The Counter Terrorist Magazine - April/May 2013

Page 1

M O T O R C Y C L E H I T T E AM • H R T MA N H U N T • L O S A Z T E C A S • R U SSIA N W E AP O N S

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Counter The

april/may 2013

Volume 6 • Number 2

honor-crime in north america

INTERNATIONAL

EDITION An SSI Publication ®

april/may 2013 USA/CANADA $5.99

www.thecounterterroristmag.com The Counter Terrorist ~ April/May 2013 1


2onThe Counter Terrorist Circle 237 Reader Service Card

~ April/May 2013


Circle 13 on Reader Service Card

The Counter Terrorist ~ April/May 2013 3

Circle 34013 on on Reader Service Card Circle Reader Service Card


WE’VE CREATED A MONSTER.

MRAD™

4 The Counter Terrorist ~ April/May 2013

Circle 121 on Reader Service Card


Counter

The Journal for Law Enforcement, Intelligence & Special Operations Professionals April/may 2013

Volume 6 • Number 2

COVER story:

32

contents

32

8

20

48

Honor-Crime in North America By M. Zuhdi Jasser and Raquel Evita Saraswati

FEATURES: 8

Firsthand: HRT MANHUNT By James A. McGee

20

Case Study: The Motorcycle Hit Team: A Global Tactic By Glenn McGovern

48

Modern Russian Special Weapons By Eeben Barlow

60

The Barrio Azteca, Los Aztecas Network By John P. Sullivan

departments: 6

From the Editor Leadership

46 Book Review Shariah Law and American Courts:

An Assessment of State Appellate Court Cases

69 Innovative Products

Mini-Caliber Robot, Reconyx Camera, CQB-11

72

Training Review

CDG Advanced Handgun Skills

Cover Photo: Muslim woman. Photo: Steve Evans

The Counter Terrorist ~ April/May 2013 5


Counter The

From The Editor:

Leadership By Chris Graham

O

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Volume 6 • Number 2

n November 5, 2009 Nidal Hasan murdered 13 soldiers and wounded 29 at Ft. Hood, Texas. Three days later Army Chief of Staff, General George Casey said, “As horrific as this tragedy was, if our diversity becomes a casualty, I think that’s worse.” On February 2, 2010 Chairman of the Joint Chiefs of Staff, Admiral Michael Mullen told the Senate Armed Services Committee, “It is my personal belief that allowing gays and lesbians to serve openly would be the right thing to do” rather than answer the question he was asked. On January 25, 2013, Chairman of the Joint Chiefs of Staff, General Martin Dempsey said, “If we do decide that a particular standard is so high that a woman couldn’t make it, the burden is now on the service to come back and explain to the Secretary [of Defense], why is it that high? Does it really have to be that high?” explaining his willingness to lower standards in order to facilitate women serving in combat arms. Of course, “interesting” acts of leadership are not limited to the Department of Defense. Elected officials act as if spending several times more money than they have been entrusted with is virtuous. Our recent Secretary of State has testified to congress that she “takes responsibility” for the four Americans needlessly murdered in Benghazi, Libya and went on to express that she still wasn’t aware exactly what happened but that some sort of un-admitted errors were committed by her staff without her knowledge. Our Attorney General was caught in apparent lies to congress about the bizarre “Fast and Furious” gun-running operation to Mexican drug cartels and then had himself investigated and cleared by a subordinate. Do I care that General Casey values “diversity” more than the lives of his soldiers? Do I care that Admiral Mullen is into gay rights? Do I care that General Dempsey is willing to lower standards in order to build co-ed infantry squads? Nope…generals are free to push whatever politically correct pet projects they wish. However, I cannot help but notice that American grunts busted their asses to topple Saddam Hussein from power only to watch Baghdad be delivered into the orbit of Tehran. A brilliantly agile CIA/SOF anti-al Qaeda campaign in Afghanistan has been eclipsed by a lumbering, inefficient Big Army campaign with dubious results. Our government fired more than 100 cruise missiles into Libya accomplishing what? A small but dominant minority in our government championed the toppling of President Mubarak in Egypt and what they called an “Arab Spring”. Now we predictably see the Islamic supremacist cult, Muslim Brotherhood, controlling Egypt and followers making a grab for power across the Middle East and North Africa. This, of course, doesn’t even touch on cyber, economic, and propaganda attacks or U.S. military bio-fuel boondoggles, etc. We all share the hope that our elected leaders will become more discriminating about the wars they choose to involve us in and more insightful about the nuances of our enemies and their goals, but is it too much to ask that we promote some men, women, transvestites or illegal aliens to the general officer level whose pet project is raising standards and winning wars? Semper Fidelis,

april/may 2013

Editor Chris Graham Director of Operations Sol Bradman Director of Advertizing Carmen Arnaes Production Assistants Giselle Manassa Melissa Berne Contributing Editors Eeben Barlow Jennifer Hesterman Richard Marquise Tom Nypaver Steve Young Graphic Design Morrison Creative Company Copy Editor Laura Town Advertising Sales Chris Bell Publisher: Security Solutions International 13155 SW 134th St. • STE 204 Miami, Florida 33186 ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: PARS International Corp. Web: www.magreprints.com/quickquote.asp Email: reprints@parsintl.com Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can also contact the editorial staff:

Chris Graham Editor, The Counter Terrorist 6 The Counter Terrorist ~ April/May 2013

www.thecounterterrroristmag.com © 2012 Security Solutions International


“toknowledge is critical deter the threat of terrorism.� Elena Mastors, Ph.D. | Dean, School of Security & Global Studies Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network.

Learn More at www.amuonline.com/counter-terrorist

Education | Management | Public Service & Health | Science & Technology | Security & Global Studies Circle 211 on Reader Service Card

The Counter Terrorist ~ April/May 2013 7


Firsthand:

hrt manhunt By James A. McGee

On May 12, 1992, Danny Ray Horning disguised himself as a medical technician and casually strolled out of the Arizona State Prison in Florence, Arizona. He was serving four consecutive life terms for kidnapping, assault, bank robbery, and burglary.

Counter The

8 The Counter Terrorist ~ April/May 2013


W

hen Horning entered the rugged back country of the Coconino National Forest, his escape became more than an Arizona law enforcement concern. He had entered federal land, and his escape, along with any other crimes he committed, fell under federal jurisdiction. With federal jurisdiction came access to federal assets. One such asset was standing by at the

FBI Academy in Quantico, Virginia. The FBI Hostage Rescue Team (HRT) is a tier I tactical law enforcement team. The HRT had just returned from a successful hostage rescue at the Federal Correctional Institute in Talladega, Alabama,* and was between missions. Trained to operate in all environments, the HRT was well equipped and suited to deploy to the remote and isolated

His ability to slip through road blocks undetected and survive off the land resulted in comparisons to the popular Sylvester Stallone movie character Rambo.

* Editor’s Note: see Vol. 2, No. 4 “FBI Rescue at Talladega”.

Patch of the FBI’s Hostage Rescue Team. Photo: FBI. Inset: John Rambo graffiti. Photo: HTO. The Counter Terrorist ~ April/May 2013 9


Oak Creek Canyon, Arizona. Photo: Postdlf

At age 33, he was lean and fit. He’d done a brief stint in the army and had acquired a basic understanding of fieldcraft while growing up in the area. 10 The Counter Terrorist ~ April/May 2013

geographic areas encompassed within the Coconino National Forest and the Grand Canyon National Park. Shortly after his escape from the Arizona State Prison, Horning robbed a Tucson bank of $2,300 before heading to the Blue Ridge Reservoir area of the Coconino National Forest. Horning, a native of Winslow, Arizona, was knowledgeable of the northern Arizona landscape. At age 33, he was lean and fit.

He’d done a brief stint in the army and had acquired a basic understanding of fieldcraft while growing up in the area. As Horning continued his trek north, he burglarized homes for food and weapons. In late June, Horning abducted two hostages and forced them to drive him from Flagstaff into the Grand Canyon National Park where he booked a room at the El Tovar Hotel. After several weeks on the run, Horning was beginning to attract a following of groupies. His ability to slip through road blocks undetected and survive off the land resulted in comparisons to the popular Sylvester Stallone movie character Rambo. An alert was broadcast on all of the HRT Operator’s pagers notifying us to report to the HRT building ASAP. A warning order was issued in preparation for a full team deployment. The majority of the HRT gathered in the team room in preparation for the HRT Commander’s comments and a briefing from the assault team supervisor. We were told that a fugitive, named Danny Ray Horning, was armed and dangerous and, based on his criminal history, had demonstrated a propensity for violence. Horning had a previous conviction for child molestation and was suspected of the 1990 murder and dismemberment of a Stockton, California, catfish farmer. We filed out of the team room and gathered our individual kit bags. This operation was in a rural setting. Every operator had several kit bags, each one specifically packed with the gear necessary for certain environments (e.g. cold weather, maritime, urban, etc.). For this mission, the shoulder weapon would be the CAR-15 in lieu of the MP-5 A3 that was normally carried in urban close quarter battle. The black body armor carriers would be exchanged for woodland camouflage carriers and the uniform would switch from black flight suits to woodland camouflage BDUs. I opted for my old 782 web gear with a butt pack instead of the standard load bearing vest worn over the body armor. The mount out and trip north to


Circle 301 on Reader Service Card

The Counter Terrorist ~ April/May 2013 11


SAFELY ASSESS POTENTIALLY DANGEROUS SITUATIONS Zistos Tactical Video System & New WalkAbout III

Call Zistos for a product demonstration now! New WalkAbout III: Larger 5.6” LCD screen — same footprint! 4X greater resolution, color VGA, sunlight readable ➤ Pole lengths from 2ft- 20ft ➤ Vehicle Search Systems ➤

Specialized Cameras include: Under Door, Thermal Imaging, Fiberscopes & Videoscopes, Robotic Remote Control and Night Vision Monocular Pole Camera ➤ Rapidly Deployable Surveillance System ➤

Zistos Corporation Ph 631.434 .1370

E-mail: sales@zistos.com Circle 311 on Reader Service Card

12 The Counter Terrorist ~ April/May 2013

Circle 191 on Reader Service Card

Andrews Air Force Base went smoothly for us. Men, assault vehicles, kit bags, and the rest of the support equipment were loaded onto a C-141 cargo plane for the flight to Arizona. As we all got comfortable on our bench seats lining the interior wall of the fuselage, the assault team supervisor began coordinating our arrival with the advance team that had left Quantico earlier. They were already on the ground in the Grand Canyon National Park. Once we were on the ground as well, an operations order would be delivered to the team and we would be updated with the most current intelligence regarding the possible whereabouts of Horning. Horning’s escapades were beginning to attract more and more national media attention. This could become a problem if overaggressive investigative reporters started trying to locate Horning on their own in the Grand Canyon National Park. Operational security was stressed and caution was given about discussing the investigation in the proximity of civilians. During the operations order briefing, it was revealed that Horning might have prepositioned caches of weapons, ammunition, food, and water within the back country of the Coconino National Forest and the Grand Canyon National Park. The operations order also outlined a possible Horning plan to abduct victims, collect $1 million in ransom, and secure the release of his brother, who was serving a twenty-nine-year sentence for child molestation. The next day, Horning attempted to kidnap a family of four, but his plan failed when one of the potential victims screamed for help. Some nearby park rangers heard the commotion and responded. Horning fled into the woods and the foot pursuit began again. This time HRT operators joined in the chase with professional scent tracking (canine) teams attached. The heat index in late June and early July was over 100 degrees Fahrenheit in the inner canyon during the day. At night the temperatures would drop dramatically to the mid40’s on the north and south rims of the canyon. This extreme temperature


WWW.TACPROGEAR.COM Tacprogear is widely used in global hot spots where Personal Protection Equipment solutions are required, not optional Tacprogear’s functional products are designed for tier 1 operators and used by those who run towards the fight Tacprogear is available at retail locations around the world and online including: OpticsPlanet.com & Amazon.com

BULLET PROOF PACKS Pistol Wheel

ARMOR PLATES & HELMETS

BACKPACKS

VESTS & CARRIERS

MOLLE SPINE

GEAR BAGS The Counter ELSE Terrorist ~ April/May 2013 13 PERFORMANCE ABOVE ALL Circle 101 on Reader Service Card


West Fork Trail in Oak Creek Canyon, Sedona. Photo: U.S. Forest Service, Coconino National Forest.

The heat index in late June and early July was over 100 degrees Fahrenheit in the inner canyon during the day. At night the temperatures would drop dramatically to the mid-40’s on the north and south rims of the canyon. 14 The Counter Terrorist ~ April/May 2013

fluctuation was challenging for those in pursuit, including the dogs. They were regularly airlifted from one location to another as possible sightings of Horning were reported to the command post. Before each shift, the dogs would be given an article to smell that had Horning’s scent on it. The next shift of personnel, along with the dog teams, would then be airlifted by helicopter to the location of the on-duty shift. The new shift would then continue in pursuit of Horning. The temperatures and the terrain, as well as Horning’s antics of running in figure eight patterns to confuse the dogs presented a grueling

challenge. Much of the surface being traversed consisted of pumice, a natural lava rock made from ground volcanic glass. The dogs suffered immensely from running on this surface and had to wear socks to minimize the wear of their paw pads. Even with this added protection, the dogs ended each shift limping with blood-soaked socks. During one of the helicopter transports, I noticed beads of sweat on the forehead of the pilot. I knew the pilot well. He was a former Vietnamera helicopter pilot with many hours of combat mission experience. I couldn’t understand why he looked so concerned.


Circle 317 on Reader Service Card

Circle 275 on Reader Service Card

The Counter Terrorist ~ April/May 2013 15


Once out of the Grand Canyon National Park, Horning ordered the two hostages out of the car and tied them to a tree.

I looked at the gauges and saw that the altitude was increasing and we had a mountain to fly over in front of us! The pilot looked at me a said, “We can’t make it over that mountain. I’m going to do a PEL (precautionary emergency landing) and get rid of some weight.” As I stood in the middle of the Coconino National Forest with one of my buddies, I watched as the helo lifted off and flew away. Fortunately, within a couple of miles we found a United States Forest Service outpost with a Bell 206 Jet Ranger sitting on the helo pad. They gave us a lift back to our base camp. As the July 4th holiday approached, concern increased about Horning remaining at large inside the Grand Canyon National Park. The HRT

intensified its efforts and established picket lines as far in front of the dog teams as possible with the intent of capturing Horning when he was flushed into their position by those pursuing him. For several days, the dog teams and operators relentlessly continued their pursuit. Horning reappeared on the morning of July 4th standing next to a car that was parked near one of the scenic overlooks in the Grand Canyon National Park. Horning pointed a handgun at the occupants of the car, two twentyseven-year-old female British citizens on holiday, and ordered them to drive him out of the park. For the next fortyfive miles, Horning passed through two law enforcement road blocks without

A burned area of the Coconino National Forest as seen from Forest Road 420 heading toward Schultz Pass. Photo: USDA Forest Service, Coconino National Forest.

