USING DEADLY FORCE • CIA’S CREATION OF TERRORISM • INTERNATIONAL TRADE TRANSPARENCY
Journal for Law Enforcement, Intelligence & Special Operations Professionals
OCTOBER/NOVEMBER 2015
VOLUME 8 • NUMBER 5
WHY DOMESTIC TERRORISTS GO SOFT.
INTERNATIONAL
EDITION An SSI Publication ®
OCTOBER/NOVEMBER 2015 USA/CANADA $5.99
thecounterterroristmag.com
ACCURACY
REDEFINED
MRAD
338 LAPUA MAG 338 NORMA MAG 300 WIN MAG 300 NORMA MAG 7MM REM MAG 308 WIN 260 REM 6.5 CREED
AMBIDEXTEROUS CONTROLS. USER INTERCHANGEABLE CALIBERS. ADJUSTABLE MATCH GRADE TRIGGER.
COMBAT PROVEN Barrett will not sell to government agencies in the State of California or New York. Learn more at barrett.net
2 The Counter Terrorist ~ October/November 2015
Circle 121 on Reader Service Card
19947 Counter Terrorist Magazine Ad v1_Layout 1 8/18/15 2:41 PM Page 1
Online Undergraduate, Graduate & Certificate Studies in
Public Safety & Homeland Security Meeting the professional advancement needs of those committed to protecting the public. Earn your career credentials without job interruption through Fairleigh Dickinson University’s respected online degree and certificate offerings. Established in 1942, FDU is New Jersey’s largest private university with 12,000 students worldwide. Degree Offerings
• Master of Administrative Science • Master of Science in Homeland Security • Bachelor of Arts in Individualized Studies Certificate Studies Career-relevant programs are available at the graduate and undergraduate level in such areas as terrorism, forensics, global security, disaster and emergency management, transit safety, homeland security, and more. Credits earned can be applied toward the appropriate degree program.
• FDU is proud to participate in the Yellow Ribbon G.I. Education Advancement program enabling eligible veterans to attend FDU at no charge. • FDU accepts Federal Tuition Assistance (FTA) for undergraduate and graduate courses (restrictions apply). • No entrance exams required. For More Information
Undergraduate Programs
Graduate Programs
JoAnna Steiner 201-692-7357 online@fdu.edu
Ronald E. Calissi 201-692-6522 calissi@fdu.edu
fdu.edu/mas
CALL TODAY. CLASSES BEGIN IN JANUARY. Circle 10 on Reader Service Card
The Counter Terrorist ~ October/November 2015 3
4 The Counter Terrorist ~ October/November 2015
Circle 259 on Reader Service Card
Counter
The Journal for Law Enforcement, Intelligence & Special Operations Professionals OCTOBER/NOVEMBER 2015 VOLUME 8 • NUMBER 5
COVER STORY:
30
CONTENTS
30
18
48
58
WHY DOMESTIC TERRORISTS GO SOFT by Karen Bunso
FEATURES: 08
Firsthand: DEADLY FORCE: THE USE OF FORCE CONTINUUM AND DEFENSIVE TACTICS OR COMBATIVES by Andrew Curtiss
18
Case Study: THE CIA’S CREATION OF ISLAMIC TERRORISM ON AMERICAN SOIL by Paul L. Williams, Ph.D.
48
THE CHAPLAIN AS FIRST RESPONDER by William A. Gralnick, BA, MA, DHL
58
“THE NEXT FRONTIER” INTERNATIONAL TRADE TRANSPARENCY: by John Cassara
DEPARTMENTS: 06
From the Editor
46
Book Review
68
Innovative Products
72
Training Review
9/11 Denial
Cycle of Fear: Syria’s Alawites in War and Peace White Horse Research and Developement, Platesmart HD Engine, Lewis Machine & Tool, YakTrax™, Kent USCG Port Security Skills Course
Cover Photo: Illustrastion by: Scott Morrison
The Counter Terrorist ~ October/November 2015 5
Counter The
FROM THE EDITOR:
9/11 Denial
by Henry Morgenstern Journal for Law Enforcement, Intelligence & Special Operations Professionals
O
n the recent, and for me sacred, 9/11 anniversary, commemorating the lives of the 2977 fallen and the heroes that together make up the worst Terrorist act on American soil ever, I was shocked to hear John Hockenberry, a regular on National Public Radio give a tirade called: Why I am done with 9/11: I was actually done with the whole 9/11 thing sometime between the famous and politically disastrous “Mission Accomplished” moment from George W. Bush after the Iraq invasion, and the empty announcement by Barack Obama that this feeble terrorist mastermind, Osama bin Laden, had been killed by Navy SEALs in Pakistan. I’m done with the whole heroes’ thing. Aren’t we over this? There’s the American tragedy story and the talk of America as the preeminent victim of terrorism—America isn’t even close to being the most victimized nation by terrorism. If anything, we are more of a victim of our own domestic terrorism than from any foreign enemies, even though it’s easy and convenient to fear them more than kids with guns who wander into churches to kill. And as if this were not appalling enough he continues: But I think the 9/11-ization of American life has been a kind of poison for all of us. We had our moment when the whole world was with us after 9/11, and we squandered it. We spent trillions on two wars that turned a battlefield into a killing field for ISIS and gave us a refugee tidal wave from Syria and Iraq. And another battlefield in Afghanistan was turned into a fragile puppet government that rules over the biggest opium crop in the history of the world. Some of that Afghan heroin finds its way into our cities where it kills and destroys lives much more easily than flying planes into towers. But should I be shocked? Since the beginning of this year, Police are being hunted by terrorists incited by Black Lives Matter to openly kill our Police. The killing of a veteran police officer north of Chicago is the latest in a string of recent law enforcement deaths. Lt. Charles Joseph Gliniewicz’ death came after the death of Police Officer Darren Goforth was shot and killed Aug. 28 in suburban Houston as the Harris County deputy stopped to put gas in his patrol car. Henry Nelson, an officer in Sunset, Louisiana, was shot and killed Aug. 26 while responding to a domestic-violence call. Louisiana State trooper Steven J. Vincent died Aug. 14 after being shot in the head while assisting a motorist. And then what about Chattanooga, where brave Americans that had every right to feel comfortable at a Recruiting Office, gunned down by a hateful Muslim Jihadist inspired by ISIS. And ISIS continues to publish details of US servicemen and their families inciting their followers to attack them here—in the USA. Yet, where is the official condemnation of these acts? The well-worn mantra about the Religion of Peace was trotted out yet again after the Chattanooga murders by none less than Jeh Johnson, Secretary of Homeland Security: “it is “critical” to refrain from the “Islamic” label in order to “build trust” among Muslims. The Tennessee murderer, Mohammad Abdulazeez, is officially a “homegrown violent extremist,” according to the government—even though he blogged about his Islamic religious motivations for the attack. He and his family also attended a local mosque controlled by a terror-tied Islamic trust. So is anything of any wonder anymore? As long as we bathe in these false moral equivalencies generated by some misguided multi-cultural, post-modern relativism and equate a disturbed child’s acts in Charleston with 19 Terrorists killing nearly 3000 Americans; or we apologize for Muslim Jihadists but don’t condemn the attacks on our Police; when our leadership does not step in to clear up the confusion but instead supports the illusion, we drift more and more towards chaos. Thanks to all that serve and protect despite this insanity. Thanks so very much.
VOLUME 8 • NUMBER 5
OCTOBER/NOVEMBER 2015 Editor Henry Morgenstern Director of Operations Carmen Arnaes Director of Advertizing Sol Bradman Administrative Ashley Villegas
Contributing Editors Garret Machine Paul L. Williams, Ph.D Karen Bunso Andrew Curtiss John Cassara William A. Gralnick, BA, MA, DHL Graphic Design Morrison Creative Company Copy Editor Laura Town Advertising Sales Sol Bradman bradman@homelandsecurityssi.com 305-302-2790 Publisher: Security Solutions International 13155 SW 134th St. • STE 103 Miami, Florida 33186 ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 103, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: Security Solutions International at villegas@homelandsecurityssi.com or call 786-573-3999 Please visit the magazine web site where you can also contact the editorial staff:
www.thecounterterrroristmag.com
Henry Morgenstern Editor, The Counter Terrorist 6 The Counter Terrorist ~ October/November 2015
© 2015 Security Solutions International
319 on Reader Service2015 Card 7 The Counter TerroristCircle ~ October/November
Firsthand:
DEADLY FORCE: THE USE OF FORCE CONTINUUM AND DEFENSIVE TACTICS OR COMBATIVES 8 The Counter Terrorist ~ October/November 2015
by Andrew Curtiss
Recently, the term “use of force” has gotten a lot of publicity. First, we saw the Michael Brown incident and the rear naked choke applied to Eric Garner in New York City that gained worldwide attention with the slogan “Black Lives Matter.” Then we saw the incident in Baltimore, where martial law was required to quell the city after another incident with local police.
A
s an arms professional, I frequently find myself training members of various law enforcement agencies. From run-of-the-mill patrolmen to SWAT to undercover narcotics task forces, I have consulted, trained, or advised a broad spectrum of law enforcement officers (LEO). I also have the honor and privilege of working with
the military and security professionals. There are two areas where my services are frequently requested: deadly force and the use of force continuum and defensive tactics or combatives. One advantage of working operationally and consulting on a broad spectrum is that I get to see things from various perspectives. That being
stated, this article is written from the perspective of someone who sees the issue of defensive tactics from numerous standpoints and not from a narrow, limited scope. This wide view was taught to me by none other than Ultimate Fighting Championship living legend Dan “The Beast” Severn. Dan is a good friend of mine and I have been privileged
The Counter Terrorist ~ October/November 2015 9
What techniques are best used and applied for law enforcement and security professionals in the real world?
to have the opportunity to train with him on numerous occasions. It was on one of these occasions that I asked him what the best techniques were to use on the ground in a professional fight. His answer was the age-old expression about techniques being as relative as the individual using them. This brings us to the subject at hand: What techniques are best used and applied for law enforcement and security professionals in the real world? Because techniques are relative and preferential, I would like to present this matter in a way that identifies criteria upon which to base the choice of techniques. In late 2014, I began working on the rewrite of a defensive tactics program for
one of my client organizations. During this rewrite, I realized something that reversed the way I was seeing things. Because the program I was developing requires a high degree of knowledge of the use of deadly force and the use of force continuum, I decided to use case law as a reference. During my research of case law, I noticed a recurring theme. Of the several cases of excessive force studied, nearly all of them entailed the officer or officers charged making the following claims: 1. They rarely received training in defensive tactics (4–8 hours per year on average). 2. During the event in question they could not effectively apply the approved techniques required by their parent organization. 3. They were restricted to the use of ONLY APPROVED TECHNIQUES. 4. When all else failed, they simply resorted to causing their victim or subject more pain in order to get the victim or subject to comply with their commands. 5. They were in a panicked state, or what is commonly referred to in Cooper’s Color Spectrum Code as “The Black.” Therefore, based on these facts, I will make my assessment of the “best” techniques for defensive tactics. Officers restricted to the use and implementation of ONLY APPROVED TECHNIQUES. This methodology, although useful in theory for mitigating legal liability, is the start of all other failures. First, the officials who decide which techniques are approved and which are not usually not subject matter experts (SMEs), even by the legal definition of the term. This means that they are not specialists in the combative arts, nor are they medical doctors or specialists in the field of biomechanics. In most cases, they
10 The Counter Terrorist ~ October/November 2015
are individuals with law enforcement backgrounds who have elevated their positions politically and have consulted with the State’s attorneys rather than individuals who truly understand how to apply biomechanics to the field of unarmed defense techniques. The next problem is the false idea that the State has the authority or the foresight to dictate which techniques officers on the street can and should be limited to for self-protection. When planning for combat operations, we used to say that “even the enemy has a vote sometimes.” This means that you can develop the best plan in the world beforehand, but a plan is really just a theory until it is time to execute it. The following things dictate which techniques should be used: • Mission: What is the desired end state the officer wants to achieve for this particular situation? • Enemy: What actions is the enemy taking? What is the actual “real” threat? • Terrain/ Weather: What is the layout of the environment? Is it urban or rural? Wet and slippery? Crushed gravel? Icy? Etc. • Time Available: How urgent and dire is the situation at hand? What is the relative positioning of the threat? • Troops Available: How available is the nearest backup? • Civil Considerations: Are there innocents or other potential collateral damage at risk? All of these things are in direct correlation to the Ability, Opportunity, and Intent equals Jeopardy algorithm. This means that the tactical situation dictates the methods and techniques used, not the State. Organizations would be wise to adhere to this model rather than setting myopic standards based solely on the premise of limiting the State’s liability in a use of force case. Officers rarely received training in
Circle 16 on Reader Service Card
The Counter Terrorist ~ October/November 2015 11
defensive tactics (4–8 hours per year on average) After Basic Law Enforcement Training, many precincts and organizations only focus on their defensive tactics curriculum once per year. This is mostly due to the cost of providing such training, the availability of the trainees and instructors, and in some cases a shortage of personnel. As a result, setting more than one day per year aside for Defensive Tactics (DT) seems a bit too much to ask. This, however, does has multiple shortcomings: 1. Officers are not familiar with the approved techniques. 2. Officers learn just enough to confuse themselves, have a loose understanding of the concepts, and eventually succumb to the old adage of “more and harder is better.” This leads to excessive force cases.
