the counter terrorist magazine - august/september 2014

76
The Counter Terrorist ~ August/September 2014 1 An SSI ® Publication AUGUST/SEPTEMBER 2014 USA/CANADA $5.99 IRANIAN ECONOMIC WARFARE www.thecounterterroristmag.com Journal for Law Enforcement, Intelligence & Special Operations Professionals VOLUME 7 • NUMBER 4 INTERNATIONAL EDITION AUGUST/SEPTEMBER 2014 PIPELINE TO JIHAD MCDONALD’S GANG IMIRAT KAVKAZ WEAPONIZED TULEREMIA

Upload: solomon

Post on 01-Apr-2016

216 views

Category:

Documents


2 download

DESCRIPTION

Journal for Law Enforcement, Intelligence & Special Operations Professionals

TRANSCRIPT

Page 1: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 1

An SSI® PublicationAUGUST/SEPTEMBER 2014

USA/CANADA $5.99

IRANIAN ECONOMIC WARFARE

www.thecounterterroristmag.com

Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 7 • NUMBER 4

INTERNATIONAL

EDITION

AUGUST/SEPTEMBER 2014

PIPELINE TO JIHAD • MCDONALD’S GANG • IMIRAT KAVKAZ • WEAPONIZED TULEREMIA

Page 2: The Counter Terrorist Magazine - August/September 2014

2 The Counter Terrorist ~ August/September 2014

The REC7 GEN II continues Barrett’s philosophy of designing the most rugged,reliable and powerful firearms. Created with passion and skill by the family that’s been building a legacy in forward-thinking firearms design for decades. When you offer the world’s strongest gas piston system in both 5.56 NATO and 6.8 SPC calibers, there really isn’t much more you need to say. Visit Barrett.net for a closer look.

6.8 SPC5.56 NATO

Circle 121 on Reader Service Card

Page 3: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 3100% US MADE

LMTDEFENSE.COM

®

100% US MADE

LMTDEFENSE.COM

®

Circle 259 on Reader Service Card

Page 4: The Counter Terrorist Magazine - August/September 2014

4 The Counter Terrorist ~ August/September 2014 Circle 13 on Reader Service Card

Page 5: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 5

Counter The

16

Journal for Law Enforcement, Intelligence & Special Operations Professionals

AUGUST/SEPTEMBER 2014VOLUME 7 • NUMBER 4

29

Cover Photo: After the Iranian hostage crisis (1979-1981), the walls of the former US embassy were covered in anti-US-murals. Photo by: Phillip Maiwald

46CO

NTE

NTS

COVER STORY: 29 IRANIAN ECONOMIC WARFARE By Kevin D. Freeman

FEATURES:

08 Firsthand: THE LAST DAYS OF THE MCDONALD’S GANG By Larry Winston and Brian Davis

16 Case Study: JOHN WALKER LINDH AND THE PIPELINE TO JIHAD By Walter Purdy

46 TULAREMIA AS A WEAPON By Jeffrey D Shuman

56 UMAROV’S LEGACY AND THE FUTURE OF THE IMIRAT KAVKAZ By Michael S. Toney

DEPARTMENTS:

06 From the Editor We Don’t Negotiate

44 Book Review Comrade J

69 Innovative Products Strategic Rifleman, LMT DMR Stock, Broco Jimmy

72 Training Review Vehicle Engagement Tactics

8

Page 6: The Counter Terrorist Magazine - August/September 2014

6 The Counter Terrorist ~ August/September 2014

O

Counter The

Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 7 • NUMBER 4 AUGUST/SEPTEMBER 2014

EditorChris GrahamDirector of OperationsSol BradmanDirector of AdvertizingCarmen ArnaesProduction AssistantsGiselle ManassaMelissa BerneContributing EditorsKevin Freeman Jennifer HestermanRichard MarquiseTom NypaverDean OlsonSteve YoungGraphic DesignMorrison Creative CompanyCopy EditorLaura TownAdvertising SalesChris [email protected] Publisher:Security Solutions International13155 SW 134th St. • STE 103 Miami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 103, Miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.For article reprints, e-prints, posters and plaques please contact:PARS International Corp.Web: www.magreprints.com/quickquote.asp Email: [email protected]: 212-221-9595 • Fax: 212-221-9195Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com© 2014 Security Solutions International

n June 30, 2009, U.S. Army Private First Class Robert Bergdahl deserted and fell into the hands of the Taliban near the town of Yahya Kheyl in

Paktika Province, Afghanistan. On May 31, 2014, The U.S. government traded five senior Taliban commanders

in custody at Guantanamo Bay, Cuba for Bergdahl. This appears to have been a trade that the Taliban has proposed for years. Based on what we have seen in the past, we can expect these five to receive a hero’s welcome, be promoted and resume killing Americans and our allies.

Does the timing of this trade have anything to do with the latest domestic scandal? As systemic corruption and incompetence at the Veteran’s Administration began to bubble to the surface, members of the public observed that Islamist terrorists in Guantanamo receive superior medical care to American combat veterans. Resistance to the unpopular “Affordable Care Act” stiffened as Americans gained their first glimpse of what government run healthcare looks like.

As coincidental as the timing of this trade may be, the opportunity now exists to determine the full details of Bergdahl’s time with the Taliban. Of course, there is plenty of downside to the terrorist trade. The U.S. government’s claim not to negotiate with terrorists is now dead, just like so many other standards eliminated in the last few years. All adversaries in the world now have proof that if they can bring some leverage to bear against the U.S. government, they can get what they want. How many Americans do you think will be kidnapped in the coming year?

Semper Fidelis,

Chris GrahamEditor, The Counter Terrorist

www.30-10pistol.com

FROM THE EDITOR:

We Don’t NegotiateBy Chris Graham

Page 7: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 7Circle 110 on Reader Service Card

Page 8: The Counter Terrorist Magazine - August/September 2014

8 The Counter Terrorist ~ August/September 2014

THE LAST DAYS OF THE MCDONALD’S GANG

Firsthand:

Photo by: iboy daniel8 The Counter Terrorist ~ August/September 2014

Page 9: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 9

T he suspects would then cover the victims’ eyes with duct tape and

wrap duct tape around the victims’ wrists. On several occasions, plastic ties were used to bind the victims’ hands. The suspects would have one of the victims open the safe. If the safe had an inner door and no key was available, the suspects would force the door open with a hammer and chisel.

By Larry Winston and Brian Davis

In August 1989, a series of McDonald’s fast food robberies took place in the city of Los Angeles. The suspects—three to four male Hispanics, wearing various types of facial covering and armed with blue steel revolvers and blue steel automatics—would force all employees into the rear portion of the store.

Most of the robberies occurred in the early morning hours, usually on a Monday with most of the weekend receipts in the safe. As the robberies continued into September and October of 1989, it became apparent that the suspects were familiar with McDonald’s operations due to some of the questions that they asked employees present during the

robbery. The suspects would also take keys from the employees and shut off alarms, open locked doors, and open safe doors. On several occasions, the suspects would follow the last employee leaving the business at closing (presumably the manager) to their home, kidnap them at gunpoint, return the victim to the business, and force the victim to open the store.

The Counter Terrorist ~ August/September 2014 9

Page 10: The Counter Terrorist Magazine - August/September 2014

10 The Counter Terrorist ~ August/September 2014

SIS trains to react to the actions of the suspects it follows, whether in a vehicle or on foot. In this case, it was apparent that the suspect’s actions were indicative of “casing” the location. The unit could not be sure that a robbery would occur, however. It has been our experience that many suspects perform a “dry run” and may not be prepared to commit the crime; therefore foot surveillance becomes an essential part of a successful observation in order to determine if a crime is occurring or if an arrest needs to be made.

At approximately 0030 hours, 12 February 1990, the suspect vehicle

McDonald’s corporate security personnel contacted the L.A.P.D. Robbery/Homicide Division in late September 1989. McDonald’s security reported that two former employees were thought to be involved in as many as 25 robberies. Both had been former assistant managers at various stores before leaving the company in 1988. Many of the stores where these two men had worked had theft, burglary and robbery problems. One of the men was administered a polygraph. The polygraph examiner determined the man to be deceptive, giving conflicting statements.

In mid-January 1990, Robbery/Homicide contacted the Special Investigation Section, (SIS), with the above information. They provided photos of the two former employees along with a residence address for one of the men. Surveillance was conducted by SIS on six separate occasions with no unusual activity noted until February.

On February 11, 1990, at approximately 2200 hours, SIS surveillance observed three male Hispanics (two formerly identified and a third unknown), exit a home, walk to a white Ford Granada parked in front of the location, and remove two large black duffle bags from the trunk. The suspects placed the bags into the trunk of a black Ford Thunderbird. All three then went back inside the home.

A short time later, four suspects exited the residence, entered the black Thunderbird, drove for approximately 40 minutes, and entered a McDonald’s parking lot located in the Sunland/Tujunga area of Los Angeles. The suspects drove around to the rear of the restaurant and exited the property. They continued to drive slowly through the residential area located just north of the McDonald’s for 15 minutes, finally parking on a side street facing south, approximately 200 yards north of the business with a view of the front of the restaurant. The vehicle remained there for approximately 1-½ hours. During that period, SIS detectives on foot observed three suspects go to the trunk of the T-bird, put on additional clothing, and re-enter their vehicle. Additionally, Detective Larry Winston reported seeing the driver using binoculars to observe the front of the restaurant.

Page 11: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 11

Shaun Mitchell: [email protected]

take your tactics to the next level

This offer is for governmental agencies only and expires 12/31/14.

Law Enforcement Should Look No Further!

The limitless capabilities and ease of operation make this highly versatile, armored track vehicle stand above the rest. With its compact size and four custom resourceful attachments, The Rook can go where others cannot, providing the safest, most cost effective and efficient solutions for SWAT teams.

• Zero personnel exposure• Provide surveillance above and below ground floors• Gas deployment capability• Second-story access• Strategic positioning of fortified position• Removal of obstacles that are in harm’s way • Transport for bomb technicians • Post disaster clean-up• Breach and access schools and malls• Bus, plane and vehicle assaults• Reduced call-out times• NIJ Level IV Protection

Circle 178 on Reader Service Card

Page 12: The Counter Terrorist Magazine - August/September 2014

12 The Counter Terrorist ~ August/September 2014

communications to cancel the uniformed response and that plainclothes detectives were already at the scene. Shortly thereafter, SIS detectives observed two suspects in the lobby of the restaurant. It was later determined that the suspects at the west door used a coat hanger to open one of the doors by pulling down on the door’s panic bar. This had never been reported as a method of entry, and if it had been seen by the SIS detectives and had they had time to move in, we would have made an arrest prior to their entry. One of the suspects now inside opened the service door at the rear. Now, all four suspects were in the business. Moments later, the driver returned to his vehicle’s trunk via the west door, removed a small toolbox, and re-entered the business. SIS detectives on foot closest to the restaurant reported hearing loud hammering noises coming from within the building. Detectives then observed the interior restaurant lights go off in a systematic pattern as the driver exited the business, placed the tool box and a dark bag into the trunk of his vehicle, entered the driver’s side of the vehicle, started his

relocated, parking facing westbound at the north curb of the major street. The vehicle was now parked directly across the street from the front doors of the restaurant, approximately 50 yards away.

A short time later, SIS detectives observed one suspect exit the vehicle, cross the major street, walk to the Northwest corner of the restaurant, look into a window, and walk to the east parking lot of the restaurant looking all around. He then returned to his vehicle, entering the passenger side. Approximately 10 minutes later, two suspects exited their vehicle, repeating the previous actions. Both suspects returned to their vehicle. Approximately 30 minutes later, SIS detectives observed the suspects’ vehicle trunk open, followed by three suspects exiting their vehicle and reaching into the trunk area. The three suspects walked across the street to the restaurant, one positioned at the west

doors, out of the footman’s view, two at the rear service door. SIS detectives were on foot at various locations so as not to lose track of the suspect’s actions. Our primary concern was the two suspects at the rear service doors. In prior robberies the suspects had waited for the last employee to lock up, leave using the service doors, and then force the employee back inside to open the safe. The driver now exited his vehicle and walked to the west side of the business while periodically looking up and down the major street.

SIS field supervisor Brian Davis was monitoring the divisional radio frequency and reported that a radio call “211 (robbery) suspects outside the McDonald’s” was just broadcast to patrol units in the area. Rather than have uniformed officers respond to a robbery call with plainclothes officers already present, Detective Davis advised

Page 13: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 13

vehicle, and turned its lights on. Seconds later the remaining three suspects were observed running back to their vehicle.

As the suspects were preparing to drive away, SIS Detectives performed a vehicle containment technique to prevent the vehicle from driving away. This technique is designed to surprise the suspects with overwhelming manpower and weaponry while they are contained in their vehicle. SIS detectives were armed with S&W 4506 .45s, 18" Remington 870s, and M1/A4 rifles with ACOG optics.

A minimum of four detectives are required, and based on circumstances as many as eight men have been used for this technique. Using and perfecting this technique has resulted in 97% of all vehicle containments conducted with a safe arrest and no shots fired. It has been demonstrated that once suspects enter their vehicle to drive off, they tend to relax for just a moment, believing that they are about to get away with their crime, and they can be isolated from the majority of bystanders. Timing is critical, though:

arrive too soon and the suspects will flee on foot, creating a foot pursuit and a possible running gun battle. Arrive too late, and the suspects will have driven off.

On the morning of 12 February, several of the responding detectives observed the suspect in the left rear seat point a gun in the direction of one of the officers. Detectives opened fire. Three suspects died, and the fourth was critically wounded.

