Bhutto Assassination • EOD Man’s Challenge • Muslim Brotherhood
Journal for Law Enforcement, Intelligence & Special Operations Professionals
Counter The
June/July 2011
Counter
i
3
rd
ss
Ann
ve
The
ue
h
R
t
D WI N N AR r d Y E I N i A
G
AW
Volume 4 • Number 3
r s a ry
i
DONATIONS
Terror Financing and prosecution in the United states
June/July 2011 USA/CANADA $5.99
An SSI Publication ®
www.thecounterterroristmag.com The Counter Terrorist ~ June/July 2011 1
Š 2011 Thermo Fisher Scientific Inc. All rights reserved.
Every second matters.
When time and safety are critical, military and civilian first responders use Thermo Scientific handheld chemical identification instruments to rapidly identify explosives, precursors, narcotics and other chemical hazards directly at the point of need. With more than 5,000 handheld chemical identification instruments deployed worldwide, we understand what first responders demand of their equipment—and why every second matters. These insights were key as we developed FirstDefenderŽ RM and FirstDefender RMX, our next generation Raman instruments, which are even faster and easier to use than ever before. For rapid, accurate analysis of a wide range of potential chemical hazards,
FirstDefender RMX and FirstDefender RM Next generation Raman instruments enable rapid identification of unknown chemicals in the field.
turn to Thermo Scientific handheld instruments, formerly sold under the Ahura Scientific brand. To schedule a demonstration of our newest solutions, visit www.thermoscientific.com/mil-chemID or call +1 (978) 642-1132.
Moving science forward Circle 254 on Reader Service Card
2 The Counter Terrorist ~ June/July 2011
The Counter Terrorist ~ June/July 2011 3
Circle 99 on Reader Service Card
Counter
The Journal for Law Enforcement, Intelligence & Special Operations Professionals
XRT SuiT
SeriouS CBrN ProteCtioN for CritiCal MiSSioNS
June/July 2011
Volume 4 • Number 3
- Now ceRTified To AVoN c50 ANd fM12 ReSpiRAToRS ®
®
- bReAThAble goRe cheMpAk fAbRic foR eXTeNded weAR
COVER story:
- fRoNT-eNTRy deSigN wiTh iNTegRATed cbRN gloVeS ANd booTieS eNAbleS quick Self doNNiNg
32
- eXTRA STReNgTh fAbRic ANd SeAMS To pReVeNT blowouTS
contents
- No cheMicAl TApe
8
P R O T E C T I O N
20
Homeland Defender
TM
by
48
60
www.blauer.com 800.225.6715 4 The Counter Terrorist ~ June/July 2011 ISO 9001:2008 Certified
www.blauerhomelanddefender.com Circle 66 on Reader Service Card
Terror Financing and Prosecution in the united States By Brooke Goldstein and Aaron Eitan Meyer
FEATURES: 8
Firsthand: EOD Man Faces Greatest Challenge By Timothy Colomer
20
Case Study: The Assassination of Benazir Bhutto By Glenn McGovern
The Muslim Brotherhood: 48 Secular and Nonviolent?
By Dean Olson
60
The Enemy of My Enemy Is my friend...For now By John Andrews
departments: 6
From the Editor
31
Book Review
A War of Necessity?
The Management of Savagery
69 Innovative Products Lil Loco, Pointman, T2 Timer 72 Training Review Tunnel Assaulters Course Cover: Photo: Scott Morrison
The Counter Terrorist ~ June/July 2011 5
Counter The
From The Editor:
A War of Necessity? By Chris Graham
Journal for Law Enforcement, Intelligence & Special Operations Professionals
Volume 4 • Number 3
T
June/July 2011
he United States faces significant challenges. Our government’s deficit spending crisis continues to intensify. American forces are heavily committed around the world. Adversary nations and non-state actors continue to challenge the USA and our allies. On March 19, 2011, the United States government fired more than 100 cruise missiles into Libya for the purpose of destroying selected Libyan personnel and equipment. By any definition, this is an act of war. I believe there are some worthwhile questions to ask ourselves. Who are the “rebels” we are supporting in North Africa (and across the Middle East)? What is our desired end-state in Libya? Do we have the will to bear the costs of seeing that mission through to completion? What do we gain if we are successful? What do we stand to lose if we fail? What do we stand to lose if we succeed? Who stands to gain the most from these flare-ups and our responses? Semper Fidelis,
Chris Graham Editor of The Counter Terrorist
Editor Chris Graham Director of Operations Sol Bradman Director of Advertizing Carmen Arnaes Director of Production Kelli Richardson Contributing Editors Eeben Barlow Jennifer Hesterman Richard Marquise Steve Young Graphic Design Morrison Creative Company Copy Editor Laura Town Office Manager Lily Valdes Publisher: Security Solutions International 13155 SW 134th St. • STE 204 Miami, Florida 33186
ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: PARS International Corp. Web: www.magreprints.com/quickquote.asp Email: reprints@parsintl.com Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can also contact the editorial staff:
www.thecounterterrroristmag.com © 2010 Security Solutions International
6 The Counter Terrorist ~ June/July 2011
The Counter Terrorist ~ June/July 2011 7
Circle 13 on Reader Service Card
The morning of December 11th started out like any other. I woke at my normal time and went to the gym. At the half-way mark of my workout, I received a radio call that we were on the hook to exploit a recently found enemy weapons cache. I was an explosive ordnance disposal (EOD) team leader.
M Firsthand:
EOD Man Faces Greatest Challenge
y Marines met me at the gym to pick me up and we were on our way. The cache was about 30 minutes away and located off an “unimproved” dirt road in al Anbar province, Iraq. My decision was to lead our team in with my mineresistant ambush-protected (MRAP) vehicle first. This was not our normal convoy configuration. Our normal configuration was a security vehicle, my MRAP, and finally two more security vehicles. I took the lead down the dirt road on the advice of a great friend and mentor, Master Sergeant Daniel F. (MSgt F. was later killed in action conducting EOD operations.) I relieved Gunnery Sergeant F. in September 2006 upon completion of his tour. He passed to me as much information about the area of
operations as possible. That is when he told me of his idea to lead from the front in the MRAP on a dirt road because “it can take a bigger hit than these Hummers.” I knew the area where we were being called out to and it had a long history of enemy activity. This was not the first time we (the Marines) found weapons in this particular area. In fact, it turned into a regular mission we would be called on. In the same area, we had found several improvised explosive devices (IEDs), car bombs, assorted weapons, and other items indicative of enemy presence. I knew when we were leaving the forward operating base (FOB) that this would be a fruitful mission, and could provide an opportunity to destroy a large enemy weapons cache. As my convoy made its way down
EOD team pre-mission photo.
The nature of being an EOD operator means you are going to be exposed to explosions, and time, probability, and statistics meant we had a likelihood of being blown up at some point.
By Timothy Colomer
Counter The
8 The Counter Terrorist ~ June/July 2011
Author poses for photo on an MRAP. All photos courtesy of the author. The Counter Terrorist ~ June/July 2011 9
Â?
Based on national guidance and training for , The Tactical Aid and Collaboration Toolset (TACT™) software provides specific tools in the . TACT™ helps build situational awareness, and supports collaboration between the negotiation team.
 � � �  Circle 204 on Reader Service Card
10 The Counter Terrorist ~ June/July 2011
the main supply route, we picked one of the few dirt roads to drive down to arrive at the weapons cache. From there it would be a walk of a few thousand meters to the actual cache site. The dirt road was in relatively good shape. It was a single lane dirt trail that was used by local farmers. It appeared passable by vehicle. As we approached the end of the dirt road we could see the dismount area nearly 50 meters away. Without warning, our vehicle was rocked to the core from the blast of an IED. In an instant, we disappeared in a mushroom cloud. All four members of my team riding in the vehicle were immediately knocked out. The nature of being an EOD operator means you are going to be exposed to explosions, and time, probability, and statistics meant we had a likelihood of being blown up at some point. We planned for it; we verbally rehearsed for something that would resemble a standard operating procedure
Author’s MRAP after IED strike. (SOP), but it is something that you can never be ready enough for. The first 30 seconds after we were blown up were critical. My lead security Marine had to make sure we were alive. He was to hail us on the radio. It is a common enemy tactic to have a secondary explosive device nearby to target the expected responding crew. If the security element could not make contact with me or my vehicle, he would send a very small team for extraction and triage. Luckily, within 30 seconds or so after we were blown up, we regained consciousness. That is when our training and SOP kicked in, blocked out fears, settled our aggression, and let us choose our next step. After I made an assessment of my team in the MRAP, I knew everyone was okay. We were all conscious and ambulatory. My next move was to search the surrounding area with my EOD partner for possible additional
Circle 49 on Reader Service Card
The Counter Terrorist ~ June/July 2011 11
Information is the foundation of good intelligence. American Military University offers one of the most well respected intelligence studies programs in the country. This well balanced and academically rigorous program is offered entirely online using open source materials and is taught by credentialed faculty with extensive operational and academic experience. Courses are designed specifically for working adults who are seeking to enter into or advance their careers in intelligence. Come find out what makes AMU the leader in intelligence education.
The B.A. Intelligence Studies offers concentrations in:
The M.A. in Intelligence Studies offers concentrations in:
Six Course Academic Certificates include:
• Criminal Intelligence • Intelligence Analysis • Intelligence Collection • Intelligence Operations • Terrorism Studies
• Intelligence Analysis • Intelligence Collection • Intelligence Operations • Criminal Intelligence • Homeland Security • Terrorism Studies
• Cybercrime • Digital Forensics • Information Assurance • Information Systems Security • National Security Studies
IEDs. We searched for 10–15 minutes, but it felt like an eternity. By the time we were finishing up with the search of our area, the infantrymen who had made the original request for support were showing up. They helped the rest of the convoy conduct their search of the area near their vehicles. We were fortunate not to have found any other explosive devices. It was then back to the mission. While operating, we kept our bulk explosives on the outside locker of our vehicle for obvious reasons; if something catastrophic happened, at least we didn’t have any more hazards inside the vehicle to contend with. Even though the explosives are rather insensitive, I would always err on the side of caution and safety. I did not want to risk our safety anymore than I had to in order to accomplish the
mission. (Always respect explosives and handle with caution—no matter how proficient you are.) While we were regrouping from the search, I realized those lockers had been destroyed. I had no more bulk explosives. I had no way of finishing my mission. I had to call another EOD team for support. In the midst of the controlled chaos after the blast, and during the IED search, one of my navy corpsmen was triaging several of my personnel. One individual (another corpsman) that was in my vehicle during the blast was injured by some flying tools. His injuries did not appear to be severe; however, it was head trauma. We all just survived head trauma by way of being concussed. Another one of my personnel in the back of the vehicle had an EOD robot crash into his leg. He was ambulatory, but probably in
2009 & 2010 Effective Practices Award AwArd winner
2009 Ralph E. Gomory Award for Quality Online Education
LEARN MORE AT
OR CALL
amuonline.com/intelligence
877.777.9081
American Military University Push your mind. Advance your career.
VBIED Post Blast (500 pounds of ANFO). Circle 270 on Reader Service Card Circle 172 on Reader Service Card
Circle 29 on Reader Service Card
12 The Counter Terrorist ~ June/July 2011
August Mission: August 21-29, 2009 November Mission: November 6-14, 2009
Circle 108 on Reader Service Card
The Counter Terrorist ~ June/July 2011 13
shock. To a certain extent, I think we all were. We were in shock from the blast, escaping the blast, the adrenaline rush we immediately got upon waking, and knowledge and slowly sinking comprehension of what happened. My
EOD partner and I did not initially recognize any personal injuries. During the triage I was in radio contact with the second EOD team. They were on the way. My corpsman was finishing his triage, and I was trying
Our robot placing a shot on an IED.
to develop greater situational awareness and work out a game plan to finish the mission. That is when I manifested signs and symptoms of concussion. I was getting dizzy, nauseous, and had blurred vision, and several other mental and physical abnormalities. I vomited and was aided by our corpsman. He made a recommendation to evacuate to the FOB hospital at Taqaddum (TQ) for medical evaluation. The infantrymen stayed at the incident site for security of the vehicle and awaited a tow/wrecker vehicle and the second EOD team. We arrived at TQ medical approximately one hour after the incident. My men and I were triaged. Everyone was okay, except our corpsman and I. We were evacuated to Balad Airbase for more extensive tests and evaluations. My corpsman was eventually sent home to the United States. After three weeks at the hospital,
Protective security equiPment At ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support. • • • • •
CALIBER® Robot Hook & Line Kits Search Mirrors EOD Hand Tools Search Kits
ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3 Tel: 613.745.3600 I Fax: 613.745.3590 I Email: sales@icortechnology.com Toll Free: 1.877.483.7978 www.icortechnology.com Circle 184 on Reader Service Card
14 The Counter Terrorist ~ June/July 2011
Circle 81 on Reader Service Card
Circle 252 on Reader Service Card
The Counter Terrorist ~ June/July 2011 15
Foot patrol mission planning.
I was getting dizzy, nauseous, and had blurred vision, and several other mental and physical abnormalities.
I decided I wanted to return to my Marines. I could not leave them. The doctor told me I would not be leaving the wire for the rest of the deployment, but he would allow me to stay in
country on a FOB. I finished our tour as the staff noncommissioned officer in charge (SNCOIC) of the EOD platoon with the help of my mentor Master Gunnery Sergeant Michael S. He was my first SNCOIC, and my last. (I thought that was ironic). When I returned to the United States, I was stationed at Marine Corps Base Quantico, Virginia. I knew the Marines there. They took good care of me and knew of my intentions of getting out of the Marine Corps. I had 14 years of service and decided to get out of the Marines with my honorable discharge. I did have a naval doctor explain to me I would be eligible for a medical retirement if I wanted to go to the navy medical board. I decided against it because these boards can last many months. I wanted to move on with my life. I finished my final
.OGISTICS
241%74'/'06
The Premier Event in Fire & Life Safety
More than 130 education sessions in 12 tracks including: > Emergency Preparedness / Business Continuity – 9 sessions > Fire & Emergency Services – 15 sessions > Building & Life Safety – 13 sessions
241&7%65 5ERVICES
Great reasons to attend: > Learn from industry experts and the nation’s leading codes authorities > Earn valuable CEUs you can apply toward your licensing requirements > Gain the current information you can apply immediately on the job
June 12-15, 2011 Boston, MA
> Meet more than 300 solution providers at the Expo
Boston Convention & Exhibition Center
> Network with peers and make your voice heard at the Association Technical Meeting
Register today at nfpa.org/conference with your priority code: 9X-PA6-1Z, or call 1-888-397-6209. 16 The Counter Terrorist ~ June/July 2011
Circle 280 on Reader Service Card
Circle Circle 98 8 on onReader ReaderService ServiceCard Card
Circle 300 on Reader Service Card
The Counter Terrorist ~ June/July 2011 17 Circle 8 on Reader Service Card
physical, and in October 2007, nearly a year after being blown up in Iraq, I was a civilian again. Of course, I will always be a Marine. The protection that I credit with saving our lives was the Cougar MRAP. The vehicle’s protective armor and design deflected the blast and fragmentation of an estimated 200 pounds of explosives, minimizing our injuries. The detonation occurred directly under the passenger side of the vehicle in a daisy chain-type IED (two separate explosive devices linked together with explosive cord). If operating in an area known for heavy enemy activity be deliberate— take things as slowly as possible. Be more vigilant than you normally would be. Never let your guard down while operating, even if just for a second. Chances are it is going to be that second when something goes wrong. I also believe in the old SCUBA idea of “plan your dive, and dive your plan.” Relating this to ground operations is easy. Put an emergency plan in place, and in an emergency, use that plan. Chances are you will not even realize you are doing it until you are done. In populated areas, it is sometimes easy to pick up on cues from locals. Do not always count on them being around though, especially in rural and desolate areas. Always trust your men and your gut. If you fail to listen to either, you are failing at your job as a leader. Lastly, I would suggest that if you are injured, do not pursue a tough-guy attitude about your injury after the mission. The things I learned from my experiences in Iraq will always stay with me. The years that have passed since I was injured have been very painful (physically). I recently had long overdue magnetic resonance imaging. Doctors discovered that I had broken my neck.