3. Because officers are largely untrained, they are not operant conditioned and crumble under the stress of real life situations. They panic and resort to the animal instinct to survive rather than the calm, collected state of the trained mind. A trained mind is able to focus on the whole situation because the trained body instinctively regresses to the organized firing of neural transmitters, which operate along finely developed neural pathways honed by thousands of repetitions of training under stressful conditions. Additionally, it is important for officers to be familiar with the jurisprudence regarding the use of proportionate force, the use of deadly force, and the premise of vital targets. All of this brings us to the discussion of pain compliance versus mechanical failure. When an officer decides to use a pain compliance
12 The Counter Terrorist ~ October/November 2015
Circle 18 on Reader Service Card
technique, he or she is essentially making the decision to cause harm to the subject in question in some way, shape, or form. The problem with this decision is that everyone perceives pain differently. The perception of pain is dependent on so many variables, including genetics, body composition, body hardening or physical conditioning, substance use, mindset, mental state, and more. All of this can result in what an arresting officer perceives as a direct challenge by the subject when he or she attempts to use pain as a motivator during an arrest. This ultimately has the egotistical potential to escalate to an excessive force scenario. When mechanical failure and leverage techniques are implemented, they change the diametric. When an officer is concerned about mitigating a threat by bringing the threat to a state of mechanical failure, he or she is not focused on using pain or harm as a tool to force compliance by a subject. These techniques are completely likely to shut down the function of an edged -weaponwielding arm without causing pain to the subject. In most cases where mechanicalfailure-driven techniques are used, it is the subject’s refusal and outright resistance to the control technique that causes pain and discomfort. The officer is not concerned with causing pain to achieve compliance and instead aims to mitigate or neutralize the specific threat. Both the subject and the threat itself are inconsequential to the arresting authority, meaning that if the subject causes himself or herself pain it is unfortunate but it does not matter. There is no direct challenge with this methodology, therefore there is little or no ego involved. This means the officer is less likely to use a level of force that greatly outweighs the threat. Some basic but effective techniques include the following:
THUMB BREAK SCABBARD ®
NEMESIS
®
STICKS ALMOST LIKE FLY PAPER
75
$
MSRP
25
99
$
Style 001
• • • •
MSRP
99
Style N38
Most favored of Federal LE Agencies Premium saddle leather Optimum draw angle Secure & highly concealable
• Stays put when gun is drawn • Available for most pocket guns • Special polymer insert prevents molding
800-GUNHIDE
631-841-6300
Dept #CTO5
431 Bayview Avenue, Amityville, NY 11701
Circle 262 on Reader Service Card
www.desantisholster.com www.desantisholster.com The Counter Terrorist ~ October/November 2015 13
THE AMERICAN 2-ON-1, ARM BAR: This is based on the classic “Russian 2-on-1” wrestling arm hold. When properly employed, this technique implements complex torque and immobilization of multiple joints. It also provides the leverage required for a smaller subject to take down a much larger subject with ease. This technique places the officer in a tactical position and gives him or her the option of escalating to a level of deadly force (by applying enough force to break the elbow) or deescalating to a simple escort position.
THE CHIN LIFT TAKEDOWN: Similar in concept to the cross-face forehead takedown, this decentralizing method attacks the body’s ability to stand erect.
THE HEAD TWIST TAKEDOWN:
THE CROSS-FACE FOREHEAD TAKEDOWN: In the event that a subject attempts to escape either the escort or American arm bar, this is a great takedown that mechanically disables the subject’s ability to stand upright by decentralizing the subject with minimal force.
14 The Counter Terrorist ~ October/November 2015
This technique is similar to the crossface forehead and chin lift takedowns. The difference in this case is that it is important to gain control of the entire head in order to dictate where the body will go.
THE SEATBELT CHOKE:
THE REAR NAKED CHOKE:
This is a speedy and effective blood choke that also implements a neck crank. This particular choke capitalizes on the virtue of position to render the near arm of the subject immobile and ineffective.
This is a blood choke that can render a person completely unconscious in seconds. This technique can easily be turned into a lethal technique by holding it for longer than a minute.
In closing, the vast landscape of political correctness should not dictate the arsenal of techniques that an officer can use to deal with tactical situations. The use of pain compliance should be abandoned in favor of the mechanical failure solution, which is deeply rooted in science. Officers need more training time in order to develop their techniques, and that means the State needs to take responsibility for ensuring that employees in uniform are receiving that training. The two things for which there is no substitute are repetition and stress. The things that officers should take away from this are that commonality in training and technique and effective and versatile implementation of techniques leads to certain fluidity and reflexiveness. After all, if your training is not instinctive it’s useless.
•
THE KIMURA ARM AND SHOULDER LOCK: This arm and shoulder lock is excellent for controlling a hostile subject and preparing the subject to be restrained. This technique utilizes the principle of complex torque and immobilizes the elbow, shoulder, and wrist.
The Counter Terrorist ~ October/November 2015 15
ABOUT THE AUTHOR Andrew Curtiss is a former US Army Special Forces Soldier and combat veteran. Andrew was nominated for the Silver Star and was awarded the Bronze Star with Valor. He holds advanced black belt ranks in the martial arts of Taekwondo and Shurite Kenpo Karate. Andrew was ranked black belt in Brazilian Jiu-Jitsu under Professor Jon Siracusano. He is a Professional Mixed Martial Arts Athlete and former world
16 The Counter Terrorist ~ October/November 2015
runner up kickboxer at the amateur level. Andrew is a former national level full contact karate champion. He is the author of two published books 1984 Redux a political commentary; and Combat Application Techniques, an instructional on edged weapon and unarmed combat. He is currently a tactical consultant for various government and private organizations and travels the country teaching firearms, use of force, defensive tactics and combatives.
Circle 20 on Reader Service Card
CYBERWARFARE HAS A NEW FIRST LINE OF DEFENSE. LEARN FROM THE LEADER. B.S., CYBERSECURITY M.S., CYBERSECURITY STUDIES
AMUONLINE.COM/COUNTER-TERRORIST
We want you to make an informed decision about the university that’s right for you. For more about the graduation rate and median debt of students who completed each program, as well as other important information—visit www.APUS.edu/disclosure.
Circle 25 on Reader Service Card
The Counter Terrorist ~ October/November 2015 17
Case Study:
THE CIA’S CREATION OF ISLAMIC TERRORISM ON AMERICAN SOIL
18 The Counter Terrorist ~ October/November 2015
by Paul L. Williams, Ph.D.
Islamic paramilitary camps have been set up in the United States and Canada to train African-American Muslims in guerilla warfare. After months of training on firing ranges and obstacle courses, the black Muslims are sent to Pakistan where they receive advanced training in explosives. Many never return.
S
tories about these camps are not news. They have been reported by the mainstream media, including Fox News. The news is that these camps—from which the next 9/11 is expected to occur—have been established by the Central Intelligence Agency. The origin of these compounds for would-be jihadis dates back to 1979,
when the Agency sent hundreds of radical Islamic clerics to the United States in an effort to recruit black Muslims for the holy war against the Soviets in Afghanistan.
THE TABLIGHI MISSIONARIES By and large, these missionaries hailed from Pakistan and belonged to Tablighi
The seal of the U.S. Central Intelligence Agency inlaid in the floor of the main lobby of the Original Headquarters Building. Photo by: Duffman
Author of Operation Gladio: The Unholy Alliance between the Vatican, the CIA, and the Mafia The Counter Terrorist ~ October/November 2015 19
Jamaat, a Muslim movement with 150 members in 213 countries.1 Upholding a strict interpretation of Islamic law (shariah), the Tablighi were united in their resistance to Western culture, their insistence that Muslims should avoid
contact with all those who do not share their beliefs, and their approval of jihad by sword (jihad bin saif ).2 Members of the movement gathered every year for three days in the small Pakistani town of Raiwind. In 1979, Sheikh Mubarek Ali Gilani, a Tablighi missionary from Lahore, Pakistan, arrived in Brooklyn, where he called upon members of Dar ul-Islam, a notoriously violent street gang, to take arms in the great jihad. Scores answered his call and were headed off to Pakistan with payments of thousands of dollars in cash and promises of seventy hours in seventh heaven if they were killed in action.3
WELCOME TO ISLAMBERG
2009 Malaysian Annual Congregation of Tablighi. Photo by: Muhammad Hamza
Journalist, Paul L. Williams at the entranceway to Islamberg.
20 The Counter Terrorist ~ October/November 2015
By 1980, the Agency realized that considerable expense could be saved by setting up paramilitary camps under the supervision of Shiekh Gilani in a rural area of the country. An ideal location was located near Hancock, New York, at the base of Point Mountain, where the east and west branches of the Delaware River converge to form the headwaters that flow through Pennsylvania and New Jersey to the Atlantic Ocean. The rocky terrain was infested with rattlesnakes, and the woods were home to black bears, coyotes, wolves, and a few bobcats. Islamberg, a seventy acre complex, came into existence. Firing ranges and obstacle courses were set up in Islamberg along with a massive underground bunker and a landing strip. The residents lived in single-wide trailers that lined the hillside. The settlement contained a small shack that served as a laundry facility, a claptrap community center, a tiny grocery store, and a masjid. A sentry post was placed at the entranceway.4 The sound of gunfire and explosions
HOMEGROWN JIHAD THE TERRORIST CAMPS AROUND U.S.
The sound of gunfire and explosions emanating from the property alarmed local residents, who filed complaints with local and state law enforcement agencies. emanating from the property alarmed local residents, who filed complaints with local and state law enforcement agencies. But a marked law enforcement vehicle never appeared at the compound.5 Islamberg was off-limits to police inspection on the spurious grounds of “national security.�
The camp also came to contain an illegal cemetery where bodies were buried in unmarked graves.6 This alone should have warranted a raid by the New York State Police. But not even dead bodies could prompt a police investigation. When Islamberg was established,
Sheikh Mubarek Ali Gilani
The Counter Terrorist ~ October/November 2015 21
A mujahideen fighter in Kunar uses a communications receiver. Photo by: Erwin Lux
Mujahideen fighters in the Kunar Province of Afghanistan in 1987. Photo by: Erwin Lux
Mujahideen fighters with two captured Soviet ZiS-2 field gun in Jaji of Paktia Province in Afghanistan. Photo by: Erwin Lux
Gilani presented himself as an employee of the CIA, and the future jihadis who resided in the compound called themselves CIA operatives.7 Few in law enforcement doubted the professed credentials of the Muslim newcomers.
COMMUNITIES OF THE IMPOVERISHED Islamberg was a great success.
22 The Counter Terrorist ~ October/November 2015
Hundreds of African-American Muslims made their way to Afghanistan and joined the ranks of the mujahedeen. Several were killed in action.8 Others, including Clement Rodney Hampton-El, returned to the U.S. to plot the 1993 bombing of the World Trade Center in New York.9 A host of other paramilitary camps were established in such places as Red House, Virginia; Commerce, Georgia;
Circle 213 on Reader Service Card
York, South Carolina; Dover, Tennessee; Buena Vista, Colorado; Macon, Georgia; Squaw Valley, California; Marion, Alabama; Talihina, Oklahoma; and Toronto, Ontario.10 Gilani placed Islamberg and the other camps under a governing organization called “Jamaat ul-Fuqra” or “the community of the impoverished.” He established the headquarters of this “charity” in Lahore. The American arm of Jamaat ul-Fuqra became the “The Muslims of America,” a tax-exempt corporation with Gilani’s mosque in Brooklyn as its address.11
INCREASED NEED OF RADICALS The Soviet withdrawal from Afghanistan in 1989 did not spell an end to the CIA’s support of radical Islam. Throughout the 1990s, Dr. Ayman Zawahiri, al-Qaeda’s second in command, travelled at the expense and bidding of the CIA throughout Central Asia, where he cultivated new armies of jihadis to destabilize the newly created republics. His efforts resulted in the uprising of the Chechens against the Russian Federation, the attempted toppling of the government in Uzbekistan, and the insurgence of the Uigurs in the Xinjiang province of China.12 A dutiful operative, Dr. Zawahiri met regularly with U.S. military and intelligence officials at the U.S. embassy in Baku, Azerbaijan, to plan the Balkan operations in which the CIA worked with al-Qaeda to overthrow the government of Slobodan Milosevic for the creation of “Greater Albania,” encompassing Albania, Kosovo, and parts of Macedonia.13 These operations, particularly in the Balkans, required the recruitment of more and more jihadis. Gilani’s camps continued to prosper. And more and
more of his African-American recruits appeared among the rank and file mujahedeen in various theaters of warfare throughout the world. Dr. Zawahiri’s help was so valuable that he was granted permanent U.S. residence by the U.S. Immigration and Naturalization Service in January 2000.14
Achieving the Goals of Shared Security and Prosperity 3R D A N N UA L
OCTOBER 27 - 28, 2015 C O B O C E N T E R | D E T R O I T, M I Sponsors
Visit www.Beyond-Border.com for information on attending and sponsorships Circle 103 on Reader Service Card
The Counter Terrorist ~ October/November 2015 23
THE RISE OF ISIS After 9/11, the Agency continued to cultivate Islamic holy warriors to maintain the “strategy of tension” in the Middle East, the Balkan states, and Central Asia, and to mount new uprisings in Africa to expand U.S. hegemony. The grand purpose of these enterprises was U.S. economic and political control of Eurasia. Zbigniew Brzezinski, former Secretary of State and leading strategist for the Council on Foreign Relations, writes: For America, the chief geopolitical prize is Eurasia… Now a non-Eurasian power is preeminent in Eurasia—and America’s global primacy is directly dependent on how long and how effectively its preponderance on the Eurasian continent is sustained… To put it in a terminology that harkens back to the more brutal age of ancient empires,
Former Director of the Central Intelligence Agency, David Petraeus. Photo by: Darren Livingston
the three great imperatives of imperial geostrategy are to prevent collusion and maintain security dependence among the vassals, to keep the tributaries pliant and protected, and to keep the barbarians from coming together.15 In accordance with the strategy of keeping “the barbarians from coming together,” ISIS forces were and are trained at a secret U.S. military base in the Jordanian town of Safawi.16 The weapons for ISIS came, compliments of the Agency, from the arsenal of deposed Libyan dictator Muammar Gaddafi. The shipment of these weapons to ISIS in Syria was supervised in 2012 by David Petraeus, the CIA director who would soon resign when it was alleged that he was having an affair with his biographer.17
SUPPLY AND DEMAND In response to the increased demand,
YOU CAN’T BE EVERYWHERE AT ONCE,
WE CAN
.
RECONYX High Definition motion activated security cameras do not require separate lines for power or communication. Extremely easy to deploy and hide, (5.5” x 4.5”) our cameras provide near instant notification of an intrusion by transmitting images via the cellular network directly to your cell phone or computer. General Surveillance and License Plate Capture Gene models available.
