The Counter Terrorist Magazine February / March 2016

Page 1

ISRAELI CARRY • HISTORY OF SELOUS SCOUTS • FLYING ARMED • SECURITY CONSEQUENCES

Journal for Law Enforcement, Intelligence & Special Operations Professionals

FEBRUARY/MARCH 2016

VOLUME 9 • NUMBER 1

SECONDARY AND TERTIARY EXPLOITATION OF EVENTS

INTERNATIONAL

EDITION An SSI Publication ®

FEBRUARY/MARCH 2016 USA/CANADA $5.99

thecounterterroristmag.com


LEGEND

REFINED

m 1 07a1

Battle Proven. Lighter Than Ever. Enhanced Precision.

SUPPRESSOR CAPABLE .50 BMG Barrett will not sell to government agencies in the State of California or New York. Learn more at barrett.net

2 The Counter Terrorist ~ February/March 2016

Circle 121 on Reader Service Card


Circle ~ 319 on Reader Service2016 Card 3 The Counter Terrorist February/March


Circle 301 on Reader Service~ Card 4 The Counter Terrorist February/March

2016


Counter

The Journal for Law Enforcement, Intelligence & Special Operations Professionals FEBRUARY/MARCH 2016 VOLUME 9 • NUMBER 1

COVER STORY: 20

SECONDARY AND TERTIARY EXPLOITATION OF EVENTS by Dr. Clairissa D. Breen, PhD, CAS

CONTENTS

FEATURES: 20

8

34

08

HISTORY OF THE SELOUS SCOUTS by Lieutenant Colonel Ron Reid-Daly CLM, DMM, MBE, Selous Scouts

14 34

FLYING WITH FIREARMS by Garret Machine

42 54

LESSONS FROM THE RECENT WAVE OF ATTACKS by John Gomez

ISRAELI CARRY FOR ARMED AND RESPONSIBLE CITIZENS by Ken Pagano

POTENTIAL SECURITY CONSEQUENCES OF THE NEW AMERICAN COLLEGE CAMPUS by Joseph J. Kolb

DEPARTMENTS: 06

From the Editor

32

Book Review

66

Innovative Products

70

Training Review

If the U.S. does not negotiate with terrorists, then why are they arraigned in Civilian court? Bombs, IEDs, and Explosives: Identification, Investigation, and Disposal Techniques

The PDS™ system, Patriot3, Fairleigh Dickinson University, The Intimidator® Style 138, The Phantom Warrior MT™ Multitask Flashlight, The Lenco BearCat® Federal Law Enforcement Training Center (FLETC) Training

42

Cover Photo: Illustration by Jennifer McKibben

The Counter Terrorist ~ February/March 2016 5


Counter The

FROM THE EDITOR:

If the U.S. does not negotiate with terrorists, then why are they arraigned in Civilian court? by Garret Machine

Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 9 • NUMBER 1

FEBRUARY/MARCH 2016 Editor Garret Machine Director of Operations Carmen Arnaes

S

hould a terrorist be given the same civil rights and due process of law that a criminal would have? Every society is plagued with crime, but only some are plagued with terrorism. If a perpetrator is actively engaging in violent deadly behavior, does it matter what their ideology is? No, in the moment it makes no difference. Can a first responder to an active shooter know in that moment the motivation of the shooter and will they have enough information in that moment to decide the appropriate level of force? In real time, no they will not. We need to make a shift in our way of thinking and it can only come from the top down. If a person is stabbing, shooting, running over, etc., they are a terrorist, an enemy of our society, and must be dealt with swiftly. Until we recognize this as parallel to an enemy combatant invading our country and intent on destroying our way of life, we will not be able to effectively fight it. You cannot defeat terrorism because it is decentralized and the parameters for its success are undefined. You can, however, suppress it. Let me tell you a quick story to illustrate the point. In 2008, a terrorist stole a front loader or bulldozer from a construction site on Jaffa Street in Jerusalem, Israel. This street in this city is equivalent to the main street in downtown Anytown, U.S.A. at midday. The terrorist then proceeded to crush cars, run over people, and flip over a city bus. A twenty-year-old off-duty soldier (who had recently been drafted into the IDF) happened to be walking down the street when this happened. The soldier ran up to a security guard, grabbed his pistol, sprinted up to the bulldozer, and climbed up to the cockpit. He shot the terrorist in the head at point blank range as the terrorist was yelling “Allahu akbar.” There was no arrest, no court of public opinion, no investigation of the soldier’s actions, no lawyers, and no secondguessing his reaction. He was commended for his aggression, decisiveness, bravery, and for ridding the world of evil by the Prime Minister himself.

Garret Machine Editor, The Counter Terrorist

Director of Advertizing Sol Bradman Administrative Ashley Villegas Contributing Editors Dr. Clairissa D. Breen Lieutenant Colonel Ron Reid-Daly Ken Pagano John Gomez Joseph J. Kolb Graphic Design Morrison Creative Company Copy Editor Laura Town Advertising Sales Sol Bradman bradman@homelandsecurityssi.com 305-302-2790 Publisher: Security Solutions International 13155 SW 134th St. • STE 103 Miami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 103, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: Security Solutions International at villegas@homelandsecurityssi.com or call 786-573-3999 Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com © 2016 Security Solutions International

6 The Counter Terrorist ~ February/March 2016


We want to hear from you! Tell us how CTS Less Lethal products have helped you accomplish your mission:

@COMBINEDSYSTEMSINC @COMBINEDSYSINC MARKETING@COMBINEDSYSTEMS.COM

Circle 93 on Reader Service Card

WWW.COMBINEDSYSTEMS.COM

The Counter Terrorist ~ February/March 2016 7


HISTORY OF THE SELOUS SCOUTS 8 The Counter Terrorist ~ February/March 2016


by Lieutenant Colonel Ron Reid-Daly CLM, DMM, MBE, Selous Scouts

The first serious terrorist incursions into Rhodesia took place during 1967/68. In the military operations which were swiftly mounted by the Rhodesian security forces when these incursions were detected, the terrorist forces were annihilated almost to a man.

S

urvivors of these actions who managed to re-cross the Zambezi River and return to their bases sat down with their leaders to find out what had gone wrong so that they could revise their strategy and tactics. They realized that their first mistake had been to enter the uninhabited game areas of the Zambezi Valley, which the Rhodesian security forces knew like the backs of their hands. For the Rhodesian forces it was simply a matter of finding their tracks, following them, and neutralizing the terrorists when they were brought to contact. This

they did with considerable efficiency. The terrorist hierarchy became aware that they had ignored the major tenet of Mao Tse-tung: if the guerrilla is to enjoy any measure of success, he must have the support of the people who will feed him, hide him, guide him, and act as his eyes and ears against the security forces. Having grasped this fundamental truth, the terrorist forces set to work on implementing this strategy. The first fruits of their success came about in December 1972, when the terrorists opened up a new campaign in the northeastern border areas of

Rhodesia, using FRELIMO infrastructure as base areas. Intelligence, that vital ingredient in insurgent warfare, dried up, leaving the Rhodesian forces baffled and dispirited because they could not get to grips with their enemy. Fortunately for the Rhodesians, at this time a small experimental “pseudogroup� had commenced operations. This group, modeled on the pseudo-gangs that had been used in the Mau Mau campaign in Kenya, set out to make connections with the real terrorists with the aim of initiating a contact. This new dimension in the Rhodesian Bush War was an

The Counter Terrorist ~ February/March 2016 9


‌68% of terrorist kills in the internal operational areas were officially credited to Selous Scouts operations. Operational areas of the Rhodesian Security Forces during the Bush War in the 1970s. Photo by: Cliftonian

A Rhodesian soldier questioning villagers near the border of Botswana in the fall of 1977. Photo by: J. Ross Baughman

10 The Counter Terrorist ~ February/March 2016

immediate success and produced a major breakthrough in the means of acquiring of hot, accurate intelligence. Plans were immediately initiated to create a new unit to specialize in pseudo-operations, and the Selous Scouts were born. Volunteers from all units in the Rhodesian Army were called for, a selection and training course was decided on, and in January 1974 the first Selous Scouts troop deployed into the operational area. The second and third troops followed and by the end of March 1974 the Selous Scouts had the capability of deploying three troops into the field. The impact of these men in their operational areas was immediate and electrifying. The Fire Force concept was initiated, and with the Selous Scouts locating terrorist targets for the Fire Force to neutralize, the kill rate rose to an all-time high. The morale of the security forces, which had taken a definite dip as a result of the terrorists changing


Circle 262 on Reader Service Card

The Counter Terrorist ~ February/March 2016 11


their tactics, rose with the kill rate. The impact of the Selous Scouts on the war is best illustrated by the fact that 68% of terrorist kills in the internal operational areas were officially credited to Selous Scouts operations. However, despite these successes, the war spread into new areas because the terrorists, taking advantage of the collapse of the Portuguese, organized an infrastructure of base and training camps in Mozambique. It was obvious that if these camps were not neutralized, the Rhodesians would be fighting a losing battle, because the rate of attrition in the operational areas was nowhere near the terrorist influx into Rhodesia. But before these camps could be neutralized, it was necessary to have an exact pinpoint of their position. And so yet another dimension was added to the Selous Scouts’ armory in the shape of a specialist external reconnaissance group. The foremost exponent of the art of reconnaissance was, without doubt, Captain Christopher Schulenburg. Under Schulie’s inspiration, a small dedicated

group of black and white scouts was formed to pinpoint external terrorist targets. These men, operating in pairs, one black and one white, would be dropped by means of free-fall parachute, mostly by night, into target areas in Mozambique and Zambia. When enough data had been collected the camps would be attacked, often by motorized raiding columns. The Selous Scouts operated from January 1974 until March 1980, when Rhodesia was sold out. The operations carried out by this unit were many and varied, ranging from internal pseudo-operations to operations designed to destroy FRELIMO and Zambian infrastructure such as trains, bridges and long stretches of railway line. Neutralizing external camps and administration bases was also undertaken and perhaps the best external operation was when seventy-two men entered a Communist terrorist camp in Mozambique dressed up as FRELIMO troops. When the attack had been completed, 1,028 terrorists lay dead in the camp.

Rhodesia is no more and has joined the pages of history. But her security forces can be proud of the fight they carried to the enemy, for they won all their battles but lost the political war. And the Selous Scouts Regiment can stand tall and proud at the forefront of these fine men. The Selous Scouts operators were innovative, imaginative, and brought a new dimension to counterinsurgency on a scale never before seen in any guerrilla war. And perhaps the greatest strength of the Selous Scouts Regiment was its tremendous esprit de corps, which was such that it pulled together not only men of different races and tribes, but even turned terrorists, and bonded them into a unique brotherhood.

ABOUT THE AUTHOR The author was a proud member of the Selous Scouts. For a comprehensive account of the origins and history of the famous special forces unit as told by the men of the unit themselves please review Selous Scouts—the Men Speak by Jonathan Pittaway.

Mineproofed armoured vehicles of the Zimbabwe National Army at Methuen Barracks, 1980. Photo by: John Wynne Hopkins

12 The Counter Terrorist ~ February/March 2016


Best Location in Orlando – The Florida Hotel and Conference Center What a fantastic hotel. Rooms were nicely appointed, the staff was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall attached to the hotel. –Top rated by TripAdvisor

Counter The

Journal for Law Enforcement, Intelligence & Special Operations Professionals

presents: 11th Annual

HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION October 25-26, 2016 • Orlando, FL We sold out in 2015 Get your registration in as soon as possible: • Best speakers in Homeland Security • Premiere opportunity to network with your peers in US Homeland Security and across the Globe • Attended by more than 100 Federal, State and Local agencies • Selected Vendor expo of the latest in HS Technologies

This year’s The Counter Terrorist Magazine Annual Homeland Security Professionals conference will celebrate its first decade. This will be a highly publicized event throughout the country and abroad.

REGISTER NOW REGISTRATION COST $399.00 *Government and group rates available. Call us for details.

www.thecounterterroristmag.com/conference

LEARN MORE at: Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 Villegas@homelandsecurityssi.com

Circle 177 on Reader Service Card

2015 13 73 The Counter Terrorist ~ February/March 2016


FLYING WITH FIREARMS

14 The Counter Terrorist ~ February/March 2016


by Garret Machine

Everyone has heard the phrase “have gun will travel”; well, some take it more seriously then others. Over the last five years I have been traveling all over the country teaching civilians, security, and police the strategies for combating terrorism through live fire training seminars.

