolled from over 75 countries
Apply early and SAVE!
The leading educational insight into the fundamental issues behind terrorism 16-week accredited online e-learning course or 4-week individual online e-learning modules
Commences
January, May & September
UK MoD ELC Scheme: 2035 | CAGE/NCAGE Code: U0G02 | CCR Registered: DUNS 232915728
Understand the threat...reduce the risk Visit www.terrorismstudies.com/FLR2324AA2H1 for prospectus
Key Issues in International Terrorism
Terrorist Ideologies, Aims, Beliefs and Motivations
Terrorist Modus Operandi
“
This training is by far the best I have experienced during my 27 years in the federal service and I will highly recommend it to my colleagues
”
Office of Security US Department of Energy
International Policing Policy
Aviation Terrorism and Security
Maritime Terrorism and Security
Critical Infrastructure Protection
Cyberterrorism
Radicalisation and De-Radicalisation
“
This has been one of the most enriching, beneficial courses I have taken in over 10 years. The opportunities to meld learnings from this course into my daily work communications has been amazing
”
Director, Partner & Asset Protection Starbucks
Study individual modules or four as part of the Certificate in Terrorism Studies. Download brochure for full details In partnership with:
www.terrorismstudies.com/FLR2324AA2H1 Email: info@terrorismstudies.com Tel: +44
(0)20 3377 3210 / +1 (646) 957 8929
Directory of Organizations
Offering Homeland Security and Counter Terrorism Curriculae. American Board for Certification in Homeland Security The ABCHS serves a diverse membership of professionals dedicated to the important mission of protection our nation. To become a member call 877-219-2519, email us at info@abchs.com or visit our website at http://www.abchs.com American Military University 111 West Congress St., Charles Town, WV, 25414 http://www.amu.apus.edu/public-safety BA & MA in Homeland Security; BA & MA in Emergency and Disaster Management; BA & MA in Intelligence Studies; BA & MA in Security Management; BS in Fire Science Management; BS in Information Systems Security. Bellevue University 1000 Galvin Road South, Bellevue, NE, 68005 http://www.bellevue.edu University offers more than 20 accelerated bachelor’s degree completion majors online, including Bachelor of Science degrees in Security Management, Criminal Justice Administration, Investigations, and Corrections Administration and Management. California University of Pennsylvania 250 University Ave., California, PA , 15419 www.calu.edu/go or call 724-597-7400
34
Master’s in Legal Studies/Homeland Security, Certificate in Homeland Security. Capella University 225 South 6th Street, 9th Floor, Minneapolis, MN 55402 http://www.capella.edu Pursue a homeland security career and help protect your country’s citizens, lands, and property. This specialization focuses on managing public security in conjunction with federal resources. Canadian Defence Academy PO Box 17000, Kingston, ON, K7K 7B4, CAN http://www.cda.forces.gc.ca Military education, defense and security. Center for Homeland Security University of Colorado at Colorado Springs UCCS Center for Homeland Security, Colorado Springs, CO www.chs.uccs.edu Graduate Certificate in Homeland Defense, Undergraduate Certificate in Homeland Defense. Center for National Security Law University of Virginia School of Law 580 Massie Rd., Charlottesville, VA , 22903-1789 http://www.virginia.edu/cnsl/ Various course on National Security Law; summer National Security Law Institute for law professors and government attorneys.
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
Center for Terrorism Law St. Mary’s University School of Law One Camino Santa Maria, San Antonio, TX, 78228 http://www.stmarytx.edu Terrorism Law Central Georgia Technical College 3300 Macon Tech Drive, Macon, GA, 31206, US http://www.centralgatech.edu Public/Private Crisis Manager Certificate, iploma and/or Associate of Applied Science Degree. Charles Sturt University Asia’s leading provider of counterterrorism, intelligence, and security education. Flexible entry requirements. Professionally relevant and academically rigorous: MA (Terrorism, Safety, and Security), MA (Intelligence Analysis), MA (Anti-Money Laundering-Countering Terrorist Finance), and MA (Emergency Management). Contact us for international delivery of customized intensive short courses available. Please visit us at: http://www.csu.edu.au/faculty/ arts/agsps/about-the-school CHDS http://www.chds.us/ The Naval Postgraduate School Center for Homeland Defense & Security (CHDS) has been the nation’s
WORTH LEADING
Doctor of Science in Civil Security Leadership, Management and Policy Jointly designated as a National Center of Academic Excellence in Security Studies by the National Security Agency and the U.S. Deptartment of Homeland Security, NJCU is proud to offer the first and only doctoral degree in CSLMP. For information on this and other graduate and undergraduate degree programs in our Department of Professional Security Studies, please visit njcu.edu/security. D.Sc., Civil Security Leadership, Management and Policy (CSLMP) M.S., National Security Studies B.S., National Security Studies
grad_dept@njcu.edu 1-877-NJCU-GRAD 2039 Kennedy Boulevard Jersey City, New Jersey 07305
Worth it.
premier provider of homeland security graduate and executive level education since 2002. NPS and the U.S. Department of Homeland Security are partnering to pioneer the development and delivery of homeland security education programs for governors, mayors and senior homeland security leaders from across a wide spectrum of disciplines. Everest University http://www.everest.edu The Homeland Security program includes: Civil & criminal justice, Emergency planning and security measures, Principles, planning and procedures of safety, Tactical communications, Domestic and international terrorism, Emergency medical services and fire operations, Business and ethics for security specialists. Command & General Staff College 100 Stimson Ave., Ft. Leavenworth, KS, 66027-2301 Command and General Staff College incorporates various aspects of homeland security and homeland defense into its core curriculum. richard.berkebile@us.army.mil Delaware Technical and Community College 100 Campus Drive, Dover, DE , 19904 www.dtcc.edu Associate Degree in Criminal Justice, Homeland Defense and Emergency Management. East Carolina University A-124A Brewster Bldg., Greenville, NC, 28758-4353 http://www.ecu.edu/cs-cas/securitystudies/ index.cfm Graduate Certificate in Security Studies, Harriot College of Arts & Science, Department of Political Science; Undergraduate Minor in Security Studies (Interdisciplinary) Emergency Administration and Planning University of North Texas 1155 Union Circle #310617, Denton, TX, 76203-5017 http://www.unt.edu/eadp UNT offers a bachelor’s degree in Emergency Administration and Planning. It also offers a Master’s and Ph.D. in Public Administration and Management (with a concentration in emergency management). Courses include Homeland Security, Disaster Response and Recovery, Hazard Mitigation and Preparedness. Fairleigh Dickinson University 1000 River Rd., H-DH2-13, Teaneck, NJ, 07666 http://fdu.edu/mas
36
Undergraduate certificate programs: Disaster & Emergency Management; Security & Terrorism Management; and Transit Safety & Terrorism Studies. Graduate certificate programs: Computer Security & Forensic Administration; Global Security & Terrorism Studies. George Mason University Dept. of Public and International Affairs, MS 3F4, 4400 University Dr., Fairfax, VA, 22030 http://pia.gmu.edu/grad/biod PhD Biodefense, MS Biodefense George Washington University 121 I Street, N.W., Washington, D.C. 20052 http://nearyou.gwu.edu/hs/index1.html Graduate Certificate in Homeland Security Emergency Preparedness This part-time graduate certificate program provides crisis, disaster and risk management expertise for persons engaged in or seeking professional careers in crisis, disaster and emergency management in the public, private and not-for-profit sectors. George Washington University 121 I Street, N.W., Washington, D.C. 20052 http://www.gwu.edu/ Graduate Certificate in Homeland Security Emergency Preparedness This part-time graduate certificate program provides crisis, disaster and risk management expertise for persons engaged in or seeking professional careers in crisis, disaster and emergency management in the Goodwin College 745 Burnside Ave., East Hartford, CT, 06108 http://www.goodwin.edu Homeland Security Greenville Technical College Critical Incident Management Institute (CIMI) 216 S. Pleasantburg Dr., Greenville, SC, 29607 http://www.gtbmc.com Professional Education and Associate Degree programs in various Public Safety, Emergency Healthcare, and Incident Response disciplines. Henley-Putnam University 25 Metro Drive, Suite 500, San Jose, CA 95110 http://www.henley-putnam.edu Henley-Putnam University is the only accredited (DETC) university that specializes exclusively in intelligence, counterterrorism and protection. We offer over 100 courses on topics such as covert actions, counterintelligence, counterter-
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
rorism and intelligence collection management. Iowa Central Community College 330 Ave M, Fort Dodge, IA, 50501 http://www.iccc.cc.ia.us Associate of Science/Arts in Criminal Justice, Diploma Certificate Jones International University 9697 East Mineral Avenue, Centennial, Colorado 80112 http://www.jonesinternational.edu Secure a better future. The four ISM courses in our MBA specialization are designed to provide realistic recommendations for improving the information security of an organization. Kaplan University 888 7th Avenue, New York, NY 10106 http://www. Kaplan.edu Kaplan University offers nine emphasis areas in the Bachelor of Science in Criminal Justice program: Forensic Psychology, Law Enforcement, Private Security, Fraud Examination and Investigation, Corrections, Crime Analysis, Crime Scene Investigation, Computer Crime and Homeland Security and Counterterrorism. Keiser University 1900 West Commercial Blvd., Fort Lauderdale, Florida 33309 http://www.keiseruniversity.edu/ Keiser University’s Bachelor of Arts degree in Homeland Security focuses on management-level skills needed in the critical field of Homeland Security. The program provides an understanding of essential management skills and addresses unique proficiencies needed to understand Homeland Security at the Local, State, and Federal levels. Topics include cross cultural management, emergency management planning and critical infrastructure protection. Long Island University 121 Speonk-Riverhead Road LIU Bldg, Riverhead, NY 11901-3499 http://www.liu.edu/homeland The Homeland Security Management Institute offers an accredited, 36-credit Master of Science degree in Homeland Security Management and a 15-credit graduate-level Advanced Certificate in Homeland Security Management, both delivered entirely online, with no in-residence component. Our rigorous curriculum focuses on the complexities of the homeland security enterprise, providing executives, managers and practitioners with exceptional professional education. Midway College 512 E. Stephens Street, Midway, KY, 40347 http://www.midwaycolleges.com Bachelor of Arts in Homeland Security Corporate Management and Assessment.
Enroll Now in FDU’s
Master of Science in
Homeland Security Flexible class formats and locations — including online and in-person at several NJ locations — let you earn your degree without career interruption. In the complex world of homeland security preparedness, experience counts. But when it comes to career advancement, your credentials make the difference. Our 36-credit Master of Science in Homeland Security is for law, public safety, emergency management and other homeland security professionals who want to advance in this fast-growing field. • Practical and theoretical focus on aspects of homeland security with an emphasis on leadership. • Network and learn with faculty and peers experienced in homeland security. • Choice of concentrations — Terrorism and Security Studies, Emergency Management and Leadership — to tailor the program to meet your career goals. • No GRE requirement.
Call today! Classes begin year-round.
