the counter terrorist magazine - december/january 2010

72
The Counter Terrorist ~ December 2009/January 2010 1 e An SSI ® Publication www.thecounterterroristmag.com Counter CAR BOMBS HEZBOLLAH GSG 9 CAPTURE CT FOR SWAT U.S. PRISON Recruitment for Jihad Official Journal of the Homeland Security Professional DEC 2009/JAN 2010 DECEMBER 2009/JANUARY 2010 USA/CANADA $5.99 Volume 2 • Number 6

Upload: solomon

Post on 02-Apr-2016

218 views

Category:

Documents


2 download

DESCRIPTION

Journal for Law Enforcement, Intelligence & Special Operations Professionals

TRANSCRIPT

Page 1: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 1

The

An SSI® Publicationwww.thecounterterroristmag.com

Counter car bombs • hezbollah • GsG 9 capture • ct for swat

u.s. prisonRecruitment for Jihad

Official Journal of the Homeland Security Professional

Dec 2009/Jan 2010

December 2009/January 2010usa/canaDa $5.99

Volume 2 • Number 6

Page 2: The Counter Terrorist Magazine - December/January 2010

2 The Counter Terrorist ~ December 2009/January 2010

• Complements FirstDefender to maximize in-the-fi eld coverage of unidentifi ed chemicals including TICs/TIMs, chemical weapons, explosives and more

• Ground-breaking design—fi ts in your hand, lightweight, yet rugged enough for fi eld use

• Fast and easy to use—delivers accurate results in less than a minute, even for complex mixtures

Made in the USA

TruDefender FTWhen every second counts, reliable results are at your fi ngertips.

To register for an upcoming seminar: +1.978.642.1132 or www.ahurascientifi c.com/ct

TruDefender | FTFTIR

FirstDefenderRaman

From the makers of FirstDefender, the revolutionary TruDefender FT handheld FTIR system enablesidentifi cation of an even broader range of unknown chemicals—right in the hotzone.

Circle 175 on Reader Service Card

Page 3: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 3Circle 99 on Reader Service Card

Page 4: The Counter Terrorist Magazine - December/January 2010

4 The Counter Terrorist ~ December 2009/January 2010

Homeland DefenderTM

by

The world’s first certified breathable* CBRN ensembles.

- NFPA 1994 (2007 edition) Certified- GORE® CHEMPAK® fabrics- Form-fitting designs for superior mobility- Durable fabrics and construction for safer CBRN operations- Breathable for extended duration response*- Reusable - multiple wash/dry cycles**

www.blauerhomelanddefender.com*WZ9430 and WZ9435 only

**HZ9420 and WZ9430 only ISO 9001:2000 Certified

WZ9435 XRT Ensemble

WZ9430 MIRT Ensemble HZ9420 Multi-

Threat Ensemble

HD_ad_7.25 x 10.indd 1 10/5/2009 12:47:27 PMCircle 91 on Reader Service Card

Page 5: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 5

Official Journal of the Homeland Security Professional

Counter TheDecember 2009/January 2010

Volume 2 • Number 6

46

co

nte

nts

54

coVer story: 30 us prison recruitment for JihaD by Dr. M. Zuhdi Jasser and Raphael Shore

FeAtures:

8 Firsthand: GsG 9 terrorist apprehension by Dieter Munzinger

20 Case Study: britain’s June, 2007 car bombs by Andy Oppenheimer

46 hezbollah: the party of GoD, 2009 by Jennifer L. Hesterman

54 solo rapiD response to active shooters A Necessity For Deployment by Michael Stepien

DepArtments:6 from the editor28 book review65 innovative products66 training review

Cover Photo: Scott Morrison

30

8

Page 6: The Counter Terrorist Magazine - December/January 2010

6 The Counter Terrorist ~ December 2009/January 2010

ne might have expected either of the two most recent presidential administrations or the United States Central Command to have

articulated clear, unchanging objectives in Iraq that would constitute victory. Victory in Iraq, however, was ill-defined.

For the sake of discussion and with the benefit of hindsight, let us consider the removal from power of Saddam Hussein and the interdiction of alleged Iraqi weapons of mass destruction to have been the initial primary goals of Operation Iraqi Freedom. These goals were accomplished within weeks of undertaking them.

Also for the sake of discussion, let us agree that additional goals created while coalition forces were committed to Iraq were to defeat or co-opt the many emergent militant opposition forces so that coalition elements could assist the Iraqis in establishing an elected representative government. Despite years of vacillating orders and inconsistent diplomatic effort, American and British soldiers, Marines, mercenaries, and others have delivered that to the people of Iraq as well.

These veterans battled Ba’athist insurgents, al-Qaeda terrorists, Iranian agents and, numerous other factions. The unwavering efforts of these magnificent few have provided the gift of this opportunity to the Iraqi people.

The American citizen has generously accepted many hundreds of billions of dollars of debt to provide this gift.

For better or worse, two presidential administrations took the decisions that accomplished this. President George W. Bush initiated this operation and President Barack Obama saw Mr. Bush’s campaign through to the fruition that provided this incredible (though unrequested) gift.

Will this achievement bring benefit to the coalition partners commensurate with the cost of effort? Only time will tell. But, the Iraqi people have been given the gift of self-determination. It is in their hands to determine if that nation is capable of producing her own George Washingtons or if she shall succumb to corruption, tribalism, shari’a law, and subversive neighbors.

Semper Fidelis,

Chris GrahamEditor of The Counter Terrorist

o

From the editor:

Thanks, Vetsby chris Graham Official Journal of the Homeland Security Professional

Counter The

Volume 2 • Number 6 december 2009/jaNuary 2010

EditorChris GrahamDirector of OperationsSol BradmanDirector of AdvertizingCarmen ArnaesDirector of ProductionKelli richardsonContributing EditorsJohn AndrewsJennifer Hestermanrichard marquiseChuck PfarrerGraphic DesignMorrison Creative CompanyCopy EditorLaura TownOffice ManagerLily ValdesPublisher:Security Solutions International13155 SW 134th St. • STe 204miami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, The Official Journal of the Homeland Security Professional, is published by Security Solutions International LLC, as a service to the nation’s First responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.For article reprints, e-prints, posters and plaques please contact:ParS International corp.Web: www.magreprints.com/quickquote.asp Email: [email protected]: 212-221-9595 • Fax: 212-221-9195Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com© 2009 Security Solutions International

Page 7: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 7Circle 337 on Reader Service Card

• LatestU.S.militarytechnology• Increasedmaskcomfort,reducedwearerburden• Superiorvisionfrompolyurethanevisorandoutserts• Upgradedcommunicationsandimprovedweaponintegration• Multipleaccessorieswithoperatorreplaceablerepairparts

NO OTHER LAW ENFORCEMENT GAS MASK HAS THIS MUCH MILITARY PEDIGREE.

GR00191-02

Page 8: The Counter Terrorist Magazine - December/January 2010

8 The Counter Terrorist ~ December 2009/January 2010

GsG 9 terrorist Apprehension

Firsthand:

Counter The

by Dieter munzinger

On November 16, 1982, Christian Klar was the most wanted terrorist in Germany. He was listed as a second generation leader of the Red Army Faction (RAF) and, according to Germany’s Federal Criminal Police Office (BKA), he was responsible for more than 20 terrorist attacks resulting in nine deaths and many injuries.

Page 9: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 9

on may 11, 1972, the raF executed a bomb attack against U.S. Army personnel in Frankfurt, killing Lt Col. Paul bloomquist and injuring 13 additional U.S. soldiers. This incident was followed by bomb attacks on German police stations in Augsburg and München the following day, injuring 17 people.

on may 19, 1972, the raF carried out another bomb attack on the Axel Springer publishing house in Hamburg, injuring 17 people. Senior u.S. army personnel in Heidelberg were targeted with a bomb on may 24. u.S. soldiers clyde bonner, charles Peck, and ronald Woodward were killed; five others were wounded.

Andreas Baader was arrested with other raF members on june 1, 1972. The second generation of raF terrorism emerged in 1974 with the rise of christian Klar. under his leadership, raF terrorists killed chief federal prosecutor Siegfried Buback and his drivers Wolfgang Göbel and Georg Wurster on april 7, 1977.

on july 30, 1977, Klar and brigitte mohnhaupt (an raF member) killed Jürgen Ponto, chairman of Dresdner bank, in his home. on September 5, 1977, Klar and other raF members abducted Federal Employer Association President Hanns Martin Schleyer and shot his close protection team and his

W e were briefed that Klar, a former history and philosophy student, was very intelligent and

extremely brutal.The raF history is divided into

three generations of terrorists. The first generation (leaders: Andreas Baader, ulrike meinhoff, jan-Karl raspe, and others) primarily wanted to cause the destruction of the German “governmental machinery.” The second and third generations crimes additionally attempted to recover imprisoned raF terrorists. The organization carried out assassinations and abductions of important representatives from the financial and political fields.

may 14, 1970, can be considered the birthday of the raF. on that day, andreas baader, the first raF leader, escaped from a prison in Berlin with the help of two terrorists. They shot and seriously injured two judicial officers during a firefight.

After finishing their training in Jordan (in al-Fatah camps), the raF members finalized their “urban guerrilla” plan. They returned to Germany, robbed seven banks within 12 months (stealing approximately one million DM), and raided several weapon shops to prepare for action.

Page 10: The Counter Terrorist Magazine - December/January 2010

10 The Counter Terrorist ~ December 2009/January 2010

driver (reinhold brändle, Helmut ulmer, roland Pieler, and Heinz marcisz).

The raF terrorists fired more than 200 rounds at Schleyer’s motorcade. The police officer brändle was hit by more than 60 bullets. German media named the Schleyer abduction the beginning of “German Fall 77.”

on october 13, 1977, four Popular Front for the Liberation of Palestine (PFLP) terrorists hijacked the Lufthansa aircraft boeing 737, named “landshut,” to support the Schleyer kidnappers. They demanded the release of all imprisoned raF terrorists. The German government was determined not to concede. On the night of october 18, at 00.05, German special operations police (GSG 9) stormed the Landshut in Mogadishu, killing three terrorists and capturing one, and rescuing 86 hostages.

On the same night, in Stuttgart-Stammheim Prison, baader, raspe, and Ensslin committed suicide. One day later police found the body of Hanns Martin Schleyer in the trunk of an audi 100. He was killed by a gunshot to the neck.

After multiple bank robberies netting approximately 900 000 dm, and

GSG 9 Fragmentary Order. Photo courtesy of the author.

Again and again they received

clear clues to his whereabouts, but

he was always already gone

when they arrived.

multiple firefights leaving three dead, Klar and his raF team attacked senior u.S. air Force personnel in ramstein. This bomb attack injured 14 on august 31, 1981. on September 15 raF shot U.S. Army General Frederick Kroesen’s limousine with a rocket-propelled grenade, injuring four people.

The raF third generation continued its “resistence against imperialism,” but Klar went into hiding. BKA invetigators were on Klar’s heels. Again and again they received clear clues to his whereabouts, but he was always already gone when they arrived.

In 1982 the raF terrorist Verena Becker was moved from jail in Cologne to jail in Kassel, apparently because of bronchial disease. (Becker was arrested on may 3, 1977, four weeks after buback was killed by raF. She carried the pistol used in his murder). In reality, she indicated willingness to cooperate and was debriefed by BKA investigators for two weeks.

Becker delivered “firsthand information” about 13 different raF arms caches and their exact locations. Furthermore, she believed that Klar was

Page 11: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 11

StormPac Ad#1:StormPac Ad#1 7/21/09 5:12 PM Page 1

Circle 167 on Reader Service Card

Page 12: The Counter Terrorist Magazine - December/January 2010

12 The Counter Terrorist ~ December 2009/January 2010

To learn more about GIS technology for homeland security,

visit www.esri.com/publicsafety.GIS for Community Safety

Critical Infrastructure Protection

Surveillance and Detection

Common Operating Picture

Intelligence Analysis

Vulnerability Assessment

Response and Recovery

Incident Management

Security

Tracking

Data Fusion

Mitigation

Situational Awareness

Copyright © 2008 ESRI. All rights reserved. The ESRI globe logo, ESRI, ESRI—The GIS Company, The Geographic Advantage, ArcGIS, www.esri.com, and @esri.com are trademarks, registered trademarks, or service marks of ESRI in the United States, the European Community, or certain other jurisdictions. Other companies and products mentioned herein may be trademarks or registered trademarks of their respective trademark owners.

GIS—Providing The Geographic Advantage™

for Homeland Security

ESRI—� e GIS Com pa ny™

[email protected]/publicsafety

Managing Homeland Security with GIS

Government agencies and private organizations of all sizes confront the possibility of a natural disaster or man-made attack on our homeland. Because all terrorist events, threats, emergencies, or natural disasters can be tied to a location, geographic information about airports, harbors, road networks, stadiums, and other important places is crucial for homeland security. Having the most accurate, up-to-date information maintained in a mission-critical common operating picture is paramount to efforts to protect life, property, and infrastructure.

Geographic information system (GIS) technology provides a complete platform to help collect, analyze, visualize, and share information. Improved situational awareness, collaboration and data sharing, interoperability, preparedness, prevention and response, and a common operating picture are just a few of the ways GIS can help better protect citizens, communities, and assets.

Discover how GIS software can play a pivotal role in solving your homeland security needs. Discover ESRI® ArcGIS®.

Tracking aircraft and identifying those that present a potential risk to critcal assets through a GIS-based common operating picture.

GIS is used to determine the vulnerability of an airport to surface-to-air missiles.

G36665_TheCntrTerrorist_AugSep09.indd 1 5/28/09 1:52:47 PM

Circle 135 on Reader Service Card

Page 13: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 13

August Mission: August 21-29, 2009November Mission: November 6-14, 2009

the user of the arms cache “Daphne” (each cache had a name), which was located in Aumühle near Hamburg in the “Sachsenforest.” She drew a precise sketch and explained the marking (notches at four Spruces) of Daphne as well as descriptions of the two forest trails used to get to the cache. The public was later told that hikers stumbled upon the cache.

A special commission (under BKA leadership) was convened. It was decided to carry out the mission as a joint operation of bKa, GSG 9, and state police special operations (SEK-Eutin Schleswig-Holstein).

To avoid too much traffic in the area of operation (a/o), a six-member reconnaissance team (two BKA, four GSG 9) was sent to aumühle to recon Daphne. The team found the cache at the exact described spot, about 90 meters (m) off the path in a dense forest in the underbrush between four marked Spruces. Concealed by the trees, the

team opened the arms cache carefully. It was “hot.” The team emptied Daphne of 15 firearms and several forged Id cards and informed bKa. reinforcements were dispatched.

Aumühle is a small community of about 2000 citizens 20 kilometers east of Hamburg. The a/o was located east of Aumühle in a recreation area named Friedrichsruh, which included a few guest-houses and the remains of the former castle of Otto von Bismarck, whose descendants still lived there.

The a/o was about 6000 square meters, primarly “Sachsenforest” and Aumühle in the west, bordered by Europestreet 26 (North), majorroad 404 (east), and countryroad 208 (West,South).

Within one day, more than 120 operatives infiltrated the small-sized area and 200 stand-by forces were held ready in Hamburg. The a/o was subdivided into three different-sized circles with one common center: Daphne.

The first circle, (the assault team) was

GSG 9 Training. Photo courtesy of the author.

Within one day, more than 120 operatives infiltrated the small-sized area and 200 stand-by forces were held ready in hamburg.

Page 14: The Counter Terrorist Magazine - December/January 2010

14 The Counter Terrorist ~ December 2009/January 2010

Circle 143 on Reader Service Card

formed by six Special-Forces (SF) members (three teams of two). Team memberes dug themselves in three hides close to daphne (distance 5 m) in an L-shape. Their only function was “Tango’s” (Klar’s call sign) apprehension.

each hide (length 200 centimeters [cm], width 150 cm, depth 120 cm) was manned with two operators plus equipment, including pistols, revolvers, mP 5s, flashlights, night-vision devices, water, mres, and etcetera. The earthwork took more than six hours (disposal was done delicately with plastic bags). The hides were covered with hatches and thoroughly camouflaged. To cover tracks, team members created simulated game trails.

The team remained in the holes for 72 hours, then it was replaced by a new team. The replaced team always renewed the game-trails before leaving.

Needless to say, this was the trickiest

part of the mission. Movement was almost impossible. Team members left their hides only for a short time during the night. Defecation was collected in plastic bags and disposed of after three days. Members could not see what happened outside because the hatches had limited views covering Daphne. Daphne was equipped with a movement device. (When the device detected movement, it would send a radio signal to the assault team). The team depended upon the radio-reports of the second and third circles for situational awareness.

The second circle (on forest trails in radius 500 m around daphne) consisted of observers disguised as hikers or joggers (normal in Sachsenforest). This team reported every suspicious movement by radio. In addition, BKA technicians installed several hooded cameras which, due to the chillness (4°c) and the almost persistent drizzle, rarely performed.

the team remained in the holes for 72 hours, then it was

replaced by a new team. the replaced

team always renewed the game-

trails before leaving.

