The Counter Terrorist Magazine - February/March 2010

Page 1

fort hood attack • undercover influence • cyber jihad • s.a.r.s.

Counter The

Official Journal of the Homeland Security Professional February/march 2010

Volume 3 • Number 1

u.n. peacekeeping Operations in africa

An SSI Publication ®

february/march 2010 USA/CANADA $5.99

www.thecounterterroristmag.com The Counter Terrorist ~ February/March 2010 1


TruDefender FT When every second counts, reliable results are at your fingertips.

From the makers of FirstDefender, the revolutionary TruDefender FT handheld FTIR system enables identification of an even broader range of unknown chemicals—right in the hotzone. • Complements FirstDefender to maximize in-the-field coverage of unidentified chemicals including TICs/TIMs, chemical weapons, explosives and more • Ground-breaking design—fits in your hand, lightweight, yet rugged enough for field use • Fast and easy to use—delivers accurate results in less than a minute, even for complex mixtures

TruDefender | FT FTIR

FirstDefender Raman

To register for an upcoming seminar: +1.978.642.1132 or www.ahurascientific.com/ct Made in the USA

2 The Counter Terrorist ~ February/March 2010

Circle 175 on Reader Service Card


The Counter Terrorist ~ February/March 2010 3 Circle 99 on Reader Service Card


Homeland Defender

TM

by

The world’s first certified breathable CBRN ensembles. *

WZ9430 MIRT Ensemble

WZ9435 XRT Ensemble

HZ9420 MultiThreat Ensemble

-

NFPA 1994 (2007 edition) Certified GORE® CHEMPAK® fabrics Form-fitting designs for superior mobility Durable fabrics and construction for safer CBRN operations Breathable for extended duration response* Reusable - multiple wash/dry cycles**

www.blauerhomelanddefender.com *WZ9430 and WZ9435 only **HZ9420 and WZ9430 only

4 HD_ad_7.25 The Counter Terrorist ~ February/March 2010 x 10.indd 1

ISO 9001:2000 Certified

Circle 91 on Reader Service Card 10/5/2009 12:47:27 PM


Counter The

february/march 2010

Volume 3 • Number 1

Official Journal of the Homeland Security Professional

COVER story: U.n. peacekeeping 34 operations in africa

contents

34

8

48

58

By Eeben Barlow

FEATURES: 8

Firsthand: agents of influence in undercover operations By Bill Majcher

Case Study: 20 fort hood attack

By Richard Marquise

The Suspicious Activity Reporting 48 System and the Citizens’ Role

By Dr. Ross L. Riggs

in Cyberspace 58 Jihad By John Bumgarner and Michael Mylrea

departments: 6 From the Editor Expert of What? 30 Book Review Architect of Global Jihad: The Life of

Al Qaeda Strategist Abu Mus’ab Al-Suri

69 Innovative Products Storm Pac, Mirage Camo 72 Training Review .50 Long Rifle Cover Photo: ©istockphoto.com/

The Counter Terrorist ~ February/March 2010 5


Counter The

From the editor:

Expert of What?

S

By Chris Graham

Official Journal of the Homeland Security Professional

Volume 3 • Number 1

ince June, 2009, a self described “progressive Washington, D.C. based think tank” has inundated me with emails requesting that I interview their two “national security experts”. Where did these two “experts” gain their expertise? One gained his expertise as a military reservist civil affairs officer and the other as a political campaign staffer. According to their publicist, they are “experts”. “Experts” are everywhere. Any news channel can provide a retired general or PhD to render their opinion on a given subject. Of course, many of the military experts will never have personally been involved in a successful real world operation of the type being discussed. Many of the PhD’s will never have visited the region for which they claim expertise. See Nassim Taleb’s book, The Black Swan, for additional enlightening entertainment on the subject of “experts”. The Counter Terrorist, however, has always been discriminating in selecting the writers that we bring to you. In this issue, you will, as always, find insight in each article that is not available elsewhere. In our case study you will find the authoritative report of a former FBI agent on the Fort Hood shootings and in our cover story, Eeben Barlow has provided an assessment of United Nations stabilization operations in Africa. Mr. Barlow, founder of the company Executive Outcomes, has been alleged to be complicit in many illicit activities in previous years. I can neither confirm nor refute any of those allegations. I can, however, confirm that he is one of extremely few living men to have run multiple successful counter-insurgency and counter-terrorism campaigns. Ignore his insight at your peril.

Semper Fidelis, Chris Graham Editor of The Counter Terrorist

February /march 2010

Editor Chris Graham Director of Operations Sol Bradman Director of Advertizing Carmen Arnaes Director of Production Kelli Richardson Contributing Editors John Andrews Jennifer Hesterman Richard Marquise J.J. Stepien Graphic Design Morrison Creative Company Copy Editor Laura Town Office Manager Lily Valdes Publisher: Security Solutions International 13155 SW 134th St. • STE 204 Miami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, The Official Journal of the Homeland Security Professional, is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: PARS International Corp. Web: www.magreprints.com/quickquote.asp Email: reprints@parsintl.com Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com © 2010 Security Solutions International

6 The Counter Terrorist ~ February/March 2010


Tactical dominance. Now available in small. www.remotec.northropgrumman.com

ODF EYE DRIVE

©2009 Northrop Grumman Corporation

360º Video + Audio Touchscreen Control Point ‘n Go™ Navigation 24 hr. Standby Throwable Durability One man transport & operation Video Motion Detection Call today for more information

The Remotec/ODF Eye Drive is a small, lightweight, and throwable tactical vehicle that allows you to observe spaces before entering, and record video with motion detection. The Eye Drive system also incorporates a unique, portable touchscreen OCU, and the ability to deliver payloads up to 8 lbs. With audio and complete 360º video, you’ll have the full picture without placing you or your team in harm’s way. Contact Remotec today for more information.

73 on Reader Service The Counter Terrorist ~Circle February/March 2010Card 7


Firsthand:

Agents of Influence in

Undercover

Operations By Bill Majcher

As a long term undercover (UC), I enjoyed a 100% success rate of engaging each target that I was sent out to meet. I have never once had the luxury of having a cooperating witness (CW) or another well placed UC to introduce me into the target group. On every occasion, I have had to make a “cold approach” to a target or a targeted organization.

Counter The

8 The Counter Terrorist ~ February/March 2010

©istockphoto.com/


T

his has included the Medellin Cartel, Sikh terrorists, Vietnamese gangs, Chinese triads, outlaw bikers, traditional organized crime (Italian, Greek Mafia), corporate CEO’s, lawyers, bankers and Iranian groups. I am an average white male and I only speak English (and some French). I grew up in a normal middle class military family. I am Catholic, relatively athletic with average intelligence, and yet I was able to engage each and every target, even though I had no cultural, religious, political or even language commonality with many of them. In some cases, I met targets in countries or cities that I had never visited before. Many of these targets were paranoid by nature and living violent lives. Why was I successful? Because I understood early in my career that SELF-INTEREST is the most powerful motivator of the human species. I didn’t care what country the targets were

from, what their religion was, what group or gang they belonged to, how many wives they had or how rich they were. I just needed to make sure we could communicate. This fundamental understanding of “self-interest” was taught to me by my father, and I have never forgotten the lesson.

©istockphoto.com/

My Father’s Lesson During the Cold War, my father was a Canadian military representative at NATO. Popular books and movies at that time often showed Russia as an evil empire, ergo suggesting that all Russians were evil. I was about 12 years old and I commented on an article in the newspaper describing some alleged Russian atrocity. I said that I hated Russians and it was too bad that they couldn’t all be wiped out. My father stopped what he was doing and asked me why I would make such a statement. He asked if I had ever met any

I didn’t care what country the targets were from, what their religion was, what group or gang they belonged to, how many wives they had or how rich they were. I just needed to make sure we could communicate.

The Counter Terrorist ~ February/March 2010 9


GSG 9 Fragmentary Order. Photo courtesy of the author.

©istockphoto.com/

I only needed to determine which agent of influence—greed, power or ego—or which combination of agents would allow me to become a person of interest to the person I was targeting.

Russians, and I said no. He asked if I thought Russians laughed and cried just like us, and I said yes. He said he had a counterpart in the Russian military and most likely his counterpart had a family with children. My father asked me if I thought this Russian father wanted his children to be safe and happy and to have a better life than what he probably had growing up, and I said yes. He then asked me if I thought these Russian children would rather play with me or kill me, and I said that they would probably want to play. My father went on to tell me that he had family members who had been murdered by the Soviets and that his aunt had spent time in a Siberian Gulag, and that he hated their political system but not the Russian people. My father said that, but for the grace of his parents immigrating to Canada when they did, I could easily have been a

10 The Counter Terrorist ~ February/March 2010

child with a father in the Soviet military. The point that resonated with me from this conversation was simple…people have similarities in goals and aspirations, regardless of race, religion or creed. It is often the methods that some people utilize to attain their objectives that we must fight against. I am confident that Osama bin Laden was happy when his children were born. I suspect he gets angry or sad when they do something he doesn’t like. If I am able to facilitate satisfying bin Laden by facilitating his achievement of a need or desire, will he have a relationship with me? Under the right circumstances, of course he will. Whether it is criminals lusting for money and power, or terrorists driven by ego and alien beliefs, they are still open to methods and people who can facilitate their desires, thus making a proper undercover approach possible.


Circle 29 on Reader Service Card

The Counter Terrorist ~ February/March 2010 11


Circle 49 onCounter Reader Service Card 12 The Terrorist ~

February/March 2010

Circle 135 on Reader Service Card


Airline Bombing On June 23, 1985, an Air India 747 with 329 people on board left Montreal bound for India via London. A bomb exploded on the aircraft just off the coast of Ireland, killing all aboard and representing the single deadliest terrorist attack involving an aircraft prior to 9/11. Two hundred eighty Canadians were murdered that day. A second bomb designed to blow up a Canadian Airlines flight bound for India from Vancouver had gone off moments earlier, killing two

blown out of the sky with another 300 or so fatalities. The previous year, Sikh militants had assassinated Indira Gandhi, the Indian Prime Minister who had ordered the army to storm the Golden Temple, the most sacred of Sikh temples, and arrest insurgents and terrorists who were hiding there. The storming of the Temple enraged many Sikhs worldwide and created a schism within the Sikh community that pitted extremists against moderates in temples around the world. The Golden Temple was more than a holy

Šistockphoto.com/ baggage handlers at Narita Airport as August 21-29, 2009 they were Mission: preparingAugust to reload the plane November Mission: November 6-14, 2009 for continuation of the flight to India. Because the flight was delayed arriving at Narita, it was two hours late departing for India, otherwise it, too, would have been

site alone. Pitched gun battles took place there for many days before the Temple was overtaken by the Indian Army, which found a large weapons cache hidden in the basement of the Temple. It would be many years before a

The Counter Terrorist ~ February/March 2010 13


I was able to sit beside him on a long flight and, by the time the flight ended, we had agreed to meet for dinner.

number of suspects were identified as having masterminded and contributed to the events surrounding the horrific aircraft bombings. One of the accused was active in the Sikh community as a business leader, with close links to the Baba Khalsa and the World Youth Sikh Federation. Both groups are identified today as terrorist organizations. Both groups were very active in drug trafficking as part of their fund raising efforts. I was tasked with engaging the Sikh business leader who was widely believed to have financed these bombings. He was arrested. In jail, I became his cell mate. My bosses were not expecting me to obtain evidence or a confession. They were mostly interested in gaining some insight before interrogation teams were set upon him. I learned what I could about this target and it was apparent to me that he was simply a greedy, narcissistic man who saw

that the militants were taking over the various Sikh temples, and that whoever controlled the temples controlled the temple finances, which totalled millions of dollars. By aligning himself with the militants and by demonstrating his support for them, he gained control of much of the money flowing through the temples. He thus contributed financially to the terrorists bent on causing as much death and destruction as possible in order to destabilize the Indian government. When I met this individual, I portrayed myself as an arrogant stockbroker who had been arrested for fraud and, after proclaiming my innocence, I used my “facilitator of commerce” line. He opened up and was happy to talk with me, telling me about his various business interests and how I should meet his wife and sons when I got out of jail to see if we could do business together. He did not appear overly stressed about being in jail and, in

Protective security equiPment At ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support. • • • • •

CALIBER® Robot Hook & Line Kits Search Mirrors EOD Hand Tools Search Kits

ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3 Tel: 613.745.3600 I Fax: 613.745.3590 I Email: sales@icortechnology.com Toll Free: 1.877.483.7978 www.icortechnology.com 14 The Counter Terrorist ~ February/March 2010

Circle 81 on Reader Service Card


NO OTHER LAW ENFORCEMENT GAS MASK HAS THIS MUCH MILITARY PEDIGREE. • • • • •

Latest U.S. military technology Increased mask comfort, reduced wearer burden Superior vision from polyurethane visor and outserts Upgraded communications and improved weapon integration Multiple accessories with operator replaceable repair parts

GR00191-02

Circle 337 on Reader Service Card

The Counter Terrorist ~ February/March 2010 15


>

new program for 2010 > Global expertise > Global best practices

An intensive advanced workshop for the Homeland Security Professional

GlobalSecurity workshop May 7-15, 2010 >

>

>

>

>

TEL AVIV,

israel

Join the more than 300 Homeland Security Professionals that have selected SSI’s training in Israel program. Over 15 missions from 2005 to 2009. The most successful program for overseas training in Homeland Security... > Multi-Casualty Incidents > Mass Evacuations > Government and Private Security Concernss > Visit Jerusalem and learn how to apply Safe City Initiative to your jurisdiction > Excursions to Israel’s cherished sites: Masada, Dead Sea, along with the opportunity to learn, interact and network with the world’s leading experts... > > > > > >

Register Today...

info@homelandsecurityssi.com • 866-573-3999

www.homelandsecurityssi.com Circle 215 on Reader Service Card

16 The Counter Terrorist ~ February/March 2010

SSI

® Protecting the Homeland Together ®

SECURITY SOLUTIONS INTERNATIONAL

Circle 37 on Reader Service Card


my view, seemed to almost be enjoying his “special” status. He appeared to be guided by ego and greed and was easy to engage. My views on this subject were later affirmed. He had wanted others to carry bombs onto planes and sacrifice themselves for the greater cause, but he wasn’t prepared to martyr himself or sacrifice the lives of his children as de facto suicide bombers. Self-interest, as he saw it, decided the actions that he took.

beginning of a three year relationship which grew to the point where I was asked to be the financial front man for the legitimate investments the Cartel wanted to make in North America. They were already alive to the ramifications of the North American Free Trade Agreement that would soon

be implemented, and were looking to buy trucking and warehousing facilities along the Canadian/US and US/Mexican borders. Even then, they were investing heavily in infrastructure and businesses in Mexico. It was during this undercover operation that I developed “the line”

Greed, Power or Ego When I met a target, I knew that I only had to identify what the agent of influence would be for me to successfully engage, manipulate, and ingratiate myself to the target. I only needed to determine which agent of influence—greed, power or ego—or which combination of agents would allow me to become a person of interest to the person I was targeting. Obviously, I often had the benefit of surveillance reports and detailed profiles that provided me with intelligence and insights regarding the target or the organization that they were a part of. We tend to complicate and overanalyze the people we are after. I have always believed in the “keep it simple” approach. Let’s face it, organized crime (OC) does not exist to sell drugs, commit fraud or intimidate people. OC exists to make money, pure and simple. Greed and ego were, for me, the most common points at which to develop a relationship.