306 Terrorist on Reader ~ Service Card 2011 18 TheCircle Counter June/July
I am lucky to be alive. I have since been treated, continue to undergo physical therapy, and life is good. My point is, all the pain could probably have been avoided if I had pursued a properly thorough assessment of my injury earlier. That might have kept me on active duty.
•
ABOUT THE AUTHOR Mr. Colomer is currently the USMC EOD Program Analyst and team leader of the Chemical Biological Radiological Nuclear Sensitive Site Exploitation team at A-T Solutions. He is also the Wounded EOD Warrior Foundation Ambassador (www.woundedeodwarrior.org).
Circle 120 on Reader Service Card
The Counter Terrorist ~ June/July 2011 19
Case Study:
The Assassination of
Benazir Bhutto
By Glenn McGovern
On December 27, 2007, a three-vehicle motorcade picked its way through Rawalpindi, Pakistan. Former Prime Minister Benazir Bhutto rode in a white Toyota Land Cruiser in the middle. At about 5:12 p.m. the vehicles exited Liaquat Bagh Park (named in honor of a prime minister assassinated in the park in 1951).
M
rs. Bhutto and her staff undoubtedly enjoyed a feeling of elation having just finished a rousing campaign speech in front of several thousand supporters. She was hoping to reclaim office in the upcoming elections. Two members of her protective detail were positioned at the back of her Toyota, standing on the rear bumper. Two additional men were positioned between the front and rear passenger doors, one on each side. All four men were facing the direction of travel and scanning the crowd. The Toyota, in addition to being armored, was equipped with a roof hatch, which opened outward from the center, providing approximately eight inches of additional shielding to the sides when fully opened. This enabled an individual to stand, exposing the upper torso. As the motorcade made its way out of the park and began to make a right turn onto Liaquat Road, it was met with a mass of pedestrians, many chanting their
Counter The
support of Mrs. Bhutto. The motorcade slowed to a crawl and Mrs. Bhutto stood up through the open hatch in the roof. Wearing a blue blouse with a shear white dupatta (head scarf ), she was all smiles as she waved to her constituents. The dense mass of people, estimated to be eight or more deep, closed in and surrounded the Toyota, separating it from the lead and follow vehicles. At approximately 5:14 p.m., a man positioned to the left rear of Mrs. Bhutto at a distance of between eight to ten feet away, opened fire with a pistol. At nearly the same time, a second shooter, wearing sunglasses and in a crossfire position at the front right side of the Toyota, also armed with a pistol (possibly a Steyr M-A1, 9 x 19 mm), opened fire. One of the rounds fired may have found its mark because Mrs. Bhutto collapsed almost immediately following the report of the weapons, falling into the lap of her assistant, Ms. Naheed Khan. Less than a second after Mrs.
There were at least two attackers amongst the crowd that fateful day.
Benazir Bhutto, former Prime Minister of Pakistan, speaks to the press upon her arrival for a state visit at Andrews Air Force Base. Photo: SRA Gerald B. Johnson, United States Department of Defense.
20 The Counter Terrorist ~ June/July 2011
The Counter Terrorist ~ June/July 2011 21
When the target is a public official at a public event, a suicide bomber may be successful despite the presence of a protective detail.
w w w. t r i p w i r e o p s . o r g
Site of Benazir Bhutto’s death. Photo: Khalid Mahmood Bhutto disappeared inside her vehicle, the shooter to the front detonated his suicide explosive device.1 Within moments of the blast, Mrs. Bhutto’s driver rapidly accelerated out of the ambush zone, but quickly discovered the vehicle’s handling had been compromised. The explosive blast had ruptured the tires. While dealing with severely hampered vehicle control, he was able to travel a distance of approximately three kilometers to a hospital. Just over one hour later, Mrs. Bhutto was pronounced dead, joining more than 60 victims killed or injured in the attack.2 Just two months prior to this, on
October 18, a similar attack had been perpetrated against Mrs. Bhutto. She had spent the day celebrating her return to the country by taking a tour on a bus as a part of the announcement of her intention to run for the office of prime minister. At close to midnight, she had stepped into a crowded area. A suicide bomber approached, threw a grenade inside her bus, and detonated the explosive device he was wearing. The blasts reportedly killed approximately 130 people, including a reported 50 security personnel, and wounded scores of others.3 Since the December 27 attack, there have been three separate investigations:
www.c-ieds.com 5th Annual
COUNTER IEDs 2011
A Holistic Approach to Countering the Evolving Threat from IEDs TEL: +44 (0)20 7368 9300
22 The Counter Terrorist ~ June/July 2011
20th-22nd June 2011, 4 Hamilton Place, Royal Aeronautical Society
FAX: +44 (0)20 7368 9301
EMAIL: defence@iqpc.co.uk Circle 264 on Reader Service Card
EXPLOSIVES SALES
TR AINING SER VICES
Tripwire Operations Group is an ATF Licensed Manufacturer/Dealer of explosive materials.We have a full line of energetic materials for the bomb technician, explosive breacher, explosive detection K-9 handler, military end user, research laboratory and contractor.
Tripwire Operations Group, LLP. is a partnership made up of highly trained professionals who provide the most up to date training in all Chemical, Biological, Radiological, Nuclear, Explosive (CBRNE) disciplines.
TEXPAK
™
Next Generation Binary Explosives
• Most cost-effective binary explosive • Mixes in seconds, arms instantaneously • No magazine storage required prior to arming • No nitroglycerine; no headaches • high velocity,high gas volume
BlAsTsAX • Providing protection from small explosive devices • Preserves the maximum amount of evidence • Bags allow water to be absorbed without releasing it
™
TM
• Designed for use with commercial binary explosives • Activate,Prime and Deploy — that simple! • Designed for soft-sided targets such as backpacks or clothing. • Operating instructions with visual are written on the label
Circle 238 on Reader Service Card
PROuDLy OWNED AND OPERATED By FiRsT REsPONDERs FOR FiRsT REsPONDERs
Licensed ATF Explosives & Class 3 Firearms Dealer
Post office Box 4026 • GettysBurG, PA 17325
The Counter Terrorist ~ June/July 2011 23 PhONE 888-330-7015 • FAX 717-334-6391
by the Pakistani authorities, by the London Metropolitan Police (Scotland Yard), and the most recent by a special investigative tribunal of the United Nations. These investigations arrived at separate conclusions regarding the precise cause of death. The first was proffered by the Pakistan government stating Mrs. Bhutto struck DT 5008 CT FEB.pdf 1 12/1/10 her head on the latch of the roof hatch
with such force as to cause a fatal brain injury. However, because no blood, hair, or skin was reportedly found on or around the latch, that assertion may be without merit .4 She may have been the victim of a gunshot wound or the explosive device. Unfortunately, an autopsy was not performed and in accordance with Islamic preference, Mrs. 3:04 Bhutto PM was buried soon afterward, so the
NAME: Maria DEPARTMENT: Manufacturing PHILOSOPHY: Every day at work, I think about those brave men and women that wear the gear I make. Knowing they are out there protecting our nation is what drives me to do my very best and give 100% to my job.
C
M
Y
CM
MY
CY
CMY
K
800.882.7667
true cause may never be confirmed. There were at least two attackers amongst the crowd that fateful day. It is noteworthy that the shooter/suicide bomber wore sunglasses at the time of the attack and that very few, if any, others in the crowd wore them.5 Was it an attempt to conceal any anxiety, tunneling vision onto Mrs. Bhutto, or the oft-mentioned ‘1000-yard stare’? While it remains unknown, it is a possibility because this individual was also in close proximity and in the direct line of sight of at least one or more members of the protective detail. Regardless of the exact cause of Mrs. Bhutto’s death, the assassins were successful in their goal. The United Nations’ report contained a statement by Mrs. Bhutto’s personal head of security, retired Pakistani Army Major and Police Superintendent Imtiaz Hussain (a man who had performed a similar role for her during her 1993–1996 tenure as prime minister of Pakistan). It stated that he “had advised her many times not to expose herself by standing through the escape hatch of her armoured car to wave to the crowds, but she would usually ignore his advice and sometimes express anger at being told what to do.”6 It appears that the entire attack was based upon the assumption that Mrs. Bhutto would present herself through the roof of the armored vehicle. Notable is the fact that those inside the vehicle with her reportedly did not suffer any injuries. In this case, the threat could have been classified at the highest level because she had already survived a previous assassination attempt just two months before, and because she lived and worked in Pakistan. If additional reason for caution was required, several members of her family had also been killed or died mysteriously around the world. Attacks by a suicide bomber represent one of the most challenging contingencies
for any individual who might be targeted. The primary hope to reduce the number of victims to a minimum requires interdiction at the earliest possible stage.7 When the target is a public official at a public event, a suicide bomber may be successful despite the presence of a protective detail. Should the bomber be identified early in a densely packed audience, and the bomber realizes the attack might be stopped, he or she may immediately detonate the device. A suicide bomber can easily wear more than 20 pounds of explosive material on a belt/vest device, and more in a backpack or satchel. Some have carried charges in body cavities, and female suicide bombers have in the past employed the ruse of pregnancy to not only delay possible violent action by authorities, but to conceal explosive material.10 Unlike a shooting-based assassination, suicide bombing attacks offer the adversary four methods of causing potentially lethal injury within a single package as well as immediate escape from apprehension. The first comes from the air blast or pressure wave resulting from the detonation.11 Fortunately, these pressures drop radically with every foot of travel.12 In the attack on Mrs. Bhutto, the type of explosive used has not been publicly released, but the force of the blast was strong enough to launch the head of the bomber (approximately 10 pounds) some distance away. The discovery of the head is common in suicide bombings and illustrates the second type of injury resulting from explosive based attacks: amputation of limb. While the bomber will obviously receive such wounds, the target needs to be fairly close to the detonation point to sustain similar injuries. The third method is thermal-based injuries. While exceedingly painful, they are often not as lethal as might be
assumed. However, the amount and degree of thermal damage corresponds to the proximity to the explosive device at the time of detonation, and the type of energetic material used in the device. The final wave of attack is the shrapnel thrown by the device including anything added for effect (e.g., nails, ball bearings, etc.). Unlike a bullet, those fragments will be tumbling through the air causing even more damage to the human body upon contact. Terrorists in the same region have even been reported to pack infected objects into devices in hopes of increasing the lethality of shrapnel. Fortunately, suicide-bombing attacks are currently rare in much of the world. For any law enforcement officer working an event, assigned to a protective detail, etc., postulating a strategy on how a suicide bomber will be identified let alone dealt with is problematic. In truth, the potential unknown variables will vastly outnumber the known facts. Imagine the scenario of a radio broadcast that information has been obtained indicating a suicide bomber is on the grounds at a local public event. The description states the bomber is a female and includes information on physical characteristics and clothing. An armed police officer or security individual spots a female matching the description and a challenge is given. No device is visible and she is not complying with commands. Her hands are concealed inside of the pockets of her bulky jacket. She is continuing to move through a fairly dense crowd of people, many of whom are stopping to watch what the officer does with the noncompliant woman. Does the officer open fire? One commonly postulated concern is the likelihood that a bullet could detonate the explosive material. This is theoretically possible, especially if the
3 3
24 The Counter Terrorist ~ June/July 2011
Circle 206 on Reader Service Card
Circle 290 on Reader Service Card
The Counter Terrorist ~ June/July 2011 25
Metal ball-bearings found by Explosive Ordnance Marines lie in a chair in a schoolyard in the Baghdad suburb of Ziona. Photo: U.S. Marine Corps photo by Master Sgt. Buzz Farrell.
The final wave of attack is the shrapnel thrown by the device including anything added for effect (e.g., nails, ball bearings, etc.)
26 The Counter Terrorist ~ June/July 2011
material used is some form of improvised explosive composition, such as triacetone triperoxide or hexamethylene triperoxide diamine, both highly susceptible to shock. The officer on the ground at the moment has no way to be sure what type of material was used. The way to stop the bomber with a high probability of success is a well-placed fatal shot to the head. Even this option must be weighed against the possibility of a dead-man switch or an escorting handler with a remote control. For law enforcement dealing with use-of-force issues, the suicide bomber is on the top of the chart—deadly force authorized. However, unlike a suspect drawing or mimicking the drawing of a weapon, the bomber does not have to make any exaggerated movements. His/ her hands are in pockets and the thumb merely moves a fraction of an inch. The officer on scene will not know the quality of the intelligence information or perhaps even that this is the correct individual. If the information is solid and this is the correct person, and a shot is taken and successful, the officer is a hero. If not, the officer has just killed an innocent woman. Such was the case of the killing (reportedly by an armed member of the Metropolitan Police) of a possible suicide bomber in London following
subway bombings.13 The suspect turned out not to be a suicide bomber in that case. While snipers are a logical tool to employ against suicide bombing threats, they must be trained to take a shot from an elevated platform onto a small target moving through a sea of civilians and must be present at the incident site. While certainly better prepared to take a headshot, they too will be faced with an enormous amount of situational uncertainty. Whether the assassination of Mrs. Bhutto was perpetrated by al-Qaeda, the Taliban, members of the Pakistani government (the Pakistani government previously obstructed Bhutto’s attempts to hire American security specialists and recent arrests suggest possible governmental involvement), or some combination thereof, the difficulties that arise when facing a hostile organization are highlighted. The majority of world leaders and lawmakers falling victim to targeted violence do so at public events.14 The attack on U.S. Senator Gabrielle Giffords in Arizona on January 8, 2011, is just the most recent high-profile example. Those in the public eye will always face a potential of violence. For those individuals, the goal is to minimize
Circle 174 on Reader Service Card
102 on Reader Service Card Circle 128 Circle 180 on Reader Service Card
The Counter Terrorist ~ June/July 2011 27
opportunities for attack. Unfortunately, not every attack will be stopped.
•
ABOUT THE AUTHOR Mr. McGovern has served in SWAT, JTTF and protective operations assignments. He is the author of Targeted Violence (CRC Press, April 2010), and the forthcoming Protective Operations (CRC Press, April 2011).
