the counter terrorist magazine - december/january 2011

75
The Counter Terrorist ~ December 2010/January 2011 1 www.thecounterterroristmag.com POLICE TARGETED VIGILANT RESOLVE LOS ZETAS FRAUDULENT LIENS An SSI ® Publication DECEMBER 2010/NOVEMBER 2011 USA/CANADA $5.99 DEC 2010/JAN 2011 VOLUME 3 • NUMBER 6 Journal for Law Enforcement, Intelligence & Special Operations Professionals NORTH KOREAN ADVENTURES IN UNCONVENTIONAL WARFARE Counter e

Upload: solomon

Post on 01-Apr-2016

215 views

Category:

Documents


0 download

DESCRIPTION

Journal for Law Enforcement, Intelligence & Special Operations Professionals

TRANSCRIPT

  • The Counter Terrorist ~ December 2010/January 2011 1

    www.thecounterterroristmag.com

    POLICE TARGETED VIGILANT RESOLVE LOS ZETAS FRAUDULENT LIENS

    An SSI PublicationDECEMBER 2010/NOVEMBER 2011

    USA/CANADA $5.99

    DEC 2010/JAN 2011

    VOLUME 3 NUMBER 6

    Journal for Law Enforcement, Intelligence & Special Operations Professionals

    NORTH KOREANADVENTURES IN UNCONVENTIONALWARFARE

    DEC 2010/JAN 2011

    VOLUME 3 NUMBER 6VOLUME 3 NUMBER 6

    DEC 2010/JAN 2011DEC 2010/JAN 2011Counter Counter Counter e

    CTdecjan2011art.indd 1 10/25/10 11:25 AM

    creo

  • 2 The Counter Terrorist ~ December 2010/January 2011 Circle 104 on Reader Service Card

    FirstDefender RMX and FirstDefender RMNext generation Raman instruments enable rapididentification of unknown chemicals in the field.

    Every second matters.

    When time and safety are critical, military and civilian first responders

    use Thermo Scientific handheld chemical identification instruments to

    rapidly identify explosives, precursors, narcotics and other chemical

    hazards directly at the point of need.

    With more than 4,500 handheld chemical identification instruments

    deployed worldwide, we understand what first responders demand of

    their equipmentand why every second matters. These insights were

    key as we developed FirstDefender RM and FirstDefender RMX, our

    next generation Raman instruments, which are even faster and easier

    to use than ever before.

    For rapid, accurate analysis of a wide range of potential chemical hazards,

    turn to Thermo Scientific handheld instruments, formerly sold under the

    Ahura Scientific brand. To schedule a demonstration of our newest solutions,

    visit www.thermoscientific.com/ahura or call +1 (978) 642-1132.

    2

    010

    Ther

    mo

    Fish

    er S

    cien

    tific

    Inc.

    All r

    ight

    s re

    serv

    ed.

    Moving science forward

    CTdecjan2011art.indd 2 10/25/10 10:13 AM

  • The Counter Terrorist ~ December 2010/January 2011 3Circle 99 on Reader Service Card

    CTdecjan2011art.indd 3 10/25/10 10:13 AM

  • 4 The Counter Terrorist ~ December 2010/January 2011

    www.blauer.com 800.225.6715

    SeriouS CBrN ProteCtioN for CritiCal MiSSioNS

    ISO 9001:2008 Certified

    P R O T E C T I O N

    Homeland DefenderTM

    www.blauerhomelanddefender.com

    by

    XRT SuiT

    - Now ceRTified To AVoN c50 ANd fM12 ReSpiRAToRS

    - bReAThAble goRe cheMpAk fAbRic foR eXTeNded weAR

    - fRoNT-eNTRy deSigN wiTh iNTegRATed cbRN gloVeS ANd booTieS eNAbleS quick Self doNNiNg

    - No cheMicAl TApe

    - eXTRA STReNgTh fAbRic ANd SeAMS To pReVeNT blowouTS

    march_counter terrorist (homeland defender.indd 1 2/1/2010 1:15:28 PM

    Circle 66 on Reader Service Card

    CTdecjan2011art.indd 4 10/25/10 10:13 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 5

    Counter e

    44

    CO

    NTE

    NTS

    58

    COVER STORY: 32 NORTH KOREAN ADVENTURES IN UNCONVENTIONAL WARFARE By Jennifer L. Hesterman

    FEATURES:

    8 Firsthand: OPERATION VIGILANT RESOLVE By Abu Niza

    22 Case Study: HEMET POLICE DEPARTMENT IN THE CROSSHAIRS By Benjamin S. Smith

    44 LOS ZETAS: MASSACRES, ASSASSINATIONS, AND INFANTRY TACTICS By John P. Sullivan and Samuel Logan

    58 FRAUDULENT LIENS TARGET INVESTIGATORS By Ed UrbanDEPARTMENTS:

    6 From the Editor Law Enforcement, Intel and SOF

    30 Book Review Expeditionary Eagles: Outmanuveuring the Taliban

    69 Innovative Products Bogota Entry Tools, ITI Under-door Scope, Mountain House Meals

    72 Training Review Dutch SOF Visit, Board, Search and Seize

    Cover: ROK soldiers watching the border at Panmunjeom in the DMZ between North and South Korea.Photo: Globaljuggler

    32

    Journal for Law Enforcement, Intelligence & Special Operations Professionals

    DECEMBER 2010/JANUARY 2011VOLUME 3 NUMBER 6

    www.blauer.com 800.225.6715

    SeriouS CBrN ProteCtioN for CritiCal MiSSioNS

    ISO 9001:2008 Certified

    P R O T E C T I O N

    Homeland DefenderTM

    www.blauerhomelanddefender.com

    by

    XRT SuiT

    - Now ceRTified To AVoN c50 ANd fM12 ReSpiRAToRS

    - bReAThAble goRe cheMpAk fAbRic foR eXTeNded weAR

    - fRoNT-eNTRy deSigN wiTh iNTegRATed cbRN gloVeS ANd booTieS eNAbleS quick Self doNNiNg

    - No cheMicAl TApe

    - eXTRA STReNgTh fAbRic ANd SeAMS To pReVeNT blowouTS

    march_counter terrorist (homeland defender.indd 1 2/1/2010 1:15:28 PM

    8

    CTdecjan2011art.indd 5 10/25/10 10:14 AM

  • 6 The Counter Terrorist ~ December 2010/January 2011

    W

    FROM THE EDITOR:

    Law Enforcement, Intel and SOFBy Chris Graham

    Counter e

    Journal for Law Enforcement, Intelligence & Special Operations Professionals

    VOLUME 3 NUMBER 6 DECEMBER 2010 /JANUARY 2011

    EditorChris GrahamDirector of OperationsSol Bradman

    Director of AdvertizingCarmen Arnaes

    Director of ProductionKelli Richardson

    Contributing EditorsEeben BarlowJennifer HestermanRichard MarquiseSteve Young

    Graphic DesignMorrison Creative CompanyCopy EditorLaura TownO ce ManagerLily Valdes

    Publisher:Security Solutions International13155 SW 134th St. STE 204Miami, Florida 33186

    ISSN 1941-8639 e Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nations First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. Th e opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. 33186 or [email protected] Th e subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.

    For article reprints, e-prints, posters and plaques please contact:PARS International Corp.Web: www.magreprints.com/quickquote.asp Email: [email protected]: 212-221-9595 Fax: 212-221-9195

    Please visit the magazine web site where you can also contact the editorial sta :

    www.thecounterterrroristmag.com 2010 Security Solutions International

    elcome back to e Counter Terrorist. We live in interesting times. Th e United States, our allies, groups and individuals that

    value the freedom and the individual liberties articulated in the Constitution

    of the United States are under attack from a wide array of adversaries.

    e Counter Terrorist remains dedicated to supporting and refi ning the e orts of those who have sworn to support and defend the Constitution of

    the United States against all enemies, foreign and domestic, those who

    protect and serve and our brothers and sisters around the world who serve

    similar ideals. e Counter Terrorist will continue to cover transnational crime, criminal action of national signifi cance, acts of unconventional warfare

    and related disciplines.

    To do so, we are dependent upon you. When the experience of your

    duties provides insight that will benefi t others, share that experience here.

    I look forward to hearing from you.

    Semper Fidelis,

    Chris GrahamEditor of e Counter Terrorist

    CTdecjan2011art.indd 6 10/25/10 10:14 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 7Circle 132 on Reader Service Card

    SSI 2010 Course Offerings

    Circle 295 on Reader Service Card

    CTdecjan2011art.indd 7 10/25/10 10:14 AM

  • 8 The Counter Terrorist ~ December 2010/January 2011

    Counter e

    OPERATION VIGILANT RESOLVE

    Firsthand:

    May 6, 2004, Midnight, Fallujah, IraqI lay in darkness behind a tree, clutching my rifl e and watching silent Marines around me as I tracked the countdown. I checked my watch and closed my eyes. Our breaching charge exploded. I felt the shock and saw the fl ash through my eyelids.