16 The Counter Terrorist ~ April/May 2013


FBI Hostage Rescue Team agents. Photo: FBI detection and successfully exited the Grand Canyon National Park. Once out of the Grand Canyon National Park, Horning ordered the two hostages out of the car and tied them to a tree. As Horning drove away in their vehicle, the two women untied themselves and ran to find help. This information was reported to the command post and the pursuit efforts were redirected to the areas around where the women were released. As law enforcement officers from multiple agencies focused on the location of the most recent sighting, Horning was seen in the stolen vehicle on Route 17

by an alert police officer. Horning fired a shot at the police officer and a chase commenced that ended a hundred miles later when Horning crashed the stolen car into an embankment near the Rocky Park Road interchange on Route 17. He fled on foot into the treacherous terrain of Jacks Canyon and Oak Creek Canyon. Again, picket lines were established and operators with dog teams pursued Horning. For the next 9.5 miles, Horning continued to elude his captors through the rocky terrain. Heat, lack of water, and the 54-day duration of the chase were taking a toll on Horning’s physical condition. Dehydration and exhaustion

The Counter Terrorist ~ April/May 2013 17


On July 5th at around two a.m., Horning was found sleeping beneath a gazebo near a home in the Pine Valley subdivision in the Village of Oak Creek by Yavapai County Sheriff’s Deputies.

were setting in. As the sun vanished and the temperatures dropped, Horning made his way into the Village of Oak Creek. Around ten p.m. Horning was seen drinking from a garden hose by a couple. His hair was matted and his speech was slurred from fatigue. He claimed to be a lost hiker. The couple’s suspicions were aroused and they called the police to report the incident. On July 5th at around two a.m., Horning was found sleeping beneath a gazebo near a home in the Pine Valley subdivision in the Village of Oak Creek by Yavapai County Sheriff’s Deputies. Horning offered no resistance. He was physically whipped. The relentless 54-day pursuit had taken its toll and he could run no more. Once in custody, Horning was transported back to the law enforcement base camp. As he stood in the center of

the law enforcement officers who had participated in the manhunt, each of the dogs were walked out by their handler. Then one by one they were escorted out and allowed to take a big whiff of the fugitive they had pursued so persistently; a fitting end to the Danny Ray Horning saga. Today, Danny Ray Horning is on death row in California’s San Quentin Prison for the mutilation murder of the fish farmer from Stockton, California.

about the author

Mr. McGee has served as an FBI field agent, a member of the Hostage Rescue Team, and a Supervisory Special Agent in the Domestic Terrorism/Counterterrorism Planning Section. He currently teaches at the University of Southern Mississippi and at Tulane University. He is the author of Phase Line Green: The FCI Talladega Hostage Rescue.

• Dynamic graphic presentation • Pages you can virtually flip through • Hyperlinks to various articles and advertisers • No waiting for the magazine to get to your doorstep • Secured access straight from our website!

Receive the E-Zine FREE for a year! Send an email to: subscriptions@thecounterterroristmag.com

with FREE EZINE from The Counter Terrorist.

18 The Counter Terrorist ~ April/May 2013

Circle 255 on Reader Service Card


241%74'/'06 5174%+0) '(',&$7(' 352&85(0(17 7($06 :,7+ */2%$/ 6285&,1* (;3(5,(1&(

‡ )HGHUDO 3URJUDPV 'LYLVLRQ ZLWK 3DVW SHUIRUPDQFH RQ /2*&$3 :336 $&27$ $)5,&$3 81,620 PRUH

‡ 0LOLWDU\ DQG ODZ HQIRUFHPHQW GLYLVLRQ ZLWK FXUUHQW NQRZOHGJH RI ODWHVW VROXWLRQV WHFKQLTXHV

‡ 6WUHDPOLQHG SXUFKDVLQJ RUGHULQJ GHOLYHU\ DQG ELOOLQJ DSSOLFDWLRQV

.OGISTICS #4'# .OGISTICS #4'# -019.'&)' #4'# -019.'&)' $ */2%$/ 1(7:25. 2) 0$18)$&785(56 6833/,(56 $1' 6<67(06 ,17(*5$7256 2))(5,1* 727$/ 62/87,216

‡ 2Q WKH JURXQG LQ $IULFD $VLD 0LGGOH (DVW 6RXWK $PHULFD DQG JOREDO KRW VSRWV ZKHUH H[SHULHQFH LV PDQGDWRU\

‡ 2IILFHV ZDUHKRXVHV IXOILOOPHQW FHQWHUV LQ 86$ 0LGGOH (DVW 6RXWK $PHULFD $IULFD

241&7%65 5ERVICES 7$5*(7 '5,9(1 62/87,216 '(6,*1(' )25 &200(5&,$/ 0,/,7$5< /( 35,9$7( 6(&85,7< 352)(66,21$/6

‡ 3HUVRQDO 3URWHFWLRQ (TXLSPHQW >33(@ 7UDLQLQJ 3ODQQLQJ 2SHUDWLRQV 0DLQWHQDQFH 3URJUDP 0DQDJHPHQW

‡ ,QWHUQDWLRQDO 'HYHORSPHQW 1DWLRQDO 6HFXULW\ 3URJUDPV 5LVN $QDO\VLV ‡ 6SHFLDOL]HG VHUYLFHV DYDLODEOH XSRQ UHTXHVW

Circle 277 on Reader Service Card

Circle 145 on Reader Service Card

The Counter Terrorist ~ April/May 2013 19


Case Study:

motorcycle

hit team: A Global Tactic

Photo: US Navy. 20 The Counter Terrorist ~ February/March April/May 20132013


By Glenn McGovern

On April 7, 1977, two members of the German communist terrorist group Red Army Faction riding tandem on a motorcycle pulled alongside a Mercedes sedan as it sat at a traffic light. A shooter, armed with a short barrel 5.56 mm rifle, filled the interior of the sedan with rounds at nearly point blank range, tearing up the bodies of the three men seated inside.

T

heir mission accomplished, the motorcycle hit-team drove off. The Mercedes drifted through the intersection, the driver, armed escort, and German Attorney General Siegfried Buback having succumbed to their injuries. Wearing protective leathers and helmets, there is still no confirmation of the identity of the shooter, to include even gender.

Attack Characteristics

Over the past five decades, there have been numerous documented attacks on individuals in which employment of a motorcycle (M/C) hit team was a major factor. Attacks using this method of operation have occurred in at least 27 different countries and appear to be on the rise, as there were thirty-five

The Counter Terrorist ~ April/May 2013 21


Of the 117 attacks studied where a motorcycle was employed in the attack, the aggressor obtained an overall success rate, meaning the target was killed, 89 percent of the time.

during the 2000’s and forty-three during just the last three years. In 2012 alone, it has been reported that in Yemen, motorcycle hit teams have assassinated some forty members of the military and four civilians.2 The groups employing the tactic are organizations that include terrorists, guerrillas, organized crime, and governmental operatives. Within just the past few years, training camps offering “courses” in use of the motorcycle for assassinations have been discovered under the control and guidance of al Qaeda, as well as various Mexican drug cartels.3 The nature of any planned attack generally favors the aggressor. The attacker will select a time, a location, and a method of attack that will increase the likelihood of a successful operation with minimal risk to themselves. The use of a motorcycle offers several advantages. A nimble machine, capable of 0 to 60 mph in mere seconds, it can split traffic

lanes when all other vehicles are stuck in traffic, drive on sidewalks and stairways, negotiate narrow roads and passageways, etc. It also provides a means of rapidly approaching the target with minimal advance notice, followed by a rapid escape, in addition to a certain degree of operational cover. Motorcycles are also simple to dispose of or conceal after use. When ridden tandem, the second individual, the “shooter,” has nearly a 360-degree field of fire, the majority of which is unobstructed. In addition, the required positioning of two riders due to the configuration of the seat facilitates the concealment of a weapon. While historically the preference of weapons in such attacks have been firearms, usually pistols or sub-machineguns, more recently, the tactic has evolved to employ parasitic improvised explosive devices, such as “sticky bombs.” Of the 117 attacks studied where a

Homeland Security CERTIFICATE PROGRAM Courses for Public Safety Practitioners Courses include:

 Law Enforcement Professionals Available Now!

 Fire Service Professionals Available Now!

 Emergency Management Professionals Coming Soon!

Rural Domestic Preparedness Consortium

Enroll in a course today. No fees! No cost!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

For more information please visit www.preventivestrategies.net or www.ruraltraining.org 22 The Counter Terrorist ~ April/May 2013

Circle 265 on Reader Service Card


motorcycle was employed in the attack, the aggressor obtained an overall success rate, meaning the target was killed, 89 percent of the time. In 89 of the attacks, the target was an unprotected individual, who may or may not have been armed (22 of the victims were law enforcement, military, or intelligence officers who may have had access to weapons). In those instances, the victim was murdered 88 percent of the time. Surprisingly, those 28 individuals in “protected status� faired even worse. In those attacks, the M/C hit team achieved success 93 percent of the time. The use of explosives by M/C hit teams is rare, accounting for only eight documented cases. Five of these (including the last three) took the form of parasitic attacks against the target. In these cases, the M/C team rapidly approached the target vehicle and slapped

the device on before speeding away just prior to detonation. The remaining three attacks studied were by suicide bombers who pulled alongside the target and triggered the device. In terms of temporal characteristics, the vast majority of M/C based attacks occurred during the traditional work week of Monday through Friday when potential targets are moving within their occupational routine. While there was an average of 21 attacks per day, Monday accounted for the most with 26 percent of attacks. Only 9 percent of all attacks occurred during a weekend, which is of note as many individuals do not tend to follow an identifiable routine on those days. The timing of these attacks also corresponded with the occupational routines of the targets. Most were focused upon the times of travel between the residence and work locations. Attacks

Halogen, HID, LED, Infrared, Thermal

Permanent, Portable & Handheld Units Remote Control or Fixed Units Industry Leading Warranties 308.278.3131 www.golight.com

militarysupport@golight.com Circle 285 on Reader Service Card

The Counter Terrorist ~ April/May 2013 23


Circle 29 on Reader Service Card

24 The Counter Terrorist ~ April/May 2013

Circle 131 on Reader Service Card

between the hours of 0600 and 0900 accounted for 43 percent of the known times. Attacks between the hours of 1700 and 2000 had the next highest rate of frequency with 26 percent. The M/C-based attacks were perpetrated against mobile targets, i.e. those moving in motorized vehicles, 65 percent of the time, with pedestrian targets making up the remaining 35 percent. In those attacks against mobile targets, the majority occurred while the vehicle was moving. In many of these cases, the M/C team merely pulled alongside of the target vehicle and opened fire. However, in some instances, the assassins waited for a more opportune moment when the target vehicle was either stuck in traffic or stopped at a traffic intersection, thus limiting escape options. Perhaps the best example of this occurred on June 8, 2000, in Athens, Greece, when two members of the November 17 communist terrorist organization assassinated British General Stephen Saunders while he was traveling to his office at the British Embassy.4 As Gen. Saunders became stuck in morning rush hour traffic (caused in part by a traffic intersection), the M/C team pulled alongside and opened fire with a .45 caliber pistol. Attacks on pedestrian targets were found to often take advantage of the victim’s vulnerability while they moved between the car and either the home or office. In addition, in many cases, the victim was in the process of either exiting or entering the vehicle at these locations, putting them at even further disadvantage. The zones between the door of a structure and a vehicle tend to be flat, open areas with minimal potential options of cover for the target, and maximum maneuverability options for the adversary. With the high percentage of attacks against a mobile target in a vehicle, the angle of approach the M/C hit team will logically take is from the rear. While in some cases the shooter fired through the back window, most pulled alongside the targeted vehicle, either right or left side, before pulling the trigger (this was also


MACTAC Multiple-Assault Counter Terrorism Action Capability

TM

The Newest, Most Dynamic Training Program from SSI . ®

SSI SWAT CT OPS EXPLOSIVE THREAT MITIGATION COURSE ®

The Most Complete CT Training Available.

MACTAC is the new tactical philosophy

Learn from the Experts:

offering your department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks.

• Terrorist Risk Assessments • Middle East Operational Debriefs—Improve Entry Methods • Secure Search Techniques for Structures • Multiple Breach Points and Advanced CT Tactics • Terrorist Hostage Rescue • Suicide Terrorist Vehicle Interdiction • Containment and Call-Out for Counter Terrorism Ops • Explosive Lab Interdiction in Urban Areas • Explosive/IED Threat Mitigation in Structures • Command, Control and Planning Issues

Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course

Call to register for our next program:

Call to register for our next program:

Camp Blanding, Florida

Camp Blanding, Florida

www.homelandsecurityssi.com

LEARN MORE at: Call now for more information.

Phone: 866-573-3999 Fax: 866-573-2090 info@homelandsecurityssi.com Circle 228 on Reader Service Card

SSI

®

SECURITY SOLUTIONS INTERNATIONAL

Protecting the Homeland Together ®

The Counter Terrorist ~ April/May 2013 25


surveillance detection, and operational security methodologies. As a result of that diligent practice, you detect the presence of a motorcycle approximately 100 meters behind you. You are aware there are a number of attacks that made use of a motorcycle in the past with lethal effectiveness, but is this particular motorcycle a threat, or are they just one of the millions of people heading to work? Are they surveilling you for some future event, or are they trying to position themselves for an imminent attack? More importantly, what are your immediate options to counter this potential hostile threat? When facing a possible motorcycle hit team, there are essentially four items of interest: the case in all of the attacks employing explosives). As such, the victim was in a position to detect the presence of the hostile adversary, even if just momentarily, prior to the attack.

