the counter terrorist magazine - august/september 2012

76
The Counter Terrorist ~ August/September 2012 1 An SSI ® Publication AUGUST/SEPTEMBER 2012 USA/CANADA $5.99 Volume 5 • Number 4 AUGUST/SEPTEMBER 2012 Counter e THE U.S. CITIZEN, THE SECOND AMENDMENT, AND THE U.N. SMALL ARMS TREATY TOULOUSE KILLER GRUPO TIGRE HIZB UT-TAHRIR RELENTLESS PURSUIT Journal for Law Enforcement, Intelligence & Special Operations Professionals www.thecounterterroristmag.com

Upload: solomon

Post on 01-Apr-2016

220 views

Category:

Documents


4 download

DESCRIPTION

Journal for Law Enforcement, Intelligence & Special Operations Professionals

TRANSCRIPT

Page 1: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 1

An SSI® PublicationAugust/september 2012

usA/CANADA $5.99

Volume 5 • Number 4

August/september 2012CounterThe

The U.S. CiTizen, The SeCond AmendmenT, And The U.n. SmAll ArmS TreATy

t o u l o u s e K i l l e r • g r u p o t i g r e • H i z b u t- tA H r i r • r e l e N t l e s s p u r s u i t

Journal for Law Enforcement, Intelligence & Special Operations Professionals

www.thecounterterroristmag.com

Page 2: The Counter Terrorist Magazine - August/September 2012

2 The Counter Terrorist ~ August/September 2012

FirstDefender RMX and FirstDefender RMNext generation Raman instruments enable rapididentification of unknown chemicals in the field.

Every second matters.

When time and safety are critical, military and civilian first responders

use Thermo Scientific handheld chemical identification instruments to

rapidly identify explosives, precursors, narcotics and other chemical

hazards directly at the point of need.

With more than 5,000 handheld chemical identification instruments

deployed worldwide, we understand what first responders demand of

their equipment—and why every second matters. These insights were

key as we developed FirstDefender® RM and FirstDefender RMX, our

next generation Raman instruments, which are even faster and easier

to use than ever before.

For rapid, accurate analysis of a wide range of potential chemical hazards,

turn to Thermo Scientific handheld instruments, formerly sold under the

Ahura Scientific brand. To schedule a demonstration of our newest solutions,

visit www.thermoscientific.com/mil-chemID or call +1 (978) 642-1132.

© 2

011

Ther

mo

Fish

er S

cien

tific

Inc.

All r

ight

s re

serv

ed.

Moving science forward

Circle 254 on Reader Service Card

Page 3: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 3Circle 340 on Reader Service CardCircle 13 on Reader Service Card

Page 4: The Counter Terrorist Magazine - August/September 2012

4 The Counter Terrorist ~ August/September 2012 Circle 29 on Reader Service Card

Page 5: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 5

Counter The

48

co

nte

ntS

58

Journal for Law Enforcement, Intelligence & Special Operations Professionals

August/september 2012Volume 5 • Number 4

32

8

coVeR StoRy: 32 tHe u.s. CitizeN, tHe seCoND AmeNDmeNt, AND tHe u.N. smAll Arms treAty By Ross Riggs

FeAtUReS:

8 Firsthand: grupo tigre pArANá rAiD By Kevan Gillies

20 Case Study: spree Killer iN toulouse, FrANCe By Richard Marquise

48 Hizb ut-tAHrir CoNVeNes iN illiNois By John Andrews

58 releNtless pursuit: A NegleCteD CoiN priNCiple? By Eeben Barlow

depARtmentS:

6 From the editor Afghanistan the Beautiful

46 book review The Eleven: Saudi Guantánamo Veterans Returning to the Fight

69 innovative products RM M203PI, Propper A-TACS BDU, Sesolinc Mobile Reinforced Data Facility

72 training review Mobile Device Seizure and Investigations

Cover: To come

Page 6: The Counter Terrorist Magazine - August/September 2012

6 The Counter Terrorist ~ August/September 2012

“A

From The ediTor:

Afghanistan the Beautifulby Chris graham

Counter The

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Volume 5 • Number 4 August/september 2012

EditorChris GrahamDirector of Operationssol bradmanDirector of AdvertizingCarmen ArnaesDirector of ProductionKelli richardsonContributing Editorseeben barlowJennifer Hestermanrichard marquisetom Nypaversteve YoungGraphic Designmorrison Creative CompanyCopy EditorLaura TownOffice Managerlily ValdesPublisher:security solutions International13155 sW 134th st. • ste 204miami, Florida 33186

IssN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by security solutions International llC, as a service to the nation’s First responders and Homeland security professionals with the aim of deepening understanding of issues related to terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. please direct all editorial correspondence related to the magazine to: security solutions International ssI, 13155 sW 134th street, suite 204, miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.For article reprints, e-prints, posters and plaques please contact:pArs International Corp.Web: www.magreprints.com/quickquote.asp email: [email protected]: 212-221-9595 • Fax: 212-221-9195please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com© 2012 security solutions International

merican troops have made use of the most advanced technology money could buy and performed as they were trained. They have endured...while tolerating...” After the september 11 attacks in 2001, president bush authorized a brilliantly agile campaign by CIA officers and special Forces soldiers leading Afghan proxies in bold, aggressive combat operations against al Qaeda and the taliban with devastating close-air-support. After some dramatic and well-publicized successes, “big Army,” the same organization that seemed hesitant to participate at the outset, jumped in with both feet.

Fast forward a decade to the present, and the u.s. government has sacrificed the lives of thousands of young Americans and hundreds of billions of dollars to… to what? Decimating and deterring the network that made war against the united states culminating in the 9/11 attacks seems to be a side job.

u.s. policy in Afghanistan today seems to be motivated by the idea of bringing governance to ungoverned regions in order to prevent the rise of future terrorist groups; not a bad idea unless one is aware of the fact that attempting to bring governance to all uncontrolled regions of the earth is a sufficiently large task to bankrupt any nation participating. And make no mistake, many nations deliberately hinder these efforts at every opportunity and it is unclear how many locals want this intrusion.

An additional trifling detail is: What form of government should be installed? should they be given a heavy-handed socialist “worker’s paradise?” should they be given the mob rule of democracy? should they be given a representative republic like the united states? In the case of Afghanistan, coalition troops find themselves propping up a corrupt Islamic regime.

Those of us who have spent time in the field in Afghanistan find claims of supporting the democratic aspirations of noble Afghans to be tragically humorous. my recollection of Afghanistan is a land where individual liberty, tolerance of others, and honesty are often considered ridiculous. I remember a land (regardless of which tribal region) where a perceived insult to the Koran could result in mob riots and killings but where rampant pedophilia and bestiality merit nothing more than a shrug of shoulders.

American troops have performed as they were trained, enduring an inhospitable environment, facing countless challenges, and tolerating the ridiculous orders of seniors to practice celibacy and abstain from alcohol for every day of each deployment. Aside from the previous, they have done well carrying out their orders.

unfortunately, they have been ordered to carry out a never-ending series of costly, inefficient operations without significant benefit. At this point, “victory” in Afghanistan is ill-defined, and the highly publicized schedule for withdrawal of u.s. forces virtually precludes the possibility of achieving a real ”victory” even if conducted piecemeal over decades.

If our politicians and generals are permitted to celebrate their “successes” without being forced to confront their failure of leadership, we can expect the same processes to be repeated. It appears that our political commitment is not great enough to achieve victory; it is merely sufficient to justify participation and guarantees great expense and unsavory results for years to come.

I would suggest that if a politician doesn't have sufficient support at the outset of a campaign to honestly and clearly state his objectives and his commitment to victory, nothing less, then he does not have sufficient support to wage war. If we permit these “leaders” to indulge in a never-ending round of self-congratulations without facing our strengths and our weaknesses, our accomplishments and our failures, with sobriety rather than spin, we will not adapt sufficiently to achieve victory in future conflicts.

semper Fidelis,

Chris Grahameditor, The Counter Terrorist

Page 7: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 7Circle 301 on Reader Service Card

Contact: Aimee Barmore, 1-866-697-6267 x111 [email protected]

KNOW BEFORE YOU GO ®

Before you send your tactical team through the door, throw in the stealthy Recon Scout® XT. It can crawl over clothing

and other debris and transmit clear, crisp video that can reveal the location of subjects and the layout of rooms.

The XT weighs just 1.2 lbs, and is exceptionally quiet. Its infrared optical system also allows you to see in complete

darkness. Learn more about its life-saving capabilities and arrange a demo at www.recon-scout.com/XT

Recon Scout XT Law Enforcement 2012_Counter Terrorist_8.375 x 10.875”_2/15/12

®

TM

WORLD LEADER IN TACTICAL MICRO-ROBOT SYSTEMS

Circle 337 on Reader Service Card

Page 8: The Counter Terrorist Magazine - August/September 2012

8 The Counter Terrorist ~ August/September 2012

Counter The

Firsthand:

General purpose police officers make an arrest.

by Kevan gillies

Page 9: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 9

Crime in Brazil is a unique situation. Large cities such as Rio de Janeiro, São Paulo, Recife, and Curitiba (capital of the southern state of Paraná) are flooded with favelas (shanty towns) where drug lords rule by fear.

bank robberies, armored vehicle robberies, kidnappings, and drug dealing. In the northwestern region of brazil, there have been many incidents where heavily armed gangs take small towns hostage, neutral-izing the small police force, and robbing banks, supermarkets, and businesses. These violent and brutal criminal organizations are famous for executing rival gang members by beheading and dismemberment.

GRUPo TIGRE Tático Integrado de Grupos de

Repressão Especial (tIgre, the In-tegrated tactical groups of special

rime is dominated by highly struc-tured criminal organizations such as Primeiro Comando da Capital (pCC)—First Command of the Capital. many of these groups are commanded from the prisons in são paulo and have “chapters” or “branches” throughout the country. Comando Vermelho (CV)—red Command- originated in rio de Janeiro and is organized similarly to pCC. The majority of individual criminals are affiliated with and pay dues to one organization or the other.

Activities practiced by these criminal organizations include

c the unit is responsible for investigating all cases of kidnappings and hostage rescue operations in the state of paraná (near the triple frontier of Brasil, paraguay and Argentina) and handles an average of seven hostage situations/kidnappings per year.

Page 10: The Counter Terrorist Magazine - August/September 2012

10 The Counter Terrorist ~ August/September 2012

suppression) was created in 1989. The unit is responsible for inves-tigating all cases of kidnappings and hostage rescue operations in the state of Paraná (near the triple frontier of brazil, paraguay and Argentina) and handles an average of seven hostage situations/kidnap-pings per year. tIgre also has the additional responsibility of provid-ing tactical support for other units on high risk warrants. The group in-cludes twenty-six operators and two delgados (commanding officers). The unit is credited with a 100% success rate in its twenty-three-year history and has been designated the state’s counter-terrorism team in preparation for the World Cup in 2014 and the olympics in 2016.

oPERATIon MERCURy

In late November of 2011, I found myself sitting amongst over four hundred-strong law enforce-ment officers from three distinct po-lice forces (the Federal, military and Civil police) being briefed on what would turn out to be one of the most significant inter-departmental operations ever conducted in the southern states of Paraná, Santa Catarina, and porto Alegre: opera-tion mercury. Cot (Comando de Operações Táticas – Tactical Opera-tions Command), the Federal police tactical unit, had flown down from brasilia to assist in fulfilling fifty-three warrants in the three states. I was sitting in the ranks of tIgre, the Civil police Counter terrorism and Hostage rescue team called in to take down one of the higher-risk targets. The gang we were about to take out of action had been involved in kidnappings,

Circle 191 on Reader Service Card

Circle 311 on Reader Service Card

Zistos CorporationPh 631.434 .1370E-mail: [email protected]

The Complete Tactical Video Tool System!

� Night Vision Monocular Pole Camera� 2-20ft Pole Cameras� Fiberscopes & Videoscopes � Under Door Cameras� Listening Devices� Thermal Imaging� Robotic Remote Control Cameras � Digital/Analog Wireless Video

An array of technology-basedvideo surveillance tools that

allow a team to safely assess anypotentially dangerous situation

FOR MILITARY & LAW ENFORCEMENT OPERATIONS

All products are interchangeable and new tools can be added at any time!

Page 11: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 11

Tacprogear manufacTures a compleTe line ofHigH-speed low-drag TacTical gear & equipmenT

sofT armor

Hard armor

HelmeTs

plaTe carriers

pockeTs & poucHes

weapon accessories

Tacprogear is widely used in global

hot spots where High-speed, low-drag

equipment is required, not optional!

Tacprogear’s manufacturing capabilities

& network of reliable partners help

us achieve extraordinary results…

delivering mission critical equipment

to wherever and whenever duty calls!

Tacprogear designs and builds all

products to not only meet, but exceed

the rigorous demands of our clients.

• Hard Armor

• Soft Armor

• Carriers

• Vests

• Pockets

• Pouches

• Packs

• Flashlights

• Safety Equipment

• Sleeping Bags

• Weaponlights

• Apparel

• Gloves

• Coveralls

• Balaclavas

• Footwear

• Weapon Accessories

• Slings

• Eye Protection

• PPE

TACProGEAr’S BATTlE TESTEd ProduCTS:

Tacprogear, llc

601 N. CoNGrESS AVE., SuITE 305

dElrAY BEACH, FlorIdA 33445 uSA

TEl: 561-265-4066 FAX: 561-265-4061

[email protected]

Circle 101 on Reader Service Card

Page 12: The Counter Terrorist Magazine - August/September 2012

12 The Counter Terrorist ~ August/September 2012

Circle 29 on Reader Service Card

Circle 245 on Reader Service Card

Circle 282 on Reader Service Card Circle 308 on Reader Service Card

AdAms IndustrIes, Inc.

