FSB poisons hvt? • UC OPS & WIKILEAKS • animal liberation front • lawfare
Journal for Law Enforcement, Intelligence & Special Operations Professionals
Counter The
APRIL/maY 2011
Volume 4 • Number 2
child soldiers at war around the world
An SSI Publication ®
APRIL/MAY 2011 USA/CANADA $5.99
www.thecounterterroristmag.com The Counter Terrorist ~ April/May 2011 1
Š 2010 Thermo Fisher Scientific Inc. All rights reserved.
Every second matters.
When time and safety are critical, military and civilian first responders use Thermo Scientific handheld chemical identification instruments to rapidly identify explosives, precursors, narcotics and other chemical hazards directly at the point of need. With more than 4,500 handheld chemical identification instruments deployed worldwide, we understand what first responders demand of their equipment—and why every second matters. These insights were key as we developed FirstDefenderŽ RM and FirstDefender RMX, our next generation Raman instruments, which are even faster and easier to use than ever before. For rapid, accurate analysis of a wide range of potential chemical hazards,
FirstDefender RMX and FirstDefender RM Next generation Raman instruments enable rapid identification of unknown chemicals in the field.
turn to Thermo Scientific handheld instruments, formerly sold under the Ahura Scientific brand. To schedule a demonstration of our newest solutions, visit www.thermoscientific.com/ahura or call +1 (978) 642-1132.
Moving science forward
2 The Counter Terrorist ~ April/May 2011
Circle 104 on Reader Service Card
The Counter Terrorist ~ April/May 2011 3
Circle 99 on Reader Service Card
Counter
The Journal for Law Enforcement, Intelligence & Special Operations Professionals
XRT SuiT
SeriouS CBrN ProteCtioN for CritiCal MiSSioNS
APRIL/maY 2011
Volume 4 • Number 2
- Now ceRTified To AVoN c50 ANd fM12 ReSpiRAToRS ®
®
- bReAThAble goRe cheMpAk fAbRic foR eXTeNded weAR
COVER story:
- fRoNT-eNTRy deSigN wiTh iNTegRATed cbRN gloVeS ANd booTieS eNAbleS quick Self doNNiNg
child soldiers at war 32 around the world
- eXTRA STReNgTh fAbRic ANd SeAMS To pReVeNT blowouTS
contents
- No cheMicAl TApe
32
P R O T E C T I O N
22
Homeland Defender
TM
by
44
60
www.blauer.com 800.225.6715 4 The Counter Terrorist ~ April/May 2011 ISO 9001:2008 Certified
www.blauerhomelanddefender.com Circle 66 on Reader Service Card
By Eeben Barlow
FEATURES: Firsthand: 8 undercover operations and wikileaks
By Bill Majcher
22
Case Study: fsb poisons high-value target? By Glenn McGovern
the animal liberation front 44 and the rise of ecoterrorism
By Glenn McGovern
60
lawfare: a supporting arm in modern conflict By David B. Harris and Aaron Eitan Meyer
departments: 6
From the Editor
30
Book Review
Unintended Consequences Science, Strategy and War: The Strategic Theory of John Boyd
69 Innovative Products MK-1 Robotic Arm, Mini Suppressor, Pocket Filter 72 Training Review Global Security Workshop Cover: Child in a rebel camp in the north-eastern Central African Republic. Photo: Pierre Holtz / UNICEF CAR
The Counter Terrorist ~ April/May 2011 5
Counter The
from the editor:
Unintended Consequences By Chris Graham
H
Volume 4 • Number 2
osni Mubarak, President of Egypt, has apparently lost his grasp on power. Mubarak has ruled that nation since President Sadat was assassinated for signing a peace treaty with Israel in 1981. Many media pundits celebrate the fall of Mubarak. Do we have reason to share their excitement? In the late 1950s, Fidel Castro overthrew Cuban dictator Fulgencio Batista. What emerged afterward were a communist dictator and a steady stream of refugees. In 1979 a revolution overthrew the oppressive Shah of Iran. What emerged from that revolution was a Shiite Islamic state with a secretive ruling council whose fingerprints can be found on a long list of terrorist atrocities around the world. Also in 1979, Nicaraguan dictator Anastasio Somoza was assassinated. The communist thugs of the Sandinista National Liberation Front seized power. In 2003, a US military invasion ended Saddam Hussein’s rule of Iraq. Hussein was a ruthless dictator—a ruthless dictator that functioned as a counter-weight to Iran and suppressed a number of Islamist terrorist groups. After years of combat and numerous backdoor deals with both Shiite and Sunni militants, Iraq has quieted... for now. In 2006, the Palestinian territories voted for Hamas control. Muslim loyalties and Hamas coercion resulted in handing governance to a vicious terrorist group. In 2008, American officials encouraged Pervez Musharraf to step down from power in Pakistan. Musharraf was an oppressive leader. He was an oppressive leader that made some significant efforts to counter Islamic terrorists. Currently, terrorist groups enjoy safe-haven within parts of Pakistan and Pakistani intelligence personnel have been captured serving with insurgents in Afghanistan. Is Mubarak’s loss of power beneficial? Hosni Mubarak has suppressed Islamic terrorists for 30 years. After Mubarak is gone, will the people of Egypt enjoy individual liberty and protection of their personal property? Time will tell, but they may see power subverted by the disciplined and organized thugs of the Muslim Brotherhood instead. The very same Islamic supremacist group that spawned al Qaeda and many of the most prolific terrorist groups of our time may be the ultimate beneficiary. Furthermore, little consideration seems to have been given to the likely actions Iran will take in support of their ruling council’s ambitions. Semper Fidelis,
Chris Graham Editor of The Counter Terrorist
6 The Counter Terrorist ~ April/May 2011
Journal for Law Enforcement, Intelligence & Special Operations Professionals
APRIL/maY 2011
Editor Chris Graham Director of Operations Sol Bradman Director of Advertizing Carmen Arnaes Director of Production Kelli Richardson Contributing Editors Eeben Barlow Jennifer Hesterman Richard Marquise Steve Young Graphic Design Morrison Creative Company Copy Editor Laura Town Office Manager Lily Valdes Publisher: Security Solutions International 13155 SW 134th St. • STE 204 Miami, Florida 33186
ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. 33186 or info@thecounterterroristmag.com The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: PARS International Corp. Web: www.magreprints.com/quickquote.asp Email: reprints@parsintl.com Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can also contact the editorial staff:
www.thecounterterrroristmag.com © 2010 Security Solutions International
The Counter Terrorist ~ April/May 2011 7
Circle 13 on Reader Service Card
WikiLeaks bunker. Photo: Stellios
By Bill Majcher
Firsthand:
undercover
Undercover Operations and WikiLeaks
“The road to Hell is paved with good intentions.” Counter The
8 The Counter Terrorist ~ April/May 2011
A
lthough I am a Canadian, I have frequently worked covertly alongside US agencies, including the FBI. During one long-term undercover operation, I was required to meet a corrupt South African banker who refused to meet in the United States. This banker facilitated money laundering for weapons traffickers, drug traffickers, and organized crime elements. The meeting was instead set up in a notoriously corrupt country. Often, when doing covert operations we notify local authorities, but because
the local police and government were believed to be corrupt, the FBI decided not to compromise security by notifying officials of this country. Instead, the US ambassador was apprised and gave permission for me to travel, meet, and record my activities. As a result, I was required to provide my actual name and my covert name. This was sent out by cable to the US ambassador. In addition, details of my “business” cover were provided, including names of covert companies. If this cover information were sent out under separate cable, it would look like a harmless US government business initiative to the casual reader. After three years undercover, I reached the point where I had convinced high-level organized
When WikiLeaks dumps millions of documents with names and locations, these activists have no way of knowing who or what is compromised. Assange is a babe in the woods when it comes to knowing the effect of releasing sensitive data into the public domain.
Julian Assange at New Media Days 09 in Copenhagen. Photo: New Media Days The Counter Terrorist ~ April/May 2011 9
It was at this point that the lawyer advised he could arrange for me to purchase PayPal, thus enabling me to launder vast sums electronically and negating the need to charter a plane and fly bulk cash into Gibraltar.
crime figures that I had several tons of cocaine sitting in a Jamaican warehouse. Unfortunately, we had to make arrests prematurely because a junior FBI agent inadvertently provided me with the same covert company bank account used in another FBI sting operation about to be made public. The risk that this covert company name could turn up in the public domain was too great, thus the decision was made to discontinue operations and make arrests. It is not hard for a sophisticated and motivated criminal or enemy to data mine information available from other investigations to search for names to compromise covert companies and individuals. The South African banker I met with spoke of his secure information technology channels and his ability to defeat the FBI Carnivore computer
program. He boasted of his bank’s ability to do a “hot swap” so all client data would be fired off to a bank in another country in the event of a police raid and all that would be found in bank files would be false data. I met this banker after 9/11 and President George Bush’s “Axis of Evil” speech. The banker had no qualms about asking me to launder steeply discounted government bonds for Iran, Libya, and North Korea. Most distressingly, he had correspondent banking relationships with many global banks! Incidentally, this banker introduced me to a lawyer who offered to sell me PayPal for cocaine money. This offer by the lawyer to arrange to sell me PayPal was made just months prior to the purchase of PayPal by eBay. I had stated that my criminal organization was generating $2–3 million dollars per day in street currency. Because of the volume of cash involved, this lawyer, who had been involved with Sicilian banks a decade earlier, advised he could launder $15M/ month through a Swiss banker in Gibraltar. The plan was to fly $10M/ month out in cash and send $5M via wire transfer. It was at this point that the lawyer advised he could arrange for me to purchase PayPal, thus enabling me to launder vast sums electronically and negating the need to charter a plane and fly bulk cash into Gibraltar. As an added bonus, I could also have access to all the information provided by PayPal clients and users for other criminal uses. WikiLeaks, until recently, was a significant recipient of “anonymous” donations received through PayPal. As an aside, this lawyer did in fact launder cocaine money for me and is now in prison.
Circle 230 on Reader Service Card
10 The Counter Terrorist ~ April/May 2011
Circle 49 on Reader Service Card
The Counter Terrorist ~ April/May 2011 11
xp o eE wCa s Sh o
FR EE
WikiLeaks
Counter The
Journal for Law Enforcement, Intelligence & Special Operations Professionals
presents: 6th Annual
Homeland Security Professionals Conference and Exposition October 3 - 7, 2011 • The Palace Station Hotel and Casino •
Our Mission:
Las Vegas, Nevada
Protecting the Homeland Together
This year’s conference looks at developments around the Globe that will impact on terrorism and crime in the USA. Instead of looking at attack response, as in past years, the conference will be dedicated to the prevention of incidents by examining the influences on home-grown terrorism and crime here from outside the country.
WikiLeaks is an international, nonprofit organization that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. The WikiLeaks website (launched in 2006) and its very public founder, Julian Assange, are vilified and praised for dumping thousands of pieces of secret or classified military and government communications or “cables,” as known in diplomatic language, into the public domain. I appreciate the purity of purpose behind what WikiLeaks claims to stand for. Assange stated in a recent Time magazine article that WikiLeaks is “an organization that tries to make the world more civil and act against abusive organizations that are pushing it in the opposite direction.”1 Well, I too have spent years working for organizations that aim to make the world more civil
and act against abusive organizations or individuals bent on eroding the freedoms and privileges that many take for granted. While our objectives may be similar, our vision differs in that I make an effort to see the world as it is, but I believe that Assange sees the world as he wishes it to be. In the Time article, Assange responded to the question of whether WikiLeaks has put lives in jeopardy. “This sort of nonsense is trotted out every time a big military or intelligence organization is exposed by the press. It’s nothing new and it’s not an exclusively American phenomenon by any means. We get that on nearly every post we do. However, this organization, in its four years of publishing history, has never caused an individual, as far as we can determine, or as far as anyone else can determine, to come to any sort of physical harm or to be wrongly imprisoned,” Assange said. This statement is nonsensical
• The influence of inciters like Al-Awaki from countries like Pakistan, Afghanistan, and even Canada and the probable direction this will take in 2012 • How International Sharia finance helps to foment incitement in the USA • International trends in terror attacks and what we can learn • Profiling is not a four letter word: how better behavioral analysis can prevent tragedies like active shooter incidents
FOCUS On the
situation You don’t have time to get a tiny sight post centered in a fuzzy circle on an outof-focus target. This is the fundamental draw back of iron sights and the benefit of Leupold illuminated tactical patrol optics.
