C Y B E R - E S P I O N A G E • S U I C I D E B O AT B O M B • V E VA K • E M S R E P O R T I N G
Journal for Law Enforcement, Intelligence & Special Operations Professionals
Counter The
june/july 2012
Volume 5 • Number 2
iran's nuclear objectives
An SSI Publication ®
june/july 2012 USA/CANADA $5.99
www.thecounterterroristmag.com The Counter Terrorist ~ June/July 2012 1
2 The Counter Terrorist ~ June/July 2012
Circle 254 on Reader Service Card Circle 13 on Reader Service Card
The Counter Terrorist ~ June/July 2012 3
Circle 34013 on on Reader Service Card Circle Reader Service Card
Counter
The Journal for Law Enforcement, Intelligence & Special Operations Professionals June/July 2012
Volume 5 • Number 3
COVER story: 30
Iran’s Nuclear Objectives By Henry Morgenstern
contents
FEATURES: 30
8
20
44
4 The Counter Terrorist ~ June/July 2012
Circle 29 on Reader Service Card
8
Firsthand: USN/USCG Encounter Suicide Boat Bomb By Phillip Null
20
Case Study: the Rise of Cyber-Espionage By Chris Mark
44
EMS and First Responder Intelligence Reporting By John Runyan
54
VEVAK: Intelligence for Terror By Tom Nypaver
departments: 6 From the Editor Tenacity 42
Book Review
66
Innovative Products
72
Training Review
Milestones
DSG Alpha Holster, Hyperfire, Kerm-Lock URA, MK107 Diablo, Opmod PVS-14, Rapid Assault Plate Carrier VATA Combat Carbine
Cover: Photo: National Nuclear Security Administration
The Counter Terrorist ~ June/July 2012 5
Counter The
From The Editor:
Tenacity By Chris Graham
I
Volume 5 • Number 3
n January 2011, Australian Special Air Service soldier Ben Roberts-Smith was presented the Victoria Cross for Australia, his nation’s highest award. He was recognized for actions conducted in support of Operation SLIPPER in Afghanistan. Mr. Roberts-Smith’s citation reads: On the 11th June 2010, a troop of the Special Operations Task Group conducted a helicopter assault into Tizak, Kandahar Province, in order to capture or kill a senior Taliban commander. Immediately upon the helicopter insertion, the troop was engaged by machine gun and rocket propelled grenade fire from multiple, dominating positions. Two soldiers were wounded in action and the troop was pinned down by fire from three machine guns in an elevated fortified position to the south of the village. Under the cover of close air support, suppressive small arms and machine gun fire, Corporal Roberts-Smith and his patrol manoeuvred to within 70 metres of the enemy position in order to neutralise the enemy machine gun positions and regain the initiative. Upon commencement of the assault, the patrol drew very heavy, intense, effective and sustained fire from the enemy position. Corporal Roberts-Smith and his patrol members fought towards the enemy position until, at a range of 40 metres, the weight of fire prevented further movement forward. At this point, he identified the opportunity to exploit some cover provided by a small structure. As he approached the structure, Corporal Roberts-Smith identified an insurgent grenadier in the throes of engaging his patrol. Corporal Roberts-Smith instinctively engaged the insurgent at point-blank range resulting in the death of the insurgent. With the members of his patrol still pinned down by the three enemy machine gun positions, he exposed his own position in order to draw fire away from his patrol, which enabled them to bring fire to bear against the enemy. His actions enabled his Patrol Commander to throw a grenade and silence one of the machine guns. Seizing the advantage, and demonstrating extreme devotion to duty and the most conspicuous gallantry, Corporal Roberts-Smith, with a total disregard for his own safety, stormed the enemy position killing the two remaining machine gunners. His act of valour enabled his patrol to break-in to the enemy position and to lift the weight of fire from the remainder of the troop who had been pinned down by the machine gun fire. On seizing the fortified gun position, Corporal Roberts-Smith then took the initiative again and continued to assault enemy positions in depth during which he and another patrol member engaged and killed further enemy. His acts of selfless valour directly enabled his troop to go on and clear the village of Tizak of Taliban. This decisive engagement subsequently caused the remainder of the Taliban in Shah Wali Kot District to retreat from the area.”1 Ben Roberts-Smith’s actions demonstrate the tenacity, initiative, and judgment that built the Special Air Service Regiment’s reputation. Roberts-Smith’s accomplishments serve as an inspiration to each of us who are entrusted with protecting the lives, liberty, and property of our countrymen.
Semper Fidelis, Chris Graham Editor, The Counter Terrorist 1
Journal for Law Enforcement, Intelligence & Special Operations Professionals
http://www.defence.gov.au/special_events/Roberts-Smith/index.htm accessed on 04-20-2012.
june/july 2012
Editor Chris Graham Director of Operations Sol Bradman Director of Advertizing Carmen Arnaes Director of Production Kelli Richardson Contributing Editors Eeben Barlow Jennifer Hesterman Richard Marquise Tom Nypaver Steve Young Graphic Design Morrison Creative Company Copy Editor Laura Town Office Manager Lily Valdes Publisher: Security Solutions International 13155 SW 134th St. • STE 204 Miami, Florida 33186
ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.
LC9™ 9mm Luger
LC9™ with Crimson Trace® Laserguard®
2011 Handgun of the Year
LC9™ with LaserMax CenterFire® Laser
CompaCt, powerful and perfeCt for
personal proteCtion. Just slightly larger than the popular Ruger® LCP,® the Ruger® LC9™ is one of the smallest 9mm pistols on the
For article reprints, e-prints, posters and plaques please contact: PARS International Corp. Web: www.magreprints.com/quickquote.asp Email: reprints@parsintl.com Phone: 212-221-9595 • Fax: 212-221-9195
market, making it the perfect choice for a backup or off-duty firearm. It features a finger grip extension floorplate,
Please visit the magazine web site where you can also contact the editorial staff:
two laser models. The Ruger® LC9™ is another great product from the industry leader in rugged, reliable firearms!
a dovetailed, high-visibility 3-dot sight system, a manual safety, a loaded chamber indicator and is now available in
www.thecounterterrroristmag.com © 2012 Security Solutions International
6 The Counter Terrorist ~ June/July 2012
www.ruger.com/Lc9
Circle 347 on Reader Service Card
©2012 Sturm, Ruger & Co., Inc.
041912
The Counter Terrorist ~ June/July 2012 7
On April 24, 2004, seven men, five with the US Navy and two with a US Coast Guard Law Enforcement Detachment, pulled away from the USS Firebolt in a rigid hull inflatable boat (RHIB) and headed toward their patrol area around the Khawr al Amaya Oil Terminal in the North Arabian Gulf.
Firsthand:
USN/USCG Encounter Suicide Boat Bomb By Phillip Null
Counter The
8 The Counter Terrorist ~ June/July 2012
T
he mission was to run interference for US Marines guarding the facility who had reported frequent small boat incursions into the waterside security zone surrounding the terminal. The Firebolt and an Australian patrol vessel would provide a visual deterrence and heavy firepower while the RHIB intercepted any approaching vessels, cautioning and redirecting them around the two-mile security zone. It wasn't long before an inbound vessel was sighted, its course a direct line toward the terminal’s supporting structure. In
USS Firebolt. response, the RHIB coxswain brought his vessel’s bow around and, pushing the throttles flush to the console, made best speed to meet it head on. The purpose of the head-on approach is to show a clear signal of assertiveness that will either force the opposing vessel to slow or alter course and turn away. As the RHIB closed on its target, the sailors noted several details that made it unique from other traffic common in the area, most of which were wooden fishing dhows with inboard engines that moved slowly and were littered with fishing tackle and the
As we were approaching this vessel, I noticed that it looked brand new. It had a brand-new paint job, outboard engines, and no fishing gear on the deck whatsoever.
Local vessel explodes. All photos courtesy USCG. The Counter Terrorist ~ June/July 2012 9
The Complete Tactical Video Tool System!
FOR MILITARY & LAW ENFORCEMENT OPERATIONS
All products are interchangeable and new tools can be added at any time! Night Vision Monocular Pole Camera ➤ 2-20ft Pole Cameras An array of technology-based ➤ Fiberscopes & Videoscopes video surveillance tools that ➤ Under Door Cameras allow a team to safely assess any ➤ Listening Devices ➤ Thermal Imaging potentially dangerous situation ➤ Robotic Remote Control Cameras ➤ Digital/Analog Wireless Video ➤
Zistos Corporation Ph 631.434 .1370
E-mail: sales@zistos.com Circle 311 on Reader Service Card
10 The Counter Terrorist ~ June/July 2012
Circle 191 on Reader Service Card
grime of a work boat. In contrast, the approaching vessel was moving in fast and in less than a minute after it was first observed on the horizon, it was within feet of the RHIB. Close aboard the boat finally responded to the RHIB’s presence and altered its course away from the terminal, but maintained speed even as the RHIB turned with it and paced alongside. “This boat was very different than the norm you would see over there. As we were approaching this vessel, I noticed that it looked brand new. It had a brandnew paint job, outboard engines, and no fishing gear on the deck whatsoever. All I could see was one person on deck,” USCG Petty Officer Joseph Ruggiero, one of the men aboard the RHIB, reported. Pulling even with the vessel’s console the RHIB crew shouted and made hand gestures at the operator to bring his engines to neutral and stop. Normal procedure was to direct the vessel to stop and upon compliance hand the crew a chart printed with the boundaries of the restricted area and warnings in local languages to keep out. The suspect vessel never reduced speed, however, and the operator just waved his hand in the opposite direction then turned away from the terminal toward open water. The RHIB crew assumed this action meant the operator understood and was complying with its orders to depart the area. With distance increasing, the RHIB coxswain slowed to shadow the vessel’s departure, but as he did the suspect made a tight turn to a reciprocal course and headed straight for the RHIB’s beam. Realizing the vessel was trying to ram him, the RHIB coxswain turned away and slammed the throttles forward to avoid collision. The vessels came within 15 feet of one another. Suddenly there was a thundering
Instant Access Introducing the All New Alpha Series Concealment Holsters from
The DSG Alpha Series Holsters Feature: • Solid Kydex Construction • Large In-Stock Inventory • Available for Most Popular Handguns • Models for Surefire and Streamlight Weapon Lights • Formed for Close to the Body Fit • Adjustable Cant and Height Available in black and dark earth
• Convertible to Inside the Waistband Carry
Specialized Gear for Military and Law Enforcement Weapons & Components — Optics — Ammo
dsgarms.com 1.800.382.7571 FREE SHIPPING on your first order this month! Promotion Code: CT0312
Circle 101 on Reader Service Card
GSA: GS-07F-6007R • CAGE: 1L0J5 Circle 275 on Reader Service Card
The Counter Terrorist ~ June/July 2012 11
BWL09_CRC_CounterTerrMag AD:Layout 1 2/13/1
WE’VE GOT YOU COVERED High Performance Protection Never Felt So Good You spend long hours protecting and defending, often in bulky, hot armor and hazmat gear. So a moisture wicking, comfortable, anti-microbal t-shirt is essential. PBI Baseguard delivers all that, plus the ultimate in flash fire and high energy blast protection. Firefighters have trusted PBI fabrics in the heat of battle for more than 30 years. PBI took its knowledge of protective outerwear and developed BaseGuard to address the US military’s need for flame resistant, no melt, no drip, wicking base layer apparel. now that same protection is available for police, tactical and homeland security workers. Made In the
USA
explosion. The force and heat of the blast travelled up then out from the suspect boat, tearing its fiberglass from the frame and disintegrating the hull and operator into lethal pieces of shrapnel and debris. Yards away the seven sailors crowded on 17 feet of RHIB had no room to move and no time to seek cover. When the blast reached their position, it forced the RHIB and crew up and into the air before the displaced oxygen returned to its point of origin and pulled them into the water, capsizing what remained of the RHIB. “When the explosion happened, I was basically looking at the boat. [I was later told by] my shipmates and other Navy sailors, as soon as the blast went off, they were about 150 yards from us; they didn’t see anyone emerge from the water for at least a full minute,” Ruggiero said. Debris from the suspect vessel littered the water and acted as shrapnel, opening wounds on the heads, arms, and torsos of the crew before coming to rest on the surface. Positioned only a few hundred yards, away the Firebolt observed the blast then waited nearly a full minute for the first sailor to resurface. “I first pulled my lanyard on my life jacket, when the only thing that happened was air escaping from it causing it not to inflate,” Ruggiero said. It had been shredded by the blast. Now treading water and struggling under injuries to his arms and face, Ruggiero swam in circles looking for the RHIB through burning sheens of oil and gas. As his arms moved, one brushed against the hose of his Camelbak and he recalled prior discussions with his team on water survival tactics. Realizing the hydration bladder might hold enough air to keep him afloat, he blew into the mouthpiece and found the bladder's integrity was not compromised by the blast. Held afloat by the makeshift lifejacket, Ruggiero began to search for other survivors.
The first he observed was his fellow Coast Guardsman, Petty Officer 3rd Class Nathan Bruckenthal, whose lifejacket had inflated and was keeping him afloat only 20 feet away. Ruggiero swam the distance and as he got close he identified several deep wounds to the back of Bruckenthal’s head that were spilling blood into the water. His eyes rolled back and forth and he mumbled incoherently as he went in and out of consciousness. Ruggiero pulled his friend onto his chest and backstroked toward the capsized RHIB where he could lift him onto the dry hull and assess his injuries. Once alongside the RHIB, Ruggiero found Navy Petty Officer 1st Class A.R. Daley, the RHIB’s coxswain, holding onto the hull, disoriented and focused on injuries to his arm that had lost 90 percent of the tricep and a large portion of the hand. After lifting Bruckenthal onto the hull and reassuring the coxswain, Ruggiero moved to the opposite side and continued his search for survivors. Fifty yards away was Navy Petty Officer 1st Class Michael Pernaselli, whose body floated lifelessly face down in the water. Ruggiero yelled Pernaselli’s name and when he failed to receive a response, he started swimming toward him. With Pernaselli’s body in tow, Ruggiero again backstroked toward the RHIB, but against an eight-knot current he made little headway. By this point, eight minutes after the explosion, a helicopter was airborne from the Australian patrol boat and had closed the distance between the ship and the position of the survivors, and it was hoisting Navy Petty Officer 2nd Class Chris Watts from the water. Simultaneously, a rescue swimmer deployed from the deck of the Firebolt reached the capsized RHIB. Bruckenthal and Daley were quickly pulled from the water onto the Firebolt, but because of their position away from the RHIB, Ruggiero and Pernaselli
SAVE 20% on our Newest Counterterrorism Books
CRC Press is a premier publisher of books on counterterrorism. Visit www.crcpress.com to see our complete selection of titles and use PROMO CODE BWL09 to receive a 20% DISCOUNT. FREE standard shipping when you order at www.crcpress.com
Circle 245 on Reader Service Card Circlewww.pbibaseguard.com/tactical 29 on Reader Service Card See it in action: 111 Terrorist on Reader ~ Service Card 2012 12 TheCircle Counter June/July
Circle 282 on Reader Service Card
Copyright © PBI Performance Products Inc.