    By Abu Niza

    A scout sniper team overwatches Marines in al-Anbar province Iraq. All photos courtesy of the author.

    CTdecjan2011art.indd 8 10/25/10 10:14 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 9

    I knew that each breath could be my last. ere was still no gun re. As I heard Marines issuing instructions and reassurances in Arabic, I kept moving north.

    Eric P, my 20-year-old radio operator, tagged along. He had experienced problems in the rigid world of the Marine Corps, but in the months to come, his tenacity would prove him to be the equal of our nest predecessors. We linked up with a two-man sniper team and silently made our way through the shadows, stepping over slum debris and navigating an urban maze.

    We reached the last strip of buildings on the main east-west highway dubbed Michigan. Eric and I tucked ourselves into the shadows to provide security for our companions as they crept up a collapsing set of concrete stairs. ey signaled down and we moved up to the roof. We had a commanding view of the highway and much of the city to the north.

    And then the curtain dropped. To our immediate right on the opposite side of the highway a volley of rocket-propelled grenades (RPGs) erupted. Green tracers of automatic re poured from the enemy positions. e noise was thunderous and unmistakable.

    is was a heavily armed enemy positioned to ambush tra c coming into the city. e enemy had glimpsed Col. Toolans element in the direction of the compound our Marines were clearing to the southeast, but it did not detect us.

    I spoke into my radio to the AC-130 above while S, our congenial sniper who looked young enough to be at home in study hall, released his rst shot.

    There was no longer any conceivable legal or moral justifi cation for sparing terrorist combatants returning to a gunfi ght.

    arines were now pouring through the

    hole in the courtyard wall. I followed them in. Clusters of Marines were stacked on each structure. is unknown compound was one of the rst objectives of what was later titled Operation Vigilant Resolve.

    e sounds of breaking glass and hooligan tools ripping open locked doors were interspersed with the sounds of ashbangs. It was exhilarating, yet

    arines were now pouring through the

    hole in the courtyard wall. I followed M

    CTdecjan2011art.indd 9 10/25/10 10:14 AM

    creo

  • 10 The Counter Terrorist ~ December 2010/January 2011

    A terrorist in the middle of firing a burst fell lifelessly behind a wall. As the gunship orbited invisibly overhead, the short wall covering the ambushers erupted in a 20-foot shower of sparks.

    Night turned to day as hundreds of rounds of automatic cannon fire ripped precisely through the ambushers. S cycled the bolt on his Remington rifle and cracked off a second shot.

    A terrorist fell clutching his side. Immediately, a pair of hands dragged him behind cover. Both snipers scanned for targets.

    Three of the remaining ambushers loaded into a battered white pickup and

    made a run to the west. With the rules of engagement we were operating under that day, I did not authorize the gunship to fire on the vehicle as it disappeared into the city, but I instructed it to follow the truck.

    The pickup drove downtown to one of the mosques and then turned back. There was no longer any conceivable legal or moral justification for sparing terrorist combatants returning to a gunfight.

    I nodded to the second sniper, a self-assured rancher we called Sgt. E, and spoke the words, Slayer, clear to engage to the gunship crew.

    The cowboy sniper put a thundering

    Marines clearing rooms in Fallujah.

    CTdecjan2011art.indd 10 10/25/10 10:14 AM

  • The Counter Terrorist ~ December 2010/January 2011 11Circle 49 on Reader Service Card

    CTdecjan2011art.indd 11 10/25/10 10:14 AM

  • 12 The Counter Terrorist ~ December 2010/January 2011

    The Counter Terrorist_Lenco_2010.indd 1 1/28/2010 10:50:42 AM

    Circle 13 on Reader Service Card

    CTdecjan2011art.indd 12 10/25/10 10:14 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 13

    The Counter Terrorist_Lenco_2010.indd 1 1/28/2010 10:50:42 AM

    August Mission: August 21-29, 2009November Mission: November 6-14, 2009

    .50 caliber Raufoss round through the engine block of the pickup. Instantly halted, it exploded with the direct hit of Slayers high-explosive round from the night sky.

    The driver sprinted into the nearest buildings entrance. A second round from the invisible aircraft slammed precisely into the truck and set it ablaze.

    The flickering light revealed our final ambushers haven to be a hospital. He was safe for the moment. The engagement had been won. No Marines were injured, and all but one of the ambushers appeared to have been killed.

    My radio operator whispered holy shit, and I grinned back and nodded, pretending this was just another day at the office. The remaining hours of darkness passed uneventfully. Sunrise revealed a line of Marines standing as

    far as I could see along the roofline with bayonets fixed and weapons at the alert.

    On our third day in the city, I found myself peering from behind the decaying hulk of a junked car. I looked across the rooftops of Fallujah. Even with the abundant squalor I couldnt guess why people had moved trashed cars and auto parts to the rooftops.

    With my radio operator and two-man sniper team, I watched the sunrise, looking forward to the warmth of daylight.

    I savored the moment, reflecting on the fact that this might be the last sunrise I would experience. Since our initial exchange with the terrorists, we had moved our position frequently and exchanged occasional shots with enemy harassers.

    As the cold night gave way to a

    Marines stockpile captured weapons.

    comfortable day, I was given a folded note. I was passed the congratulations of battalion staff members for a comparatively minor previous engagement and apprised of the aircraft that would be supporting us for the rest of the day. In addition, I was reattaching to the element that would be taking over the battalions main effort in the attack. The adrenaline flow that came from walking into the violent unknown kicked in again.

    Eric and I climbed into the back of 1st Lt. Josh Gs Hummer. Lt. G., a very professional young officer who went by the call sign of Red Cloud, was going to lead this part of the attack. Riding in the third Hummer from the front, we raced westward on Michigan toward the center of town. I forced myself to breathe deeply and overcome the hollow feeling

    CTdecjan2011art.indd 13 10/25/10 10:15 AM

  • 14 The Counter Terrorist ~ December 2010/January 2011 Circle 112 on Reader Service Card

    in my stomach as we all waited for the rst shots. Mobs we had seen earlier had dispersed. e city appeared to be a ghost town again.

    We paused brie y as Marines dismantled a barricade of cinder blocks that had been placed in our way. At the

    center of Fallujah, we passed an enormous blue-tiled mosque. We had been familiar with the mosque because of its incessant speaker messages promising paradise for anyone who killed an American. Two tanks that were supposed to rendezvous with us were nowhere to be seen, but Red Cloud refused to slow our momentum. In front of the mosque, we turned south on a road dubbed Violet.

    e silence was broken. Ri e and RPG re cut through the air. I attempted to reach our helicopters on my radio. For all the incoming rounds, targets were elusive. e two lead Hummers opened up with disciplined bursts of machine-gun re. My engine was instantly killed by enemy gun re. e terrorists were ring from hidden positions. e volume of enemy re increased and we needed to back o the street. e two lead Hummers were reversing, while we sat dead in the road. e second hummer slammed into us

    corbon.com 800.626.7266

    Fighting terrorism is a full time job, so choose a bullet that performs with every shot.

    When fired at heavy barriers like drywall, plywood, auto steel and auto glass, DPX

    ammunition penetrates from 12 18 whileretaining 100% of its original weight.

    Now thats one hard working bullet!

    See us at the Shot Showin Las Vegas

    Booth 14571

    Jesse iry, Matthew Serio, Chris Ramos, and Shane Goldman: four brave Marines killed in action in al-Anbar province, Iraq on 5 April 2004.

    CTdecjan2011art.indd 14 10/25/10 10:15 AM

  • The Counter Terrorist ~ December 2010/January 2011 15Circle 8 on Reader Service Card

    Circle 8 on Reader Service Card The Counter Terrorist ~ December 2010/January 2011 15Circle 8 on Reader Service Card

    Circle 8 on Reader Service CardCircle 98 on Reader Service Card

    CTdecjan2011art.indd 15 10/25/10 10:15 AM

  • 16 The Counter Terrorist ~ December 2010/January 2011

    back to ring my ri e. I watched three RPG rounds explode on a telephone pole diagonally in front of me. A distant part of my mind was amused, thinking that the enemy gunner would have been unlikely to be able to deliberately perform that feat, and that a platoon of Marines had been given cover by a single telephone pole.

    I picked up the radio and the Cobras informed me that they would not be ying downtown.