• New Technologies to help detect and prevent terror attacks • Humint: Intelligence in the USA and what we can learn about Intelligence efforts against the insurgency in Iraq • Likely Terror modus operandi based on expert analysis of 2011 incidents • Crime, Fraud, Drugs and Terrorism - deadly crossroads and what we can do. • And much more! Apart from a line-up of world class speakers as you have come to expect, there will be numerous activities around the conference enabling you to network with your colleagues in the greatest entertainment city in the World. Sign up for Vegas now by visiting www.thecounterterroristmag.com/conference
SSI
®
August Mission: August 21-29, 2009 November Mission: November 6-14, 2009
SECURITY SOLUTIONS INTERNATIONAL
TACTICAL PRISMATIC 1x14MM
Protecting the Homeland Together ®
Register Today!
www.thecounterterroristmag.com/conference • 866-573-3999
Circle 35 on Reader Service Card
12 The Counter Terrorist ~ April/May 2011
This conference is approved for graduate and undergraduate credits through Saint Leo University
Ebay & Paypal European HQ. Photo: Raymond Okonski
Circle 218 on Reader Service Card
The Counter Terrorist ~ April/May 2011 13
hubris on the part of Assange. It is a disingenuous statement that masks the fact these sanctimonious arbiters of illegally obtained cables have little, if any, experience in the methods and actions that some of the governments involved take daily to save lives and protect society. The vast majority of people employed by covert agencies and governments are unaware of the methodologies, personnel, and tradecraft employed to support and protect personnel in the field, provide payments to informants and agents, or facilitate source and witness protection programs. There is nothing in the background or practical experience of Assange to support the assertions that the information his organization releases does not jeopardize lives or operations. As such, when WikiLeaks dumps millions of documents with names and locations, these activists have no way of knowing who or what is compromised. Assange is a babe in the woods when it comes to knowing the effect of releasing sensitive data into the public domain. Those running covert operations and informants have all had to shut down a file or an investigation to protect a source, an operative, or another investigation as the exposure of one can lead to the exposure of another. As governments have not disclosed which investigations or persons have been compromised by WikiLeaks, Assange claims this as a sign that he has done no harm. However, Assange must realize governments are in a catch-22. To acknowledge who or what has been compromised risks exposing more people. Assange counts on our values to protect his moral high horse and self-righteousness. Meanwhile, PayPal has been the
conduit by which WikiLeaks receives funding. Is WikiLeaks aware of the source of its funding? Does it follow a “Know Your Client” rule? I am confident that it does not. I suspect WikiLeaks is willfully blind or naïve to the fact it is very likely an unwitting dupe of repressive and foreign intelligence services working against the very “freedoms” that WikiLeaks claims to fight for. If I could buy PayPal and use it to launder my street drug currency, how difficult would it be for an enemy of Western governments to use it to provide funding to sustain an organization that willingly gathers and distributes information that is useful to interests contrary to our own? In the same Time article, Assange was asked if there were instances in diplomacy in which secrecy was necessary and an asset. He replied, “Yes, of course. We keep secret the identity of our sources…take great pains to do it. So secrecy is important for many things, but shouldn’t be used to cover up abuses.” While WikiLeaks protects its sources, it does not worry about venturing into areas where it has little knowledge, and exposing thousands of individuals working covertly for Western governments to potential death, torture, kidnapping, and violence. Most interestingly, WikiLeaks seems to target Western governments, such as the United States, while inexplicably doing little to illuminate totalitarian and repressive regimes and rogue states.
it’s only sCienCe FiCtion
until you make it FaCt.
It started as a mission to create a prosthetic limb to replace those lost to IEDs and other hazards found in the field. Today, it offers a way to prevent those injuries from occurring in the first place. The MK-1 Robotic Arm was pioneered by HDT to provide a light-weight, high-strength arm with unmatched dexterity. These attributes make it ideal for disarming explosives while its human operators remain out of harm’s way. It represents the most-advanced robotic arm in existence, and is a sterling example of the innovation HDT’s engineers bring to its shelters, ECUs, Power Systems and other industry-leading products.
Backstopping Following 9/11, I audited Canada’s national backstopping program for all covert ops and rewrote the operational plan with Inspector Brad Desmarais,
hdtglobal.com Circle 106 on Reader Service Card
14 The Counter Terrorist ~ April/May 2011
Circle~244 on Reader2011 Service15 Card The Counter Terrorist April/May
WikiLeaks only has a few pieces of the puzzle, so when the activists release something without full context, they do not know the extent of the damage they inflict.
currently the officer in charge of drug and gang enforcement for Vancouver City Police. This plan was designed to set up a global backstopping regime that would protect covert operators, informants, agents, and witnesses, as well as relocated and protected persons. There are many myths about undercover work and what makes a good undercover operative. It is fair to say that a successful operation is only in part about the undercover officer. An undercover operation is similar to a NASCAR or Formula 1 race. The undercover agent, like the race car driver, gets most of the glory if they meet the objectives of the investigation or take the checkered flag. But, in the case of the race win, it is not the driver who builds the car, develops the race strategy, or keeps the car in service with the pit crew. Similarly, an undercover operative is not an
investigator, but an investigative aid who uses skills to gather evidence, intelligence, and/or the truth about an event, an individual, or a group. This information is used by others to determine an outcome. Depending on the size and scope of an investigation, a great deal of work and effort are deployed to sustain a long-term operation. Typically, an operation is supported by a trained and designated cover person, a surveillance team, a cover team (for operator security), a financial person to manage accounts, and the reams of paperwork for tracking expenses (both secret and open). Members of the team will file travel authorities, locate and maintain safe houses, file reports and exhibits, manage files, coordinate and conduct follow-up investigations, liaise with other agencies, provide information
Introducing EODbuyersguide.com: the easiest way to access news, information and our WORLDWIDE DIRECTORY of manufacturers for all EOD products, bomb squad equipment and supplies.
Explosive Ordnance Disposal Manufacturers Directory • 570.290.9123 16 The Counter Terrorist ~ April/May 2011
Circle 208 on Reader Service Card
Circle Circle 98 8 on onReader ReaderService ServiceCard Card
Circle 188 on Reader Service Card
The Counter Terrorist ~ April/May 2011 17
Protest defending Wikileaks and asking for Julian Assange’s release in Madrid. Photo: OsvaldoGago www.fotografar.net to analysts, and conduct ongoing risk assessments, all while conforming with policy, budgets, law, and secrecy. Since the advent of Internet hackers and researchers trained to
search global databases, the risks of protecting identities and infrastructure to support covert operations have increased exponentially and are one of the greatest challenges in the fight
Protective security equiPment At ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support. • • • • •
CALIBER® Robot Hook & Line Kits Search Mirrors EOD Hand Tools Search Kits
ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3 Tel: 613.745.3600 I Fax: 613.745.3590 I Email: sales@icortechnology.com Toll Free: 1.877.483.7978 www.icortechnology.com 18 The Counter Terrorist ~ April/May 2011
Circle 81 on Reader Service Card
against terrorism and organized crime. That WikiLeaks appears to have no one on its editorial board trained or conversant in covert support methodologies indicates a reckless and negligent disregard for human life. Just the date and location of a specific cable is enough for a terrorist group to surmise there is an informant in the area. WikiLeaks only has a few pieces of the puzzle, so when the activists release something without full context, they do not know the extent of the damage they inflict. After all, while Western governments will not convict 10 guilty men to protect one innocent man, terrorists have, in fact, killed10 innocent men to stop one informant. In drafting Canada’s covert operational plan, we felt that creating a secure and competent covert infrastructure required layers of backstopping. We looked at best practices in which sophisticated money launderers placed, layered, and integrated dirty cash. We extrapolated that information to create original identities and layered those identities through a series of companies and bank accounts in a multitude of jurisdictions. As any major criminal knows, “jurisdiction equals freedom” because it is a complicated and timely procedure for any investigator to follow a trail through a myriad of jurisdictions and laws. To effectively set up such an operation, we had to create the “illusion” of a global commercial enterprise. This required dealing in common and civil law countries, which take very different views on how covert operations are conducted. This, in turn, required the cooperation of different government branches to elicit support and take action. Because of the
secret nature of the purpose for setting up these “commercial” links around the world, often diplomats working outside police, military, or intelligence services would communicate with foreign counterparts on our behalf to ask questions, learn local practices, and find out whom to approach to solicit
Circle 120 on Reader Service Card
The Counter Terrorist ~ April/May 2011 19
The cost in terms of time and money resulting from WikiLeaks’ disclosures is enormous.
support to make a covert venture actionable. These “commercial” items were in cables that seemed benign or at least not part of a police, intelligence, or covert operation because the premise was to use normal channels to support covert ops, including payments to agents and informants.
Conclusion Even if, hypothetically, no harm has arisen from the release of such information by WikiLeaks, it would be negligent for those in covert organizations to take the risk that they have not been compromised or will not be compromised in the future as a result of Assange’s gamesmanship. The cost in terms of time and money resulting from WikiLeaks’ disclosures is enormous. More importantly, it has likely created a temporary gap in the ability to fight crime and terrorism as valuable and limited resources are likely diverted to re-
create a new covert infrastructure. Some may view WikiLeaks and its founder, Assange, as some sort of “digital Robin Hood”—stealing secrets from the rich and powerful and sharing them with the masses. I happen to view Assange as a “digital anarchist.” I do not see a search for the truth, but rather a clearinghouse of stolen and unqualified data collected by any means possible and shamelessly “reporting” it as news, regardless of its accuracy, context, or consequence.
•
ABOUT THE AUTHOR Mr. Majcher is a decorated Royal Canadian Mounted Police Inspector now retired from public service and living in Asia. He is a veteran of international undercover operations and continues to live and work internationally as CEO of a global Family of Funds platform.
endnotes Time, Dec.13th, 2010 Vol. 176, No.24, Kate Peters. 1
Information is the foundation of good intelligence. American Military University offers one of the most well respected intelligence studies programs in the country. This well balanced and academically rigorous program is offered entirely online using open source materials and is taught by credentialed faculty with extensive operational and academic experience. Courses are designed specifically for working adults who are seeking to enter into or advance their careers in intelligence. Come find out what makes AMU the leader in intelligence education.
The B.A. Intelligence Studies offers concentrations in:
The M.A. in Intelligence Studies offers concentrations in:
Six Course Academic Certificates include:
• Criminal Intelligence • Intelligence Analysis • Intelligence Collection • Intelligence Operations • Terrorism Studies
• Intelligence Analysis • Intelligence Collection • Intelligence Operations • Criminal Intelligence • Homeland Security • Terrorism Studies
• Cybercrime • Digital Forensics • Information Assurance • Information Systems Security • National Security Studies
2009 & 2010 Effective Practices Award AwArd winner
2009 Ralph E. Gomory Award for Quality Online Education
LEARN MORE AT
OR CALL
amuonline.com/intelligence
877.777.9081
American Military University Push your mind. Advance your career. 20 The Counter Terrorist ~ April/May 2011
Circle 214 on Reader Service Card
Circle 108 on Reader Service Card
The Counter Terrorist ~ April/May 2011 21
Case Study:
FSB poisons high-value target? By Glenn McGovern
On November 1, 2006, Former FSB (Russian Federal Security Service) Colonel Alexander Litvinenko left his residence around 11:00 A.M. He caught the bus to the East Finchley tube station where he then took the train for a twenty-minute ride into London.
O
n his agenda was a meeting with former KGB colleague Andrei Lugovoi, at the Millennium Hotel in Grosvenor Square. The purpose of the meeting was to discuss a potential new business venture. After that, Litvinenko had scheduled a 3:00 meeting with a Mario Scaramella at a sushi restaurant in Piccadilly. This meeting had been confirmed only that morning and was for the purpose of discussing the murder of journalist Anna Politkovskaya. She had been a staunch critic of Russian President Putin, whom Litvinenko believed had ordered her assassination. At some point around noon, he arrived at room 441. It was during this meeting that an ambush was sprung. A tasteless and odorless poison was administered to Litvinenko via a cup of tea.1 The tea was laced with a poison five million times more toxic than hydrogen cyanide.2 With no ill effects, at shortly before 3:00 P.M., he departed for the
Counter The
22 The Counter Terrorist ~ April/May 2011
meeting with Scaramella, only to return at around 4:30 P.M. to the hotel’s Pine Bar. There Litvinenko met again with Ludovoi and Kovtun. The meeting was short and the three men soon went their separate ways with Litvinenko eventually getting home at 7:30 P.M. At 11:00 P.M. that evening, the ingested toxin began to noticeably take effect.3 The toxin would complete its deadly work twenty-two days later on November 23, 2006 at approximately twenty minutes after eleven in the evening. At that instant, history would document the first known case of a radiological element being used in a targeted killing. On November 3rd, Andrei Lugovoi departed England flying directly to Moscow. The use of poison to assassinate is a very subtle tactic. A deadly unknown substance administered covertly to kill the individual from the inside. Some affect quickly, some drag out a death while some mimic a natural death. Its method of delivery is also discreet: a mist
The use of poison to assassinate is a very subtle tactic. A deadly unknown substance administered covertly to kill the individual from the inside.
Millennium Hotel London Mayfair, Grosvenor Square entrance. Photo: Millennium Hotel London Mayfair
Photo: Arria Belli The Counter Terrorist ~ April/May 2011 23
Photograph of the grave of Alexander Litvinenko, Highgate Cemetary, London, United Kingdom. Photo: JohnArmagh in the face, a liquid poured into a drink or injected into the skin, a gel rubbed into an article of clothing or on a door handle. Regardless of form of delivery
or path of death, all allow the assassin to strike their target, even if at the height of day in the presence of numerous witnesses or even protective details.
ITEC is Europe’s No.1 exhibition and conference meeting the needs of those who define, influence, procure and implement military training. Held 10 – 12 May 2011, Koelnmesse, Cologne, ITEC brings together representatives from the industry, armed forces and government sectors in one location. A visit to ITEC 2011 gives you the opportunity to: Research the latest technologies from over 140 key suppliers to help you become more cost-effective Meet with existing and prospective suppliers to increase productivity of your contracts Network with decision makers and experts in a relaxed environment at the networking lunches and drinks reception By registering as a conference delegate you will gain additional access to: The ITEC conference where you can explore current and future training and simulation challenges Interactive conference sessions including keynote presentations, panel discussions and extended time for Q&A Food and refreshments during the conference sessions (excluding evening meals) Post conference presentation slides and notes for training purposes and more… Reserve your place as an ITEC delegate or visitor now to benefit from Early Bird rates. Visit www.itec.co.uk/register. For more information about the ITEC exhibition and conference visit www.itec.co.uk
24 The Counter Terrorist ~ April/May 2011
supported by
organised by
Circle 200 on Reader Service Card
Many will be ignorant, as is often times the victim, that they have been attacked. If the killing goes as planned, then the victim may be presumed to have passed due to natural causes, or at worst is labeled “cause unknown.” It is precisely this reason that makes investigating and researching such attacks difficult at best. It is only through assassination failures that methods of operation are learned. A perfect example of this occurred in the Ricin based killing of Georgi Markov. Had he not survived long enough to tell authorities of the umbrella incident, the Ricin capsule might never have been discovered. Further, this could possibly have caused Vladimir Kostov to remain ignorant to the fact that an attempt by similar means had been made against him. Since the discovery of the al Qaeda “Manchester Manual”, and subsequently reinforced by interrogations of terrorist training camp attendees, much has been fretted over of the use of poisons by al Qaeda operatives. As recently as December, 2010, media reports circulated regarding possible poisoning attacks in North America. While there has certainly been some limited history of the use of toxic substances by terrorist/extremist organizations, it has had but limited successes. The potential anonymity of poisoning makes the tactic appealing to hostile government agent(s), if more subtle than terrorist organizations often prefer. The type of organization that wishes to strike and disappear (aka: nonattributable operation) without leaving a trace and more importantly, without media grabbing headlines. Hence, the documented poison assassinations and attempts have come predominately from the hands of government agents. The total number of assassinations that have come by way of poison can never be known; such is the nature of the tactic. Those that are known are those
that failed to either kill quickly or not at all and thus become known through the resulting criminal and medical investigation. While there have been a handful of governments documented or strongly suspected of having dabbled in the deadly art, only one has apparently turned to its use repeatedly, that of the Russian government through the FSB
The total number of assassinations that have come by way of poison can never be known; such is the nature of the tactic.