Detectives entered the McDonald’s and rescued the manager, who had been

An out-of-service Gold Line train stationed at the Atlantic station, East Los Angeles. Photo by: Tim Adams

Page 14: The Counter Terrorist Magazine - August/September 2014

14 The Counter Terrorist ~ August/September 2014 Circle 198 on Reader Service Card

death of his three co-suspects as a result of their actions, which caused our officer-involved shooting. No detectives were injured. It is interesting to note that this is not the first time SIS detectives have been confronted by suspects armed with pellet guns. The psychology of suspects who bring a pellet gun to a gunfight is itself a subject that has been written about many times.

It is also worth noting that surveillance of suspects often does not allow detectives the opportunity to arrest the suspects prior to the crime being committed. Tactical concerns based on distance and locations of the suspects (in this case spread out over a large parking lot) may dictate that it would be safer for all involved, including victims, for officers to allow the suspects to commit the crime, let them leave the premises, and then make the arrest away from victims and bystanders. It can be extremely dangerous to allow uniformed officers to respond to a location where plainclothes detectives are already on scene in a fluid situation. •

ABOUT THE AUTHORSMr. Winston’s 30 years of service

with the Los Angeles Police Department includes 17 years with the Special Investigation Section (SIS) as a Detective Supervisor. He also served six years in a deep, long-term undercover investigation of terrorist organizations, and today provides instruction as a consultant (www.train2tail.com).

Mr. Davis’ 35-year career with the Los Angeles Police Department includes 30 years in criminal surveillance and crime scene analysis with 19 years as team supervisor, including nine years of homicide investigations and general crime investigations. He served as supervisor of the Special Investigation Section (SIS), and now provides

bound and gagged in the locked office area. The property from the robbery was recovered from the trunk of the suspect vehicle along with two replica .45 pellet guns. Two additional pellet guns were found in possession of two of the deceased suspects.

The fourth suspect survived and was ultimately convicted for robbery and the

Detectives entered the McDonald’s and

rescued the manager, who had been bound

and gagged in the locked office area.

Page 15: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 15Circle 271 on Reader Service Card

People who know choose

TACTICAL HEMOSTASISMAKE E VERY SECON D COU NT

www.biostatllc.com | 844.BIO.STATfacebook.com/tactical.biostat

Saves Time. Saves Blood. Saves Lives.

Biostat_Celox_May2014.indd 1 4/19/14 12:06 PM

Page 16: The Counter Terrorist Magazine - August/September 2014

16 The Counter Terrorist ~ August/September 2014

Case Study:

“What’s your name? Who brought you here?How did you get here? Why are you here?”

Mike Spann, November 25, 2001

16 The Counter Terrorist ~ August/September 2014

JOHN WALKER LINDH AND THE PIPELINE TO JIHAD

Photo by: LoggaWiggler

Page 17: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 17

ittle did he know that the man he was attempting to question

was an American from Marin County, California.2 At no time did this trained fighter answer Spann or tell him he was an American fighting with the Taliban.

John Walker Lindh was born in

Washington, DC on February 9, 1981. As a child his family lived in middle income neighborhoods in Takoma Park and Silver Springs. The family moved to San Anselmo, California when he was ten. Six years later he converted to Islam, began wearing Middle Eastern clothing,

L

By Walter Purdy

Thirteen years ago in the southern courtyard of Qala-i-Jangi prison in Northern Afghanistan, Mike Spann, a CIA case officer, asked these questions of a captured fighter. Spann thought the long-haired, pale-skinned prisoner wearing a British military-style sweater might be a member of the IRA.

John Walker Lindh in custody.Photo by: American military personnel

Page 18: The Counter Terrorist Magazine - August/September 2014

18 The Counter Terrorist ~ August/September 2014

a supporter of Usama bin Laden.4 In December 2000, Lindh traveled to Bannu, Pakistan to study at the Madrassa al Arabia. In May 2001, Lindh left the madrassa and attended a training camp run by Harakat ul-Mujahidin. He then attended al-Qaeda’s al Farooq training camp.5 After meeting Usama bin Laden he fought for the Taliban in Northern Afghanistan until the group he was with surrendered.

Mike Spann would become the first American casualty in Afghanistan not long after questioning Lindh. Taliban prisoners rose up against their Northern Alliance guards and started an uprising, gaining control of weapons and fighting for a week. On December 2, 2001, Robert Pelton, a CNN journalist, was informed that 18 fighters from the Qala-i-Jangi uprising were taken to the hospital and one of them was an American. Surprised by this news, Pelton and a Special Forces medic raced over to the hospital and discovered an injured John Walker Lindh.6 Pelton’s video of his interaction with Lindh was the first that anyone knew that there was an American fighting with the Taliban in Afghanistan.

Robert Pelton captured Lindh’s mindset when he asked “Was this the right cause and the right place?” Lindh responded, “This is exactly what I thought it would be.”7 After enduring a week of bombardment and fighting, that was where John Walker Lindh wanted to be. Lindh was not the first American to convert to Islam, travel to Afghanistan and train in the camps. I have had the opportunity to spend time with the first American who travelled to Afghanistan and trained in the Khalid bin Walid camp.8 Aqil Collins, a young convert to Islam from California, shared a tent in the training camp with Omar Sheikh, who would later kidnap American journalist Danny Pearl. After

and started using the name Suleyman al-Lindh. His family afforded him the opportunity to travel to Yemen to study Arabic and Islam.3 Lindh spent time studying at al Iman University (Faith University) in Sanaa, Yemen, operated by Sheikh Abdul Majid al-Zindani,

A registration form for Harkat’s Khalid bin Whalid training camp. The form says ‘‘Jihad’’ on the top of the page, and common Islamic prayers cover the group’s seal. The form asks for a recruit’s name, age, nationality, religious education, code name, skills,

languages, military experience and blood type. Photo by: Unknown

Page 19: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 19

Aqil completed his training he traveled to Chechnya and waged jihad against the Russians. Aqil’s jihad was cut short when he stepped on a landmine and lost his right leg.9 The questions that Mike Spann asked John Walker Lindh are the same questions that need to be asked today of Americans waging jihad in places like Somalia, Pakistan, Yemen, and Syria. Often a recruiter will manipulate, motivate and radicalize Americans to travel abroad and fight jihad. Other times, individuals will radicalize themselves, often using the Internet to accomplish this task. More often than not, there are others who participate in the recruiting, radicalization, and raising money for travel to train for jihad.

One such recruiter, Omer Abdi Mohamed, put together a terrorist pipeline that stretched from Minneapolis

Circle 197 on Reader Service Card

REGULATORY AFFAIRS MANAGERBUSINESS PRACTICES SUPERVISORPOLICE CHIEFCOMPLIANCE MANAGER

APPLY TODAY!Waldorf.edu/CT or call

888-494-0826

HOMELAND SECURITYEARN YOUR

DIRECTORPATROL SERGEANTPOLICECHIEF OF POLICEPOLICE SERGEANTDETECTIVE SERGEANTPOLICE LIEUTENANTPOLICE CAPTAINDETECTIVESERGEANT EMS DIRECTORPOLICE CHIEF

DEGREEVisit our website at www.waldorf.edu/disclosure for information about gainful employment including cost of attendance, on-time graduation rates, occupational opportunities, median student debt and other important information about Waldorf programs.

ONLINEOPERATIONS COMPLIANCE MANAGERCOMPLIANCE AUDITORSEMERGENCY MANAGEMENT DIRECTOR

• Textbooks Provided Through Waldorf Book Grant • No ACT or SAT Required for Online Programs

• Flexible, Affordable Online Programs • Complimentary Tutoring • Financial Aid and Tuition Assistance (TA) and Veterans Benefits (VA)

B-1 accelerates for take off, during Operation Enduring Freedom. United States Air Force. Photo by: SrA Rebeca M. Luquin.

Page 20: The Counter Terrorist Magazine - August/September 2014

20 The Counter Terrorist ~ August/September 2014

In 2007, the first group of radicalized Somali-Americans traveled to fight with al Shabaab (which means “the youth” in Arabic). Shirwa Ahmed was part of the first group of Americans that traveled from Minneapolis. On October 28, 2008, Ahmed became the first known suicide bomber from America when he drove a Toyota truck packed with explosives into the Puntland Intelligence Service (PIS) compound in Bosaso, Puntland.12

It appears that on September 17, 2009, Omar Mohamud, from Seattle, became

to Mogadishu.10 Much of the recruitment took place at the Abubakar As-Saddique Islamic Center and the Cedar Square public housing complex known as “Little Mogadishu.” Before departing, the individuals would listen to Anwar al Awlaki’s lecture Constants on the Path of Jihad.11 Others raised money to pay for travel and weapons for the fighters. Some went door to door collecting money under false pretenses from Somali-Americans, while others donated funds to purchase weapons and provide for fighters.

Often a recruiter will manipulate, motivate

and radicalize Americans to travel

abroad and fight jihad.

Aqil Collins, a young convert to Islam from California. Photo by: Dominique Mainon

Page 21: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 21Circle 317 on Reader Service Card

Page 22: The Counter Terrorist Magazine - August/September 2014

22 The Counter Terrorist ~ August/September 2014

the second American suicide bomber. Driving a stolen white United Nations vehicle, he was able to detonate at the AMISOM Headquarters at the airport.12 On May 30, 2011, another American from the Twin Cities, Farah Mohamed Beledi, armed with a suicide bomb vest, was killed before he was able to detonate at a government checkpoint. Abdisalan Hussein Ali’s family had fled the fighting in Somalia and spent time living in a refugee camp in Kenya. The family was

Page 23: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 23

Toronto, where he married a Somalian wife. In 2006, he arrived in Somalia and quickly rose in importance within al Shabaab due to his computer skills and his ability to put together media and propaganda. Omar, known by his kunya Abu Mansoor al Amriki, came to the attention of two al-Qaeda operatives, Fazul Abdullah Mohammed and Saleh Ali Saleh Nabhan.14

Under their leadership, Abu Mansoor al Amriki put out a number of propaganda videos and conducted a number of interviews for al Shabaab. Many of his efforts led to recruitment of a number of English speaking fighters. Abu Mansoor al Amriki wrote about his life and journey to Somalia in The Story of an American Jihadi: Part One.15 He writes of his conversion to Islam and how he “began reading more Salafi books and

able to finally move to Seattle in 2000. They later moved to Minneapolis, where Ali graduated from Edison High School, the home of the “Tommies.” The former University of Minnesota student became the third known American suicide bomber on October 29, 2011.13

Since 2006, over 100 individuals have traveled to Somalia from America to wage jihad. Probably the most noted American to join al Shabaab was Omar Hammami. Hammami went from the Jubilee City of Daphne, Alabama, to waging jihad in Somalia. Growing up, Omar and his sister were raised as Baptists like his mother and attended the Perdido Baptist Church. Omar played soccer, had a basketball hoop in the driveway, and listened to Nirvana. Omar converted to Islam and went to

articles.”16 During his time in Somalia with al Shabaab, the American fighter from Daphne, Alabama had contact with numerous foreign fighters. He stated that “those Minnesota Brothers have almost all left their mark on the Jihad and many have received martyrdom; while the rest are still waiting.”17

Disputes with the leadership of al Shabaab led to a number of false reports of his death. But Ahmed Abdi Godane was on a mission to remove anyone who questioned his authority within al Shabaab. On September 12, 2013, Omar Hammami was killed along with a British jihadi, Usama al Britani. From Hammami’s Twitter account came the following: “We confirm the martyrdom of Omar Hammami in the morning of Thur 12 2013.”18 A fellow jihadi with access to Hammami’s Twitter account tweeted that Omar “was killed because he refused to bow down to Godane’s deviation from shariah.”19

Unfortunately, the list of Americans who have traveled to fight jihad continues to grow. Robert Mueller, the former director of the FBI, speaking about Americans who had gone to Somalia to fight, stated, “it raises the question of whether these young men will one day come home, and, if so, what might they undertake here.”20 Today, Americans can use social media to gain access to information and “follow” any number of jihadis who are fighting in Pakistan, Somalia, Yemen and Syria. Terrorist groups use English language social media to recruit and radicalize potential American fighters. We have seen a number of American fighters who have taken selfies and created digital propaganda of themselves posing with various weapons on international battlefields. These Internet-based technologies are just some of the tools that are being used by terrorist groups to recruit and radicalize Americans.

Page 24: The Counter Terrorist Magazine - August/September 2014

24 The Counter Terrorist ~ August/September 2014 Circle 83 on Reader Service Card

Since the Syria conflict escalated in 2011, over 75 Americans have traveled to fight in Syria. Nicole Lynn Mansfield, a convert to Islam, from Flint, Michigan, was killed in Syria last year. Eric Harroun, a former soldier from Phoenix, Arizona, fought in Syria. On May 25, 2014, a video was posted by Jabhat al-Nusrait that announced Abu Hurayra al Amriki had carried out a suicide bombing attack on Syrian forces in Idlib. The video showed Abusalha loading a truck with explosives and driving off to conduct the attack. Moner Mohammad Abusalha had taken the kunya Abu Hurayra and now has the distinction of being the first known American suicide bomber in Syria. He grew up in a gated community in Vero Beach playing basketball.

Today, the same questions Mike Spann asked 13 years ago might have been asked of this Florida native, or of the Virginia Five who went to Pakistan for jihad, or the Lackawanna Six, or those who travel to Yemen, Somalia, Syria, and Iraq to wage jihad.

Who brought you here? How did you get here? Why are you here?”21 •ABOUT THE AUTHOR

Walter Purdy is the President of the Terrorism Research Center, Inc., a Virginia-based company that provides cutting-edge training and research on terrorism, counterinsurgency, and homeland security issues. His book, Blue Mako Five: Exploits in Counter Terrorism will be published this fall.

Page 25: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 25

Circle 228 on Reader Service Card

MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY

Contact us today at: www.homelandsecurityssi.comCall now for more information.

Phone: 866-573-3999Fax: 866-573-2090

[email protected]

MACTACTM

MACTAC is the new tactical philosophy offering your department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks.