    A Marine M203 gunner red a 40-mm grenade in a softball-like arc at the open window of an enemy gunner. It looked like it would go low; our re tapered o , and we collectively inhaled. e round made the window and we cheered like spectators and resumed ring.

    One of the tanks moved forward to our right and red a round that raised a dust cloud where that enemy position

    and launched us rearward. We made it back around the corner onto Michigan.

    Shielded from re, our two tanks joined us. ey hesitated to lead, so with our Hummer towed by chains and Red Cloud directing the tanks on foot, we led the way back onto Violet.

    With small arms and RPG rounds ying everywhere, we were stationary in the middle of the road. Every Marine was ring at the muzzle ashes of concealed terrorists. I paused from ring to try the radio again. I thought through everything I was going to say and then deliberately spoke slowly so as not to give the impression to the Marines around me that the hundreds of rounds passing between us were cause for concern. ere was no way anyone could hear me over the barrage of machine-gun re and explosions.

    I threw down my radio and went

    Circle 81 on Reader Service Card

    Protective security equiPmentAt ICOR, we understand that the outcome of your mission depends on the performance of our products. Thats why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support.

    CALIBER Robot Hook&LineKits SearchMirrors EODHandTools SearchKits

    ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3Tel: 613.745.3600 I Fax: 613.745.3590 I Email: [email protected] Toll Free: 1.877.483.7978 www.icortechnology.com

    With small arms and RPG rounds fl ying

    everywhere, we were stationary in the

    middle of the road.

    CTdecjan2011art.indd 16 10/25/10 10:15 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 17Circle 120 on Reader Service Card

    had been. According to the plan, A Company was racing to clear the remainder of the city to our southeast and catch up to us. Eric and I ran to a nearby building and scaled the outside of it.

    With rounds still flying, I positioned myself on an awning on the protected side of the structure, able to see over the top, but retaining two walls of protection. Eric jumped on the roof and I ordered him back. As he joined me, machine-gun fire ripped through his previous position.

    With Eric next to me on the awning, we found an AK-47 round embedded in the accessory rail on his rifle. I convinced the Cobras to come in and threw a smoke grenade to mark our position. It rolled into a hole and fell inside the building doing no good.

    I directed the helicopters in for one pass. With the terrorists spread throughout the city, the gunships had limited value. They faced a volley of RPG airbursts as they flew through, but the Marines were grateful for the assistance.

    Eventually, the enemy fire died out.Shortly after we had begun our push

    through the terrorist haven we were told that city fathers had approached the Iraqi governing council and coalition forces to negotiate on behalf of the terrorists. Our offense was suspended and we simply held our positions. The cool weather became scorching and a daily monotony set in.

    We slept on piles of debris on rooftops and feasted on Meals Ready to Eat (MREs). Marines began rotating to a forward operating base (FOB) for a shower and a meal. After the Marines had the opportunity for rejuvenation, the officers began rotating to the FOB also. I was able to replace a tooth filling I had lost a couple of weeks earlier and check my e-mail. I was ecstatic. My girlfriend was in love with me at that time and my inbox was full of her sexy plans for my

    return to the United States. I returned to the city with a smile on my face.

    The daily tedium was intermittently broken by bizarre events. We grew accustomed to shooting snipers and others who attacked us during the cessation of hostilities, and we occasionally shifted positions to dodge

    CTdecjan2011art.indd 17 10/25/10 10:15 AM

  • 18 The Counter Terrorist ~ December 2010/January 2011 Circle 144 on Reader Service Card

    COUNTER TERRORISMAND SECURITY

    2nd Annual

    REGISTER NOW QUOTING 'MKCT' Tel +44 (0)20 7307 4668 email [email protected] Online www.thedefencealliance.com/cts

    Wednesday 17 and Thursday 18 november, 2010 london, UK

    Ensuring maximum protection against attacks in an uncertain world though effective detection and prevention strategies

    MKCT_HP_CTER110conf Ad.indd 3 28/9/10 09:25:58

    mortar and RPG attacks. We were ordered to shoot only terrorists who were displaying hostile intent. Terrorists began to move openly with AK-47s in hand.

    We regularly observed armed terrorists emerging from their favorite taxi: the Red Crescent ambulances. We continued to plan and stand by for the resumption of the o ensive. We received reports that the terrorists were using the time to fortify their positions and booby trap the remaining portions of the city.

    We were told that the terrorists agreed to surrender their weapons and in return a small number of families would initially be allowed to return to the city the following morning. When almost no functioning weapons were turned in, we were surprised to see the stream of people passing our position back into the

    city. Fifty families at a time consisting of up to 50 people each were allowed back into the city anyway. Many of the families I observed consisted solely of males in their 20s and 30s. Each day more were allowed in.

    Mosques were abundant enough in Fallujah that one was never deprived of their almost continuous speaker messages. Allah Akhbar, God is greatest, was common and we all grew to recognize the regular calls to prayer. We listened with interest as exhortations to murder those who supported the new Iraqi government were translated to us. On one occasion, when Marines were forced to defend themselves against a terrorist attack, our translator shared the mosques immediate message, ank you for your sacri ce. Come to me. Come to methe results of a gun ght being a foregone

    I observed an armed terrorist crawl

    up to our position in the dark and yell

    Help me, help me in English in an attempt to draw us

    into an ambush.

    CTdecjan2011art.indd 18 10/25/10 10:15 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 19

    Circle 3 on Reader Service Card

    CTdecjan2011art.indd 19 10/25/10 10:15 AM

    creo

  • 20 The Counter Terrorist ~ December 2010/January 2011Awarded Special Prize for Innovation at 2010 European Land Robot Trials www.macrousa.com

    Circle 44 on Reader Service Card

    5 day/night cameras with 4X digital zoom 360FOV Micro UGV class (6 lb weight) Submersible to IP67 Complies to over 30 MIL-STDs Fielded system part of large Military program Only Micro UGV on the market with COFDM Video links (250 mt LOS and150 mt NLOS range) Audio IR LED lights 4WD EMI and EMC tested Built to withstand multiple 2.5 mt drops on concrete Integrates into common CDS controller with all MacroUSA MOUT line Integrates into C4ISTAR with Open Architecture 4 hr UGV battery duration (standard mission average)

    Scorpion S-UGV:The Scorpion is a 6x6 UGV, equipped with 2 high resolution day/night cameras, COFDM audio / video transmission, thermal camera & a 27X zoomcamera. It is designed for surveillance, inspection & reconnaissance missions intended to extend the operators SA & increase his safety. 6x6 UGV Control Station 500 mt. Fibre Optic Spool EO Turret 10 Kph speed Integrates into common CDS controller with all MacroUSA MOUT line Integrates into C4ISTAR with Open Integrates into C4ISTAR with Open Architecture Architecture

    Armadillo Micro UGV:TTC Throwcam Nano UGV:

    MACRO USA CORPORATION5930 Price AvenueMcClellan, CA 95652, USAPhone: 916-333-5950Toll Free: 877-840-8006

    Complies with over 30 MIL-STDs. Nano UGV Class (1.1 lb) 360continuous rotation day/night camera with 4X digital zoom Automatic image inversion Smallest UGV on the market with COFDM Video links (150 mt LOS and 100 mt NLOS) Audio IR LED lights EMI and EMC tested survives multiple 2.5 mt drops on concrete Throwable up to 5 meters high Integrates into common CDS controller with all MacroUSA MOUT line Integrates into C4ISTAR with Open Architecture 1 hr UGV battery duration (continuous rotation)

    CTdecjan2011art.indd 20 10/25/10 10:16 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 21

    Available in

    Circle 171 on Reader Service Card

    conclusion, even for the supporters of the terrorists.

    I observed an armed terrorist crawl up to our position in the dark and yell Help me, help me in English in an attempt to draw us into an ambush. The daily heat and monotony contrasted sharply with the surreal qualities of bizarre events. I was told that the news of the two bridges on the west of Fallujah being dropped to prevent terrorist escape was premature and that had not been approved. I was updated daily on our newest plans for the offensive until the end of the month approached.

    I was on the roof of a hotel just south of the Blue Mosque at the center of Fallujah. Eric and two, two-man sniper teams scanned the darkness for our next attackers. As I lay on my stomach looking through a thermal scope, a Marine called to me from inside the ladder well. I crawled over to him. He told me we

    were withdrawing. There was a Hummer waiting for us behind the building. I couldnt believe it. In a matter of minutes the Marines left Fallujah.

    First Marine Expeditionary Force Commander (later promoted to commandant) Lt. Gen. James Conway publicly expressed regret that we were ordered to leave the city to the terrorists. I may be alive today because of that order. Some lives were certainly spared for the short term because of it, but our commanders sentiment coursed through our veins.