I

have been fortunate enough to fall in with the right group of people and have had the pleasure of making my way through 35 states and Canada plus a few other countries. But this is not about the training; it’s about the traveling from state to state by commercial aircraft with firearms. If you work in this field for long

enough, then you too will have to travel with your weapon at some point. So, this is for you.

THE BASICS We all know that the TSA has the very important responsibility of keeping air travel safe and incident free. The

TSA has three simple rules: the firearm must be unloaded and separated from ammunition, locked in a hard sided container, and declared at the checkin counter. But unfortunately, it’s not that simple. Each airport has its own procedure and each airline has its own regulations as well. What I have found,

The Counter Terrorist ~ February/March 2016 15


Screening Checkpoint at Boston Logan International Airport. Photo by: U.S. Federal Government

after traveling twice a week with fifteen pistols and two rifles in tow, is that it is up to the discretion of the individual person at the checkin counter to interpret those rules and regulations. This can make the difference between an uneventful flight and a hassle that will cost you time and money. Some incidents and lessons learned: • If you read the TSA rules, you may believe that ammunition in a magazine is an acceptable way of transporting it. It is not. It’s a $1,000 fine for having

16 The Counter Terrorist ~ February/March 2016

a loaded magazine stored in the same container as the unloaded firearm. “Firearm magazines and ammunition clips, whether loaded or empty, must be securely boxed or included within a hard-sided case containing an unloaded firearm.” And “Small arms ammunition, including ammunition not exceeding .75 caliber for rifle or pistol and shotgun shells of any gauge, may be carried in the same hardsided case as the firearm, as described in the packing guidelines above.” In


20534 Counter Terrorist Magazine Ad v1_Layout 1 1/21/16 3:20 PM Page 1

Online Undergraduate, Graduate & Certificate Studies in

Public Safety & Homeland Security Meeting the professional advancement needs of those committed to protecting the public. Earn your career credentials without job interruption through Fairleigh Dickinson University’s respected online degree and certificate offerings. Established in 1942, FDU is New Jersey’s largest private university with 12,000 students worldwide. Degree Offerings

• Master of Administrative Science • Master of Science in Homeland Security • Bachelor of Arts in Individualized Studies Certificate Studies Career-relevant programs are available at the graduate and undergraduate level in such areas as terrorism, forensics, global security, disaster and emergency management, transit safety, homeland security, and more. Credits earned can be applied toward the appropriate degree program.

• FDU is proud to participate in the Yellow Ribbon G.I. Education Advancement program enabling eligible veterans to attend FDU at no charge. • FDU accepts Federal Tuition Assistance (FTA) for undergraduate and graduate courses (restrictions apply). • No entrance exams required. For More Information

Undergraduate Programs

Graduate Programs

JoAnna Steiner 201-692-7357 online@fdu.edu

Ronald E. Calissi 201-692-6522 calissi@fdu.edu

fdu.edu/mas

CALL TODAY. CLASSES BEGIN YEAR-ROUND. Circle 10 on Reader Service Card

The Counter Terrorist ~ February/March 2016 17


They let me throw the ammunition in the trash right there at the terminal so I could check in and make the flight.

Detroit Wayne County Airport. Photo by: Minseong Kim

18 The Counter Terrorist ~ February/March 2016

one incident I experienced, it was the individual agent who made the “loaded” determination, even after the police officer in the terminal inspected the weapon and called it “unloaded by definition.” • An airline ticket agent in a separate incident refused to accept ammunition even when it was in a separate locked container, but in the same larger suitcase. They let me throw the ammunition in the trash right there at the terminal so I could check in and make the flight. • At another airport, a check-in agent refused to accept fifteen firearms even after the TSA cleared them to fly. I had to have a friend from a local gun shop come pick up the firearms so I could make the flight. • Sometimes, the weapon cases come out on the belt with the rest of the baggage, and other times they come out with oversized bags. In some cases, the guns were “lost” and returned later after


I didn’t even need them because the training had passed. • On three separate occasions I have had the cases destroyed by the airline to the point that the weapons had to be removed and put in a separate cardboard box. In one such incident the firearms case was dragged behind the baggage tractor across the runway. Perhaps a simple solution to hassle-free airline travel would be a unified procedure followed by all air carriers and all terminals with regard to firearm check-in. Seeing as the TSA is the official governing body, one would think that their regulations trump airline-specific rules. However when reading the rules, each individual agent is left with their own interpretation due to the ambiguity and the sheer number of employees and terminals. In the meantime, I have found that being overly nice, polite, and excessively friendly makes an enormous difference.

9TH ANNUAL

FOLLOW UP The moral of the story is to drive when you can. If not, use frequent flyer miles to upgrade yourself to first class, and then they are noticeably more inclined to help your luggage make it to where it is supposed to be. When you do need to fly with weapons, the fewer the better. Don’t even bother bringing ammo. Get it where you are going. Finally, if you’re using training guns or Sim guns, they get checked in as weapons, but let them know that they are training tools and not actual deadly weapons. This also makes a difference when they look alike to untrained persons.

MILITARY RADAR

SUMMIT 2016

February 29-March 2, 2016 Washington D.C. DETERMINING REQUIREMENTS FOR FUTURE RADAR CAPABILITIES • Improving small target detection and UAV radar capabilities • Expanding radar reach in the arctic circle • Enabling features and capabilities of Cognitive RF • The latest advancements in electronic warfare capabilities

ABOUT THE AUTHOR Garret Machine is a Certified Protection Professional and Board Certified in Security Management. www.MilitaryRadarSummit.com Circle 113 on Reader Service Card

Circle 20 on Reader Service Card

The Counter Terrorist ~ February/March 2016 19


SECONDARY AND TERTIARY

EXPLOITATION OF EVENTS

20 The Counter Terrorist ~ February/March 2016


by Dr. Clairissa D. Breen, PhD, CAS

Douglas MacArthur once said that “there is no such thing as security, there is only opportunity.� The primary function of terrorism is to exploit any available opportunity.

A

ny event can be exploited by terrorists. Events are a resource that can be used and manipulated by terrorists for a variety of purposes. However, it is not necessary for terrorists to participate in an event in order to exploit it. Secondary and tertiary exploitation of events by terrorist organizations refers to a variety of ways in which terrorists can use an event that may have had nothing to do with

terrorism for their own benefit. It is more likely that terrorists are not directly involved in the events that provide the most opportunities for exploitation. In some cases, the event in question is naturally occurring, such as a hurricane. Military events not directed at a terrorist organization are also easily exploited. Any event that has social or political ramifications can be exploited by a terrorist organization.

Community members gather around a firepit during the fifth night of demonstrations outside the Minneapolis Police Department's 4th Precinct following the police shooting death of Jamar Clark. Photo by: Tony Webster

The Counter Terrorist ~ February/March 2016 21


The East German delegation marching in the opening ceremonies of the 1972 Summer Olympics. Photo by: Gahlbeck Friedrich

Front view of the Israeli apartment at the 1972 Olympic Games in Munich where the athletes were held hostage during the Munich massacre. Photo by: ProhibitOnions

The concept of secondary or tertiary exploitation of events by terrorists is not new. Members of the Narodniki in the 1800s kept abreast of current events around the world and used letters to newspapers in response to events, such as the assassination of President McKinley, to acquire a platform for their cause on the global media stage.1 The Black September chose multiple means of exploiting the 1972 Summer Olympic Games in Munich, Germany to present their message to the world, acquire supporters, and embarrass the German government.2 Terrorists cannot

22 The Counter Terrorist ~ February/March 2016

accomplish any goal in a vacuum; they need an audience. Changes in the availability of contact with a larger audience have allowed terrorists to reach more supporters, more recruits, and more targets. It has become far easier for a wide range of terrorist groups to become household names with far less effort than ever before. There are a variety of ways to exploit an event. The first is offense collection. For both individual terrorists and organizations, the collection of offenses is important. Most terrorists like to portray themselves as responding to slight or


aggression rather than being the instigator. Offense collection allows individual terrorists and organizations to respond to allegations or dissent with a list of terrible actions perpetrated by their targets or victims. For domestic right-wing terrorists, like Timothy McVeigh, the litany of offenses perpetrated by the Federal Government includes Ruby Ridge, where U.S. Marshals and later the FBI engaged in a fatal standoff with the white separatist family of Randy Weaver, and Waco, where state and federal law enforcement supported by the military laid siege to the Branch Davidians’ compound in Texas, a siege that ended with a tragic fire and the death of over eighty supporters of the cult in 1993.3 For international terrorists, the list of offenses can include the Mohammed cartoons, military operations, alliances between target nations, and diplomatic and/or economic sanctions. For singleissue terrorists such as eco-terrorists, animal rights extremists, and violent antiabortionists, changes in legislation can be seen as a failure of government to protect their cause and can be collected as offenses just as easily as actual cases of pollution, animal experimentation or cruelty, or abortions.4,5 Likewise, media attention to their cause, investigative reports, articles, or documentaries can be seen as popular support, as much as they provide evidence to support offense collection. Popular opinion can be very important to certain terrorist organizations. While some organizations have engaged in social programs to assist individuals in areas where they operate, train, or recruit in order to buoy popular opinion, event exploitation provides a new way of swaying popular opinion. This form of event exploitation rarely includes natural disasters, unless the exploiting

This is the last photograph of Vicki Weaver before she was killed by an FBI sniper August 22, 1992 in the Ruby Ridge standoff. Photo by: U.S. Marshal Service

Terrorists cannot accomplish any goal in a vacuum; they need an audience.

The Mount Carmel Center engulfed in flames on April 19, 1993. Photo by: Federal Bureau of Investigation

The Counter Terrorist ~ February/March 2016 23


Underground damage after the 1993 World Trade bombing. Photo by: Bureau of ATF 1993 Explosives Incident Report

Procession of emergency vehicles at the 1993 World Trade Center bombing. Photo by: Eric Ascalon

terrorist organization is a single-issue environmental group, which then can argue that the natural disaster has taken place because of some previous counter-environmental action or neglect. Political, economic, or social actions are the easiest events to exploit in this fashion, especially in the era of instant opinion. A terrorist organization can exploit any speech, any economic downturn, any social movement to benefit its standing in popular opinion, mostly by highlighting the opposition as weak, wrong, dangerous to its own people, insensitive, war-mongering, or forcing the terrorist organization to respond in a negative fashion. In the case of military events, the accidental destruction of civilian sites is easily exploited to show the opposition as more aggressive and disregarding human life. These situations are among those best used for embarrassing the target of terrorist activity.