Circle 331 on Reader Service Card
The Counter Terrorist ~ June/July 2012 13
were prevented from receiving the same assistance. This left Ruggiero fighting the current and rotor wash for over 20 minutes until he reached the RHIB, and he climbed onboard still holding onto Pernaselli. Seeing his friend conscious and sitting on the RHIB, a third Coast Guardsman onboard the Firebolt jumped into the water with a life ring and swam to his position. He was quickly joined by a Navy officer who also went in the water. The two helped Ruggiero secure Pernaselli in the life ring.
Amaya Oil Terminal. “I later reentered the water from the capsized [boat] with Mike’s body and started swimming back towards the Firebolt where I was assisted by two shipmates, who jumped into the water from the Firebolt. The three of us, while pulling Mike’s body, eventually made it close enough to the Firebolt where we were given a line and pulled in towards the ship,” Ruggiero said. All were recovered onto the ship’s deck. Forty minutes elapsed from the explosion to the recovery of all the victims. Three servicemen, Pernaselli, Watts, and Bruckenthal, died in the attack and four
others were injured. Ruggiero continues to deal with lingering effects from the explosion, and for over a year had difficulty hearing and suffered bleeding from both ears. He only recently completed extensive dental work to realign his jaw. Petty Officer Joseph Ruggiero earned a Bronze Star with Combat “V” for Valor and a Purple Heart, the first awarded to a Coast Guardsman since the Vietnam War.
Conclusion
Seven trained fighting men, fully aware of the threats they faced protecting the terminal and well equipped to counter them, were still vulnerable to explosives concealed in a boat that closed on their position faster than they could determine its intent. The security they provided was effective, however, and the boat’s intended target was left undamaged. Intelligence gained with their lives also prevented additional deaths because a description of the involved boat was briefed to security personnel manning Iraq’s two terminals and they were able to move other patrol boats to safety as follow-on attacks were identified and interdicted with preemptive small arms and MK-19 fire. Detecting these vessels is a difficult task once they have left their dock or trailer for open water. The only indicators that can be expected are minor abnormalities not easily observed unless close aboard. Although small craft are the preferred carrier for a waterborne bomb, larger ships are capable of serving in this capacity, as demonstrated by Palestinian terrorists who rigged six tons of TNT to the keel of a commercial freighter in a failed attempt to attack a crowded Israeli beach. Monitoring the way vessels ride in the water is the simplest and most immediate method for identifying potential attackers. Low freeboard or a persistent list to one side are indications the vessel is overloaded, possibly with explosives. Condition of the vessel, its deck, and the
C
M
Y
CM
MY
CY
CMY
K
Circle 333 on Reader Service Card
14 The Counter Terrorist ~ June/July 2012
Circle 201 on Reader Service Card
The Counter Terrorist ~ June/July 2012 15
The absence of fishing poles on a sport fisher, wires visible outside of compartments, or tarps covering the deck are indicators meriting increased attention and scrutiny.
type of equipment carried onboard can all suggest a voyage isn’t for recreational or commercial purposes. The absence of fishing poles on a sport fisher, wires visible outside of compartments, or tarps covering the deck are indicators meriting increased attention and scrutiny. The demeanor of the crew, and its focus on surrounding vessels, level of cooperation, and overall appearance will often be the most telling signs. A suspect focused and unwilling to avert his attention from a large commercial tanker while sweating profusely and speaking in short sentences should key suspicion. Less suspicious, but a documented tactic, is overt friendliness by those onboard as they ease their vessel into striking range and detonate. When a vessel is suspected of carrying explosives, maintaining standoff distance outside projected blast and fragmentation reach is crucial to survival of a ship
and her crew. This is accomplished with pre-attack intelligence allowing avoidance altogether or the employment of armed escort vessels or onboard ship security. Establishing boundaries surrounding a protected ship or facility, divided into layers to first investigate and when within range to stop by force, is the method used by the US Navy to protect its fleet. Called a Naval Vessel Protection Zone, the area of water surrounding each warship is separated into a warning zone at the outer edge, where minimum speeds are directed for passing vessels, and an exclusion zone at the closest ring, where access is restricted and any offending vessel failing to obey commands will be taken under fire. To extend the protective boundary, small boats are often employed to intercept and query approaching vessels before they transit close enough to become a threat. These vessels and
LED LIGHTING
law enforcemenT Body Armor duTy GEAr HelmeTs rioT gear apparel
mIlITAry special operaTions plaTe carriers
BY: GOLIGHT INC
NyloN PouCHES & PACkS EyE ProTECTIoN
Durable...Versatile...Powerful...
PrIVATE SECurITy
GUARANTEED!
armor medical & emT uniforms plaTes
Circle 101 on Reader Service Card
800.557.0098 | www.golight.com | militarysupport@golight.com 16 The Counter Terrorist ~ June/July 2012
Circle 285 on Reader Service Card
The Counter Terrorist ~ June/July 2012 17
18 The Counter Terrorist ~ June/July 2012
•
About the Author Mr. Null is a veteran of the US Coast Guard with assignments that include the Maritime Safety & Security Team in Miami, Florida, a nationwide deployable tactical unit responsible for antiterrorism and border interdiction missions. This article is based on interviews with Petty Officer Joseph Ruggiero, and Department of the Navy records.
www.homelandsecurityssi.com
the crew take significant risk moving on inbound contacts and rely on early threat detection by judging responses to commands communicated over radios and loudspeakers. A vessel failing to turn away when ordered on VHF-FM Channel 16, the international hailing frequency, and continuing on course despite the obvious presence of armed vessels will be classified as a threat. Without knowing for sure that the threatening craft is rigged with explosives, aggressive boat tactics intended to alter the suspect vessel’s course will be the initial response. If these efforts fail, escalation to warning shots and disabling fire will become necessary. The tactic of concentric rings has proved successful as evidenced by the unsuccessful attempt to bomb the Khawr al Amaya Oil Terminal discussed above. Confirmation of an explosive laden vessel gives cause for lethal countermeasures. Firing on those operating the vessel may prevent them from actuating any detonation trigger, but without action to disable and stop the vessel it will continue to move, possibly closer to its target where a timer, pressure switch, or remote control from a handler will initiate the explosion. Targeting the propelling machinery, the
Find out more at:
A rigid-hull inflatable aboard the USS Firebolt.
engine spaces and propellers, will stop the vessel’s forward momentum, preserving the standoff distance needed to prevent damage and injury. Rifles chambered for .223 or larger rounds are ideal for this purpose, allowing multiple rounds with sufficient penetration capability to be rapidly fired into the engines until they stop. In the event no clear line of fire to the engines can be established, fully automatic bursts into the vessel’s hull concentrated on its centerline will cause it to drag and reduce speed as it begins to flood. The resulting rush of water is also likely to force a turn as the vessel begins to list to its heavier side. Even when dead in the water, a boat bomb continues to pose a threat and needs to be destroyed or, if time and circumstance require, disarmed and preserved as evidence and for intelligence value. Destructive fire is accomplished by firing into the vessel’s hull until it floods and sinks. As we read of other bombing attempts ending in failure, it’s important to remember that these events can become unintentional trial runs for future attacks. Those responsible for attacking the USS Cole made an earlier attempt to bomb the USS The Sullivans in January 2000, but their boat sank under the weight of the explosives. The attackers learned what they did wrong and got it right on the next try. Only through a combination of intelligence, awareness, and decisive application of firepower can future attacks be prevented or countered.
Take your training to a higher level...
SSI Elevated Tactics training Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn: • Vehicle driving and operating techniques in a variety of situations • Global case studies of real-world operations using the specific equipment • Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults • Elevated obstacle negotiation and firing platforms • Emergency evacuations, climbing and descending options • Distraction and deception techniques ® SECURITY • and much more... SOLUTIONS
SSI
INTERNATIONAL
Protecting the Homeland Together ®
Call now for more information.
Elevated Tactics Training provided in partnership with Patriot3.
Circle 311 on Reader Service Card
Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 313 on Reader Service Card
The Counter Terrorist 2012 19 Circle 183~ onJune/July Reader Service Card
By Chris Mark
Case Study:
the Rise of Cyber-Espionage 2011 Recruitment Plan
At a Hopkinton, Massachusetts, office, an executive received an email that appeared to be from a coworker on March 1, 2011. Attached to the email was an Excel spreadsheet titled “2011 Recruitment Plan.” The man opened the spreadsheet. The email was not from a coworker, it was a carefully crafted attack known as ”spearfishing” in which a fraudulent email is sent to a specific person.
T
he spearfishing email contained an Excel spreadsheet with a zeroday exploit and a version of the Poison Ivy RAT (remote administration tool) payload embedded. The RAT enabled a hacker to gain privileged access to the network of RSA Security (an American computer and network security company). The company had been founded by Ron Rivest, Adi Shamir, and Leonard Adleman, the inventors of the RSA public key cryptographic algorithm. This single event initiated an attack that would result in the compromise of one of the largest and most respected data security companies in the world. Within weeks, hackers had penetrated RSA’s defenses and stolen the source code to the vaunted two-factor authentication
system, SecurID. SecurID is used by an estimated 250 million people worldwide. The attack was believed to have been initiated using a zero-day exploit created by a Chinese hacker. Evidence suggests the possibility of Chinese-sponsored cyberespionage.1 RSA’s CEO, Art Coviello, stated the stolen SecurID information “could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack (italics added).”2 This proved to be an ominous prediction. On May 27, 2011, an employee at L-3 Communications, a major supplier of communication, intelligence, surveillance, and reconnaissance technology to the Department of Defense, noticed suspicious activity in the network. An in-
The US government and US companies are losing the battle to protect sensitive data.
Counter The
20 The Counter Terrorist ~ June/July 2012
©istockphoto/loops7
The Counter Terrorist ~ June/July 2012 21
Panel discussion at the 3rd annual State of the Net conference, held in Washington, D.C. From Left: Lord w:Toby Harris (UK Parliament), Chrsitopher Painter (US DoJ), Scott Charney, (MSFT), Chris Young (RSA Security) and Ari Schwartz (CDT). Photo: Joe Hall
22 The Counter Terrorist ~ June/July 2012
vestigation showed a hacker had accessed the network using cloned RSA SecurID tokens3 and potentially accessed critical intellectual property related to defense projects. This is only one of several reported attacks that seem to have originated from the RSA breach months before.4 It is believed that Northrup Grumman Corporation (a designer, systems integrator, and manufacturer of military aircraft) may have been targeted, and Lockheed Martin (an American aerospace, defense, security, and advanced technology company) announced that it too was the target of a “significant and tenacious” attack, which also apparently originated from the compromised RSA tokens.5 By February 2012 security analysts began to acknowledge what many have known for a long time. The US government and US companies are losing the battle to protect sensitive data. At RSA’s
Circle 295 on Reader Service Card
annual security convention, Robert Mueller, head of the Federal Bureau of Investigation, told the audience, “There are only two types of companies. Those that have been hacked, and those that will be.” Echoing his sentiments, RSA’s Coviello took the stage and ominously informed the crowd, “Our networks will be penetrated. We should no longer be surprised by this.” He added, “The reality today is that we are in an arms race with our adversaries, and right now, more often than not, they are winning.”6 The comments at RSA accurately depict the state of cybersecurity today. Organizations are spending billions of dollars per year and are being literally and figuratively eviscerated by people intent on stealing data. There are growing numbers of reasons why data is stolen but, in general, the motivations can be fit into three broad categories: political or social activism, cyber- espionage, and financial crimes. Regardless of the basic motivations, the methods of attack are similar
Circle 299 on Reader Service Card
and the same techniques used to perpetrate politically motivated attacks are used to steal financial data. During a London speech in 2007 on credit card security and compliance, a French participant stated unequivocally to me that the recommendations provided did not apply to companies accepting credit cards in France because, “In France we do things differently.” My response was to ask a series of simple questions. “Is the Internet in France based on the Internet protocol? Does the OSI model apply in France? Is structured query language used in France?” He sheepishly answered “yes” to all the questions. Whether the motivation is stealing credit card data, intellectual property, or state secrets, the attack principles are the same because the underlying protocols and technologies are the same. To understand the difficulty of protecting systems from today’s attacks, it is useful to look at the concepts of unrestricted warfare and guerilla tactics. As stated in
“One man’s freedom fighter is another man’s terrorist. So let them call us terrorists.”