Attack Recognition

Consider the following scenario: You are on your way to work, commuting amongst the masses. Realizing you could be a target as a result of your job, you practice situational awareness,

• • • •

Riding tandem Manner of dress Manner of riding Location

Of the 117 attacks researched, 89 percent had two riders at the time. The commonality or rarity of a tandem ridden motorcycle is likely dependent upon the region of the world and topology. In an effort to quantify, or what the US Marine Corps refers to in their teaching of Combat Profiling as “obtaining a baseline,”5 an informal study of tandem ridden motorcycles was conducted in San Jose, California, the tenth largest city in the United States, over a four-week period. During the one-hour commute in the morning and evening of the

Are You Protected? We protect you from Tasers, Fires, Knives & Stun Guns.

guardian series multi-threat protection uniforms

BULLET PROOF CARRIERS

(Exclusively thru Point Blank Enterprises)

Ÿ Electro Shock Weapon protection Ÿ Light Weight and Machine Washable

Ÿ Electro Shock Weapon (i.e. Taser) Ÿ Cut/ Slash protection and Fire/Flame protection Ÿ Electro Static Discharge protection

Protector Series multi-threat protection gloves Ÿ Ÿ Ÿ Ÿ Ÿ Ÿ

Electro Shock Weapons (i.e. Taser) Cut/ Slash protection Fire/Flame protection Tear/Bite protection Anti-Microbial protection Smartphone and Touch Screen enabled

Connector Series Gloves

CALL NOW!

Ÿ Electro Static Discharge Ÿ Smartphone and

Touchscreen enabled

Ÿ Neoprene and Leather

Duty styles

877.562.1935 www.ThorShield.com info@ThorShield.com G-Squared Consulting LLC 3819 S. Evans Blvd. #306 Tucson, AZ 85714 26 The Counter Terrorist ~ April/May 2013

Circle 97 on Reader Service Card


traditional work week, the total numbers of motorcycles traveling on the roadways were counted along with the number that had two riders.6 The outcome of that study revealed that the daily average encountered was fifteen. Motorcycles with two riders were discovered to be a rarity, with the average plummeting to only once a week, all of which occurred during the evening commute and while traveling upon a major highway. Armed with this information, any tandem ridden motorcycle detected while commuting in the San Jose area could be viewed with suspicion until proven otherwise. Another indicator is the manner in which the motorcycle is being ridden. As with the majority of society, during the morning and evening commute times, the goal is to get to work, home, or some other frequented location (gym, children’s school, etc.). This means everyone is

Circle 83 on Reader Service Card

usually driving in a similar fashion, trying to get to their respective destinations in the shortest amount of time. Motorcycle riders—the legitimate ones—are no different. They are moving with purpose in a designated car pool/motorcycle lane, normal traffic lanes, or splitting lanes, usually at a consistent speed. Finally, the location you find yourself in when the M/C has been detected is the last indicator. Unfortunately, until you see a weapon, you will probably not have any confirmation of hostile intent and thus are legally and perhaps morally prevented from taking any overt or aggressive action.

Conclusion

Of the 117 attacks researched, 89 percent had two riders at the time. The commonality or rarity of a tandem ridden motorcycle is likely dependent upon the region of the world and topology.

The purpose of this article is to promote awareness. The majority of us will never face such an attack. If you practice situational awareness, you will see ghosts. Motorcycle riders are going to make moves that are indicative of a

The Counter Terrorist ~ April/May 2013 27


presents:

Human

GEOGRAPHY 2013 Geospatial Intelligence Focus Day: May 6, 2013 Main Summit Days: May 7-8, 2013 Washington, DC

Innovative New Focus for 2013 • Uncovering future technological capabilities for Human Geography • Deploying new and innovative training techniques • Implementing next gen Human Geography methodology • Emphasizing the role of Female Engagement Teams

SAVE 20% OFF

Standard fees with discount code CTM_GEO when you register by Friday, April 19, 2013

Facilities WEST

Maintaining Public Safety and Accountability Despite Decreasing Budgets June 17th – 19th, 2013 | Denver, CO LEARN AND BENEFIT FROM: • Dedicated networking event for the Western states • Featuring prison experts with proven solutions to the greatest problems facing prisons and correctional facilities • Discover how the Federal, State, and Private prisons plan to cope with mounting budget reductions and increasing prison populations • Optimizing budget efficiency while improving our prisons and corrections systems

SAVE 20% OFF

Call: 1-800-882-8684 Email: info@idga.org

Standard fees with discount code CTM_WEST when you register by Friday, May 24, 2013 TWO EASY WAYS TO REGISTER: Call: 1-800-882-8684 | Email: info@idga.org

www.humangeographyevent.com

www.PrisonsCorrectionalFacilities.com

TWO EASY WAYS TO REGISTER:

Circle 113 on Reader Service Card

Circle 293 on Reader Service Card

March 25-28, 2013 | Detroit, MI Securing Sensitive Networks Through Collaboration and Technology June 24-26, 2013 Washington DC Metro Area

In-depth discussions will cover: • First-hand Cyber perspectives, challenges and initiatives from the Air Force, Marine Corps, Army, Department of Homeland Security and more • Improving Real-Time Response to Cyber Attacks • Security and ROI–Creative Security Funding • Cyber Security Threat Intelligence– Access and Availability

SAVE 20% OFF

Standard fees with discount code CTM_CYBERD when you register by Friday, May 24, 2013 TWO EASY WAYS TO REGISTER: Call: 1-800-882-8684 | Email: info@idga.org

www.humangeographyevent.com Circle 148 on Reader Service Card

28 The Counter Terrorist ~ April/May 2013

Exclusively designed for members of US and Canadian Border Management and Security!

FEATURING DETAILED DISCUSSIONS ON: • Transportation: Cargo and container security • IT Interoperability: Cross border communication and data sharing collaboration • Unmanned Systems: Securing our Waterways • Unique Policy Updates and Conversations: Leading strategists and policy makers • Pacific Northwest focus and perspective: Focused on Port and Maritime Security • And much more!

www.BorderManagementSummit.com Circle 115 on Reader Service Card

possible attack, all the while the rider will be oblivious of the signature his actions are putting forward. This is okay as long as you are aware it is occurring. Use these times to think through your actions. What options are available to you in that instant? However, if you are ever unlucky enough to find yourself under this type of attack, you must act decisively. Motorcycle hit teams are agile, but they are also the most vulnerable vehicle on the road. Let your controlled rage course through your body as you go on the attack. Even if you are shot, breathe, keep moving, and never quit.

about the author

Mr. McGovern has served in SWAT, JTTF and Protective Operations. He is the author of Targeted Violence (CRC Press, April 2010) and Protective Operations (CRC Press, April 2011).

Endnotes

“Top West German Prosecutor Murdered,” The St. Petersburg Times, April 8, 1977, page 11A. 2 Ashraf Al-Muraqab, “Motorcyclists Assassinated 40 Soldiers and 4 Civilians in 2012,” The Yemen Times, January 3, 2013, www.yementimes.com/en/1639/ news/1810/Motorcyclists-assassinated-40soldiers-and-4-civilians-in-2012.htm. 3 Juan Carlos Llorca, “Guatemalan Police Raid Hitman Training Camp,” Associated Press, March 27, 2009, http://www.boston.com/news/world/ latinamerica/articles/2009/03/27/ guatemalan_police_seize_500_grenades_ in_raid/. 4 David Graves, Paul Anast, and Ben Fenton, “Fury as Terrorist Kill Envoy,” Telegraph, June 9, 2000, www. telegraph.co.uk/news/worldnews/europe/ greece/1341819/Fury-as-terrorists-killenvoy.html. 5 For further information on Combat Profiling, see www.combatprofiling.com. 6 The count was conducted by the author and lasted four weeks beginning in mid October through mid November. This allowed for a variety of weather patterns, from hot to wet and cold, as well as the yearly time change, to be incorporated into the study. 1


Get military news, product deals and benefit resources straight to your inbox

It’s our mission to serve those who serve our country, and stand as a resource to the world’s best. Whether you’re active military, reserve, veteran, family or supporter - become a part of the newest military community online.

Benefits Videos

Career Advice Expert Columnists

The Coast Guard spends much more time thinking about how to keep ships from sinking, than it does about how to sink them.

When you leave the military, your mind is usually filled with a range of emotions. There’s joy over your newfound freedom.

A US soldier captured a gunfight, in which he was shot four times, with Taleban insurgents on a camera attached to his helmet.

Product Video Library Find out how to simultaneously search vast public and proprietary records

News Forums

Products Education

ENLIST AT MILITARY1.COM! Circle 335 on Reader Service Card

The Counter Terrorist ~ April/May 2013 29


V

CRAFTED BY EXPERIENCE...

SSI’S VICTORY BOOT. www.ssitacticalgear.com

Authorized Dealer

30 The Counter Terrorist ~ April/May 2013

Circle 291 on Reader Service Card


Victory! O ne the most famous weapons in the world isn’t a weapon at all. Going back to the Han

Dynasty eight centuries ago and on through the Roman Empire, World War II and right up to present day, one of the decisive factors in victory on the battlefield or in special operations has been none other than the lowly boot. Without good boots, military disasters have frequently occurred. Take for example, Hitler’s campaign “Barbarossa” or Red Beard, where the biggest invasion in history (four million German soldiers along a front that was 2,900 miles wide) invaded Russia. The Germans didn’t count on the invasion lasting until winter. There on the outskirts of Moscow, exhausted German soldiers that had been marching up to 12 hours a day, found themselves facing winter with light summer boots. Their feet were soon devastated by the freezing Russian cold, or what they called "General Winter." They were ultimately defeated by ice. So, when SSI Tactical Gear set about designing the best boot for combat for law enforcement and military personnel, they used the experience they have as the leading trainners for SWAT and Special Operations teams around the world. This real-world experience led to a boot design that would protect warriors in any conditions. A boot warriors could fight in over glass shards, sharp metal shrapnel from

IED’s, and any other obstacles that got in their way. They crafted the Victory to withstand the rigors of kicking through doors and windows to get the bad guys; accomplish the mission; come home safe and never be defeated by anything. The Victory can now be yours through SSI Tactical Gear. Using top quality components that are made in the United States of America including Velcro® safety fasteners, 3M Thinsulate® and YKK Zippers®, SSI’s Victory Boot is rugged as it is flexible. With a composite toe and anti-puncture sole it is customized to give you the traction you need on any surface. 1,000 Denier Nylon Cordura® with its breathable, antibacterial lining gives you full weather resistance. Genuine leather and water repellence completes the boot’s durability and performance. In tough times for budgets in departments across the country, you can get the Victory for 30% less than any other competitive product that is made in America—quality and durability that exceeds footwear our well-known competitors make in China or in Asia— and still beats their price. The Chinese may have known how to make good boots eight centuries ago, but today, only SSI Tactical Gear leads to Victory.

Call now to get agency or distributor pricing. 1-786-573-3999 ext 113, 305-401-6906, 305-302-2790. www.ssitacticalgear.com The Counter Terrorist ~ April/May 2013 31


Honor-Crime in North America

By M. Zuhdi Jasser and Raquel Evita Saraswati

Counter The

32 The Counter Terrorist ~ February/March April/May 20132013

A Muslim woman. Photo: Muminah billah


Noor Al-Maleki was a popular, spirited 20-year old Muslim woman. At school, she was known to be funloving and independent. At home, she lived under her father’s iron fist, followed endless rules, and was responsible for taking care of her six younger siblings. After years of withstanding abuse and resisting a forced marriage, Noor ran away.1

O

n October 20, 2009, Noor’s father, Faleh AlMaleki, waited for his daughter outside a government building. Fueled by rage, Al-Maleki directed his car toward his daughter and her friend, accelerated, and struck them both. Noor was killed. Al-Maleki spoke candidly about having killed Noor to protect his “honor,”2 cleansing his reputation with her blood. For some reason, he was not charged with premeditated murder, despite

the rock-solid case presented by the prosecution. Where did this happen? Not in Al-Maleki’s native Iraq, but in Arizona. At least 5,000 girls and women lose their lives in “honor killings” every year.3 Noor’s case was certainly not the first honor killing in the West, and it wasn’t the first in the United States. In our national strategy against “terrorism,” we have for too long focused narrowly on Islamist terrorism committed by groups like al Qaeda

and similar operatives. However, genuine counterterrorism efforts must look beyond the isolated symptom of politically inspired “violent extremism.” Islamism, or political Islam, is an all-encompassing ideology in which men committed to a supremacist interpretation of Islam invoke their version of Islamic jurisprudence (shariah) in society. Political Islam brings with it a litany of pathologies, not just militancy.

The Counter The Counter Terrorist Terrorist ~ February/March ~ April/May 2013 33


Acid attack victim. Photo: Sand Paper

The price paid by women and girls often goes unnoticed. At its worst, Islamism manifests within the family unit through honor-based abuse and violence.

34 The Counter Terrorist ~ April/May 2013

Counterterrorism specialists must understand that every layer of society is affected by Islamic supremacism. Terrorism as we know it strikes out in the public and is thus addressed on many levels—including what is now the largest agency in the US government—the Department of Homeland Security. No part of society is spared from the ravages of Islamism. The Muslim family unit probably suffers the most, yet gets the least attention from any government or media outlet. We believe ignorance and political correctness are two core reasons for this. The price paid by women and girls often goes unnoticed. At its worst, Islamism manifests within the family unit

through honor-based abuse and violence. While honor violence occurs in multiple religious and cultural communities, the majority of honor killings we’ve become aware of in the United States have been committed within the Muslim community. While these crimes are not sanctioned by Islam as a personal faith, “honor culture” is fostered by the totalitarian ideology of political Islam, or Islamism. Islamism doesn’t recognize the value of the individual, and misogyny thrives wherever it is found. To Islamists, the subjugation of women through the control of dress, behavior, and sexual expression is a divine mandate. Because Islamism is a political ideology, it is


Reconyx HyperFire security series cameras are designed for quick and easy deployment in areas where no power or communication lines exist. • Motion activated trigger as fast as 1/10th of a second. • 1080P High Definition color images by day, NoGlowTM Covert Infrared illumination by night. • Compact size (5.5” x 4.5” x 3”) aids in concealment. • On-board memory and power with a battery life of up to one year or 40,000 images.

• Completely weatherproof housing designed for extreme duty usage. • General surveillance and license plate capture models available. No • Made in the U.S.A.