For more information or to request an application, contact: Paulette Laubsch, DPA Program Director, MS in Homeland Security Phone: 201-692-6523 Email: plaubsch@fdu.edu Website: www.fdu.edu/mshs
one of the largest online undergraduate degree programs and was recently named a “Leading Southern University” by U.S. News and World Report. Saint Leo is also proud to be a leading participant in eArmyU. Montgomery County Community College 340 Dekalb Pike, Blue Bell, PA, 19422 www.mc3.edu AAS degrees in CJS, FSC, & EMP; Certificates in FSC and EMP; Individual courses. Also Police Academy and Fire Academy at Montgomery County Public Safety Training Campus. Naval Postgraduate School Center for Homeland Defense and Security 1 University Circle, Monterey, CA, 93943 http://www.chds.us Master of Arts Degree Program, Executive Leadership Program, Mobile Education Team (MET) Seminars. New Jersey City University Doctor of Science in Civil Security Leadership, Management and Policy Jointly designated as a National Center of Academic Excellence in Security Studies by the National Security Agency and the U.S. Department of Homeland Security, NJCU is proud to offer the first and only doctoral degree in CSLMP. For information on this and other graduate and undergraduate degree programs in our Department of Professional Security Studies. njcu.edu/security. grad_dept@njcu.edu 1-877-NJCU-GRAD New Jersey City University Northcentral University Center for Law Enforcement and Security 10000 E. University Drive, Prescott Valley, AZ, 86314 http://www.ncu.edu Bachelor’s, master’s and doctoral degrees, as well as certificates of advanced graduate study, in business and technology management, education and psychology. Specializations include Homeland Security, Criminal Justice, Public Administration, Organization. Norwich University 158 Harmon Drive, Northfield, VT 05663 Northfield, VT 05663 http://www.norwich.edu At Norwich, you’ll develop traits common among leaders in every profession discipline, integrity, confidence, critical thinking, adaptability, loyalty, and honor through a wide range of opportunities that will empower you in lasting ways you never imagined. Notre Dame College 4545 College Rd., South Euclid, OH, 44121-4293 www.notredamecollege.edu/professional_de-
38
velopment Certificate in Intelligence Analysis (Homeland Security) Certificate in Competitive (Business) Intelligence Penn State 222B Outreach Bldg. Penn State,University Park, PA, 16802 http://www.worldcampus.psu.edu Bachelor’s Degree in Forensic Science; Bachelor’s Degree in Security and Risk Analysis; Master of Geographic Information Systems; Master of Homeland Security in Public Health Preparedness; Master of Professional Studies in Forensic Science. Purdue University Purdue Homeland Security Institute (PHSI) Gerald D. and Edna E. Mann Hall Room 166, 203 S. Intramural Drive, West Lafayette, IN, 47907-1971 http://www.purdue.edu/DiscoveryPark/phsi/ Homeland Security Masters Area of Specialization Rochester Institute of Technology 31 Lomb Memorial Drive, Building 1, Suite 2210, Rochester, NY, 14623 http://www.rit.edu/cms Security Technology Management; Security Technology Policy, Law and Ethics; Managing Cyber Threats and Critical Information; Internal Organization Security Management; Examining Terrorist Groups. S2 Safety & Intelligence Institute 1261 South Missouri Ave., Clearwater, Florida 33756 http://www.s2institute.com/ Since 1998, the S2 Safety & Intelligence Institute has trained thousands of security, intelligence, and law enforcement professionals in critical public safety topics. With a staff of world-class instructors, S2 has earned a reputation as one of the nation’s premier sources for security and public safety training. We provide traditional classroom instruction and hands-on training at our two locations in Florida and at host locations throughout the United States. Through our sister company, the S2 Online Academy, we also deliver high quality distance education to students throughout the world. Saint Leo 33701 State Road 52, PO Box 6665, Saint Leo FL 33574-6665 http://www.saintleo.edu Founded in 1889, Saint Leo University offers
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
SIG Homeland Security 184 Columbia Turnpike, Suite 4 #103, Florham Park, NJ 07932 http://www.sighls.org The Certified Homeland Security Professional [CHSP] courses and certifications are designed to prepare and certify the next generation of homeland security professionals in both the physical and digital spectrum of the business. Southwestern College 2040 South Rock Rd., Wichita, KS, 67207 www.southwesterncollege.org Master of Science in Security Administration, Bachelor of Science in Security Management, Bachelor of Science in Criminal Justice, Certificate in Homeland. Stanford University Center for International Security and Cooperation Encina Hall, Stanford, CA, 94305-6165 http://cisac.Stanford.edu Fellowships in Science, Technology, and International Security; Pre-doctoral and Postdoctoral Fellowships in International Security; Interschool Honors Program in International Security. St. Clair County Community College 323 Erie St., Port Huron, MI, 48061-5015 www.sc4.edu/homelandsecurity Series 100-Understanding and Combating Terrorism; Series 200-Preventing, Identifying and Investigating; Series 300-WMD: Anticipation, Preparation, and Prevention for First Responders and Medical Personnel; Series 400-Investigating. St. Petersburg College 3200 34th Street South, St. Petersburg, FL, 33733 http://www.spcollege.edu/ac/ Associate in Science in Emergency Administration & Management; Bachelor in Applied Science in Public Safety Administration; Certificate in Emergency Administration & Management; Certificate of Homeland Security. Stanford University Center for International Security and Cooperation Encina Hall, Stanford, CA, 94305-6165 http://cisac.Stanford.edu Fellowships in Science, Technology, and International Security; Pre-doctoral and Postdoctoral Fellowships in International Security; Interschool Honors Program in International Security.
THINKING ABOUT
A DEGREE IN COUNTERTERRORISM OR INTELLIGENCE? THINK ABOUT
HENLEY-PUTNAM UNIVERSITY TERRORISM AND COUNTERTERRORISM STUDIES AT HENLEY-PUTNAM UNIVERSITY Sample of Available Courses: • Terrorist Techniques • Analysing the Terrorist Mind • Counterterrorism • Threat Assessment • Counterintelligence • Chemical, Biological, Radiological and Nuclear Weapons • Extremist and Terrorist Groups • Open Source Research • Ethics • Terrorist Operations • Terrorism and Society • Cyber/Information Security • Clandestine Communications • The Psychology of Fear
EARN YOUR B.S. OR M.S. ONLINE, LEARN FROM FACULTY WITH ACTUAL FIELD EXPERIENCE. Henley-Putnam faculty members have worked in strategic security positions in the military and/or in government agencies for an average of 22 years, making them uniquely equipped to share practical field expertise with their students. VETERAN CIA OFFICER … WMD TERRORISM SPECIALIST … DIRECTOR OF CORPORATE SECURITY, WORLD-WIDE SECURITY OPERATIONS … CHIEF OF INTELLIGENCE, GROUND FORCE DIVISION, OPERATION DESERT STORM … NATIONAL PROGRAM MANAGER FOR FBI COUNTERTERRORISM INVESTIGATIONS … STATE DEPARTMENT ANTITERRORISM SURVEILLANCE DETECTION TEAM…CLANDESTINE COLLECTION IN KOREA…HUMAN INTELLIGENCE AND COUNTERINTELLIGENCE ... ALL-SOURCE SENIOR INTELLIGENCE ANALYSIS, DEFENSE INTELLIGENCE AGENCY … NUCLEAR, PETROCHEMICAL, K-9 AND PERSONAL PROTECTION … PORT SECURITY SPECIALIST … FBI SUPERVISORY SPECIAL AGENT … THEATER SECURITY COOPERATION FOR SOUTH AND CENTRAL AMERICA … CIA CASE OFFICER ON COUNTERTERRORISM MISSIONS … FIELD WORK ON BOMBING, KIDNAPPING, AND MONEY LAUNDERING … TERRORISM INVESTIGATIONS AGAINST OSAMA BIN LADIN … FOREIGN SERVICE OFFICER … DIGNITARY PROTECTION OF AFGHAN PRESIDENT KARzAI … INTELLIGENCE OFFICER, DIA IRAq SURVEY GROUP … VETERAN UNITED STATES SECRET SERVICE … SECURITY SPECIALIST FOR THE DEFENSE LOGISTICS AGENCY PACIFIC … RESIDENT SPECIAL AGENT AT ANTITERRORISM OPERATIONS AND INTELLIGENCE CELL … SECURITY SPECIALIST FOR THE DEFENSE LOGISTICS AGENCY PACIFIC ... to
Get started today! Find out more:
Or call:
HENLEY-PUTNAM.EDU
+1
Accredited Member DETC www.detc.org
name a few.
(888) 852 8746 +1 (408) 453 9900
Syracuse University College of Law, Syracuse, NY, 13244 http://insct.syr.edu/ Institute for National Security and Counterterrorism Texas A&M University 200 Discovery Drive, College Station, TX, 77845-1185 http://homelandsecurity.tamu.edu Graduate Certificate in Homeland Security The Center for Continuing Studies, (UCONN) One Bishop Circle, Unit 4056, Storrs, CT 06269-4056 http://continuingstudies.uconn.edu/mps/programs/hsl.html In partnership with the Naval Postgraduate School (NPS) in Monterey, California, is offering a Master of Professional Studies degree with a Homeland Security Leadership concentration (MPS HSL). The New York Times Knowledge Network and Fairleigh Dickinson University 620 Eighth Avenue, New York, NY 10018 (212) 556-8300 www.nytimes.com/fdu Course: Business, Technology & Communication, Global Leadership, Cybercrime & Computer Forensics, Security, Safety, & Terrorism Studies, US Homeland Security Thomas Edison State College 101 West State Street, Trenton, NJ, 08608 http://military.tesc.edu Bachelor of Science in Homeland Security and Emergency Preparedness (approval pending, Oct. 2008); BSHS in Administration of Justice; BA in Criminal Justice; BSHS in Emergency Disaster Services; Graduate certificate in Homeland Security. Tiffin University 155 Miami Street, Tiffin, OH, 44883 http://www.tiffin.edu Bachelor’s in CJ; Associate’s in CJ; Master’s of Science in CJ. Towson University 8000 York Road, Towson, MD, 21252-0001 www.new.towson.edu/hsm Integrated HS Management Program. Tulane University School of Continuing Studies 125 Gibson Hall,
40
New Orleans, LA, 70118-5698 scs.tulane.edu/degrees_programs/homeland.htm Bachelor’s degree, minor, or post-baccalaureate certificate in Homeland Security Studies. A Masters in Professional Studies (MPS) in homeland Security Studies is currently under development. University of Denver 2201 South Gaylord, Denver, CO, 80208 du.edu/gsis/areas/homelandsecurity.html Master’s and graduate level certificate in Homeland Security. University of Hawaii West Oahu 96-129 Ala Ike, Pearl City, HI, 96782 http://www.uhwo.hawaii.edu Disaster Preparedness and Emergency Response (DPEM), Justice Administration, Public Administration, Health Care Administration, Forensic Anthropology, Security Administration. University of Idaho 1776 Science Center Dr., Idaho Falls, ID, 83402 http://www.uidaho.edu Emergency Management and Planning Certificate University of Maryland College Park, MD, 20742 www.start.umd.edu/education/ or www.publicpolicy.umd.edu/Int... Graduate Certificate in Intelligence Analysis; Graduate Certificate in Terrorism Analysis; Undergraduate Minor in Terrorism Studies; Critical languages study. University of Maryland University College 3501 University Blvd. East, Adelphi, MD, 20783 http://www.umuc.edu/homelandsecurity Homeland Security Management Program. University of New Haven 300 Boston Post Road, West Haven, CT, 06516 http://www.newhaven.edu/5924/ Undergraduate Programs -Criminal Justice (B.S.) (A.S.) -Forensic Science (B.S.) -Fire Science (B.S.) -Fire Protection Engineering (B.S.) -Fire & Occupational Safety (A.S. -Legal Studies (B.S.) (A.S.) Graduate Programs -Criminal Justice.
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
University of Southern California 3710 McClintock Avenue, Los Angeles, CA, 90089-2910 http://www.usc.edu/create National Center for Risk & Economic Analysis of Terrorism Events (CREATE) Executive Program in Counter-Terrorism. University of St. Andrews Certificate in Terrorism Studies Contact: Bob Sherwood, Terrorism Studies Consultant to The University of St Andrews St Andrews, Fife KY16 9AJ, Scotland Ph: +44 (0) 20 7017 5263 Robert.Sherwood@informa.com The University of St. Andrews, Centre for the Study of Terrorism and Political Violence, is offering a Certificate in Terrorism Studies. The Certificate is a transnational e-leaning course that provides individuals, the military, the police, as well as public or private sector organizations with an understanding of the latest terrorist thinking. Virginia Commonwealth U Room 301B Scherer Hall, Richmond, VA, 23284-2028, US http://www.pubapps.vcu.edu/gov/academics/ default.asp?ID=134 Bachelor’s of Arts in Homeland Security and Emergency Preparedness, Master’s of Arts and Graduate Certificate in Homeland Security and Emergency Preparedness. Walden University Phone: 1-866-492-5336 http://www.waldenu.edu Designed for professionals in the public, nonprofit, and private sectors, Walden’s online M.P.A. program offers collaborative online courses. You’ll interact with peers and faculty members who are active in government and nonprofit agencies. West Kentucky Community and Technical College 4810 Alben Barkley Drive, Paducah, KY, 42001 http://www.westkentucky.kctcs.edu/ West Kentucky Community and Technical ¬College offers two programs in Homeland Security/Emergency Management. One leads to a Certificate and the other to an Associate in Applied Science in Homeland Security/ Emergency Management. Wilmington University 320 N. DuPont Highway, New Castle, DE, 19720 http://www.wilmu.edu Criminal Justice Program
Shadow War:
Past Threats And Present Answers By Stanley I. White
42
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
O
n February 14th of 2012 Iranian agents accidentally detonated an improvised explosive (IED) during preparation inside a rented residence in Bangkok. The group was suspected of planning to attack Israeli targets located inside Bangkok. Following the explosion one of the agents, Saeid Morabi, fled on foot and attempted to hail a cab to facilitate his escape. When he was denied access to his cab he threw an IED at the cab, that bounced off of a nearby tree and exploded near him and blew his legs off. Other Iranian agents involved in the plot were later arrested in Malaysia. Further investigation confirmed that these terrorist agents had planned to attack Israeli targets in Bangkok.