The Counter Terrorist ~ June/July 2012 23
INL cybersecurity researcher operates a Supervisory Control and Data Acquisition System inside the lab’s Information Operations Research Center. Photo: Idaho National Laboratory Mao Tse-tung’s On Guerilla Warfare: “At one end of the spectrum, ranks of electronic boxes buried deep in the earth hungrily spew out endless tapes. Scientists and engineers confer in air conditioned offices; missiles are checked by intense men who move about them silently, almost reverently….in forty minutes the countdown begins. At the other end of the spectrum, a tired man wearing a greasy felt hat, a tattered shirt, and soiled shorts is seated, his back against a tree. Barrel pressed between his knees, butt resting on the moist earth between his sandaled feet, is a browning automatic rifle...Draped around his neck, a sausage-like cloth tube with three day’s supply of rice…In forty minutes his group of fifteen men will occupy a previously prepared ambush.”7 In today’s world of cybersecurity, companies are spending billions of dollars on cutting-edge equipment and monitoring systems and networks around the clock. On the other end of the spectrum is Hector Xavier Monsegur, also known as “Sabu.” Sabu is a 28-year-old unemployed, high school graduate. He is a fa-
ther of two who lives on public assistance in a housing project in New York’s Lower East Side. With a dilapidated computer he allegedly wreaked havoc on numerous companies, including Fox, Sony, and PBS.8 He does not require sophisticated equipment. All he needs is knowledge, patience, time, and motivation to attack a company. As mentioned previously, there are several motivations that drive hacking behavior. Although these motivations often intersect and may overlap, generally, they tend to be either financial or ideological. Financially driven crimes are, arguably, easier to anticipate and counter. Volumes have been written on the exploits of the Russian Business Network, BOA Factory, Mazafaka, and other alleged financially motivated criminal groups. Today, companies are also facing increasingly dangerous adversaries driven by ideology. People driven by ideology are often more dangerous and difficult to deter. Their willingness to accept greater risk and focus greater resources for less-perceived return makes them particularly challenging. There are primarily two types of ideologically motivated adversaries threatening companies today: social or politically motivated hacktavists, and “patriotic hackers” involved in cyber-espionage. Hacktavism refers to cyberattacks or data thefts that are conducted primarily to make a political, social, or other statement. It should be noted that although the primary objective may be politically or socially motivated, these attacks often result in stolen financial and other data that may be used for financial gain. Two of the most prominent groups active today appear to be LulzSec and Anonymous. In 2004 a relatively anonymous hacker named Jeremy Hammond presented the LulzSec manifesto at the hacker convention known as DefCon. To a chorus of boos and hisses, and with a bandana cov-
ering his face, the hacker, political activist, and self-styled anarchist known online as “anarchaos” and “crediblethreat” stated defiantly, “One man’s freedom fighter is another man’s terrorist. So let them call us terrorists.” He added moments later, “I’ll still bomb their buildings.”9 He served two years in prison in 2006 for cyberattacks. In 2011 Hammond was arrested again for a hack against the US intelligence company Stratfor. Although Anonymous is believed to be a loosely knit, decentralized group of hackers whose members may overlap with those of LulzSec, its motivations can be seen in its published manifesto. Like LulzSec, Anonymous has political interests.10 Its manifesto states: “The intention of Anonymous is to protect free flow of information of all types from the control of any individual, corporation, or government entity. We
will do this until our proverbial, dying breath. We do this not only for ourselves, but for the citizens of the world. We are people campaigning at this very moment for your freedom of information exchange, freedom of expression, and free use of the Internet. Please remember this as you watch the news, read posts on Twitter, comment on YouTube or Facebook, or send email to a friend or loved one: Anonymous is making every effort to defend free speech and free information on the Internet” Anonymous concedes that it does not control, or try to control its own members’ actions. “May we remind you that Anonymous is a dynamic entity. Furthermore, anything attributed, credited, or tagged to Anonymous is not always based on the consensus of us as a whole. Even the document you read now was written by at
ProTecT Your Vehicle BaTTerY uSing 2 SeParaTe Timing DelaYS
T2 ShuT Down Timer • Protect vehicle batteries from over-discharge by shutting off up to single 30 amp and 20 amp loads at a preset time after the engine is shut down or when the battery is discharged to a low voltage level • Manage power loads separately using 2 independent timing circuits • An emergency switch allows 15 minutes of operation after the timer shuts down the equipment • The timed sequences can be activated by sensing when the ignition is turned to, or the alternator goes, off
POWER SPECIALISTS FOR MOBILE COMPUTING
1.800.697.3701 • info@lindelectronics.com • www.lindelectronics.com 24 The Counter Terrorist ~ June/July 2012
Circle 327 on Reader Service Card
The Counter Terrorist ~ June/July 2012 25
The economics of cyber-theft is simple: Stealing technology is far easier and cheaper than doing original research and development.
least ten people simultaneously.’ State-sponsored cyber-espionage includes hacks perpetrated directly by foreign governments, or by foreign organizations and individuals associated with foreign governments. Although numerous countries engage in cyber-espionage, the largest perpetrator of cyber-espionage appears to be the People’s Republic of China. Although the motivations are often ultimately financial, we see a glimpse into how China reportedly motivates attackers to perpetrate the crimes. China calls those who steal for the benefit of China, “patriot hackers”.11 By appealing to the patriotism of the hacker, it applies moral relativism to the act. In short, the hacker, in their eyes, is not committing a wrong, he or she is patriotically supporting China. On April 15, 2011, the US Congressional Subcommittee on Oversight and Investigations conducted a hearing on
Chinese cyber-espionage. The hearing revealed the US government’s awareness of Chinese cyberattacks. In describing the situation in her opening remarks, subcommittee chairperson Dana Rohrbacher astutely stated: “[The]United States is under attack.”12 “The Communist Chinese Government has defined us as the enemy. It is buying, building and stealing whatever it takes to contain and destroy us. Again, the Chinese Government has defined us as the enemy.” The RSA compromise, as well as the theft of data from DuPont, and the theft of intellectual property from American Superconductor, Microsoft, Cisco, and Motorola to name but a few, demonstrate the motivation and sophistication of the efforts to steal data from US companies.13 It should be noted that the United States is not the only victim. The United Kingdom reportedly loses $45 billion per
Helping You Protect Us
“toknowledge is critical deter the threat of terrorism.” Elena Mastors, Ph.D. | Dean, School of Security & Global Studies Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network.
Karlstad, MN / 218-436-7000
RUBB ER TRAC K CONV ERSIO N SYST EMS, 76 MODELS TO CHOOSE FROM !
Learn More at www.amuonline.com/counter-terrorist
Mattracks.com 12SM00000149
26 The Counter Terrorist ~ June/July 2012
Circle 297 on Reader Service Card
Education | Management | Public Service & Health | Science & Technology | Security & Global Studies Circle 211 on Reader Service Card AMU_Counter Terrorist_0212.indd 1
2/17/122012 9:38 AM27 The Counter Terrorist ~ June/July
year from cybercrime with $28 billion in losses directly attributable to cyber-espionage.14 As detailed in the congressional report: “The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology.” “The economics of cyber-theft is simple: Stealing technology is far easier and cheaper than doing original research and development. It is also far less risky to the spy than historic cloak and dagger economic espionage.”15 Cybercrime has been an issue for companies since the Internet boom of the late 1990s. Early criminal efforts focused on stealing financial data such as credit and debit card information, and website defacements. Throughout the 2000s companies have been plagued with data thieves stealing financial data. Today, companies and governments are increasingly facing more dangerous hacktivist and cyberespionage attacks. Companies that have focused on protecting financial data are now faced with the daunting task
of protecting intellectual property and systems from a motivated, sophisticated adversary often driven by ideology.
•
About the Author Mr. Mark is the founder of Mark Consulting Group, Inc. He is a data security and risk professional. He has consulted for numerous Fortune 500 companies and publishes the blog: www.GlobalRiskInfo.com.
end notes http://jeffreycarr.blogspot. com/2011/06/18-days-from-0day-to-8krsa-attack.html (accessed 3/18/12) 2 http://www.eweek.com/c/a/Security/ Northrop-Grumman-L3-Communications-Hacked-via-Cloned-RSA-SecurIDTokens-841662/ (accessed 3/18/12) 3 http://www.eweek.com/c/a/Security/ Northrop-Grumman-L3-Communications-Hacked-via-Cloned-RSA-SecurIDTokens-841662/ (accessed 3/18/12) 4 http://www.eweek.com/c/a/Security/ Northrop-Grumman-L3-Communications-Hacked-via-Cloned-RSA-SecurIDTokens-841662/ (accessed 3/18/12) 5 http://www.informationweek.com/ 1
IQPC-NY Military Vehicles Expo Counter Terr Ad 1.1:Layout 1 12-03-30 3:19 PM Page 1
New Dates. New Pavilions. New Opportunities. Get your FREE EXPO PASS for limitless information sharing and networking with over 2,500 professionals in two days of exhibit time at the LARGEST stand alone military vehicles event in the world!
July 10-13, 2012 | Cobo Center, Detroit, MI
Benefit from 15+ free educational sessions in the Presentation Theater and evaluate the latest products from over 200 exhibitors.
REGISTER TODAY! EXPO FREE ES PASS
Quote Promo Code: CT12
Go online for complete speaker and agenda details! www.MilitaryVehiclesExpo.com/CT12
28 The Counter Terrorist ~ June/July 2012
Circle 113 on Reader Service Card
news/government/security/229700151 (accessed 3/15/12) 6 Cowley, Stacy. (Feb 28, 2012) “New Cybersecurity Reality: Attackers are winning.” http://money.cnn. com/2012/02/28/technology/rsa_cybersecurity_attacks/index.htm (accessed 3/15/12) 7 21st Century U.S. Military Manuals: Mao Tse-tung on Guerrilla Warfare (Yu Chi Chan) U.S. Marine Corps Reference Publication FMFRP 12-18 (accessed 3/18/12) 8 http://www.foxnews.com/scitech/2012/03/06/exclusive-unmaskingworlds-most-wanted-hacker/ 9 http://www.belch.com/ blog/2012/03/08/lulzsec-hacker-delivered-defcon-manifesto-in-2004/ (accessed 3/12/12) 10 http://www.indybay.org/newsitems/2010/12/09/18666107.php (accessed 3/12/12) 11 of Representatives, United States House (2011-06-30). Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology (Kindle Locations 188-189). Kindle Edition. (accessed 3/13/12) 12 House of Representatives, United States House (2011-06-30). Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology (Kindle Location 66). Kindle Edition. (accessed 3/12/12) 13 http://articles.boston.com/201109-19/news/30176716_1_alternativeenergy-china-ties-data-theft-case (accessed 3/18/12) 14 http://cyberpointllc.com/news_09. html (accessed 3/13/12) 15 House of Representatives, United States House (2011-06-30). Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology (Kindle Locations 188-189). Kindle Edition. (accessed 3/13/12)
Mobility, Deployment, Maintenance, Sustainment And Operations Systems Deployable Command Centers Enhanced Command and Control Secure Communications Video Conferencing Increased Protection for Sensitive Equipment
Increased Mission Flexibility Multiple System Configurations Deployable via Military and Commercial Vehicles Air-Transportable and Sling-Loadable
Deployable Data Security Data Container Maximum Flexibility Completely Customized to Client Requirements
HVAC Venting
Weather and Fire-proof ISO Compatible Enclosure
Fire Detection and Suppression
Racks
Phone (866) 312-6226 (571) 259-2817 Fax (800) 862-9489 Email info@sesolinc.com
www.sesolinc.com
360° High Density Insulation
HVAC Condenser/ Evaporator Chilled H2O
Un-Interruptable Power Supply (UPS)
Power Distribution Unit (PDU)
THE
SESOLINC GROUP
Circle 239 on Reader Service Card
The Counter Terrorist ~ June/July 2012 29
Iran’s Nuclear Objectives By Henry Morgenstern
I had the privilege of being in Washington, DC to attend the annual American Israel Public Affairs Committee (AIPAC) policy conference last March at the invitation of one of AIPAC’s board members.
A
IPAC is one of the most powerful lobbying groups in the nation; more than 13,000 people attended, including President Barack Obama, the President of Israel, Shimon Peres, and the Prime Minister of Israel, Benjamin Netanyahu, and members of Congress. This year’s conference attendance certainly reflects the power of the pro-Israel lobby. Despite the concern for the nation of Israel and its supporters over a nuclear Iran and the centrality of that subject at the conference, one of the questions asked by many speakers was: should Iran be considered an Israeli issue, or is this a US/International problem?
Counter The
US and IRAN: Ongoing LowIntensity Conflict I believe Iran’s push for nuclear weaponry is but another facet of its ongoing war with the USA. Israel is but one front in this long, low-intensity conflict.1 The effective start date of the conflict between Iran and the US is well known and has nothing to do with Iran’s current push to develop nuclear weapons. Current events should be seen as the outcome, not the cause of a long process of adversarial relations between the two countries. The political, economic and diplomatic warfare, began on November
...should Iran be considered an Israeli issue, or is this a US/ International problem?
Grand Ayatollah Ali Khamenei, the current Supreme Leader of Iran. Photo: Government of Iran
30 The Counter Terrorist ~ June/July 2012
The Counter Terrorist ~ June/July 2012 31
4th 1979 when men identified as “students” invaded the US Embassy in Iran and took the staff hostage,2 holding them for 444 days with at least tacit approval from the Leader of the Iranian revolution Ayatollah Khomeini.
Iran does not manifest a passive resistance to our way of life but a very active resistance. The aims of expanding the revolution to the entire world were first embodied in the constitution of Iran in 1979.
Clash of values and civilizations Democratic principles and the notion of compromise are anathema to Islamic supremacists. Indeed, the present maximum leader, Ayatollah Ali Khamenei, head of the Council of Guardians and Iran’s supreme leader, was
one of the foremost Persian translators of Sayed Qutb*. Qutb’s principle contribution to radical Islam was creating a disdain for the American way of life as the embodiment of all that is corrupt. Any government of man such as one “By the people, and for the people” does not come from the divine law of the Koran as given to Mohammed and embodied in shariah. Therefore, the guardian and leader of the Islamic revolution must be religious, and this leader is the ultimate safeguard for the purity of man’s regimes, according to Islamists. Iran’s maximum religious leader makes the key
*Editors Note: See Book Review on page 42 of this issue.
