The Counter Terrorist Magazine April / May 2018

Page 1

BIOLOGICAL ATTACKS, SELF TRAINING RANGE DRILLS, HOW ACCOUNTANTS CAN HELP FIGHT TERRORISM

Journal for Law Enforcement, Intelligence & Special Operations Professionals

APRIL/MAY 2018

VOLUME 11 • NUMBER 2

BREACHED IN APRIL

INTERNATIONAL

EDITION An SSI Publication ®

APRIL/MAY 2018 USA/CANADA $5.99

thecounterterroristmag.com


A NEW BREED OF BARRETT. At Barrett, we’ve set the industry standard for precision and performance. Now, that bar has been raised. Our MRAD is the most accurate rifle in the world. The Multi-Role Adaptive Design surpasses all expectations of a long-range rifle. It is held to the most stringent testing standards

fully adjustable, user-accessible, match-grade trigger module. The thumb-operated safety can be configured for left- or right-hand operation; the ambidextrous magazine release can be used intuitively while retaining a firing grip and cheek weld. IN YOUR HANDS. AT YOUR COMMAND.

A LIGHTWEIGHT BUILD, NOT TO

THE BULLET POINTS:

BE TAKEN LIGHTLY. • Mil-Spec Type 2, Class 3 Hardcoat

The available lightweight carbon

anodized available in Cerakote™

fiber-wrapped barrel does not

MRB, Black, Flat Dark Earth, OD

build up heat, lessening the point of impact shift over a long string

Green and Tungsten Grey • Match-grade barrels available in fluted and heavy in multiple

of fire. Made of a temperatureresistant polymer, the adjustable cheek piece also offers a

lengths • High-efficiency muzzle brake • Generously sized magazine well

consistent rifle-to-user

for quick reloads

and outperforms the competition. Inspired by our design of Every single time. Fielded by the Model 98B, the MRAD exceeds any several allied governments, the expectation of MRAD is as hardworking as the a precision one who holds it. rifle. After ACCURATE AND ADAPTABLE FOR years of ANY TARGET, EVERY TIME. perfecting research, we Every detail of the MRAD has hit the target with been carefully designed to create unfailing accuracy and one thing: a unprecedented adaptability. high-performance rifle you The MRAD has a folding stock, an

9 o’clock positions. The MRAD

- 388 Lapua Magnum

can truly make your own.

foldable stock provides compact

- 300 Winchester Magnum

mobility and swift configuration.

- 308 Winchester

During transport, the stock folds

- 260 Remington

and locks onto the bolt handle

- 6.5 Creedmoor

Available in multiple calibers

adjustable length of pull, and an extended rail for range of scope.

and configurations, the precisiongrade barrel can be removed by simply loosening

With its user-changeable barrel system, the power is truly in your hands.

contact point. Integrated into the MRAD rifle’s 7000 series aluminum upper receiver is a 21.75-inch M1913 rail with a 20 MOA taper. The upper receiver is drilled and tapped for any of your accessory rails to be mounted at the 3, 6 and

maintaining the same rifle.

• 10-round, polymer magazine • Oversized trigger guard for operation with gloved hands • Fully adjustable trigger module can be removed without tools • Accepts most standard M4/M16 pistol grips • Recoil absorbent Sorbathane® pad • Available calibers: - 338 Norma - 300 Norma - 7mm Remington Magnum

Visit BARRETT.NET/ FIREARMS/MRAD for more.

two bolts. The MRAD boasts our

*Rifle shown with optional accessories. Circle 121 on Reader Service Card

2 The Counter Terrorist ~ April/May 2018

PERFORM | NEVER PRETEND™


Circle 241 on Reader Service Card

Circle 277 on Reader Service Card

The Counter Terrorist ~ April/May 2018 3


SLIM-TUK

®

by DeSantis

WE DIDN’T INVENT CONCEALMENT, WE JUST PERFECTED IT!

MSRP $39.99 MADE IN THE U.S.A.

WWW.DESANTISHOLSTER.COM 4 The Counter Terrorist ~ April/May 2018

Circle 241 on Reader Service Card


Counter CONTENTS

The Journal for Law Enforcement, Intelligence & Special Operations Professionals

22

8

30

APRIL/MAY 2018

VOLUME 11 • NUMBER 2

COVER STORY: 22

BREACHED IN APRIL by Garret Machine

FEATURES:

8

EXPLORING THE ENEMY’S MODUS OPERANDI: A CASE STUDY ON HOW TO IDENTIFY A BIOLOGICAL ATTACK IN THE MAKING by Gus Michalik

30

HOW TO TRAIN YOURSELF: RANGE DRILLS by Editorial Staff

34

WHERE ARE MEYER LANSKY AND LUCKY LUCIANO WHEN YOU NEED THEM? HOW ACCOUNTANTS CAN HELP FIGHT THE WAR AGAINST TERRORISM by Karen Maguire

DEPARTMENTS: 06

From the Editor

40

Innovative Products

42

Book Review

44

Product Review

If it is debatable, then it is not a solution. If it is a solution, then is actionable A Homeland Security Degree with a Public Health Preparedness Option, FLIR Ultra-Portable Explosives Trace Detector Fido X2 Rich Dad, Poor Dad by Robert T. Kiyosaki The Glock Training Pistol for Defensive Tactics

Cover Photo:

Neil Cohen, IDF Spokesperson’s Film Unit

26 34

The Counter Terrorist ~ April/May 2018 5


If it is debatable, then it is not a solution. If it is a solution, then is actionable. by Garret Machine

M

Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 11 • NUMBER 2 APRIL/ MAY 2018

any people are calling for bans on certain weapons in the wake of the recent school shooting in South Florida. (In this case, the shooting occurred about 30 minutes from our headquarters, and our staff even knew some of the personnel who responded.) Some people want to ban the AR-15 altogether, whereas others want to limit magazine capacity, restrict ammo purchasing, and/or tighten age restrictions. In a recent news video that went viral in the wake of the shooting, a 13-year-old actor is paid to try to buy beer, lotto tickets, and cigarettes from a few different stores. In the candid camera clip, he is turned down each time. Some clerks ask for ID, and some laugh at him. In the final scene, he is at what looks like a gun show, where he successfully buys an old wooden rifle from a 70-year-old man. You get where this is going. As usual, the tabloid media has produced propaganda in an attempt to manipulate the ignorant. Peer-to-peer sale is legal and unregulated however, under federal law, it is a felony to sell any firearm to a person under age 18 (or to any person who falls in one of nine other prohibited categories). Buying a firearm from a private seller is equivalent to buying beer, lotto tickets, or cigarettes from a homeless guy in a back alley. Thus, in the news video, the old-timer was tricked into committing a felony—unless, of course, the old rifle was a replica or otherwise inert or a BB gun. Gun control is a debatable and divisive topic. Therefore, it is not a solution. The extreme right will not give an inch, and the extreme left are so uneducated on the topic that they cannot have an informed conversation. You know what’s not debatable? Security. Everyone wants to have safe and secure schools, just like they want safe and secure homes, business, and critical infrastructure. Making a school safer is something everyone can get behind; it is immediate and relatively simple to do. This is my profession: making places safer through design and implementation of physical measures and protocols. Some schools operate as an open campus, meaning anyone who wants to can enter by foot or vehicle. Other schools are well protected and operate a closed campus with a single point of entry (by foot or by vehicle) at which all individuals undergo a security check. I believe all schools (like businesses, your home etc) should operate a closed campus, thereby giving access to only the eligible. Arming school staff has been proposed as a potential solution, but consider the fact that four Broward County Sheriff’s deputies failed to make contact with the shooter when given the opportunity. They were afraid—not prepared mentally or physically—and brought disgrace. Would a faculty member be better equipped to respond in such a situation? I don’t know. I do know, however, that many private schools in South Florida have in-house armed guards who are former military. These guards work for the school, are paid well, treat the campus like their own home, and view an attack on the school as an attack on their family. Are they a better option than police officers? In this case, yes. These guards have buy-in, are emotionally invested in the cause, are regularly trained, and are empowered with the tools and authority to act in the best interest of the kids. Peterson (BSO School Resource Officer at the time of the incedent) was paid a $101,000 salary in 2017 and had been milking taxpayers for 30 years. (Yes, you heard that right.) After 30 years on the job, he was way past his prime to be working the streets and should have been in an executive position actually earning that $101,000. This shows evidence of complacency and high year tenure. He and other “armed professionals” failed to close distance with the shooter. They allowed the enemy to control the fight by ducking for cover and failing to engage. Ironically it was later discovered that officers from an unaffiliated PD were reprimanded when they did make entry. The bottom line is that we will always debate gun control, irrespective of school security. In the meantime, schools, houses of worship, and other institutions will remain unsafe. The solution is a cultural one—on two fronts. First, police need to stop avoiding conflict and instead move toward it. Police cannot do their job if they are constantly afraid of being videotaped, sued, fired, and accused of racism and sexual harassment. They must be warriors first, not social workers. Second, soft targets need to get hard. This is a common-sense, immediate solution everyone can get behind—and it may not be that expensive after all. Consider the measures that could have been put in place if the last 10 years of Peterson’s salary had been applied to target hardening rather than making Peterson a millionaire. Garret Machine Editor, The Counter Terrorist 6 The Counter Terrorist ~ April/May 2018