NAME: Martha DEPARTMENT: Ballistic Lab PHILOSOPHY: Knowing that what I shoot and design is in the field saving the lives of those who protect us is what inspires me. Making armor better is just a small token for the commitment and dedication they show everyday.
proudly
since 2001
www.diamondbacktactical.com Circle 206 on Reader Service Card
!"#$%& 800.882.7667 ! !"
The Counter Terrorist ~ April/May 2011 25
Bulgarian historian Academician Georgi Markov. Photo: Vassia Atanassova - Spiritia
It is only through assassination failures that methods of operation are learned. A perfect example of this occurred in the Ricin based killing of Georgi Markov. Had he not survived long enough to tell authorities of the umbrella incident, the Ricin capsule might never have been discovered.
26 The Counter Terrorist ~ April/May 2011
and its forerunner, the nefarious KGB. In order to obtain the most understanding of this particular assassination, and the tactic in general requires what can be referred to as “reverse engineering of the attack.” Anyone who has ever served an arrest warrant, carried out a raid, conducted surveillance, even recruited an informant will appreciate the complexities an operation such as an assassination might involve. The intentional targeting of a specific individual is difficult enough, but in the case of a poisoning attack, it is compounded. Making some assumptions on the reasons poison is selected as the weapon of choice in an assassination can allow for greater insight into the methodology in its entirety. The following four points seem the most logical, although there may be many more: 1. Death is easily believed/ written off as natural. 2. Real cause of death will not show up in general toxicology scans. 3. Toxin can be delivered to the victim without their knowledge, or any third party becoming aware. 4. Toxin cannot be categorically traced back to the sponsoring entity. The intricacies of a poison based assassination are clearly considerable in addition to the normal required activities with any targeted violence: surveillance, rehearsal, and attack. Interestingly, it was found with this attack that Litvinenko had met with Lugovoi and Kovtun at the Millennium Hotel inside of the Pine Bar two weeks before, on October 16th. Was this meeting a rehearsal? It is hard to know with certainty, but it would seem logical. Further, it would be consistent with a previous poison based attack, that of the aforementioned Markov and Kostov (which involved the KGB through the Bulgarian Intelligence Service).
One of the first challenges of this technique would be selecting the toxin to be used. Given the characteristics of poison, what is available that can be easily transported and administered by the assassin(s) while at the same time not affecting them or cause for their discovery? What is available that can mimic a natural death in a relatively short period of time? Finally, what has not been used before (if an intentional poisoning is suspected, it stands to reason that previously known used toxins might be checked off the list first). This last point is clearly something understood by the KGB/FSB. They have employed a variety of methods to attack individuals. In the case of poisoning, during the 1950’s they are known to have used a similar toxin and delivery more than once. In that case, it was used twice in a very short period of time. The next step for the adversary would have to be an analysis of the victimology of their target. What aspects of their lives provide the best avenues of success? For instance, is the intended victim known to use recreational drugs and/or participate in activities law enforcement professionals tend to consider more high risk? In these situations, the adversary may consider rather than a complicated scheme, the best avenue would be to prepare a “hot shot” (i.e. a lethal dose of a narcotic) to kill, or stage a robbery gone wrong scenario. In the case of Mr. Litvinenko, a KGB trained officer who professed to have survived previous attempts and no doubt was aware of the possibility of his being targeted again, the victimology from the adversarial perspective would be classified as a hard target (i.e. maintains operational security, practices situational awareness and surveillance detection methodologies). Ultimately, it was decided by parties unknown that the toxin would be
Circle 52 on Reader Service Card
The Counter Terrorist ~ April/May 2011 27
Meeting of senior officials of the Federal Security Service in Moscow. Photo: www.kremlin.ru.
28 The Counter Terrorist ~ April/May 2011
administered through food or drink, which with this particular poison was the only way for it to become toxic to a human body. This method of delivery is perhaps the oldest of all precisely because it works. While a person may be suspicious and alert to possible attack, they still need to eat and drink. Therefore, if a situation or ruse can be developed that puts the target at ease, than the chances of success increase. The problem with the Litvinenko assassination from the perspective of an attacker that may have wanted anonymity was that the toxin, Polonium-210 was too exotic. While it is understandable that the rarity of this particular poison may have been believed to be a strong point, once it was properly identified its’ exoticness assisted law enforcement, to a degree, in the investigation. The nature of the toxin violated one of the key reasons for using poison in the first place. It allowed for it to be traced back possibly to the government responsible. While there will always be accusations as to who was responsible for possible poisonings, there is a certain amount of plausible deniability for a government. That however dissipates rapidly when the toxin is traced back nearly to one’s doorstep. Polonium-210 is one of the rarest
elements on Earth. It is invisible to the eye, tasteless and extremely deadly. A radioactive isotope, it releases only Alpha waves and has a relatively short half-life of only 138 days (inside the human body that half-life drops to only 50 days4 certainly a benefit to the assassins). Being only an Alpha emitter assisted the hit team in several ways. First, Alpha particles will lose their energy within about one to two inches of travel in the atmosphere and does not have the power necessary to penetrate a single piece of paper, let alone the epidermis of the human body.5 This made the transport of the toxin infinitely easier for the team in that as long as they did not consume or inhale the particles or allow for them to penetrate the skin through a wound, they were safe.6 Second, being only an Alpha emitter meant the hospitals/emergency responders did not have the necessary equipment on hand to detect its presence, thereby providing even more delay for the assassins to make good their escape. The characteristics of radiation poisoning was of course another benefit. In most instances, it will take a considerable amount of time to pass after exposure before symptoms are first exhibited. This is especially true for Alpha emitters regardless of
Circle 174 on Reader Service Card
the dose, which in Mr. Litvinenko’s case was estimated to have been some 200 times the amount needed to be lethal.7 Unlike a cyanide or similar poison, Mr. Litvinenko was dead the moment he finished his tea. This insidious toxin would slowly kill him from the inside out, and there was nothing that could be done to stop it. As any veteran homicide detective will attest, the first 24 to 72 hours after a homicide are the most critical and can quite literally affect the ultimate outcome of the investigation. With each passing hour, potential witness memories begin to fade, small details are forgotten and evidence is lost or destroyed. In the Litvinenko poisoning, the killers were able to calmly flee the country well before the authorities were even aware that a crime had occurred. Ultimately, it was through the diligent work that Scotland Yard was able identify three main suspects. Unfortunately, these men may never be brought to justice, but even if they are, they were just the implement of delivery. Those ordering the hit will likely never be positively identified, let alone face trial. For protective details, law enforcement and the like it is critical to remember history when dealing with a suddenly sickened individual, especially if the victim can count a foreign government as one of their enemies. Whether it is cyanide or a Fentanyl derivative blown in the face, Ricin or Paraoxon administered directly into or on the body, or whether it is dioxin or Polonium-210 administered through food, all leave a trace that can be detected if specifically looked for early enough. Such is the nature of the organized targeted attack. One can never know with certainty if an attack is imminent and/or what form it will take. Hence the importance of being aware of
An FBI photograph of the small metal vial included with a ricin contaminated letter that was discovered on October 15, 2003 in Greenville, South Carolina. The vial contained ricin powder. The letter was addressed to the U.S. Department of Transportation. Photo: FBI your own personal victimology, as well as that of likely targets within your organization. An assessment of potential adversaries is critical to understanding the threat they represent. If past practices are an indicator of future activities and you potentially face a hostile government, than attack by poison can never be ruled out.
•
ABOUT THE AUTHOR Mr. McGovern has served in SWAT, JTTF and protective operations assignments. He is the author of Targeted Violence (CRC Press, April 2010), and the forthcoming Protective Operations (CRC Press, April 2011).
endnotes Volodarsky, Boris, The KGB’s Poison Factory: From Lenin to Litvinenko, Zenith Press, 2009, p 158-164 2 www.3rd1000.com/elements/ Polonium.htm#Overview, accessed 10/30/2010. 1
Volodarsky, Boris, The KGB’s Poison Factory: From Lenin to Litvinenko, Zenith Press, 2009, p 158-164 4 International Atomic Energy Agency “Polnium-210 Factsheets & FAQs”, www.iaea.org/Publications/ Factsheets/English?polonium201. html, accessed 10/30/2010. 5 Department of Homeland Security, “Weapons of Mass Destruction, Technical Emergency Response Training” attended by Author on February 6, 2004. 6 “World Health Organization Polonium-210: basic facts and questions”, www.who.int/ionizing_ radiation/pub_meet/polonium210/ en/index.html, accessed 10/30/2010 7 Gray, Richard “Litvinenko waiter recounts polonium poisoning” Telegraph Media Group, www. telegraph.co.uk/news/main. jhtml?xml=/news/2007/07/15/ nlitvin115.xml, accessed 10/30/2010 3
The Counter Terrorist ~ April/May 2011 29
Science, Strategy and War: The Strategic Theory of John Boyd By Frans P. B. Osinga
H
ave you ever won a fight? Whether your opponent was a belligerent drunk resisting arrest, 50 al Qaeda mujahideen defending the highvalue target you were after, or a Fagot (MiG-15) maneuvering for your 6:00, you competed inside Boyd’s loop with your adversary. If you won, you operated Boyd’s cycle more efficiently than your adversary did. John Boyd (1927–1997) was a US Air Force fighter pilot known best for his ideas as a strategist. Boyd never wrote a book that carries all his ideas forward, but he did write papers and lecture on his ideas. Frans P. B. Osinga, a Dutch F-16 pilot, studied Boyd’s ideas and wrote Science, Strategy and War: The Strategic Theory of John Boyd (Routledge, 2007). One of Boyd’s early insights was “energy maneuverability theory.” Boyd looked at the fact that US F-86s shot down MiGs at a rate of 10:1 in Korea despite the MiGs’ superior speed, ceiling, and turn radius. Superior training was significant to this outcome, but Boyd believed there was more. After many unauthorized hours of expensive governmental computer use (this was in the 1960s), Boyd was able to quantify what had previously been intangible. Osinga says, “Using the insight from thermodynamics, he discovered he could explain air-to-air combat in terms of energy relationships,
30 The Counter Terrorist ~ April/May 2011
Reviewed by: Chris Graham in which altitude is potential energy to be traded for speed–kinetic energy and vice versa. Turns became energyconsuming maneuvers, with the rate of consumption depending on the number of g-forces of the turn, and engine power an energy provider for gaining
altitude, gaining speed, or sustaining a turn, or a combination of these. These relationships could be expressed in calculable equations and the outcomes could be plotted in graphs displaying energy/maneuverability characteristics of a fighter.” Boyd was able to quantify
“agility,” the rate at which a fighter could transition from one maneuver to another. Osinga identifies five key products of Boyd: “Patterns of Conflict represents a compendium of ideas and actions for winning and losing in a highly competitive world; Organic Design for Command and Control surfaces the implicit arrangements that permit cooperation in complex, competitive, fast-moving situations; The Strategic Game of ? and ? emphasizes the mental twists and turns we undertake to surface appropriate schemes or designs for realizing our aims or purposes; Destruction and Creation lays out in abstract but graphic fashion the ways by which we evolve mental concepts to comprehend and cope with our environment; Revelation makes visible the metaphorical message that flows from this Discourse.” Boyd’s cycle, the OODAloop discussed above, may be Boyd’s best-known concept. Boyd theorized that belligerents in conflict Observe the situation and their opponent(s), Orient to achieve spatial awareness, Decide what to do, and take Action. All participants work through these activities and they do so not once, but in continuous loops in which one’s loop disturbs then dominates another’s. The victor is the party who operates the loop more efficiently. A true visionary, Boyd’s insights went well beyond the OODAloop. Boyd wrote about “maneuver conflict” and
commented on ambiguity, deception, and novelty as key elements exploited in maneuver warfare. Osinga states of Boyd’s ideas in countering blitzkrieg tactics, “The defense should have better intelligence, operate faster, be more mobile, move even more inconspicuously, also with small combat teams…and maintain a higher level of cohesion to shatter the opponent’s cohesion with counterstrokes…It implies an acceptance of ‘gaps’ and ‘risks’….” In essence, Boyd provided the tactical answer to patrol officers for active shooter scenarios like the Mumbai attacks long before law enforcement agencies were even aware of the question (as but one example). Osinga also explains Boyd’s key concepts of “moral conflict.” He writes, “Moral strength: mental capacity to overcome menace, uncertainty, and mistrust. Moral victory: triumph of courage, confidence, and esprit (de corps) over fear, anxiety, and alienation when confronted by menace, uncertainty, and mistrust. Moral defeat: triumph of fear, anxiety, and alienation over courage, confidence, and esprit when confronted by menace, uncertainty, and mistrust. Moral values: human values that permit one to carry on in the face of menace, uncertainty, and mistrust. Moral authority: person or body that can give one the courage, confidence, and esprit to overcome menace, uncertainty, and mistrust.” Osinga writes of Boyd’s perspective, “moral and mental dimensions came before technology, superiority in numbers and massed firepower….” He states, “… from 1979 onwards, several [US] Marine Corps officers later to achieve high ranks were exposed to Boyd’s ideas….” He also states, “in order to generate the tempo of operations we desire, and to best cope with uncertainty, disorder, and fluidity of combat, command and control must
be decentralized.” The Marine Corps struggles to perfect this ideal, but serves as an example to other bureaucracies mired in “central planning.” Boyd’s concepts are one of the primary reasons that US Marines have acquitted themselves well in recent campaigns in which elements of other services, at times, performed poorly.
