Ctmagoctnov17final

Page 1

S I T U AT I O N A L AWA R E N E S S , G T M O D E P L O Y M E N T, S O C I A L M E D I A M O N I T O R , B R E A C H I N G 1 0 1

Journal for Law Enforcement, Intelligence & Special Operations Professionals

OCTOBER/NOVEMBER 2017

VOLUME 10 • NUMBER 5

SITUATIONAL AWARENESS WHEN TRAVELING ABROAD

INTERNATIONAL

EDITION An SSI Publication ®

OCTOBER/NOVEMBER 2017 USA/CANADA $5.99

thecounterterroristmag.com


A NEW BREED OF BARRETT. At Barrett, we’ve set the industry standard for precision and performance. Now, that bar has been raised. Our MRAD is the most accurate rifle in the world. The Multi-Role Adaptive Design surpasses all expectations of a long-range rifle. It is held to the most stringent testing standards

fully adjustable, user-accessible, match-grade trigger module. The thumb-operated safety can be configured for left- or right-hand operation; the ambidextrous magazine release can be used intuitively while retaining a firing grip and cheek weld. IN YOUR HANDS. AT YOUR COMMAND.

A LIGHTWEIGHT BUILD, NOT TO

THE BULLET POINTS:

BE TAKEN LIGHTLY. • Mil-Spec Type 2, Class 3 Hardcoat

The available lightweight carbon

anodized available in Cerakote™

fiber-wrapped barrel does not

MRB, Black, Flat Dark Earth, OD

build up heat, lessening the point of impact shift over a long string

Green and Tungsten Grey • Match-grade barrels available in fluted and heavy in multiple

of fire. Made of a temperatureresistant polymer, the adjustable cheek piece also offers a

lengths • High-efficiency muzzle brake • Generously sized magazine well

consistent rifle-to-user

for quick reloads

and outperforms the competition. Inspired by our design of Every single time. Fielded by the Model 98B, the MRAD exceeds any several allied governments, the expectation of MRAD is as hardworking as the a precision one who holds it. rifle. After ACCURATE AND ADAPTABLE FOR years of ANY TARGET, EVERY TIME. perfecting research, we Every detail of the MRAD has hit the target with been carefully designed to create unfailing accuracy and one thing: a unprecedented adaptability. high-performance rifle you The MRAD has a folding stock, an

9 o’clock positions. The MRAD

- 388 Lapua Magnum

can truly make your own.

foldable stock provides compact

- 300 Winchester Magnum

mobility and swift configuration.

- 308 Winchester

During transport, the stock folds

- 260 Remington

and locks onto the bolt handle

- 6.5 Creedmoor

Available in multiple calibers

adjustable length of pull, and an extended rail for range of scope.

and configurations, the precisiongrade barrel can be removed by simply loosening

With its user-changeable barrel system, the power is truly in your hands.

contact point. Integrated into the MRAD rifle’s 7000 series aluminum upper receiver is a 21.75-inch M1913 rail with a 20 MOA taper. The upper receiver is drilled and tapped for any of your accessory rails to be mounted at the 3, 6 and

maintaining the same rifle.

• 10-round, polymer magazine • Oversized trigger guard for operation with gloved hands • Fully adjustable trigger module can be removed without tools • Accepts most standard M4/M16 pistol grips • Recoil absorbent Sorbathane® pad • Available calibers: - 338 Norma - 300 Norma - 7mm Remington Magnum

Visit BARRETT.NET/ FIREARMS/MRAD for more.

two bolts. The MRAD boasts our

*Rifle shown with optional accessories. Circle 121 on Reader Service Card

2 The Counter Terrorist ~ October/November 2017

PERFORM | NEVER PRETEND™


BUILD THE SKILLS YOU NEED TO BECOME AN INTELLIGENCE LEADER

AMU ALUM AND VETERAN LINWOOD HARRISON B.A. INTELLIGENCE STUDIES (2013)

At American Military University, we understand what a typical day in the intelligence community involves. The intelligence field is ever-evolving, and that’s why we offer more than 200 informed and career-relevant online degrees and certificates including Intelligence Studies and Intelligence Analysis. Our degree and certificate programs are respected by the intelligence community and taught by experts – many of whom have real-world IC experience. Apply today and join a global network of like-minded peers and professionals all with one goal in mind: success. To learn more, visit www.AMUonline.com/counter-terrorist Circle 241 on Reader Service Card Circle 25 on Reader Service Card

1901-17-698273_AMU_Intel_7.25x10_TCT_4C_r0.indd 1

The Counter Terrorist ~ October/November 2017 3 5/12/17 4:41 PM


Best Location in Orlando – The Florida Hotel and Conference Center What a fantastic hotel. Rooms were nicely appointed, the staff was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall attached to the hotel. –Top rated by TripAdvisor

Counter The

Journal for Law Enforcement, Intelligence & Special Operations Professionals

presents: 12th Annual

HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION

November 7-8, 2017 • Orlando, Florida

Get your registration in as soon as possible: • Best speakers in Homeland Security • Premiere opportunity to network with your peers in US Homeland Security and across the Globe • Attended by more than 100 Federal, State and Local agencies • Selected Vendor expo of the latest in HS Technologies This year’s 12 Annual Conference is being held at a time of renewal for US Counter Terrorism. With a promise by the new administration to “wipe radical Islamic terrorism from the face of the earth”, what will US counter terrorism have to do to fulfill that promise? Taking the gloves off: Re-igniting US counter terrorism” will feature speakers that cast light on the subject of how the US can revitalize the war on Radical Islam. The debilitating effects of an anonymous and unnamed enemy for the past 8 years have led to gaping holes in the way the US effort is organized. Exciting presentations on everything from Cyber Security to banning groups associated with the Muslim Brotherhood will be covered by 8 excellent speakers over 8 days bringing global best practices. A group of carefully selected vendors will support the conference with an expo of technologies that can contribute to protecting the USA.

REGISTER NOW REGISTRATION COST $399.00 *Government and group rates available. Call us for details.

LEARN MORE at:

www.thecounterterroristmag.com/conference

Call now for more information.

Phone: 866-573-3999 Fax: 866-573-2090 Circle 180 on Reader Service Card Villegas@homelandsecurityssi.com 177 on Reader Service Card 4 The Counter Terrorist ~Circle October/November 2017


Counter CONTENTS

The Journal for Law Enforcement, Intelligence & Special Operations Professionals

14

8

22

OCTOBER/NOVEMBER 2017 VOLUME 10 • NUMBER 5

COVER STORY: 14

SITUATIONAL AWARENESS WHEN TRAVELING ABROAD by Patrick Moltrup

FEATURES:

8

PSU 305 GTMO DEPLOYMENT by PA2 Matt Masaschi

22

U.S. RELIANCE ON SOCIAL MEDIA COMPAINIES TO MONITOR AND TAKE DOWN TERROR ACITIVITY by Madison Crow

30

BREACHING 101 by Garret Machine

DEPARTMENTS: 06

From the Editor

38

Innovative Products

40

Product Review

42

Training Review

44

Book Review

Only Results Count

Breakthrough® Clean Technologies, DeSantis Gunhide’s New Sl Raptor Holster: Style 147, SSI PVB Targetize: Never Miss Again Team O’Neil Car Control School The Road to Character by David Brooks

Cover Photo:

Pixabay

30

The Counter Terrorist ~ October/November 2017 5


Counter The

FROM THE EDITOR:

Only Results Count

by Garret Machine

A

Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 10 • NUMBER 5

ll soldiers and police officers find themselves in a training role at some point in their careers. When you have an acute ability for a particular skill set, you end up taking a leadership role in that field, task, or subject. After you have a considerable amount of time and experience in the subject or field, you can be considered a subject matter expert. Selection gives you access to training, and training gives you access to experience. Experience trumps everything. But what makes an expert? We’ve all heard that 10,000 hours of deliberate practice makes a person an expert, but what about raw talent? Isn’t that also important? Some people are simply better than others at certain tasks from the start, whether due to superior hand-eye coordination, mental capacity, physical size, ability to stay cool under pressure, or any number of other factors. A great instructor is also a great student and always learns and develops his or her art. There are many schools of thought, techniques, and tactics to achieve the same end result. When it comes to high-liability skill sets and performance under stress, I have come to understand that certain instructors and schools have their own idiosyncrasies. However, I’ve also found that experienced instructors adhere to industry standard best practices and care less about nuance. That’s the level you should aspire to. Let me tell you a quick story to illustrate this point. Over the years, I’ve had the privilege of attending many driving schools, not because of personal interest but because it was part of my job. Last week, I elected to attend a course focused on driving vehicles with a low center of gravity at high speeds over varied terrain—in other words, rally driving. During the week-long course, I learned a lot of useful techniques and got to practice them at speed. For example, we were taught how to maneuver a car around a turn at a high rate of speed. In the past, instructors at other driving schools gave conflicting advice—all of them said to never shift in a turn, but some advised to shift after the turn while others said to shift before turning. Last week’s driving instructor told me to try the following: Approach the turn straight on, holding the outside and applying straight-line braking down to 40 miles per hour. Just prior to the turn, drop the car into first gear and turn the wheel in the direction you want to move. As soon as you let out the clutch, the car will begin to turn. About halfway through the turn, drop the clutch and pull back the gearshift into second gear. Release the clutch and hit the gas. This will have you accelerating in the right direction. If this technique is executed correctly, you will experience very little loss in speed and no noticeable drop in momentum. We practiced this method several times over the course of a morning. Soon, my confidence grew to the point that I was able to implement the technique where appropriate. I mentioned to my instructor that previous courses had taught me never to shift in a turn, but instead before or after it. My instructor said to me from the passenger seat, “There are no nevers in racing, just results.” The same is true for counter terrorism and tactical teams all the way down to individual operators. All the logistics, planning, preparation, intelligence, food, housing, insurance, ammo, weapons, selection, and training come down to one moment… the moment when the individual needs to perform under pressure and the result has to be dead terrorists and live hostages. No matter how you got to this moment, everything you’ve done up to now will be forever judged based on this moment’s outcome. To nuance the point of the driving instructor and apply it to small arms, I don’t care how you grip a gun. Are you maximizing surface contact, and are you as close as possible to the moving parts? I don’t care what part of your finger pulls the trigger, but are you pulling straight back into the frame of the weapon without deviation? If so, then you are adhering to best practices. The bottom line is this: Don’t fix it if it’s not broken, and don’t re-teach someone if they already get the results. Results are what count in real life, not whether you shoot Weaver or isosceles or tie figure-eight or bowline…

OCTOBER/NOVEMBER 2017 Editor Garret Machine Director of Operations Carmen Arnaes Director of Advertizing Sol Bradman Administrative Jennifer Junatas Contributing Editors Madison Crow PA2 Matt Masaschi Patrick Moltrup Graphic Design Morrison Creative Company Copy Editor Laura Town Advertising Sales Sol Bradman bradman@homelandsecurityssi.com 305-302-2790 Publisher: Security Solutions International 13155 SW 134th St. • STE 103 Miami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 103, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 eZine issues of the magazine is $19.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: Security Solutions International at villegas@homelandsecurityssi.com or call 786-573-3999 Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com © 2017 Security Solutions International

Garret Machine Editor, The Counter Terrorist 6 The Counter Terrorist ~ October/November 2017


MADE IN THE USA

• • • • • •

NIJ IIIA and NIJ III Dimensions: 21”x38”, Viewport: 3”x10” Available with arm cut outs for quicker target acquisition and aiming Weight: 19-21 lbs for NIJ IIIA Weight: 28-30 lbs for NIJ III Durable protective coating with protective edge strip

BALLISTICS

REVOLUTIONARY DESIGN www.patriot3.com

ELEVATED TACTICS

• • •

Hydraulically Operated, Single Ramp Elevated Tactics System Designed to be lightweight and fit many APC’s, like the Lenco Bearcat (G1-G4) Tactical and rescue capabilities include elevated entry, bus assault, aircraft assault, sniper positioning, hostage rescue, mass evacuation and more all while maintaining existing APC functions

Circle 301 on Reader Service Card

Circle 301 on Reader2017 Service 7 Card The Counter Terrorist ~ October/November


by PA2 Matt Masaschi

PSU 305 GTMO DEPLOYMENT

The U.S. Coast Guard cutter USCGC Sanibel (WPB 1312),patrols the Portland Harbor. Photo by Public Affairs Specialist 3rd Class Luke Pinneo 8 The Counter Terrorist ~ October/November 2017


Deep in the Caribbean, fleets of Coast Guard, Navy, Army, Air Force, and Marine personnel need to move through and around Guantanamo Bay, Cuba. Ensuring their safety is a huge responsibility that requires the 24-hour presence of highly trained personnel. These personnel come from the smallest branch of the nation’s military: the U.S. Coast Guard.

C

oast Guard Port Security Units (PSUs) serve as anti-terrorism force protection expeditionary units, with boat crews and shore-side security teams capable of supporting port and waterway security within the United States or anywhere in the world the military operates. More than 100 Coast Guardsmen from U.S. Coast Guard Port Security Unit 305(PSU 305), based in Fort Eustis, Virginia, are executing multiple missions alongside Department of Defense partners who staff the

Maritime Security Detachment (MARSECDET) at Naval Station Guantanamo Bay, Cuba, during a nearly year-long deployment. While deployed to Guantanamo Bay, PSU members provide aroundthe-clock waterborne security and point defense force protection to DOD assets, and they operate alongside Navy, Marine, Air Force, and Army service members conducting joint operations. Transiting through the mouthwashblue Caribbean Sea, PSU crew

The Counter Terrorist ~ October/November 2017 9


members aboard 32-foot Transportable Port Security Boats provide armed escorts to inbound Coast Guard cutters, Navy ships, and commercial ships entering Guantanamo Bay. PSU crew members also escort authorized maritime traffic passing through Guantanamo Bay en route to Cuba, and they enforce offshore security zones. During an emergency response, moving personnel through remote regions in the area can be difficult. Should a medical evacuation or a need to get personnel to these remote locations arise, the fastest route is across the bay via boat. Thus, PSU crew members routinely train with Marines

in launching and recovering personnel from remote locations throughout the bay. On land, PSU service members provide anti-terrorism defense protection to assets and personnel at Naval Station Guantanamo Bay. “People come to Port Security Units for moments like this—for the deployment,” said U.S. Coast Guard Commander Michael McCarthy, MARSECDET commanding officer with PSU 305. “This is the actual game. You spend four or five years training, but it’s not until you actually go on a deployment that you get into the game. This is the highlight and culmination for the training and hard

work our people put in getting their boat [qualifications] or their shore-side security [qualifications].” PSUs consist of enlisted members from almost every rating who train to execute PSU operations and missions worldwide. Boatswains’ mates, machinery technicians, and maritime enforcement specialists make up the majority of the personnel. Beyond operations, a wide support umbrella of administration staff, intelligence, engineering departments, communications, and logistics and armory personnel work behind the scenes keeping the boats in the water, the equipment operating, the security forces properly equipped, and the

The Coast Guard Port Security Unit 313, Photo by PH1 Shane T. McCoy .

10 The Counter Terrorist ~ October/November 2017


PSUs consist of enlisted members from almost every rating who train to execute PSU operations and missions worldwide.

HOUSTON Marine Safety Office Port Arthur, Texas USCG photo by PA2 Andrew Kendrick service members mission ready. A cache of replacement parts and consumables are kept on hand for the engineering department, minimizing downtime for vehicles, equipment, and boats. When repair items are needed beyond what the unit stocks, the PSU relies on a five-person crew at Air Station Miami, Aviation Detachment (AVDET) Guantanamo Bay to deliver the needed parts. “For the PSUs, the AVDET provides depot-level inventory from the Surface Forces Logistics Center in Baltimore for the Transportable Port Security Boats,” said Chief Petty Officer David Knapp, AVDET Guantanamo Bay supervisor. “The PSU has their own inventory for small things, but we stage depot-level repair items such as a stern drive or an engine. We can provide them a replacement engine, then take the broken engine and send it back to get it fixed and returned to inventory.”

Beyond managing the forward-staged inventory, Knapp said AVDET crew members also support PSU personnel by facilitating logistics—getting people on and off the island for emergency leave. “Our job is to make sure they can do their job and they don’t fail, which is sometimes hard since the PSU is operating boats 24 hours a day, seven days a week,” said Knapp. PSU 305’s current deployment marks the first time a complete PSU has deployed to Guantanamo Bay to staff boat forces and shore-side security missions for the entire deployment. Because it is the first full PSU to deploy to Guantanamo Bay for the complete deployment, PSU 305 needed additional members to be fully staffed to carry out its missions. A number of members from as far away as Alaska volunteered to deploy with the unit, McCarthy said. Though the

deployment is almost a year long, the PSU is staffed with people who want to be deployed and are committed to the mission. “I’ve got two individuals from Station Valdez, [Alaska], people from Station Seattle, folks from the Great Lakes area, Galveston, [Texas], and others from up and down the East Coast who raised their hand and volunteered,” said McCarthy. “It’s unique. Coast Guard reservists get called up everyone once in a while to do contingency operations. These are the best opportunities for anyone in the reserves. It’s an opportunity to get exposed to a significant mission and for members to get specialized training, qualifications, educational benefits, [and] health benefits and to take care of themselves and grow professionally and personally.” Operating on a naval base with individuals from all five branches of the armed forces, PSU 305 may represent the first and possibly the only time other service members will ever interact with the Coast Guard. “We realize this is our chance to make a great impression of our service,” added McCarthy. “This is our time to showcase what we’re made of, and we’re proud to do it.” •

The Counter Terrorist ~ October/November 2017 11


HOSTILE VEHICLE MITIGATION MADE SIMPLE.