Counter The

FROM THE EDITOR:

Editor Garret Machine Director of Operations Carmen Arnaes Director of Advertizing Sol Bradman Administrative Jennifer Junatas Contributing Editors Gus Michalik Karen Maguire Graphic Design Morrison Creative Company Copy Editor Laura Town Advertising Sales Sol Bradman bradman@homelandsecurityssi.com 305-302-2790 Publisher: Security Solutions International 13155 SW 134th St. • STE 103 Miami, Florida 33186 ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 103, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 eZine issues of the magazine is $19.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: Security Solutions International at villegas@homelandsecurityssi.com or call 786-573-3999 Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com © 2017 Security Solutions International


Circle 301 on Reader Service Card

Circle~301 on Reader2018 Service 7 Card The Counter Terrorist April/May


EXPLORING THE ENEMY’S MODUS OPERANDI:

A CASE STUDY ON HOW TO IDENTIFY A BIOLOGICAL ATTACK IN THE MAKING In this case study, we will explore the possibility of mounting a terror attack as if we were a transnational terrorist. We will also explore the motives and objectives of the transnational terrorist and how the terrorist will acquire weapons of mass destruction.

U.S. Marine, Chemical Biological Radiological Nuclear Photo by: Pfc. Brian Bekkala

8 The Counter Terrorist ~ April/May 2018


By Gus Michalik

I

n the exercise, we will use both chemical and biological weapons of mass destruction. In particular, we will target hospitals with a chemical weapon that has a biological marker. We will also use an infectious disease agent against the general population and infect them prior to the attack on the hospitals, taking into consideration the agent’s incubation period. Finally, we will discuss the final outcomes of the operation.

BIOLOGICAL AGENTS AS WEAPONS OF MASS DESTRUCTION For purposes of this case study, we will use the definition of weapons of mass destruction developed by the Commission for Conventional Armaments in 1948. At that time, the Commission “defined weapons of mass destruction as including, besides atomic explosive weapons, radioactive

material weapons, lethal chemical and biological weapons, and any weapons developed in the future with comparable destructive effects.” Per this description, weapons of mass destruction include devices used to carry out biological terrorism, also known as bioterrorism. Bioterrorism is defined as “the use of microorganisms or toxins derived from living organisms to produce death, disease, or toxicity in humans, animals, or plants.” There are several advantages to

The Counter Terrorist ~ April/May 2018 9


using biological agents as weapons of mass destruction. Generally speaking, a biological weapon is inexpensive and easy to procure. This type of weapon could be hidden in legitimate medical research. Most biological weapons are odorless, tasteless, and have an incubation period that makes them difficult to detect at first, which means an immediate response would not be triggered. Biological agents can be extremely toxic and can also expand to cover a large area, which may cause a very high casualty rate. Not all biological agents are created the same, however. When picking a biological weapon for our scenario, we need to review the properties of various agents, including those categorized as bacteria-based, virusbased, toxin-based, and “new” Category A bioweapons.

BACTERIA-BASED CATEGORY A BIOWEAPONS Prominent bacteria-based Category A bioweapons include anthrax, plague, tularemia, and botulinum toxin.

Lance Cpl. Michael F. Madriz, left, a chemical, biological, radiological and nuclear instructor with Marine Wing Headquarters Squadron 3 and a San Francisco native, and Cpl. William N. Pederson, right, seal a leak on a simulated trolley car aboard. Photo by: United States Marine Corps 10 The Counter Terrorist ~ April/May 2018

Anthrax (Bacillus anthracis). This aerobic, sporulating microorganism is a rod-shaped, gram-positive bacterium with a width of 1.0–1.2 µm and a length of 3.0–5.0 µm. Anthrax cannot be transmitted person to person. Its lethality is moderate to high with a normal incubation period of 3–7 days. (However, Russians have developed a strain that incubates up to 46 days.) Because anthrax is a spore, it is highly stable. The typical duration of illness is 3–5 days; symptoms appear in 2–3 days, with shock and death occurring within 24–36 hours after symptoms appear. A protective vaccine is available. Means of Delivery: Anthrax


can be delivered via aerosol, then inhaled by victims. This is the ideal terrorist delivery system, although the bacterium can also enter the body via ingestion or broken skin. Plague (Yersinia pestis). This organism is a rod-shaped, nonmobile, nonsporulating, gram-negative, aerobic bacterium with a width of 0.5–1.0 µm and a length of 1.0–2.0 µm. It can produce pneumonic, bubonic, or septicemic forms of plague. The death rate is 100% in nontreated persons. The incubation period is 2–6 days for bubonic plague and 2–4 days for pneumonic plague. The illness lasts 1–2 days, but its short duration is relatively unimportant given the high rate of transmission from person to person. Means of delivery: Vectors such as fleas or rodents can deliver the bubonic type. The pneumonic type may be transmitted via aerosol. Tularemia (Francisella tularensis). This is a small, aerobic, nonsporulating, nonmotile, gramnegative coccobacillus that is 0.2 µm wide and 0.2–0.7 µm long. There is no human-to-human transmission. Tularemia has a high to moderate mortality rate if untreated. The incubation period ranges from 1–10 days, and the duration of illness is 1–2 weeks or more. It is not very persistent or stable. A vaccine is available. The rate of action of 3–5 days. Method of delivery: Tularemia can be spread by vector, but the most effective delivery method is aerosol. Botulinum toxin. Any of several distinct neurotoxins produced by the bacillus Clostridium botulinum may be used as a bioweapon. These neurotoxins cannot be transmitted

from person to person. Botulinum toxin has a low to high lethality rate, and the incubation period varies from days to months. The duration of illness is usually 24–72 hours but can sometimes be months. A vaccine is available. The rate of action from 12–72 hours. Method of delivery: Botulinum toxin may be used to sabotage food or water supplies. It can also be delivered by aerosol.

VIRUS-BASED CATEGORY A BIOWEAPONS Hemorrhagic fevers (filovirus). Various filoviruses (e.g., Ebola virus, Marburg virus) can cause different types of hemorrhagic fever. These viruses transmit moderately from person to person, and they are relatively stable. Their lethality is very high, with an incubation period of 7–9 days. The duration of illness is 5–16 days. There are no vaccines. The rate of action is sudden, with immediate signs of infection. Method of delivery: Filovirus is usually transmitted via airborne spread. Smallpox (variola virus). Variola virus is a symmetric, brick-shaped DNA virus with rounded corners. It is highly infectious from person to person and lethal. The incubation period is 7–17 days, and the duration of illness is 1–2 weeks. The virus is very stable, and there is a vaccine available. The rate of action is 2–4 days. Method of delivery: Smallpox may be transmitted via airborne spread.

TOXIN-BASED CATEGORY A BIOWEAPONS Ricin. Ricin is a toxic protein extracted from castor beans. It is a chemical reagent that can be used as

a weapon. Even small amounts are deadly, with as little as 1 mg able to kill an adult. Method of delivery: Ricin may be delivered by aerosol or direct contact.

NEW CATEGORY A BIOWEAPONS Chimera-type weapons. These types of weapons mix whole bacteria and whole viruses. For example, one might combine the plague and smallpox with Ebola virus or Venezuelan equine encephalomyelitis (VEE) virus. Recombinant DNA. According to Dr. Igor Shafhid, the Russians have developed 58 new genetically engineered weapons, an example being “isolation of the gene for the lethal factor of Bacillus anthracis and introducing this gene into Escherichia coli, which is normally harmless.” The lethal factor protein is then activated in E. coli and displays the same deadly effects as it did in its native B. anthracis.

SELECTING A BIOLOGICAL WEAPON Based on the information above, I have determined that the easiest agent to acquire—and the one that spreads most adequately for this exercise—is the plague. This will be used as our primary agent; however, will also use ricin toxin as a secondary agent for our secondary attack.