Glow Covert Infrared

Visit www.reconyx.com for more information. Circle 303 on Reader Service Card

Circle 81 on Reader Service Card

The Counter Terrorist ~ April/May 2013 35


able to fortify misogyny within the culture by engaging both those who identify as religious and those who do not. In short, it is a malignant brand of tribal or familial politics masked in piety—targeting women as public enemy number one. As cases like Noor’s continue to come to light, it is imperative that we recognize these tragedies as warning signs of a deeper common problem of radicalization, and an urgent need for reform. Honor violence is a specific form of domestic and community violence, in which its victims, predominantly women, are targeted due to a perceived sexual or social indiscretion, often involving the opposite sex. In honor violence, the family, often with the help of members of the larger identity group, punishes or kills the victim as a way to “cleanse” the reputation of the family and/or identity group. In some cases, honor violence occurs

36 The Counter Terrorist ~ April/May 2013

when there is fear of behavior that hasn’t yet occurred.4 Cases of honor violence—beatings, torture, physical mutilation, and “corrective rape,” as well as honor killings—have been carried out against women who are perceived to be “too Western,” who are seen or suspected of speaking with members of the opposite sex (including phone communication, social media interaction, and text messaging), who are suspected of dating or socializing with men, and so on. In some of the most extreme cases, victims of rape and other sexual assault are murdered because they are seen as sexually impure.5 This includes sexual violence and abuse carried out by family members, who may kill the victim to both destroy evidence of their crime and to clear their own reputation. This is regularly characterized by a perpetrator accusing a family member (a son or daughter, niece or nephew) of sexual indiscretions, indecency, improper

Circle 307 on Reader Service Card

social interactions, promiscuity, or homosexuality, especially if the child has been abused by an adult of the same sex. Perpetrators and potential perpetrators of honor-based violence demonstrate an obsession with sexuality, often marked by the insistence that they are surrounded by immoral behavior that threatens their traditional belief system. Behaviors seen by the larger society as perfectly normal and non-sexual such as the wearing of t-shirts, participating in a co-ed study group at school, etc.—have fed some individuals’ obsessive and irrational fixation on sex and sexuality. Perpetrators of honor-based violence often engage in surveillance of their victims, including spying on the victims’ phone calls, text messages, mail, and internet communications; following the victim to school, work or social activities; having community members (including siblings and other family) spy and report on the victims’ behavior and relationships, etc. We classify individuals who participate in this behavior as perpetrators of honor-based crime (rather than as potential perpetrators) because these behaviors constitute emotional and psychological abuse in themselves. It may seem unlikely to many Americans that some individuals who come to the United States by choice, and who clearly engage aspects of American society (including professional and academic environments) without a problem would commit an honor killing. Unfortunately, honor violence and honor killings are occurring with increasing frequency in the United States,6 and while the perpetrators are of varied national and cultural origins, the warning signs are nearly always striking in their similarity. It must be recognized that for every one girl who pays the ultimate price—her life—due to honor violence, thousands, if not more, are more subtly victimized by a culture which ostracizes and marginalizes women who choose to behave independently from the mores of their family or “tribe” in the United States. This marginalization can manifest


A veiled Muslim woman makes her way through an Astoria, Queens neighborhood in New York City. Photo: russavia

The Counter Terrorist ~ April/May 2013 37


A picture of the Islamic prophet Mohammed, along with Buraq and Gabriel, visit Hell, and see a demon punishing “shameless women” who had exposed their hair to strangers. For this crime of inciting lust in men, the women are strung up by their hair and burned for eternity. Persian, 15th century.

Women are spied on, stalked, lured into dangerous situations by family members, and accused of sexual impropriety.

38 The Counter Terrorist ~ April/May 2013

through abandonment, bullying, and psychological abuse. We believe that Muslim girls are often psychologically tortured in a community conspiracy, which leaves them empty and with few choices despite living in the United States. Each case of honor violence has a story unique to the victim and those who targeted her. Yet each bear the markings of honor-based culture, in which those views and practices deemed “sacred” are placed in higher regard than human dignity and the rule of law. This is why a man like Muzzammil Hassan, successful banker and founder

of Buffalo’s “Bridges TV,” a television network meant to increase understanding and cooperation between Muslims and those of other faiths, was able to justify the brutal beheading of his wife, Aasiya Zubair, in 2009. On February 12 of that year, Hassan stabbed Ms. Zubair as many as 40 times, severing her head.7 Three days prior to the killing, Ms. Zubair had dared to seek a divorce in the United States and had filed the necessary paperwork. Hassan had been served with an order of protection and divorce papers citing “inhumane treatment and ongoing abuse.” Ms. Zubair’s sisters reported that she had spent eight years of marriage “living in fear,” and that she had once visited them requiring $3,000 in treatment for injuries inflicted by her husband.8 She was reportedly terrified of leaving Hassan, and had rightfully feared for her life. Muzzammil Hassan came to the United States from Pakistan at the age of 17, received his MBA at the University of Rochester, and went on to become a well-known leader who claimed to seek a more harmonious relationship between Muslims and non-Muslims in a post-9/11 America. Why would this supposedly modern and integrated man be so controlling and vicious? The answer is that to men like Hassan, one can enjoy the pleasures of a modern life whilst retaining the misogyny of honor culture. To Hassan, Ms. Zubair was not an equal partner, entitled to happiness, freedom, and safety. She was his property. Any expression of independence or autonomy with regard to her body was a direct threat to his “honor” —which he valued above life and law. Yasser Said, an Egyptian immigrant living in Texas, was a cab driver married to an American non-Muslim woman named Patricia Owens. On January 1, 2008, Said shot his two daughters, Sarah and Amina Said, to death in the back of his car.9 Sarah and Amina were 18 and 17 years old, respectively, and had been physically and sexually abused by their father for years. They had finally decided


Photo: Khashayar Elyassi to run away. Their mother, Patricia Owens, appears to have been under the influence of Said’s manipulation— and lured the girls back home despite knowing what surely awaited them.

Circle 147 on Reader Service Card

Witnesses to the family’s relationship say that they heard Owens herself say that, should the girls return home, their father would surely kill them for having American boyfriends and becoming “too

Western.” In the eyes of their father, they had succumbed to the “sexually deviant” American lifestyle, and deserved to die so he would not be shamed. To this day, Yasser Said is still at large.

The Counter Terrorist ~ April/May 2013 39


“No Women” sign at the Marriott Hotel, Jeddah. Photo: Jpatokal

None of these men—Faleh AlMaleki, Muzzammil Hassan, or Yasser Said—are especially pious, but they are certainly misogynist supremacists who value the tribal code of “honor” over human life and US law. According to their worldview, they are entitled to enjoy the benefits of an American lifestyle and the refuge provided to them by this country—but the rights and freedoms of the US Constitution don’t apply to the women in their lives. As far as men like these are concerned, women answer to the men in their lives, and men are not just immune from punishment, but even glorified for carrying out these crimes. In many cases of honor-based violence, the surrounding community doesn’t just turn a blind eye to the crime, but even endorses it.10 It is believed that Yasser Said has evaded arrest for so long with the assistance of others in the Iraqi community. It is important to recognize that honor killings do not happen on a whim—they usually follow years of psychological, emotional, physical, and often sexual abuse of the victim. Circle 343 on Reader Service Card

40 The Counter Terrorist ~ April/May 2013

In honor violence, a female member of the family or identity group is punished at any point a man feels that his ownership over her body is compromised. Women are spied on, stalked, lured into dangerous situations by family members, and accused of sexual impropriety. Victims are often too terrified to attempt leaving—believing that the perpetrator’s family and associates will find them—and may even carry out the killings themselves to “cleanse” the reputation of the entire community. While an honor killing is an obvious crime, it is actually the predictable endpoint of a pattern of criminal abuse against women and girls. Unfortunately, in too many cases of honor violence, the abusive parent, relative, or spouse is able to continue abusing the victim for months or years, until it is too late. In the case of Sarah and Amina Said, for example, friends of the girls reported that they’d show up to school with “welts and bruises,” and that the girls had spoken of numerous threats their father had made against their lives. Yet, no one intervened on the girls’ behalf, perhaps because people considered such extreme


Circle 279 on Reader Service Card

The Counter Terrorist ~ April/May 2013 41


While imams and community leaders do at times speak out against these atrocities, all too often discussion of honor and genderbased violence is met with hostility and condemnation of the person speaking against the violence, rather than against the attacker.

treatment of girls as “cultural,” and didn’t feel that it was their place to attempt to help them. This cultural relativism and political correctness, combined with the demonstrably fatal nature of honor culture, ultimately costs women and girls their lives. It also provides radicals with the assurance that if their ideology is cloaked in religion or culture, it will be safe from scrutiny. This trend of “double blindness”—the combined complicity of the community in which the crime is taking place and silence from the surrounding culture— enables criminal acts like honor violence, as well as a multitude of other alarming practices, to flourish. Female genital mutilation (FGM), for example, occurs in the United States,11 and prevention remains difficult because of the curtain

42 The Counter Terrorist ~ April/May 2013

of secrecy raised whenever a matter is justified by religion or culture. Marital rape, spousal abuse, and forced marriage are other radical practices clearly in violation of American law and universal human rights—which continue in insular communities protected by conspicuous silence. Sadly, the rest of society looks at these human rights crises as internal matters about which they have no say. As Muslims, we cannot help but look upon such avoidance and blinders as “the soft bigotry of low expectations,” This bizarre respect for “other” cultures even when it tramples over the human rights of women actually contributes to a culture of impunity on our own soil. In the well-intentioned attempt to avoid disrespecting culture, they are saying that Muslims—both women and men— deserve no more than the brutality of the worst in our community. While the majority of Muslims condemn these practices, the simple fact is that they would not continue at the rate they do without the support of a powerful minority and the inaction of too many. While imams and community leaders do at times speak out against these atrocities, all too often discussion of honor and gender-based violence is met with hostility and condemnation of the person speaking against the violence, rather than against the attacker. This reveals a deep and urgent need for reform within the Muslim community to address the core of radicalism of all kinds: Islamism, or political Islam, as well as tribal and cultural forces that influence our communities in a malignant way. These same forces are those that have led to acts of terrorism, threats against dissidents and critics of Islamism, and human rights abuses of minorities. Honor-based violence is a byproduct of the collectivist mentality of Islamism and the direct result of the inherently misogynist, supremacist nature of Islamism itself. Where honor-based violence occurs, you will find a family unit run like a theocratic fascist unit:

male dominated, oppressive, and insular. Where Islamism seeks global domination through a misogynistic legal system, “honor culture” achieves this on a micro level. The silences around honor-based violence and the intimidation of those who speak out against it are similar to the reaction of Islamists to honest discussion of radicalization within our community. Islamists threaten, bully, and intimidate their critics both abroad and here in the United States. Honest discussion of honor-based violence and the problem of radicalization within the Muslim community both result in accusations of “Islamophobia,” bigotry, racism, and “selling out.” Figures from the Council on American Islamic Relations (CAIR), the Muslim Public Affairs Council (MPAC), the Islamic Society of North America (ISNA), and others repeatedly downplay the threat of radicalization and genderbased violence within our community, claiming that to discuss these inspires anti-Muslim hatred and violence. For example, when 32-year-old Shaima Alawadi was murdered in California in March 2012, many of these groups immediately came out to condemn it as a hate crime committed by a bigoted non-Muslim, despite signs that it could have been an honor killing or other type of familial foul play.12 Anyone who questioned these groups’ theories about Ms. Alawadi’s untimely death was demonized and called an Islamophobe. CAIR and other so-called Muslim civil rights groups equated Shaima’s plight with that of Trayvon Martin. Ultimately, Ms. Alawadi’s husband, Kassim Alhimdi, was arrested and charged with her death, confirming our suspicions that this was likely an honor killing. There were no “mea culpas” to be heard from the media or activists who exploited her death to tarnish Americans as bigots. There were also no further attempts to expose the pervasiveness of women victimized by misogynistic Islamist men who believe they own them. When Islamists indoctrinate Muslims


NEW LOCATION FOR 2013! The Florida Hotel and Conference Center, Orlando

Counter The

Journal for Law Enforcement, Intelligence & Special Operations Professionals

presents: 8th Annual

Homeland Security Professionals Conference and Exposition November 5-7, 2013 • Orlando, Florida With a sellout in 2012 at the Gaylord Palms you spoke and we listened: • More centrally-located, deluxe hotel • No parking charges • Inexpensive and plentiful alternatives to hotel meals • Internet in the rooms and in the lobby

Program for the 2013 Conference:

Hot Topics in International Crime & Terrorism • Money laundering, Fraud and Counterfeit: Special case studies • Crime, Innovation and the Mexican Border • Syria: new breeding ground for terrorists—lessons learned • Iran’s Terrorist Empire • Cyber Crime and Terrorism • Islamist Economic Warfare • The importance of Counter Intelligence • Cognitive warfare—how to fight it in the USA • Takeaways for the First Responder in fighting International Crime and Terrorism • And More! This conference is approved for graduate and undergraduate credits through Saint Leo University

Register now to get a special introductory price of only $199.00 instead of $399.00 (valid only until April 15th, 2013)

www.thecounterterroristmag.com/conference

LEARN MORE at: Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 info@homelandsecurityssi.com Circle 177 on Reader Service Card

SSI

®

SECURITY SOLUTIONS INTERNATIONAL

Protecting the Homeland Together ®

The Counter Terrorist ~ April/May 2013 43


4H AnnUAL

SECURIng THE U.S.-MExICO wITH TACTICAL STRATEgIES & TECHnOLOgIES

MAy 29 - 31, 2013 • TUCSOn, AZ

MEET MICHAEL FISHER, CHIEF, U.S. BORDER PATROL IDGA’s 4th Annual Border Management Southwest will bring together all relevant stakeholders to discuss the most pressing issues facing the Department of Homeland Security, from efforts to build new partnerships to modernizing security capabilities. Gain access to valuable insights, recommendations, and best practices on: • New technologies and applications for border surveillance, safety and security • Integration of homeland security intelligence and information sharing • Border tactics, training and capabilities for the DHS, DOD and DOJ • Current and future requirements of U.S. Customs and Border Protection Policy makers, uniformed service leaders, law enforcement and industry partners will gather in Tucson to network, share best practices and explore potential paths to fortify the United States border.

www.BorderSouthwest.com Circle 168 on Reader Service Card

DATA CENTER CONSOLIDATION

The Federal IT Revolution: Doing More with Less

MAy 21-22, 2013 | WAShIngTOn, DC Tackling the Revolutionary Challenges Facing the IT Community in Data Center Consolidation In-Depth DIscussIons wIll cover: • Department perspectives on the Federal Data Center Consolidation Initiative: Challenges and opportunities • Reducing data center energy usage • The persistent need for cyber security • Latest advancements in consolidation technologies, including cloud computing and virtualization

learn More on the latest InDustry consolIDatIon solutIons, IncluDIng: • Cloud Computing: Its benefits to consolidation and the security implications • Virtualization: Allowing for data center sustainability • RDF Stores: Optimizing storage and retrieval of data www.DCCEvent.com | Email: info@idga.org | Call: 1-800-882-8684

Circle 289 on Reader Service Card

44 The Counter Terrorist ~ April/May 2013

to feel victimized rather than empowered to create positive change, they silence important and life-saving dialogue about the most pressing problems faced by our community today. While we, as American Muslims, are, of course, alarmed by legitimate evidence of bias crimes against Muslims (and individuals of any group), we believe that radicalization in all its forms can only be solved through the empowerment of Muslims against those most actively trying to silence us against the tyranny of Islamism. Non-Muslims must also recognize the need to join us in combating abuses of women committed in the name of religion and culture. These behaviors don’t exist in isolation. They are symptoms of the cancer that is radicalism. Like the symptoms of a possibly terminal illness, to ignore them is to surrender everything. Not until we begin to topple the supremacists in our own homes, empowering both women and men to reach their fullest potential, will we be positioned to defeat the global supremacist threat of radical Islam.