Tiered for full-spectrum training of your department personnel to meet multiple challenges.

•MACTAC Officers Course•MACTAC Leaders Course•MACTAC Instructors Course

The Newest, Most Dynamic Training Program from SSI ®.

Circle 83 on Reader Service Card

Page 26: The Counter Terrorist Magazine - August/September 2014

26 The Counter Terrorist ~ August/September 2014 Circle 303 on Reader Service Card

YOU CAN’T BE EVERYWHERE AT ONCE,

WE CAN.RECONYX High Definition motion activated security cameras do not require separate lines for power or communication. Extremely easy to deploy and hide, (5.5” x 4.5”) our cameras provide near instant notification of an intrusion by transmitting images via the cellular network directly to your cell phone or computer.  GeneGeneral Surveillance and License Plate Capturemodels available. 

PHONE 866-493-6064 | WWW.RECONYX.COM

7Transcript of Robert Young Pelton Video Qala-i-Jangi Prison Uprising and John Walker Lindh Interview.

8Aukai “Aqil” Collins, Interview by Author, Phoenix, AZ, January 28-29, 2002.

9Aukai “Aqil” Collins, Interview by Author, Washington, DC, January 9, 2003.

10FBI Press Release, Minneapolis Man Pleads Guilty to Terror Offense, July 18, 2011.

11Interview with Unnamed Law Enforcement Officer, Minneapolis, MN, June 8, 2010.

12TRC Study of Significant Worldwide Suicide Bombings, p. 37, March 2013.

13Ibid. p.42.14Elliott, Andrea, The Jihadist Next

Door, New York Times, January 27, 2010

ENDNOTES1Transcript of Robert Young Pelton

Video Qala-i-Jangi Prison Uprising and John Walker Lindh Interview

2Robert Young Pelton, Interview by Author, May 2006

3Terrorism Research Center Inc., TRC Report: The Path of John Walker Lindh From California to Jihad, March 24, 2012

4Timothy Roche, Brian Bennett, Anne Berryman, Hilary Hylton, Siobhan Morrissey and Amany Radwan, Time, The Making of John Walker Lindh, October 7, 2007

5U.S. Department of Justice Indictment: United States v. John Phillip Walker Lindh: February 5, 2002

6Robert Young Pelton, Interview by Author, May 2006.

15Abu Mansuur al-Amriiki, The Story of An American Jihaadi Part One, accessed at http://azelin.files.wordpress.com/2012/05/omar-hammami-abc5ab-mane1b9a3c5abr-al-amrc4abkc4ab-22the-story-of-an-american-jihc481dc4ab-part-122.pdf

16Ibid, p. 18.17Ibid, p. 122.18Unknown Person Tweeted from

Abum@abumamerican (September 15, 2013) retrieved June 6, 2014 from https://twitter.com/abuamerican.

19Ibid, September 28 2013.20Johnston, David, Militants Drew

Recruits in US, FBI Says, New York Times, February 23, 2009.

21Transcript of Robert Young Pelton Video Qala-i-Jangi Prison Uprising and John Walker Lindh Interview

Page 27: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 27

CITADEL™ SERIES - Hard Armor

Tacprogear o�ers a complete line of hard body armor products that meets or exceeds U.S. Military and National Institute of Justice (NIJ) performance standards.

Tacprogear proudly o�ers its own CITADEL™ line of hard armor plates as the strongest part of its personal protection systems. Available in a wide range of material constructions, weights, shapes, and performance levels, the CITADEL™ line of armor is that last line of defense against ri�e threats for the �rst responder, tactical entry personnel, or any other law enforcement professional who is placed in harm’s way. Tacprogear is committed to providing “performance above all else®.”

FULL SIZE (FS) SAPI/ESAPI (SE) SHOOTER’S (SH)

Circle 101 on Reader Service Card

Page 28: The Counter Terrorist Magazine - August/September 2014

28 The Counter Terrorist ~ August/September 2014

IRANIAN ECONOMIC WARFARE

President Barack Obama talks with President Hassan Rouhani of Iran during a phone call in the Oval Office, Sept. 27, 2013. Photo by: Pete Souza

28 The Counter Terrorist ~ August/September 2014

Page 29: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 29

by Kevin D. Freeman

The United States has been in an economic war with the Islamic Republic of Iran in one form or another since the 1979 hostage crisis.1 This war intensified in 2007 when President George W. Bush ordered sanctions designed to force Iran to give up nuclear ambitions.2

T sanctions, which the president signed into law.3”

There should be little doubt as to whether the sanctions were serious or powerful. Yet, there should be substantial doubt with regard to whether or not the sanctions have been effective in terms

succeeded in “bringing the entire world together over the last few years with the most withering economic sanctions that have ever been administered against any country.” On August 1st, both the House and Senate approved even more

he sanctions were increased multiple times under President

Obama. According to The New American:“David Axelrod, senior advisor

to the president, said on ABC’s This Week on March 4th of this year [2012] that the president had

The Counter Terrorist ~ August/September 2014 29

Page 30: The Counter Terrorist Magazine - August/September 2014

30 The Counter Terrorist ~ August/September 2014

of achieving their primary objective. In fact, some observers believe that the Iranians matched the United States in the economic war, albeit at great cost.

We threw everything at them, inflicting “a currency collapse, hyperinflation, and a bank run and… caused a scarcity of food, gasoline and consumer goods, through the expedient of cutting Iran out of the global payments system.”4 Despite this, we have seen no real evidence of slowdown in Iranian nuclear development and the government remains as defiant as ever. Even if the Obama administration would like to credit the sanctions process for bringing Iran into negotiations,

Vice President George Bush and other VIP's wait to welcome the former hostages from Iran home. Photo by: Templeton

Recently freed Americans held hostage by Iran disembark Freedom One, an Air Force VC-137 Stratoliner aircraft, upon their arrival. Photo by: Don Koralewski

Page 31: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 31

the truth may be much less flattering. According to the Los Angeles Times:

“Sanctions did not bring Iran to the table. Not only Iranian officials but other undeniably objective observers concur that the reason negotiations have commenced is emphatically not because Iran could endure the pain no longer.

‘Total nonsense,’ scoffed former U.S. Ambassador William Miller when I put the question to him. Miller has closely monitored Iranian affairs since he was stationed in that country in the 1960s, and has close contacts with the current leadership. “Sanctions only made them more

defiant,” and they always had ways of getting around them. The deal that’s being discussed now is almost exactly the same one the Iranians offered back in 2003—full transparency on their nuclear program, but recognition of Iran’s right to enrich uranium.5”

Secretary of Defense Leon Panetta tells the audience at the Saban Forum, held at the Willard Hotel in Washington, D. C. on Dec. 2, 2011, that the United States and its allies and partners in the international community must do everything possible to make sure Iran never obtains a

nuclear weapon. Photo by: R. D. Ward/Released

Page 32: The Counter Terrorist Magazine - August/September 2014

32 The Counter Terrorist ~ August/September 2014

instruments of power that the current administration is willing to deploy in an increasingly complex world.8 The United States backed down on the sanctions and accepted a 10-year-old Iranian proposal that had been repeatedly rejected by both

This is one of the great untold stories of the past few years, at least untold in the American media. Iran, with an economy equal to a little over 3% of that of the United States,6 and roughly the size of New Jersey7, went toe-to-toe against the

economic might of the United States and remained standing. The failure to provide a knockout punch, however, risks damaging American credibility at a crucial time when financial warfare and sanctions appear to be the only

Iran concluded negotiations about nuclear capabilities on November 2013. Photo by: U.S. Department of State from United States

Iranian Nuclear Negotiators. Photo by: Dragan Tatic

Page 33: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 33

Presidents Bush and Obama. We loosened sanctions without getting anything new in return. Quoting James Rickards, author of “The Death of Money”:

“Iran had fought the United States to a standstill in its financial war,

despite enormous disruption to the Iranian economy. The U.S.-Iranian financial war of 2012–13 illustrates how nations that could not stand up to the United States militarily could prove a tough match when the

Anti-aircraft guns guarding Natanz Nuclear Facility, Iran. Photo by: Hamed Saber

battlefield is financial or electronic.9”

To be clear, there has been considerable collateral damage inflicted upon the Iranian people, but not all of Iran has suffered. In fact, the leadership, especially the “supreme leader” Khamenei and his

Page 34: The Counter Terrorist Magazine - August/September 2014

34 The Counter Terrorist ~ August/September 2014

Khamenei is about 40% greater than the total annual oil exports from Iran. It also is a powerful base of funds from which retaliatory economic warfare might be launched. Some estimate this to be far in excess of the wealth controlled by the Shah at his peak prior to the 1979 revolution that deposed him.13

HOW IRAN SURVIVED SANCTIONS

The simple answer to how Iran could survive under sanctions is that they learned to operate without using the

supporters, actually found ways to enrich themselves and further consolidate power during the sanctions.10 One Reuter’s estimate suggests that a single entity controlled by Khamenei has a value approaching $100 billion.11 The wealth is largely based on seized assets, some of which were achieved under the cover of sanctions.12 The holdings are largely secret and subject almost exclusively to Khamenei’s control, thus wielding tremendous power and influence even in a country potentially rocked by division. To understand the context, the roughly $95 billion of wealth controlled by

dollar. By instituting new payment arrangements as well as utilizing centuries-old mechanisms, Iran found a way to buy and sell without access to American-controlled systems.14 They used gold,15 barter,16 non-dollar currencies, and hawala17 (an ancient Arabic method of transferring funds) to circumvent controls. According to Immigration and Customs Enforcement (as quoted in The Cornerstone Report):

“The hawala system can be utilized by criminal organizations to transfer funds in or out of a country with little or no detection

Vladimir Putin answered journalists’ questions on the situation in Ukraine (2014-03-04). Photo by: The Presidential Press and Information Office

Page 35: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 35

by law enforcement. Hawalas allow the transfer of millions, if not billions of dollars tracked only by a secret code and disposable scraps of paper. Transfers of money take place based on communications between members of a network of hawaladars…18”

Oil for gold also became commonplace in significant transactions with Turkey and India, among others. The growth in gold trade became so significant that the United States attempted to enforce a gold ban on Iran in July 2013.19 When the gold trade tightened, Iran began processing sales in other non-dollar currencies. Although less convenient than the dollar-based system, it was ultimately effective and exposed the reality that there are other currencies in the world. In some cases, it actually provided a convenience to not have to convert currencies back to dollars for trade.

The Iranians also worked through Chinese and Russian banks that served as fronts for them to the international system. Iran had used Western banks for this purpose during the Bush administration, but the banks were caught and had to pay stiff penalties.20 Chinese banks supported some $40 billion in transactions, largely avoiding the political pressure because of the political complications for the U.S. Russian, Turkish, and Indian banks also supported Iranian oil sales in spite of U.S. sanctions.21

Even British banks had found it difficult to turn down the profits associated with helping Iran circumvent American sanctions. Standard Chartered was responsible for $250 billion in transactions, and when caught paid over $300 million in fines.22 Interestingly,

British resentment of American sanctions can be summed up in the following email comment quoted from Reuters:

“You fucking Americans. Who are you to tell us that we’re not going to deal with Iranians.23”

It’s one thing to quietly attempt to go around the sanctions. It’s quite another, however, to boldly reject them. Yet, that is precisely what Vladimir Putin’s Russia did in a multi-billion dollar deal announced in advance of the Winter Olympics.24 This was perhaps foreshadowing of how Putin would respond to American complaints after seizing Crimea.

Even after the negotiated agreement allowed increased Iranian oil shipments, the Islamic Republic has found creative ways to blow past the limits.25 There seems to be little, if any interest in abiding by the watered-down agreements.

IMPLICATIONS GOING FORWARD

One of the consequences has been the exposure of American weakness. Once Iran demonstrated that it could survive, despite serious hardship, without the dollar-based system, others took notice. Many accurately expected the sanctions approach to fail or at least fall far short of its objectives. I made the following observation in my blog on February 22, 2012:

“The economic weapon the government is using against Iran is sadly exposing our greatest vulnerability. In essence, to punish Iran for continued nuclear development, we have threatened to deprive them of access to the U.S. dollar. That is a serious threat and has serious implications for the domestic Iranian economy. The

The problem is that at the end of the day, the world may prefer to have their oil rather than our paper.

Page 36: The Counter Terrorist Magazine - August/September 2014

36 The Counter Terrorist ~ August/September 2014 Circle 343 on Reader Service Card

with SWIFT. Now imagine that a combination of actions—triggered only by an attempt to circumvent some really very silly sanctions—can suddenly unleash some unexpected possibilities that were beyond the realm of imagination a mere few years ago.

Imagine the emergence, say, of regional economic hubs, powered by the currencies of the local hegemonic powers, where bartering natural resources, goods and services becomes as commonplace as transactions involving currency transfers. Because of the frailty inherent in dealing with these new local currencies and a bartering system, nations tend to trade most with those closest to them in geography and culture. Shocking? Maybe not. Sometimes it just takes a need for change... and a handy tipping point.

“This is not the time to fan the flames,” someone should have told the United States. “You and your pals are sitting in a jalopy tottering on the cliff’s edge — why

problem is that at the end of the day, the world may prefer to have their oil rather than our paper. Certainly that is what the market is telling us as the price of oil in dollars has been rising.