Medellin Cartel When I did a cold approach into one of the primary “cambionistas” for the Medellin Cartel in 1993, I already knew that the target fancied himself a sophisticated financial player. I was able to sit beside him on a long flight and, by the time the flight ended, we had agreed to meet for dinner. This was the

Circle 51 on Reader Service Card

The Counter Terrorist ~ February/March 2010 17


and the persona that worked so well for me throughout my career. When the Colombian asked me what I did for a living I replied, “I am a facilitator of commerce. I don’t care where the money comes from and I don’t care what the investment opportunity is, I simply try to match money to opportunities.” The beauty of using this line is that I could be flexible, either having money laundered on my behalf or being the one doing the laundering. Thus, it allowed me to keep my options open. The concept of self-interest reared its head often during this lengthy operation. One conversation that I recall occurred when a major Cartel money launderer advised me that he wanted to move out of Colombia. When I asked him why, he became hardened and said his oldest son would be 17 the following year and would be drafted into the army.

He advised me that he did not raise his children and send them to private schools around the world so they could be killed in the jungles by some narco-terrorist! Interesting that he didn’t mind facilitating the most murderous criminal group on the planet because he made a good living from it, but when it meant that his son might die in the jungle fighting the very group that he worked for, he wanted to bail.

character that all human beings possess. Working undercover is nothing more or less than relationship building. The skilled undercover just has to keep it simple and recognize that base people are guided by base ideals, and that it is the job of the undercover to recognize what type of motivation is at work and exploit it.

Relationship Building

Mr. Majcher retired from the Royal Canadian Mounted Police as an Inspector after 22 years of service. The author was a highly decorated undercover officer who spent much of his career working on behalf of U.S. agencies. He continues his role as a “facilitator of commerce” overseeing international business for Baron Group, a Hong Kong based Merchant Bank.

Obviously, there were many other factors and scenarios that had to play out before I had the opportunity to meet these targets. Considerable effort went into my interactions with the various targets I met throughout my career. Through it all, however, I always remained focused on the fact that they were human beings and, as such, were vulnerable to the imperfections in

18 The Counter Terrorist ~ February/March 2010

about the author

Circle 143 on Reader Service Card


Counter The

Official Journal of the Homeland Security Professional

presents:

5th Annual

Homeland Security Professionals Conference and Exposition October 25 - 29, 2010 • The Palace Station Hotel and Casino •

Our Mission:

Las Vegas, Nevada

Protecting the Homeland Together

• Evolution of Mass Hostage Siege Tactics • Protecting large Gatherings from Sporting events to Casinos • Victimizing Innocent Citizens - The attack in Mumbai, India • Psychological Impact and Implications for the First Responder Community • Meet with leading suppliers providing the tools you need to stay safe! • And much more!

SSI

®

SECURITY SOLUTIONS INTERNATIONAL

Protecting the Homeland Together ®

Register Today!

www.thecounterterroristmag.com/conference • 866-573-3999

Circle 35 on Reader Service Card

This conference is approved for graduate and undergraduate credits through Saint Leo University

Featured Sponsors: Personal A id Kit

The Counter Terrorist ~ February/March 2010 19


Case Study:

fort hood

attack By Richard Marquise

On November 5, 2009, after giving away possessions including: food, furniture and copies of the Koran, army psychiatrist Nidal Hasan, who had told friends he was going to visit his (deceased) parents before deploying to Afghanistan, concealed his FN Herstal 5.7x 28mm pistol (and possibly a revolver). He had purchased 13 extra magazines. He made his way to the Soldier Readiness Center at Ft. Hood, Texas where hundreds of deploying soldiers were being given shots and eye examinations. Hasan jumped on a table and yelled “Allahu Akhbar!” (God is Great) in Arabic, a language he did not speak.

Counter The

20 The Counter Terrorist ~ February/March 2010

©istockphoto.com/


H

asan reportedly opened fire and within minutes, 13 lie dead or dying and 31 more were injured. Hasan’s rampage ended when two base police officers shot and seriously wounded him. 1 When word of the attack became public, it was quickly followed by the release of his name and occupation. “Had a US military man committed a terrorist attack within our borders, targeting his own force?” His motives may not be fully known for some time, if ever. Born in the United States to Palestinian parents, Nidal Malik Hasan graduated from Virginia Tech and against the wishes of his family, joined the U.S. Army. The military sent him to medical school and

©istockphoto.com/ Nidal Hasan. ©istockphoto.com/ he became one of only a few hundred psychiatrists in the military. He was assigned to Ft. Hood, a Texas base that has reported a large number of suicides.2 Hasan had asked about resigning his commission and reportedly offered to pay back his educational expenses. Hasan reportedly doubted his military commitment, a situation some believe worsened after he received orders to Afghanistan. Hasan met Anwar al-Aulaqi, a radical Yemeni-American imam while living in the Washington, DC area and later corresponded with him on the internet. Al-Aulaqi had left the United States for Yemen after being investigated in connection with the 9/11 attacks 3. On July 15, 2009, al-Aulaqi had posted a message on

After purchasing his weapon in August 2009, he began frequenting a firing range. 7 He was reported to have “applauded the killing of a US soldier at an Arkansas recruiting center”. 8

The Counter Terrorist ~ February/March 2010 21


his website; “Blessed are those who fight against them (armies fighting in the Muslim world) and blessed are these (martyrs) who are killed by them.” 4 Three weeks later, Hasan purchased the weapon used on November 5 at a Killeen, Texas gun store for $1140. 5 Hasan apparently criticized the wars in Iraq and Afghanistan. He called himself a Muslim first and an American second. He spoke at a seminar at Walter Reed Military Hospital in Washington in June 2007, making a presentation entitled “Why the War on Terror is a War on Islam.” During his presentation he said, “It’s getting harder…for Muslims…to morally justify being in a military that seems constantly engaged against fellow Muslims.” 6 He had reportedly attempted to find a Muslim wife but after assignment to Ft. Hood in the fall of 2009, he began frequenting strip clubs. After purchasing his weapon in August 2009, he began frequenting a firing range. 7 He was reported to have “applauded the killing of a US soldier at an

Arkansas recruiting center”. 8 Information has also emerged since the attacks that suggests that Hasan had business cards which contained the abbreviation “SoA(SWT)” which some experts claim is common shorthand for “Soldier of Allah,” and “Subhanahu Wa Ta’all,” or “Glory to God.” 9 In December 2008 his emails to al Aulaqi were discovered by a Joint Terrorist Task Force (JTTF) in San Diego. A report stated that the “content of those communications was consistent with research being conducted by Major Hasan in his position as a psychiatrist at… Walter Reed….and nothing else derogatory was found…. the JTTF concluded (he) was not involved in terrorist activities or planning.” This information was shared with members of the Washington JTTF. The FBI did not indicate whether Department of Defense personnel assigned to that task force saw the content of the emails. 10 However, it has become clear that Major Hasan’s actions over the past several years

Aden, Yemen, Oct. 12, 2000 — Seventeen Sailors aboard USS Cole (DDG 67) were killed as a result of an explosion Oct. 12 which left a 40 foot by 40 foot hole in the port side of the Norfolk, Va.,- based destroyer. U.S. Navy photo. Circle 343 on Reader Service Card

22 The Counter Terrorist ~ February/March 2010


had come to the attention of those in his chain of command. The investigation has allegedly determined that Hasan had donated $20,000 to $30,000 a year to overseas Islamic charities.11 There have also been allegations that his emails to al Aulaqi, contained “cryptic and coded exchanges” explaining how to transfer money overseas so as to not attract the attention of law enforcement.12 Based on all that is known, many have concluded that the Ft. Hood attack was a terrorist attack against the U.S. military. The military has, in fact, been targeted domestically numerous times in the past few years. Normally, these ideologically motivated attacks originate from outside of the military. In July 2006, Adam Gadahn (Azzam the American), a self described al Qaeda internet spokesman, encouraged those with grievances against the US military action in Iraq “to go on a shooting spree at the Marine housing facilities at Camp

Pendleton” (California).13 Derrick Shareef, who was later convicted in a plot to attack Illinois shopping centers, conspired in 2003-2004 with a former U.S. Navy sailor, Paul Hall, to attack military recruiting targets in Phoenix or a base in San Diego. They did not carry out these attacks but in 2006 again planned to attack either a recruiting station or a military base with a rocket propelled grenade. Hall, while on duty in the Navy, had emailed an al Qaeda website congratulating them on the 2000 attack on the USS Cole. Hall was indicted on terrorism and espionage charges in 2007. 14 In June 2005, Kevin James and three other men were indicted in California on charges alleging that they were about to “wage war” on the United States. They conducted surveillance of an army ball and ten army recruiting centers near Los Angeles. These men believed an armed assault would be the most effective type of attack to cause mass casualties. Some of these

Hall, while on duty in the Navy, had emailed an al Qaeda website congratulating them on the 2000 attack on the USS Cole.

• Impressive Expansion • Certified Lead Free • Optimal Soft Tissue Penetration • Solid Copper X Bullet • Superior Hard Barrier Penetration Premier Products from

605.347.4544 800.626.7266 Circle 57 on Reader Service Card

corbon.com The Counter Terrorist ~ February/March 2010 23


He said one of his initial targets were military recruiting centers. 20

men did physical and firearms training in a Los Angeles park. The plot unraveled after the men were arrested following a gas station hold up.15 In May 2007, six men from the Balkans were arrested in New Jersey and charged with planning to attack soldiers at the Ft. Dix army base. They had procured weap-

SEE WHAT YOU’VE BEEN MISSING

Renegade-320 • Highly versatile thermal imager • Ideal for nighttime surveillance, search & rescue, and close quarters combat • Detects human activity more than a half mile away • Handheld, tripod, weapon mount • Image capture, digital zoom, switchable polarity • Five reticle styles—selectable and adjustable • Lightweight, rugged, submersible

Shown with optional laser pointer

A DIVISION OF P&R TECHNOLOGIES, INC 5727

prtech-thermalimaging.com • 800-722-8078 • email: info@prtech-pdx.com

24 The Counter Terrorist ~ February/March 2010

Circle 169 on Reader Service Card

ons and engaged in tactical and firearms training in rural Pennsylvania and New Jersey. They had surveilled military shipyards and bases in Delaware, New Jersey and Pennsylvania as well as the location of the annual Army-Navy football game. They discounted some targets because of security. These men planned to conduct a small arms attack but were arrested before they took further action.16 On June 1, 2009, Carlos Bledsoe, a native born American, shot two soldiers standing in front of an Army recruiting center in Little Rock, Arkansas, killing one. He later said he was upset with the U.S. military because of “what they had done to Muslims in the past.”17 A number of weapons were found in his vehicle but a search of his computer indicated that he had targeted military recruiting centers in the southeastern United States, New York and Philadelphia. 18 He had previously been arrested then released while traveling in Yemen on a false Somali passport (and interviewed by an FBI agent). His attorney later said that he was “an impressionable youth driven to public service in an impoverished Middle Eastern country. Teachings by hardened terrorists in Yemen…drove him to become someone his parents did not know.” 19 He had come to the attention of a local JTTF but was not deemed an immediate threat. On September 24, 2009, a 19 year old Jordanian citizen parked a vehicle filled with what he thought were explosives under a 60 story Dallas, Texas, office building. His “associates”—undercover FBI agents—furnished him with a vehicle; cell phone and what he thought were explosives. When his attempts to detonate his bomb with the cell phone failed, he was arrested. He had told agents a few months before that “I want to destroy… targets…everything that helps America on its war with Arabs will be targeted.” He said one of his initial targets were military recruiting centers. 20 That same day, authorities in North Carolina filed a superseding indictment


Circle 67 on Reader Service Card

The Counter Terrorist ~ February/March 2010 25


Circle 345 on Reader Service Card

I�������� ��� P��������� S��������� at The Center for Rural Development

I�������� ��� P��������� S���������

Homeland Security

at The Center for Rural Development

CertifiCate Program Courses for Public Safety Practitioners Courses include:

 Law Enforcement Professionals Available Now!

 Fire Service Professionals Coming Soon!

 Emergency Management Professionals Coming Soon!