Page 15: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 15

Tactical dominance. Now available in small.

360º Video + Audio

Touchscreen Control

Point ‘n Go™ Navigation

24 hr. Standby

Throwable Durability

One man transport & operation

Video Motion Detection

Call today for more information

www.remotec.northropgrumman.com

ODF EYE DRIVEThe Remotec/ODF Eye Drive is a small, lightweight, and throwable tactical vehicle that allows you to observe spaces before entering, and record video with motion detection. The Eye Drive system also incorporates a unique, portable touchscreen OCU, and the ability to deliver payloads up to 8 lbs. With audio and complete 360º video, you’ll have the full picture without placing you or your team in harm’s way. Contact Remotec today for more information.

©200

9 No

rthr

op G

rum

man

Cor

pora

tion

Circle 73 on Reader Service Card

Page 16: The Counter Terrorist Magazine - December/January 2010

16 The Counter Terrorist ~ December 2009/January 2010

prtech-thermalimaging.com • 800-722-8078 • email: [email protected] • 800-722-8078 • email: [email protected]

Shown with optional laser pointer

SEE WHAT YOU’VE BEEN MISSING

• Highly versatile thermal imager

• Ideal for nighttime surveillance, search & rescue, and close quarters combat

• Detects human activity morethan a half mile away

• Handheld, tripod, weapon mount

• Image capture, digital zoom, switchable polarity

• Five reticle styles—selectable and adjustable

• Lightweight, rugged, submersible

5727

A DIVISION OF P&R TECHNOLOGIES, INC

Renegade-320

Circle 169 on Reader Service Card

The third circle included observers located at the edge of Sachsenforest (e.g., parkings of guesthouses or rented guest rooms), and mobile observers with cars or motorcycles on the streets around Sachsenforest and in Aumühle (e.g., railway station).

The locations of the observers from the second and third circles were “tactically designed” (like a Spider web), so that it was (mostly) not necessary to follow a suspicious person. It was possible to pass a sighting on (after description by radio) to the next observer position.

The operations center was situated in the main building of a former castle. While coordinating the complete operation, the center was permanently in contact with BKA.

radio traffic was reduced to a minimum and not encrypted. If using a scanner (which for the raF was standard), Klar would have been alarmed upon hearing encrypted radio sounds. He knew very well that only SF operated encrypted.

Days passed but nothing happened. repeatedly, hikers and mushroom-collectors were observed, but nobody approached Daphne. After two weeks, doubts arose among the involved forces as to whether it made sense to continue the mission. The third circle observers had already attracted attention from some residents in Aumühle and had to be replaced by stand-by forces from Hamburg. Moreover the temperature was near the freezing point and inside the hides the continuous rain pooled.

At the end of the third week, the Federal Ministry of Interior (BMI) gave the word to abort the operation after four weeks because the costs were devastating and mission success was questionable.

on November 16 (fourth week), at about 11:45 a.m., third circle observers in Friedrichsruh announced the appearance

Circle 191 on Reader Service Card

Page 17: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 17

IntroducIng a new standard In hIgh mobIlIty and maneuverabIlIty.

www.oshkosh-tacticalprotector.com

© 2009 Oshkosh Corporation • Oshkosh and the Oshkosh logo are registered trademarks and Tactical Protector Vehicle is a trademark of Oshkosh Corporation, Oshkosh, WI, USA

Tactical Protector VehicleTM from Oshkosh Defense creates a new strategic dimension for special operation missions. With a new standard in mobility, military-grade protection and capacity for up to eight officers, it enhances access, speed and safety in urban, rural and off-road high-risk situations.

get In. get around. gaIn control.

find out more:

CONTACT:Jack ReiffProgram Director, Tactical Protector Vehicle™

920.235.9151 extension [email protected]

10958_TPV_ad_COUNTER_TERRORISTmag.indd 1 10/9/09 12:36:28 PM

Circle 75 on Reader Service Card

Page 18: The Counter Terrorist Magazine - December/January 2010

18 The Counter Terrorist ~ December 2009/January 2010

of a male person at the railway station. The person was described as very slim and about 180 cm high. He was dressed in blue jeans and a blue rain jacket with a hood on his head (it was still raining), and he carried binoculars and (paradoxically) a spade. He was heading for Sachsenforest. He passed the former Bismarck castle and went on the forest path in an eastern direction. Sometimes he stopped, looking around. at 12:20 p.m. he was reported on Saw-Mill-Friedrichsruh, about 1000 m away from Daphne. He used exactly the forest path that led to the arms cache, but after about 500 m he vanished into the forest in an eastern direction.

He was out of sight for more than 30 minutes. The assault team near Daphne was ordered by the operations center to arrest the person as soon as he tampered with the cache. Nobody knew at this time whether the person was Klar, however,

a situation assessment by the operations center, the man’s suspicious behavior, and the risk of losing him led to the decision to make an arrest.

He approached Daphne from the north and nearly walked over the hides, they were so well camouflaged. He checked the environment for a few seconds and examined the soil. Then he started digging.

The assault team burst out of their hides and aimed their weapons at him hollering

“Police, don’t move!” He was psychologically shattered, and fell backward on the ground. A team member handcuffed and searched him. In his belt were a pistol (Colt Combat commander), a wallet containing 465 DM (from a bank robbery in Bochum), and a forged dänish passport. He was in bad shape (weighing about 50 kilograms) and very unkempt. When asked “Are you

Christian Klar?” he answered, “I am the one you waited for.”

Klar was sentenced to five life terms plus 15 years for murder in nine cases and 11 attempted murders. He was imprisoned in bruchsal in 1982. He was released in december of 2008.

Paradoxically, attention has gone almost exclusively to the offenders of the raF. many books, articles, and even movies about the motives and passions of raF members have appeared over the years. The victims and their relatives are almost forgotten. •ABOut tHe AutHOR

Dieter Munzinger (pseudonym) served in German Police Special Forces (GSG 9, SEK) for more than 23 years. The author was an assault team member and participated in numerous hostage rescue operations and operations against RAF. He currently works as an instructor for close protection teams.

Circle 101 on Reader Service Card

Page 19: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 19Circle 341 on Reader Service Card

Page 20: The Counter Terrorist Magazine - December/January 2010

20 The Counter Terrorist ~ December 2009/January 2010

Glasgow International Airport—site of the second of two attacks on British soil in a 24 hour period. ©istockphoto.com/Rockfinder

Case Study:

Counter The

by andy oppenheimer

Barely two years following the most lethal terrorist attack on uK soil— the transit bombings on July 7, 2005 in which 56 people died and 700 were in-jured, many severely — a reprise of these horrific events came in the form of an attempted double car bomb attack in London, and another attack with more devastating results one day later at Glasgow Airport.

Britain’s June, 2007 cAr bombs

Page 21: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 21

second failed to function presumably be-cause of faults in the initiator construction. When the vehicles failed to explode, Bilal abdulla, a 27-year-old diabetes special-ist who worked at the royal alexandra Hospital in Paisley, Scotland, and Kafeel Ahmed, an Indian engineering student, realized their attempts at mass murder had failed. They left the area separately on cycle rickshaws, meeting up just after 02:00 on nearby edgware road.

They also knew the forensic evidence contained intact within the unexploded vehicles would lead to their arrest. Abdulla had already been under surveillance. After spending the night at an east London hotel, the pair left the capital the follow-ing morning and traveled to the English Midlands, where they met up with a third man, mohammed asha, a 28-year-old Jordanian neurologist, near the University Hospital of North Staffordshire where he worked as a doctor. Abdulla and Ahmed then went to Glasgow, where they as-sembled their makeshift canister devices in a suburban house.

teRMiNAL AttACK

barely 24 hours later, on june 30, 2007, these same two British Muslims, who had tried to blow up hundreds of people on the streets of London, rammed a petrol-filled, four-wheel-drive, green Jeep Cherokee at speed into the main glass door entrance to the terminal at Glasgow International Airport. The vehicle became stuck in the

Case Study:London police removed one of the potential car bombs as the result of a routine parking violation.©istockphoto.com/Rockfinder

The first device was set to function at 02:00, when the nightclub would have been dis-gorging its partygoers, and the second 15 minutes later.

oLONDON tARGeteD AGAiN

n june 29, 2007, two Mercedes cars loaded with fuel, six 13-kg calor

patio gas canisters, homemade detonators, and 2,000 nails were left on a busy street in the center of the capital, poised to deto-nate. The first vehicle was parked outside the Tiger Tiger nightclub, one of the West end’s night hotspots with 400 partygoers inside at the time. The car was packed with up to 60 liters of fuel and two cell phones linked together, one on the back seat, one in the trunk. The gas cylinders were opened to allow the vehicle to fill with flammable gas.

A second Mercedes, also packed with gas canisters and nails, was later found a few hundred meters from the first, just round the corner on Cockspur Street. It had been parked so that it would be in the path of those escaping from the first car bomb explosion. It was fortuitously removed by local authorities at 03:15hrs because it was illegally parked and only discovered later when suspicions were aroused by the smell of petrol and gas emitting from it. The first device was set to function at 02:00, when the nightclub would have been disgorging its partygoers, and the second 15 minutes later.

Whereas the first device may have been rendered safe by prompt police action, the

Page 22: The Counter Terrorist Magazine - December/January 2010

22 The Counter Terrorist ~ December 2009/January 2010

combustion — a fireball, which could have caused hundreds of deaths and ap-palling injuries.

WHy tHe AttACKS FAiLeD

Of prime importance for assessing this and possible future attempts is to examine why the attacks failed in their deadly mis-sion. Why didn’t the highly volatile cargoes in the vehicles detonate?

The cars left outside the London night-club contained improvised “detonators” consisting of two mobile phones wired to a lightbulb surrounded by match heads. Once a safe distance away, Abdulla and Ahmed attempted to trigger the bombs, repeatedly calling the two mobile phones they had left on the front seat of each car. A phone call was supposed to trigger the homemade device igniting the vapors swirling inside the cars. Only one detona-tor sparked, but even that was quickly snuffed out because the mixture of petrol and gas was too thick.

The police said that if the car windows had been opened the bombs could have gone off; however, there was not enough oxygen to trigger the devices. The attacks failed because an oversight of a gap of less than 1 mm between the phones and detonators broke the circuit: a simple loose connection saved hundreds of late-night

airport entrance main terminal doors.After the Jeep crashed into the entrance,

one of the men got out, carrying what appeared to be an already lit incendiary device, and began pouring gasoline on and under the vehicle. The other man, who was not carrying a device, began remov-ing gas cylinders from it. The vehicle then burst into flames. Footage of the flaming vehicle and its extensively burnt occupant emerging from the vehicle was flashed around the globe on 24-hour news chan-nels within minutes.

Abdulla was arrested at the scene. Ahmed had doused himself in petrol and set himself on fire at the scene. Police and brave members of the public restrained the men, despite their vigorous resistance. Ahmed died from burns a month later. All flights were cancelled for the day at the height of the vacation season with families leaving on holiday. Ahmed was also found to be wearing what appeared to be a suicide device, which led to an evacuation and security operation at the hospital. It was later reported that the suspected article was in fact not a device.

Because the main charge was a mixture of flammable gas and liquid, it could have been ignited by heating the exposed fila-ment of a bulb in a kindling of petrol-satu-rated cotton wool. The flammable material could have undergone near-spontaneous

©istockphoto.com/Rockfinder

Circle 343 on Reader Service Card

Page 23: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 23

revellers from death and injury. However, the Glasgow attack, while causing “only” one fatality — the perpetrator — caused horrid mayhem and injury to airline passengers in the terminal. Local hospital casualty departments had to be cleared for emergency admissions.

The Irish republican army (Ira) had pioneered cell phone remote detonation in the 1990s but it did not attempt such attacks because it regarded the method un-reliable and likely to kill civilians wholesale if the signal set off devices prematurely. The 2004 madrid transit bombers had no such compunction, killing more than200 people in multiple attacks by mobile phone initiation. The Ira tried to make its own detonating tube by distilling the components of Semtex high explosive through lengths of clear plastic flex when the U.S.-origin Ireco and other supplies dried up. The Ira actually tried to deploy these homemade detonators but many devices failed to go off.

An adaptation of the terrorist’s favored weapon, the car bomb, was attempted as a weapon of indiscriminate effect. Closed-circuit television footage recorded during the attack shows dozens of passengers run-ning in terror as the Jeep crashed into the main terminal building doorway. Many travellers abandoned their luggage, but in the mayhem others caused luggage trolley pileups at doorways. The doors that the ve-hicle tried to break through were adjacent to the passenger check-in desks.

The Glasgow Airport and London vehicles contained gas canisters that would have been devastating improvised explo-sive devices (IEDs) had the mobile phone detonation in each vehicle succeeded. The London attempts were similar to an earlier plot in which an al-Qaeda militant planned to blow up gas-filled bombs inside limousines in London, and another plot where a major nightclub was one of a range of targets.

The attacks had been six months in the

An adaptation of the terrorist’s favored weapon, the car bomb, was attempt-ed as a weapon of indiscriminate effect.

Protective security equiPmentAt ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support.

• CALIBER® Robot• Hook&LineKits• SearchMirrors• EODHandTools• SearchKits

ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3Tel: 613.745.3600 I Fax: 613.745.3590 I Email: [email protected] Toll Free: 1.877.483.7978 www.icortechnology.com

Circle 81 on Reader Service Card

Page 24: The Counter Terrorist Magazine - December/January 2010

24 The Counter Terrorist ~ December 2009/January 2010

planning. The men had purchased large amounts of nails, fuel, and gas canisters without attracting attention. There was no information on Abdulla and Ahmed avail-able to police — they simply weren’t on the police radar yet (though they had been the subject of intelligence interest). The men also had at least two more vehicles and more supplies of gas, petrol, and elec-tronic detonators.

WHy NOt ieDS?Why didn’t the group build classic vehi-

cle-borne Ieds, as had the Ira in dozens of attacks (including the biggest terrorist explosions on UK soil, the London city bombs of the early 1990s), and al-Qaeda in bali in 2002 and many other attacks?

rather than a hurried attempt, ahmed, the would-be “bombmeister,” had spent months in India working on a design for the car bombs. The Indian-born engineer modeled the devices on those used by insurgent forces in Iraq, but the tests he carried out in India used fuel that was more flammable than that found in the UK. The vehicles were intended to act as large incendiary devices.

The perpetrators apparently did not have access to conventional detonators or conventional explosives; none were found in any of the vehicles. They also apparently lacked the expertise to make hydrogen-per-oxide-based explosives such as triacetone triperoxide (TATP) or, as was likely used in the july 7, 2005, attacks, hexamethylene triperoxide diamine (HTMD). Had either of these been used, a detonator would be superfluous to requirements because just a slight vibration can ignite these very volatile mixtures.

With some engineering experience, Ahmed had begun work on a PhD at the Faculty of Science and Technology at anglia ruskin university in cambridge in 2004 but he did not complete his degree. This is often the case with would-be at-tackers; they possess just enough expertise to plan and assemble the improvised means of mass murder but do not com-

Circle 93 on Reader Service Card

Circle 155 on Reader Service Card

Page 25: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 25Circle 67 on Reader Service Card

Page 26: The Counter Terrorist Magazine - December/January 2010

26 The Counter Terrorist ~ December 2009/January 2010

Circle 141 on Reader Service Card

plete their training. Therefore, their attacks sometimes, as on this occasion, fail. The plotters’ medical and engineering profile was, chillingly, more fitting to bioterrorism rather than classic bomb-making.

iNFiLtRAtiONGroups with ill intent, however, are not

short of intelligence. While the 2007 at-tempted attacks were not cbrN (chemi-cal, biological, radiological, and nuclear) attempts, as such, the fact that medical employees were involved alerted the authorities to the possibility of expertise being offered or applied for radiological or other nonconventional purposes. The attacks may not have involved VX or sarin nerve agents, but the intended enhanced incendiary effect would have killed and injured hundreds as improvised chemical devices.

Similar infiltrators into the British health system and other biological facilities with further expertise or contacts would pose a biological or chemical weapons risk. Ahmed is believed to have arrived in Northern Ireland in 2001, enrolling at Queen’s University Belfast to study aeronautical engineering, graduating in 2003, and staying on as a paid researcher. He was suspected to be an al-Qaeda operative in Ireland, adding a potentially deadly element to what had been decades of terrorism and conflict in Northern Ireland and the UK mainland. Asha had been employed at Addenbrookes Hospital in Cambridge.

The british Intelligence Service, mI5, has uncovered multiple attempts at infil-tration into British labs and universities. The Ira for example, had infiltrated brit-ish Telecom and the post office for years.