During a recent training exercise that included federal agents, private contractors/consultants, state and local law enforcement personnel, the lead lecturer made the bold statement that the U.S. is currently entangled in a Shadow War with Iran that grows more intense each day. The U.S. finds herself entering a phase involving national security as it regards future battles against terrorist extremist. Two months after the Bangkok attack representatives from the U.S. State Department announced that the United States War on Terror was officially over due to the termination of Osama Bin Laden at the hands of the U.S. Navy SEALS and recent reports of Al Qaida’s weakened status. This report was met several weeks later with the announcement that the CIA thwarted an Al Qaida plot to bring down a U.S. airliner with a more advanced version of an underwear bomb. However, the remnants of Al Qaida and the other enemies of the U.S. such as Iran may not have drawn the same conclusion that the war is over. If the State Department has concluded that Al Qaida is no longer a threat, then the dark shadow of Iran continues to pose a threat to the security of the U.S. and her allies. Past and current examples of this threat are as follows:
used during the Civil War and so on. The modern age brought us the CIA , MI-6, the KGB but before these elite units were formed one group set the standard for accurate, aggressive and rapid intelligence gathering, they were known as Suppa, Rappa, Kusa, Shinobi and more commonly known as the ninja of ancient Japan. Throughout the turbulent history of this island nation these intelligence gathering agents of feudal Japan have been mischaracterized by everyone from the Kabuki theater to the screenwriters of Hollywood. Regardless of these portrayals the truth is simple: the ninja were neither predominately assassins nor blood thirsty mercenaries but elite masters of espionage who collected intelligence deep inside enemy territories. Their goal was to get in and get out without contact with the enemy. The shedding of blood through assassination or direct physical engagement was a last resort. True practitioners of this art were not driven by personal gain but the execution and completion of their mission to achieve the bigger picture.
If the State Department has concluded that Al Qaida is no longer a threat, then the dark shadow of Iran continues to pose a threat to the security of the U.S. and her allies.
• • • • •
1979 Iranian Hostage Crisis with 66 Americans held for 444 days Iranian threats against the U.S. and Israel Iranian trained militants and weaponry sent from Iran into Iraqi extremist during the U.S. and Iraqi War to launch attacks against U.S. forces and her allies Iranian quest for nuclear arms and continued testing of long range missiles Iranian agents tied to a thwarted assassination of a foreign diplomat in Washington DC
Incidents such as these and the Bangkok affair should be of concern to the U.S. and global intelligence communities. Prior to the 911 Attacks the USS Cole and the U.S. African Embassies were attacked by Al Qaida. This is a prime example of how what happens overseas can easily occur on our shores. What stands between
stopping the next attack and being caught off guard is aggressive intelligence gathering. The U.S. has ended the War in Iraq and pulled many of its resources out of the country and is presently drawing down troop levels in Afghanistan, these actions also result a reduction in rapid/accurate intelligence collection.
Throughout history good intelligence gleamed from people on the ground has made the difference in survival of nations. King Darius of ancient Persia utilized an advanced spy network called the Eyes and Ears of the King, the American Revolutionary forces used the Culper Spy Ring, the Pinkertons Detective Agency was
The average life span of people during this period of time was approximately 50 years of age. Training for ninja started as early as three years old. When operatives were in their early teens they were ready to operate in the field. Active agents varied in age from the teenagers to the elderly. One major misconception about the ninja involves their standard uniform, ninniku yoroi, a black outer garment with a black mask and a large sword attached to their back. The truth be told, the typical espionage agent of the time dressed to blend in with the general populace, disguised as peasants, beggars, merchants, priest
Joku-nin- is to deceive the target without them knowing they have been deceived. This relates to infiltrating a location and exiting without leaving any clue they were there. etc. The ninniku would be used at night on covert missions. The ninniku was generally either a dark blue or an earthen color to blend in with the night sky and surrounding environments. Their weapon of choice was a shorter sword called a wakizashi that ranged in length from 12” to 23” which was attached to their hip or thigh. These spy units recruited women as well as men at a
The ethos of these aggressive espionage networks still provides an excellent example for modern intelligence networks. Their focus and dedication to mission execution remains historically unparalleled by today’s standards. Although some of their tactics and weaponry are outdated in this modern age a majority of their strategic principles remain age-
The understanding and application of the previously summarized strategic principles is only part of the challenge. Sun Tzu in the “The Art of War “ stated a successful operative needs to know his enemy as he knows himself. The fact that you understand and know the strategies and tactics of your enemy whether engaged in a overt conflict or a shadow engagement is key to vic-
Progressive Surveillance - any combination of the above techniques used for a prolonged period of time. The Department of Defense recently released on January 15th, 2012 a report entitled “Sustaining U.S. Global Leadership Priorities for 21st Century Defense.” This document highlights the first mission of the U.S. Military in 2012 as the engagement of terrorism and irregular warfare. The knowledge of hostile surveillance and its various forms will be key not only for military personnel but also for law enforcement, security professionals as well as the general public now and forward
Shinmyoken-is the technique known as the “Divine Sword”. This entails being able to defeat the enemy without physical combat. This relates to the out maneuvering of them through deception as well as the ability to anticipate their next move and counter it without them even knowing what has happened.
time when woman were regarded as property. These female agents were called Konouchi. This recruitment of agents also extended across levels of social class that included peasants, priests, merchants, theatre actors/ street entertainers and even the elite Samurai class of that period. The Five types of operatives (Gokan) used during that time were: Local operatives (Inko no kan)- inhabitants of an area who are recruited to provide information on a target Inside operatives (Nairyo no kan)individuals very close to the target (inside their inner circle usually high level officials) Turned operatives (Hantoku no kan)- agents(spies) who have been retained by the target who are in turn recruited to be double agents Sacrificed Operatives (Shicho no kan)- operatives that are utilized knowingly or unknowingly only once for intelligence gathering Re-usable Operatives (Tensei no kan)- agents who are reliable and have not been corrupted and utilized numerous times
44
less. Below six of these principles are summarized as follows: Muga Mushin-is the ability to act and gain the trust of the target (the adversary) to achieve the stated goal while not losing one’s self in the mission. The ability to change as needed but not forget who you are and what is your purpose. Shinmyoken-is the technique known as the “Divine Sword”. This entails being able to defeat the enemy without physical combat. This relates to the out maneuvering of them through deception as well as the ability to anticipate their next move and counter it without them even knowing what has happened. Jogen nin- is the ability to create a false front that allows for the exploitation of the smallest gap in the enemy’s defenses. Jun-nin- gathering intelligence by getting as close to the target as possible via surveillance, infiltration of the target’s enter circle etc. Joei-nin- is a shadowing of the target without them even knowing you are present.
tory. The remainder of this piece will explore principles and tactics that terrorist operatives may deploy, these include surveillance of their selected targets, terror paradigm and the 8 phases of a terrorist attack. The definition of hostile surveillance can best be explained as the collection of field information on a potential target. These targets can range from an individual(s) of interest to nationally revered landmarks. There are 4 common types of surveillance generally utilized by terrorist operatives. They are as follows: Remote Surveillance- any form of information collection done at a location away from the potential target by utilizing libraries, open source intelligence, online mapping systems (i.e. Google Earth) etc. Fixed Surveillance- a form of information collection where the collector is in a static position either on-site or immediately adjacent to the potential target Mobile Surveillance- a form of information collection where the collector is mobile and utilize a motor vehicle, watercraft, bicycle etc.
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
from this moment. These professionals and the general public should also be familiar with two additional components utilized in a terrorist operations. These two components are the Terrorist Paradigm and the eight Phases of Terrorist Planning Cycle. The Terrorist Paradigm consists of three components. They are: Intent/Desire- the core goal and objective of the organization. Ability- the means to accomplish the goals of an organization. This includes, but is not limited to financing, weapons, training, staging areas means of communication, etc. Opportunity- the timing and the opportune moment to execute a planned terrorist attack. Removal of either one or more of these three will most likely prevent an attack on a potential target. The easiest component of the three to neutralize is opportunity. Opportunity can be removed through depriving the terrorist organization the ability to collect necessary information on a potential target. If a terrorist organization cannot obtain information on target access, security, staff etc.
then chances are slim to none they will attempt an attack and risk failure with the possibility of arrest. The Eight Phases of the Terrorist Cycle are as follows: The Cause- what the terrorist organization is fighting and willing to die for; their motivation. Initial Information Collection- the 1st stages of information collection in the field. This is usually performed by low level operatives (i.e. expendables) who do not have a thorough knowledge of either the organization’s plans or structure.
Rehearsal- the phase where weapons training/tests are performed (ie small arms training is accelerated and explosives devices are tested). Dry runs are also executed to test security and first response measures at the target site. This can take the form of either phoned in bomb threats or the abandoning of a vehicle as close to the target as possible. At this point surveillance is performed to document the response of security personnel. Execution- the actual attack.
Pre-Attack Surveillance- a second round of field information is collected by operatives usually higherranking members who now seek to refine the attack plan.
Escape and Exploitation- if the attack is not a suicide mission, then escape routes have been included in the attack plan. These routes most likely have been planned to get the operatives out of the country. Steps to generate as much media coverage will also have been put into place during the planning stage. This may include the filming of the attack as well as taking credit for the assault and threatening additional attacks.
Planning- the phase where the terrorist attack is finalized.
Law enforcement, security professionals and the general public must
Target Selection- that phase where several potential targets are narrowed down to one based on collected field information.
continually educate themselves with these previously- mentioned methodologies and tactics. A terrorist surveillance operative(s) will be most likely susceptible to detection during the following phases: • • •
Initial Information Collection Pre-Attack Surveillance Rehearsal
During these three phases there always exists the possibility of a surveillance operative(s) being burned by falling prey to one of the three most common weakness of every surveillance operation. The first of the three is time. A surveillance team always has a limited amount of time to collect field information, when they are conducting information collection in an area with some form of security. The second takes the form of barriers to access. These barriers can consist of restrictive points of egress (i.e. sign-in/checkpoint stations, receptionist areas), physical fencing, roving security patrols, security cameras etc. The final area takes the form of suspicious
behavior that may stand out to the general public and security. The most efficient manner to institute the above tactics and principles first starts with the acceptance that a significant threat exists, regardless of what political and media talking heads ramble on about on any given day. The fact that Iran and other extremist elements still threaten the National Security of the U.S. remains a serious issue that requires our constant attention. This attention will involve aggressive and rapid intelligence collection combined with proactive measures to thwart the future terrorist actions of our enemies.
About the Author Stanley I. White is a private sector Safety Officer and a defensive tactics instructor who has trained personnel from numerous law enforcement agencies. He is a lifetime IACSP member and serves as their Counterintelligence Advisor. Mr. White has over 29 years of martial arts experience, holds several black belts and is also a Ninpo Taijutsu practitioner.