The OODAloop and Boyd’s other concepts are keys to winning in any competitive endeavor. Science, Strategy and War may be a dry read, but this book contains the seeds of genius and can assist you and your team in achieving victory before firing a single shot.
•
RBR North America is pleased to announce the rebirth of the RBR Helmet in North America. All the quality and features you’ve come to know and appreciate. Dealer inquiries welcome.
RBR North America
Book Review
Circle 248 on Reader Service Card
www.rbrnorthamerica.com Contact info@rbrnorthamerica.com North American Distributors for LBA International Limited. RBR North America is a division of Defense Optics Group Corporation The Counter Terrorist ~ April/May 2011 31
By Eeben Barlow
T
child soldiers
at War Around the World “Child soldiers” have been encountered in Afghanistan, Angola, Burundi, Bhutan, Central African Republic, Chad, Chechnya, Colombia, Côte d’Ivoire, the Democratic Republic of Congo, India, Indonesia, Iraq, Israel and the Occupied Territories, Lebanon, Liberia, Mozambique, Myanmar (Burma), Namibia, Nepal, Nigeria, Pakistan, Philippines, Rwanda, Sierra Leone, Somalia, South Africa, Sri Lanka, Sudan, Thailand, Uganda, and Yemen.
Counter The
32 The Counter Terrorist ~ April/May 2011
A Chechen boy stands in the street during the battle for Grozny. Photo: Mikhail Evstafiev
hese children are the victims of atrocities and crimes committed against them and by them. They are deployed in approximately 75 percent of all armed conflicts worldwide. Because their actions are mainly hidden from the public, they are indeed the “Invisible Children.”1 It is said that education is the greatest gift we can give our children. Yet, to many thousands of children, their education is not acquired in their homes and at schools, but in war zones and conflict areas, fighting and surviving as child soldiers who were either kidnapped or coerced into joining insurgent and terror groups, or encouraged to do so voluntarily. Ethnic and religious hatred and intolerance, often encouraged by parents and society leaders, play an equally damaging role in preparing children to disregard laws and turn to violence.2 Despite Article 8.2.26 of the Rome Statute of the International Criminal Court, adopted in July 1998 and entered into force July 1, 2002, which states “Conscripting or enlisting children under the age of fifteen years into the national armed forces or using them to participate actively in hostilities” is a war crime, their employment continues.3 Deprived of responsible adult role models and the security of a home and family, they become dependent on their captors for material and psychological support. Children are impressionable and can easily be manipulated into becoming ruthless and keen to please
Two Afghan children turn over ammunition left behind by the Taliban in Barge Matal, Afghanistan. Photo: Christopher Allison
their captors. In turn, this shapes their view of life and violence becomes an acceptable reaction to anything that threatens them. Rarely do they emerge from their ordeals without physical and psychological damage. Many turn to drugs, alcohol, and a life of crime. Although no precise figures exist, it is estimated that approximately 300,000 children4 are currently engaged in wars and conflicts across the globe. Their roles range from being actively engaged in combat5 to a host of “support services”
How do soldiers distinguish between a harmless child and a suicide child-bomber in a village? How do they know that their movements are not being reported to the enemy by smiling children? The Counter Terrorist ~ April/May 2011 33
as well as propaganda. They are used as “soldiers,” intelligence gatherers, sexual slaves for soldiers and commanders alike, porters, cooks, human mine detectors, early warning systems, human shields, and suicide bombers—in fact, any role that can advantage the abilities, actions, and standing of the groups
34 The Counter Terrorist ~ April/May 2011
Circle 198 on Reader Service Card
using them. Of these child soldiers, 80 percent are younger than 15-years-old.6 Drug cartel assassins as young as 12-years-old have been arrested in Mexico, but some child soldiers are even younger. The Kurdistan Workers’ Party in Turkey has been known to have child soldiers as young as 7-yearsold in their ranks. Children as young as 6-years-old have been found in the ranks for the Lord’s Resistance Army (LRA) in Uganda. Five-yearolds were found in the Sierra Leone Revolutionary United Front (RUF). Their role, however, is not restricted solely to military-type actions. The ongoing drug war in Mexico has illustrated the use of children as “foot soldiers” close to the borders of the United States. The arrest by Mexican authorities7 of 14-year-old US-born Edgar Jimenez, known as “El Ponchis,” the young South Pacific Cartel hit man, in December 2010 highlights this callous use of children in the conflict. Despite an earlier arrest in October 2010, El Ponchis was released by the military because of his young age—and he simply continued with his activities. Increasing numbers of children are being used—and will increasingly be used—as active players in political violence through their association with and membership of organized crime syndicates, cartels, and gangs where they will fulfill numerous roles, such as hit men,8 pirates, drug smugglers, burglars, information gatherers and reporters, and so forth. Already children are being used in protests and riots, complicating the task of public order and law enforcement officials. Armed rebel and/or terrorist groups in Africa, the Middle East, and South America seem to employ the largest number of child soldiers, although Circle 29 on Reader Service Card
The Counter Terrorist ~ April/May 2011 35
The Next Level Of Dry Firing!
A child soldier in the Iran-Iraq war on the Iranian front. Photo: unknown SIRT Training Helps You
• Save Money — Save Ammo • Get More Shots — Get More Training • Maximize Trigger Mechanics Features
• Red Laser Take-Up Indicator Option • Auto-Resetting Trigger Allows For Engaging Targets in a Continuous String • Powerful Shot Indicating Laser Works on Any Target • 6 Trigger Adjustments • Made In The USA
Order online, or call us today to learn more: 360.933.4640
NextLevelTraining.com
numerous child soldiers have been found in the Far East as well. In Afghanistan, there have been many cases of children being used by the Taliban and Hizb-e-Islami as messengers, couriers, “soldiers,” and even suicide bombers where they are instructed to target the International Security Assistance Force or government facilities and buildings.9 This total disregard for the lives of children by insurgent or terror groups remains difficult to understand by anyone who values life. Children who have been forced into joining the ranks of rebels or terror groups are subject to a host of tactics to ensure their absolute adherence to orders. These tactics include beatings, the exploitation of religious beliefs, the threat of being killed or maimed, being forced to kill family and friends (this discourages them from escaping back to their families and friends), forcibly eating human flesh
and drinking human blood, as well as the use of drugs to deaden their consciences. The success of these tactics is evident. Child soldiers of the RUF10 had no compunction in killing family and friends and resorting to cannibalism. The child soldiers of the LRA are likewise immune to killing and maiming. The children used by groups such as the Taliban and al-Qaeda have no hesitation in killing others—and themselves in the process. Although the tactics may be successful, the impact on those who survive remains: “Initially most children experience a mixture of disgust, guilt and selfcontempt. These normal reactions reflect the strength of children’s deeply held civilian morals and social commitments not to murder or to hurt friends. Faced with the magnitude of their actions, children may also rationalize their actions
Use code: ssi_sirt10 for SSI discount price.
Circle 126 on Reader Service Card
36 The Counter Terrorist ~ April/May 2011
Circle 180 on Reader Service Card
The Counter Terrorist ~ April/May 2011 37
by telling themselves, ‘I didn’t want to do it. I had to follow orders or I would be killed.’ . . . Other children may see such acts as surreal, as if they occurred in a dream world, and they may feel quite split off or dissociated from them. This splitting process is a normal self-protective reaction to the strain induced by the enormous gap between children’s previous morals and the atrocity they have been forced to commit. . . . The children’s former values might not be lost so much as suspended.”11
w w w. t r i p w i r e o p s . o r g
E X P LO S I V E S SALES
TRAINING SERVICES
Tripwire Operations Group is an ATF Licensed Manufacturer/Dealer of explosive materials.We have a full line of energetic materials for the bomb technician, explosive breacher, explosive detection K-9 handler, military end user, research laboratory and contractor.
Tripwire Operations Group, LLP. is a partnership made up of highly trained professionals who provide the most up to date training in all Chemical, Biological, Radiological, Nuclear, Explosive (CBRNE) disciplines.
TEXPAK
™
Next Generation Binary Explosives
• Most cost-effective binary explosive • Mixes in seconds, arms instantaneously • No magazine storage required prior to arming • No nitroglycerine; no headaches • high velocity,high gas volume
BlAsTsAX • Providing protection from small explosive devices • Preserves the maximum amount of evidence • Bags allow water to be absorbed without releasing it
PROuDLy OWNED AND OPERATED By FiRsT REsPONDERs FOR FiRsT REsPONDERs 38 The Counter Terrorist ~ April/May 2011 Licensed ATF Explosives & Class 3 Firearms Dealer
™
Whereas boys are commonly associated
with child soldiers, girls too are part of this phenomenon. They are used to fight, act as porters, provide domestic labor, and serve as “wives” for the boy soldiers and their commanders—and even act as suicide bombers. Refusal to follow these orders can result in death, mutilation, or rape. Pregnancies become commonplace, thus adding to the burden of these girls. Repeated sexual assault can result in sexually transmitted diseases as well as other reproductive complications. Coupled with this are “shock, loss of dignity, shame, low self-esteem, poor concentration and memory, persistent nightmares, depression, and other
TM
• Designed for use with commercial binary explosives • Activate,Prime and Deploy — that simple! • Designed for soft-sided targets such as backpacks or clothing. • Operating instructions with visual are written on the label
Circle 238 on Reader Service Card
Post office Box 4026 • GettysBurG, PA 17325 PhONE 888-330-7015 • FAX 717-334-6391
Vedasto Nsanzugwanko, child protection specialist from the United Nations Children’s Fund (UNICEF), speaks to soldiers assigned to Uganda People’s Defense Force (UPDF) during two weeks of civil affairs training at the Kasenyi Training Facility in Entebbe, Uganda. U.S. Navy photo by Chief Mass Communication Specialist Frank S. Montellano/Released
Circle 232 on Reader Service Card
The Counter Terrorist ~ April/May 2011 39
K9COP
M A G A Z I N E TM
For Police and Military Working dog Handlers r i b ut
Di
ed
st
W
o
rld
wid
e
post-traumatic stress effects.”12 This creates a dilemma for the forces engaged in these conflicts. A child with a gun—especially if he or she has used it before—poses as great a danger as an adult opposing them with a gun. How do soldiers distinguish between a harmless child and a suicide child-bomber in a village? How do they know that their movements are not being reported to the enemy by smiling children? The dilemma is further compounded when child soldiers are captured— how should they be handled and treated? Are they prisoners of war, cold-blooded killers, or merely victims of crimes perpetrated against them? Currently, opinion is divided over whether children ought to be prosecuted for committing war crimes. The figures of casualties are staggering. In September 2003 it was reported13 that according to the United Nations’ Children’s Fund (UNICEF) the dangers to children have significantly increased because of recent developments in warfare. It is estimated that during the past decade, child victims have included:14
“Night commuter” in northern Uganda from the Lord’s Resistance Army. “Night commuters” like these leave their homes in the evenings to sleep in public places, where they are more protected from abduction by rebel groups. Photo: K. Burns
• 2 million killed • 4–5 million disabled • 12 million left homeless • more than 1 million orphaned or separated from their parents • more than 10 million psychologically traumatized
The largest and most read law enforcement K-9 magazine in the world.
1 Year (6 issues) ONLY $24.95 • SUBSCRIBE TODAY! Circle 216 on Reader Service Card
Scan code with your Smartphone to subscribe today!
www.k9copmagazine.com (270) 534-0500 • E-mail: info@k9copmagazine.com • Fax: (270) 554-0514 40 The Counter Terrorist•~Telephone: April/May 2011 020311CTK9COP
The challenges facing these traumatized children who have been rescued from their captors are enormous. Whereas immediate needs, such as medical treatment, food, clothing, water, housing, and reuniting them with their families, are usually offered, the emotional trauma they have experienced is seldom viewed as a priority. Their deep
Circle 178 on Reader Service Card
The Counter Terrorist ~ April/May 2011 41
distrust toward adults also needs to be overcome, and the stigma attached to child soldiers at having been rebels adds to the complexity of the rehabilitation process. This process may require drug counseling and support, basic education, and treatment for post-traumatic stress disorder and social rejection. The disarmament, demobilization, and reintegration (DDR) processes will be of little to no value if rescued
A U.S. Army Soldier interacts with a local child during a dismounted patrol in Arab Jabour, Iraq, .U.S. Army photo by Spc. Angelica Golindano
child soldiers are not protected from rerecruitment, provided with meaningful counseling, and carefully reintroduced into their communities. Indeed, the DDR provisions, now included in peace accords, are aimed at assisting child soldiers to make a smoother reintegration into society without the stigma and rejection associated with their actions. If this process for reintegration fails, the former child soldiers will become walking time bombs and pose a grave danger to those around them. It is impossible not to feel empathy for those children who have lost their childhood and had it replaced with violence, killing and maiming, crime and destruction. The actual perpetrators of these crimes against children and via children remain adults, who, in many cases, are not challenged, confronted, or punished. The rehabilitation of child soldiers, therefore, needs to be conducted alongside every effort by governments and organizations alike to bring to justice the warlords and crime bosses who recruit, abuse, and exploit children for their personal or political benefit. Unless they are swiftly brought to justice and
subjected to the harshest international sanction, they will continue with this most despicable tactic of war.
ABOUT THE AUTHOR
•
Mr. Barlow is a former special operations officer and intelligence officer of the South African Defence Force. The author was also the founder of the private military company, Executive Outcomes and author of the book Executive Outcomes (Galago Publishing, 2007).