Iran Hostage Crisis student demonstration, Washington, D.C., 1979. Photo: Trikosko, Marion S. 32 The Counter Terrorist ~ June/July 2012
decisions and his will is enforced by the Revolutionary Guard. Nothing made this clearer than recent power struggles between the supreme leader and the President Ahmadinejad, which Khamenei won handily.3 While Iran’s government has some checks and balances, everything must be endorsed by the religious leadership, including those who may stand for election. Logically, this puts it in conflict with democratic traditions. Iran does not manifest a passive resistance to our way of life but a very active resistance. The aims of expanding the revolution to the entire world were first embodied in the constitution of Iran in 1979. This is reflected in Iran’s proxy Hamas, which calls for the total destruction of Israel in its charter. Successive regimes have been diligent in the pursuit of this goal. Apart from recently attempting to assassinate the Saudi Ambassador to the USA in Washington DC, the Islamist regime has been active since 1979, killing and maiming Americans in Lebanon, in Afghanistan, in Iraq4 and elsewhere. It has been especially active through its terror proxies Hamas (which has tentacles in the USA)5 and Hezbollah6. Recently, the Supreme Leader declared, “In response to threats of oil embargo and war, we have our own threats to impose at the right time." It is likely that he means that they are prepared to unleash jihad in US Cities. The idea that the world’s first Islamist State may be willing to compromise on the basis of the US President’s selfproclaimed “tough talk” of not “taking anything off the table” seems unlikely. Why would this intimidate the battlehardened Iranian leaders? A prime example of the intransigence of the regime and its resultant immunity to public pressures was the Iran and Iraq
History of Relevant US/Iranian Relations • 1979 Iranian “students” seize 63 hostages at US embassy in Tehran, US severs diplomatic ties and US imposes sanctions against Iran. • 1980 22 September - Iraq invades, US supports Iraq in war on Iran. • 1981 20 January - Last 52 US hostages freed in January. Their release comes after US President Jimmy Carter leaves office. 444 days spent in captivity. • 1983 Attacks on American facilities. 241 US Servicemen (220 Marines) killed by Iranian Shia terrorist proxies “Amal”, later known as Hezbollah. • 1985/6 US holds secret talks with Iran and makes weapons shipments, to help convince the Iranians to assist in releasing US hostages in Lebanon. Diversion of revenue to Nicaragua nearly brings down Reagan Presidency. • 1987/8 US forces engage in series of encounters with Iranian maritime forces, including strikes on Persian Gulf oil platforms. • 1988 US cruiser Vincennes mistakenly shoots down Iran Air Airbus over the Gulf, killing all 290 people on board. As a result, and believing that the US was about to throw its military might against Iran directly, Khomeini, according to him, “drinks a cup of poison” and capitulates in the Iran/Iraq war – two weeks after the airliner was shot down. • 1997 Muhammad Khatami elected president of Iran. • 1998 President Khatami calls for a "dialogue with the American people" in American TV interview. But in a sermon a few weeks later he is sharply critical of US "oppressive policies". • 2001 The US alleges that elements within the Iranian Government were directly involved in the bombing of an American military base in Saudi Arabia in 1996. • 2002 Russian technicians begin construction of Iran's first nuclear reactor at Bushehr despite strong objections from US. • 2003 The UN's International Atomic Energy Agency (IAEA) conducts a series of inspections in Iran. • 2003 White House refusal to rule out the “military option” after IAEA says Iran "failed to report certain nuclear materials and activities". First round of sanctions begins, 9 years ago. Note: When the US invaded Iraq in the summer of 2002 until 2003, Iran apparently put its nuclear program on the back burner.
The Counter Terrorist ~ June/July 2012 33
The first mistake was the offer by the newly elected President Barack Obama to open talks without preconditions with Iran.
war that was fought from 1982 to 1988 – millions on both sides were killed. Harold Rhode, a former Defense Department official, cited the case of the USS Vincennes and details the Iranian response to this in his study, Iranian Negotiating Behavior,7 which details the cult of the strongman and how compromise is considered a sign of the ultimate weakness in that society. *Editor’s note: See this issue’s Book Review. The war raged for years, causing costly Iranian casualties, but Khomeini would not yield. About a week after the US missile cruiser Vincennes mistakenly downed an Iranian airliner, Khomeini publicly announced an end to the bloody, eight-year war and said that Iran had to swallow this “poison” in order to prevent dire consequences for the country and the Islamist revolution. From an Iranian point of view, this was no accident. The Vincennes incident proved
that the U.S. was signaling its willingness to use power mercilessly, and Iran had therefore no choice but to give in to the American demand to end the war.8 Myths about moderates in the Islamic supremacist world who might come to the rescue of the West in Iran’s march to nuclear armament are also extremely dangerous notions that only fuel the crisis. There are no moderates in Iran’s leadership. Khamenei is as guilty9 as Khomeini in the slaughter of as many as 30,000 Iranians in 1988. Khatamei who was President and often regarded as a moderate in the West, was President in 1997 when the regime was as hard-line as it gets. Similar is the notion that the so-called “Arab Spring” that toppled nonIslamist heads of state will trickle into Iran. Iran, like Syria, will firmly repress any resistance. The current conflict between the
Video training from leading law enforcement experts. Anytime, anywhere. With more than 500 high-definition videos covering dozens of critical training topics, the PoliceOne Academy gives you instant, cost-effective access to training that will improve your team’s performance and help keep them safe on the streets.
The PoliceOne Academy Offers • No overtime, travel, or downtime costs associated with training • A wide variety of topics from Defensive Tactics to Leadership • Ideal for in service/roll call training • An easy-to-use video navigation and management system • Objective lesson plans and knowledge check quizzes • Tracking and reporting features • An advanced-delivery system that ensures the highest possible
quality of streaming available based on your internet connection • Access from your mobile device • Available to departments for an affordable annual subscription
based on agency size
Contact us today at
(800)323-0037 for your FREE department preview! Bushehr nuclear power plant under construction.
Circle 335 on Reader Service Card
is a Praetorian Group Company 34 The Counter Terrorist ~ June/July 2012
Circle 180 on Reader Service Card
www.PoliceOneAcademy.com
The Counter Terrorist ~ June/July 2012 35
supreme leader and Ahmadinejad is unlikely to help. The President of Iran is now a lame duck and will be replaced but the regime will go on. Hoping that resistance will come from the streets is also futile since in 2009 (possibly the world’s best chance yet to depose the Iranian regime by assisting the rioting resistance) we missed the opportunity to intervene, leaving Iranian citizens to brutal repression. Our lack of involvement in Syria will also signal to the regime that we will likely do nothing. This guarantees the further repression of the Iranian people.
Khamenai is obsessed with his own survival as supreme leader. He is in every sense the “Chosen One” and wants to continue.
What does Iran gain with nuclear weapons? I believe that the first reason why Iran is willing to enter into a debilitating economic conflict with the West in order to obtain nuclear weapons is because it feels that it can obtain these weapons. The US government’s handling of the
issue so far could serve as a case study in how not to deal with a terrorist state in international diplomacy. The first mistake was the offer by the newly elected President Barack Obama to open talks without preconditions with Iran. 10As expected, the Iranians rejected this-even after having claimed it was the prime reason for the friction on nuclear issues in the first place! As soon as the President of the United States agreed to talks, they withdrew their keenness for “talks” and said the President was twofaced. The countries in the region took note of the US move and the Iranian rebuff and in 2008 allegiances logically began to shift to Iran since countries in the Gulf had reason to doubt US resolve.11 In a lively session at AIPAC named “Nuclear Intentions: Why Iran really wants Nukes’’,12 many of the reasons Iran wants nuclear weapons were enumerated: • Iran wants to export the Islamic revolution, achieve hegemony over the Islamic world and bring back the Persian domination of the caliphate as well as achieve shia dominance of Islam. • Iran would rather be North Korea than Iraq. Iran has witnessed first-hand how the US can intervene in the region and topple regimes. • Iran is a one-resource country and has only oil and natural gas. An attack against their oil fields would likely topple the regime fairly quickly. Having nuclear weapons deters adversaries. • The regime will be able to use its terrorist proxies to the brink of nuclear war and know that they have the ability to retaliate. For example, if a bomb were placed in a US City by Hezbollah – how would the US respond if Iran is a nuclear power?
Industrial engineering department (left) and "Nuclear Engineering and Physics" department (right) of Amirkabir University of Technology, Tehran, Iran. Photo: Ladsgroup • The Iranians are watching the struggle in Syria. This has accelerated their programs. Bashar Al Assad is their representative, and they have bolstered his regime. They anticipate the possibility of being next if that regime falls. • Khamenai is obsessed with his own survival as supreme leader. He is in every sense the “Chosen One” and wants to continue. Although US inaction in Syria is relaxing the idea that the US might act to implement regime change, he would still likely prefer the insurance of nuclear weapons.
• Iran wants to win the “long war” that has raged between the two nations and knows that nuclear weapons will give a significant edge. • The Gulf will become the fiefdom of Iran. Lebanon is dominated by Iranian surrogates. Iraq is subject to Iranian influence after the withdrawal of US forces, and Bahrain is already known as the 14th province of Iran. All the Oil States are likely to become part of this fiefdom, including Saudi Arabia if Iran has nuclear weapons. The US response to its old adversary
As has been pointed out by Martin Kroenig, there is never a good time for war, especially after a decade of conflicts in Iraq and Afghanistan.
IAEA's Safeguard inspectors. Photo: Dean Calma 36 The Counter Terrorist ~ June/July 2012
The Counter Terrorist ~ June/July 2012 37
Circle 207 on Reader Service Card
IR Reduce your chemical light stick budget by over 90% Reduce the weight and volume for this type of equipment by over 60% Improve your patient collection time by over 30% Improve your patient collection error rate from 4 errors down to 1 error Be 24/7 Field triage prepared All four colors in one light (R/Y/G/B), IR version available for TCCC scenarios Use grant money to purchase, associated with Standardized Equipment List(SEL) numbers [03OE-03-GLRL] System, Marking, Green Line/Red Line and [09MS-01-TTAG] Tags and Supplies, Triage. Multiple use tool, use for IED marking, clear room indicators, IFF, boat back up lights, personnel identifiers, Buzz Saws, expedited landing zones, etc...A value purchase! NSN's being issued
Use Promo Code: “E/T Light” for a 15% Discount! One light with four colors and 15 different program settings, including strictly IR modes, 8 hour IR auto off and "Light Grenade / Distraction Mode”
Versions 6.8A and 6.8IR
has been perplexing. As has been pointed out by Martin Kroenig, 13there is never a good time for war, especially after a decade of conflicts in Iraq and Afghanistan. He suggests that the idea that there are many good reasons not to attack Iran fade with the terrifying prospect of that country obtaining nuclear weapons. The usual canards stating that Iran’s hard liners will be strengthened, that this will not set back the Iranians much, that Iran will retaliate against our cities, close the straits of Hormuz and irrevocably damage the US relations with the Islamic world are just that – naïve beliefs. The hardliners are already firmly in power, so no amount of attacks will give them an edge. An attack would only convince Iran that further nuclear programs will yield further attacks – a real deterrent in their terms. The ideas that they will retaliate or that our standing in the Muslim world will be damaged are minor problems compared with the devastating consequence of a nuclear Iran. Perhaps the very best argument for not allowing Iran to have nuclear weapons is one advanced by Brett Stephens. “A state that can take a rock in its right hand to stone a woman to death should not have a nuclear bomb within reach of its left.”
•
ABOUT THE AUTHOR Mr. Morgenstern is the president of Security Solutions International (www.homelandsecurityssi.com) – the publisher of The Counter Terrorist magazine. He is the author of Suicide Terror: Understanding and confronting the threat (www. suicideterror.com). The opinions expressed in this article are his own.
www.TriageLights.com 38 The Counter Terrorist ~ June/July 2012
Circle 345 on Reader Service Card
Circle 308 Circle on 305 Reader on Service Reader Card Service Card
The Counter Terrorist ~ June/July 2012 39
New and improved
End Notes “Tehran Children on ‘Jerusalem Day’: We Came to Say Death to Israel, Death to America,” (Nov. 13, 2004). Youtube.com, http://www.youtube.com/ watch?v=FckLO8HcNyo. 2 Joseph J. St. Marie and Shahdad Naghshpour, Revolutionary Iran and the United States: Low Intensity Conflict in the Persian Gulf (Farnham: Ashgate, 2011). 3 David Batty and Saeed Kamali Denghan, “Iran Elections: Ahmadinejad Rivals Set to Gain Control of Parliament,” The Guardian, March 3, 2012. 4 Jay Solomon, “Iran Funnels New Weapons to Iraq and Afghanistan,” The Wall Street Journal, July 2, 2011. 5 Investigative Project on Terrorism chronicles the rise of front groups such as CAIR that have been proven co-conspirators in raising US money for HAMAS, since the 1990’s. www. 1
investigativeproject.org 6 Cindy Saine, “US Lawmaker: Iran May Have Hezbollah Operatives in US,” Voice of America, March 21, 2012. 7 Elton L. Daniels, The History of Iran (Westport: Greenwood, 2012), 218. 8 Christina Lamb, “Khomeini Fatwa 'Led to Killing of 30,000 in Iran,” The Telegraph, Feb. 4, 2001. 9 Brett Stephens, “The Bogus Intelligence Debate,” Wall Street Journal, European ed., March 19. 2012. 10 Thomas Erdbrink, “Facing Obama, Iran Suddenly Hedges on Talks,” Wall Street Journal, Nov. 13, 2008. 11 Matthew Kroenig, “Time to Attack Iran,” Foreignaffairs.com, Jan. 2012. 12 Mark Dubowitz, Brad Sherman, Avi Issacharoff, AIPAC Panel Discussion, “Nuclear Intentions: Why Iran Wants Nukes,” aipac.org, March 5, 2012. 13 Kroenig.
( portable vehicle barrier ) When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.
K9 COP AD #1 Call now for more information. Pricing dependent on quantity
and delivery location. Call: (305) 401-6906 or email Richardson@securitysolutionsint.com
40 The Counter Terrorist ~ June/July 2012
Circle 81 on Reader Service Card
Or visit our website: www.SSIPVB.com
Circle 308 on Reader Service Card
Circle 226 on Reader Service Card
SSI
®
SECURITY SOLUTIONS INTERNATIONAL
Protecting the Homeland Together ®
The Counter TerroristCircle ~ June/July 2012Service 41 Card 136 on Reader
Book Review
Milestones By Sayed Qutb
Reviewed by: Chris Graham
S
ayed Qutb was born into a wealthy Egyptian family in 1906. In 1949 he spent two years in the United States studying, working, and traveling. He decided the country was corrupt and immoral. By the mid-1950s he was recognized as the intellectual leader of the Muslim Brotherhood. He is known for extensive writing and is credited with authoring Milestones, one of the most influential works for Islamic supremacists. This book has been translated into numerous languages and is available in multiple versions. Qutb asks, “How is it possible to start the task of reviving Islam?” He answers, “It is necessary that there should be a vanguard that sets out with this determination….” He concludes, “I have written Milestones for this vanguard….” The author asserts, “Islam…means to bring human beings into submission to God, to free them from servitude to other human beings…to deliver them from the clutches of human lordship and manmade laws, value systems, and traditions so that they will acknowledge the sovereignty and authority of God and follow his law in all spheres of life.” Qutb adds, “When the purpose is to abolish the existing system and to replace it with a new system, then it stands to reason that this new system should also come into the battlefield as an organized movement….” He concludes, “It is therefore necessary that Islam’s theoretical foundation—belief—materialize in the form of an organized and active group from the very beginning.” Qutb makes the interesting assertion that “…this religion forbids the imposi42 The Counter Terrorist ~ June/July 2012
Milestones, Createspace, 2005 edition pictured. tion of its belief by force…,” but reveals “…it tries to annihilate all those political and material powers that stand between people and Islam.” Interestingly, at the time of this writing, the world had already witnessed communist revolutionary warfare tactics combine the two tracks of deceptive nonviolent efforts and combat to obtain goals. Likewise, Qutb encouraged insurgency and admonished Muslims to “enter the field with preaching as well as the movement, and to strike hard at all… Political powers….” And just as Muslim Brotherhood affiliates today use the term “freedom” creatively, Qutb also advocated “freedom” and states, “Freedom does not mean that they can make their desires their gods, or that they can choose to remain in the servitude of other human beings…. Whatever system is to be established in the world ought to be on the authority of God. Then every individual is free, under the protection of this universal system, to adopt any belief he wishes to adopt.” He states, “The peace that Islam desires is that the religion has the obedience of all the world’s people.” Qutb notes, “the Islamic movement… stands on the clear verses of the Koran…. Fight against those among the People of the
Book who do not believe in God and the Last Day, who do not forbid what God and his Messenger have forbidden, and who do not consider the true religion as their way of life, until they are subdued and pay Jizyah.” He observed, “It may happen that the enemies of Islam consider it expedient not take action against Islam, if Islam leaves them alone in their geographical boundaries to continue the lordship of some men over others and does not extend its message and its declaration of universal freedom within their domain. But Islam cannot agree to this unless they submit to its authority by paying jizyah, which will be a guarantee that they have opened their doors for the preaching of Islam and will not put any obstacle in its way through the power of the state.” He added, “Thus wherever an Islamic community exists it has a God-given right to step forward and take control of the political authority….” Qutb concluded, “It is not the function of Islam to compromise with the concepts of jahiliyyah that are current in the world or to coexist…” and added the threat, “Islam will change your concepts, your modes of living, and your values.” There is little point to studying how improvised explosive devices are employed or the capabilities and limitations of an AK-47 without also studying why they will be employed. Milestones provides much insight into why. When as many voters, security personnel, and policy makers have read this book as jihadists have, we will be well on our way to more efficient, more effective counterterrorism operations.