CHEMICAL TERRORISM Chemical terrorism is, quite simply, terrorism using chemical agents. Chemical agents include poisonous gases, liquids, or solids that have toxic effects on people, animals, or plants. Most chemical agents are capable of causing serious injuries or death. The Counter Terrorist ~ April/May 2018 11


12 The Counter Terrorist ~ April/May 2018


The severity of injuries depends on the type and amount of the chemical agent used, and the duration of exposure. There are four main categories of lethal chemical agents: nerve agents, blistering agents, blood agents, and choking agents. Regardless of type, most chemical weapons are inexpensive, easy to manufacture, and easily hidden in legitimate chemical processing. Once dispersed, these agents can cover a large area with moderate to high casualty rates. One disadvantage of chemical weapons is that some of the precursor materials are monitored. The other potential disadvantage is that chemical weapons trigger an immediate response. After reviewing various chemical weapons, I decided to use the nerve agent sarin in this exercise. Sarin is easily manufactured, and the only controlled precursor with which it is associated is methylphosphonyl difluoride (DF). However, it is possible to manufacture sarin using precursors that are not restricted. Sarin is a colorless liquid that has almost no odor and is very stable when pure. It works rapidly (within 10 minutes of inhalation) and can be fatal at low concentrations. For example, 50% of individuals will die when exposed to a concentration of 10,000 milligram-minutes per cubic meter (mgmin/m3) by skin vapor, a concentration of 1,700 mg-min/m3 by liquid, or a concentration of 35 mg-min/m3 by inhalation. Sarin is therefore “20 times more deadly than cyanide, and even a tiny dose…can be deadly.” Sarin is heavier than air, which is to our advantage in this scenario, as it will remain closer to the ground and thus affect many people. After exposure to sarin, physiological suffocation can occur because lungs

“Regardless of type, most chemical weapons are inexpensive, easy to manufacture, and easily hidden in legitimate chemical processing.”

A Military Command of the Plateau executes a drill on 7/28/2016 in case of attacks during the 2016 Olympic Games in Brazil. At about 11PM the day before, extras who passed as terrorists announced that they were armed and that they had hostages. Subway security officers report to the Integrated Command and Control Center, which is responsible for triggering the responsible battalions that took over the station Photo by Andre Borges/ Brasilia Agency.

The Counter Terrorist ~ April/May 2018 13


Nurse Prapti Chishim helps some of the victims of acid attacks Photo by DFID- UK Department for International Development the cannot expand. Also, because sarin is a nerve agent, it prevents the body from hydrolyzing the neurotransmitter acetylcholine by breaking down enzyme acetyl-cholinesterase. This causes the nerves to fire constantly until death ocurs. Sarin is not only easy to make, but you can acquire all the ingredients without suspicion. In addition, you can use a unilateral dissemination system rather than a binary system, which is less likely to fail on delivery of the product. The chemicals and equipment required to produce and deliver the substance are fairly cheap.

TRANSNATIONAL TERRORISTS As previously mentioned, we will assume the role of transnational

14 The Counter Terrorist ~ April/May 2018

terrorist for purposes of this case study. “Transnational terrorists are mobile, having no fixed base or boundaries governing where they commit acts of terrorism. They are motivated by strong personal beliefs, ruthless, and independent, being free of government sponsorship.” Examples of transnational terrorists include AlQaeda and associated groups.

MOTIVATION “Transnational terrorists are motivated mostly by a strong personal or religious idea, rather than a broad, purely political motive.” Al-Qaeda, for instance, follows the doctrine of Wahhabism. Accordingly, members view attacks “as a form of worship conducted in God’s name and in accordance of God’s wishes; the

enemy is the infidel, and the opposing ideology is the Western culture. This motivation makes them the most dangerous group to the United States.”

OBJECTIVES Transnational terrorists want change, not compromise. In AlQaeda’s case, they want everyone to follow the Wahhabism interpretation of Islam. According to Charles T. Englehart, former head of Arab operations for the Central Intelligence Agency, Al-Qaeda wants the rest of the world to either convert to their extremist views of Islam or die. Al-Qaeda and Bin Laden have publicly proclaimed their goal is to kill 4 million Americans, and they say they have “religious approval for 10 million deaths.” The


organization’s two main objectives are to force religious change and to kill as many American as possible.

TARGETS The targets selected by transnational terrorists are usually areas where many people are present. Common examples include downtown areas, special events, transportation systems, government buildings, malls, theaters, military sites, and religious facilities. In this scenario, our primary target will be the general population of a city in the United States. In addition, to enhance the kill ratio and make it more difficult for anyone to receive medical treatment, our secondary target will be local hospitals— including medical staff, hospital employees, and patients. Hospitals are an icon of our way of life; they are a sign of civilization, technological advancement, knowledge, and twentyfirst century thinking. This makes them an ideal terrorist target.

STRATEGIES FOR MAXIMIZING HARM It is common knowledge that Al-Qaeda wants to kill as many Americans as they can. So, when planning our fictitious attack, we— like Al-Qaeda—will want the biggest bang for our buck. This is where we will look at previous studies and past practice to see what methods could be most successful. Let’s start with existing information about the plague. In 1970, the World Health Organization reported that, “in a worst-case scenario, if 50 kg of asbestos were released as an aerosol over a city of 5 million, pneumonic plague could occur in as many as 150,000 persons, 36,000 of whom would be expected to die. The plague

bacilli would remain viable as an aerosol for one hour for a distance of up to 10 kilometers or 6 miles.” But what about ricin? “Airborne and inhaled, ricin becomes exponentially more dangerous than if simply touching the skin. While there have been no studies on human beings; it was shown with rats that the airborne ricin actually binds to ciliated bronchial lining cells, alveolar macrophages, and alveolar lining cells within the lungs.” Also, “the World Health Organization… estimate[s] that an airplane release of 50 kilograms of anthrax over a 5 million [person] population would kill 250,000 to 100,000 people without treatment.” Based on these sources, a combined plague and ricin attack should result in an extremely big bang for our buck. Other terrorists, including Al-Qaeda, similarly analyze available data when determining what type of attacks they want to conduct.

THE PLAN In our fictitious scenario, we are going to run two operations. One is a covert operation, and the other is an overt operation.

THE COVERT OPERATION The first step in the covert operation is to assess the material needed to carry out the operation. Clearly, we are going to have to acquire one or more biological agents. Here, we decided to use plague because it spreads quickly from person to person, ricin because it is easy to make, and

PSYCHOLOGICAL CONSIDERATIONS According to Rohan Gunaratna, AlQaeda’s main agenda is to “politicize, mobilize, and radicalize Muslims worldwide.” Al-Qaeda is effective because it seeks to radicalize the community, not only existing members and supporters.” Therefore, we have to be careful not to put all Muslims in the same category. We have to make a distinction between Islamic (associated with Islam as a whole) and Islamist (associated with radicals). We also need to careful about using the term “Muslim world.” It’s a better idea to refer to individual countries rather than putting all Muslims together, because doing so only reinforces the terrorists’ belief that all Muslim nations must unite in an “us-versus-them” mindset.

Photo Pixabay sarin because it is easy to acquire the materials used to produce it. We have several options for obtaining the materials we need. For one, we could buy the agents for medical research. (As an example, in 1995, Larry Wayne Harris was arrested after purchasing three vials of plague from a lab in Maryland for supposed medical research purposes. ) We could also acquire the agents off the black market or steal them. (As an example: “February…brought news The Counter Terrorist ~ April/May 2018 15


“Obviously, our focus is on the protection of the public, but we don’t do body searches on people leaving the building.”