War With Iran
By Danny Dickerson
T
Iranian military personnel stand on a submarine during a naval parade on the last day of the Velayat-90 war game in the Sea of Oman near the Strait of Hormuz in southern Iran January 3, 2012. Iran will take action if a U.S. aircraft carrier which left the area because of Iranian naval exercises returns to the Gulf, the state news agency quoted army chief Ataollah Salehi as saying. REUTERS/Jamejamonline/Ebrahim Norouzi
here will be no diplomatic solution with Iran: The illusion that ‘diplomacy’ can accomplish anything worthwhile with the Islamic Republic of Iran will only intensifies the mullahs’ conviction that killing Americans is divinely sanctioned and a winning strategy.1
Daily, the world’s press reports of the possibility of war with Iran without understanding that Iran has been at war with the world since 1979. Tehran does not share the dreams of the West; they dream of global conquest and domination and they believe they are winning. This is a regime that embraces “destruction, pestilence and wars in a deliberate clash of civilizations with the West.”2 To date, political and military leaders, journalists, and experts have focused on U.S. and Israeli capabilities in either a limited air and naval strike or a full invasion of Iran. These discussions have centered on a war that would last no more than three weeks, considering the inadequacies of Iran’s air and naval forces. U.S. naval forces would clear the sea of any naval threat while fighters and bombers would destroy key Iranian targets. These tactics were successful initially in Iraq and Afghanistan, and then the U.S. forces became bogged down by an enemy who refused to fight by the Western concept of warfare. In Iraq and Afghanistan, the U.S. used modern weapons and tactics against an enemy who used low-tech weapons and asymmetrical warfare, and was able to exhaust the will of the American people. With Iran, the U.S. is facing an enemy who can use high-tech weapons, is capable of fighting on more than one front, and has prepared for a war of attrition. While the U.S. and Israel begin preparations for war, Iran has already prepared. For the last three decades, Tehran has sent members of the Revolutionary Guard and Quds force to every insurgency in the Middle East. Military leaders in the Iranian Revolutionary Guards and Quds Force studied how the U.S. and Israeli militaries fought and, combining this knowledge with the Chinese concept of the Assassins Mace, and the
46
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
strategy of Jihadi Concept of Fourth Generation Warfare, developed a strategy that centers on deterrence, asymmetrical warfare and attrition. The war in Iraq and Afghanistan has demonstrated some of the difficulties in fighting two wars at the same time. During the 2006 conflict in the Levant, Iran’s proxy Hezbollah executed a form of hybrid warfare that combined well-trained conventional forces, unexpected new weapons and tactics, and masterful exploitation of the information environment.3 To present a war with Iran as “the kind of war the United States excels in fighting” ignores the lessons of the country’s new style of hybrid warfare demonstrated in Lebanon in 2006.4 When Israeli forces entered southern Lebanon, they were prepared to fight the type of war they had trained for; however, as the popular adage of military strategist’s states, “the enemy gets a vote.” Hezbollah did not choose to fight on Israel’s terms, and neither will Iran fight on our terms. With this mindset and preparation, Iran has the best strategy of any opponent the U.S. has faced in several
decades. Iran cannot defeat or completely stop a conventional attack, but it can make such a war too costly. In a recently published study by the Center for Strategic International Studies, titled Analyzing the Impact of Preventive Strike against Iran’s Nuclear Facilities, the authors stated a strike on Iran won’t involve a few sorties flown by air force and navy jets, or several cruise missiles aimed at strategic targets. To set back Iran’s nuclear program would require massive and repeated attacks by bombers and fighter jets, commando raids within the country, enough interceptor missiles to ring Iran, the majority of the U.S. carrier fleet and the logistical support to sustain successive operations over a two year period.
Iran possesses the largest ballistic missile inventory in the Middle East, which threaten all of the Middle East and Eastern Europe. These missile forces are comprised of mobile launchers that can launch and then relocate to a new location, making detection and any retaliatory strike difficult, as witnessed during the Iraqi war. Iran has chemical and biological weapons capability: “Iran has all the technology needed to produce sophisticated biological weapons. Obviously, chemical and biological weapons would dramatically increase the number of casualties Iran could inflict.”6 Missiles situated along the Gulf of Hormuz have been fitted either with chemical or biological warheads with the intent to remove a U.S. ship from combat by contamination. Further, cargo vessels have
Missiles are part of Iran’s asymmetric warfare doctrine – they are intended to inflict as much damage as possible but, more importantly, create the greatest amount of fear. Iran’s ballistic missiles could target Israel, U.S. forces in Iraq and Afghanistan, as well as in the Gulf region, and member countries of the Gulf Cooperation Council, who would be U.S. allies in this war:
With the opening shot, the world’s economy will be the first casualty, given the almost certain rising costs of crude oil and the uncertainty for future supplies. Reducing long term economic effects to the world market, the U.S. would have to clear the Gulf of Hormuz of any and all threats from Iranian defenses as quickly as possible despite the risks. The Strait presents severe limitations for the U.S Navy due to its shallow depth and narrow width and Iran has expanded its military capabilities along the only route any naval vessel could take. The majority of Iranian defenses are deployed along key shipping channels in the Gulf and islands in the Strait of Hormuz. Iran can launch antiship cruise missiles from mobile launchers (some of which are on flatbed trucks) from the shore, and missile sites placed on the islands in the Persian Gulf, in hardened and concealed tunnels, bringing the sea lanes in the Gulf of Hormuz within range.5
been equipped to launch short-andmedium range Scud-type missiles. These vessels have been stationed in the northern Persian Gulf and the Strait of Hormuz.7 Missiles are part of Iran’s asymmetric warfare doctrine – they are intended to inflict as much damage as possible but, more importantly, create the greatest amount of fear. Iran’s ballistic missiles could target Israel, U.S. forces in Iraq and Afghanistan, as well as in the Gulf region, and member countries of the Gulf Cooperation Council, who would be U.S. allies in this war: “Missile systems (principally the Shahab 3 variants and Sejjl types) allow Iran to strike targets throughout the Middle East, including population centers, military facilities, oil infrastructure and U.S. forces based in the region.”8 Within Iran’s arsenal are the latest underwater mines (free floating, magnetic, acoustic and rocket propelled) from Russia and China, though not in numbers sufficient to assure the closure of the Strait, these
are still a concern for military and civilian vessels. In addition, Iran could deploy these mines in other strategic locations where there would be less chance of discovery and a greater chance of sinking a tanker or navy vessel. Iran’s submarine fleet consists of 6 Kilo- class (diesel) and 19 Ghadir class (midget) submarines, all of which carry anti-ship missiles, torpedoes, and are capable of laying mines. The Ghadir class is designed for the shallow waters of the Gulf and almost invisible to underwater
detection. The Kilo-class can deploy as far as the Gulf of Oman, Red Sea or Indian Ocean and has been equipped with “noise dampeners”, further reducing their underwater signature. The presence of the Kiloclass submarines extends the range of Iran’s strike capability. China and Iran have been constructing a series of strategically placed harbors, in the Indian Ocean, partially for independent strategic reasons but equally to ensure maritime commerce in oil, gas, other licit resources, and illicit technologies between both
An Iranian long-range shore-to-sea missile called Qader (Capable) is launched during Velayat-90 war game on Sea of Oman’s shore near the Strait of Hormuz in southern Iran January 2, 2012. REUTERS/Jamejamonline/Ebrahim Norouzi/Handout
to overwhelm larger slower moving ships throughout the Gulf.”
nations can continue uninterrupted.9 Two of these ports, one located in Pakistan and the other in Sri Lanka, could offer tactical assistance to Iranian submarines on missions outside the Strait of Hormuz.
In a sea battle, Iran would use swarming and hit and run tactics with its large fleet of fast attack boats armed with the C-802 anti-ship cruise missile, as well as mines, submarines and suicide boats. Iran’s intentions are to drag out
This begs the question whether Iran could close the Strait of Hormuz: “The Iranians have invested in capabilities that could, in fact, for a period of time block the Straits of Hormuz. We’ve invested in capabilities to ensure that, if that happens, we can defeat that. And so the simple answer is, yes, they can block it”12
stated that Iran could seek to create perpetual, low-grade instability in the strait, mostly through asymmetric means, with the objective of making it an aquatic no-man’s land. Iran plans to fight the U.S. asymmetrically at sea, using hit and run attacks with sea and land-launched anti-ship cruise missiles, mines, mini-subs and suicide boats. In almost no scenario can Iran destroy the U.S. Navy--it just doesn’t have the naval strength--but Iran could possibly
Washington has to decide on a course of action that promises the U.S. the greatest chance of, not just winning, but surviving the coming conflict.
Presently, Turkey, India, and Pakistan aren’t seen as willing to become involved in a war with Iran. There is a “however” to this. If authorities in Pakistan see an advantage to their political position in the Middle East, then, unofficially, that government would involve itself with the Iranians. Unconfirmed sources have indicated that several Iranian civilian freighters have been converted to submarine tenders which could refuel and resupply the Kilo-class submarines in the Indian Ocean. The final threat facing U.S. naval forces are fast attack boats. Iran has a fleet, estimated between 3,000 and 5,000, of fast attack boats, capable of carrying anti-ship missiles and laying mines. Iran has conducted numerous naval exercises involving dozens of fast attack boats and cruise missiles in a tactic called “swarming.” This naval exercise’s using patrol boats exclusively have become a matter of great concern to the Pentagon and the U.S. Navy. Recognizing Iran’s buildup of fast attack boats, the Pentagon conducted simulated war games in which Iran would use these swift boats to attack a naval carrier group. Using “swarming” tactics, Iran was able to defeat the U.S. Navy in every exercise: “The sheer number of the speed boats involved overloaded their ability, both mentally and electronically, to handle the attack.”10
48
the conflict and inflict the maximum number of causalities.11 The southern coastline of Iran is an ideal staging area for hit-and-run tactics and stealth operations, allowing Iran to conceal this fleet anywhere along this coastline, emerging to attack using missiles or torpedoes. Michael V. Rienzi’s article Iran’s Response to a U.S. Attack in the Small Wars Journal, supports this theory: “While Iran has added some of these [capital ships] recently, the majority of their buildup has constituted mostly of small boats that are fast and capable of firing lethal missiles, including cruise missiles. They have built up these forces partially through
While the U.S. and its allies are attempting to destroy Iran’s military capabilities through conventional methods of warfare, Iran will shift to a long war of endurance, using every possible means to make continuing the war against Tehran unaffordable. Through a combination of submarines, missiles, and fast attack boats, Iran could play a game of hit-and-run with the U.S. navy and allies vessels. According to Gariborz Haghshenass, in a 2008 study based on published doctrines of the Iranian Revolutionary Guards, Iran aims to exploit enemy vulnerabilities through the use of swarming tactics by well-armed small boats
A rocket fires from a military boat during Velayat-90 war game on Sea of Oman near the Strait of Hormuz in southern Iran December 30, 2011. REUTERS/Fars News/Hamed Jafarnejad
acquisitions of Chinese missile boats and Chinese C802 anti-ship cruise missiles and torpedoes. Iran’s use of fast attack crafts have a history of success; during the Tanker Wars in the 1980’s Iran used swarming techniques
and fast-attack craft, to mount surprise attacks at unexpected times and places which will ultimately destroy technologically superior enemy forces. Reza Sanati, in an analysis published by the Tehran Bureau/PBS Frontline website
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
inflict thousands of casualties in a short period of time.13 A 2009 study prepared for the Naval War College warns of Iran’s increasing ability to “execute a massive naval ambush” in the Strait of Hormuz, a narrow waterway dotted with small islands and inlets and perfectly suited for the kind of asymmetric warfare preferred by Iran’s commanders. “If the U.S. chooses to station warships in the Strait of Hormuz during the buildup to conflict, it cedes the decision of when to fight and allows the fight to begin in the most advantageous place for Iran,” wrote the study’s author, Navy Lt. Cmdr. Colin Boynton. “This could lead to a devastating first salvo on U.S. Navy warships, which would most likely be operating under restrictive rules of engagement.” With the U.S. and its ally’s attention on Iran and the Strait, Iran could bring more pressure on the world’s economy by expanding its operations. The Strait of Hormuz is one of three chokepoints for the transit of crude oil from the Middle East to overseas markets. The Suez Canal and Bab el Mandeb are the remaining transit chokepoints, vulnerable to an attack either from sea or land. These are areas that Iranian submarines or fast attack boats could attack oil tankers using cruise missiles, torpedoes or by laying mines. Iranian commandos could attack tankers passing
through these chokepoints with missiles smuggled into that country: “Iran has a highly-trained 5,000 person strong marine unit that can carry out extensive raids against gulf shipping... or other countries.”14 One attack on an oil tanker, regardless of how successful, would drive the world’s economy into a tailspin. Iran is prepared to fight an unconventional war, not just in the Gulf, but throughout the Middle East, Europe, and the U.S. According to Danielle Pletka, a defense expert at the American Enterprise Institute, Iran has the capacity to attack, from Argentina to Venezuela, in Europe and throughout the Middle East. It seems naïve to believe it does not have the capacity to launch attacks in the United States.” Iran has been preparing for decades for conducting a war within the U.S. Through its terrorist camps in Venezuela, Nicaragua, and Mexico, its working relationship with the Mexican Drug cartels, and Latin American gangs, Tehran has been able to insert hundreds, if not thousands of sleeper agents throughout the U.S., all of whom are waiting for orders to conduct terrorist attacks. The Aurora theatre shooting is still in the minds of most Americans. Multiply this event by 1,000 occurring at shopping malls, restaurants, schools, hospitals, anywhere groups of vulnerable civilians gather, across the country over a period of days, weeks, or months. The attackers would be in groups averaging from one to three persons, using weapons bought on the local market or smuggled in from Mexico. From the federal to local level, no agency is presently prepared to respond, much less prevent, such an occurrence and the effects on our society and economy would last for years. Kevin L. Perkins, deputy director of the FBI, told a hearing of the Senate Homeland Security and Governmental Affairs Committee that the agency considered Iran’s assets a “serious threat….Quds Forces, Hezbollah and others have shown they both have the capability and the willingness to extend beyond that (Middle East) region of the world and likely here into the homeland itself.” With all this, Iran may have the crown jewel in its arsenal to use against the U.S. and Israel. Could the U.S. be attacked in such a way that it would be instantaneously removed as a world
power? In the case of an electromagnetic pulse (EMP) attack, the answer would be YES. An electromagnetic pulse is a quick, powerful blast of electromagnetic energy created by a nuclear detonation. The pulse affects electronics, but does no harm to human or animal life or any structures.15 Russia, China, and North Korea have tested EMP weapons, with Russia assigning these weapons to the forefront of their nuclear arsenal. It is believed that Iran possesses such weapons and is prepared to use them against Israel and the U.S. Peter Pry, a senior staffer the Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack, has noted that all of Iran’s testing of the Shahab-3 medium-range missile has been for mid-air detonation of a nuclear weapon, i.e. an EMP. These missiles were fired from freighters that had been specially outfitted with launch platforms for the Shahab-3. In his report, Dr. Pry explained: “A nuclear missile concealed in the hold of a freighter would give Iran or terrorists the capability to perform an EMP attack against the United States homeland without developing an ICBM and with some prospect of remaining anonymous. Iran’s Shahab-3 medium range missile, mentioned earlier, is a mobile missile and small enough to be transported in the hold of a freighter. We cannot rule out that Iran, the world’s leading sponsor of international terrorism, might provide terrorists with the means to executive an EMP attack against the United States.” Dr. Pry’s concerns are reinforced by an article in an Iranian military journal, translated by the CIA that “explicitly discusses a nuclear EMP attack that would gravely harm the United States.”16 An Iranian freighter, well off the coast of the U.S. in either the Atlantic Ocean or the Gulf of Mexico, could launch an EMP weapon into the heartland and push the U.S. into the dark ages. There is the additional threat of either Israel or Iran or both launching an EMP attack against the other; the effects of such an attack could spill over into the oil-producing nations, effectively stopping the production of oil for an undetermined period of time. Regardless of who fires the first shot, the U.S. will be drawn into a war with Iran, one that will see acts of terrorism on American soil. Political and military leaders in the Middle East, Europe
and the U.S. have little time remaining to determine a course of action. Due to the success in derailing international intervention in its nuclear weapons program, Iran is now at the threshold of becoming a nuclear power. With nuclear weapons, Iran would have the ability to threaten the governments of the Middle East and U.S. troops stationed in the area. The possession of nuclear weapons, combined with virtual control of the Strait of Hormuz, and the resulting ability to place a stranglehold on a large portion of the world’s oil, would embolden Iran to increase its use of terrorism without fear of retaliation on the part of any Western power: “With a nuclear weapons option acting as a deterrent to U.S. and allied action against it, Iran would likely lend greater support to terrorists operating against Israel, Iraq, Libya, Saudi Arabia, Europe and the U.S.”17 At present, the threat of a nuclear Iran has triggered a nuclear arms race in the Middle East with the danger of a nuclear war within the Middle East and against the U.S. if Iran becomes nuclear capable. If the U.S. acts now, our military will suffer losses, and there will be terrorist attacks in Europe and especially the U.S., with continuing political, social, and economic consequences within the Middle East, Europe, and here at home. Washington has to decide on a course of action that promises the U.S. the greatest chance of, not just winning, but surviving the coming conflict.