ENDNOTES Determined by author after the viewing of Mrs. Bhutto from two separate angles, one from the rear looking forward and the second taken from the right front. 2 Moore, Matthew and Emma Henry, “Benazir Bhutto killed in gun and bomb attack” The Telegraph, December 27, 2007, “http://www.telegraph.co.uk/ news/worldnews/1573792/BenazirBhutto-killed-in-gun-and-bomb-attack. html” www.telegraph.co.uk/news/ worldnews/1573792/Benazir-Bhuttokilled-in-gun-and-bomb-attack.html , 1
accessed December 28, 2005. Gall, Carlotta and Salmon Masood “After Bombing, Bhutto Assails Officials’ Ties” New York Times, October 20, 2007, “http://www.nytimes. com/2007/10/20/world/asia/20Pakistan. html?pagewanted=1&_r=1” www. nytimes.com/2007/10/20/world/ asia/20Pakistan.html?pagewanted=1&_ r=1 , accessed March 15, 2011. 4 The United Nations, Report of the United Nations Commission of Inquiry into the facts and circumstances of the assassination of former Pakistani Prime Minister Mohtarma Benazir Bhutto, page 40. “http://www.un.org/News/ dh/infocus/Pakistan/UN_Bhutto_ Report_15April2010.pdf ” www.un.org/ News/dh/infocus/Pakistan/UN_Bhutto_ Report_15April2010.pdf , accessed February 11, 2011. 5 Determined by author after the viewing of numerous different video clips from several different angles of the assassination. 3
The United Nations, op. cit. page 18 McGovern, Glenn Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings and Kidnappings, (Boca Raton, CRC Press, 2010), p. 98. 8 G. McGovern, op. cit., p. 99 9 G. McGovern, op. cit., p. 100 10 Department of Homeland Security Technical Level Course: Incident Response to Terrorist Bombings, attended by author in March, 2005 11 Department of Homeland Security Technical Level Course: Prevention and Response to Suicide Bombing Incidents, attended by author in March, 2005 12 Incident Response to Terrorist Bombings 13 “Police shot Brazilian eight times” BBC News, July 25, 2005, “http://news. bbc.co.uk/2/hi/uk_news/4713753. stm” http://news.bbc.co.uk/2/hi/uk_ news/4713753.stm, accessed March 15, 2011. 14 G. McGovern, op. cit., p. 193, 205 6 7
Digital Ears®
The Ultimate Tactical Com System
Bone Mic
INVISIO® X5
DUAL HEADSET » Clarity in high noise » Talk even at a whisper » Works under gas mask » Provides 360° Awareness
INVISIO® X50
» Certified hear-Pro
Multi-Com PTT
» Available in Custom Fit
» Control Multiple Radios » Works with Mobile Phones » Integrates into vehicle ICS » Simplified button layout » AA Battery lasts 100 hrs » Optional sniper/wireless PTT’s
Recommended TEA Acc.
The X50 can work with practically any 2-way radio or vehicle/aircraft intercom
30 Day Eval Program New York
www.TEAheadsets.com
28 The Counter Terrorist ~ June/July 2011
(845) 278-0960
California
(310) 457-7401
Texas
(469) 362-0121
Indiana
(574) 264-7217
Circle 302 on Reader Service Card
Circle 286 on Reader Service Card
The Counter Terrorist ~ June/July 2011 29
Paratch-CountTerFP511MBRf.pdf
1
4/8/11
4:30 PM
Book Review
The Management of Savagery By Abu Bakr Naji
T
he Management of Savagery (2004) is attributed to Abu Bakr Naji and can be accessed at http://ctc.usma. edu/publications/naji.asp. This document is a strategy for bringing about the Islamic state known as the caliphate. Naji seeks to provide one clear plan by which the Ummah can be led out of their current position as citizens of individual countries and put on “the path of divine guidance and salvation.” He pursues the goal of overthrowing every country’s government that subscribes to laws made by men and “freeing” human beings to live under shariah law instead. In his preface, Naji lays out some broad goals concerning America and then describes more specific details of his plan. By destroying respect for America among Muslim people, he intends to spread confidence among militant Muslims. Naji’s plan of action included “sequential strikes against America, ending with the strike of September which America deserved according to shariah…The inevitable result of this escalating sequence is the fall of the prestige of America among the masses and among the elites of the world in the armies of apostacy.” He believes this facilitates attracting more recruits to replace those who have been lost in battle and widening the conflict to a confrontation with all of Islam on a global scale. His intent is to publicly expose America’s inability to defend everywhere at once to Muslims. Successes against America are intended to encourage the targeting of weaker governments to bring about regional chaos, anarchy, and “savagery.” Naji refers to “the management of
C
M
Y
CM
MY
CY
CMY
K
30 The Counter Terrorist ~ June/July 2011
Circle 278 on Reader Service Card
Reviewed by: Avner Smith savage chaos.” He states that after an area is no longer controlled by a government, savagery breaks out. He advocates Islamic intervention in these geographic areas. His stated intent is for Islamic supremacists to agitate for the outbreak of savagery through “operations of vexation and exhaustion.” This is accomplished by means of many operations of all sizes against vulnerable targets that degrade organizational infrastructure and economies. This, in turn, causes the forces of the target nation or region to pull back to protect more valuable assets. When the daily life of citizens becomes harsh, the Islamists may overtly enter the chaotic region and set about meeting the requirements for the management of savagery. Some of these are as follows: · Spreading internal security/setting up a security apparatus · Providing food and medical treatment · Securing the region from invasion of enemies · Establishing shariah law · Indoctrinating and training the society to fight · Progressing until it is possible to expand and then attack the enemies in surrounding areas Once circumstances are advantageous, the Islamists can begin to expand their area of control from country to country, around the region, and eventually to the world. Naji’s stated priority countries or regions to target are “Jordan, the countries of the Maghrib, Nigeria, Pakistan, the countries of the Haramayn, and Yemen.” After the targeted states or regions are thrown into “savagery” and
then “managed,” the third and final phase is the “stage of establishment” where the Islamic state is set up with shariah law as its basis. This process is intended to repeat over and over again until Naji associates “liberate the earth and humanity from the hegemony of unbelief and tyranny through the power of God.” Naji asserts that missionary efforts are doomed to “relapse and fall to pieces if there are not those who nourish it with blood and build it with skulls and corpses.” This is acceptable because they “are confronting the crusaders and their helpers among the apostates and their army. Thus, there is nothing preventing us from spilling their blood, rather, we see that this is one of the most important obligations since they do not repent, undertake prayer, and give alms.” He does, however, offer another option: submission. Accepting this choice would enable the new subjects to convert and be “subjugated,” but the option for killing is always on the table. Naji explains, “he has repented after he had the capacity to do so earlier.” Much can be learned from this book. We face an enemy with a well-conceived strategy and he has demonstrated willingness to use any and all means to achieve his goal. If the world is to resist the Islamist threat over time, we must begin by understanding the goals and methods that have been set forth. Is the strategy described in The Management of Savagery in evidence anywhere today?
•
ABOUT THE AUTHOR Mr. Smith (pseudonym) is a federal law enforcement agent.
The Counter Terrorist ~ June/July 2011 31
Terror Financing and Prosecution in the United States By Brooke Goldstein and Aaron Eitan Meyer
On December 4, 2001, President George W. Bush announced at a White House news conference that, “those who do business with terror will do no business with the United States—or anywhere else the United States can reach.” President Bush notified the public that at midnight on the previous day, “the Treasury Department froze the assets and accounts of the Holy Land Foundation in Richardson, Texas, whose money is used to support the Hamas terror organization.”
Counter The
32 The Counter Terrorist ~ June/July 2011
Main Street (Beltline) in Richardson, Texas. Photo: Nathan Beach
T
he targeting of the Holy Land Foundation, at the time the largest Islamic charity organization in the United States, was a significant moment for the interdiction of terrorist financing, even as the United States was focused not just on Hamas, but al-Qaeda and other terrorist groups. U.S. interest in terror financing did not begin on 9/11. On October 7, 1985, two years before the Muslim Brotherhood founded Hamas, four members of the Palestine Liberation Front hijacked an Italian cruise ship (the Achille Lauro) and issued a demand that Israel release
several imprisoned terrorists. They shot a wheelchair-bound passenger from the United States named Leon Klinghoffer, and dumped his body overboard before Egyptian President Hosni Mubarak negotiated an end to the standoff. The murder of Klinghoffer, combined with the bombing of Pan Am Flight 103 in 1988, would lead to the Antiterrorism Act (ATA) of 1990 and its successor in 1991. The ATA extended U.S. jurisdiction over international acts of terrorism, and was expanded in 1994 with the addition of two statutes that criminalized providing “material
Scanned check given to Council on American-Islamic Relations (CAIR) by the terrorist organization Holy Land Foundation for Relief and Development. Photo: Matt57 The Counter Terrorist ~ June/July 2011 33
34 The Counter Terrorist ~ June/July 2011
Circle 256 on Reader Service Card
Circle 180 on Reader Service Card
support or resources” to foreign terrorist organizations. The current form of the statute defines material support and resources as “any property, tangible or intangible, or service, including currency or monetary instruments…financial services…expert advice or assistance, safe houses…weapons, lethal substances,
RBR North America is pleased to announce the rebirth of the RBR Helmet in North America. All the quality and features you’ve come to know and appreciate. Dealer inquiries welcome.
RBR North America
explosives, and transportation, except medicine or religious materials.” Recognizing that claimed “humanitarian aid” could constitute material support just as much as armaments, Congress expanded the definition of material support in 1996 with the enactment of the Antiterrorism and Effective Death Penalty Act (AEDPA). As the U.S. Supreme Court recently stated in Holder v. Humanitarian Law Project, “That repeal [i.e., the exception of ‘humanitarian aid’ from material support categories] demonstrates that Congress considered and rejected the view that ostensibly peaceful aid [to terrorist groups] would have no harmful effects.” Indeed, Congress deliberately crafted a broad description for material support because it found that “foreign organizations that engage in terrorist activity are so tainted by their criminal conduct that any contribution to such an organization facilitates that conduct (italics added).” This is because terrorist organizations “systematically conceal their activities behind charitable, social, and political fronts.” In fact, these groups often pursue objectives through dual tracks of violent crime in tandem with nonviolent public maneuvering. Yet, as international terrorism increasingly became a concern of the United States, prosecuting those who illegally financed terrorist organizations remained at a relative standstill before 2001. As the 9/11 Commission Report pointed out in 2004, “Before 9/11, Treasury did not consider terrorist financing important enough to mention in its national strategy for money laundering.” Against this backdrop, a tax-exempt charity was established in 1989 in the state of California, initially called the Occupied Land Fund, subsequently
Circle 248 on Reader Service Card
www.rbrnorthamerica.com Contact info@rbrnorthamerica.com North American Distributors for LBA International Limited. RBR North America is a division of Defense Optics Group Corporation The Counter Terrorist ~ June/July 2011 35
The Next Level Of Dry Firing!
Pro-Hamas demonstrators at a rally in Damascus, Syria, December 2008 during the Israel-Gaza conflict.. Photo: Thephotostrand
SIRT Training Helps You
• Save Money — Save Ammo • Get More Shots — Get More Training • Maximize Trigger Mechanics Features
• Red Laser Take-Up Indicator Option • Auto-Resetting Trigger Allows For Engaging Targets in a Continuous String • Powerful Shot Indicating Laser Works on Any Target • 6 Trigger Adjustments • Made In The USA
Order online, or call us today to learn more: 360.933.4640
NextLevelTraining.com
renamed the Holy Land Foundation for Relief and Development (HLF), which then relocated to Texas. In 1995 Hamas was identified by President Bill Clinton as a “terrorist organization which threaten[s] to disrupt the Middle East Peace Process,” as was Mousa Mohamed Abu Marzook, a Hamas political leader who had “designated HLF as the primary fundraising entity for HAMAS in the United States.” While Hamas continued to target civilians and recruit Palestinian children as suicide bombers, HLF continued to thrive, raising $13 million in the year 2000 alone. In total, the Justice Department estimated that HLF and its members sent approximately $12.4 million to Hamas from 1995 onward. After the 9/11 attacks, domestic “charities” were scrutinized more closely. In December 2001 the U.S. Treasury Office of Terrorism and Financial Intelligence (TFI) identified HLF under
Executive Orders 13224 and 12947 as a “charity that provided millions of dollars of material and logistical support to HAMAS” and then moved to shut down the foundation for good. In 2002 a federal grand jury in Dallas returned indictments against Abu Marzook and his wife Nadia Elashi, as well as “the INFOCOM Corporation, along with INFOCOM Vice President Ghassan Elashi,” who served as chairman of the Holy Land Foundation, and four of his brothers, all employees of INFOCOM.” Infocom was a computer and Internet services company begun with seed money from Abu Marzook, and which “continued to engage in financial transactions with Marzook after his designation as a terrorist, in violation of the International Emergency Economic Powers Act (IEEPA).” Almost two years later, in July 2004, a federal grand jury released a 42-count indictment that accused HLF of
Use code: ssi_sirt10 for SSI discount price.