Introducing the “RING OF STEEL” line of Perimeter Security Products. The Ring of Steel line of products are ideal solutions to today’s threats. From Hostile Vehicle Mitigation to situations requiring Extreme Crowd Control. Protect your facility or event with the very best in perimeter solutions.

NHCRP 350/MASH/DOS/ASTM Certified & Approved

WWW.TCP-SS.COM INFO@TCP-SS.COM 813.446.4115

12 The Counter Terrorist ~ October/November 2017

Circle 249 on Reader Service Card


Circle 339 on Reader Service Card

The Counter Terrorist ~ October/November 2017 13


SITUATIONAL AWARENESS WHEN TRAVELING ABROAD

Backpacker in the Grand Lower, Los Angeles 14 The Counter Terrorist ~ August/September October/November2017 2017


by Patrick Moltrup

I was recently doing some research and came across several stories from travelers who had been robbed or mugged during their travels to specific countries. As I read these stories, I shook my head at the fact that rather than analyze what they had done wrong, each of these individuals instead pointed fingers at their host country and its people.

I

ssues with mugging, pickpockets, thieves, and thugs exist in every single city in the world. For example, Washington, D.C., has a murder rate of 31.4 in 100,000, as compared to Cancun’s rate of 2 in 100,000. You are 15 times more likely to get killed in a violent crime in the capital of the United States than the beaches of the Riviera Maya in Mexico, one of the

“most dangerous countries in the world” according to Western media—yet you have the exact same chances of being mugged in a dark alley late at night if you choose to disregard the commonsense rules of situational awareness, regardless of what city you are in. Each year, the U.S. State Department issues dozens of advisories with the intent of keeping Americans safe as

The Counter Terrorist ~ October/November 2017 15


they travel abroad. Unfortunately, some of these warnings go unheeded. Mexico, Mali, and Israel have been targeted by the most travel advisories in recent years, but Americans are more likely to face life-threatening danger in Thailand, Pakistan, and Honduras. Fortunately, some travelers—at least those headed to the Philippines or Egypt—seem to have taken heed, as these countries have seen drop-offs in tourism following warnings. Now, please don’t think it’s unsafe to leave the confines of our nation’s borders, because that is not the case. Travelers should understand the actual risk of terrorism and crime in

a cold, logical, statistical way. Per the Washington Post and Time, your odds of being killed by a terrorist overseas or in the air are 1 in 20 million. In comparison, the New York Times reports that your odds of being struck by lightning are 1 in 10 million, while your odds of being killed by gunfire in the United States are 1 in 32,250. Luckily, terrorists’ targets are predictable. They lash out at high-profile symbols of our powerful and wealthy society: cruise ships, high-rise hotels, embassies, and military bases. If you melt into Europe and avoid places like Hilton Hotels and Burger King, you’ll avoid likely terrorist targets and have a more enriching

16 The Counter Terrorist ~ October/November 2017

vacation at the same time. Indeed, Americans are traveling outside our country’s borders more than ever before. According to statistics from the National Travel and Tourism Office, in 2016, there was an increase of more than 8 percent in the number of American citizens jetting off to international destinations. In 2016, a total of 66,960,943 U.S. citizens traveled outside the country, compared to 61,783,913 during the previous year. And just where were these travelers going? For the most part, they didn’t stray too far from home. More than half of 2016’s international travelers—37,403,398 to be exact— stayed within the confines of North America, with Mexico as the year’s most popular destination (25,181,630 trips in total), followed by Canada (which saw about half that traffic, with 12,221,768 visits). Europe was the third most popular destination, with 11,831,870 Americans visiting the region, followed by the Caribbean (6,579,691) and Asia (4,388,391). Regardless of exact destination, basic situational awareness can prevent many of the unfortunate circumstances Americans have faced as they’ve traveled the world. When training professionals in preparedness programs, we use terms like vulnerability assessment, threat environment, and situational awareness. Although these terms have specific meanings in the context of community preparedness, they also translate into daily living, especially when traveling. When you are at home or work, you are in a familiar environment, where you know the risks and can control many of them. When traveling, however— even to a known place—there are new challenges and unfamiliar environments. Situational awareness is the number-


Palais de Versailles, main courtyard one rule of avoiding issues while out and about in a street environment, regardless of whether you are an expat abroad or living in your home country. I’m sorry, but if you don’t notice two or three people coming up behind you on a darkened street at 11:30 at night, you deserve to be mugged, if only to teach you a lesson that you’ll carry with you for the rest of your life: Pay attention to your surroundings. To reiterate: The most important rule is to maintain situational awareness in all circumstances. That means being aware of the environment and potential threats around you at all times. If you can anticipate any higher-risk situations you’re likely to encounter, you’ll have a better idea of what to look for to reduce your risks and plan appropriate responses.

Like everything in preparedness, planning starts well before the event. Conduct a simple vulnerability analysis—what are the adverse events or conditions you can anticipate at each stage? This would include the possibility of mechanical failure, effects of adverse weather, and other causes of breakdown or accident. There are a multitude of websites that offer informational assistance in preplanning for travel. Most notably, the U.S. State Department has a site (https://travel.state.gov/content/travel/ en.html) that provides Americans with the most up-to-date travel warnings. This site should be accessed multiple times leading up to your departure date so you’re not surprised by whatever situation may develop. If you go to the State Department

So, what can you do to not be a statistic? It’s really very simple: Pick your head up from your phone and use the senses you were equipped with at birth.

The Counter Terrorist ~ October/November 2017 17


Group of American tourists encounter Rick Steves in the streets of Italy, all there due in part to his travel programs.

site, you’ll see that Mexico tops the list, with 28 warnings in an 8-year period. It’s worth noting that these warnings are regionally specific, targeting sites where crime syndicates are particularly active. Popular tourist destinations like Mexico City and the Yucatán peninsula (including Cancun) are generally regarded as safe. Most other countries on the State

Department list are participants in ongoing international conflicts (e.g., Israel, Pakistan, Afghanistan) or are sites in which extremist groups regularly carry out terrorist attacks (e.g., Mali, Nigeria, Syria). North Korea is an interesting exception, as the government itself presents a danger to American travelers. According to the State Department, foreigners are liable to be jailed for

18 The Counter Terrorist ~ October/November 2017

unspecified reasons, or for seemingly innocuous infractions like interacting with the locals or taking unauthorized photos. How do State Department warnings square with the actual likelihood of crime abroad? Reliable, global data on crime is difficult to come by, but the State Department tracks the incidence and causes of American deaths abroad


(https://travel.state.gov/content/travel/ en/statistics/deaths.html). We used that dataset to identify countries where Americans are most likely to experience life-threatening danger while traveling. The following table ranks the foreign countries in which the most Americans were killed between 2009 and 2016. Before ranking, we filtered the data to include only homicides, executions, deaths in terrorist attacks, and drugrelated deaths. So, what can you do to not be a statistic? It’s really very simple: Pick your head up from your phone and use the senses you were equipped with at birth. In 2017, that does seem to be at times a difficult task. When you board a train in Copenhagen, enjoy a museum in Madrid, or are just walking the streets of London, do so with your head up and your eyes and ears aware of your surroundings. The weapon of choice for terrorism lately isn’t always an AK-47. Increasingly we’ are seeing large vehicles being used to run down innocents on sidewalks or along areas where people would normally congregate. Being selfaware could give you the second or two required to move yourself and whomever you’re with to a safe area. Be responsible for your own safety. Trust your feelings always. Choose to pay attention to what is going on around you.