Given the global situation, do we remain so arrogant as to believe that the world prefers American paper to oil from any source? At a minimum, we know that the amount of American paper available (whether in the form of currency or Treasury debt) has and continues to grow exponentially while the amount of available oil reserves are reasonably stagnant (at least by comparison). Add to this the fact that oil has enormous use and the demand for it will grow markedly over the long term. As for American paper? Nearly every major nation of the world including our best trading partners have begun to question (some publicly, some privately) its long-term usefulness.26”

Frighteningly, I wasn’t alone in this observation. In fact, it almost seemed as if the defeat of sanctions was part of a larger plan being instituted with the

involvement of Russia, China, and the BRICS nations to de-Americanize the world and destroy the dollar.27 Putin has long been close to Iran and sympathized with their position regarding dollar-based attacks.28 When the United States cut Iran off from dollar-based transactions, the Russians helped build alternative payment systems that in turn undermined the dollar. Then, when sanctions were placed against Russia, Putin requested Iranian assistance in circumventing them.29

The Islamic world was also watching closely as sanctions were imposed, with some expecting their failure to expose American weakness. Consider this from February 2012, “How Iran Changed the World” in al-Akhbar, a daily Arabic-language newspaper:

“Imagine: Iran stops selling oil to the EU; China tells the US to take a hike on currency values; India starts trading in large quantities of rupees; Russia’s central bank becomes a depot for holding dollars that don’t need to pass through New York; the creation of a global payment messaging system competing

Page 37: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 37

risk making moves now?” they should have warned. “Be a little less arrogant”…

But Washington is absolutely, irrevocably, dangerously fixated on showing Iran who’s boss, and spends a good part of every day trying to tighten the screws around the Islamic Republic. For the most part, the US’s pursuit of this dubious objective has instead stripped it of the vital political tools it once wielded. No more UN Security Council resolutions, no more unscrutinized military adventures. The only thing left is the nefarious tentacles of the United States Department of Treasury and its financial weapons.30

Unfortunately, the “Almighty Dollar” has been shown to be mortal after all. Sanctions were unable to achieve their objective and the world has seen it. With the Russian conflict over the Ukraine, the issue has become increasingly serious.”

CYBER BATTLESOf course, sanctions, oil sales, and

currency battles are just part of the

economic war already underway. Iran has borrowed from the Unrestricted Warfare playbook and created combination efforts built around a cyber strategy.31 The Iranians coordinated specific attacks directly targeting American banks as retaliation for economic sanctions. Even the largest banks were found to be vulnerable to disruption and the tactics were beyond what had been previously experienced.32 This shouldn’t be a surprise. Iran has built a very sophisticated hacking network. According to Foreign Policy:

“In March 2012, Ayatollah Ali Khameini, the Supreme Leader of Iran, publicly announced the creation [of ] a new Supreme Council of Cyberspace to oversee the defense of the Islamic republic’s computer networks and develop new ways of infiltrating or attacking the computer networks of its enemies. Less than two years later, security experts and U.S. intelligence, officials are alarmed by how quickly Iran has managed to develop its cyber warfare capabilities—and by how much it’s willing to use them.33”

To order contact:Gander Mtn. Law Enforcement Sales at:

877-482-3982, 651-325-4911 or [email protected]

Offer is valid for qualified Law Enforcement Depts & Officers only. This offer is not available in stores. Contact Gander Mountain LE

Sales for full list of firearms offered under this program.

FirEarMS

Sig 516 Patrol $1135.00Sig M400 Enhanced $814.00Sig P226/P229 (.9mm/.40) $591.00Sig P238 (.380) $418.00

Department price

iOp price

$1344.00 $964.00$740.00$495.00

Department price

1,000 Rounds

Circle 28 on Reader Service Card

Anti-American mural in the Iranian capital Tehran. Photo by: Ali Abbas

Page 38: The Counter Terrorist Magazine - August/September 2014

38 The Counter Terrorist ~ August/September 2014

The Iranians have become a “first-tier cyber power.”34 They have launched sophisticated attacks against military websites. It took four months and $10 million to clear Iranian penetration from the Navy Marine Corps Intranet.35 The Iranians also penetrated major energy networks and control systems with the potential to damage or sabotage pipelines, energy distribution, and the electric grid.36 A disruption in any of these areas has the potential to create catastrophic economic and human costs.

Iranian cyber efforts have also targeted U.S. officials to seek intelligence, undermine sanctions and detect vulnerabilities. This is an extraordinarily broad effort: utilizing Facebook, fake emails, password theft, and other clandestine tactics to augment more direct attacks.37

Iran has developed a cyber army intended to win 21st Century wars. It is also responding to the cyber capabilities reportedly demonstrated by the United States and Israel that disabled 1,000 centrifuges used to enrich uranium: the so-called Stuxnet virus attack.38 The Iranians adapted to alleged U.S. government attacks and developed their own capabilities with frightening speed.

THIS IS WARThe Iranian leadership has made it clear

that it is preparing for a multi-phased war with the United States using physical, economic and cyber means. After decades of Iranian-sponsored terrorist attacks, there is now sufficient evidence to conclude that the war is underway in the economic and cyber realms as well. The American reduction of sanctions in response to a promise of transparency regarding nuclear development is only

4Wiggin, Addison. “How Gold Helped Iran Withstand U.S. Financial Fury.” Forbes. N.p., 23 May 2014. Web. June 2014. <http://www.forbes.com/sites/greatspeculations/2014/05/23/how-gold-helped-iran-withstand-u-s-financial-fury/ >.

5Cockburn, Andrew. “Why sanctions don’t really work.” Los Angeles Times. N.p., 19 Mar. 2014. Web. June 2014. <http://articles.latimes.com/2014/mar/19/opinion/la-oe-cockburn-sanctions-20140320 >.

6“Iran.” The World Bank. N.p., n.d. Web. June 2014. <http://www.worldbank.org/en/country/iran >.

7“Current-Dollar GDP by State, 2009-2012.” US Bureau of Economic Analysis. N.p., 6 June 2013. Web. June 2014. <http://lwd.dol.state.nj.us/labor/lpa/industry/gsp/gsp_statec.xls >.

8Griffin, Christopher. “The War of Wills Between U.S. and Iran.” Real Clear World. N.p., 8 Feb. 2014. Web. June 2014. <http://www.realclearworld.com/articles/2014/02/08/the_war_of_wills_between_us_and_iran_110280.html>.

9Wiggin, Addison. “How Gold Helped Iran Withstand U.S. Financial Fury.” Forbes. N.p., 23 May 2014. Web. June 2014. <http://www.forbes.com/sites/greatspeculations/2014/05/23/how-gold-helped-iran-withstand-u-s-financial-fury/ >.

10“To expand Khamenei’s grip on the economy, Iran stretched its laws.” Reuter Investigates. Reuters, 13 Nov. 2013. Web. June 2014. <http://www.reuters.com/investigates/iran/#article/part3>.

11Stecklow, Steve, Babak Dehghanpisheh, and Yeganeh Torbati. “Khamenei’s conglomerate thrived as sanctions squeezed Iran.” Reuters Investigates. Reuters, 12 Nov. 2013. Web.

a slight detour in direction, not a pathway to ending conflict. We cannot be complacent. The government of Iran was not beaten by sanctions and remains as defiant as ever. It was just February when the “supreme leader” Khamenei openly called for his cyber hacking units to prepare for war.39 By May, despite the promise of eased tensions, Khamenei was calling for renewed jihad “until America was no more.”40 We face a number of national security challenges. Economic war with Iran is certainly among the most serious. •ABOUT THE AUTHOR

Mr. Freeman (CFA) is the author of Secret Weapon: How Economic Terrorism Brought Down the U.S. Stock Market (www.secretweapon.org) and Game Plan: Your Secret Weapon to Protect Yourself From Economic Attack (Regnery, 2014). He authors the blog: www.globaleconomicwarfare.com.

ENDNOTES1“UN Sanctions Against Iran.” Global

Policy Forum. GPF, n.d. Web. June 2014. <http://www.globalpolicy.org/security-council/index-of-countries-on-the-security-council-agenda/iran.html>.

2Mohammed, Arshad, Justyna Pawlak, and Warren Strobel. “Special Report: Inside the West’s economic war with Iran.” Reuters. N.p., 18 Dec. 2012. Web. June 2014. <http://www.reuters.com/article/2012/12/28/us-iran-sanctions-idUSBRE8BR04620121228 >.

3Kenny, Jack. “Sanctions: The Economic War on Iran.” The New American. N.p., 13 Nov. 2012. Web. June 2014. <http://www.thenewamerican.com/usnews/foreign-policy/item/13486-sanctions-the-economic-war-on-iran >.

Page 39: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 39Circle 213 on Reader Service Card

June 2014. <http://www.reuters.com/investigates/iran/#article/part2>.

12Stecklow, Steve, Babak Dehghanpisheh, and Yeganeh Torbati. “Khamenei controls massive financial empire built on property seizures.” Reuters Investigates. Reuters, 11 Nov. 2013. Web. June 2014. <http://www.reuters.com/investigates/iran/#article/part1 >.

13 IBID

14“Iranian banks bypass electronic money payment systems.” Gulf News. Al Nisr, 10 Feb. 2013. Web. 9 June 2014. <http://gulfnews.com/business/banking/iranian-banks-bypass-electronic-money-payment-systems-1.1144334 >.

15Wiggin, Addison. “How Gold Helped Iran Withstand U.S. Financial Fury.” Forbes. N.p., 23 May 2014. Web. June 2014. <http://www.forbes.com/sites/greatspeculations/2014/05/23/how-gold-helped-iran-withstand-u-s-financial-fury/ >.

16Saul, Jonathan, and Parisa Hafezi. “Exclusive: Iran, Russia negotiating big oil-for-goods deal.” Reuters. N.p., 10 Jan. 2014. Web. June 2014. <http://www.reuters.com/article/2014/01/10/us-iran-russia-oil-idUSBREA090DK20140110 >.

17The Editors. “Global Insider: Iran’s Informal Financial Sector Has Boomed Under Sanctions.” World Politics Review. N.p., 31 Jan. 2013. Web. June 2014. <http://www.worldpoliticsreview.com/trend-lines/12681/global-insider-iran-s-informal-financial-sector-has-boomed-under-sanctions >.

18“Hawalas.” The Cornerstone Report. N.p., n.d. Web. June 2014. <http://www.ice.gov/doclib/news/library/reports/cornerstone/cornerstone7-2.pdf>.

19Wiggin, Addison. “How Gold Helped Iran Withstand U.S. Financial Fury.” Forbes. N.p., 23 May 2014. Web.

June 2014. <http://www.forbes.com/sites/greatspeculations/2014/05/23/how-gold-helped-iran-withstand-u-s-financial-fury/>.

20Bajaj, Vikas, and John Eligon. “Iran Moved Billions via U.S. Banks.” The New York Times. N.p., 9 Jan.

2009. Web. June 2014. <http://www.nytimes.com/2009/01/10/business/worldbusiness/10bank.html?_r=0 >.

21Wouk, Joseph. “Iran’s $40 billion Transfers to Chinese Banks Sidestep Financial Isolation.” A Sclerotic Goes to War. Wordpress, 23 Mar. 2012. Web. June

Page 40: The Counter Terrorist Magazine - August/September 2014

40 The Counter Terrorist ~ August/September 2014

sh) >.31Wiggin, Addison. “How Gold Helped

Iran Withstand U.S. Financial Fury.” Forbes. N.p., 23 May 2014. Web. June 2014. <http://www.forbes.com/sites/greatspeculations/2014/05/23/how-gold-helped-iran-withstand-u-s-financial-fury/>.

32Perlroth, Nicole, and Quentin Hardy. “Bank Hacking Was the Work of Iranians, Officials Say.” The New York Times. N.p., 8 Jan. 2013. Web. June 2014. <http://www.nytimes.com/2013/01/09/technology/online-banking-attacks-were-work-of-iran-us-officials-say.html?_r=0 >.

33Harris, Shane. “Forget China: Iran’s Hackers Are America’s Newest Cyber Threat.” Foreign Policy. N.p., 18 Feb. 2014. Web. June 2014. <http://complex.foreignpolicy.com/posts/2014/02/18/

Circle 285 on Reader Service Card

2014. <http://warsclerotic.wordpress.com/2012/03/23/irans-40-billion-transfers-to-chinese-banks-sidestep-financial-isolation/ >.

22Rappaport, Liz. “Bank Settles Iran Money Case.” The Wall Street Journal. N.p., 15 Aug. 2012. Web. June 2014. <http://online.wsj.com/news/articles/SB10000872396390444318104577589380427559426>.

23Salmon, Felix. “Counterparties: “You f—ing Americans. Who are you to tell us that we’re not going to deal with Iranians.”.” Reuters. N.p., 6 Aug. 2012. Web. June 2014. < http://blogs.reuters.com/felix-salmon/2012/08/06/counterparties-you-fucking-americans-who-are-you-to-tell-us-that-we%E2%80%99re-not-going-to-deal-with-iranians/>.

24Saul, Jonathan, and Parisa Hafezi. “Exclusive: Iran, Russia negotiating big oil-for-goods deal.” Reuters. N.p., 10 Jan. 2014. Web. June 2014. < http://www.reuters.com/article/2014/01/10/us-iran-russia-oil-idUSBREA090DK20140110 >.

25Caruso-Cabrera, Michelle. “Iranian oil exports on course to blow past limits.” CNBC. N.p., 3 June 2014. Web. June 2014. <http://www.cnbc.com/id/101727475 >.

26Freeman, Kevin D. “Our Paper or Their Oil?” Global Economic Warfare. N.p., 22 Feb. 2012. Web. June 2014. < http://globaleconomicwarfare.com/2012/02/our-paper-or-their-oil/ >.

27The Counter Terrorist—June/July 2013

Cover: Russia, China and The New Global Democratic Peace

28CNN Wire Staff. “Russia slams new sanctions against Iran.” CNN World. N.p., 22 Nov. 2011. Web. June 2014. <http://www.cnn.com/2011/11/22/world/meast/

SPOT THEM FIRST

Model #4600

Golight Inc.