Rural Domestic Preparedness Consortium

Enroll in a course today. No fees! No cost!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

For more information please visit www.preventivestrategies.net or www.ruraltraining.org 26 The Counter Terrorist ~ February/March 2010 IPS-RDPC-DHS Ad 4.75 x 4.875.indd 1

Circle 123 on Reader Service Card 4/13/2009 4:33:01 PM

against Daniel Patrick Boyd and seven codefendants (all but one US citizens). The conspirators planned to raise money, buy weapons, train and “become ‘mujihadeen’ and die ‘shahid’ (martyrs), in furtherance of violent jihad.” Boyd had received training in Pakistan and Afghanistan. They said if efforts to fight jihad overseas proved impossible, they would act within the United States. Boyd had conducted surveillance of the Marine Corps Base, Quantico, Virginia. He had researched maps of the base on the internet, and had acquired weapons and ammunition for the attack. 21 In the past 30 years, terrorists have infrequently targeted military personnel in the United States. Most terrorist targets in America have been symbolic, corporate or non military government facilities. These attacks demonstrate that there are a number of individuals interested in attacking U.S. military personnel in the United States. Most have no connection to the military, but view them as the enemy. Hasan’s attack may be an anomaly, yet one must wonder how many others having a similar view would be willing to give their lives to conduct such a symbolic attack. Military targets abroad have been hardened, but the freedoms we enjoy allow enemies living in the United States to target what they perceive to be softer targets. There are countless military targets in the United States. Hasan’s attack demonstrates the significance of the threat. Inhibiting soldiers from defending themselves and failing to acknowledge the existence of the threat will not prevent similar future incidents. Intelligence sharing, improved facility security (to include all military facilities, not just bases), and acknowledgement of the threat are necessary actions. Building force protection relationships with the local JTTF as well as appropriate state and local law enforcement entities in advance, as well as reporting thefts or acquisition of military uniforms, vehicles or identifica-


tion is the key to preventing many of these types of attacks from succeeding in the future.

about the author Mr. Marquise is a retired FBI agent. He led the American task force which investigated the bombing of Pan Am Flight 103 over Scotland and is the author of “Scotbom:  Evidence and the Lockerbie Investigation” Algora, 2006.  He is a Senior Research Associate with the Institute for Intergovernmental Research and teaches in the State and Local Antiterrorism Training (SLATT) program.  He also teaches for the US Department of State in the Anti Terrorism Assistance Program.

Endnotes “Terrified or Terrorist,” by Nancy Gibbs, Time Magazine, November 23, 2009 1

PR Pyro IED Simulator Stand

http://www.upi.com/Top_News/ US/2009/11/06/Fort-Hood-plagued-bysuicides/UPI-33131257558240/ retrieved November 23, 2009 3 “Anwar al Awlaki: Pro Al-Qaida Ideologue With Influence in the West,” February 5, 2009, NEFA Foundation report 4 “Hasan’s Ties to Radical Cleric Raises Issues for Law Enforcement,” by Spencer S. Hsu, Washington Post, November 18, 2009 5 http://www.telegraph.co.uk/news/ worldnews/northamerica/usa/barackobama/6531599/Fort-Hood-massacreBarack-Obama-would-have-to-sign-deathwarrant.html retrieved November 23, 2009. 6 “Terrified or Terrorist,” by Nancy Gibbs, Time Magazine, November 23, 2009 7 “Accused Fort Hood Shooter Was a Regular at Shooting Range, Strip Club,” by Joseph Rhee, Mary-Rose Abraham and Brian Ross, ABC News, November 16, 2009. 2

PR RPG Launcher Simulator

Weatherproof, powdercoated, solid steel, 22 lbs. Holds 3 IEDs, 2 Mortars, and 1 Smoke simultaneously. Unlimited use.

Smoke Munition

IED Munition

In the past 30 years, terrorists have infrequently targeted military personnel in the United States. Most terrorist targets in America have been symbolic, corporate or non military government facilities.

Replica of the Rocket Propelled Grenade Launcher. Fires 4 types of PR Pyro munitions.

New PR Suicide Vest Simulator Optional 50 mm SAM Munition Holder

OPFOR Munitions and Equipment

New PR Pyro Grenade Simulator

Visit www.OPFORmunitions.com for our complete line of OPFOR training products. 713-728-4772 • fax 713-723-2985 Made in the USA Circle 301 on Reader Service Card

PR Corporation

Pyrotechnic Battle Scene Simulator Systems

© 2009 PR Corporation

The Counter Terrorist ~ February/March 2010 27


Circle 39 on Reader Service Card

Circle 41 on Reader Service Card

28 The Counter Terrorist ~ February/March 2010

“Terrified or Terrorist,� by Nance G8bbs, Time Magazine, November 23, 2009. 9 “Alleged Fort Hood Shooter Had Jihad Message on his Business Cards,� by Dave Gibson, Norfolk Crime Examiner, November 13, 2009. 10 “Investigation Continues into Fort Hood Shooting,� FBI Press release, November 11, 2009. 11 “Hasan Was Worried About Results of Recent HIV Test Investigators Also Find Accused Fort Hood Shooter Sent $30,000 a Year Overseas to Islamic ‘Charities’,� by Joseph Rhee, Anna Schecter and Brian Ross, ABC News, November 19, 2009 12 “Hasan had intensified contact with cleric,� by Carrie Johnson, Spencer S. Hsu and Ellen Nakashima, Washington Post, November 21, 2009. 13 http://memri.org/bin/articles.cgi?P age=archives&Area=sd&ID=SP120106 retrieved November 23, 2009 14 “The Illinois Shopping Mall Plot,� Report #3 in a NEFA series, “Target America,� Updated December 2007. 15 U.S. v James, Central District of California, Indictment filed August 31, 2005. 16 U.S. v Duka, District of New Jersey, NO 1: 07-CR00459RBK, complaint filed May 7, 2007. 17 Little Rock, Arkansas Police report of Detective Tommy Hudson 11997, June 1, 2009. 18 Search Warrant return filed in District Court, Little Rock, Arkansas, June 2, 2009. 19 “Lawyer: Shooting Suspect Radicalized in Yemen,� Jon Campbell, Army Times, June 6, 2009. 20 “Bomb Plot Targeting Dallas Skyscraper Foiled,� Jason Trahan, Todd J. Gilman and Scott Goldstein, Dallas Morning News, September 25, 2009, 21 U.S. v Daniel Patrick Boyd, et al, Eastern District of North Carolina, NO 5:09-CR-216-1-FL to 5:09-CR-216-8-FL, Superseding Indictment 22 “Cleric says he was confidant to Hasan,� by Sudarsan Raghavan, Washington Post, November 16, 2009. 8


Circle 95 on Reader Service Card

The Counter Terrorist ~ February/March 2010 29


Book Review

Architect of Global Jihad:

The Life of Al-Qaida Strategist Abu Mus’ab al-Suri By: Brynjar Lia

A

bu Mus’ab Al-Suri is the subject of Brynjar Lia’s 2008 book, Architect of Global Jihad: The Life of Al-Qaida Strategist Abu Mus’ab al-Suri (Columbia University Press). Al-Suri is a career jihadist. Lia’s book chronicles al-Suri’s Syrian experience; exile in Europe; Afghanistan, Algeria and London experience; Taliban experience; and finally excerpts from al-Suri’s own book The Global Islamic Resistance Call. It is this work that has influenced al-Qaida in moving away from a secret hierarchical organization to decentralized cells and individuals acting independently of any central organization. Al-Suri was an intellectual, not a cleric. He applied logical reasoning and secular knowledge to provide strategic and operative frameworks for future jihadist warfare. His goal was to support individual terrorism by using loners or self-sustained, independent cells. (Lia 2008, 6–11) Al-Suri’s teachings melded leftist radicalism with a militant, panIslamic nationalism that would appeal to well–educated, young jihadists. Al-Suri believed that secret organizations that the jihadists established were defeated because the cells were exposed and infiltrated by governments. The jihadists did not keep their propaganda, media, and indoctrination activities separate from their operational cells (Lia, 339). They also failed to reach out to the masses and become popular from a grass-roots perspective. He believed that it was absolutely necessary to have a sense of commitment to the

Reviewed by: John Andrews Nation of Islam, and to open the minds and hearts of the nation’s youth so they feel a commitment to the nation as a whole and not to some individual country drawn on a map by the infidels or their lackeys (Lia, 370). Al-Suri stated that although it is not possible to gather the Islamic nation in

training camps, it is possible to plant training camps where members of the Islamic nation reside. The operational units must first be trained in Islamic doctrine in general and jihadist doctrine in particular. They must be provided with the necessary materials to prepare them mentally and ideologically to develop a desire to fight. This training could be provided through the Internet, in mobile

30 The Counter Terrorist ~ February/March 2010

training camps, and in secret training within jihadists’ own houses. The group providing this training and establishing the units would not be involved in military operations or under the scrutiny

According to anNabhani, such a government would be led by a caliph, who is a substitute for Mohammed, a political as well as a religious leader. He would declare jihad and wage war against all nonbelievers, and would not recognize existing national, tribal, or clan differences. of the security services. The group would carry out surveillance, information gathering, fund-raising, and recruitment. Once it had completed its task, it would leave the area to preserve security. Up to four or five units could be created; however, security would be maintained because if one of the units


were infiltrated, it could only reveal information about that one unit. The other units would be autonomous and known only by the trainer who is no longer in the area. The remaining operational units that had been training in jihadist-guerrilla warfare would then conduct their operation, attacking their target (Lia, 451–455). What I have just described is a system of action, not a centralized organization. It is a system that has the ability to perpetuate itself without any guidance from a central command. It can even be formed spontaneously without any direct intervention from the outside. If an individual is extremely upset about an action by the U.S. government and wants to react, he can train himself through the Internet, books, pamphlets, and computer discs. He can engage in a physical training program, join a gun club to learn how to handle small arms, and obtain literature on intelligence, spying, and secret warfare. He would, in effect, become a jihadist lone wolf as it appears that Major Nidal Hasan may have done at Fort Hood. The glue that bonds these disparate individuals and units together is a common doctrine and goal. That doctrine is jihad and that goal is to defeat God’s enemies. The concepts espoused by al-Suri are also employed by a little-known organization called Hitzb ut Tahrir or the Islamic Party of Liberation. It was founded in 1952 by Sheikh Taqiuddin an- Nabhani al Falestini. It is a political party based on Islam. Islam in this context is not only a religion but an allencompassing ideology and way of life that claims to have an answer for all man’s problems, whether economic, cultural, social, or political. In this specific school of thought, one can only truly live as a Muslim if he lives under a government controlled by Muslims. Only under such

a system can human nature thrive and one experience tranquility. All other forms of government contradict human nature and bring nothing but misery to mankind. This is especially true of democracy, which states that sovereignty belongs to the people and not to Allah. The goal of this organization according to its website is “ . . . seizing the reins of power through the Ummah (Muslim community) in order to implement the ideology in a comprehensive manner, because it is forbidden to seize partial power. Hence, the arrival at the ruling must be total and the implementation of Islam must be comprehensive” (Hizb ut Tahrir website). According to an-Nabhani, such a government would be led by a caliph, who is a substitute for Mohammed, a political as well as a religious leader. He would declare jihad and wage war against all nonbelievers, and would not

recognize existing national, tribal, or clan differences. The caliph would be appointed by a group of prominent men and remain a caliph as long as he follows Islamic law. He would not be accountable to the people (Cohen 2003, 2). A threepronged approach is used to achieve the caliphate. First, establish a vanguard of loyal cell members. These members would undergo a two-year period of study supervised by a party member. After their indoctrination is complete they would become a cell member along with five to eight other members. Only the commander of the cell knows the next level of the leadership. Second, convince the Ummah to adopt the ideology of the party and follow the established vanguard. Militants advocate accomplishing this by attacking the West as colonial powers who control the intellectual, political, economic, and military apparatus of the Islamic

Our Strength

is your security.

Safe Storage for Ammunition and Explosives. usexplosivestorage.com visit our website! some models for sale online!

1-877-233-1481 • Meet ATF Regs • Meet Military Specs • Many Sizes

Circle 69 on Reader Service Card

The Counter Terrorist ~ February/March 2010 31


World’s Finest Magazines

“OPTIMUM”... THE WORLD’S BEST MAGAZINES

MEC-GAR is proud to offer “Optimum” - our new and unique series of high capacity flush-fit pistol magazines. The new design of the magazine housing and interlinked magazine components, together with a special Anti-Friction Coating offer far superior performance even in difficult operational environments.