OTHER GENERAL AWARENESS TIPS • Follow the local news, and be aware of what’s happening in the area before you arrive. • Before you leave, get travel insurance and register with the Smart Traveler Enrollment Program (STEP) if your insurance doesn’t already cover you overseas. I know heaps of people (usually British for some reason) who get injured

overseas and have to head home or pay medical costs up front. • Make copies of your passport, travel itinerary, tickets, credit cards, driver’s license, and any other important documents. Copy the back of everything as well. This can make it easier for you to recover if any of your documents are stolen—but only if you keep the copies in a separate location than the originals and make sure they’re safe. You might consider making scans of your documents and e-mailing them as attachments to yourself to be printed when and if needed. You may also be able to store your important documents in an online “safe” for additional security. • Health warnings are an important part of safe travel, which is why Americans are always advised to visit their general practitioner prior to travel. Make sure your doctor approves you for international travel. If you’re pregnant or have an illness, it may be best to stay home. Get any vaccines that are suggested for the area you are traveling to. The CDC keeps a list of recommended vaccinations based upon your destination. There are instances where you may want to opt out of some vaccinations. You can discuss these situations with your doctor. Also be knowledgeable of current outbreaks. For example, the Zika virus is a highly talked-about disease in 2017. • Upon arrival at your destination, ask if the tap water is safe before drinking it or using it to brush your teeth. • Know the location of safe spots in your area, such as a U.S. embassy, embassy of a nation friendly to the U.S., hospitals, and possibly churches or synagogues. • Keep the address of your hotel on you, in both English and the native

Be responsible for your own safety. Trust your feelings always. Choose to pay attention to what is going on around you. tongue. Store the information both in your phone’s notes (or snap a photo) and in a little notebook (because phone batteries die). Everyone in your group should do this in case you get separated. • Avoid looking like a tourist. Generally, this means you shouldn’t wear excessive or expensive-looking jewelry or a nice pair of sneakers (especially white ones). You might be tempted to wear nice sneakers because you will be doing a lot of walking, but such shoes will show people that you are indeed a tourist (which makes you a target for thieves). If you must wear sneakers, be sure that they are not the type that would attract attention. Also avoid fanny packs, because a pickpocket could easily unzip (or take a knife to) them and empty the contents without you being aware. Don’t use tote bags imprinted with a tour group operator name or symbol. Avoid obviously new apparel. If you must bring electronics, put them in the oldest, most beaten-up backpack you can find.

The Counter Terrorist ~ October/November 2017 19


Photo: Pixabay

COMMUNICATIONS TIPS • Have a cell phone with an international voice and data plan, or buy a local SIM card wherever you travel. Unlock your phone before departure from the U.S., and keep it on and charged at all times. • Have different ways of sending and receiving messages (e.g., e-mail, cell phone, SMS, FB, WhatsApp, Viber, WeChat, Google Project Fi for Fi-ready phones, etc.). Do not underestimate the ability to call emergency services when necessary. You may not have always have Wi-Fi access. • Carry paper copies of emergency and assistance-provider contact cards. Know local emergency numbers. • Protect your personal information. Be discreet on social media about yourself and your plans. Be cautious.

TRAVELING TIPS •Consider safety when traveling. Avoid stops in high-risk areas or airports. Familiarize yourself with current conditions. Learn basic survival phrases in the local language (e.g., “I need help”; “Call the police”; “I need a doctor”).

•Avoid travel to countries with an active U.S. Department of State travel warning. Stay in contact with your family and friends to help minimize unnecessary anxiety. Share your itinerary and contact information with them. •Pair up. Use the “buddy system” and travel in groups. Do not leave your friends behind. Know how to get there and back. Avoid hitchhiking. •Observe road safety when taking local transportation or as a pedestrian. *Always choose safe transportation. Road crashes are the leading cause of death and injury for travelers. It’s a good idea to avoid owning, renting, or operating any motorized vehicle while abroad. •If caught in a dangerous situation, remain calm, stay low, and run away as safely as possible. • Be aware of cultural differences and abide by local customs and laws. Remember that you are a guest in someone else’s country. • Avoid demonstrations; they can turn violent without warning. If caught in a demonstration, leave immediately. • Avoid large public gatherings.

20 The Counter Terrorist ~ October/November 2017

Choose public activities carefully. Always identify exits. In the end, if you have situational awareness and think about the position you’re in objectively, you will be fine. Always trust your gut. To avoid trouble abroad, use common sense and be aware of your environment. The same general rules apply to any city around the world: Avoid hustlers, muggers, gangsters, pimps, and pushers. Westerners who want to avoid danger while traveling should arrive in their host country with a basic knowledge of local threats, laws, and customs. Furthermore, they should avoid danger zones and maintain situational awareness—and exercise common sense—at all times.

ABOUT THE AUTHOR Patrick Moltrup is a 25-year military veteran, first as a Marine, then as a Navy SWCC. Patrick has held positions as a trauma medic, boat team POIC combat advisor, and SERE instructor. He currently owns GPM Kit, which makes a unique tactical and multisport belt. He lives and works in southern California.•


New and improved

( portable vehicle barrier ) When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email info@homelandsecurityssi.com

Or visit our website: www.SSIPVB.com

Circle 308 on Reader Service Circle 317 onCard Reader Service Card

Circle 226 on Reader Service Card

The Counter Terrorist ~ October/November 2017 21


U.S. RELIANCE ON SOCIAL MEDIA COMPANIES TO MONITOR AND TAKE DOWN TERROR ACTIVITY by Madison Crow

The U.S. is losing the fight against terrorism online because of limitations on how it can censor speech and fight false information about American intentions overseas.

22 The Counter Terrorist ~ October/November 2017


T

Photo: Pixabay

he U.S. does legally have the right to shut down terrorist organizations for the potential to incite violence. There is, however, a hurdle in how the nation’s authorities can censor online content—namely, the U.S. government does not necessarily have jurisdiction over the places where terror groups operate online, and private websites do not have to provide information about their users or shut down posts or accounts. Thus, most monitoring of social media accounts falls largely on the social media companies themselves. These companies do not necessarily have a legal obligation to engage in such monitoring, although many have. They exist in a legal gray area with regard to privacy regulations, because they are not a “phone company, which isn’t responsible for what people

say,” nor are they “a traditional broadcaster, subject to strict regulations on what can be put on air” (Sydell, 2017). Instead, they fall somewhere between. Because of this relative lack of monitoring, social media sites have become hotbeds for terror organizations that are looking for new recruits. The Brookings Institution notes that terror groups often following a certain sequence of steps when seeking recruits online, as described below (Lesaca, 2015): 1. A group’s first step is discovery. Either the group locates a potential recruit, or the potential recruit seeks out or discovers the terror group. Terror groups can find new recruits by looking at social media analytics, which are available to all users. The

Army Gen. Martin E. Dempsey, chairman of the Joint Chiefs of Staff, tours Facebook headquarters in Mountain View, Calif., July 26, 2012. DOD photo by D. Myles Cullen The Counter Terrorist ~ October/November 2017 23


Facebook headquarters in downtown Palo Alto, California. Photo: Coolceaser group measures interactions sent and received by its recruiters to figure out which Twitter or Facebook users seem most interested in the group or visit its accounts most often. 2. After the group identifies a potential recruit, it creates a microcommunity. Supporters (not necessarily the group itself ) flock around potential recruits and surround them with social influence and input so they become trusted allies. 3. Next, the group isolates the potential recruits, encouraging them to cut ties with influences such as families, friends, and local religious communities. 4. After isolation, the terror group shifts to being a recruit’s sole provider of information. Supporters encourage recruits to take their conversations onto encrypted messaging forums for planning. 5. If a recruit takes the step onto the messaging platform, supporters of the terror group will encourage the recruit to take action. Supporters and recruiters will try to figure out what the recruit is most willing or likely to do. This usually involves travel to join the group or