Abdulla had been in the crosshairs of british intelligence for 13 months prior to the attacks. Ahmed was also distantly related to Mohammed Haneef, an Indian doctor detained in Australia after the attacks in Britain. Haneef was released by the Australian authorities at the end of july 2007. Kafeel ahmed, who came

Circle 345 on Reader Service Card

Page 27: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 27

from Bangalore, was the brother of Sabeel Ahmed, who was also arrested and charged in relation to the attempted attacks.

CONviCtiNG teRRORiStS

Several recent terrorism trials have failed to convict. In the Glasgow attack trial in december 2008, only abdulla was found guilty of plotting with the fatally burnt driver, Ahmed. Abdulla was sentenced to prison for 32 years in december 2008. Mohammed Asha, who was accused of providing financial aid and “spiritual guid-ance,” was cleared of any involvement but faced deportation.

CONCLuSiONWhatever the judicial problems, the

threat is constant. The Glasgow incident was a stark reminder that London is not the only U.K. city at risk. While such attempts may have fallen short of the ruth-lessly high standards achieved by the Ira,

Hamas, al–Qaeda, and others overseas (or are being preempted), the terrorist learn-ing curve may not last long. Therefore, vigilance — especially within communities — must be eternal. •ABOut tHe AutHOR

Mr. Oppenheimer is Editor of World Security Report and author of IRA - The Bombs and the Bullets: A History of Deadly Ingenuity (Irish Academic Press). The author serves as a CBRNE consultant specializing in counter-IED. eNDNOteS

Quick look report, attempted Suicide-Ini-tiated Vehicle-Borne Incendiary Device Attack on Glasgow airport, 30 june 2007, Hazmat Solutions (HmS) ltd, 2 july 2007. from trial evidence, october 2008.

Quick look report, attempted Suicide-Initiated Vehicle-Borne Incendiary Device attack on Glasgow airport, 30 june 2007,

Hazmat Solutions (HmS) ltd, 2 july 2007. From trial evidence, october 2008. Matthew Taylor, Just one open window

would have caused carnage, The Guardian, 16 december 2008.

a. r. oppenheimer, Ira: The bombs and the Bullets – A History of Deadly Ingenuity, Irish academic Press, 2008, p. 204.

Personal communication, EOD operative in Northern Ireland, 2006.

Quick look report, attempted Suicide-Initiated Vehicle-Borne Incendiary Device attack on Glasgow airport, 30 june 2007, Hazmat Solutions (HmS) ltd, 2 july 2007.

raffaello Pantucci,“appearance is key in tackling terrorism, The Guardian, 4 may 2009.

Matthew Taylor, Profile: Kafeel Ahmed, The Mastermind, The Guardian, 16 december 2008

a. r. oppenheimer, explosives in the 21st Century, Aviation Security International, Vol 15 Issue 1, February 2009.

Henry mcdonald, mI5 targets Ireland’s al-Qaeda cells, The Observer, 2 march 2008.

Circle 79 on Reader Service Card

Page 28: The Counter Terrorist Magazine - December/January 2010

28 The Counter Terrorist ~ December 2009/January 2010

Book review

Unrestricted Warfarereviewed by: chris Graham

c ol. Qiao Liang and Col. Wang Xiangsui, two military strategists from the People’s

republic of china, define “unrestricted warfare” as warfare that transcends all boundaries and limits. They advocate fluidity, combining of methods and technologies, and careful tailoring of efforts to circumstances, locations, and enemies. They assert that all methods, including “military, trans-military and nonmilitary,” constitute unrestricted warfare. The writing of these men reveals an intimate knowledge of history and warfare from ancient China to recent U.S. Army doctrinal publications. The writers unhesitatingly express both admiration and ridicule for American methodologies. A portion of their work, Unrestricted Warfare (People’s Liberation Army Publishing House, 1999), is available in English at www.terrorism.com/documents/Trc-analysis/unrestricted.pdf.

Many of the disciplines these strategists identify will be recognized by Westerners. Additionally, they speak of “financial warfare, trade warfare, ecological warfare, regulatory warfare, electronic warfare, smuggling warfare, drug warfare, terrorist warfare,” and others. Interestingly, when these officers speak of financial warfare, for example, they are not using the term as a slogan, as a commerce association might. rather, they advocate the concept of an entity enforcing its will upon another by means that include attacking, manipulating and destroying a nation’s financial system. As another example, when they speak of drug warfare, they do not use the term as a police chief

“the 9-11 attacks may have been just the beginning of unrestricted Warfare. many terrorist nations and groups will try to imitate this operation . . . and china’s war book unrestricted Warfare will be their text.”

major General John singlaub,

United States Army (retired special operations officer)

seeking funds might. The writers explain drug warfare to be flooding a nation with drugs (and associated crime) as one more discipline to be strategically combined for the purpose of imposing one’s will upon another.

The colonels rhetorically ask, “Can special funds be set up to exert

Former Chinese intelligence chief Maj. Gen. Ji Shengde’s generous financial contributions to American politics seems to suggest the answer.

Many recognize that modern warfare encompasses more than martial matters. The United States coordinates political, financial, and other measures to include strategic alliances and partnerships to pursue national objectives. But, it would be a mistake to believe that pursuing objectives through nonmilitary means makes the imposition of will acceptable to an adversary. Liang and Xiangsui state, “War is still the ground of life and death, the path of survival and destruction, and even the slightest innocence is not tolerated.”

Suggesting reference to widely accepted rules such as the Geneva Conventions or Laws of Land Warfare, the writers state, “Whether or not each nation acknowledges the rules often depends on whether or not they are beneficial to themselves.” This statement is a logical conclusion when one sees that many of these laws, enacted long ago, provide privileges and protections to nations and individuals who fought within them, and deliberately withheld protections from individuals who did not such as “spies” and “saboteurs.” However, when one witnesses modern anomalies such as attempting to reward noncompliant illegal enemy combatants abroad with the same privileges as legal combatants, or inexplicably advocating the application of domestic civil and criminal laws on international battlefields, it would appear that one is witnessing the violation of principles for successful warfare.

by: col. Qiao liang and col. wang Xaingsui

greater influence on another country’s government and legislature through lobbying? And could buying or gaining control of stocks be used to turn another country’s newspapers and television stations into the tools of media warfare?”

Page 29: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 29

The strategists state, “Even though the United States bears the brunt of being faced with the threat of this type of nonmilitary war and has been the injured party time after time, what is surprising is that such a large nation unexpectedly does not have a unified strategy and command structure to deal with the threat.”

Using terror groups as an example, the authors write, “These multinational, non-state, and supranational organizations together constitute an up and coming worldwide system of power.” The authors understood the comparatively inferior agility of nation-states a decade ago. Best sellers such as The Starfish and the Spider (brafman and beckstrom, 2006) recount numerous modern business failures as the result of centralized decision making and the inability to adapt. Nassim Taleb discusses similar phenomena in his brilliant 2007 book, The Black Swan. Tragically, in time of crisis, one may see organizations attempt to further centralize power and decision making, inadvertently creating greater vulnerability to all manner of challenges. The colonels also state, “Americans tend to pursue unlimited objectives as they expand their national power. But this is a tendency which in the end will lead to tragedy. A company which has limited resources but which is nevertheless keen to take on unlimited responsibilities is headed for only one possible outcome, and that is bankruptcy.”

Policy makers who do not make space next to their favorite copy of The Prince for this text will find themselves in the dark. Military officers who do not study this work as a companion to The Art of War will likely be judged by history as derelict. In fact, any individual tasked with counter terrorism or anti terrorism duties will find Unrestricted Warfare to be a revelation about the near future of warfare and eye opening to the complexities of current events. •

Circle 243 on Reader Service Card

Circle 69 on Reader Service Card

Our Strengthis your security.

Safe Storage for Ammunition and Explosives.

usexplosivestorage.com visit our website!some models for sale online!

1-877-233-1481• Meet ATF Regs • Meet Military Specs • Many Sizes

Page 30: The Counter Terrorist Magazine - December/January 2010

30 The Counter Terrorist ~ December 2009/January 2010

us prison

Photo: Scott MorrisonCounter The

in May of this year, four men were arrested and charged with plotting to blow up New york synagogues and shoot down airplanes with antiaircraft missiles. the men were arrested after planting what they believed to be explosives outside two synagogues.1

Dr. m. zuhdi Jasser and raphael shore

Recruitment for Jihad

Page 31: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 31

tthere are hundreds of thousands of muslims in state and federal prisons.6 An estimated 80 percent of faith seekers turn to islam while imprisoned, with an estimated 30,000 to 40,000 converting each year.7

he men had been under FBI surveillance for months and were provided simulated explosives

when they tried to follow through with the act of terror.2 All four were Muslims who are believed to have converted to the faith while in prison.3 This case is but one example of what has long been a growing problem of Islamic extremism in the U.S. prison system.

Extremism is not unique to Islam, nor can the faith be said to be synonymous with radicalism.4 However, prison converts to Islam are often exposed to a version of Islam that is militant and extreme—Wahhabi Islam. Many, after leaving prison, are already far along the path toward radicalization and can eventually, with a few more wrong turns, go on to commit acts of terrorism.5 What are the roots of this problem? Are there other potential threats that can be traced back? What can be done to counter the emerging fifth column arising out of prison Islamist radicalization?

PRiSON CONveRSiONSThere are hundreds of thousands of

Muslims in state and federal prisons.6 an estimated 80 percent of faith seekers turn to Islam while imprisoned, with an estimated 30,000 to 40,000 converting each year.7 While some ultimately leave Islam when they leave prison, for most who convert while incarcerated, the change is real.

For many inmates, the transformation is a largely positive one. Islam and

other forms of religious observance provide a way to cope with the difficult challenges of prison life.8 Additionally, there is considerable evidence to show that faith observance can provide viable resources for rehabilitation. It can teach self-discipline, humility, and healthy social skills. In many cases, it can act as a counterweight against extremism. These can be useful tools which, if done “right” with religious values free of “political Islam’s” societal mission and Wahhabism’s extremism, will give inmates one way to be able to lead productive lives when they return to society.9

In fact, many Muslim converts will go on to lead lives as productive members of American society. Unfortunately, others will not, having been influenced by Islamist teachings while behind bars.10 A distinction here is important to make between the faith of Islam and the political movement of Islamism. Islamism is a theocratic movement that attempts to create societies that implement shar’iah law (Islamic jurisprudence) through government. Wahhabi Islam is one of the more potent militant, extremist, exclusivist versions of Islam that teaches that any means necessary can be employed to establish its own extreme version of the Islamic state and impose Islamic law. Despite its relatively obscure origins within tribal Saudi Arabia, Wahhabism emerged in the twentieth century as a particularly potent influence upon global Islam because of the profound influence of the unending

Page 32: The Counter Terrorist Magazine - December/January 2010

32 The Counter Terrorist ~ December 2009/January 2010

©istockphoto.com/JJRD

fuel of petrodollars. Petrodollars have fueled the Wahhabis’ ability to spread their message, texts, imams, and influence within Muslim institutions all over the world.

The number of inmates radicalized while in prison might be comparatively small, but elements that become militant are very dangerous.11 According to a recent report, “The potential for radicalization of prison inmates in the United States poses a threat of unknown magnitude to national security. Prisons have long been places where extremist ideology and calls to violence could find a willing ear, and conditions are often conducive to radicalization.”12 One of the primary concerns is that radicalization can be “full” or “partial.” There is a continuum of radicalization in which most Muslims may never be affected

as devotional orthodox adherents to their faith, but others will, from within that psychological absorption, and the influence of other contacts, complete a journey to radicalization. The New york Police Department reported on this very process in 2007.13

FACtORS LeADiNG tO tHe RiSe OF extReMiSM iN PRiSONS

Sociological and psychological factors14 in prisons as well as the need for protection from gangs have been profound elements of prison radicalization.15 Unfiltered hiring practices have allowed Islamist imams easy access to inmates, and an extreme staffing shortage has allowed radicalized prisoners and volunteers to serve as

primary sources of spiritual guidance.16,

17 Problematic literature fills prison libraries.18

Additionally, some Islamist organizations provide support to inmates reentering society, using this as a recruitment opportunity, leaving former inmates at risk for involvement in terrorist activities.19 Note that beneath all this are the driving commonalities of those who believe in political Islam. Many “Islamist” organizations may condemn terrorism but they do so half-heartedly with obvious apologetics for the advocacy of political Islam. Make no mistake, their Islamist ideologies and apologetics serve as a gateway for the possible future susceptibility of their constituencies to radicalization. The Islamist ideology includes a focus on “Muslim victimization and grievances” as a minority and fosters separatism. It drives converts toward an Islamic state and Islamic law (shari’a), and away from American society and Western law. The followers replace an American identity with an all-encompassing Islamic community (ummah).

Another problem lending fodder to this crisis is that many of the men come from dysfunctional backgrounds without intrinsic values and are disillusioned with the society they came from. The Center for Islamic Pluralism writes that “Islamist radical recruiters and extremist Wahhabi clerics use their demagogy to attract the disfranchised, disgruntled and others who may feel marginalized.”20 A Georgetown report notes that “radical religious groups allow the inmates to demonize their perceived enemies and view themselves as righteous.”21

RADiCAL ReLiGiOuS LeADeRS

One way Islamist teachings have crept into the prisons is through imams,22 prisoners,23 and volunteers giving radicalized interpretations of Islam to inmates. This problem is caused

Page 33: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 33

prisoners as well as volunteers often take on leadership roles because of the severe shortage of qualified imams.

by reasons ranging from ineffective oversight24 to severe religious staffing shortages.25

The pervasiveness of the radicalism of Muslim chaplains needs further study because many are not from a supremacist mindset, but the problem is certainly profound. For example, the former head muslim chaplain for the New york State Department of Correctional Services, Imam Warith Dean Umar,26 a former convict himself, oversaw the hiring of most of the 45 muslim chaplains and clerics in the New york system, while he also lead regular Islamic religious services for inmates himself.27 He indoctrinated his clerics in Wahhabism with Saudi-sponsored trips to Saudi Arabia and preached an extreme form of Islam to convicts, with the New york authorities completely oblivious.28 Umar said he found that prisons “are a powder keg” and “the perfect recruitment and training ground” for his Wahhabi ideas and radicalism “under the cover of the Islamic religion.”29

Shockingly, Umar was quite open about his radical beliefs. In an interview with the The Wall Street Journal in February 2003, umar said that “the 9/11 hijackers were martyrs” and that America would face “warfare” that would “be carried out by prison inmates who’ve converted to radical Islam.” 30

As a result of his extremism, Umar was eventually barred from the prisons.31 but even up until august 2009, this overtly radical imam had yet to be barred from American Islamist groups in the United States who present themselves as so-called voices of moderation. The Islamic Society of North america (ISNa) invited Umar to conduct a session at its annual conference in Washington, D.C., this summer. The Investigative Project quickly revealed that his speech entitled “Jews and Salaam” was riddled with anti-Semitism and obvious Islamic extremism.32 So one can see how Muslim brotherhood-affiliated groups like ISNa,

which openly claim to be nonviolent, will overlap with more radical Islamists like Imam umar. ISNa quickly tried to dismiss their association with Imam Umar.33

Unfortunately, other Muslims are also the target of this extremism. Salahuddin Muhammed, a prison imam hired by Umar and the chaplain of the mosque attended by the men recently arrested for plotting to blow up New york synagogues, was accused by Shiite prisoners of inciting hostility against them in his sermons, calling them “infiltrators and snitches.”34

Oversights have also allowed problematic groups to play an important role in hiring. Until recently, two American Islamist organizations with Saudi Wahhabist roots and leanings were responsible for the training and certification of Muslim clerics in the prison system.35 ISNa was an unindicted co-conspirator in the recent trial of the Holy Land Foundation36—the largest terror-finance case in U.S. history demonstrating ISNa’s muslim Brotherhood roots and connections.37

Prisoners as well as volunteers often take on leadership roles because of the severe shortage of qualified imams. A Florida official said that most inmates, in fact, are radicalized by other inmates. The case involving the JIS (Jam’iyyat Ul-Islam As-Saheeh, or Assembly of Authentic Islam) is one of the most prominent examples of this. In that case, Kevin James, a charismatic leader imprisoned at Folsom, was able to recruit a terrorist cell that almost went operational. Among its targets were Los Angeles-area Army recruiting offices and the Israeli consulate.38

iSLAMiSt LiteRAtuReInadequate supervision of religious

events and informational materials entering prisons has helped to reinforce the grip of fundamentalist chaplains, despite regulations that require the

screening of such materials.39 The Center for Islamic Pluralism recently reviewed the inventory of Islamic literature in prisons, and found a significant number of Wahhabi and other fundamentalist texts, including works by leading Muslim brotherhood figures yusuf al-Qaradawi and Sayed Qutb.40

A particularly disturbing case is that of the Noble Quran distributed by the al-Haramain Islamic Foundation41 and the Islamic Affairs Department of the Saudi Arabian Embassy in Washington D.C.42 In 2004 the u.S. Treasury department froze the assets of Al-Haramain for funneling money to al-Qaeda and rebels in Chechnya.43 This Saudi-Wahhabi printed version of the Quran, distributed to over 10,000 prisoners, contains inflammatory rhetoric attacking non-Muslims, and preaches violent jihad.