PHONE 866-493-6064 | WWW.RECONYX.COM
24 The Counter Terrorist ~ October/November 2015
Circle 303 on Reader Service Card
www.PoliceOneAcademy.com www.PoliceOneAcademy.com
Video Training Training Video “PoliceOne Academy’s online “PoliceOne Academy’s online training is a valuable tool training is a valuable tool for any officer, that provides for any officer, that provides high liability training at a high liability training at a moment’s notice.” moment’s notice.” Lt. Eric Rauch Lt. Eric RauchSheriff’s Office Polk County Polk County Sheriff’s Office
On Demand Demand On
Maximize your training budget with Maximize your training budget with 24/7 access to more than 500 HD 24/7 access to more than 500 HD training videos! training videos! • Fulfill FDLE Mandatory Retraining • Fulfill FDLE Mandatory Retraining Requirements online! Requirements online! • Provides Certificates of Completion for • Provides Certificates of Completion for each one-hour course completed each one-hour course completed • 80+ hours of training available • 80+ hours of training available • Ideal for in service/roll call training • Ideal for in service/roll call training • Create self-paced training assignments • Create self-paced training assignments • Lesson plans and quizzes • Lesson plans and quizzes • Tracking and reporting features • Tracking and reporting features • Full-featured mobile experience • Full-featured mobile experience • Department and individual • Department and individual subscriptions available subscriptions available Contact us today at Contact us today at
866-941-4090 866-941-4090 academy@PoliceOne.com
academy@PoliceOne.com for your FREE department preview! for your FREE department preview! Circle 335 on Reader Service Card
The Counter Terrorist ~ October/November 2015 25
The Al-Farooq Mosque at in Brooklyn, New York City, which describes itself as one of the oldest Islamic centers in New York City, was founded in 1976. The mosque has been described as having been “a center of radical Islamic thought in Brooklyn and a major spiritual and operational al-Qaeda hub in the United States before and after the September 11, 2001 terrorist attacks.” Photo by: Beyond My Ken
Gilani continued to churn out more and more African-American jihadis. More and more training camps opened, including one in Texas.18 More and more bodies were buried in unmarked graves. More and more complaints were made to law enforcement officials. And more and more graduates from the training camps made their way to Pakistan. The Bushmaster XM-15 used by the Washington D.C. snipers during their attacks in October 2002. It is equipped with a 20-round STANAG magazine and a holographic weapon sight of some sort. Photo by: Federal Bureau of Investigation
BLOWBACK Of course, there was blowback to the CIA’s establishment of Islamic paramilitary camps on American soil. Over the years, numerous members of Jamaat ul-Fuqra have been convicted in
26 The Counter Terrorist ~ October/November 2015
U.S. court of such crimes as conspiracy to commit murder, firebombing, gun smuggling, and workers’ compensation fraud. Others remain leading suspects in criminal cases throughout the country, including ten unsolved assassinations and seventeen firebombings between 1979 and 1990.19 In 2001, a resident of the ul-Fuqra camp in California was charged with first-degree murder in the shooting of a sheriff’s deputy; another was charged with gun-smuggling; and twenty-four from the camp in Red House, Virginia, were convicted of firearms violations.20 By 2004, investigators uncovered evidence that purportedly linked both the Washington, DC “sniper killer” John Allen Muhammad and “Shoe Bomber” Richard Reid to Gilani’s group, and reports surfaced that Wall Street Journal reporter Daniel Pearl had been captured and killed in the process of attempting to gain an interview with Sheikh Gilani in Pakistan.21 By 2015, Jamaat ul-Fuqra had been involved in more terror attacks on America soil (30 and counting) than all the other terrorist groups combined. Despite these attacks, the group has never been placed on the official U.S. Terrorist Watchlist, and The Muslims of America continues to operate as a legitimate nonprofit, tax-exempt organization.22
THE WARNING Investigators, including Patrick Walsh and William Krayer, who have visited Islamberg and other paramilitary settlements, believe that the next major attack on U.S. soil will emanate from Gilani’s jamaats of homegrown terrorism. Based on the history of the CIA’s involvement in the creation of these camps, such an attack may occur in accordance with the Agency’s own design.
•
Counter The
Asia Pacific Edition The Counter Terrorist Magazine Asia Pacific Edition is finally available for the Asia Pacific region counter-terrorism and homeland security practitioners. The Asia Pacific Edition not only gives the readers a worldwide counter-terrorism perspective but also in-depth information about counter terrorism activities in Asia. The Asia Pacific Edition provides an excellent platform for counter-terrorism and homeland solutions providers to access and penetrate the Asia Pacific market.
Circle 255 on Reader Service Card
Email: sales@thecounterterroristmag.com Circle 13 on Reader Service CardThe
Counter Terrorist ~ October/November 2015 27
ABOUT THE AUTHOR Paul L. Williams holds a Ph.D. in philosophical theology from Drew University. An award-winning journalist, he is the author of The Day of Islam and Crescent Moon Rising: The Islamic Transformation of America. His latest book is Operation Gladio: The Unholy Alliance between the Vatican, the CIA, and the Mafia (Prometheus, 2015). Williams served as a consultant (CI-14) to the FBI. His work with the Agency resulted in arrests and convictions. His field work also served to unravel the plot of the Toronto 18 to blow up Parliament and behead the Canadian prime minister.
ENDNOTES Alex Alexiev, “Tablighi Jamaat: Jihad’s Stealthy Legion,” Middle East Quarterly, no. 1 (Winter 2005), 3-11. 2 Jane I. Smith, Islam in America (New York: Columbia University Press, 1999), 161. 3 Robert Dannin, Black Pilgrimage to Islam (New York: Oxford University Press, 2002), 75-76. 4 Douglas J. Hagmann, “Special Report: 1
28 The Counter Terrorist ~ October/November 2015
Jamaat ul-Fuqra Training Compound Inside the U.S.,” Northeast Intelligence Network, February 28, 2006, http:// politicsofcp.blogspot.com/2006/02/ special-report-released-jamaat-ul.html 5 Ibid. 6 Paul L. Williams, Crescent Moon Rising: The Islamic Transformation of America (Amherst, New York: Prometheus Books, 2013), 134. 7 “Afghanistan Update,” Daily Telegraph (London), August 5, 1983; Los Angeles Times, August 5, 1983. This is the title. 8 Ibid. 9 Zachary Crowley, “Jamaat ul-Fuqra Dossier,” Center for Policing Terrorism, March 16, 2005, hard copy. 10 Gordon Gregory and Sonna Williams, “Jamaat ul-Fuqra,” Special Research Report, Regional Organized Crime Information Center, 2006. 11 Ibid. 12 Nafeez Mosaddeq Ahmed, “Whistleblower: Al Qaeda Chief Was US Asset,” Huffington Post, May 21, 2013. http://www.huffingtonpost.co.uk/drnafeez-mosaddeq-ahmed/whistlebloweralqaeda-chi_b_3305954.html 13 Sibel Edmonds, “Know Your Terrorists: Ayman al-Zawahiri,” Boiling
Circle 87 on Reader Service Card
Frogs Post, February 16, 2013, http:// www.boilingfrogspost.com/2013/02/16/ video-report-know-your-terrorists-aymanal-zawahiri/ 14 Rory McCarthy, “The Real Ayman al-Zawahiri,” The Guardian, August 5, 2005, http://www.prisonplanet.com/ articles/august2005/050805therealayman. htm (note: this site links to The Guardian)See also Michel Chossudovsky, The Globalization of War (Montreal: Global Research Publishers, 2015), 111. 15 Zbigniew Brzezinski, The Grand Chessboard: American Primacy and Its Geostrategic Imperative (New York: Basic Books, 1997), 20, 40. 16 “Americans Are Training Syria Rebels in Jordan,” Reuters, March 10, 2013, /www.reuters.com/ article/2013/03/10/us-syria-crisis-rebelsusa-idUSBRE9290FI20130310 17 Ibid. See also Sy Hersch, “Beyond Partisan politics: What Benzagi Is Really About,” WashingtonBlog, April 15, 2014, http://www.washingtonsblog. com/2014/04/real-benghazi-story.html 18 Ryan Mauro, “Islamic Terror Enclave Discovered in Texas,” The Clarion Project, February 18, 2014, http://www. clarionproject.org/analysis/exclusiveclarion-project-discovers-texas-terrorenclave 19 “Jamaat ul-Fuqra: Terror Group of Pakistan,” Institute of Contact Management, 2001, http://www.satp. org/satporgtp/countries/pakistan/ terroristoutfits/jamaat-ul-fuqra.htm 20 Ibid. 21 “The Jamaat ul-Fuqra Threat,” Stratfor, Security Consulting Intelligence Resources, June 3, 2005. 22 Patrick B. Briley, “Al Fuqra: U.S. Islamic Terror Network Protected by FBI, U.S. State Department,” Liberty Post, July 28, 2006, http://www. newswithviews.com/Briley/Patrick28.htm
“Gripping reading.” NEXUS MAGAZINE
“Will cause the reader to question what person of authority and leadership can be trusted. . . .” SGT. THOMAS JUBY
Member of the Advisory Council for the Intelligence Summit
“Well-researched. . . . [This] scholarly work fills a major lacuna in the study of the US foreign policy.” THE WASHINGTON BOOK REVIEW
WWW.PROMETHEUSBOOKS.COM
INNOVATION, NOT IMITATION
FROM THE MAKERS OF THE ORIGINAL M9 ASSAULT MEDICAL BACKPACK
Medical, Response and EOD Kits / Logistics Services Solutions TSSI-OPS.COM sales@tssi-ops.com Toll-free 877 535-8774 Circle 123 on Reader Service Card
The Counter Terrorist ~ October/November 2015 29
WHY DOMESTIC TERRORISTS GO SOFT Photo by: Al Jazeera English 30 The Counter Terrorist ~ October/November 2015
by Karen Bunso
With all of the information we have learned about mass shootings and domestic terror attacks, we have learned all too much of, I thought it would be a good idea to design visual models that could visually explain some of the factors contributing to such violent incidents.
A
s for explaining the “why” behind these incidents is more difficult because that’s one detail that we usually learn after the fact; and even then, these incidents still do not make any sense.
PART I TARGET HIERARCHY The first model is called the Target Hierarchy and it is a hierarchy in a
pyramid scale. It begins with the easiest category of target to assault and works upward to the most difficult category of target to assault. I will attempt to explain factors that play a part in an assault based on the type of target. Tactical factors like the category of target, the degree of difficulty, available targets (people), and the preparation time will be covered. While the possibilities for a target objective are unlimited, potential target
The Counter Terrorist ~ October/November 2015 31
TARGET HIERARCHY u
HARD TARGET
Fewer targets Low opportunity for mass casualty event, unless attack on secondary target used as distraction 1 assailant
Some preparation and planning needed to carry out an
HARDENED SOFT TARGET
Many targets to choose from High opportunity for mass casualty event because on a Hardened Soft Target
1 A
Fort Knox Bullion Depository, White House, Level V Federal Buildings
Sport Stadiums, Concert Event, City Hall, Airports, Federal Buildings (Below Level V), Police Station, Court Houses
est Little to no preparation or planning needed, spontaneous assault possible
SOFT TARGET
Numerous targets available Medium opportunity for mass casualty event
School, Medical Facilities, Places of Worship, Public Transportation, Restaurant, Mall, Theater, Park, Parade, Public Access spaces, Fire Station, Community Figures with routine public interaction Note: all targets are stationary.
Content: Karen Bunso, Design: Jessica Rosenthal, 2015
objectives can be sorted into two categories: soft targets and hard targets. The degree of difficulty assaulting a target depends on the category it is in, the number of targets available, and the amount of time and other resources the assailants will invest. For this paper, all targets are fixed and are permanently stationary.
THE HARD TARGET A hard target is a site that has wellestablished physical and technical defensive security measures engineered
into the design of the building and site. It has layers of access constricts, multiple layers of security rings establishing standoff distance for explosives, line of site precautions and steel-concrete barriers. It has also prepared for and taken extensive measures to handle and repel an intrusion or assault of varying tactics. Hard targets have permanent security personnel that are vetted, trusted, trained, and armed. Hard targets have a large monetary value, house a world leader, or are a symbol of national or international importance
32 The Counter Terrorist ~ October/November 2015
(monument), and they require extensive, well thought out security measures to keep them safe. Some good examples of hard targets are the United States Bullion Depository at Fort Knox, the Pentagon, and the Statue of Liberty. Assaulting a hard target has the highest degree of difficulty because of the layered security measures that are permanently in place and have been specifically designed to actively defend it. There are 446,000 federal buildings according to the U.S. Department of
The Pentagon, headquarters of the United States Department of Defense, taken from an airplane in January 2008. Photo by: David B. Gleason
The United States Bullion Depository at Fort Knox, Kentucky. Photo by: David B. Gleason Statue of Liberty. Photo by: Derek Jensen Justice, U.S. Marshals Service (USMS), Vulnerability Assessment of Federal Facilities report. Because of the Oklahoma City Bombing, an evaluation of security at all federal buildings was commissioned and was released in 1995. The report placed buildings into five categories, Level V “… are considered critical to national security
(e.g., the Pentagon).” Information about the number of federal buildings classified as Level V is not readily available, but I estimate there are less than 100 buildings with this classification. The amount of preparation time required to plan an effective assault on a hard target depends upon the objective of
The Counter Terrorist ~ October/November 2015 33
An assailant has flexibility and can act spontaneously or on a whim.
the assailant(s). If they want to take over and destroy the target, it will necessitate a lot of planning and preparation in order to mount a sophisticated assault. If the assailant(s) simply wants to test security and see if they can breach it (for their 15 minutes of notoriety), very little planning time will be needed.