The increased firepower of MEC-GAR “Optimum” magazines can be further raised by an optional “Plus Two” adapter. “Plus Two” is a new set of hollow butt-plate and inner base to raise the capacity of the MEC-GAR “Optimum” magazine by 2-rounds and stick out only 5/8” from the butt of the pistol! Available For:

Beretta 92FS 9mm 18rd / 20rd Beretta 96FS .40S&W 13rd / 15rd Para-Ordnance P14 .45ACP 14rd SIG P226 9mm 18rd / 20rd SIG P226 .40S&W 13rd / 15rd Springfield XD 9mm 18rd Springfield XD .40S&W 13rd Taurus PT92 9mm 18rd / 20rd Taurus PT100 .40S&W 13rd / 15rd Mec-Gar USA, Inc., 905 Middle Street, Middletown, CT 06457 Tel: (800) 632-4271 Fax: (860) 635-1712 www.mec-gar.com Circle 141 on Reader Service Card

32 The Counter Terrorist ~ February/March 2010

Circle 163 on Reader Service Card

countries through the corrupt regimes of the current Muslim leaders who do not follow the rules of Islam. Third, seize the reins of power and establish the caliphate through the Ummah and the vanguard. The party may then appoint an emir or military leader who would declare jihad against nonbelievers, expel Western citizens, and terminate existing diplomatic agreements with Western governments (Cohen 2003, 3–5). There are approximately 10,000 hard-core Hitzb ut Tahrir members operating in more than 40 countries, with a significant presence in London (Cohen 2003, 1). They have recently conducted open forums in the United States, including in the Chicago area. On July 19, 2009, approximately 500 people attended a conference sponsored by the Hizb ut-Tahrir captioned “The Fall of Capitalism and the Rise of Islam” in Oak Lawn, Illinois. A spokesman for the group, Mohammad Malkawi, stated that Hizb ut-Tahrir condemns terrorism and has never indulged in recruiting jihadists. He said, “We do not train them for violence or for jihad. Our objective is to create an Islamic state of Khalifah in the Muslim world.” However, intelligence sources have indicated that Khalid Sheikh Mohammed, the mastermind of 9/11, and abu Musab Al-Zarqawi, the former leader of al-Qaida in Iraq, are both former members (Fox News). Compare what Malkawi said to the U.S. press with what Muhammad Ibrahim, member of the advisory council of Hizb al-Tahrir in Lebanon, stated: “Some people tried to interpret jihad to mean nothing more than self-defense. Thus, the Muslims abandoned the pinnacle of their glory, and relinquished their responsibility toward the world, as a result of their ideological weakness and their lack of understanding of the laws of


the Shari’a of the Prophet Muhammad. In principle, Jihad is an offensive Jihad, which was instated in order to spread Islam throughout the world.” Also Salah Al-Din Adhadhda, member of the press bureau of Hizb al-Tahrir stated “ . . . the Jihad of a nation over 1.5 billion strong has been reduced to the killing of an American in Iraq, a Briton in Afghanistan, a Jew in Palestine, or a Russian in Chechnya . . . .true celebration should only occur with the conquest of the capitals of the world by the message of Islam . . .” (MEMRI). The jihadists reveal their goals. It is not only in the historically Islamic countries that they wish to establish their caliphate, but in all the capitals of the world. We only have to pay attention and listen to them—not what they disseminate to media outlets, but to what they tell their own followers. The merging of orthodox

Circle 171 on Reader Service Card

Islamist ideology with Leninist strategy and tactics is a combination that may prove to be the most challenging yet.

about the author Mr. Andrews served as a Special Agent of the Federal Bureau of Investigation for twenty-three years. He worked the Vernon Jordan shooting in Indiana as a first office agent, and he conducted international terrorist investigations for nine years. Mr. Andrews currently serves as an adjunct professor at Florida State University, and he has also been a guest lecturer at Troy University. He conducts police training throughout the United States for Benchmark Professional Seminars and Unitech.

Central Asia” retrieved from http://www. heritage.org. Fox News, (July 20, 2009) “Protesters Gather Outside Islamic Conference Near Chicago”, retrieved from http://www. foxnews.com Hizb ut Tahrir website, retrieved from http://english.hizbuttahrir.org Lia, Brynjar, (2008) “Architect of Global Jihad: The Life of Al-Qaida Strategist Abu Mus’ab al-Suri, Columbia University Press. MEMRI, “On Al-Jazeera TV: Lebanese Islamists Favor Offensive Jihad to Conquer the World, Impose Islam, Special Dispatch, No. 2485, August 12, 2009.

References Cohen, Ariel, (2003) “Hizb ut-Tahrir: An Emerging Threat to U.S Interest in

The Counter Terrorist ~ February/March 2010 33


u.n. peacekeeping Operations in Africa

By Eeben Barlow Since fielding the first United Nations (U.N.) peacekeeping mission in 1948, the world has witnessed the deployment of about 63 U.N. peacekeeping operations. Since 1989 the U.N.’s Department of Peacekeeping Operations (DPKO) has deployed 18 missions to Africa.

Counter The

34 The Counter Terrorist ~ February/March 2010

Šistockphoto.com/


B

y November 2006 the DPKO’s deployment had reached an all-time high with 81,000 military and police personnel and 15,000 civilians. With 18 active missions in progress at that time, it was estimated that the DPKO would possibly require a budget of U.S. $7 billion.1 By 2010 this figure will have increased significantly, particularly in Africa.

The U.N.’s DPKO African Missions

When the DPKO’s African missions are tabulated, one can gain some perspective of the scope of the U.N.’s involvement in Africa. Table 1 below chronicles these operations.

Table 1 Official Abbrev.

Mission Name

Mission Start

Mission End

In Countries

Mandate according to U.N. Charter Chapter

ONUC

United Nations Operation In The Congo

July 1960

June 1964

Congo

VI from the beginning, later added Chapter VII authorization

UNAVEM I

United Nations Angola Verification Mission I

December 1988

May 1991

Angola

Chapter VI authorization only

UNTAG

United Nations Transition Assistance Group

April 1989

March 1990

Namibia

Chapter VI authorization only

MINURSO

United Nations Mission For The Referendum In Western Sahara

April 1991

ongoing

Western Sahara

Chapter VI authorization only

UNAVEM II

United Nations Angola Verification Mission Ii

May 1991

February 1995

Angola

Chapter VI authorization only

UNOSOM I

United Nations Operation In Somalia I

April 1992

March 1993

Somalia

Chapter VI authorization only*

ONUMOZ

United Nations Operation In Mozambique

December 1992

December 1994

Mozambique

Chapter VI authorization only

UNOSOM II

United Nations Operation In Somalia Ii

March 1993

March 1995

Somalia

Chapter VI and VII authorization from the beginning

UNOMUR

United Nations Observer Mission Uganda-Rwanda

June 1993

September 1994

Rwanda, Uganda

Chapter VI authorization only

UNAMIR

United Nations Assistance Mission For Rwanda

October 1993

March 1996

Rwanda

Chapter VI authorization only

UNOMIL

United Nations Observer Mission In Liberia

September 1993

September 1997

Liberia

Chapter VI authorization only

UNASOG

United Nations Aouzou Strip Observer Group

May 1994

June 1994

Chad, Libya

Chapter VI authorization only

UNAVEM III

United Nations Angola Verification Mission Iii

February 1995

June 1997

Angola

Chapter VI authorization only

MONUA

United Nations Observer Mission In Angola

June 1997

February 1999

Angola

Chapter VI authorization only

MINURCA

United Nations Mission In The Central African Republic

April 1998

February 2000

Central African Republic Chapter VI authorization only

UNOMSIL

United Nations Observer Mission In Sierra Leone

July 1998

October 1999

Sierra Leone

Chapter VI authorization only

UNAMSIL

United Nations Mission In Sierra Leone

October 1999

December 2005

Sierra Leone

VI from the beginning, later added Chapter VII authorization

MONUC

United Nations Organization Mission In The Democratic Republic Of The Congo

November 1999

ongoing

Democratic Republic of Congo

VI from the beginning, later added Chapter VII authorization

UNMEE

United Nations Mission In Ethiopia And Eritrea

July 2000

ongoing

Ethiopia, Eritrea

Chapter VI authorization only

UNMIL

United Nations Mission In Liberia

September 2003

ongoing

Liberia

Chapter VI and VII authorization from the beginning

UNOCI

United Nations Operation In Côte d’Ivoire

April 2004

ongoing

Côte d’Ivoire

Chapter VI and VII authorization from the beginning

ONUB

United Nations Mission In Burundi

June 2004

ongoing

Burundi

Chapter VI and VII authorization from the beginning

UNMIS

United Nations Mission In The Sudan

March 2005

ongoing

Sudan

Chapter VI and VII authorization from the beginning

Source: Based on data published by U.N. (http://www.un.org/Depts/dpko/dpko/index.asp, 5.5.2006) *UNOSOM was established to monitor the ceasefire in Mogadishu and to escort deliveries of humanitarian aid. It later worked together with the Unified Task Force (UNITAF—contingents from 24 countries led by the United States) in an effort to establish a safe environment for the delivery of humanitarian assistance. The U.N .Security Council used Chapter VII to authorize the UNITAF operation.

The Counter Terrorist ~ February/March 2010 35


©istockphoto.com/

Defining Success

Success can only be achieved or claimed if a mission has succeeded in bringing about and maintaining peace, allowing for nation-building to take place in an environment where the local population can live with the knowledge that they are secure. However, in order to assess the success of the DPKO’s missions, one needs to analyze differences between a DPKO

Table 2

mission and an alternate option exercised by an African government that has experienced the DPKO’s deployment in its country.

The Sierra Leone Debacle

Sierra Leone has had firsthand experience of a devastating, cruel, and vicious civil war. With a civil war already in progress when he seized power,

Organization

Costs

Result

United Nations (UNAMSIL1) 1998–2005

U.S. $600 million per year (2001)

Military coup ousts elected president. RUF2 over-runs Freetown. Thousands of civilians killed. Damage estimated at millions of dollars. Thousands become refugees. U.N. considers UNAMSIL to be most successful U.N.-mission.

Executive Outcomes 1995–1997

U.S. $31 million per year (approx.)

RUF defeated on battlefield. Thousands of civilian lives saved. Child-soldiers demobilized. Government gains control of diamond fields and rutile mines. Food convoys travel in safety. RUF signs cease-fire. Refugees return home to SL. Elections held.

International Community

U.S. $60 million per year to maintain refugees outside of Sierra Leone

Thousands of people prevented from dying of malnutrition.

World Food Programme and other U.N. agencies and NGOs

?

? 1

From: Barlow, Eeben, Executive Outcomes, Against all Odds, Galago, 2007. UNAMSIL arrived in Sierra Leone after EO left the country, ostensibly to “take over and maintain peace.” 2 Revolutionary United Front

36 The Counter Terrorist ~ February/March 2010


Captain Valentine Strasser’s calls to the United Nations for assistance were ignored. He subsequently contracted a private military company (PMC) known as Executive Outcomes (EO) to come to the rescue of Sierra Leone. EO arrived in Sierra Leone in April 1995 and when the company left in January 1997 because of massive international pressure, the rebel forces that had terrorized the country were all but destroyed. The United Nations then stepped in. In assessing the U.N.’s role in terms of cost and achievement, one gains perspective by comparing it against EO. This is illustrated in Table 2 at left:

Whereas there can be no doubt that the United Nations has the potential to be an instrument for peace and stability, there are certainly grave doubts about how this organization went about its business in Sierra Leone. As Doug Bandow, a senior fellow at the Cato Institute, commented on the situation in Sierra Leone: Diplomatic pressure, expressions of international outrage, and U.N. missions have all failed. People die, refugees flee, children starve, societies disintegrate. The only strategy that has worked is military force. In 1995, Sierra Leone’s

When the genocide in Rwanda erupted in early April 1994, the United Nations had had ample warning of what was to come. Indeed, Kofi Annan had ordered that no action be taken.3

©istockphoto.com/ The Counter Terrorist ~ February/March 2010 37


©istockphoto.com/ government was tottering before an offensive of the Revolutionary United Front (RUF). The regime hired the firm Executive Outcomes, made up of South African mercenaries, which routed the RUF. But one requirement of the political “settlement” pushed by the United States was to send Executive Outcomes home. U.N. peacekeepers proved to be dismal replacements.2

The Rwanda Eruption

When the genocide in Rwanda erupted in early April 1994, the United Nations had had ample warning of what was to come. Indeed, Kofi Annan had ordered that no action be taken.3 The case of Rwanda becomes even more tragic when considering that the United Nations approached EO around 12 April 1994. The request by the United Nations was to rapidly

38 The Counter Terrorist ~ February/March 2010

Circle 87 on Reader Service Card


Circle 109 on Reader Service Card

The Counter Terrorist ~ February/March 2010 39


Table 3 Organization

Costs

Result

U.N.

U.S. $600 million for 6 months (approx.)

Hundreds of thousands of civilians slaughtered (approx. 500,000)

U.S. Military Ops Distant Runner and Support Hope

U.S. $147.8 million for 6 months

Rescue of 148 Americans and 82 “others” 500,0001 people killed in genocide

Executive Outcomes

Budgeted U.S. $100 million for 6 months

Rejected by U.N. as too expensive

France

Unknown

See U.N. Result

Belgium

Unknown

See U.N. Result

From: Barlow, Eeben, Executive Outcomes, Against all Odds, Galago, 2007. Later estimates have put the civilians killed at 800,000. 1

put together a force and intervene in Rwanda. The company’s proposal was immediately rejected by the United Nations for being “too expensive.” It also needs to be mentioned that EO had to make provision for the purchase of all of its equipment, including all weapons, ammunition, medical supplies, signals equipment, vehicles, and aircraft. Table 3 chronicles the relevant operational costs and their achievements. Indeed, the United Nations itself released reports documenting two of its “worst stumbles”:

According to these confessions, U.N. peacekeepers in Rwanda stood by as Hutu slaughtered some 800,000 Tutsi. In Bosnia . . . its blue-helmeted troops were used as hostages by the Serbs to deter a military response from the West. Presumably, Secretary-General Kofi Annan—who was head of the U.N.’s peacekeeping department at the time—hopes that an institutional mea culpa now will wipe the slate clean and allow the organization to play a more vigorous role in the future.4

From a strictly operational point of view, the U.N.’s peacekeeping operations are nothing short of disastrous.

ntained, and ready duttyy. The EyePole tactical surveillance pole camera is completely self contained, r for f duty.

Color Camera with Auto-switching IR Night Vision and 360º Articulation Load-bearing probe Quick Flip-lock™ Collar for Extension

5" TFT Color Display with 180º Tilt & Swivel

Control Panel with Power, Brightness, Video-out, and Audio-out (option)

Under Door Camera Quick Disconnect Rifle Sling for Hands-free Approach

Quick Connect Attachment to EyePole y Ultra-sensitve Microphone

EyeOn, LLC PO Box 2302 Issaquah, WA 98027-0104 425-652-9556 phone 866-631-3086 fax info@eyepole.com www.eyepole.com

40 The Counter Terrorist ~ February/March 2010

Circle 165 on Reader Service Card


Dwayne L.