    After the Battle of Fallujah, I reattached to an element raiding and patrolling against Abu Musab al-Zarqawis organization and other terrorists in the surrounding areas. I submitted Eric for the Navy Commendation Medal for valor for his cumulative acts of bravery during this Iraq tour. He received it and immediately volunteered for

    another deployment. I rotated to a new assignment, returning for a third tour in Iraq commanding an Anti-Terrorism Task Force in Diyala province.

    My Iraq tours taught me many lessons. Those involved in counter-terrorism work must understand that we face a determined enemy. This enemy makes great use of deception. This enemy exploits vulnerabilities in our cultural, religious, and moral presuppositions.

    I will never forget the Marines we lost. Every day, I think of our brothers who came home with wounds far greater than my own. I am proud to have served with men willing to risk all to oppose evil.

    About the AuthorAbu Niza (pseudonym) is the former

    commander of a US military anti-terrorism unit.

    CTdecjan2011art.indd 21 10/25/10 10:16 AM

    creo

  • 22 The Counter Terrorist ~ December 2010/January 2011

    Case Study:

    Counter e

    By Benjamin S. Smith

    e City of Hemet. Photo: Jstroudr

    IN THE CROSSHAIRSIN THE IN THE Hemet Police DepartmentCase Study:

    By Benjamin S. Smith

    IN THE CROSSHAIRSCROSSHAIRSIN THE Hemet Police Department

    CTdecjan2011art.indd 22 10/25/10 10:16 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 23

    Hemet is a city of 75,000 people located in Riverside County, California.1 The Hemet police force has 68 offi cers,2 some of whom are assigned to the Hemet-San Jacinto Valley Gang Task Force.3This is one of eight gang enforcement teams located throughout the county.4

    T he gang task force headquarters was located in an unmarked building. On December 29, 2009, about 100 members of the Vagos motorcycle gang attended a funeral that happened to be across the street from the headquarters. O cers did not attend the service, but they did monitor it.6

    On December 31, 2009, a gas line was unhooked from a roof-mounted heating system. A hole was drilled into the attic and the gas was turned on, lling the building.7 O cers noticed the gas odor and called the re department. ere was no explosion.

    On February 23, 2010, a zip gun-type device in handgun caliber was attached to the sliding metal pedestrian gate going into the headquarters. e booby trap red a bullet, missing a police o cer.

    e gang task force headquarters was moved to a new, unmarked location where extra security precautions were reportedly implemented.8

    On February 25, 2010, Riverside County District Attorney Rod Pacheco and California Attorney General Edmund G. Brown, Jr., announced a $200,000 reward in hopes of gaining useful assistance with the cases.9 Police believed the threat involved area gang members and placed several under investigation. Pacheco said gangs had become more aggressive in carrying out attacks on law enforcement, which he compared to attacks on Mexican authorities in Mexicos ongoing drug wars.10

    On March 5, 2010, a bomb11 was discovered attached to an unmarked police car. e device was described as a

    While many details of the targeting of the Hemet Police Department are still undisclosed, it is an instructional series of events.

    IN THE CROSSHAIRS

    CTdecjan2011art.indd 23 10/25/10 10:16 AM

    creo

  • 24 The Counter Terrorist ~ December 2010/January 2011

    pipe bomb and had not exploded. It was apparently attached to the vehicle when the officer stopped at a store.12

    On March 17, 2010, local, state, and federal officers raided Vagos members suspected of parole violations.13 On March 21, 2010, an unidentified caller phoned 911 and stated that a police car would be blown up in the next 48 hours.14 The threat was believed to be retaliation for the raid on the Vagos gang members.15 No police vehicles seemed to have been targeted in relation to the call.

    On March 24, 2010, four code enforcement trucks with the city seal and amber lights were set on fire.15 On April 13, 2010, fire damaged a Hemet police training building.17 Capt. Dave Brown wrote in a staff report to the city council, Intelligence reports indicate that the police facility is the likely focus of future criminal acts.

    In April 2010 one arrestee proved to be

    notable. Patrick Mike Nugent, 40, was charged with two counts of possession or manufacture of zip guns, and one count of participating in the C.O.O.R.S. Skins, a white supremacist group in Hemet.22

    The people we ended up arresting are not necessarily responsible for the attacks, Hemet police Capt. Brown said, though some of them may have been involved.23

    On June 4, 2010, a stack of pallets across the street from an area police station were set ablaze by a device that the police did not openly describe. On June 8, 2010, a WWII-era bazooka training round was placed on top of a building aimed at the police station. According to reports, there was an attempt to light the rocket motor that failed. The M-29A2 bazooka round was a nonexplosive practice round. The motor is designed to be electrically initiated, but the attempted ignition was reportedly pyrotechnic and

    ineffective. On June 28, 2010, unknown subjects set fire to a local police evidence facility. Some evidence was reportedly lost in the fire.

    On July 3, 2010, Nicholas John Smit of Hemet was arrested in association with at least one of the attacks. Smit was previously convicted of cultivating marijuana. Steven Hansen of Homeland, California, was taken into custody and charged with Smit in this case. Smit was arrested again on charges of growing and distributing marijuana. He may have believed that if he could destroy evidence, then the case against him would not be prosecuted.

    While many details of the targeting of the Hemet Police Department are still undisclosed, it is an instructional series of events. The apparent gang war against that department may have demonstrated a low level of operational competence, but it also demonstrated the willingness

    Understand the threat....reduce the risk

    A 16-week online programme of study from the renowned Centrefor the Study of Terrorism and Political Violence (CSTPV) at theUniversity of St Andrews provides an easily assessable and rarelyavailable educational insight into the fundamental issues behindterrorism as well as the motivations, methodology and modusoperandi of the various strains of terrorism in the world today.

    Knowing who, how and why terrorists plot against civilians,governments, corporations, transport or IT networks makes anunmistakable difference to your counter terrorism and securitystrategies, whilst providing a valuable context to operational duties.

    For further details of the course programme and to apply online, visitwww.terrorismstudies.com/LR0055AA1N1To talk to a course representative, and for group bookingscall +44 (0)20 3377 3210 or +1 (646) 957 8929 or email [email protected] Code: LR0055AA1N1

    PROVIDER NUMBER 2035

    Supported by ACPO TAM

    Approved by MoD insupport of the ELC Scheme

    Certificate inTerrorism Studies

    Study the leading terrorism studies course, which hasenrolled students from over 72 countries

    Course commences:

    17January 2011Enrolling Now

    Further intakes commence18 May & 12 Sept 2011

    Circle 122 on Reader Service Card

    CTdecjan2011art.indd 24 10/25/10 10:16 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 25

    of a criminal organization to mount an o ensive campaign against an American law enforcement agency. Unfortunately, this campaign against the Hemet Police Department is not the only example of a criminal insurgency against law enforcement personnel. Future campaigns may be likely, and some may be much more sophisticated. Mexican crime groups deliberately engage police in combat and terrorist groups routinely ambush government personnel. Has this sort of trouble found your community? It did in mine. ere were fewer incidents, however, one was fatal.

    On April, 4, 1978, my friend, Patrolman J. W. Billy Nunalee, was ambushed and murdered in Wilmington, North Carolina. He had gone into a convenience store. Two criminals with ri es dressed in hoods, masks, gloves, heavy clothing, and boots gunned him down as he left. A few days later, law enforcement o cers attended his funeral. ere was a protocol for the funeral service: if you go into the church, your sidearm and holster do not.

    e church was big, but not big enough for all who attended the service. at day I felt better outside. ankfully, I wasnt the only one. A loose perimeter was formed. We wondered: when will this happen again? ere were no suspects and few leads. Over time, the fear went away. e it just doesnt happen here thought process was back in evidence.

    Four o cers were gunned down while drinking co ee in Parkland, Washington, on November 29, 2009. O cers have been given false calls and then ambushed from St. Paul, Minnesota, to Hoonah, Alaska. No location is immune to this type of violence. Many o cers in the United States have an o ensive perspective and overlook the possibility of being targeted. Some may believe, It only happens in big cities. Is Hemet a big city?

    A member of the Marxist-Leninist

    Baader-Meinhof terrorist organization is believed to have said, It is foolish to hunt tigers, when there are so many sheep to be had.

    e greatest peril to o cers may be mind-set. e failure to recognize a threat or to take measures to improve security makes an easy target. Security is an individual responsibility that is

    Circle 74 on Reader Service Card

    NAMES:BrianDEPARTMENT:ITPHILOSOPHY:EverydayIembracethechallengeofkeepingDiamondbackstechnologyrunningsmoothlyandonthecuttingedge.Istrivetodomyjobwell,knowingthatitultimatelyaffectsourcustomers,themenandwomenthatareservingtoprotectthegreatUSA.