Dual Illumination Capability Visible LED White Light 225,000cd 950 nm LED IR

24 Volt DC360° Continuous Horizontal180° Vertical TiltAuto Engage Speed ControlHard Wired Dash ControlProgrammable Home ButtonWeather-Tight EnclosureCarbon Fiber BodySeparate Stainless Steel Mounting Plate

37146 Old Hwy 17, Culbertson, NE 69024 www.golight.com | 800.557.0098 | [email protected]

iran-sanctions/ >.29Kredo, Adam. “Russia Asks Iran: Help

Us Skirt U.S. Sanctions.” The Washington Free Beacon. N.p., 8 May 2014. Web. June 2014. <http://freebeacon.com/national-security/russia-asks-iran-help-us-skirt-u-s-sanctions/ >.

30Narwani, Sharmine. “News Politics Culture & Society Economy Opinion Portraits In Focus Blogs GI Files Syria Files Arabic Edition Follow Al-Akhbar on Twitter Like Al-Akhbar on Facebook Subscribe to our RSS Feed How Iran Changed The World.” al-akhbar. N.p., 17 Feb. 2012. Web. June 2014. < http://english.al-akhbar.com/blogs/sandbox/how-iran-changed-world?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+AlAkhbarEnglish+(Al+Akhbar+Engli

Page 41: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 41Circle 317 on Reader Service CardCircle 308 on Reader Service Card

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906

or email [email protected]

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB.

The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever.

The Portable Vehicle Barrier comes with several customized configurations:

• You can put wheels on it so that it acts as a swing barrier and easily opens a road

• You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything

• Additional safety features can be added

PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable.Best of all NO maintenance is required.

Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Or visit our website: www.SSIPVB.comCircle 226 on Reader Service Card

New and improved

Page 42: The Counter Terrorist Magazine - August/September 2014

42 The Counter Terrorist ~ August/September 2014

forget_china_iran_s_hackers_are_america_s_newest_cyber_threat >.

34IBID35Neal, Ryan W. “US Navy Needed Four

Months And $10 Million To Clear Iranian Hackers From Marine Corps Network.” International Business Times. N.p., 18 Feb. 2014. Web. June 2014. < http://www.ibtimes.com/us-navy-needed-four-months-10-million-clear-iranian-hackers-marine-corps-network-1556377 >.

36Neal, Ryan W. “US Navy Needed Four Months And $10 Million To Clear Iranian Hackers From Marine Corps Network.” International Business Times. N.p., 18 Feb. 2014. Web. June 2014. <http://online.wsj.com/news/articles/SB10001424127887323336104578501601108021968 >.

37Gorman, Siobhan. “Iran-Based Cyberspies Targeting U.S. Officials, Report Alleges.” The Wall Street Journal. N.p., 29 May 2014. Web. June 2014. <http://online.wsj.com/articles/iran-based-cyberspies-targeting-u-s-officials-report-alleges-1401335072 >.

38Sanger, David E. “Obama Order Sped Up Wave of Cyberattacks Against Iran.” The New York Times. N.p., 1 June 2012. Web. 9 June 2014. <http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?hp >.

39Haaretz. “Prepare for cyber war, Iran’s supreme leader tells students.” Haaretz. N.p., 13 Feb. 2014. Web. June 2014. <http://www.haaretz.com/news/middle-east/1.574043 >.

40Kahlili, Reza. “Iran’s Supreme Leader: Jihad Will Continue Until America is No More.” The Daily Caller. N.p., 25 May 2014. Web. June 2014. <http://dailycaller.com/2014/05/25/irans-supreme-leader-jihad-will-continue-until-america-is-no-more/ >.

Circle 155 on Reader Service Card

Circle 131 on Reader Service Card

Rd

t-1 R

obo

t d

eliv

ery

to

ol

www.jntactical.com

NEW FOR 2014

Circle 301 on Reader Service Card

Page 43: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 43Circle 301 on Reader Service Card

Page 44: The Counter Terrorist Magazine - August/September 2014

44 The Counter Terrorist ~ August/September 2014

C

BOOK REVIEW

Comrade JReviewed by: Chris GrahamBy Pete Earley

olonel Sergei Tretyakov— “Comrade J”—is the highest-

ranking Russian SVR officer to defect to the United States. He collaborated with writer Pete Earley to share his insights in Comrade J: The Untold Secrets of Russia’s Master Spy in America After the End of the Cold War (Berkley, 2009). Tretyakov’s account of life behind the Iron Curtain and life under Vladimir Putin reveals the amount of institutional deception that is necessary to bring an oppressive government to power and the scope of domestic spying and manipulation that is necessary to retain that power.

The author opens quoting Colonel Tretyakov, “I want to warn Americans. As a people, you are very naïve about Russia and its intentions. You believe because the Soviet Union no longer exists, Russia now is your friend. It isn’t, and I can show you how the SVR is trying to destroy the U.S. even today and even more than the KGB did during the Cold War.” He goes on to warn Americans how Soviet socialists achieved their aims by quoting Stalin: “the people who cast the votes don’t decide an election, the people who count the votes do.”

Tretyakov recounts a KGB operation that he believes is representative of Russian schemes to manipulate world opinion. “[LAZAR] was a coworker of Arthur’s at the Canadian arms control disarmament center in Ottawa. He had a close relationship with members

of the Canadian Parliament. LAZAR’s expertise was in international environmental law, and the KGB used him whenever it could to cause headaches for the U.S. The Center in Moscow provided LAZAR with scientific information that was specifically written to disrupt relations between Canada and the U.S. over environmental issues. LAZAR would deliver these anti-U.S. reports to his political connections in the Canadian parliament. They in turn would cite these reports, drafting legislation on environmental concerns. LAZAR never believed he was committing treason… he thought he was protecting the… environment.” The author quotes writer Michael Creighton describing another Russian enviro-scam as a “well orchestrated media campaign.” And adds, “This is not the way science is

done, it is the way products are sold.” Tretyakov relayed to the author that

“Gorbachev and Yeltsin did not fire the generals who ran the [KGB] Center. Nor did they put an outsider in charge of foreign intelligence and order him to clean house. Instead, Gorbachev promoted a former KGB lieutenant

Page 45: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 45

general to take charge of the SVR.” In the days following the collapse of the Soviet Union, Russia agreed to stop engaging in active measures (disinformation campaigns). Tretyakov reports, “we said, ‘okay, now we are friends. We will stop doing this’ and the SVR shutdown Directorate A (A stood for active measures), but Directive A basically underwent a name change. That’s all. It became department MS (measures of support) and the very same people who had run it under the KGB were still doing it for the SVR.”

The author explains how Saddam Hussein and the SVR exploited corruption in the U.N. to beat an oil embargo and specifies, “[U.N. Secretary General Kofi] Annan’s son, Kojo Annan, had earned as much as $485,000 in ‘consulting fees’ related to Iraqi oil transactions.” Tratyakov continues, “Politicians from nearly every country at the U.N.—except the U.S.—received money from Saddam’s scam. Many of them were U.N. diplomats.”

Tretyakov relates, “officers brazenly met their sources inside the U.N.’s main building.” This was against rules, but

“we ignored this rule because we had so many sources at the U.N.” The colonel explains, “We looked for diplomats who disliked the U.S. even though they were from countries that were considered by America to be a friend… I was always amazed at how cheaply we could get U.N. diplomats to work for us…We would buy jewelry at Walmart and they would gobble it up as if it were some precious treasure when they were actually betraying their countries… for a few hundred dollars worth of gold trinkets.”

Tretyakov tells us, “from my parents I had learned neither communism nor socialism worked in Soviet society… As new citizens we found ourselves… offended when we see how natural born Americans take liberties for granted. Sometimes I believe only someone who’s lived in a corrupt society can truly understand the importance of America’s liberties.”

Colonel Tretyakov warns, “During the Cold War in the Soviet military doctrine there was the definition of the Main Enemy, which was also used by intelligence as a basic principal.

It was the United States, followed by NATO… What is the official guideline for the SVR today? The terms have changed. It is now called the Main Target. But it is exactly the same, the United States followed by NATO.” He identifies the targets he was instructed to penetrate in New York: “military and government, New York financial institutions including the New York Stock Exchange… New York University [and] Columbia University.”

Little consideration is given to the enduring wounds inflicted by the KGB’s subversive activities. Even less consideration is given to the current efforts of Vladimir Putin’s SVR. How many subversive seeds sown by yesterday’s communists are employed as weapons by today’s radicals? Read Comrade J and decide for yourself. •ABOUT THE AUTHOR

Mr. Graham is the former commander of a military anti-terrorism unit, the creator of 30-10 training (www.30-10pistol.com) and he is the editor of The Counter Terrorist magazine.

Circle 309 on Reader Service Card

Page 46: The Counter Terrorist Magazine - August/September 2014

46 The Counter Terrorist ~ August/September 2014

TULAREMIAAS A WEAPONTularemia is a bacteria-based disease that is highly contagious and potentially fatal. It spreads to humans through insect bites, skin contact with infected animals, ingesting contaminated water or food, or inhaling contaminated dusts or aerosols.

46 The Counter Terrorist ~ August/September 2014Photo by: James R. Evans

Page 47: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 47

R abbits, hares, squirrels, mice, and other rodents are especially

susceptible and die in large numbers during outbreaks.¹ Birds, reptiles and fish may also be carriers.2 The disease is often called “rabbit fever” due to its virulence among rabbits. The disease is endemic throughout North America, continental Europe, Russia, China, and Japan. It is rare in the United Kingdom, Africa, and Central and South America.3 The Amarillo, Texas International Airport experienced a tularemia outbreak in 2006. An entomologist was the first

to observe a mass jackrabbit die-off, and suspected tularemia. This person contacted airport and city officials, who quickly enacted quarantine protocols and appear to have successfully stemmed the spread of the disease to other rodents or humans.4

EFFECTS ON HUMANSThere are six types of tularemia.

Each has specific symptoms and all are accompanied by fever. Symptoms are displayed within ten days of infection.

By Jeffrey D. Shuman

The type of infection depends on where the bacteria enters the body. Most common routes are through the skin or mucous membranes, but the bacteria may also be inhaled or eaten. Ulceroglandular tularemia is the most common. Symptoms include skin ulcers at the site of infection, swollen and painful lymph glands, chills, headache, and exhaustion. Glandular tularemia exhibits the same symptoms as ulceroglandular but without the skin ulcers. Oculoglandular tularemia affects the eyes and causes eye pain, redness, eye

The Counter Terrorist ~ August/September 2014 47Photo by: James R. Evans

Page 48: The Counter Terrorist Magazine - August/September 2014

48 The Counter Terrorist ~ August/September 2014

swelling and discharge, and an ulcer on the inside of the eyelid. Oropharyngeal tularemia is usually caused by eating infected game that is improperly cooked, or by drinking contaminated water. Symptoms include sore throat, mouth ulcers, tonsillitis, swollen lymph glands in the neck, vomiting, and diarrhea. Pneumonic tularemia is more common in elderly people. It displays symptoms of pneumonia, and may be contracted in conjunction with the other forms of tularemia. Typhoidal tularemia is rare and more serious than the others. Symptoms include high fever, extreme exhaustion, vomiting and diarrhea, enlarged spleen, enlarged liver, and pneumonia. Of all the types listed, typhoidal tularemia

The image, taken with a fluorescent microscope, shows mouse macrophages 12 hours after infection with a virulent strain of Francisella tularensis. The cells on the left are untreated,

while the cells on the right were treated 3 days in advance with CLDC+MPF. The untreated cells fail to control replication of F. tularensis. In contrast, cells activated with the

CLDC+MPF therapeutic have nearly eliminated all of the bacteria.Photo by: National Institutes of Health (NIH)

A culture of Francisella tularensis. Photo by: MarcoTolo

Page 49: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 49Circle 211 on Reader Service Card

YOU ARE DRIVEN TO

LEADWE ARE DRIVEN TO HELP YOU GET THERE.

To learn more visit, www.AMUonline.com/Counter-Terrorist

At American Military University, we understand where you’ve been, what you’ve done andwhat you’d like your team to achieve. Choose from more than 90 career-relevant online degrees — respected by the intelligence community — which can help your squad advance their careers while serving their country. Your team will join 100,000 professionals gaining relevant skills that can be put into practice the same day. Take the next step, and learn from the leader.