About the author

Dr. Jasser is the author of A Battle for the Soul of Islam: An American Muslim Patriot’s Fight to Save His Faith (Simon & Schuster, 2012) and is president and founder of the American Islamic Forum for Democracy. He also serves as a commissioner on the US Commission for International Religious Freedom (the opinions expressed are his own). Ms. Saraswati is an American Muslim activist and writer whose primary area of focus is the rights of women and girls in the Muslim world and in Islamic communities in the West. Find more of her work at www.raquelevita.com.

Endnotes:

Lisa Freed and Jonathan Leach, “Was Noor Almaleki the victim of an honor killing?” Forty-Eight Hours, September 1, 2012, http://www.cbsnews.com/830118559_162-57408082/was-nooralmaleki-the-victim-of-an-honor-killing/. 2 Paul Rubin, “Iraq Native Faleh Almaleki Gets 34 Years in Prison for 1

Murdering His Americanized Daughter,” Phoenix New Times, April 21, 2011, http://www.phoenixnewtimes.com/201104-21/news/iraqi-faleh-almaleki-gets34-years-in-prison-for-murdering-hisamericanized-daughter/. 3 Honor Based Violence Awareness Network, http://hbv-awareness.com/ statistics-data/. 4 Jim Wilkes and Isabel Teotonio, “Teen’s Slaying Sparks ‘Honor Killing’ Debate,” The Star, December 14, 2007, http://www.thestar.com/news/gta/ article/285589--teen-s-slaying-sparkshonour-killing-debate. 5 Tina Susman and Caesar Ahmed, “In Iraq, a Story of Rape, Shame and ‘Honor Killing,’” Los Angeles Times, April 23, 2009, http://articles.latimes.com/2009/ apr/23/world/fg-iraq-woman23. 6 Oren Dorell, “’Honor Killings’ in USA Raise Concerns,” USA Today, November 30, 2009, http://usatoday30.usatoday. com/news/nation/2009-11-29-honorkillings-in-the-US_N.htm. 7 Carolyn Thompson, “Muzzammil Hassan Convicted of Beheading Wife,” Huffington Post, February 7, 2011, http:// www.huffingtonpost.com/2011/02/08/ muzzammil-hassan-convicte_n_820389. html. 8 Ashley Broughton, “Beheaded Woman’s Sister: I Might Have Heard Deadly Confrontation,” CNN, February 17, 2009, http://articles.cnn.com/200902-17/justice/new.york.beheading_1_ american-muslim-cape-town-southafrica?_s=PM:CRIME. 9 Glenna Whitley, “American Girls,” Dallas Observer, June 19, 2008, http:// www.dallasobserver.com/2008-06-19/ news/american-girls/. 10 Phyllis Chesler, “Are Honor Killings Simply Domestic Violence?” Middle East Forum, Spring 2009,http://www. meforum.org/2067/are-honor-killingssimply-domestic-violence. 11 “Female Genital Mutilation in the U.S. Factsheet, Equality Now, http:// www.equalitynow.org/node/866. 12 Linda Sarsour, “My Take: My Hijab is my Hoodie,”Belief Blog, CNN, April 5, 2012, http://religion.blogs.cnn. com/2012/04/05/my-take-my-hijab-ismy-hoodie/.


New and improved

( portable vehicle barrier ) When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email info@homelandsecurityssi.com

Or visit our website: www.SSIPVB.com

Circle 308 on Reader Service Card

Circle 226 on Reader Service Card

SSI

SECURITY SOLUTIONS INTERNATIONAL

®

Protecting the Homeland Together ®

The Counter Terrorist ~ April/May 2013 45


Book Review

Shariah Law and American Courts:

An Assessment of State Appellate Court Cases By Center for Security Policy

H

ave American officials advanced initiatives that undermine the U.S. Constitution? Have any judges considered legal precedents that do not have jurisdiction in the United States when deciding cases? History will likely judge these questions to be among the most important of our time. The Center for Security Policy studied these questions in Shariah Law and American Courts: An Assessment of State Appellate Court Cases (2011). The writers observe, “there are organizations and individuals within the United States actively and openly advocating for the establishment of shariah law in America, especially for personal status and family law. A prominent one is the Assembly of Muslim Jurists of America1 (AMJA) with more than 100 members including local Imams and shariah authorities across America, as well as shariah authorities from other countries... Given these stated goals of AMJA and similar organizations, this study was conducted to discover the extent to which shariah law had in fact entered U.S. state courts. News reports have identified individual cases of plaintiffs, defendants or judges citing shariah or Islamic law. Many groups and individuals have raised

46 The Counter Terrorist ~ April/May 2013

concerns about state courts citing foreign and transnationalist laws and precedents, including shariah law. The authors note, “…institutionalized, authoritative shariah is comprehensive

and by definition without limit in its ambitions and scope, and it also includes legally mandated, recommended, permitted, discouraged and prohibited practices that are strongly biased and discriminatory against women, homosexuals and non-Muslims. Shariah

Reviewed by: Chris Graham

law provides a legal framework for violence up to and including legalized murder against… blasphemers… Shariah criminal punishments are extreme, including amputations and lashings for numerous crimes…” Their document “evaluates published appellate legal cases that involved “conflict of law” issues between shariah (Islamic law) and American state law.” The writers say, “For every case in this sample drawn from published appellate legal cases, there are innumerable cases at the trial level that remain unnoticed except by the participants. Thus, this report is only a sample of possible cases—a “tip of the iceberg”—of legal cases involving shariah in local, state and federal courts. Our findings suggest that shariah law has entered into state court decisions, in conflict with the Constitution and state public policy. Some commentators have said there are no more than one or two cases of shariah law in U.S. state court cases; yet we found 50 significant cases just from the small sample of appellate published cases. Others state with certainty that state court judges will always reject any foreign law, including shariah law, when it conflicts with the Constitution or state public policy; yet we found 15 Trial Court cases, and 12 Appellate Court cases, where shariah was


found to be applicable in the case at bar. The facts are the facts: some judges are making decisions deferring to shariah law even when those decisions conflict with Constitutional protections. This is a serious issue and should be a subject of public debate and engagement by policymakers. With the publication of this study and subsequent studies now in preparation, our objective is to encourage an informed, serious and civil public debate and policymakers’ engagement with the issue of shariah law in the United States of America. This public debate is more urgent than ever before, as organizations such as the Muslim Brotherhood and their salafist coalition partners state openly their intent to impose the Shariah State and shariah law as dominant across all Muslim majority countries. We found an initial sample of approximately 150 cases involving shariah doctrine, which were narrowed to a set

of 50 cases designated Relevant... In addition, the cases were also assessed as to whether or not the ultimate decision of the court was in accordance with shariah law at both the Trial Court and Appellate Court levels: At the Trial Court level: 22 decisions found that the application of shariah was at odds with the state’s public policy; 15 found shariah to be applicable in the case at bar; 9 were indeterminate; and in 4 cases shariah was not applicable to the decision at this level, but was applicable at the appellate level. At the Appellate Court level: 23 decisions found that the application of shariah was at odds with the state’s public policy; 12 found shariah to be applicable in the case at bar; 8 were indeterminate; and in 7 cases shariah was not applicable to the decision, but had been applicable at the trial court level. The writers conclude, “The topic is not new to academics or lawyers; but, with an increased presence of shariah-adherent

Bite Suit Helmet $74.95

Hand Protectors E-Collar Holsters

[[

Follow us on Scan our QR code with your smart phone to view our online catalog.

Reward Balls with Tug Handles 3" Ball

$12.95

2.5" Ball

$11.95

2" Ball

$9.95

$39.95 ea

Special Operations Harness

Bite Suit

available in black, coyote or multicam*

$39.95

Has cutouts so the buttons can still be worked while it’s holstered. Has 2¼" metal clip on back of holster so it can be worn on a 2" duty belt or clipped to a MOLLE tactical vest.

Muslims in the United States, and the rapid rise of political and militant Islam globally, the conflict between Shariah law and the Constitution requires a new level of debate among policymakers, media, the legal community, and most importantly, the American public.” The liberty that was born in North America in the late 1700’s is an historical anomaly. If it is permitted to burn out, it is unknowable how many generations will pass before there will be another opportunity to win freedom from the oppression that is the historical norm. We must always be vigilant against actions that undermine our Constitution. Shariah Law and American Courts contains valuable information for each of us who has taken the oath to “support and defend the Constitution of the United States, against all enemies foreign and domestic…”

$1,189.95

with plastic buckles

$149.95

with metal cobra buckles

$199.95

*with attachments for MOLLE pouches and K-9 camera

Muzzles $69.95

Malinois

German Shepherd

YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT Circle 277 on Reader Service Card

The Counter Terrorist ~ April/May 2013 47


modern

russian

special

weapons

48 The Counter Terrorist ~ April/May 2013


By Eeben Barlow

A young Marine operates an RPD.

The Cold War witnessed both the West and the East increase their research and development into small arms and associated battlefield technologies. As both sides vied for influence over nonaligned countries in Africa and the Middle East, it was the Soviet small arms that would eventually dominate in these areas.

T

he African and Middle Eastern operating environments are both harsh and unforgiving. It is, therefore, no small wonder that many African and Middle Eastern armies opted for Russian (or old Soviet-bloc) weapons; these weapons were unsophisticated, simple to operate, relatively inexpensive, and reliable. They also have stopping power that equals or exceeds that of many Western small arms.1 Their modern counterparts are no different.2

Modern Russian small arms and close combat weapons comprise much more than just the prolific AK-47 and RPG7 rocket propelled grenade launcher. These weapons include side arms, assault rifles, shotguns, grenade launchers, disposable anti-tank and anti-personnel weapons. Designed to fulfil multiple missions and roles,3 these weapons are well-suited to covert, clandestine, and conventional operations.

The Counter Terrorist ~ April/May 2013 49


Gsh-18 9mm Pistol

This new-generation sidearm was developed as a reliable, compact, and powerful close-quarter weapon. Chambered for the 9mm Para round, the pistol is fed with a double-column magazine. It can also fire the 7N31 cartridge, an armor-piercing round that is advertised as capable of defeating Level 2 body armor. To enable left- and right-hand shooting, the magazine release is accessible on both sides of the frame. Weight-reduction is achieved with the use of composite materials. It can be fitted with a lasers or light accessories. Caliber (mm)..............................................................9 Cartridge............................................9x19 Para/7N31 Effective rate of fire (rds/min).......................................36 Effective range (m).....................................................50 Weight without magazine (kg)..................................0.48 Weight of empty magazine (kg)................................0.09 Magazine capacity...................................................18 Muzzle velocity (7N31 AP cartridge) (m/s)......... 535 –570 Dimensions............................................. 183 x 133 x33

Gsh-18 9mm Pistol

Yarygin PYa 9mm Pistol

Chambered for the 9mm Para cartridge, the Yarygin pistol was developed to provide a reliable blow-back operated sidearm. The pistol can also feed the 7N31 9mm armor-piercing cartridge. It operates in either single- action or double-action mode. Caliber (mm)..............................................................9 Cartridge............................................9x19 Para/7N31 Effective rate of fire (rds/min).......................................36 Effective range (m).....................................................50 Weight without magazine (kg)..................................0.95 Weight of empty magazine (kg)................................0.12 Magazine capacity...................................................18 Muzzle velocity (7N31 AP cartridge) (m/s)......... 535 –570 Dimensions............................................. 195 x 140 x38 Yarygin PYa 9mm Pistol

Kedr 9mm Sub-Machinegun

The 9mm Kedr sub-machinegun is a mass-produced, closequarter weapon designed for use in confined spaces or for covert concealment. It is fitted with a stock that folds up and over the receiver and can be employed semi or full auto. It is designed to accommodate suppressors and lasers. Caliber (mm)..............................................................9 Cartridge ....................................................... 9x18 PM Cyclic rate of fire (rds/min)............................. 800–1000 Effective range (m)...................................................100 Weight without magazine (kg)..................................1.40 Weight with loaded magazine (kg)............................1.82 Muzzle velocity (m/s)...............................................310 Length, butt extended (mm)........................................540 Length with butt folded (mm)......................................310 Magazine capacity (rds).................................... 20 or 30 50 The Counter Terrorist ~ April/May 2013

Kedr 9mm Sub-Machinegun


AEK-919K Kashtan 9mm Sub-Machinegun

The Kashtan is a lightweight, compact, recoil-operated 9mm sub-machinegun developed as a self-defence weapon for special operations forces. The weapon combines both metal and plastics with a cold-stamped receiver, a radial-forged barrel, and a high-impact plastic frame and pistol grip. An adjustable rear sight ranges from 50m to 100m. The SMG has a telescopic butt with a swivel heel. Ammunition is fed via a double-stack box magazine. The Kashtan can be fitted with a suppressor, a laser, or a collimator sight/occluded eye sight (OEG). Caliber (mm)........................................................9 Cartridge types..........................................9x18 PM Effective rate of fire (rds/min).............................. • Single shot (rds/min)..................................40 • Bursts (rds/min)........................................100 Maximum Effective range (m)...............................100 Weight with empty magazine (kg).......................1.68 Weight with loaded magazine (kg)......................2.02 Muzzle velocity (m/s).........................................315 Length, butt extended (mm)..................................610 Length with butt folded (mm)................................360 Magazine capacity (rds).............................. 20 or 30

PP-2000 9mm Sub-Machinegun

The PP-2000 is a 9mm sub-machinegun that was developed for special applications. It is currently in service with the Russian Interior Ministry. Firing the 9 x 19mm armor-piercing round, it is advertised as capable of penetrating Class 2 body armor, softskinned vehicles, or light cover. The generous use of high-impact plastic has resulted in a decrease in weight whilst simultaneously increasing its resistance to corrosion. The PP-2000 can be fitted with a suppressor (and a flash suppressor).