THE SOFT TARGET A soft target is the most vulnerable type of target because it has almost no security measures or protection in place, imaginary or otherwise. I do not consider observational security measures such as video monitoring as security, but view them as passive deterrents and investigative tools. Soft targets are places or people that the public has unrestricted, routine access to, such as unticketed public events, like parades. Other examples include schools, fire stations, public transportation, grocery stores, shopping malls, public parks, places of worship, and medical facilities. Community activists, local celebrities, local judges, school principals and town mayors are also examples of soft targets. Assaulting soft targets is not a difficult task because of their security
vulnerabilities. Perhaps the most difficult thing for assailants assaulting soft targets is choosing which one to attack. Consider the fact that nearly every place a person frequents throughout the day is a soft target. Soft targets are everywhere and they are abundant. On the Target
34 The Counter Terrorist ~ October/November 2015
Hierarchy, there are more available soft targets than any other category. From a preparation standpoint, very little time is needed to plan an assault on a soft target. An assailant has flexibility and can act spontaneously or on a whim. For the reasons previously discussed,
THE VENOM速 PRODUCT LINE FROM CSI 速
A family of high-capacity non-lethal grenade launchers designed to be fully interchangeable for mounted use on vehicles, tripod mounts, and static installations. Expanded in 2014, the VENOM速 product line offers non-lethal solutions for a variety of calibers and ranges. LIGHT WEIGHT // VERSATILE MULTI-CALIBER & TACTICAL SOLUTIONS
GET THE UPPER HAND...
AND KEEP IT.
Deployed remotely or on land and marine platforms, the V3037 delivers non-lethal flash and sound, smoke obscuration, irritant, and blunt trauma effects. These capabilities support escalation of force, determination of intent, crowd dispersal and area denial objectives.
SEE THE PRODUCT LINE IN ACTION:
VISIT US AT THE FOLLOWING TRADESHOWS: AUSA: Booth #1460 MILIPOL Paris: Booth #5F120 in the U.S. Pavilion
Circle 93 on Reader Service Card
The Counter Terrorist ~ October/November 2015 35
Super Bowl XLVII Kick Off. Photo by: Au Kirk soft targets represent the worst case scenario-they are the most likely places for mass casualty events to occur. Wherever a lot of people congregate with no security it IS the worst case scenario- it is a target rich environment.
THE HARDENED SOFT TARGET
The site of the first bomb at the 2013 Boston Marathon finish line at 1:56:44pm April 15th, 54 minutes before the explosion. Photo by: Aaron “tango� Tang
Sandwiched between these two welldefined categories is what I term the hardened soft target. This is simply a soft target that has been hardened with some security measures. A hardened soft target is a closed venue with restricted access granted by purchased event tickets, identification credentials, or employment. It has passive but visible security measures that were added to the venue
36 The Counter Terrorist ~ October/November 2015
or site after it was constructed. These added security measures may include unarmed temporary security personnel interspersed with armed local or state law enforcement, bollards, chain link fencing, locking gates, and video cameras. Examples of hardened soft targets include police stations, sport stadiums or event sites, concert venues, airports, federal buildings, office buildings, courthouses, and city halls. A hardened soft target usually has some form of perimeter security that it is, in fact, duplicitous: it keeps the bad guys out and the attendees confined inside. With the attendees as a captive audience, the assailant(s) have the potential to carry out a mass casualty event. How difficult is it to carry out an assault on a hardened soft target? Not very, especially if the assailant works at the venue. The insider threat is a very real vulnerability. Even without insider threats, hardened soft targets are appealing targets because they advertise security that they cannot deliver. Security measures cannot keep people at venues 100% safe because the venues themselves were designed to let people in (spectators), not keep them out. Additionally, most events scheduled at hardened soft targets are well publicized, providing notice of certain events and a timeline or deadline for those planning an assault. A hardened soft target with limited security measures is an inviting and possibly symbolic target for an assailant(s). Such an assault, while needing less preparation time than an assault on a hard target, still requires time to plan.
Even without insider threats, hardened soft targets are appealing targets because they advertise security that they cannot deliver.
The Counter Terrorist ~ October/November 2015 37
TACTIC HIERARCHY $ $ $ R R R
Can have a large blanket coverage range, not great precision, deadly by proximity Moderate time needed for device preparation and planning for assault HME could be made and used by just 1 assailant
$ $ $
Inexpensive and easy to obtain
R R R
< 20 - > 50 yards for handgun, precision to blanket coverage; Range depends on assailant’s expertise, Rifle range < 1000 yards, precision weapon
HME + IEDs TATP, ANFO, TNT, RDX IED – Pipe bomb, grenade, VBIED – Car, truck, tractor trailor, model aircraft, bicycle, motorcycle, SBIED
FIREARMS Handgun, automatic, revolver, shotgun,
$ $ $ Requires little expertise to be weaponized
R R R
Has a blanket coverage range, not a weapon of precision unless assailing one victim
FIRE
Very little time needed for preparation or planning Can be weaponized and used as a tactic by just 1 assailant
Arson, incendiary device (Molotov cocktail)
Content: Karen Bunso, Design: Jessica Rosenthal, 2015
PART II TACTIC/WEAPONRY HIERARCHY Tactic-noun tac·tic \'tak-tik\ :an action or method that is planned and used to achieve a particular goal Weaponry-noun weap·on·ry \-rē\ 1: weapons -Merriam-Webster Dictionary While pretty much anything can be used as a weapon—your hand, a pencil, etc.—I will cover conventional weapons
excluding Advanced Conventional Weapons (ACW) such as Man-Portable Air Defense Systems (MANPADS), tanks, etc., and military grade, statemanufactured weapons. Basically, I will cover small conventional weapons that the average assailant can afford to purchase or make on their own. Like the previous model, I have put these weapons as tactics in a hierarchy, creatively titled Tactic / Weaponry Hierarchy. The weapons are ranked according to their affordability and
38 The Counter Terrorist ~ October/November 2015
attainability, their ease of operability, their effective range (precision or blanket coverage), the time required to plan or prepare for their use (expertise, practice), and the number of assailants necessary to carry out an effective assault. Regarding the number of assailants necessary to carry out an effective assault, it only takes one.
FIRE According to the 2014 Global Terrorism Index, “60% of all attacks
involve the use of explosives, 30% use firearms and 10 per cent used other tactics including incendiary devices…” It makes sense then that the first tier at the base of the Tactic / Weaponry Hierarchy is fire weaponized via incendiary device. Fire has been used to light up the dark and to destroy entire cities. It’s easy to overlook the simplistic importance of fire with the prevalence of firearms—until you read about arson, a small airplane flying into a building or recall the events of 9/11, when jetliners full of petrol were used as incendiary devices. Jetliners are not the scale I am focusing on here however, and their use as a weapon is another article entirely. Fire as an incendiary device is at the base of my hierarchy because it is easy to obtain, easy to use, has a blanket range, and requires little or no planning. It is the most basic of weapons. If an assailant one can find a match, they can carry out arson, destruction, and murder with this most primitive weapon. If targeting one person, an assailant can be precise at close range. With a rag, a glass bottle, and a common accelerant like gasoline, an assailant can build the unsophisticated incendiary device popularly known as a “Molotov Cocktail.” It only takes one assailant to weaponize fire using an incendiary device and carry out an attack.
FIREARMS Firearms, handguns, and small arms are weapons that are commonly available and some examples are revolvers, rifles, and automatic handguns. Handguns are relatively inexpensive; for the price of a flat screen television an assailant can purchase a handgun. Handguns are also easily concealed, giving them the element of surprise in an assault. They are legal to
purchase, require a short waiting period, and can be permitted to carry concealed. They can also be purchased without a waiting period from private sellers. Most firearms are simple to operate; if some expertise is required, or if the user needs to learn how to adjust the sights, instructional videos can be found on the Internet. The effective range of firearms depends on the skill of the user as well as the weapon used. A handgun used by an experienced shooter has quite an effective range, up to 100 yards. A handgun used by a novice has a shorter effective range, less than 20 yards. The same is true with the use of rifles, although with a longer range, the effectiveness and accuracy are limited by the user’s expertise. A long gun (hunting rifle) can be used for sniping and necessitates great expertise through training and practice in order to be accurate where it’s meant to be used– long range, 250 to 1000 yards. Firearms are versatile in that they allow for precision as well as a blanket range depending on whether they are automatic (continuous fire) or semiautomatic (fires one round at a time). One assailant can easily carry out a successful firearm attack. There is a short learning curve for operating a handgun, and user planning time can be as short as learning how to load the weapon. Planning time can be as long as the assailant needs for honing their expertise or planning the details and logistics of an attack. Of course, the more planning an assailant does, the more lethal the attack will be. This goes for any tactic or weaponry used.
4700 Providence Rd. Perry, fl 32347
Since 1996, ALS has been serving law enforcement, corrections and Rd. military 4700 Providence Perry, 32347 communities, bothfldomestically and 4700 abroad. ALS Providence was purchased in Rd. 2011 by Perry, fl been 32347 Since 1996, ALSIndustries has serving law National Presto and became 4700 Providence Rd. 4700 Providence Rd. enforcement, corrections and military Perry, fl 32347 4700 Providence AMTEC Less Lethal fl Systems, Inc.Rd. As a full Perry, 32347 Since 1996, ALS has been serving law Perry, fldomestically 32347 communities, and service provider both of tactical and operational enforcement, corrections military abroad.1996, ALS ALS was in 2011 by Since 1996, ALS hastraining, beenand serving law Since has been serving law and purchased AMTEC equipment communities, both and Since 1996, ALS has domestically beenand serving law National Presto Industries and became enforcement, corrections military enforcement, corrections Less-Lethal strives to provideand only military the best abroad. ALS Lethal was in 2011 by enforcement, corrections and military AMTEC Systems, As a and full communities, bothpurchased domestically and communities, both products Less and services todomestically meet Inc. the needs of National Presto Industries and became communities, both domestically and service provider of tactical and operational abroad.customers ALS was was in purchased in changing 2011 by by abroad. ALS purchased 2011 our today'sin AMTEC Less Lethal Systems, Inc. As a full abroad. ALS was purchased in 2011 by andIndustries training, equipment National Presto and became National Presto Industries and AMTEC became environment. From a core of manufactured service ofIndustries tactical andand operational Nationalprovider Presto became Less-Lethal strives to provide only the best AMTEC Less Lethal Systems, Inc. As a full AMTEC Less Lethal Systems, Inc. As a full products, to strategic partners, ALS and training, AMTEC equipment AMTECprovider Less Lethal Systems, As a full products and services to meet the needs of service of tactical tactical andInc. operational service provider of and operational provides comprehensive solutions for all of Less-Lethal strives to provide the best service provider of in tactical andonly operational our customers today's changing and training, AMTEC equipment training,and AMTEC equipment operational training your tactical, and products andstrives services to meet the AMTEC needs of and to training, equipment environment. From a core of manufactured Less-Lethal provide only the best best Less-Lethal strives to provide only the needs. our customers in today's changing Less-Lethal strives to provide only the best products, to strategic partners, ALS products and and services services to to meet meet the the needs needs of of products environment. Fromina core of manufactured products and services to solutions meet the for needs of provides comprehensive all of our our customers customers in today's today's changing changing products, toFrom strategic ALS our customers ina core today's tactical, operational and changing training your environment. ofpartners, manufactured environment. From a core of manufactured provides for all of environment. a coresolutions ofpartners, manufactured needs. products,comprehensive toFrom strategic ALS products, to strategic partners, ALS tactical, and for training your products, to operational strategicsolutions partners, ALS provides comprehensive all provides comprehensive solutions for all of of needs. tactical, provides comprehensive solutions all of operational and for training your tactical, operational and training your tactical, operational and training your needs. needs. needs.
1-850-223-4066
www.LessLethal.com
1-850-223-4066 www.LessLethal.com 1-850-223-4066 1-850-223-4066 www.LessLethal.com 1-850-223-4066 www.LessLethal.com www.LessLethal.com
EXPLOSIVES
The National Counterterrorism Center (NCTC) has a very good
Circle 91 on Reader Service Card
The Counter Terrorist ~ October/November 2015 39
Counterterrorism Calendar that is posted to their website (www.nctc. gov). Along with profiles of terrorist groups and dates of terrorist incidents worldwide, the NCTC includes a practical list of “Common Explosives— Identification and Characteristics.” The explosives on this list are broken into three categories: Military/Commercial, Primary Explosive Booster, and Secondary Explosive/Main Charge. Examples of military or industrial grade explosives are Trinitrotoluene (TNT), which is used in mining and industrial operations; Tovex, a more stable version of dynamite in a liquid gel formula; and cyclotrimethylene trinitramine (RDX). Even though these explosives cannot be purchased at a local gun store, they can be easily acquired by theft from an industrial worksite as domestic terrorist and mass murderer Timothy McVeigh did prior to the Oklahoma City Bombing in 1995. Some education or expertise is be needed to make this type of explosive device, but it can most certainly be done by those who are determined with knowhow, and the Internet. While NCTC lists two other categories, I will be focus on Homemade Explosives (HME) and Improvised Explosive Devices (IED). In 2008, the Department of Homeland Security’s (DHS) Science and Technology Directorate produced a document titled “Homemade Explosives (HME) Program Overview.” The following HME’s were listed under the section “Taxonomy of Current Threat”: • “Liquid hydrogen peroxide/fuel formulations (HP/F)—(e.g. hydrogen peroxide with various fuels)” In this combination, hydrogen peroxide can become tri-peroxide, the other half of
40 The Counter Terrorist ~ October/November 2015
tri-acetone tri-peroxide (TATP). • “Mixtures with solid oxidizers, (e.g. perchlorates and ammonium nitrate.)” In this combination, ammonium nitrate plus fuel oil yields ANFO. • “Mono-molecular mixtures, (e.g. urea nitrate, TATP, petric acids.)” In this combination, hydrogen peroxide can become tri-peroxide, the other half of tri-acetone tri-peroxide (TATP). • “Nitrogen based explosives, (e.g. nitro glycerin, EGDN, and methyl nitrate.)” In this combination, urea nitrate explosive is dissolved urea fertilizer plus nitric acid. While the names given to these HMEs reads like Chemistry 101, the combination information is my attempt to remove the glaze from your eyes. HMEs can be built out of common household and farming chemicals by literate, determined assailants. If assailants lacks those skills, they can always opt to steal industrial grade explosives rather than mix their own. An IED can use either commercial explosives or HME. Some examples include, grenade, pipe bombs, pressure cookers, people, bicycles, mail, and vehicles or model aircraft. The options are limited only by the assailant’s creativity and expertise. Detonation of the device can be simple, such as a device that is command detonated by the assailant. Detonation can also be more complex, such as a device that uses a timer, remote control or physical or infrared activation. In spite the ease with which the components for HMEs can be obtained, other explosives are more commonly used. According to information from the Bomb Arson Tracking System, (BATS), the most common explosive used are black powder,
Take your education to a higher level:
FOR A LIMITED TIME, THE HOMELAND SECURITY NETWORK , the most valued and reliable resource for Homeland Security professionals is available for FREE to criminal justice and homeland security students. Education:
Opportunities to learn through film, webinars, and expert postings.