About the Author Danny Dickerson is a retired Colonel, U.S. Army. He has served as an advisor to the UN, NATO and Interpol on terrorism and intelligence planning. He has trained law enforcement from the local to federal level on terrorism and intelligence, as well as investigators for the Canadian Attorney Gen-
eral’s office and police officials in Egypt and Jordan, and is recognized as a “presenter” by the Illinois Terrorism Task Force. He has written articles addressing the growing threat of terrorism which have been republished in Latin America, Europe and the Middle East.
(Endnotes) 1- Michael A. Ledeen, “The Iranian Time Bomb: The Mullah Zealots’ Quest for Destruction,” (New York: St. Martin’s Press, 2007), p. 18. / 2- Amir Taheri, “A Clash of Civilizations,” Newsweek International, September 5, 2005, http://www.msnbc.msn.com/id/9108626/site/ newsweek. 3- Shmuel Bar, Hybrid Conflict: A Retrospective Analysis of The Summer 2006 War Between Israel and Hizballah , October 2010, Contemporary Op Art Exam Case Study (Newport, RI: Naval War College, October 2010), p. 14. 4- George Friedman, “Rethinking American Options on Iran,” posted 31 August 2010: www. stratfor.com, p. 4. 5- Office of Naval Intelligence, Iran’s Naval Forces: From Guerilla Warfare to a Modern Naval Strategy, http://www.fas.org/blog/secrecy/2009/11/ iran_naval_forces.html. 6- Cordesman, Anthony H. and Wilner, Alexander. 2011. “The Conventional and Asymmetric Dimensions.” In U.S. and Iranian Strategic Competition edited by Anthony Cordesman, Adam Mausner and Aram Nerguizian. Washington D.C.: Center for Strategic & International Studies Reports, p. 98-99. 7- Middle East Newsline, 14 October 2004. 8- White, Jeffery, “What Would War with Iran Look Like,” The American Interest, July/August 2011, p. 18. 9- Hamilton, Booz Allen, “Energy Futures in Asia,” (January 18, 2004), http://www.historycommons.org/entity. jsp?entity=booz_allen_hamilton. 10- Dickerson, Dan, “IRAN Would Strike First,” Counter Terrorism: Journal of Counterterrorism & Homeland Security International, Vol. 16, No. 3, Fall, 2010, p. 32. 11- Office of Naval Intelligence, Iran’s Naval Forces: From Guerilla Warfare to a Modern Naval Strategy, http://www.fas.org/blog/ secrecy/2009/11/iran_naval_forces.html. 12Comments by Joint Chiefs Chairman Dempsey on CBS TV program “Face the Nation,” January 8, 2012. 3- Ibid, p. 7. 14- Op.cit, Cordesman and Wilner, p. 70. 15- Dickerson, Dan, “No Defense: America’s growing Vulnerability to an EMP Attack,” Journal of Counterterrorism & Homeland Security, Vol. 18, No. 1, spring, 2012. 16- Tehran, Nashriyeh-eSiasi Nezami, December 1998 -January 1999. 17- Draft Report: Restraining a Nuclear-Ready Iran: Seven Levers, Washington: Nonproliferation Policy Education Center, 13 September 2004, http://www. npec-web.org/projects/Iran/200409-13SevenLevers.pdf.
General Sarath Fonseka:
The Defeat of the Liberation of Tigers of Tamil Elam (LTTE), the Re-emergence of the LTTE and the strategic plans of the attack on the LTTE By Andrin Raj
50
A Sri Lankan Muslim boy (R) reacts the instant a bomb exploded during a Muslim religious festival in Akuressa March 10, 2009. A suspected Tamil Tiger suicide bomber killed 14 people and wounded 35, including Sri Lanka’s telecommunications minister, during a Muslim festival in the island’s south, officials said. REUTERS via Reuters TV
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
T
he Liberation of Tigers of Tamil Elam (LTTE) is considered to be one of the most organized terrorist organizations in the world today based on its capabilities, expertise, modus operandi in guerilla warfare, management of funds and in its operational structure. Headed by Vellupillai Prabhakaran since its inception in May of 1976, the LTTE soon became the most feared terrorist group in Sri Lanka. The LTTE is the only terrorist organization that has an Army, Navy and an Air force within its organized structure. The suicide attacks have been LTTE’s trademark and its greatest achievements in most of its targeted operational attacks as it is the first terrorist organization to carry out such activities in the past three decades. Al Qaeda and many terrorist organizations operating internationally have derived LTTE’s training manuals. Through its training manuals, the LTTE also derived revenues for its operations. The LTTE has been working closely with international terrorist organizations and transnational crime organizations to further fund their organization. Although the LTTE’s main course was to maintain an autonomy region under the control of the LTTE from the Jaffna district right to the Vavunaya district, its concentration was purely domestic terrorism in nature. The suicide attack on Rajiv Ghandi in India is a political conspiracy that many believed took place between the Indians and the LTTE in the early eighties. The release of the Commander of the Sri Lankan forces, General Sarath Fonseka who strategically planned and defeated the Liberation of Tigers of Tamil Elam in 2009, is not a surprise. He served two years out of the three years that he was sentenced. General Fonseka became a hero after the defeat of the LTTE and was praised for his leadership. Soon after, he had a fall out with the current leadership of Sri Lanka. General Fonseka
Jailed former army chief Sarath Fonseka waves to his supporters as he leaves a private hospital with prison officers in Colombo May 21, 2012. Sri Lanka’s president has ordered the early release from jail of Fonseka, his highest-profile political rival, the president’s spokesman said, in an apparent bid to quell international criticism of the government’s human rights record. The authorisation for Fonseka’s release will be sent to the justice ministry, spokesman Bandula Jayasekara said. The former general is expected to be free soon afterwards, but will not be able to leave the country. REUTERS/Dinuka Liyanawatte
resigned from the military and ran for politics where after his defeat in the elections, was arrested and detained for committing military offences and was found guilty and sentenced to three years in prison. The charge was considered to be politically motivated. The pressure from the international community on his arrest and detention was only minimal but the real underlying current is the re-emergence of the LTTE in what is known as a Political & Economical approach of the re-emergence. The LTTE has re-emerged and its operations as a political and economical organization have been set up in North America, Europe as well as in South and Southeast Asia. The LTTE is now steering itself into politics within the Sri Lankan government rather than with a “terrorist” organization approach. This will allow the LTTE to set base within the political context of Sri Lankan politics and to gain an entry point into a legitimate political framework. The Re-emergence of the LTTE is now a new challenge to the current Sri Lankan administration. General Fonseka is well aware of the LTTE’s capabilities in its new paradigm of a new security threat. General Fonseka’s release plays an important role in the new challenges as well as the growing concerns of rifts that is facing the Sri Lankan government. The General is well liked by Sri Lankans as well as Tamilians from the Jaffna district because of his humanitarian efforts during and after the defeat of the LTTE.
he LTTE has re-emerged and its operations as a political and economical organization have been set up in North America, Europe as well as in South and Southeast Asia. The LTTE is now steering itself into politics within the Sri Lankan government rather than with a “terrorist” organization approach.
Although the LTTE was fighting for a course they believed in, they were also killing and torturing their own people. Today, Tamilians of the Jaffna district appreciates Fonseka for his true nature in protecting both the Sri Lankans and Tamilians from the threats of the Prabakharan’s LTTE terrorist organization. The support that he is given by the people is no doubt the current administrations “trump” card to rely on if they are to stay in power and totally wipe out the LTTE’s re-emergence.
The defeat of the LTTE was well planned and strategically focused on the militant’s capabilities and modus operandi. The Art of War became a strategy employed by General Fonseka from his experiences fighting the LTTE years before. The exact planning and strategy was coordinated by General Fonseka himself together with Prabhakaran’s close aid and one of his field operations commanders from 1983 to 1998 known by the name of JR who defected and joined the Sri Lankan government
and who today is a Minister in the Sri Lankan government. His knowledge on the modus operandi of the LTTE’s capabilities was beneficial to the Sri Lankan forces to mount the attack plan by General Fonseka. The planning of the attack by the Sri Lankan forces on LTTE’s stronghold was not anticipated by Prabhakaran himself. The more than twenty five year old dispute was to come to an end which saw the LTTE fall dramatically to its feet. The attack on the LTTE to completely dismantle the terrorist organization came with no surprises as the Sri Lankan forces were able to identify the strategic locations of the LTTE in coordinating and planning the attacks with precise accu-
The focus of the attack consisted of moving the first and the second division towards the right flank and moving up north to Mullaittivu district and the third, fourth and fifth division towards the left flank moving up north to Kilinochchi district and the sixth division from the northern flank of the Jaffna district. These divisions will eventually meet at the end of the conflict which was predetermined by General Fonseka himself. (Movement of troops provided as attachment below) The strategic movement of the Sri Lankan forces, headed by General Fonseka approached the LTTE’s stronghold centre by moving government troops from Siripura, some miles south of the 205 horizontal
The support that he is given by the people is no doubt the current administrations “trump” card to rely on if they are to stay in power and totally wipe out the LTTE’s re-emergence.
Troop Movements on the Eastern Coast Eastern coast of Sri Lanka: Jaffna/KSS Position 0949 N, 8004 E. Source: Undisclosed
racy and determination. The plan was to attack the LTTE from all directions and pinning them down within Kilinochchi district of the Political Headquarters of the LTTE and the Operational Headquarters at Kodalikallu and Kumulamunai township respectively. The command structure consisted of six divisions and utilizing the farmers from the Vavuniya District armed by the Sri Lankan forces to prevent the LTTE from crossing over and beyond the Vavuniya district towards the south. These village farmers were trained and armed by the Sri Lankan forces to counter the LTTE whenever there was no military presence in the district. The Sri Lankan forces knew well that the LTTE were constantly using this path to cross over to the Sri Lankan occupied district as to penetrate and conduct attacks within the Sri Lankan occupied districts. This was evidently the most strategic path of the LTTE’s movement as it was mainly small villages and farming areas where the LTTE took cover.