Now with by
ChitoGauze
TM
Battlefield technology stops severe bleeding fast with easy-to-handle Z-fold. • Antibacterial • No fumbling with a roll • Does not burn • No allergic reactions
endnotes http://www.invisiblechildren.com/ http://www.dailymail.co.uk/ news/article-1331789/Sharialessons-pupils-aged-BBC-uncoversweekend-schools.html 3 Rome Statute of the International Criminal Court#Article 8 - War crimes 4 www.warchild.org 5 The author encountered child soldiers serving in rebel groups in both Angola and Sierra Leone in the mid-1990s. 6 www.warchild.org 7 http://news.iafrica.com/ worldnews/691893.html 8 http://www.nypost.com/p/news/ international/cartel_killer_is_hit_boy_ 1
Pantone 185 CVC Pantone 704 CVC
2
Approx. 3.5” x 5”
x 7” Approx. 5”
Z01 third page ad_Layout 1 18/02/2011 08:24 Page 1
Approx. 5” x 5.75 ”
OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES:
CBRN-E Asia-Pacific Preparing for the Modern Threat 11th & 12th April 2011 Grand Copthorne Waterfront Hotel, Singapore
• Royal Thai Army • Ministry of Defence, Vietnam
• Kuala Lumpur General Hospital, Malaysia
• International Centre for Political Violence and Terrorism Research (ICPVTR), Singapore
• Government of Japan
• US NORTHCOM
• Business Continuity Management Institute, Singapore
• Seoul Metropolitan Rapid Transit Corporation, South Korea • Office of Transportation Security, DOTC, Philippines
• Australian Department of Defence
• National Counter Terrorism Authority, Pakistan
Circle 134 on Reader Service Card
• New Zealand Defence Force vacuum sealed first aid supplies for the emergency treatment of gunshot, stab woundS and other trauma
www.cbrneasiapac.com Register online or contact Marta Levy on +65 66 4990 95 or email mlevy@smi-online.sg 42 The Counter Terrorist ~ April/May 2011
A few ounces in your pocket could save your life.
Circle 250 on Reader Service Card
RESQ-PAK.COM
• 888 . 949. R ES Q ( 7377 )
Enter coupon code SSCT610 to receive a 10% discount from ResQ-PAK.com
( Offer valid through July 15, 2010 )
The Counter Terrorist ~ April/May 2011 43
The animal
liberation front and the Rise of Ecoterrorism By Glenn McGovern
Counter The
At 5:00 a.m., the town was quiet. Just one day past the new moon and sunrise more than an hour away, it was also very dark. August 2, 2008, Santa Cruz, California, was a quiet beachside community known for relaxed attitudes. That Saturday morning, however, was not an average day. On a small suburban street with only a single decorative street lamp, an unknown number of individuals prepared to launch an attack. Unbeknownst to the family of four asleep inside a small, two-story, blue townhouse, an improvised incendiary device (IID) (which would later be described as a “Molotov cocktail on steroids”) was deployed.
W
hether this IID was thrown or set in place and ignited is not clear, but at approximately 5:30 a.m., Dr. David Feldheim awoke with a start to the sound of smoke detectors blaring. Upon investigating, he discovered the house’s first floor blanketed in dense smoke. He quickly gathered his wife and two small children, and used a second-story emergency escape ladder. They were lucky. Feldheim is a University of California at Santa Cruz research scientist
Two of nine goats removed from QinetiQ in the UK by the Animal Liberation Front (ALF) in July 2006. Photo: SlimVirgin at en. wikipedia
Fire engine in California. Photo: John Martinez Pavliga
The attack on Feldheim and his family was a recent attack that has marked a shift in the level of violence employed by an ecoextremist group, in this case ALF.
Anti-HLS slogans painted on pharmacy by the ALF. Photo: Untileveryoneisfree at en.wikipedia
44 The Counter Terrorist ~ April/May 2011
The Counter Terrorist ~ April/May 2011 45
In In the the world world of of tactical tactical electronics, electronics, one one company company has has been been at at it every day since 1994: it every day since 1994:
www.AdamsIndustries.com In the world of tactical NIGHT VISION: NIGHT VISION: electronics, one company has been A.I. A.I. carries carries a a full full line line of of night night vision vision including including PVS-14s, PVS-14s, at it every day since 1994...
M145_QrtrPage4C
7/30/10
specializing in the study of the human brain. As part of his research, he uses rodents. This practice brought him to the attention of ecoterrorists. The year before this attack, he had received threats. His home was vandalized with graffiti, which consisted of messages of hate directed at Feldheim. Because of that incident, the UC Santa Cruz police installed an alarm system and motion-sensitive lights to
PVS-7Ds, PVS-7Ds, and and now now our our AI/ AI/ NVG-S NVG-S offering offering PVS-15 PVS-15 like like 2:19 PM Page 1 performance performance minus minus the the painpainful price price or or wait wait for for delivery. delivery. M-145 4WD ful
! W E MOVING TARGET SYSTEM
N
increase the security of his residence. The week prior to the arson attack, a large number of pamphlets had been distributed around the downtown area of Santa Cruz, left on stacks of newspapers, and posted inside coffee shops. These pamphlets were titled “Murderers and Torturers Alive and Well in Santa Cruz” and stated “Animal Abusers Everywhere We Know Where You Live We Know Where You Work We Will Never Back Down Until You End Your Abuse.”1 Printed on copy paper, the pamphlets identified 13 researchers by picture, name, phone number, and address, and accused them of abusing animals in the name of research.2,3 Ecological extremist groups, such as the Animal Liberation Front (ALF), the Earth Liberation Front (ELF), the Stop Huntingdon Animal Cruelty (SHAC) organization, and a host of splinter groups, such as the Vegan Final Solution, have, for many years, restricted targeting individuals in their operations. They have attempted to intimidate, used graffiti, freed animals from universities, farms, and ranches, raided corporations, and/or caused intentional destruction of facilities through arson, but until recently have refrained from targeting their efforts against people. The attacks by these organizations, both attempted and completed, have spanned more than 25 states in the United States and nine countries, including Italy, Canada, the United Kingdom (UK),
Breakthrough Price
FEATURES
$2,895 Delivered.
• Rugged, robust all wheel drive target platform. • Lightweight, portable, high-speed, 360º control. • Wireless Control to 1000 meters. • Price includes Manikin Mike™ (non-reactive) 3DHT target. • Optional Stop-Drop™ hit reactive target system. Long Range Wireless Operation
1000 Meter Line Of Sight Remote Control Optional Stop-Drop™ Electronic Hit Sensing System
© ATS 2010
THERMAL THERMAL TECHNOLOGY: TECHNOLOGY:
From From handhelds handhelds to to extreme extreme range range systems, systems, A.I. A.I. has has offoffthe-shelf the-shelf and and build-to-suit build-to-suit answers answers for for any any requirement. requirement.
SENSOR SENSOR SYSTEMS: SYSTEMS:
We We are are proud proud to to distribute distribute the the MilMillennium lennium Sensor Sensor line line of of covert covert tactitactical cal sensor sensor and and surveillance surveillance kits kits used used by by the the US US Military, Military, US US Border Border Patrol, Patrol, and and SWAT SWAT Teams Teams nationwide. nationwide. This This force force multiplier multiplier provides provides extra extra eyes eyes and and ears ears where where you you need need them. them.
For More Information: ADVANCED TRAINING SYSTEMS 4524 Highway 61 North • St. Paul, MN 55110 USA Tel: 651.429.8091 • Fax:651.429.8702 Email: info@atsusa.biz • Web: www.atsusa.biz
Circle 64 on Reader Service Card
NIGHT VISION: A.I. carries a full line of night vision including PVS-14s, PVS-7Ds, and now our AI/NVG-S offering PVS-15 like performance minus the painful price or wait for delivery.
THERMAL TECHNOLOGY: From handhelds to extreme range systems, A.I. has off-the-shelf and build-to-suit answers for any requirement.
SENSOR SYSTEMS: We are proud to distribute the Millennium Sensor line of covert tactical sensor and surveillance kits used by the US Military, US Border Patrol, and SWAT Teams nationwide. This force multiplier provides extra eyes and ears where you need them.
Contact: Contact: Adams Adams Industries, Industries, Inc. Inc. P.O. P.O. Box Box 641413 641413 • • Los Los Angeles, Angeles, CA CA 90064 90064
Tel: Tel: (310) (310) 472-3017 472-3017
ACCESS A COMMERCIAL SECURITY AND FIRE SAFETY MARKET WORTH £635 + MILLION The largest economic centre in the Middle East Planned investment of US$1.4 trillion over the next decade Lack of legacy systems and real demand for new technology
www.ifsecarabia.com Co-located with:
46IFSECArabia11Ad_2.25x4.75".indd The Counter Terrorist ~1 April/May 2011
Fax: 861-5324 FOR INFORMATION EXHIBITING Fax: ON(310) (310) 861-5324
T: +44 (0)20Sales@AdamsIndustries.com 7921 8614 E: carl.richardson@ubm.com Email: Email: Sales@AdamsIndustries.com
www.AdamsIndustries.com www.AdamsIndustries.com Organised by:
Circle 246 on Reader Service Card 18/02/2011 15:42
www.AdamsIndustries.com
Adams Industries, Inc. P.O. Box 641413 • Los Angeles, CA 90064 Tel: (310) 472-3017 Fax: (310) 861-5324 Email: Sales@AdamsIndustries.com Circle 27 on Reader Service Card
The Counter Terrorist ~ April/May 2011 47
An ALF raid on a mink farm in Rome, Italy, saw 2,000 mink released, March 16, 2005. Photo: SlimVirgin at en.wikipedia
In California, 2003 was a particularly damaging year because ecoterrorists caused tens of millions in damages and also demonstrated a change in tactic.
Jerry Vlasak. Photo: Rainer Ebert New Zealand, Finland, the Netherlands, Belgium, Greece, and France. ALF was founded in the United Kingdom in the mid 1970s and in the United States in the late 1970s. It carried out its first “known” arson attack in the United States on April 15, 1987, when members apparently set fire to the University of California at Davis Veterinary Medicine laboratory,
causing $3.5 million in damage. Apart from this attack, ALF extremists have largely focused their operations to raids and the release of animals. ELF was also founded in the United Kingdom, during the early 1990s. ELF extremists almost immediately began conducting attacks employing IIDs. One of their most destructive attacks to date occurred on October 19, 1998,
when they reportedly torched the Vail Mountain Ski Resort in Vail, Colorado. This attack resulted in $26 million in damages. On November 27, 2000, it is believed ELF struck again, setting alight the Legend Ridge Mansion in Boulder, Colorado.4 On May 21, 2001, ELF claimed responsibility for the arson attack on the Center for Urban Horticulture at the University of Washington, which caused $5.6 million in damages.5 The SHAC organization, as with the previously mentioned groups, was originally founded in the United Kingdom in 1999. Its stated purpose was to shut down the UK-based research company, Huntingdon Life Sciences (HLS). SHAC in the United States was formed in 2000 and it has stated it would use violent criminal actions as part of its repertoire of attack. In California, 2003 was a particularly damaging year because ecoterrorists caused tens of millions in damages and also demonstrated a change in tactic. It began on August 22, 2003, in San Diego when an apartment complex under construction was set ablaze. The following day in West Covina, a city 120 miles north of San Diego, a Hummer dealership was attacked by arsonists. Both of these terrorist events were claimed by ELF and totaled more than $22 million in damages. An attack occurred on August 28, 2003, in the San Francisco Bay area that marked the arrival of a new and more
The Complete Tactical Video Tool Set!
Mexican gas station, operated by PEMEX.
An array of technology-based video surveillance tools that allow a team to safely assess any potentially dangerous situation covertly and remotely. ➤ N E W! Through-the-Wall Camera
Listening Devices ➤ 2-20ft Pole Cameras ➤ Thermal Imaging ➤ Fiberscopes & Videoscopes ➤ Robotic Remote Control Cameras ➤ Under Door Cameras ➤ Digital/Analog Wireless Video ➤
All products are interchangeable and new tools can be added at any time! Zistos Corporation Ph 631.434 .1370
E-mail: sales@zistos.com 48 The Counter Terrorist ~ April/May 2011
Circle 192 on Reader Service Card
The Counter Terrorist ~ April/May 2011 49
New and improved
Ecoextremist organizations may exploit the lone-wolf concept by operating in very small cells.
deadly method of operation. In this case, the Chiron Corporation suffered a bombing when an improvised explosive device was detonated outside of its offices during the hours of darkness. This was followed by a similar attack against the Shaklee Corporation in the same area on September 26, 2003. These two companies were affiliated with HLS, however, the attacks were claimed by the Revolutionary Cells – Animal Liberation Brigade (the links
to SHAC are not currently known). A communiqué from the group stated that all customers and their families were considered legitimate targets. It went on to threaten, “You never know when your house, your car even, might go boom.” It was a significant statement. In the mid 1990s, ecoextremists began conducting limited attacks against individuals. Fortunately, the method of attack was limited to the throwing of pies in the victim’s face. The only damage from such attacks was embarrassment for the victim and certainly for any protective personnel who failed to prevent it, but there was no physical harm. The attack on Feldheim and his family was a recent attack that has marked a shift in the level of violence employed by an ecoextremist group, in this case ALF. The extremists have moved beyond the raids and burning of structures and appear willing to employ
FIRSTHAND AC COUNTS AND FROM FRONTL INE PERSONNE ANALYSES L AND ExPERT IN THE wAR AG S AINS T TERROR Based on
edite
ophir falk and hed by nry Morgenstern
When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly – moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.