Counter_Terrorist 1013.indd 1 10/21/13 9:52 AM

Page 50: The Counter Terrorist Magazine - August/September 2014

50 The Counter Terrorist ~ August/September 2014

of a form of tularemia. There is some speculation about a tularemia outbreak along the German-Russian front in 1942. Soldiers on both sides reportedly contracted the disease. Some believe the Russian forces released the bacteria as a form of defense to stem the German attack. Russian soldiers may have been sickened because this weapon does not discriminate. Others dispute this and claim the outbreak may have been due to a breakdown in health and hygiene and an increase in contact with disease-bearing rodents.3

One of the largest outbreaks of tularemia occurred in Sweden between 1966 and 1967.3 The outbreak coincided with a large increase, then sudden drop, in the number of voles in that country. Sweden reported 2,739 cases of tularemia

A Tularemia lesion on the dorsal skin of the right hand. Photo by: CDC Public Health Image Library

in an inhaled form would be the most dangerous and successful if weaponized. This is due to the seriousness of its symptoms when compared to the other forms.1, 3 Tularemia is rare and shares symptoms common with other diseases. This makes proper identification difficult. Doctors may check for the bacteria in blood or sputum. Chest x-rays may show signs of pneumonia. All forms of the disease may be successfully treated if diagnosed early and treated with antibiotics. There are no known vaccines for tularemia, but the symptoms may be treated with streptomycin or doxycycline.2

PAST OUTBREAKSSeveral tularemia outbreaks have

been recorded throughout the twentieth

century in the United States, Europe, the former Soviet Union countries, and Japan. Outbreaks may have occurred as early as the nineteenth century, but were likely improperly identified as isolated cases and not associated with a larger infectious process. In the early part of the twentieth century, a Japanese physician noted a comparison between the number of dead rabbits and the number of people becoming sick who had somehow handled or been exposed to these rabbits.3 Around the same time in the United States, physicians in California investigated dead rats and squirrels in an attempt to tie them to an outbreak of plague in San Francisco. These doctors noted lesions in infected samples that were different from plague samples, and this led to their discovery

Page 51: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 51

that year which is nearly half of the total number of cases the country reported between 1931 and 1993.3 The United States has reported between 200-300 cases of tularemia each year with the most occurring in Arkansas, Illinois, Missouri, Oklahoma, Virginia, and Tennessee. The disease has been reported in all states except Hawaii.3

While there is no known immunization for tularemia, the spread of the disease appears to be halted by minimizing contact with infected animals, following good hygiene standards, and treating people who have the sickness. Victims of the disease go through a clinical program to treat the symptoms.3 This has proven successful in past cases and outbreaks. Not treating the symptoms has the potential to allow the disease to progress to respiratory failure, shock, and possibly death.3 In 2000, the Working Group on Civilian Biodefense noted a mortality rate for pneumonic tularemia, if untreated, as high as 60%.3 In 1970, a World Health Organization committee asserted that roughly 100 pounds of tularemia dispersed as an aerosol over a population of 5 million could result in an estimated 250,000 casualties, including nearly 19,000 deaths.3, 5

WEAPONIZATIONBiological agents are difficult to

successfully weaponize. They are living organisms that die if not maintained within the limits of their required environment. Weaponization conjures images of vials filled with bio-agents either inside a bomb or secured around an explosive. In this case, the biological agent is released upon detonation. That is a possible form of dissemination. However, the heat from the explosion would likely kill a large amount of the agent and render the attack less

successful. The sound of the detonation would alert people that something had happened. Investigators could discover the biological agent and enact procedures to limit contamination.

Employing any biological agent as a weapon requires patience. A biological release would not garner the immediate headlines associated with an Improvised Explosive Device (IED) detonated in a populated area. However, the eventual confusion and fear following a successful bioterrorist attack could be unimaginable. Sickened people, depending on where the agent was introduced, could easily number into the thousands. Victims could overwhelm hospitals and emergency rooms. Local, state, and federal government offices would be inundated with calls for action. Bioterrorists realize this potential and may attempt to covertly release their agent on unsuspecting communities. An attack would likely occur at night and

Bacillus anthracis Bioterrorism Incident, Kameido, Tokyo, 1993, Fluid collected from the Kameido site cultured on Petri dishes to identify potential Bacillus anthracis isolates.

Photo by: Centers for Disease Control

Kasumigaseki Station, one of the many stations affected during the attack. Photo by: WikimediaCommons

Page 52: The Counter Terrorist Magazine - August/September 2014

52 The Counter Terrorist ~ August/September 2014

A chest X-ray showing increased opacity in both lungs, indicative of pneumonia, in a patient with SARS. Photo by: PerPlex

employ a quiet dispersal device such as a fan or sprayer. Alternately, the bioterrorist may simply open or secrete a container downwind from the target or near a public area such as an office building, courtyard, stadium or mass transit station. A night attack would minimize the sun’s adverse affects on the agent. The incubation period takes time and this could allow a bioterrorist to escape the area. The bioterrorist risks the threat of self-contamination, but if they understand the disease and the nature of their attack, then they may take the necessary precautions to protect themselves.

A template for a bioterrorist attack would be the Aum Shinrikyo sarin gas attack on the Tokyo subway in 1995. The Aum Shinrikyo cult placed plastic bags filled with home-made sarin gas on five subway cars during Tokyo’s early morning rush hour. The gas dispersed throughout the subway cars and Kasumigaseki station. Twelve people died and an estimated 5,000 were injured.6 A biological agent could be released in a similar fashion. Innocent people would be sickened and a percentage will likely die. The ideal biological weapon would be effective in small doses, have a short incubation period, withstand the stresses of dissemination, and be minimally contagious to the person, or persons, employing it.

IMPACT OF A BIOTERRORIST ATTACK

One of the greatest unknowns regarding a bioterrorist attack is how far the disease could spread before being discovered. As discussed above, releasing a biological agent would most likely take place quietly and in a non-descript manner. People would not know they were exposed until after symptoms appeared. Victims would eventually be identified through hospitalization, from family members reporting sicknesses or deaths, or from people not showing up to work. Hospital emergency rooms would be the first to notice an increase in people seeking treatment for related ailments. Eventually medical professionals and other specialists would put the dots together and realize that a biological agent has been released. They may even be able to pinpoint the date, time, and location of the release. This would help with clean-up efforts but little else. Stopping the spread would require

As the disease spreads and knowledge of the

attack grows, so too would fear spread.

Page 53: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 53

knowing how far the disease travelled.A disease such as typhoidal tularemia

in its inhaled form could spread like wildfire. The 2002 spread of Severe Acute Respiratory Syndrome (SARS) is a good comparison for how tularemia may spread. The SARS disease was first discovered in China in late 2002 and spread to over two dozen countries before being contained in mid 2003.7

The disease first crossed into countries nearest to China, such as Vietnam and Hong Kong, and then travelled to the Philippines, Europe, and North America. It is probable that the disease travelled to these cities via airports. If tularemia was dispersed in a city with an international airport or an international population, such as New York City, then it would be possible for the disease to travel

throughout the world in a very short time.As the disease spreads and knowledge

of the attack grows, so too would fear spread. People would avoid public places including mass transit, shopping centers, and parks. People would stay away from work for fear of coming into contact with an infected person. The area around the initial exposure may completely shut down. If this area was a city government or federal building then that function could, conceivably, be shut down until disinfected. Tourism would end either by mandatory notices from governments or voluntary bans on travel from tourists. Businesses would suffer as goods and services into and out of the affected area would grind to a halt. Least known would be the cost of clean-up after an attack. This could range

Entrance to the headquarters of the Centers for Disease Control and Prevention. Photo by: Daniel Mayer

into the billions of dollars based on lost productivity, insurance claims, the money expended by governments for emergency response, and countless man-hours for police and other investigators, hospital staffs, clean-up crews, etc. Finally, the fallout from dealing with diseased persons could be unconscionable. Mandatory treatments might be enforced as well as the quarantine of entire neighborhoods. The legal issues of these procedures are almost limitless.8

CONCLUSIONThe Center for Disease Control and

Prevention has identified tularemia as a Category A Bioterrorism Agent. Category A agents are easily transmitted from person to person, result in a high mortality rate, have the potential for

Page 54: The Counter Terrorist Magazine - August/September 2014

54 The Counter Terrorist ~ August/September 2014 Circle 113 on Reader Service Card

outbreak at a metropolitan airport, Texas. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 7(3). Retrieved from Academic OneFile database.

5World Health Organization. (1970). Health aspects of chemical and biological weapons. Geneva, Switzerland: World Health Organization; 1970:105-107

6Seto, Y. (2001). The sarin gas attack in Japan and the related forensic investigation. Retrieved from http://www.opcw.org/news/article/the-sarin-gas-attack-in-japan-and-the-related-forensic-investigation/

7Hunter, N.D. (2009). The Law of Emergencies Public Health and Disaster Management, Butterworth-Heinemann.

8Tognotti, E. (2013). Lessons from the history of quarantine, from plague to influenza A. Emerging Infectious Diseases, 19(2). Retrieved from Academic OneFile database.

register for yourfree expo pass

october 6-9, 2014 | Washington Dc

• Preventing Terrorism and Enhancing Security• Border Management & Immigration• Cybersecurity• Disaster Relief and Emergency Preparedness• Science & Technology

Over the course of 4 days, attendees will haveexclusive entry to over 40 high level presentations onHomeland Security, access to 60+ exhibitors, productsdemonstrations, and networking opportunities withover 700 attendees.

Now in its 4th year, Homeland Security Week 2014will bring together high profi le speakers from theDepartment of Homeland Security including CBP,TSA, ICE, USCG, FEMA and more to discuss themost pressing issues facing the homeland securitycommunity including:

www.HomelandSecurityExpo.com

a major public health impact, may cause panic and social disruption, and require special action for public health preparedness.1 The United States has historically done well fighting conventional adversaries. This was evidenced by the success of the first Gulf War and the quick defeat of the Iraqi Army in 2003. However, the government is still coming to grips with Unrestricted Warfare and unconventional adversaries. A biological attack, while not immediately gratifying for a terrorist, does have the potential to produce massive casualties, chaos, and fear. These asymmetric warriors may be the most likely to employ biological agents or other Weapons of Mass Destruction (WMD) against the United States or other free societies. A biological agent release would be difficult to determine until after the damage has been done. Deterring potential adversaries and being prepared to react to a release may be the most successful approach to dealing with a bioterrorist attack. •

The Aeromedical Isolation Team of the US Army Medical Research Institute of Infectious Diseases at Fort Detrick, Maryland. Photo by: US Government

ABOUT THE AUTHORMr. Shuman is a former U.S. Air

Force Explosive Ordnance Disposal technician and master sergeant. He works as a government consultant in the Washington D.C. area.

ENDNOTES1Center for Disease Control and

Prevention (CDC). (2014). Tularemia. Retrieved from http://www.cdc.gov/tularemia

2Mayo Clinic. (2014). Diseases and conditions tularemia. Retrieved from http://www.mayoclinic.com/health/tularemia/DS00714

3Texas Department of State Health Services. (2010). History of tularemia – tularemia through the ages. Retrieved from https://www.dshs.state.tx.us/preparedness/bt_public_history_tularemia.shtm

4Alexander, J. L., Bell, T. E., Duke, D., Thomas, S. G., Rush, P. Jr., & Richardson, J. M. (2009). Tularemia

Page 55: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 55Circle 180 on Reader Service Card

TheCounter Journal for Law Enforcement, Intelligence & Special Operations Professionals

9th Annual

presents:

HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION November 4-6, 2014 • Orlando, Florida

Best Location in Orlando – The Florida Hotel and

Conference Center

What a fantastic hotel. Rooms were nicely appointed, the staff was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall

attached to the hotel. –Top rated by TripAdvisor

LEARN MORE at: www.thecounterterroristmag.com/conferenceCall now for more information.

Phone: 866-573-3999Fax: 866-573-2090

[email protected]

We sold out in 2013. Get your registration in as soon as possible:• Best speakers in Homeland Security• Premiere opportunity to network with your peers in US Homeland Security and across the Globe• Attended by more than 100 Federal, State and Local agencies• Selected Vendor expo of the latest in HS Technologies

PROGRAM FOR THE 2014 CONFERENCE “TOOLS TO MITIGATE ACTS OF TERRORISM AND VIOLENT CRIME”• Next Generation in Behavior Analysis• Terrorism Funding – The many different scenarios• Personal and Professional Resilience: Are you Ready• Active shooters – profiling mass killers• Survival against a Suicide Bomber• Human Trafficking the Terror Nexus• Medical Response to a Terrorist incident• Future Threats to Homeland Security• Transit System employees – Training to prevent an incident And many more…

REGISTRATION COST $399.00*Government and group rates available. Call us for details.

Circle 177 on Reader Service Card

Page 56: The Counter Terrorist Magazine - August/September 2014

56 The Counter Terrorist ~ August/September 2014

UMAROV’S LEGACY AND THE FUTURE OF THE IMIRAT KAVKAZ

56 The Counter Terrorist ~ August/September 2014Photo by: Angelliuel7

Page 57: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 57

By Michael S. Toney

marov, often referred to as Russia’s bin Laden, was

declared dead at age 49 on March 19, 2014.2, 3 Various sources reported that he had been seriously wounded in a battle against Russian forces, succumbing to his injuries sometime between January and

U

In a mixture of Arabic and heavily accented Russian, Dokku Umarov’s successor, Aliashab Alibulatovich Kebekov, also known as Sheikh Ali Abu Mukhammad ad-Dagestani, announced that he was the new emir of the Imirat Kavkaz (IK).1

March 2014.4 He had been reportedly killed eight times before, forced to retire by senior Chechen commanders, and then been reinstated as emir by an IK shariah court; however, this time he would not be returning from the dead.

Umarov’s death was confirmed by

The Counter Terrorist ~ August/September 2014 57

Page 58: The Counter Terrorist Magazine - August/September 2014

58 The Counter Terrorist ~ August/September 2014

2010, Russian authorities believe that Umarov was behind other high casualty attacks such as the Moscow theater siege in 2002, which resulted in the deaths of 129 people.7, 8

In the months leading up to the 2014 Olympic Games in Sochi, Umarov intensified his threats, resulting in significantly increased security actions by the Russian government. Umarov had encouraged his followers to use “any methods that Allah allows” to stop the Olympic Games, including biological weapons.9, 10 He attempted to enrage his followers with messages such as “they plan to hold the Olympics on the bones of our ancestors.” To his dismay, his demands went unanswered and led to nothing more than threats, fear and

an IK media release and other terrorist organizations from Turkey to Syria. It was also confirmed by Russian President Vladimir Putin and Russia’s Federal Security Service (FSB).5 Umarov’s death was a major accomplishment for Putin, ending a decades-long manhunt for Russia’s most wanted terrorist, an event similar in importance to the killing of Osama bin Laden for the U.S. government. Russian authorities have accused Umarov of ordering Chechen rebels to carry out some 2,400 insurgency operations, including 54 suicide attacks, resulting in as many as 9,000 casualties.6 In addition to the more recent bombing of the Domodedovo airport in January 2011, and two metro stations using female suicide bombers in September

He attempted to enrage his followers

with messages such as “they plan to hold the

Olympics on the bones of our ancestors.”