•
With The Rise Of The “New” Anti-Semitism… Isn’t It Time For Christians To Stand Up And Act On Our Biblical Responsibility?
PJTN Produces Powerful Film and Media Communications to Educate Christians about Their Biblical Responsibility to Defend Israel and Her People. Reaching Over 200 Nations with Video Tools and Messaging. Find Out More and What You Can Do at PJTN.org.
Circle 119 on Reader Service Card
The Counter Terrorist ~ June/July 2012 43
The collection and reporting of information are essential to the prevention of terrorism and major crimes. Intelligence reporting, in this case, refers to alerting law enforcement agencies to suspicious activity associated with a potential terrorist attack or major crimes.
T EMS and First Responder Intelligence Reporting By John Runyan
Counter
errorism prevention relies on the sharing of timely and accurate intelligence from a wide variety of sources, including national programs such as the “If you see something, say something” campaign encouraging citizens to report unusual activity in their community. This program, originally implemented by New York City’s Metro Transit Authority, is now part of a Department of Homeland Security nationwide campaign.1 The campaign is also visible in Los Angeles and Chicago. The “If you see something, say something” campaign receives a myriad of “suspicious” activity tips daily. The success of this campaign has yet to be determined.2
Other programs attempt to incorporate first responders, including Emergency Medical Services (EMS) personnel, into intelligence reporting roles.3 One such program is the Fire Service Intelligence Enterprise (FSIE). The FSIE “…is a collaborative effort of the State and Local Program Office, Office of Intelligence and Analysis, Department of Homeland Security, and the US Fire Administration (USFA) with support from the National Preparedness Directorate in FEMA.”4 Participating fire agencies include FDNY, Los Angeles, Washington, Baltimore, Miami-Dade County, and Chicago.5 Over the last few years, the inclusion of first responders, specifically EMS personnel,
People trapped in London underground. Photo: Adam Stacey.
Terrorist attacks always have indicators leading up to attacks that provide opportunities to intervene if noticed.
The
44 The Counter Terrorist ~ June/July 2012
Times Square is closed by the NYPD due to a bomb scare. Photo: from Tokyo Japan The Counter Terrorist ~ June/July 2012 45
217-281_HmldSctyAd_2.25x10_4C_Layout 1 12/20/
FDNY Ambulance. Photo: Kevin B. into this role has proven controversial. Safety issues, patient privacy, community trust, and scope of practice are all reasons cited to exclude EMS and other health care personnel from the intelligence reporting
A New York City fire fighter looks up at what remains of the World Trade Center. Photo: Jim Watson,U.S. Navy
46 The Counter Terrorist ~ June/July 2012
role. Despite these concerns, some cities, including New York and Washington DC, have provided first responders with the training to identify and report suspicious activity generally associated with terrorism. Boston EMS has a full-time presence in the Boston Regional Intelligence Center enabling Boston EMS to stay current with homeland security and public safety issues. EMS and fire personnel respond to emergencies offering assistance and specialized services. We do not arrest, detain, or interrogate the individuals we encounter while performing our duties. Traditionally, our profession reports only specific criminal activity, such as child abuse or neglect, to authorities. As a result, fire and EMS personnel enjoy a certain amount of trust from the community. In today’s society, citizens expect rapid, professional, and private service from our nation’s fire and EMS organizations. Communities often do not worry about
first responders reporting suspicious activity to government agencies. Many view first responder reporting of suspicious activity as dangerous and intrusive, potentially leading to violent acts of retaliation. Other providers believe that reporting will create a lack of public trust resulting in some individuals not calling for help simply because of mistrust or fear of our profession. Additionally, today’s society expects privacy in all medical matters. Our nation’s health care providers are required to expend considerable effort to comply with patient privacy rules and regulations. This often discourages providers from disclosing information of any kind. Despite the negative implications, EMS can take a positive and proactive role reporting lifesaving information. EMS’ role in intelligence reporting of suspicious activity should be limited to that of potential terrorism and life-threatening criminal activity. It is not the responsibility of EMS to provide information to law enforcement regarding suspicious activity related to routine crimes, unpopular
political leaning, or drug abuse. I believe that type of reporting goes beyond the acceptable scope of EMS providers and potentially interferes with our ability to provide safe and effective medical care. The benefit of EMS intelligence reporting regarding indicators of terrorism, however, outweighs the potential risk. Reporting indicators of terrorism provides opportunities to prevent acts of terrorism, protects our nation and community, and ultimately saves lives. History is full of acts of terrorism and extreme violence, such as the Columbine High School shooting in Littleton, Colorado, that had warning signs but no intervention took place. The events leading up to the April 20, 1999, massacre produced numerous opportunities for intervention in the year leading up to the attack. Eric Harris and Dylan Klebold showed classmates homemade videos of shooting their guns. The Jefferson County Sheriff’s Office received several complaints from concerned parents regarding the violent website maintained by Eric Harris. Two months prior, Dylan Klebold submitted a
BACHELOR OF SCIENCE OR MASTER OF SCIENCE IN
Legal Studies
100% ONLINE DEGREE • LAW & PUBLIC POLICY TRACK • HOMELAND SECURITY TRACK • CRIMINAL JUSTICE TRACK The 100% online curriculum provides students with a strong foundation in criminal, family, real estate, administrative and business law. It also includes a set of competencies in legal research and writing, litigation, estates and trusts, bankruptcy, ethics and constitutional law. Cal U’s web-based format allows students the opportunity to pursue their interests in a variety of legal topics, preparing them for a host of different career options. To learn more about the 100% online BS and MS in Legal Studies: Law & Public Policy, Homeland Security and Criminal Justice tracks, and other unique online opportunities, visit Cal U’s website at www.calu.edu/go or call 724-597-7400.
1
#
University in the country for online degree programs.*
*www.guidetoonlineschools.com
CALU GLOBAL ONLINE
California University of Pennsylvania Building Character. Building Careers. www.calu.edu
The Columbine High School Memorial, located in Clement Park in Littleton, Colorado. Photo: Seraphimblade
A proud member of the Pennsylvania State System of Higher Education.
Circle 263 on Reader Service Card
The Counter Terrorist ~ June/July 2012 47
story described by his teacher as “the most vicious story she’d ever read.”6 Missed opportunities were also among the factors that contributed to the 2005 London Tube Bombings, 9/11, and others. Mohammad Sidique Khan, the alleged leader of the 2005 London Tube Bombings, had been on the periphery of other terror-related investigations. As a result, Khan was never formally investigated. Detainees outside of the United Kingdom reported on Khan as part of a potential fertilizer bomb plot, but these detainees were never shown a picture to confirm Khan’s identity until after the Tube bombings.7 Intelligence personnel did attempt to identify Khan and another bomber, Shehzad Tanweer, however, a lack of resources resulted in a diversion in the investigation.8 Terrorist attacks always have indicators leading up to attacks that provide opportunities to intervene if noticed.
Reporting and active participation aimed at stopping terrorism remains critical to our nation’s safety and security.
Terrorists do not have the ability to materialize with weapons in hand and reconnaissance complete. Successful intervention depends on recognition of and reaction to these indicators. Indicators can be suspicious activity such as conducting surveillance, rehearsing an attack, accumulating tools/weapons, and the rendezvous of a team. These indicators create an opportunity for alert responders and the public to notice the preparation for an attack and potentially for law enforcement officers to intervene. For many attacks, one of the most common clues pertain to changes in mood and behavior. Individuals familiar with terrorists have often noticed a change in behavior that appeared suspicious, but the individuals failed to act. A change in behavior was noted among those terrorists involved in the London Tube bombings and the attempted airline bombing on Christmas Day in 2009.9
The Jersey Cuff™
New York, NY, September 13, 2001 -- Fire fighters continue to battle smouldering fires and clean up the wreckage at the World Trade Center. Photo: FEMA Photo Library. successful interventions of these two cases, Khan had worked with difficult children it is important to remember that not all and became a well-respected teacher’s incidents will involve reporting suspicious assistant. Eventually, he began to display activity as obvious as a VBIED spewing an intolerant attitude, which was contrary smoke. However, reporting of suspicious to his usual demeanor.10 behavior or a scene resembling a bomb lab Incidents of reporting were responsible will prove just as crucial. for stopping the 2010 Times Square Public reporting of suspicious activity bombing. New York City street vendor remains instrumental in successful Lance Orton was among a group of intervention of terrorist activity. Reporting individuals responsible for noticing of suspicious behavior and indicators and reporting the suspicious, smoking 11 of terrorism by the general public have Nissan Pathfinder. In 2007 a London ambulance crew responding to an proven successful in intervening against emergency at a nightclub noted a similar terrorist attacks. A joint study conducted incident involving a suspicious vehicle by the RAND Corporation and the 12 with smoke. The vehicle turned out to Institute for Homeland Security Solutions at Research Triangle Institute International be a vehicle-borne improvised explosive examined 68 potential terrorist acts over device (VBIED). The nightclub contained a 10-year period from 1999 to 2009. The an estimated 1,700 people. Despite the
The Next Generation in Disposable Restraints Actual Size 7.5 inches 0.7 grams
Made in the U.S.A. Sold exclusively by Combined Systems, Inc. 388 Kinsman Road Jamestown, PA 16134 (888) 989-7800 www.combinedsystems.com
48CT_Jersey The Counter Terrorist ~ June/July 2012 Cuff Ad.indd 1
• Patented Jersey Cuff™ is the lightest, smallest, safest and most versatile disposable cuff in the world • Fits in a pocket, a molle strap or in an operational carry pouch Tac-Pac™ - (pictured right) holds 4 Jersey Cuffs and a safety cutter G-Pac™ - gas mask pouch, holds 20 Jersey Cuffs and attaches via drop style, molle system or D-rings and sling Evac-Pac™ - for riot control or jail evacuations, the Evac-Pac™ holds 96 Jersey Cuffs
Circle 252 on Reader Service Card
Circle 319 on Reader Service Card 2/28/12 9:05 AM
The Counter Terrorist ~ June/July 2012 49
In th
Nas h e He
10 M
art o
inut
es f
f Do
ville
rom
the
wnt
own
PRESENTS 2012 POLICE & MILITARY WORKING DOG CONFERENCE October 1,2,3 - 2012 Airp
ort
Registration/Reception: September 30 - Conference: October 1,2,3, - 2012 Sheraton Hotel Downtown - Nashville, TN
$350 after August 15
/APRIL 2012
Only $275 per person
MARCH
Register Now!
MARCH
before you post ZINE™
IJICON
th factse
fea ed contrtur actor:
VCSi
LED, Adjust Long Lastingable LED ™ Single Battery and Dual-Illumina Sight Refere Life ted Version nce Point Forged 7075-T 6 Militars Availab Manua l & Autom y Grade le Rugge d & Depen © 2011 atic Brightn Aluminum-All Trijicon, dable ess Contro oy Housin Inc. Frederic g ls ksburg, VA USA
2012
$6.95
MAGA
THE TR
/APRIL
pseudo scents get :
RMR
te bitewam ork
1-540-2
86-1827
VOLUME
PML701
0-1 Rev(0)
TRIJIC
4, ISSUE
WWW.
M
2
ON.CO
See pgs. 14 - 15!
K- 9
C
Policeo p M a g a z i n e ’ & Militar s y Workin
g Dog
Conferen
ce
1 Year (6 issues)
Tackle the latest border challenges with: • Bradford Bench, Special Agent in Charge for Washington, Alaska, Oregon, Idaho DHS ICE Homeland Security Investigations • James A. Loudermilk, Senior Level Technologist, FBI Science and Technology Branch • Gary A. Wheeler, Chief, Global Initiatives Unit, Federal Bureau of Investigations (FBI), Criminal Justice Information Services Division (CJIS) • John Madden, Director of Alaska Division of Homeland Security • Dawn Hoff, Assistant Director of Homeland Security and Justice Team, Government Accountability Office (GAO) • Amy L. Clymer, Senior Analyst and Operational Manager, Rapid Reaction Tunnel Detection, NORAD-USNORTHCOM
EXCLUSIVE DISCOUNT FOR THE COUNTER TERRORIST READERS! SAVE 20% OFF THE STANDARD ALL-ACCESS FEE WITH CODE: TCT_BNORTH Visit www.BorderManagementSummit.com/North or call 1-800-882-8684 today
Circle 115 on Reader Service Card
50 The Counter Terrorist ~ June/July 2012
•
End Notes
K9COP OP
is t
ribu
d
Port of Seattle Workshop Day: July 23, 2012 Main Summit Days: July 24-25, 2012 Seattle, WA
Mr. Runyan is a supervisor/paramedic with 16 years experience in EMS and fire service. He holds a master’s degree in homeland security and provides WMD instruction to EMTs and paramedics.
te
Advancing Security at the US-Canadian Border with Technology, Interoperability, and Infrastructure
ABOUT THE AUTHOR
Wo
border management summit
purpose of the study was to determine what interventions prevented the attacks. Of the 68 recognized attempted attacks examined, reporting from the general public was responsible for stopping approximately one-third of these cases.13 Reporting and active participation aimed at stopping terrorism remains critical to our nation’s safety and security. Despite the best efforts of the nation’s intelligence community, acts of terrorism still occur and are often highly decentralized. Our nation’s network of terrorist early warning groups and 72 fusion centers would greatly benefit from the assistance of all our nation’s first responders. Knowing your community and response area enables you to recognize suspicious or unusual behavior.