Jobs:
Search for jobs when it is time to start your career and develop relationships with professionals that can help.
Blogs:
Blogs and feeds concentrated in one site to keep a pulse on what hands-on professionals are talking about.
Mentoring:
The ability to network with more than 6000 professional Homeland Security First Responders that can help to mentor you through your study.
Giveaways & Gear:
Participate in groups and discussions and be entered for prizes exceeding $10,000, weekly raffles, free giveaways, groupon-style offers from manufacturers and much more.
ITâ&#x20AC;&#x2122;S FREE!
The professional resource in Homeland Security, now in its 4th year, is available at no cost to students for a limited time. See below to find out how you can benefit from all the resources available to take your education to a higher level!
To take advantage of this opportunity, visit:
www.homelandsecuritynet.com and then call Henry Morgenstern on 305-401-6906. Circle 19 on Reader Service Card
Get a FREE Subscription A $40 value.
H
Homeland Security
NETWORK
The Counter Terrorist ~ October/November 2015 41
smokeless powder, and fireworks powders. The most common explosive device in the U.S. is the pipe bomb.
PART III TRENDS In February 2015, the Southern Poverty Law Center (SPLC) published a major study entitled “The Rise of the Lone Wolf.” The study is a wellresearched report with information and statistics taken from the University of Maryland’s Global Terrorism Database, among other credible sources. The study covers a time span of 6 years, from April 1, 2009, to February 1, 2015. (I do not use the term “lone wolf ” because it was a term devised by a narcissistic white supremacist. I use the term lone gunman: 1 shooter, unassisted; a gunman; alone-no wolf.) SPLC researched incidents considered acts of terrorism as defined by law enforcement: incidents classified as domestic terrorism and violent incidents that “occurred when authorities confronted volatile political extremists.” According to the study, “the regularity of major violence or planned violence from domestic terrorists—one attack, on average, (occurred) every 34 days.” The study examined 63 incidents “culled from academic databases and the SPLC’s own files, 46 of them—fully 74%—were carried out by lone wolves, unassisted by others.” Lone gunmen accounted for the majority of all attacks. SPLC’s study also reported that “of the 61 incidents where the weapon used is known, 59% of attackers used firearms, while 25% used explosives, including such jury-rigged bombs as propane tanks. Five percent (5%) used both firearms and explosives. And 11% used other weapons,
including arson fires and a private plane.” It comes as no surprise that the majority of attackers (mostly lone gunmen) used firearms. For reasons explained in my Tactic/Weaponry Hierarchy, firearms are relatively affordable, easy to obtain, easy to use, require little to no time to plan an attack, and there are a large number of targets. SPLC included the actual incidents they based their study on in the report, and I looked at them to see if they could yield any other useful information. I found that of the 61 incidents where the weapon used was known, 46 of them were actually carried out and 17 of them were disrupted by law enforcement. Compared to the 46 incidents that occurred, 17 may seem like a relatively small number. It is, however 17 more than 0. And it means we never had to hear about how many innocent men, women and children were murdered, or how many first responders lost their lives trying to save them. I also found that of the 46 incidents that actually occurred, 35 of them (76%) were carried out by lone gunmen, which is very close to the original percentage (74%) from all 63 incidents. However, of those 35 lone gunman attacks, 27 of them, or 77%, used firearms, a significant increase, nearly 20% greater than SPLC’s original value of 59%. As previously examined, the reasons why the majority of these domestic terrorists used firearms is clear: they are inexpensive, easy to obtain, easy to operate, for even the least skilled assailant, and portable—because they are easy to carry and conceal. They also require little preparation time and are accurate at close range. The targets attacked in the 35 lone
42 The Counter Terrorist ~ October/November 2015
gunman attacks described in the SPLC report also fit directly into the Target Hierarchy. The majority of attacks were on soft targets, with a smaller proportion on hardened soft targets and only one attack on a hard target, which was carried out by an insider. Based on these statistics, the obvious trend is lone gunman plus firearm plus soft target. But is this combination really a trend, or does it just confirm what we already know? I don’t think it’s a new trend in domestic terrorism. The only thing new about these attacks are the names of the groups or causes carrying them out. They may be on the lower rungs of the Target Hierarchy and Tactic/Weaponry Hierarchy today, but they can only go up from there. It’s the logical progression.
•
ABOUT THE AUTHOR Karen is a former Intelligence Officer for the United States Secret Service. In the USSS’s Foreign Assessment and Counterterrorism Branch (FAB), her area of concentration was the Middle East (ME), Counterterrorism Section (CTS) and the Critical Protective Analysis Group (CPAG). Karen is a veteran of the U.S. Army and served as a Signals Intelligence Analyst (SIGINT). Currently, Karen is a doctoral student at Florida State University in the Department of Sport Management. Her concentration is in Sport Security.
ACRONYMS ACW: Advanced Conventional Weapons ANFO: Ammonium Nitrate Fuel Oil AOP: Area of Operations CPAG: Critical Protective Analysis Group
Tactical Tools to Achieve The Mission! • Pelican® Brand 1740 case attached to custom hitch that inserts in standard two inch tow receiver. Adaptable to replace push plate on Bear® and Bearcat®. Textured powder coated black • Custom Laser Cut Foam insert for all kit items • 4 Carabiners rated for over 6,000 lbs. each • Two 30 foot custom made “black” tow straps rated at over 10,000 lbs. tensile strength each • Two custom made hooks extra open non-gated for easy insertion – textured powder coated black for non-slip grip • Custom-made 39” long, 1” diameter rolled steel window spear with rounded ends, and 6 foot chain - textured powder coated black for non-slip grip • Custom made elongated Thor hammer 12 pound custom head with 3 foot composite handle
Universal Mounting Options Available! Call now for more information. Pricing dependent on quantity
and delivery location. Call Solomon Bradman at: (305) 302-2790 or email bradman@homelandsecurityssi.com Circle 179 on Reader Service Card
Circle 179 on Reader Service Card
The Counter Terrorist ~ October/November 2015 43
CTS: Counterterrorism Section DHS: Department of Homeland Security EGDN: Ethyl Glycol Dinitrate FAB: Foreign Assessment and Counterterrorism Section FBI: Federal Bureau of Investigation HME: Home Made Explosives HP/F: Hydrogen Peroxide / Fuel IED: Improvised Explosive Device MANPADS: Man-Portable Air Defense Systems ME: Middle East NCTC: National Counterterrorism Center RDX: Cyclotrimethylene Trinitramine SIGINT: Signals Intelligence SPLC: Southern Poverty Law Center SPORTSEC: Sport Security START: National Consortium for the Study of Terrorism and Responses to Terrorism (Going by GTD now: Global Terrorism Database) TATP: Tri-acetone Tri-peroxide TNT: Trinitrotoluene USMS: United States Marshals Service Circle 97 on Reader Service Card
REFERENCES Federal Building and Facility Security:
44 The Counter Terrorist ~ October/November 2015
Frequently Asked Questions, Congressional Research Service, June 17, 2014, Shawn Reese. Federal Building and Facility Security, Congressional Research Service, March 24, 2010, Shawn Reese, Lorraine H. Tong. Vulnerability Assessment of Federal Facilities report, U.S. Department of Justice, U.S. Marshals Service, June 1995 Global Terrorism Index 2014, Institute for Economics and Peace, www. visionofhumanity.org Homemade Explosive (HME) Program Overview, Homeland Security Science and Technology, Department of Homeland Security, undated, www.dtic.mil/ ndia/2008homest/char.pdf Age of the Wolf, A Study of the Rise of Lone Wolf and Leaderless Resistance Terrorism, Southern Poverty Law Center (SPLC), February 12, 2015, splcenter.org. The National Counterterrorism Center Counterterrorism 2015 Calendar, Common Explosives and Characteristics, page 139, nctc.gov. Bomb Arson Tracking System, (BATS), U.S. Bomb Data Center, www.bats.gov/ batsnet/ Miriam Websterâ&#x20AC;&#x2122;s Dictionary
Circle 241 on Reader Service Card
Best Location in Orlando – The Florida Hotel and Conference Center What a fantastic hotel. Rooms were nicely appointed, the staff was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall attached to the hotel. –Top rated by TripAdvisor
Counter The
Journal for Law Enforcement, Intelligence & Special Operations Professionals
presents: 10th Annual
HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION November 3-4, 2015 • Orlando, Florida We sold out in 2014. Get your registration in as soon as possible: • Best speakers in Homeland Security • Premiere opportunity to network with your peers in US Homeland Security and across the Globe • Attended by more than 100 Federal, State and Local agencies • Selected Vendor expo of the latest in HS Technologies
This year’s The Counter Terrorist Magazine Annual Homeland Security Professionals conference will celebrate its first decade. This will be a highly publicized event throughout the country and abroad.
REGISTER NOW REGISTRATION COST $399.00 *Government and group rates available. Call us for details.
www.thecounterterroristmag.com/conference
LEARN MORE at: Call now for more information.
Phone: 866-573-3999 Fax: 866-573-2090 Circle 180 on Reader Service Card info@homelandsecurityssi.com Circle 177 on Reader Service Card
The Counter Terrorist ~ October/November 2015 45
BOOK REVIEW
Cycle of Fear: Syria’s Alawites in War and Peace by Leon T. Goldsmith Hurst and Company, London 2015
Reviewed by the Counter Terrorist Magazine’s Editorial staff
W
ith the Syrian Conflict dominating the news recently due to the flood of refugees that are swarming Europe, it seems like a good idea to understand this costly civil war a little better through understanding the Alawites, the Muslim religious sect that through the family of Asad, has ruled Syria since the 12th of March, 1971. In March, of 2011, some 40 years later, anti-government demonstrations broke out that would lead to an estimated 250,000 - 300,000 Syrians killed in the conflict, with fully half the Syrian population being displaced either within Syria or spread into Turkey, Lebanon and beyond. Now, that huge refugee swell is threatening Europe. The savagery of the fighting, including Bashar Al-Asad’s use of Chemical weapons against his own population, has never raised any protests at Berkeley, Columbia, The London School of Economics or other Liberal bastions of Academia. So fond of protesting when the Israelis, in defending themselves, hit a few Palestinians. So who are these Teflon Alawite’s that have the backing of Iran and Russia, and who are demonized by the Sunni Muslim insurgency in Syria and Iraq and of course ISIS? How relevant is the Alawite sect to the Asad regime? Alawites are a product of the great divide between Sunni and Shia Islam.
In 1305, Ibn-Taymiyya declared the sect heretics and enemies of Islam, a status the caused them to be persecuted, and contributed as other factors to the feelings of solidarity in this very rural mountain tribe. The cycle of fear created by these prosecutions gave rise to their tendency to be supportive of the Asad regime way past the point where it served their tribal interest. During the regime, the tribe became the foremost element in governing Syria. The group cross-cuts the identities of Muslims, Shi’ites, Arabs, and Syrians (by no means are the last two the same). 4 main tribes: Khaytin, Kalbiyya, Haddadin and Matawira and there are
46 The Counter Terrorist ~ October/November 2015
many of unknown tribal affiliation. Indeed much of the support derived by Asad’s Baathist party has come from a more secular element in the sect. They are not Shi’a but a break-away sect from within the Twelver Shi’a Islam. Their main point of difference is their elevation of the fourth caliph Ali ibn Abi Talib and his descendants to near divine status. The beliefs of the Alawite incorporate Christianity and Paganism and they are liberal in the role of religion in their daily lives. Alcohol is permitted and women are not required to cover their heads and can freely associate in public. Because they view their religious commitment as a personal one, they are not required to attend the Mosque. Needless to say, these attitudes have not endeared them, not to the Shi’a where they are accused of being “extremists”. According to Goldstein, the revolt that threatened to bring down the Government in 2011 threatened the social and political order which had been favorable to them, and threatened once again to make them, as they had been for their 1100 year history, persecuted violently again. To support their rise to power under Asad, the sect turned a blind eye to the regime’s repression. It was a repression made necessary by the opposition. The Muslim Brotherhood, so active here in
the USA, challenged the Government’s secular constitution and economic dissatisfaction among Sunni merchants. The Brotherhood resorted to assassinations, a very well-known Brotherhood tactic (think Sadat). This resulted in brutal repression by Asad’s Brother Rifaat, that meant 6000 imprisoned and 30 executed. As fighting between Asad and his brother eventually led to the alliance with Iran. In 2000, his son Bashar was taken from his studies as an optometrist and catapulted into a dynastic succession which his father had assured by stocking the military with loyalists and ruthlessly eliminating any potential source of conflict to the Dynasty. The resulting decline of the rulers culminating in the revolution which began with the protests of 2011, shows how complex the ruling situation in these countries really is. The interplay between Iran and Russia with the regime
Circle 277 on Reader Service Card
does have something to do with the Alawite’s. These rough mountain men, considered “hillbillies” by the Sunni Majority in Syria have played a key role in the stability and since that time, equally, the destruction of Syria. But the book further underscores how our US “religious” zeal in supporting what appears, but rarely is, an outpouring of “democratic” aspirations leads us into quagmires. There was no need to topple Hosni Mubarak, and it certainly served to encourage the Muslim Brotherhood opposition to Asad. Given the nature of the regime; the usual suspects, corruption, brutal repression, dynastic succession and complete control of the power of the State, these may indeed be a more palatable option in the Middle East than the forces that come to replace them like ISIS or in the case of Egypt, Morsi and the Brotherhood.