Technician, Federal Government Graduate. American Military University

My AMU education gives me the edge to meet the evolving homeland security challenges I face every day. From psychology of disaster to Arabic language courses, my AMU education builds on my experience in the Marine Corps to help me better fulfill my mission of protecting our community and this country’s freedom and ideals.

Push your mind. Advance your career. Respected online intelligence degree programs focused on: • Criminal Intelligence • Homeland Security • Intelligence Analysis • Intelligence Collection

• Intelligence Operations • Terrorism Studies • And More

learn more at:

www.amuonline.com

Circle 59 on Reader Service Card

or call:

877.777.9081

The Counter Terrorist ~ February/March 2010 41


SSI 2010 Course Offerings ®

Classroom - Lecture Courses • The Islamic Jihadist Threat • Building Safety & Security Engineering • Protecting Aviation • Operational Response to Mass Casualty Incidents • Suicide Terror & the Threat of Explosives • Jihad 2.0 - From Virtual to Physical

Advanced Tactical Programs • SWAT Counter Terrorism Operations • Inside the Mind • SMART School • High Risk Terrorist Arrest Objective • Low Signature Operations in the IR Spectrum Objective • Suicide Terrorist Interdiction Operations • In Extremis Terrorist Hostage Rescue Objective • Vehicle Interdiction for High Risk and CT Operations • Counter Terrorism Sniper Operations • Tactical K-9 Employment for Counter Terrorism Operations • CBRNE Counter Terrorism Operations • Tactical Integration of LE EOD for CT Ops and lED Threat Mitigation • Tactical Leadership for SWAT and CT Operations • Mechanical Breaching for Tactical Operations • Stealth Movement on Urban Terrain • Low Light Tactical Operations • Tactical and EOD Robotics Operations

Military Pre-Deployment Training • Tactical Rifle • Combat Pistol • Personal Security Detail • Tactical Convoy Operations • Combat Life Saver / Tactical Combat Casualty Care • Machine Gun • Surveillance Detection

Training in Israel • Krav Maga Training in Israel • Homeland Security Mission to Israel

SSI SSI

®

SECURITY SOLUTIONS INTERNATIONAL

Protecting the Homeland Together ®

www.homelandsecurityssi.com • 866-573-3999

Circle 33 on Reader Service Card

42 The Counter Terrorist ~ February/March 2010


Military Success or Military Blunder?

The above comparisons illustrate certain weaknesses in the DPKO’s makeup and mandate. From a strictly operational point of view, the U.N.’s peacekeeping operations are nothing short of disastrous. With a lack of strategy, poorly defined and unstructured operational missions, inadequately trained troops, and apparently dubious leadership, these operations tend to prolong the conflicts instead of shorten them. As the conflicts deepen, the United Nations appears to attempt to rectify the failure by increasing its troop levels. Thus, “mission creep” sets in—and the costs of maintaining these operations soar. In addition to the above criticisms and the excessive costs to fund and maintain these missions, the allegations of bias, rampant U.N. sexual assaults, cover–up, and the inability to secure peace are synonymous with U.N. peacekeeping missions.5 Countries such as Angola, Burundi, Democratic Republic of the Congo, Chad, Somalia, and Sudan simply add to the long list of U.N. failures. In none of

Circle 85 on Reader Service Card

these countries did the United Nations bring about peace, resolve the conflict, stop the killing, or even partially resolve the underlying tensions and conflicts. Yet, even failures are lauded by the United Nations as achievements. The United Nations states that its peacekeeping “continues to evolve, both conceptually and operationally, to meet new challenges and political realities. Faced with the rising demand for increasingly complex peace operations . . . . The Organization has worked vigorously to strengthen its capacity to manage and sustain field operations and, thus, contribute to the most important function of the United Nations— maintaining international peace and security.”6 Whereas these claims may seem reasonable on paper, the reality in the field is disconcerting. As the organization involves itself with its own troop surges and ever-growing budgets, people continue to be displaced and slaughtered, thugs and criminals continue to control entire regions, and the human disasters continue to grow. The result is a lack of confidence in these missions by the local population. But the root cause of these failures

Army camp in the Sudan. ©istockphoto.com/Claudiad

The Counter Terrorist ~ February/March 2010 43


Peacekeeping has been pushed to the wall. There is a sense across the system that this is a mess— overburdened, underfunded, overstretched.

seems to escape the United Nations. Perhaps it is viewed as politically incorrect to assess the real reasons for failure or perhaps it is that the United Nations wishes to see itself as an organization that will only involve itself in “keeping peace.” However, to speak of keeping peace when there is no peace is a fallacy. To keep peace there needs to be an end to hostilities. The conflict needs to be resolved—either politically or militarily— and the antagonists need to accept that peace.

Armed Intervention

As retired Australian General John Sanderson once remarked, ”You either go to war or go home.”7 In dealing with civil wars and failed states, armed intervention remains the only option available to force the antagonist to the negotiation table or destroy the antagonist on the battlefield once talks have failed. The U.N.’s DPKO has the legitimacy to intervene in conflicts but it does not have the ability to end them. As a continent, Africa will continue to haunt the DPKO. As journalist Neil MacFarquhar noted recently: Among the most noticeable failures in recent months: the inability of troops in Congo and the Darfur region of Sudan to stop the violence that is killing civilians, the difficulty in finding enough

troops for either of those missions, and the unwillingness of any nation to lead a possible mission in Somalia. In Congo in December, a contingent of 100 peacekeepers that was less than a mile away did not intervene in a rebel massacre that human rights investigators said killed 150 people; the peacekeepers reported that they were short of equipment and manpower and lacked the intelligence capacity to figure out what was happening in the nearby town.8 Such excuses do nothing to enhance the image of the U.N. DPKO’s competence. The international community will never accept a U.N.-controlled and led “standing force” to ensure an end to hostilities or conflict. Many nations will refuse to put their forces under U.N. commanders. Others have their doubts about such a force intervening in conflicts across the globe. While this uncertainty continues, Africa burns. This was alluded to by Bruce Jones, the director of the Center on International Cooperation at New York: Peacekeeping has been pushed to the wall. There is a sense across the system that this is a mess—overburdened, underfunded, overstretched. Has the time not come for the United Nations to accept its inability in the field and acknowledge its failures? Are

Non Explosive and Non Pyrotechnic Safe to use Indoors & Near Buildings (850) 862-5344

www.explotrain.com

The most Effective, Economical and Realistic Explosive Effects Simulators available... Anywhere.

130 Decibels 10 Cents per Shot 44 The Counter Terrorist ~ February/March 2010

Simulates Virtually any type of IED Wireless Remote Controlled Remote Triggering/Initiation Capability Used by hundreds of US Military, Special Forces and Law Enforcement personnel Circle 307 on Reader Service Card


Circle 341 on Reader Service Card

The Counter Terrorist ~ February/March 2010 45


©istockphoto.com/ the claims of being underfunded not a direct result of using ill-trained troops from poorer countries—and in the documented case of Bulgaria, hardened criminals dressed in military uniforms— as opposed to professional soldiers? Is it not the time to begin vetting and training troops correctly prior to mission deployment? Doug Brooks of the International Peace Operations Association said: The much maligned South African PMC, ‘Executive Outcomes’ (EO), actually brought two African wars to an end, and they did it cheaper and

46 The Counter Terrorist ~ February/March 2010

Circle 191 on Reader Service Card

faster than would have been possible using multinational organisations. In Sierra Leone, ECOMOG (the CeaseFire Monitoring Group of ECOWAS) spent hundreds of millions of dollars over several years, losing a war that EO had won in ten months for only 35 million dollars. Before that, in Angola, the UN spent 1.5 billion dollars in its failed attempt to solidify a peace under the Lusaka Protocol that EO had created in a year’s fighting, for only 80 million dollars. In both cases, the PMC had done the hard combat, but the subsequent peace was lost because the international organisations were unable to provide the effective post-conflict security necessary to establish a long-term settlement. In both cases, EO. . . could easily have continued to provide the necessary security that would have permanently ended those wars. . . . African conflicts are complex and nuanced. It is unrealistic to expect PMCs to solve the larger political issues. A PMC can stop the killing and provide the essential window of peace that will


allow reconciliation and free and fair self-determination . . .Ultimately, only Africans can provide the enduring political solutions to Africa’s seemingly endless wars. Nevertheless, of all the tools currently available to end organized African violence, only PMCs are capable of quickly bringing peace to the African continent. They should not be dismissed as mere ‘mercenaries.’ They have proven their ability to push low-intensity conflicts to settlements, and they have shown their willingness to enter seemingly intractable conflicts, where Western powers dare not tread. They have a unique and remarkable ability to act as a force multiplier, working with local forces and nullifying problems of scale. PMCs can be used to pacify areas of ethnic tension, provide peacekeeping services, oversee truce monitoring operations, protect NGO programs, undertake

humanitarian rescue operations, and if necessary, even conclude wars decisively.9 A closer look into the U.N.’s claims that it achieved success in Namibia, Angola, Sierra Leone, and elsewhere reveals that its claims are unfounded. Whereas its presence in those countries cannot be disputed, it took the intervention of other forces on the battlefield to end the conflicts—under the watchful gaze of the United Nations. That, in itself, is an indictment of the DPKO.

About the Author Mr. Barlow is a former special operations officer and intelligence officer of the South African Defence Force. The author was also the founder of the private military company, Executive Outcomes and author of the book “Executive Outcomes” (Galago Publishing, 2007).

FIRSTHAND AC COUNTS AND FROM FRONTL INE PERSONNE ANALYSES L AND ExPERT IN THE wAR AG S AINS T TERROR Based on

edite

Understanding

Understandin

g and Confro nting the threat

and Confront ing the threat

U.s. and policymakers, first israeli experiences and detailed interv responders, and threat of suicide students of home iews with frontline personnel, terro Suicide Terror enab land security to understand and for future attacks. r. it analyzes recent suicide attac deal with the grow les ks as well as our following the expe current vulnerabili Moreover, they learn ing rt authors’ advic ties e, readers learn how to prepare for possible measures and likely scenarios and losses in the and imple ment event of an attac to prevent an attac an effective and k. quick response to k. following an overv minimize casualties iew and historical review of suicide terror, the book cover • Global jihad s: • Israel’s confron tation with suicide te rrorism • America’s expe rience with suicide b ombings • Internationalizat ion of suicide terroris m • High-risk scena rios and future trends • Methods for co nfronting suicide terror • Medical manag ement of suicide terro rism Using eye-witnes s accounts, the text recreates the studies help reade look and feel of rs actua these very dangerousget into the minds of suicide terro rists in order to unde l terrorism incidents. Detailed threats. case rstand how to best This book is a defin prevent and confr itive study of suicide ont experts who have terror, synthesizing t dealt with it firsth he ex perie nce of well-known Is devastating threa and. anyone respo t should read this book and consider nsible for understanding, preventing raeli and American its recommendation , and confronting OPHIR FALK, LLB, this s with all seriousne ss. institute for Coun MBA, is a Partner at the Naveh, K ter terrorism, wher of experience in e he has published antor Even-Har law firm and a Rese vario numerous articles carried out risk asses us security capacities and serve in the field. Mr. falk arch Fellow at the d as a consultant sments for olympic has over a decade for the venue 2004 s and olym HENRY MORGEN critical national infras pic games, wher STERN is the Presi e he tructure. than 500 federal, dent of security state solutions internation first responders to Is , and local agencies to effectively al, a company that of suicide terror. He rael to study Homeland Security. Mr. confront the threat of terror and regul has trained more radio stations, and has offered expert commentary on tMorgenstern is a widely publishe arly takes groups of d aut Web broadcasts. error-related issu es for NBC, ABC hor on the subject , CBS, Fox, numerous

UN News Service, 10 November 2006 2 http://www.cato.org/pub_display. php?pub_id=4682 3 Pioneer Press, 4 May 1998 4 http://www.foreignaffairs.com/ articles/55875/max-boot/pavingthe-road-to-hell-the-failure-of-u-npeacekeeping 5 http://abcnews.go.com/Blotter/ UnitedNations/story?id=489306&page=1 6 UN official website, http://www. un.org/ 7 Washington Times, 9 June 2000 8 The New York Times, 10 February 2009 9 Brooks, D: Write a cheque, end a war, www.accord.org.za 1

ophir falk and hed by nry Morgenstern

SUICIDE TERROR

SUICIDE TERROR

falk Morgenstern

Ophir Falk and Henr y Morgenstern have serious about winn compiled a book that should be read ing the war on terro better understan r. By painstakingly by anyone who is d the nature of analyzing the empi our enemies and rical data, they they offer important why they employ help us insights on how these barbaric tacti terrorism can be In so doing, they cs. Most crucially, effectively confr have performed onted and ultim an invaluable servi crucial battle. ately defeated. ce for all those who are committed to winning this —Benjamin Neta nyahu, former Prime Minister of Israe l

endnotes

www.SuicideTerror.com • 866-573-3999 Circle 117 on Reader Service Card

The Counter Terrorist ~ February/March 2010 47


S.A.R.S.

The Suspicious Activity Reporting System and the Citizens’ Role By Dr. Ross L. Riggs

Counter The

48 The Counter Terrorist ~ February/March 2010

Photo: Scott Morrison


The Suspicious Activity Reporting System (SARS) of the Department of Homeland Security is an avenue by which citizens can become active participants in defending against terrorism. The Department of Homeland Security and a host of other entities have worked to protect our citizens from unprecedented domestic acts of war against the United States.