16 The Counter Terrorist ~ April/May 2018

of another potential threat to world health when two bubonic plague– infested rats went missing from the University of Medicine and Dentistry of New Jersey facility in Newark.” ) Theft is an appealing option because of the lack of security at many labs. Consider the words of Canada’s Chief Public Health Officer Dr. David Butler Jones after the biological agents Ebola and HIV disappeared from national labs in Winnipeg: “Obviously, our focus is on the protection of the public, but we don’t do body searches on people leaving the building.” In general, though, the easiest way to get access to biological agents is when the agent is in transport by mail from a supplier to a university. There are also foreign countries where bioagents—including some of the most dangerous weaponized agents—are not well protected and are relatively easy to access. An example is on Vozrozhdeniye Island, which is currently shared by Kazakhstan and Uzbekistan. At this location, the Soviet Union experimented with genetically engineered bioagents, some of which still remain. In contrast, the most difficult method is to start from scratch and get the agents right out of the environment. Next, we have to acquire the chemicals needed to make sarin gas. From my research, I learned that these ingredients—dimethyl methylphosphonate, phosphorus trichloride, sodium fluoride, and alcohol—are readily available online. In fact, reporters from both Scientific America (Musser, 2001) and the British Broadcasting Corporation (Stickler, 2003) were able to obtain all the chemicals necessary for the production of sarin through chemical supply companies. The recipe for sarin is also

readily available, both on the Internet and in books such as Silent Death, which can be purchased through online retailers including Amazon.com. So, now we have an idea of where we are going to acquire the materials and agents for our attack and the rate of growth of the agents to cause the maximum effect. Our next step is to run surveillance on shipping schedules of biological agents from suppliers to universities and from university to university. We will also run surveillance on the vulnerability of the local hospitals’ loading docks and the areas where they stage the mail for pickup and delivery to its target destination within each hospital. In addition, we will go to the worst streets in town and run surveillance on vagrant types of drug addicts to determine when they are most vulnerable to injection with the agent. For the chemical attack, our required equipment includes a “standard distilling kit with a variety of sizes of round-bottom flasks,” as well as “a magnetic stirrer–hotplate and a good source of vacuum, such as a properly working aspirator.” Finally, for the ricin biological attack, we will need a blender, castor beans, centrifuge, and basic chemicals like lye and vinegar.

THE DEVICE Our next step is to complete the logistics on making a dissemination device. There are a few different options for dissemination, including a spray device, an exploding or bursting device, a simple breakable container, a binary device, surgicaltype dissemination devices (needle), and the vector method (e.g., rats, mice, or fleas). The device we decide to use is a single dissemination device. To make this device, we need a cylinder, rubber pressure tubing,


Cpl. Jon R. Loftis inspects a building for hazardous material Photo by Lance Cpl. Tyler Ngiraswei a magnetic close valve, a battery, a clock, and some wire. Below is a rough diagram of our device. The diagram depicts the device as it will be used to disseminate sarin gas for our chemical attack. As shown in the diagram, the gas cylinder will be opened, with sarin gas running through a pressurized rubber tube to the magnetic solenoid that is closed. There are two circuits, one of which is activated upon opening the box. (This is the same wire system as in a mail bomb.) In addition, there is a fail-safe circuit that is activated by a timer. The delivery system is packed in styrofoam, and the box is stapled shut with the magnetic valve at the top parallel to the box opening. When

the box is opened or the timer goes off, the agent will be released. We will use the same type of device to deliver ricin, the only difference being that the tube will be filled with the biological agent and the cylinder will be filled with compressed air. For the plague attack, all we need is a surgical dissemination device—in this case, a hypodermic needle.

OPERATION During the plan assessment, we learned that biological agents are most vulnerable when they are in transit from suppliers to university research centers. Therefore, we will steal our required biological agents at that time. After acquiring the plague, we will

introduce it to the general population. Through extensive reconnaissance of local vagrant drug users, we learned their daily routines and patterns. We decide to offer them an injection which they will think is a drug; however, what they will actually receive is an injection of the plague. As noted earlier, the plague has an incubation period of 3–7 days, with signs of infection first appearing on the third day after exposure. We will call this day on which plague symptoms initially appear “Day 1”. Our secondary attack will be an attack on local hospitals. Through surveillance, we determined that each hospital’s clerk stages mail on a desk just beyond the entrance at The Counter Terrorist ~ April/May 2018 17


U.S. soldiers wearing full chemical protection Photo by defense.gov/photos/photolist.aspx

the hospital loading dock. The mail sits there until at least 9:00 a.m. Therefore, on Day 4, we will have our disseminating systems delivered by a delivery company before 9:00. After 9:00, each hospital’s clerk will pick up the mail and distribute it to the departments to whom it is addressed. To cause maximum damage and contaminate equipment, we will have two packages delivered to several departments in each hospital: one package containing ricin, and the other containing sarin. The departments to receive the packages will be the Critical Care Trauma Unit,

18 The Counter Terrorist ~ April/May 2018

the Critical Care Unit, the Emergency Department, and the Recovery Room. We estimate that large numbers of equipment and personnel will be contaminated in these locations. Thus, we require a total of eight packages per hospital. Recall from the diagram that each dissemination device has both a timer and a switch that will be triggered when the box is opened. This is the same method of activation as a letter bomb. Also, note that we will not use explosives in the operation because it might denature the ricin or affect chemical toxicity. We will label the boxes “Urgent,” which is typical in hospitals, thereby increasing the likelihood that they will be opened right away. Each box’s clock trigger will be set for 10:00 a.m. to ensure there is time to deliver the packages to each department. We expect that after our devices are triggered, the hospitals will close. By this time, the plague will have incubated, and people will begin to arrive at the hospitals with signs of infection, only to find that the hospitals are closed. In addition, the hospital equipment will be contaminated— including the ventilators, which are very important pieces of equipment for recovery from plague.

RESULTS The plague will now be in the community, and no hospitals will be available. Family doctors will be overwhelmed, and the infection will start spreading exponentially. There will be mass panic because we are not just dealing with the plague, which is highly contagious from person to person, but also because there are very few resources for treatment. People

will be advised to stay home, and therefore all transportation systems will be shut down. This will cause a major economic crisis. Essential service personnel will be scared to go to work, and there will be a major shortage of essential services. The military will eventually need to be called out to try to contain the contamination. There will be a major logistics problem in getting food into the city, and due to the contamination of the hospitals, there will be a major shortage of ventilators. The death toll will start to mount, as casualty rates will be extremely high. In order to house all the bodies, officials will have to convert schools into morgues.

IMPLICATIONS As this scenario illustrates, traditional biological agents can have a devastating effect if strategically deployed. Furthermore, if a terrorist opted to use one of the new chimeratype plague agents as a weapon, the resulting disease would be almost impossible to contain. Chimeratype bioweapons mix bacteria and viruses—for example, plague and smallpox may be combined with Ebola or Venezuelan equine encephalomyelitis (VEE). When a person is infected with plague that has smallpox incorporated into it, medical professionals will begin to treat the plague with the appropriate antibiotics. The plague will be destroyed but the smallpox will be unaffected by the medication. Thus, disease will continue to take its toll on the patient, ultimately causing death. Russian researchers have already developed chimera-type weapons. If a terrorist group such as AlQaeda acquired and used one of


these weapons in the United States, the government would have great difficulty containing the disease. Because the rate of infection would be dramatic and there would be no cure, the government may be forced to consider launching a surgical nuclear strike on its own people to limit the

spread of disease. In doing so, the government would have to take a utilitarianism-type of view of what is best for the masses. If ordered, a nuclear strike of this nature would likely cause the country to collapse, as many citizens would no longer feel able to trust their government.

CONCLUSION From my research, I learned that launching an attack using biological weapons of mass destruction is quite easy to do, with a major amount of casualties as the result. Many biological agents are relatively easy to access, and chemical agents are

A Military Command of the Plateau executes a drill on 7/28/2016Photo by Andre Borges/Brasilia Agency. Circle 339 on Reader Service Card

The Counter Terrorist ~ April/May 2018 19


often very easy to produce. A good dissemination system can be made for less than $200, and there are major vulnerabilities in our country that can be identified and exploited by a dedicated transnational terrorist. Therefore, I believe it is only a matter of time before we see a major attack on United States soil.•

REFERENCES Aaron, H., J. M. Lindsay, & P. S. Nivola. (2003). Agenda for the Nation. Washington, DC: Brookings Institution. 2 Allison, G. (2004). “Preventable Nightmare: Al Qaeda Wants to Nuke a U.S. City. There Are Simple Ways to Stop It.” Retrieved July 8, 2009, from http://www.lacity.org/done/articles/ donearticles54723533_09192004.pdf. 3 CBC. (2009, May 13). Retrieved July 1, 2009, from http://www.cbc.ca/ canada/manitoba/story/2009/05/13/ mb-microbiology-lab.html?ref=rss. 4 CDI. (2003, February 7). “Ricin Factsheet.” Retrieved July 1, 2009, from http://www.cdi.org/terrorism/ ricin-factsheet.cfm. 5 City of Kansas City, MO. (2003, July 15). “Plague.” Retrieved July 1, 2009, from http://www.kcmo.org/ health/pdf/chapter4.pdf. 6 CNN. (1998, February 19). “Two Charged with Buying Biological Weapons.” Retrieved July 1, 2009, from http://www.cnn.com/ US/9802/19/fbi.arrest.pm/. 7 Department of Veterans Affairs. (2003, October). Health Effects from Chemical, Biological, and Radiological Weapons [Employee education system]. Washington, DC: Author. 8 Drielak, S., & T. Brandon. (2000). Weapons of Mass Destruction 1