Penetrating the night...

nIght vIsIon/thermAl monoculArs, goggles And weApon sIghts.

www.AdAmsIndustrIes.com

[email protected]

west: (310) 472-3017

eAst: (540) 815-1421

Circle 308 on Reader Service Card

Page 13: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 13Circle 331 on Reader Service Card

drug dealing, assaults on armored cars, and bank robberies using explosives to open Atms (the latest fad amongst brazilian organized crime). We were taking down an entire gang in one shot. They were a well trained and organized group of hard core criminals. A month earlier they had lost a member and killed two police officers in paraguay dur-ing an attempt to take them down by the National police Force. less than a week prior to our operation, they had exchanged fire with the paraná state Highway patrol, using covering fire and bounding drills to retreat. They were armed with Ar-15s and conducted transition drills to glock 9 mm pistols with thirty-round magazines.

The whole investigation had originated from a receipt for phone credits found in an abandoned vehicle used in a robbery. It took a total of two years of investigations to collect enough evidence and intelligence to bring in the whole gang. At 06:00 (local) the fifty-three warrants would be executed simultaneously.

o6:00 ASSAULTERS In ThE FUP

At 05:45 we dropped off the rear perimeter and containment team. At 06:00 sharp we were stacked in our Fup (forming up position). We had rehearsed our movements back at tIgre´s operational base

CRC Press is a premier publisher of books on

counterterrorism.

FREE standard shipping when you order at www.crcpress.com

SAVE 25%on our Newest

Counterterrorism Books

Visit www.crcpress.com to seeour complete selection of titles and use PROMO CODE FWL14to receive a 25% DISCOUNT.

Third Edition

Pre-order today!

FWL14_CRC_CounterTerrMag AD_Layout 1 7/2/12 9

Grupo TIGRE. Photo courtesy of Carlos Frigerio.

AdAms IndustrIes, Inc.

Penetrating the night...

Circle 308 on Reader Service Card

Page 14: The Counter Terrorist Magazine - August/September 2012

14 The Counter Terrorist ~ August/September 2012 Circle 129 on Reader Service Card

and were fired up and ready to go. on number 15’s signal we moved out. A team of three provided cover on the front and second floor whilst swiftly taking care of the padlock and opening the gate. I slid in behind my cover men num-bers 15 and 18 with my linear fire hose charge already in my hands. As usual our intelligence was not the best we could wish for, and I only knew we had two outside doors, probably wooden, and did not know where exactly they would lead. We had decided to take the left door, which appeared to be an entrance to a downstairs living room. 15 and I scraped between the wall and a Volkswagon car, and I slapped the charge on the door. In what must have been fractions of a second, I could see that it was

070212-Robotex-7.25x4.875-AvatraII.indd 1 7/2/12 2:33 PM

Grupo TIGRE. Photo courtesy of Carlos Frigerio.

Page 15: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 15

C

M

Y

CM

MY

CY

CMY

K

Paratech-CountTerFPMBR812f.pdf 1 7/2/12 3:52 PM

Circle 333 on Reader Service Card

Circle 333 on Reader Service Card

Page 16: The Counter Terrorist Magazine - August/September 2012

16 The Counter Terrorist ~ August/September 2012

a heavy wooden door opening in and felt confident that the charge (made up of 15 gram det cord) would handle it easily. As I started flaking out the shock tube and retreating around hard cover, I felt the line go taught, I looked back and found it had tangled and was starting to pull the charge off the door. I managed to make it around the corner as my two cover men exited the gate. I decided to fire the charge from where I was and let it rip. The shock wave reflecting off the garage wall was manageable.

before I could finish reeling in the shock tube, the team had passed me and I heard the calls of ”clear, clear, coming out.” still under the cover of number 18, I accessed my second linear hose charge and started peeling off the breacher´s tape and placing the charge. same type of door, only this time open-ing out. I grabbed 18 by his vest´s drag handle and pulled him back a couple of meters closer to the wall whilst accessing the pen-flare firing device. A quick look around to make sure none of the team was

Rio de Janeiro - the Armed Forces (CFN) occupy the Complex of the German, in Rio de Janeiro, to ensure safety during the municipal elections. Photo: Wilson Dias/ABr

Page 17: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 17Circle 301 on Reader Service Card

Specialized Gear for Military and Law EnforcementWeapons & Components — Optics — Ammo

The DSG Alpha Series Holsters Feature:• Solid Kydex Construction• Large In-Stock Inventory• Available for Most Popular Handguns• Models for Surefi re and Streamlight Weapon Lights• Formed for Close to the Body Fit• Adjustable Cant and Height• Convertible to Inside the Waistband Carry

GSA: GS-07F-6007R • CAGE: 1L0J5

dsgarms.com 1.800.382.7571

Instant Access

FREE SHIPPING on your fi rst order this month!Promotion Code: CT0312

Available in black and dark earth

Introducing the All New Alpha Series Concealment

Holsters from

Circle 275 on Reader Service Card

Page 18: The Counter Terrorist Magazine - August/September 2012

18 The Counter Terrorist ~ August/September 2012

exposed to the charge (if you can see the charge, the charge can see you), and I pulled back the firing pin. The image of the flash going down the plastic shock tube, the door banging off the jamb and falling backwards, let’s just say it was a beautiful sight. Numbers 18 and 15 headed up the stairs to the living quarters. soon after I heard the command of “Dominado.” It turned out the ground floor was being turned into a small clothes shop and was completely empty except for a few shelves, hangers, and construction materials.

mission accomplished: two explosive breaches and warrant executed with two perpetrators in custody. We seized two .40 caliber pistols, credit cards, and cash. our part in the operation was over. op-eration mercury was a success and fifty of fifty-three warrants were fulfilled. only one team was fired

upon. Zero casualties were taken, and their perp was in custody.

LESSonS LEARnED1) success comes from long hours dedicated to realistic tactical training. 2) good Intelligence is worth gold. 3) rehearsals are critical to any successful operation. 4) A team must have multiple points and methods of entry. 5) explosive breaching is an essential tool for any tactical team. 6) A clear mission statement and rules of engagement are essential. •ABoUT ThE AUThoR

Mr. Gillies is a British expatriate resident of Brazil. He is Director of the Tactical Explosive Entry School Brazil (www.teesbrazil.com.br) and serves as a tactical trainer, consultant and explosive breacher for Grupo TIGRE.

Grupo TIGRE explosive wall breach. Photo courtesy of Carlos Frigerio.

the image of the flash going down the plastic shock

tube, the door banging off the

jamb and falling backwards, let’s just say it was a

beautiful sight.

Page 19: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 19Circle 183 on Reader Service Card

Protecting the Homeland Together ®

®

SSISSI

Fin

d ou

t mor

e at

: ww

w.h

omel

ands

ecur

ityss

i.com

Take your Training To a higher level...

SECURITY SOLUTIONS INTERNATIONAL

SSI ElEvatEd tactIcS traInIngEnhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

• Vehicledrivingandoperatingtechniquesinavarietyofsituations• Globalcasestudiesofreal-worldoperationsusingthespecificequipment• Usingvehicleplatformsforobservation,structuremultipleentrytechniques,andlinearassaults• Elevatedobstaclenegotiationandfiringplatforms• Emergencyevacuations,climbinganddescendingoptions• Distractionanddeceptiontechniques• andmuchmore...

Circle 311 on Reader Service Card

Elevated Tactics Training provided in partnership with Patriot3.

Call now for more information. Phone: 866-573-3999

Fax: [email protected]

Circle 313 on Reader Service Card

Page 20: The Counter Terrorist Magazine - August/September 2012

20 The Counter Terrorist ~ August/September 2012

Counter The

Aftermath of the 2012 shootings, flags of Capitole de Toulouse are not flying. Photo: PierreSelim

Case Study:

SpRee KilleR in toUloUSe, FRAnceby richard marquise

Page 21: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 21

on March 11, 2012, the 8th anniversary of the Madrid train bombings, a lone gunman killed a French paratrooper near the southwestern French city of Toulouse. This seemingly isolated attack drew little attention. Four days later, two more off-duty French soldiers were killed, and another was wound-ed thirty miles from Toulouse in what appeared to be a “drive-by” shooting at a bank ATM.

nvestigators began to connect the two attacks. on video later accessed by police, the gunman shouted, “Allahu Ak-bar,” or “god is great,” as he drove away.

While police were working to identify the shooter in each of these attacks, it would take a third, more heinous crime before he would be fully identified. Four days after the second attack, on the morn-ing of march 19 a lone gunman on a motorcycle drove up to a Jewish school in toulouse and began firing at anyone he saw. before he was through, a rabbi and two of his children, aged six and three, were dead. Another child was gravely wounded. media reports indicated that the shooter then chased eight-year-old miriam monsonego, fatally shooting her in the head at point-blank range.1 Although the gunman initially escaped, French investi-gators linked the three attacks to twenty-three-year-old mohamed merah.

merah, a French citizen of Algerian descent, had come to the attention of French police as a teenager. He had been

involved in a series of criminal activities and had a string of convictions for petty crimes.2 merah had also spent over a year in prison for theft and upon release was rejected for service in the French Foreign legion. He traveled to the border region of Afghanistan and pakistan. media reports provide conflicting information: some reported it was in 20083 and others said 20104.

He trained at militant camps in Wa-ziristan. He attempted to forge ties with al Qaeda; however, except for his own statements, it is not clear if he succeeded. It was also alleged he may have fought with the taliban. However, he was appre-hended by a military patrol in Afghani-stan in 2010 and deported to France. merah may have been placed on the united states “Do Not Fly” list because of his capture in Afghanistan.5

After merah returned to France, interviewers attempted to determine why he had been in Afghanistan. merah told French personnel in November 2011 he

i

Unfortunately, it took three attacks and seven deaths before French authorities were able to link them to-gether and to merah.

SpRee KilleR in toUloUSe, FRAnce

Mohamed Merah. © Sémhur / Wikimedia Commons / CC-BY-SA-3.0

Page 22: The Counter Terrorist Magazine - August/September 2012

22 The Counter Terrorist ~ August/September 2012

had been there as a tourist and produced photographs to support his claim.6

After the attacks, it was alleged that the mother of a fifteen-year-old boy twice complained to police about merah. she stated that merah had forced her son to watch al Qaeda videos of women being shot in the head and men being strangled to death. He apparently had also made her son listen to songs that she said were calls to “go to war.”7 There was also a report that a spanish intelligence service had told the French government that merah had attended a “meeting of salaf-ists in Catalonia in 2007.”8

unfortunately, it took three attacks and seven deaths before French authori-ties were able to link them together and to merah. It is believed that he videoed his attacks to upload to the internet. It had only been eight days from the time

of the first to the final attack, but anyone who has lived through a similar series of attacks knows that each day that passes without a solution can terrorize a com-munity. recall the Washington D.C. sniper case in 2002 when it took police twenty-two days and ten deaths in the Washington D.C. area before two men were conclusively linked to those attacks and others around the united states.

Investigation of the first attack revealed the soldier had placed an ad attempt-ing to sell a motorcycle. one response had come from a computer having an Ip (Internet protocol) address located in merah’s mothers’ home. unfortunately, there were also five-hundred-seventy-six other Ip addresses that were linked to the dead paratrooper. each had to be inves-tigated. After the second attack, French police as well as domestic security agency,

despite the information already in possession

of French authorities that included merah’s travel to Afghanistan,

his actions with regard to the French teenager,

and his mother’s ip address linked to the

first murdered soldier, it took six days to link the

shootings to merah.

For more information please visit www.preventivestrategies.net or www.ruraltraining.org

Rural Domestic Preparedness Consortium

Homeland SecurityCERTIFICATE PROGRAM

Courses for Public Safety Practitioners Courses include:

Law Enforcement Professionals Available Now!

Fire Service Professionals Available Now!

Emergency Management Professionals Coming Soon!

Enroll in a course today.No fees! No cost!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

Circle 265 on Reader Service Card

Page 23: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 23Circle 285 on Reader Service Card

Halogen, HID, LED, Infrared, Thermal

Permanent, Portable & Handheld UnitsRemote Control or Fixed UnitsIndustry Leading Warranties

308.278.3131 www.golight.com [email protected]

Direction Centrale du renseignement In-terieur (DCrI), created a list of suspects that included merah.