It is highly recommended that the current managers of our Foreign Policy read books like this so that they can understand that in the Middle East there is nothing we recognize as democratic impetus outside of Israel. Rather there are forces that have been created over more than a thousand years that create solidarities that have nothing to do with Democratic parties. And a better reading of these forces, like the Alawites, may make the moves we make less damaging and more productive for our own interests.
•
The Counter Terrorist ~ October/November 2015 47
THE CHAPLAIN AS FIRST RESPONDER 48 The Counter Terrorist ~ October/November 2015
by William A. Gralnick, BA, MA, DHL
Law Enforcement Chaplains are called on to play many roles. Their ministry, according to the International Conference of Police Chaplains, is a “ministry of presence.” And they are present in many different ways.
I
n some departments, the role is primarily ceremonial. The chaplain is seen giving invocations and benedictions at all manner of functions, from banquets to departmental funerals. Chaplains often perform life cycle events for sworn and non-sworn employees of their departments who are “unchurched.” Last year, a Palm
Beach County Sheriff’s Office (PBSO) chaplain married two PBSO deputies to each other. Chaplains do baptisms and funerals. In many departments in the Midwest, chaplains do an annual blessing of the crops and of the animals. In a small west coast of Florida City, the chaplain blesses the fishing fleet. In more and more departments,
chaplains don vests and do ride alongs. The rationale comes from the old proverb that you can’t know a man until you’ve walked a mile in his shoes. It is only through experience that a chaplain can feel the roller-coaster ride of a shift and what that ride, day in and day out, can do to an officer and by extension his or her family. Other than the
The Counter Terrorist ~ October/November 2015 49
New York, NY, September 30, 2001— A Chaplain is on hand at Ground Zero. Photo by Andrea Booher/ FEMA News
military, law enforcement is the only job where the morning kiss goodbye could potentially not be followed by an end of shift kiss hello. The car also provides the best “office” for spiritual counseling during a slow shift or after an intense encounter on the street. As we train
our chaplains, “If you’re talking… the deputy can’t.” Technology provides chaplains with ever-increasing ways to “reach out and touch someone,” aside from dropping in to the district and “schmoozing.” Phone calls, emails, texts, and
50 The Counter Terrorist ~ October/November 2015
social media are electronic means of continuing that presence so essential to the chaplain’s ministry. More departments, like this one, are assigning chaplains to the more highstress “specialty units.” This is not for every chaplain, and frankly it takes a
Photo by: Elvert Xavier Barnes Photography
lot longer for these â&#x20AC;&#x153;brotherhoodsâ&#x20AC;? to be accepting of a chaplain. PBSO staffs K-9, Homicide, TAC Gang Task Force, Marine, and Aviation. So as law enforcement has evolved, so has the role of the chaplain, a role first recognized in this country by the military in 1787!
Chaplain (Maj.) Jack Stanley, 422nd Air Base Group chaplain, runs along the perimeter road at RAF Croughton, England, May 11, 2015, during a ruck march in honor of National Police Week. The event was held to honor law enforcement officers who have given their lives in the line of duty. Photo by: Staff Sgt. Jarad A. Denton
The Counter Terrorist ~ October/November 2015 51
American Airlines Flight 587 crash site. Photo by: NOAA
Recovery of the American Airlines Flight 587 vertical stabilizer. Photo by: NTSB
52 The Counter Terrorist ~ October/November 2015
There is one glaring omission in most chaplainciesâ&#x20AC;&#x2122; use: the natural or mancaused disaster. Disasters include acts of terrorism, domestic and foreign. As some departments like NYPD and the FBI have learned, who better to serve those traumatized but uninjured and who better to serve those injured waiting for triage than the chaplain? This lesson was learned during the aftermath of 9/11. As recounted by Fr. Paul Wierichs, there was a chaplainâ&#x20AC;&#x2122;s command post; it also dealt with the grief of the chaplains when they lost one of their own. Then came the plane crash of American Airlines Flight 587 in Queens at Long Island Sound. The second-worst domestic airlines crash in the U.S., it killed 280 people on the plane and five more on the ground. Fear and anxiety ran rampant. Was it another act of terrorism? Or was it just another terrible tragedy? Either way, said Fr. Wierichs, the days ran into nights and night ran into days as chaplains played the hand that fate dealt them, many still in deep shock and great fatigue from 9/11.
Active
shooter Scenario GAIN THE TACTICAL ADVANTAGE IN ACTIVE THREAT MANAGEMENT
Adapt to unpredictable and quickly evolving situations with our dynamic, expandable, fullmission profile training solution designed to take force-on-force, training to new levels of realism.
Photo by: West Midlands Police
This was definitely not a time for On the Job Training. It is one thing to detail chaplains to a disaster scene; it is totally another to have them prepared for what they are going to face. This is the issue recently faced by the Palm Beach County Sheriff’s Office when it was chosen to be the “faith-based” representative during disasters for the Red Cross/FEMA disaster teams. While PBSO has by far the largest chaplaincy in South Florida, currently 35 with an allocation of 45, it was quickly predetermined that its chaplaincy unit would act in part as a
host, bringing together chaplains from around the area for training. The rationale was simple. All one has had to do is look at a hurricane brewing off shore and measure it against the areas it is likely to hit and one sees the enormous swath of territory likely to be affected. Nor does it have to hit to raise anxiety levels that cause accidents from distracted driving, fights on lines cued up for all manner of necessities that should have been bought and stocked months before, and a host of other actions that likely would result in call outs.
Simulated gunfire, IEDs, smoke, noise and our industry-leading Tactical Operations Medical Manikin™ create a memorable training experience with realistic GSW injuries and hemorrhaging that allow for seamless integration into ALERRT & ASTTP programs. Simultaneously control up to four units in your scenario with the hand-held remote, each unit customized with up to 250,000 possible wound combinations, making TOMManikin™ the most effective scenario training manikin available today. *RENTAL AND LEASE OPTIONS
AVAILABLE!
FOR MORE INFORMATION, CONTACT:
1.866.839.3455
Circle 99 on Reader Service Card
The Counter Terrorist ~ October/November 2015 53
Army Col. Jacob Goldstein, a Jewish chaplain visiting the Joint Task Force Guantanamo. Photo by: Navy Petty Officer 2nd Class Jayme Pastoric
The intent is to invite chaplains to a variety of different exercises: tabletops at the Ops Center, active shooter trainings, and even SWAT trainings. There is also history in the face of that reality that shows the pulling together of the counties to help one another. Thus chaplains from one community, even if well trained, shouldn’t be the only chaplains used. They might know the issues, but they would not know the communities and their personalities, often invaluable insight in helping to calm an individual or area.
Circle 343 on Reader Service Card
54 The Counter Terrorist ~ October/November 2015
So comes the training. Chaplains from around the region, with the cooperation of the International Conference of Police Chaplains, came together at the PBSO training center to spend three hours with Red Cross trainers. The academics of disaster relief were covered: there were videos for discussion and even CPR training in the latest technique, one which eliminates mouth-to-mouth breaths. Clearly this isn’t enough. The Unit has reached out to the Emergency Operations Center and the HLS Security Bureau of the SO. The intent is to invite chaplains to a variety of different exercises: tabletops at the Ops Center, active shooter trainings, and even SWAT trainings. Over the top, you say? The idea is not to have chaplains just learn how such things are handled; the primary goal is to expose them to chaos—screaming and
New and improved
( portable vehicle barrier ) When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.
Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email info@homelandsecurityssi.com
Or visit our website: www.SSIPVB.com
Circle 308 on Reader CircleService 317 onCard Reader Service Card
Circle 226 on Reader Service Card
The Counter Terrorist ~ October/November 2015 55
yelling, hysteria, loud and sudden noises, all in stewpot of seeming disorganization. Chaplains who participated in an active shooter scenario at the Wellington Green Mall were not observers. They were assigned rolls to play. Many agreed with one chaplain who said, “It was amazing, overwhelming—I never realized what large-scale chaos was like and how loud it could be!” The first time entering such a maelstrom shouldn’t be “the first time.” Training, just like for cops, is the answer. Do it enough times so that when one is thrown into this storm of sound and emotion, one’s training kicks in, not one’s “flight” mechanism. As Ronald Reagan used to intone for GE, “Progress is our most important product.” To have a well-used chaplaincy, progress needs to be made in training and expanding its purview. The ceremonial chaplain is no longer the chaplain needed for the 21st century.
“ To Protect and Serve ”
May mean many things, but we all understand the “Ultimate Sacrifice”. Train to Superiority Educate to Excellence Equip to Survive (or do we?)
“With a targeted attacks on the rise for providers” Don’t join the STATITICS! STATITICS
Saves Time, Saves Blood, Saves Lives
#Self#Self-Aid/BuddyAid/Buddy-Aid The life you save may be your own!
Professional MultiMulti-Disciplined Medical/Tactical: Products Kits/Go Bags Training & Consulting
407407-363363-1383 407-248248-0883 • Fax: 407info@advancedtraumaspecialties.com
William A. Gralnick has spent four decades in many volunteer capacities with law enforcement, including Johnstown, PA after the assassination of Dr. Martin Luther King, Jr; in Atlanta, GA during the infamous child murders; in Miami, FL in the aftermath of the Overtown Riots; and as an adjunct training officer in diversity and ethnicity for seven different South Florida jurisdictions, including the PBC Sheriff’s Office. Currently in a second career as a paid employee at PBSO, Gralnick was tasked with reshaping and modernizing its thensmall chaplaincy, which he has tripled in size and embedded throughout the agency.
•
advancedtraumaspecialties.com
Circle 89 on Reader Service Card
LET US SHOWCASE YOUR PRODUCTS, SERVICES AND TRAINING TO OUR FIRST RESPONDERS...
IO AZTE CA PAND A • BARR • PRC’ S DEEP • 18TH ST. K&R SE SCHO OL PLOT TROJ AN HOR
& rcement, Intelligence Journal for Law Enfo
ABOUT THE AUTHOR
Professionals Special Operations
ENT BAGHDAD I • MS-13 RECRUITM RESCUE IN IRAQ • ISIS WARLORD PUTIN’S RING OF STEEL •
/JULY 2015
JUNE nals nce & Special Operations Professio Journal for Law Enforcement, Intellige
7
TH
IS
ANN
IV
SUE
V
The
SE
AW
D WINNIN AR N T H Y E A E Counter
R
ER 4 E 8 • NUMB 2015 2014/JAN DEC VOLUM
G
Counter The
E R S A RY
UNDERSTANDING THE GLOBAL JIHAD EBOLA AND BIOLOGICAL WARFARE
VOLUME 7 • NUMBER 6
L INTERNATIONA
EDITION An SSI Publication
The Counter Terrorist is a peer journal, that is read in the USA and in ASIA by:
We are now committed to bring valuable tools to the attention of our First Responders through:
• Police • Fire • Emergency Management • Emergency Medicine • The Military • Special Forces
• Detailed Product Reviews • Innovative Product launches • International Resources
Call Sol Bradman now at 305-302-2790 or write him at bradman@homelandsecurityssi.com
®
g.com
thecounterterroristma JUNE/J ULY 2015 $5.99 USA/CANADA
INTERNATIONAL
EDITION An SSI Publication
Whether it’s the magazine, our online sites and e-blasts or our annual conference...he’ll help you reach your audience!
®
DECEMBER 2014/JANUARY USA/CANADA $5.99
2015
www.thecounterterroristmag.com 2014/January 2015 1 The Counter Terrorist ~ December
★ 56 The Counter Terrorist ~ October/November 2015
Counter The
Homeland Security Professionals Conference and Exposition Circle 33 on Reader Service Card
MACTAC
MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY
TM
The Newest, Most Dynamic Training Program from SSI . ®
MACTAC is the new tactical philosophy offering your
department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks.
Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course Next training in Perry, FL November 17–20, 2015
Contact us today at:
www.homelandsecurityssi.com Call now for more information.
Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 228 on Reader Service Card
The Counter Terrorist ~ October/November 2015 57
58 The Counter Terrorist ~ October/November 2015
by John Cassara
INTERNATIONAL TRADE TRANSPARENCY:
“THE NEXT FRONTIER”
Shortly after the September 11 terrorist attacks, I had a conversation with a Pakistani businessman involved with the underworld of crime. He was involved in the gray markets of South Asia and the Middle East.
H
e said, “Mr. John, don’t you know that the criminals and the terrorists are moving money and transferring value right under your noses? But the West doesn’t see it. Your enemies are laughing at you.” The Pakistani businessman was referring to various forms of what we loosely call “trade-based money
laundering” (TBML) and the transfer of “value” via commodities and trade goods. In addition to customs fraud, trade-based value transfer is often used to provide “counter-valuation,” or a way of balancing the books in many global underground financial systems such as hawala/hundi. Criminal organizations and those that finance terror sometimes
use trade-based value transfer. The magnitude of TBML is difficult to quantify and has never been systematically examined. However, the Financial Action Task Force (FATF), an inter-governmental body that sets global anti-money laundering standards, believes TBML is one of the three principal categories of money laundering.
The Counter Terrorist ~ October/November 2015 59
According to the U.S. State Department, TBML has reached “staggering” proportions in recent years. It is found in every country but remains virtually unrecognizable. The rapid expansion of worldwide trade increases the possibilities for TBML. Today, total annual global merchandise trade is in the tens of trillions of dollars. Money laundering in international trade works just as in traditional money laundering via financial institutions, in which criminals “mix” or “co-mingle” illicit money with licit money. However, the large volume of international trade masks the occasional suspect transfer. The FATF defines TBML as “the process of disguising the proceeds of crime and moving value through the use of trade transactions in an attempt to legitimize their illicit origins.” The key word in the definition is value, particularly because it is getting increasingly difficult to define currency. Most forms of TBML revolve around invoice fraud and manipulation. Generally speaking, “invoice fraud” means that the contents, description,
and/or the value of goods is misrepresented. Sometimes this is done to facilitate simple customs fraud—i.e., minimizing the payment of taxes and duties. In most jurisdictions, customs fraud is a predicate offense for money laundering. However, often invoice fraud is part of value transfer. As Raymond Baker, the Director of Global Financial Integrity (GFI), said, “Anything that can be priced can be mispriced and false pricing is done every day…”
INVOICE MANIPULATION AND VALUE TRANSFER MADE SIMPLE: To move money out: • Import goods at overvalued prices or export goods at undervalued prices To move money in: • Import goods at undervalued prices or export goods at overvalued prices The illustration below1 shows the fluctuating value associated with thousands of refrigerators exported from the United States (light color) to Country X (dark color). Official trade data from both sides was matched and compared.