24 The Counter Terrorist ~ February/March 2016

Embarrassing the target is event exploitation that highlights some action by the target that is shameful domestically or internationally. A political or social failure, an incident that brings condemnation to the target country from outsiders, a military mistake, a protest, a riot, or any of the signs that there is malcontent in the target country, can be easily exploited to embarrass it. Hamas has actively used civilian areas to launch attacks against Israel, forcing Israel to attack areas that increase the likelihood of civilian casualties, such as schools, refugee camps, and hospitals. These death tolls can later be exploited by Hamas in the popular press to embarrass Israel on the world stage. Similar actions seek to embarrass one target nation due to its connection to another, such as Ramzi Yousef ’s motivations for the 1993 World Trade Center attack, stating that the primary motive was to end the United States’ political, military, and financial support to Israel. State supporters of terrorism have often highlighted protests and riots in enemy locations as a sign of weakness in that country and as signs of the way policies or ideology in that country is failing in comparison to their own system. A combination of exploiting popular opinion and embarrassing target nations can be used to gain supporters. When terrorists use event exploitation to gain supporters, they can be doing so to gain financial support, without actively seeking recruits. Terrorist organizations that create shell charities easily gain support through secondary and tertiary exploitation of events by requesting financial support for widows or orphans associated with an event. In these cases, photos from the exploitable event are used to create the personal response


Police officers using tear gas during the first wave of the Ferguson Riots. Photo by: Loavesofbread that draws financial support. For more opportunistic terrorist organizations, fake charities for a wide range of natural disasters have been created for funding, exploiting the desire of people to help those in need in response to a hurricane or tsunami. Recruitment of supporters by exploiting events can be accomplished in a variety of ways. For some, the event itself is galvanizing enough to draw the individual to an organization or to

self-radicalize and prepare for lone wolf operations. For others, it is the careful exploitation of events and the associated personal response of the recruit that can be used to draw an individual into a terrorist organization. For example, the Black Lives Matter movement has drawn a wide range of groups and individuals together to highlight violence against and within the AfricanAmerican community. For radical white supremacist organizations, the protests,

marches, rallies, and sometimes riots can be exploited for recruitment, as well as action, as in the case of Allen Lawrence “Lance� Scarsella III, Nathan Gustavsson, 21, and Daniel Macey, who shot five people at a Black Lives Matter encampment in Minneapolis.6 On the other side of the same series of events, supporters of the Black Lives Matter movement have highlighted and exploited the events leading to the creation of the movement to target

The Counter Terrorist ~ February/March 2016 25


NYC action in solidarity with Ferguson. Mo, encouraging a boycott of Black Friday Consumerism. Photo by: The All-Nite Images

26 The Counter Terrorist ~ February/March 2016


Photo by: The All-Nite Images

and kill law enforcement, leading to the deaths of Wenjian Liu and Rafael Ramos.7 Protests and groups that have called for the assassination of white police officers include the African American Defense League.8 Another way in which events can be exploited is to allow terrorist organizations and individuals to gain access to targets. Events that open an area to the general public provide opportunities for terrorist organizations and individuals to gather information about a target, to conduct surveillance, and to prepare for future attacks. These can be public or personal events, such as David Headley’s use of seeking a venue for an upcoming wedding to conduct surveillance on the hotel chosen for the Mumbai attack.9 The increased use of a wide range of social media platforms means that additional information such as the average number

Black Lives Matter supporters and allies gather inside the Minneapolis City Hall rotunda on December 3, 2015, after an early morning raid and eviction of demonstrators occupying the space outside the Minneapolis Police Department's 4th Precinct, following the police shooting death of Jamar Clark. Photo by: Tony Webster

The Counter Terrorist ~ February/March 2016 27


Events around the world, from the lighting of Christmas trees to rock concerts, can all be expxloited as opportunities for attack.

28 The Counter Terrorist ~ February/March 2016


of individuals attending a public event can be identified and extrapolated by terrorist organizations and individuals for future attacks. On occasion, terrorist organizations will seek to exploit an event to show the extent of their reach or influence. This has been actively encouraged by both al-Qaeda and ISIS through their propaganda magazines Inspire and Dabiq, respectively, where potential followers and supporters are advised to engage in attacks without input, training, or financial support from these terrorist organizations, and state their connection to al-Qaeda or ISIS. Then, those groups would claim them as followers.10,11 In these cases, there is a delay in terrorist organizations claiming responsibility for attacks, and it muddies the water regarding the true extent of a terrorist organization. This activity was previously seen in organizations such as the Earth and Animal Liberation Fronts, who told supporters to engage in terrorist action and use graffiti to show that the event was associated with the organization.4 In other cases, terrorist organizations have claimed unrelated events in efforts to show that they are more capable of attacking a target than previously believed, such as the claim by Tehrik-i-Taliban Pakistan chief Baitullah Mehsud that they were behind the shootings at the American Civic Association in Binghamton, NY in 2009.12 Another way in which events are exploited by terrorists is for the purposes of radicalization. In cases of self-radicalization, the benefit of the continuous exploitation of an event can be used to perpetuate the development of a personal ideology based on views of what that event symbolizes. Events to which an individual has created a

personal connection can be turning points in self-radicalization. Sovereign Citizen Jerry Kane became increasingly radical in his anti-government beliefs before he and his son were involved in the murder of Officers Brandon Paudert and Bill Evans through a series of interactions with law enforcement, courts, and banks. Each one of these events perpetuating his beliefs in government enslavement and the likelihood that his next interaction with law enforcement would be violent.13 For others, successful terrorist events or activities can provide a reference point for radicalization, such as the Fort Dix Six and repeated viewing of the videos of the Baghdad Sniper,14 or the many videos and writings of Anwar al-Awlaki, who has inspired a wide range of individuals to engage in terrorist activities, including the Tsarnaev brothers in Boston, Hasan in Fort Hood, Texas, and Carlos Bledsoe in Little Rock, Arkansas. Al-Awlaki continues to do so despite his death in 2011.15 Events around the world, from the lighting of Christmas trees to rock concerts, can all be exploited

2013 Boston Marathon site after bombings. Photo by: AaronTang

The Counter Terrorist ~ February/March 2016 29


as opportunities for attack. Military operations, political speeches, rallies, marches, riots: each can be seen as a means to gain support for terrorist ideas and action. Once an event has occurred, it can be repackaged and presented to supporters of terrorism—potential

recruits or even generous innocents— to provide social or financial gain to terrorist organizations. Instant access to information and audiences through social media allows for continuous and immediate exploitation of events, opinions, and audiences. It is not

10th Anniversary Event

SAN ANTONIO

2016

APRIL

13-14

TEXAS

Countering Transnational Organized Crime: An Important Component of Counter-Terrorism Strategy

Now more than ever.

necessary for an event to be terroristic in nature for it to be exploited by terrorist organizations, nor is it necessary for individuals who begin to exploit events for terroristic purposes to have any direct connection to an existing terrorist organization or ideology. Terrorists will continue to exploit events. It is part of their nature. However, increased vigilance and wider collaboration between local, state, federal, and international agencies can counteract the negative impact of terrorist exploitation of events.

ABOUT THE AUTHOR Dr. Clairissa D. Breen, Ph.D. CAS, is program director for criminal justice and homeland security studies at Cazenovia College. She received her PhD from Temple University and is certified as an anti-terrorism specialist by the anti-terrorism accreditation board. Her primary research interests include catastrophic criminology, terrorism, hate groups, political and historical crime. Dr. Breen gives talk and seminars around the world. She can be reached at clairissa. breen@yahoo.com for consultation.

ENDNOTES Vera Figner, Memoirs of a Revolutionist (DeKalb, IL: Northern Illinois University Press, 2001). 2 Simon Reeve, One Day in September: The Full Story of the 1972 Munich Olympics Massacre and the Israeli Revenge Operation “Wrath of God” (New York: Arcade Publishing, 2000). 3 Mark Hamm, Apocalypse In Oklahoma: Waco and Ruby Ridge Revenged (Lebanon, NH: Northeastern University Press, 1997). 4 United States Congress Senate Committee, Eco-terrorism Specifically 1

■ The largest gathering of border security leaders and field

commanders ■ Largest exhibition of border technology products,

systems and solutions anywhere ■ Daily keynotes, luncheons and awards ceremonies ■ Host to the Salute to Fallen Heroes Memorial Ceremony ■ Networking events throughout

Visit www.BorderSecurityExpo.com For Information on Attending, Sponsorships and Exhibiting 30 The Counter Terrorist ~ February/March 2016

Circle 103 on Reader Service Card


Examining The Earth Liberation Front and The Animal Liberation Front (Scholar’s Choice, 2015). 5 Elanor Bader and Patricia Baird Windle, Targets of Hatred: Anti-Abortion Terrorism (New York: St. Martin’s Press, 2015). 6 David Neiwert, “Three Men Who Shot Black Lives Matter Protesters Emerged From Internet’s Racist Swamps,” Southern Policy Law Center, November 25, 2015, https://www.splcenter.org/ hatewatch/2015/11/25/three-men-whoshot-black-lives-matter-protesters-emergedinternet%E2%80%99s-racist-swamps. 7 Benjamin Mueller and Al Baker, “2 N.Y.P.D. Officers Killed in Brooklyn Ambush; Suspect Commits Suicide,” The New York Times, December 21, 2014, http://www.nytimes.com/2014/12/21/ nyregion/two-police-officers-shot-in-theirpatrol-car-in-brooklyn.html. 8 “African American Defense League,” Facebook, https://www.facebook.com/ pages/African-American-DefenseLeague/759646587404526. 9 Kaare Sørensen and Cory Klingsporn, The Mind of a Terrorist: David Headley, the Mumbai Massacre, and His European Revenge (New York: Arcade Publishing, 2016). 10 Al-Qaeda, Inspire Magazine, 2010. 11 ISIS, Dabiq Magazine, 2012. 12 Anwal Iqbar, “FBI Rejects Mehsud’s Claim for NY Attack,” Dawn, April 4, 2009, http://www.dawn.com/ news/454907/fbi-rejects-mehsudaes-claimfor-ny-attack. 13 Zack McMillin and Marc Perrusquia, “Police killers identified as activists on mission to spread anti-government message,” Knoxville News Sentinel, May 22, 2010, http://www.knoxnews.com/news/ nation-and-world/police-killers-identifiedactivists-mission-spread.

Graham, Troy, “Jurors see videos taken from defendants Some appeared to be pained,” Philly.com, October 23, 2008, http://articles.philly.com/2008-1023/news/25264414_1_video-fort-dixshain-duka. 14

Bergen, Peter, “The American who inspires terror from Paris to the U.S.,” CNN, January 11, 2015, http://www. cnn.com/2015/01/11/opinion/bergenamerican-terrorism-leader-paris-attack/ index.html. 15

Rolling Mass Casualty Kit

The TACOPS® line is sold exclusively through TSSi. TSSI-OPS.COM sales@tssi-ops.com / Toll-free 877 535-8774 Circle 123 on Reader Service Card

The Counter Terrorist ~ February/March 2016 31


BOOK REVIEW

Bombs, IEDs, and Explosives: Identification, Investigation, and Disposal Techniques by Paul R. Laska © 2016, Taylor & Francis Group, LLC

C

oming from the Israel Defense Forces (IDF) and living in Israel for the better part of a decade, I feel a little numb to the idea of explosives and improvised explosive devices (IEDs) when compared to the layman. Granted, I participated in several operations involving breaching and responded to potential suicide bombers. However, the truth is that I was never a hot breacher or a bomb tech, so my familiarity with the subject matter of this book is still quite limited. After working with the IDF, I trained on IEDs for security operations but never really took much of a personal interest in the topic. Explosive ordnance disposal (EOD) is its own technical profession and a high-stress field within an already intense line of work. This book was a great way for me to refresh my memory, expand my perspective, and get some details about U.S. bomb disposal, how it is organized, and how it operates in various law enforcement and emergency response scenarios. The book starts off with the history of IEDs, including investigation and disposal techniques, and it is interlaced with case studies and relevant images,

Reviewed by Garret Machine

most of which are entertaining and a nice break from the depth of knowledge in the book. Then the subject matter moves to the structure of EOD and bomb disposal in the civilian law enforcement and emergency response field. This was a great overview and very educational for me, as I knew little about U.S. civilian EOD and HAZMAT as they relate to the various agencies and training bodies. Next, the book explores the specifics of EOD investigation, organization, training, legal considerations and response. After that, the focus turns to equipment, evidence handling, and documentation. Finally, the last few chapters of the book are dedicated to detailed case studies. Needless to say, the book is well organized and informative for the layman, as well as for the law enforcement professional who is interested in career advancement. My recommendation to anyone new to the technical topics presented in this volume would be to read slowly—and read the book twice. In fact, I would say that this book could even serve as one of the manuals for an actual EOD course, or at least as required reading.

32 The Counter Terrorist ~ February/March 2016

IDF forces uncovered four improvised explosive devices in the bags of two Palestinians at Beka'ot Crossing, north of Jericho. The devices were safely detonated by a team of sappers. Photo by: Israel Defense Forces


The Counter Terrorist ~ February/March 2016 33


ISRAELI CARRY FOR ARMED AND RESPONSIBLE CITIZENS

34 The Counter Terrorist ~ February/March 2016

Marines practice drawing their pistols at a moment’s notice during a V.I.P. security course at the Indoor Small-Arms Range. For three days, Marines from Marine Corps Air Station Iwakuni, Japan, trained with former members of the Israeli Special Forces in tactics used in V.I.P. protection. Photo by: U.S. federal government,


by Ken Pagano

The ancients had a saying: “The wicked flee when no one is pursuing, but the righteous are bold as a lion.” To broach this topic upon American soil is not for the faint of heart. Believe me, I know.