AEK-919K Kashtan 9mm Sub-Machinegun

Caliber (mm)..............................................................9 Cartridge type.................................. 9x19 armor-piercing Fire mode.......................................Single-shot/automatic Effective rate of fire (rds/min)............................. 600–800 Maximum effective range (m).....................................200 Weight with empty magazine (kg).............................1.40 Weight with loaded magazine (kg)................. Approx 1.92 Muzzle velocity (m/s)...............................................550 Length, butt extended (mm)........................................555 Length with butt folded (mm)......................................340 Magazine capacity (rds).................................... 20 or 44

PP-2000 9mm Sub-Machinegun The Counter Terrorist ~ April/May 2013 51


AM (SR3) Assault Rifle (9 x 39mm)

The AM (SR3) assault rifle was designed for use by special operations forces and airborne and mechanised infantry, allowing the soldiers to engage enemy infantry wearing body armor, as well as soft-skinned vehicles with the SP-6 round. The SP-6 round is designed to penetrate two 1.4mm thick titanium plates, as well as Kevlar body armor (30 layers) at 100m. A specially-designed, ricochet-reduced round allows the weapon to be used in confined spaces. The weapon utilises a folding butt that folds over the receiver cover when not in use. The AM (SR3) is fitted with iron sights graduated for 100m and 200m ranges and can be used when the butt has been folded over the receiver.

Caliber/cartridge.....................................9 x 39mm SP-6 Muzzle velocity (m/s)...............................................290 Effective range (m)...................................................200 Effective rate of fire (rds/min).................................... • Single shots....................................................30 • Bursts.............................................................90 Weight with empty magazine (20 rounds) (kg)...............2.1 Length with butt extended (mm)...................................640 Length with butt folded (mm)......................................396 Magazine capacity (rds).................................... 10 or 20

AM (SR3) Assault Rifle (9 x 39mm)

SR.3M Assault Rifle (9 x 39mm)

The SR.3M is a variant of the AM SR3 assault rifle. The 9 x 39mm cartridge (SP-6) allows the firer to engage enemy infantry and soft-skinned vehicles. The SP-6 round may defeat CRISANT NATO-type body armor at a range of up to 400m. The weapon has a collapsible fore grip and removable suppressor. The SR.3M uses sub-sonic ammunition to reduce both muzzle flash and noise when suppressed. The weapon can be accurately fired using its own iron sights with aiming ranges of 100m to 200m. It can also be fitted with the PSO-1M2-1 optical sight with an effective range 400m (as depicted in the photograph) or with the NSPU-3 night sight, giving it an effective range of 300m.

Caliber/Cartridge 9 x 39mm SP-6 and SP-5 (sniper round) Muzzle velocity (m/s)...............................................295 Effective range (m)................................................... • With iron sights..................................... 100–200 • With PSO-1M2-1..........................................400 • With NSPU-3................................................300 Effective rate of fire (rds/min).....................................900 Weight without silencer and magazine (kg)...................2.2 Weight of empty magazine (20/30 rds) (kg)......0.18/0.34 Length with butt extended/folded (mm)................675/410 Magazine capacity (rds).................................... 20 or 30

SR.3M Assault Rifle (9 x 39mm) 52 The Counter Terrorist ~ April/May 2013


MTs-116M Sniper Rifle (7.62 x 54mm or 7.62 x 51mm)

The MTs-116M sniper rifle is based on the MTs-116 sporting rifle. The weapon is deployed to engage enemy troops with or without body armor, as well as soft-skinned vehicles and highvalue targets. The rifle is a manual, bolt-action loaded rifle and is fitted with a Picatinny rail on the receiver. The stock is adjustable in height and has an adjustable cheek piece. A folding bipod is mounted on the shortened forearm grip. A slot flash suppressor is attached to the muzzle. In addition to the standard ramp-type

iron sights, the rifle can be fitted with various day and night sights. An anti-mirage device is intended to make sighting easier in hot temperatures. Cartridge (mm)............................... 7.62 x 54/7.62 x 51 Effective range (m)...................................................600 Weight (unloaded) with magazine (kg).........................6.5 Barrel length (mm)....................................................650 Length without muzzle suppressor (mm)......................1250 Magazine capacity (rds)...................................... 5 or 10

MTs-116M Sniper Rifle (7.62 x 54mm or 7.62 x 51mm)

7.62 x 54mm Kalashnikov Pecheneg Machinegun

The Kalashnikov Pecheneg machinegun (KPMG) was developed as an infantry light machine gun (LMG) to engage enemy infantry in the open, weapon systems, soft-skinned vehicles, and low-flying aircraft. Although similarities exist with the PKM machinegun, the KPMG features improved barrel cooling, allegedly making a second barrel redundant.

The KPMG’s accuracy has been improved by reducing thermal distortion and the absence of hot air flow by a more rigid barrel. Cartridge (mm)............................................... 7.62 x 54 Rate of fire (rds/min)........................................ 600–800 Belt capacity (rds).......................................100 and 200 Magazine...............................................................Box Expected service life (rds).......................... Approx 25 000 Length (mm).......................................................1,2000

7.62 x 54mm Kalashnikov Pecheneg Machinegun The Counter Terrorist ~ April/May 2013 53


OSV-96 Sniper Rifle (12.7 x 108mm)

The OSV-96 is a 12.7mm sniper rifle developed to allow the sniper and his spotter to remain beyond the range of conventional small arms while engaging personnel and equipment. The weapon is also intended to monitor border crossing points, attack small sea or riverine vessels and destroy sea mines. The OSV-96 is a gas-operated rifle and can fire either the 12.7 x 108mm sniper cartridge or the 12.7mm machinegun round. It can be fitted with a collimator sight or a night sight. The rifle can be disassembled into individually packable loads.

Caliber (mm).........................................................12.7 Cartridge.......................................... 12.7 x 108 (sniper) Effective range (m)................................................... • Against infantry in the open..........................1,200 • Against vehicles..........................................1,800 Effective range with night sight (m)..............................600 Penetration of 20mm armor plate at 100m (%).................... Not less than............................................................90 Weight without optical sight (kg)...............................12.6 Length (mm).........................................................1,700 Length with butt folded (mm)...................................1,300 Magazine capacity (rds)...............................................5

OSV-96 Sniper Rifle (12.7x 108mm)

Learn. Prevent. Defend.

BR-3 BR-5 BR-6

Prepare for the fight against terrorism on all of its fronts. From the cyberwar to the economic arena to the frontline, Southern New Hampshire University can help you be ready for anything. • Counterterrorism and Cybersecurity education in SNHU’s Justice Studies programs • More than 180 degree and certificate programs, completely online • Corporate and military discounts for eligible students

VANDAL BR-3

Visit snhu.edu/ct to get started on your counterterrorism education.

/ct 54 The Counter Terrorist ~ April/May 2013

800.607.8374 WWW.jntactical.COM Circle 111 on Reader Service Card

Circle 155 on Reader Service Card


g n i t a r t e n Pe . . . t h g i N e th

. c n I , s e i r t s u d n I s m ries.com a d A st ndu n l Mo rma

o

rs cula

g , go

e nd w a s gle

t sigh n o p a

s.

the ion/ s i v t si tries.com Nigh m a s d

.a msindu www da 017 s@a 72-3 sale (310) 4 -1421 5 t: Wes (540) 81 : East

Circle 308 on Reader Service Card

The Counter Terrorist ~ April/May 2013 55


12.7mm Machinegun Kord with Bipod 6P50-1

The 12.7mm Kord machinegun with lightweight bipod 6P50-1 was developed to engage enemy troops, lightly armored vehicles, fortified positions, and low-flying aircraft. The Kord has a cut-down butt and, with its lightweight bipod, can be brought rapidly into action to engage targets. It can also be fitted with optical day and night sights. The weapon can fire the following rounds: • B-32 (API)

• BS (API) • BZT-44M (APIT) Caliber (mm)......................................................12.7 Effective rate of fire (rds/min).......................... 600–750 Effective range (m).............................................2,000 Lifespan (rds)...................................................10,000 Weight without sight (kg).......................................32.6 Length of weapon (mm)......................................1,980 Feed................................................................... Belt

12.7mm Machinegun Kord with Bipod 6P50-1

GM-94 Grenade launcher

The GM-94 grenade launcher was designed to attack infantry and other soft targets in the open, as well as behind cover. The GM-94 is fed from a magazine tube and fires a variety of ammunition types to fulfill multiple roles. These include setting fire to bush/buildings, screening from enemy observers, and suppressing rioters. The weapon is highly versatile, although it is limited in range. Caliber (mm)............................................................43 Weight (empty) (kg)..................................................4.5

Magazine capacity (rds) ..............................................3 Ammunition types.................................................... • Thermobaric..................................... VGM93.100 • Irritant-Gas....................................... VGM93.200 • Smoke............................................ VGM93.300 • Flash/Bang..................................... VGM93.400 • HE................................................. VGM93.500 • Shock effect..................................... VGM93.600 • Inert/Training............... VGM93.700/VGM93.800 Effective range of fire (m).................................. 100–300 Dimensions (stock folded) mm................... 528 x 70 x 196

GM-94 Grenade launcher 56 The Counter Terrorist ~ April/May 2013


SSI

®

SECURITY SOLUTIONS INTERNATIONAL

Protecting the Homeland Together

®

is proud to provide the Homeland Security Network with content, operations and administration, and advertising management. If you want simply the best web site to reach the $170 billion dollar Homeland Security market, call us about:

H

Homeland Security

netwOrk

Homeland Security Network addresses the needs of more than three million Homeland Security First Responders by providing training, intelligence, technology, and the latest news reports. The Homeland Security Network offers an efficient, private-industry alternative to the disparate and fragmented sources available at the Federal, State and Local levels. ALL CONTENT IS COMPLETELY FREE. All members are hand-vetted members of Homeland Security agencies and Homeland Security Professionals. If you want to reach the decision makers, when they communicate with each other call Henry Morgenstern at Homeland Security Network.

www.homelandsecuritynet.com

LEARN MORE at:

www.homelandsecuritynet.com Call now for more information.

Phone: 866-573-3999 • Fax: 866-573-2090 Circle 19 on Reader Service Card

Circle 19 on Reader Service Card

Circle 56 on Reader Service Card

The Counter Terrorist ~ April/May 2013 57


RPG-26

The RPG-26 is a disposable anti-armor rocket launcher. It is an air droppable weapon that fires a 72.5mm High Explosive AntiTank (HEAT) rocket. Warhead..............................................................HEAT Caliber (mm).........................................................72.5

Weight (Kg)............................................................2.9 Effective engagement range (m).................................250 Penetration (mm)..................................................... • Homogenous armor........................................440 • Reinforced concrete.....................................1,000 • Brick.........................................................1,500 • Log and earth.............................................2,400

Caliber (mm).........................................................72.5 Weight (Kg)............................................................2.9 The RPG-27 is a larger and more effective weapon than the Effective engagement range (m).................................250 RPG-26. It is a disposable anti-armor rocket. Its improved Penetration (mm)..................................................... capabilities come with a cost in terms of weight. Like the RPG • Homogenous armor........................................440 26, the weapon is air droppable. • Reinforced concrete.....................................1,000 • Brick.........................................................1,500 Warhead..............................................................HEAT • Log and earth.............................................2,400

RPG-27

RPG-27

RShG-1 Assault Weapon

The RShG-1 is a disposable assault weapon. It fires a thermobaric warhead that was developed to attack enemy concentrations in the open, as well as enemy troops hiding behind field fortifications and inside buildings. It is also highly effective against soft-skinned and lightly-armoured vehicles. The thermobaric warhead utilises considerable blast and shock, fragmentation, and incendiary effects neutralizing troops in buildings up to 300m².

ADDRESSING THE CHALLENGES OF FUNDING AND INTEROPERABILITY June 24–26, 2013 | Washington, DC Metro Area Highlights of GIS for Government 2013: • Learn from an exclusive lineup of the TOP experts in the field of GIS, as well as leading authorities from a full spectrum of government representation: from the Federal, State, and County levels • Gain unparalleled insight into varied GIS applications, while addressing the need for analysis-oriented and standards compliant systems • Delve into the development and integration of GIS, strengthening your knowledge of LiDAR technology, WebGIS, ArcGIS, and much more

Warhead......... Thermobaric Caliber (mm)............... 105 Weight (kg).................. 8.3 Length (mm).............. 1,135 Effective range (m)........ 200

Top Priorities: • Explore emerging initiatives and ongoing programs and projects, as well as address the challenges of funding • Analyze existing systems and issues of interoperability and standardization within geospatial software • Reveal advances in GIS development, and the integration and implementation across various applications

RShG-1 Assault Weapon 58 The Counter Terrorist ~ April/May 2013

www.GISforGovernment.com Circle 119 on Reader Service Card


RPO-A, -D and -Z Rocket Flame Throwers

The RPO series of rocket flame throwers was developed to attack numerous targets. They are in service with mechanised infantry and airborne units as a fire support weapon. RPO-D: This weapon creates an effective smoke screen to blind enemy crew served weapon teams, anti-tank teams, ATGM-teams, observation posts, and sniper positions. RPO-Z: This system was developed to create fires in buildings, concrete, and other structures and open terrain covered by flammable vegetation. Caliber (mm)...................... 93 Length (mm)...................... 920 Engagement range (m) • Maximum range... 1,000 • Effective range........ 600 • Minimum range......... 25 Weight (kg)........................ 12 RPO-A, -D and -Z Rocket Flame Throwers

Increasing global instability guarantees that many of these small arms and close combat weapons will find their way into the armories of armies, guerrillas, terrorists, and criminals. It remains to be seen if any of them will displace the AK-47 as the most common firearm on planet earth.

about the author

Mr. Barlow is a former special operations officer of the South African Defence force. He was the founder of the company Executive Outcomes, and eebenbarlowsmilitaryandsecurity blog.blogspot.com. The author is the chairman of STTEP International. He is the author of Executive Outcomes (Galago Publishing, 2007) and Composite Warfare: The Conduct of Ground Forces Operations in Africa (Dec. 2013).

Endnotes

This is the author’s opinion and is based on several years’ experience in the African operating environment. 2 The information contained herein was obtained by the author during discussions with Rosoboron staff at the African Aerospace and Defence Exhibition (2012) 3 The specifications contained herein were extracted from the official Rosoboronexport catalogue, 2012. Similarly, all photographs were obtained from the Rosoboron catalogue. 1

Getting You Where You Need To Be

SEE THE COMPLETE LINE OF MATTRACKS SYSTEMS AT MATTRACKS.COM Karlstad, MN / 877-436-7800 toll free US & Canada 218-683-9800 / 218-436-7000

sales@mattracks.com

12SM00000206

Circle 297 on Reader Service Card

The Counter Terrorist ~ April/May 2013 59


the barrio azteca, los aztecas network

60 The Counter Terrorist ~ April/May 2013


By John P. Sullivan

The US-Mexico border zone is a complex region. Commerce, culture, and crime are linked in a series of complex transactions and connections. Some analysts call it the hyperborder due to its dense human, cultural, and economic interconnectedness. Along this border, 14 sets of twin cities (28 total) link the United States and Mexico.