D
Suspected car bomb in Times Square, June 2010. Photo: T L Miles
SUBSCRIPTIONS ONLY $29.95 available SUBSCRIBE TODAY! to EVERYONE 270.534.0500 info@k9copmagazine.com www.k9copmagazine.com
rl
dwide
M A G A Z I N E TM
FOR POLICE AND MILITARY WORKING DOG HANDLERS
DHS Announces “If You See Something, Say Something” Campaign Partnership with the National Hockey League. (2011). Retrieved from http:// www.dhs.gov/ynews/releases/20111229dhs-partnership-nhl.shtm 2 Resnick, S. (2011). Is DHS’s ‘If you see something, say something’ campaign helpful or burdensome? Retrieved from http://newmexicoindependent. com/68938/is-dhs%E2%80%99s%E2%80%98if-you-see-something-saysomething%E2%80%99-campaignhelpful-or-burdensome on January 2012. 3 Sullivan, E. Firefighters Taking New 1
The LARGEST and MOST READ Law Enforcement K-9 magazine in the world
1 Year (6 issues)
ONLY $29.95 SUBSCRIBE TODAY!
SUBSCRIPTIONS available to EVERYONE
270.534.0500 info@k9copmagazine.com www.k9copmagazine.com Circle 279 on Reader Service Card
The Counter Terrorist ~ June/July 2012 51
Circle 273 on Reader Service Card
We are not the Best because we are the oldest… We are the oldest because we ARE the Best!
America’s Top EP Training School Featuring the world renowned 7-Day Providing Executive Protection Program Established in 1978 by Dr. Richard W. Kobetz Over 100 hours with 20 plus instructors 5-Day LEO Dignitary Protection Program Other Specialized and Custom Training Courses Perfect for Military, Government, Police and Private Security Protective Services
Role as Anti-Terrorist Eyes of the US Government. Retrieved from http:// www.emsvillage.com/articles/article. cfm?id=2276 on March 2012. 4 Suburban Emergency Management Project. (2009) What is the Fire Service Intelligence Enterprise?” Retrieved from http://www.semp.us/publications/biot_ reader.php?BiotID=652 on March 2012 5 Ibid. 6 Kohn, D. (2009). Coumbine: Were There Warning Signs? Retrieved from http://www.cbsnews.com/21003475_162-286163.html on March 2012 7 Reynolds, P. (2006). Missed chances but nobody blamed. Retrieved from http://news.bbc.co.uk/2/hi/uk_ news/4763097.stm on March 2012. 8 Ibid. 9 Esposito, R. and Ross, B. (2009). Investigators: Northwest Bomb Plot Planned by al Qaeda in Yemen. Retrieved from http://abcnews.go.com/Blotter/ al-qaeda-yemen-planned-northwest-flight253-bomb-plot/story?id=9426085#. T2KW8MyghFV on December 2011. 10 BBC. (2007). Profile: Mohammad Sidique Khan. Retrieved from http://news. bbc.co.uk/2/hi/uk_news/4762209.stm 11 Nichols, M. (2010). NY street vendors praised for spotting car bomb. Retrieved from http://www.reuters.com/ article/2010/05/03/us-timessquarevendors-idUSTRE64209V20100503 on December 2011. 12 BBC. Police avert car bomb ‘carnage’ (2007). Retrieved from http://news.bbc. co.uk/2/hi/6252276.stm on December 2011. 13 Hollywood, John S. & Strom, Kevin J. (May 2011) Can you help stop terror plots? Retrieved on December 30, 2011 from http://www.cnn.com/2011/ OPINION/05/10/hollywood.strom. terrorism/
www.personalprotection.com 16 Penn Plaza Suite 1570, New York, NY, 10001 (212)268.4555 info@personalprotection.com
52 The Counter Terrorist ~ June/July 2012
Circle 281 on Reader Service Card
Circle 323 on Reader Service Card
The Counter Terrorist ~ June/July 2012 53
Intelligence for Terror By Tom Nypaver
In February 2012 Azerbaijani authorities arrested 22 spies, bombings rocked New Delhi and Bangkok, and a foiled plot was discovered in Tbilisi, Georgia. Iranian agents are suspected to have been involved in each incident.
M
ost press reports point to suspicions that these are the actions of the Iranian Revolutionary Guards Corps (IRGC) or Hezbollah, but there is likely another Iranian agency that is also very much involved in these events—the Vezarat-e Ettela’at va Amniat-e Keshvar (VEVAK). VEVAK is Iran’s Ministry of Intelligence and Security (MOIS) and it has been a key agency supporting the Iranian regime for the last three decades.
VEVAK’S Creation Intelligence efforts in the early years of the regime were lacking in organization and oversight. The deficiency soon became apparent. Following a bombing attack against the Islamic Republic of Iran’s Ministry of Telecommunications on October 1, 1982, Prime Minister Mir Hussein Moussavi called for a quick solution to fill the intelligence gaps through a bill that would create a single intelligence agency in Iran.1 Parliament
In Iran, VEVAK uses IRGC, Iranian army bases and bases disguised to look like normal cities to train non-Iranian agents.
Counter The
54 The Counter Terrorist ~ June/July 2012
Iranian Flag. Photo: Farzaaaad2000
The Counter Terrorist ~ June/July 2012 55
created the organization as a ministry so that it would be under the supervision of the prime minister, president, and parliament, reportedly in hopes that this broad oversight would prevent VEVAK from becoming excessively powerful like the shah’s Sāzemān-e Ettelā’āt va Amniyat-e Keshvar (SAVAK)—National Intelligence and Security Organization had been.2 Thus, VEVAK was born on September 1, 1983, with broad latitude and the charge of “gathering, procurement, analysis, and classification of necessary information inside and outside the country.”3 VEVAK’s activities, however, would exceed this charter and come to include propaganda murder, kidnapping, torture, and terrorist attacks.
VEVAK Operations VEVAK’s methodology can be described in simple tactical terms as: find, fix, finish, and exploit. VEVAK acts as the primary agency for the find, fix, and exploit phases, but it often outsources the finish phase to agents, proxies, the IRGC, or the Qods (Jerusalem) Force. According to Jane’s Intelligence Review, “The Ministry of Intelligence and Security (MOIS) plays the lead role in organizing and conducting terrorist operations abroad.”4 In Iran, VEVAK uses IRGC, Iranian army bases and bases disguised to look like normal cities to train non-Iranian agents.5 Iran also trains surrogates in foreign camps. These surrogates use assassination, kidnapping, and bombings to finish VEVAK targets. The most infamous of these forces is the Lebanese shiite militia Hezbollah. Through Hezbollah, VEVAK is able to influence and control other terrorist groups, such as Hamas and Palestinian Islamic Jihad.6 The ministry also conducts extensive propaganda activities to exploit perceptions of its operations inside Iran and around the world.
iSO Brothers in arms ad
Dissident Operations
David Belfield (aka Daoud Salahuddin) assassinated an Iranian diplomat in Bethesda, Maryland. Belfield was employed as a security guard at the Iranian interest section of the Algerian Embassy in Washington, DC, shown above. Photo: AgnosticPreachersKid 56 The Counter Terrorist ~ June/July 2012
Iran did not wait for the formation of VEVAK to begin killing its enemies. In December 1979 Iranian agents murdered a relative of the shah in Paris.7 In July 1980 David Belfield (aka Daoud Salahuddin) assassinated an Iranian diplomat in Bethesda, Maryland. Belfield was employed as a security guard at the Iranian interest section of the Algerian Embassy in Washington, DC, but later fled to Iran.8 Also in July 1980 an Iranian-financed hit man attempted to assassinate former prime minister Shapour Baktiar in Paris.9 The formation of VEVAK would formalize and organize Iranian efforts to eliminate dissidents.
Circle 105 on Reader Service Card
Circle 107 on Reader Service Card Circle 257 on Reader Service Card
The Counter Terrorist ~ June/July 2012 57
From left, Prime Minister Ayad Allawi, Ambassador L. Paul Bremer, and President Sheikh Ghazi Ajil al-Yawar make their farewells after a ceremony celebrating the transfer of full governmental authority to the Iraqi Interim Government in Baghdad, Iraq, 2004. Photo: U.S. Navy
Journalist Ed Blanche references a leaked US intelligence report that indicated Iran contracted Iraqi militias to kill Ambassador L. Paul Bremer in 2003
Iranian defector Reza Khalili10 provides insight to this process: “Rasool has been sent to London from MOIS as an agent to infiltrate the opposition groups. His duties are to identify group leaders, sympathizers, and individuals connected to them who travel in and out of Iran. This information is used by MOIS to arrest members and sympathizers upon their arrival in Iran and to assassinate opposition leaders abroad.”11 Journalist and author Ronen Bergman provides an anecdote about one VEVAK officer who ran such operations. Farhad Abdulgasem Mesbahi was VEVAK head of the France station in 1983. Mossad regarded Mesbahi as an excellent operative and gave him the code name Gladiator. “Mossad and DGSE [French Intelligence] learned
that Mesbahi’s activities were part of a major scheme to eliminate figures in the Iranian opposition.” Mesbadi had also commanded the 1979 Paris murder mentioned. France quickly declared Mesbahi persona non grata, and Mesbahi moved to Vienna and then to Brussels. In 1989 VEVAK minister Ali Fallahian appointed Mesbahi as the deputy head of station in Bonn, Germany, to act as a back channel to the Germans. The Germans recruited Mesbahi who “provided them with enormous amounts of information about Iran’s intelligence and terror networks in Europe, and especially Germany.”12 The murders of Darioush and Parnaveh Forouhar in Tehran in November 1998 (critics of the Islamist government) began a series of killings within Iran. Kahlili recalls, “In what became known
Patrol, SWAT, CNT, TEMS, EOD... NTOA is where you belong! memBer Benefits › Training › Conferences › The Tactical
Edge › Resource Library › Research › Members-only Website › Grants › Scholarships › PCIR/Less-Lethal Database › Networking › Member Tested Program
2012 conferences Tactical Operations Conference and trade show
Crisis Negotiations Conference
September 9-14, 2012 • Seattle, Wa
OctOber 23-26, 2012 • meSa, aZ
National Tactical Officers Association PO Box 797, Doylestown, PA 18901 | 800-279-9127
emBer B ec o m e a m .o rg a at w w w .n t o
Circle 222 on Reader Service Card
58 The Counter Terrorist ~ June/July 2012
The Counter Terrorist ~ June/July 2012 59
as the ‘chain murders of dissidents,’ MOIS agents stepped up their killing spree, murdering dozens of dissident intellectuals, journalists, poets, writers, and political activists.”13 The Iran Human Rights Documentation Center summarizes the campaign: “From 1979 [to 1999], high-level officials within the Islamic Republic of Iran, particularly those within the Revolutionary Guards and the Ministry of Intelligence, have been linked to at least 162 extrajudicial killings of the regime’s political opponents around the globe.”14 With protection of the regime as the primary goal, VEVAK operations against dissidents became a key tactic to achieve that strategic end.
Assassinations and Kidnappings The Iranian regime demonstrated its willingness to kidnap foreign citizens during the Lebanon hostage crisis. Imad Mugniyah commanded Iran’s proxy militia, Hezbollah, in carrying out some of Iran’s dirty work. Bergman notes, “Between late 1982 and June 1986, the peak period for Hizballah’s hostage operations, ninety-six foreign citizens were abducted in Lebanon.”15 Iraniandirected hostage taking has declined, but has not gone away. This was seen in Bosnia in 1995. John R. Schindler, professor of national security affairs at the US Naval War College in Newport, Rhode Island, recalls, “The [CIA’s Chief of Station, Sarajevo] learned that his VEVAK opposite number was planning an operation to kidnap, torture, and kill him.”16 Iran employed this tactic in Iraq as well. Journalist Ed Blanche references a leaked US intelligence report that indicated Iran contracted Iraqi militias to kill Ambassador L. Paul Bremer in 2003.17 The most recent example occurred on March 8, 2007, when former
FBI agent Robert Levinson disappeared on Kish Island in Iran. According to former CIA officer Robert Baer, “The FBI’s best guess is that a rogue element of Iran’s intelligence service grabbed him.”18 If this was, indeed, a “rogue” element, this may indicate that VEVAK is an adversary that is even more dangerous because it operates on unsanctioned initiative. Fred Burton, former deputy chief of the counter-terrorism division of the Diplomatic Security Service, assessed: “There is a possibility Levinson was abducted or even killed by a criminal syndicate… However, due to Levinson’s profile, he obviously was under tight MOIS surveillance... Even on the off chance Levinson did fall victim to a criminal plot, the MOIS would have witnessed it. In that case, the Iranian government would have no motive to deny any knowledge of Levinson”.19 These accounts indicate that VEVAK is at least complicit in the abduction by either employing or turning a blind eye to surrogates or criminals. There is little doubt that VEVAK has and will continue to view kidnapping and assassination as among its key tasks.