    800.735.7030

    NAMES:BrianDEPARTMENT:ITPHILOSOPHY:EverydayIembracethechallengeofkeepingDiamondbackstechnologyrunningsmoothlyandonthecuttingedge.Istrivetodomyjobwell,knowingthatitultimatelyaffectsourcustomers,themenandwomenthatareservingtoprotectthegreatUSA.

    TWENTY

    proudly

    since2001

    NAMES:DEPARTMENT:PHILOSOPHY:embracethechallengeofkeepingDiamondbackstechnologyrunningsmoothlyandonthecuttingedge.Istrivetodomyjobwell,knowingthatitultimatelyaffectsourcustomers,themenandwomenthatareservingtoprotectthegreatUSA.

    C

    M

    Y

    CM

    MY

    CY

    CMY

    K

    DT 5008 CT copy.pdf 1 7/27/10 9:49 AM

    CTdecjan2011art.indd 25 10/25/10 10:16 AM

    creo

  • 26 The Counter Terrorist ~ December 2010/January 2011

    Police hunt criminals who also have the

    ability to hunt.

    Circle 100 on Reader Service Card

    Proudly owned and oPerated by First resPonders For First resPonders

    licensed atF explosives & Class 3 Firearms dealer

    w w w . t r i p w i r e o p s . o r g

    E X P LO S I V E S S A L E S Fullserviceexplosivemanufacturer/dealer

    K-9trainingaids&complete trainingpackages

    Fullarrayofexplosiveproductsandsupplies

    Discountsand/orcommissionsforreferralsandrepeatcustomers

    TRAINING SER VICES Advancedexplosivedetection K-9training

    Energeticmaterialtraining Post-blastinvestigationcourses

    Forafullcourselistingpleasevisitourwebsite

    F I R E A R M S S A L E S WeareanATFClass3

    firearms dealer. Pleaseseeourwebsiteforpricingandmoreinformation!

    Next Generation Binary ExplosivesTEXPAKManufacturersof

    Mostcost-effective binaryexplosive

    Mixesinseconds, armsinstantaneously

    Nomagazinestoragerequiredpriortoarming

    Nonitroglycerine; no headaches

    Highvelocity,high gasvolume

    storageto

    instantaneously

    forcustomers

    tonitroglycerine;

    no headachesvelocity,high

    volume

    storagetoarming

    nitroglycerine;nitroglycerine;nitroglycerine;

    high

    challenging, but not impossible. ose o cers who choose not to consider personal security increase not only their risk, but add risk to their colleagues.

    Anti-terrorism techniques are easily learned and with a little e ort incorporated into daily life, on and o duty. Your goal is to be aware of your environment and act without an externally noticeable pattern or routine that could become the basis for an ambush.

    US Marines operating in Iraq borrowed a concept called guardian angel from British forces that had operated in Northern Ireland. When Marines were visible, there

    would be at least one armed Marine not visible providing security. Is this something you practice at incidents, at crime scenes, or meeting for a cup of co ee?

    Police hunt criminals who also have the ability to hunt. Have you ever looked for a GPS locator on your car? Would you know where to look? Would you know what you were looking for if you did?

    A relaxed vigilance may be your best defense. USMC Lt. Col. Je Coopers color codes of awareness is the basis for protection.

    O cers in condition WHITE are unaware of their environment and are easily surprised.

    CTdecjan2011art.indd 26 10/25/10 10:16 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 27Circle 108 on Reader Service Card

    American Military University offers one of the most well respected intelligence studies programs in the country. This well balanced and academically rigorous program is offered entirely online using open source materials and is taught by credentialed faculty with extensive operational and academic experience. Courses are designed specifically for working adults who are seeking to enter into or advance their careers in intelligence. Come find out what makes AMU the leader in intelligence education.

    The B.A. Intelligence Studies offers concentrations in: Criminal Intelligence Intelligence Analysis Intelligence Collection Intelligence Operations Terrorism Studies

    The M.A. in Intelligence Studies offers concentrations in: Intelligence Analysis Intelligence Collection Intelligence Operations Criminal Intelligence Homeland Security Terrorism Studies

    Six Course Academic Certificates include: Cybercrime Digital Forensics Information Assurance Information Systems Security National Security Studies

    amuonline.com/intelligenceLEARN MORE AT OR CALL

    877.777.9081

    American Military University Push your mind. Advance your career.

    Information is the foundation of good intelligence.

    2009 & 2010 Effective Practices Award

    2009 Ralph E. Gomory Award for Quality Online EducationAwArd winner

    CTdecjan2011art.indd 27 10/25/10 10:17 AM

    creo

  • 28 The Counter Terrorist ~ December 2010/January 2011

    Condition YELLOW is a state of relaxed, constant awareness of conditions all around. If o cers perceive trouble, their condition can be quickly upgraded.

    A threat or an unusual situation brings the o cer to condition ORANGE. It can be maintained for short periods. Your thinking becomes tactical, and you consciously maintain 360-degree awareness.

    Condition RED means a lethal threat is encountered or imminent. e focus is on the threat. Handle the threat or imminent action and scan for additional threats. Now reset to Orange and maintain awareness.

    Never underestimate the threat. Accept realityyou may be violently targeted. It can happen to you and it can happen here; mentally prepare.

    You must decide now if you will use violence in accordance with the law. It is a requirement of the job for both law

    enforcement and military personnel. Taking individual precautions can reduce the risk of being attacked. Potential attackers do not play by your rules. ABOUT THE AUTHOR

    Mr. Smith is a college law enforcement instructor in North Carolina and is a 26-year veteran of the New Hanover County Sheri s O ce. He is a former US Army civil a airs o cer.

    ENDNOTES1 e New York Times 28MAR10

    Rebecca Cathcart.2 Hemet Police Department Website.3 e Post Chronicle 01JAN10.4 e Press Enterprise 03MAR10 John

    Asbury.5 e Post Chronicle 01JAN10.6 e Associated Press 18MAR10

    omas Watkins7 KCAL 9 NEWS 25FEB108 CNN 22APR10

    9 e Guardian 21MAR10 omas Watkins

    10 e Press Enterprise 03MAR10 John Asbury

    11 CNN 22APR1012 e Press Enterprise 05MAR10 John

    Asbury13 e New York Times 28MAR10

    Rebecca Cathcart14 e Guardian 21MAR10 omas

    Watkins15 e New York Times 28MAR10

    Rebecca Cathcart16 e Press Enterprise 25MAR10 John

    Asbury17 City News Service 13APR1018 City News Service 13APR1019 e Press Enterprise 15APR1020 e Press Enterprise 25MAR10 John

    Asbury21 CNN 22APR10 22 KESQ.COM 23APR1023 KESQ.COM 23APR1024 e Press Enterprise 03MAY10 John

    Asbury

    Circle 124 on Reader Service Card

    CTdecjan2011art.indd 28 10/25/10 10:17 AM

  • The Counter Terrorist ~ December 2010/January 2011 29

    Your Mission:Homeland Security

    THE FOREMOST AUTHORITY ON SECURING THE NATION RETURNS TO WASHINGTON, D.C. ON MARCH 29-31, 2011

    Join thousands for the most interactive and thought-provoking homeland security focused event of the year!

    CONFERENCE2 days of advanced-level education on:

    Critical Infrastructure Protection Attacks & Emergencies: Prevention, Preparedness, Response Protecting from Advanced Persistent Threats (APT) Cybersecurity: Strategies and Best Practices

    FREE EXPOMeet hundreds of top homeland security solution providers you only read about in magazines! Participate in exciting events on the show fl oor including the PPE Runway 9-1-1, the GovSec Force and Firearms Championship, Canine Security Demos, and a Scavenger Hunt tailor-made for attendees like you.

    www.govsecinfo.com/CTM

    MARCH 2931, 2011 WASHINGTON D.C.

    Prepare yourself with the latest tools and training only at GovSec

    REGISTER TODAY AT

    PARTNERING WITH

    HOMELAND

    SE

    CU

    RIT

    Y H

    OMELAND SE

    CU

    RITY

    govsec_ad_TCTmag.v2a.indd 1 10/13/10 3:57 PM

    Circle 102 on Reader Service Card

    CTdecjan2011art.indd 29 10/25/10 10:17 AM

    creo

  • 30 The Counter Terrorist ~ December 2010/January 2011

    BOOK REVIEW

    Expeditionary Eagles: Outmaneuvering the Taliban

    Reviewed by: Chris Graham

    more speci c area familiarization than most troops receive in pre-deployment training. e author divided this work into three parts.