Understandin
g and Confro nting the threat
reat
Call now for more information. Pricing dependent on quantity
www.SuicideTerror.com • 866-573-3999 50 The Counter Terrorist ~ April/May 2011
( portable vehicle barrier )
nfronting the th
U.s. and policymakers, first israeli experiences and detailed interv responders, and threat of suicide students of home iews with frontline personnel, terro Suicide Terror enab land security to understand and for future attacks. r. it analyzes recent suicide attac deal with the grow les ks as well as our following the expe current vulnerabili Moreover, they learn rt authors’ advic ties and likely scena ing e, readers learn how to prepare for and losses in the and imple ment an effective possible measures to prevent an rios event of an attac attac and quick response k. following an overv to minimize casua k. iew and historical lties review of suicide terror, the book cover • Global jihad s: • Israel’s confron tation with suicide te rroris m • America’s expe rience with suicide b ombings • Internationalizat ion of suicide terroris m • High-risk scena rios and future trends • Methods for co nfronting suicide terror • Medical manag ement of suicide terro rism Using eye-witnes s accounts, the text recreates the studies help reade look and feel of rs actua these very dangerousget into the minds of suicide terro rists in order to unde l terrorism incidents. Detailed threats. case rstand how to best This book is a defin prevent and confr itive study of suicide ont experts who have terror, synthesizing t dealt with it firsth he ex perience of well-kno devastating threa and. anyone respo wn Israeli and A t should read this nsible for unde meric rstan book and consider its recommendation ding, preventing, and confrontin an OPHIR FALK, LLB, g this s with all seriousne ss. institute for Coun MBA, is a Partner at the Naveh, K ter terrorism, wher of experience in e he has published antor Even-Har law firm and a Rese vario numerous articles carried out risk asses us security capacities and serve in the field. Mr. falk arch Fellow at the d as a consultant sments for olympic has over a decade for the venue 2004 s and critical natio HENRY MORGEN nal infrastructure. olympic games, where he STERN is the Presi than 500 federal, dent of security state solutions internation first responders to Is , and local agencies to effectively al, a company that of suicide terror. He rael to study Homeland Security. Mr. confront the threat of terror and regul has trained more radio stations, and has offered expert commentary on tMorgenstern is a widely publishe arly takes groups of d aut Web broadcasts. error-related issu es for NBC, ABC hor on the subject , CBS, Fox, numerous
SUICIDE TERROR Understanding and Co
SUICIDE TERROR
falk Morgenstern
Ophir Falk and Henr y Morgenstern have serious about winn compiled a book that should be read ing the war on terro better understan r. By painstakingly by anyone who is d the nature of analyzing the empi our enemies and rical data, they they offer important why they employ help us insights on how these barbaric tacti terrorism can be In so doing, they cs. Most crucially, effectively confr have performed onted and ultim an invaluable servi crucial battle. ately defeated. ce for all those who are committed to winning this —Benjamin Neta nyahu, former Prime Minister of Israe l
murder to accomplish their goals. This shift was first noted in London on February 22, 2001, when three SHAC men wearing balaclavas and armed with pickax handles attacked Brian Cass, managing director of HLS. The attack occurred outside his residence and resulted in his being hospitalized. Shortly after, on May 1, 2001, vehicles belonging to HLS employees were firebombed in the United Kingdom. Targeted violence against individuals subsided for a time, perhaps because of the events of 9/11. However, on September 7, 2005, the attacks resumed with a firebombing in Beaconsfield, England, of the home owned by a senior employee of the GlaxoSmithKline corporation. Like the attack on Feldheim, the employee’s wife and daughter were home at the time of the attack, but were able to escape safely. This attack was claimed by ELF.
and delivery location. Call: (305) 401-6906 or email Richardson@securitysolutionsint.com
Circle 117 on Reader Service Card
Or visit our website: www.SSIPVB.com Circle 226 on Reader Service Card
SSI
®
SECURITY SOLUTIONS INTERNATIONAL
Protecting the Homeland Together ®
The Counter Terrorist ~ April/May 2011 51
View of the devastation from the fire that caused £500,000 damage to Londbridges boathouse, Oxfordshire on 4 July 2005. The fire was the first arson by a supposed ALF cell known as the Oxford Arson Squad. Photo: Matt86C at en.wikipedia
This new level of violence would not reach the shores of the United States until February 5, 2008, in Los Angeles, California. In this case, the home of a University of California at Los Angeles professor was firebombed. Fortunately, no one was home at the time.6 That same month, extremists believed to be linked to SHAC attempted to force their way into the home of a University of California at Santa Cruz professor. The husband fought with upwards of six masked individuals, resulting in his receiving several blows. May 2010 marked the use of another violent tactic. In this case, the wife of a marine biologist researcher in Santa Cruz walked out from her hillside home and approached her car. As she did, she noted a pool of fluid underneath. Ultimately, it was discovered that the entire brake system had been disabled and lines cut, including the
Lind Shut Down Timer (Screw Terminal Option)
ProtEct your VEhIclE’s BattEry Easy to Install, sEt, and tEst
LIND Lind Shut Down Timer (Block Terminal Option)
Designed to protect your vehicle’s battery from over discharge, the Lind Shut Down Timer (SDT) is programmed to automatically turn off electrical loads at a preset time after the vehicle’s ignition has been shut off. The Shut Down Timer is easy to set and test without any confusing DIP switches or special tools. For more information, please contact Lind Electronics at 1.800.697.3701, via email at info@lindelectronics.com, or visit us online at www.lindelectronics.com. 52 The Counter Terrorist ~ April/May 2011
Power SPecialiStS for Mobile coMPuting
Circle 220 on Reader Service Card
Circle 176 on Reader Service Card
The Counter Terrorist ~ April/May 2011 53
new program for 2011 > Global expertise > Global best practices
An intensive advanced workshop for the Homeland Security Professional
GlobalSecurity workshop JUNE 24 - JULY 2, 2011 >
An animal researcher for the Oregon National Primate Research Center (OHSU) is targeted. Photo: ALF
Understanding the nature and methodology of the attacks carried out by ecoterrorists is incredibly important given the world’s current battle with
emergency brake cable. To date, there have been no claims of responsibility.7 While laws that can be used against the perpetrators of such attacks already exist in most if not all jurisdictions, there were no laws specifically addressing the threat ecoterrorists represented. In 1992 that changed when the U.S. Congress passed the Animal Enterprise Protection Act. It represented the first major legislation for protecting animal researchers. In 2006 Congress expanded its efforts when it passed the Animal Enterprise Terrorism
Act to replace the 1992 law. This law prohibits using force, violence, or threats for purpose of damaging or interfering with the operations of an animal enterprise. In many of these ecoterrorist attacks, no one has been arrested. Understanding the nature and methodology of the attacks carried out by ecoterrorists is incredibly important given the world’s current battle with Islamic terrorists. With the apparent increase in the number of Islamic extremist lone-wolf or small-cell attacks
>
>
>
>
>
TEL AVIV,
israel
Join the more than 400 Homeland Security Professionals that have selected SSI’s training in Israel Program. Over 17 missions from 2005 to 2010. The most successful program for overseas training in Homeland Security. Here is what you will learn: > The nature of the threat; modus operandi and the tactics employed by terrorist organizations including in-depth discussions of vehicle and other IED devices. > The approach to security for Infrastructure, Ports, Schools, Universities, Church’s and Religious institutions, Government buildings, VIP’s and public safety at venues and malls > How to create safe-city projects and monitor threats – explained through visiting the Old City of Jerusalem and seeing the command and control center for operations in that Holy City > Learn how Counter Terror units work, and cooperate with intelligence and much more…. > All of this while visiting some of the most memorable sites in the world. Please call for further information > > > >
Register Today...
info@homelandsecurityssi.com • 866-573-3999
www.homelandsecurityssi.com 54 The Counter Terrorist ~ April/May 2011
Circle 224 on Reader Service Card
Circle 215 on Reader Service Card
SSI
® Protecting the Homeland Together ®
SECURITY SOLUTIONS INTERNATIONAL
37 on Reader Service55 Card The Counter TerroristCircle ~ April/May 2011
• Network with senior military decision making teams vısıt www.soldıertechnology.com fortomore ınformatıon from NATO nations improve your contact base and June 7 AM – Soldier Power June 10 AM – Soldier C4i awareness of emergi ng needs to Trials June 7 PM – Soldier Weightto accuratel June y10respond PM – Soldier June 8 – 9 – National Updates end “…we user requisupport rements Soldier Technology because the right In t
r fo sers th sar i 10 ver on orum dern ni iti ng F Mo An EdServi ldier o t es al S ng on Lo nati er
Capability Group 1, Dismounted Soldier
Mr. McGovern has served in SWAT, JTTF and protective operations assignments. He is the author of Targeted Violence (CRC Press, April 2010), and the forthcoming Protective Operations (CRC Press, April 2011).
endnotes FBI Media Bulletin, “FBI and Santa Cruz Police Department Seek Assistance from the Public in Identifying 2008 Firebombers,” August 2, 2010 2 “Santa Cruz firebombs look familiar: ‘Molotov cocktails on steroids’ are similar to those animal rights extremists have used, police say,” August 4, 2008, Wyatt Buchananand and Demian 1
Circle 22 on Reader Service Card
56 The Counter Terrorist ~ April/May 2011
Circle 191 on Reader Service Card
y
ABOUT THE AUTHOR
soldier modernisation experts attend year on year…”
• Find out how top defence and security system Venue: Olympia Conference Centre, London integrators plan to provide new services and products FIST & Royal Marines to a diverse Effective New Approaches torange of national governments and where the IdZ opportuni ty lies for you Soldier Modernisation to FELIN & SCORPION Enhance Human and System • Test game-changing new technology for the soldier MARKUS Capability While Reducing in an exhiWeight bition zone specializing in dismounted soldier ANOG 10 Year A nniversar y ki t to benchmark your product l i n es agai n st the best top speakers ın 2011 ınclude: benefıts of attendıng: COBRA General Carew Wilks, Head of Brigadier • Meet military soldier modernization customers from new regions iincluding nnovatinew onsLatin industry has to offer Individual Capability Group, DE&S, UK MoD America and the Middle East to develop business beyond Brigadier General Dominique Luzeaux, traditional markets so that you protect your investments and generate totally NORMANS Director, Land Systems Procurement, DGA, new revenue channels ARS OF SER 10 YE VI N
Helmut Huegle, Head of Soldier Systems, Cassidian, EADS
G
LDIER MOD E SO ER TH NI
COMMUNITY
•
meet natıonal soldıer modernısatıon teams ıncludıng:
N TIO SA
and attempted attacks, a connection may become evident. Ecoextremist organizations may exploit the lone-wolf concept by operating in very small cells. By approximating what has been termed “leaderless resistance,” a small, close-knit structure, penetration by law enforcement is exceedingly difficult. By way of the Internet, extremists are able to share a common cause, claim responsibility for attacks, and learn from others about targeting, methods of attack, and so forth. Will Islamic terrorists learn from the methods of operation and targeting used repeatedly and largely successfully by ecoterrorists? Will the members of ALF and ELF and others learn from the Islamic extremists and increase the lethality of attacks? Jerry Vlasak, the Los Angeles founder of and spokesman for the North American Animal Liberation Press Office, which often posts claims of responsibility for animal extremist attacks, told Congress in 2005 that the killing of researchers who use animals in their work is an acceptable tactic.
French MoD
Marine Expeditionary Rifle Squad
Brigadier General J Vance, Chief of Staff, Land Strategy, Department of National Defense Canada
Tytan
Lt Colonel Mike Bodner, Chairman, NATO Land Capability Group 1, Dismounted Soldier
meet Kinatıonal ng Abdullah Desisoldıer gn and Development Bureau modernısatıon teams ıncludıng: FIST & Royal Marines IdZ FELIN & SCORPION MARKUS
PriANOG cipal Sponsors
Associate Sponsor
COBRA
• Discover new partners among a global audience of innovative defence manufacturers attending and exhibiting to ensure innovation flows into your defence and security product lines
Download Free Industry Content Today at www.soldiertechnology.com
• Network with senior military decision making teams from NATO nations to improve your contact base and awareness of emerging needs to accurately respond to end user requirements
• Find out how top defence and security system integrators plan to provide new services and products to a diverse range of national governments and where the opportunity lies for you
• Test game-changing new technology for the soldier in an exhibition zone specializing in dismounted soldier and Exhiyour bitors product lines against the best Organised By kit to Sponsors benchmark innovations industry has to offer
NORMANS
®
ODU
Marine Expeditionary Rifle Squad Tytan King Abdullah Design and Development Bureau
Pricipal Sponsors
Proud supporter of
Associate Sponsor
Download Free Industry Content Today at www.soldiertechnology.com Sponsors and Exhibitors
Organised By
Proud supporter of
®
ODU
regıster your place today usıng your early bookıng code: prem regıster your place today usıng your early bookıng code: prem
Circle 242 on Reader Service Card
call: saıma qureshı on +44 (0) 207 368 9465 emaıl: soldıertechnology@wbr.co.uk onlıne: www.soldıertechnology.com The Counter Terrorist ~ April/May 2011 57 call: saıma qureshı on +44 (0) 207 368 9465 emaıl: soldıertechnology@wbr.co.uk onlıne: www.soldıertechnology.com
UDT is the essential exhibition and conference for anyone involved in undersea security, underwater warfare and sub-surface platforms. UDT 2010 welcomed: 1500 attendees 35 high profile military officers
Key prime contractors
Leading tier 1 & 2 suppliers
Reasons to exhibit: Display your product in front of senior procurement attendees Get the industry talking about your latest product launches and technology advancements in the Innovation Showcase Meet top level international delegations on the Senior Officers’ Day Enhance your exhibiting experience and maximise ROI by taking part in the Waterborne Demonstration programme UDT 2011 will feature relevant conference themes designed to attract top quality delegates to the event and your stand. Visit www.udt-europe.com/conference for full list of themes.
www.homelandsecurityssi.com
The Most Complete CT Training Available.