Despite the information already in possession of French authorities that included merah’s travel to Afghanistan, his actions with regard to the French teenager, and his mother’s Ip address linked to the first murdered soldier, it took six days to link the shootings to merah. police also found evidence of con-versations between merah and the first victim based on an examination of the soldier’s cell phone. A motorcycle dealer had notified the police that a customer had come into his shop and asked how to deactivate the electronic locator chip installed on a motorcycle. Deactivation of the device would ostensibly allow the driver not to be tracked when on the motorcycle. That customer had been merah’s brother, Abdelkader, who would later be arrested in connection with the A news camera in the center of Toulouse after the shootings. Photo: PierreSelim

Page 24: The Counter Terrorist Magazine - August/September 2012

24 The Counter Terrorist ~ August/September 2012

attacks. Abdelkader merah also admitted being present when his brother stole the motorcycle that he used in his attacks. This information, once collated, allowed police to focus exclusively on merah, yet he was able to conduct his most heinous attacks on march 19, when he killed four people, including the children.9

merah was tracked to his residence, and after a thirty-two hour standoff, he was killed in a blaze of gunfire. before he died, merah spoke with negotiators and others. He told them about his travels to pakistan and Afghanistan, claimed to be a “jihadist,” and said he belonged to al Qaeda. He said he wanted to avenge palestinian children and take revenge on the French Army because of its foreign interventions. He initially said he did not intend to conduct a suicide mission and wanted to live, but shortly before the standoff ended, he said he wanted to “die as a mujahedeen.”10

After merah was killed, many in France began to question whether or not authorities could have done more to prevent these attacks. In spite of merah having been apprehended in Afghanistan, allegedly placed on the u.s. “Do Not Fly” list, and having been reported for his attempts to “recruit” the teen, many believed that merah had been ignored by French law enforcement and the DCrI. However, the French Defense minister responded ,“I don’t think so, unless we want to turn France into a police state.”11

Merah’s case is similar to that of a number of young individuals who have either carried out attacks or have been arrested in the united states as a result of their having become radicalized. some believe that merah may have been radi-calized in prison.12

It is worth asking, “Could it happen here? Would a lone gunman attempt to kill soldiers, young children, or other

merah was tracked to his

residence, and after a thirty-two

hour standoff, he was killed in a

blaze of gunfire.

Facade of the apartment of Mohammed Merah, in Toulouse, shortly after the battle with French authorities. Photo: Casablanca1950

Page 25: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 25Circle 327 on Reader Service Card

T 2 S h u T D o w n T i m e r• Protect vehicle batteries from over-discharge byshuttingoffuptosingle30ampand20amploadsatapresettimeaftertheengineisshutdownorwhenthebatteryisdischargedtoalowvoltagelevel

• Manage power loads separately using 2 independenttimingcircuits

• An emergency switch allows 15minutes of operationafterthetimershutsdowntheequipment

• Thetimedsequencescanbeactivatedbysensingwhentheignitionisturnedto,orthealternatorgoes,off

ProTecTYour Vehicle BaTTerY uSing 2

SeParaTe Timing DelaYS

POWER SPECIALISTS FOR MOBILE COMPUTING

1.800.697.3701 •[email protected] •www.lindelectronics.com

civilians?” most of the terrorist attacks of the past few years have been directed at military or other government targets. military and law-enforcement personnel are easily identifiable, often because of their uniforms.

other than the shooting of middle-school student Iran brown during the D.C. sniper attacks in 2002, terrorists and other criminals have generally not targeted schools or schoolchildren in the united states. In fact, a review of some of the documents taken from osama bin laden’s home in Abbottabad, paki-stan, indicates that bin laden himself may have rejected such an attack. The documents outline bin laden’s thoughts about “tatarrus,” which are the special circumstances where it is permissible under Islamic law for a military com-mander to attack enemy territory even if the attack will result in the death of non–combatants, including muslim

women or children. However, bin laden expressed concern that many “jihadi groups” may have expanded the applica-tion of this practice from rare cases and the exception to the norm.13 The report did not contain his thoughts about the 2004 attack at beslan, russia, where at least one-hundred-eighty-six children were killed.

There have been successful terrorist attacks in the united states in the past several years. umar Abdulmutallab and Faisal shahzad, the Christmas Day and times square bombers, respectively, Nidal Hasan at Ft. Hood, and Carlos bledsoe’s murderous attack at a military recruiting station in little rock dem-onstrate there is work to be done to keep our communities safe. While these attacks represent our failures, many oth-ers have been prevented. American law enforcement has interdicted about fifty terrorist events in the past three years.

American law enforcement has interdicted about fifty terrorist events in the past three years.

Page 26: The Counter Terrorist Magazine - August/September 2012

26 The Counter Terrorist ~ August/September 2012

SOLVED

Mattracks.com

PROBLEM

Karlstad, MN218-436-7000 110M000D0101

RUBBER TRACKCONVERSION SYSTEMS 75 MODELS TO CHOOSE FROM

Circle 297 on Reader Service Card

This includes a number of individuals who have attempted to provide material support to or attempted to join a ter-rorist group overseas as well as conduct attacks domestically.

While much of the media focus has been on individuals like merah who are considered international terrorists by ideology, there have been successful and

prevented attacks by domestic terrorists whose motivation is fueled by events taking place solely in the united states. on may 1, 2012, a group of anarchists wanting to “send a message to corpora-tions and the united states government” by blowing up a major bridge near Cleve-land, ohio, were arrested.14

significant terrorist plots were stopped in New York, Illinois, North Carolina, and texas in 2009. The last defendant in a plot described as the most op-erational since 9/11 was convicted on may 1, 2012. In that case, three former high-school classmates had conspired to conduct suicide attacks on the New York City subway system on the anniversary of the 9/11 attacks. other interdicted plots involved both explosives and weap-ons attacks.

more attacks were prevented in 2010 in Virginia, maryland, oregon, michi-gan, and Alaska. other individuals were arrested as they attempted to travel abroad to join terrorist groups or while they were providing funds to support them. During 2010, terrorism investiga-tors found a number of individuals who traveled (or wanted to travel) to somalia in order to join al shabaab. two young men from New Jersey were recorded saying, “We’ll start doing killing here, if I can’t do it over there (somalia).”15

In 2011, numerous plots, both domes-tic and international, were disrupted in the united states including texas, Wash-ington, and the Washington, D. C. area. Jason Abdo, a young u.A. (unauthorized absence) soldier from Fort Campbell, KY, was arrested in texas as he planned to at-tack soldiers at Ft. Hood. He was charged with attempting to attack a restaurant that soldiers from Ft. Hood frequented. In his possession were explosives com-ponents as well as an article from the al Qaeda online publication, “Inspire,” entitled “make a bomb in the Kitchen of Your mom.”16

Page 27: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 27Circle 211 on Reader Service Card

“knowledge is critical to deter the threat of terrorism.”

Elena Mastors, Ph.D. | Dean, School of Security & Global Studies

Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network.

Learn More at www.amuonline.com/counter-terrorist

Education | Management | Public Service & Health | Science & Technology | Security & Global Studies

Page 28: The Counter Terrorist Magazine - August/September 2012

28 The Counter Terrorist ~ August/September 2012

Circle 273 on Reader Service Card

Circle 121 on Reader Service Card

In early 2011, a young saudi student studying at south plains College in lub-bock, texas, was arrested as he collected components to make a bomb. Khalid Al-dawsari has been charged with attempt-ing to use weapons of mass destruction in carrying out a terrorist attack. At the time of his arrest, he had purchased lab equipment and a trigger as well as two of the three chemicals required to make an explosive device. He had also done research on possible targets in the united states.17

In 2012, several attacks have already been prevented. In addition to the pre-empted attack in ohio described above, another young man was arrested as he walked toward the u.s. Capitol wearing a suicide vest and carrying an inoperable weapon provided by the FbI. He had also been recorded discussing possible at-tacks on u.s. soldiers in the Washington D.C. area.

The above are examples of plots that have been interdicted in the united states in the past three years. There are any number of young (and old), rich and poor, disaffected and not individuals who for a variety of reasons want to strike Americans no matter the cost—to the victims or to themselves.

After merah’s murderous attacks, a moderator of an online al Qaeda forum, Abu sa’d al-Amili, wrote, “The hero of the battle of Toulouse will be an ex-ample and a role model for whomever is behind him among the muslim youth in the West, especially those who have not joined up with mujahid groups.” He wrote further that the actions (such as merah’s) will make them heroes for Islam. Al-Amili wrote that many of the youth (in the west) have no social value, no jobs, or faith, but due to the “wide margins of liberty in the West,” they will be prevented from becoming downtrod-den like the Arabs living under tyrannical

“Explosive Countermeasures International, Inc. is dedicated to eliminating the threat to human life caused by the use and misuse of explosives worldwide.”

• EXPLOSIVE DETECTION CANINE TEAMS.• FACILITY HARDNESS REVIEWS, PLANS.• TRAINING SERVICES:• Access Control - Control Point Screening.

• Mail Room X-Ray Screening Operations.

• Hazardous Mail - Mail Room Operations.

• Explosive Device Recognition & Search Procedures.

• Chemical & Biological WMD 1st Responders Course.

• Managing Bomb Threats & Incidents (Operations/Managers).

• Managing Bomb Threats & Incidents (Law Enforcement).

• Advance Anti-Terrorism Course.

A crisis is not the time to determine your responses and needs.

Will you be ready?

www.nobombs.netPhone: 540-364-69003151 Winchester Road, Delaplane, VA 20144

Page 29: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 29

rule in their home countries.Al-Amili ends his online essay by

stating that Western-born muslims are rejecting local governmental attempts to promote non-violent forms of Islam, and ultimately the goal will be to produce an “al Qaeda in Western dress with blue eyes and with a totally Western appearance.”18

most people believe the killing of any child is reprehensible. unfortunately, some like al-Amili only see a “jihadist” doing his part to attack the west. The military, its personnel, and facilities will continue to be targets of terrorists in the united states, and attacks such as that perpetrated by merah would be an effec-tive way to carry them out. Whether or not children will be a target, we only have to look at the D.C. snipers and at merah to realize the continued likelihood of this type attack.

The responsibility to identify those who may wish to harm us, our institutions, or our children rests with individual citizens. Communities working with local law enforcement have the ability to identify those who may represent a risk to them. In turn, local law enforcement working in partnership with the Joint Terrorism task Forces and Fusion Centers around the united states have been effective in preventing a number of terrorist attacks. These relationships are the key to prevent-ing attacks such as those perpetrated in toulouse. It will be our local institu-tions—family, community, and local law enforcement working in conjunction with federal and international partners who constitute our defense network. It will be up to them to identify the mohamed merahs in their communities. •

Map of the school, and access map of Merah’s residence. Source: Open Street Map

Location map of Montauban and Toulouse, France. In pink, the area covored by the Scarlet Vigipirate level. Author: Eric Gaba – Wikimedia Commons user: Sting

Page 30: The Counter Terrorist Magazine - August/September 2012

30 The Counter Terrorist ~ August/September 2012

ABoUT ThE AUThoRMr. Marquise is the Director of the

Department of Justice’s, Bureau of Justice Assistance State and Local Antiterror-ism Training (SLATT) program. He is a retired FBI senior executive who led the investigation into the bombing of Pan Am Flight 103 and is the author of scotbom: evidence and the lockerbie Investigation.

EnD noTES1Fiona govan, “toulouse shooting:

little girl cornered in school and shot in head,” The Telegraph, 03 march 2012, (04 April 2012), http://www.telegraph.co.uk/news/worldnews/europe/france/9154350/toulouse-shooting-little-girl-cornered-in-school-and-shot-in-head.html.

2sarah Dilorenzo and Johanna De-course, “French shooting suspect Dead as toulouse siege Comes to Violent end,” The guardian, 03 march 2012, (10 April 2012), http://www.guardian.co.uk/news/blog/2012/mar/22/france-shooting-tou-louse-police-suspects-jewish-school-raid.

3Duncan gardham, “british links to toulouse terrorist,” The Telegraph, 22 march 2012, (10 April 2012), http://www.telegraph.co.uk/news/worldnews/europe/france/9163544/british-links-to-toulouse-terrorist.html.

4rob Crilly, “toulouse shooting: 80 French Nationals training with paki-stani taliban,” The telegraph, 21 march 2012, (10 April 2012), http://www.telegraph.co.uk/news/worldnews/europe/france/9158336/toulouse-shooting-80-French-nationals-training-with-pakistan-taliban.html.

5stefan simons, “A serial Killer under observation,” Spiegal Online Interna-tional, 22 march 2012, (10 April 2012), http://www.spiegel.de/international/europe/secret-services-had-monitored-french-serial-killer-a-823200.html.

6Ibid.

7rapheal Ahren, “Woman Went to police about merah’s radicalization two Years Ago,” The Times of Israel , 21 march 2012, (10 April 2012), http://www.timesofisrael.com/shooting-suspect-said-to-like-talking-about-cars-bikes-girls-and-sport/.

8simons, “A serial Killer under obser-vation.”

9Ibid.10laura smith-spark, “Who is

French shooting suspect mohammed merah?,”CNN.com, 22 march 2012, (10 April 2012), http://articles.cnn.com/2012-03-21/world/world_europe_france-shooting-suspect-profile_1_qaeda-pakistan-s-waziristan-afghanistan?_s=pm:europe.

11simons, “A serial Killer under ob-servation.”

12elaine ganley, “France looks at radicalization in prisons,” Salon, 10 April 2012, (09 April 2012), http://www.salon.com/2012/04/09/france_takes_new_look_at_radicalization_in_prisons.

13Don rassler, gabriel Koehler-Derrick, liam Collins, muhammad al-obaidi, Nelly lahoud, “letters from Abbottabad: bin ladin sidelined?,” Countering Terrorism Center at West Point, 5/3/12, http://www.ctc.usma.edu/posts/letters-from-abbottabad-bin-ladin-sidelined.

14united statesv. Douglas l. Wright, 1:!2-mj-03073-gw (6th Cir. 2012).

15united states v. mohamed Alessa, 10-mj-8109 (3rd Cir. 2010); united states v. Carlos e. Almonte, 10-cr-594 (3rd Cir. 2010).

16united states v. Naser Jason Abdo, w-11-cr-182 (5th Cir. 2011).

17united states v. Khalid Ali-m Al-dawsari, 11-mag-2617 (5th Cir. 2011).

18“Jihadi’s New toulouse Inspiration,” The Investigative Project on Terrorism, 18 April 2012, (22 April 2012), http://www.investigativeproject.org/3540/ipt-exclu-sive-jihadis-new-toulouse-inspiration.

it will be our local institutions—family, community,

and local law enforcement working

in conjunction with federal and

international partners who constitute our defense network.