T

here are direct, specific actions that citizens can take to participate in their own defense. Local law enforcement is part of the solution, but police officers need the help of the citizens they serve. SARS is the key to providing that help. Who is responsible for protecting people in any given society, institution or organization? The answer is simple: the people themselves. Sadly, individuals often no longer realize the need to be responsible for their own safety or that of their families. The old adage of police, to protect and to serve, may create a misimpression that the government will protect every citizen. Many in law enforcement realize that local police have never truly had the ability to protect. A strong police presence and

effective investigations followed by a strong judicial stance against crime will deter some criminals. However, personal safety is the responsibility of the individual. It will never be enough to beef up our patrol forces or better train our infrastructure security officers. Local citizens, armed with information and a method for sharing that information with officials, provide the critical pieces of the puzzle needed to thwart the next enemy attack. War was declared on the citizens of the United States long before 9/11, but that September morning should have been the bugler’s reveille to a sleeping nation. In the classic WWII story, Tora! Tora! Tora!, Japanese Admiral Isoroku Yamamoto is quoted as saying after the attack on Pearl Harbor, “I fear all we have done is to

It will never be enough to beef up our patrol forces or better train our infrastructure security officers.

Šistockphoto.com/jcarillet

The Counter Terrorist ~ February/March 2010 49


©istockphoto.com/

Private industrial security, law enforcement at every level of government, intelligence, and the general public are the essential sources of the required information.

awaken a sleeping giant and fill him with a terrible resolve.”1 Interestingly, in the movie Pearl Harbor, Admiral Yamamoto’s quote was shortened to, “I fear all we have done is to awaken a sleeping giant.”2 Could it be that 9/11 awoke a sleeping giant, but that America is no longer filled with such resolve? The brave men and women in the military, police, fire and emergency services uniforms have held that resolve on behalf of the American people, but what about the people themselves and their representatives? Experts agree that effective counter terrorism is multidisciplinary, with multiple levels in each discipline. As much of an art as it is a science, the practitioners of counter terrorism need input from every possible level. Private industrial security, law enforcement at every level of government, intelligence, and the general public are the essential sources of the required information. Heinous acts of terror against a populace can be accomplished if the will to commit those acts, at all costs, exists. The individual must take effective action of his own initiative to “elude(s) the threat of the enemy, to cease to be an isolated

50 The Counter Terrorist ~ February/March 2010

target that no police force can protect…”3 and he does so by participating in his own defense. At what point can those who seek to harm American citizens best be stopped? When the enemy first plots an act of aggression, before the plan has fully come together, is the time when circumstances bring the most vulnerability to plotters. The purpose behind the FUSION CENTERS4, which were developed both nationally and on state levels through the Department of Homeland Security, is to be a repository for small pieces of the intelligence puzzle that are examined and combined by trained personnel. The corner pieces begin to outline the making of a plot. The smaller pieces fit into the larger ones and the picture begins to take shape. One small, seemingly insignificant, yet suspicious, act meshes with other suspicious activity reported through SARS, a plot is discovered, and lives are saved. Federal officials learned, early in the months following 9/11, that communication between agencies and officers in different branches of federal law enforcement was critical to success.


Circle 77 on Reader Service Card

The Counter Terrorist ~ February/March 2010 51


Circle 79 on Reader Service Card

SUPPLY

EOD EQUIPMENT

WWW.IDEALSUPPLYINC.COM

Next, there needed to be more flow of information between state and federal agencies. As the concept of FUSION CENTERS was developed, it became apparent that more information needed to come from patrol officers. However, the first point in the communication channel was perhaps the single most critical and the most overlooked; the flow of information from citizens to law enforcement. Currently, SARS information first enters the system through a local police department.5 “Locally generated threat and other criminal and/or terrorismrelated information is identified, gathered, entered into an appropriate data/retrieval system, and provided to appropriate analysis centers.�6 Four thousand to eight thousand cables come into the NCTC every day.7 Where does the local police department get the initial

800-533-0144 or 828-274-0140 Circle 233 on Reader Service Card

52 The Counter Terrorist ~ February/March 2010

information of suspicious activity that becomes a SARS report? Patrol officers and law enforcement officials in various subspecialties within the agency gather information that is transmitted through the SARS system. If the link between local citizens and police can be rejoined, then it will be possible to re-open the channels of communication between citizens and police that will make SARS reporting perhaps the single best inhibitor of continued aggression against the United States. The connections that people across the country have through media, internet, and all types of communication options are amazing ways to gather and to disseminate information. The success of the AMBER ALERT system that goes to radio, internet, traffic billboards, and cellular phones almost instantaneously is a great example of officials providing


The Counter Terrorist ~ February/March 2010 53


get In. get around. gaIn control. IntroducIng a new standard In hIgh mobIlIty and maneuverabIlIty. Tactical Protector Vehicle from Oshkosh Defense creates a new strategic dimension for special operation missions. With a new standard in mobility, military-grade protection and capacity for up to eight officers, it enhances access, speed and safety in urban, rural and off-road high-risk situations. TM

find out more:

www.oshkosh-tacticalprotector.com

CONTACT:

Jack Reiff Program Director, Tactical Protector Vehicle™ 920.235.9151 extension 22815 jreiff@defense.oshkoshcorp.com

© 2009 Oshkosh Corporation • Oshkosh and the Oshkosh logo are registered trademarks and Tactical Protector Vehicle is a trademark of Oshkosh Corporation, Oshkosh, WI, USA

54 The Counter Terrorist ~ February/March 2010

Circle 75 on Reader Service Card


The connections that people across the country have through media, internet, and all types of communication options are amazing ways to gather and to disseminate information

Photo: Scott Morrison citizens with vital information8. It is possible to use some of the same concepts to reverse the information flow. The primary step to successful citizen participation is education. Has the sleeping giant been awakened and is there a terrible resolve within the people of America to save themselves from their enemy? For the sake of all, let’s hope so. From local government to Capitol Hill, SARS, as a tool of modern warfare, begins with the citizens

themselves. Familiarity with the system must be developed so that citizens may take part in their own defense. Ronald Kessler, author of The Terrorist Watch writes concerning those who work diligently to analyze this information: “Those who are fighting the silent battle against terrorism have produced an American success story. They are unsung heroes who have indeed made us safer. But only if Americans recognize the fact and pull together will we win this war

The Counter Terrorist ~ February/March 2010 55


©istockphoto.com/ for the country’s survival.” A sign at the entrance of the CIA’s Counter Terrorism Center’s Global Response Center reads, “Today is September 12, 2001.”9

about the author Dr. Riggs, is a retired police chief with over 24 years of law enforcement and military security experience. He is an FBI National Academy graduate and is the director of Security Consulting Investigations.

ENDNOTES http://en.wikipedia.org/wiki/Isoroku_ Yamamoto’s_sleeping_giant_quote 2 Ibid. 3 Trinquier, Roger. Modern Warfare: A French View of Counterinsurgency. Combined Arms Research Library, Command and General Staff College, Fort Leavenworth, KA 1

56 The Counter Terrorist ~ February/March 2010

http://www.dhs.gov/files/programs/ gc_1156877184684.shtm 5 http://ema.ohio.gov/Documents/ pdfs/Target_Capabilities/TCL_Info_ Gathering_May_2008.pdf 6 http://ema.ohio.gov/Documents/ pdfs/Target_Capabilities/TCL_Info_ Gathering_May_2008.pdf Safety, Division of Homeland Security, Information Gathering and Recognition of Indicators and Warnings, (81) 7 Kessler, Ronald The Terrorist Watch Inside the Desperate Race to Stop the Next Attack Crown Forum: New York 2007(p 164) 8 http://www.amberalert.gov/statistics. htm 9 Kessler, Ronald The Terrorist Watch Inside the Desperate Race to Stop the Next Attack Crown Forum: New York 2007 (p 188) 4


MARCH 23-24, 2010 WASHINGTON D.C. WALTER E. WASHINGTON CONVENTION CENTER

WHERE THE MISSION IS TO SECURE OUR NATION

EVENT HIGHLIGHTS

GovSec/U.S. Law is the only event for government that offers a comprehensive perspective on homeland security and has the convergence of IT and physical security at its core. Engage yourself in the full GovSec/U.S. Law experience, including:

Powerful keynote lineup jump starting each day

A 2-day, 4-track, 20-session program focusing on • Critical Infrastructure and Protection • Cybersecurity and Information Assurance • Domestic and International Terrorism: Deterrence, Preparation and Response • Law Enforcement Case Studies and Tactics

High-level, in-depth conference program

An expo floor featuring cutting-edge security products demonstrated by top industry innovators. Experience, first-hand, the newest systems, tools and technologies preventing future incidents, preparing for and responding to all hazards and disasters, and ensuring the public safety. OPENING KEYNOTE Anthony E. Zuiker Creator & Executive Producer of CSI: Crime Scene Investigation “Cross Platforming: New Interactive Strategies and Creative Solutions” Don’t miss this year’s only expo and conference with a comprehensive approach to securing our country. GovSec/U.S. Law—a must attend for 2010!

2nd Annual Domestic Defense Symposium: U.S. Military Forces, First Responders & Defense of the Nation Featured areas on the show floor: • Cybersecurity Pavilion • Focus on Digital Forensics • U.S. Law And so much more! BONUS! Access to FOSE featuring the Defense Innovations Pavilion!

OFFICIAL PUBLICATIONS

PRODUCED BY

UNCOVER THE CRITICAL INFORMATION YOU NEED TO COMPLETE YOUR MISSION FOR FULL EVENT DETAILS AND TO REGISTER:

www.govsecinfo.com

PLEASE USE PRIORITY CODE NQ1S03 WHEN REGISTERING

REGISTER TODAY! Circle 43 on Reader Service Card

The Counter Terrorist ~ February/March 2010 57


jihad In Cyberspace

By John Bumgarner and Michael Mylrea Media coverage of jihadists has often focused on acts of violence in the physical world, such as suicide bombings and shooting sprees. Less publicized, however, is the growing importance of the virtual world to the extremist groups that make the news. The free territory of cyberspace offers them a virtual sanctuary where they may plan, train for, and finance physical attacks. The jihadists’ operations are facilitated by web-based services and applications, such as social networking sites, encryption programs, and streaming video.

Counter The

58 The Counter Terrorist ~ February/March 2010


O

rganizations such as al-Qaeda and factions of the organizations Hamas and Hezbollah have used the Internet to propagate their extremist religious ideology. Members of these organizations use many of the most popular social-networking sites, including Facebook, Friendster, LiveJournal, MySpace,1 and Twitter,2 to spread propaganda. By providing access to a large network of users, these portals facilitate recruiting and fund-raising by extremist groups. These groups also use traditional social-networking sites, such as Yahoo! Groups or Google Groups. The architecture for private, quasi-

anonymous communication that is provided by many social-networking sites shelters members of extremist organizations from detection by most law enforcement efforts. Many socialnetworking sites feature user controls that allow extremist groups to prevent or detect infiltration. For example, individuals who seek to become group members might have to be approved or invited to join the group. Individuals requesting membership may thus be thoroughly vetted before they are permitted to view the content on the group’s website or to participate in forum discussions with other group members. Additionally, many social-networking sites permit groups to monitor forum content

The 2008 attacks in Mumbai, India, involved the Internet at multiple stages. Prior to launching the attacks, the organizers used a variety of Internet sites, such as Google Earth, to research their targets.16

The Counter Terrorist ~ February/March 2010 59


EXPO 2010 14-15 April 2010 | National Hall, Olympia

Countering the Global Threat

Some extremist websites are hosted on servers within the physical boundaries of the United States.

or other website activities. These elements are critical to ensuring the group’s operational security. Extremist groups have also learned to operate on social networking sites in a covert fashion. For example, public content may be carefully controlled to conceal the group’s true purpose. A simple masking technique avoids using any phrases (e.g., Allahu Akbar) or terms (e.g., Al-Mujahidin) that would trigger a search engine detection alarm.

Despite the advantages of socialnetworking sites for centralized and controlled collaboration, they also pose security risks to the extremist sects that use them. Infiltration is one danger; just as extremist groups will exhibition attempt to Dedicated for companies of hide their operations, law enforcement specialist security and intelligence agencies will attempt and counter terrorism technologies to discover them. Security mayand also be solutions compromised because extremist groups High level conference do not own the social-networking featuring multiple sites streams they use. To counter these risks, some Comprehensive programme of free-toattend technology and practical workshops Networking Functions For more information on exhibiting, visiting or attending the conference please contact: Nicola Greenaway Tel: + 44 (0) 208 542 9090 or email: ngreenaway@niche-events.com

PRE-REGISTRATION ENTRANCE ONLY, ATTENDEES WILL NOT BE PERMITTED TO REGISTER ON-SITE Headline Sponsor

R e g i s te r n ow at w w w. co u nt e r t e r ro rex p o. co m

CTX Ad 184x79.4 Nov09.indd 1

60 The Counter Terrorist ~ February/March 2010

27/11/09 12:22:40

Circle 47 on Reader Service Card


extremists have established their own portals, most of which function on systems controlled by third-party hosts who are unaware of the extremists’ activities.3 Some extremist websites are hosted on servers within the physical boundaries of the United States. Access to these portals is often heavily guarded by the extremist groups that control them. For example, some groups restrict connections by their location of origin (e.g., Egypt). Access to forums may also be password protected, and forum participants may be thoroughly vetted before receiving a password. On the forums, participants discuss a variety of topics, from religious beliefs to the construction of improvised explosive devices (IEDs). Forum organizers have begun to mask their communications through encryption, which presents a formidable challenge to efforts by law enforcement agencies to monitor the extremist groups’ activities. As early as 1998, Louis Freeh, former director of the Federal Bureau of Investigation, testified before a Senate Appropriations Subcommittee that “encryption has become the most important issue confronting law enforcement. Widespread use of robust, non-recoverable encryption is beginning to devastate our ability to fight crime and terrorism.”4 Evidence shows that extremist groups use and distribute sophisticated encryption programs. For example, in response to growing fears about eavesdropping, the Global Islamic Media Front5 released an encryption application called Asrar Al-Mujahidin (“Mujahideen Secrets”)6 first on several restricted forums and later on dozens of publicly accessible file-sharing sites. Mujahedeen Secrets supports several advanced encryption algorithms, including the Advanced Encryption Standard (AES). In 2001 the

U.S. government approved the AES to safeguard sensitive public information,6 and in 2003 the National Security Agency approved the AES to protect top secret information.7 Hezbollah has praised the brilliance of encryption programs such as Mujahedeen Secrets, which allow its members to communicate jihad messages without fear that they will be deciphered by “the Americans.” Extremist groups distribute other applications and programs on their websites as well. Many of these sites are digital repositories for bootleg copies of commercially available programs that might help members of an extremist group evade detection while planning or executing an attack. For example, some applications conceal Internet-surfing activities.8 Others are designed to perform highly advanced anti-forensic tasks, such as securely deleting files via methods approved by the U.S. Department of Defense or erasing incriminating Internet-surfing trails from a member’s computer.9 The extremist groups also distribute training materials on their restricted portals. These materials include copies of training manuals used by the U.S. military, especially the U.S. Army, which are available on many extremist sites. The manuals, which describe combat techniques, further link these extremist groups to violence. For example, U.S. Army FM 3-23.35 Combat Training with Pistols, M9 and M1911, which describes fundamental marksmanship techniques, is available for download from several extremist sites. The manual illustrates advanced shooting skills, such as the “controlled pair” or “double tapping” technique, which allows a trained marksman to quickly neutralize an opponent with two shots to the center of the chest or head at close range. One extremist site that provides access to this

Military Grade Night Vision and Thermal Gear For Your Warfighting Advantage!