Circle 272 on Reader Service Card
36 The Counter Terrorist ~ June/July 2011
Circle 29 on Reader Service Card
Circle 190 on Reader Service The Counter Terrorist ~ June/July 2011 Card 37
supporting “HAMAS activities through direct fund transfers to its offices in the West Bank and Gaza that are affiliated with HAMAS and transfers of funds to Islamic charity committees (“zakat committees”) and other charitable organizations that are part of HAMAS or controlled by HAMAS members.” Abu Marzook has thus far eluded imprisonment, and currently holds the title of “Deputy Political Bureau Chief of HAMAS, operating out of Damascus, Syria.” After an initial mistrial in 2007, the Elashi brothers and several HLF officers were convicted of various terrorrelated charges and sentenced to prison. (See appended chart A for HLF officers, and chart B for the Elashi brothers’ two trials, in 2004 and 2005.) Perhaps more notable than the HLF defendants themselves was an 11-page list of unindicted coconspirators released by the Dallas federal court in 2007. In addition to a list of individuals and entities who were “part of the HAMAS’ social infrastructure in Israel and the Palestinian territories,” or otherwise connected to Hamas, the list included three organizations as being or having been “members of the US Muslim Brotherhood,” namely the Islamic Society of North America (ISNA), the Muslim Arab Youth Association (MAYA), and the North American Islamic Trust (NAIT). Another prominent domestic organization, the Council on American Islamic Relations (CAIR), was also identified as a member of the “US Muslim Brotherhood’s Palestine Committee and/or its organizations.” Despite their status as unindicted coconspirators, these organizations remain active in the United States today. Most disturbingly, NAIT, MAYA, and ISNA have been granted nonprofit
Circle 176 on Reader Service Card
38 The Counter Terrorist ~ June/July 2011
status by the Internal Revenue Service; donations to each organization are tax exempt. CAIR continues to function though the Federal Bureau of Investigation (FBI) suspended formal contacts with the organization in 2008 because of its unindicted coconspirator status. Yet, as the Investigative Project on Terrorism noted in 2010, “Two recent episodes show that, despite this rhetoric and linking CAIR to a Hamas support network—in addition to unresolved questions about its current connections— government agencies continue to engage with the group, even sending its officials abroad to represent the U.S.” Despite its ongoing connections with the government, CAIR printed and publicly distributed flyers telling Muslims to “build a wall of resistance, don’t talk to the FBI” and filed a class action suit over allegedly illegal FBI surveillance of Muslim communities in Southern California over a 14-month period. Some Muslim communities have investigated CAIR themselves. In his recent testimony to the Committee on Homeland Security, Abdirizak Bihi, director of the Somali Education and Social Advocacy Center in Minneapolis, identified CAIR as deliberately impeding the Somali American community’s attempts to discover the whereabouts of missing children it feared had been radicalized and recruited by terrorist groups: CAIR held meetings for some members of the community and told them not to talk to the FBI, which was a slap in the face for the Somali American Muslim mothers who were knocking on doors day and night with pictures of their missing children and asking for Circle 106 on Reader Service Card
The Counter Terrorist ~ June/July 2011 39
The SR-556® offers Ruger’s legendary rugged reliability, and comes factory standard with a host of accessories that today’s shooters demand.
din -pen t n e t a pa ha t oys stem t l p m g sy ls, e e ode opera tin relia bl m , 6 g 5 n n e 5 riv Rnni all S iston d oler ru e k i o p l c , e ner, sta g 6FB -55 d two- h a clea he-art. R S e t The e-pla t ser wi a te-of-t u m o st e r h y h l t c es t is tru d i v pro m tha r firea
FB 556 SR- NATO/ . mm Rem 5.56 .223
C 556 SR- ATO/ N . mm Rem 5.56 .223
/6.8 556 C SR- 6.8 SP
new d its l y n a , nt e) azin ignifica '') g a m f or s (.850 ction. out with ont end hea vy ht redu ( s sa eig e fr .4 lb l y 7 from th 56C ha rd f or w n o 5 s a s SRdgu eigh 5 lb C w oves 0. cs. The he han 6 5 t i 5 r rem ynam SRnde The l design dling d fluted u n e barr ved ha r and is o r u o p im l cont e r r ba e ang wnr zzle o d and r mu wer g rea te is ideal o p the 6.8 with ting sses idge – R-556/ al hun e s s e r S o d cart an i The .8 p e 6/6 .8 SPC nergy. makes ty of th 5 5 i e 6 l i d t R e e . g S an sa th The rity of ownran l roles the ver pla tf orm o d a e e h c l t i t d t ia c au ity an sty prec ARor ta c velo fensive who a p onomic e e in d or thos and erg f rifle mizable o cust
©2011 Sturm, Ruger & Co., Inc.
40 The Counter Terrorist ~ June/July 2011
g,
the community to talk to law enforcement about what they know of the missing kids. Despite the fact that unindicted coconspirators continue to operate in the United States, the HLF prosecution certainly constituted a watershed moment in the development of terror finance prosecution; the Seventh Circuit en banc ruling in a 2009 civil suit filed against HLF and several others by the family of David Boim, a 17-year-old American murdered by Hamas in 1997, solidified further the liability of groups that finance terrorism. Although courts have not yet explicitly considered how to define the chain of liability when multiple organizations transmit funds to ultimately aid a foreign terrorist organization (FTO) in his opinion in the Boim case, Judge Richard Posner of the Seventh Circuit Court of Appeals provided an easily understandable formula to determine the liability chain: …donors to terrorism [should not] be able to escape liability because terrorists and their supporters launder donations through a chain of intermediate organizations. Donor A gives to innocentappearing organization B which gives to innocent-appearing organization C which gives to Hamas. As long as A either knows or is reckless in failing to discover that donations to B end up with Hamas, A is liable. Equally important, however, if this knowledge requirement is not satisfied, the donor is not liable. And as the temporal chain lengthens, the likelihood that a donor has or should know of the donee’s connection to terrorism shrinks. But to set the knowledge and causal requirement
higher than we have done in this opinion would be to invite money laundering, the proliferation of affiliated organizations, and twotrack terrorism (killing plus welfare). Donor liability would be eviscerated, and the statute would be a dead letter. The Supreme Court’s ruling in Holder further cited Hamas as an example of how to “muddy the waters” by using “its overt political and charitable organizations as a financial and logistical support network for its terrorist operations.” Despite these developments, loopholes remain in the framework of U.S. law that will likely not be closed until there is another case comparable to HLF in size and scope. The 9/11 commission noted, “trying
to starve the terrorists of money is like trying to catch one kind of fish by draining the ocean.” The nautical metaphor is particularly apt after the Muslim Brotherhood affiliate Union of Good (an umbrella group of charities designed to funnel money to Hamas and whose leader is unindicted coconspirator Youssef al-Qaradawi) was involved with a “freedom flotilla” of ships designed to break Israel’s counter-terror naval blockade of Hamas-controlled Gaza Strip in May 2010. Given the evolving nature of terrorism and terror finance, it is highly likely that laws and judicial doctrines will be needed to evolve apace. Looking to the HLF case as an example, there is reason to be encouraged that this will occur, so long as the government remains committed to prosecuting channels of terror finance.
•
092810
Circle 294 on Reader Service Card
Circle 178 on Reader Service Card
The Counter Terrorist ~ June/July 2011 41
ABOUT THE AUTHOR
12
Endnotes
register&docid=fr25ja95-126.pdf
Attorney General Transcript, News Confer-
ence with President Bush and Treasury Secretary O’Neill. http://www.justice.gov/archive/ ag/speeches/2001/1204newsconferencewithb ush.htm 2
Id
3
“Hamas,” Council on Foreign Relations,
updated August 27, 2009. http://www.cfr.org/ israel/hamas/p8968 4
“Terror aboard the Achille Lauro,” Mitchell
Bard. http://www.jewishvirtuallibrary.org/ jsource/Terrorism/achille.html 5
“Due to an enrolling error, the ATA was
enacted into law on November 5, 1990 as part of the Military Construction Appropriations Act--Public Law 101-519.” Statement by Senator Charles Grassley, Congressional Record, April 16, 1991. “http://www.fas.org/irp/ congress/1991_cr/h910416-terror.htm”http:// www.fas.org/irp/congress/1991_cr/h910416terror.htm The law was repealed on purely technical grounds and passed again in 1991. 6
18 U.S.C. § 2339A and § 2339B, “Pro-
viding material support to terrorists” and “Providing material support or resources to designated foreign terrorist organizations,” respectively.
42 The Counter Terrorist ~ June/July 2011
The Holy Land Foundation for Relief
Ms. Goldstein is a human rights attorney, an award-winning documentary film producer, serves as director of The Lawfare Project, and is the founder and director of the Children’s Rights Institute. Mr. Meyer is research director of The Lawfare Project, director of research for the Children’s Rights Institute, and legal correspondent to the Terror Finance Blog.
1
Circle 130 on Reader Service Card
report/911Report.pdf
7
18 U.S.C. §2339A(b)(1).
8
130 S.Ct. 2705, 2725 (2010).
9
Holder, 130 S. Ct. at 2712 (emphasis added).
10
Id. at 2725.
11
P. 186. http://www.9-11commission.gov/
and Development. U.S. Treasury - Office of Terrorism and Financial Intelligence (TFI). http://www.treasury.gov/resource-center/ terrorist-illicit-finance/Pages/protecting-charities_execorder_13224-e.aspx#hlf 13
Executive Order 12947 of January 23,
Now with
1995, “Prohibiting Transactions With Ter-
by
rorists Who Threaten To Disrupt the Middle
ChitoGauze
TM
Battlefield technology stops severe bleeding fast with easy-to-handle Z-fold. • Antibacterial • No fumbling with a roll • Does not burn • No allergic reactions
East Peace Process” http://frwebgate.access. gpo.gov/cgi-bin/getdoc.cgi?dbname=1995_ 14
See FN 9 above.
15
See FN 9,above.
16
Holy Land Foundation, Leaders, Accused
Pantone 185 CVC Pantone 704 CVC
of Providing Material Support to Hamas Terrorist Organization, Department of Justice, July 27, 2004. http://www.justice.gov/opa/ pr/2004/July/04_crm_514.htm 17
The Holy Land Foundation for Relief
and Development. U.S. Treasury - Office of Terrorism and Financial Intelligence (TFI). http://www.treasury.gov/resource-center/ terrorist-illicit-finance/Pages/protecting-charities_execorder_13224-e.aspx#hlf 18
“Senior Leader of Hamas and Texas Com-
puter Company indicted for Conspiracy to
Approx. 3.5” x 5”
x 7” Approx. 5”
Violate U.S. Ban on Financial Dealings with Terrorists” Department of Justice, December 18, 2002. http://www.justice.gov/opa/ pr/2002/December/02_crm_734.htm 19
Id.
20
See FN 9, above.
21
“Individual Terrorists: Mousa Abu Mar-
Approx. 5” x 5.75 ”
zook,” The Investigative Project on Terrorism, updated August 4, 2009. http://www.investigativeproject.org/profile/106 22
A few ounces in your pocket could save your life.
Note that HLF has appealed its conviction to
the Fifth Circuit Court of Appeals. See “Government Rebuts Convicted Hamas Charity’s Appeal,” IPT News, February 2, 2011. http:// www.investigativeproject.org/2549/govern-
Circle 134 on Reader Service Card
ment-rebuts-convicted-hamas-charity-appeal 23
“List of Unindicted Co-conspirators and/
vacuum sealed first aid supplies for the emergency treatment of gunshot, stab woundS and other trauma
RESQ-PAK.COM Circle 146 on Reader Service Card
• 888 . 949. R ES Q ( 7377 )
Enter coupon code SSCT610 to receive a 10% discount from ResQ-PAK.com
( Offer valid through July 15, 2010 )
The Counter Terrorist ~ June/July 2011 43
&deductibility=all&dispatchMethod=search&
www.nefafoundation.org/miscellaneous/HLF/
tchMethod=search&searched.nameSearchTyp
submitName=Search”http://www.irs.gov/app/
US_v_HLF_Unindicted_Coconspirators.
eStarts=true&searched.name”http://www.irs.
pub-78/search.do?nameSearchTypeStarts=tru
pdf ”http://www.nefafoundation.org/miscel-
gov/app/pub-78/searchFromResults.do?nameS
e&names=islamic+society+of+north+america
laneous/HLF/US_v_HLF_Unindicted_Co-
earchTypeStarts=true&names=Muslim+Arab+
&nameSearchTypeAll=true&city=&state=All
conspirators.pdf
Youth+Association+&nameSearchTypeAll=tru
...&country=USA&deductibility=all&dispatc
“http://www.irs.gov/app/pub-78/search.do
e&city=&state=All...&country=USA&deducti
hMethod=search&submitName=Search [Last
?nameSearchTypeStarts=true&names=North+
bility=all&dispatchMethod=search&searched.
accessed March 17, 2011]
American+Islamic+Trust&nameSearchTypeA
nameSearchTypeStarts=true&searched.na
Letter from Richard C. Powers, FBI Assistant
ll=true&city=&state=All...&country=USA&
mes=North+American+Islamic+Trust&sea
Director of the Office of Congressional Affairs
deductibility=all&dispatchMethod=search&s
rched.nameSearchTypeAll=true&searched.
to Senator Jon Kyl, April 28, 2009. “http://
ubmitName=Search”http://www.irs.gov/app/
city=&searched.state=All...&searched.
www.investigativeproject.org/documents/
pub-78/search.do?nameSearchTypeStarts=tru
country=USA&searched.
misc/265.pdf ”http://www.investigativepro-
e&names=North+American+Islamic+Trust&
deductibility=all&searched.
ject.org/documents/misc/265.pdf. See also
nameSearchTypeAll=true&city=&state=All..
sortColumn=name&searched.
“FBI Cuts Ties With CAIR Following Terror
.&country=USA&deductibility=all&dispatc
indexOfFirstRow=0&searched.isDescendin
Financing Trial,” Joseph Abrams, FoxNews.
hMethod=search&submitName=Search [Last
g=false&submitName=Search [Last accessed
com, January 20, 2009. http://www.foxnews.
accessed March 17, 2011]
March 17, 2011]
com/politics/2009/01/30/fbi-cuts-ties-cair-
24
25
“http://www.irs.gov/app/pub-78/search-
26
“http://www.irs.gov/app/pub-78/search.do
following-terror-financing-trial/ “CAIR – Suspected and Supported by the
FromResults.do?nameSearchTypeStarts=true
?nameSearchTypeStarts=true&names=islamic
27
&names=Muslim+Arab+Youth+Association+
+society+of+north+america&nameSearchTyp
Federal Government,” IPT News,
&nameSearchTypeAll=true&city=&state=Al
eAll=true&city=&state=All...&country=USA
July 30, 2010. http://www.investigativepro-
Reward Balls with Tug Handles
Bite Suit Helmet $74.95
3" Ball
$12.95
2.5" Ball
$11.95
2" Ball
$9.95
Hand Protectors $39.95 ea
E-Collar Holsters $39.95 Has cutouts so the buttons can still be worked while it’s holstered. Has 2¼" metal clip on back of holster so it can be worn on a 2" duty belt or clipped to a MOLLE tactical vest.
Special Operations Harness
Elite K-9 Bite Suit $999.95
available in black, coyote or multicam* with plastic buckles
$149.95 Muzzles $69.95
Scan our QR code with your smart phone to view our online catalog.
Malinois
with metal cobra buckles
$199.95
*with attachments for MOLLE pouches and K-9 camera
www.homelandsecurityssi.com
l...&country=USA&deductibility=all&dispa
See for yourself at:
or Joint Venturers,” May 29, 2007 “http://
SSI SWAT CT OPS EXPLOSIVE THREAT MITIGATION COURSE ®
The Most Complete CT Training Available.
Learn from the Experts:
• Terrorist Risk Assessments • Middle East Operational Debriefs—Improve Entry Methods • Secure Search Techniques for Structures • Multiple Breach Points and Advanced CT Tactics • Terrorist Hostage Rescue • Suicide Terrorist Vehicle Interdiction • Containment and Call-Out for Counter Terrorism Ops • Explosive Lab Interdiction in Urban Areas • Explosive/IED Threat Mitigation in Structures • Command, Control and Planning Issues
Call to register for our next program: > November 2011 at Camp Blanding FL > November 2011 at Yakima, WA
SSI
®
SECURITY SOLUTIONS INTERNATIONAL
Protecting the Homeland Together ®
Call now for more information.
German Shepherd
(Must be an active member in a SRT Team or SWAT Team)
Phone: 866-573-3999 Fax: 866-573-2090 info@homelandsecurityssi.com
032511CT_EK9
44 The Counter Terrorist ~ June/July 2011
Circle 266 on Reader Service Card
Circle 179 on Reader Service Card
The Counter Terrorist ~ June/July 2011 45
http://www.investigativeproject.org/2675/
compelling-testimony-political-theater 29
Caroline May, The Daily Caller, February 24, 2011. http://dailycaller.com/2011/02/23/ cair-sues-fbi-for-allegedly-illegal-surveillanceof-muslims-in-southern-california/ “The Extent of Radicalization in the Ameri-
can Muslim Community and that Community’s Response,” March 10, 2011. http:// homeland.house.gov/sites/homeland.house. gov/files/Testimony%20Bihi.pdf 31
Id.