Page 31: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 31Circle 131 on Reader Service Card

Page 32: The Counter Terrorist Magazine - August/September 2012

32 The Counter Terrorist ~ August/September 2012

Counter TheNew Orleans Police officer at a crime scene, Central City, New Orleans.

Photo: Derek Bridges

the U.S. citizen, the Second Amendment, And the U.n. SmAll ARmS tReAty

Page 33: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 33

responsible for any individual’s safety is that individual. so from where does the misleading phrase, “Protect and Serve” originate?

From 1950 to 1966, Chief William parker led the los Angeles police Department through an amazing period of re-birth. Chief parker was one of the first to believe that cops could be trained, equipped, led, and respected as “professionals.”1 In the early 1960s, Chief parker enlisted the help of then Inspector Daryl gates. together they created the country’s first sWAt team, began developing the concept of field training officers, and increased basic and in-service training standards, to name

o

Despite the well-known motto “to protect and serve,” police officers cannot prevent crime from being initiated. A crime is reported or observed and they respond to it, after the fact, and try to limit damage. But prevent crime?

An unrealistic expectation has been created as to what the police in any community can do.

by ross riggs

Constitution of the United States Photo: U.S. National Archives and Records Administration

nly in the big scheme of things, such as with a highly

visible patrol presence, a substantial percentage of convictions, and strict sentencing is crime “prevented” by deterring irrational actors, most of whom would not have done anything illegal in the first place.

When crime happens in your neighborhood, in your family, on your front porch, there is only one person responsible for stopping that criminal before he commits the crime he intends to commit. many criminals attempt crimes regardless of how many patrol cars are out or how high the risk of jail time might be. The only person who can be

Page 34: The Counter Terrorist Magazine - August/September 2012

34 The Counter Terrorist ~ August/September 2012

but a few innovations. officer Joseph Dorobek2 created the

motto “protect and serve” for the lApD training Academy in 1955. The motto was adopted by the los Angeles City Council as the department motto in 1963 and has graced the patrol cars of that agency ever since. Through good times and bad, “protect and serve” was the bottom line for what law enforcement was all about. but with that motto have come some unintended consequences.

An unrealistic expectation has been created as to what the police in any community can do. The stress a

community experiences when police incompetence is perceived when really bad things happen is exponentially greater on the police themselves. They are individually and collectively frustrated. Cops receive pressure from seniors and peers, are lampooned by the media, and are sometimes even hated by the members of the public they have sworn to protect. It has been said, "We did not become the men that we are because we were soldiers or cops, but became soldiers and cops because of the men we are."3

This quote explains the mindset of most cops, and also why such inability to

make the desired difference is so painful.The criminal always gets the first move

and once the first move is played, the responder can only react to what the criminal has already done. even when the police try to anticipate the next move of a criminal, such as a serial killer, they have to first respond to the crimes already committed. The resulting friction plays out in increased distrust of the police by the public, and of officers denigrating the citizens they joined the force to serve.

In as much as most crime is not perpetrated by a criminal in the lobby of police headquarters at shift change,

Department Motto - To Protect and to Serve, along with the Los Angeles city seal is located on both front doors of every black & white LAPD patrol vehicle. - Jeff Costlow 2004. Photo: Skyfox11

Page 35: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 35

Mobility, Deployment, Maintenance, Sustainment And Operations Systems

Enhanced Command and Control Secure Communications Video Conferencing Increased Protection for Sensitive Equipment

Increased Mission Flexibility Multiple System Configurations Deployable via Military and Commercial Vehicles Air-Transportable and Sling-Loadable

Deployable Command Centers

HVACVenting

360° High Density

Insulation

Fire Detection and Suppression Racks Un-Interruptable

Power Supply (UPS)Power Distribution

Unit (PDU)

Weather and Fire-proof ISO Compatible Enclosure

HVAC Condenser/Evaporator Chilled H2O

Phone (866) 312-6226 (571) 259-2817Fax (800) 862-9489 Email [email protected]

www.sesolinc.comSESOLINC

GROUP

THESESOLINC

GROUP

THE

Data Container Maximum Flexibility Completely Customized

to Client Requirements

Deployable Data Security

Circle 239 on Reader Service Card

Page 36: The Counter Terrorist Magazine - August/September 2012

36 The Counter Terrorist ~ August/September 2012

• Motion activated trigger as fast as 1/10th of a second.• 1080P High Definition color images by day, NoGlowTM Covert

Infrared illumination by night.• Compact size (5.5” x 4.5” x 3”) aids in concealment.• On-board memory and power with a battery life of up to one

year or 40,000 images.

• Completely weatherproof housing designed forextreme duty usage.

• General surveillance and license plate capturemodels available.

• Made in the U.S.A.

Reconyx HyperFire security series cameras are designed for quick and easy deployment in areaswhere no power or communication lines exist.

Visit www.reconyx.com for more information.

CovertInfrared

CovertInfrared

NoGlow

Circle 303 on Reader Service Card

however, if every individual took

responsibility to stop criminals before

they committed an act against them,

criminals would not be so brazen.

Video training from leadinglaw enforcement experts.Anytime, anywhere.

With more than 500 high-definition videos covering dozens of critical training topics, the PoliceOne Academy gives you instant, cost-effective access to training that will improve your team’s performance and help keep them safe on the streets.

www.PoliceOneAcademy.com

is a Praetorian Group Company

Contact us today at (800)323-0037for your FREE department preview!

No overtime, travel, or downtime costs associated with training

A wide variety of topics from Defensive Tactics to Leadership

Ideal for in service/roll call training

An easy-to-use video navigation and management system

Objective lesson plans and knowledge check quizzes

Tracking and reporting features

An advanced-delivery system that ensures the highest possible

quality of streaming available based on your internet connection

Access from your mobile device

Available to departments for an affordable annual subscription based on agency size

The PoliceOne Academy Offers

the vast majority of crime in the united states and elsewhere will not be prevented. This premise, of course, recognizes that society cannot quantify how much crime has been prevented since it never occurred. However, based on available crime statistics, it is reasonable to conclude that the vast majority of crimes that are committed are not preventable by local police. If that is true, why do police agencies and their communities continue to hold on to that paradigm? Why are billions of dollars poured into such a losing proposition? Finally, why is the inevitable fulfillment of the obvious outcome allowed to create such stress?

There is only one person in all the world who can be responsible for preventing crime, and that person is the

individual to whom the crime is about to happen. The phrase “victim of crime” has been used universally when perhaps a more constructive perspective is “victim of their own refusal (or inability) to take the action necessary to stop the criminal from completing their crime.” The term inability is appropriate because there are individuals who are incapable of acting in their own best interests, whether they are unborn babies, infants, or the infirm. some others, too, could not have foreseen the situation in which they found themselves, nor in any way could they have avoided the event.

If they did whatever they had to do to remain alive, they are winners, not victims. If they did all that they could possibly do to survive but did not, they are heroes. Individuals, must, however,

Page 37: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 37Circle 180 on Reader Service Card

Video training from leadinglaw enforcement experts.Anytime, anywhere.

With more than 500 high-definition videos covering dozens of critical training topics, the PoliceOne Academy gives you instant, cost-effective access to training that will improve your team’s performance and help keep them safe on the streets.

www.PoliceOneAcademy.com

is a Praetorian Group Company

Contact us today at (800)323-0037for your FREE department preview!

No overtime, travel, or downtime costs associated with training

A wide variety of topics from Defensive Tactics to Leadership

Ideal for in service/roll call training

An easy-to-use video navigation and management system

Objective lesson plans and knowledge check quizzes

Tracking and reporting features

An advanced-delivery system that ensures the highest possible

quality of streaming available based on your internet connection

Access from your mobile device

Available to departments for an affordable annual subscription based on agency size

The PoliceOne Academy Offers

Circle 335 on Reader Service Card

Page 38: The Counter Terrorist Magazine - August/September 2012

38 The Counter Terrorist ~ August/September 2012

and disarmed him, holding him for police. The pastor’s grandson, according to some of the reports, was licensed to carry a concealed firearm and used his weapon to hold the subject for police. They made a choice to be responsible for their own safety.

Americans have traditionally stood up for themselves. Admiral Yamamoto’s not wanting to accept the risk of an invasion by his Japanese Imperial Fleet on America’s West Coast following pearl Harbor is well known. According to legend, he reasoned that there would be a “rifle behind every blade of grass.” 6 However, if every individual took responsibility to stop criminals before they committed an act against them, criminals would not be so brazen. If there were the probability of a rifle in the hands of a well-trained patriot awaiting

the would-be criminal, crime rates would plummet. The significance of “lone wolf” terrorists would be negligible.

The infiltration of America’s city streets by gangs, many now affiliated with mexican drug cartels, have brought mexico’s drug war into u.s. homes. Initially it was border towns that were at risk. many political leaders turned their heads, and now it is well beyond the border and the violence of drug cartels is visible in daily newspapers across the u.s.

There is no current plan that is consistently applied across the law enforcement field to combat this incursion. The case study, Los Zetas Cartel: Ambush in Houston, articulated the problem very clearly. “our population (CoNus) is insufficiently informed of the threat, and will be caught unprepared in the crossfire in

Circle 175 on Reader Service Card

understand their responsibility to avoid becoming a “victim” of crime and realize their own capability to prevent crime.

The first rule of risk mitigation is to “avoid the risk.”4 The numbers of options for preventing a criminal act are too numerous to catalog here. suffice it to say, the responsibility does not lie with the local gendarme, a father, a brother, or even the generous soul performing Neighborhood Watch down the street. It can, and must, only reside with the individual.

In the spring of 2012 a small church in Spartanburg, South Carolina, was the scene of an attempted mass shooting incident.5 When the congregants saw a man with a gun approaching the church, they took action. First, they barred the door. When the shooter broke through the door, the congregants jumped him

Page 39: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 39

the law abiding citizen would be left dependent solely on the police to protect him and his family and that is clearly not a reasonable option.

their neighborhoods.”7 Citizens who are insufficiently informed are not able to effectively avoid risk. “Crime prevention” in the u.s. must focus on not only encouraging citizens to avoid risk, but also on more accurately communicating the risks to the public so they can avoid or ameliorate a risk when possible, and confront the risk when that is their only option.

The public cannot adequately prepare to protect themselves by becoming better informed of the risks, learning strategies on how to avoid, ameliorate and confront risks, and teach these methods to their families if, at the same time, they must tolerate attempts to undermine the second

Amendment. u.s. Attorney general eric Holder is on record as stating in 1995 that he wanted to “brainwash people into thinking about guns in a vastly different way.”8

Currently, health insurance companies require physicians to ask, in their screening process, if patients keep any guns in their homes, regardless of the reason for the doctor visit. They also require the insured to grant access to all medical records by the insurance company at any time. Now, if medical insurance were provided by a government entity administered by an individual lacking commitment to the Constitution, one can imagine the potential for abuse.

As another concern, secretary of state

Page 40: The Counter Terrorist Magazine - August/September 2012

40 The Counter Terrorist ~ August/September 2012

Circle 343 on Reader Service Card

Hillary Clinton reportedly announced that president obama would seek to pass through Congress approval of the united Nations small Arms treaty.9 The phrase “the devil is in the details” may fit here. The summary document posted by the u.N. on the issue of a small arms treaty and proliferation of guns leading to violence has the respectable stated goal of stopping international illegal trade.

Among others, the text of the u.N.

small Arms treaty summary contains these details:

(55) The World Report on Violence Against Children indicated that violence in the community could take on frightening proportions where weapons were in wide circulation. The report recommended that States develop a comprehensive prevention policy to reduce demand for and access to weapons as a key action to reduce environmental factors that contribute to

Hillary Rodham Clinton, Secretary of State, met Katsuya Okada, Minister for Foreign Affairs, and Stephen Smith, Minister for Foreign Affairs, at the Waldorf-Astoria Hotel in New York

City, New York State on September 21, 2009. Photo: State Dept Image by Michael Gross

Page 41: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 41Circle 339 on Reader Service Card

violence against children in the community. (56) Just as there is no single cause to armed violence, there is no single solution. Armed violence reduction programmes must take a wide range of risk and resilience factors into account and involve all stakeholders. The current efforts to reduce and contain armed violence are generally carried out by military and policing institutions, public health and education agencies [emphasis added] or civil society organizations that focus on conflict prevention, peacebuilding, transitional justice, and community development10

This is but one excerpt of the summary of the u.N. agreement but additional treaty passages reveal the desire to require every weapon everywhere and, when possible, all ammunition to be traceable by governments. u.N. personnel have publicly expressed indifference to individual gun ownership and self-defense needs. It is easy to see the potential for damage to the Constitution by being overly cooperative with various u.N. initiatives.

“resilience” is a word that recently

achieved buzzword status at some u.s. “think tanks.” In recognition of the potential for chaos to be created by acts of terrorism, spill-over narco insurgency, financial breakdown, and other disasters, citizen resilience has re-emerged as a point of interest. one must ask: Does a naïve understanding of police “protection” improve or degrade individual resilience? Does inhibiting individual’s desire and ability to defend themselves and their property improve or degrade citizen resilience?

Of course, if the point is crime reduction and risk amelioration, limiting access to small arms will only adversely affect law-abiding citizens. Criminals, by definition, are willing to break the law and will obviously still use guns. Just as the 18th Amendment did not stop drinking, even an amendment to reverse the second Amendment would not prevent criminals from obtaining guns. The law abiding citizen would be left dependent solely on the police to protect him and his family and that is clearly not a reasonable option. •

BP-2C

BP-2

BANgstick

WWW.FLASHBANGPOLE.COM

Circle 155 on Reader Service Card

Official portrait of United States Attorney General Eric Holder. Photo: United

States Department of Justice

U.S. Attorney General Eric holder is on record as stating in 1995 that he wanted to “brainwash people into thinking about guns in a vastly different way.”