E

ach of these bi-national urban settings essentially forms a bifurcated metropolitan area. People, commerce, and crime on each side of the border are deeply connected. Familiarity and connections provide opportunity for cross-border drug trafficking and crime. The El Paso-Ciudad Juárez twin cities are home to the transnational Azteca gang network. The gang is known as Barrio Azteca in El Paso and Los Aztecas in Ciudad Juárez.

Origins of Barrio Azteca/Los Aztecas

Barrio Azteca (BA) was founded in 1986 as a prison gang. Several El Paso gang members—Benito “Benny” Acosta, Alberto “Indio” Estrada, Benjamín “T-Top” Olivarez, Manuel “Tolon” Cardoza, Manuel “El Grande” Fernandez, Raúl “Rabillo” Fierro, and José “Gitano” Ledesma—banded together in the Coffield Unit of the US-Mexico border. Photo: Tomas Castelazo

The Counter Terrorist ~ April/May 2013 61


Eduardo Ravelo, an FBI Ten Most Wanted Fugitive. Photo: FBI

Money laundering, extortion, and enforcement are linked on both sides of the border.

Texas Department of Criminal Justice (Corrections) to protect themselves from other prison gangs such as Mexikanemi and the Texas Syndicate, which were at war at the time. They became a powerful prison gang in their own right.2 Under the leadership of Eduardo Ravelo, known as “Tablas,”3 the gang morphed into a comprehensive criminal enterprise operating on both sides of the border. The gang became a hybrid transnational street and prison gang.4 The El Paso Police Department— which has a gang injunction against the BA—observes that “Most of the original members were from the Second Ward (Segundo Barrio) area of El Paso, which is located in the south central region of the city. As the Aztecas grew in numbers, they became involved in the now standard activities of prison gangs: narcotics, extortion, assaults, murders, theft, and intimidation. The Aztecas recruit directly from the pool of street gang members who have been arrested or imprisoned; however, [they] also form alliances and intimidate various street-level gangs who have not progressed to the prison system.”5 The FBI reports: “According to court documents and information presented in court, the Barrio Azteca is a violent street and prison gang that began in the late 1980s and expanded into a transnational criminal organization. In the 2000s, the BA formed an alliance in Mexico with ‘La Linea,’ which is part of the Juarez Drug Cartel (also known as the Vicente Carrillo Fuentes Drug Cartel or VCF). The purpose of the BA-La Linea alliance was to battle the Chapo Guzman Cartel and its allies for control of the drug trafficking routes.”6

Los Aztecas Structure

The BA is configured as a paramilitary hierarchy with a defined internal rank structure. The structure includes capos mayor (president/vice president), capos (captains), lieutenants, sergeants, and soldados/carnal (soldiers). In addition prospectos (prospective members) and esquinas (associates) contribute to gang The U.S. border fence near EL PASO. Photo: Office of Representative Phil Gingrey 62 The Counter Terrorist ~ April/May 2013

activities. The gang’s hierarchy is designed to seek profit and territorial control. While the gang operates both on the street and in prison, the prison is its central authority. Street taxes or “quota” extracted from drug dealers are funneled into prison commissary accounts for BA leaders to dispense favor within the prison system. Coded letters and contraband cell phones are used for communication with the street and the issuance of the green light (or luz verde) targeting for murder, or enforcement action, persons not in good standing with the gang. The gang taxes street-level drug sales in El Paso, West Texas, and southeast New Mexico. Its members have been found in Arizona, California, Colorado, New Mexico, and Mexico (Ciudad Juárez and other parts of Chihuahua). It engages in drug trafficking, money laundering, extortion, intimidation, and murder (enforcement). Other activities include prostitution, kidnapping, arson, and auto theft. According to the FBI, “because of the BA’s alliance with the Juarez Drug Cartel, the gang receives illegal drugs at low cost and profits on its importation, sale, and distribution within the United States.”7 The Aztecas’ allies include several El Paso gangs, including Puro Barrio Sandoval, Barrio Cantu Rifa, Varrio Hacienda Heights, the Colonel Street Locos, and Varrio Northeast. Their rivals include Los Mexicles and the Artistas Asesinos (AA) both linked to the Sinaloa Cartel. The Aztecas are linked with the Juárez cartel and the mercenary enforcement army known as La Línea.

La Línea Links

The Aztecas have chapters in Ciudad Juárez, where they act as proxies and enforcers for the Juárez Cartel (Vicente Carrillo Fuentes Organization). Both the BA and Los Aztecas are believed to be integral components of the La Línea organization. Here the transnational network linkages that permeate the Juárez Plaza are apparent. Money laundering, extortion, and enforcement are linked on both sides of the border. La Línea is a hybrid entity within the array of


Though governed by separate countries, the cities of El Paso, Texas, and Juårez, Mexico, merge into an apparently seamless metropolis in this satellite image. Acquired by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA’s Terra satellite, this false-color image shows a cityscape straddling the Rio Grande, the river that divides the United States an Mexico. Photo: Jesse Allen The Counter Terrorist ~ April/May 2013 63


Mexico 2010, Ciudad Juárez, Mexico. Photo: Astrid Bussink

Azteca tactics, techniques and procedures (TTPs) center on mass shootings; however they are known to employ blocking positions in surrounding areas to support their attacks.

64 The Counter Terrorist ~ April/May 2013

networked non-state actors in Mexico’s narco-conflict. It serves as a protective detail, an enforcement operation, and collectors of street taxes. Its members are a cadre that may serve as liaison officers to other organizations. “La Línea has their networks in gangs like Los Aztecas who are hired killers (sicarios) and the municipal police that protect their precious cargo.”8 9 Together, Los Aztecas and La Línea form a hybrid node in the transnational criminal network. Barrio Azteca is a tier-two enterprise (i.e., a superpandilla) with regional reach working for a tier-one transnational criminal organization (the Juárez Cartel).10 Together with La Línea, it is a specialized variant of a thirdgeneration gang whose members are essentially serving as mercenaries. It has transnational reach through its allies and

inter-networked cross-border gangs and cartel partners.

Azteca Attacks and Tactics

The Aztecas (on both sides of the border) played a key role in the brutal violence in the battle for the Juárez Plaza. Massacres in prison, including Juárez’s Cereso prison, and in the community are their hallmark. Notable prison massacres include the March 5, 2009, attack on Los Mexicles and Artistas Asesinos that left 20 dead11 and the July 26, 2011, attack on Los Mexicles that left 17 dead and 20 injured.12 Community attacks include the Villas de Salvárcar massacre13 where 16 youths (aged 15-20) were gunned down using the Cuerno de Chivo (AK-47) and the October 23, 2010, Horizontes del Sur


El Paso, Texas. Photo: Zereshk massacre where 14 were killed and over 20 injured.14 Both occurred in Juárez and it is believed that the gangsters mistakenly believed rival gang members were at the locations. The Aztecas (in league with La Línea) are also linked to the US Consulate assassinations on March 13, 2010, where three people affiliated with the consulate were killed in two separate incidents.15 Azteca tactics, techniques and procedures (TTPs) center on mass shootings; however, they are known to employ blocking positions in surrounding areas to support their attacks. While they appear to primarily employ small arms, they can be expected to marshal the full range of armament associated with La Línea, including rocket propelled grenades (RPGs), and IEDs (including car bombs).16

Conclusion: Cross-Border Gangsters

Barrio Azteca/Los Aztecas are a networked third-generation/second-tier gang. Together, their network operates on both sides of the Texas Chihuahua border with a prison-street cross-border nexus. They are linked with the Juárez Cartel and La Línea and are active participants in Mexico’s drug war. Their ability to negotiate the human terrain on both sides of the “hyperborder” makes these crossborder gangs a valuable ally to the major cartels. It also makes them a threat to police and communities on both sides of the frontier.

The Counter Terrorist ~ April/May 2013 65


About the author

Mr. Sullivan is a lieutenant in the Los Angeles Sheriff’s Department. He is a senior research fellow with the Center for the Advanced Studies of Terrorism (CAST) and a member of the Advisory Board of Southern Pulse | Networked Intelligence.

Endnotes

Fernando Romero/LAR, Hyper-Border: The Contemporary U.S.-Mexico Border and its Future (New York: Princeton Architectural Press, 2008). 2 “Barrio Azteca,” Prison Offenders, http://www.prisonoffenders.com/barrio_ azteca.html. 3 Federal Bureau of Investigation,“New Top Ten Fugitive: Leader of Violent Barrio Azteca Gang,” news release, October 20, 2009, http://www.fbi. gov/news/stories/2009/october/ ravelo_102009. 4 John P. Sullivan, “Transnational 1

Gangs: The Impact of Third Generation Gangs in Central America,” Air & Space Power Journal—Spanish Edition, July 1, 2008,http://www.Airpower.maxwell. af.mil/apjinternational/apj-s/2008/2tri08/ sullivaneng.htm. 5 El Paso Police Department, “An Innovative Tool to Create safe Communities,”, http://www.elpasotexas. gov/police/gang_injunctions.asp 6 Federal Bureau of Investigation, “Barrio Azteca Leader Sentenced to Life in Prison and Two Barrio Azteca Soldiers Sentenced to 20 and 30 Years in Prison,” press release, El Paso Division, June 29, 2012,http://www.fbi.gov/elpaso/ press-releases/2012/barrio-azteca-leadersentenced-to-life-in-prison-and-twobarrio-azteca-soldiers-sentenced-to-20and-30-years-in-prison. 7 Ibid. 8 “La Línea,” Borderland Beat, October 14, 2009, http://www.Borderlandbeat. com/2009/10/la-linea.html; 9 John P. Sullivan and Samuel Logan,

GW COLLEGE OF PROFESSIONAL STUDIES • ARLINGTON Master of Professional studies

security and safety leadershiP learn from experts in homeland security policy, law enforcement cooperation, public safety leadership, emergency management, and cyber security. Choose to focus your studies: • fundamentals of strategic security • strategic cybersecurity enforcement. Attend convenient classes. one evening per week and one saturday a month in arlington, Virginia. complete a master’s degree in approximately 16 months. www.cps.gwu.edu/security-leadership

Information Sessions Monday, April 22 6:30 pm Monday, May 20 6:30 pm 950 N. Glebe Rd., 6th Floor Arlington, VA 22203 Metro: Orange Line to Ballston RSvp Today! 703.248.2800 www.cps.gwu.edu/ security-leadership

for a list of all GW graduate programs, visit www.gwu.edu/gradapply.

the GeorGe WashinGton uniVersity is an equal oPPortunity/

38386 affirMatiVe action institution certified to oPerate in Va by scheV.

66 The Counter Terrorist ~ April/May 2013

Circle 283 on Reader Service Card

“La Línea: Network, Gang, and Mercenary Army,” The Counter Terrorist, Vol. 4, No. 4, August/September 2011. 10 Samuel Logan has developed a three tier ranking of criminal enterprises operating in Mexico. Tier-one enterprises are transnational criminal organizations; tier-two organizations are regional superpandillas that often work for tierone entities; tier-three entities are local street gangs. Tier-two entities correspond to second or third generation gangs; tier-three entities correspond with first generation gangs. See Ciudad Juárez Criminal Environment, Southern Pulse, 2012 and John P. Sullivan, “Maras Morphing: Revisiting Third Generation Gangs, Global Crime, Vol. 7, Issue 3-4, 2006, p.478-504. 11 “Mexican Prison Riot ‘Kills 20,’” BBC News, March 5, 2009, http://news.bbc. co.uk/2/hi/americas/7924815.stm. 12 Jo Tuckman, “Mexican Prison Massacre That Left 17 Dead Captured on Video,” The Guardian, 28 July 2011, http://www.guardian.co.uk/world/2011/ jul/28/mexican-prison-massacre-video. 13 Mario Héctor Silva, “Juárez Llora; Exigen Justicia Tras Matanza,” El Universal, February 2, 2010, http://www. eluniversal.com.mx/estados/74615.html. 14 Elisabeth Malkin, “Death Toll in Juárez Attack Rises to 14,” The New York Times, October 24, 2010, http:// www.nytimes.com/2010/10/25/world/ americas/25mexico.html?_r=0. 15 Marc Lacey and Ginger Thompson, “Two Drug Slayings in Mexico Rock U.S. Consulate,” The New York Times, March 14, 2010, http://www. nytimes.com/2010/03/15/world/ americas/15juarez.html?pagewanted=all. 16 Sullivan and Logan, “La Línea” and John P. Sullivan, “Explosive escalation: Reflections on the Car Bombing in Ciudad Juárez,” Small Wars Journal, 21 July 2010 at http://smallwarsjournal. com/blog/journal/docstemp/474sullivan.pdf.


Introducing Your New Visitor Management Solution...

Complia with HSPDnt Homeland Sec 12 urity Presidentia Directive l Since 2003, Security Solutions International (SSI) has taken a holistic approach to security and is the leading provider of Identity Management Solutions for the Maritime industry, Education, Healthcare, Corporations, Government and Law Enforcement Agencies.

The New leader in Identity Management for Schools The SSI Visitor Management System thoroughly complies with initiatives such as the Jessica Lundsford Act requiring thorough identification of those accessing educational facilities. The system cross checks Criminal, Sex Offender, and Internal Watch Lists. As schools recognize a need for greater security, they are identifying visitor management as essential front line protection in controlling and tracking individuals gaining access to school facilities. Schools utilizing the SSI Visitor Management System are processing thousands of visitors, contractors and vendors daily. Once a visitor is cleared, a photo badge is instantly printed designating expiration and final destination. The system is easy to use and completes the process in seconds. Additionally, the system generates an electronic audit trail of all activity that can be printed, emailed or stored for later retrieval for management or investigative reports. The SSI Visitor Management System acts as a frontline deterrent, eliminating the opportunity for undesirables to act on their intentions.

LEARN MORE at:

www.homelandsecurityssi.com/products

Call now for more information.