32
See, e.g., Laura B. Rowe, Ending Terrorism
with Civil Remedies: Boim v. Holy Land Foundation and the Proper Framework of Liability, 4 SEVENTH CIRCUIT REV. 372 (2009), at
June 29 – Improving Availability and Deployability of Interoperable Assets
www.defencelog.com
“CAIR sues DBI for allegedly illegal surveil-
lance of Muslims in Southern California,”
30
The 11th Annual Conference for Military and Industry Logistics Leaders
! ar Ye
28
th
June 28 – Enhancing Sustainability and Mobility of Deployed Forces
ject.org/2082/cair-suspected-and-supportedby-the-federal
11
June 27 – Optimising Logistics Information Visibility
Le Plaza Hotel, Brussels
transformıng mılıtary logıstıcs through government, cıvılıan and contractor ınterdependence to enhance support and delıver value to the end user Agencies Sending Senior Delegations In 2011 Include: NATO HQ
NATO SHAPE
DGA, French MoD
NAMSA
NAMA
DLA, US DoD
NATO C3A
EDA
SOUTH AFRICAN AIR FORCE
NATO ACT
DE&S, UK MoD
AND MORE!
http://www.kentlaw.edu/7cr/v4-2/rowe.pdf. 33
Boim v. Holy Land Found. for Relief &
Dev., 549 F.3d 685, 701-02 (7th Cir. 2008). Note that Judge Posner was considering civil liability that may arise under 18 U.S.C. § 2339B and related statutes, though he noted elsewhere that the analysis was similar for criminal and civil liability for material support claims. 34
See FN 7 above.
35
Holder at 2725, quoting Matthew Levitt,
Hamas: Politics, Charity, and Terrorism in the Service of Jihad p. 2 (2006). Incidentally, Levitt was unsuccessfully sued by KinderUSA in 2007 for including “KinderUSA among “other American-based charities [which] continue to Circle 284 on Reader Service Card
fund Hamas” after the Holy Land Foundation closed its doors.” “Combating Lawfare,” IPT News, March 15, 2010. http://www.investigativeproject.org/1858/combating-lawfare 36
Report at p. 382. See FN 8 above.
37
“A New Jihad Flotilla initiative to Gaza,”
Jonathan Fighel International Institute for Counter-Terrorism
July 4, 2010 http://www.investigativeproject.org/2045/a-new-jihad-flotillainitiative-to-gaza
46 The Counter Terrorist ~ June/July 2011
Circle 191 on Reader Service Card
35+ Senior Government and Industry Speakers You Will Meet and Learn from Include: Major General Jochen Both, Commander, European Air Transport Command
Colonel Derek Smith, Commander, Europe and Africa, Defense Logistics Agency, US DoD
Brigadier Rory Maxwell, Head of Defence Logistics Operations and Plans, Defence Equipment and Support, DE&S, UK MoD
Colonel Mikhael Burzlaff, Chief, Transformation and Governance Branch, NATO C3 Agency
Brigadier Allan McLeod, Former Chief of Combat Service Support, HQ ISAF, Joint Command NATO (French Rapid Reaction Corps) Jeffrey Pete, Programme Manager, Future Logistics Information Service(FLIS), Boeing Patrick Dufour, Director, Service in Charge of Maintenance (SMCO), DGA, French MoD Phil Armatage, Head of Governments and Mail, Middle East, North Africa & Turkey (MENAT), Country Manager Iraq & Afghanistan, DHL Express Pete Demarest, Director, Strategic Development, U.S. COCOM, US Government Sales and Support Team, DHL Express
Event Partner:
Robbert Smit, Director, Joint Procurement, NATO Maintenance and Supply Agency Bruno Cantin, Head, Defence Planning and Policy Division, NATO HQ George Bond, Head of UK National Codification Bureau & Chairman NATO Group of Directors of Codification Major General (ret’d) David Shouesmith, Vice President, PRTM Major General (ret’d) Tim Cross, Former Commander of British Forces in Iraq
Sponsored by:
Organised By:
Register Today By T: +44 (0) 207 368 9465 E: defencelogistics@wbr.co.uk W: www.defencelog.com Circle7201 304 Reader1 Service Card CTon AW.indd
29/03/2011 08:44 The Counter Terrorist ~ June/July 2011 47
The Muslim Brotherhood: Secular and Nonviolent? By Dean Olson
Counter The
An imam of the Al-Azhar University in Tahrir Square during the 2011 Egyptian Revolution. The central banner in the background reads: “I am not from the Brotherhood, but it is Mubarak who is now banned”, in reference to the opposition group, the Muslim Brotherhood. Photo: Sherif9282
48 The Counter Terrorist ~ June/July 2011
The Muslim Brotherhood (MB), al-Ikhwan al-Muslimun in Arabic, is a Muslim fundamentalist group formed in Egypt in 1928. It is the progenitor of many of the contemporary Islamic terror groups active today, including Hamas and al Qaeda. In the 80plus years since its formation, the group has matured into the most influential Islamic supremacist group in the world. It has an estimated 600,000 dues-paying members in Egypt alone, with members present in countries from the Middle East to Europe and the United States.
E
ven though its reach extends to more than 80 countries, it is often held that the MB is not a cohesive transnational entity. MB branches throughout the world share a common ideological set of motivations—the MB is more a school of thought and association than an industrial–aged, rigid hierarchy. While branches interact through a complex network of personal, financial, and ideological ties, MB elements largely operate independently with each pursuing
Muhammad Hosni Mubarak, President of Egypt addressing the Opening Plenary session of the World Economic Forum on the Middle East 2008 held in Sharm El Sheikh, Egypt. Photo: World Economic Forum
goals it deems appropriate. The glue that binds MB branches is shared ideology centered on the unwavering belief that Islam is a complete way of religious, political, and personal life. The organization’s ideology is virulently antiSemitic, anti-Western, and anti-democratic, and espouses the following tenets: 1. Islam must dominate other religions and must not be dominated. 2. Restoration of the caliphate, i’adat al Khalifa al Mafqudah, is the primary
The key difference between overt Islamist terrorist groups and the MB is the choice of tactics.
The Counter Terrorist ~ June/July 2011 49
In In the the world world of of tactical tactical electronics, electronics, one one company company has has been been at at it every day since 1994: it every day since 1994:
www.AdamsIndustries.com In the world of tactical NIGHT VISION: NIGHT VISION: electronics, one company has been A.I. A.I. carries carries a a full full line line of of night night vision vision including including PVS-14s, PVS-14s, at it every day since 1994... political goal. 3. Islam’s demise relative to the ascendency of the West is due to the incursion of Western culture and decadence that has caused Muslims to abandon Islam’s roots. The only way to restore Islam’s lost dominance and dignity is to return to the true Islam during the “Golden Age” when Islam was practiced by the Prophet Muhammed and the first generations of Muslims. 4. Social revolution and anticolonial struggle are an integral and major part of the mission of the Islamic revival. 5. Violent jihad is a central tenet of Islam and martyrdom in the cause of Allah is the highest aspiration. Violent jihad is the greater jihad while inner struggle for moral purity is the lesser jihad. Hadiths that reverse this priority are inauthentic and heretical. 6. Islam must aim to take over the entire world and assert its superiority through violent jihad. 7. Western civilization is doomed by its decadence and Jewish influence. 8. Ideas such as democracy and human rights are products of Jewish influence and Western decadence. Society must be ruled by Allah alone via shariah. 9. The Jews are particularly vile enemies of Islam. Israel must be destroyed because it is an infidel nation in the heart of the Muslim homeland, Dar al-Islam. Once a land has been conquered for Islam it can never be relinquished. Palestine/ Israel, and especially Jerusalem, are considered Waqf-alal-aulad, an inalienable religious endowment. MB members in the West have publicly stated that jihad is an inner spiritual struggle to be a better Muslim
PVS-7Ds, PVS-7Ds, and and now now our our AI/ AI/ NVG-S NVG-S offering offering PVS-15 PVS-15 like like performance performance minus minus the the painpainful ful price price or or wait wait for for delivery. delivery.
NIGHT VISION: A.I. carries a full line of night vision including PVS-14s, PVS-7Ds, and now our AI/NVG-S offering PVS-15 like performance minus the painful price or wait for delivery.
THERMAL THERMAL TECHNOLOGY: TECHNOLOGY:
M145_QrtrPage4C
7/30/10
2:19 PM
Page 1
From From handhelds handhelds to to extreme extreme range range systems, systems, A.I. A.I. has has offoffthe-shelf the-shelf and and build-to-suit build-to-suit answers answers for for any any requirement. requirement.
SENSOR SYSTEMS: SENSOR SYSTEMS: ! M-145 4WD We W MOVING We are are proud proud to to distribute distribute the the MilMilE TARGET SYSTEM N lennium Sensor line of covert tactiFEATURES
• Rugged, robust all wheel drive target platform. • Lightweight, portable, high-speed, 360º control. • Wireless Control to 1000 meters. • Price includes Manikin Mike™ (non-reactive) 3DHT target. • Optional Stop-Drop™ hit reactive target system. Long Range Wireless Operation
Circle 292 on Reader Service Card
lennium Sensor line of covert tactiBreakthrough Price cal sensor cal sensor and and surveillance surveillance kits kits used used $2,895 by the by Delivered. the US US Military, Military, US US Border Border Patrol, Patrol, and and SWAT SWAT Teams Teams nationwide. nationwide. This This force force multiplier multiplier provides provides extra extra eyes eyes and and ears ears where where you you need need them. them.
SENSOR SYSTEMS: We are proud to distribute the Millennium Sensor line of covert tactical sensor and surveillance kits used by the US Military, US Border Patrol, and SWAT Teams nationwide. This force multiplier provides extra eyes and ears where you need them.
Contact: Contact: Adams Adams Industries, Industries, Inc. Inc. P.O. P.O. Box Box 641413 641413 • • Los Los Angeles, Angeles, CA CA 90064 90064
Tel: Tel: (310) (310) 472-3017 472-3017
1000 Meter Line Of Sight Remote Control
Fax: Fax: (310) (310) 861-5324 861-5324
Optional Stop-Drop™ Electronic Hit Sensing System For More Information: ADVANCED TRAINING SYSTEMS 4524 Highway 61 North • St. Paul, MN 55110 USA Tel: 651.429.8091 • Fax:651.429.8702 Email: info@atsusa.biz • Web: www.atsusa.biz
Email: Email: Sales@AdamsIndustries.com Sales@AdamsIndustries.com
www.AdamsIndustries.com www.AdamsIndustries.com
© ATS 2010
50 The Counter Terrorist ~ June/July 2011
THERMAL TECHNOLOGY: From handhelds to extreme range systems, A.I. has off-the-shelf and build-to-suit answers for any requirement.
Circle 64 on Reader Service Card
www.AdamsIndustries.com
Adams Industries, Inc. P.O. Box 641413 • Los Angeles, CA 90064 Tel: (310) 472-3017 Fax: (310) 861-5324 Email: Sales@AdamsIndustries.com Circle 27 on Reader Service Card
The Counter Terrorist ~ June/July 2011 51
Demonstartion in Imaba, Cairo, January 28, 2011 Photo: Ramy Raoof
X37 third page ad_Layout 1 22/03/2011 14:30
(as many Muslims assert), but the group embraces jihad in all of its manifestations, including as a global strategy of conquest. “[Jihad] is the unceasing attack on every infidel rule, intended to widen the borders of the Islamic state until all mankind lives under the Islamic flag.” The centrality of jihad to MB machinations is underscored by Mustafa Page 1 Mashhur, the fifth general guide of the
MB in Egypt until 2002. In his book, Jihad Is the Way, he says, “Prepare yourself and train in the art of warfare, and embrace the causes of power. You must learn the ways and manners and laws of war…when nothing else will suffice… jihad is an inevitable necessity, and that’s why it was made a religious duty in Islam…the highest pinnacle of Islam….” The MB pursues many of the same
DON'T MISS PRESENTATIONS FROM:
20th & 21st June 2011, Crowne Plaza - The City Hotel, London PLUS TWO HALF-DAY POST CONFERENCE WORKSHOPS
Hiring MarSec Specialists In association with MRM
How to Handle Piracy in a Proactive Manner In association with Proactima
• Rear Admiral Charles W. Martoglio, Chief of Staff, HQ U.S. European Command • Rear Admiral Cristiano Aliperta, Head of Safety Navigation Department, Italian Coast Guard • Colonel Richard Spencer OBE, Chief of Staff, EU NAVAL FORCE • Vice Admiral (Ret'd) Fernando Del Pozo, Maritime Surveillance Wise Pen Team, European Defence Agency • Vice Admiral (Ret’d) Sir Alan Massey, Chief Executive, UK Maritime and Coastguard Agency • Rear Admiral David Snelson, Harbour Master, Port of London Authority • Commodore David Wolfe, Knowledge Director, Allied Joint Force Command Lisbon, NATO
www.mda-security.co.uk
Register online or contact Steven Myers on: +44 (0)20 7827 6090 or email: smyers@smi-online.co.uk 52 The Counter Terrorist ~ June/July 2011
Circle 288 on Reader Service Card
strategic objectives as terrorist groups like al–Qaeda, including converting Muslim countries into states ruled by the harsh, totalitarian seventh-century Islamic system of jurisprudence called shariah. It also seeks to unify the global Muslim community, or ummah, by reestablishing the global caliphate. Its ultimate goal is to impose Islam on the world. The key difference between overt Islamist terrorist groups and the MB is the choice of tactics. While violent jihad dominates the attention of homeland security entities, the MB seeks to avoid that attention by quietly and patiently using what ultimately may be a much more effective form of jihad based on subversion and sedition. Cautioning against reactionary and ill-timed violence—a view the MB took of the al-Qaeda attacks on 9/11— Mashhur eschews the premature resort to violence as counterproductive because it risks exposing the MB’s use of “soft” jihad, “…enthusiasm pushes some of the young [soldiers] to personal hasty actions, which harm the overall [jihad] process… some of the young [fighters] think that this bitter struggle…can come to an end by killing a couple of people and blowing up bombs and actions of that sort, without grasping the [long-term] results... None of the Muslims [in the time of the Prophet Muhammad in Mecca when Islam was weak] resorted to premature violence…due to the great harm that would befall the Da’wa (Islamic missionary activity), and would expose it to the danger of destruction, while it was still like a young plant....” The MB views soft jihad, especially da’wa or Islamic prosetylyzation, as more effective against America and Western democracies. The group refers to it as “civilization jihad”; a previolent form of jihad stemming from the totalitarian ideology of shariah. It is effective because
The group refers to it as “civilization jihad”; a previolent form of jihad stemming from the totalitarian ideology of shariah.
The Complete Tactical Video Tool Set!
Mexican gas station, operated by PEMEX.