I

have been an advocate of the Israeli method of carry for almost forty years. While the topic could be applied to others’ focus groups, in this case I will specifically be concerned with civilians who carry a concealed firearm. I purposefully choose to sidestep and refuse to respond to the common gun range and Internet chatter. Such comments as, if you don’t have a round

in the chamber you might as well carry a brick; an unloaded gun is just an expensive paperweight; or anyone who carries a gun with the chamber empty must be afraid of their gun or doesn’t have proper training. All such comments are banal nonsense. I grew up in a family that possessed a deep respect and admiration for firearms. For the most part we were just ordinary civilians. Albeit, I did have relatives who

The Counter Terrorist ~ February/March 2016 35


Muslim Quarter. Photo by: James Emery

36 The Counter Terrorist ~ February/March 2016

served as police, deputy sheriffs and federal agents. I had thirteen uncles who fought during WWII. But when it was all said and done, when they came home they returned to their civilian life. But they all had an appreciation for guns as citizens. I myself grew up hunting and sport shooting in the Northeast when guns were still popular. I was a gun guy, as a civilian, before I served in the U.S. Marine Corps, and I am still a gun guy today. Before I started serving as a deputy sheriff, I was a gun guy, and see myself still being a gun guy when I no longer have active police powers. I do not believe that firearms should be limited to military and police. I fully respect and admire military, police, and all other first responders. I am one and have been, off and on, for the past forty years. But my passion lies with training civilians, the ordinary man or woman who carries a firearm primarily for self-defense. They are not police, nor do they wish to be. They carry a gun to protect themselves or their loved ones from harm. In fact, they are often the true first responders when a situation goes “sideways,” often before 911 is called and help arrives. I call them “self-responders.” My goal is to train average civilians in a safe and effective system that will help them become responsible armed citizens. This means they must be just as responsible when not using their firearms as they would be if they had to deploy one in self-defense. Since the object of the article has been established, namely the armed responsible civilian, let me now explain the subject. It is what I have found to be the best method of training for citizens, the Israeli carry system. Notice that I used the word “system.” The Israeli method of carry comprises so much more than what the average person would normally think when hearing this


terminology. Let me begin by stating what the Israeli method of carry is not. It is not merely the carrying of a firearm without a round in the chamber. Although the majority of Israelis do indeed carry without a chambered round, some specialized military/police units do not. Yet they still carry “Israeli.� Why? Because the Israeli technique is a complete system that begins with a proper mindset and embraces other topics such as open hand self-defense, first aid, and physical conditioning, to name a few. It is a close-quarters fighting system that relies primary on point shooting. The body position, gun presentation, and operating under stress are part and parcel of the Israeli method. Merely carrying a firearm without a chambered round is just a small piece of the puzzle. Yet when most people hear of the Israeli method or carrying Israeli, they think of a pistol sans a loaded chamber. I was first introduced to Condition 3 carry, also known as Cruiser carry, while a young man in the Marines almost forty years ago. As I began to expand my training with firearms, I would later come to logically understand and fully embrace the Israeli carry method. The technique of carrying chamber empty is not restricted to the Israelis, nor did they develop it. It goes back to the days of Fairbairn and Sykes, when they worked with the Shanghai Municipal Police during the 1920s and ‘30s. Their method was later adopted and enhanced by one Hector Grant-Taylor, whose teaching later became the basis for The Palestinian Police Force Manual. The manual provided the foundation for Israeli method. It acquired that label because the Israelis popularized it as a method of carry and developed an entire system around empty-chamber carry utilizing point shooting. And their reasons for doing so are as valid today as

they were then: Israeli carry provides a means that allows safe carry with quick response time for a population largely untrained in the use of firearms, in close quarters urban environment. This is quite often the same situation when training civilians to prepare for concealed carry. Most have semi-auto of various calibers and design and are urbanites who have little or no prior training. In this climate the Israeli method flourishes. The method of carrying with a loaded magazine in the gun without a chambered round has been around since the advent of semi-auto pistols. Some would argue that the practice was around in the Old West, when single action revolvers ruled the day, and many would not carry with a round under the hammer. Currently the commonly known conditions of carry that are based upon the usage of the 1911, single-action semi-auto are: Condition 1, loaded magazine in the weapon, a round in the chamber, the hammer cocked and locked. Condition 2 is a loaded magazine in, a round in the chamber and hammer fully down or in the half cock position. Condition 3, which has become known as Israeli carry, is a loaded magazine in the weapon but no round in the chamber. The gun must be drawn and the slide cycled in order to chamber the first round. Condition 4 is the weapon without a round or magazine in the chamber and the slide locked back in the open position. Condition 3 carry is a valid method and is still taught and practiced by our military in certain venues. It is a practice utilized by some of the largest civilian armed security companies across the globe. And it is often the primary fashion that most civilians feel comfortable when first beginning to carry a semiauto firearm. Some states even teach in their mandated Department of Criminal Justice Training (DOCJT) curriculum

The gun must be drawn and the slide cycled in order to chamber the first round.

The Counter Terrorist ~ February/March 2016 37


that a single action handgun, be it pistol or revolver, should not be carried with a round in the chamber or under the hammer. Since 9/11, with the rise of terrorism, the concern with active shooter events, and the vast majority of states allowing for concealed carry, there are now more armed civilians then ever before. And as some states consider expanding concealed carry of firearms to include public schools, some policy makers need to consider balancing the mitigation of one type of vulnerability, the potential of an active shooter, with

the introduction of another, the potential of a negligent discharge. Bearing all this in mind, I think it is safe to say whether or not one agrees with this fashion of carry, it is still valid option in which teaching needs to be provided. The primary reason for Israeli carry has always been safety. The Israeli army is made up of conscripts, young men and women who not only want but also have to serve in the military. Many if not most have no prior firearms training. It is a reasonable and safe practice to introduce these young soldiers to firearms training

Soldiers of the Caracal co-ed battalion during a platoon exercise in southern Israel. Photo by: The Israel Defense Forces

March 30 – April 1, 2016 ¡ McAllen, TX

ADVANCING CAPABILITIES IN THE FIELD REGISTER TODAY!

WWW.BORDERSOUTHWEST.COM

38 The Counter Terrorist ~ February/March 2016

Circle 117 on Reader Service Card

without a live round in the chamber. It is a safe and effective method that I too learned many years ago. I am convinced now more than ever, under normal daily conditions, that this is still the best method of carry, especially for civilians. All one needs to do is a quick Internet search on the topic of negligent/ accidental discharges (NDs/ADs) to understand the reasoning behind carrying Israeli. The number of NDs by trained professionals, such as law enforcement officers (LEOs), is mind numbing and somewhat embarrassing, to say the least. Most of these NDs occur during administrative handling of the firearm, such as drawing, holstering, or cleaning of the weapon. Some will argue that this boils down to a training issue, to which I have no quarrel. If one would simply keep their finger off the trigger, most of this discussion would be moot. However, sometimes it is also due to an equipment failure such as a faulty holster. There may be other factors such as the weapons platform itself, that make it easier for an ND to occur, but that is for another discussion. The fact remains that NDs still occur, and perpetrated by people who are considered to be the trained professionals. Sad but true, many officers only practice with their firearms when qualifications are due. Many never take their guns from their holsters until this time. Routinely, most don then remove their gun belts without even touching the sidearm, which is often secured in a multiple retention holster. And even then, there are still reported cases of negligent discharges. So how much more likely are these to occur for the average civilian? One who most likely uses a simple concealment holster, level, who may be removing their firearms multiple times in the course of the day, depending on their circumstances? Every time a gun


Circle 279 on Reader Service Card

The Counter Terrorist ~ February/March 2016 39


A civilian who is proficient in the Israeli draw can draw, from concealment, in about 1.5–2.5 seconds, some less.

is handled, the risk potential goes up. And since these individuals are not LE, they arguably are more likely to shoot themselves with their own firearm by means of administrative handling then they are of being shot in a gunfight. As a general proposition, the risk of a ND from carrying C1 is far greater than the risk of being killed because someone is carrying Israeli. That is the simple truth for most civilians who carry a concealed firearm. The preponderance of self-defense situations, of which I am aware, do not include an ambush or other such circumstances that require a one-hand only, instant response. Part and parcel of training for responsible citizens is to prepare for the worst but practice for what is most probable. Knowing how to clear a double feed, with your support hand only, while in the prone position, is a good thing. But the practice of safely handling a firearm on a daily basis in one’s normal civilian setting, I think, is better. To truly look at the safety issue, we need to move beyond the “I’m in a gunfight right now” mentality and move more toward the “What is the risk involved in carrying a gun on a daily basis?” Honestly, for the average civilian, being involved in an

40 The Counter Terrorist ~ February/March 2016

actual gunfight is not that likely; it’s a once in a lifetime. And if it does happen, it is going to involve a few seconds of my life. Admittedly, they are going to be extremely important seconds, but I have to balance that against the thousands of hours I will carry the gun, and the thousands of times I will administratively handle the gun. Only then can I do a honest and responsible risk assessment. Israeli carry without a round in the chamber, for the average citizen, is the safest manner of carry, bar none. As an instructor, I can attest to the fact that the vast majority of those who carry a firearm are not as proficient as they should be. They are unconsciously incompetant. It is a sad fact that most are not “gun people.” Most who reject the Israeli method of carry do so because they believe it is too slow on the draw and takes more time to chamber the round. Having been trained in both chambered and unchambered Israeli methodologies, I can attest that the Israeli method of carry is less than .5 seconds slower than chambered carry, if you are proficient. I have been timed and have timed others who are proficient in the Israeli technique, and this has been proven to be true.

Circle 213 on Reader Service Card


A civilian who is proficient in the Israeli draw can draw, from concealment, in about 1.5–2.5 seconds, some less. I will concede that the Israeli method will add perhaps .5 seconds to the draw compared to C1 carry. As a trained, responsible, and logical civilian, I can afford the extra .5 seconds on the draw. What I cannot afford is the chance of an ND/AD. An ND/AD has the potential to wreck my life and that of my friends or family. And that may well be true even if the round does not strike anyone. If the extra .5 seconds will make a difference in a critical incident, I confess perhaps I let my guard down on my situational awareness and that I probably need do something else before going to my firearm. I cannot out-draw a trigger pull. If my threat already has drawn on me, I need to do something else. Action trumps reaction. If a bad guy with a knife is suddenly upon me, well perhaps I need to seek a means of escape or engage my attacker with open hand techniques, if space permits. Do the math: if the attack comes in less than 2.0 seconds, it will not matter what condition my weapon is in because any holstered weapon would be to slow. If the attack comes in over 2.5 seconds, then any condition will be fast enough. So I am really only concerning myself with an

Circle 343 on Reader Service Card

attack between 2.0 and 2.5 seconds. I will say that you must train in the Israeli method at least as much as you would any other carry method. I think it is fair to say that most people will gravitate to that which they know and often how they have been trained. Me too. For some, it is difficult to understand or embrace a different methodology. But if I am to be a responsible civilian carry holder, I must explore and examine multiple techniques and find what best fits my current needs and conditions. Under stress, you will revert back to your training. The entire methodology of Israeli carry is different. But different does not mean inferior. In fact, the Israeli method has been found to be time tested on the mean streets of the Middle East, and has been more than a little successful. It works with those of various ages and abilities and those who carry a multitude of different weapon platforms. It works under stress and is safe. The system focuses upon instinctive body responses and utilizes constant repetitions of drills to develop muscle memory. Chamber empty is not only a safe method of carry but also helps to overcome possible training complications

due to a weapon’s design. No playing with different safety mechanisms. Simply draw, cock, and shoot. Frankly, I have found the training that goes with the carrying of a weapon without a chambered round to be quite superior to much of what I have seen on today’s market. While the Israeli method of carry may not be for all people, I do think it has more going for it, for the responsible civilian concealed carry holder, than most people care to admit. Live fire demonstrations of the Israeli method can be found at www.youtube. com/TrainWithTheIDF.

ABOUT THE AUTHOR Ken Pagano has been teaching students in the Israeli method for almost 40 yrs. He is a graduate of the FBI’s Police Firearms Instructor course, a member of IALEFI, a certified NRA instructor, as well as, an instructor trainer for Private Armed Security Guards and Concealed Carry of Deadly Weapons in his state of residence. He also currently serves as a deputy sheriff and may be contact at kbpagano59@gmail.com or Facebook at https://www.facebook.com/IsraeliTactical-Sport-Shooting-AssociationIsraeli-Combat-Sport-Shooting.