    In part one, Poole describes the value of Afghanistan to the transit of oil and

    they may have to gain in an unstable country. e author discusses Pakistani intelligence a liation with drug networks and al-Qaeda. He describes the Soviet defeat in Afghanistan and evaluates whether the Taliban are using the same

    havens and routes that were used to defeat the Soviets.

    In part three, Poole evaluates the evolution of Taliban tactics, and the objectives of the criminal groups and their allies. e author analyzes recent US strategy, discusses drug interdiction tactics, and nally, advocates a tailored series of o ensive tactics.

    Is Americas expenditure of lives and resources in Afghanistan the result of the manipulations of strategically advanced adversaries? Do the US militarys e orts in Afghanistan constitute an e ective campaign against a patchwork of terrorist, insurgent and criminal forces with external support despite being waged primarily by conventionally trained o cers and forces that do not speak the local languages? If favorable circumstances are to be miraculously created in

    Afghanistan prior to President Barack Obamas promised July 2011 withdrawal date, soldiers, Marines, and their leaders will have to mine every gem of insight possible from Expeditionary Eagles: Outmaneuvering the Taliban.

    the production of opium. He details the various Taliban factions, their presence in Pakistan, and al-Qaedas continuing in uence. Finally, he discusses the drug trade and its practitioners, and argues that this is a primary strategic concern.

    In part two, Poole discusses some of the key tribes of Afghanistan and what

    By H. John Poole

    A fter making war against the United States for nearly a decade, al-Qaeda sponsored the September 11, 2001, suicide attacks that killed nearly 3,000 people in the United States. Al- Qaeda, a Sala st Sunni terrorist network then centered largely in Afghanistan, succeeded in provoking the war that it sought.

    Shortly after the 9/11 attacks, CIA o cers and allied special operations troops (aided by close-air-support) launched a brilliant campaign to recruit indigenous assistance and annihilate al-Qaeda in Afghanistan. Nearly 10 years later, that bold, clever, unconventional warfare campaign has apparently been eclipsed by a massive conventional force attempt to build a functioning central Afghan government, suppress the various Taliban factions, and assassinate senior al-Qaeda personnel with unmanned aerial vehicles.

    Expeditionary Eagles: Outmaneuvering the Taliban is the latest in John Pooles series of books on tactics and strategy. Poole, a veteran of combat operations in Vietnam and criminal investigations in Chicago, shares the insights of a lifelong student of foreign, unconventional warfare tactics and current events. His works are identi able by deceptively simple covers and copious endnotes drawn from exhaustive open-source research and extensive regional travel.

    In his latest book, Poole provides a

    CTdecjan2011art.indd 30 10/25/10 10:17 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 31

    Expeditionary Eagles: Outmaneuvering the Taliban

    Circle 128 on Reader Service Card

    CTdecjan2011art.indd 31 10/25/10 10:17 AM

    creo

  • 32 The Counter Terrorist ~ December 2010/January 2011

    Counter e

    On September 15, 1996, a North Korean Sang-O mini-submarine overloaded with 26 military infi ltrators lingered off the coast of Gangneung, South Korea, about 74 miles south of the demilitarized zone (DMZ). A team of three left the sub and went ashore to observe nearby naval installations. Upon their return two days later, the operatives attempted to swim out to the sub, but were deterred by large waves. In its attempts to collect the crew, the Sang-O ran aground and became disabled.

    A semi-submersible used by North Korean SOF in ltrating near Dadaepo, Busan, on December 3, 1983. Photo: Feth

    CTdecjan2011art.indd 32 10/25/10 10:17 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 33

    NORTH KOREAN ADVENTURES IN

    Two North Korean soldiers march along the North Korean side of the defense line at the Demilitarized Zone. Photo: Anthony W. Holmes

    A press regarding the 1996 incident, and shed great light on the North Korean mini-sub program, capability, and goals.1

    Nearly two years later, in June 1998, South Korea captured a Yeono mini-sub after it became entangled in South Korean shing nets near Sokcho, just north of the Sang-O incident. After the sub was brought to shore, it was reported that the nine crew members aboard had committed suicide.

    In March 2010 a Yeono mini-sub sank a South Korean ship carrying 104 crew members. e 1,200-ton ROKS Cheonan was operating o the west coast

    fter a taxi driver spotted the operatives and the Sang-O,

    he informed authorities. e Republic of Korea (ROK) mobilized 40,000 soldiers in response, and a 49-day manhunt ensued. After days of violent confrontation, 13 operatives were killed in re ghts and 11 operatives fought, but ultimately committed suicide to avoid capture. One in ltrator was captured and one escaped across the border. e captured man, Lee Kwang Soo, was allowed to stay in South Korea and assimilated peacefully with society. He recently made his rst comments to the

    NORTH KOREAN ADVENTURES IN ADVENTURES IN ADVENTURES IN ADVENTURES IN ADVENTURES IN ADVENTURES IN ADVENTURES IN ADVENTURES IN ADVENTURES IN ADVENTURES IN

    By Jennifer L. Hesterman

    CTdecjan2011art.indd 33 10/25/10 10:32 AM

    creo

  • 34 The Counter Terrorist ~ December 2010/January 2011

    ROK Defense Ministry sources announced the

    development of a stealthy North Korean boat

    that might approach a coastline undetected by

    modern surveillance and radar systems.

    of the peninsula, near an island southwest of the Northern Line Limit, the maritime DMZ. A torpedo launched from the sub apparently hit the hull of the Cheonan, killing 46 sailors. Investigators were able to raise the ship and recover a rocket motor from the torpedo and explosive residue from the charge. When presented with the evidence, the United Nations rebuked North Korea for the incident and demanded a confession and an apology. The North has yet to respond.

    The infiltrators of the Korean Peoples Army (KPA) have other seacraft at their disposal as well. In December 1998 the South Korean navy fired on a semi-submersible high-speed boat off the far southern coast near Pusan. The boat was able to get away, however, the body of a North Korean diver was later recovered

    near the site. The modernization of the North

    Korean surface fleet is ongoing. ROK Defense Ministry sources announced the development of a stealthy North Korean boat that might approach a coastline undetected by modern surveillance and radar systems.

    The armed vessel is

    reportedly 100 feet long, with radar-absorbing paint and faceted surfaces.2 In addition, some believe North Korean infiltrators employ specially designed high-speed boats resembling civilian fishing craft, and a small contingent of hovercraft.

    North Korea reportedly maintains more than 30 of the largest mini-sub, the Sang-O, which accommodates 20 sailors. The smaller mini-sub, the Yeono, can hold nine crew members and passengers.

    U.S.-ROK Amphibious Task Force conducts combined amphibious landing during exercise Foal Eagle 07. Photo: USFK

    CTdecjan2011art.indd 34 10/25/10 10:18 AM

  • The Counter Terrorist ~ December 2010/January 2011 35Circle 52 on Reader Service Card

    CTdecjan2011art.indd 35 10/25/10 10:18 AM

  • 36 The Counter Terrorist ~ December 2010/January 2011

    ere are believed to be approximately 10 Yeonos in the inventory. Both platforms are capable of launching torpedoes without leaving a large sonar signature.

    ASSASSINATION SQUADS

    KPA in ltrators carried out several assassination attempts against the South Korean president on and o the peninsula. In January 1968 a 31-man team successfully crossed the DMZ to Seoul nearing the Blue House, home of then-South Korean President Park Chung-Hee. e in ltrators were dressed as South Korean soldiers and civilians; however, they were confronted by suspicious South Korean citizens who noti ed the police. A gun battle and chase north to the DMZ ensued. Twenty-eight in ltrators were killed, one was captured, and two were unaccounted for. 68 South Koreans were killed and 66 were wounded, the majority of whom were soldiers and police o cers. ree American soldiers were also killed in the ght, and three others were wounded.

    In October 1983 a KPA assassination team arrived in Rangoon, Burma (now Myanmar), and harbored at the North Korean ambassadors complex. ey placed a bomb at the Martyrs Mausoleum, the location of a wreath-laying ceremony. e bomb exploded a few minutes before the arrival of then-South Korean President Chun Doo-hwan, killing 17 senior South Korean o cials and injuring 14 others. e explosion also killed four Burmese nationals and wounded 32 others. Two North Korean operatives were arrested and tried in a Burma court. ey provided confessions and were executed.