An array of technology-based video surveillance tools that allow a team to safely assess any potentially dangerous situation covertly and remotely. ➤ N E W! Through-the-Wall Camera
Listening Devices ➤ 2-20ft Pole Cameras ➤ Thermal Imaging ➤ Fiberscopes & Videoscopes ➤ Robotic Remote Control Cameras ➤ Under Door Cameras ➤ Digital/Analog Wireless Video ➤
All products are interchangeable and new tools can be added at any time! Zistos Corporation Ph 631.434 .1370
E-mail: sales@zistos.com Circle 192 on Reader Service Card
The Counter Terrorist ~ June/July 2011 53
New and improved
a senior Hamas leader in the United States and a member of the board of directors for the MB in North America. The memorandum explains that the MBorganized “Islamic Movement” in the United States is a “settlement process” to establish itself in the United States and, once entrenched, to undertake a “grand jihad” characterized as a “civilization jihadist” mission under MB direction. Specifically, the document describes the “settlement process” in America as a “grand jihad in eliminating and destroying the Western civilization from within and ‘sabotaging’ its miserable house by their hands and the hands of the believers so that it is eliminated.” The MB relies on naive and oftentimes well-meaning non-Muslims to facilitate its destructive plans. Yusuf al-Qaradawi, the spiritual leader of the MB, told a Toledo, Ohio, Muslim Arab Youth Association convention in 1995, “We will conquer Europe, we will conquer
is t
ribu te
( portable vehicle barrier ) When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.
d
Wo
K9COP
D
In spite of its well-cultivated Western persona as nonviolent and moderate, the MB will resort to violence when it is believed to further strategic goals.
its tactics are a second track, ostensibly nonviolent, resulting in the MB being viewed as “moderate”—not because the group eschews violence, but because it has decided that this phase of jihad is better accomplished with subtlety. Civilization jihad is a form of political and psychological warfare that includes multifaceted cultural subversion, the co-opting of senior religious, political, and law enforcement leaders, influence operations, propaganda, and other means of insinuating shariah gradually into the fabric of Western societies. The concept of civilization jihad is found in a document that was entered into evidence in the 2008 United States v Holy Land Foundation terrorist finance trial. The document, titled “ “http://www. investigativeproject.org/document/id/20” An Explanatory Memorandum: On the General Strategic Goal for the Group,” was written in 1991 by Mohamed Akram,
rl
MAGAZINE
dwide
TM
For Police and Military Working dog Handlers The largest and most read police and military K-9 magazine in the world. 1 year (6 issues) ONLY $24.95 SUBSCRIBE TODAY! Scan code with your Smartphone to subscribe today!
www.k9copmagazine.com • Telephone: (270) 534-0500 • E-mail: info@k9copmagazine.com • Fax: (270) 554-0514 032511CTK9C
54 The Counter Terrorist ~ June/July 2011
Call now for more information. Pricing dependent on quantity
and delivery location. Call: (305) 401-6906 or email Richardson@securitysolutionsint.com
Or visit our website: www.SSIPVB.com Circle 268 on Reader Service Card
Circle 226 on Reader Service Card
SSI
®
SECURITY SOLUTIONS INTERNATIONAL
Protecting the Homeland Together ®
136 on Reader The Counter TerroristCircle ~ June/July 2011Service 55 Card
Early photo of Yusuf al-Qaradawi Photo: unknown
America! Not through the sword, but through da’wa.” The apparently benign effects of da’wa blind many observers to the threat posed by civilization jihad. This creates room for the previolent jihadist to maneuver unimpeded in Western societies to infiltrate and subvert democratic institutions. In spite of its well-cultivated Western persona as nonviolent and moderate, the MB will resort to violence when it is believed to further strategic goals. The World Trade Center (WTC) bombing in February 1993 was planned and perpetrated by members of the MBoffshoot al-Gama’a al-Islamiyya headed by the blind sheikh Omar AbdelRahman. The group built a 1,500-pound vehicle-borne improvised explosive device (VBIED) that was detonated below the North Tower. Its goal was to collapse both towers by knocking the North into the South Tower to kill thousands of people.
That attack failed to collapse the towers as intended, but did kill 7 and injured 1,042 people. A follow-up plot in 1993 involved a mega terror attack in New York City aimed at paralyzing the city in what has been referred to as the “Day Of Terror ” plot. Like the World Trade Center bombing, it was planned by many of the same perpetrators involved in the 1993 WTC bombing, including the blind sheikh. This ambitious attack was designed to inflict mass casualties by attacking well-known landmark targets throughout New York City using a series of simultaneous bombing of five targets, including the United Nations Headquarters, the Lincoln and Holland tunnels, the George Washington Bridge, and the Federal Bureau of Investigation’s New York headquarters at the Jacob Javits Federal Building. The plot also involved several assassinations targeting U.S.
Senator Al D’Amato and former Egyptian President Hosni Mubarak. The plot was foiled before it could be carried out. If it had been successful it likely would have killed thousands and paralyzed the city. In June 1995 a failed assassination attempt in Ethiopia by MB- affiliated groups Egyptian Islamic Jihad and al-Gama’a al-Islamiyya again targeted (former) Egyptian President Hosni Mubarak. The plotters had been planning the attack for more than a year and had even married local women in Ethiopia as part of their cover for status. Their hope was to decapitate the Egyptian government to create a power vacuum that would undermine the “iron grip” of the Egyptian security services and enable them to seize power. The attack reportedly failed because of a malfunctioning rocket propelled grenade launcher and Mubarak’s bulletproof limousine. Is the Muslim Brotherhood a strangely named, secular activist group? Is the MB committed to peace? If one ignores its English-language statements and pays attention to those translated from Arabic and the actions of members, one may find an answer somewhat at odds with “conventional wisdom.”
•
Procession of emergency vehicles at the World Trade Center bombing on February 26, 1993. The Tower is on the far right of the frame. Photo: Eric Ascalon
Lind Shut Down Timer (Screw Terminal Option)
UDT is the essential exhibition and conference for anyone involved in undersea security, underwater warfare and sub-surface platforms.
ProtEct your VEhIclE’s BattEry Easy to Install, sEt, and tEst
LIND Lind Shut Down Timer (Block Terminal Option)
Designed to protect your vehicle’s battery from over discharge, the Lind Shut Down Timer (SDT) is programmed to automatically turn off electrical loads at a preset time after the vehicle’s ignition has been shut off. The Shut Down Timer is easy to set and test without any confusing DIP switches or special tools. For more information, please contact Lind Electronics at 1.800.697.3701, via email at info@lindelectronics.com, or visit us online at www.lindelectronics.com. 56 The Counter Terrorist ~ June/July 2011
UDT 2010 welcomed: 1500 attendees 35 high profile military officers
Key prime contractors
Leading tier 1 & 2 suppliers
Reasons to exhibit: Display your product in front of senior procurement attendees Get the industry talking about your latest product launches and technology advancements in the Innovation Showcase Meet top level international delegations on the Senior Officers’ Day Enhance your exhibiting experience and maximise ROI by taking part in the Waterborne Demonstration programme UDT 2011 will feature relevant conference themes designed to attract top quality delegates to the event and your stand. Visit www.udt-europe.com/conference for full list of themes.
Can you afford to miss UDT 2011? To book your space at the world’s largest dedicated undersea conference and exhibition contact:
Power SPecialiStS for Mobile coMPuting
Circle 220 on Reader Service Card
James Dolleymore, Event Manager Nikki Sherman, Sales Executive Circle 260 on Reader Service Card
t: +44 (0) 20 7370 8636 e: james.dolleymore@clarionevents.com w: www.udt-europe.com t: +44 (0) 20 7370 8364 e: nikki.sherman@clarionevents.com w: www.udt-europe.com
Organised by
The Counter Terrorist ~ June/July 2011 57
new program for 2011 > Global expertise > Global best practices
ABOUT THE AUTHOR
No. 27, February 2011, http://www.jcpa. org/JCPA/Templates/ShowPage.asp?DBI D=1&LNGID=1&TMID=111&FID=4 42&PID=0&IID=6003 6 Itamar Marcus and Nan Zilberdik, “The Muslim Brotherhood - In Its Own Words” translation of Jihad is The Way by Mustafa Mashhur, Palestine Media Watch, http://www.palwatch.org/main. aspx?fi=157&doc_id=4603, February 2011. Douglas Farah, Ron Sandee and Josh Lefkowitz, “The Muslim Brotherhood in the United States: A Brief History” Nine Eleven Finding Answers Foundation (NEFA), October 26, 2007, www. nefafoundation.org, p. 2. 7 Ibid, Note 4. 8 Center for Security Policy, Shariah, the Threat to America, October 2010, Washington, DC p. 83. 8 Mohamad Akram, An Explanatory Memorandum: On the General Strategic Goal for the Group, May 22, 1991, Government Exhibit 003-0085/3:04-CR-240-G U.S. v. HLF, et al., United States District Court, Northern District of Texas, http:// www.txnd.uscourts.gov/judges/hlf2/092508/Elbarasse%20Search%203.pdf, 18. 9 Ibid, Note 11.
Mr. Olson is a retired sheriff’s department bureau commander and FBI National Academy graduate. He is the author of Tactical Counterterrorism: The Law Enforcement Manual of Terrorism Prevention (Scheduled October, 2011 release by Charles C. Thomas Publishing).
endnotes General Intelligence and Security Service of the Netherlands (AIVD), The Radical Dawa in Transition: The Rise of Islamic Neo-radicalism in the Netherlands, (2007) p.50 2 Scott Atran, Egypt’s Bumbling Brotherhood, New York Times Op-Ed, February 22, 2011. 3 Lorenzo Vidino, Five Myths about the Muslim Brotherhood, The Washington Post on March 6, 2011 4 Encyclopedia of the Middle East, Muslim Brotherhood, http://www.mideastweb.org/Middle-East-Encyclopedia/ muslim_brotherhood.htm 5 “http://www.jcpa.org/JCPA/Templates/ ShowPage.asp?DBID=1&LNGID=1 &TMID=610&FID=442&PID=0&I ID=511” Jonathan D. Halevi, Egypt’s Muslim Brotherhood: In Their Own Words, Jerusalem Issue Briefs, Vol. 10, 1
Yousef al-Qaradawi, Muslim Arab Youth Association (MAYA) Conference, 1995, Toledo, Ohio. 11 J. Gilmore Childers and Henry J. DePippo (1998-02-24). “http://web. archive.org/web/20071227065444/http:/ judiciary.senate.gov/oldsite/childers. htm” “Senate Judiciary Committee Hearings: Foreign Terrorists in America: Five Years After the World Trade Center”. US Senate Judiciary Committee. Archived from “http://judiciary.senate. gov/oldsite/childers.htm” the original on 2007-12-27. “http://web.archive.org/ web/20071227065444/http:/judiciary. senate.gov/oldsite/childers.htm” http:// web.archive.org/web/20071227065444/ http://judiciary.senate.gov/oldsite/ childers.htm. Retrieved 2008-01-08. And Lawrence Wright, Looming Tower, Knopf, (2006) p. 178. 12 Steven Myers, July 18, 1993, Man in New Jersey Charged in Plot to Kill Mubarak, New York Times, http://query.nytimes.com/gst/fullpage.ht ml?res=9F0CE7D6113AF93BA25754C 0A965958260&sec=&spon=&pagewant ed=print. 13 Kenneth Katzman, Al Qaeda: Profile and Threat Assessment, CRS Report for Congress, RL33038, August 2005. 10
An intensive advanced workshop for the Homeland Security Professional
GlobalSecurity workshop NOVEMBER,2011 >
>
>
>
>
>
TEL AVIV,
israel
Join the more than 400 Homeland Security Professionals that have selected SSI’s training in Israel Program. Over 17 missions from 2005 to 2010. The most successful program for overseas training in Homeland Security. Here is what you will learn: > The nature of the threat; modus operandi and the tactics employed by terrorist organizations including in-depth discussions of vehicle and other IED devices. > The approach to security for Infrastructure, Ports, Schools, Universities, Church’s and Religious institutions, Government buildings, VIP’s and public safety at venues and malls > How to create safe-city projects and monitor threats – explained through visiting the Old City of Jerusalem and seeing the command and control center for operations in that Holy City > Learn how Counter Terror units work, and cooperate with intelligence and much more…. > All of this while visiting some of the most memorable sites in the world. Please call for further information > > > >
FAC TU R NU
Securing Passengers and Cargo Worldwide
R
SER . M -U
E
A
■ High level international conferences ■ Live product demonstrations
R
AT
D
. INTE G
■ Focused exhibition
■ Free-to-attend workshops ■ Networking functions
OR . EN
Aviation
Cargo
Maritime
Supply Chain
For more information please call Adam Smith on +44 (0) 208 542 9090 or email asmith@niche-events.com
www.transec.com 13-14 September 2011 | Olympia, London 58 The Counter Terrorist ~ June/July 2011 TSX11 ad 3.125x7.25in.indd 1
Circle 274 on Reader Service Card 28/03/2011 19:55
Register Today...
info@homelandsecurityssi.com • 866-573-3999
www.homelandsecurityssi.com Circle 215 on Reader Service Card
SSI
® Protecting the Homeland Together ®
SECURITY SOLUTIONS INTERNATIONAL
Circle on Reader Service59 Card The Counter Terrorist ~ 37 June/July 2011
Capitalism is a necessary precondition for the relevance and function of the United States Constitution. As a result, many see this economic system as synonymous with the values, traditions, and identity of the United States and some allies.
O The Enemy of my Enemy is my friend... for now By John Andrews
Counter The
60 The Counter Terrorist ~ June/July 2011
At the G20 Meltdown protest in London on 1 April 2009. Photo: Jonny White
sama bin Laden reportedly attacks capitalism, not as a jihadist, but as a self-styled hero for those inspired by the words of Marx, Mao, and Lenin. Inspire magazine quotes him as saying,“I am not about to talk here about partial solutions which merely lessen the harmful effects of global warming. Rather, I am going to talk about looking for a solution to the crisis at its root.” “All industrialized countries, especially the major ones, bear responsibility for the global warming crisis.” The United States, according to bin Laden, is the real culprit behind alleged global warming, and also the current global financial crisis. “Many senior capitalists are characterized by wickedness and hardheartedness and thus they don’t care about the human disasters caused by their economic activities,” said bin Laden, godfather of the infamous September 11th mass murders. He further stated, “Noam Chomsky was right when he pointed to a similarity between American policies and the policies of Mafia gangs. So they are the real terrorists and drastic and decisive solutions are required to restrain and subdue them: restrain them from their sin and subdue their savagery,
...There are nods to the US counterculture and the progressive Left social and environmental movement, pieces that look like Madison Avenue consumer capitalist advertisements for jihad... — Robert Lindsay, as quoted in the jihadist Inspire Magazine, Issue 5 Spring 2011.