Page 34: The Counter Terrorist Magazine - December/January 2010

34 The Counter Terrorist ~ December 2009/January 2010Circle 109 on Reader Service Card

Page 35: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 35

Circle 65 on Reader Service Card

since 9/11, members have

remained in the united states training at their encampments to avoid the scrutiny of law enforcement.

ReeNteRiNG SOCietyFbI director robert mueller said that

the threat of radicalization does not end when prisoners are released. Extremists exploit “their socio-economic status and placement in the community” as another way of reaching this vulnerable group.44

at a Senate hearing in 2006, Frank Cilluffo, director of the George Washington University Homeland

Security Policy Institute, addressed this subject further.

Former inmates are vulnerable to radicalization and recruitment because many leave prison with very little financial or social support. To the extent that radical groups may draw upon funding from well-financed, extremist backers, they can offer much more support to released prisoners than other more legitimate community programs that would facilitate genuine reintegration into society. By providing for prisoners in their time of greatest need, radical organizations can build upon the loyalty developed during the individual’s time in prison. If connections are made with a radicalized community group, the recently released inmate may remain at risk for recruitment or continued involvement in terrorist networks.45

One organization that appears to have taken advantage of this is a group called Jama’at al-Fuqra.46

JAMA’At AL-FuqRA/MuSLiMS OF tHe AMeRiCAS

Jama’at al-Fuqra (JF), or “community of the impoverished,”47 was founded in New york by Pakistani cleric mubarak Gilani in 1980.48 It’s an example of a potential threat that can be traced, in part, to prison radicalization. When JF was formed, Gilani targeted African American converts to Islam—primarily those with criminal backgrounds—who were living in the inner city. This, in and of itself, is not the problem. As previously stated, religious groups often provide a positive influence on inmates. In the case of JF, the problem is the kind of Islam they are turning to. One dossier on the group gives an indication of this when it writes that “Gilani used their hostility and cynicism toward Western society to aid in their adoption of his extremist beliefs.”49

Understand the threat - reduce the risk to your operations

If it’s part of your responsibility to protect people, infrastructure, supplychains or your organisation and its operations, then knowing how andwhy terrorists plot against civilians, governments, corporations,transport or IT networks makes an unmistakable difference to yourcounter terrorism and security strategies.

This 16-week online programme of study from the renowned Centrefor the Study of Terrorism and Political Violence (CSTPV) at theUniversity of St Andrews provides a sophisticated introduction to thefundamental issues behind terrorism as well as the motivations,methodology and modus operandi of the various strains of terrorism inthe world today.

For further details or to apply: visit www.terrorismstudies.com/AA1K1email [email protected] or call +1 (646) 957 8929 (North America) or +44 (0)20 3377 3210 (UK) VIP Code: LR0032AA1K1

Certificate inTerrorism Studies

Course commences:

18th Jan 2010 EnrollingNowFurther intakescommence5th May 2010 and13th September 2010

Elective modules include bothmaritime and aviation terrorism

Page 36: The Counter Terrorist Magazine - December/January 2010

36 The Counter Terrorist ~ December 2009/January 2010

Where the mission isSECURING OUR NATION

March 23-24, 2010 | Washington, DC | www.govsecinfo.com

GovSec/U.S. Law provides the products, strategies, tactics, education and networking for the professionals whose mission is to secure our nation and their communities. Attendees will become better prepared to anticipate, prepare, prevent, and respond to domestic and international terrorism, accidental and natural disasters, and attacks on critical infrastructure.

Don’t miss the only event for government providing a comprehensive approach to homeland security & has

the convergence of IT and physical security at its core!

• 2nd Annual Domestic Defense Symposium• Cybersecurity Pavilion and Accenture Cybersecurity Theater• Focus on Digital Forensics• Homeland Security Finance Forum• International Issues & Initiatives on Cybersecurity• Law Enforcement Theater• Briefings on Key Topics• Career Fair – Focus on Homeland Security and Law Enforcement

Presented by:

In addition to the show flow with leading suppliersdemonstrating hundreds of cutting edge securityproducts, you’ll experience:

Insightful Keynotes -Plus an expanded conference with sessions on:

• Critical Infrastructure Planning and Protection• Cybersecurity and Information Assurance• Domestic and International Terrorism: Deterrence, Preparation and Response• Law Enforcement Case Studies and Tactics

*Please use Priority Code NQ1S01 when registering.

Register TODAY for the conference & FREE Expo at www.GovSecInfo.com.

Your GovSec/U.S. Law registration gives you access to FOSE, joining forces with GovSec/U.S. Law at the Walter E. Washington Convention Center.

To exhibit and/or sponsor GovSec/U.S. Law, contact Don Berey, Show Director, at (703) 876-5073or [email protected]

Circle 61 on Reader Service Card

Page 37: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 37

The EyePole tactical surveillance pole camera is completely self contained, and ready for duty.

EyeOn, LLCPO Box 2302

Issaquah, WA 98027-0104425-652-9556 phone

866-631-3086 [email protected]

Color Camera with Auto-switching IR Night Vision and 360º Articulation

Load-bearing probe

Quick Flip-lock™ Collar for Extension

Control Panel with Power, Brightness, Video-out, and Audio-out (option)

5" TFT Color Display with 180º Tilt & Swivel

Quick Connect Attachment to EyePoleUltra-sensitve Microphone

Quick Disconnect Rifle Sling for Hands-free Approach

ntained, and readyrr for duff tyyttyytttt .yy

yUltra-sensitve Microphone

Under Door Camera

Circle 165 on Reader Service Card

Though Gilani runs JF from Pakistan,50 it has continued to operate in North America under two front groups: Muslims of the Americas (MoA) and the International Quranic Open University.51 The group’s goal is to purify Islam of Western influences through violence.52 They have openly supported Muslim Kashmiri separatists against India, and have declared as their enemies Israelis, Hindus, Jews, Hare Krishnas, Buddhists, and the U.S. government, among others.53 The State Department listed JF as a terrorist organization until 1999,54 and the Department of Defense handbook, A Military Guide to Terrorism in the Twenty-First Century, did the same from 2003 to 2005.55

JF is believed to be responsible for dozens of bombings and murders across the United States and abroad, including the first World Trade Center attack in 1993.56 JF has also been linked to “shoe bomber” richard reid,57 al-Qaeda operative Ayman Faris, who was convicted for plotting attacks on the

Brooklyn Bridge and other targets,58 and D.C. sniper John Allen Muhammad.59

Although members have not been arrested for violent activities in several years, they continue to support Gilani financially through extensive white collar crimes, by taking advantage of a variety of social services programs, including workers’ compensation, public health care, welfare, and the Food Stamp Program.60 In one recent case, Khadijah Ghadur, a JF member in California, was convicted of bilking the state of more than a million dollars through a charter school she ran. Evidence never introduced in court indicated that the money may have gone to Gilani.61

SHeiKH GiLANiSheikh Gilani is as controversial as JF.

He espouses extremist views, telling his followers that “Zionist plotters” plan to rule the world and encouraging them to leave America’s cities to avoid the “decadence of a godless society. “”62 He has militant connections to al-Qaeda

muslim radicalization in American prisons is a deep-seated, multilayered problem that will require an overhaul of the approach to “islam” behind bars.

Page 38: The Counter Terrorist Magazine - December/January 2010

38 The Counter Terrorist ~ December 2009/January 2010

and Osama Bin Laden,63 Hamas, and Hezbollah,64 and reportedly was a former member of the Pakistani Inter-Services Intelligence agency (ISI).65 Gilani has also trained fighters for Bosnia, Chechnya, and Kashmir.66 American reporter Daniel Pearl was trying to interview Gilani in Pakistan when he was kidnapped and beheaded.67 Gilani was arrested but later released by Pakistani authorities, denying any involvement in the murder. Gilani currently denies any connection to JF, as do residents of the MOA compounds, who say the “terrorist” group was created by enemies of Islam hoping to destroy their communities.68

COMPOuNDSThe group, which has 1,000–3,000

members, maintains about 20–30 compounds across America.69 These compounds, in rural hamlets, shelter hundreds of members, some of whom, according to intelligence sources, have been trained in the use of weapons and explosives in Pakistan. Since 9/11, members have remained in the United States training at their encampments to avoid the scrutiny of law enforcement. There are reports of gunfire and explosions coming from these compounds and anyone not affiliated with the organization, including law

enforcement, is barred from entering the encampment.70 A blogger who posted a negative story about the town in 2007 was threatened with violence.71 Members of these enclaves submit to laws set out by Gilani, which are considered to be above local, state, and federal authority.

The MOA university has portrayed itself as a religious, charitable, and educational institution dedicated to home study and public awareness of the Koran. However, MOA has made anti-Semitic, anti-Christian, anti-American, and homophobic statements as well as statements promoting violence.72 Gilani’s appearance in a recruitment video shows JF’s true face. The video shows individuals being trained in the use of firearms and explosives and Gilani, wearing a camouflage jacket over traditional Pakistani dress, declaring, “We give highly specialized training in guerrilla warfare . . . . We are at present establishing training camps . . . . you can easily reach us at Koranic Open university offices in upstate New york or in Canada or in Michigan or in South Carolina or in Pakistan. Wherever we are you can reach us.”

Muslim radicalization in American prisons is a deep-seated, multilayered problem that will require an overhaul of the approach to “Islam” behind

Circle 87 on Reader Service Card

Page 39: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 39Circle 171 on Reader Service Card

bars. There must be a coherent process by which we can allow prisoners the “freedom” to embrace a personal faith that they choose to help promote their rehabilitation while also protecting them and the American public against the spread of the very real threat, which is radical Islam.

ABOut tHe AutHORSDr. Jasser is a devout practicing

American Muslim and a former physician to the U.S. Congress. He is the narrator of The Clarion Fund’s documentary, “The Third Jihad” (www.TheThirdJihad.com), as well as the founder and president of the American Islamic Forum for Democracy (AIFD, www.aifdemocracy.org).

Mr. Shore is a producer of documentary films and the founder of The Clarion Fund, a nonprofit organization dedicated to educating the public about national security threats. Shore is well known for producing

the documentary “Obsession: Radical Islam’s War Against the West.” His latest documentary, “The Third Jihad” (www.TheThirdJihad.com), explores radical Islam in America.

eNDNOteS1 “Four men indicted in Ny synagogue

bomb plot.” reuters, june 2, 2009. http://www.reuters.com/article/domesticNews/iduSTre5517Ku20090602

2 Gendar, Alison, and Corky Siemaszko, “Terrorist ‘Candid Camera’: Alleged wanna-be Bronx jihadists under surveillance for nearly a year.” Ny daily News, may 23, 2009. http://www.nydailynews.com/news/ny_crime/2009/05/23/2009-05-23_terrorist_candid_camera_wannabe_bronx_jihadists_under_constant_surveillance_for_.html

3 de la llosa, luis Torres, “New york Synagogue bomb suspects plead not guilty.” aFP, june 2009. http://www.google.com/hostednews/afp/article/ alm5gi3umIih1vmke8Ql8vyrcpmltvrw

4 “out of the Shadows: Getting ahead of Prisoner radicalization.” George Washington University, Homeland Security Policy Institute and The University of Virginia, Critical Incident Analysis Group.

the moA university has portrayed itself as a religious, charitable, and educational institution dedicated to home study and public awareness of the Koran.

Page 40: The Counter Terrorist Magazine - December/January 2010

40 The Counter Terrorist ~ December 2009/January 2010Circle 163 on Reader Service Card

5 Hamm, mark S., “Terrorist recruitment in American Correctional Institutions: An exploratory Study of Non-Traditional Faith Groups Final report.” Sponsored by the National Institute of justice, december 2007.

6 Islam, mufti Siraj, “Islam in american Prisons.” Islamonline.net, august 31, 2001. http://www.islamonline.net/servlet/Satellite?c=article_c&cid=1156077734147&pagename=Zone-english-muslim_Affairs%2FMAELayout

7 Hamm, mark S., “Terrorist recruitment in American Correctional Institutions: An exploratory Study of Non-Traditional Faith Groups Final report.” Sponsored by the National Institute of justice, december 2007.

8 malik, Imaad, “black america, Prisons and radical Islam: a report.” center for Islamic Pluralism, September 2008.

9 Hamm, mark S., “Terrorist recruitment in American Correctional Institutions: An exploratory Study of Non-Traditional Faith Groups Final report.” Sponsored by the National Institute of justice, december 2007.

10 Zoll, rachel. “u.S. prisons becoming Islam battleground.” Associated Press, july 14, 2005. http://www.library.omc.ca/mtarchives/000073.htm

11 Hamm, mark S., “Terrorist recruitment in American Correctional Institutions: An exploratory Study of Non-Traditional Faith Groups Final report.” Sponsored by the National Institute of justice, december 2007.

12 “out of the Shadows: Getting ahead of Prisoner radicalization.” George Washington University, Homeland Security Policy Institute and The University of Virginia, Critical Incident Analysis Group.

13 Silber, mitchell d., and arvin bhatt, radicalization in the West: The Homegrown Threat”. New york city Police department. 2007.

14 “out of the Shadows: Getting ahead of Prisoner radicalization.” George Washington University, Homeland Security Policy Institute and The University of Virginia, Critical Incident Analysis Group.

15 Hamm, mark S., “Terrorist recruitment in American Correctional Institutions: An exploratory Study of Non-Traditional Faith Groups Final report.” Sponsored by the National Institute of justice, december 2007.

16 ali, javed, “Prison radicalization: are Terrorist Cells Forming in U.S. Cell Blocks?” Statement before the U.S. Senate Committee on Homeland Security and Government affairs, September 19, 2006.

17 cilluffo, Frank j., “Prison radicalization: are Terrorist cells Forming in U.S. Cell Blocks?” Testimony before the Senate Committee on Homeland Security and

Circle 123 on Reader Service Card

For more information please visit www.preventivestrategies.net or www.ruraltraining.org

I�������� ��� P��������� S���������at �e Center for Rural Development

Rural Domestic Preparedness Consortium

I�������� ��� P��������� S���������at �e Center for Rural Development

Homeland SecurityCertifiCate Program

Courses for Public Safety Practitioners Courses include:

Law Enforcement Professionals Available Now!

Fire Service Professionals Coming Soon!

Emergency Management Professionals Coming Soon!

Enroll in a course today.No fees! No cost!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

IPS-RDPC-DHS Ad 4.75 x 4.875.indd 1 4/13/2009 4:33:01 PM

Page 41: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 41

recent report from the Commis- sion to Assess the Threat to the United States from Electro- magnetic Pulse (EMP) Attack

presented a fairly clear picture of an often unappreciated threat. An EMP strikes out in all directions within its line of sight, sending a series of high-energy pulses that tend to fry any exposed micro-circuitry, among other things, but does not have the flattening effects associated with a nuclear strike.

“A single EMP attack may seriously de-grade or shut down a large part of the electric power grid in the geographic area of EMP exposure effectively in-stantaneously. There is also a possibility of functional collapse of grids beyond the exposed area, as electrical effects propagate from one region to another.” The first HEMP (high altitude elec-tromagnetic pulse) experiment was performed july 8, 1962 in a test 900 miles west of Hawaii. The experiment, Starfish Prime, successfully launched a 1950s’ vintage Thor intermediate range ballistic missile (Irbm) carrying a 1.4 megaton warhead to test, among other things, if there were any detectable impacts on the ground from an EMP from the blast some 400 kilometers (km) in the air. It is important to note that these tests took place at a time when there was a fraction of integrated circuitry that exists today, though it seems that the impacts were significant.reports from Hawaii included radios

malfunctioning, television sets blown, more than 100 streetlights blown or fused, burglar alarms sounding, and power lines fused. On neighboring Kauai, the EMP shut down telephone service, burning out equipment used in a microwave link. Later post-detonation reports indicated that the electromagnetic composition of the Van Allen belt, a ra-diation belt surrounding the planet, had been amplified or changed by the EMP. As a result, seven satellites were destroyed

Pre-ConferenCe 1 Day Training from SSi “The iSlamiC JihaDiST ThreaT” Call for DeTailS! 866-573-3999

Personal Trauma Kits A few ounces in your pocket could save your life.

with

Approx. 4” x 5”

Approx. 4” x 8”

Approx. 4” x 6”

Circle 315 on Reader Service Card

RESQ-PAK.COM • 888.949.RESQ (7377)Enter coupon code SSCT1209 to receive a 10% discount from ResQ-PAK.com ( Offer valid through January 15, 2010 )

Page 42: The Counter Terrorist Magazine - December/January 2010

42 The Counter Terrorist ~ December 2009/January 2010

Governmental affairs, September 19, 2006.18 malik, Imaad, “black america, Prisons

and radical Islam: a report.” center for Islamic Pluralism, September 2008.