Page 42: The Counter Terrorist Magazine - August/September 2012

42 The Counter Terrorist ~ August/September 2012 Circle 81 on Reader Service Card

Protective security equiPmentAt ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support.

• CALIBER® Robot• Hook&LineKits• SearchMirrors• EODHandTools• SearchKits

ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3Tel: 613.745.3600 I Fax: 613.745.3590 I Email: [email protected] Toll Free: 1.877.483.7978 www.icortechnology.com

Circle 79 on Reader Service Card

Page 43: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 43

PRESENTS

Registration/Icebreaker Social: September 30 - Conference: October 1,2,3

In the Heart of DowntownNashville

10 Minutes from the Airport

Sheraton Hotel Downtown - Nashville, TN

2012 POLICE & MILITARY WORKING DOG CONFERENCE AND VENDOR SHOW

270.534.0500 [email protected] www.k9copmagazine.com

Attendees will receive a certificate for 24 Hours Continuing Law Enforcement K-9 Education

Register Now! Only $275 per person $350 after August 15

SUBSCRIPTIONS available to EVERYONE

ONLY $29.95

Scan code with your smartphone

to subscribe today!

K9 COPM A G A Z I N E TM

For Police and Military Working dog Handlers

Wo

r l d w i d e

D

istributed

The largest and most read

Police and Military K-9 magazine in the world

1 year (6 issues)

www.k9copmagazine.com (270) 534-0500 [email protected]

[ [Follow us on

Circle 277 on Reader Service Card

Page 44: The Counter Terrorist Magazine - August/September 2012

44 The Counter Terrorist ~ August/September 2012

K9 COP AD #1

ABoUT ThE AUThoRDr. Riggs retired Louisville,

Ohio Chief of Police, a 38-year law enforcement veteran and a graduate of the FBI National Academy. He is the president of Security Consulting Investigations, LLC (www.security-consulting.us). His blogs are available at: www.homelandsecuritynet.com/HSN/?s=PoliceBlotter and he is working on his first book: to protect and serve (projected 2013 release).

EnD noTES1Alisa sarah Kramer, “William H.

parker and the thin blue line: politics, public relations and policing in postwar los Angeles,” American university 2007.

2“History of the lApD,” los Angeles police Department, accessed June 11,

2012, http://www.lapdonline.org/history_of_the_lapd/content_basic_view/.

3ross l. riggs, “truth, Justice, and the American Way,” magazine of the FBI National Academy Associates, June 21, 2011, http://issuu.com/fbi_nationalacademyassociate/docs/fbi_mar-apr2012_flipbk.

4ross l. riggs. In times of Crisis: A Plan for Creating Contingency Management Teams for Missionary Sending Churches and Agencies. library of Congress tXu1-687-474, April 28, 2009.

5Derek Dellinger and Casey Vaughn, “Churchgoers subdue gunman at spartanburg Church,” accessed march 25, 2012, http://www.foxcarolina.com/story/17251517/churchgoers-subdue-gunman-at-spartanburg-church.

6http://en.wikiquote.org/wiki/Isoroku_

Yamamoto accessed June 11, 20127Jennifer Hesterman, “los Zetas

Cartel Ambush in Houston,” The CounterTerrorist, April-may 2012, 26.

8“eric Holder ‘brainwash people’ About guns,” Youtube, (18 march 2012), accessed may 27, 2012, http://www.youtube.com/watch?v=0nm0asnCXD0.http://www.youtube.com/watch?v=0nm0asnCXD0.

9rand paul, “stop the u.N. gun ban,” National Association for gun rights, accessed June 1, 2012, www.nagr.org/uN_lp_survey2.aspx.

10ban Ki-moon, “small Arms: report of the secretary-general,” united Nations security Council, (05 April 2011), accessed April 2, 2012, http://www.un.org/ga/search/view_doc.asp?symbol=s/2011/255.

Hillary Rodham Clinton, Secretary of State, met Katsuya Okada, Minister for Foreign Affairs, and Stephen Smith, Minister for Foreign Af-fairs, at the Waldorf-Astoria Hotel in New York City, New York State on September 21, 2009. Photo: State Dept Image by Michael Gross

Page 45: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 45Circle 308 on Reader Service Card Circle 136 on Reader Service Card

SECURITY SOLUTIONS INTERNATIONALSSISSI Protecting the Homeland Together ®

® Call now for more information. Pricing dependent on quantity

and delivery location. Call: (305) 401-6906 or email [email protected]

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB.

The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever.

The Portable Vehicle Barrier comes with several customized configurations:

• Youcanputwheelsonitsothatitactsasaswingbarrier and easily opens a road

• Youcantoughenthelinebyaddinganchoringcables or place the PVB’s in one single row or even three rows to stop anything

• Additionalsafetyfeaturescanbeadded

PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable.Best of all NO maintenance is required.

MadeintheUSAmeansjobsintheUSAandsupporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB isaVBIEDkiller.CALLNOW.

Or visit our website: www.SSIPVB.comCircle 226 on Reader Service Card

New and improved

Page 46: The Counter Terrorist Magazine - August/September 2012

46 The Counter Terrorist ~ August/September 2012

Book review

S everal years ago in Iraq, I wit- nessed multiple mass prisoner re-leases. I felt confident that I would never see a study commissioned to determine

subject of terrorist recidivism is difficult to obtain. The Eleven: Saudi Guantánamo Veterans Returning to the Fight, by evan F. Kohlmann (www.nefafoundation.org) is a

‘ ‘ ‘

the number of American troops killed in Iraq by terrorists who had already been in custody and released. For a number of reasons, accurate information on the

The Eleven: Saudi Guantánamo Veterans Returning to the Fight

reviewed by: Chris grahamby evan F. Kohlmann

GUANTANAMO BAY, Cuba (Dec. 31, 2009) A Soldier stands guard in a tower at Camp Delta at Joint Task Force Guantanamo Bay. Photo: U.S. Army by Spc. Cody Black/Released.

Page 47: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 47

uniquely valuable work on the subject. The previous presidential election

brought the handling of terrorist prison-ers to the forefront as one candidate promised to close the us military prison in guantánamo bay Cuba (gitmo). once elected, president obama issued several executive orders on the subject of doing so, and then reversed himself in practice by keeping the facility open to this day. Despite the prison’s being kept open, about 600 prisoners have been released.1 The Eleven profiles some of those prisoners.

The title of the work comes from the fact that, at the time of publication, eleven alleged terrorists wanted by the saudi Arabian government were known to have been held at gitmo and released to saudi Arabia. obviously, it would be likely that the total number of recidivist terrorists from gitmo would be higher than could be proven.

The first man profiled is saeed Ali Jabir al-Kathim al-shehri. Al-shehri traveled to Iran and served as an "al Qaeda facilitator . . . For youth traveling to Afghanistan." Al-shehri admitted to later traveling to Afghanistan before being wounded and taken into custody. Kohlmann states, "on November 9, 2007, saeed al-shehri was quietly transferred by the us govern-ment from his cell in guantanamo bay to a locally-run detention facility in saudi Arabia. less than a year later, Al -shehri managed to escape the grip of saudi security forces and fled with other high-profile saudi al Qaeda operatives to neighboring Yemen. Al-shehri later turned up in a video using the title, “sec-retary general of the Al Qaeda organiza-tion saudi Arabia."

Yusuf muhammad mubarak al-Jebairy al-shehri had travelled to syria and Iran

before entering Afghanistan and work-ing with the taliban. us officials believe he trained at al Qaeda's infamous al Farouq terrorist camp near Kandahar, Afghanistan. (This same camp produced at least seven of the 9/11 hijackers.) He was captured in Afghanistan and sent to gitmo. Kohlmann states that his case file said, “the detainee stated he considers all Americans his enemy. The Detainee has decided that he hates all Americans be-cause they attack his religion, Islam. since Americans are the detainee’s enemy he will continue to fight them until he dies." Yusuf Al shehri was nonetheless released by the us military from detention on November 9, 2007, to the saudis. In a quote repeated throughout this docu-ment, Kohlmann states, "it is not known when, how or why shehri was able to escape his saudi captors."

Jabir bin Ali bin Jubran al-Faify claimed he was "influenced to join jihad after studying various verses in the Koran dealing with jihad." Al-Faify was a drug user and “saw jihad as an opportunity to make things right.” It is believed that he attended the al Farouq camp. He was picked up in pakistan after fleeing tora bora, Afghanistan, in 2002. The military review board said, "the detainee stated that he now thinks what he did was mistake." Al-Faify was released to saudi Arabia in 2006 and subsequently escaped. Kohlmann states, "it is not known when, how or why al-Faify was able to escape his saudi captors."

Attacking guards, expressing joining the jihad to die, and hatred for “Ameri-cans and all non-believers” was reported from other gitmo releasees. some were released after the review panel unani-mously decided that the subject “contin-ues to be a threat.” Kohlmann concludes,

"there is also one other final lesson to be learned from the [Administrative review board] Arb panel reviews of the eleven guantánamo veterans currently sought by saudi authorities: the danger of blindly taking anyone at their word that they are not, in fact, enemy combatants. Argu-ably, the most dangerous of the eleven saudi gitmo veterans currently on the run—saeed Al shehri and mohammed Al-Harbi were cooperative, non-confron-tational, and even charming during their interactions with Arb panel members in guantanamo bay.”

The NeFA foundation posted a Direc-tor of National Intelligence document called “summary of the reengagement of Detainees Formerly held at guantánamo bay, Cuba” (2012).2 This document con-firms that released prisoners are returning to jihad, albeit at a reportedly improving rate, to this day. terrorist recidivism is a complex issue. Kohlmann’s The Eleven: Saudi Guantánamo Veterans Returning to the Fight provides much information relevant to the challenges we face with today’s series of inconsistent systems for terrorist interdiction, apprehension, detention, and release. •EnD noTES

1“summary of the reengagement of Detainees Formerly Held at guanta-namo bay, Cuba,” Director of National Intelligence, accessed June 2, 2012, www.nefafoundation.org

2Ibid.

Page 48: The Counter Terrorist Magazine - August/September 2012

48 The Counter Terrorist ~ August/September 2012

Counter The

by John Andrews

hizB Ut-tAhRiR conVeneS in illinoiS

Hizb ut-Tahrir is working for the establishment of an islamic state ("Ummah") lead by one true leader ("khilafah"/caliph).

Page 49: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 49

it was founded in 1952 by sheikh taqiuddin an-Nabhani al Falestini. It is a political party based on Islam. Islam in this context is not only a religion, but an all encompassing ideology and way of life that has an answer for all man’s problems, whether economic, cultural, social, or political.

Hut holds that one can only truly live as a muslim if he lives under a government controlled by muslims. Followers believe that only under such a system can human nature thrive and experience tranquility.1

The official website of Hizb ut-tahrir states, “Another condition of Jihad is that the ruler must be Muslim, be he righteous or dissolute (Fajir); the term Fajir does not include the Kafir (infidel) because the Kafir cannot be emir over the muslim and the muslim is not obliged to obey

him.” It also states, “Allah (swt) says: ‘And never will Allah grant to the unbelievers a way over the believers.’” [4-141]2 HuT members hold that all other forms of government contradict human nature and bring nothing but misery to mankind. This is especially true of democracy, which states that sovereignty belongs to the people and not to Allah.

The goal of this organization, as spelled out in its website, is “seizing the reins of power through the ummah [muslim community] in order to implement the ideology in a comprehensive manner, because it is forbidden to seize partial power. Hence, the arrival at the ruling must be total and the implementation of Islam must be comprehensive.”3

According to an-Nabhani, such a government would be led by a Caliph,

there are approximately 10,000 hard core members operating in over 40 countries with a significant presence in london.

hizb ut-Tahrir (huT), or the Islamic Party of Liberation, is a little-known organization that has successfully merged orthodox Islamist ideology with Leninist strategy and techniques.

Page 50: The Counter Terrorist Magazine - August/September 2012

50 The Counter Terrorist ~ August/September 2012

a two-year period of study supervised by a party member. After their indoctrination is complete, they would become a cell member along with five to eight other members. only the commander of the cell knows the next level of the leadership.

2) Convince the ummah to adopt the ideology of the party and follow the established vanguard. They will do this by attacking the West as colonial powers that control the intellectual, political, economic, and military apparatus of the Islamic countries through the corrupt regimes of the current muslim leaders who “do not follow the rules of Islam.”

who is a substitute for mohammed, a political, as well as religious, leader. He would declare jihad and wage war against all non-believers and would not recognize existing national, tribal, or clan differences. The Caliph would be appointed by a group of prominent men and remain a Caliph as long as he followed Islamic law. He would not be accountable to the people.4

Hut states that they intend to achieve the Caliphate by way of a three-pronged approach:

1) establish a vanguard of loyal cell members. These members would undergo

Sheikh Issam Amira (an islamic scholar) talking in a conference organized by Hizb ut-Tahrir in Ramallah.

Page 51: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 51Circle 125 on Reader Service Card

PLATESMART’S LPR TECHNOLOGY IS THE MOST IMPORTANT PRODUCT NOW AVAILABLE TO U.S. SECURITY AGENCIES TO FIGHT DOMESTIC AND INTERNATIONAL TERRORISM ON AMERICAN SOIL.