52
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
gridline from the east to up north of Tanniyuttu near the eastern coastline. The second troop movement was closer to the 205 horizontal gridline from the east of the Vavuniya district moving from nearby Maruthodai towards North West to Keridamadu some miles away to Kondalikallu of the LTTE’s operational HQ. Along the way they encountered and defeated LTTE’s guerillas. The operational HQ of the LTTE was crushed and some remaining guerillas and Prabhakaran then escaped towards Chundikkulam Sanctuary near the eastern coastline. The third movement of troops was moving from Omantai on the A9 route towards the north at Kokkavil and heading to nearby Puthukkudiyiruppu, joining the first and second troop movement, engaging the LTTE and securing the villages where the LTTE took refuge and operated. The fifth troop movement took off from Mundumurippu heading northeast to Tunukkai and passing Kokkavil and joining troop movement two near Kerridamadu.
The fourth troop movement was from the Nelukulam area on the A 30 route moving far east into the Mannar district heading to Vankalai and towards up north to Pooneryn and then cutting towards southwest within the Kilinochchi district and attacking the LTTE’s political HQ in Kilinochchi itself. After defeating and taking over the Kilinochchi city the troops moved southeast towards Theravikulam some miles near troop three at Puthukkudiyiruppi to join them. The fifth troop movement was heading North West along the A32 route leading to Pallawarayankaddu and crossing the causeway into Chunnavil and up north to Pooneryn Township and down south to LTTE’s political HQ. Troop five movement than moved up north passing Elephant Pass, a strategic location for the LTTE’s movement, joining the sixth troop movement that proceeded from the north of the Jaffna district from Pallai and Chempiyanpattu heading along the coastal line on the east to Chundikkulam Sanctuary, a lagoon where saw the final hours of Prabhakaran’s fall and the defeat
and surrender of the LTTE. The Sri Lankan forces were aware that the final movement on the defeating LTTE was to move towards the eastern coastline where the LTTE was operating one of their naval operations. The Sri Lankan navy was quick to respond to any threats from the LTTE’s naval operations on the eastern part of the Sri Lankan coastal waters. According to intelligence sources, a vessel from Eretria was to rescue Prabakaran from the advancing Sri Lankan forces near the Chundikkulam coastline. Apparently the vessel was never sited and the remaining LTTE’s guerillas and Prabakaran were defeated in Chundikkulam lagoon. The fighting was fierce during the last hours as both suffered casualties. Prabhakaran was believed to have been shot in the head by gunfire. The LTTE’s leader was confirmed dead by the Sri Lankan government after the operations ended. Ironically, his mobile handset had a last number dialed to a number which belonged to his counterpart in Thailand, Selvarasa Pathmanathan. Pathmanathan was second in com-
mand and would have succeeded Prabhakaran if he was not apprehended. Pathmanathan operated a shipping company in Malaysia and soon after moved to Thailand as the Malaysian Special Branch started cracking down on LTTE’s activities in Malaysia. Thailand became a safe haven that operated procurement, shipping and manufacturing for the LTTE. However Selvarasa was apprehended in Thailand prior to escaping the radar after the killing of Prabhakaran. Although the LTTE has been defeated, Sri Lanka remains under emergency laws that have not been fully removed. This is due to the remnants of the LTTE who still exist within the Sri Lankan community. The Sri Lankan government is aware of the near threats that are lurking within the LTTE and its approaches towards a settlement. However, I feel the Sri Lankan administration is not prepared for what is to come from the political and economic approaches of the LTTE. The Sri Lankan government, although has been critized by the international community on its humanitarian issues on the war is nevertheless trying to come
to terms with the war and working closely with international observers in rectifying its position on the war. About the Author Andrin Raj (andrin.raj@stratad.net) is Director, Counter Terrorism & Security Expert for Stratad Asia Pacific Strategic Centre (SAPSC) and Director for Chapter-SEA Regional HQ for the International Association for Counterterrorism and Security Professionals. He is also the Deputy Head of the Defence & Security Committee of the EU Malaysia Chambers of Commerce & Industry. He was a Visiting Fellow at the Japan Institute for International Affairs (JIIA) 2008-09.Mr. A is also one of the founding members of the Turkish Think Tank Dialogue (TOD TURKEY) of the Turkish Asian Center For Strategic Studies (TASAM) and part of the Think Tank Forum of the Organization of Islamic Countries based in Istanbul, Turkey. The views expressed are of his own and does not reflect those of SAPSC, IACSP, TOD TURKEY, TASAM, JIIA or the EUMCCI. Sources: Undisclosed and research interviews conducted by Andrin Raj during his visit to Sri Lanka in June of 2010.
COUNTER TERRORISM
SECURITY NEWS YOU NEED TO KNOW
Aviation, Corporate, Cyber, Global, Homeland, Maritime, Law Enforcement, Intelligence Photo credit U.S. Department of Defense.
IACSP and PlanetData present a new website bringing you counterterrorism news, articles, events, and more.
www.planetdata.net/ct
Secure Driver:
Transmissions By Sean McLaine
R
ecently, I have noticed a shift to the eight speed automatic transmission by a few manufacturers. My first reaction was that it was a gimmick to sell cars in a tough market. The more I thought about it my view began to shift. This is more substantial than the traditional gimmicks used by the companies (pony tail cut out in the head rest, and cup holder lights that change color), but the question at the core of the matter remained. Why use an eight-speed transmission? Fuel economy?
bit of a jolt as the chain catches the next gear up. The extra gears benefit your car by keeping RPM lower throughout the duration of your drive, and shift more smoothly.
I also discovered that there is a 9 speed automatic transmission used for front wheel drive vehicles.
Lower RPM means less fuel flowing into the cylinders. If you are having trouble visualizing this concept, take a ten-speed bicycle out for a quick ride. Start off with the front gearing on the smallest sprocket and the rear on the largest. On flat pavement, pedal at a moderate pace and as resistance fades, switch the rear sprocket up to the next gear. You should notice that the pace at which you are pedaling does not change very much, yet your speed increases.
Lets examine the system. The eightspeed allows the car to stay in a low RPM range as it gains speed. This only makes sense due to the fact that you are putting gears in between the normal RPM range.
Now go back to our original set-up and begin pedaling. This time, stay in the first gear until you are pedaling very quickly, and then skip two gears at once on your way up. You will find yourself doing a little bit of extra work, and then possibly feel a
If you were to start with the same gearing we did last time, pedal as fast as you can, and change gears as quickly as possible one at a time, you would find yourself pushing very hard throughout the cycle. In top gear,
As I began to research, that was the answer that jumped off the page, well screen, but the more I looked into it, the more benefits I uncovered.
54
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
I read further and saw that the transmission is being touted as having the capability to accelerate the car faster with the shift being measured in milliseconds! Again, we can use our ten-speed bicycle to demonstrate.
you would still be pushing hard, and then work your way up to speed as your pedaling increased RPM. This is what is happening when you see a manual transmission being moved from a stopped position and the driver shifts at the same RPM they would if they were accelerating gradually. When they clutch, the car lurches forward, and when the next gear is engaged it is at a low RPM. When looking purely for speed, you want first gear to be the one to get you to the high RPM range. This usually has the best torque for the job, and will get you to a high RPM quickly. Once near the red-line, you shift into the next gear. At this point, you are traveling at a higher speed and at the higher end of the RPM range. If you repeat this process until top gear you should find you get up to speed faster. By shifting at the lower RPM in this instance the car’s momentum is being broken (as evidenced by the lurch forward) and then has to work harder as it is in the lower RPM range in the next gear. The eight-speed transmissions are built with a torque sensor, and the ability to skip gears. By doing this, the designers have allowed the computer to determine which gear ratio is best for the conditions and get the car to speed faster than traditional transmissions.
If the car can stay in that high RPM range it will accelerate more quickly. Keep in mind, this feature benefits the driver while slowing as well as accelerating. Also available as an optional add-on is a stop/ start function that automatically cuts out the engine when the vehicle stops and restarts it when the brake is released The 8HP has a system to maintain hydraulic pressure even when the engine isn’t running and is therefore the first automatic that’s compatible with stop-start operation. The start/stop function is enabled by the development of the hydraulic impulse oil storage (HIS). It supplies the hydraulic oil that the transmission’s shift elements need for starting. When the engine is switched off, it allows for a quick start – as it is required with the start/ stop function. Already 350 milliseconds after starting the engine, the vehicle is ready for setting off. With the start/stop function of the hydraulic impulse oil storage, it is possible to reduce fuel consumption by another 5%. Compared with the worldwide most efficient 6-speed automatic transmission by ZF, the newly developed 8-speed automatic transmission saves another 11%.(ZF.com)
The eight-speed transmission will also affect what engines are to be used in cars and trucks in the future. The gearbox will allow Ford to continue its effort to downsize engine displacement without affecting performance, said Joe Bakaj, Ford’s vice president of global powertrain engineering. As you can see, this is certainly not just a gimmick. The eight-speed transmission is the real deal offering many benefits in both performance and fuel economy. Like many other technological advances, in time I would expect this to become the standard in automatic transmissions.
About the Author Sean McLaine attended the University of Scranton, obtaining his Bachelors in Criminal Justice in 1998. He has served as a Police Officer in Ridgefield, CT and now is working for the New York City Police Department. While working as a motorcycle officer on the Highway Patrol, Sean received extensive training in high speed Emergency Vehicle Operations. In addition to his police related driver training, he also acquired driving experience at the Skip Barber Race School, where he participated in the Skip Barber Race Series. He currently serves as a Sergeant in the 79th Precinct in Bedford-Stuyvesant. Sean has been working with ADSI since 2004.
" % # " "
# & & ( # ( * '& ( ) # $$ '# &+ # ( # + ' # # $ # (
ADSI
# & & ( '# &+ # & $ # & & & + # ( '# &+ ) # $$
# # $ # # $ Please make sure this ad and all other non-bleeding ads are centered in the page accordingly and/or blue border lines that # # & & # ( # # surround the page, Thanks! #& & &+ ! #
* # #. )# . %# !!4 ) % # 5 1 # ) 1 # * %%! *' ! 5 # # .) # # 0) .4 ) 1 )* 3 0. 1 )%. . %# "* # %*. # " #4 %)'%) . ! . .4 ')% ) "*( 1 . ! .4 .% * # # "'! " #. %0)* * %) 2 0 # *' ! 5 # # %)'%) . 0) .4 # 2 # %) " #. .) # # (
( # ( '# &+ "
/&6 )'%). .( 0 . &6 %). # *.%2# 6/ / ! 6& /$ &,66 3 6& /$ +,66 ! # % & * ( %"
!
$$$
IACSP Book Review Ruse and Treachery, Cross and Double Cross: Ben Macinytre’s Double Cross:
The True Story of the D-Day Spies
Crosses stand at the American Cemetery and Memorial at Colleville-sur-Mer in Normandy, October 11, 2009. Located on a bluff overlooking Omaha Beach, one of the D-Day landing sites, the cemetary contains the remains of 9,387 American military dead. Picture taken October 11, 2009. REUTERS/ Finbarr O’Reilly
Reviewed by Paul Davis
“T
angle within tangle, plot and counter-plot, ruse and treachery, cross and double-cross, true agent, false agent, double agent, gold and steel, the bomb, the dagger and the firing party, were interwoven in many a texture so intricate as to be incredible and yet true,” wrote Winston Churchill.
In November of 1943, Churchill, the British Prime Minister, met with American President Franklin Roosevelt and Soviet Premier Joseph Stalin at the Tehran Conference. The allied leaders met to discuss “Operation Overlord,” the plan for the invasion of Europe. 56
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
In “Double-Cross: The True Story of the D-Day Spies,” British author Ben Macintyre writes: “Churchill turned to Joseph Stalin and uttered a typically Churchillian remark that has since become a sort of myth: “In wartime, truth is so precious that she should always be attended by a bodyguard of lies.” Stalin, who had little time for literary metaphor, replied: “This is what we call military cunning.” The D-Day invasion would be protected and supported by a comprehensive, worldwide deception campaign, a body of lies to shield the truth: in a tip of the hat to Churchill’s remark, it was code-named “Bodyguard.” With “Double Cross,” Macintyre offers another outstanding true tale of World War II espionage. Like his previous World War II true espionage books, “Agent Zigzag,” the true story of Eddie Chapman, a crook who became a double agent against the Nazis and “Operation Mincemeat,” which tells the story of how British Intelligence used a corpse to fool the Nazis (The Man Who Never Was story), Macintyre presents an interesting story and compelling, if somewhat peculiar, characters set against the fascinating history of World War II. The central aim of Operation Bodyguard, Macintyre tells us, was to fool the Germans
into believing the invasion “was coming in the place where it was not, and that it was not coming in the place where it was.” Also, the deception had to be maintained after D-Day, as the German’s had to be kept guessing. The aim was to convince the Germans that the decisive D-Day target in France was Pas de Calais and not Normandy.
of men and woman who reported to the British and volunteered to become double agents against the Germans. These volunteers became the basis for the Double Cross system.