Hezbollah Iran has long denied its connection to Hezbollah while openly showing support for the terrorist organization through its rhetoric. Because of the volume of Hezbollah activities, Iran and VEVAK have been unable to cover their tracks. Former FBI director Louis Freeh asserted, “Although the Hezbollah is based in Lebanon, it takes its orders and draws finances and logistic support from Tehran, particularly Iran’s two security services, the Islamic Revolutionary Guards Corps (IRGC) and the Intelligence and Security Ministry (MOIS).”20 Hezbollah operations
A grave digger at a cemetery in Sarajevo, 1992. Photo: Mikhail Evstafiev supported by VEVAK include: • Hostage taking in Beirut and Lebanon throughout the 1980s21 • The 1983 bombings of the US Embassy and Marine barracks in Beirut22 • The 1992 bombing of the Israeli Embassy in Argentina, and the 1994 bombing of the Argentine Hebrew Mutual Association (AMIA) in Argentina23 • The 1996 bombing of Khobar Towers in Saudi Arabia24 • The 2007 plot to bomb the Israeli Embassy and Russian radar station in Azerbaijan25
Bosnian Muslims The Bosnian War of 1992–1995 captivated the world. Supporters from
all sides rushed to the aid of Bosnian Muslims to protect them from the Croats and Serbs. Iran did not miss its chance to provide arms and paramilitary support to the Bosnians. Author Kenneth Timmerman adds, “The Iranian intelligence service ‘[VEVAK]’ ran wild through the area developing intelligence networks, setting up terrorist support systems, recruiting terrorist ‘sleeper’ agents and agents of influence, and insinuating itself with the Bosnian leadership to a remarkable degree.”26 Bosnia became a rallying point for mujahideen from across the Muslim world. Iran embraced them all, but also focused on setting up a Bosnian intelligence apparatus in VEVAK’s image.
Bosnia became a rallying point for mujahideen from across the Muslim world. Iran embraced them all, but also focused on setting up a Bosnian intelligence apparatus in VEVAK’s image.
Circle 349 on Reader Service Card
60 The Counter Terrorist ~ June/July 2012
The Counter Terrorist ~ June/July 2012 61
Schindler observes, “While Sarajevo’s secret police sent some officers to Iran for extended training, hundreds of mujahidin passed through VEVAK and Pasdaran courses held in Bosnia in the last year of the war.”27 VEVAK’s involvement in Bosnia enabled it to increase its intelligence networks in the Muslim world and to portray itself once more as the protector of Muslims everywhere.
Iraqi Militias
Iraqis demonstrate loudly outside the Karbala City Hall, protesting against the Karbala Police Force, who they believe are remanents of the old regime. 2008. Photo: James Gordon
Journalist Neil Mackay of the Scotland Herald cites British Ministry of Defense sources who assert that Iran passed false information on weapons of mass destruction through Iraqi exiles to convince the United States to go to war in Iraq. Mackay also reports that Iran conducts the following activities: • Transferring improvised explosive devices and explosively formed penetrators • Inciting sectarian violence • Surveillance and intelligence collection against coalition forces • Training of Iraqi insurgent militias • Providing safe haven and safe passage to insurgents • Providing logistics, funding, and official documentation28
get In. get around. gaIn control. IntroducIng a new standard In hIgh mobIlIty and maneuverabIlIty. Tactical Protector Vehicle from Oshkosh Defense creates a new strategic dimension for special operation missions. With a new standard in mobility, military-grade protection and capacity for up to nine officers, it enhances access, speed and safety in urban, rural and off-road high-risk situations. TM
find out more:
oshkosh-tacticalprotector.com CONTACT:
Program Director, Tactical Protector Vehicle™ 920.235.9150 marketing@defense.oshkoshcorp.com Financing is available for Tactical Protector Vehicle™ through Oshkosh Capital.
62 The Counter Terrorist ~ June/July 2012
Circle 174 on Reader Service Card
The Counter Terrorist ~ June/July 2012 63
© 2012 Oshkosh Corporation • Oshkosh and the Oshkosh logo are registered trademarks and Tactical Protector Vehicle is a trademark of Oshkosh Corporation, Oshkosh, WI, USA
Circle 50 on Reader Service Card
Other reports are harder to verify. A Baghdad newspaper claimed in 2007 that the city of Karballa was under VEVAK control.29 Journalist Michael Ledeen says that Iranians operating inside Iraq were from IRGC or Qods, but some also came from VEVAK. Their mission, says Ledeen, was to lead a variety of militias in the “second Lebanon.”30 Others accounts differ. Baer recalls, “’The Iranians aren’t crazy or naïve enough to send their own secret service agents [into Iraq], nor do they have to,’ one Shia politician in Basra told the independent International Crisis Group. ‘Thanks to the parties that used to be exiled in Iran and those that currently dominate the local government, they already have Iraqi accomplices on the ground.’”31 The debate over whether Iranian operatives were physically in Iraq largely depends on the definition of who is an Iranian—that is, how Iraqis who lived in exile in Iran should be counted. An
example can be seen at the highest level. Selig S. Harrison, scholar, journalist, and author, describes such an instance: “Soon after its 2003 invasion, the United States sponsored the creation of the National Intelligence Service, headed by a longtime anti-Saddam CIA ally, Mohammed Shahwani, a Sunni. Al-Maliki countered by installing an Iran-trained VEVAK protégé, Sheerwan al-Waeli, as head of the Ministry of National Security, and succeeded in replacing Shahwani with his own man in August 2009…. Al-Maliki, like many other Shiite political leaders of his generation, spent the Iran-Iraq War years (1980-1988) in exile in Iran and has longstanding ties with VEVAK.”32 It is difficult to determine the exact nature of VEVAK’s role in supporting Iraqi operations. Yet, there can be no question that VEVAK is involved in supporting Iraqi militias to some extent,
Bite Suit Helmet $74.95
Hand Protectors E-Collar Holsters
Controlling perceptions at home and abroad is a critical VEVAK mission. VEVAK propaganda efforts are vast and permeate all communications made by the regime. Through propaganda the ministry attempts to convince all audiences of the legitimacy and piety of the regime and to discredit any opposing views. Propaganda is used independently and in the exploit phase of any VEVAK operation. VEVAK disseminates its propaganda through unwitting proxies, forged documents, announcements and commercials on IRNA television, and via prisoner confessions. In an attempt to discredit dissident Iranian exiles, VEVAK conducts an aggressive campaign to spread disinformation through foreign academia and media, and through
Scan our QR code with your smart phone to view our online catalog.
VEVAK is a formidable opponent of Western governments, a fact officially recognized by Washington on February
2" Ball
available in black, coyote or multicam* with plastic buckles
with metal cobra buckles
$149.95
$199.95
*with attachments for MOLLE pouches and K-9 camera
Reconyx HyperFire security series cameras are designed for quick and easy deployment in areas where no power or communication lines exist. • Motion activated trigger as fast as 1/10th of a second. • 1080P High Definition color images by day, NoGlowTM Covert Infrared illumination by night. • Compact size (5.5” x 4.5” x 3”) aids in concealment. • On-board memory and power with a battery life of up to one year or 40,000 images.
German Shepherd
YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT 64 The Counter Terrorist ~ June/July 2012
Conclusion
$9.95
$69.95
Malinois
is especially fond of creating videotaped confessions spliced with images of other dissidents or historic Americans to implicate the accused: “There has been a pattern to the way such dissidents have been treated. Usually they’ve been quietly arrested. Then, weeks or months later, they are paraded on state-run television recanting their antistate activities, in detailed confessions that generally sound more invented than real.”37 In total, these activities amount to a sophisticated and enduring campaign by VEVAK to attempt to control perceptions of the regime. VEVAK takes every opportunity to inject each message with some measure of deception.
2.5" Ball
$11.95
Bite Suit
Muzzles
the British expelled Vahid Belourchi, the first secretary of the Iranian Embassy in London, who was the VEVAK officer behind the operation.”35 Other propaganda actions are directed at the people of Iran. VEVAK ministers Heydar Moslehi and Qolam-Hossein Mohseni-Ejei have taken a more active role in making public statements on IRNA that deny Iranian involvement and accuse the opposition. In February 2009 VEVAK produced a commercial featuring a computer-generated cartoon of Senator John McCain and billionaire activist George Soros.36 The ad alleged an American-Zionist conspiracy and encouraged the Iranian public to report all spies to VEVAK. Within Iran, the forced confession is VEVAK’s main propaganda tool used to control and eliminate dissidents internally. Elaine Sciolino, New York Times journalist and author, says VEVAK
3" Ball
$12.95
Special Operations Harness
$1,189.95
organizations, including Human Rights Watch, Amnesty International, the US Department of State, and the UN Human Rights commission.33 The Iran Focus website claims that MohammadReza Irvani, VEVAK deputy minister to Ali Yunesi, “scored a propaganda coup on May 18 [2005], when Human Rights Watch put out a 28-page report on alleged human rights violations by the [dissident terrorist group] MeK.”34 VEVAK has also conducted deception operations targeting Western governments. Schindler offers this case: “In the spring of 1994, the British Foreign Office discovered a letter, purportedly from Foreign Secretary Douglas Hurd, explaining that London’s Balkan policy was motivated by Islamophobia. It was a crude forgery, a clear case of what the KGB termed ‘active measures’ during the Cold War, and it had the mark of VEVAK. In late May,
Reward Balls with Tug Handles
[[
Follow us on
Propaganda
$39.95 ea
$39.95
Has cutouts so the buttons can still be worked while it’s holstered. Has 2¼" metal clip on back of holster so it can be worn on a 2" duty belt or clipped to a MOLLE tactical vest.
given its role as the “defender” of the shia and the Iranian Islamic regime.
Circle 277 on Reader Service Card
• Completely weatherproof housing designed for extreme duty usage. • General surveillance and license plate capture models available. No • Made in the U.S.A. Glow Covert Infrared
Visit www.reconyx.com for more information. Circle 303 on Reader Service Card
The Counter Terrorist ~ June/July 2012 65
16, 2012, when the US Department of the Treasury designated VEVAK as an organization that supports terrorism and human rights abuses.38 Its leadership has remained loyal to the authoritarian Islamic regime. Devotion and fanaticism permeate its ranks. VEVAK’s operatives should be considered well-trained, experienced, and dangerous adversaries. Although some of the proxies have botched recent attempts to finish targets, VEVAK personnel likely remain behind the scenes continuing to find, fix, and exploit. These operatives have demonstrated the ability to conduct operations throughout Asia, Europe, the Middle East, and the former Soviet states. In some of these regions, VEVAK can draw from a large pool of surrogate organizations to distance itself from terrorist acts.
•
About the Author Mr. Nypaver commanded U.S. Army Special Forces A-Teams (ODAs) on multiple international deployments. He is a National Guard captain and is currently a graduate student focusing on national security issues at the Bush School at Texas A&M University.
End Notes Iran Human Rights Documentation Center. 2008. “No Safe Haven: Iran’s Global Assassination Campaign.” http:// iranhrdc.org/httpdocs/English/pdfs/ Reports/No-Safe-Haven_May08.pdf (October 22, 2010). p. 9. 2 Ibid. 3 Ibid. See also: Kahana, Ephraim, & Muhammad Suwaed. 2009. Historical Dictionary of Middle Eastern Intelligence. Lanham, Md: Scarecrow Press. p. 125. 4 Venter, A. 2001. “Iran’s Increasingly Unconventional Arsenal.” Jane’s Islamic Affairs Analyst, April 1. Jane’s Online 1
(November 29, 2010). 5 Kahana. p. 131. 6 Calabresi, Massimo. 2000. “Terrorism: A Hidden Hand in the Breakdown of Peace.” Time Magazine, February 28. 7 Bergman, Ronen. 2008. The Secret War With Iran. New York: Free Press. p. 136. 8 Silverman, Ira. 2002. “An American Terrorist.” The New Yorker, August 5. http://www.newyorker.com/ archive/2002/08/05/020805fa_ fact?currentPage=1 (November 21, 2010). 9 Bergman. p. 136. 10 “Reza Kahlili” is a pseudonym used by an IRGC agent for the CIA who later defected. Khalili has changed the names of people and places in his book to protect his identity. Names of government officials have not been changed. 11 Kahlili, Reza. 2010. A Time to Betray: The Astonishing Double Life of a CIA Agent inside the Revolutionary Guards of Iran. New York: Threshold Editions. p. 226. 12 Bergman. p. 133-140. 13 Kahlili. p. 320. 14 Iran Human Rights Documentation Center. 2008. “No Safe Haven: Iran’s Global Assassination Campaign.” http:// iranhrdc.org/httpdocs/English/pdfs/ Reports/No-Safe-Haven_May08.pdf (October 22, 2010). 15 Bergman. p. 93. 16 Schindler, John R. 2007. Unholy Terror: Bosnia, Al-Qa’ida, and The Rise of Global Jihad. St. Paul, MN: Zenith Press. p. 241. 17 Blanche, Ed. 2007. “The Hidden Hand.” Middle East, (March 2007): 7-10. p. 10. 18 Baer, Robert. 2008. The Devil We Know: Dealing with the New Iranian Superpower. New York: Crown. p. 11. 19 Burton, Fred. 2007. “Iran: The Apparent Abduction of an Ex-FBI Agent.” Stratfor, April 25. Stratfor
Premium (November 27, 2010). 20 Freeh, Louis J. 2005. My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror. New York: St. Martin’s Press. p. 9. 21 Bergman. p. 106. 22 O’Reilly, Cary. 2009. “Iran Ordered to Pay $310 Million to U.S. Embassy Bombing Victim.” Bloomberg, October 16. See also: Brewer v. Iran. 2009. https://ecf.dcd.uscourts.gov/cgi-bin/ show_public_doc?2008cv0534-20. See also: Valore v. Iran. 2007. https://ecf. dcd.uscourts.gov/cgi-bin/show_public_ doc?2003cv1959-24 23 Schindler. p. 136-137. 24 Heiser v. Iran. 2006. https://ecf. dcd.uscourts.gov/cgi-bin/show_public_ doc?2000cv2329-133 25 Valiyev, Anar. 2009. “Alleged Iranian and Hezbollah Agents on Trial for Targeting Russian-Operated Radar Station in Azerbaijan.” Terrorism Monitor
Volume 7 Issue 20, July 9. http://www. jamestown.org (November 24, 2010). 26 Timmerman, Kenneth R. 2006. Countdown to Crisis: The Coming Nuclear Showdown with Iran. New York: Three Rivers Press. p. 138. 27 Schindler. p. 241. 28 Mackay, Neil. 2006. “Iran’s Spies.” Herald Scotland, December 23. http:// www.heraldscotland.com/iran-sspies-1.834461 (November 4, 2010). 29 Blanche, Ed. 2007. “The Hidden Hand.” Middle East, (March 2007): 7-10. p. 10 30 Ledeen, Michael A. 2007. The Iranian Time Bomb. New York: St. Martin’s Press. p. 119-123. 31 Baer. p. 90. 32 Harrison, Selig S. 2010. “Iraq, Iran and the United States.” Foreign Service Journal, March 2010. 33 Mackay. 34 Shakiba, Nader. 2005.