Demonstrations against the G8 summit, Rostock, Germany, 2007. Photo: circus and I place in front of you a number of solutions.” Bin Laden went on to describe these solutions, which included boycotting the United States, abolishing the dollar as a reserve currency, and punishing the leaders of major corporations and their political allies.1 Former British intelligence officer Alistair Crooke heads an organization called the Conflicts Forum. Mr. Crooke agrees with Imam Ali (632 CE), the son-in-law and successor of the Prophet Muhammad, who views Islam as the friend of the oppressed and the enemies of the Karl Marx (above) Photo: International Institute of Social History in Amsterdam, Netherlands Lenin (below) Photo: L. Léonidov The Counter Terrorist ~ June/July 2011 61
Think restraint is the answer? Think Again! Epilepsy and Seizure Response for Law Enforcement Free Online Training Teaching law enforcement personnel about: • Seizure recognition • Correct response to seizures • The unique needs of people living with epilepsy who are taken into police custody
Go to www.epilepsyfoundation.org/ firstresponders
For more information, call 800-332-1000 or visit www.epilepsyfoundation.org This ad was developed with support from the Centers for Disease Control and Prevention under cooperative agreement number 5U58DP000606-05.
Circle 262 on Reader Service Card
62 The Counter Terrorist ~ June/July 2011
Yasser Arafat at the Annual Meeting 2001 of the World Economic Forum. Photo: World Economic Forum
Arab secularism is all but extinguished. It died with Yassir Arafat, Saddam Hussein, and now Hosni Mubarak oppressor. Mr. Crooke describes a world order dominated by ultra-rich, narcissistic elites, including the rulers of the Middle East, who are divorced from the rest of humanity and exploitive of others. Islamic supremacist movements frequently allude to global inequities, exploitation, and a lack of respect. Values rewarded by a freely functioning marketplace and the secular liberal world have been described as hollow to those who see in it only privilege, disparity, and self-interest. Crooke wrote, “Islam stands, for many Muslims, for a humanism and
a respect for justice, human dignity and defiance of tyranny that Europe once espoused. Of course, few in the West will see it in these terms: they have been too busy creating an inverted mirror image of what they perceive still to be western virtues—and call it Iranian theocracy.” Mr. Crooke sees political Islam emerging as a resistance axis to the current world order and its systems of control imposed upon societies.2 Examining the language used by Crooke is revealing. Words such as inequities, oppressor, elites, exploitive, privilege, and self-interest are words frequently utilized by the followers of Marx and Mao to attack capitalism. This hatred of capitalism appears to be a common thread that binds the Islamic supremacists and neosocialists. This hatred is exemplified in a speech given by the British Abu Mounisa in a lecture during the Islamic Awakening Conference held December 15, 2010, in England. He stated that you need to provoke society for society to be changed. Just as Muhammad went to Mecca to destroy the pagan’s false gods, the modern jihadist must destroy the false gods of democracy and capitalism. “…kill it from its roots. That is what we need to do. We should hate it so much, my dear brothers, that every day, we should attack their system. Every day. Just like the Prophet Muhammad did.”3 Anwar al-Awlaki the American leader of al-Qaeda in the Arabian Peninsula, stated “…the other religions are exploitive and unjust: Christianity, Judaism, Hinduism, and Buddhism, and also Democracy— which is ‘religion’ the West wants to enforce on us—all of them are exploitive and unjust, and by which people oppress themselves. And Islam is justice.”4 Sharing common ground with traditional socialists, Islamic supremacists describe a vast role for government in controlling all aspects of society (shariah)
to include even health care and general welfare. They apparently take the concept of individual charity (zakat) and place that function in the hands of government through taxation. Zuhdi Jasser, president of the American Islamic Forum for Democracy writes, “The wealth of citizens in the Islamic state are seized and redistributed through socialist taxation under the guise of Islamic charity. They achieve a ‘halo effect’ by being perceived as the dispenser of vitally needed goods and services buying themselves legitimacy. The far left will naturally perceive them to be ideological brothers.”5 This is, in fact, why we see jihadist terrorist groups administering social programs and general governmental type services (often paid for by Western nations) throughout the world. Arab secularism is all but extinguished. It died with Yassir Arafat, Saddam Hussein, and now Hosni Mubarak. Israel and the United States, whether by strategic design or not, have largely undermined or eliminated the secular Arab. The Shiite, in Lebanon, flocked to Hezbollah because of the astute positioning of Iran’s surrogates and because they believed Hezbollah was instrumental in removing Israel from Lebanese territory, something the Lebanese army could not accomplish. “…the current PLO leadership has lost purpose altogether for their existence as a force to be reckoned with in determining the fate of the Palestinian people.” “…Hamas has proven itself to be a dynamic force in the body politic of the Palestinian people. More importantly, this dynamic political organization has proven to the world that indeed the Palestinians alone are actually able to stand steadfast against the might of the Israelis.”6 The jihadists enjoyed more tactical successes and as a result they garner more support. Dr. George Habash, the founder of the Marxist Popular Front for the Liberation of Palestine (PFLP), has stated that any Palestinian national dialogue must include
George Habash, Chairman of the PFLP - “Popular Front for the Libaration of Palestine” Photo: PFLP “Al Hadaf ” those who believe in continued armed struggle, such as Hamas and Islamic jihad, as well as Fatah. He went on to say, “We are associated with Hamas.”7 Islamic supremacists and fans of Marx and Lenin apparently have an enemy in common—the FBI. On September 24, 2010, the FBI executed a series of search warrants in Minneapolis and Chicago against a number of “activists” associated with the (Marxist-Leninist) Revolutionary Armed Forces of Columbia (FARC) and the PFLP. In response to these raids and the subsequent service of grand jury subpoenas to the activists, a number of demonstrations were planned. Information concerning these demonstrations and updates on the case were highlighted on a website called stopfbi.net. The site indicates its goal to stop FBI repression of antiwar and international solidarity activists. The organizations associated with the website are: Women against Military Madness, the National Lawyers Guild, Al Aqsa Institute, American Arab Anti-Discrimination Committee, Arab Community Center, International Jewish Anti-Zionist Network, Middle East Peace Now, and the Students for a Democratic Society among others.8 The Council on American Islamic Relations (CAIR), a self-identified Islamic civil rights organization and unindicted coconspirator in the US v Holyland case, was not listed as associated with the website, however, its members did undertake efforts to support those arrested. CAIR’s Chicago executive director called the investigation
At Ray Allen, we’re dedicated to offering you and your working dog top-of-the-line training gear, cutting-edge transport equipment, even basics like tugs and toys. with a This dedication comes w promise of outstanding service and the highest quality products avaialble. All Ray Allen training products are made right here in the USA. No other supplier of K-9 make that claim. equipment can ma Who do you rely on?
800-444-0404 www.rayallen.com Circle 56 on Reader Service Card
Circle 182 on Reader Service Card
The Counter Terrorist ~ June/July 2011 63
“a waste of taxpayer dollars. The FBI has overstepped its bounds in targeting individuals based on their commitment to peacefully challenge US policies in Palestine and Columbia (sic).” Michigan’s CAIR director went further and accused the FBI of recruiting “more so-called extremist Muslims than al-Qaeda.” They also displayed an image on the San Francisco CAIR website captioned “Build a Wall of Resistance; Don’t Talk to the FBI.”9 After receiving negative publicity, this image was removed. Since 9/11 a number of Left-leaning academics, entertainers, and politicians have come to the defense of jihadists. George Galloway, former British Member of Parliament and current leader of Viva Palestina, gave a speech February 2, 2011, at a Stop the War Coalition meeting in London in support of the Egyptian revolution. He identified the revolution as an Islamic movement and stated, “This revolution must go forward to victory, or it will go back to defeat. And if it goes back to defeat, all these dictatorships who starve their people, who prostitute their countries in the interest of America and Israel and Britain and other imperialist countries, will breathe a sigh of relief.” He went on to state that if the revolution goes forward, the Palestinian national movement will be able to be reunited and strengthened against the occupation.10 Norman Mailer, a Leftist novelist, attended a festival in Amsterdam October 29, 2001. Mailer’s comments at that time, as quoted by The New Republic, said of the World Trade Center towers, “Everything wrong with America led to this point where the country built that tower of Babel, which consequently had to be destroyed. What if those perpetrators were right and we were not?” He went on to say, “We had to realize that the people that did this were brilliant.”11 Rosie O’Donnell, an entertainer who
In the mountains east of the Jordan River, a patrol from the Popular Front for the Liberation of Palestine. Early 1969. Photo: Thomas R. Koeniges
Our Strength
is your security.
Safe Storage for Ammunition and Explosives. usexplosivestorage.com visit our website! some models for sale online!
• Meet ATF Regs • Meet Military Specs • Many Sizes • Type II, III, & IV Magazines • Armories • Dayboxes
1-877-233-1481 Circle 240 on Reader Service Card
64 The Counter Terrorist ~ June/July 2011
Circle 164 on Readaer Service Card Circle 282 on Reader Service Card
The Counter Terrorist ~ June/July 2011 65
xp o eE wCa s Sh o
FR EE
Counter The
Journal for Law Enforcement, Intelligence & Special Operations Professionals
presents: 6th Annual
Homeland Security Professionals Conference and Exposition October 3 - 7, 2011 • The Palace Station Hotel and Casino •
Las Vegas, Nevada
5 DAYS – 5 INCREDIBLE SPEAKERS Only hands-on, world renowned speakers and bestselling authors. SSI brings you the very best in hands-on counter terrorism training. This year’s conference brings together the best line-up in Homeland Security training. Everyone speaking is internationally recognized for their expertise and have all published best-selling books.
A LINE-UP OF UNPRECEDENTED TALENT: · John Giduck – Author of “Shooter Down: the dramatic, untold story of the police response to the Virginia Tech Massacre”, “Terror at Beslan” · Ebrahim Ashabi – Author of “Evolution of Radical Islam: Jihadist plans to conquer the world” · Dr. Mauricio Lynn – World-renowned specialist in disaster medicine · Mordechai Dijansky – Author of “Terrorist Cop” · Henry Morgenstern – Author of “Suicide Terror: understanding and confronting the threat” Apart from this line-up of world class speakers that you have come to expect, there will be numerous activities throughout the conference enabling you to network with your colleagues in the greatest entertainment city in the world.
BOOK NOW BEFORE ALL SEATS ARE GONE.
SSI
®
SECURITY SOLUTIONS INTERNATIONAL
Protecting the Homeland Together ®
Register Today!
www.thecounterterroristmag.com/conference • 866-573-3999
Circle 35 on Reader Service Card
66 The Counter Terrorist ~ June/July 2011
This conference is approved for graduate and undergraduate credits through Saint Leo University
has had her own talk show in the past, appeared on ABC’s The View September 12, 2006, and stated “Radical Christianity is just as threatening as radical Islam.” And, of course, there is Michael Moore, a documentary filmmaker, who stated in April 2004, “The Iraqis who have risen up against the occupation are not ‘insurgents’ or ‘terrorists’ or ‘The Enemy.’ They are the REVOLUTION, the minutemen, and their numbers will grow—and they will win.”12 Why would people who support gay rights and equality for women defend a political ideology that supports the execution of homosexuals and the treatment of women as property? To some, the United States, or the West, is the cause of the problem—every problem. There appears to be a presumption of guilt for the group they choose to view as an adversary. The Arabic proverb “the enemy of my enemy is my friend” is consistent with the surprising alliance between the Left and the jihadist.13 The final motivation encouraging the existence of this sometimes passive, sometimes active alliance appears to be fear. The Left frequently chooses a contrarian perspective in opposition to established “norms,” especially in the arts. There is the photo Piss Christ by Andres Serrano with a crucifix featured in a jar of the artist’s urine. The piece was supported by the National Endowment for the Arts. The Holy Virgin Mary by Chris Ofili featuring sexually explicit cutouts covered with elephant feces was displayed at the city-funded Brooklyn Museum of Art. These two works have been considered test cases for the idea of free speech and expression. In fact, a federal court ruled against the city for withholding funding for the Brooklyn Museum of Art. The court granted a preliminary injunction to stop the city from removing the painting and ordered the city to resume the museum’s funding.14
Now let us consider two controversial works that may be perceived as an insult to Islam: The Jewel of Medina, a novel by Sherry Jones depicting the life of Muhammad’s child bride, A’isha, and the Danish Cartoon Controversy. The Jewel of Medina, according to one critic, depicts A’isha as a top-notch general inside an emotionally immature child. The author makes Muhammad into a character who wants women to be equal but can’t quite get over his culture’s attitude toward them. The book is described by a Los Angeles Times book reviewer as “…a misstepridden, pleasant-enough mediocrity.”15 Controversy, however, was ignited when Denise Spellberg, an Islamic scholar, was asked to comment on the book prior to publishing. She apparently described it as soft-core porn that could provoke violence. The possibility of irrational violent repercussions apparently caused Random House to drop the book. It appears that Random House’s fears were not unfounded. In Britain, Gibson Square’s publishing plans for the novel were halted after the publisher Martin Reyna’s house was firebombed.16 Another violent reaction to the publication of an Islam-related theme was the Danish Cartoon Controversy. Several European publications displayed 12 cartoons caricaturing the Prophet Muhammad. As a result of these publications, protests erupted around the world. Embassies and churches were burned and at least 200 people were killed and many more were injured. Although these cartoons were published more than five years ago, violence directed at the Danes continues to this day. In January 2010 a Somali man armed with a knife and an axe entered the house of a cartoonist who drew one of the caricatures. In September a Chechnya-born Belgian was arrested after a small explosion in Copenhagen that police also linked to the cartoons, and in December 2010 Circle 296 on Reader Service Card
The Counter Terrorist ~ June/July 2011 67
five Islamic supremacist militants were arrested for planning to attack a Danish newspaper that printed the cartoon. The police recovered an automatic weapon, a suppressor, and ammunition. According to the police, the men wanted to “kill as many people as possible at the newspaper.”17 It would seem that artists, academics, and publishers of major newspapers like the New York Times or the Washington Post are not particularly concerned with Christians, Jews, or Buddhists attacking their offices and homes. Of course, it is easy to support free speech and expression when there is no threat to personal security. A decision made by Yale University Press regarding the reprinting of the Danish cartoons in a book about the incident appears to illustrate a different trend. The publisher asked chosen “experts” on Islam if they should republish the cartoons. The answer was unanimous and vehement: do not print the cartoons. John Donatich, the director of Yale University Press, said the press has a long history of defending free expression, but the risk of violence in this case outweighed the benefit of including the caricatures. All depictions of Muhammad were pulled.18 The political Left of the world appears
to see what happens when the doctrines of Islamic supremacists are challenged, and seem also to see places where short-term gains may be made by cooperating. Leftists have displayed bizarre silence and even excuse making for terrorism and religious supremacism. The revolutionary followers of Marx, Mao, and Lenin seem to have found a new brother-in-arms…for now.