The British “Twenty Committee,” so named because the double cross XX resembled the Roman numerals for twenty, was entrusted along with MI5 (also called the Security Incredibly, in “Double Cross” Service) with overseeing the we learn that the British were activities of the double agents. able to capture and imprison, While the names Dusko Popvo, Roman Czerniawski, Lily Serniawski, Juan Pujol Garcia, Elvira De La Fuente Chaudoir are not as well-known as Generals Eisenhower, Patton and Montgomery, their espionage work greatly aided the war effort and saved countless lives. Macintyre writes: “… the DDay spies were, without question, one of the oddest military units ever assembled. They included a bisexual Peruvian playgirl, a tiny Polish fighter pilot, a mercurial Frenchwoman, a Serbian seducer, and a or turn into a double agent, deeply eccentric Spaniard with every single Abwehr (German a diploma in chicken farming.” military intelligence) spy initially agent sent to the British The British officers who ran Isles. Using the spies’ captured the D-Day spies were an odd radios, and using the “turned” group as well. spies’ codebooks, the British were able to send back the And while the British were spies’ bogus reports. busy tricking the Germans, British Intelligence was also As Macintyre explains in being taken in by the Soviets, Double Cross, then came the their so-called ally. Several “walk-ins,” a small number MI5 and Secret Intelligence
Service (SIS, or better known as MI6) officers were Soviet spies during World War II and many continued to spy for the Soviets after the war. One was Anthony Blunt, an MI5 officer, and another was Kim Philby, an SIS officer. The Soviet “sleepers” - or “moles”, as John le Carre would go on to call penetration agents in his spy thriller Tinker, Tailor, Soldier, Spy - kept Comrade Stalin completely informed of the Double Cross system, as well as many other secrets. If an author of spy thrillers were to offer such a wild story, the novel would be roundly criticized as outlandish, unrealistic and unbelievable. The Double Cross system had the double agents work in concert in informing the Germans that the main assault would not be at Normandy. The D-Day invasion forces fought a bloody battle on the Normandy beaches, but had it not been for the Double Cross system, the Allied death toll would have been much higher. And perhaps the Allies’ invasion would have failed. Macintyre, a writer-at-large for the Times of London, offers a true story that reads like a spy thriller. Paul Davis is an online columnist and a contributing editor to the Journal.
The Double Cross system had the double agents work in concert in informing the Germans that the main assault would not be at Normandy.
Counter Terrorism Bookshelf
Protesters from Hizb ut-Tahrir demonstrate against insults to Islam at the American Embassy in London September 16, 2012. A wave of furious anti-Western protests against a film mocking the Prophet Mohammad abated, but U.S. policy in the Muslim world remained overshadowed by 13 minutes of amateurish video on the Internet. REUTERS/Neil Hall
By Dr. Joshua Sinai
T
his article presents capsule reviews of important books recently published on terrorism and counterterrorism issues, including several published a few years ago that the reviewer was previously unaware of, but that deserve renewed interest. Radicalisation and the Media: Connectivity and Terrorism in the New Media Ecology
Akil N. Awan, Andrew Hoskins and Ben O’Loughlin, (New York: Routledge, 2011), 168 pages, $138.00. An examination of the role of mass media’s coverage of terrorism, whether mainstream television news or web-based sites, in promoting or hindering polarization and radicalization among its various audiences.
58
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
Akil N. Awan, Andrew Hoskins and Ben O’Loughlin, (Burlington, VT: Ashgate, 2012), 201 pages, $89.95. A comprehensive discussion of the nature of cyber threats, cyber hate and cyber terrorism and the components of effective countermeasures.
Encyclopedia of Transnational Crime & Justice
Margaret E. Beare, editor, (Los Angeles, CA: Sage Reference, 2012), 544 pages, $125.00. This comprehensive encyclopedia covers transnational crimes that take place in one country with consequences that significantly affect other
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
countries, such as human trafficking, smuggling (arms, drugs, and currency), nondomestic terrorism, and financial crimes. Such crimes are generally carried out by organized crime syndicates. Transnational justice is also covered among the volume’s more than 150 entries.
Terrorism, Drugs & Crime in Europe After 1992
Richard Clutterbuck, [Reprint of 1990 edition] (New York: Routledge, 2011), 256 pages, $42.95. First published in 1990, the late Richard Clutterbuck’s important analysis of some of the most important security issues confronting Europe also covers the technological tools available at that time to combat terrorism and international crime.
Hate: My Life in the British Far Right
Matthew Collins, (London: Birchback Publishing, Ltd., 2011), Biteback Publishing (June 6, 2012), 352 pages. In this hard-hitting and fascinating memoir, Collins describes how he joined the extremist far-right National Front as a teenager, filled at the time with racist hatred towards the British left and other perceived adversaries. Over time, the National Front disintegrated, replaced by the BNP, and then the English Defence League. Eventually realizing that his extremist comrades were “mad”, he became an informant for Searchlight magazine, and is now an antifascist campaigner.
Terrorism: An Investigator’s Handbook
William E. Dyson, [Fourth Edition] (Waltham, MA: Anderson Publishing, 2012), 528 pages, $59.95. This is one of the finest and most important handbooks written on the discipline of terror-
ism investigations. It discusses what investigators need to know about terrorism in terms of how terrorism is defined from an investigator’s perspective, the different categories of terrorist groups, including religiousbased terrorism, how terrorists operate and how they differ from other types of criminals, what terrorists attempt to know about law enforcement (for instance, by reading securityrelated manuals), effective interrogation techniques, how to create and maintain databases on terrorist suspects, conducting undercover surveillance, using informants, managing terrorist incidents, including collecting physical evidence at such sites, and how to prepare prosecutable cases against terrorist suspects.
Jean-Pierre Filiu, translated by M.B. DeBevoise, Apocalypse in Islam
(Berkeley, CA: University of California Press, 2011), 288 pages, $45.00. An exploration of the role of apocalypse in Islam over the centuries, highlighting its re-
surgence in recent decades. He identifies 1979 as a decisive year in the rise of contemporary millenarianism in both Sunni and Shi’I Islam, with what its adherents believe will begin in the Afghan-Pakistani borderlands.
The Terrorism Lectures
James J.F. Forest, (Orange County, CA: Nortia Press, 2012), $25.00, 424 pages. The author is an associate professor at the University of Massachusetts, Lowell, and an eminent expert on terrorism and counterterrorism issues. In this volume, he has assembled his class lectures to comprehensively discuss and explain the history of terrorism, its root causes, how terrorist groups organize, as well as the frameworks that analysts use to determine the scope of a terrorist threat. Divided into four parts, the chapters cover topics such as definitions, the history of terrorism, underlying contexts that motivate and facilitate terrorism, such as grievances, the process of radicalization and recruitment into terrorism, terrorism and the internet, financial and criminal dimensions, different categories
of terrorist groups, tactics and weapons, and the components of effective counterterrorism.
The Politics of Conflict: A Survey
Vassilis K. Fouskas, editor, ( N e w Yo r k : R o u t l e d g e , 2007/2011), 304 pages, $55.00. Originally published in 2007 and re-issued in 2011, this is a collection of entries on major conflicts around the world, such as in Angola, Baluchistan, Cyprus, East Timor, IsraelPalestine, Kurdistan, Kashmir, Lebanon, Tibet, Sri Lanka and Taiwan. The volume also includes an A–Z glossary of terms and maps of the conflicts covered in the volume.
Financing Terrorism: Case Studies
Michael Freeman, editor, (Burlington, VT: Ashgate, 2012), 256 pages, $99.95. The contributors to this important volume discuss how eleven different terrorist groups go about raising funds, their budgets, and the methods that can be used to disrupt them.
Criminalistics: Forensic Science, Crime, and Terrorism
James E. Girard, [Second edition] (Sudbury, MA: Jones & Bartlett Learning, 2011), 520 pages, $147.95. An authoritative and comprehensive introduction to the study of forensic science and crime analysis, covering subjects such as fingerprint identification, DNA, paint and glass analysis, drug toxicology, and forensic soil characterization. Also covered are homeland security issues such as explosives, weapons of mass destruction, and cybercrime.
Women Warriors for Allah: An Islamist Network in the Netherlands
Janny Groen and Annieke Kranenberg, (Philadelphia, PA: University of Pennsylvania Press, 2010), 280 pages, $75.00. An examination by Dutch jour-
60
nalists of the “women of jihad” – those connected to al Qaida and its affiliates – focusing on the socalled Hofstad network, the jihadist group responsible for the murder of filmmaker Theo van Gogh in November 2004. The authors find these women to be not only well-educated and confident, but even more extremist in their views than their male counterparts. This book is also valuable for its insight into the social dynamics of this terrorist network and the processes of radicalization and recruitment that leads such individuals and others to become violent terrorists.
International Aviation and Terrorism: Evolving Threats, Evolving Security John Harrison, (New York: Routledge, 2009), 224 pages, $140.00.
An insightful examination, focusing on the United States, of the threat of terrorism against the international aviation secu-
rity regime. Also discussed are U.S. efforts to upgrade civil aviation security in the wake of 9/11 and the impacts of these developments on the international civil aviation system.
The Military Balance 2012: The Annual Assessment of Global Military Capabilities and Defence Economics IISS, (London, UK: Routledge, 2012), 510 pages, $501.00.
The annually published The Military Balance is the preeminent and most authoritative assessment of the military capabilities and defense-related economies of some 170 countries around the world. Compiled by the prestigious London-based International Institute for Strategic Studies (IISS), it is an indispensable resource for those involved in international security and defense policy making, analysis and research. The volume’s first part includes general chapters on Arab militaries and the Arab “awakening”, military trends since 9/11, the war in Afghanistan, comparative defense statistics concerning defense budgets and expenditures, and top 10 submarine holdings. These are followed by chapters on defense and security trends in worldwide regions, accompanied by up-todate detailed entries on each country’s military capabilities per service (e.g., army, navy, and air force), military equipment, and deployments. Of special to the counterterrorism community is a table in the volume’s conclusion on significant terrorist groups around the world, which details their estimated size, the nature of their organiza-
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
tion, training, and weaponry. The volume also includes a pull-out wall chart and world map that shows current areas of conflict, with explanatory tables.
Freedom and Terror: Reason and Unreason in Politics
Abraham Kaplan and Gabriel Weimann, (New York: Routledge, 2011), $138.00, 208 pages. This book was mostly written by the late Abraham Kaplan (1918-1993), a leading American philosopher, and was edited and updated by his friend, Gabriel Weimann, a Professor of Communication at Haifa University, Israel, and one of the world’s foremost experts on terrorists’ use of communications media. Drawing on Kaplan’s work, the book examines the roles of reason and unreason in governments’ legal and political responses to terrorism and their interplay with the manifestations of terrorism, ranging from reason, emotions, madness, magic, morality, absolutism, extremism, psychopathology, and rationality. With the analysis rooted in theories and concepts derived from history, philosophy, religion, art, sociology, psychology, and political science, this book is recommended for those with interest in applying these academic disciplines to the study of terrorism.
Hunting in the Shadows: The Pursuit of Al Qa’ida Since 9/11 Seth G. Jones, (New York: W.W. Norton & Company, 2012), 544 pages, $27.95.
A comprehensive account of the battles against al Qaida by the United States and its allies, focusing with great detail on the on-the-ground measures by law enforcement, intelligence and military organizations.
CRC_GWL08 IACSP AD_Layout 1 7/10/12 3:29 PM Page 1
Save Now on These Counterterrorism and Security Management Books
CRC Press is a premier publisher of books on Counterterrorism and Security Management.
Visit www.crcpress.com to see our complete selection of titles and use promo code GWL08 to receive a 25% DISCOUNT.
Sign up for our emails and get more special savings!