    TUNNELING SOUTH e North Koreans are masters at

    tunneling. e DMZ is 151 miles long and about half of the territory is mountainous. Plenty of forti cations, troops, mines, and other defensive measures are in place along the DMZ; therefore, the North has prepared approaches from underground. e rst tunnels under the DMZ were discovered

    Freedom Bridge (bottom) on the Imjin River. Photo: Andrew Currie

    Circle 126 on Reader Service Card

    Order online, or call us today to learn more: 360.933.4640

    The Next Level Of Dry Firing!

    NextLevelTraining.comUse code: ssi_sirt10 for SSI discount price.

    Save Money Save Ammo Get More Shots

    Get More Training Maximize Trigger Mechanics

    Red Laser Take-Up Indicator Option

    Auto-Resetting Trigger Allows For Engaging Targets in a Continuous String

    Powerful Shot Indicating Laser Works on Any Target

    6 Trigger Adjustments Made In The USA

    SIRT Training Helps You

    Features

    CTdecjan2011art.indd 36 10/25/10 10:18 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 37Circle 92 on Reader Service Card

    CTdecjan2011art.indd 37 10/25/10 10:18 AM

  • 38 The Counter Terrorist ~ December 2010/January 2011 Circle 116 on Reader Service Card

    SecurityAn IntroductionPhilip Purpura, CPPFlorence-Darlington Technical College, South Carolina, USA

    Catalog no. AU2839, October 2010637 pp., ISBN: 978-1-4200-9283-7$69.95 / 44.99Discount price: $55.96 / 35.99

    Homeland SecurityAn Introduction to Principles and PracticeCharles P. NemethChair and Professor of Legal Studies, Homeland Security and Criminal Justice, California University of Pennsylvania, USA

    Catalog no. AU8567January 2010, 542 pp.ISBN: 978-1-4200-8567-9$69.95 / 44.99Discount price: $55.96 / 35.99

    Principles of Emergency Management and Emergency Operations Centers (EOC)Michael J. Fagel, PhD, CEMAurora Safety, Founder, CEO, Illinois, USA

    Catalog no. K11747December 2010, c. 440 pp.ISBN: 978-1-4398-3851-8$79.95 / 49.99Discount price: $63.96 / 39.99

    Antonov An-2. Photo: MilborneOne

    CTdecjan2011art.indd 38 10/25/10 10:18 AM

  • The Counter Terrorist ~ December 2010/January 2011 39

    in the late 1970s. The largest was of great concern because it ended just a mile southwest of a US Army base. Reports estimate 30,000 armed men accompanied by light artillery could pass through this tunnel, which included an operational railroad track, every hour. Based on the testimony from North Korean defectors, some estimates allege that there could be at least 35 tunnels under the DMZ.3

    Whether gaining access through tunnels, hiking the mountains, or swimming the Imjin River, which flows across the DMZ, infiltrators from the North have been discovered in South Korea on numerous occasions throughout the years. In the 1990s several of these incursions ended in gunfights. Three KPA soldiers wearing South Korean uniforms were killed in May 1992 in the border town of Cholwon by ROK army forces. In 1995 armed operatives were found and killed south of the DMZ in the Imjin River. The body of a KPA operative was found on a southern shore in July 1998, apparently equipped as an intelligence collector.

    The Air OpTiOnAlthough the KPA has a fleet of aircraft

    designed for troop movements, the job of infiltrating South Korea would likely be accomplished with the Russian Antonov AN-2. The AN-2 is a propeller-driven biplane that KPA special operations personnel reportedly use. It is a special, light-weight model with wings made from cloth and wood; thus, it provides a very low radar cross section. The AN-2 can transport 10 fully loaded passengers and serve as a platform for paratroopers. It is a short takeoff and landing (STOL) aircraft with range such that it can reach the southern part of the peninsula without refueling. These aircraft likely have South Korean markings in an attempt to make infiltration easier. It is estimated that there are 200 AN-2s in inventory dedicated to supporting special operations forces (SOF), but there are reports that the fleet was grounded in 2007 because of rising fuel costs in the country.4 Although there are no publicly documented instances of aerial incursions by these craft, it is worth noting that they play a role in SOF battle plans.

    Antonov An-2. Photo: MilborneOne

    Circle 106 on Reader Service Card

    CTdecjan2011art.indd 39 10/25/10 10:18 AM

  • 40 The Counter Terrorist ~ December 2010/January 2011

    Reception Center at Cheongwadae or Blue House, the South Korean presidential residence in Seoul South Korea. Photo: Steve46814

    North KoreaN SoFNorth Korea seems to be favoring

    two military angles: the use of short- and long-range missiles, and the KPA SOF. Analysts suggest that the special operations program has trained more than 30,000 members in the last few years, and now consists of approximately 121,500 soldiers. Under the leadership of the Training Unit Guidance Bureau, the SOF is organized into at least 22 light infantry-type brigades and seven independent, light infantry battalions. Embedded in the structure are airborne assault, amphibious, reconnaissance, and sniper units.5

    The KPA SOF has five basic missions: conducting reconnaissance, performing combat operations in conjunction with conventional operations, establishing a second front in South Koreas rear areas, countering ROK/US special operations

    forces in North Koreas rear area, and maintaining internal security.6 Strategic goals include disabling ROK and US command, control, communications, and intelligence; kidnapping/killing senior leaders of opposing forces; destroying sensitive facilities by disabling control towers at airfields and destroying POL (petroleum, oil and lubricant) supplies; and neutralizing enemy nuclear, chemical, or biological capabilities.

    Analysts believe that during a conflict, KPA SOF would breach the DMZ en mass by sea, land, and air with the overarching goal of creating chaos. KPA SOF may work in small teams of three to five, and are often armed with knives, suppressed pistols, AK and AR style rifles, hand grenades, RPG type rocket launchers, and light mortars. Demonstrated tactics for infiltrating the South include wearing ROK and US uniforms to access military installations,

    A North Korean soldier perform-ing maintenance work on a Korean

    Peoples Army jeep (BJ2020).Photo: Mark Scott Johnson

    CTdecjan2011art.indd 40 10/25/10 10:18 AM

  • The Counter Terrorist ~ December 2010/January 2011 41

    infiltrating Seoul in civilian clothes, and entering South Korea by commercial airliner from other countries. KPA SOF is one of the best-resourced military programs in North Korea, and its members are zealously loyal to their president.

    ConClusionSixty years after the Korean conflict

    simmered down, the North and South remain at war. A peace accord was never signed. Tensions are high with the sinking of the Chenoan and the alarming nuclear capabilities of an inscrutable, provocative government. The growth of the KPA SOF during austere economic times may indicate a shift in ideology, from reliance on conventional forces to the asymmetric advantage offered by a light, stealthy, more highly skilled force.

    As the world continues to focus on its nuclear program and naval attacks on the South, North Korea has slowly and deliberately built a special operations behemoth. Part of the KPA, this professional SOF is trained in unconventional tactics, can operate in harsh terrain, and has successfully penetrated the border numerous times in the last decade.

    ABouT THE AuTHoRMs. Hesterman is a retired US Air Force

    colonel and is currently an analyst for the MASY Group, and Vice President of Academic Research and Development for the 5th Generation Warfare Educational Institute. She is a professor of counter-terrorism studies at American Military University, author of Transnational Crime and the Criminal-Terrorist Nexus, and authors the blog counterterrorforum.com.

    oTHER souRCEshttp://www.globalsecurity.org/military/

    world/dprk/army.htmhttp://www.iiss.org/publications/

    military-balance/the-military-balance-archive/

    http://www.fas.org/irp/dia/product/knfms/knfms_chp5a.html

    http://www.rense.com/general37/nkorr.htm

    http://www.policyarchive.org/handle/10207/bitstreams/884.pdf

    http://www.chosun.com/w2Idata/html/news/199812/199812200240.html

    http://www.kmimediagroup.com/sotech-archives/180-sotech-2008-volume-5-issue-7/1670-qaa-brigadier-general-simeon-g-trombitas.html

    EndnoTEs1 http://www.dailynk.com/english/read.

    php?cataId=nk02500&num=64452 http://www.au.af.mil/au/awc/awcgate/

    acsc/99-102.pdf3 http://www.military.com/NewCon

    tent/0,13190,Defensewatch_090803_Tunnel,00.html

    4 Air Forces Monthly, December 2007 issue, p.27

    5 Illustrated Directory of Special Forces , Ray Bonds and David Miller, 2003

    6 http://www.globalsecurity.org/wmd/library/news/dprk/1996/kpa-guide/part03.htm

    Republic of Korea (ROK) and United States (U.S.) soldiers monitor the Korean Demilitarized Zone. Photo: Edward N. Johnson, U.S. Army Public Affairs Officer

    Analysts believe that during a conflict, KPA SOF would breach the DMZ en mass by sea, land, and air with the overarching goal of creating chaos.