The Counter Terrorist ~ February/March 2016 41


LESSONS FROM THE RECENT WAVE OF ATTACKS

42 The Counter Terrorist ~ February/March 2016


by John Gomez

Any terrorist attack is undoubtedly going to lead to a variety of assumptions, most of which are based on less than solid intelligence. This was especially true for the recent terrorist attacks in California.

W

ithin hours of the San Bernardino attacks, several media outlets began interviewing experts in regard to their assumptions of what had occurred and what was meant. Unfortunately, much of what was presented by experts was somewhat dated and did not align with real-world

operational intelligence. One of the key takeaways from this event, especially in terms of the early speculation and guidance, is that our understanding of terrorism is rather limited and still developing. Most Law Enforcement Line Officers (Street LEOs), even at the federal level, are not well versed in the ideology,

Blood and sand on the ground in front of Le Petit Cambodge/ Carillon on the day following November 2015 Paris attacks. Photo by: Maya-Anaïs Yataghène

operational methods, or tactics utilized by global terrorists, specifically those associated with radical Islamic ideology and objectives. This lack of understanding was not only prevalent in the hours and days after the San Bernardino attacks, but also was a key construct of the Paris attacks. As was

The Counter Terrorist ~ February/March 2016 43


The suspect's vehicle involved in a shootout with the police in the 2015 San Bernardino shooting. Photo by: San Bernardino County Sheriff's Department

Four of the guns believed used by the couple who killed 14 people and injured 21 others at the 2015 San Bernardino shooting. The rifles were identified as the DPMS Panther Arms model A15 and a Smith & Wesson M&P15. The 9mm handguns were from Llama arms and Springfield Armory. Photo by: San Bernardino County Sheriff's Department

the case in California, investigators and experts (advisors, etc.) made statements and assumptions that were not in line with the actual operational tactics, techniques, and procedures (TTPs) employed by today’s leading terrorist organizations, such as ISIS. In this article, I will examine some of the assumptions that were made by those either involved in the investigation or those speculating and adding color commentary from the sidelines. My hope is that by sharing some of the counter-intelligence work that my firm put together publicly, it will help those in leadership positions realize that their assumptions may need to evolve. Sun Tzu, in the classic work The Art of War, coached that it is critical to know one’s

44 The Counter Terrorist ~ February/March 2016

enemy. In today’s world of global terrorism, understanding the enemy has never been so critical, because frankly, so much has never been at stake. I have done what I can to present responses to common assumptions that were made specifically after the California attacks. These responses are limited in scope, but do a good job, I believe, of representing the broader counterintelligence workup that was developed by Group Espada. In some cases I have purposefully refrained from providing detail or naming sources, given that this is an ongoing investigation. That stated, the information presented here should provide a fresh basis for planning and decisionmaking for those who are responsible for responding to terrorist attacks.


ASSUMPTION:

A female does not fit the profile of the average terrorist or jihadist.

RESPONSE:

The belief that there is such a thing as an “average” terrorist or jihadist is counter to following the evidence. The evidence shows that this terrorist incident did involve a female. Further, we have seen the employment of females in various terrorist incidents in the past several years. This includes the attacks in Paris as well as Australia and a large percentage of homicide bomber attacks in the Middle East. The employment of females, and in some cases children, is not atypical. Terrorist organizations employ females because they realize that most anti-terror agents or others (civilian population) do not view females as threats. The employment of a female playing the role of a lost person, pretending to be helpless, or using other charms, dates back well before the modern age of terrorism. There is no restriction in the Koran or Hadith for the employment of woman in direct action or support roles related to jihadist activities. The assumption that this was an evolution of tactics is false and does not contribute to our ability to prepare effectively and employ counter intelligence or action. Women are integral part of the terrorist force and are heavily relied-upon assets.

ASSUMPTION: Why would the attackers stay in the area and not exit? RESPONSE:

It is my belief that the attackers planned to return to their base or other location (storage facility, secondary support area, staging area) and resupply, and that they did not plan to stay in the area. My reasoning for this belief is based on several factors,

including the amount of explosives found at their home, which were not part of a trap. Based on their TTP and other details, it is my belief that the attackers became overzealous in their pursuit of accomplishing their first mission. After the explosives in the county building did not detonate, I suspect they returned to the area, or waited in the area discussing what they should do, to successfully detonate the explosives. Upon being spotted by police, they attempted to flee. They did not stand and fight; they did not move to a hardened location: they attempted to continue with their secondary mission(s). Their operational mistake cost them their lives, but it is naive to believe they stayed in the area on purpose. This assumption does not follow the evidence.

There is no restriction in the Koran or Hadith for the employment of woman in direct action or support roles related to jihadist activities.

All of the evidence points to secondary targets. The amount of explosives at their base, the state of their personal luggage (packed and ready to go), and other indicators show that they were planning to return, resupply, and continue their operations. What is unknown is if the secondary targets would be engaged directly or after a period of time. A large factor in this is that they wore masks. If their goal were not to continue the fight, but to martyr themselves, they would have no need for anonymity. Anonymity is only employed when your goal is continued execution of operations, escape, or evasion.

to embrace. Most jihadists are not martyrs. Jihadists are warriors focused on winning the war, not simply the battle. Those selected for martyrdom are few and far between, when compared to the overall number of jihadists employed on missions. There is no requirement for a jihadist to commit martyrdom. Further martyrdom does not always require the practitioner to end their life. Martyrdom is traditionally a complete and total devotion to a way of life or belief. Some may be martyrs simply by carrying out a mission with conviction and yet continue to fight another day. That said, any jihadist who dies in battle is entitled to the heavenly rewards described in their religious texts, at least as it relates to Islam. This was a well thought out mission and the goal was not to end their lives, but to fight on.

ASSUMPTION: They weren’t martyrs so this is workplace violence.

ASSUMPTION: They must have had help building the pipe bombs.

ASSUMPTION:

There are no

secondary targets.

RESPONSE:

RESPONSE:

This is another unqualified assumption that is dangerous

RESPONSE:

It is possible they did have assistance, but the fact is that

The Counter Terrorist ~ February/March 2016 45


Driver license photo of Syed Rizwan Farook. Photo by: Department of Motor Vehicles

relatively unskilled individuals can build pipe bombs. In this case specifically, the male attacker was highly skilled in the repair of cars, understood the use of tools, had the ability to read plans, and had an engineering background. He had access to plans (Inspire Magazine, etc.) and access to the materials. His job at the county also provided opportunity and access to compounds without raising concern. Although they may have had help, and possibly did, they did not have to have help. The attackers had the

skills and determination to build close to twenty pipe bombs on their own. This also fits the pattern of operational security that they employed for what appears to have been two years or longer. It is important to understand this, because the notion that a cell requires tremendous support or funding is a very dangerous assumption.

ASSUMPTION: He wasn’t radicalized and this wasn’t an ISIS mission, since they didn’t take credit.

Tactical belt used by one of the shooters at the 2015 San Bernardino shooting. Photo by: San Bernardino County Sheriff's Department

46 The Counter Terrorist ~ February/March 2016


Counter The

Asia Pacific Edition The Counter Terrorist Magazine Asia Pacific Edition is finally available for the Asia Pacific region counter-terrorism and homeland security practitioners. The Asia Pacific Edition not only gives the readers a worldwide counter-terrorism perspective but also in-depth information about counter terrorism activities in Asia. The Asia Pacific Edition provides an excellent platform for counter-terrorism and homeland solutions providers to access and penetrate the Asia Pacific market.

Circle 255 on Reader Service Card

Email: sales@thecounterterroristmag.com Circle 13 on Reader Service Card

The Counter Terrorist ~ February/March 2016 47


RESPONSE: Radicalization does not require a pledge, membership, or trip to a country. It might help, might make things easier, but radicalization only requires a personal commitment to a cause. There is no fanfare required, no requirement to post something to social media or to take an oath. In fact, doing so may not be the best operational security and at worst is somewhat dramatic. To believe that you must have a handler, affiliation, or proof of such connection is a Western belief, not a factual understanding of jihadist or terrorists overall. No mission approval is required, or command and control. Once a personal decision is made to fight, access to resources is plentiful. We should also keep in mind that ISIS has repeatedly called for lone wolf attacks; this is a clear lone wolf attack and demonstrates the effectiveness and danger of such a personal decision in which there is no

overt or covert connection to a cause. This is franchising without the legal paperwork and is highly effective, with a tremendous return on investment.

ASSUMPTION: The GoPro was so they could film their martyrdom videos. RESPONSE:

The GoPro was not for martyrdom, but rather for socialization of their cause and demonstration of what can be accomplished. The attackers, I believe, wanted to use the GoPro video to show others what they could do and how easy they could do it—and still live to fight another day. There is no evidence they were martyrs. Further, a martyrdom video is done prior to the operation and part of a ritual, which includes cleansing. None of this evidence was found. These were highly intelligent attackers who would have probably submitted the video to

48 The Counter Terrorist ~ February/March 2016

ISIS, who would in turn utilize it for further marketing, specifically in the U.S. The very fact that this was part of their planning and objectives demonstrates the level of patience and professional detail employed in planning these attacks.

ASSUMPTION: They really wanted a fight with police.

RESPONSE:

This is not what the evidence shows. They disposed burner cell phones, hard drives, and other intelligence, which were recovered by police, after the operation. This action does not fit with the actions of someone wanting to fight. You don’t dispose of evidence if your goal is to die fighting; in fact you don’t even think of evidence disposal. Their goal was to continue the mission and to fight on. This is a very critical lesson to be learned by law enforcement as it speaks to the potential

Circle 277 on Reader Service Card


to deal with prolonged operations, something most U.S. Law Enforcement agencies do not train for and are not equipped to manage.

ASSUMPTION: The 3,000 rounds of ammunition was a lot of ammunition and required tremendous funding. How could they get that on his salary? RESPONSE: A lot of ammunition is subjective. This is not that much ammunition and actually is similar to what was owned by the Aurora attacker. The cost of 3,000 rounds of ammunition is approximately $650, including shipping. It is not an extreme economical challenge, and does not require sophisticated funding or tactics. Since the attacks in California, much more has come to light, including trips to Saudi Arabia, wedding gifts, and possible participation by neighbors or family members of the attackers. Although that evidence is important to understand, the real goal of this article is to drive change in our tactics as law enforcement. Life has dramatically changed, and our understandings of the life cycle of a terrorist event, our response and pre-planning, cannot be based on false assumptions, outdated information, or limited Western perspectives that do not match the reality of our enemies. If you wonder just how drastically false perceptions or assumptions hinder our effectiveness, I will share with you a quote from a member of the French CT teams, who are extremely well trained. “Nous ne crovions qu’ils etaient ce bien, ce bien equipe, ce professionnel or ce sophistiquee.” Translation: “We never believed that they were this good, this well equipped, this professional, or this sophisticated.”

If you don’t think what you assume, believe, or think matters, think again!

FROM PARIS Within days of the Paris attacks, French authorities began to decipher the after action reviews from the various law enforcement agencies that responded to the terrorist attacks in and around Paris. Many lessons were learned and much of that will be incorporated into go-forward training programs. The top three lessons,

You don’t dispose of evidence if your goal is to die fighting; in fact you don’t even think of evidence disposal.

NO COST PASSES AVAILABLE FOR FEDERAL GOVERNMENT EMPLOYEES AND ACTIVE MILITARY

April 25-27, 2016 | Washington D.C.

ADVANCING NETWORKS IN THE DOD AND MILITARY SERVICES ✓

Help forge the way in future network requirements and initiatives

Learn how to get involved with the military’s evolution to Joint networks

Acquire insight on where cloud computing can impact government and military networks

Learn about Emerging Technologies Supporting the “Mobile” Warfighter

Hear from Experts on the Army’s Roadmap to Network Modernization

Discuss the Newest Advances in SATCOM and Tactical Radio capabilities

Gain a deeper understanding of the big picture for our Military’s Joint Information Environment.

Hear first hand about the future of information and technology policies of all the Military Services

Deep Dive into the organizations tasked with NETMOD initiatives

Gain insight about the newest advances in information assurance and security

Register Today! www.MilitaryNetworkModernization.com 1-800-882-8684 | idga@idga.org Circle 115 on Reader Service Card

The Counter Terrorist ~ February/March 2016 49


Soldiers from France’s First Infantry Regiment march down Camps del Elysee during the 2012 14th of July parade in Paris. Photo by: U.S. Air Force photo/Staff Sgt. Benjamin Wilson

in my opinion, that were learned were as follows.