19 cilluffo, Frank j., “Prison radicalization: Are Terrorist Cells Forming in U.S. Cell Blocks?” Testimony before the Senate Committee on Homeland Security and Governmental affairs, September 19, 2006.

20 malik, Imaad, “black america, Prisons and radical Islam: a report.” center for Islamic Pluralism, September 2008.

21“out of the Shadows: Getting ahead of Prisoner radicalization.” George Washington University, Homeland Security Policy Institute and The University of Virginia, Critical Incident Analysis Group.

22 Van Duyn, Donald, “Statement… Before the House Homeland Security Committee Subcommittee on Intelligence, Information Sharing, and Terrorism risk assessment,” September 20, 2006. http://www.fbi.gov/congress/congress06/vanduyn092006.htm cited in “radicalization: an overview and Annotated Bibiliography of Open Source literature. Final report.” Homeland Security Institute, december 15, 2006.

23 cilluffo, Frank j., “Prison radicalization: Are Terrorist Cells Forming in U.S. Cell Blocks?” Testimony before the Senate Committee on Homeland Security and Governmental affairs, September 19, 2006.

24 “out of the Shadows: Getting ahead of Prisoner radicalization.” George Washington University, Homeland Security Policy Institute and The University of Virginia, Critical Incident Analysis Group.

25 cilluffo, Frank j., “Prison radicalization: Are Terrorist Cells Forming in U.S. Cell

Blocks?” Testimony before the Senate Committee on Homeland Security and Governmental affairs, September 19, 2006.

26 umar was born Wallace Gene marks and converted to the Nation of Islam in 1971 after being sentenced to two years in prison on weapons possession charges as part of the Harlem Five conspiracy. When he moved into more orthodox Sunni Islam and Wahhabism he changed his name to Warith Dean Umar, meaning “inheritor of the religion.” Umar was one of Muhammad’s successors and companions.

27 Schwartz, Stephen, “Prison Poison,” New york Post, january 10, 2006.

28 barrett, Paul m., “captive audience: How a Chaplain Spread Extremism To an Inmate Flock — radical New york Imam Chose Clerics for State Prisons; Praise for 9/11 ‘martyrs’ — Saudi arabia’s Helping Hand,” The Wall Street Journal, February 5, 2003. 29 barrett, Paul m., “captive Audience: How a Chaplain Spread Extremism To an Inmate Flock — radical New york Imam Chose Clerics for State Prisons; Praise for 9/11 ‘martyrs’ — Saudi arabia’s Helping Hand,” The Wall Street journal, February 5, 2003.

30 “jihad: at a Prison Near you,” The New york Post, February 6, 2003.

31 Schwartz, Stephen, “Prison Poison,” New york Post, january 10, 2006.

32 “Warith deen umar: jews ‘Have Control of the World.’” The Investigative Project on Terrorism, july 5, 2009. http://www.investigativeproject.org/1081/warith-deen-umar-jews-have-control-of-the-world

33 “ISNa’s Non-apology apology.” The Investigative Project on Terrorism, July

13, 2009. http://www.investigativeproject.org/1090/isnas-non-apology-apology

34 Silverberg, mark, “Wahhabism in the american Prison System.” may 6, 2006. http://www.jfednepa.org/mark%20silverberg/wahhabi_america.html

35 ibid36 united States of america vs. Holy land

Foundation for relief and development et. al, 3:04-c12-cr-240-G “list of unindicted co-conspirators and/or joint Venturers.”

37 Trahan, jason,”5 decry jail terms in Holy Land Foundation case.” The Dallas Morning News, may 27, 2009. http://www.dallasnews.com/sharedcontent/dws/dn/latestnews/stories/052809dnmetholyland.209bc6fd.html

38 Hamm, mark S., “Terrorist recruitment in American Correctional Institutions: An exploratory Study of Non-Traditional Faith Groups Final report.” Sponsored by the National Institute of justice, december 2007

39 barrett, Paul m., “captive audience: How a Chaplain Spread Extremism To an Inmate Flock — radical New york Imam Chose Clerics for State Prisons; Praise for 9/11 ‘martyrs’ — Saudi arabia’s Helping Hand,” The Wall Street journal, February 5, 2003.

40 malik, Imaad, “black america, Prisons and radical Islam: a report.” center for Islamic Pluralism, September 2008.

41 Founded in 1992 in riyadh, Saudi Arabia, the Al-Haramain Organization is a private charity with branches in more than 50 countries. Its worldwide annual operation budget was estimated at $40–50 million. The charity no longer exists as its own entity as it was merged into the Saudi National commission for relief and charity Work

Circle 89 on Reader Service Card

Page 43: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 43Circle 161 on Reader Service Card

Page 44: The Counter Terrorist Magazine - December/January 2010

44 The Counter Terrorist ~ December 2009/January 2010

Abroad. 42 Waller, dr. michael, Testimony for the

Committee on Terrorism, Technology and Homeland Security, “Terrorist recruitment and Infiltration in the United States: Prisons and Military as an Operational Base.” Senate committee on the judiciary, october 14, 2003.

43 “u.S. based branch of al Haramain Foundation Linked to Terror.” U.S. department of the Treasury Press release, September 9, 2004. http://www.ustreas.gov/press/releases/js1895.htm (accessed december 18, 2007). branches in Tanzania, Kenya, Afghanistan, Comoros Islands, Albania, India, Ethiopia, Indonesia, Pakistan, Bangladesh, Somalia, and Bosnia-Herzegovina were also shut down for involvement in funding terrorist operations around the world.

44 mueller, robert, Testimony before the Senate Committee on Intelligence of the united States Senate, February 16, 2005.

45 cilluffo, Frank j., “Prison radicalization: are Terrorist cells Forming in U.S. Cell Blocks?” Testimony before the Senate Committee on Homeland Security and Governmental affairs, September 19, 2006.

46 “jamaat ul-Fuqra: Gilani Followers Conducting Paramilitary Training in U.S.”

regional organized crime Information center, 2006.

47 crowley, Zachary, “jamaat al-Fuqra Dossier.” Center for Policing Terrorism, march 16, 2005.

48 ibid49 “jamaat ul-Fuqra: Gilani Followers

Conducting Paramilitary Training in U.S.” regional organized crime Information center, 2006.

50 organized crime in california: annual report to the california legislature.” california department of justice, 2004.

51 boland, mira l., “Sheikh Gilani’s American Disciples: What to make of the Islamic compounds across America affiliated with the Pakistani radical group Jamaat al-Fuqra?” The Weekly Standard, march 18, 2002, Vol 7, No 26. http://www.weeklystandard.com/content/Public/articles/000%5c000%5c000%5c996lxfmd.asp

52 “Patterns of Global Terrorism 1999.” u.S. department of State, april 2000. http://www.state.gov/www/global/terrorism/1999report/patterns.pdf

53 Kane, john, and april Wall, “Identifying the Links Between White-Collar Crime and Terrorism,” National White collar crime center, doc. 2090520, award #2003-Ij-

cX-1018, September 2004, p. 18. http://www.ncjrs.gov/pdffiles1/nij/grants/209520.pdf

54 See “Patterns of Global Terrorism, 1994,” u.S. department of State, april 1995: appendix b: background Information on major Groups discussed in the report. http://www.fas.org/irp/threat/terror_94/append.html and “Patterns of Global Terrorism 1999.” u.S. department of State, april 2000, april 2000. http://www.state.gov/www/global/terrorism/1999report/patterns.pdf.. JF were no longer listed as a terrorist organization in 2000. The State department responded to a reporter’s question as to why this was so on january 31, 2002, saying that because the group had been inactive over the years in terms of terrorist activity they were no longer included. Moreover, the State Department report’s designation did not have a legal definition in the same way al-Qaeda was designated.

55 See “a military Guide to Terrorism in the Twenty-First Century.” U.S. Army Training and doctrine command Tradoc Intelligence Support Activity – Threats, october 12, 2004 and Zachary crowley, “Jamaat al-Fuqra Dossier.” Center for Policing Terrorism, march 16, 2005. http://centerforpolicingterrorism.net/pdf/

Circle 349 on Reader Service Card

Page 45: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 45Circle 117 on Reader Service Card

SUICIDETERROR

Understanding and Confronting the threat

edited byophir falk and henry Morgenstern

falkM

orgensternSUICIDE TERROR

Understan

ding an

d Confron

ting the threat

Based on U.s. and israeli experiences and detailed interviews with frontline personnel, Suicide Terror enables

policymakers, first responders, and students of homeland security to understand and deal with the growing

threat of suicide terror. it analyzes recent suicide attacks as well as our current vulnerabilities and likely scenarios

for future attacks. following the expert authors’ advice, readers learn possible measures to prevent an attack.

Moreover, they learn how to prepare for and implement an effective and quick response to minimize casualties

and losses in the event of an attack.following an overview and historical review of suicide terror, the book covers:• Globaljihad• Israel’sconfrontationwithsuicideterrorism• America’sexperiencewithsuicidebombings• Internationalizationofsuicideterrorism• High-riskscenariosandfuturetrends• Methodsforconfrontingsuicideterror• MedicalmanagementofsuicideterrorismUsing eye-witness accounts, the text recreates the look and feel of actual terrorism incidents. Detailed case

studies help readers get into the minds of suicide terrorists in order to understand how to best prevent and confront

these very dangerous threats.Thisbookisadefinitivestudyofsuicideterror,synthesizingtheexperienceofwell-knownIsraeliandAmerican

experts who have dealt with it firsthand. anyone responsible for understanding, preventing, and confronting this

devastating threat should read this book and consider its recommendations with all seriousness.OPHIR FALK, LLB, MBA, isaPartnerattheNaveh,KantorEven-HarlawfirmandaResearchFellowatthe

institute for Counter terrorism, where he has published numerous articles in the field. Mr. falk has over a decade

of experience in various security capacities and served as a consultant for the 2004 olympic games, where he

carried out risk assessments for olympic venues and critical national infrastructure.HENRY MORGENSTERN is the President of security solutions international, a company that has trained more

than 500 federal, state, and local agencies to effectively confront the threat of terror and regularly takes groups of

firstresponderstoIsraeltostudyHomelandSecurity.Mr.Morgensternisawidelypublishedauthoronthesubject

ofsuicideterror.Hehasofferedexpertcommentaryonterror-relatedissuesforNBC,ABC,CBS,Fox,numerous

radio stations, and Web broadcasts.

Ophir Falk and Henry Morgenstern have compiled a book that should be read by anyone who is

serious about winning the war on terror. By painstakingly analyzing the empirical data, they help us

better understand the nature of our enemies and why they employ these barbaric tactics. Most crucially,

they offer important insights on how terrorism can be effectively confronted and ultimately defeated.

In so doing, they have performed an invaluable service for all those who are committed to winning this

crucial battle. —Benjamin Netanyahu, former Prime Minister of Israel

FIRSTHAND ACCOUNTS AND ANALYSES FROM FRONTLINE PERSONNEL AND ExPERTS IN THE wAR AGAINST TERROR

FIRSTHAND ACCOUNTS AND ANALYSES FROM FRONTLINE PERSONNEL AND ExPERTS IN THE wAR AGAINST TERROR

www.SuicideTerror.com • 866-573-3999

jamaaTal-FuQra2.pdf56 clines, Francis X., “Specter of Terror;

U.S.-Born Suspect in Bombing Plots: Zealous causes and civic roles.” New york Times, june 28, 1993. http://www.nytimes.com/1993/06/28/nyregion/specter-terror-us-born-suspect-bombing-plots-zealous-causes-civic-roles.html?sec=&spon=&pagewanted=all

57 Stockman, Farah, “bomb Probe Eyes Pakistan Links Extremist May Have Influenced reid.” The boston Globe, january 6, 2002.

58 raman, b., “al-Qaeda clone Takes roots in the uS.” asia Times online, july 3, 2003. http://www.atimes.com/atimes/South_asia/eG03df07.html

59 “united States: The jamaat al-Fuqra Threat.” STraTFor Global Intelligence, june 3, 2005. http://www.stratfor.com/united_states_jamaat_al_fuqra_threat

60 Kane, john, and april Wall, “Identifying the Links Between White-Collar Crime and Terrorism,” National White collar crime center, doc. 2090520, award #2003-Ij-cX-1018, September 2004, p. 17. http://www.ncjrs.gov/pdffiles1/nij/grants/209520.pdf

61 bailey, brandon, and Sean Webby, “The mysterious saga of Sister Khadijah.” Mercury

News, February 11, 2007. http://www.hvk.org/articles/0207/100.html

62 levanthal, rick, “Quiet muslim-only Town in N.y. Founded by alleged Terrorist,” Fox News, march 23, 2009. http://www.foxnews.com/story/0,2933,510218,00.html

63 See david Kohn, “Sheikh Gilani: cbS’ Man in Pakistan Tracks Him Down.” CBS News, march 13, 2002 http://www.cbsnews.com/stories/2002/03/13/60II/main503644.shtml; and Jamie Glazov, “Terrorist Camps in America.” FrontPageMagazine.com, February 3, 2009. http://www.frontpagemag.com/articles/read.aspx?GuId=7c52675d-0e6c-4026-bade-d2a80c777099

64 “jamaat ul-Fuqra,” South asia Terrorism Portal (SaTP). http://www.satp.org/satporgtp/countries/pakistan/terroristoutfits/jamaat-ul-fuqra.htm#

65 mira l. boland, “Sheikh Gilani’s American Disciples.” The Weekly Standard Vol. 7 Issue 26, march 18, 2002. http://www.weeklystandard.com/content/Public/articles/000%5c000%5c000%5c996lxfmd.asp?pg=1

66 ibid67 See david e. Kaplan, “made in

the U.S.A.: Hundreds of Americans have followed the path to jihad. Here’s how and why,” u.S. News and World report, june

10, 2002. http://www.usnews.com/usnews/news/articles/020610/archive_021602.htm; and Unmesh Kher, “The Odd Ordeal of daniel Pearl”, Time, February 11, 2002. http://www.time.com/time/magazine/article/0,9171,1001778-2,00.html

68 “Imam el Sheikh Gilani Sets the record Straight,” Muslims of Americas Online Press release, june 12, 2007. http://www.islamberg.org/

69 ali, Farhana and William rosenau, “Jama`at al-Fuqra’: An Overblown Threat?” cTc Sentinel, october 2008, Vol 1, Issue 11.

70 “Probe Finds Terrorists in u.S. ‘Training for War’: Neighbors of muslim encampment Fear retaliation if They report to Police.” WorldNetdaily.com February 17, 2006. http://www.worldnetdaily.com/news/article.asp?arTIcle_Id=48868

71 judi mcleod, “blogger Who Posted CFP Islamberg Story Had Life Threatened,” canada Free Press, may 15, 2007. http://www.canadafreepress.com/2007/cover051507.htm

72 “muslims of the americas: In Their Own Words.” Anti-Defamation League. http://www.adl.org/extremism/moa/default.asp

Page 46: The Counter Terrorist Magazine - December/January 2010

46 The Counter Terrorist ~ December 2009/January 2010

Counter The

hezbollAh:

A Hezbollah flag flies over Beaufort Castle, Lebanon. ©istockphoto.com/RichVintage

The Party of God, 2009by Jennifer l. hesterman

Page 47: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 47

According to the state Department, hezbollah remains the most technically capable terrorist group in the world.13

hezbollAh:2008: After three days of bloodshed,

heavily armed fighters seized West Beirut. This is the first use of Hezbollah’s military arsenal against their host state to increase territory and span of control. The conflict was sparked by government action to shut down Hezbollah’s telecommunications network.

2006: Hezbollah militants kidnapped two Israeli soldiers in northern Israel, sparking the month-long “Lebanon War,” which devastated the country’s infrastructure. during the conflict, Israel bombed Lebanon and sent in troops and tanks. Hezbollah fired 4,000 rockets across the border into Israel. More than 1,000 lebanese, mostly civilians, died, and 120 Israeli soldiers and 43 Israeli civilians were killed.3

MetHODSHezbollah has a history of suicide

bombings, however, this tactic appears to have fallen out of favor in the past 10 years. Kidnapping has been utilized as a way to engage in prisoner exchange. rockets and missiles are the primary military weapons, and recent unconfirmed reports indicate the presence of chemical weapons at a bunker leveled by a blast earlier this year. Hezbollah also fields a unique weapon: the group is very

today, non-state actors confidently engage powerful nations in irregular warfare, despite an obvious mismatch in resources. When these groups are successful, they often pull their opposition into a long, expensive, and casualty-ridden conflict. Hezbollah is a powerful non-state actor that is growing in complexity and influence.

espite decades of overt and covert attempts to dismantle the group, it is still one of the world’s most effective

terrorist organizations. A review of Hezbollah reveals an organization that leverages unique sources of power, and continues to wield influence not only in the Middle East, but globally.