20 The Counter Terrorist ~ April/May 2018

Response and Investigation. Springfield, IL: Charles C. Thomas. Fester, U. (1997). Silent Death (2d ed.). Port Townshend, WA: Loompanics Unlimited. 9 Gundry, C. (2007). “Four Common Myths about Chemical and Biological Terrorism.” Retrieved July 1, 2009, from www.chs.acfei.com. Khardori, K. (n.d.). “Anthrax.” Retrieved July 1, 2009, from http:// www.siumed.edu/medicine/infectiousdiseases/current_issues/AnthraxPPT.pdf. 10 Medhurst, P. (2002). Global Terrorism. New York: United Nations Institute for Training and Research. 11 Medicinenet.com, n.d. “Chemical Terrorism.” Retrieved July 9, 2009, from http://www.medterms.com/ script/main/art.asp?articlekey=18694. 12 Miller, J., S. Engelberg, & W. Broad. (2002). Biological Weapons and America’s Secret War Germs. New York: Simon & Schuster. 13 Nations Encyclopedia. (n.d.). “Arms Regulation and Disarmament: Other Weapons of Mass Destruction.” Retrieved June 9, 2009, from http:// www.nationsencyclopedia.com/ United-Nations/Arms-Regulation-andDisarmament-OTHER-WEAPONSOF-MASS-DESTRUCTION.html. 14 Now Public. (n.d.). “Ft. Detrick Disease Samples Lost? Ebola, Anthrax, and Plague.” Retrieved April 22, 2009, from http://www.nowpublic.com/ health/ft-detrick-disease-samples-lostebola-anthrax-and-plague. 15 Orent, W. (2004). Plague: The Mysterious Past and Terrifying Future of the World’s Most Dangerous Disease. New York: Free Press. 16 Proengin. Chemical warfare agent characteristics and selected biological agent characteristics. Florida.

Richardson, L. (2006.) What Terrorists Want: Understanding the Enemy, Containing the Threat. New York: Random House. 18 Simons, E. (2006). “Faith, Fanaticism, and Fear: Aum Shinrikyo—The Birth and Death of a Terrorist Organization.” Forensic Examiner 15(1), 36–45. 19 Simpson, B. (n.d.). “Sarin.” Retrieved July 1, 2009, from http://www.bioteach. ubc.ca/Journal/V02I01/Sarin.pdf. 20 Schaap, W., & E. Ray. (2003). Bioterror. New York: Ocean Press. Stogel, S. (2004). “Al-Qaeda and Bin Laden Have Publicly Proclaimed Their Goal Is to Kill ‘4 Million Americans.’” Retrieved July 8, 2009, from http:// www.freerepublic.com/focus/ fr/1171627/posts. 21 U.S. Congress, Office of Technology Assessment. (1993). Technologies Underlying Weapons of Mass Destruction. Washington, DC: U.S. Government Printing Office. 17

ABOUT THE AUTHOR Gus Michalik is a graduate student in Homeland Security at the American Military University with 30 years of experience in close-quarter combat training. He is the CEO of Homeland Security Training Inc. and has consulted with military and police officers both domestically and internationally.Contact: Gus Michalik, cbrne3636@gmail.com


TAKE FAST, DECISIVE ACTION

FLIR Fido X-Series handheld explosives trace detectors (ETDs) help responders interdict explosives threats in critical security applications. They detect a broad range of threats with best-in-class sensitivity and deliver actionable intelligence within 10 seconds. Screen with confidence using the Fido X2 and Fido X3 ETDs.

Circle 339 on Reader Service Card

TO LEARN MORE GO TO FLIR.COM/EXPLOSIVESGUIDEBOOK FLIR.EU/EXPLOSIVESGUIDEBOOK

What to know before your team goes in. The Counter Terrorist ~ April/May 2018 Download the 21 guidebook now!


BREACHED IN APRIL

Photo by: IDF

22 The Counter Terrorist ~ April/May 2018


A first hand account by Garret Machine

“No good decision was ever made in a swivel chair.” —General George S. Patton

I

t is May, and I’m turning 25 this month. As I look back, I realize that just one year and some months ago, I was fresh out of training and completely new to this job. It is the most meaningful, satisfying, and certainly underpaying job I will ever have, no doubt. Over the past year, I’ve participated in more than 30 Direct Action missions—serving as a breacher, the first one through the door, a field medic, and a sharp

shooter. I’ve operated in every major terror nest in the country, so by now I’m well versed and experienced in our unit’s operational activities. Tonight I’m going on a mission in Kalkilya, a city in the West Bank. Kalkilya is known as a “weak” city compared to, say, Jenin or Beit Lechem. The mission is as follows: Capture, dead or alive (but preferably alive), the second in command of Hamas. If his brother is there, take

The Counter Terrorist ~ April/May 2018 23


him also. He is said to be hiding in his parents’ attic, which will be accessible only through a trap door. This poses a serious threat to our safety when searching the house. Think about how an aggressor could easily shoot through a sheetrock wall when he sees someone on the other side through a peephole. For this reason, we bring a dog to search ahead of us and sniff him out. This is not unlike big game hunting—the primary difference being that our prey can shoot back. It’s common knowledge in combat that the defender has a home court advantage over the attacker, so the element of surprise will be a critical aspect of our operation.

Photo by: IDF

24 The Counter Terrorist ~ April/May 2018

At 22:00 I’m on my way out of our base. By 23:00 we are readying our gear to embark from our staging area. I am working with three others on this mission: one man is an urban sniper (a designation unique to the IDF), one man is our squad leader, and one man is a combat medic. Our squad leader is a unique individual. He is about 5’10” and his flesh looks carved out like a perfect Greek statue—but even more impressive is the fact that he can work like a machine. He has broken four Israeli Defense Force (IDF) physical fitness records. In particular, he has the fastest obstacle course time for course Makim (the IDF sergeants’ course), as well as the obstacle course record for Samabim (which is the course for field combat squad leaders). He also has the record for fastest time up the “natural disaster,” which is a large dune, 30 meters high and made of soft sand, on the beach at one of the training bases we use. That base, called Wingate, is the center for army combat fitness and hand-to-hand combat training, located just north of Tel Aviv. In addition, our squad leader has the IDF pull-up record—and more than I have ever seen—at 75. That is not a typo. The man is capable of 75 good, clean, strict pull-ups. Our squad needs to carry a stretcher with us on each outing, but all the men are already geared up and have no room for the stretcher on their back. Bringing a stretcher is not something we can question, however. We must have one, so I volunteer to take it. The stretcher is collapsed into a small backpack weighing about 12 pounds. I have other gear on my back, so I sling


Photo by: IDF

The Counter Terrorist ~ April/May 2018 25


“Our mission is to enter the apartment building that is now positioned at our right in the alley, then to move to the top floor and gain control of the apartment there.”

26 The Counter Terrorist ~ April/May 2018

the pack over my shoulder. By 1:00 a.m., we are on our way to our objective. We move in using armored vehicles similar to a Chevy Suburban. The city is quiet upon our approach. Few people are seen on the streets; it feels somehow like a ghost town. The roads are wide, the air is cool, and a nice breeze moves through the night. We quietly emerge from the comfort and safety of our vehicles and run silently. The vehicle silently disappears. I have the stretcher slung over my left arm, and my left hand grips the front for-grip of my rifle. The butt of the gun stays in its place on my chest, while my right hand grasps the rear pistol grip, with my trigger finger straight and thumb riding the safety. We run straight down a street, then make a turn to the left as we enter a smaller alley that dead ends in about 30 meters. Our mission is to enter the apartment building that is now positioned at our right in the alley, then to move to the top floor and gain control of the apartment there. At that point, we should have a good view of our target’s apartment building. Each building is about four stories high. Once we have this vantage point, we can take aim across to his place, to ensure that he cannot escape out the back door of his apartment building. We can also observe all movement on the roof of the building that he is currently in. We are at the neighboring building’s front door, and it is locked. The medic and the squad leader are working on the door with a hydraulic door splitter. These tools are quiet, smooth and powerful however they don’t work on all doors. But with a little experience anyone can use