24 The Counter Terrorist ~ October/November 2017

carrying out terrorist attacks wherever the recruit already is. Terror groups do not just have free reign to recruit, though. There is legal precedent for restricting a group’s freedom of speech through the U.S. Supreme Court’s decision in Whitney v. California (1927). In that decision, the Court stated that the federal government has the power to punish those who abuse their rights to freedom of speech “by utterances inimical to the public welfare, tending to incite crime, disturb the public peace, or endanger the foundations of organized government and threaten its overthrow.” Although the federal government may have legal justification for limiting someone’s free speech, they do not have access to that speech on social media sites. This is because the government does not have jurisdiction over the Internet and social media companies. As the Federal Communications Commission (FCC) pointed out, the “[Commission does not have the authority to target [social] media accounts... We do not have jurisdiction over Facebook and all the other web providers. We do not intend to assert jurisdiction over them” (Trujillo, 2015). Rather, the FCC would like private companies to take responsibility for the social media accounts they manage on each of their respective sites. Social media companies do not have a legal requirement to shut down terror activity. Section 230 of the Communications Decency Act of 1996 states, “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” As noted before, Facebook and other social media sites do not have a legal obligation to take things down because they exist


in a legislative gap (Sydell, 2017). Nonetheless, Twitter and Facebook have begun to set up algorithms for finding and shutting down inciting speech on their platforms. These algorithms search for key terms in postings, then review the content that has been posted. Twitter and Facebook also monitor known accounts to better learn how they act and speak (Fioretti & Chee, 2016). Thus far, their efforts have been effective. “Over time, individual users who repeatedly created new accounts after being suspended suffered devastating reductions in their follower counts” (Berger & Perez, 2016). When social media accounts lose followers, they have a more limited reach in the online space and may not be seen by outsiders as a legitimate group. There is currently a bill in Congress that would put greater responsibility on social media companies to not only take down potential terrorist activity, but also to report it to the FBI and CIA. Authored by Senator Dianne Feinstein (D-CA), this measure is known as the Requiring Reporting of Online Terrorist Activity Act. Feinstein notes, “We’re in a new age where terrorist groups like [ISIS] are using social media to reinvent how they recruit and plot attacks. That information can be the key to identifying and stopping terrorist recruitment or a terrorist attack, but we need help from technology companies. Congress needs to do everything we can to help intelligence and law enforcement agencies identify and prevent terrorist attacks, and this bill is a step in the right direction” (Feinstein, 2015). Feinstein’s bill has received considerable backlash from tech companies and freedom of speech activists. Some say that the bill would “put more innocent people under government surveillance, without

Gen. Joseph F. Dunford, Jr., chairman of the Joint Chiefs of Staff, at the Brookings Institute Feb. 23, 2017 in Washington, DC. Photo by D. Myles Cullen any evidence it would make us safer” (Williams, 2016). There are also concerns about what constitutes “terrorist activity” online and whether the bill would just lead to political censorship (Williams, 2016). Under current law, the federal government must rely on Twitter, Facebook, and the like to take down false or inciting messaging. However, shutting down accounts is not the only thing the U.S. can do to combat

President George W. Bush gestures as he addresses an audience Wednesday, July 20, 2005 at the Port of Baltimore in Baltimore, Md., encouraging the renewal of provisions of the Patriot Act. Photo: Eric Draper The Counter Terrorist ~ October/November 2017 25


The threat of terrorism online is not something you can solve simply, or with just one solution. the spread of “misinformation” by groups like ISIS. The U.S. also uses alternative messaging to get its version of events online (Aistrope, 2015). The government focuses some of these messaging efforts on Americans, but it also targets messages to people all over the world. In particular, authorities are looking for individuals who are vulnerable to joining groups like ISIS and hurting the US. The goal of these social media and alternative messaging efforts is “[to humanize] Americans and their allies, as well as the victims of ISIS aggression” (Weinstein, 2015). There is

mixed evidence as to how this approach works and how effective it is. After 9/11, “propaganda and misinformation about U.S. foreign policy were seen as key contributors to the radicalization process” by the Bush administration (Aistrope, 2015). To combat this, the U.S. called on the Counter-Misinformation Team (CMT) started during the Cold War and the Digital Outreach Team (DOT) developed in 2007 by the State Department. These groups collaborated to “engage directly with criticism of U.S. policy expressed on Islamist websites and

International jihadist fighters. Photo: Magharebia 26 The Counter Terrorist ~ October/November 2017

social media” (Aistrope, 2015). The DOT and CMT worked as “a group of bloggers tasked with countering anti-Americanism via direct interaction with online users in Persian, Urdu, Arabic, Pashto, Punjabi, and English” (Aistrope, 2015). However, DOT employees faced a considerable amount of blowback from online forums because the State Department regulations required them to identify themselves as federal employees. This was supposed to help the authenticity of the program, the idea being that people would know the information they were receiving was reliable because it came from an official source. Instead, it made the bloggers targets for harassment and ridicule (Aistrope, 2015). To deal with this problem, the U.S. Central Command (CENTCOM) contracted its digital outreach efforts out to a group called the Joint PsychologicalOperations Support Element (JPSY). The group’s contract called for “50 platforms and personas with the look and feel of real people” (Aistrope, 2015) The goal is for the company to directly engage with critics of U.S. policy but not have the obligations of U.S. regulation. This tactic also provides the U.S. full deniability of any actions taken by JPSY employees online. Where DOT had to provide clear and truthful information, JPSY could be more strategically deceptive. They wanted to by deceptive in some sense because “ISIS counter-narrative campaigns obtain more engagement and more views when they are distributed through nongovernment channels” (Lesaca, 2015). So how does the U.S. move forward? One option would be for the government to double down on efforts to pass a bill that would make companies remove any posts that promote terrorist activity. This tactic, however, would likely face resistance from tech


companies and foster resentment. It would allow tech companies to be exposed to lawsuits if they, for example, appeared to be monitoring only one group of people. Discrimination lawsuits might result (Williams, 2016). The second option might be to trust social media companies to use appropriate measures when they encounter inciting messaging on their websites. This may be costly for the tech companies, though. The companies would need to employ speakers fluent in all of the languages in which terrorism may be a threat. They also would need to know the evolving slang with which people speak about terrorism. Tech companies also would not have preexisting databases of people and organizations that present a threat and what their histories are. Furthermore, the government may not be in favor of this option because it would have no way to regulate how tech companies monitor and remove messages. Option three would be for the federal government to expand or continue programs like DOT and JPSY. These programs try to fight misinformation or unfavorable information so that people do not have the fuel or motivation to join groups like ISIS. Alternatively, the U.S. can do nothing and hope that everything will be fine. The best option, however, would be a mix of a few things. The threat of terrorism online is not something you can solve simply, or with just one solution. For example, instead of forcing tech companies to hand over user information and posts, the government should instead work with these companies to create better lines of communication. Then, when something comes up, the companies would feel more comfortable deciding what is best with the appropriate agencies and departments in mind.

The New Standard in Ballistic Shield Technology

Our proprietary construction allows for a rugged, waterproof, long-lasting duty life of 7 years with stopping power unsurpassed in the industry. We offer a full line of composites compliant with NIJ Standard 00108.01 in 3a, 3 as well as Level 4.

www.venture-ballistics.com Circle 143 on Reader Service Card

The Counter Terrorist ~ October/November 2017 27


Circle 6 on Reader Service Card

www.breakthroughclean.com

THE ONLY NON-TOXIC, NON-STAINING AND ODORLESS GUN CLEANING SYSTEM. THE DIFFERENCE IS CLEAR.™ SOLVENTS | LUBRICANTS | CLEANING KITS

Come see our complete line of products at booth # 21

Circle 14 on Reader Service Card

Trusting relationships would increase the likelihood that companies seek the government’s advice rather than work in spite of it. Also, while it may seem contradictory to getting factual information online, there may be wisdom in tricking people with fake accounts. It is worth continuing the JPSY program to see if the results are productive. In addition, “[c]ounter-narrative campaigns against ISIS should be based on true stories of Arabs and Muslims who have first-hand experience of the suffering caused by ISIS” (Lesaca, 2015). You can use JSPY to do this because, according to the Brookings Institution, “ISIS counternarrative campaigns obtain more engagement and more views when they are distributed through non-government channels” (Lesaca, 2015). The world can never be free from fear or violence, but there are things the U.S. government can try to stop terror organizations from recruiting citizens into groups like ISIS. It is worthwhile to try to stop the spread of misinformation about U.S. ideals and intentions abroad. By taking a blended approach to combat the spread of radicalization, the U.S. stands to make a positive impact on the War on Terror.

REFERENCE 47 U.S. Code § 230. Protection for private blocking and screening of offensive material. (n.d.). Retrieved March 4, 2017, from https://www.law. cornell.edu/uscode/text/47/230 2 Aistrope, T. (2015). Social media and counterterrorism strategy. Australian Journal of International Affairs, 70(2), 121–138. doi:10.1080/10357718.2015 .1113230 3 Berger, J. M., & Perez, H. (2016, February). The Islamic State’s diminishing returns on Twitter. 1

28 The Counter Terrorist ~ October/November 2017


Retrieved March 4, 2017, from https:// cchs.gwu.edu/sites/cchs.gwu.edu/files/ downloads/Berger_Occasional%20 Paper.pdf 4 Feinstein, D. (2015, December 8). Bill would require tech companies to report online terrorist activity. Retrieved March 6, 2017, from http://www.feinstein. senate.gov/public/index.cfm/2015/12/ bill-would-require-tech-companies-toreport-online-terrorist-activity 5 Fioretti, J., & Chee, F. Y. (2016, May 31). Facebook, Twitter, YouTube, Microsoft back EU hate speech rules. Retrieved March 4, 2017, from http:// www.reuters.com/article/us-eu-facebooktwitter-hatecrime-idUSKCN0YM0VJ 6 Lesaca, J. (2015, November 19). Fight against ISIS reveals power of social media. Brookings Institution. Retrieved April 4, 2017, from https://www.brookings.edu/blog/ techtank/2015/11/19/fight-against-isisreveals-power-of-social-media/ 7 Whitney v. California. Retrieved March 4, 2017, from https://www.law. cornell.edu/supremecourt/text/274/357 8 Sydell, L. (2017, April 21). Murder video again raises questions about how Facebook handles content. Retrieved April 24, 2017, from http:// www.npr.org/sectionsalltechconsidered/2017/04/21/525042474/ murder-video-again-raisesquestions-about-how-facebookhandles-content?utm_source=twitter. com&utm_medium=social&utm_ campaign=npr&utm_ term=nprnews&utm_content=20170421 Trujillo, M. (2015, November 17). FCC says it can’t shut down ISIS websites. Retrieved March 4, 2017, from http://thehill.com/policy/ technology/260438-fcc-says-it-cantshutdown-online-terrorist-activity Weinstein, A. (2015, March 12).