ReCeNt OPeRAtiONS2009: When Israel engaged Hamas

in Gaza, Hezbollah did not intervene militarily (possibly at the behest of Syria), but influenced the battlefield in a variety of ways. Prior to the conflict, Hezbollah’s leadership invited Arab nations to join it in protesting Israel’s embargo of goods entering Gaza. This contributed to the propaganda associated with the conflict and also demonstrated Hezbollah’s ability to engage from afar via psychological operations.1

During the battle, Hezbollah’s influence on Hamas’s tactics was apparent with the group again relying more on rocket attacks and less on suicide operations. Iranian sources report that Hezbollah trained Hamas in military tactics used to attack Merkava tanks, the main battle tank employed by the Israeli Defense Forces (IDF).2

D

Page 48: The Counter Terrorist Magazine - December/January 2010

48 The Counter Terrorist ~ December 2009/January 2010

hezbollah is also known to have killed more Americans than

any other terrorist group prior to 9/11.4

donations from sympathizers in large Middle Eastern communities.7

venezuela: Hezbollah has received support and sympathy in Venezuela. In 2006, following the end of hostilities in Lebanon with Israel, Hassan Nasrallah (Hezbollah leader) called Hugo Chavez his “brother,” and signs that said “Gracias, Chavez” in thanks for the president’s backing during the conflict were hung in Lebanon. In response to the Israeli engagement in Gaza earlier this year, President Chavez ejected the Israeli ambassador and staff from his country.

europe: According to the U.S. State Department, the European Union (EU) as a whole remained reluctant to take steps to block the assets of charities associated with Hamas and Hezbollah.8 uncharacteristically, in 2007, the Swedish government shut down the al-Aqsa Foundation in Malmo when it was suspected of facilitating fund-raising for Hezbollah and/or Hamas. Its leader, Khaled al-yousef, a Swedish citizen, was charged with financing terrorism in Israel. Although he was acquitted of supporting terror, he was confirmed to be sending money to various “charities.”

west africa: Hezbollah is active in several West African countries, reaping profits from booming narco-trafficking routes, diamond trade, and solicitation of funds from Muslims—either voluntarily or through an imposed “tax.” Funds are illegally transferred from Africa to Lebanon and bulk cash smuggling is rampant. For instance, in 2003 a charter flight en route to beirut from benin crashed on takeoff killing all onboard, including senior Hezbollah members who were carrying $2 million.9

iraQ: In 2006 the Iraq Study Group (a 10-person panel appointed by congress in 2006) revealed that Hezbollah trained thousands of soldiers of the Mahdi Army (an Iraqi Shi’ite militia) in Lebanon. Hezbollah operatives also traveled to Iraq to advise the Mahdi Army. The report revealed that Iran facilitated these activities.10

Gaza Strip. ©istockphoto.com/sweetandsour

adept at leveraging the global audience through press campaigns, political activity, and humanitarian engagement.

OBJeCtiveSHezbollah has stated that one of its

goals is to eliminate the state of Israel. Other demonstrated objectives include freeing Hezbollah prisoners in Israel; supporting the humanitarian and basic needs of Lebanon’s Shi’ite civilian populace; maintaining a political presence in Lebanon’s parliament; and fund-raising through both legitimate and illicit means. Hezbollah is also known to have killed more Americans than any other terrorist group prior to 9/11.4

PRiMARy AReA OF OPeRAtiONS

Hezbollah operates in the formerly Syrian-controlled Bekaa Valley, the southern suburbs of Beirut, and southern Lebanon. It has established cells in europe, africa, South america, North America, and Asia.5 The training bases are mostly in the Bekaa Valley, and its headquarters and offices are in southern Beirut and in Ba’albek.6 Hezbollah is now a “state within a state,” similar to how the Palestinian Liberation Organization used to operate in Lebanon.

GLOBAL OPeRAtiONSiran anD syria: Hezbollah

continues to methodically expand its sphere of influence around the world while receiving weapons and training support from Iran and Syria. It now operates in the same space as other major terrorist organizations such as revolutionary armed Forces of columbia and al Qaeda. Sharing resources, tactics, or established trafficking routes between the groups would have dire implications.

latin america: U.S. officials are concerned that Hezbollah sympathizers are raising funds in the tri-border area through illicit activities (such as DVD pirating) but also through solicited

Page 49: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 49

West Africa’s diamond trade is just one of many sources of illegal funding for Hezbollah. ©istockphoto.com/cristi_m

ORGANizAtiONHezbollah was designated as a

Foreign Terrorist Organization by the State department in 1995. It consists of several thousand supporters and militants. Although the United States does not distinguish between Hezbollah’s departments, the group’s structure is clearly defined by distinct activities—adding to an already complex diplomatic challenge.

PARAMiLitARyHezbollah’s military philosophy

revolves around the guerrilla-based concept of “muslim resistance.” Its strategy is that soldiers should have a military role and a civilian role. They are integrated into the civilian populace during times of peace, and form a well-trained, disciplined military force during war.11 The civilian populace has demonstrated support for this concept and is a catalyst for its success.

Following repeated defeats of Arab forces by the IDF, Hezbollah adopted a new command structure that encourages initiative in junior ranks. A decentralized command structure allows for rapid response to any situation without consulting with group leadership. The military wing, however, answers directly

to Hezbollah’s central council of clerics for direction.12

According to the State Department, Hezbollah remains the most technically capable terrorist group in the world.13 A formidable paramilitary force in the region, the group continues to demonstrate that it can blend unconventional warfare tactics with strategies typically employed by conventional forces. It has spent decades posturing, preparing, and rebuilding its arsenal.

Israeli officials claim Hezbollah has completely replenished its ranks, possesses more short- and medium-range rockets than it had before the 2006 war, has moved arms back to southern Lebanon, and is providing training to Hamas operatives from Gaza.14

In june, reports surfaced that 40,000 rockets were placed by Hezbollah on the border of Lebanon and Israel. One month later, an explosion at an ammunition bunker in a lebanese village 12 miles from the Israeli border gave further cause for concern. The weapons cache at this location, wrongly believed by the United Nations (uN) to be abandoned, consisted of aK-47s, artillery shells, mortars, and 122-millimeter rockets. a uN officer

Military Grade Night Vision and Thermal Gear For Your

Warfighting Advantage!

PHX-7Medium-Range Thermal Binocular

UTAM-32Thermal Acquisition Monocular

NVBS-15Dual Tube Binocular System

Nivisys Industries, LLC400 S. Clark Drive, Suite 105

Tempe, AZ 85281 USATel: +1(480) 970-3222

nivisys.com

Circle 153 on Reader Service Card

Page 50: The Counter Terrorist Magazine - December/January 2010

50 The Counter Terrorist ~ December 2009/January 2010

stated that the facility was a violation of uN resolution 1701, which imposed a cease-fire and arms ban after the war.15

Hezbollah is undeterred by the presence of the uN Interim Force in lebanon (uNIFIl), which fields 13,000 troops at an annual budget of $590 million.16 uNIFIl’s mandate is to ensure compliance with resolutions, and it attempts to do so in a very unstable environment. Following the July cache explosion, uNIFIl attempted to inspect a similar facility in the neighborhood but it was repelled by villagers throwing rocks, injuring 14.

Iran is supplementing Hizbollah’s arsenal. According to the State department, in 2008 Iran’s Qods Force continued to provide weapons, training, and funding to the group and trained more than 3,000 fighters at camps in Iran.17

Finally, there are unconfirmed reports

that Hezbollah is procuring russian-made Sa-8 and Sa-18 surface-to-air missiles.18

POLitiCAL Hezbollah seeks to improve its political

position in Lebanon whose government and the majority of Arab nations recognize the group as a legitimate “resistance group” and political party, namely the Lebanese Islamist party. Since 1992 its political arm has fronted candidates in parliamentary elections. In 2005 Hezbollah secured an all-time high of 14 of the lebanese Parliament’s 128 seats. as part of the government, Hezbollah has participated in meetings with the EU and the International Monetary Fund.

after taking over West beirut in 2008, the group’s political power increased. As part of an Arab-brokered deal to end the fighting, Hezbollah was granted enough

Tank in Israel. ©istockphoto.com/sweetand-

Circle 83 on Reader Service Card

Page 51: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 51Circle 131 on Reader Service Card

SECURITY SOLUTIONS INTERNATIONAL LLC • 866-573-3999 • [email protected]

See our incredible video at: www.FLOODSAXSTORE.COM

Using sandbags to mitigate flood damage no longer holds water. FloodSaxTM are the new, lightweight, compact, clean and

superior-engineered alternative to the mess and limitations of sandbagging.

We’ve just turned the tide in flood damage.

Introducing FloodSaxTM

• Rapid Deployment: FloodSaxTM expand to their full size in only 3 minutes in water.

• Superior to Sand: Seals, blocks and diverts flood waters infinitely better than sandbags.

• Clean: FloodSaxTM eliminates the need for messy sand, dirty workspace and materials.

• Compact: 20 FloodSaxTM per carton vacuum sealed in bundles of five.

• Dual Sizes: Expands to 20” x 17” or 18” x 15” when inflated.

• Lightweight: 15 ounces or 22 ounces when dry, deploys to 32 lbs or 44 lbs (respectively).

• Durable: Lasts up to 3 months deployed in use ~ 5 years on shelf.

• Versatile: Can be used to soak up interior water seepage or spills.

• Biodegradeable: FloodSaxTM are 100% biodegradeable.

Page 52: The Counter Terrorist Magazine - December/January 2010

52 The Counter Terrorist ~ December 2009/January 2010

Zistos Corporation631.434 .1370www.zistos.comE-mail: [email protected]

IMPROVED!IMPROVED!

� Search all areas of a vehicle, cargo, under carriage, engine and passenger areas with just one system

� System includes three uniquely configured, interchangeablevideo cameras and a body-worn, battery operated LCD monitor

� Look for weapons, IED’s, contraband, stolen materials� Use immediately —no installation required� Affordable and easy to operate� Also search public/employee areas on grounds and in buildings

Designed for Vehicle Screening at Check Pointsand Entrances of Secure Facilities

The system includes a WalkAbout® body-worn LCD Monitor with interchangeable camera

components that can be configured as a 14-foot Pole Camera, 2-foot Baton Camera, and an

Under Vehicle Inspection Trolley Camera.Product No. WA-VSWD14

Under Vehicle Inspection TrolleyCamera with 6-Foot Pole

14-Foot Pole Camera

2-Foot Baton Camera

The Complete Portable

Vehicle Search System

The Complete Portable

Vehicle Search System

Circle 139 on Reader Service Card

seats to have veto power over government decisions. Illustrating the synergy between its political and military efforts, Hezbollah’s election campaign posters contained a mushroom cloud with the inscription: “oh Zionists, If you Want This Type of War Then So Be It!”19 Likely a message from their Iranian sponsors, intended as a warning for Israel.

COMMuNity OutReACH

Hezbollah’s civilian wing provides a variety of social services for Lebanese Shi’ites, which comprise nearly one-third of the population of Lebanon. Providing protection and basic necessities to the populace has naturally increased the group’s popularity among citizens.

It publishes a newspaper and monthly magazine, operates radio and TV stations, and runs hospitals, schools, and orphanages. The group also has a substantial Martyrs Fund to provide support to families of dead, injured, or imprisoned Shi’ites.

Key PeRSONNeLHassan Nasrallah, a former military

leader and Shi’a religious expert, has led Hezbollah for more than 17 years. Nasrallah is widely credited for driving Israel from Lebanon and for the successful prisoner exchange with Israel in 2004 that freed hundreds of Palestinians and Lebanese.

Nasrallah demonstrated his animosity toward the united States in 2002 when he stated, “Let the entire world hear me. Our hostility to the Great Satan is absolute . . . regardless of how the world has changed after 11 September, Death to America will remain our reverberating and powerful slogan: Death to America.”20

Two men who wield significant power within the organization and often serve as spokespersons for Hezbollah are Deputy Secretary-General Sheikh Naim Qassem, Nasrallah’s second in command, and the most senior Hezbollah member of parliament, mohammed raad.

uSG ReSPONSe Groups like Hezbollah are not

controlled by any one nation, so traditional means of applying pressure through diplomatic, economic, and military means are not effective, or even possible. International norms and laws are difficult to enforce upon such groups, particularly for organizations like the uN.

In the last three years, the U.S. department of defense has allocated $61 million to Lebanon for counter terrorism assistance.21 The State Department provided $6 million in 2008 to support the bureau of International Narcotics and Law Enforcement Affairs’ efforts in

Page 53: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 53

lebanon. INl is actively training and equipping Lebanon’s Internal Security Forces, which are reportedly countering Hezbollah and attempting to maintain stability in the country.22

We must learn from Hezbollah’s 30 years of growth, adaptation, and unique activities. •ABOut tHe AutHOR

Ms. Hesterman is a retired U.S. Air Force colonel. She is a senior analyst for The MASY Group, a global intelligence and risk management firm, and a professor at American Military University. Her book “Transnational Crime and the Criminal-Terrorist Nexus” was published in 2005.

eNDNOteS1http://www.jamestown.org/single/?no_

cache=1&tx_ttnews[tt_news]=34575 2 http://www.jamestown.org/

single/?no_cache=1&tx_ttnews[tt_news]=34575

3 http://www.bloomberg.com/apps/news?pid=20601087&sid=aeol1KbcenkM

4 https://www.cia.gov/news-information/press-releases-statements/press-release-archive-2004/pr07192004.html

5 http://www.state.gov/documents/organization/10300.pdf

6 http://www.globalsecurity.org/military/world/para/hizballah.htm

7http://www.state.gov/documents/organization/122599.pdf

8 http://www.state.gov/documents/organization/122599.pdf

9 http://www.strategycenter.net/research/pubId.118/pub_detail.asp

10http://www.nytimes.com/2006/11/28/world/middleeast/28military.html

11 www.fride.org/download/lebanon.pdf

12http://www.jamestown.org/single/?no_cache=1&tx_ttnews[tt_news]=860

13www.state.gov/s/ct/rls/crt/2006/82738.htm

14http://www.state.gov/documents/organization/122599.pdf

15http://www.nytimes.com/2009/07/25/world/middleeast/25briefs-lebanon.html

16http://www.un.org/depts/dpko/missions/unifil/index.html

17http://www.state.gov/documents/organization/122599.pdf

18http://www.bloomberg.com/apps/news?pid=20601087&sid=aeol1KbcenkM

We have been specializing in providing U.S. government

agencies with specialty explosives for 25 years!

We provide a full line of REAL & INERT explosive

products especially suited for Bomb Techs, Entry Teams,

Special Teams and K9 Professionals.

www.OMNIexplosives.comWebsite password... “omniexplo”

Omni Distribution Inc. Explosive Products Division

PO Box 69, Marion AR 72364 800.277.6664

Now Available

The Omni UBSUniversal Breaching SystemMake Any Size Frame or Port.

Please visit our website for more images.

Circle 309 on Reader Service Card

19http://www.michaeltotten.com/archives/2009/04/hezbollahs-mush.php

20http://georgewbush-whitehouse.archives.gov/news/releases/2006/09/20060905-7.html

21http://www.fpc.state.gov/documents/organization/128331.pdf

22http://www.state.gov/documents/organization/121735.pdf

Page 54: The Counter Terrorist Magazine - December/January 2010

54 The Counter Terrorist ~ December 2009/January 2010

solo rApiD response to ActiVe shooters

Photo: Scott MorrisonCounter The

by michael stepien

A Necessity for Rapid Deployment

Page 55: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 55

by michael stepien

the “active shooter” response doctrine and its burgeoning nationwide training programs have done much to expedite American law enforcement’s response to in-progress attacks on citizens.

the need for the fastest response time possible is imperative because of one inescapable fact: the average school shooting is becoming increasingly deadlier in a shorter period of time.

ndoubtedly, there will be more police on scene faster to an active shooter than would have been possible a mere 10

years ago. However, many current active shooter response tactics require multiple officers in the same place to make entry and neutralize the threat. Under the high-stress scenario of an active shooting, coupled with the unfamiliar settings likely for patrolmen to encounter and the possibility of barricaded entry points, police arrival is in no way guaranteed before a new “high score” of dead victims is a reality. A new thought process must be propagated throughout law enforcement to again increase the speed of responding officers to an ongoing attack, even if that means a solo officer entering a school, an office building, a hotel, and so forth, without assistance, currently taught throughout the country.

Of note: The following examination focuses specifically on an active shooter in a school setting. However, the principles discussed are easily applied to any possible scenario, from a lone, disgruntled student or transient in a school to a professional terrorist siege

of multiple targets such as the attacks in Mumbai.1 The overarching principle is that the first responding officer or operator cannot wait for the “optimal” level of backup desired to engage the suspect(s) and must make contact as fast as possible. regardless of the officer’s level of training and equipment, it can be expected to be superior to that of the individuals targeted. Thus, even if the first responder cannot stop the threat entirely, his mere presence and actions serve several vital purposes. By making contact with the perpetrator without delay, the attacker cannot actively engage helpless targets, fortify his position, move hostages, barricade entry points, disperse improvised explosive devices (IEDs), and etcetera.