10 MILLION 9 MILLION 8 MILLION 7 MILLION 6 MILLION 5 MILLION 4 MILLION 3 MILLION 2 MILLION
60 The Counter Terrorist ~ October/November 2015
DEC
NOV
OCT
SEP
AUG
JULY
JUNE
MAY
APR
MAR
FEB
JAN
DEC
NOV
OCT
SEP
AUG
JULY
JUNE
MAY
APR
MAR
FEB
JAN
1 MILLION
Photo by: Andrzej Barabasz
The Counter Terrorist ~ October/November 2015 61
complimentary
subscription
www.tacticaldefensemedia.com Scan the code to sign up now!
TDM PUBLICATIONS
With some recognized variables, the declared export price should equal the declared import price. The difference between the two ranges of peaks and the valleys—the two colors shown on the graph—represents the transfer of value in the form of refrigerators. In this case, value transfer also masked the proceeds of narcotics trafficking. Dr. John Zdanowicz, an academic and early pioneer in the field of TBML, examined 2013 U.S. trade data obtained from the U.S. Census Bureau. By examining undervalued exports ($124,116,420,714) and overvalued imports ($94,796,135,280) similar to what is described above, Dr. Zdanowicz found that $218,912,555,994 was moved out of the United States in the form of value transfer! That figure represents 5.69% of U.S. trade. Examining overvalued exports ($68,332,594,940) and undervalued imports ($272,753,571,621), Dr. Zdanowicz calculates that
DOUBLE ISSUE
…Dr. Zdanowicz found that $218,912,555,994 was moved out of the United States in the form of value transfer!
Circle 141 on Reader Service Card
62 The Counter Terrorist ~ October/November 2015
$341,086,166,561 was moved into the United States! That figure represents 8.87% of U.S. trade in 2013.2 The numbers are jaw dropping. They are particularly telling because in my opinion the U.S. has the best and most robust customs enforcement in the world. If this much money/value is being purloined every year due primarily to trade fraud, what is going on in the rest of the world? GFI has done considerable work in examining trade misinvoicing, which is a method for moving money illicitly across borders that involves deliberately misreporting the value of a commercial transaction on an invoice and other documents submitted to customs. A form of trade-based money laundering, trade misinvoicing is the largest component of illicit financial outflows measured by GFI. After examining trade data covering developing countries, GFI concluded that a record $991.2 billion was siphoned from those countries in 2012 via trade misinvoicing!3 Of course, much of this hemorrhage of capital originates from crime, corruption, fraud, and tax evasion. An additional concern is that for the most part value transfer schemes avoid countries’ financial intelligence reporting requirements; compliance with these requirements is one of the key FATF recommendations and the cornerstone of almost every country’s anti-money laundering and counter terrorist finance countermeasures. And thus far, for the most part banks have been reluctant to incorporate antimoney laundering/counter terrorist finance (AML/CFT) safeguards into their trade finance programs. Because of the sheer volume of international trade, physical scrutiny of trade items is impossible—a fact taken advantage of by criminals and tax cheats
Circle 279 on Reader Service Card
The Counter Terrorist ~ October/November 2015 63
Cyber Security for PROACTIVE STRATEGIES FOR MANAGING CYBER VULNERABILITIES DECEMBER 9 – 11, 2015 | WASHINGTON, D.C.
WHAT WILL BE COVERED? 3 Meeting Persistent, Evolving Challenges with Effective Cyber Security Strategies 3 Building a Culture of Security to Combat Human Factors 3 Inspiring and Training the Next Cyber Security Leaders 3 Moving Towards Greater Unity of Effort for Government Cyber Security Preparedness 3 Proactive Cyber Security Initiatives for Critical Infrastructure 3 Thought Leading Panel: “Tech Talk” to “Policy Speak” Translation to Cultivate a National Posture on Cyber Security
A 1951 hundi of Bombay Province for Rs 2500 with a pre-printed revenue stamp. Photo by: British Government
NO COST TO ALL ACTIVE GOVERNMENT AND MILITARY PERSONNEL www.C yberSecurityGovernment.com
Circle 113 on Reader Service Card
December 7-9, 2015 | Washington, D.C. RELIABILITY, ECONOMY, AND ENDURANCE WHY ATTEND UNMANNED MARITIME SYSTEMS?
3
Hear from key thought leaders in Unmanned Maritime Systems, including the latest requirements for Surface and Undersea systems
3
Gain invaluable access to military stakeholders as they develop and refine requirements surrounding unmanned maritime vehicle programs including updates and shortfalls in existing systems
3
Receive a holistic perspective on next-generation technology by attending workshop day
3
Understand UMS technology gaps, training challenges, lessons learned, and future needs
around the world. In the United States, approximately 20 million containers enter the country every year. Maritime commerce alone is expected to triple by 2020.4 Approximately five percent of inbound containers are physically inspected and about two percent outbound. Vehicular and airborne cargo is also worrisome. The situation is far worse in most other countries. And in some jurisdictions, the lack of customs inspection and control is facilitated by corruption. So not only is TBML a concern, but so are the associated threats of smuggling, corruption, and proliferation. Globalization has led to increased scrutiny of underground financial systems such as hawala, hundi, fei-chein, padala, black market peso exchanges, and others. These are sometimes known as alternative remittance systems, parallel banking, or informal value transfer systems (IVTS). Most are regional, cultural, and ethnic based. Despite
www.UnmannedMaritimeSystems.com Circle 115 on Reader Service Card
64 The Counter Terrorist ~ October/November 2015
differences in terminology, most such systems are adept at clandestinely transferring money from one location to another without physically moving it. Multi-hundreds of billions of dollars are transferred via IVTS every year. Most of these transfers are benign and used primarily for immigrants’ remittances. Unfortunately, their veiled nature also makes them attractive to criminals and sometimes terrorists. The common denominator is that, historically and culturally, IVTS use trade as the primary means of providing “counter-valuation,” or a means of balancing the books between brokers. Other subsets of suspect trade-based value transfer include international barter trade, trade diversion, abusive transfer pricing to low tax jurisdictions, VAT, drawback, carousel fraud, commodity-based capital flight, etc. So what can be done? Trade transparency is the single best measure to detect trade-based money
The optic of choice
for military and law enforcement professionals.
Available at
Call 877 535-8774, email sales@tssi-ops.com or build an RFQ at agency.tssi-ops.com. Circle 249 on Reader Service Card
The Counter Terrorist ~ October/November 2015 65
laundering and associated financial crimes. It is something that every government and legitimate industry and trader should welcome. Fortunately, with modern advances in data and analytics, trade transparency is now technically feasible. All countries track what comes in and what goes out for security, statistical, and revenue purposes. So by examining and comparing one country’s targeted exports with the corresponding trading partner’s record of imports, it is a fairly straightforward process to spot anomalies. Some trade irregularities can be easily dismissed as numerical outliers, but sometimes anomalies can be indicative of customs fraud, tax evasion, value transfer, TBML, or perhaps even underground financial systems such as hawala. In 2004, the United States adopted a proposal I advanced and created the world’s first trade transparency unit (TTU). It is located within Homeland Security Investigations. Since that time, about a dozen other countries have established similar units. The creation of TTUs has simultaneously overlapped with exponential advances in big data and advanced analytics. Overlaying financial intelligence, law enforcement and customs data, travel data, commercial records, etc. further increases transparency and facilitates more precise targeting.5 And via customs-to-customs agreements, TTUs are able to exchange specific information about suspect transactions. In addition to being an innovative countermeasure to TBML and value transfer, systematically cracking down on trade-fraud is a revenue enhancer for participating governments. Frankly, it is for this reason that many countries have expressed interest in the concept. I believe trade transparency is the “next frontier” in international Circle 143 on Reader Service Card
66 The Counter Terrorist ~ October/November 2015
money laundering and counter terrorist finance enforcement.
•
ABOUT THE AUTHOR John Cassara is a former U.S. intelligence officer and Treasury Special Agent. He has developed expertise in various AML/CFT issues including trade-based money laundering and underground finance. He is a consultant for government and industry. Mr. Cassara has authored several articles and books. His latest is Trade-Based Money Laundering: The Next Frontier in International Money Laundering Enforcement (Wiley, November, 2015). www.JohnCassara.com
ENDNOTES John Cassara and Avi Jorisch, On the Trail of Terror Finance, Red Cell Intelligence Group, 2010, p. 63. 2 Analysis given to the author by Dr. John Zdanowicz via June 30, 2015, email. 3 Clark Gascoigne, “New Study: Crime, Corruption, Tax Evasion Drained a Record US $991.2bn in Illicit Financial Flows from Developing Economies in 2012,” Global Financial Integrity, December 15, 2014. Retrieved from http://www.gfintegrity.org/press-release/ new-study-crime-corruption-tax-evasiondrained-a-record-us991-2-billion-inillicit-financial-flows-from-developingeconomies-in-2012/. 4 Container Security Initiative, Customs and Border Protection, 2006 – 2011 Strategic Plan. Retrieved from http://epic. org/privacy/surveillance/spotlight/1006/ csiplan.pdf. 5 For additional information, the HIS/ ICE Trade Transparency Unit (TTU) program is described online at http:// www.ice.gov/trade-transparency/. 1
Circle 301 on Reader Service Card
The Counter Terrorist ~ October/November 2015 67
Innovative Products WHITE HORSE RESEARCH AND DEVELOPMENT
PLATESMART HD ENGINE
White Horse Research and Development produces Advanced Composites Solutions, Ballistic Defense Applications, Blast Mitigation and Fragmentation Protection. Cost effective, state of the art six years running. Diversified goto-market applications for Military, security, Law Enforcement and commercial use. Off the shelf products: Boss Box (weapons release systems); Close Quarter Trainer Targets (CQT) ricochet safe up to 5 feet; Bomb Containment Unit (BCU) pipe bomb fragmentation containment and blast redirecion. Just-In-Time made to order products: 50 caliber armor piercing, multi hit Fighting Positions (guard posts, safe rooms, in theater protection, exterior walls in high action locations); Blast Mitigation (exterior walls of high targeted buildings); Threat Vehicle Targets (TVTs) – custom made for the Military – full size enemy targets set on training bases for accrete instrumentation reading and firing. Commercial Use: Tank or Vessel leak prevention and protection (Self-Sealing coating can protect against nuisance acts; Contaminated Waste Containment (nuclear barrels, meth waste containment). whitehorserd.com
Soon to be introduced in all PlateSmart ALPR solutions, our new High Definition (HD) engine enables greater flexibility in your video surveillance system. With PlateSmart’s HD engine, multiple license plates can be captured and read even from a wide-angle view, which means that you can have more complete area coverage and still perform ALPR operations with a single camera. This results in a reduction in footprint and cost currently unavailable in any other ALPR solution. High Definition ALPR will soon be available in ARES, PlateSmart’s enterprise fixed-location ALPR-based video analytics suite. ARES’ real-time analytic data provides unparalleled situational awareness and is the best tool available for Enhanced Force Protection. Give your key assets the extra level of protection they need with PlateSmart ALPR-based video analytics solutions. www.platesmart.com
LEWIS MACHINE & TOOL For 35 years, LMT has been designing and manufacturing quality weapons without compromises. LMT is proud to expand that product line to include Precision Aiming Lasers. The latest offset Infra-red aimer is offset aimer with an ultra-compact lightweight design. The aimer features and tightly focused precision beam profile with precise windage and elevation dials. 68 The Counter Terrorist ~ October/November 2015
The laser features a battery life of over 12 hours and can use 123 or AA batteries with no modifications and has a salt water depth down to 30 meters. This makes the LMT Precision Aiming Laser the lightest IR aimer with the longest battery life and deepest underwater capacity. lmtdefense.com
VIDEO ANALYTICS THE WORLD’S MOST SOPHISTICATED SENSING DEVICE Video Analytics solve a long-standing surveillance challenge. Traditional cameras (the old way of doing things) rely on human beings to be flawlessly vigilant and this is simply an unrealistic expectation, particularly when you consider the number of cameras being monitored. Today it is typical that the current cameras serve the community through an entirely forensic approach, should an incident actually occur. At Kent, we eliminate this problem. Our Video Analytics solutions use smart surveillance technology that allows cameras to analyze events as they happen and determine whether or not they constitute threats or merit further attention. If so, the system instantly logs the event and notifies the proper authorities to spring into action. Our Remote Guards can call upon the management team or local police force to react to the incident, as well as “Voice Down” the perpetrators in real-time The 4-channel encoder incorporates advanced, auto-adapting video analytics, a video server and video recording, all in a single device. It converts analog CCTV surveillance camera systems from forensic tools into proactive video surveillance and alarm verification solutions. • Easily add the encoder to existing analog cameras and DVRs and integrate with alarm panels • Remotely configure and manage all encoder devices from a convenient Web Portal • View video event clips, live streaming and recorded video from a convenient Web Portal • Send video alerts to smartphones, email addresses, or a remote monitoring service • Expand cloud-based system without requiring investment in servers or software www.kentsecurity.com
YAKTRAX™ Winter weather is unpredictable enough without having to worry about walking from point A to point B and making it in one piece. YakTrax™ Ice Traction Device for your shoes is the answer. It stretches over any footwear, from boots to jogging shoes, and stays in place. A grid of 360° steel coils gives you traction on ice and snow with hundreds of edges gripping any slick, icy surface, providing stability. Best of all they are so comfortable, you won’t even realize you are wearing them. Walk normally as you would on dry ground. Even World Cup Bobsledders wear YakTrax® to walk up the bobsled run. Stay safe and upright with YakTrax®. AVAILABLE AT: www.andax.com
The Counter Terrorist ~ October/November 2015 69
Counter
ADVERTISER INDEX
The
OCTOBER/NOVEMBER 2015 VOLUME 8 • NUMBER 5
Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”
Page
Ad/Company • website and/or email.......................................................................................................... RSN Number
2
Barrett Firearms Manufacturing • www.barrett.net.................................................................................................................................. 121
3
Fairleigh Dickinson University • www.fdu.edu/mas................................................................................................................................. 10
4
Lewis Machine & Tool • www.lmtdefense.com............................................................................................................................................ 259
7
Surveilance One • www.survone.com.......................................................................................................................................................... 319
11
Group Espada LLC • www.groupespada.com............................................................................................................................................... 16
13
DeSantis Holster & Leathergoods • www.desantisholster.com................................................................................................................... 262
16
Resco Instruments • www.rescoinstruments.com.......................................................................................................................................... 20
17
American Public University • www.amuonline.com/counter-terrorist........................................................................................................... 25
22
Occupational Health Dynamics • www.ohdusa.com................................................................................................................................. 213
23
3rd Annual US/Canada Border Conference • www.beyond-border.com................................................................................................. 103
24