NVBS-15 Dual Tube Binocular System

PHX-7 Medium-Range Thermal Binocular

UTAM-32 Thermal Acquisition Monocular

nivisys.com Nivisys Industries, LLC 400 S. Clark Drive, Suite 105 Tempe, AZ 85281 USA Tel: +1(480) 970-3222

Circle 153 on Reader Service Card

The Counter Terrorist ~ February/March 2010 61


manual advises its members to use public gun ranges to improve their handgun skills.10 Another manual, the TM 31-210 Improvised Munitions Handbook, created by the U.S. Army for Special Forces, has also been distributed on the websites of extremist groups. This technical manual offers practical advice on the construction of IEDs from materials that may be readily purchased from most home improvement centers. Although the techniques described in this book have been successfully exploited by terrorist groups for decades, the Internet has clearly lowered the cost of distributing these instructions. Many jihadist organizations also develop and distribute their own training materials via the Internet. Improvements in streaming online video have expanded the capabilities of these virtual training

Primero-CounterTerr 12/3/09 10:22 AM Page 1

aids. Web-based distribution confers other advantages to the groups as well. For example, web-based training may be more secure than physical training camps, which are vulnerable to physical attacks. Furthermore, aerial bombardment or skirmishes with ground forces pose a threat not just to the training camps but also to the people who attend them. By contrast, if a web-based training site is shut down, its members remain unharmed and live to fight another day. Web-based distribution also allows jihadist organizations to train more individuals in combat techniques.11 Web-based training materials may be disseminated quickly to members of extremist groups throughout the world. The materials may be downloaded (duplicated) by members at almost no additional cost and may be used by a large number of members simultaneously. The materials may also aid extremist organizations in their efforts to recruit and indoctrinate new members. Virtual-training materials developed by extremist groups cover a wide range of topics, including IED construction and guidelines on the use of shoulderfired surface-to-air missiles.12 One video shows how to make an IED from common household items, such as a

propane gas cylinder and a cell phone to serve as a detonator.13 The video also highlights the importance of using nails or other standard construction materials to create shrapnel that make the device more lethal. Another video demonstrates techniques for making a vehicle-borne improvised explosive device, or car bomb.14 Car bombs have been used successfully in many terrorist attacks, including attacks on the Marine barracks in Beirut, Lebanon, in 1983, Khobar Towers in Saudi Arabia in 1996, the U.S. embassy in Kenya in 1998, and the Danish embassy in Islamabad, Pakistan, in 2008. Many videos advertise the effectiveness of radical violence by extremist groups. For example, some videos show the tactical effectiveness of roadside bombs used against coalition forces in Iraq. Others document brutality inflicted by extremist groups on their captives. Some videos highlight the path to martyrdom chosen by other group members. The As Sahab Foundation for Islamic Media Publication, which has supported various organizations known to be al-Qaeda Associated Movements (AQAM), created a unique video depicting the 2008 bombing of the Danish embassy that blends several of

Advance Your Communications with primero DPC™ New primero DPC™ is a custom-fit boomless radio headset with dynamic hearing protection! •In quiet situations, primero DPC is “acoustically transparent”. Hear all environmental sounds as if you were not wearing hearing protection. •In loud situations (similar to rock concert volume) you can still hear normal radio communications. •In the loudest situations (gunshots, crashes, etc.) sounds are instantly reduced to a safe level. Wired and wireless PTT units available www.earinc.com • www.eartactical.com • www.hearplugz.com • 303-447-2619• 800-525-2690 62 The Counter Terrorist ~ February/March 2010

Circle 55 on Reader Service Card


We’ve just turned the tide in flood damage. Using sandbags to mitigate flood damage no longer holds water. FloodSax are the new, lightweight, compact, clean and superior-engineered alternative to the mess and limitations of sandbagging. TM

Introducing TM

• Rapid Deployment: FloodSax

FloodSax

TM

expand to their full size in only 3 minutes in water.

• Superior to Sand: Seals, blocks and diverts flood waters infinitely better than sandbags. TM

• Clean: FloodSax

eliminates the need for messy sand, dirty workspace and materials.

• Compact: 20 FloodSax

TM

per carton vacuum sealed in bundles of five.

• Dual Sizes: Expands to 20” x 17” or 18” x 15” when inflated. • Lightweight: 15 ounces or 22 ounces when dry, deploys to 32 lbs or 44 lbs (respectively). • Durable: Lasts up to 3 months deployed in use ~ 5 years on shelf. • Versatile: Can be used to soak up interior water seepage or spills. TM

• Biodegradeable: FloodSax

are 100% biodegradeable.

See our incredible video at : w w w. F L O O D S A X S T O R E . C O M SECURITY SOLUTIONS INTERNATIONAL LLC • 866-573-3999 • bradman@homelandsecurityssi.com

Circle 131 on Reader Service Card

The Counter Terrorist ~ February/March 2010 63


these elements.15 The video begins with an interview with a suicide bomber. It then uses computer animation to simulate a suicide bombing attack on the Danish embassy that ends in a massive fireball. The video has been widely distributed on many websites, including YouTube.

Video applications also play a pivotal role in the psychological warfare operations of extremist groups. Many videos direct persuasive communications toward a specific audience to propagate the groups’ ideologies. AQAM organizations are increasingly featuring members who speak English in videos

We have been specializing in providing U.S. government agencies with specialty explosives for 25 years! We provide a full line of REAL & INERT explosive products especially suited for Bomb Techs, Entry Teams, Special Teams and K9 Professionals.

Now Available

The Omni UBS Universal Breaching System Make Any Size Frame or Port. Please visit our website for more images.

Omni Distribution Inc. Explosive Products Division PO Box 69, Marion AR 72364 800.277.6664

www.OMNIexplosives.com Website password... “omniexplo” 64 The Counter Terrorist ~ February/March 2010

Circle 309 on Reader Service Card

aimed at Western audiences. The release of a video may also be timed to achieve the greatest possible impact. For example, a cell-phone video of an IED attack may be released immediately following the event, which attracts media attention and possibly an ancillary following by the general public. The video may thus intensify the emotional response of the public to an attack that has taken place. Extremist groups use the Internet not only to plan, prepare for, and publicize physical attacks, but also to execute them. The 2008 attacks in Mumbai, India, involved the Internet at multiple stages. Prior to launching the attacks, the organizers used a variety of Internet sites, such as Google Earth, to research their targets.16 Satellite images and maps available online enabled the attackers to reconnoiter their targets in Mumbai remotely. Using Google Earth, the attacks could be planned from afar with great precision, down to the entrances and exits to be used at the primary targets. Such detailed preparation would reduce the likelihood of encountering unforeseen obstacles along the assault paths and increase the effectiveness of the attacks. On the day of the Mumbai assault, the attackers reportedly communicated through the Internet with handlers in other locations. Armed with disposable cellular phones that were configured with subscriber identity module (SIM) cards obtained from different countries, the attackers shared updated intelligence with their handlers, who were listening on Voice over Internet Protocol equipment17. These steps made it more difficult for law enforcement agencies to intercept the calls or trace them after the attacks had taken place. It has also been speculated that the handlers used real-time television coverage to track the location of the police units and counterterrorism commandos that had responded


Circle 45 on Reader Service Card

The Counter Terrorist ~ February/March 2010 65


Pre-Conference 1 Day Training from SSI

report from the Commis“The Islamic Jihadist Threat” Call for recent Details! 866-573-3999 sion to Assess the Threat to the United States from Electro magnetic Pulse (EMP) Attack presented a fairly clear picture of an often unappreciated threat. An EMP strikes out in all directions within its line of sight, sending a series of high-energy pulses that tend to fry any exposed micro-circuitry, among other things, but does not have the flattening effects associated with a with nuclear strike. A few ounces in your pocket “A single EMP attack may seriously degrade or shut down a large part of the could save your life. electric power grid in the geographic area of EMP exposure effectively instantaneously. There is also a possibility of functional collapse of grids beyond the exposed area, as electrical effects propagate from one region to another.” The first HEMP (high altitude electromagnetic pulse) experiment was performed July 8, 1962 in a test 900 miles west of Hawaii. The experiment, Starfish Prime, successfully launched a 1950s’ vintage Thor intermediate range ballistic missile (IRBM) carrying a 1.4 Approx. to megaton warhead among other 4” xtest, 5” things, if there were any detectable impacts on the ground from an EMP 6” Approx. 4” x from the blast some 400 kilometers (km) in the air. It is important to note that these tests took place at a time when there was a fraction of integrated circuitry that exists today, though it seems that the impacts were significant. Reports from Hawaii included radios malfunctioning, television sets blown, more than 100 streetlights blown or fused, burglar alarms sounding, and power lines fused. On neighboring Kauai, the EMP shut down telephone Approx. 4” x 8” service, burning out equipment used in a microwave link. Later post-detonation reports indicated that the electromagnetic composition of the Van Allen belt, a radiation belt surrounding the planet, had been amplified or changed by the EMP. As a result, seven satellites were destroyed Enter coupon code SSCT110 to receive a 10% discount from ResQ-PAK.com ( Offer valid through March 15, 2010 )

Personal

Trauma Kits

RESQ-PAK.COM

66 The Counter Terrorist ~ February/March 2010

• 888 . 949. R ES Q ( 7377 )

Circle 315 on Reader Service Card


to the attacks. Updates based on the media coverage were transmitted to the attackers via their cellular phones.18 The Mumbai attacks are not the first example of the exploitation of online imagery technologies by an extremist group for remote target reconnaissance. It has been alleged that al-Qaeda has used similar technologies to study potential targets within the United States, such as nuclear power plants and natural gas storage facilities. There is evidence that extremist groups are planning to use the Internet itself as a weapon to attack critical infrastructure in the United States and disrupt the national economy. Computers captured from al-Qaeda show evidence of research on the logistics of cyber attacks against computers that control critical utilities, such as electric power plants and water treatment facilities19. Transportation systems have also been targeted. These critical computer systems are also vulnerable to physical attacks. For example, an explosive charge could be strategically positioned to incapacitate a communications choke point that routes emergency (911) calls. If people were unable to report incidents, emergency services would be delayed in their response. By providing a number of applications and services that substitute for faceto-face contact and physical training camps, the Internet enables extremist groups to promote their agenda. Cyberjihadist elements use the Internet to recruit, indoctrinate, and train new members to wage violent attacks. These groups have also used the Internet to coordinate physical attacks as they unfold. Furthermore, some extremist groups have begun to investigate ways to use the Internet itself as a weapon to launch cyber attacks that would have catastrophic consequences in the real world. Extremist groups will use the

Internet more and more as their members gain more technical knowledge and as technology continues to improve. As cyber-jihadist elements continue to flourish, efforts to combat them must also grow more sophisticated.

about the authors Mr. Bumgarner is the research director for security technology at the U.S. Cyber Consequences Unit and a senior research fellow at the Fletcher School of Law and Diplomacy at Tufts University. He was formerly a member of the U.S. Army. Mr. Mylrea is a Fulbright and critical Arabic language scholar in the Middle East. He has worked on various research projects for the Jebsen Center for Counter-Terrorism, Harvard Berkman Center for Internet & Society, and MIT Lincoln Laboratory.

endnotes http://viewmorepics.myspace. com/index.cfm?fuseaction=user. viewAlbums&friendID=481927459 2 Accessed at: http://twitter.com/ arrahmah 3 The Islamic website ekhlaas.org has been hosted by several United States service providers operating in Florida and Minnesota. 4 United States Senate Appropriations Subcommittee on Commerce, Justice, and State, the Judiciary, and related Agencies. Federal Bureau of Investigation 1999 Budget Request. 105th Congress. Washington, D.C. March 3, 1998. 5 Global Islamic Media Front Blog. http://gimf.wordpress.com 6 Federal Information Processing Standards Publication 197. Announcing the Advance Encryption Standard (AES). Accessed at: http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf 7 NSA Suite B Cryptography. Accessed at: http://www.nsa.gov/ia/programs/ suiteb_cryptography/index.shtml 1