Here’s how the U.S. should fight ISIS with social media. Retrieved March 4, 2017, from https://www.wired.com/2015/03/ heres-us-fight-isis-social-media/ Williams, K. B. (2016, February 1). Bill targeting social media “terrorist activity” faces backlash. Retrieved March 6, 2017, from http://thehill.com/policy/ cybersecurity/262530-social-mediaterrorism-bill-faces-backlash

Circle 24 on Reader Service Card

ABOUT THE AUTHOR Madison Crow is a junior at Indiana University majoring in Law in Public Policy with a certificate in Political and Civic Engagement. Currently she is working as an intern for Senator Joe Donnelly in Washington, D.C. You can contact her by e-mail at macrow@iu.edu.

The Counter Terrorist ~ October/November 2017 29


Gaining access to a target location is a critical aspect of any mission. Over the course of a career that spans the Israel Defense Forces, U.S. SWAT school, and a current member of a full-time federal law enforcement tactical team, I have seen various methods of breaching.

30 The Counter Terrorist ~ October/November 2017


BREACHING

101

by Garret Machine

I

n the following article, I outline some of the tools that are most common in the law enforcement/military operational environment. Each team member should be trained and qualified in using these tools. Most are available on the civilian market, and it is not hard to find locations to gain proficiency in just a

few short weeks. The hardest part is not the actual application of these tools and techniques, but the teamwork involved in knowing when and where they should fall into your assault element and how to coordinate their appropriate use in a high-risk environment. Note that I have omitted lock picks

and shims from my list of tools. Use of these devices requires a lot of practice, and with experience, one can quietly gain access to a variety of deadbolt locks and padlocks without compromising sound and light discipline. However, this is a perishable skill, and one must have the right picks for the lock at hand.

A U.S. Marine with Echo Company, 4th Reconnaissance Battalion, clears glass from a window during breacher training at Goettge demolitions range, Marine Corps Base Quantico, Va., July 22, 2014. Photo by Lance Cpl. Diana Sims The Counter Terrorist ~ October/November 2017 31


MANUAL BREACHING The use of hand tools to destroy the door, lock, or window being breached. Tools: Sledgehammer for all-purpose striking. Crowbar for prying doors, garage entries, windows, etc. Bolt cutter for cutting locks, arms, chains, etc. 35 lb. ram for smashing in doors. Pros: Simple; require minimal training; anyone can use them. Cons: Noisy, heavy, and time consuming. Leave the operator vulnerable. Hurricane windows and doors will defeat these tools. Best application and use: When the threat level is low, sound and time are on your side, and/or you want to breach interior doors. Best practices: The two people performing the breach should not be part of the initial team of four who make entry, and they should have a plan to toss their tools out of the way of other team members and ready their weapons.

MECHANICAL BREACHING The use of a K12 diamond-bladed, gas-powered saw to cut any surface. In this case, the user brings the blade up to

maximum speed and then cuts through chain-link fence, door hinges, locks, and even the door itself. This method is

also useful for breaching car trunks and concrete or metal barriers, such as a ship’s bulkhead. Tools: K12 saw and diamond blade. Pros: Quick and powerful. Cons: Noisy, heavy, and requires preparation. Hurricane glass may defeat this tool. Best application: When the threat is at a distance and you have time to work the tools. This method would be ideal in a situation like entering a school/ commercial/industrial, where you would likely encounter chain-link fences and heavy commercial doors. Best practices: Have two saws on hand and readily available. Do preventative maintenance on each saw prior to any

32 The Counter Terrorist ~ October/November 2017

operation. Use a new diamond blade for each mission, and check that the bolts are tight and the tank is full. Start the saw about 10–12 meters from the intended breach point while four other team members hold cover on the opening or point of entry. Once the saw is turning, use the ground to stop the blade. Approach with a still blade, mount to the surface to be cut, bring the blade up to maximum RPM, and then begin to cut down and straight. Your assistant breacher should use a crowbar or grease pen to mark the cutting line. As you cut, the assistant breacher should use the crowbar to manipulate the surface (e.g., pull the fence, push the door, etc.). Once you stop and there is sufficient room for the team to pass, immediately ground the saw to stop the blade, then move it aside right away.

THERMAL BREACHING The use of a Broco torch that reaches a temperature of 10,000º F to cut through anything. The hot torch literally melts any surface it touches, turning it to lava and molten slag. Tools: Broco O2 tank, torch, hose, magnesium sticks, and starters. Pros: Nothing can stop it. Cons: Long set-up time; extremely dangerous; makes lava. Best application: When breaching anything metal, including steel walls on ships, water-tight doors, safes, and locks. Best practices: Wear protective clothing designed for such work,


MACTAC

MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY

TM

The Newest, Most Dynamic Training Program from SSI . ®

MACTAC is the new tactical philosophy offering your

department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks.

Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course

Contact us today at:

www.homelandsecurityssi.com

Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 228 on Reader Service Card

The Counter Terrorist ~ October/November 2017 33


including a full face mask, gloves, steel boots, and helmet. Have an assistant (also wearing gloves) help insert and replace rods. This method takes a long time and is very dangerous, so know when, where, and how to use it.

BALLISTIC BREACHING The use of a 12-gauge shotgun with Hatton rounds to blast or break any lock or hinge so that the door can be defeated by pushing or pulling. Tools: A Remington breaching shotgun. This gun holds only four rounds and has no stock, but it does have a breaching muzzle brake to bite the door and a hand shield on the pump. This weapon must also have a red light so the user can see the lock.

Pros: Easy, quick, and lightweight. Allows for surprise entry. Can be used as a weapon. Of the methods mentioned so far, this is the only one where the operator can avoid standing right in the opening and leaving himself vulnerable. Cons: May take significant time if the operator fails to select the right tool. Noisy and limited capacity. Best application: When breaching interior doors, wood doors, or hollowcore metal doors. Best practices: Ready the shotgun on the approach, then switch the red light on (if without night-vision goggles). Stand against the wall facing the hinges or doorknob, making sure to avoid 90° angles. Stab the door at a 90° angle in the spot where the deadbolt is just outside the frame on the door. Then lift 45° and push 45° away. This will ideally create a

situation in which the door is struck and the frame is also damaged. Immediately kick the door in if it is a push door and you are breaching the knob. If the initial attempt fails, follow up with shots immediately above or below, then re-kick the door. If it is a pull door and you need to attack the hinges, start from the bottom and work up; remember that the lower hinge is 12 inches from the bottom of the door, the middle hinge is across from the handle, and the upper hinge is 10 inches from the top of the door. Once the door is breached, the breacher should not be one of the first two or even the first four team members through the opening. Instead, he should safe the shotgun with the action open and get to his primary weapon while his squad makes entry. (Use a magnet to secure the shotgun to the vest.) In the event that it is an interior door and there are only two men to enter, the breacher should use the shotgun as his primary weapon for that entry if there are any rounds left. Otherwise, his partner will need to wait for him to get his primary up, then they can both enter.

Tools: Broco makes one of the best. Pros: Silent, powerful, and lightweight. Requires minimal training. Cons: Device needs regular maintenance. Some skill and experience helps. Best application: When breaching any door, window, or other potential opening where silence is a requirement. This device takes some experience to get a positive breach on the first attempt. Placement is key. Best practices: Maintain sound and light discipline. Use your squad to cover your work. After the door is defeated, move out of the way and stow your gear.

PNEUMATIC METHOD

HYDRAULIC METHOD This method involves the use of hydraulic pressure from a manual pump with oil. The oil powers a small handheld device that splits with 5 tons of force and can move up to 5 inches. There is an available frame-splitter attachment that can push the frame of an inset door apart.