SPEED AND COORDINATION MATTER One of the biggest challenges was the ability of ground teams to move quickly and coordinate. There was a slowing of responses, in some cases, because there was a lack of coordination.

TRAIN AND PLAN FOR SIMULTANEOUS ATTACKS November 18, 2015—French police search for suspects after the Paris attacks in Saint-Denis. Photo by: Chris93

A key learning point of the Paris attacks, is that terrorist cells can effectively execute coordinated attacks

50 The Counter Terrorist ~ February/March 2016

that are either simultaneous or waterfall in nature. It is imperative that organizations responsible for responding to terrorist events train and plan for dealing with situations where resources are challenged with multiple highly sophisticated events.

OPERATOR PSYCHOLOGY MATTERS A key challenge that came out of Paris is that the requirements of entry teams may have changed forever. The Paris attacks forced the entry teams to make a rather heroic choice. Stay outside and continue to hear their countrymen


301 on Reader Service Card Circle 329

The Counter Terrorist ~ February/March 2016 51


being slaughtered by the attackers or enter the theatre and face near certain death. Although all entry teams realize there is a risk, few are asked to enter a location with multiple attackers wearing homicide vests, who have planned to detonate themselves. The Paris entry teams knew the attackers had explosives, they knew that they were being taunted to enter and yet they had no choice but to enter. This is a major psychological challenge that leaders in law enforcement must address. Asking your entry team to enter, knowing they will most likely die, is vastly different than asking a team to enter with a good chance of winning the fight due to their conditioning.

ABOUT THE AUTHOR John Gomez is CEO of Group Espada and has a background in special operations, counter terrorism and cyber-warfare. www.groupespada.com

•

52 The Counter Terrorist ~ February/March 2016

Photo by: Mstyslav Chernov


www.homelandsecurityssi.com Find out more at:

TAKE YOUR TRAINING TO A HIGHER LEVEL...

SSI ELEVATED TACTICS TRAINING Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn: • • • • • • •

Vehicle driving and operating techniques in a variety of situations Global case studies of real-world operations using the specific equipment Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults Elevated obstacle negotiation and firing platforms Emergency evacuations, climbing and descending options Distraction and deception techniques ® SECURITY and much more... SOLUTIONS

SSI

INTERNATIONAL

Protecting the Homeland Together ®

Call now for more information.

Elevated Tactics Training provided in partnership with Patriot3.

Circle 291 on Reader Service Card

Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 313 on Reader Service Card

The Counter The Counter TerroristTerrorist ~ February/March 2016 2015Card 53 29 Circle 183~onJune/July Reader Service


POTENTIAL SECURITY

CONSEQUENCES OF THE NEW AMERICAN COLLEGE CAMPUS For generations, American universities have fomented radical beliefs through the free exchange of ideas critical of the dominant culture. These ideas ultimately traveled down dangerous paths.

54 The Counter Terrorist ~ February/March 2016


by Joseph J. Kolb

T

he recent wave of demonstrations on American campuses to ensure cultural and personal sensitivity of race and religion at the expense of open dialogue could be detrimental to understanding and preventing Islamic radicalization on campus. This could incite some students to commit acts of violence, either on or off campus. A generation ago, a harbinger of domestic radicalism was put forth by Bernadine Dohrn. “All over the world,

people fighting American imperialism look to America’s youth to use our strategic position behind enemy lines to join forces in the destruction of the empire,” Dorhn said in the Weather Underground’s 1970 Declaration of a State of War. The Weather Underground was a militant spinoff of the Students for a Democratic Society and responsible for taking the rhetoric operational with numerous domestic bombings. Now a new generation of college

students are taking up the disturbing mantle, albeit naively, of radicalism. There is an inherent ambivalence among most American college students as to the root causes of terrorism as well as the implications of international events on domestic security. The elimination of open dialogue about religion and its implications to acts of terrorism, a refusal to recognize an event such as 9/11 for no other reason that

United Airlines Flight 175 crashes into the south tower of the World Trade Center complex in New York City during the September 11th attacks. Photo by: Robert J. Fisch The Counter Terrorist ~ February/March 2016 55


Photo by: Bsstu

it being potentially Islamaphobic,1 the growing sense of anti-Semitism through the nationwide boycott, divestment, and sanctions (BDS) against Israel campaigns, and an unknown demographic of Muslim students, such as Faisal Mohammad, who investigators identified as being a troubled, isolated young man who knew few people on campus, may actually create a sense of empowerment to execute an act of terrorism.2 On November 10, the (University of ) Minnesota Student Association voted against a resolution to annually recognize 9/11 on campus out of fear of offending Muslim students on campus.1 This seemingly benign decision was preceded on November 4, when at The University of California, Merced, eighteen-year-old freshman Faisal Mohammad went on a stabbing spree on the campus. In the 2013–2014 college school year there were some 400 anti-Israel events calling for the boycott, divestment, and sanctions in an attempt to dismantle/disrupt Israel.3 A more tangible incident occurred in August 2007, when two University of South Florida students, Ahmed Abdelatif Sherif Mohamed and Youssef Samir Megahed, were stopped by a Berkley County sheriff deputy not far from a Naval installation in Goose Creek, S.C., that housed enemy combatants. In the trunk of the student’s car were pipe bombs. Megahed would be found not guilty of federal charges in 2009. In 2008, Mohamed pleaded guilty to aiding terrorists and was sentenced to 15 years in prison after a YouTube video he produced showed how to make a bomb detonator out of a toy remote control. In the video, Mohamed admitted he wanted to target “infidels,” including American troops overseas, without “martyrs” having to sacrifice their lives.4 It was also revealed that he used USF equipment at night, when no one else was

56 The Counter Terrorist ~ February/March 2016

around, to upload the video. Mohamed “embraces a violent and extreme ideology” and “has a particular dislike of Americans,” said Assistant U.S. Attorney Robert Monk at the time of Mohamed’s sentencing.4 The consequences of unilateral expression while suppressing free speech through intimidation creates a hostile environment eliminating the ability to have an atmosphere of philosophical checks and balances to prevent some theories to evolve to the operational level. We will likely never know what was in the mind of Faisal Mohammad when he went on a stabbing spree at The University of California, Merced in November 2015 that resulted in four people being wounded and his ultimate death by police, but the subsequent discovery of an ISIS flag among his belongings and the utilization of the very same knifing tactic being employed by Palestinians against Israelis is a point that can’t be ignored. The narrative that Mohammad went on his violent attacks because he was removed from a study group may very well be true, but the opportunity for him to stew in his anger and hate to the point this random act of violence could have been fueled by a festering disdain for American society, and his victims merely served as a catalyst for the opportunity. In Mohammad’s two-page manifesto, he described taking students hostage then summoning campus police to steal an officer’s firearm, which he then planned to use to kill students at a dormitory. Investigators contend that the model for the attack may have been an extremist group.2 The similarity between Mohammad’s attacks and those carried out by Palestinians against Israelis could not be ignored. Mohammad was killed by police before carrying out the plan. The ingredients for subsequent radical Islam-inspired campus attacks are rapidly


Palestine Columbia Students for Justice in Palestine organized a mock Israeli Checkpoint to raise awareness of human rights abuses and subsequent obstruction of education. In respose pro Israeli groups on campus handed out a factsheet describing checkpoints as a "necessary evil" essential for preventing terrorist attacks. Photo by: Andra MIhali

emerging, not only of actual group members, but those disenfranchised and living on the fringes of society, who will be attracted to the glamor of the jihad that can flourish in the “tolerant� college environment. Mohammad was identified as a loner, but investigators are staunchly claiming his violent act was out of revenge for being snubbed from the study group despite having an ISIS flag replica in his backpack. At the heart of the emerging antiIsrael sentiment is the Muslim Students Association (MSA) and Students for Justice in Palestine (SJP), who have been inciting a groundswell of student involvement to urge universities to

Students for Justice in Palestine at UC Berkeley. Photo by: Ariel Hayat

The Counter Terrorist ~ February/March 2016 57


August 2, 2014—Students for Justice in Palestine march. Photo by: William Stadtwald Demchick

boycott, divest, and create sanctions against Israel, in large part for its alleged repression of Palestine. ProIsraeli supporters such as author David Horowitz says the two student groups were created by members of the Muslim Brotherhood, forerunner to al-Qaeda and Hamas.5 Subsequent to vitriolic levels of anti-Israel sentiment, Horowitz devised a Top 10 list of American universities “friendly to terrorists.”5 • Brandeis • Columbia

• Harvard • Rutgers-New Brunswick • San Francisco State University • University of California-Irvine • University of California-Los Angeles • University of San Diego • University of Michigan • University of New Mexico “The increase in programs and initiatives designed to isolate, defame, and delegitimize Israel on college campuses have resulted in increased tension between students and can foster

58 The Counter Terrorist ~ February/March 2016

a hostile atmosphere for pro-Israel and Jewish students,” said Oren Segal, director, Center on Extremism, AntiDefamation League.6 “That in and of itself is troubling and should be rejected. But there is little evidence to suggest that these same student groups are incubating hard core extremists that view foreign terrorist organizations such as ISIS as a legitimate force.” Horowitz alleges that schools such as UNM (and the others) are a breeding ground for terrorists and practice a


double standard contending that the universities have a Code of Conduct and would never tolerate such behavior against non-Jewish students.7 Not mentioned on the list is the University of South Florida. USF has been the focus of law enforcement attention in the past because of former computer engineering Professor Sami al-Arian’s acknowledged connection to the Palestinian Islamic Jihad organization. USF also gained attention in 2006, when two Saudi students attending

the university were arrested on trespass charges after hitching a ride on a school bus transporting high school students.8 With the environment of antiSemitism through the BDS campaign fueled by a robust radical Islamist social media campaign, disgruntled students such as Faisal Mohammad may pick up the mantle to carry out campus attacks. In a similar vein, the University of South Florida students planning the attack in South Carolina used their student status as a cover.

This acceptance of countercultural beliefs already instilled in many of these institutions presents a daunting conundrum between free speech and religious freedom. Efforts to prevent student dissent and protest from accelerating in violence, an atmosphere of what may appear to be forced tolerance for one group at the expense of the right to free speech and expression, or the ability for nefarious individuals to plot and execute an attack under the cover of this newfound tolerance, cannot be ignored. Michael Fagel, Ph.D, Adjunct Professor at the Illinois Institute of Technology in Chicago, where he teaches in the Master of Public Administration program, focusing on homeland security and emergency planning topics, said the inherent nature of the university structure is capable of breeding radicalization. “Universities are afraid to disenfranchise a student population that generally are high revenue students,” Fagel said.9 Fagel goes on to say that many schools are hotbeds of unrest and free thinking, as many tenure track professors are radicals themselves as a throwback to the late 60s and 70s generation, and due to the fact that many universities are stuck in the politically correct mode versus the patriotic mode. What is particularly disconcerting given the open university atmosphere is the absence of any universal strategies to identify or mitigate campus radicalization. “IACLEA does not have a specific policy on identifying Islamic radicalization, as that is an operational decision of each individual institution, and its public safety organization which is influenced by national policy set by the federal government,” said Kendra Pheasant, Associate Director International Association of Campus Law Enforcement Administrators.10 Fagel says such programs are few and far between.