Webroot - Window Washer. http:// www.webroot.com/En_US/consumerproducts-windowwasher.html 9 O&O Software - Safe Erase. http:// www.oo-software.com/home/en/ products/oosafeerase/ 10 How Can I Train Myself for Jihad. Accessed at: http://www.alqimmah.net/ showthread.php?p=19477 11 Maujahideen Training/Fighting (Martial Arts). Accessed at: http://www. youtube.com/watch?v=Fh86eTspLPY 12 Al-Qaeda Virtual Training. Accessed at: http://www.youtube.com/ watch?v=yQFsQt8IJhQ 13 Media Department of Ansar alSunnah (Army of Sunni Supporters), As Sahab Video. Accessed at youtube.com 14 Media Department Ansar al-Sunnah (Army of Sunni Supporters), As Sahab Video. Accessed at: www.youtube.com/ watch?v=LwjlCKuIGjc 15 Accessed at: http://www.youtube. com/user/3rbi1#p/a/u/2/Z_dCl6qs-yc 16 Jeremy Kahn, “Mumbai Terrorists Relied on New Technology for Attacks.” The New York Times, December 8, 2008. Accessed at: http://www.nytimes. com/2008/12/09/world/asia/09mumbai. html 17 Rhys Blakely, “Mumbai Terrorists Thwarted Security Agencies by Using Internet Telephones.” Times Online, December 10, 2008. Accessed at: http:// www.timesonline.co.uk/tol/news/world/ asia/article5317075.ece 18 Jeremy Kahn, “Mumbai Terrorists Relied on New Technology for Attacks.” The New York Times, December 8, 2008. Accessed at: http://www.nytimes. com/2008/12/09/world/asia/09mumbai. html 19 Kelli Arena and Ensor, David, “U.S. Infrastructure Information Found on al Qaeda Computers.” CNN, June 27, 2008. Accessed at: http://edition.cnn. com/2002/US/06/27/alqaeda.cyber. threat/index.html 8

The Counter Terrorist ~ February/March 2010 67


StormPac Ad#1:StormPac Ad#1 7/21/09 5:12 PM Page 1

68 The Counter Terrorist ~ February/March 2010

Circle 167 on Reader Service Card


Innovative Products Mirage Camo® In 2005, the U.S. Army began fielding a new uniform that blends into both wooded and desert environments equally poorly. Not to be out done, the U.S. Air Force released a blue tiger-striped camouflage uniform, and in the ultimate act of one-ups-manship, the U.S. Navy introduced an even more bizarre blue digital camouflage outfit. Unsurprisingly, special operations troops have made efforts to acquire more practical uniforms. One of the best performing of these is Mirage Camo®. This pattern consistently outperforms the Department of Defense’s flamboyant fashion statements. www.miragecamo.us

STORM Pac™ The Sager Tactical Orthopedic Response Matrix (STORM Pac) is the only tactical splinting system in the world with a full range of motion from 30° to 330°. It is designed to enable first responders to treat multiple fractures and/or multiple patients and eliminate the

need to carry multiple kits. The compact, lightweight kit includes three main components; a compact traction device, two Adaptors™ and a bacteriocidal and bacteriostatic Tensor Cravat System. Together the three components facilitate tactical fracture response in today’s challenging rescue environments. www.sagersplints.com The Counter Terrorist ~ February/March 2010 69


Counter

advertiser index

The

February/march 2010

Volume 3 • Number 1

Official Journal of the Homeland Security Professional To request detailed product information, circle the appropriate reader service number (RSN) on the attached Reader Service Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.

RSN

Ad/Company • website and/or email...................................Page Number

RSN

Ad/Company • website and/or email...................................Page Number

175

Ahura Scientific • www.ahurascientific.com/ct.......................................... 2

73

Northrup Grumman • www.remotec.northropgrumman.com..................... 15

95

ALS Technologies Inc • www.lesslethal.com............................................ 62

77

NTOA 2010 Ad • www.ntoa.org........................................................ 61

337

Avon Protection Systems • www.avon-protection.com................................. 7

309

Omni Distributors • www.omniexplosives.com......................................... 53

93

AWC Systems Technology • www.awcsystech.com.................................. 24

75

Oshkosh Corporation • www.oshkosh-tacticalprotector.com...................... 17

91

Blauer Manufacturing Co • www.blauerhomelanddefender.com.................. 4

343

OSSI • www.spystik.com.................................................................... 22

67

CellAntenna • www.cellantenna.com.................................................... 25

169

P&R Technologies • www.prtech-thermalimaging.com.............................. 16

123

CenterTech • www.preventivestrategies.net............................................ 40

127

Patriot 3 • www.patriot3online.com.................................................... 72

89

Counter Terror Expo 2010 • www.counterterrorexpo.com........................ 42

141

Pistol Cam • www.pistolcam.com......................................................... 26

87

Degrata Tactical Inc • www.degrata.com............................................... 38

109

Police One • www.homeland1.com/registration.................................... 34

159

Delta Nu • www.deltanu.com.............................................................. 70

191

PoliceTraining.net • www.policetraining.net............................................ 16

161

Eagle Industries • www.degrata.com..................................................... 43

301

PR Corporation • www.opformunitions.com............................................ 56

163

Ear Phone Connection • www.earphoneconnect.com............................... 40

315

Res-Q-Pack • www.resq-pak.com......................................................... 41

135

ESRI • www.esri.com/publicsafety........................................................ 12

101

Scanna MSC • www.scanna-msc.com.................................................. 18

307

Explotrain • www.explotrain.com........................................................ 69

243

Secure Search • www.securesearchinc.com........................................... 29

85

Extendo Bed • www.extendobed.com................................................... 67

171

SSI BlastSax • www.blastsaxstore.com.................................................. 39

165

EyeOn LLC • www.eyepole.com........................................................... 37

131

SSI FloodSax • www.floodsaxstore.com................................................ 51

83

Golden Engineering • www.goldenengineering.com............................... 50

215

SSI Homeland Security Training in Israel • www.homelansecurityssi.com...... 64

83

GOV SEC • www.govsecinfo.com....................................................... 36

117

SSI Suicide Terror • www.suicideterror.com............................................ 45

81

Icor Technology • www.icortechnology.com........................................... 23

179

SSI SWAT Counter Terrorism Course • www.homelandsecurityssi.com......... 57

233

Ideal Products • www.idealsupplyinc.com.............................................. 56

143

SWAT Headsets • www.swatheadsets.com............................................. 14

155

J&N • www.flashbangpole.com........................................................... 24

99

Tactical Electronics • www.tacticalelectronics.com...................................... 3

341

Lenco Industries • www.armoredtrucks.com............................................ 19

345

Telluric Group • www.telluricgroup.com................................................ 26

65

Lloyd’s Maritime Academy • www.terrorismstudies.com/AA1K1................ 35

349

The Armored Group • www.swat-vehicles.com....................................... 44

79

McGard • www.mcgard.com/home/assetsecurityrevenueprotection.......... 27

69

U.S. Explosive Storage • www.usexplosivestorage.com............................ 29

167

Minto Research • www.sagersplints.com.................................................11

139

Zistos Corp • www.zistos.com............................................................. 52

153

Nivisys • www.nivisys.com.................................................................. 49

71

Z-Medica • www.z-medica.com........................................................... 71

70 The Counter Terrorist ~ February/March 2010


Circle 161 on Reader Service Card

Circle 307 on Reader Service Card

The Counter Terrorist ~ February/March 2010 71


Training Review

.50 Long Rifle

L

ate on a chilly night in May, 2004, I crouched on a Fallujah rooftop. “S” (a talented young sniper), “E” (the senior sniper), “P” (a communications specialist), and I had silently navigated an urban maze of side streets and alleyways. Stepping over slum debris and gliding from shadow to shadow while covering each other with our rifles, we found a collapsing set of concrete and rebar stairs that led to the rooftop that would serve as our observation post. S had already shot two people and I had controlled an AC-130 strike, killing a total of about a half-dozen

By Chris Graham

Sniper with .50 M107A1. Photo: Courtesy of Chris Graham. terrorists that evening. E had set down his assault rifle and emplaced his .50 caliber M82A1 Special Applications Scoped Rifle (SASR) oriented down “Michigan”, the eastwest highway we were monitoring. The AC-130 was tracking a white Toyota pickup truck with two terrorists on board moving from the city center toward us. As it came into view, I nodded to E and said, “Slayer, you are cleared to engage,” into my PRC-148. E thunderously released a .50 Raufoss round. It flashed green through my night vision goggles as it slapped into the center

72 The Counter Terrorist ~ February/March 2010

of the truck’s engine block. Instantly halted, the truck exploded with two high explosive shells from the gunship orbiting invisibly overhead. The crumpled mass of the junked Toyota illuminated the darkness with small flickering flames. By the time we were withdrawn from Fallujah a few weeks later, I had been impressed by the capabilities of the air force AC-130s that supported us each night and convinced that no other form of close-air-support could perform similarly. I also swore to myself that I would become proficient with the monstrous .50 SASR at the


soonest opportunity. On a cool November day five years later, that opportunity finally occurred. Barrett Firearms hosted Long Rifle (LR) One and Long Rifle Two courses near Raton, New Mexico. Jay Gibson, a former USMC scout sniper and Special Operations Training Group instructor, and Don Cook, a former USMC infantryman and match armorer provided six days of instruction. On day one of the LR One course, I was provided with a .50 M82A1 rifle with a Leupold MK-IV scope. Don taught students about the assembly and function of the rifles and Jay provided classes on the fundamentals of shooting, scope operation, and the construction of a rifle data book. On day two, students zeroed rifles at 300 yards, shooting paper targets on a known distance range. During the second and third days of training, participants also confirmed data for

Circle 83 on Reader Service Card

their rifles shooting from the 500, 600, 800, 900 and 1,000 yard lines. Day four was the first day of the LR Two course. I was teamed with a 19th Special Forces Group staff sergeant and traded my rifle for a .50 M107A1 with BORS scope. Students (a different group from those in the LR One class) fired on the known distance range from the 500 and 1,000 yard lines in order to confirm rifle data. We tested a prototype .50 sound suppressor and conducted a night shoot against targets with little illumination at 500 yards. Day five began with a 500 yard shoot against moving man-sized targets and a class on range estimation using objects of known size, mill measurements, and a constant variable. The day concluded with students creating a range card for an unknown distance range oriented toward a scenic ridgeline and engaging

steel targets. The final training day, probably the most fun and valuable day, consisted of two-man teams engaging targets at unknown distances. Teams started together and were permitted to maneuver independently for initiative driven engagements. I successfully hit a 44” x 36” steel target at 1,916 yards with my second shot and regularly scored first round hits on targets approximately 1,600 yards away. Snipers provide invaluable support to military, law enforcement and security operations. .50 caliber rifles have been successfully used to safely destroy explosive devices, disable trucks, boats, and aircraft, and engage individuals at long range, behind cover and wearing body armor. The Barrett Long Range courses provide the opportunity to develop proficiency in the use of these tools and evaluate these rifles prior to purchasing them.

The Counter Terrorist ~ February/March 2010 73


DUMMY TRAINING AIDS Inert Explosive Training Products & Solid Dummy “Rubber Ducks”

Custom products available by contacting us.

EXTREMELY DURABLE TRAINING AIDS

METAL RAILS

Sold separately

FULL LENGTH METAL BARREL

M4 AWST

Advanced Weapon System Trainer

*Mount all your tactical accessories. Sold Separately

Replica Rocket and Missile Launchers

We Provide:

IED Training Aids IED Training Kits Inert Explosives Replica Ordnance Replica Landmines Replica Weapons Replica Ammunition

Products for offical training use only! Suicide Vests & Belts IED Training Posters Training DVDs X-Ray Training Aids K9 Training Aids Custom Tooling Custom Production

74 The Counter Terrorist ~ February/March 2010

http://www.inertproducts.com Phone: 570-341-3751 Email: Sales@inertproducts.com Circle 53 on Reader Service Card


Stopping Power You Can Trust. QuikClot速 hemostatic agent the leader in hemostasis, rapidly and effectively stops bleeding. The absorbent dressings are easy-to-use and easily removed once the bleeding is controlled. With over 1.5 million units sold, QuikClot速 hemostatic dressings have saved countless lives. QuikClot速 Combat Gauze: Saving the Lives of those Protecting Us. For more information contact us at 203-294-0000 or visit us on the web at www.z-medica.com. Z-Medica Corporation 4 Fairfield Boulevard Wallingford, CT 06492 Circle 71 on Reader Service Card

The Counter Terrorist ~ February/March 2010 75


XPS-G2 Meet Extreme with X-treme:

X-treme Protection Series U.S. Patent pending

OPTIONS: • GUN PORT • LIGHT SYSTEM • BALLASTIC WINGS

wings open

OUTSIDE VIEW wings open

The XPS Series: The most maneuverable rifle threat shields on the market today. wings closed INSIDE VIEW

Introducing Patriot3’s X-treme Protection Series (XPS) Shield Line. The first high-threat protection designed for ease of use and superb mobility. The XPS’s unique, Patent Pending design incorporates the first ever, Folding Ballistic Wings. These Ballistic Wings are added to the XPS Base Unit to provide a wide area of coverage beyond that of the base unit. With the rotation of Patriot3’s revolutionary wing-deployment mechanism, the Ballistic Wings can be folded backwards to reduce the width of the shield enabling passage through commercial doorways. Once through the door, the Ballistic Wings are immediately re-deployed providing a wide area of coverage of up to 66” or three operators wide. In addition, each of the XPS Ballistic Wings can be removed instantly with one hand, allowing the XPS to split into as many as 4 separate hand held shields (NIJ 3 only) allowing team members to break away with ballistic protection to clear additional areas, simultaneously. The XPS Base Unit has several options such as Ballistic Gun Port, Lighting System, Folding Ballistic Wings, Ballistic Wing View Ports and Ballistic Wing Handles (NIJ 3 only).

www.patriot3.com

76 The Counter

Contact Patriot3 to learn more about our X-treme Protection Series. email: info@patriot3.com Terrorist ~ February/March 2010Patriot3 is a Sole Source Provider for the XPS Shield Line. Circle 63 on Reader Service Card


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.