The Business of Martyrdom: A History of Suicide Bombing
Jeffrey William Lewis, (Annapolis, MD: Naval Institute Press, 2012), 368 pages, $39.95. A comprehensive history of the warfare tactic of suicide bombing from its origins in Imperial Russia to the present day. The book examines the nature of the bombers, their motivations, the terrorist organizations that recruit, train and dispatch them, showing the differences in suicide bombing over time and from region to region.
Cartel: The Coming Invasion of Mexico’s Drug Wars
Sylvia Longmire, (New York: Palgrave Macmillan, 2011), 256 pages, $26.95 (hardcover); $16.95 (paperback).
The author, a (medically) retired Air Force captain and former Special Agent with the Air Force Office of Special Investigations, is a leading expert on Mexico’s drug cartels and U.S. border security. The book discusses the illicit underground networks that deliver drugs to American middlemen and consumers. Such drugs are transported from South and Central America by custom-made submarines, as well as elaborate tunnels. The book concludes with
62
recommendations for solutions, including programs to deter youth in Mexico from joining the cartels and changing drug laws on both sides of the border.
Homeland Security: Principles and Practice of Terrorism Response
Paul M. Maniscalco and Hank T. Christen, (Sudbury, MA: Jones & Bartlett Learning, 2011), 230 pages, $81.95.
viewer was unaware of it until recently. Its focus is highly relevant to today’s New-Nazi White Supremacist and militant Islamist extremists in America and Europe with their convergence and linkages based on the notion that “the enemy of my enemy is my friend.” The author’s account explores the growing linkage between these two movements, the nature of their mutual appeal, and how the Internet and globalization have made their increased interaction possible. A dominant thread running throughout both camps, according to the author, is a fervent
An authoritative textbook by leading practitioner experts on homeland security, this comprehensive volume covers subjects ranging from incident management, threat assessment, planning for and response to terrorism and other forms of violence, the federal response plan, and weapons of mass effect. It is especially valuable for explaining key concepts
of national security and applying them to real-world operations.
The Enemy of My Enemy: The Alarming Convergence of Militant Islam and the Extreme Right George Michael, (Lawrence, KS: University of Kansas Press, 2006), 397 pages, $34.95.
Although this book was published six years ago, this re-
challenges of counterintelligence in the form of protecting information, identifying undercover agents, and operating clandestinely, also apply to the hunted terrorist organizations. In their attempts to evade penetration by their government pursuers, some of the terrorist groups’ strategies work well, while others (fortunately), do not. These subjects are discussed in this important book, which employs detailed case studies to illustrate the interplay between terrorist groups and their government pursuers. Also discussed are steps for improving the monitoring, disruption, and elimination of terrorist cells by exploiting their mistakes and weaknesses in counterintelligence.
Tabernacle of Hate: Seduction into RightWing Extremism
Kerry Noble, (Syracuse, NY: Syracuse University Press, 2010), 463 pages, $55.00.
anti-Semitism, accompanied by strong pro-Palestinian views, and opposition to American involvement in the in the Middle East.
Terrorism and Counterintelligence: How Terrorist Groups Elude Detection
Blake W. Mobley, (New York: Columbia University Press, 2012), 352 pages, $40.00. Like the counterterrorist organizations that pursue them, the
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
Originally published in 1998, this second edition includes a new introduction that places the author’s narrative about his role as one of the founders in the early 1980s of the farright Covenant, Sword, and Arm of the Lord (CSA), a cult and paramilitary group. The book was written following the author’s release from prison in 1995, when he became a leading critic of such violently extremist groups.
In the Whirwind of Jihad Martha Brill Olcott, (Washington, DC: Carnegie Endowment for International Peace, 2012), 300 pages, $19.95.
An account by one of the world’s leading experts on Central Asia of the tensions unleashed by the proliferation of a jihadi form of Islam in Uzbekistan, and its authoritarian government’s counter-measures.
Intelligence in a Networked World
Anthony Olcott, (New York: Continuum, 2012), 304 pages, $29.95. With the vast amount of open source information available on the Internet, intelligence analysts are literally drowning in such digitized data, which in the intelligence world is termed a “signal-to-noise ratio.” The book’s author, a veteran intelligence analyst (and a leading expert on Russian history as well as an author of two novels), explains how to navigate
A fascinating first-person account of the planning and execution of the Usama bin Laden raid by a former Navy Seal who was part of the team that confronted the al Qaida leader at his Abbottabad compound in Pakistan. At the time this review was written, the Pentagon was threatening to charge the author (writing under the pseudonym “Mark Owen”) for allegedly violating a secrecy agreement demanded of all SEALs. The Pentagon also disputed some of the author’s facts about the raid.
ventional warfare who discuss how regular armies attempt to counter irregular warfare. The volume is divided into three sections: doctrinal origins (Western theory and practice), operational aspects (the roles of various military services in counterinsurgency), and challenges (how wider issues such as effective governance, civil-military cooperation, and engagement with local populations need to be taken into account in assessing effectiveness in counterinsurgency).
Belfast and Derry in Revolt: A New History of the Start of the Troubles
Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives
Simon Prince and Geoffrey Warner, (Dublin, Ireland and Portland, Oregon: Irish Academic Press, 2012), 288 pages, $79.95.
An account, based on extensive archival research, that sheds new light on the beginnings of the “Troubles” in Northern Ire-
this rising flood of data to collect, process, and analyze such information into finished intelligence studies. The book includes case studies on the difficulties in analyzing data on terrorist groups.
land in the late 1960s and early 1970s, focusing on the cities of Belfast and Derry.
No Easy Day: The Autobiography of a Navy Seal
Thomas Rid and Thomas Keaney, editors, (New York: Routledge, 2010), 280 pages, $150.00.
Mark Owen with Kevin Maurer, (New York: Dutton, 2012), 336 pages, $26.95.
Understanding Counterinsurgency: Doctrine, Operations, and Challenges
This textbook features chapters by leading experts on uncon-
Jose A. Rodriguez, Jr., with Bill Harlow, (New York: Threshold Editions, 2012), 288pages, $27.00.
A riveting account by the author, a former high-ranking officer at the CIA’s Counterterrorism Center, of how “hard measures” against al
Qaida operatives, in the form of what are known as harsh interrogation techniques, were essential in thwarting significant terrorist attacks against the United States and apprehending its top leaders, including Usama bin Laden.
Counter-Terrorism and International Law
Katja L.H. Samuel and Nigel D. White, editors, (Burlington, VT: Ashgate, 2012), 594 pages, $300.00. The articles and essays in this authoritative volume discuss the subject of international ter-
rorism from an international legal perspective. These subjects include the dilemma of how to reach agreement on a definition of what constitutes terrorism, the different legal responses to terrorism by states and international organizations, and the role of the United Nations Security Council in developing legal regimes to combat terrorism, such as the use of targeted sanctions or by general legislative measures.
Democracy and Political Violence
John Schwarzmantel, (Edinburgh, Scotland, UK: Edinburgh University Press, 2011), 224 pages, $90.00 (Hardcover), $30.00 (Paperback).
A discussion of the application of the problem of creating a liberal democracy in a situation of terrorist conflict and social division, especially one characterized by ethnic polarization. For these conflicts to be successfully resolved, the author writes, a common culture of citizenship spanning ethnic and cultural divisions is required.
The Provisional Irish Republican Army and the Morality of Terrorism
Timothy Shanahan, (Edinburgh, Scotland, UK: Edinburgh University Press, Ltd., 2009), 256 pages, $37.50. This book is a philosophical examination of the morality of the PIRA’s terrorist campaign and the British government’s attempts to counter it. As the author points out, to its supporters the PIRA was the legitimate army of Ireland, fighting for a British withdrawal as a
64
prelude to the reunification of the Irish nation. To its enemies (and critics), however, the PIRA was an illegal, extremist terrorist organization whose members were criminals who attacked innocent civilians in pursuit of its ideological objectives.
Counterterrorism: From the Cold War to the War on Terror
Frank Shanty, editor, [Volume One: Combating Modern Terrorism (1968-2011)], [Volume Two: 21st Century Global Counterterrorism Measures] (Santa Barbara, CA: Praeger, 2012). 994 pages, $131.00. This two-volume reference set is a comprehensive compilation of entries (to which this reviewer contributed three entries) on some of the primary issues involved in combating terrorism. The first volume covers issues such as defining terrorism and insurgency, case studies on significant counterterrorism campaigns around the world, and key issues affecting counterterrorism strategies, such as the psychology of those who become terrorists, countering radicalization and recruitment into terrorism, curtailing terrorists’ funding, and intelligence,
law enforcement and military countermeasures. The second volume presents overviews of the world’s top counterterrorism forces, chronologies of major counterterrorism operations, and profiles of major terrorist organizations and prominent terrorists.
Essentials of Terror Medicine
Shmuel C. Shapira, Jeffrey S. Hammond, and Leonard A. Cole,
editors, (New York: Springer, 2009), 468 pages, $89.95. An important edited volume on a major field in terrorism studies: terror medicine. This is related to the constellation of medical issues involved in emergency and disaster medicine that are uniquely related to the consequences of terrorist attacks. The field encompasses four broad areas: preparedness, incident management, mechanisms of injuries and responses, and psychological consequences.
Red Teams and Counterterrorism Training
Stephen Sloan and Robert J. Bunker, (Norman, OK: University of Oklahoma Press, 2011), 160 pages, $19.95. Staying ahead of tactical and technological innovations in terrorist warfare requires innovative training. The au-
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
thors, both of whom are well known terrorism experts and educational trainers, discuss how realistic simulations that incorporate red teams in which the participants play the part of active aggressors can provide the necessary insights to enable counterterrorism forces to anticipate how the terrorist adversaries are likely to use current or new tactics and technologies in their warfare.
The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda
Ali H. Soufan, with Daniel Freedman, (New York: W.W. Norton & Company, 2011), 608 pages, $26.95. An account by former FBI Special Agent Ali H. Soufan of his involvement in investigating plots by al Qaida since 9/11. Soufan, a native Arabic speaker, also served as an interrogator, which enabled him to elicit important confessions from al Qaida terrorists in countries where they were held, such as Yemen. The author also discusses how terrorists “think and operate” and proposes a series of steps he believes are required to defeat them.
Mexico’s Criminal Insurgency
John P. Sullivan and Robert J. Bunker, [A Small Wars Jour-
nal – El Centro Anthology] (Bloomington, IN: iUniverse, 2012), 208 pages, $17.95. This edited anthology (with most of the articles separately written by the two editors) is a comprehensive account on the threats posed by the breakdown of the security environment in Mexico and the implications this holds for the United States.
The Eleventh Day: The Full Story of 9/11 and Osama Bin Laden
Anthony Summers and Robbyn Swan, (New York: Ballantine Books, 2011), 656 pages, $30.00. Based on extensive research and interviews, the authors present a comprehensive account of 9/11’s attacks and the terrorist masterminds behind it.
The U.S. Army/Marine Corps Counterinsurgency Field Manual No. 3-24
United States, Department of the Army. (Chicago, IL: University of Chicago Press, 2007), 472 pages, $15.00. Based on a collaboration by top U.S. military experts, scholars, and practitioners, the manual presents a new approach to
combating guerrilla and terrorist insurgencies.
About the Author Dr. Joshua Sinai is a senior manager, national security program, at Infinity Technology, LLC, in Mclean, VA. His primary area of specialization is terrorism and counterterrorism studies. He can be reached at: jsinai@itllc.com.
The Mexican Narco Journal (MNJ) provides: •
Weekly List of Narco Related Incidents
•
Weekly In-Depth Reports on Incidents Including:
•
Murders: Thefts, Kidnappings: Extortion: Bombings
•
Forecasts of Future Actions
•
Detailed Maps and Graphs Based Upon Weekly Events
•
Risk Ratings in Mexico’s Hot Spots
The Mexican - Narco Journal is a comprehensive document combining expert analysis and research with detailed coverage of Events and Criminal activities in Mexico.
For a Free Sample or additional info contact: www.iacsp.com / Tel: 571-216- 8205 / 201-224-0588 / iacsp@aol.com
Journal of Counterterrorism & Homeland Security International
Vol.18, No.4
G4S International Training Inc.
has been a quality training provider for over 20 years. All of our instructors are prior military or law enforcement professionals. We specialize in Driving, Firearms, CounterTerrorism, Protective Services, Combatives and Medical Courses. Go to www.g4siti.com to find out more about classes offered by G4S International Training Inc. or call us 804-785-6000. M/D/F/V
“toknowledge is critical deter the threat of terrorism.� Elena Mastors, Ph.D. | Dean, School of Security & Global Studies Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network.
Learn More at www.amuonline.com/JOC
Education | Journal Management | Public& Service Health | Science & Technology | Security & Global Studies of Counterterrorism Homeland & Security International Vol.18, No.4