The Counter Terrorist ~ February/March 2016 59


In 2005, the FBI launched the National Security Higher Education Advisory Board, a seventeen-member panel that includes presidents from top public and private research schools. The board meets approximately three times a year and provides a forum for FBI leadership and university presidents to discuss national security issues of mutual concern. The College and University Security Effort—or CAUSE—allows FBI Special Agents in Charge to meet with the heads of local colleges to discuss national security issues and to share information and ideas. These discussions include the national security implications these world-renowned research facilities may be facing and how and why some foreign governments may be attempting to pry loose their research and intellectual property creations. “As we do our work, we wish to be sensitive to university concerns about

international students, visas, technology export policy, and the special culture of colleges and universities,” said then-FBI Director Robert Mueller.11

WARNING SIGNS Prevention is paramount to prevent campus radicalization. Warning signs may be as subtle as a course major or personality traits. Burton and Stewart suggest that the major of a potential jihadist could be a compelling factor.8 Although there is no evidence at this point to indicate that Megahed was anything but a normal student, past cases suggest that radical Muslim youth studying the applied sciences are disproportionately more prone to embrace jihadism than are those who pursue studies in social sciences, humanities, liberal arts, or business.8 Evidence might include surreptitious

use of university computer equipment, as Mohamed had done with his training video. Students who are disenfranchised with the “American Dream” and exist on the fringe of the social strata could also be susceptible to radicalization. Kamran Bhatti, a Canadian volunteer outreach social worker, says he has observed four signs of potential radicalization among youth, especially in the wake of the death of four young Canadians in January 2015, who left to fight for ISIS in Syria.12 Mulholland referenced 24-year-old John Maguire, a former University of Ottawa student who advocated domestic attacks on Canadian, as well as three Somali-Canadian cousins from Edmonton.12 Bhati warns that some students display an obsession with Islam as a result of an underlying mental illness; some show an attraction to an extremist

Israeli Security Concepts A Comprehensive Guide For Selecting Training And Deploying A Security Team For Installation And Personnel Protection BY GARRET MACHINE, CPP TO PURCHASE: AMZN.COM/1453769838

60 The Counter Terrorist ~ February/March 2016


ideology obsessed with fighting the mainstream norms; some are religious zealots (these are the most dangerous and most likely to strike); and some are disgruntled, typically immigrant youths striking back at society for their inability to assimilate.12

APPLIED SECURITY MEASURES Universities are typically cities themselves operating with their own police departments and policies of behavior. The notion these institutions are capable or even willing to structure and prepare their public safety departments, faculty, and staff on the current day anti-terrorist war fighting has been slow to materialize, largely for the very reason the problems may fester. The concern over First Amendment rights and student privacy are intractable issues on campuses.

The signs of an emerging radicalized student can be as subtle as a student isolating themselves from the greater class or student body. Other signs include computer searches, hardcopy notes or manifestos, or inexplicable outbursts against other students or university faculty and staff. It is for these reasons that universities need to expand their awareness programs to include everyone from campus police, to students, faculty, and clerical and maintenance staff.

SOCIAL MEDIA Internet and social media outlets have become the primary source of recruitment, radicalization, training, and operational incitement for extremists. Al-Qaeda quickly caught the wave of popularity in the relatively new medium during its more operational phases, but most recently, ISIS has perfected it. To

combat potential digital radicalization on campus, the University of New Mexico has joined 44 other universities around the world in participating in the Peer to Peer (P2P) Extremism initiative.13 The U.S. Department of State-sponsored program creates student teams to “create digital media content in the form of an initiative, product, or tool that empowers networks of youth to counter the social media presence and effectiveness of violent extremists’ online messaging.” Identifying, preventing, and mitigating operational level radicalization on college campuses is a daunting proposition. However, with the rise and digital influence of ISIS and al-Qaeda, failure to do so will be catastrophic in an age where active shooter incidents have exponentially increased.

WWW.jntactical.COM Circle 155 on Reader Service Card

The Counter Terrorist ~ February/March 2016 61


ABOUT THE AUTHOR

html?referrer=https://search.yahoo.com/#. VkqitHarSM8. 4 Elaine Silverstrini, “Former USF Student Gets 15 Years for Aiding Terrorists,” The Tampa Tribune, December 18, 2008, http://www2.tbo.com/news/ northeast/2008/dec/18/ex-usf-studentmohamed-gets-xx-terrorism-casear-114406/. 5 Jacob Kamaras, “Watchdog Lists ‘Top Ten American Universities Friendly to Terrorists,’” Stop the Jihad on Campus, November 9, 2015, http://www. stopthejihadoncampus.org/. 6 Oren Segal, Anti-Defamation League, e-mail interview, November 28, 2015. 7 Caleb James, “Students and Muslim Groups, UNM Denounce Report Calling University ‘Terrorist Friendly,’” KOB4, November 17, 2015, http://www.kob. com/article/stories/s3966495.shtml#. VnRrkMArIy4. 8 Fred Burton and Scott Stewart, “Traffic Stops and Thwarted Plots,” Stratfor Global

Joseph J. Kolb, M.A., is the founder of the Border Security Studies Program in the Criminal Justice Department at Western New Mexico University.

ENDNOTES Kasey Carpenter, “MSA Rejects Moment of Recognition Resolution for 9/11,” The Minnesota Republic, November 11, 2015, http://www. mnrepublic.com/msa-rejects-moment-ofrecognition-resolution-for-911/. 2 R. Parsons, B. Calix, and M. Morgante, “UC Merced Stabbing Investigation Leads to Questions on Student’s Background,” The Modesto Bee, November 10, 2015, http://www.modbee.com/news/ article44189529.html. 3 Anti-Defamation League, “BDS on American College Campuses: 2013-2014 Year in Review,” June 4, 2014, http:// www.adl.org/israel-international/antiisrael-activity/bds-on-american-college. 1

LET US SHOWCASE YOUR PRODUCTS, SERVICES AND TRAINING TO OUR FIRST RESPONDERS...

IO AZTE CA PAND A • BARR • PRC’ S DEEP • 18TH ST. K&R SE SCHO OL PLOT TROJ AN HOR

& rcement, Intelligence Journal for Law Enfo

Intelligence, August 8, 2007, https://www. stratfor.com/traffic_stops_and_thwarted_plots. 9 Michael Fagel, e-mail interview, December 3, 2015. 10 Kendra Pheasant, e-mail interview, December 4, 2015. 11 FBI, “FBI Director Appoints National Security Higher Education Advisory Board,” September 15, 2005, https:// www.fbi.gov/news/pressrel/press-releases/ fbi-appoints-national-security-highereducation-advisory-board. 12 Angela, Mulholland, “Identifying Radicals: The Four Types of Youth Attracted to Extremism,” CTV News, January 16, 2015, http://www.ctvnews.ca/canada/ identifying-radicals-the-four-types-ofyouth-attracted-to-extremism-1.2192009. 13 Reuters, “University of New Mexico to Participate in P2P: Challenging Extremism Initiative,” October 2, 2015, http://www. reuters.com/article/2015/10/02/unm-p2pcampaign-idUSnPnCxmW6+52+PRN2015 1002#ABV70uIGCCP1RrYb.97.

Professionals Special Operations

ENT BAGHDAD I • MS-13 RECRUITM RESCUE IN IRAQ • ISIS WARLORD PUTIN’S RING OF STEEL •

/JULY 2015

JUNE nals nce & Special Operations Professio Journal for Law Enforcement, Intellige

7

TH

IS

ANN

IV

SUE

V

The

SE

AW

D WINNIN AR N T H Y E A E Counter

R

ER 4 E 8 • NUMB 2015 2014/JAN DEC VOLUM

G

Counter The

E R S A RY

UNDERSTANDING THE GLOBAL JIHAD EBOLA AND BIOLOGICAL WARFARE

VOLUME 7 • NUMBER 6

L INTERNATIONA

EDITION An SSI Publication

The Counter Terrorist is a peer journal, that is read in the USA and in ASIA by:

We are now committed to bring valuable tools to the attention of our First Responders through:

• Police • Fire • Emergency Management • Emergency Medicine • The Military • Special Forces

• Detailed Product Reviews • Innovative Product launches • International Resources

Call Sol Bradman now at 305-302-2790 or write him at bradman@homelandsecurityssi.com

®

g.com

thecounterterroristma JUNE/J ULY 2015 $5.99 USA/CANADA

INTERNATIONAL

EDITION An SSI Publication

Whether it’s the magazine, our online sites and e-blasts or our annual conference...he’ll help you reach your audience!

®

DECEMBER 2014/JANUARY USA/CANADA $5.99

2015

www.thecounterterroristmag.com 2014/January 2015 1 The Counter Terrorist ~ December

★ 62 The Counter Terrorist ~ February/March 2016

Counter The

Homeland Security Professionals Conference and Exposition Circle 33 on Reader Service Card


CNI PROTECTION | CYBER SECURITY | POLICING AND LAW ENFORCEMENT MAJOR EVENT SECURITY | BORDER SECURITY | OFFENDER MANAGEMENT | SERVICES

Supported by

The leading event for public and private sector security and counter terror professionals

3,000+ products and services on display

100+ free conference and seminar sessions

10,000+ private & public sector visitors

200+ expert speakers from the private sector, police, government, military and intelligence services

#SCTX16

Register as a free visitor online and save ÂŁ50

www.counterterrorexpo.com/counterterrorist Co-located with

J309428_SCTX_Counter Terrorist_2016_v1.indd 1 Circle 221 on Reader Service Card

Sponsored by

Follow us on

Organised by

18/01/2016 The Counter Terrorist ~ February/March 201617:26 63


Save the Date

TACKLING GLOBAL SECURITY THREATS JUNE 7–9, 2016 WASHINGTON, DC Three of the leading organizations in global security: The Anti Money Laundering Association, (The AMLA) Quaynote Communications and Security Solutions International-SSI will be hosting the first Tackling Global Security Threats conference in Washington DC on June 7–9, 2016. Each organization will showcase best practices vital to tackling Global Threats for corporations. Besides their expertise, all three organizations are well known for their very successful conferences. Against a background of heightened tensions across the Globe this conference is imperative for corporations that are concerned with optimizing their response to the current environment.

64 The Counter Terrorist ~ February/March 2016

WHO SHOULD ATTEND? • Human Resources directors • Risk managers • Security directors and managers • Crisis management executives • Business continuity executives • Insurers, lawyers, medical, operational, travel and procurement professionals • AML or BSA executives • C-Suite executives


JUNE 7 Corporate

Liability, Travel Risk & Duty of Care Conference

Day 1 organized by Quaynote Communications— will answer the question: What does it take to enhance corporate sustainability in high risk environments?

Day 1 is dedicated to examining issues of corporate liability and duty of care of organisations towards their employees, especially when sending them overseas to work. “It is often the C-Suite Executives who responsible for duty of care policy issues”, explained Lorna Titley, Director at Quaynote, “so we are therefore including a session targeting this group and asking the critical issue of whether effective risk mitigation can simultaneously address duty of care and protect the bottom line”.

JUNE 8 Tactical and strategic responses to

Global Security Threats

Day 2 organized by Security Solutions International—will answer the question: How should corporate security departments react to complex physical and cyber security challenges

Day 2 will concentrate on new strategies for assessing risk and threat in a fast paced challenging environments by hearing from SSI partners, Israeli corporate security specialists. Red Teaming as a tactical tool will be examined for its contribution to auditing corporate security. In the second part of the Day our cyber security partners will speak about the new challenges for corporate cyber security and the necessity and vulnerability caused by social media in the enterprise. Creating comprehensive policies for both Cyber security and social media will also be discussed. In addition, the value of having a social media targeting program will be discussed by one of the creators of the leading social media targeting platform.

Henry Morgenstern: +1-305-401-6906 contact@homelandsecurityssi.com

JUNE 9 Organized by the AMLA—The Anti

Money Laundering Association Lorna Titley: +1-604-538-3353 lorna@quaynote.ca

Day 3 The AMLA—this one day conference will focus on the financial institution sector crimes such as money laundering, fraud, cyber threats, terrorist financing and more. This is a must for the AML, BSA and other professionals dealing with reporting unusual or suspect activity.

Mary Miele: 407-864-532 mary@theamla.com The Counter Terrorist ~ February/March 2016 65


Innovative Products

THE PDS™ SYSTEM The PDS™ system utilizes a heavy-duty catch that securely latches around the trigger guard when the weapon is holstered. This prevents the pistol from being grabbed by anyone other than the operator. The PDS unique latching mechanism prevents accidental discharge of the weapon while drawing by keeping the trigger finger away from the trigger guard in a natural position. To Draw the gun

simply Push the gun downwards in a natural draw motion and the locking lever is released. The greatest advantage of this Retention system is that there is No Need to Train or Change the way you draw your gun. It is based on the natural instinctive movement of the draw. For more information about the Holster please contact ed.porat@themakogroup.com (417) 849-3233 and mention you saw it in the The Counter Terrorist Magazine.