“Profile of Iran’s Master Terrorist: Mohammad-Reza Iravani (a.k.a. Amr-Hossein Taghavi).” http://www. iranfocus.com/en/?option=com_ content&task=view&id=2223 May 27. (October 22, 2010). 35 Schindler. p. 137. 36 Geraghty, Jim. 2008. “Iranian Intelligence Creates Coolest McCain Campaign Ad Ever.” National Review Online, February 12. (November 22, 2010). 37 Sciolino, Elaine. 2000. Persian Mirrors: The Elusive Face of Iran. New York: Free Press. p. 239-242. 38 U.S. Department of Treasury. 2012. “ Treasury Designates Iranian Ministry of Intelligence and Security for Human Rights Abuses and Support for Terrorism.” http://www.treasury.gov/ press-center/press-releases/Pages/tg1424. aspx
Circle 343 on Reader Service Card
66 The Counter Terrorist ~ June/July 2012
Circle 259 on Reader Service Card
The Counter Terrorist ~ June/July 2012 67
Innovative Products KERM-LOCK URA This mount is designed for the standard non railed hand guard on AR-15/M-4 style rifles. The KERM-LOCK attaches in seconds and provides a solid platform for attaching flashlights or other common rail mounted accessories. When used with a flashlight, the URA is configured to illuminate the front sight and the target down range. Many personnel are unable to modify their rifles due to agency policies, limiting vehicle racks, etc. This mount allows the attachment of an accessory during deployment and removal upon completion of the operation. www.836technologies.com
MK107 Diablo (7.62x39mm) This short barreled rifle (7”) was developed by Primary Weapons Systems (PWS) for use with close protection teams. It is as reliable as the AK47 that it was designed after and has been used in Iraq and Afghanistan. The Stainless Steel, Isonite QPQ treated 1:8 twist barrel provides excellent accuracy and barrel longevity. The product improvements made by PWS have increased reliability and performance. The MK1 series is available as a complete rifle or as a complete upper receiver. Whether you want the ability to resupply ammo off adversaries and the performance of 7.62x39mm or you simply want to train at a fraction of the cost, the Diablo is a great choice. www.primaryweaponsystems.com
Rapid Assault Plate Carrier (V-RAPC1)The Tacprogear Rapid Assault Plate Carrier was designed to provide maximum protection and agility for law enforcement, military and private security operators. Capable of holding a standard 10” x 12” ballistic plate in the smallest possible configuration, this lightweight durable 1000D nylon carrier has an internal pocket with ambidextrous zipper access from the left or right side. With front and back MOLLE, reinforced drag handle, padded shoulders, and adjustable shoulder and waist straps, the V-RAPC1 is built for comfort and durability. The V-RAPC1 is available in a universal size in Black, OD Green and Coyote Tan. www.tacprogear.com
HyperFire The RECONYX HyperFire motion activated security series cameras are designed for stand-alone surveillance in situations where no power or communication lines exist. Covert infrared illumination increases the cameras ability to remain undetected. The General Surveillance camera (model SC950) monitors people and activities, the License Plate Capture camera (model SM750) provides photo documentation of vehicle license plates day or night at speeds of up to 50mph. www.www.reconyx.com 68 The Counter Terrorist ~ June/July 2012
DSG Alpha Holster This holster is designed carry a weapon up to full size with a light concealed without compromising comfort. It is built for a close to the body, contoured fit and is available for most popular law enforcement and military handguns. The interchangeable belt loops can be repositioned for multiple cant angles as well as moved to the opposite side for inside the waistband carry. Alpha series Holsters will also be available for handguns that use the Streamlight TLR Series lights and the X300 weapon light from Surefire. www.dsgarms.com
OPMOD PVS-14 This generation III night vision monocular is available exclusively through Optics Planet. It comes as a package including an eye cup, head mount, demist and sacrificial shields, and other accessories. The OPMOD PVS-14 can be used as a handheld, head mounted or weapon mounted night vision device. This scope uses high performance commercial grade third generation intensifier tubes, with a minimum resolution rating of 64 LP/MM and has a built in infrared illuminator for use without ambient light. The monocular uses a single AA battery in its MIL-SPEC housing and is designed to be waterproof to 66 feet for one hour. www.opticsplanet.net The Counter Terrorist ~ June/July 2012 69
Counter
advertiser index
The
June/july 2012
Volume 5 • Number 3
Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, circle the appropriate reader service number (RSN) on the attached Reader Service Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.
Page 14 12 2 27 67 74 18 56 50 62 13 28 51 73 76 54 28 23 36 55 32 52 52 54 22 65 3 25 26 68 60 45 61 75 71 17 15 35 10 63 41 34 40 48 7 29 53 66 33 38 40 19 43 57 64 11 4 16 10
Ad/Company • website and/or email........................................................................................................ RSN Number 836 Technologies • www.836technologies.com................................................................................................................... 259 Adams Industries • www.adamsindustries.com................................................................................................................... 308 Ahura Scientific • www.thermoscientific.com/mil-chemid................................................................................................. 254 American Military University • www.amuonline.com/counter-terrorist............................................................................ 211 APCO • www.apco2012.org........................................................................................................................................... 317 Applied Research Associates, Inc. • www.ara.com/robotics.......................................................................................... 256 AWC Systems Technology • www.awcsilencers.com....................................................................................................... 261 California University of Pennsylvania • www.calu.edu................................................................................................ 263 Combined Systems Inc. • www.combinedsystems.com.................................................................................................... 319 Counter Terror Expo • www.counterterrorexpo.com/advert............................................................................................. 267 CRC Press • www.crcpress.com....................................................................................................................................... 331 Defense Group - CoBra Software • www.cobrafirstresponder.com................................................................................. 273 Defense Solutions Group - DSG Arms • www.dsgarms.com.......................................................................................... 275 Elite K9 • www.elitek9.com............................................................................................................................................. 279 Energizer • www.hardcasetactical.com............................................................................................................................ 209 Executive Protection Institute • www.personalprotection.com......................................................................................... 281 George Washington University • www.nearyou.gwu.edu/ssl........................................................................................ 321 Golight Inc • www.golight.com....................................................................................................................................... 285 Heat Armor • www.heat-armor.com............................................................................................................................... 175 Hydrosack • www.homelandsecurityssi.com.................................................................................................................... 323 Icor Technology • www.icortechnology.com.................................................................................................................... 81 IDGA Irregular Warfare Summit • www.irregularwarfaresummit.com............................................................................ 289 IDGA Border Management Summit • www.bordermanagementsummit.com/southwest.................................................... 291 Infrared, Inc. • www.infrared.com.................................................................................................................................. 177 ITT • www.einidine-recoil.com......................................................................................................................................... 295 K9 Cop Magazine • www.k9copmagazine.com.............................................................................................................. 277 Lenco Industries Inc. • www.swattrucks.com................................................................................................................... 13 Lind Electronics Inc. • www.lindelectronics.com............................................................................................................... 327 Mattracks • www.mattracks.com.................................................................................................................................... 297 Mid-Michigan Kennels Inc. • www.midmichigankennels.com.......................................................................................... 174 NFPA Conference & Expo • www.nfpa.org/conference.................................................................................................. 105 TSAC Conference • www.nsca-lift.org/TSAC2012........................................................................................................... 329 NTOA • www.ntoa.org................................................................................................................................................... 222 Oasys Technology • info@oasystechnology.com............................................................................................................. 334 Oshkosh Defense • www.oshkosh-tacticalprotector.com................................................................................................... 50 Patriot3 • www.patriot3.com.......................................................................................................................................... 301 Paratech • www.paratech-tactical.com............................................................................................................................ 333 PoliceOne • www.policeoneacademy.com....................................................................................................................... 335 PoliceTraining.net • www.policetraining.net................................................................................................................... 191 Precision Reflex • www.pri-mounts.com......................................................................................................................... 235 Recon Robotics • www.recon-scout.com/XT.................................................................................................................... 337 Reconyx • www.reconyx.com......................................................................................................................................... 303 RM Equipment • www.m203grip.com............................................................................................................................ 207 RONCO Consulting • www.roncoconsulting.com............................................................................................................. 324 Ruger • www.ruger.com/million...................................................................................................................................... 347 Seabotix • www.seabotix.com........................................................................................................................................ 282 6th Annual National Homeland Security Conference • www.uasicolumbus2012.us...................................................... 265 Smi Cyber Defence 2012 • www.cyber-defence.com...................................................................................................... 339 Southeastern Solutions • www.sesolinc.com.................................................................................................................. 239 Southern Police Equipment • www.southernpoliceequipment.com................................................................................... 343 Southwest Synergistic Solutions • www.triagelights.com............................................................................................... 345 SSI Elevated Tactics Training • www.homelandsecurityssi.com........................................................................................ 313 SSI Portable Vehicle Barriers (PVB) • www.ssipvb.com................................................................................................. 226 STI International • catalog@stiguns.com......................................................................................................................... 241 Sun Badge Company • www.sunbadgeco.com............................................................................................................... 349 Tactical Products Group Inc. • www.tacprogear.com...................................................................................................... 101 Tex Shield Inc • info@tex-shield.com.............................................................................................................................. 29 Vidisco • www.vidisco.com............................................................................................................................................. 103 Zistos Corp • www.zistos.com........................................................................................................................................ 311
70 The Counter Terrorist ~ June/July 2012
Circle 301 on Reader Service Card
The Counter Terrorist ~ June/July 2012 71
Training Review
VATA Combat Carbine
By Greg Lapin
Photo courtesy of www.vatatrainingcenter.com
T
imes change and it is important that TTPs (Tactics, Techniques, and Procedures) evolve to meet new demands. For this reason, southern Louisiana based VATA Group met with one of the busiest federal SWAT teams (one of their members had just been shot during a warrant service) to provide
72 The Counter Terrorist ~ June/July 2012
them updated combat shooting training. This was important because it is always important to keep a fresh set of eyeballs looking for training scars. Class began with an in-depth safety brief because reinforcing the four cardinal rules prevents negligent discharges and complacency. Students were encouraged to train like they intend to fight. They were encouraged not to get lazy
or sloppy, and perform every function as though their life and the life of their buddy depends on it. A brief review of the basics reveals that everyone, no matter how good, has training scars and room for improvement. Over time, human beings tend to become lax on the details and finer points of shooting. As just one example, it was explained to students that they shouldn’t just stack their thumbs
high, but drive their support thumb and manage recoil to the best of their ability to compress reset time between shots. Once the shooters got dialed in with Combat Fundamental Details, instructors took them through Non-Standard Response drills (NSRs), Vertical Track drills, and Zipper drills. The human body is an amazing system, and one never really knows how it’s going to react to trauma. Primarily when training Law Enforcement (because they rarely have to worry about running out of ammo) we say, “get yourselves out of the mindset of the controlled and hammer pairs.” Take the guess work out of it and “shoot them as many times as they need to be shot, as fast as the situation and your skill level allow.” We also talked about something we call the “Kill Corridor.” This simply refers to a narrow corridor of high value targets that runs up the body, from the pelvic girdle to the brain “box”. The guys were shooting faster, driving their rifles, and getting good hits throughout the Kill Corridor and executing immediate transitions if and when their primaries went down. They were communicating with each other and tactical loading in between commands (of course, instructors insured that at some point rifles ran dry). We have all heard the valuable quote, “speed is fine, but accuracy is final.” Of course, the truth is, if you’re not fast enough, you won’t have to worry about accurate, because you’ll be dead. The shooting equation requires skill at both accuracy and speed. After a day of shooting, diagnosing shooting inefficiencies, self-critiquing, and pushing the limits, it was time to move on to gunfighter craft. Cruisers, units, g-rides—whatever you want to call them—are NOT good cover, but they are better than no cover at all. So if that’s all you’ve got, then you better be familiar with how to use them. You don’t want to
find yourself in an uncomfortable position for the first time in a gunfight. We talked about the realities of cover, concealment, and the seriousness of limiting the exposure of your own body. We went through body position, optical offset, and trajectory when you can’t employ your rifle conventionally. We set up multiple stations. The first station was a simple standing barricade/cover that illustrated that if you have distance on the subject and have the ability to penetrate past the plane of the cover a little, then you can reverse your support hand and C-clamp the hand guard to really stabilize the rifle and improve your ability to get fast, accurate shots on target. When transitioning to your support side, rather than moving the entire rifle over to your support shoulder and switching your fire control hand, you can maintain your normal grip on the rifle and simply shift it over to your support shoulder. Students performed the same task from the kneeling position, both conventional and “the Monica”, utilizing the C-clamp. From there they moved on to a vehicle, where we showed them the standard Urban Prone and the Fetal Prone, explaining the differences in positions and why and where they might use them. In the prone positions the shooters realized that even though they are pretty awkward and uncomfortable, you can get accurate, fast hits while drastically limiting your exposure. They were working out certain gear issues and realizing that some of their government-purchased kit (and placement of that kit) was not optimal. Once they finished getting brass burns on their arms, they moved to another vehicle. At this station they utilized the Junkyard squat over the hood. They developed comfort rotating the rifle a full 90 degrees to maximize their cover and get their heads low, and they realized that if they shot their own vehicle, 1) it
would be some embarrassing paperwork and 2) their rounds were not hitting their intended target. I always ask, “What is the best way to get someone to stop shooting at you?” and someone always responds with, “Shoot back.” I like to clarify and say, “Shoot them.” The junkyard position was covered from both backed away from the vehicle to make sure incoming rounds were deflected off the hood area well above their heads and from close up, using it for support, which simulated that they had an enemy in an elevated position. We finished up the course and sat down with the shooters for a debrief— what worked, what didn’t, why, and how they can tweak things to make it easier. The gun fighter ethos, was talked about and we all shared some stories with each other. The shooters were all 40+ years old and in good shape. They were all quiet professionals who were eager to learn and progress in their chosen field. www.vatatrainingcenter.com
•
About the Author Mr. Lapin is a former New Orleans Police Department Criminal Intelligence Bureau detective. He has deployed to numerous high-threat regions to conduct security operations on behalf of the US government and provides international anti-piracy services. He has trained personnel from federal, state and local agencies and is a principal of VATA group.
The Counter Terrorist ~ June/July 2012 73
Circle 334 on Reader Service Card
74 Terrorist ~ June/July 2012 CircleThe 256Counter on Reader Service Card
The Counter Terrorist ~ June/July 2012 75
76 The Counter Terrorist ~ June/July 2012
Circle 209 on Reader Service Card