Vladimir Putin chaired a meeting on the “environmental” aspects of the 2014 Winter Olympic Games in Sochi. Photo by: premier.gov.ru

Page 59: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 59

the arrest of his followers. The Olympic Games concluded successfully and his aspirations for violence had been a humiliating failure.

Omar al-Shishani, a Chechen commander in the Islamic State of Iraq and the Levant (ISIL), and Abdullah Mansour, the leader of the Turkistan Islamic Party (TIP), announced condolences and gave eulogies to Umarov.11, 12 According to the Kavkaz Center, processions were held in several cities in Turkey, which were reportedly attended by thousands of Turkish Muslims.4 Mukhtar Abu al-Zubeir, the leader of al Qaeda’s branch in Syria, the Shabaab al-Mujahideen Movement, offered his condolences as well.13

UMAROV’S RISE TO POWER

Umarov, also known as Dokku Umarov, was born April 13, 1964, in the village of Kharsenoi in the Shatoysky District of Southern Chechnya.14 Umarov’s first run-in with the government was in 1980 with a conviction for reckless homicide. Following this incident, in 1992, he was wanted for murder and later for kidnapping. His military career began before 1994 when he served in the special forces under Ruslan Gelayev, a prominent commander in the Chechen separatist movement against Russia.15 In 1997, Umarov held the position of Secretary of the Security Council of the self-proclaimed Republic of Ichkeria.16

Chechnya is recognized as a Republic, or subject of Russia, split into two parts, the Republic of Ingushetia and the Chechen Republic, also referred to as the Chechen Republic of Ichkeria. In the first Chechen War with Russia, Ichkeria established independence, but surrendered this independence back to

Russia following the second Chechen War.17 Chechen extremists continue to battle Russian forces with the goal of establishing an independent Islamic state. Umarov’s IK is supposed to be the manifestation of an independent Islamic state; however, it is recognized not as a

territory, but as a terrorist organization by Russian authorities.

Umarov’s rise through the ranks accelerated after Russian forces killed his predecessors, Aslan Maskhadov, in 2005, and then Khalim Saydullayev, in 2006.16, 18 Umarov formed the IK on

“Dozens killed in Domodedovo airport blast”. Law enforcement officers guard the entrance to Domodedovo airport as part of increased security measures following the deadly blast.

Photo by: Andrey Stenin

Domodedovo Airport, lobby and check-in desks. Photo by: A.Savin

Page 60: The Counter Terrorist Magazine - August/September 2014

60 The Counter Terrorist ~ August/September 2014

the global jihadist community. The tentativeness of his messages reflected a form of adaptive control in which he adjusted his messages in response to the political environment and mainstream media. Umarov rationalized his thought processes and actions while implying a sense of insight into future events from a narcissistic point-of-view. He was hypersensitive to managing social perception, and likely considered it imperative to his survival and role as regional unifier.

Umarov likely anticipated that at some point, perception and reality would converge, materializing into an acceptable variation of his political objectives, but his death leaves this convergence to his successor. Legitimization of his role and the ongoing validation of the IK were extremely important to him, particularly the perception within the IK ranks, as this was his only means of protecting the organization from fragmentation. While he was self-focused, he also demonstrated an emotional attachment to the IK and its ideology as an altruistic participant. The religious context of his messages in effect, served as a recruitment tool for attracting disillusioned Muslim youths and the sustainment of his organization

October 31, 2007, citing liberation, and that he was following Allah’s path.6 He divided the Caucasus into six fronts, some further subdivided into sectors, each headed by its own Emir who reported directly to Umarov personally. Although he had declared himself as the supreme Emir in 2007, most Chechens rejected this proclamation.19

UMAROV’S LEADERSHIP STYLE

Based upon a detailed analysis of Umarov’s video messages,20 he can be described as an exploitative leader who used his followers as a means for creating, validating, and perpetuating his power in the Northern Caucasus and within

People mourning the victims and bringing flowers and candles at the scene of the terrorist attack in the Lubyanka metro station in Moscow. Photo by: Leonid Dzhepko

Overcrowded surface public transport lines on the day of the 2010 Moscow Metro bombings. Photo by: Anton Nossik

Aslan Maskhadov. Photo by: Natalia Medvedeva

Page 61: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 61

during times of crisis. Umarov viewed his efforts with

permanence and resoluteness, to the degree of denying real-world circumstances and obstacles. This behavior reflected the intent to drive group cohesion by emphasizing the IK’s successes and future objectives, which is a common practice by jihadist organizations. Communications were important as he frequently addressed

his followers, providing status of his efforts and the state of the IK as facts and strategic imperatives. His rhetoric followed a tentative format allowing the maximum number of outcomes to align with his insights and forecasts. Contrary to other news reports, his behaviors demonstrated a political savvy and sensitivity to the critical observations of his followers and opponents. It was this political savvy that enabled him to unite Chechen

Emergency meeting following explosions at Domodedovo Airport with head of Investigative Committee of the Russian Federation Alexander Bastrykin, Prosecutor General Yury Chaika and Transport Minister Igor Levitin (right). Photo by: The Presidential Press and Information Office

Page 62: The Counter Terrorist Magazine - August/September 2014

62 The Counter Terrorist ~ August/September 2014

the position of “Qadi,” chief theologian, judge and ideologist, monitoring organizational compliance with the Koran and Sunna.6 It is unclear if he will maintain that role in addition to Emir. He has already earned a position on Russia’s list of most wanted terrorists and will likely take on the priority for “kill or capture” once held by his predecessor.

The IK as an organization will likely go through a period of chaos while Mukhammad seeks to impose his authority and organize his command structure. As a Caucasian Avar, a non-

jihadists with other terrorist groups in the North Caucasus as well as extending his relationships beyond the Caucasus.

MUKHAMMAD AND THE IK’S FUTURE

Hidden away in the North Caucasus, Mukhammad declared his acceptance of the role of IK Emir via recorded video. Mukhammad was born in 1972 in the Sovyetsky District of Dagestan.21 He studied shariah law in Syria in the early 2000s under his nephew, Murtuzali Magomedov. Since 2010, he has held

A mountain outpost of the 33rd Mountain Rifle Brigade in Dagestan. Photo by: Sergey Pyatakov

Page 63: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 63Circle 183 on Reader Service Card

Protecting the Homeland Together ®

®

SSISSI

Fin

d ou

t mor

e at

: ww

w.h

omel

ands

ecur

ityss

i.com

TAKE YOUR TRAINING TO A HIGHER LEVEL...

SECURITY SOLUTIONS INTERNATIONAL

SSI ELEVATED TACTICS TRAININGEnhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

• Vehicle driving and operating techniques in a variety of situations• Global case studies of real-world operations using the specific equipment• Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults• Elevated obstacle negotiation and firing platforms• Emergency evacuations, climbing and descending options• Distraction and deception techniques• and much more...

Elevated Tactics Training provided in partnership with Patriot3.

Call now for more information. Phone: 866-573-3999

Fax: [email protected]

Circle 313 on Reader Service Card

Page 64: The Counter Terrorist Magazine - August/September 2014

64 The Counter Terrorist ~ August/September 2014

Sharia Judge, Ali Abu Muhammad, elected as new CE Emir by leaders of CE provinces, in Kavkaz Center. 2014, Kavkaz Center: Online.

2Winter, J., US, Russian forces hunt jihadist widow feared inside Olympic zone, in Fox News. 2014, Fox News: Online.

3News, F., Islamic group reports death of Chechen warlord who threatened Sochi Olympics, in Fox News. 2014, Fox News: Online.

4Kavkaz Center, Thousands prayed for martyr, Insha’Allah, Dokku Abu Usman in Turkey in Kavkaz Center. 2014, Kavkaz Center: Online.

5Baczynska, G., Russia confirms death of Islamist militant, its most wanted man, in Reuters. 2014, Reuters: Online.

6Roggio, W., House Homeland Security Subcommittee on Counterterrorism and Intelligence Hearing. 2014, Federal Information & News Dispatch, Inc: Online.

7Lister, T., Moscow attack renews spotlight on ‘Emir of the Caucasus’, in CNN. 2011, CNN: Online.

8RT, Two blasts in Moscow Metro, dozens killed, in RT. 2010, RT: Online.

9Kavkaz Center, Circassians got no reply from the IOC. Perhaps, Dokku Umarov and his friends answer them in Kavkaz Center. 2013, Kavkaz Center: Online.

10de Carbonnel, A. and S. Gutterman, Russia says foils plot to attack chemical arms facility, in Reuters. 2013.

11SITE Monitoring Service. Chechen ISIL Commander Gives Eulogy for Former IEC Leader Doku Umarov. 2014 [cited 2014 May 27]; Available from: https://news.siteintelgroup.com/Jihadist-News/chechen-isil-commander-gives-eulogy-for-former-iec-leader-doku-umarov.html.

12SITE Monitoring Service. TIP Leader Expresses Solidarity with Chechen Fighters Over Umarov Death. 2014 [cited 2014 May 27]; Available from: https://news.siteintelgroup.com/Jihadist-News/tip-

Chechen, it is not clear yet if he will be capable of holding the organization together.22 Mukhammad’s video releases demonstrate an increase in the radical nature of the IK, indicating that he will rule with an iron fist under an extremist’s interpretation of Islam. Umarov’s efforts to unite the Northern Caucasus and legitimize the IK will likely dissipate into disorganization. Sub-factions may form and break away from IK-proper, as has happened to many other violent organizations during periods of major transition.

It is equally possible that the IK will reject Mukhammad’s heavy-handed rule by shariah law. In a video release, he stated “If you consider yourselves Muslims, then impose shariah law, and we shall stop waging war against you.”21 Included in this message was a warning that his men will target those who engage in promoting depravity and vice, such as owners of liquor stores, saunas, and bordellos. He expects strict adherence to the Koran and Sunna.

Mukhammad’s ideological position aligns with the extremist values of the broader jihadist movement, but it fails to demonstrate the larger view and goals of regional unification and establishment of an Islamic state that his predecessor held. He has several pending actions awaiting his attention. Organizations such as the Syrian Al-Nusrah Front for the People of the Levant, the Islamic State of Iraq and the Sham (ISIS), and the Ukrainian Right Sector expect support in the form of people, weapons and funding.23

The global jihadist community awaits Mukhammad’s first actions as the IK Emir, particularly al-Qaeda. While it would be a logical first action to build upon the relationship with the mujahidin in Syria because it presents

an opportunity to gain access to Assad’s chemical weapons cache, he ordered his fighters to remain in the Caucasus.24 It remains to be seen whether he will inspire and order violent actions or drive away the more liberal Chechen prospects. His rigidity and obsession with shariah law, as noted in his blanket statement of waging war against noncompliant Muslims, may become his Achilles’ heel in sustaining an active and cohesive organization.

Under Mukhammad’s self-admission, he lacks the combat training and hands-on experience that enabled Umarov to evade capture by Russian forces for so many years.25 Although Umarov’s political and strategic competencies are considered far worse than his predecessors, Mukhammad seems to be a step further away from increasing the tactical competency of the IK or garnering international sympathy. With the death of Umarov and the inexperience of Mukhammad, the FSB has the clear strategic advantage, equipment, and force strength to quickly dismantle the IK threat, beginning with a kill or capture order for Mukhammad. •

ABOUT THE AUTHOR Mr. Toney holds a doctorate in business

administration with specialization in organizational behavior from the University of Phoenix. He has worked with the U.S. Department of Defense for more than 25 years, teaches graduate courses at Ashford University, and has published three books on terrorism: Terrorist Organizational Behavior, Organizational Behavior Profile: AQIM, and Terrorist Leader Profiles and Comparative Behavioral Analysis.

FOOTNOTES1Kavkaz Center, Caucasus Emirate’s

Page 65: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 65Circle 279 on Reader Service Card

Page 66: The Counter Terrorist Magazine - August/September 2014

66 The Counter Terrorist ~ August/September 2014 Circle 277 on Reader Service Card

YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

Scan our QR code with your smart phone to view our online catalog.

Special OperationsHarness

available in black, coyote or multicam*

with plastic with metal cobra buckles buckles

$149.95 $199.95*with attachments for MOLLE pouches

and K-9 camera

E-Collar Holsters$39.95

Has cutouts so the buttons can still be worked while it’s holstered. Has 2¼" metal clip on back of holster so it can be worn on a 2" duty belt or clipped to a MOLLE tactical vest.

Reward Balls with Tug Handles

3" Ball

$12.95 2.5" Ball

$11.95 2" Ball

$9.95

Bite SuitHelmet$74.95

Bite Suit$1,189.95

HandProtectors

$39.95 ea

Muzzles$69.95

German ShepherdMalinois

[ [Follow us on

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

leader-expresses-solidarity-with-chechen-fighters-over-umarov-death.html.

13SITE Monitoring Service. Shabaab Leader Links France, Missionaries to Car Attacks. 2014 [cited 2014 May 27]; Available from: https://news.siteintelgroup.com/Western-Jihadist-Forum-Digest/shabaab-leader-links-france-missionaries-to-car-attacks.html.

14Opperman, J., Latest Report of Umarov’s Death Leaves Details Unclear, in Radio Free Europe. 2014, Radio Free Europe: Online.

15Kavkaz Center, Combats in Western Ichkeria in Kavkaz Center. 2003, Kavkaz Center: Online.

16Kavkaz Center, Caucasus Emirate’s Emir Dokku Abu Usman martyred, Insha’Allah. Obituary in Kavkaz Center. 2014, Kavkaz Center: Online.

17Schaefer, R.W., The Insurgency in Chechnya and the North Caucasus: From

Gazavat to Jihad. 1 ed. 2011: Praeger Security International.

18Anthony, L. and W. Helen, Russia’s bin Laden dead, rebels admit, in The Times (London, England). 2014, News International Trading Limited: London (UK). p. 26.

19Kavkaz Center, Caucasus Emirate, in Kavkaz Center. 2007, Kavkaz Center: Online.