•
ABOUT THE AUTHOR Mr. Andrews has more than 20 years of experience investigating international and domestic terrorism as a Special Agent with the FBI. He has taught at Florida State University and conducted seminars for first responders throughout the United States. He is currently a contracted subject matter expert in the Washington, DC, area.
endnotes Bin Ladin, Usamah, “The Way to Save the Earth” Inspire Magazine, November, 2010 2 http://globalmbreports.org/?p=3586 3 “http://memri.org/report/en/print” http:// memri.org/report/en/print 4901.htm 4 Al-Awlaki, Anwar: “Do Not Consult Anyone in Killing the Americans” released November 8, 2010 5 Jasser, Zuhdi; “Understanding Egypt: Islamic Socialism and the Left”, February 7, 2011 6 http://www/yementimes.com/DefaultDET. aspx?i=1284&p=opinion&a=1 1
Halsell, Grace, “A Visit with George Habash: Still the Prophet of Arab Nationalism and Armed Struggle Against Israel”, Washington Report on Middle East Affairs, September, 1998 8 “Minneapolis; How US Support to Israeli Oppression in Palestine Leads to Political Repression at Home” submitted by stopfbi.net, 12/31/2010 9 IPT News; “CAIR Imagery Makes Obstructionist Goal Clear”, January 12, 2001 10 “http://www.investigativeproject. org/2562galloway-endorses-an-islamic-revolution-in-egypt February 4” www.investigativeproject.org/2562galloway-endorses-an-islamicrevolution-in-egypt 11 http://www.mediaresearch.org/printer/ cyberalerts/2001/cyb20011127pf.asp 12 “Bowling for Fallujah” “http://www. CoxAndForkum.com” www.CoxAndForkum. com April 19, 2004 13 Hustmyre, Chuck, “The Left’s Love Affair with Islam”www.jihadwatch.org 14 http://www.your3dsource.com/controversial-artwork-html 15 Laurel, Maury “Jewel is finally here; was it worth the wait?” http://articles.latimes.com/ print/2008/oct/06/entertainment/et-book6 16 Laurel, Maury 17 http://www.hiiraan.com/news2/2/2010/ dec/denmark.aspx 18 Cohen, Patricia, “Danish Cartoon Controversy”, the New York Times, August 12, 2009 7
Secure your company’s future SHOWCASE YOUR FULL SECURITY BASED CAPABILITIES AT DSEI DSEi 2011 will feature: Security Demonstrations and Showcase allowing you to display your product’s full performance; On floor security seminar series enabling you to discuss key topics with the leading international security stakeholders; and Position your maritime security products in the Waterborne Demonstrations and ensure delegations are talking about you FOR MORE INFORMATION VISIT WWW.DSEI.CO.UK
DSEi attracts
and in 2009
Your company can access
primes, integrators, manufacturers and suppliers
of exhibitors focused on security
attendees from 98 countries and 70 official delegations from 49 countries.
1300 30% 25,170 Confirmed security capability providers include Detica, G4S, Remotec, & Avon Protection
68 The Counter Terrorist ~ June/July 2011
TO BOOK YOUR SPACE AT DSEI 2011 CONTACT: Alexander Jakes, Sales Executive T +44 (0) 20 7370 8527 E alexander.jakes@clarionevents.com North American Enquiries Doug Schlam T +1 (203) 275 8014 E doug.schlam@clarionevents.com
Innovative Products Lil Loco
The Loco, inspired by the WWII OSS thumb dagger, is a hideout. It’s main design parameter is that it be capable of being secreted almost anywhere. It’s not a primary weapon and it should be thought of as another layer in a tiered tool carriage profile. Overall it’s three inches in length and weighs less than an ounce with its kydex sheath. It has a wedge shaped blade that is relatively wide at it’s base considering the Loco’s diminutive size. The blade tapers into a narrow stem, which ends in a triangular pommel. These features give the Loco a distinct advantage over the traditionally flat and straight profiles of the lapel and thumb daggers. www.shivworks.com
Pointman Pointman is a lightweight, compact, tactical robot that provides reconnaissance and surveillance of structures, facilities, and vehicles from a safe distance. It’s selfrighting and stair climbing capabilities allow it to be dropped through a window or tossed through a door to conduct recon activities on multi-story structures. It is deigned in a compact size for operating in confined spaces. The camera boom houses both daylight and low-light cameras. An integrated high-intensity headlight provides full color capability when no ambient light is present. A video output jack on the controller provides streaming video to your video storage device or monitor. www.ara.com
T2 Shut Down Timer The T2 Shut Down Timer protects your vehicle’s battery from over-discharge by shutting Off up to 50 amp loads at a preset time after the engine is shut down or when the battery is discharged to a low voltage level. The timer also protects radio or computer equipment from damage due to low or high input voltage as experienced with alternator failure or improper voltage jump-starts. An emergency switch allows 15 minutes of operation after the timer shuts down the equipment. This timer is normally activated by sensing the alternator charge voltage level applied to the battery. When the alternator goes Off the timed sequences are started. www.lindelectronics.com
Platinum Sponsors
Circle 258 on Reader Service Card
The Counter Terrorist ~ June/July 2011 69
Counter
advertiser index
The
June/July 2011
Volume 4 • Number 3
Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, circle the appropriate reader service number (RSN) on the attached Reader Service Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.
Page
Ad/Company • website and/or email........................................................................................................ RSN Number
22 5th Annual Counter IEDs 2011 • www.c-ieds.com................................................................................................................. 264 66 6th Annual Homeland Security Professionals Conference & Expo • www.thecounterterroristmag.com/conference.............35 51 Adams Industries • www.adamsindustries.com............................................................................................................................27 50 Advanced Training Systems • www.atsusa.biz..........................................................................................................................64 2 Ahura Scientific • www.thermoscientific.com/ahura................................................................................................................... 254 14 ALS Technologies Inc • www.lesslethal.com.............................................................................................................................. 106 12 American Military University • www.amuonline.com/intelligence........................................................................................... 108 4 Blauer Manufacturing Co • www.blauerhomelanddefender.com..................................................................................................66 24 Diamondback Tactical • www.diamondbacktactical.com........................................................................................................... 206 68 DSEi 2011 • www.dsei.co.uk...................................................................................................................................................... 258 44 Elite K-9 • www.elitek9.com........................................................................................................................................................ 266 62 Epilepsy Foundation • www.epilepsyfoundation.org................................................................................................................. 262 73 Golden Engineering • www.goldenengineering.com....................................................................................................................83 18 HDT Engineered Technology • www.hdtglobal.com................................................................................................................ 306 14 Icor Technology • www.icortechnology.com..................................................................................................................................81 47 International Defence Logistics and Support 2011 • www.defencelog.com....................................................................... 304 19 ITI • www.scopes.com.................................................................................................................................................................. 120 54 K-9 Cop Magazine • www.k9copmagazine.com....................................................................................................................... 268 7 Lenco Industries • www.swattrucks.com.......................................................................................................................................13 13 Leupold • www.leupold.com....................................................................................................................................................... 270 56 Lind Electronics • www.lindelectronics.com................................................................................................................................ 220 11 Line of Fire • www.lineoffire.ca.....................................................................................................................................................49 52 Maritime Domain Awareness • www.mda-security.co.uk........................................................................................................ 288 26 Mid-Michigan Kennels • www.midmichigankennels.com........................................................................................................... 174 36 Next Level Training • www.nextleveltraining.com..................................................................................................................... 272 16 NFPA Conference 2011 • www.nfpa.org/conference............................................................................................................... 280 38 Novatac • www.novatac.com...................................................................................................................................................... 176 71 NTOA • www.ntoa.org................................................................................................................................................................ 222 75 Oasys Technology • info@oasys-technology.com....................................................................................................................... 234 41 Organo Gold • www.jc1cafe.organogold.com............................................................................................................................ 178 30 Paratech • www.paratech-tactical.com........................................................................................................................................ 278 27 PoliceOne Academy • www.PoliceOneAcademy.com................................................................................................................ 180 46 PoliceTraining.net • www.policetraining.net.............................................................................................................................. 191 42 Precision Locker • solutions@precisionlocker.com....................................................................................................................... 130 55 PVB • www.ssipvb.com................................................................................................................................................................ 226 63 Ray Allen Manufacturing • www.rayallen.com....................................................................................................................... 182 35 RBR North America • www.rbrnorthamerica.com...................................................................................................................... 248 43 ResQ-Pak • www.resq-pak.com.................................................................................................................................................. 134 64 Seabotix • www.seabotix.com.................................................................................................................................................... 282 29 Security Management International • www.smiconsultancy.com........................................................................................... 286 46 Security Management International • www.smiconsultancy.com........................................................................................... 284 25 Southern Police Equipment • www.southerpoliceequipment.com.............................................................................................. 290 50 Southwest Synergistic Solutions • www.triagelights.com....................................................................................................... 292 59 SSI Global Security Workshop in Tel Aviv • www.homelandsecurityssi.com.............................................................................37 45 SSI SWAT Counter Terrorism Course • www.homelandsecurityssi.com.................................................................................... 179 74 Stryke Logistical Group •info@tacticalstryke.com ................................................................................................................... 212 76 Surefire • www.surefire.com/magazines...................................................................................................................................... 298 35 TACT - Defense Group • www.tactfirstresponder.com................................................................................................................ 204 3 Tactical Electronics • www.tacticalelectronics.com.........................................................................................................................99 17 Tactical Products Group • www.tacprogroup.com.................................................................................................................... 300 37 Tex-Shield • www.tex-shield.com...................................................................................................................................................29 58 Transport Security Expo & Conference • www.transec.com.................................................................................................. 274 23 Tripwire Operations Group • www.tripwireops.org................................................................................................................ 238 65 U.S. Explosive Storage • www.usexplosivestorage.com............................................................................................................ 240 57 UDT 2011 • www.udt-europe.com.............................................................................................................................................. 260 53 Zistos • www.zistos.com.............................................................................................................................................................. 192
70 The Counter Terrorist ~ June/July 2011
September 18 – 24, 2011 • richmond, VA co-hoSted by richmond conference committee
feAtUred coUrSeS: • Advanced tactics • beyond pipe bombs: Understanding the threat of today’s bomb-makers • paramilitary Assault counter offensive plan • police response to Active Shooter
National Tactical Officers Association 800-279-9127 www.ntoa.org Circle 222 on Reader Service Card
The Counter Terrorist ~ June/July 2011 71
Training Review
Tunnel Assaulters Course By Ryan Potts
E
ach military campaign has its share of underground combat. Hitler’s massive support bunkers, the tunnel rat work of Vietnam, and contemporarily the mountains of Afghanistan have demonstrated that battles aren’t always fought in open spaces. Caves, tunnels, mines, bunkers, wells, and basements create unique and dynamic battle conditions. However, considering the frequency that operational forces are faced with underground warfare, surprisingly little official doctrine covers the subject. There is only one place in the United States where operators receive formal training in this discipline. That place is the high desert of northern Nevada, alongside the instructor cadre of CESTUSPathfinder. The four-day Tunnel Assaulters Course takes place at an abandoned copper mine, between 4,500 feet and 5,500 feet above sea level near Reno. On the first evening of the course, training was outlined, providing an overview on underground terminology, subsurface safety issues, site recognition, digital and photo interpretation, as well as reconnaissance. Training Day-1 (TD-1) started with several hours of range time confirming weapon zero and conducting diagnostics. Students are expected to arrive tactically proficient. “We hit them pretty hard on the range to make sure these are nonissues and to get their head in game” says Charles Clifton, the program’s developer and lead instructor. Key concepts were confirmed, and then hill surveillance, the first part of the curriculum, began. Prone students
72 The Counter Terrorist ~ June/July 2011
Team leader providing security for tracker. Photo Courtesy of Ryan Potts scoping hillsides were taught how to read a wide variety of surface disturbances to determine their direction and whether or not they are interconnected. This built an accurate mental picture of what is happening underground, and enabled the class to determine where the tunnels are, how deep they are, if they are open, if they are dry, and whether they hold breathable air, as well as other details of interest. The class then headed underground. The air was cold and dusty in the 100-year-old mine. Everyone gained an appreciation for “true dark” and “time compression.” Next, the class was taught the “fast stick” hasty mapping technique, developed by the school for creating a hasty map of the underground. It helps keep an operator from getting lost, gives
him a visual reference for intelligence finds, and can serve in support of field reports or to plan future exploitations of the complex. Once back on the surface, everyone travelled to some remote cabins for a shower and dinner. In the evening, the staff used the stick maps created by the class to generate a 3D model in Google SketchUp. On TD-2, the class donned full gear and dry weapons, and was led up the hill and into the extensive mine complexes, sometimes close to a mile in, with more than 1,000 feet of rock above. This is where the counterintuitive tactical environment began to unfold. Common surface tactics either don’t apply or need adjustment. Trainers explained and demonstrated air movement and the use of chemicals and smoke. Light discipline, sound bounce, and depth perception are all part of the experience. Handheld radios were issued to each student, and the class dispersed to multiple locations within 100 meters of each other. The students then attempted to pass along a simple radio message. It failed by the third person every time. “Radios are useless underground unless you station a man at every intersection, and at every curve and bend, to pass along messages. This will be the only way you can send communication to the surface” said Clifton. Tactically, it can be overwhelming, and communications and navigation problems can lead to a separated patrol, or even a friendly fire mishap. The ability to engage targets anywhere below the grass line made for some very interesting shooting.
On TD-3, the class conducted live fire training underground. Tactical movements were taught, and one by one, with an instructor at their side, students entered the mine and conducted a basic shoot. Clifton explained, “The object here is to show each man what happens when you cook off rounds down here.” The compartment filled with dust, and depending on the air movement of that part of the system, it can take anywhere from seconds to minutes to settle. The sound was startling, and the overpressure and compression of each round was jarring. The class then regrouped to run through contact drills and other formational movements while executing scenarios that required them to put everything into play. That evening, the
Circle 83 on Reader Service Card
group was given aerial and ground-based imagery, given access to Google Earth, and issued a mission scenario to plan for the final exercise on the following day. TD-4 started early. Students drove to a predetermined site, scouted targets, set their overwatch, and moved into an assault position. This required a tactical patrol on an unfamiliar mountain and climbing several thousand feet in less than two miles. Once in position, the “go” order was given and the assault began. Under the watchful eye of the staff, the team moved through the set of complexes with live weapons, completing terminal objectives and clearing the area. The exercise ended in the early afternoon. A quick individual walk-through test was administered to each student, the class was debriefed, questions were answered, and
certificates were awarded. The ground and rock provide an escape for those looking to disappear, infiltrate borders, or conceal weapons, drugs, and captives. Tunnels are a risky place to move in, a dangerous place to hunt in, and a foolish place to bring standard urban tactics. Soldiers and border patrol agents are commonly faced with natural and man-made caves, underground hides and mines, and various other places that airborne assets cannot readily locate. This is why CESTUS-Pathfinder teaches this very unique skill set. www.pathfindertactical.net
•
ABOUT THE AUTHOR Mr. Potts is a former member of the Canadian Forces and is currently working independently in the defense industry.
The Counter Terrorist ~ June/July 2011 73
74 The Counter Terrorist ~ June/July 2011
Circle 212 on Reader Service Card
Circle 234 on~Reader Service Card 75 The Counter Terrorist June/July 2011
Weight and size are the enemy of speed and maneuverability, two primary factors that determine an operator’s survival. So we packed 110 lumens of output into a compact, Mil-Spec hard-anodized aluminum body that comes with a click-on/off tailcap switch and a pressureactivated tape switch. Its virtually indestructible LED and Total Internal Reflection (TIR) lens produce a focused, far-reaching beam with plenty of peripheral light for situational awareness. All this power packed into a mere four inches of length, and weighing a scant 4.5 ounces. The Mini Scout—smaller, lighter, better. Circle 298 on Reader Service Card
76 The Counter Terrorist ~ June/July 2011