•PlateSmart®’S SOFTWARE-ONLY LICENSE PLATE RECOGNITION (LPR) technology can be used to identify vehicles with license plates of interest at BORDER CROSSINGS, ON ROADWAYS, AND FOR SITE SECURITY (SUCH AS AT GOVERNMENT FACILITIES, AIRPORTS, NUCLEAR POWER PLANTS, AND OTHER SITES OF INTEREST), ALL EFFORTLESSLY AND WITHOUT HUMAN INTERACTION.

•PlateSmart® is the ONLY LPR TECHNOLOGY CAPABLE OF READING A LICENSE PLATE’S STATE JURISDICTIONAL DATA AND ALPHANUMERIC CHARACTER STRING WITH THE HIGHEST ACCURACY RATES IN THE INDUSTRY, AS INDEPENDENTLY VERIFIED BY LPR INDUSTRY EXPERT LEE J. NELSON.

•PlateSmart®’S LPR technology is the most versatile Anti-Terrorism tool currently available to U.S. security agencies due to its TOTALLY COVERT NATURE, FUNCTIONALITY IN ALL LIGHTING AND WEATHER CONDITIONS, AFFORDABILITY, INTEGRABILITY WITH THIRD-PARTY TECHNOLOGIES, and ability to be utilized with PRE-EXISTING OR NEWLY INSTALLED LEGACY, STATE-OF-THE-ART, OFF-THE-SHELF, OR PROPRIETARY VIDEO AND COMPUTER EQUIPMENT.

•PlateSmart®’S LPR software is THE MOST AFFORDABLE LPR TECHNOLOGY AVAILABLE ON THE MARKET. ITS COST IS A FRACTION OF THAT OF COMPETITORS’ SYSTEMS, AND IT IS TOTALLY SCALABLE, ALLOWING A RANGE OF INSTALLS FROM SINGLE SYSTEMS TO HUNDREDS. THIS CAPABILITY IN TURN ALLOWS AGENCIES TO SCAN HUNDREDS, THOUSANDS, OR EVEN MILLIONS OF VEHICLES PER YEAR.

•PlateSmart®’S NEW DATABASE CONTROL CENTER offers the user the ability to monitor or to manipulate its LPR systems from a central location. The data collected by the system is stored and can be data mined to find BOLOs in real-time or to track a vehicle’s movement over days, weeks, months, or even years. Data is available with GPS coordinates, date- and time-stamps, and map overlays, all invaluable tools to help officers track movement patterns of suspect vehicles.

•PlateSmart® can be utilized as EITHER A STAND-ALONE OR ENTERPRISE SOLUTION IN EITHER FIXED OR MOBILE APPLICATIONS (SUCH AS UAVs).

•PlateSmart® instantly checks all BOLOs in highly sensitive databases from Federal (NCIC) to State (SUCH AS FLORIDA’S FDLE) and local databases as well as other unnamed Federal BOLO lists at the same time and returns a hit within milliseconds of the plate entering the camera’s viewfinder. SEVERAL MILLION BOLOs CAN INSTANTLY BE CHECKED IN THESE DATABASES.

www.platesmart.comFor More Information

Call (813) 749-0892Copyright ©2012 Cyclops Technologies, Inc., d/b/a PlateSmart.All Rights Reserved.

HIGHWAY MONITORING BORDER CONTROL

LAWENFORCEMENT

SITE SECURITY

ANTI-TERRORISM

PLATESMART’S VERSATILITY, AFFORDABILITY, ROBUSTNESS, AND EASE OF USE ALLOW FOR MASS DEPLOYMENT TO A DEGREE PREVIOUSLY UNATTAINABLE.

PLATESMART DELIVERS THE HIGHEST ROI IN THE LPR INDUSTRY.

Counter Terrorist Ad.indd 1 7/2/12 4:05 PM

Page 52: The Counter Terrorist Magazine - August/September 2012

52 The Counter Terrorist ~ August/September 2012 Circle 252 on Reader Service Card Circle 319 on Reader Service Card

The Jersey Cuff™The Next Generation in Disposable Restraints

Actual Size 7.5 inches 0.7 grams

• Patented Jersey Cuff™ is the lightest, smallest, safest and most versatile disposable cuff in the world• Fits in a pocket, a molle strap or in an operational carry pouch Tac-Pac™ - (pictured right) holds 4 Jersey Cuffs and a safety cutter G-Pac™ - gas mask pouch, holds 20 Jersey Cuffs and attaches via drop style, molle system or D-rings and sling Evac-Pac™ - for riot control or jail evacuations, the Evac-Pac™ holds 96 Jersey Cuffs

Made in the U.S.A.Sold exclusively by Combined Systems, Inc.388 Kinsman RoadJamestown, PA 16134(888) 989-7800www.combinedsystems.com

CT_Jersey Cuff Ad.indd 1 2/28/12 9:05 AM

3) The party (through the ummah and led by the vanguard) would seize the reins of power and establish the Caliphate. They state that they then intend to appoint an emir or military leader, who would declare jihad against all non-believers, expel all Western citizens and shred all diplomatic agreements with Western governments.

Hut’s website states, “The emir is a military leader who leads the muslims in Jihad against the Infidels. The Imam is but a shield behind which one fights and protects himself.” It goes on to say: “Jihad is obligatory upon you with every emir, be it righteous or dissolute. The actions and the sayings of the messenger of Allah demonstrate that the muslims must appoint an emir from amongst them and it is this Emir who organises the matter of Jihad. The reality of Jihad is that Allah (swt) has decreed it upon the muslims as whole while they had an emir; thus Jihad is a collective duty and with the emir. This

means that it is imperative for the ummah to appoint an emir”.5

There are approximately 10,000 hard core members operating in over 40 countries with a significant presence in london. Their sources of financing are largely unknown.6 Hut is, however, active in the united states.

They have recently been conducting open forums in the u.s. including in the Chicago area. on July 19, 2009, approximately 500 people attended a conference sponsored by the Hizb ut-tahrir captioned, “The Fall of Capitalism and the rise of Islam,” in oak lawn, Illinois. Another conference sponsored by Hizb ut-tahrir scheduled for June 17, 2012 captioned, “Khilafah Conference 2012; liberation by revelation” to be held in rolling meadows, Illinois.7

The organization appears to have two philosophies depending upon their audience. A spokesman for the group,

the organization appears to have two philosophies depending upon their audience. A

spokesman for the group, mohammad malkawi, stated to reporters present at

the conference in oak lawn, illinois, that hizb

ut-tahrir condemns terrorism and has never

indulged in recruiting jihadists.

Page 53: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 53Circle 275 on Reader Service CardCircle 301 on Reader Service Card

Page 54: The Counter Terrorist Magazine - August/September 2012

54 The Counter Terrorist ~ August/September 2012

mohammad malkawi, stated to reporters present at the conference in oak lawn, Illinois, that Hizb ut-tahrir condemns terrorism and has never indulged in recruiting jihadists. He stated, “We do not train them for violence or for jihad. our objective is to create an Islamic state of Khalifah in the muslim world.” However, intelligence sources have indicated that Khalid sheikh mohammed, the master mind of 9/11, and abu musab Al-Zarqawi, the former leader of al-Qaeda in Iraq, are both alumni members.8

Compare what malkawi says to the u.s. press with what muhammad Ibrahim, member of the advisory council of Hizb ut-tahrir in lebanon, stated: “some people tried to interpret jihad to mean nothing more than self-defense. Thus, the muslims abandoned the pinnacle of their glory, and relinquished their

responsibility toward the world, as a result of their ideological weakness and their lack of understanding of the laws of the shari’a of the prophet muhammad. In principle, Jihad is an offensive Jihad, which was instated in order to spread Islam throughout the world.”9 Salah Al-Din Adhadhda, member of the press bureau of Hizb al-tahrir, stated, “the Jihad of a nation over 1.5 billion strong has been reduced to the killing of an American in Iraq, a briton in Afghanistan, a Jew in palestine, or a russian in Chechnya. . . . true celebration should only occur with the conquest of the capitals of the world by the message of Islam…”10

Hizb ut-tahrir has been recruiting members in the u.s. by utilizing new media to market its ideology, such as hip hop fashion boutiques and bands along with online social networks and chat

Featuring the world renowned 7-Day Providing Executive Protection Program Established in 1978 by Dr. Richard W. Kobetz

Over 100 hours with 20 plus instructors

5-Day LEO Dignitary Protection Program

Other Specialized and Custom

Perfect for Military, Government, Police and

America’s Top EP Training School

www.personalprotection.com 16 Penn Plaza Suite 1570, New York, NY, 10001 (212)268.4555 [email protected]

We are not the Best because we are the oldest…

We are the oldest because we ARE the Best!

Training Courses

Private Security Protective Services

Circle 281 on Reader Service Card Circle 115 on Reader Service Card

BorderManagementConference &Technology Expo

2nd Annual

UAS Focus Day: October 15th, 2012Main Conference & Free Exhibition: October 16th - 17th, 2012Judson F William Convention CenterEl Paso, TX

Information, Integration, and Rapid Response

Hear from over 30 high profi le speakers addressing the hottest issues in border management and gain exclusive access to the latest technology needed to secure U.S. land, air and maritime borders.

REGISTER TODAY TO SAVE!

WWW.BORDERTECHEXPO.COM

Khalid Shaikh Mohammed, upon capture. Photo: U.S. forces

Page 55: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 55

Four motorcycles of Copenhagen Police Department during an demonstration by Hizb ut-Tahrir in Copenhagen the intersection Nørre Farimagsgade/Frederiksborggade is blocked.

rooms. They have also been recruiting well educated professionals who are influential in their communities, such as doctors, lawyers, business owners, and university professors.11

Hizb ut-tarhrir’s website has a separate section devoted to Jihad and the establishment of a caliphate to rule over all, muslim and non-muslim. Allah (swt) says: “Fight against those who believe not In Allah, nor in the last day, nor forbid that which has been forbidden by Allah and his messenger and those who accept not the Deen of Truth from among the people of the book, until they pay the

Jizyah with willing submission, and feel themselves subdued.”[9-29] and states: “o ye who believe! Fight the unbelievers who gird you about, and let them find firmness in you: and know that Allah is with those who fear Him.” [9-123] – “so fight against the friends of satan: feeble indeed is the cunning.”12

Islamic supremacists tell us their goals. It is not only in the Islamic countries that some want to re-establish their Caliphate, but in all the capitals of the world. We only have to pay attention and listen to them–not what they tell the u.s. media but what they tell their own followers.

Page 56: The Counter Terrorist Magazine - August/September 2012

56 The Counter Terrorist ~ August/September 2012

hizb-ut-tahrir-an-emerging-threat-to-us-interests-in-central-asia.

5Hizb ut tahrir website, accessed June 5, 1012, http://english.hizbuttahrir.org.

6Ariel Cohen, “Hizb ut-tahrir: An emerging Threat to u.s Interest in Central Asia,” The Heritage Foundation: leadership for America, accessed June 5, 2012, http://www.heritage.org/research/reports/2003/05/hizb-ut-tahrir-an-emerging-threat-to-us-interests-in-central-asia..

7“revolution: liberation by revelation,” Muslims Marching Toward Victory flyer.

8“protesters gather outside Islamic Conference near Chicago,” Fox News, July 20, 2009, http://www.foxnews.com/story/0,2933,533880,00.html.

9memrI, August 12, 2009, www.memri.org.

10Ibid.11madeleine gruen, “Hizb-ut-tahrir's

Activities in the united states,” Jamestown Foundation terrorism monitor 5, no. 16 (August 16, 2007), http://www.jamestown.org/programs/gta/single/?tx_ttnews%5btt_news%5D=4377&tx_ttnews%5bbackpid%5D=182&no_cache=1.

12bismillah-ir-rahman-ir-raheem, “The Necessity of political Thought in the life of the muslims,” Hizb ut tahrir website, accessed June 5, 2012, http://english.hizbuttahrir.org http/index.php/culture/thoughts/181-the-necessity-of-political-thought-in-the-life-of-the-muslims.

Additionally, we must recognize that, as important as preventing and deterring individual acts of terrorism is, defeating the objectives of islamists is far more important than defeating any single attack. As tragic as the possible loss of life from another suicide bomber or active shooter might be, what would that mean to the future of the country? on the other hand, if this ideology is not exposed and resisted, what will that mean for the practice of individual liberty around the world and at home? •ABoUT ThE AUThoR

Mr. Andrews is a retired FBI Special Agent with 23 years of experience, including 20 years investigating international and domestic terrorist organizations. Since retiring, he has served as a consultant and recently finished a year-long contract with the FBI in the Counter Terrorism Division. He is currently developing an intelligence program for Florida State University.

EnD noTES 1Ariel Cohen, “Hizb ut-tahrir: An

emerging Threat to u.s Interest in Central Asia,” The Heritage Foundation: leadership for America, accessed June 5, 2012, http://www.heritage.org/research/reports/2003/05/hizb-ut-tahrir-an-emerging-threat-to-us-interests-in-central-asia.

2“About us,” Hizb ut tahrir, accessed June 5, 2012, http://english.hizbuttahrir.org/index.php/about-us.

3Ibid.4Ariel Cohen, “Hizb ut-tahrir:

An emerging Threat to u.s Interest in Central Asia,” The Heritage Foundation: leadership for America, accessed June 5, 2012, http://www.heritage.org/research/reports/2003/05/

Abu Musab al-Zarqawi Photo: unknown

Page 57: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 57Circle 323 on Reader Service Card

Page 58: The Counter Terrorist Magazine - August/September 2012

58 The Counter Terrorist ~ August/September 2012

Counter The

RelentleSS pURSUit: A neGlected coin pRinciple?