Phone: 866-573-3999 Fax: 866-573-2090 Circle 239 on Reader Service Card contact@securitysolutionsint.com

Circle295 295on onReader ReaderService ServiceCard Card Circle

SSI

SECURITY SOLUTIONS INTERNATIONAL

Protecting the Homeland Together 速

The Counter Terrorist ~ April/May 2013 67


international Resources ITW Nexus Advanced Products and Accessories A Division of Illinois Tool Works Inc. Throughout the years, ITW Nexus APA’s breadth of engineered products has expanded exponentially. Our mission is to outperform conventional solutions while conforming to strict performance and quality standards. We provide unique access to the newest advances in research and development across a wide spectrum of applications. Divisions such as Nexus, Fastex, and our new Advanced Products and Accessories division are known throughout the world for their history of quality and innovation. Now these products and associated technologies are being made available to all end-users through our expanding group of strategic distribution partners, targeted at value-added opportunities in the Commercial/Industrial, Military/Defense, Law Enforcement, Hunting/Outdoor, Maritime and Personal security markets. In addition to our world class high performance plastic and metal hardware, find end user accessory products like the FASTmag, Grimloc, TacLink, Web Dominator, Quick Cap Connector, MASH Hook and CLASH Hook at www.itwmilitaryproducts.com. Please contact us for more information or to find a an authorized source for ITW Products. www.itwmilitaryproducts.com

K2B International In today’s business world it’s knowledge that drives opportunities and advancement. K2B International, standing for Knowledge 2 Business, is dedicated to creating content-rich communities – in the form of technical training courses, conferences, summits and online portals – providing platforms for gaining knowledge when it’s needed most. Delivering practical insights from seasoned practitioners, each K2B forum empowers participants to make a real difference in their organisations. For more information about K2B International’s training courses, please visit www.k2binternational.com or email marketing@k2binternational.com

Milipol qatar Milipol Paris is the worldwide event of the internal State security market for all public and industrial security professionals. Participate at the 18th edition of Milipol Paris, 19-22 November 2013: • meet the key international players of the public and industrial security sector, • discover and discuss new trends, products and services of the market, develop your business! www.milipol.com Milipol Qatar is the foremost exhibition of the key players involved in the Middle East internal State security sector. Milipol Qatar 2012 boasted record participation at the region’s premier security show: • 244 exhibitors – coming from 37 countries – 97% of them were satisfied with their participation • 5,820 visitors – coming from 66 countries – 96% of them were satisfied with their visit Attend the 10th edition of Milipol Qatar, 10-12 November 2014! www.milipolqatar.com

68 The Counter Terrorist ~ April/May 2013

Circle 81 on Reader Service Card


Innovative Products RECONYX Camera These Cameras are used by law enforcement agencies to provide covert 24/7 surveillance where no power or communication lines exist. Both the License Plate Capture and General Surveillance models are capable of operating outdoors with battery life up to a year. When equipped with the cellular upgrade option the camera will provide near instant notification of an intrusion by transmitting images directly to your cell phone or computer. www.reconyx.com

Mini-CALIBER Robot This SWAT tool is designed to increase situational awareness and allow resolution of dangerous incidents from a distance. Wireless RF control, 5 onboard cameras (color, IR, and zoom cameras), 2-way audio communication, remotely controlled front/rear flippers for stair climbing, and a robotic claw to open doors and manipulate objects allows search and clearance, gathering audio and video intelligence on barricaded suspects, delivers packages, and supports crisis negotiation without putting team members in harm’s way. www.icortechnology.com

CQB-11 This Bravo Company rifle is the CQB model of one of the highest quality families of rifles available. It features: select fire (auto or burst), a BCMGunfighter charging handle, USGI 5.56mm, flat top receiver, chrome lined bore and chamber, manganese phosphate barrel finish, and many other innovations designed to deliver the highest performance. Bravo Company Manufacturing is a leader among a growing number of companies standing up for the Second Amendment! www.bravocompanyusa.com

The Counter Terrorist ~ April/May 2013 69


Counter

advertiser index

The

APRIL/maY 2013

Volume 6 • Number 2

Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, visit our website www.thecounterterroristmag.com/advertising.asp or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page

Ad/Company • website and/or email........................................................................................................ RSN Number

44 43 55 24 7 4 28 22 28 44 47 66 58 27 23 57 28 35 54 41 3 36 59 29 15 2 73 11 12 28 35 75 54 40 71 45 25 30-31 67 76 13 19 24 39 18 26 12

4th Annual Border Management Southwest • www.bordersouthwest.com........................................... 168 8th Annual Homeland Security Professionals Conference • www.terrorconference.com....................... 177 Adams Industries • www.adamsindustries.com...................................................................................... 308 ALLRed - Armadillo Tactical Gear • www.armadillotacticalgear.com...................................................... 131 American Public University • www.amuonline.com/counter-terrorist...................................................... 211 Barrett Firearms Manufacturing • www.barrett.net.............................................................................. 121 Border Management North Summit • www.bordermanagementsummit.com......................................... 115 Center for Rural Development • www.ruraltraining.org........................................................................ 265 Cyber Defense and Network Security Summit • www.defensecybersecurity.com................................... 148 Data Center Consolidation Summit • www.dccevent.com..................................................................... 289 Elite K9 • www.elitek9.com.................................................................................................................... 277 George Washington University • www.cps.gwu.edu/security-leadership............................................... 283 GIS for Government • www.gisforgovernment.com................................................................................ 119 Golden Engineering • www.goldenengineering.com.............................................................................. 83 Golight Inc • www.golight.com.............................................................................................................. 285 Homeland Security Network • www.homelandsecuritynet.com.............................................................. 19 Human Geography 2013 • www.humangeographyevent.com............................................................... 113 Icor Technology • www.icortechnology.com........................................................................................... 81 J & N Tactical • www.jntactical.com....................................................................................................... 155 K9 Cope Magazine • www.k9copmagazine.com................................................................................... 279 Lenco Industries Inc. • www.lencoarmor.com......................................................................................... 13 Lithos Robotics • www.lithosrobotics.com.............................................................................................. 307 Mattracks • www.mattracks.com........................................................................................................... 297 Military1.com • www.military1.com...................................................................................................... 335 National Homeland Security Conference • www.la2013conference.org............................................... 317 NEMO Arms • www.nemoarms.com...................................................................................................... 237 NTOA • www.ntoa.org.......................................................................................................................... 222 Patriot3 • www.patriot3.com................................................................................................................. 301 PoliceTraining.net • www.policetraining.net.......................................................................................... 191 Prisons & Correctional Facilities West • www.prisonscorrectionalfacilities.com....................................... 293 Reconyx • www.reconyx.com................................................................................................................ 303 Remploy • frontline.remploy.co.uk......................................................................................................... 331 Southern New Hampshire University • www.snhu.edu/ct.................................................................... 111 Southern Police Equipment • www.southernpoliceequipment.com.......................................................... 343 SSI Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com........................... 215 SSI PVBs • www.ssipvb.com.................................................................................................................. 226 SSI SWAT-MACTAC • www.homelandsecurityssi.com............................................................................... 228 SSI Victory Boots • www.ssitacticalgear.com.......................................................................................... 291 SSI Visitor Management System • www.homelandsecurityssi.com/products........................................... 295 Sturm, Ruger & Co., Inc. • www.ruger.com/sr-series............................................................................. 347 Tactical Products Gear • www.tacprogear.com...................................................................................... 101 Tactical Products Group Inc. • www.tacprogroup.com........................................................................... 145 Tex-Shield • info@tex-shield.com........................................................................................................... 29 TGA Readiness Action Division • www.taniaglenn.com......................................................................... 147 The Counter Terrorist Magazine • www.thecounterterroristmag.com/subscribe.php................................ 255 Thorshield - G Squared Consulting • www.thorshield.com.................................................................... 97 Zistos • sales@zistos.com...................................................................................................................... 311

70 The Counter Terrorist ~ April/May 2013


SSI

SECURITY SOLUTIONS INTERNATIONAL

®

The Advanced Global Security Workshop in

Israel The experts on training in:

the Homeland Security professional’s best resource

Since 2005, SSI has taken nearly 500 First Responders to Israel and shown them the basics of the Israel security concept. Thanks in part to that program, we are better able to defend ourselves in the United States. In response to demand, we are now offering a once-in-a-lifetime experience covering the following advanced subjects:

May 17-25,

2013

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel’s northern border. Hostage Rescue - Discover how they go wrong. Hospital Response - Find out how Israel’s critical response hospitals handle surge and multi-casualty incidents. Israel Counter Terrorism units - Learn how they operate. Israel National Police - National Academy; See how they train? Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system. Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

www.homelandsecurityssi.com

LEARN MORE at: Call now for more information. Circle 215 on Reader Service Card

Phone: 866-573-3999 Fax: 866-573-2090 info@homelandsecurityssi.com Circle 50 on Reader Service Card Circle 215 on Reader Service Card

SSI

SECURITY SOLUTIONS INTERNATIONAL

®

Protecting the Homeland Together ®

The Counter Terrorist ~ April/May 2013 71


Training Review

CDG Advanced Handgun Skills By Mac Mackinzie

“Among the many misdeeds of the British rule in India, history will look upon the act of depriving a whole nation of arms, as the blackest.” - Mahatma Gandhi

O

n December 13, 2012, Min Yingjun stabbed 22 children in one of China’s many school attacks. On December 14, 2012, Adam Lanza shot 20 children and six adults at the Sandy Hook Elementary School. Such attacks, along with the advancement of ill-conceived “gun control” legislation, have created a national buying frenzy for firearms and expanded interest in firearms training. Also, in December 2012, a dozen returning students attended Critical Defense Group’s two-day advanced handgun skills course. On a cool Texas day, after a thorough safety briefing, we proceeded to a square range for our end-of-the year shot at “the title.” No dry-fire practice, no warm-up shoot. We stood on the 10 yard line, loaded and ready. The challenge was three shots to the chest and one to the head in the “A” zone of a standard IPSC target under time constraint. Students were taught from day one of involvement with CDG that misses are unacceptable. As responsible shooters, we must be accountable for every shot fired to insure bystander safety. Photos courtesy of Mac MacKinzie.

72 The Counter Terrorist ~ April/May 2013


Circle 222 on Reader Service Card

The Counter Terrorist ~ April/May 2013 73


Students were reminded of the importance of mastering the fundamentals of shooting. We worked on:

• • • • • • •

Stance/Position Grip Sight Alignment Sight Picture Trigger Control Controlled Breathing Fire/Follow Through

With the fundamentals in place, students could accurately diagnose to an instructor why they may have missed a shot. After our initial shoot, we began implementing additional live fire drills, which included stationary turns or pivots from different directions, kneeling fire, shooting on the move, barricade fire, close quarter engagements from positions two and three, speed reload drills involving a shot timer, shift/failure-to-stop drills, low-light engagements, supine shooting, position sul shooting, extended range fire, and support hand shooting with reloads. We finished day two with a timed course of fire qualification and a written exam requiring a perfect score to pass. Students had the opportunity to fire at a steel IPSC target at ranges exceeding 50 yards and one close to 100 yards. By late afternoon of the second day, students were required to shoot the qualification course (60 rounds) for a maximum score of 300 and a passing score of 90 percent or better. Support hand draw with 6 rounds fired and a support-hand-only reload proved to be very challenging for all the students. This was just one of the many requirements at distances starting at 25 yards and ending at 7 yards. The experience reminded students how important it is to be well rounded in using a handgun safely with either hand should the dominant hand become disabled. The end result was a 100 percent failure. Students were humbled, but they identified their weaknesses. We ended day 2 with our timed course of fire starting with a barricaded position at 25 yards and a bonus target at 35 yards,

74 The Counter Terrorist ~ April/May 2013

replicating a head shot with a subject behind a vehicle. Several students made the bonus shot. Upon completion of the class, I could see the disappointment in some students, motivation in others, and peace in some. I explained to the students that they were paying me to share my experience, training, and skills and that one of the priorities of my school is to never allow students to stay in their comfort zones. We will always be learning and growing. The course was designed with a 90 percent failure rate anticipated. The moment you choose to live your life in a comfort zone, you are slowly dying. I always push standards so my students will stay ahead of their opponents. The two school attacks we started with have something in common— tragedy. They also have a significant difference. Chinese citizens have been stripped of the means of defending

themselves by their oppressive communist government. In recognition of the fact that each American cannot be assigned a bodyguard, Americans are guaranteed the right to defend themselves with firearms by the Second Amendment to the U.S. Constitution. One can only wonder… If just one of the adult victims at Sandy Hook had not been prohibited from being armed, and was in possession of the most basic level of fighting proficiency, how many of those twenty murdered children might be alive today? www.criticaldefensegroup.com

Mr. Mackinzie is a former ANGLICO Marine, competitive shooter, personal security specialist, security manager, and project manager. He has trained hundreds of personnel from military, security and law enforcement agencies worldwide. He is director of Critical Defense Group.


High Comfort & High Protection CBRN Oversuit

Kestrel

High Comfort & High Protection CBRN Oversuit The Kestrel is a highly comfortable and highly protective two piece CBRN oversuit harnessing much of the technology used in the Phoenix Lightweight Protection suit. At around 30% lighter than conventional systems, it provides qualified CBRN vapour protection with the added benefit of water/oil repellence and fire retardant coatings, thus making the Kestrel an extremely versatile CBRN protection system for use in multiple CBRN threat environments

For further information: W: http://frontline.remploy.co.uk E: frontline@remploy.co.uk

T: +44 (0) 151 630 3811

Frontline Circle 331 on Reader Service Card

The Ketrel is constructed using a lightweight activated carbon liner, combined with a breathable, rugged and anti-rip outer. • Lightweight and breathable, the Kestrel has been tested using the Avon FM12 respirator, and can be configured to suit many other types of respiratory protection Highlights • • • • • • • • • • •

Conforms to NATO standards High protection High air permeability Greater comfort and low physiological burden 20 times launderable 10 year shelf life Compatible with a range of accessories Fire retardant and water/oil repellent Stand alone garment or overgarment Rugged and durable Available in various colours and camo patterns

The Counter Terrorist ~ April/May 2013 75


THE RUGER

®

SR45

Like the popular Ruger® SR9® and SR40® pistols, the SR45™ is perfectly sized to be comfortable and controllable with a slim, ergonomic grip and narrow slide. A short reach from the backstrap to the trigger creates a comfort level that will challenge any standard-sized, strikerfired pistol available today. Its structurally rigid, recoil-reducing, glass-filled nylon frame and alloy or stainless steel slide combine to create a lowmaintenance, rugged and reliable handgun.

Large Caliber Pistol with a Trim, Ergonomic Profile

High Visibility 3-Dot Sight System

Unique Reversible Backstrap is Adjustable for a Flat or Arched Fit

Ambidextrous Thumb Safety and D-Shaped Ambidextrous Magazine Release

Ships with Two Flush-Fit, 10-Round Magazines

Brushed Stainless or Black Nitride Finishes

LEARN MORE ABOUT THE FULL LINE OF SR-SERIES PISTOLS ONLINE AT:

WWW.RUGER.COM/SR-SERIES WWW.RUGER.COM/SR45

Circle 347 on Reader Service~Card 76 The Counter Terrorist April/May 2013

©2013 Sturm, Ruger & Co., Inc.

121812


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.