them. The two men start splitting the attack points hard and fast. We need to crack that door open as soon as possible. Two minutes in and it is already too long; we could blow the whole operation if we are not in position and our target makes a run for it or goes to the roof without us seeing him. We are well skilled in opening all sorts of doors under time, but this door is proving difficult. Meanwhile, I’m covering the direction we came from. The sniper and I are aiming down the alley at a cross cover, securing our squad members who are working the door. The noise is loud as two men come around the corner, both dressed in jeans, belts, and short-sleeved buttondown shirts tucked in. One of the men is holding a knife. It looks like a kitchen knife with duct tape around the handle. The men freeze as they run directly into our line of sight, only about 10 meters in front of us. I tell them in Arabic, “Stop! Hands up! Put your hands on your head! Now turn around!” Our sniper says to me, “Get him,” and I understand this means that he will cover me as I go in. I immediately disarm the first man and throw his knife to the right side. I move both men quickly to the left, against the wall of the building. I pull out my flex cuffs from my vest without taking my eyes off the center of the first man’s back, allowing my peripheral vision to see his extremities. I pull his hands down to his back and cuff him quickly, then the sniper moves in to cuff the second man, who is on my left. By the time both men are cuffed, the door is open. The whole ordeal takes about four minutes. We move inside the building and


clear the stairwell one flight and platform at a time. The medic is at point (meaning he is the first man in line), taking the steps as the squad leader covers him. The sniper and I are escorting our suspects up the stairs after them. When we get to the top floor, we find the apartment abandoned and the door open. The medic and squad leader search the flat, and after it is deemed safe, we all enter. I am now guarding the two prisoners, whom I instruct to sit down in Arabic, as the sniper takes position inset from the window and trains his tripod and aim through his

night-vision scope on the targeted house. The medic and I search the captured subjects a second time while the squad leader radios in our position, confirming that our location is secure and that we have two prisoners. I give the captured men’s identification cards to the sergeant so he can radio in their numbers and names, providing the IDs are even real. This is standard procedure when taking prisoners in the field. After a few minutes, we are told over our radios (which are audible only to us because we have earpieces built into our ear protection, unlike

conventional walkie talkies): “One of your prisoners is the man we are looking for. He is our objective. Hold tight and we will send two men from our position with instructions.” This message comes from the mission commander. Two more warriors now come up the steps and through the door. They tell us to bring the two prisoners over to one of our extraction vehicles that has freshly arrived in front of the building we were searching. The medic and I bring them over at a light jog, about 50 meters from our original entry point. We secure them in the vehicle

Photo by: IDF Circle 313 on Reader Service Card

The Counter Terrorist ~ April/May 2018 27


with our backup force. We then enter the first floor of the wanted man’s apartment building, where the rest of our force has convened. We are about 10 men in all. The door is open when I arrive, and everyone has taken a position in the living room on the first floor of the apartment building. From the doorway of that first secured apartment, we speak through a megaphone into the stairwell, announcing ourselves (in Arabic) as the army and saying that everyone in the building needs to come out of their apartments and to the bottom floor at once. This is for the sake of safety, because if we need to search the top floor apartment for terrorists and weapons, no one can be in the apartments in between. This also guarantees two critical things. First, it ensures that no innocent civilian is mistaken as a threat or caught in the crossfire, thereby becoming an unnecessary casualty. Second, when we have every man, woman, and child in the building down with us, we can be sure that any noise or movement detected during our search is in fact enemy movement and can be treated as such. After everyone in the building has joined us and they all confirm that no one is hiding in their apartment, we start to conduct our search, angle by angle. Everything in urban warfare is based on angles of fire and cover. We move from apartment to apartment, floor to floor from the bottom to the top of the building, slowly and methodically. Eventually we approach the final apartment and the rooftop where our man was supposed to be. (Don’t forget that his brother is still

28 The Counter Terrorist ~ April/May 2018

at large and that he, too, must be apprehended.) Just after breaching the door of the final apartment, we send our dog to search for any sign of life within. He returns after finding no one, showing us no sign of life. We move in, stacked on one another at the doorframe so that we can carefully scan each room with live fire. If there is a closet or a couch, we don’t take the chance of opening it or looking behind it. We shoot a few holes in it and then look, this is a form of a threshold assessment. It is too dangerous to enter without this technique and in this case team integrity and safety is the priority. The place comes up clean, no brother to be found. We locate the trap door

that we learned about during our briefing, which leads to the attic hideaway. The attic is free from life as well, but not free from weapons. We find 7.62 mm ammo, knives, shanks, and one AK-47 assault rifle, also known locally as a “Kalash.” Even though the subject’s brother is still free, the mission is considered a success, and we can go home with the knowledge that we have taken a top terrorist leader and some of his weapons out of the game—at least until he is replaced. The mission was relatively uneventful but productive. It took about six hours from start to finish and left me curious about what might have happened had the target not been outside when we arrived and instead poised in the attic, ready with his gear.•

Photo by: IDF


CALLING ALL PIPE HITTERS, DOOR KICKERS, AND LEAD SLINGERS‌ The Counter Terrorist is seeking professionals from the law enforcement, military, intelligence, and special operations communities to contribute articles. (Obviously nothing OPSEC, and you can use a pen name.) If you have a business, we can offer you a free business card–sized advertisement in the magazine instead of financial compensation. We are looking for articles that are about 2,000 words long and cite sources; these articles should also include a short biography and your contact details. We are additionally searching for product, book, or training course reviews that are approximately 500 words in length. Your article or review will go through several rounds of formatting and editing prior to publication, and you will be provided with a PDF copy of the magazine. Please contact the editor with articles or ideas at garretmachine@gmail.com.

The Counter Terrorist ~ April/May 2018 29


by Editorial Staff

HOW TO TRAIN YOURSELF: RANGE DRILLS Photo Pixabay 30 The Counter Terrorist ~ April/May 2018


At each firearms training class I teach, people ask how they can train on their own and what they can do so as to not waste time and money at the range. (Most people will go to the range with no plan, much like the gym.) Here is what I recommend to maintain a level of combat proficiency.

F

irst, dedicate 30 minutes each week to “dry practice,” spending half of that time with a pistol and the other half with a rifle. Use a barrel plug in your gun. (I don’t like dummy rounds and think that they are a recipe for a disaster, both on the training side and operationally.) You can even get a dedicated dry-fire gun from Glock. Use the same model gun and holster

for all your dry drills. Don’t mix and match weapons, as this won’t serve you well in real life. Here is a link to barrel plugs: http://bit.ly/2p5dXzX Next, spend 30 minutes at the range for live fire once per month. While there, complete the following pistol drills (all drills listed can be done at 5–15 meters, depending on your ability).

The Counter Terrorist ~ April/May 2018 31


WITH YOUR FIRST BOX OF AMMUNITION • Five rounds slowly in quartersquare paper. Two-hand slow fire. Work on your sights, trigger, and grip. • Four rounds with one-hand slow and accurate fire. Support hand on your chest. • Five rounds from a high-ready position, one round at a time. Don’t move your body; just punch the weapon up and out. Get a followthrough trigger reset and sights.

32 The Counter Terrorist ~ April/May 2018

• Five rounds of draw-and-fire single shot. Same-size target for firstshot placement guarantee. Work on your draw times. • Three magazines with threefour rounds each. Draw and fire full magazine as fast as you can hit an “A” zone ISPCA target. Work on your rhythm sets and shot breaks. Goal is .20–.33 breaks consistently. • Three magazines with four rounds each. Draw and fire three to the body and one to the head. Work on your

transition times, draw times, and shot breaks. • Two magazines with six rounds each. Shoot three to the center mass, two to the pelvic area, and one to the head to finish.