The author leading a pursuit team. Photo courtesy Eeben Barlow.

Page 59: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 59

An insurgency is, in essence, a political conflict that manifests itself with a host of grievances expressed by the populace in the form of non-violent and violent demonstrations and protests.

eft unchecked, these actions can result in an escalation of violence, attacks on government installations and ultimately an armed insurgency where the aggrieved mobilize the populace to take up arms. Their goal is to force the government to take heed of their dissatisfaction and govern “for the people,” and ultimately to depose of the government and install their own government.

Identifying the potential for an insurgency and an armed insurrection is the function of the intelligence services. They ought to utilize all sources and agents at their disposal to gain insight into the planning and organization of any

planned insurgency. It is this intelligence that poses a threat to the national interests (NI) of the government and that ought to guide national policy.

As the threat is internal against NI, the function of countering the potential of a real or perceived insurgency lies with law enforcement agencies. Acting on intelligence, the law enforcement agencies must identify and neutralize the pending uprising. These actions can take the form of crowd control, riot control, and eventually even armed actions against the insurgents.

The failure of government to take heed of the intelligence product and address the grievances of the populace,

by eeben barlow

once the insurgency reaches its tipping point, the armed forces are tasked to take control and counter the armed insurgency.

l

Page 60: The Counter Terrorist Magazine - August/September 2012

60 The Counter Terrorist ~ August/September 2012

as well as the failure of the law enforcement agencies to take appropriate pre-emptive actions, will result in the insurgency gaining momentum. As the insurgency develops, armed forces may be used to act in support of law enforcement agencies. The insurgents will, in turn, seek to galvanize national and international support. Additionally, the insurgents will seek to gain financial

support to sustain their movement as well as purchase weapons, ammunition, and other equipment to continue their “armed struggle.”

once the insurgency reaches its tipping point, the armed forces are tasked to take control and counter the armed insurgency. This mission, however, indicates a failure at the political level, and thus the armed forces find themselves in a war that is neither of their own doing nor their choosing.

In developing a counter insurgency (CoIN) strategy and the subsequent CoIN campaign, the most important aims are to:• Deny the insurgent freedom and space in which to maneuver • regain the lost confidence of the populace• Create a safe environment for the populace to live and work without fear• Negate the insurgent’s principles for an insurgency• Deny the insurgent access to funding

many military forces seem to have found themselves in a mental quandary as far as counter insurgency (CoIN) operations are concerned. New terms and buzzwords are created to explain an age-old phenomenon and papers are written trying to intellectualize the insurgent and his ideals. This has given rise to a host of different arguments on the conduct of CoIN operations. Indeed, books are written explaining in detail how insurgencies start and the different approaches that should be adopted in countering the insurgent forces.

Whereas understanding and debate ought to be welcomed, it appears as though we may have forgotten that we ought to win a war before we try to intellectualize it.

However, there are three basic approaches to modern counter insurgency1:

U.S. Marines make a comm. shot.

Page 61: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 61Circle 257 on Reader Service Card

Circle 222 on Reader Service Card

For more information, visit: http://ntoa.org/site/tactical-conference/

Page 62: The Counter Terrorist Magazine - August/September 2012

62 The Counter Terrorist ~ August/September 2012

1. EnEMy-CEnTRIC APPRoACh:

This approach views CoIN as an extension of conventional warfare and therefore centres primarily on defeating the insurgent. The belief is that the enemy must be located and destroyed and, in so doing, the problem will be solved. The enemy is viewed as an organized enemy that follows typical tactics, techniques, and procedures (ttps) related to movement. Within this approach, numerous strategies can be formulated to achieve the aim.

2. PoPULATIon-CEnTRIC APPRoACh:

This approach views CoIN as an attempt to mobilize the population and gain support to act against the government. In essence, the population becomes the water the fish must swim in. remove the water and the fish cannot survive. This requires securing the population, realigning their loyalty towards the government, and denying the insurgent access to the population. This is considered by many to be the foundation of the “hearts-and-minds” policy.

A map showing the insurgent forces’ progress (in red) as well as blocking forces ahead (in blue). This pursuit took place over a distance of more than 700 km. Photo: EB

Weapons hidden in a WWII baby carriage. Photo: Shpritz

Page 63: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 63

3. FUnD-CEnTRIC APPRoACh:

This approach views the driving force of the insurgency as a need to gain and use financial assets and benefits. In the early stages of the insurgency, the movement requires financial assets with which to purchase weapons, ammunition, and equipment, as well as to sustain the movement. to achieve this, the movement may form foreign alliances or even resort to crime to fund their activities.

Whereas no two insurgencies are identical in nature, all insurgencies contain elements of all three approaches. to counteract the insurgent on a wide front, a planned, coordinated and controlled integration of political, civilian, law enforcement and military counter-actions needs to be applied. These counter-actions must be cognizant of the political, security, economic, social, tribal, religious, and cultural environments in which they will be implemented.

Iranian Girls Gift Their Money boxes as symbolic for supplying logistic Iranian Forces. Photo: sajed.ir

Page 64: The Counter Terrorist Magazine - August/September 2012

64 The Counter Terrorist ~ August/September 2012

the use of helicopters to

deploy substitute troops after a few hours of

pursuit enhances the principle of

relentless pursuit.

U.S. Marines insert via fast-rope.

Page 65: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 65

Circle 349 on Reader Service Card

operate according to tactics, techniques and procedures. The ttps are, in turn, derived from the principles of CoIN as well as from the lessons learned that are particular to the campaign being fought. This does, however, not reduce the frustration of the soldier in the field.

The frustration is increased when it appears that the insurgent has the initiative—which indeed he has at times—as he can choose his place, time, and method of attack. These attacks are usually of short duration but are aimed at killing, wounding, disrupting, demoralizing or delaying their opponents. The insurgents also aim to get maximum publicity for their actions and their cause. Civilian casualties are both a means to an end and a method of intimidation aimed at forcing support or demonstrating the weakness of the government.

When the insurgent believes he has the initiative, he becomes bolder and more daring. When we believe that he has the initiative, it places us in a reactive state-of-mind, thus reaffirming and strengthening the insurgent’s belief in his position.

Wresting the initiative from the insurgent is not as easy as it sounds, but it is not impossible. We need to place the enemy in a position of continual disadvantage and then exploit it with speed, aggression, and targeted firepower. The tactical principles of CoIN, correctly applied to the terrain in which the campaign takes place, enable us to do this, but one principle that appears to receive little attention is “relentless pursuit.”

relentless pursuit implies the enemy is pursued with speed and aggression, without stopping, pushing him past the limits of his endurance while continually substituting the men doing the pursuit

These three approaches give rise to a trinity of gravity in CoIN operations as opposed to a single centre of gravity as expounded by Clausewitz. It is a critical factor in neutralizing and destroying an insurgent force. If two of these pillars of the trinity are collapsed, the insurgency will collapse.

The population-centric approach is and will remain a function of good governance. The fund-centric approach is and will remain an intelligence and law enforcement matter. The enemy-centric approach involves the soldier on the ground. In most instances, he wants to find, fix, and destroy the enemy, and he has scant interest in the two remaining approaches.

Fighting an apparently elusive enemy during CoIN operations can be very frustrating for the man in the field, especially when he is expected to conduct population-centric operations on behalf of a failed government. Indeed, had the government competently governed, the intelligence agencies gathered the requisite intelligence, and the law enforcement agencies exercised the law in a manner regarded as legitimate by the population, the insurgency could, in all likelihood, have been nipped in the bud.

As with all military operations, strategies are devised, operational plans made, and deployments then take place—according to the numerous principles that have over time been proven to be relevant. CoIN is no exception, as it, too—as an action aimed at defeating an enemy—has both strategic and tactical principles that have, over time, manifested themselves to be relevant to the type of campaign that is being planned and fought.

As with conventional operations, soldiers engaged in CoIN operations

Page 66: The Counter Terrorist Magazine - August/September 2012

66 The Counter Terrorist ~ August/September 2012

with fresh troops. This forces the enemy into a state of exhaustion as he has no time to eat, rest or sleep. It also degrades his morale, leads to panic, and subsequently leads him to make mistakes.

When the enemy is tired and hungry, he becomes weak and slow in his movements, disorientated, and prone to making poor decisions. It is these mistakes we need to identify and exploit to aggressively seize the initiative. Therefore, every possibility must be exploited to hunt down the insurgents and either force a surrender or destroy them.

To effectively close with and destroy the enemy, the training and organisation of the units conducting the campaign need to be reassessed. Combat tracker teams supported by correctly trained and lightly equipped troops must be deployed and conduct an aggressive pursuit policy. To enable the pursuit forces to maintain their speed on the insurgent’s tracks, fresh teams must be leap-

enemy. once the trackers have analyzed the age of the tracks to within an hour or less, it is possible to determine the distance the insurgents are ahead of the pursuit force. Helicopters can then be used to deploy troops into blocking positions, as well as deliver troops onto tactically advantageous ground. Alternatively, troops can be deployed to seal off villages and temporarily prevent their use by the insurgents.

The use of dummy-drops using helicopters can be executed to the flanks of the moving insurgent forces to channel them into a specific area. The dummy-drops must be sufficiently realistic for the enemy to believe that troops are indeed being inserted to their flanks. These dummy-drops must be close enough for the enemy to either hear or even observe them but far enough away to prevent the enemy from using small arms on the helicopter.

Implementing relentless pursuit requires, amongst others, that troops:• Can eat while on the move• Can track an enemy at speed• Are able to leap-frog ahead of the enemy by means of helicopters or vehicles• Have outstanding communications• Are aggressive• Are adept at night operations• must “outgun” the enemy with superior skill and weaponry• Have a rapid reaction force on standby

troops need to be conditioned to eat

frogged ahead of the teams on the tracks and relieve them. A good guideline is to deploy a pursuit team for four to five hours before relieving it with a fresh team. The pursuit teams must have the ability to operate by both day and night in order to give the insurgents no respite. Once contact has been made with the insurgent force, aggressive focussed application of fire, and manoeuvre must be applied.

In applying relentless pursuit, the ability to track humans is an essential prerequisite. good visual trackers can tell the age of a track as well as indicate if the enemy is carrying heavy loads, how fast he is moving, the types of weapons he has (this is identified when locating enemy resting places), what he is eating, what counter-tracking measures he is taking, and so forth. good trackers are also able to identify disturbances in the soil or tripwires indicating a possible landmine or IeD as well as indications of an ambush ahead of the pursuit force.

supporting the combat trackers are troops that are lightly equipped but well-armed and ready to conduct immediate offensive actions when required. The size of these teams will depend on the size of the insurgent force being pursued, as well as its past actions.

The use of helicopters to deploy substitute troops after a few hours of pursuit enhances the principle of relentless pursuit. tired troops can be replaced with fresh troops to maintain momentum and keep pressure on the

pursuit must continue after dark and

through the night. equipment such as

night vision goggles and illumination

flares must be used to the optimal.

Page 67: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 67

Circle 215 on Reader Service Card

Cost: $399 Registration

LEARN MORE at: www.homelandsecurityssi.com SECURITY SOLUTIONS INTERNATIONALSSI

®

SSICall now for more information. Phone: 866-573-3999

Fax: [email protected] Protecting the Homeland Together ®

The experts on training in:

SECURITY SOLUTIONS INTERNATIONALSSI®

SSI

IsraelIsraelIsrael

8PAGEINSERT.indd 3 1/10/12 1:53 PM

The Advanced Global Security Workshop in

the Homeland Security professionals best resource

Since 2005, SSI has taken nearly 500 First Responders to Israel and shown them the basics of the Israel security concept. Thanks in part to that program, we are better able to defend ourselves in the United States. In response to demand, we are now offering a once-in-a-lifetime experience covering the following advanced subjects:

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel's northern border. Hostage Rescue - Discover how they go wrong. Hospital Response - Find out how Israel's critical response hospitals handle surge and multi-casualty incidents. Israel Counter Terrorism units - Learn how they operate. Israel National Police - National Academy; See how they train? Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system. Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

NOVEMBER 9-16, 2012

Circle 215 on Reader Service Card

Page 68: The Counter Terrorist Magazine - August/September 2012

68 The Counter Terrorist ~ August/September 2012

while on the move. During relentless pursuit, troops cannot stop to prepare meals, as this will give the enemy time to make his escape. Apart from their weapons and ammunition, dry rations and water are all these troops need to carry with them, especially since they will only be moving for a few hours before being relieved by fresh troops.

good communication is essential to ensure that pursuit forces do not engage in so-called friendly-fire incidents. Communication is also essential to enable calling for air support, fresh troops, or the quick reaction force. by frequently reporting the pursuit forces’ coordinates, operations officers will be able to plot and even predict the enemy’s intended direction of movement.

troops need to develop their aggression level to such a point that the enemy fears

Circle 207 on Reader Service Card

them. Aggressive pursuit is aimed at initiating and maintaining contact with the enemy. This aspect is closely allied to the principle of aggressive, focused application of force.

pursuit must continue after dark and through the night. equipment such as night vision goggles and illumination flares must be used to the optimal. battlefield illumination, when closing with the enemy, is useful in slowing an enemy’s progress or forcing him to show himself prematurely.

The enemy must be engaged at maximum range, terrain depending, to force him to deploy tactically. long distance engagements may not cause enemy casualties but it will slow his progress and allow friendly forces to begin offensive tactical maneuvers. Weapons such as the 20mm personal assault

weapon (pAW), 60mm patrol mortars, man portable rockets, and so forth can force the enemy to slow his progress and take cover, thus slowing his escape.