34 The Counter Terrorist ~ October/November 2017

Same as above, but with the use of a pressurized air tank on the breacher’s back. This enables the quick application and release of pressure. Pros: Fast, powerful, and silent. Cons: Cumbersome; dangerous to have a tank on your back. Best application: When breaching any door, window, or other potential opening where silence is a requirement. This device takes some experience to get a positive breach on the first attempt. Placement is key. Best practices: Maintain sound and light discipline. Use your squad to cover your work. After the door is defeated, move out of the way and stow your gear.


COUNTER TERRORIST AD - 2017 FINAL.pdf

1

2017/09/28

5:53 PM

Circle 277on Reader Service Card

C

M

Y

CM

MY

CY

CMY

K

Circle 335 on Reader Service Card

The Counter Terrorist ~ October/November 2017 35


Best practices: Maintain sound and light discipline. Use your squad to cover your work. After the door is defeated, move out of the way and stow your gear.

EXPLOSIVE METHOD

ELECTRONIC METHOD Same as above, but in this case, the two primary tools are operated by a DeWalt or Makita handheld device that resembles a drill. Pros: Silent, fast, powerful, and light. Cons: Needs batteries; requires skill. Best application: When breaching any door, window, or other potential opening where silence is a requirement. This device takes some experience to get a positive breach on the first attempt. Placement is key.

The use of various explosive material, such as TATP, data cord, and C-4, titrated to a level appropriate to the object being breached. Pros: Powerful and versatile. Allows for surprise entry and offers shock value. Cons: Requires extensive training and experience or it can be dangerous. Best Application: When breaching solid walls, brick, block, steel, doors, etc. Best practices: Should only be employed by individuals with specific training and experience; not everyone on the team will be an explosive breacher. Charges must be adjusted to the specific needs of the breach; this requires consideration not only of what

36 The Counter Terrorist ~ October/November 2017

you are defeating, but also of the overall structure, what is behind the door, and what you have around you as a point of cover at the time of detonation. •


ALWAYS BE READY Marco Bettosini (321) 689-9592

Northern Florida Sales Rep bettmj@aol.com

GET READY AT 511TACTICAL.COM Circle 8 on Reader Service Card

The Counter Terrorist ~ October/November 2017 37


Innovative Products DESANTIS GUNHIDE’S NEW SL RAPTOR HOLSTER, STYLE 147

The SL Raptor is a self locking OWB/IWB Kydex- thermoformed holster. It is formed with a curved back with most of the detailed molding on the outer portion. This adds to both comfort and concealment. It will accommodate belt loops up to 1 3/4” and IWB soft polymer straps. $83.99. http://www.desantisholster.com/SL-RAPTOR

HIGHCOM RIFLE ARMOR KIT (RAK)

BREAKTHROUGH® CLEAN TECHNOLOGIES

Breakthrough® Clean Technologies offers the finest and most effective, nontoxic, odorless, and stain-free solvent and lubricants. Breakthrough® MilitaryGrade Solvent helps remove all carbon, copper, lead and barrel fouling, giving you a no-residue true clean. This non-flammable (150°F flashpoint) militarygrade cleaner won’t stain your wood, plastic or polymer components and is safe on Cerakote and hydro-printing. Our Battle Born Oils and grease are a blend of the finest quality syntheticbased oils and treated with the most effective extreme pressure additives, corrosion inhibitors, anti-oxidant, anti-foam and anti-wear additives. This unique combination provides maximum firearm lubrication and protection in extreme environmental conditions and temperatures (From -90°F to 510°F). Breakthrough® Clean Technologies is the choice for gun owners who settle for nothing less than the best when it comes to the care of their firearms, bows, knives and fishing reels.

Due to increasing safety concerns for our armed forces and law enforcement and driven by increasing security threats across regions, including advances in explosive devices, HighCom’s Rifle Armor Kit (“RAK”) which is a critical response platform for quick deployment over plain clothes or uniform for added rifle armor protection; and its Blast Mitigating solutions to mitigate blast pressure from IEDs provide our military and LEO’s with much needed and desired protection capability. HighCom is a USA manufacturer of NIJ Certified personal body armor products. In fact, HighCom became the first company in the world to achieve BA 9000 certification, NIJ’s new body armor quality management standard. Our R&D testing facility, along with our manufacturing and distribution plant are located in Columbus, Ohio. BlastGard developed a unique blast mitigation technology called BlastWrap that offers revolutionary blast mitigation/protection against all blast and fire/burn threats. We are sole source with USA government as a Safety Act Product. 38 The Counter Terrorist ~ October/November 2017


Circle 19 on Reader Service Card

The Counter Terrorist ~ October/November 2017 39


PRODUCT REVIEW

Targetize: Never Miss Again

F

irearm training sessions and range time experience may change from today onward, and there is a good reason why. The TargetizeTM app and sensor can be used to monitor every shot you make and analyze your shooting trends. The system supports dry, live, and CO2 powered pistol practice. It tracks your muzzle movement thousands of times per second and in return, its advanced dedicated algorithm makes personalized suggestions regarding your shooting style and technique. The real-time, shot-by-shot analysis is there to remind and teach you about your stance, grip, trigger pull, and muzzle movement. Any good instructor will tell you to analyze the shooter while he is taking the shot rather than analyzing the “outcome,” meaning the target, after the shot was made. Essentially, that is exactly what it does. The system measures muzzle movement, acceleration, and orientation to pinpoint the difference between your point of aim (POA) before you start making the shot and your POA by the time you are done pulling the trigger. An optimal shooting technique is one that does not interfere with your sight picture and does not throw off your sight alignment during the trigger pull. There are many elements that can affect a good trigger pull—anticipating recoil, milking the grip, too much trigger finger, and so on—but most of these elements are very hard to detect without an experienced coach standing next to

by Editorial Staff you. The real power is in revealing those tiny interferences you would otherwise be unaware of. This is where Targetize comes in. For every shot you make, the system will generate a personalized tip (supported by a detailed explanation) describing alterations that could improve your next shot, or it will tell you how great your

shot was. And if that is not enough, the system even provides stability, precision, and accuracy scores as well as a combined overall evaluation, allowing you to decide which aspect of your shooting you should focus on. Another very appealing feature of Targetize is the training drills and challenges incorporated into the app. The speed and accuracy challenges provide a new angle to a shooter’s training time by encourage better

40 The Counter Terrorist ~ October/November 2017

performance so that the shooter can unlock different levels and achievements based on skill level. An additional advantage of Targetize is that it provides bullet travel direction for targets that will not show bullet placement otherwise (such as steel targets or targets in dry fire practice.) Knowing what your target would have looked like if you maintained the same POA while shooting multiple or transitioning targets makes it easier to detect shooting trends and therefore understand your mistakes or strengths. Targetize also tracks performance over time and highlights the shooter’s most common mistakes. The history records are chronologically organized and include the number of bullets shot per session, a trace line representing muzzle movement during each shot, performance scores for each bullet, and a techniquerelated suggestion. Targetize was developed and tested by an elite forces unit whose shooting instructors are veterans of the Israel Defense Forces (IDF). The knowledge, drills, and tips incorporated into the system all come from reallife scenarios and years of teaching experience. Taking Targetize to the range would be like having your own virtual coach who helps you focus on the things that matter most to your technique. The cost of a set ranges from $129.99 to $149.99 USD and includes a sensor, a rail mount, a charging cable, a hardshell case, and the free app. •


Circle 279 on Reader Service Card

The Counter Terrorist ~ October/November 2017 41


TRAINING REVIEW

Training Course Review: Team O’Neil Car Control School

I

would like to begin this review with results and move backwards. Simply put: I went to Team O’Neil Rally School to become a better driver—and I did become a better driver. The school offers several courses for DoD components and federal agencies, so it had been on my radar for years. I had even heard from coworkers how great it was. I knew I would go at some point, but with my robust work schedule, it was hard to make everything line up just right. It wasn’t just work that interested me in Team O’Neil Rally School, though. Ever since my youth, I’ve loved sports cars. My first car was a 1993 Ford Mustang 5.0 coupe five speed. It was unreliable, unrefined, and unsafe—but it was a lot of fun. From there I got into a 98 Mustang GT. I drove that car for about a year, then decided to get serious and purchased a 1998 BMW M3 coupe five-speed. In short time, I was able to drive the car with great confidence, topping it out once a week, hand-braking U-turns, and even finding a point in the road where I would jump the car about a foot in the air at 60 miles per hour. It was an amazing machine. After returning stateside, I went from my brother’s 1988 Mercedes SL560 to a BMW 135. That car fit me like a glove until it was totaled by a commercial truck that flipped on the highway.