Learn from the Experts:
• Terrorist Risk Assessments • Middle East Operational Debriefs—Improve Entry Methods • Secure Search Techniques for Structures • Multiple Breach Points and Advanced CT Tactics • Terrorist Hostage Rescue • Suicide Terrorist Vehicle Interdiction • Containment and Call-Out for Counter Terrorism Ops • Explosive Lab Interdiction in Urban Areas • Explosive/IED Threat Mitigation in Structures • Command, Control and Planning Issues
Call to register for our next program: > March 8th-11th, 2011 at Camp Blanding FL > April 5th-8th 2011 at Yakima, WA
SSI
®
SECURITY SOLUTIONS INTERNATIONAL
Protecting the Homeland Together ®
(Must be an active member in a SRT Team or SWAT Team)
t: +44 (0) 20 7370 8636 e: james.dolleymore@clarionevents.com w: www.udt-europe.com t: +44 (0) 20 7370 8364 e: nikki.sherman@clarionevents.com w: www.udt-europe.com
58 The Counter Terrorist ~ April/May 2011
SSI SWAT CT OPS EXPLOSIVE THREAT MITIGATION COURSE
Call now for more information.
Can you afford to miss UDT 2011? To book your space at the world’s largest dedicated undersea conference and exhibition contact: James Dolleymore, Event Manager Nikki Sherman, Sales Executive
See for yourself at:
A protest in Huntingdon by SHAC, November 2007. Photo: SHAC Activist
Bulwa, San Francisco Chronicle Staff Writers http://articles.sfgate. com/2008-08-04/news/17121852_1_ uc-santa-cruz-animal-rightsfirebombs accessed 12/22/2010 3 “A year after firebombings, no arrests, though awareness remains among scientists” August 2, 2009, J. M. Brown, Sentinel Staff Writer 4 “Eco-Violence: The Record” Intelligence Report, Fall 2002, Issue 107, Southern Poverty Law Center http://www.splcenter.org/ get-informed/intelligence-report/ browse-all-issues/2002/fall/frompush-to-shove/eco-violence-the-rec 5 Ibid 6 “Animal extremists say ‘liberationists’ responsible for firebomb attack,” Office of Media Relations, UCLA Newsroom, February 5, 2008, http://newsroom.ucla.edu/portal/ucla/ fbi-investigates-fire-ar-home-44151. aspx accessed 12/29/2010 7 “Cops Eye Animal Rights Extremist in Attack on Marine Biologist,” Eamon McNiff, CBS News, May 26, 2010, http://abcnews.go.com/TheLaw/ police-suspect-animal-rights-groupcut-brake-lines/story?id=10740962 accessed 12/29/2010
®
Organised by
Circle 202 on Reader Service Card
Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 179 on Reader Service Card
The Counter Terrorist ~ April/May 2011 59
lawfare: A Supporting Arm in Modern Conflict
By David B. Harris and Aaron Eitan Meyer
Counter The
The twentieth century, like each previous century, has seen shifts in how wars are fought. To give one example, the large-scale tank battles of World War II have not been seen since the Sinai battleground of the 1973 Yom Kippur War.1 Yet the biggest shift in military development does not lie in technological upgrades of vehicles and weapons, but in tactical application; a notable manifestation being terrorism.2
A
decade into the twenty first century, terrorist organizations engage in acts of violence against civilian populations while attempts to manipulate legal systems serve as the second track of a complementary strategy, even as the terrorist organizations themselves flaunt the laws of armed conflict with impunity. This second avenue of attack has become known as “lawfare,”3 and has attracted the attention of military personnel and jurists around the world. In 2001 Major General Charles Dunlap offered the first serious analysis of the term “lawfare.”4A decade later, despite the term’s now-widespread use, there is no single, authoritative, or universally accepted definition of the word, beyond the general’s rather nonspecific “the use of the law as a weapon of war.”5 As broadly serviceable as this understanding may be, it constitutes a starting point rather than a theoretically comprehensive and operationally useful guide to the term. What, then, is lawfare? Is it, as some critics argue, merely one-sizefits-all terminology used by nations in response to adverse legal actions? Is it
Photo: Jonathunder
Emergent evidence of World War II’s toll and of the Holocaust’s horrors fueled profound new developments in international human rights law.
A human shadow on the Holocaust monument in Vienna, constructed by Rachel Whiteread. Photo: Gryffindor
60 The Counter Terrorist ~ April/May 2011
The Counter Terrorist ~ April/May 2011 61
Think you always need to use restraint? Let the Epilepsy Foundation help you rethink the situation. Law Enforcement Personnel Training for Epilepsy and Seizure Management You can access this training online! Go to www.epilepsyfoundation.org/ firstresponders
For more information, call 800-332-1000 or visit www.epilepsyfoundation.org This ad was developed with support from the Centers for Disease Control and Prevention under cooperative agreement number 5U58DP000606-05. Circle 210 on Reader Service Card
62 The Counter Terrorist ~ April/May 2011
Henry Dunant (1828–1910), Swiss philanthropist and co-founder of the International Committee of the Red Cross; Nobel Peace Prize laureate 1901 Photo: Time Life Pictures instead a term that applies broadly to the hinterland where law and warfare meet? Is it traditional subversion? Or could it be a new form of asymmetric warfare, one seeking to turn international and national courts into strategic military and political battlegrounds? More than 2,000 years ago, Marcus Tullius Cicero stated that “the law is silent during war,”6 perhaps echoing Roman General Caius Marius’s declaration that
“the law speaks too softly to be heard amidst the din of arms.”7 This state of affairs would not remain forever. The agonies of the wounded at Solferino in 1859 drove Jean-Henri Dunant to spearhead changes in the application of law to warfare. His monument would be the Convention for the Amelioration of the Condition of the Wounded in Armies in the Field, signed by 12 European nations a mere five years
after Dunant’s battlefield witness. More commonly known as the First Geneva Convention, the international agreement marked the beginning of modern humanitarian law. It established the principle that, notwithstanding the chaos of war, armed forces had a duty with respect to opposing soldiers who could no longer fight. Under the Convention, this duty, and corresponding entitlement, stemmed from the hors de combat soldier’s identity as a human being replete with universal rights. Emergent evidence of World War II’s toll and of the Holocaust’s horrors fueled profound new developments in international human rights law. The postwar legacy: the Universal Declaration of Human Rights in 1948, and four 1949 treaties collectively known as the Geneva Convention. These actions display a historical progression toward expanding the rule of law, so that legal protections apply even in the bloody midst of armed conflict. This expanding of the ambit of law brought the world further from its brutish state of nature, and closer to recognition of humanitarian order as an abiding and enforceable value. And yet, for all its hopeful implications, this trend has complicated the question of law and war. More, it may be said to have pathologized aspects, manifestations, and uses of law, itself. In this, it confuses attempts to understand the appropriate relationship between law and war. Without such understanding, a proper comprehending of lawfare in its Dunlapian weapon-of-war sense will prove evasive. What is the proper purpose of law and legal proceedings in war? The problem is pressing, for courtrooms and international agreements are currently being used by litigious combatants seeking new avenues to undermine “defendant” countries’ war
efforts in the midst of transnational conflict. One could easily imagine how court processes might be exploited to expose military secrets under disclosure provisions, or to rely on causes of action to bring dramatic public focus on military conduct, focus calculated propagandistically to sow discord and dismay among the opponent’s citizens—the better to weaken an adversary’s will preparatory to a larger, kinetic, and violent offensive. Thus, courts are now becoming—through inadvertence or otherwise—weapons to be exploited, not for humanitarian gain, but to advance military and associated subversive efforts by parties with no real interest in humanitarian causes. One might ask, isn’t this advantageous? Don’t we want conflicts to be played out in courtrooms as opposed to the physical battlefield? In the ideal world, the answer would naturally be yes, but unfortunately this is not what is actually occurring. In fact, the United States Supreme Court recently considered precisely these questions. As Chief Justice John Roberts explained, “[a] foreign terrorist organization introduced to the structures of the international legal system might use the information to threaten, manipulate, and disrupt. This possibility is real, not remote.”8 The chief justice specifically noted that a terrorist organization could use specialized legal knowledge “as part of a broader strategy to promote terrorism.”9 Still, there is no commonly accepted definition of lawfare, which has led to considerable discussion and argument regarding whether there really is such a phenomenon, or whether, as Scott Horton, human rights attorney and journalist, mused in Harper’s Magazine, “Lawfare turns out to be a flexible concept, available for a wide array of situations in which a
At Ray Allen, we’re dedicated to offering you and your working dog top-of-the-line training gear, cutting-edge transport equipment, even basics like tugs and toys. with a This dedication comes w promise of outstanding service and the highest quality products avaialble. All Ray Allen training products are made right here in the USA. No other supplier of K-9 make that claim. equipment can ma Who do you rely on?
800-444-0404 www.rayallen.com Circle 56 on Reader Service Card
Circle 182 on Reader Service Card
The Counter Terrorist ~ April/May 2011 63
We’ve just turned the tide in flood damage. Using sandbags to mitigate flood damage no longer holds water. FloodSax are the new, lightweight, compact, clean and superior-engineered alternative to the mess and limitations of sandbagging. TM
Introducing TM
• Rapid Deployment: FloodSax
FloodSax
TM
expand to their full size in only 3 minutes in water.
• Superior to Sand: Seals, blocks and diverts flood waters infinitely better than sandbags. TM
• Clean: FloodSax
eliminates the need for messy sand, dirty workspace and materials.
• Compact: 20 FloodSax
TM
per carton vacuum sealed in bundles of five.
• Dual Sizes: Expands to 20” x 17” or 18” x 15” when inflated. • Lightweight: 15 ounces or 22 ounces when dry, deploys to 32 lbs or 44 lbs (respectively). • Durable: Lasts up to 3 months deployed in use ~ 5 years on shelf. • Versatile: Can be used to soak up interior water seepage or spills. TM
• Biodegradeable: FloodSax
are 100% biodegradeable.
As featured on:
See our incredible video at : w w w. F L O O D S A X S T O R E . C O M SECURITY SOLUTIONS INTERNATIONAL LLC • 866-573-3999 • bradman@homelandsecurityssi.com
government finds itself at odds with the law, fighting a rear-guard action in its own courts, or menaced by the prospect of prosecutions overseas.”10 The Lawfare Project utilizes the following carefully constructed definition of lawfare: “Lawfare denotes the use of the law as a weapon of war, or more specifically, the abuse of the law and legal systems for strategic political or military ends.”11 Though based on General Dunlap’s revised and expanded definition,12 The Lawfare Project adds coloration and precision to this conception by injecting into it a certain emphasis on manipulation in the negative sense of that word. Thus, the Project definition regards lawfare as involving the manipulation of international and national human rights laws to achieve purposes other than, or contrary to, those for which the laws were originally enacted or recognized. Taken together, the above Project definition establishes identifiable elements that can be applied to determine whether a given situation is classifiable as lawfare, or—in deference to General Dunlap—“negative” lawfare. First, does the issue involve a law or legal system? If the issue inextricably involves legal process, or legal definitions, it may involve lawfare. If it is a purely political matter, it cannot be lawfare. Consider the episode in which China’s foreign minister responded in 2010 to a question about Japan’s release of a Chinese civilian captain by calling his detention “illegal.”13 The minister’s remark could have been dismissed as mere political rhetoric, if not for the fact that it delegitimized Japan’s entire judicial system by asserting that “Japan’s…so-called judicial procedures over the Chinese captain” were “illegal and invalid.”14 The dismissing of a nation’s courts in this fashion may
reflect an attempt to make a case for International Criminal Court (ICC) jurisdiction because, even if it has jurisdiction otherwise, the ICC “cannot intervene if relevant authorities are conducting genuine investigations or prosecutions.”15 The State of Israel has already been subject to censure at the United Nations, and currently faces a potential ICC investigation into its 2008–2009 military Cast Lead operation. Second, is the law or legal system being used to achieve a larger, possibly clandestine, purpose such as complementing terrorism, as in the US Supreme Court case mentioned above? When the purpose behind an ostensible legal initiative is to achieve a strategic political or military goal, the result might well constitute lawfare. If, however, a plaintiff is trying to use a legal system for purely personal reasons, and there
The Lawfare Project utilizes the following carefully constructed definition of lawfare: “Lawfare denotes the use of the law as a weapon of war, or more specifically, the abuse of the law and legal systems for strategic political or military ends.”
Our Strength
is your security.
Safe Storage for Ammunition and Explosives. usexplosivestorage.com visit our website! some models for sale online!
• Meet ATF Regs • Meet Military Specs • Many Sizes • Type II, III, & IV Magazines • Armories • Dayboxes
1-877-233-1481 Circle 240 on Reader Service Card
64 The Counter Terrorist ~ April/May 2011
Circle 131 on Reader Service Card
The Counter Terrorist ~ April/May 2011 65
MACTAC Multiple-Assault Counter Terrorism Action Capability
TM
The Newest, Most Dynamic Training Program from SSI . ®
Anwar al-Awlaki in Yemen October 2008. Photo: Muhammad ud-Deen is no larger goal being achieved by the lawsuit, it would not amount to lawfare. Such distinctions call for careful scrutiny of underlying motivations. As an illustration of this, one might contemplate the lawsuit brought by the father of radical cleric Anwar alAwlaki, against the US government’s decision to authorize a targeted killing of this American citizen. This lawsuit is being supported by the American Civil Liberties Union and Center for Constitutional Rights, which categorically object to targeted killings as unconstitutional. Having accepted the prima facie “legal” nature of the process, our analytical methodology might require that we begin by noting the organizations’ own portrayals of their primary motivation, say, a desire to make a principled defense of constitutional rights to life and security of the person. A comparison of this interpretation with other evidence might, however, persuade us of a true motivation that is
hidden, somewhat deceptive, and perhaps more significant in the organization’s thinking than these principled positions. The true aim, for example, might be to achieve a judgment that would have the effect of interfering with the prosecution of the war by withholding from the government a necessary military stratagem—targeted killing. This court-based manipulation would qualify as lawfare. On the other hand, a lawfare analysis of al-Awlaki’s father’s part in initiating the case might conclude that the latter is primarily pursuing his “overt” and legally proper purpose: the safeguarding of what he regards to be his son’s constitutional rights. The distinguished legal philosopher H. L. A. Hart once cautioned that international law is problematic inasmuch as its ill-defined nature means that it does not have all the elements of a fully developed judicial system, particularly procedural safeguards that ensure the due process of law.15
MACTAC is the new tactical philosophy offering your
department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks.
Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course
Call to register for our upcoming program: April 19th-22nd Camp Blanding FL. LEARN MORE at:
www.homelandsecurityssi.com Call now for more information.
Phone: 866-573-3999 Fax: 866-573-2090 contact@securitysolutionsint.com Circle 130 on Reader Service Card
66 The Counter Terrorist ~ April/May 2011
SSI
®
SECURITY SOLUTIONS INTERNATIONAL
Protecting the Homeland Together ® Circle 228 on Reader Service Card
The Counter Terrorist ~ April/May 2011 67
Indeed, there is mounting evidence that international-level lawfare campaigns have systematically exploited this flaw. As a result, lawfare threatens to undo centuries of legal progress in the interests of certain nations and international voting blocs whose values and interests would seem inimical to those upon which decades of relative peace and stability have been founded.
•
ABOUT THE AUTHOR
Â?
Mr. Harris is director of the intelligence program at INSIGNIS Strategic Research Inc. He previously served with the Canadian Security Intelligence Service. Mr. Meyer is research director of The Lawfare Project, director of research for the Children’s Rights Institute, and legal correspondent to the Terror Finance Blog.
Based on national guidance and training for , The Tactical Aid and Collaboration Toolset (TACT™) software provides specific tools in the . TACT™ helps build situational awareness, and supports collaboration between the negotiation team.
 � � �  Circle 204 on Reader Service Card
68 The Counter Terrorist ~ April/May 2011
endnotes See, e.g. Thomas E. Ricks, “Is the Army’s armor branch defunct?�The Best Defense. Available online at http://ricks. foreignpolicy.com/posts/2010/04/19/ is_the_army_s_armor_branch_defunct 2 As defined by the Federal Bureau of Investigation, “[t]errorism includes the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.� 28 Code of Federal Regulations § 0.85 (2010). Though it does not refer to “terrorism� explicitly, see also the Canadian Security Intelligence Service Act, which defines “threats to the security of Canada� as including “activities within or relating to Canada directed toward or in support of the threat or use of acts of serious violence against persons or property for the purpose of achieving a political, 1
religious or ideological objective within Canada or a foreign state� R.S., 1985, c. C-23, s. 2; 2001, c. 41, s. 89. Available online at http://www.csisscrs.gc.ca/pblctns/ct/cssct-eng.asp 3 Law and Military Interventions: Preserving Humanitarian Values in 21st Century Conflicts, Carr Center for Human Rights, John F. Kennedy School of Government, Harvard University, Working Paper, 2001. Available online at http://www.ksg.harvard.edu/cchrp/ Web%20Working%20Papers/Use%20 of%20Force/Dunlap2001.pdf 4 General Dunlap has since revised and expanded his definition of lawfare to refer to a “strategy of using—or misusing—law as a substitute for traditional military means to achieve an operational objective.� “Lawfare Today,� Yale Journal of International Affairs, Winter 2008, 146. 5 Pro Milone. 6 Life of Caius Marius, Plutarch 7 Holder v. Humanitarian Law Project, 130 S.Ct. 2705 (2010) 8 Id 9 “Lawfare Redux,� March 12, 2010. Available online at http://www.harpers. org/archive/2010/03/hbc-90006694 10 www.TheLawfareProject.org 11 “Lawfare Today� See FN 2 above. 12 “Foreign Ministry Spokesperson Jiang Yu’s Remarks,� September 24, 2010. Available online at http://www.fmprc. gov.cn/eng/xwfw/s2510/t756291.htm 13 Id 14 ICC Prosecutor Luis MorenoOcampo, “Gaza Jurisdiction Debate - Should the ICC Investigate War Crimes in Gaza?� Human Rights and International Criminal Law Online Forum, September-November 2010. Available online at http:// uclalawforum.com/#Glasius 15 The Concept of Law, Clarendon Press, 1965, 209.
Circle 194 on Reader Service Card
Innovative Products
MK-1 robotic arm HDT Engineered Technologies (HDT) designed the MK-1 robotic arm to be the world’s most advanced prosthetic arm. Its unique abilities allow it to use any tool meant for human hands and perform many tasks previously impossible for a robotic arm, keeping those operating it safely out of harm’s way. It features the industry’s best strength-to-weight ratio in a light-weight, durable remote ground unit. www.hdtglobal.com
Pocket Filter
MINI Suppressor The Surefire MINI provides flash and dust signature suppression, and reduces the average maximum sound pressure level below the OSHA 140-decibel safe level for firearms with barrels 14.5 inches or longer using standard M855 (5.56mm) ammunition. It adds 2.75 inches to weapon length and weighs 14 ounces. Adapters for the MINI sound suppressor screw directly onto the original rifle muzzle threads and are available for a wide variety of firearms. www.surefire.com
Katadyn’s robust water filter made of heavy duty materials is designed for long lasting continuous use. The silver impregnated ceramic element is effective against bacteria, protozoa, cysts, algae, spores, sediments and viruses in combination with particles greater than 0.2 microns and reduces chemicals and radioactive particles. This device yields approximately one liter per minute and may provide up to 50,000 liters of drinking water. www.katadyn.com The Counter Terrorist ~ April/May 2011 69
Counter
advertiser index
The
APRIL/maY 2011
Volume 4 • Number 2
September 18 – 24, 2011 • richmond, VA
Journal for Law Enforcement, Intelligence & Special Operations Professionals To request detailed product information, circle the appropriate reader service number (RSN) on the attached Reader Service Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.
Page 12 47 46 2 14 21 4 34 42 25 16 62 57 73 15 18 46 20 24 19 40 7 13 52 11 56 28 36 53 71 75 41 37 56 66 51 27 63 31 43 54 10 39 55 59 64 51 74 50 76 68 3 17 35 38 65 49
Ad/Company • website and/or email........................................................................................................ RSN Number 6th Annual Homeland Security Professionals Conference & Expo • www.thecounterterroristmag.com/conference Adams Industries • www.adamsindustries.com Advanced Training Systems • www.atsusa.biz Ahura Scientific • www.thermoscientific.com/ahura ALS Technologies Inc • www.lesslethal.com American Military University • www.amuonline.com/intelligence Blauer Manufacturing Co • www.blauerhomelanddefender.com Broco Tactical • www.brocoinc.com CBRNe Asia Pacific Conference • www.cbrneasiapac.com Diamondback Tactical • www.diamondbacktactical.com EOD Buyers Guide • www.eodbuyersguide.com Epilepsy Foundation • www.epilepsyfoundation.org Global Soldier Techonology Conference• www.soldiertechnology.com Golden Engineering • www.goldenengineering.com HDT Engineered Technology • www.hdtglobal.com Icor Technology • www.icortechnology.com IFSEC Arabia 2011 • www.ifsecarabia.com Inert Products • www.inertproducts.com ITEC • www.itec.co.uk ITI • www.scopes.com K-9 Cop Magazine • www.k9copmagazine.com Lenco Industries • www.swattrucks.com Leupold • www.leupold.com Lind Electronics • www.lindelectronics.com Line of Fire • www.lineoffire.ca McGard • www.mcgard.com/security Mid-Michigan Kennels • www.midmichigankennels.com Next Level Training • www.nextleveltraining.com Novatac • www.novatac.com NTOA • www.ntoa.org Oasys Technology • info@oasys-technology.com Organo Gold• www.jc1cafe.organogold.com PoliceOne Academy • www.PoliceOneAcademy.com PoliceTraining.net • www.policetraining.net Precision Locker • solutions@precisionlocker.com PVB • www.ssipvb.com QinetiQ North America • www.talonrobots.com Ray Allen Manufacturing • www.rayallen.com RBR North America • www.rbrnorthamerica.com ResQ-Pak • www.resq-pak.com Road International • export@roadinternational.net Southern Police Equipment • www.southerpoliceequipment.com Southwest Synergistic Solutions • www.triagelights.com SSI Global Security Workshop in Tel Aviv • www.homelandsecurityssi.com SSI SWAT Counter Terrorism Course • www.homelandsecurityssi.com SSI’s Floodsax • www.floodsaxstore.com SSI’s MACTAC • www.homelandsecurityssi.com Stryke Logistical Group • info@tacticalstryke.com Suicide Terror - Understanding & Confronting the Threat • www.suicideterror.com Surefire • www.surefire.com/magazines TACT - Defense Group • www.tactfirstresponder.com Tactical Electronics • www.tacticalelectronics.com Tactical Products Group • www.tacprogroup.com Tex-Shield • www.tex-shield.com Tripwire Operations Group • www.tripwireops.org U.S. Explosive Storage • www.usexplosivestorage.com Zistos • www.zistos.com
70 The Counter Terrorist ~ April/May 2011
35 27 64 104 106 108 66 198 250 206 208 210 242 83 244 81 246 214 200 120 216 13 218 220 49 22 174 126 176 222 234 178 180 191 130 226 52 182 248 134 224 230 232 37 179 131 228 212 117 236 204 99 188 29 238 240 192
co-hoSted by richmond conference committee feAtUred coUrSeS: • Advanced tactics • beyond pipe bombs: Understanding the threat of today’s bomb-makers • paramilitary Assault counter offensive plan • police response to Active Shooter
National Tactical Officers Association 800-279-9127 • www.ntoa.org
The Counter Terrorist April/May Circle~222 on Reader2011 Service 71 Card
Training Review
Global Security Workshop By Richard Bash
I
was promoted to deputy chief in June 2010 and placed in command of our Homeland Security Subdivision. I knew that I needed some additional training and I believed the best place to get that training was with Security Solutions International (SSI) and its Global Security Workshop. So on November 5, 2010, I joined 12 other students and SSI’s CEO, Henry Morgenstern, and boarded a flight for Tel Aviv, Israel. We landed at about 8 a.m. local time on a Saturday and our lessons began. We made our way to a booth to have our passports checked and were asked some questions about our intentions for our stay; some of us were asked more questions than others. After lunch we were ready for our first class. Karen Dollinger, an immigrant
72 The Counter Terrorist ~ April/May 2011
taught by Moshe Ben Shalom, a veteran of Yamam, the national counter-terror unit of the Israeli Police. Tuesday we studied VBIED (vehicleborne improvised explosive devices) and other terror actions, as well as a case study of the 1995 assassination of Israeli Prime Minister Rabin by a Jewish activist. This event highlighted the fact that threats can come from any direction and that VIP protection must be continuously improved. Wednesday morning we enjoyed a Krav Maga (defensive tactics) session followed by a presentation on the security challenges of rail systems in Israel and abroad. After lunch, we traveled to the mall, not to shop but to investigate how these huge public complexes are secured. On Thursday we toured Jerusalem University. The campus is surrounded by
“less than friendly” communities and has been a target of a few terrorist acts; most significant was the bombing of a busy cafeteria in 2002. After lunch we toured the Old City of Jerusalem. Friday came far too quickly. While the tour of Masada and the Dead Sea were intended to be more recreational than academic, it proved to be very educational. We saw the recurrent theme of concentric circles of security. The goals here: provide security while minimizing the perceived need for security. Finally, we experienced the security of the Tel Aviv airport. Our flight was scheduled to leave at 11:30 a.m. so we got to the airport at about 8:30 a.m. Our bus was stopped at a checkpoint well away from the terminal and we were evaluated by security personnel. As we exited the bus, we were surveyed
and profiled by both uniformed and nonuniformed security personnel. Once inside the terminal, our passports were inspected, our luggage was screened, and we were interviewed. We saw outstanding coordination of human and technological security measures. I had a great time on this trip and would recommend it. I learned a great deal because I had a great deal to learn. SSI and Henry were professional and accommodating, and it was great to get back home to my wife and kids. www.homelandsecurityssi.com
•
ABOUT THE AUTHOR Mr. Bash is deputy chief of the Homeland Security Subdivision of the Columbus Division of Police. He is a graduate of the FBI National Academy.
Port of Ashdod, one of Israel’s two main cargo ports. SSI photo. from the United States, provided us with some insight into the country and its history, and what we could expect culturally during our stay. After the class we headed for dinner at Mike’s Place, an American-style bar and restaurant. Mike’s Place was the scene of a suicide bombing April 30, 2003, and this dinner was a learning opportunity for all of us. After a fine meal and a local beverage or two, we were all ready for a good night’s sleep. Day two started early as we climbed aboard a bus for the Ashkelon Rutenberg power station. A power plant is a piece of critical infrastructure, but in Israel it is more than that. As an “electric island,” Israel is not able to borrow power from a neighboring country. Additionally, the Gaza Strip where many terror attacks have originated is only about a mile away, making the plant
a viable terror target. We saw how the concentric circle concept of security and a cooperative environment with other security groups are used to protect this important installation. Afterward, we were treated to a lively lecture from Sam Levi on “Suicide Terror” detection and mitigation. On day three we visited the Port of Ashdod, one of Israel’s two main cargo ports. This port was targeted in a terror attack in 2004 and the lessons learned are incorporated throughout Israel. Again, we witnessed the synthesis of intelligence and multiagency cooperation providing concentric circles of security. The transportation theme continued as we studied some aspects and strategies used in aviation security and why Israeli airport security is generally regarded as superior. We ended the day with a session
Circle 83 on Reader Service Card
The Counter Terrorist ~ April/May 2011 73
74 The Counter Terrorist ~ April/May 2011
Circle 234 on Reader Service Card
Circle 212 on Reader Service Card
The Counter Terrorist ~ April/May 2011 75
Circle 236 on Reader Service Card
76 The Counter Terrorist ~ April/May 2011