When the enemy scatters (bombshells), at least one set of tracks should be taken to ensure a successful pursuit, as it is likely that even a minimally skilled enemy will regroup at an emergency rally point.

A quick reaction force, equipped to enter the fire-fight immediately on arriving on the ground, must be kept on standby. This force can comprise resting pursuit force men who have been replaced with fresh troops and are available for immediate air-lift.

to apply relentless pursuit, the troops need to be fit, mentally alert, and ready to immediately take offensive action. Failure to apply the principle of relentless pursuit will continue to give the enemy options and advantages, often at our own peril. •

ABoUT ThE AUThoRMr. Barlow is a former special

operations officer and intelligence officer of the South African Defence Force. He was the founder of the private military company, Executive Outcomes, author of the book executive outcomes and www.eebenbarlowsmilitaryandsecurityblog.blogspot.com. He is currently writing a book on the conduct of land-based operations in Africa.

EnD noTES1An extract from the author’s upcoming

book on land forces operations in Africa. 2This approach was developed by the

author in Angola to bleed an insurgency into bankruptcy.

3An extract from the author’s upcoming book on land forces operations in Africa.

Page 69: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 69

Innovative Products

PRoPPER A-TACS BDUIn 2005, the u.s. Army began fielding a new uniform that blends into both wooded and desert environments equally poorly. Not to be out done, the u.s. Air Force released a blue tiger-striped uniform, and in the ultimate act of one-ups-manship, the u.s. Navy introduced an even more bizarre blue digital camouflage outfit.unsurprisingly, special operations troops and grunts have demanded more functional camouflage. one of the best performing is propper’s Advanced tactical Concealment system (A-tACs) battle Dress uniform. This pattern consistently outperforms the Department of Defense’s flamboyant fashion statements.www.propper.com

SESoLInC MoBILE REInFoRCED DATA FACILITyThe sesolINC mobile reinforced Data Facility (smrF) is designed as a scalable, deployable data protection solution that can be built and configured to mission-specific requirements. There are multiple configurations available. It is self-contained, with generator power, environmental controls/monitoring, interior/exterior video surveillance, and radio communications. It can be configured and deployed as a command center with It equipment, radio Communications, Video situational Awareness system, surveillance, and personnel workspace areas.www.sesolinc.com

RM M203PIThe rm m203pI (NsN 1010-01-393-0656) operates in three modes from a single 40mm grenade launcher module. rifle-mounted, shoulder-fired standalone and hand-held solutions can easily and quickly be configured by the user without tools. The m203pI fits any military rifle with or without a lower rail. rm offers many unique 40mm launching solutions and accessories. www.rm-equipment.com

Page 70: The Counter Terrorist Magazine - August/September 2012

70 The Counter Terrorist ~ August/September 2012

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Counter TheAugust/september 2012

Volume 5 • Number 4

AdVe

RtiS

eR in

dex to request detailed product information, circle the appropriate reader service number (rsN) on the attached reader service

Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.

page Ad/Company • website and/or email .......................................................................................................RSN Number

2347

101011121314151719222325262728283536373840414242434551525354545761656768717374757631

2541329337191311101308331129333275313265285327297211121273239303335175343155798127722612531930111528132322234921520750279256334209131

Ahura scientific • www.thermoscientific.com/mil-chemid .......................................................................................lenco industries inc. • www.swattrucks.com.......................................................................................................tex shield inc • [email protected] ................................................................................................................recon robotics • www.reconrobotics.com/throwbotXTdemo .............................................................................policetraining.net • www.policetraining.net ....................................................................................................zistos Corp • www.zistos.com ..........................................................................................................................tactical products group inc. • www.tacprogear.com ......................................................................................Adams industries • www.adamsindustries.com ................................................................................................CrC press • www.crcpress.com .........................................................................................................................robotex • www.robotex.com ............................................................................................................................ paratech • www.paratech-tactical.com ..............................................................................................................Defense solutions group - Dsg Arms • www.dsgarms.com .........................................................................ssi elevated tactics training • www.homelandsecurityssi.com ........................................................................Center for rural Development • www.preventivestrategies.net ....................................................................... golight inc • www.golight.com .........................................................................................................................lind electronics inc. • www.lindelectronics.com ...............................................................................................mattracks • www.mattracks.com ......................................................................................................................American military university • www.amuonline.com/counter-terrorist ............................................................explosives Countermeasures inc • www.nobombs.net ..................................................................................Defense group - Cobra software • www.cobrafirstresponder.com ................................................................southeastern solutions • www.sesolinc.com ..................................................................................................reconyx • www.reconyx.com ...........................................................................................................................policeone • www.policeoneacademy.com .........................................................................................................Heat Armor • www.heat-armor.com .................................................................................................................southern police equipment • www.sooutherpoliceequipment.com ...................................................................J&N • www.bangpole.com ................................................................................................................................mcgard • www.manholelocks.com ....................................................................................................................icor technology • www.icortechnology.com .....................................................................................................K9 Cop magazine • www.k9copmagazine.com ...............................................................................................ssi pVbs • www.ssipvb.com .............................................................................................................................platesmart • www.platesmart.com ...................................................................................................................Combined systems inc. • www.combinedsystems.com ....................................................................................patriot3 • www.patriot3.com ............................................................................................................................border management Conference & technology expo • www.bordertechexpo.com ...................................executive protection institute • www.personalprotection.com .........................................................................Hydrosack • www.homelandsecurityssi.com ......................................................................................................NtoA • www.ntoa.org ......................................................................................................................................sun badge Company • www.sunbadgeco.com ...............................................................................................ssi training in israel • www.homelandsecurityssi.com .....................................................................................rm equipment • www.m203grip.com ..............................................................................................................oshkosh Defense • www.oshkosh-tacticalprotector.com ....................................................................................elite K9 • www.elitek9.com ..............................................................................................................................Applied research Associates, inc. • www.ara.com/robotics .........................................................................oasys technology • [email protected] ..............................................................................................energizer • www.hardcasetactical.com ..............................................................................................................urban shield 2012 • www.urbanshield.org ....................................................................................................

Page 71: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 71

IntroducIng a new standard In hIgh mobIlIty and maneuverabIlIty.

oshkosh-tacticalprotector.com

© 2012 Oshkosh Corporation • Oshkosh and the Oshkosh logo are registered trademarks and Tactical Protector Vehicle is a trademark of Oshkosh Corporation, Oshkosh, WI, USA

Tactical Protector VehicleTM from Oshkosh Defense creates a new strategic dimension for special operation missions. With a new standard in mobility, military-grade protection and capacity for up to nine officers, it enhances access, speed and safety in urban, rural and off-road high-risk situations.

get In. get around. gaIn control.

find out more:

CONTACT:Program Director, Tactical Protector Vehicle™

[email protected]

Financing is available for Tactical Protector Vehicle™ through Oshkosh Capital.

14110_TPV_ad_CounterTerroristMag_3.16.12.indd 1 3/16/12 3:27 PM

Circle 50 on Reader Service CardCircle 50 on Reader Service Card

Page 72: The Counter Terrorist Magazine - August/September 2012

72 The Counter Terrorist ~ August/September 2012

Training review

Mobile Device Seizure and Investigationsby Chris graham

n a bright Iraqi day, I surveyed the bodies of some insurgents. We had responded as a quick-reaction force to assist Iraqi soldiers who had been ambushed in the village of udaim. The Iraqi soldiers had been over-run, and most of the survivors had been executed before we arrived. The high-intensity combat of the day had waned as any remaining live insurgents fled.

The insurgent at my feet was wearing commercially produced body armor with steel plates that had successfully defeated two 5.56 x 45 mm hits to the chest. I was admiring the headshot that had taken him out when the silly upbeat ringtone of a cell phone startled me. It was ring-ing in the grass a few feet away. several callers attempted to get through over the next few minutes. The surviving insur-gents seemed to be attempting to rally. our HumINt team bagged the phone and retained it for exploitation. We never received any information from that phone, but I continue to hope that it was pushed forward to another operational unit for action.

Cell phones and mobile communica-tion devices are a universal part of mod-ern life. soldiers and police officers who do not know how to handle these items to support the maximum acquisition of information, evidence, and intelligence are detrimental to operations. unfortu-nately, they are not uncommon.

In order to improve these skills in the law-enforcement world, epyx Forensics offers several blocks of mobile train-ing. I recently had the opportunity to attend their mobile Device seizure and Investigations Course. Detective pete mcgovern, a digital forensics investigator

from the palm beach sheriff’s office and a state Department Anti-terrorism As-sistance program instructor, served as our lead instructor.

on the first day of training, we introduced ourselves to each other and received a lecture on modern manufac-turers and operating systems. We talked about wireless network generation, gsm, and CDmA networks. We were given definitions for digital evidence and digital forensics. We discussed considerations, locations where this information might be collected, and common and uncom-mon evidence to collect.

In the afternoon, we were lectured on legal authority, plain view doctrine, and exigent circumstances relevant to communication devices. We talked about physical evidence possibilities such as fingerprints and DNA. We were given a sample report to use for documenting

the device and discussed suspect inter-views designed to establish an individual’s relationship to a device. We were encour-aged to leave devices that are “off” when seized “off” unless exigent circumstances required urgent exploitation. We talked about collecting devices that were “on” and the preference to keep them “on” to prevent engaging passcodes or encryp-tion that might be difficult to defeat and considerations for inhibiting subjects from remotely dumping data or chang-ing information that might undermine evidentiary value. We talked about the benefits of seizing supporting accessories and the need to be able to provide power to keep the device on.

Day two included discussion of the use of cell phones for tracking and eaves-dropping and watching some supporting videos. We carried out a practical-appli-cation exercise plotting location informa-

o

Apple iPhone (left) vs HTC Hero (right). Photo: Marius Røstad/Mobilen.no

Page 73: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 73

tion from available cell tower and switch information. students were provided a chart depicting data-retention periods for cellular providers, some investigation checklists, useful website addresses, and resource guides.

We discussed what to submit to foren-sic examiners, forensic tools such as Cel-lebrite, and logical and physical forensic images. We conducted a practical exercise involving a murder scenario with a cell phone recovered from the crime scene.

on the final day of training, we took a written exam, and we individually took practical skills tests. I put on surgical gloves to preserve physical evidence, and I was provided a cell phone that was turned “off”. I chose to leave it “off” and submit it to a forensic examiner. I also obtained a smartphone that was turned “on.” I put it in airplane mode, turned bluetooth off, logged relevant data that was visible with-out opening anything additional, plugged

in a power cord (students were provided tool bags with common power cords), and placed the device in an anti-static bag, a faraday bag, and an evidence bag. I filled out a seizure report and submitted it with the device.

Cell phones, tablets, and other elec-tronic communication devices are uni-versally popular. Valuable information, evidence, and intelligence can be gained from these devices. Knowledge of what devices your subject is using and how they are using them is useful. The epyx Forensics mobile Device seizure and In-vestigations Course provides insight into the scope and limitations of information that can be acquired from electronic com-munication devices and trains individuals to seize devices while maximizing the preservation of useful data and evidence. epYX Forensics provides digital forensic services and customized training for law enforcement, government, and private

sector personnel. Additional courses include digital investigations, forensic analysis, computer triage and seizure. •

www.epyxforensics.com

Circle 279 on Reader Service Card

YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

Scan our QR code with your smart phone to view our online catalog.

Special OperationsHarness

available in black, coyote or multicam*

with plastic with metal cobra buckles buckles

$149.95 $199.95*with attachments for MOLLE pouches

and K-9 camera

E-Collar Holsters$39.95

Has cutouts so the buttons can still be worked while it’s holstered. Has 2¼" metal clip on back of holster so it can be worn on a 2" duty belt or clipped to a MOLLE tactical vest.

Reward Balls with Tug Handles

3" Ball

$12.95 2.5" Ball

$11.95 2" Ball

$9.95

Bite SuitHelmet$74.95

Bite Suit$1,189.95

HandProtectors

$39.95 ea

Muzzles$69.95

German ShepherdMalinois

[ [Follow us on

Person with PDA handheld device. Photo: Johannes 'volty' Hemmerlein

Page 74: The Counter Terrorist Magazine - August/September 2012

74 The Counter Terrorist ~ August/September 2012Circle 256 on Reader Service Card

Page 75: The Counter Terrorist Magazine - August/September 2012

The Counter Terrorist ~ August/September 2012 75

Circle 334 on Reader Service Card

Page 76: The Counter Terrorist Magazine - August/September 2012

76 The Counter Terrorist ~ August/September 2012

TM

www.HardCaseTactical.com

© 2012 Energizer Energizer and other marks are trademarks of Energizer

®

Engineered to be virtually indestructible, Energizer® Hard Case® Tactical® lights are multi-functional, lightweight and versatile, with features critical to law enforcement personnel to combat terrorism.

Check out the complete product line at HardCaseTactical.com!

White and blue LEDs and IR and IFF for night vision compatibility. Includes helmet and vest mounts.

Tango LEHL11L

A swivel-head light with white, red, blue, and green LEDs and IR for night vision compatibility.

Bravo LE2G21L

The world’s longest lasting AA battery in high tech devices, Energizer® Ultimate Lithium AA provides 1/3 less weight and outperforms alkaline AA and Lithium 123 batteries in temperature extremes.

A compact vest light in white with red, blue and green filters for light discipline.

romeo LEMOL11L

energizer® Ultimate Lithium aa L91

EN_LE_FullPgAd_CounterTerroristMag.indd 1 6/29/12 5:11 PM

Circle 209 on Reader Service Card