20Toney, M., Terrorist Leader Profiles and Comparative Behavioral Analysis: Abdullaah Yusuf Azzam, Abdelmalek Droukdel, Osama bin Laden, Dokku Umarov Abu Uthman and Ayman al-Zawahiri. 2013: CreateSpace Independent Publishing.

21TRAC. Ali Abu-Muhammad (aka Aliashab Alibulatovich Kebekov). 2014 [cited 2014 May 27]; Available from: http://www.trackingterrorism.org/group/ali-abu-muhammad-aka-aliashab-

alibulatovich-kebekov-individual-profile.22TRAC. Caucasus Emirate chooses

a new leader. 2014 [cited 2014 May 27]; Available from: http://www.trackingterrorism.org/what-to-watch/caucasus-emirate-new-leader-old-choice-and-uncertain-future.

23Kavkaz Center, Ukrainian Right Sector declares mobilization and appeals to Caucasus Emirate’s Emir Dokku Abu Usman, in Kavkaz Center. 2014, Kavkaz Center: Online.

24Paraszczuk, J. New Caucasus Emirate Emir Kebekov: Jihad In North Caucasus Priority Over Syria. 2014 [cited 2014 May 27]; Available from: http://www.chechensinsyria.com/?p=21203.

25Radio Free Europe, Avar Theologian Named To Succeed Umarov As Insurgency Leader, in Radio Free Europe,. 2014, Radio Free Europe,: Online.

Page 67: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 67Circle 335 on Reader Service Card

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

Circle 335 on Reader Service Card

Page 68: The Counter Terrorist Magazine - August/September 2014

68 The Counter Terrorist ~ August/September 2014

SSI PVBThe Portable Vehicle Barrier transfers the momentum of a moving vehicle upwards

and stops it in its tracks. Two adults can deploy the barrier in minutes without any need for electricity. It can be equipped with wheels to act as a swing barrier. You can add anchoring cables and place the PVBs in a single row or more. The PVB can be folded quickly for moving and storage; it is reusable and durable.

www.ssipvb.com

INTERNATIONAL RESOURCES RING POWER

When Law Enforcement officers are called to any emergency situation – they have to be prepared for the worst case scenario. Whether dealing with a hostage rescue, barricaded suspects, riot scene, or natural disaster, having the tactical advantage is critical. The Rook was custom designed with mission specific attachments that increase job safety, while also improving the ease and speed of changing attachments.

The Armored Deployment Platform(APD) allows officers to approach structures with reduced exposure. A team can be placed anywhere and have a secure position from which to make better tactical decisions. Officers can also gain entry to the second story of a house or building without a ladder, allowing them to search the house from the top down without using stairways to work their way up. The ADP can also be used to deploy snipers to a rooftop. The Rook integrated video system gives visibility into areas that small robotic video cameras cannot.

www.ringpower.com

EXOSKEL Exoskel™ is designed for times when proper climbing technique is out, replaced by the need

for speed and low profile scrambling. Exoskel™ assists the user to rapidly ascend and negotiate obstacles, while offering enhanced stabilization and lower limb protection. After constantly failing to negotiate obstacles when rushed and weighed down, and after multiple cuts and damaged lower limbs, Exoskel™ was developed.

Armed with teeth to lock on to any terrain, it lifts the user, via the stirrup system, up, over, and on…

• Assists the operator rapidly ascend and negotiate obstacles• Stabilizes the firing or anchor position on irregular terrain• Shin protection• Close Quarter Battle tool• Perpetrator restraint• Injury Prevention• Berry CompliantThe Exoskel™ guards hold in excess of 1000 lbs (450kg), on the teeth, buckle and stirrup, and

each weight only 1.1 lbs (500g). They are Berry Compliant, and are made from high specification specialty engineering grade Polyamide which is: high impact, puncture, UV, hydrolysis, and flame resistant - UL94 VO rated.

“If Exoskel-Group Inc can assist one operator get over one obstacle one second faster, it will have achieved its aim”.

www.exoskel-group.com

®

SSISSI68 The Counter Terrorist ~ August/September 2014

Page 69: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 69

LMT DMR STOCK This buttstock offers the user customization that the designated marksman requires by including features already known on the LMT SOPMOD. The DMR buttstock fits Mil-Spec carbine extension tube rifles in both the 5.56 and .308 platforms. It includes 0.725" adjustable SOPMOD style cheek rest height, 1.25" adjustable length of pull with SOPMOD buttpad for reduced felt recoil and a concealed Mil-Std 1913 STANAG 4694 compliant rail for mono-pod attachment. The DMR stock was designed to be able to replace current adjustable stocks in less than twenty seconds without using special tools. www.lmtstore.com

STRATEGIC RIFLEMAN Former Chairman of the Joint Chiefs Michael Mullen acknowledged that debt was America’s greatest vulnerability. In the near future, the U.S. government will have to drastically reduce spending or face creditors unwilling to continue lending. America’s defense apparatus is going to have to shift to a more cost effective model. John Poole advocates a lighter, more agile, initiative driven force that is capable of handling the adversaries our current force has had such challenges with. Read Strategic Rifleman and see how austerity could actually be used to improve the U.S. military’s capabilities. www.posteritypress.org

BROCO JIMMY Broco introduced the Jimmy as the first purpose-built, low cost tactical pry bar at the request of federal law enforcement agent clients. Key features requested were: high strength, light weight, a compact size for carrying yet large enough to leverage the operator’s strength. The Jimmy has a 5:1 mechanical advantage with its fulcrum point 1.75" from the 25° angled tip and a shaft length of 9". The handle features a foam core with cord over-wrap for grip and comfort. The Jimmy fits under MOLLE. It is made in the U.S.A. and sells for under $30.00.www.broco-rankin.com

Innovative Products

Page 70: The Counter Terrorist Magazine - August/September 2014

70 The Counter Terrorist ~ August/September 2014

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Counter TheAUGUST/SEPTEMBER 2014

VOLUME 7 • NUMBER 4

ADVE

RTIS

ER IN

DEX

Page Ad/Company • website and/or email ......................................................................................................... RSN Number

55757142492

15147

6676372440544265

43

7339434567261136632541272119

177116215131211121271198110277280288328511315527913259329213301309335303178343313228226101317197

9th Annual Homeland Security Professionals Conference & Expo • www.terrorconference.com ...........Adamson Police Products • policeproducts.com ...........................................................................................Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com .....................................ALLRed - Armadillo Tactical Gear • ArmadilloTacticalGear.com ...................................................................American Public University • www.AMUonline.com/Counter-Terrorist ...........................................................Barrett Firearms Manufacturing • www.barrett.net .....................................................................................BioStat LLC • www.biostatllc.com .....................................................................................................................Broco • [email protected] .............................................................................................................................Designsteins • www.blackrainordnance.com ....................................................................................................Elite K9 • www.EliteK9.com ..............................................................................................................................Exoskel • www.exoskel-group.com....................................................................................................................Gander Mountain LE Sales • [email protected] .................................................................................Golden Engineering • www.goldenengineering.com .......................................................................................Golight Inc • www.golight.com ........................................................................................................................IDGA Homeland Security Week • www.HomelandSecurityExpo.com ............................................................J & N Tactical • www.JNTactical.com ..............................................................................................................K9 Cop Magazine • www.k9copmagazine.com ..............................................................................................Lenco Industries Inc. • www.lencoarmor.com .................................................................................................Lewis Machine & Tool • www.lmtdefense.com ...............................................................................................NTOA Tactical Operations Conference & Trade Show • www.ntoa.org ...................................................Occupational Health Dynamics • www.ohdusa.com ....................................................................................Patriot3 • www.patriot3.com ...........................................................................................................................Phantom Products Inc. • www.phantomscout.com .........................................................................................PoliceOne Academy • www.PoliceOneAcademy.com......................................................................................Reconyx • www.reconyx.com ..........................................................................................................................Ring Power • Ringpower.com/tacticalsolutions .................................................................................................Southern Police Equipment • www.southernpoliceequipment.com ..................................................................SSI Elevated Tactics • www.homelandsecurityssi.com ......................................................................................SSI MACTAC • www.homelandsecurityssi.com ...................................................................................................SSI PVBs • www.SSIPVB.com ...........................................................................................................................Tactical Products Group Inc. • www.taccprogearblack.com ...........................................................................Urban Shield 2014 • UrbanShield.org ..........................................................................................................Waldorf College • Waldorf.edu/CT ...............................................................................................................

To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page 71: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 71Circle 50 on Reader Service Card

Circle 215 on Reader Service Card

LEARN MORE at: www.homelandsecurityssi.comCall now for more information.

Phone: 866-573-3999Fax: 866-573-2090

[email protected]

The experts on training in:

IsraelThe Advanced Global Security Workshop in

the Homeland Security professionals best resource

Since 2005, SSI has taken nearly 500 First Responders

to Israel and shown them the basics of the Israel

security concept.Thanks in part to that

program, we are better able to defend ourselves in the United States. In response

to demand, we are now offering a once-in-a-lifetime

experience covering the following advanced subjects:

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel’s northern border.

Hostage Rescue - Discover how they go wrong.

Hospital Response - Find out how Israel’s critical response hospitals handle surge and multi-casualty incidents.

Israel Counter Terrorism units - Learn how they operate.

Israel National Police - National Academy; See how they train?

Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system.

Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

Nov. 7-15,

2014Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

Circle 215 on Reader Service Card

®

Page 72: The Counter Terrorist Magazine - August/September 2014

72 The Counter Terrorist ~ August/September 2014

TRAINING REVIEW

Vehicle Engagement Tactics

W

By Max Joseph

e all spend a great amount of time in and

around our vehicles. Considering this, it stands to reason that our chances of becoming involved in a lethal force encounter in a vehicle is high. In recognition of this fact, I created a three-day Vehicle Engagements Tactics course for personnel who may be required to employ their firearms from, in, and around their vehicles. Here are some of the topics we cover:

COUNTER AMBUSH PROCEDURES

Being caught in an ambush while in our

vehicles is a real possibility. Our highest chances of being hit may occur while we are arriving or departing from venues. There are four basic options presented to us if we are caught in a vehicle ambush.

DRIVE THROUGH The safest way to survive a shootout is

to not be there when it happens. This is where the drive through option comes into play. For example, we may be taking sporadic hits from a hasty or far ambush. The sooner we can get out of the kill zone, the safer we will be. We refer to this as “duck your head / punch your gas / and pucker your ass.” Our vehicles will

drive over or through many obstacles that seem impassible to those who are not trained in vehicle dynamics.

The driver should focus on nothing but driving. This man is critical to our survival. He has one job: “Drive the car!” Everyone else has one job also: “Protect the driver!” Only after a vehicle is completely incapacitated does it make sense for the driver to become another shooter.

RAM THROUGHWe should always use the most

effective weapons at our disposal. Your vehicle is often your best weapon. Why reach for a four-pound weapon when

Page 73: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 73Circle 329 on Reader Service Card

Page 74: The Counter Terrorist Magazine - August/September 2014

74 The Counter Terrorist ~ August/September 2014

you have a 4,000-pound one available? If the enemy deploys a barricade or vehicle blockade to stop your forward movement, the best option may be to ram through the obstacle. Care should be taken in controlling the speed used when making contact with the barricade. The maxim that has been taught for quite a while is to slow down as if you are going to stop. This will momentarily lull the enemy into thinking that you are in fact complying with their orders. When about 25 yards out, accelerate and prepare for contact. Too high a rate of speed on your part may cause disabling damage to your own vehicle. We are normally looking for contact between our front end and their rear axle to have the best leverage for pushing that barricade out of our path.

REVERSE OUTIf the enemy has conducted

surveillance on us and knows that our

SOPs would be to ram through any obstacles they present, they may choose to beef up their barricade. An armored car or cement truck will pose a more formidable obstacle and will negate the ramming option. In this case, either a straight reverse out or a J turn would be the next option. When involved in motorcade operations, coordinating this procedure with multiple vehicles in training is crucial.

DEBUSSThe option to dismount is a critical

decision, and it is generally best to drive through when possible. The debuss is performed in only two occasions. First, if the vehicle is fatally disabled and it becomes a bullet trap. Dynamically deploying from the vehicle using coordinated fire and movement may allow the passengers to move to a more advantageous position.

A second reason that the team may deploy from the vehicle is that it may be their mission to serve as a counter assault team for a motorcade. While the principal’s vehicle is departing the kill zone, the CAT will be delivering accurate fire into the threat to mitigate their desire and ability to continue the attack.

Always seek cover. Understand what parts of your vehicle will and will not stop rounds. Always be aware of your muzzle control. While we are scrambling across seats and providing covering fire for our teammates who are deploying from the vehicle, we must be cognizant that our muzzles never flags our teammates or any part of our bodies. Keep your finger straight except when actually firing. In debuss drills, we may be firing through the windshield one second then the next second be opening our doors to deploy. During this mental transition between firing and then moving, our fingers must come out of the trigger guards and our weapons must be either decocked or put back on safe. Always remember that a well-executed ambush is fast and violent with a maximum amount of firepower brought to bear on the kill zone. As in any ambush, the faster those in the kill zone can drive through and get rounds on target, the better chance they will have of surviving the ambush. •

www.tftt.com

ABOUT THE AUTHORMr. Joseph is the founder and training

director of both TFTT)and the Direct Action Group. He is a former Recon Marine and has trained and worked with personnel from Asia, Africa, Eastern Europe, the Middle East and South America and has worked protective details in Central America, South America, Eastern Europe, and Afghanistan.

Page 75: The Counter Terrorist Magazine - August/September 2014

The Counter Terrorist ~ August/September 2014 75Circle 116 on Reader Service Card

Page 76: The Counter Terrorist Magazine - August/September 2014

Circle 280 on Reader Service Card