by Editorial Staff In the Israel Defense Forces (IDF), I received training on operational driving, mostly using modified civilian vehicles designed for off-road use in austere environments. It was fun—but not as fun as Team O’Neil Rally School, mostly because the vehicles had a high center of gravity, so speeds and angles had to be

42 The Counter Terrorist ~ October/November 2017

reduced to account for losses in stability. I originally signed up for Team O’Neil’s five-day course, which is the school’s “whole package.” I ended up doing only three days—but you can take the classes à la carte for one to five days, then come back later and make up the rest. By my third day, I was in an early


90s BMW 3 series with a straight-six motor, five-speed transmission (though I never got out of third gear), full cage, racing harness, and all the other goodies. I was able to hit speeds of 60 miles per hour on a dirt road and actually control the car on hairpin turns, slides, straightline breaking, 180º turns, pendulum turns, and left-foot breaking. Of course, we didn’t start like that on the first day. We began our classes with front-wheel drive cars and modulation of the gas and break simultaneously to control the car in slides. We moved to all-wheel-drive Subarus with locked center differentials, then to rear-wheel cars. Rear-wheel drive feels the most intuitive and allows you to use rightfoot braking. Front-wheel drive sucks and you have to use left-foot braking. All-wheel drive is the easiest and safest for most conditions. Personally, I elected to stay in the BMW for the rest of the third day, as that was closest to what I normally drive. Each evening, we learned about how to set up a car for high-speed off-road maneuvering, suspension, reliability, safety, etc. One evening we also learned how to start a car without the keys. This was specific training for official purposes, of course. I will go back to finish my last

Circle 343 on Reader Service Card

two days in May of next year and will update this review accordingly. To sum it all up, I would highly recommend a trip to Team O’Neil Rally School in New Hampshire. NH is a safe

place with little crime, where businesses accept cash and there are lots of friendly faces, dirt roads, and fast cars.•

Professionals Use DIAMONDHEAD

Sights, Rails & Accessories for AR15 / M4 & AR10 / .308 www.Diamondhead-USA.com

©2017 Diamondhead USA, Inc.

Circle 259 on Reader Service Card

The Counter Terrorist ~ October/November 2017 43


BOOK REVIEW

Book Review: The Road to Character by David Brooks

I

enjoyed David Brooks’ book The Road to Character because it reminded me of home. If you’ve read this book, you may be thinking, “Huh?” Let me explain. I was raised in South Florida, but not by my parents. After a vicious custody battle, the court ruled that my grandparents were best fit to care for me. This occurred in 1982, when I was just two years old. From that time until 1994, I lived with my grandfather Nate and my grandmother Shirley, who were born in 1918 and 1923, respectively. Make no mistake about it, their generation truly was the greatest generation. When my peers ask what it was like as an only child being raised by his grandparents in the 1980s, my answer is that my experience was a lot closer to 1955 then 1985. You see, my grandfather was a Merchant Marine in WWII and was torpedoed twice in theater. He was very patriotic and refused to buy a Japanese car—or Japanese anything else, for that matter. He thought made in the USA was the only way to go. He ruled the house with an iron fist; discipline was how he lived his life. My grandmother was similarly strong-willed; in fact, she was nicknamed “The General” because of her decisive, stubborn character. Brooks puts great value on people like my grandparents—people of a generation who suffered and experienced quiet and humble victories. In The Road

by Editorial Staff

to Character, he contrasts these people with their present-day counterparts. As Brooks explains, individuals today are measured by their résumés and the accomplishments they can put on paper and add up. In years past, he argues, people were judged not by their résumés but by their “eulogy virtues,” or those characteristics they possessed irrespective of any life accomplishments. Brooks

also points out that there is a difference between doing good and being good— meaning that a single good act does not make one “good” and recognition for one’s actions is not what quantifies their worth. Brooks clearly has a sense of nostalgia for the way things used to be, presenting

44 The Counter Terrorist ~ October/November 2017

them as if they are the way things ought to be. I agree. In today’s world, there is no character. Young people just want to go viral; that’s all that matters to them. Brooks illustrates this point with a simple example: When a football player today makes a single touchdown, he overreacts with enthusiasm as if he just cured cancer. Contrast this with soldiers returning from World War II, who were humble, quiet, and satisfied with their victory. I like the way things were before technology took over and social media became the proving ground. Today, the United States has 100 million more people than it did in 1980. Do you think that this increase has blessed us with a surplus of hard-working, intelligent people who contribute to the betterment of society? Surely some Americans possess these characteristics, but turn on the TV and you will soon find that the majority are interested in using this country like a service and not in serving. Get to know the nation’s youth and you will quickly realize that this generation, while not lacking access, may be misguided in their aspirations. I recommend The Road to Character in the hope that it can help reverse this trend. If we take Brooks’ lessons to heart, perhaps America will once again become a country that celebrates eulogy virtues rather than résumé accomplishments.•


MINI SLIDE $71 ®

MSRP

99

Style 086

• Premium saddle leather • Tight riding holster, highly concealable • Precision molding & tension device

SUPER FLY $39 99 ®

MSRP

STICKS ALMOST LIKE FLY PAPER

WITHOUT FLAP

Style M44

• Removable, reversible outer flap to further disguise firearm • Holster will not move out of position in pocket • Available for most pocket guns • Special polymer insert prevents molding

WITH FLAP

COZY 99 $ 81 PARTNER MSRP

®

Style 028

Die Hard Ankle Rig

• Premium saddle leather • Precision molding & tension device • Memory band retains holster’s shape for easy one handed re-holstering

®

MSRP

88 99

$

Style 014

• Tough leather-lined holster • Neoprene leg band, padded with foam & lined with sheepskin • Conventional thumb break

800-GUNHIDE 631-841-6300 Dept #CTO7

431 Bayview Avenue Amityville, NY 11701

desantisholster.com Circle 241 on Reader Service Card

The Counter Terrorist ~ October/November 2017 45


ADVERTISER INDEX

Counter The

OCTOBER/NOVEMBER 2017 VOLUME 10 • NUMBER 5

Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page

Ad/Company • website and/or email............................................................................................... RSN Number

37

5.11• www.511tactical.com............................................................................................................................ 8

4

12th Annual Homeland Security Professionals Conference • www.thecounterterroristmag.com/conference.177

41

4th Annual Police K-9 Conference • www.k9copmagazine.com................................................................. 279

39

Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com..................................... 215

3

American Public University • www.amuonline.com/counter-terrorist............................................................... 25

2

Barrett Firearms Manufacturing • www.barrett.net/firearms/mrad............................................................. 121

28

Breakthrough Clean • www.breakthroughclean.com........................................................................................ 6

28

Cole Engineering Services Inc. •bob.walker@cesicorp.com........................................................................... 14

45

DeSantis Holster & Leathergoods • www.desantisholster.com.................................................................... 241

43

Diamondhead• www.diamondhead-USA.com............................................................................................... 259

47

Elevated tactics by SSI • www.homelandsecurityssi.com............................................................................... 313

13

FLIR Systems, Inc. • www.flir.com/primed................................................................................................... 339

29

Gear4Grunts LLC • www.gear4grunts.com..................................................................................................... 24

35

Highcom Blastgard • www.highcomarmor.com........................................................................................... 335

35

K9 Cop Magazine • www.k9copmagazine.com........................................................................................... 277

33

MACTAC • www.homelandsecurityssi.com...................................................................................................... 228

7

Patriot3 • www.patriot3.com....................................................................................................................... 301

48

Phantom Products Inc. • www.phantomlights.com....................................................................................... 209

21

PVB • www.SSIPVB.com............................................................................................................................... 226

43

Southern Police Equipment • www.southernpoliceequipment.com................................................................ 343

12

TCP Security Solutions• www.TCP-SS.com................................................................................................. 249

27

Venture Ballistic Composites• www.venture-ballistics.com........................................................................... 143

46 The Counter Terrorist ~ October/November 2017


www.homelandsecurityssi.com Find out more at:

TAKE YOUR TRAINING TO A HIGHER LEVEL...

SSI ELEVATED TACTICS TRAINING Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn: • Vehicle driving and operating techniques in a variety of situations • Global case studies of real-world operations using the specific equipment • Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults • Elevated obstacle negotiation and firing platforms • Emergency evacuations, climbing and descending options • Distraction and deception techniques ® SECURITY • and much more...

SOLUTIONS INTERNATIONAL

Protecting the Homeland Together ®

Elevated Tactics Training provided in partnership with Patriot3.

Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 313 on Reader Service Card

The Counter Terrorist ~ October/November 2017 47


Circle 209 on Reader Service Card


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.