Moreover, tactics that utilize a small number of operators during a response to an active shooting/takeover must be formalized and trained as it may be required by the perpetrators actions. Government personnel responding to attacks at multiple, high-profile, “soft” target sites as well as peripheral target sites, created by the perpetrators to sow chaos and strain responding agencies

u

Page 56: The Counter Terrorist Magazine - December/January 2010

56 The Counter Terrorist ~ December 2009/January 2010

SUPPLY

WWW.IDEALSUPPLYINC.COM800-533-0144 or 828-274-0140

EOD EQUIPMENT

Circle 233 on Reader Service Card

(as executed in Mumbaii, the Oasis compound of Khobar in Saudi Arabia,

egypt in 1997, and planned for St. Petersburg in 2006 and Manhattan in 1993) may force a change from the “first arriving officer” scenario. regardless, speed is the universal imperative and is vital during any level of response.

The need for the fastest response time possible is imperative because of one inescapable fact: the average school shooting is becoming increasingly deadlier in a shorter period of time. Undoubtedly, this is the result of ongoing efforts by law enforcement (LE) professionals to learn from the devastating lessons taught by previous active shooter incidents. According to ron borsch, manager and trainer at the Seale regional Training academy in Bedford, Ohio, the duration of active shooter incidents is shrinking while lethality is increasing—a phenomenon he called the “Stopwatch of Death.” Following a study of the murder statistics

of the 44 active shooter incidents (for which data are available) that have occurred in North america since 1966, Borsch concluded that, undeniably, “the time frame in active shooter incidents is getting tighter.”

Specifically, Borsch reported:

A Virginia Tech insider shared that 30 dead and 25 wounded were accomplished in 7 minutes. The Stopwatch of Death factor here is 7.9 (murder attempts per minute)—four times that of Columbine (2.1), and over twice that of Dawson College in Montreal (2.9). In other words, at Virginia Tech, the worst mass murder by a solo active shooter to date, one shooter committed twice as many murders (32 casualties) in less than half the time it took the two Columbine shooters to kill 13.

Although the Virginia Tech shooting reportedly lasted closer to 10 minutes,2 the numbers presented by Borsch are eye

OPFOR Munitions and

Equipment

PR Pyro IED Simulator StandWeatherproof, powder-coated, solid steel, 22 lbs. Holds 3 IEDs, 2 Mortars, and 1 Smoke simultaneously. Unlimited use.

PR RPG Launcher Simulator Replica of the Rocket Propelled Grenade Launcher. Fires 4 types of PR Pyro munitions.

Smoke Munition

IED Munition

Optional 50 mm SAM Munition Holder

PR CorporationPyrotechnic Battle Scene Simulator Systems

Visit www.OPFORmunitions.com for our complete line of OPFOR training products.

713-728-4772 • fax 713-723-2985

Made in the USA

© 2009 PR Corporation

New PR Suicide Vest Simulator

New PR Pyro Grenade Simulator

Circle 301 on Reader Service Card

Page 57: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 57

Page 58: The Counter Terrorist Magazine - December/January 2010

58 The Counter Terrorist ~ December 2009/January 2010

opening. As aptly summarized by Borsch, “Time is our worst adversary in dealing with active killers . . . . Victims are often added to the toll every several seconds.” Few, if any, formalized strategies beyond the current “active shooter” training have been adopted with this horrific reality in mind. When the dead and injured are added by the second, a new strategy to combat this reality is needed.

Therefore the good fighter will be terrible in his onset, and prompt in his decision — Sun Tzu

Unquestionably, waiting for a “hasty” team of the five to six plus officers necessary to properly execute “rolling thunder” or the four to five officers mandated for the “diamond” formation is ideal. These tactical manifestations attempt to apply the lessons gleaned from prior active shooter atrocities—expedited entry, speed of movement, known areas of responsibility, superior firepower, room dominance, and so forth. Although the viability of the “diamond” or “rolling thunder” is a topic of incessant debate, the above principles are vital

and must be drilled to the point where any possible combination of patrol, SWaT, school resource officer (Sro), detective, or supervisory personnel can move effectively and efficiently through a large area filled with doorways, halls, and staircases. Police departments must endeavor to practice the tactics they deem appropriate for their organization—preferably in their city’s schools or in a similar shoot house or off-site facility—until any group of officers are comfortable with their responsibilities and the general principles adopted.

The question, however, is: how many children’s lives are worth the wait for four plus officers to arrive on scene, coordinate positions in an unfamiliar and stressful environment, and breach an entry point near the sound of gunfire, assuming it has not been barricaded or chained? Kind estimates, presumably with moderately sized police departments in a suburban or an urban environment, peg the time for two officers’ arrival in concert at 6 minutes. others cite 30 minutes3 as the time needed for four “plain-vanilla” patrolmen to make entry into a given target.

Photo: Scott Morrison

Page 59: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 59

Gary Marbut, president of the Montana Shooting Sports Association, conducted a study of the Montana University System and Firearms Authority4 to determine exactly how much damage an individual armed with a handgun can incur in a given period of time. Even with the devastating memories of contemporary shootings still reverberating, the numbers are shocking. Per the study, six targets—standard humanoid scoring targets were set up seven yards from the shooting position. The targets, arranged a target-width apart, were designed to simulate a relatively congested environment likely to be found in a school classroom or lecture hall. Using a shot timer, the shooter, loaded and holstered, was allotted a 15-second window and instructed to change targets for each shot fired. Six shooters were run through the test. The fewest shots fired in 15 seconds was 17, a mean of ~25, and maximum shots were 34 (most of the shots fired were considered fatal, or at least fatal without immediate medical attention).

Extrapolated to a time of one minute, the range of accurate shots fired into different targets ranges from 68–136 rounds. Therefore, according to the above estimate of six minutes for two officers to coalesce into a viable entry team, an active shooter could fire between 408 and 816 aimed rounds at as many targets. (Note: according to john Giduck of the archangel Group, in addition to the 174 rounds he fired in less than 11 minutes, Seung-Hui Cho, the student responsible for the Virginia Tech shooting rampage, possessed an additional 203 unfired rounds stored in preloaded magazines in his backpack. For active shooters motivated by the new “highest score,” taking large quantities of ammunition is becoming the norm, not the exception.)

To be fair, the Montana University study was conducted using experienced shooters and static targets, which could arguably detract from the viability of

the test. The case of Michael Carneal, however, attests that even the most seemingly benign, untrained child can display extremely proficient firearms skills in a dynamic, real-life scenario. recounted in dr. Grossman’s Stop Teaching our Kids to Kill: A Call to Action Against TV, Movies, and Video Game Violence, carneal, a 14-year-old who had never previously fired a real gun, engaged a student prayer group at his school in 1997. carneal fired eight shots and hit eight different children, killing three. Like the accomplished shooters in the Montana University study, all the shots fired were at different targets and were unforgivingly accurate—five head and three upper torso shots.

Water shapes its course according to the nature of the ground over which it flows; the soldier works out his victory in relation to the foe which he is facing — Sun tzu

American LE is painfully aware of the dangers of a delayed response to active shooters. Departments that neglect preparing their personnel for the possibility of such incidents and the doctrine adapted post-Columbine are arguably in dereliction of duty and risk allegations of negligence. Indeed, active shooter training is now commonplace, with little question remaining about the standard response protocols and standard operating procedures regarding such incidents, even across multi-jurisdiction responses.

However, with the above understanding of how fast casualties are occurring, new tactics must be implemented. LE must tailor its response to a higher degree. The current “Active Shooter/rapid deployment” doctrine was an enormous paradigm shift from the “barricaded subject” and subsequent

indeed, active shooter training is now commonplace, with little question remaining about the standard response protocols and standard operating procedures regarding such incidents, even across multi-jurisdiction responses.

Page 60: The Counter Terrorist Magazine - December/January 2010

60 The Counter Terrorist ~ December 2009/January 2010 Circle 157 on Reader Service Card

perimeter default. A solo-officer response goes against the deep-seated (and unarguably necessary) contact and cover mantra taught across the country but, in light of current trends, it is profoundly important to mentally and logistically prepare individual officers to engage active school shooters without the assistance that is so often assumed to be in place.

as reported by robert o’brien in Police: The Law Enforcement Magazine,5 a modified active shooter response, wherein a single patrol officer is permitted to enter a site solo to engage the suspect(s) as an alternative to spending valuable seconds waiting for multiple cover officers, as the initial stage of a multi-tiered response, is needed. The principle of this strategy is that an officer should be expected to be better trained and mentally prepared for confrontation in contrast with the suspect whom, by the nature of his or her targets,- seeks easy prey and thus will likely not stand for a protracted fight with a single officer, not to mention the waves of reinforcements that are likely to follow. At minimum, the officer is exponentially better equipped and prepared for such

If shots are not observed upon the first officer’s arrival, the officer should attempt to enter the school in the areas known to occupy large numbers of students, i.e., the cafeteria, auditorium, library, lounges, and etcetera. Because the shooter may be pursuing the new “highest score,” these areas remain likely targets. Arriving officers unaware of active shooting should secure these areas first and, to borrow a counter-insurgency term, “inkblot” their presence throughout the school. This tactic of securing ground and gradually expanding control as additional resources arrive puts officers immediately into the likely areas of attack and allows them to cut off the supply of victims.

Sros will be encouraged to employ this thought process versus leaving the interior of the school to meet up with arriving officers. Leaving the interior puts the officer at risk of losing secured ground as well as surrendering the guarantee of an unopposed entry into the school.

Again, the inkblot tactic should be employed when there are no observable shots being fired. If that is not the case and shots are being fired, the initial officers should flow into the area of the attack through any opening possible. There is no guarantee that the doors most likely chosen, and identifiable by multiple officers directing incoming resources, will not be barricaded or chained. Copycat shooters learn their lessons well and the trend of gaining more time to add victims to their “score” via chains and barricades, even IEDs, cannot be ignored. Officers seeking any opening possible are more likely to gain entry in a shorter period of time than attempting to coalesce at commonly known entry points, which will likely be fortified. If necessary, the first arriving officer can employ his/her vehicle as a “ram” if they are unable to breach otherwise. Not only will this ensure entry, but the noise and intimidation—a small-scale “shock and awe” factor—may cause hesitation in the shooter, if not inspiring suicide all together.

an occasion than the individuals being targeted and who are otherwise helpless to defend themselves. Contemporary active shooter incidents, e.g., Columbine, colorado, bailey, colorado, New life Church, Colorado, and Virginia Tech, illustrate that the perpetrators of these attacks are ill prepared and unmotivated for a determined law enforcement response. Barring deliberate hostage taking such as beslan, russia,6 history has shown that individuals performing this type of attack can be devastating during the initial stages, but will often stop upon resistance; thus, the importance of a fast response. The suicidal responses (approximately 90 percent commit suicide on-site according to Jeffrey denning of the Force Science research Center) of active shooter suspects upon initial confrontation encourage an emphasis on a fast response by law enforcement. Once again, speed is the necessity for the best outcome possible.

Rapidity is the essence of war: take advantage of the enemy’s unreadiness, make your way by unexpected routes, and attack unguarded spots . . . if the enemy leaves a door open, you must rush in — Sun tzu

A solo-officer entry is, by necessity, a simple, albeit challenging, prospect. If shots are observed upon arrival, the objective is to breach the target area preferably as close to the last known shots fired as possible and engage the subject. At the very least, the officer can distract the shooter with rounds down range, hopefully encouraging the shooter to commit suicide, seek cover, flee, and so forth. In any event, the shooter will not be actively engaging innocent children, fortifying his position, or gathering hostages.

Photo: Scott Morrison

Page 61: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 61Circle 77 on Reader Service Card

Page 62: The Counter Terrorist Magazine - December/January 2010

62 The Counter Terrorist ~ December 2009/January 2010 Circle 95 on Reader Service Card

Page 63: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 63

The first officer in place, a patrolman or Sro, also serves to augment the information available to responding resources. Because citizens are not conditioned to observe and effectively report relevant intelligence, an officer trained to obtain and vet tactical information is profoundly important. A review of the false and incomplete information relayed from citizens to dispatchers during the Columbine and Virginia Tech attacks underscores how vital accurate information is, and how bad intelligence can impede an effective response. Undeniably, a first responding officer acting as a scout/observer, even if he/she cannot effectively stop the threat, can profoundly contribute to a favorable outcome through disciplined intelligence gathering and dissemination. By relaying the number of perpetrators, their weaponry, location (even where they are not located), existing fortifications, clothing, armor, open entry points, and so forth, the officer is augmenting the speed of response.

Opponents of this strategy that point out that a lone officer entering a school during an active shoot incident has a higher likelihood of being killed, and thus is only supplying the shooter with more ammunition and firepower, are simply missing the point. Of course, every officer with any sense would choose not to enter a target building alone. However, the prospect of being in close proximity to an ongoing tragedy, equipped with the means to put an end to it and not acting, is equally distasteful. One of the most prominent differences between the antiquated doctrine before the shift to the active shooter/rapid deployment tactic is the re-prioritization of the value of life spectrum, with “officer safety” subjugated to a lesser value over innocent bystanders and hostages/victims. Those questioning a solo-officer response are questioning the cornerstone of the “active shooter” doctrine: cops’ lives are prioritized below innocent citizens’ lives.

If detractors of this tactic are worried

responses to an active shooter in their area. Officers must be authorized to enter an active shooter scene alone if necessary. The scenario of an officer in place to stop an active shooter but who hesitates breaking protocol for fear of sanction is not unlikely. LE must continue to adapt and train in order to respond as quickly and effectively as possible to active shooters, even if it is a single officer armed with standard patrol weaponry. •ABOut tHe AutHORMr. Stepien is a police officer in the Denver area and holds a Master’s Degree in International Security from the University of Denver.

eNDNOteS1 Magnie, Mark, and Sharma, Subhash.

“India terrorist attacks leave at least 101 dead in Mumbai.” Los Angeles Times 27 Nov 2008 accessed.08 aug 2009. <http://articles.latimes.com/2008/nov/27/world/fg-mumbai27>.

2 Giduck, John, and Chi, Walter. “after action review: an evaluation and Assessment of the Law Enforcement Tactical response to the Virginia Tech university Shootings of monday, 16 april 2007.” Archangel Group, Ltd. 05 Sep 2008 accessed.01 jan 2009. <www.antiterrorconsultants.org>.

3 marbut, Gary. “Testing reality Potential ‘Active Shooter’ Toll,” The Montana University System and Firearms Authority, Policy, Discussion, and conclusions, 2008.

http://progunleaders.org/university/Testingreality.html

4 Ibid.5 o’brien, robert. “active Shooter

response revisited-Part 1.” Police: The Law Enforcement Magazine 05282008 accessed.17 Feb 2009. <http://www.policemag.com/channels/SWaT/2008/05/28/active-Shooter-response-revisited-Part-1.aspx>.>.

6 Giduck, John. Terror at Beslan. 1. canada: archangel Group Inc., 2005. Print.

about friendly fire, their concern is justified. If anyone has gone through a shoot house with live fire, under any amount of stress (not to mention the immense stress inherent in a school shooting), they are aware of how difficult it is to discriminate between a target holding a gun and a target holding a gun and a badge. However, target discrimination is what officers train for, and in a setting with hundreds, perhaps thousands, of people, it will undoubtedly be in the forefront of every officer’s mind. Perpetrators have the luxury of keeping their finger on the trigger, LE officers do not. This is a hazard every officer must accept.

There is no more important asset to America than its youth. There is also no softer target and no higher guarantee of media coverage than an attack on its schools. A formalized solo-entry tactic must be implemented to prepare for the entire scope of possibilities of response to the next school shooting or any possible active shooter scenario. New training with this possibility in mind must be disseminated. In addition to ron borsche’s offerings, Israeli police and security forces have operated with this paradigm in mind for some time and numerous veterans of these forces currently offer the Israeli perspective on the matter. At the very least, a dialogue must occur within individual departments regarding the many possible

there is no more important asset to

America than its youth. there is also no softer target and no higher guarantee of media coverage than an

attack on its schools.