Reconyx • www.reconyx.com....................................................................................................................................................................... 303
25
Police One • www.policeoneacademy.com.................................................................................................................................................... 335
27
Asia Pacific Edition – The Counter Terrorist • sales@thecounterterroristmag.com...................................................................................... 255
28
Field Forensics, Inc. • swww.fieldforensics.com............................................................................................................................................ 95
29
TSSI • www.TSSI-OPS.com............................................................................................................................................................................. 123
28
Prometheus Books • www.prometheusbooks.com........................................................................................................................................ 87
35
Combined Systems, Inc. • www.combinedsystems.com............................................................................................................................... 93
12
Group Espada LLC • www.groupespada.com............................................................................................................................................... 18
39
AMTEC Less-Lethal Systems • www.lesslethal.com..................................................................................................................................... 91
41
Homeland Security Network • www.homelandsecuritynet.com.................................................................................................................. 19
43
SSI Pull Kit • bradman@homelandsecurityssi.com.......................................................................................................................................... 179
44
Counter Assault • www.counterassault.com................................................................................................................................................. 241
44
Hilomast LLC • www.hilomast.com............................................................................................................................................................... 97
45
10th Annual Homeland Security Professionals Conference & Expo • www.terrorconference.com...................................................... 177
47
Elite K9 • www.elitek9.com........................................................................................................................................................................... 277
56
Advanced Trauma Specialties • www.advancedtraumaspecialties.com....................................................................................................... 89
53
Innovative Tactical Training Solutions • www.4ITTS.com........................................................................................................................ 99
54
Southern Police Equipment • www.southernpoliceequipment.com............................................................................................................... 343
55
SSI PVBs • www.ssipvb.com.......................................................................................................................................................................... 226
56
The Counter Terrorist Magazine • bradman@homelandsecurityssi.com...................................................................................................... 33
57
MACTAC • www.homelandsecurityssi.com...................................................................................................................................................... 228
62
Tactical Defense Media • www.tacticaldefensemedia.com........................................................................................................................... 141
63
K9 Cop magazine • www.k9copmagazine.com........................................................................................................................................... 279
64
IDGA Cyber Security for Government • www.cybersecuritygovernment.com............................................................................................. 113
64
IDGA Unmanned Maritime Systems • www.unmannedmaritimesystems.com............................................................................................. 115
65
TSSI • agency.tssi-ops.com............................................................................................................................................................................. 249
66
TRU-SPEC • www.truspec.com....................................................................................................................................................................... 143
67
Patriot3 • www.patriot3.com........................................................................................................................................................................ 301
71
Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com.................................................................................. 215
75
Phantom Products Inc. • www.phantomlights.com...................................................................................................................................... 209
76
Broco • www.broco-rankin.com..................................................................................................................................................................... 198
70 The Counter Terrorist ~ October/November 2015
The Advanced Global Security Workshop in
Israel ®
The experts on training in:
the Homeland Security professionals best resource
Since 2005, SSI has taken nearly 500 First Responders to Israel and shown them the basics of the Israel security concept. Thanks in part to that program, we are better able to defend ourselves in the United States. In response to demand, we are now offering a once-in-a-lifetime experience covering the following advanced subjects: May 13–21
2016
Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel’s northern border. Hostage Rescue - Discover how they go wrong. Hospital Response - Find out how Israel’s critical response hospitals handle surge and multi-casualty incidents. Israel Counter Terrorism units - Learn how they operate. Israel National Police - National Academy; See how they train? Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system. Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.
Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.
www.homelandsecurityssi.com
LEARN MORE at: Call now for more information. Circle 215 on Reader Service Card
Phone: 866-573-3999 Fax: 866-573-2090 info@homelandsecurityssi.com Circle 50 on Reader Service Card Circle 215 on Reader Service Card
The Counter Terrorist ~ October/November 2015 71
TRAINING REVIEW
USCG Port Security Skills Course
T
he U.S. Coast Guard Port Security Training Detachment or PSU TRADET was is the USCG premier training site for operational readiness, maritime security training, and CT/ Force Protection tactics techniques and procedures (TTP). Originally located in Port Clinton, Ohio and tasked with training the 8 PSUs, it now sits within the Special Missions Training Center or SMTC in Camp Lejeune, NC (since 1998). The SMTC name came into being in 2002 and the training center was commissioned in 2003. This was shortly after the USCG was transferred from the Department of Transportation to DHS and the scope of operations expanded to USCG Maritime Safety and Security Teams (MSST), as well as other Deployable Special Forces (DSF) units within the CG and Navy/Marine expeditionary forces. Let me start by saying that I have had the privilege of attending many training courses related to the topics of physical security and, security operations and have managed security operations and PSD teams both here in the U.S. and internationally in high risk environments. Like anyone in my position, I came with an open mind and, of course, an internal knowledge set, which worked both for and against me. The course1 is 12 days in duration and open to anyone in the CG, active duty or reserve. You do not need to be a member of a Port Security Unit to attend, but PSU members do get priority. http://www.uscg.mil/smtc/ Training_PSU_Basic.asp After taking the course, it is my recommendation that every member
by Garret Machine
of the CG go through this training. Similar toIn the Marines, in which each member goes through Marine Combat Training (MCT) in order to operate in a combat environment, and Coastguardsmen should also have this ability. I firmly believe that this training
should be included in CG basic training and could even afford to be extended. I was able to take this course on my annual Active Duty for Training, or AD-T. Iand if you are a reservist in the CG (blue side), then this is a great opportunity for you to see a side of the guard (green side) few will likely experience and get some great hands-on real-world training in combat arms. On Monday morning, on day one, andthe first classes we received was were on combat mindset and the importance of mental conditioning., Tthis was a great way to set the tone of
72 The Counter Terrorist ~ October/November 2015
the course and get our minds right. We spent the next few days in a classroom environment, learning the fundamentals of Tactical Combat Casualty Care, or TCCC, discussing Chemical Biological Radiological and Nuclear defense, or CBRN, creating range cards, and the like. We also had classes on the finer points of land navigation, patrolling, and entry control points. The water side of the operation has its own training courses and is separate from the shore side operations. After only a few days in the classroom and in crew-serviced weapons familiarization, we were in the field for the remainder of the course., Wwe learned how to set up a base camp, entry control points (ECP), guard shifts, and did daily patrols which included MOUT training and basic land navigation. During this course we trained on the M240B 7.62mm machine gun and M2HB .50 caliber machine gun. We had the opportunity to engage targets out to 1000 meters and manage simulated malfunctions in a stressinduced environment on those weapon systems, but you we weare expected to come with a basic knowledge of the M16 and other related field equipment from your our parent commands. The course culminated with a force-on-force scenario that involved multiple squads, flanking maneuvers, TCCC, CBRN, and exfiltration. All of this is directly in line with the PSU fundamental mission of being able to deploy anywhere in the world in 96 hours, set up security operations within 24 hours, and sustain itself for 30 days.
Photos courtesy of United States Coast Guard
One of the nice things about PSU Basic Skills Course (BSC), other than 3 MREs a day, is the student-to-instructor ratio and quality of subject matter experts they employ for each phase of training. If there is one thing that will stick with me from PSU BSC, it is the diverse backgrounds that each person brought to the course, each with a different perspective,, not only the students but the instructor staff as well. My one recommendation to BSC is to extend the course a week so that graduates could can benefit from full qualification in each subject matter (TCCC/CBRN/M240/ M2HB), versusVS just “familiarization.”. However, in just two weeks’ time, we actually started to look like a high-speed infantry element,; moving, shooting and communicating like it was all we did. NOTE: Information contained in this article is available through public search.
•
www.uscg.mil/smtc/Training_PSU_ Basic.asp 1
ABOUT THE AUTHOR Garret Machine served as a combat soldier in the Duvdevan Unit of the Israeli Defense Force, where he gained extensive combat experience from multiple operations in support of Israeli counter terrorism and national security objectives. Duvdevan is a counter terror (CT) unit specializing in urban warfare, hostage rescue, targeted assassinations, and kidnapping of wanted militants throughout the West Bank, Gaza Strip, and border nations. He was a firearms tactics instructor in his unit and later provided Personnel Security Detail (PSD) for Ministry of Defense officials on highrisk assignments. In 2012, Machine joined the ranks of TACLET, the SOF component of the USCG, and further
distinguished himself by earning the Director of Homeland Security Award for his performance at the Federal Law Enforcement Training Center (FLETC). Machine has published two DVDs on combat shooting (Pressure Makes Diamonds) and a book on combat tactics (Israeli Security Concepts), both available on Amazon.
The Counter Terrorist ~ October/November 2015 73
Subscribe Today! I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address) SUBSCRIPTION INFORMATION (please print clearly) NAME____________________________________________________________________ ADDRESS_________________________________________________________________ CITY_________________________ STATE________ZIP_____________________________ EMAIL____________________________________________________________________
q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.) Name on Card______________________________ Card #__________________________
*
Exp. Date_______________________ Billing Address______________________________
FREE MEMBERSHIP TO THE HOMELAND SECURITY NETWORK WITH EVERY SUBSCRIPTION
Scan to subscribe
GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999
Subscribe Today! I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address) SUBSCRIPTION INFORMATION (please print clearly) NAME____________________________________________________________________ ADDRESS_________________________________________________________________ CITY_________________________ STATE________ZIP_____________________________ EMAIL____________________________________________________________________
q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.) Name on Card______________________________ Card #__________________________
*
Exp. Date_______________________ Billing Address______________________________
FREE MEMBERSHIP TO THE HOMELAND SECURITY NETWORK WITH EVERY 74 The Counter Terrorist ~ October/November 2015 SUBSCRIPTION
Scan to subscribe
GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999
The The Phantom Phantom Warrior Warrior TLS™ TLS™ was was never never designed designed toto bebe the the brightest brightest light. light. You You can can get get those thoseatata acamping campingstore. store.The ThePhantom PhantomWarrior WarriorTLS™ TLS™uses usessolid-state solid-stateLEDs LEDsforfor100 100 lumen lumenoutput outputononcommon commonAAAAbatteries. batteries.This Thisfully-adjustable fully-adjustablelight lightgives givesyou youthe the proper proper light light toto dodo your your job, job, adds adds the the features features shown shown above, above, and and keeps keeps your your position position secure. secure.Phantom Phantomalso alsooffers offersa universal a universalmounting mountingbracket bracket(UMB), (UMB),a pocket a pocketclip, clip,and and lanyard lanyardforforthe theTLS™ TLS™asaswell wellasasour ournew newResQ™ ResQ™lens lenswhich whichconverts convertsthis thiscovert, covert, tactical tactical light light into into a superior a superior rescue rescue beacon! beacon! Phantom Phantom Warrior Warrior Flashlights Flashlights
Circle 209 on Reader Service Card
The Counter Terrorist ~ October/November 2015 75
NEW! Non-Spark Door Ram BRO-RAM-ENF32NS
®
Broco introduces the first Enforcer™ door ram with a non ‐spark striking surface. Engineered at the request of our customers, the model BRO‐RAM‐ENF32NS features a high impact plastic face.
This new ram fills the middle of the Broco Enforcer
lineup, weighing 32 lbs and having an overall length of only 21”. Broco’s original Enforcer ram is 37 lbs and 24” long while the Baby™ Enforcer weighs 25 lbs and is only 16” long.
Like the other Broco rams, the new 32NS features:
Reach through fixed rear handle Rotating front handle Rubber non‐slip grips Steel knuckle guard Weight forward design Balanced sling point and sling
BRO-RAM-ENF32NS, 21” OA length, 32 lb.
MADE IN THE U.S.A.
NEW! Ultimate Breacher Tool BRO-UBT-24D, BRO-UBT-26S
®
Designed to be the one simple go‐to tool for First Responders, the Broco Ultimate Breacher Tool (UBT) combines four tools into one: a Sledge, Pry, Ram and Rake.
Whether it be an active shooter event, medical related or some other emergency, the first person on‐scene needs basic entry capability that is easy to carry, easy to use.
BRO-UBT-26S, 26” OA length, 14 lb.
A Choice of Handles
BRO-UBT-24D, 24” OA length, 16 lb.
Broco’s innovative breaching solutions are available glob‐ ally through leading military and police products distributors. Visit Broco’s web page for details on exothermic torch sets, diamond rescue blades, and mechanical and hydraulic tools.
Broco’s Ultimate Breacher Tool is offered with either a ‘D” handle or straight handle. The ‘D’ handle pro‐ vides more ramming power and makes carrying easier.
The straight handle version of the UBT is offered at the request of mili‐ tary operators who carry the tool on their back in a pack or a tube. MADE IN THE U.S.A.
400 S. Rockefeller Ave., Ontario, CA 91761 U.S.A. Tel: 909 483 3222; 800 845 7259 Fax: 909 483 3233 Email: Sales@Brocoinc.com www.Broco‐Rankin.com/Tactical Circle 198 on Reader Service Card