PATRIOT3 The XPS-G2’s unique; Patent Pending design incorporates the first ever, Folding Ballistic Wings. These Ballistic Wings are added to the XPS Base Unit to provide a wide area of coverage beyond that of the base unit. With Patriot3’s revolutionary wing-deployment mechanism, the Ballistic Wings can be folded backwards to reduce the width of the shield allowing passage through commercial doorways. In addition, each of the XPS Ballistic Wings can be removed instantly with one hand, allowing the XPS to split into as many as 2 separate hand held shields (NIJ 3 only) allowing team members to break away with ballistic protection to clear additional areas, simultaneously. The XPS Base Unit has several options such as Ballistic Gun Port, Lighting System, Folding Ballistic Wings, Ballistic Wing View Ports and Ballistic Wing Handles (NIJ 3 only). This shield is truly a game changer that will give you and your department or agency the tactical advantage. 66 The Counter Terrorist ~ February/March 2016


FAIRLEIGH DICKINSON UNIVERSITY Master of Science in Homeland Security

A dramatic rise in terrorist activities around the world has increased awareness of the need to safeguard the United States against terrorism and other threats. The Master of Science in Homeland Security (MSHS) at Fairleigh Dickinson University is a 36-credit program focused on the practical and theoretical aspects of enforcing and ensuring the security of the homeland. Students choose from three areas of specialization: Emergency Management, Leadership, and Terrorism and Security Studies. The curriculum is designed to make your classroom experiences immediately applicable in the workplace. For the convenience of deployed military and other working professionals interested

THE INTIMIDATOR® STYLE 138 The Intimidator® 2.0 is a minimal two slot pancake style holster. The holster body is formed of precision-model Kydex® sheet while the back component is formed of leather and synthetic materials making it both compact and lightweight. It is immediately available for a large number of handguns in both right and left. www.DeSantisHolster.com

in advancement in this evolving field, the MSHS may be completed online or on campus. The MSHS program participates in the Order of the Sword & Shield, the only national honor society dedicated to homeland security. To learn more about the MSHS at Fairleigh Dickinson University, visit fdu.edu/mshs or call Paulette Laubsch, program director, at 201-692-6523.

THE PHANTOM WARRIOR MT™ MULTITASK FLASHLIGHT Phantom Products is proud to introduce the newest addition to its hand held lighting line: The Phantom Warrior MT™ Multitask Flashlight. This AA battery unit employs all solid state bulbs and has two intensity levels on the primary forward flashlight mode--this saves both your night eyes and your power consumption as you only use the light you need. The high intensity shoots 100 lumens out in a powerful blast to let you see EVERYTHING. But what is truly unique about this light is the side light feature. We make the only flashlight with an integrated side strobe/steady—this keeps you and your team safe in crowds as you will easily locate each other by sight instead of providing locations verbally—just hold up your light and announce your presence. The side lights are available in Amber/White, Red/Blue, or Red/White. The light can mount on your belt for easy access. This is the light that will be on every department’s “required equipment” list. phantomlights.com

THE LENCO BEARCAT® Lenco trucks can be used in a variety of missions. The BearCat, our best selling truck, may be used as a S.W.A.T. or Military Counter Attack and Rescue Vehicle and is often used in hostile Urban Environments or as a Patrol/Reaction Vehicle on a Military Base. The BearCat, with its standard NIJ IV armor and 4WD system, can carry up to 10 people through varying terrain. The BearCat has been embraced by several DoD and DoE Security Forces and, because of its affordability, low maintenance expenses, ease of use and superior armor level, is increasingly the replacement vehicle of choice for up-armored Humvees. It may also be equipped with our optional Mechanical Rotating Turret with Cupola (Tub) and Weapon Ready Mounting System, suitable for the M60, 240B and Mark 19 weapons system. www.lencoarmor.com

The Counter Terrorist ~ February/March 2016 67


Counter

ADVERTISER INDEX

The

FEBRUARY/MARCH 2016 VOLUME 9 • NUMBER 1

Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page

Ad/Company • website and/or email.......................................................................................................... RSN Number

30

10th Annual Border Security Expo • www.bordersecurityexpo.com.............................................................. 103

73

10th Annual National Homeland Security Conference • www.nationaluasi.com...................................... 317

13

11th Annual Homeland Security Conference • www.thecounterterroristmag.com/conference...................... 177

19

9th Annual Military Radar Summit • www.militaryradarsummit.com............................................................ 113

71

Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com...................................... 215

47

Asia Pacific Edition - The Counter Terrorist • sales@thecounterterroristmag.com.......................................... 255

2

Barrett Firearms Manufacturing • www.barrett.net...................................................................................... 121

7

Combined Systems, Inc. • www.counterterrorexpo.com/counterterrorist............................................................. 93

63

Counter Terror Expo • www.counterterrorexpo.com/counterterrorist................................................................. 221

11

DeSantis Holster & Leathergoods • www.desantisholster.com....................................................................... 262

53

Elevated tactics by SSI • www.homelandsecurityssi.com.................................................................................. 313

48

Elite K9 • www.elitek9.com............................................................................................................................... 277

17

Fairleigh Dickinson University • www.fdu.edu/mas....................................................................................... 10

61

J & N Tactical • www.jntactical.com................................................................................................................. 155

39

K9 Cop Magazine • www.k9copmagazine.com............................................................................................... 279

69

MACTAC • www.homelandsecurityssi.com.......................................................................................................... 228

49

NETMOD 2016 • www.militarynetworkmodernization.com................................................................................. 115

51

NTOA • www.ntoa.org/tactical-conference......................................................................................................... 329

40

Occupational Health Dynamics • www.ohdusa.com..................................................................................... 213

4

Patriot 3 • www.patriot3.com........................................................................................................................... 301

76

Phantom Lights • www.phantomlights.com...................................................................................................... 209

19

Resco Instruments • www.rescoinstruments.com................................................................................................ 20

41

Southern Police Equipment • www.southernpoliceequipment.com................................................................... 343

38

Southwest Border Security Expo 2016 • www.bordersouthwest.com........................................................... 117

75

SSI PVBs • www.SSIPVB.com............................................................................................................................ 226

72

SSI SWAT • www.homelandsecurityssi.com........................................................................................................... 13

3

Surveilance One • www.survone.com.............................................................................................................. 319

62

The Counter Terrorist Magazine • bradman@homelandsecurityssi.com............................................................ 33

31

TSSI • www.tssi-ops.com.................................................................................................................................... 123

68 The Counter Terrorist ~ February/March 2016


MACTAC

MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY

TM

The Newest, Most Dynamic Training Program from SSI . ®

MACTAC is the new tactical philosophy offering your

department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks.

Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course Next training in Miami, FL March 15th-18th, 2016

Contact us today at:

www.homelandsecurityssi.com Call now for more information.

Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 228 on Reader Service Card

The The Counter Counter Terrorist Terrorist ~~ August/September February/March 2015 2016 57 69


TRAINING REVIEW

Federal Law Enforcement Training Center (FLETC) Training

T

he Federal Law Enforcement Training Center (FLETC) is what some in the industry would call the gold standard in LE training. Under the umbrella of the Department of Homeland Security (DHS), the five training sites (and countless accredited offsite facilities) educate almost all federal law enforcement officers. At any one of

by Garret Machine

their campuses you will find the alphabet soup of agencies and quite a few I bet you have never even heard of. Back when was I was working for the Israeli Ministry of Defense as a physical security specialist, I became interested in the different units, agencies and training offered by partner nations. I thought FLETC was an interesting entity because it accomplished

something that I felt was critical in the field of law enforcement and security combat doctrine. It standardized it, much the way it is in Israel, so I thought. Fast forward a few years, and I ended up in a place I had never imagined possible, as a student in a basic law enforcement academy, at you guessed it: FLETC. I went on to take a few other

CBP Field Operations Academy at the Federal Law Enforcement Training Center in Glynco, Georgia. CBP officers initiate an arrest at the mock port of entry while overseen by a CBP Instructor. Photo by: Gerald L. Nino, CBP, U.S. Dept. of Homeland Security

70 The Counter Terrorist ~ February/March 2016


The Advanced Global Security Workshop in

Israel ®

The experts on training in:

the Homeland Security professionals best resource

Since 2005, SSI has taken nearly 500 First Responders to Israel and shown them the basics of the Israel security concept. Thanks in part to that program, we are better able to defend ourselves in the United States. In response to demand, we are now offering a once-in-a-lifetime experience covering the following advanced subjects: May 13–21

2016

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel’s northern border. Hostage Rescue - Discover how they go wrong. Hospital Response - Find out how Israel’s critical response hospitals handle surge and multi-casualty incidents. Israel Counter Terrorism units - Learn how they operate. Israel National Police - National Academy; See how they train? Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system. Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

www.homelandsecurityssi.com

LEARN MORE at: Call now for more information. Circle 215 on Reader Service Card

Phone: 866-573-3999 Fax: 866-573-2090 info@homelandsecurityssi.com Circle 50 on Reader Service Card Circle 215 on Reader Service Card

The Counter Terrorist ~ February/March 2016 71


advanced courses there and always look forward to going back there. Here is what you need to know about FLETC: you will be treated like a first class professional and receive training in the finest facilities and have all the resources you need to that end. Food is good and living conditions are nice as well: you can have your car there and keep business hours +/-. For someone like me, I loved the various education and opportunities that only a place like that can provide.

THE CONCEPT FLETC sets a standard with end-state objectives; how you get there is agencyspecific. Meaning that I was trained with firearms by GS staff, defensive tactics by contractors, and academic classes by agency-specific instructors. While each agency and organization will use different firearms, calibers, and targets, the end result must be a level of

proficiency that adheres to industry best practices. Getting a FLETC diploma is a prestigious thing. Consolidating the training of several government law enforcement entities makes resources available that would otherwise not be, meaning you will get training that is as realistic as it can safely get. The vetting process for instructor staff is extensive. I made friends with the staff because of mutual respect. All the while, they knew when to turn up the pressure on my class to get us where we needed to be. We shot every day, did physical training every day, had defensive tactics every day, and class every day. We kept long hours and were constantly tested, the way it should be. I have several friends who attended different courses offered through FLETC, from air marshals to high-speed vessel pursuit, and each came away with what they expected. Most law enforcement officers will attend a local academy for

their initial certification at the state level, which depending on your municipality can be hit-or-miss.

SUMMARY I am a big proponent of standardization of tactics, techniques, procedures, use of force policy, weapons, ammo, and training doctrine. You will not get exactly that, but this is defiantly as close as it is going to get in the foreseeable future. There is a lot to be said for standardization and reciprocity among high liability skill sets. Looking back over the last fifteen years, we can see a trend of skills and experiences trickling down from the military to civilian LE. This is a good thing, and I hope our industry continues to grow in this direction.

•

Next training: April 5th-8th, 2016 Miami, FL. Hosted by Miami Airsoft!

72 The Counter Terrorist ~ February/March 2016

Circle 13 on Reader Service Card


Save The Date 10th Annual National Homeland Security Conference Tampa Bay, Florida : June 28-30, 2016

Breakout Sessions Include: Recent Events Training for Preparedness Grant Management Emergency Medical Response Port & Transit Authority Intelligence & Information Sharing Whole Community Preparedness Public Safety NCTC

For More Information Visit: WWW.NATIONALUASI.COM Securing Our Liberty by Protecting Our Homeland Circle 317 on Reader Service Card

The Counter Terrorist ~ February/March 2016 73


Subscribe Today! I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address) SUBSCRIPTION INFORMATION (please print clearly) NAME____________________________________________________________________ ADDRESS_________________________________________________________________ CITY_________________________ STATE________ZIP_____________________________ EMAIL____________________________________________________________________

q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.) Name on Card______________________________ Card #__________________________

*

Exp. Date_______________________ Billing Address______________________________

FREE MEMBERSHIP TO THE HOMELAND SECURITY NETWORK WITH EVERY SUBSCRIPTION

Scan to subscribe

GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999

Subscribe Today! I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address) SUBSCRIPTION INFORMATION (please print clearly) NAME____________________________________________________________________ ADDRESS_________________________________________________________________ CITY_________________________ STATE________ZIP_____________________________ EMAIL____________________________________________________________________

q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.) Name on Card______________________________ Card #__________________________

*

Exp. Date_______________________ Billing Address______________________________

FREE MEMBERSHIP TO THE HOMELAND SECURITY NETWORK WITH EVERY 74 The Counter Terrorist ~ February/March 2016 SUBSCRIPTION

Scan to subscribe

GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999


New and improved

( portable vehicle barrier ) When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email info@homelandsecurityssi.com

Or visit our website: www.SSIPVB.com

Circle 308 on Reader CircleService 317 onCard Reader Service Card

Circle 226 on Reader Service Card

The Counter Terrorist ~ February/March 2016 75


Circle 209 on Reader Service Card


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.