WITH YOUR SECOND BOX OF AMMUNITION • Five rounds, with one round in each magazine. Draw and fire one round to your head target (index card). Change magazine four times,


for a total of five rounds. Use a shot timer. Draw should take less than 3 seconds from concealment facing 90 degrees away. Each magazine change should take 3 seconds or less. • Two magazines with nine rounds each. Two staggered targets (e.g., one at 7 meters and one at 12 meters). Draw and fire three rounds to the center mass of target one, transition to target two for another four rounds, then back for a head shot, one at each target. • Three magazines with three, four,

and five rounds each. These are rhythm drills to achieve shot breaks between a maximum of .33 and ideally .20. Focus on rhythm. Once you can do this well, just use magazines of five rounds and increase distance. • Ten rounds in one magazine. Start with the gun out in two hands extended. Then bring it in and put it in the support hand. Punch it out single handed and fire two rounds. Next, bring the gun back in and go back to your strong hand but don’t

fire. Then repeat the process five times (for a total of ten rounds, all fired from your support hand). • Seven rounds divided in two magazines of three and four (mix them up). Practice walking with your weapon at the high ready, as if searching an unsecured area. Use a flashlight in your non-shooting hand. Start 15–20 meters from your target. Walk in search mode and engage your target with one of the two magazines, allowing the reload to surprise you. Repeat.•

Photo Pixabay The Counter Terrorist ~ April/May 2018 33


WHERE ARE MEYER LANSKY AND LUCKY LUCIANO WHEN YOU NEED THEM? Photo Pixabay 34 The Counter Terrorist ~ April/May 2018


by Karen Maguire

HOW ACCOUNTANTS CAN HELP FIGHT THE WAR AGAINST TERRORISM Declassified, Disclosed, and Sometimes Disputed: Criminals Helped Win World War II

D

uring World War II Meyer Lansky, the Mafia’s accountant, served as the linchpin in an unlikely alliance between the U.S. military and the Mafia to defeat the Axis powers. In 1942, Lansky negotiated the transfer of organized crime boss Lucky Luciano from Clinton Correctional Facility in Dannemora, New York, to Great Meadow Correctional Facility, located downstate in Comstock. Great Meadow’s proximity to New York City allowed visitors from the Office

of Naval Intelligence (ONI) to visit with Luciano and Lansky. The two sides negotiated a deal in which the organized crime figures agreed to help the Navy in exchange for Luciano’s release. Code named “Operation Underworld,” the effort involved both Italian and Jewish criminal organizations. These organizations are credited with keeping all ports along the Eastern seaboard free from sabotage, black market looting, worker strikes, and Axis spies from 1942 until the end of World War II in 1945. In addition, Luciano and Lansky

provided a network of organized crime colleagues in Italy that assisted the U.S. military in its invasion of Sicily in 1943, code named “Operation Husky.” Lansky personally escorted Sicilians chosen by him and Luciano to the ONI’s Counter-Intelligence Unit so they could provide information on the ports, waterways, coastlines, and villages of Sicily. They were not alone. Other organized crime figures provided similar assistance to the U.S. Joint Chiefs of Staff and the British Secret Intelligence Service.

The Counter Terrorist ~ April/May 2018 35


“The first element is to identify your customer. This requires vetting the customer for any inconsistencies or gaps in information provided, asking whether the customer does business in highrisk countries listed by the FATF, and profiling the customer’s typical transaction parameters.”

Questions emerge when considering this U.S. Navy–Lansky– Luciano–organized crime alliance. Luciano is famous for saying, “There’s no such thing as good money or bad money. There’s just money.” So why would Luciano and Lansky commit their organizations’ resources and abandon potential criminal proceeds to keep ports free from Axis submarines, spies, and sabotage and help with a military invasion? The answer to this question lies in the fact that both men had been fighting the Axis powers for over a decade before the U.S. entered the war. In Italy, since his rise to power in the 1920s, Mussolini had sworn to eradicate the Mafia. His brutal tactics included caging suspected associates and torturing them. Sicilian families risked everything to smuggle their sons out of Italy and over to America. One of these sons was Joseph Bonanno, a Luciano ally and future head of the Bonanno crime family

Charlie “Lucky” Luciano by Remo Nass 36 The Counter Terrorist ~ April/May 2018

that still bears his name. Meanwhile, in the 1930s, legitimate leaders of the Jewish community asked Lansky if he and the Jewish mafia could help deter Nazi supporters from demonstrating and espousing antisemitism in the United States. At the first pro-Nazi meeting Lansky broke up, he and his fellow Jewish mafia members pummeled Nazi supporters. His Italian comrades had offered their services, but Lansky said he needed to do the first attack himself for his own self-respect. After that, both mafias participated in the raids.

CRIMINAL AND TERRORIST ORGANIZATIONS In 2004 Tamara Makarenko proposed the modern-day crime– terror continuum. The continuum illustrates how criminal and terrorist organizations learn from one another. The process begins when the initial membership of a terrorist group unites around a common ideology, hoping to execute acts of terror to draw attention to their cause. To do this, they need money for supplies, travel, reconnaissance, and recruiting. The most effective way to obtain money is through crime. Later, when the members of the terrorist organization plan an attack and need to move people and weapons, they utilize the most efficient distribution network in the world: smuggling routes created and run by organized crime. During this process, the terrorists learn about more efficient ways to commit crime and obtain the funds they need. In turn, the criminal organizations gain knowledge from the terrorists about the best ways to conduct shock and awe


activities that will suppress opposition. For example, plata o plomo—silver or lead—is the intimidating method utilized by cartels. The problem for organized crime today is the geography of the Global War on Terrorism. Terrorist organizations have declared war on the rest of the world, including the locations of the crime networks that provide them with services. For example, most of the drugs manufactured in Africa travel via organized crime smuggling routes through Turkey. Terrorists have committed acts of terrorism in Istanbul, most notably the New Year’s Eve attack on the Reina nightclub. With these attacks, terrorists have shown disrespect and disregard for the operations of the organized crime networks. They have attracted international attention to the areas where the criminal organizations manufacture, distribute, and sell their products—areas where organized crime prefers to minimize attention.

ORGANIZED CRIME CAN HELP DEFEAT TERRORISTS So why do we need today’s organized criminals to help fight the war against terrorism? Although the idea seems counterintuitive on its face, perhaps it takes a bad guy to catch a bad guy. Criminal organizations have a competitive advantage: adaptability. Unlike governments burdened with regulations, criminal organizations can react quickly to changes in their environment. The ONI recognized that this capability, combined with the Mafia code of honor, made organized criminals uniquely suited to the task.

So why would governments, sworn with upholding the laws of their respective nations, want to work with organized crime? Lieutenant Anthony J. Marsloe was one of four men to interview the people chosen by Lansky and Luciano. He was also one of four men in the first landing crafts on Sicily. In his words, “The exploitation of informants, irrespective of their backgrounds, is not only desirous, but necessary when the nation is struggling for its existence.” Marsloe did not condone the illegal activities of the Italian and Jewish mobsters, but he recognized a simple premise: The enemy of my enemy is my friend.

ACCOUNTANTS CAN HELP DEFEAT TERRORISTS So how does this apply to accountants and technology today? Once again, accountants serve as the linchpin in the modern-day war against terrorism. The Financial Action Task Force (FATF) and its 37 member countries (including the United States) set policy to prevent and detect money laundering and terrorism financing. Accountants are specifically tasked to “know your customer” (KYC). The member countries emphasize that firms require no new technology to complete this task. Rather, they ask companies to utilize their existing due diligence processes to identify and report suspicious activity so that government officials can investigate and seize terrorist funds. KYC typically involves three elements of due diligence. The first element is to identify your customer. This requires vetting the customer

Meyer Lansky Photo by Al Ravenna

The Counter Terrorist ~ April/May 2018 37


for any inconsistencies or gaps in information provided, asking whether the customer does business in highrisk countries listed by the FATF, and profiling the customer’s typical transaction parameters. The second element is to identify the source of your customer’s funds. This means identifying unusual transactions to or from a high-risk country, determining whether the customer is using multiple transactions to avoid reporting thresholds, and spotting deviations from the customer’s typical transaction parameters. Finally, the

third element is to conduct due diligence dynamically. Dynamic due diligence involves periodically re-vetting customers, determining whether any changes in ownership or location have occurred, and reconciling any changes to the list of high-risk countries. By following this approach, every accountant does his or her part in fighting the war against terrorism. Whether organized crime organizations join governments in an unlikely alliance to combat terrorism is a code-of-honor question only

they can answer. At what point do these organizations decide that longterm freedom outweighs short-term revenue? In other words, when is bad money no longer just money? Lansky and Luciano asked themselves this question, and today’s organized crime organizations will need to as well. •

ABOUT THE AUTHOR Karen Maguire is a PhD, MSF, CFS, CFE, CPA, and Professor of Accounting at Coastal Carolina University. She can be reached at KMaguire@coastal.edu.

Photo by Pixabay

38 The Counter Terrorist ~ April/May 2018


www.homelandsecurityssi.com Find out more at:

TAKE YOUR TRAINING TO A HIGHER LEVEL...

SSI ELEVATED TACTICS TRAINING Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn: • • • • • • •

Vehicle driving and operating techniques in a variety of situations Global case studies of real-world operations using the specific equipment Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults Elevated obstacle negotiation and firing platforms Emergency evacuations, climbing and descending options ® SECURITY Distraction and deception techniques SOLUTIONS and much more... INTERNATIONAL

Protecting the Homeland Together ®

Elevated Tactics Training provided in partnership with Patriot3.

Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 313 on Reader Service Card

The Counter Terrorist ~ April/May 2018 39


Innovative Products A HOMELAND SECURITY DEGREE WITH A PUBLIC HEALTH PREPAREDNESS OPTION

Penn State’s online intercollege Master of Professional Studies (iMPS) in Homeland Security with an option in Public Health Preparedness can give you the knowledge and skills to respond efficiently and effectively to natural and man-made disasters. By completing this program, you will be equipped to adapt to a catastrophe and its aftermath. The knowledge and skills learned from Penn State’s online program have helped our graduates fill leadership roles in public health, education, health care, emergency management, and the military.

FLIR ULTRA-PORTABLE EXPLOSIVES TRACE DETECTOR FIDO X2

At less than 1.5 pounds and featuring a durable, ergonomic design, the FLIR Fido X2 explosives trace detector (ETD) offers maximum portability. It features FLIR’s proprietary TrueTrace® technology to detect a broad range of chemicals used in the manufacture of homemade, commercial, and military explosives with best-in-class sensitivity. On-screen prompts guide security officers quickly through operation, so they can confidently clear vehicles and personal belongings passing through a security checkpoint.•

40 The Counter Terrorist ~ April/May 2018


The Counter Terrorist ~ April/May 2018 41 Circle 313 on Reader Service Card


BOOK REVIEW

Rich Dad, Poor Dad by Robert T. Kiyosaki

R

ich Dad, Poor Dad by Robert T. Kiyosaki is an excellent book. It outlines what children in middle and high school say when they don’t want to do their homework. To put it into the words most parents have heard, “When am I going to use this in real life?” I remember saying this as a kid in an attempt to avoid doing my math homework. I hated school subjects and felt like I was just going through the motions, trying to please everyone but myself. I wanted to go out and do things, to learn hands-on, tangible skills. Even while in college getting a business degree, my schoolwork seemed useless— so I became a lifeguard while in school to feel fulfilled. The takeaway from this book is just that: Focus on what counts, don’t be cautious, and be educated. In other words, Kiyosaki recommends taking risks—not gambles, but educated and calculated risks. Most people go through life trying not to lose, which is the opposite of what the winners in life do. People like Donald Trump, who the author often references, go in to win and win big, not to avoid loss. To put things in perspective, what if high schools got rid of subjects like algebra, geometry, biology, chemistry,

42 The Counter Terrorist ~ April/May 2018

Reviewed by Garret Machine


BOOK REVIEW

and ancient history and in their place taught topics like accounting, marketing, law, and investing? What type of product would schools produce then? I wish my parents had this type of mindset and educated me in relevant subjects. Even if I had the maturity to read this book 15 years ago, I would be better off today. I want for nothing, but I am by no means fit to retire. So, what is the key to saving for a comfortable retirement? Kiyosaki recommends using the approach embraced by the wealthy, rather than the approach employed by much of the middle class. According to Kiyosaki, members of the middle class prioritize employment security and then consume goods for comfort, using that as a gauge of success. Whatever money is left over they save, perhaps setting aside a small

amount to invest. That is the wrong way to go, because it is playing the game “not to lose.” The rich, on the other hand, build up an investment portfolio, seek professional satisfaction from work, and then save from their investments. Whatever money is left over they consume for comfort, perhaps in the form of a Porsche 911 or Audi Q5. When it comes to building wealth, Kiyosaki also emphasizes the following points: 1. Assets put money in your pocket, even when you are on vacation. Liabilities take money out of your pocket; therefore, your house is a liability. You may think of it as an asset, but it’s not! 2. Wealthy people buy assets first, then let their assets buy their luxuries from the surplus cash flow. An example

would be letting income from rental apartments pay off your mortgage. 3. Rich people continuously increase their assets by reinvesting their surplus cash flow in more assets. 4. There are three primary asset classes: real estate, businesses, and paper assets (stocks, bonds, notes, etc.). 5. Cash flow is more important than net worth. Cash flow makes you rich, whereas net worth only makes you wealthy. 6. The rich don’t work for money; they work for assets. That’s because assets generate cash flow, cash flow makes you rich, and being rich provides freedom. To conclude: Read the book. Rethink education, especially in the context of today’s school system. Don’t be a cog in someone else’s machine. Build your assets, and limit your liabilities.•

Circle 343 on Reader Service Card

The Counter Terrorist ~ April/May 2018 43


PRODUCT REVIEW

The Glock Training Pistol for Defensive Tactics by Editorial Staff

I

have been training in defensive tactics for as long as I can remember. I began with judo class as a small child, then karate as a teenager, krav maga as an adult, and finally police defensive tactics when I became part of that community. I’ve taught krav maga and the Haganah FIGHT program for years in conjunction with Haganah and GORUCK. All the while, gun disarms have been a hot topic for one obvious reason: If you can touch it, you can take it. In other words, there are often times when you are in close proximity to an adversary who has a firearm, but your firearm is holstered or not on your person. Either way, your draw will never be faster then his trigger pull. The solution is a quick, decisive, and surprising eruption of violence. You must get off the line of fire while gaining control of the weapon; deliver pain so as to knock your adversary off balance and reset his mind; then disarm and neutralize him. To do this, you must train so that the process becomes motor memory and is engrained in your subconscious. And for safe and proper training, you need the right tools. When choosing a training pistol for dry practice or martial arts, you look for realism, durability, compatibility

44 The Counter Terrorist ~ April/May 2018

with your EDC or duty holster, and—of course—the right price. Enter the Garret Machine Glock Training Pistol. This product is built to the exact dimensions and specifications of the famed Glock 17 or Glock 22 model pistol, the most widely used pistols for law enforcement and civilians alike in North America and most Western nations. Molded from a single piece of glass-filled nylon for maximum strength and durability, this training tool enables you to practice martial arts gun disarms, defensive tactics for law enforcement, and krav maga. The front sight is shaved off to

minimize injuries to your hands during training. This inert pistol is also excellent for knife defenses when you want to practice getting to your weapon during scenario-based training because it is both safe and 100% compatible with your Glock 17 or Glock 22 duty holster. Furthermore, you can use this gun for practicing room clearing in your home or office and other locations where safe dry drills may be authorized. The design is not only aesthetically pleasing but functional. This product is a Garret Machine–brand exclusive and only available at www.GarretMachine.com•


The Advanced Global Security Workshop in

Israel ®

The experts on training in:

the Homeland Security professionals best resource

Since 2005, SSI has taken nearly 500 First Responders to Israel and shown them the basics of the Israel security concept. Thanks in part to that program, we are better able to defend ourselves in the United States. In response to demand, we are now offering a once-in-a-lifetime experience covering the following advanced subjects: May 11- 18 & June 1-9

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel’s northern border. Hostage Rescue - Discover how they go wrong. Hospital Response - Find out how Israel’s critical response hospitals handle surge and multi-casualty incidents. Israel Counter Terrorism units - Learn how they operate. Israel National Police - National Academy; See how they train? Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system. Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

2018

LEARN MORE at: Call now for more information.

www.homelandsecurityssi.com

Circle 215 on Reader Service Card

Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 50 on Reader Service Card Circle 215 on Reader Service Card

The Counter Terrorist ~ April/May 2018 45


ADVERTISER INDEX

Counter The

APRIL/MAY 2018

VOLUME 11 • NUMBER 2

Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page

Ad/Company • website and/or email............................................................................................... RSN Number

45 Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com... 215 2 Barrett Firearms Manufacturing • www.barrett.net/firearms/mrad........................... 121 4 DeSantis Holster & Leathergoods • www.desantisholster.com.................................. 241 39 Elevated tactics by SSI • www.homelandsecurityssi.com............................................. 313 21 FLIR • www. flir.com/explosivesguidebook www.flir.eu/explosivesguidebook...................... 49

FLIR

3 TAC OPS • www.tacopseast.com................................................................................. 277 41 NYTOA Tactical Conference 2018 • www.nytacticalexpo.com.................................. 313 7 Patriot3 • www.patriot3.com..................................................................................... 301 48 Phantom Products Inc. • www.phantomlights.com..................................................... 209 43 Southern Police Equipment • www.southernpoliceequipment.com.............................. 343 47 SSI PVB • www.SSIPVB.com....................................................................................... 226

46 The Counter Terrorist ~ April/May 2018


New and improved

( portable vehicle barrier ) When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email info@homelandsecurityssi.com

Or visit our website: www.SSIPVB.com

Circle 308 on Reader CircleService 317 onCard Reader Service Card

Circle 226 on Reader Service Card

The Counter Terrorist ~ April/May 2018 47


Circle 209 on Reader Service Card


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.