Page 64: The Counter Terrorist Magazine - December/January 2010

64 The Counter Terrorist ~ December 2009/January 2010Circle 215 on Reader Service Card

Page 65: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 65

Innovative Products

interface. They can be used to simulate improvised explosive devices, unexploded ordnance, and indirect fire such as artillery. These simulators are intended to be safe to use near buildings, windows and personnel (with reports up to 130 decibels) and an operating cost of only 10 cents per shot. www.explotrain.com

exPLOtRAiN exPLOSive BLASt SiMuLAtORS

Explotrain simulators are designed to be a realistic, cost effective and safe method for simulating a variety of explosive device threats. The Simulators are computer controlled, gas powered and operated by remote transmitters, triggering devices or computer

he field of Homeland Security is inundated with a bewildering range of technologies, including everything from smart video, biometrics, millimeter wave and backscatter, to varying detection equipment such as biological, chemical and explosive.

to enhance our readers’ familiarity with new technologies and products, a committee at SSi has chosen to highlight the following products in this, the innovative Products section.

henry morgensternPresident

Security Solutions International (Publisher)

t

ALPHA ONe KNiFe The H3 alpha one is one of the first knife creations of the Pohl Force Company. Dietmar Pohl, 15 year veteran of the Solingen knife industry, designed the Alpha One in collaboration with U.S. and German special operations personnel. The 9.9 ounce knife features a 4.5 inch 440c blade. Each knife comes with a certificate featuring the individual knife’s serial number, control date and signature of Dietmar Pohl. He personally examines each knife prior to shipping. www.grouph3.com/knives.html

Page 66: The Counter Terrorist Magazine - December/January 2010

66 The Counter Terrorist ~ December 2009/January 2010

training review

Counter Terrorism Operations for SWAT Units by richard a. Ganey ii

law enforcement (LE) tactical teams possess an

impressive array of skills, techniques, and tools to deal with the threats that they typically encounter during their standard operations. Around the country, teams have shown a remarkable ability to adapt to new and evolving threats and situations in their areas of responsibility, such as the active shooters that we have seen all too often in the past few years. This adaptability demonstrates the professionalism and experience of those chosen to serve with tactical teams.

Though hardly a new threat, the post-9/11 reality of international terrorism perpetrated domestically has provided U.S. LE tactical teams with perhaps their greatest challenge to date. Forward-thinking teams have faced this challenge with a determination to be prepared for the day they are called upon to protect citizens in their charge from the threat of terrorists. These teams have understood that to truly be prepared to combat terrorism, they must adjust their existing capabilities to the realities of counter terrorism (CT) and acquire new capabilities as well. Though certain tactics and techniques utilized against criminal activity are transferable to the CT realm, there are many that would be ineffective and actually work to the benefit of the terrorists.

From october 2008 to october 2009, Security Solutions International (SSI) conducted 12 SWaT cT courses around the country with hosting agencies. The courses have been taught on the East Coast, on the West Coast and in the midwest, with a total of 48 le agencies participating. In addition to LEOs, members of federal agencies and the U.S.

military have taken part as well. The primary training objective of the SWAT CT course is to provide teams with operational tools, based on experience, for dealing with terrorists in their jurisdiction.

The curriculum reflects the international experience of SSI instructors who are veterans of U.S. and Israeli special operations and CT units. The tactics, techniques, and procedures (TTPs) presented are based on real-world experience in combating terrorism around the globe and across the operational spectrum, from high-risk terrorist arrests to terrorist hostage rescue (Hr). Instructors acquired their skills and knowledge through operations conducted in the United States, europe, Israel, lebanon, Gaza/West Bank, Iraq, Afghanistan, and elsewhere. Utilizing personal experience

as the primary instructional platform, the absolute emphasis is on placing global CT experience into the context of the domestic, local reality. This includes complex operational scenarios combining restrictive rules of engagement and use-of-force parameters.

The training commences with classroom presentations on CT operations to include dealing with suicide terrorists. Case studies are utilized to facilitate discussion on the unique facets of fighting terrorism that require altering traditional LE TTPs. Participants are encouraged through a dynamic classroom environment to “think outside the box” that they are familiar with. Case studies and specific operational examples are used throughout the course to explain TTPs presented and to place them into context for the students. The morning session of the first day includes a presentation of the

u.s.

Operator provides security to EOD technicians dealing with a booby trap hostage. Photo: Courtesy of SSI.

Page 67: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 67

topics to be addressed during the course and the rationale behind them. Students are also briefed on safety procedures that will guide them during the scenario-based training exercises.

The afternoon session of the first day opens with a safety brief and inspection, followed by movement to the training facility. The first subject introduced is a method of clearing a structure, which is alternately referred to as “secure search” or “deliberate clearance.” This method places an emphasis on techniques that maximize force protection and minimize exposure to threats during operations dealing with terrorism, whether serving arrest warrants or search warrants involving terrorist elements. Emphasis is placed equally on mission accomplishment and mitigating

risks to team members. Techniques are taught through

fundamentals that are relevant and critical to all tactical movement and engagement of threats. This teaching methodology not only increases understanding of the efficacy of the techniques, but also aids in applying them to varying contexts and circumstances. All scenarios are initiated with a short brief to place the students in context and to provide them with clear rules of engagement, two critical elements affecting real-time decision making.

The second topic introduced is containment and isolation of the target structure. An emphasis is placed on detailed planning, control measures, and positioning of elements to maximize containment and provide safe fields

of fire 360˚ around the objective. The students are introduced to both stealth-approach techniques and rapid-vehicular options which maximize surprise, thereby increasing the probability of successful containment and preventing escape of the terrorists. Subsequent to containment, callout procedures specific to CT and potential suicide terrorists are discussed and practiced.

A third topic presented is terrorist Hr, including bus assaults and structure assaults. Building on existing team skills, advanced bus Hr techniques are taught with a focus on simultaneous assault from all sides in a safe and effective manner in order to overwhelm the threat before he can begin executing hostages or detonate an explosive charge. •

Circle 85 on Reader Service Card

A scenario debrief. Photo: Courtesy of SSI.

Page 68: The Counter Terrorist Magazine - December/January 2010

68 The Counter Terrorist ~ December 2009/January 2010

Official Journal of the Homeland Security Professional

Counter TheDecember 2009/January 2010

Volume 2 • Number 6

AD

Vert

iser

inD

ex RSN Ad/Company Pg Number175 Ahura Scientific ins Frt Cvr95 ALS technologies inc 337 Avon Protection Systems 93 AWC Systems technology 91 Blauer Manufacturing Co Pg 467 CellAntenna (new ad) Front 50123 Centertech (2nd Ad) 89 Counter terror expo 2010 87 Degrata tactical inc Front 50159 Delta Nu ins Bck L161 eagle industries 163 ear Phone Connection 135 eSRi 307 explotrain 85 extendo Bed 165 eyeOn LLC 83 Golden engineering 81 icor technology 233 ideal Products 155 J&N 341 Lenco industries 65 Lloyd’s Maritime Academy (new ad)79 McGard 167 Minto Research 153 Nivisys 77 NtOA 2010 Ad 309 Omni Distributors 75 Oshkosh Corporation 343 OSSi 169 P&R technologies 127 Patriot 3 (with colors) Bck Cvr141 Pistol Cam 109 Police One Front 50191 Policetraining.net 301 PR Corporation (2nd Ad -f grenades)73 Remotec 315 Res-q-Pack 101 Scanna MSC 243 Secure Search 171 SSi BlastSax 295 SSi Corp Ad 131 SSi FloodSax 215 SSi Homeland Security training in israel117 SSi Suicide terror (Henry Book) 179 SSi SWAt Counter terrorism Course143 SWAt Headsets 99 tactical electronics ins Frt R345 telluric Group 349 the Armored Group 69 u.S. explosive Storage 139 zistos Corp (vert) 71 z-Medica ins Bck Cvr

Page 69: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 69

Individual techniques are tied together in full profile exercises, both dry fire and using Simunition. Techniques taught for terrorist Hr operations in structures also build on existing LE TTPs, altering and adapting them to the CT reality, particularly the presence of explosives and multiple breach points.

The subject of suicide terrorist interdiction is addressed through the scenario of a suicide cell en route to its target in a vehicle. The fundamentals of the interdiction are explained and demonstrated, with a military style L-shaped ambush as the basis. The effectiveness of the technique is shown while dealing with several different contingencies during scenarios. In addition to TTPs, relevant technologies that contribute to the success of the mission and the safety of the team are discussed. As with all topics, numerous examples from the personal experience of the instructors are presented to aid in explaining the realities of dealing with suicide terrorists.

The course culminates on the last day with a “rolling exercise,” which incorporates several scenarios tied together through intelligence provided by instructors and information discovered during preceding scenarios. As an example, the day may open with an Hr operation leading to information on cell

leaders who planned the hostage taking. The students are given the mission of arresting these leaders in their safe house, where they will find information on a suicide terrorist cell due to launch its attack. After interdicting the cell en route to its target, the interrogation of one terrorist who surrendered provides information on an additional safe house that doubles as an explosives lab that must be neutralized.

Throughout the week of training, liberal use is made of role players, pyrotechnics, simulated explosive devices, flash bangs, and Simunitions to add realism and to provide context. After each scenario is run, quick debriefs are conducted to ensure lessons are learned. Those lessons are then integrated into subsequent scenarios for reinforcement. The course begins with basic CT TTPs and progresses through increasingly complex scenarios that build one upon another. A crawl, walk, run progression from a focus on individual skills to team-level techniques is employed to ensure that the material is absorbed by students. Time is set aside on the last day to evaluate the course, and to discuss lessons learned throughout the week and possible methods for their implementation in future operations.

While many aspects of operations combating terrorism overlap traditional

tactical LE operations, SWAT teams must recognize those elements that are particular to terrorism. CT, in the past a responsibility solely of military special mission units and dedicated federal government organizations, is now understood to be well within the realm of local LE in the United States. Experience has shown that the first responders to a domestic terrorist event, the tip of the homeland security spear, will be local LE teams. It is imperative that teams plan and prepare to successfully engage terrorists in their jurisdiction. SSI’s SWAT Counter Terrorism Operations Course provides teams with a valuable base of knowledge and tools for developing capabilities critical to CT operations. •ABOut tHe AutHOR

Mr. Ganey has more than 28 years of military experience in the United States and Israel. He retired last year from the Israel Defense Forces with 18 years’ of service with special operations and counter terrorism units. He holds a BA in International Affairs, an MA in Middle East Studies, and is pursuing a PhD in Middle East History. He currently leads SSI Basic and Advanced CT courses.

(850) 862-5344 www.explotrain.com

The most Effective, Economical and Realistic Explosive Effects

Simulators available... Anywhere.

130 Decibels

10 Cents per Shot

Non Explosive and Non Pyrotechnic

Safe to use Indoors & Near Buildings

Simulates Virtually any type of IED

Wireless Remote Controlled

Remote Triggering/Initiation Capability

Used by hundreds of US Military, Special Forces and Law Enforcement personnel

Circle 307 on Reader Service Card

Page 70: The Counter Terrorist Magazine - December/January 2010

70 The Counter Terrorist ~ December 2009/January 2010

Rapid Material Identi�cation on the Front Line

When you need answers NOW the ReporteR provides rapid analysis of unknown materials. Suspicious materials testing by crime labs can take up to several weeks. Other material ID systems are bulky and di�cult to use in the �eld. The palm-sized ReporteR, featuring DeltaNu’s patented technology*, rapidly identi�es unknown substances in seconds with the push of a button.

• Non-destructive technique, scans samples through containers (i.e. plastics bags) • Range of applications, extensive library includes explosives, chemicals, narcotics, etc. • Intuitive user interface, easy to read display • Palm-sized, lightweight device (14 oz.) • Low cost, a�ordable system

For more information on the ReporteR visit the DeltaNu website at www.deltanu.com or sendand email to [email protected].

*US patent no. 7403281

www.deltanu.com

Rapid Material Identi�cation on the Front Line

When you need answers NOW the ReporteR provides rapid analysis of unknown materials. Suspicious materials testing by crime labs can take up to several weeks. Other material ID systems are bulky and di�cult to use in the �eld. The palm-sized ReporteR, featuring DeltaNu’s patented technology*, rapidly identi�es unknown substances in seconds with the push of a button.

• Non-destructive technique, scans samples through containers (i.e. plastics bags) • Range of applications, extensive library includes explosives, chemicals, narcotics, etc. • Intuitive user interface, easy to read display • Palm-sized, lightweight device (14 oz.) • Low cost, a�ordable system

For more information on the ReporteR visit the DeltaNu website at www.deltanu.com or sendand email to [email protected].

*US patent no. 7403281

www.deltanu.com

Rapid Material Identi�cation on the Front Line

When you need answers NOW the ReporteR provides rapid analysis of unknown materials. Suspicious materials testing by crime labs can take up to several weeks. Other material ID systems are bulky and di�cult to use in the �eld. The palm-sized ReporteR, featuring DeltaNu’s patented technology*, rapidly identi�es unknown substances in seconds with the push of a button.

• Non-destructive technique, scans samples through containers (i.e. plastics bags) • Range of applications, extensive library includes explosives, chemicals, narcotics, etc. • Intuitive user interface, easy to read display • Palm-sized, lightweight device (14 oz.) • Low cost, a�ordable system

For more information on the ReporteR visit the DeltaNu website at www.deltanu.com or sendand email to [email protected].

*US patent no. 7403281

www.deltanu.comCircle 159 on Reader Service Card

Rapid Material Identi�cation on the Front Line

When you need answers NOW the ReporteR provides rapid analysis of unknown materials. Suspicious materials testing by crime labs can take up to several weeks. Other material ID systems are bulky and di�cult to use in the �eld. The palm-sized ReporteR, featuring DeltaNu’s patented technology*, rapidly identi�es unknown substances in seconds with the push of a button.

• Non-destructive technique, scans samples through containers (i.e. plastics bags) • Range of applications, extensive library includes explosives, chemicals, narcotics, etc. • Intuitive user interface, easy to read display • Palm-sized, lightweight device (14 oz.) • Low cost, a�ordable system

For more information on the ReporteR visit the DeltaNu website at www.deltanu.com or sendand email to [email protected].

*US patent no. 7403281

www.deltanu.com

Rapid Material Identi�cation on the Front Line

When you need answers NOW the ReporteR provides rapid analysis of unknown materials. Suspicious materials testing by crime labs can take up to several weeks. Other material ID systems are bulky and di�cult to use in the �eld. The palm-sized ReporteR, featuring DeltaNu’s patented technology*, rapidly identi�es unknown substances in seconds with the push of a button.

• Non-destructive technique, scans samples through containers (i.e. plastics bags) • Range of applications, extensive library includes explosives, chemicals, narcotics, etc. • Intuitive user interface, easy to read display • Palm-sized, lightweight device (14 oz.) • Low cost, a�ordable system

For more information on the ReporteR visit the DeltaNu website at www.deltanu.com or sendand email to [email protected].

*US patent no. 7403281

www.deltanu.com

Page 71: The Counter Terrorist Magazine - December/January 2010

The Counter Terrorist ~ December 2009/January 2010 71

Z-Medica Corporation 4 Fairfield Boulevard Wallingford, CT 06492

Stopping Power You Can Trust.QuikClot® hemostatic agent the leader in hemostasis, rapidly and effectively stops bleeding. The absorbent dressings are easy-to-use and easily removed once the bleeding is controlled. With over 1.5 million units sold, QuikClot® hemostatic dressings have saved countless lives.

QuikClot® Combat Gauze: Saving the Lives of those Protecting Us.

For more information contact us at 203-294-0000 or visit us on the web at www.z-medica.com.

Z-Medicacounterterrorist10-21-09.indd 1 10/21/09 3:40:17 PM

Circle 71 on Reader Service Card

Page 72: The Counter Terrorist Magazine - December/January 2010

72 The Counter Terrorist ~ December 2009/January 2010

OUTSIDE VIEWwings open

The XPS Series: The most maneuverable rifle threat shields on the market today.

Introducing Patriot3’s X-treme Protection Series (XPS) Shield Line. The first high-threat protection designed for ease of use and superb mobility. The XPS’s unique, Patent Pending design incorporates the first ever, Folding Ballistic Wings. These Ballistic Wings are added to the XPS Base Unit to provide a wide area of coverage beyond that of the base unit. With the rotation of Patriot3’s revolutionary wing-deployment mechanism, the Ballistic Wings can be folded backwards to reduce the width of the shield enabling passage through commercial doorways. Once through the door, the Ballistic Wings are immediately re-deployed providing a wide area of coverage of up to 66” or three operators wide. In addition, each of the XPS Ballistic Wings can be removed instantly with one hand, allowing the XPS to split into as many as 4 separate hand held shields (NIJ 3 only) allowing team members to break away with ballistic protection to clear additional areas, simultaneously. The XPS Base Unit has several options such as Ballistic Gun Port, Lighting System, Folding Ballistic Wings, Ballistic Wing View Ports and Ballistic Wing Handles (NIJ 3 only).

XPS-G2X-treme Protection Series

OPTIONS:• GUN PORT• LIGHT SYSTEM• BALLASTIC WINGS

U.S. PATENT PENDING

INSIDE VIEW

wings open

wings closed

Meet Extreme with X-treme:

www.patriot3.com Contact Patriot3 to learn more about our X-treme Protection Series. email: [email protected]

Patriot3 is a Sole Source Provider for the XPS Shield Line. Circle 63 on Reader Service Card