    CTdecjan2011art.indd 41 10/25/10 10:18 AM

  • 42 The Counter Terrorist ~ December 2010/January 2011

    STOP ARTERIAL BLEEDING IN EIGHT SECONDS

    OR LESS...

    FOR MORE INFO OR TO ORDER: FAST-TLLC.com888.949.7377Circle 134 on Reader Service Card

    CTdecjan2011art.indd 42 10/25/10 10:19 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 43

    A few ounces in your pocket could save your life.

    RESQ-PAK.COM 888.949.RESQ (7377)Enter coupon code SSCT610 to receive a 10% discount from ResQ-PAK.com ( Offer valid through July 15, 2010 )

    Approx. 5 x 5.75

    VACUUM SEALED FIRST AID SUPPLIES FOR THE EMERGENCY TREATMENT OF GUNSHOT, STAB WOUNDS AND OTHER TRAUMA

    Circle 315 on Reader Service Card

    Now with ChitoGauzeTM

    Pantone 185 CVC

    Pantone 704 CVC

    by

    Antibacterial No fumbling with a roll Does not burn No allergic reactions

    Now with ChitoGauzeChitoGauzeChitoGauze

    Approx. 3.5 x 5

    Approx. 5 x 7

    Battle eld technology stops severe bleeding fast with easy-to-handle Z-fold.

    CTdecjan2011art.indd 43 10/25/10 10:19 AM

    creo

  • 44 The Counter Terrorist ~ December 2010/January 2011

    Counter e

    LOS ZETAS:

    By John P. Sullivan and Samuel Logan

    Massacres, Assassinations, and Infantry Tactics

    Mexican soldiers render salutes in Mexico City. Photo: Master Sgt. Adam M. Stump, USAF

    CTdecjan2011art.indd 44 10/25/10 10:19 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 45

    Los Zetas are arguably Mexicos most ruthless and tactically profi cient criminal gang. Essentially enforcers turned multipurpose cartel, they are waging a brutal war against competing cartels and the Mexican state alike. The Zetas current situation is one of fl ux. They are under immense pressure from both the state and criminal competitors. As a result, they are waging an increasingly brutal campaign to retain relevancy and expand their power base.

    known as GAFES (Grupo Aeromvil de Fuerzas Especiales), they became the close protection detail for Gulf cartel kingpin Osiel Cardenas Guillen. Under the command of Z1 Arturo Guzman Decenas, the original 31 Zetas brought their skills and combat tradecraft to bear for the Gulf cartels business interests. eir mercenary mastery of intelligence and operational tactics served their new masters well.1

    Once in place, the original Zetas each trained a cadre of soldiers, recruited from state and municipal police forces

    T hey could emerge from their current situation stronger by consolidating power and expanding their reach, or, the backlash to their campaign could force them o the table. Either way, Los Zetas have changed the game forever in Mexico.

    ORIGINS: DESERTERS AND ENFORCERS

    Los Zetas were initially established as an enforcement/protection arm for the Gulf Cartel (Cartel del Golfo/CDG) in the late 1990s. Deserters from the Mexican special operations force, Tower of Our Lady of Refuge Cathedral;

    Ciudad Victoria, Tamaulipas. Photo: Efrain Klerigan

    CTdecjan2011art.indd 45 10/25/10 10:19 AM

    creo

  • 46 The Counter Terrorist ~ December 2010/January 2011 Circle 64 on Reader Service Card

    Delivered.

    Breakthrough Price

    $2,895 FEATURESRugged, robust all wheel

    drive target platform.Lightweight, portable, high-speed, 360 control.Wireless Control to 1000 meters.Price includes Manikin Mike(non-reactive) 3DHT target.Optional Stop-Drop hit reactive target system.

    For More Information:ADVANCED TRAINING SYSTEMS

    4524 Highway 61 North St. Paul, MN 55110 USATel: 651.429.8091 Fax:651.429.8702

    Email: [email protected] Web: www.atsusa.biz ATS 2010

    Long Range Wireless Operation

    1000 Meter Line Of Sight Remote Control

    Optional Stop-DropElectronic Hit Sensing System

    NEW! M-145 4WD MOVING TARGET SYSTEM

    M145_QrtrPage4C 7/30/10 2:19 PM Page 1

    and, in some cases, the rank and file of Mexicos army. This initial group of elite bodyguards catalyzed an evolution of lethal force and tactics used within Mexicos criminal underworld. Late-model SUVs with tinted windows and no license plates became the normal method of transport. Tight shot groups in Los Zetas victims indicated a high-level of proficiency, though this particular high-skill level has diluted over the years. Los Zetas brought ambushes, defensive positions, and small-unit tacticsall long-employed by military forcesto Mexicos criminal syndicates. They remain one of the few criminal groups in the Americas willing to deliberately take head on a military checkpoint or patrol. When Los Zetas arrived, they catalyzed an evolution of tactical knowledge and strategic intelligence gathering that over the past 10 years has become the norm.

    From that initial foundation the Zetas grew, bringing in Guatemalan Kaibiles to expand their depth,2 reaching into other aspects of the cartel business, and ultimately merging with the Gulf leadership to form the Company (La Compania). They then threw off their master to form their own cartel cum private army. Along the way, the Zetas created a brutal mystique, and developed a brutally protected criminal brand, today synonymous with violence and fear across the Americas. Their core strengths include well-honed intelligence capabilities, exploiting grassroots networks, precision small-unit attacks, ambushes and raids, and symbolic violence and brutality.3 As a result, they are a dangerous force across Mexico, where they have a concentration of force, including the Mexican states of Quintana Roo, Campeche, Tabasco, Veracruz, Tamaulipas, and Nuevo Len. In addition, they now pose a significant threat to the solvency of state organs where they operate, especially

    The result of the Gulf-Zeta split is a new battle for primacy among

    Mexicos criminal enterprises. The Zetas, formerly

    enforcers, muscle or a praetorian

    guard, turned on their masters.

    Osiel Cardenas Guillen, convicted Mexican drug lord. Photo: DEA

    CTdecjan2011art.indd 46 10/25/10 10:20 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 47

    In the world of tactical electronics, one company has been at it every day since 1994...

    ADAMS INDUSTRIES, INC.www.AdamsIndustries.com

    NIGHT VISION: A.I. carries a full line of night vision including PVS-14s, PVS-7Ds, and now our AI/NVG-S offering PVS-15 like performance minus the painful price or wait for delivery.

    THERMAL TECHNOLOGY: From handhelds to extreme range systems, A.I. has off-the-shelf and build-to-suit answers for any requirement.

    SENSOR SYSTEMS: We are proud to distribute the Millennium Sensor line of covert tactical sensor and surveillance kits used by the US Military, US Border Patrol, and SWAT Teams nationwide. This force multiplier provides extra eyes and ears where you need them.

    P.O. Box 641413 Los Angeles, CA 90064 Tel: (310) 472-3017 Fax: (310) 861-5324

    Email: [email protected]

    NIGHT VISION: A.I. carries a full line of night vision including PVS-14s, PVS-7Ds, and now our AI/NVG-S offering PVS-15 like performance minus the pain-ful price or wait for delivery.

    Contact: Adams Industries, Inc. P.O. Box 641413 Los Angeles, CA 90064

    Tel: (310) 472-3017 Fax: (310) 861-5324

    Email: [email protected] www.AdamsIndustries.com

    In the world of tactical electronics, one company has been at it every day since 1994:

    www.AdamsIndustries.com

    THERMAL TECHNOLOGY: From handhelds to extreme range systems, A.I. has off-the-shelf and build-to-suit answers for any requirement.

    SENSOR SYSTEMS: We are proud to distribute the Mil-lennium Sensor line of covert tacti-cal sensor and surveillance kits used by the US Military, US Border Patrol, and SWAT Teams nationwide. This force multiplier provides extra eyes and ears where you need them.

    Circle 27 on Reader Service Card

    CTdecjan2011art.indd 47 10/25/10 10:20 AM

    creo

  • 48 The Counter Terrorist ~ December 2010/January 2011

    in the northeastern Mexican state of Tamaulipas.

    Notable incidents allegedly tied to Los Zetas include the December 2008 execution of Mexican soldiers in Guerrero, a violence-torn, impoverished southern state where a dual sovereignty exists between the elected government and narco-criminals;4 the February

    2009 assassination of retired Brigadier Mauro Enrique Tello Quinones to ward off government interference; and their alleged participation in a September 2008 grenade attack in Morelia that killed eight and wounded more than 100.5 Los Zetas weaponry includes rocket and grenade launchers, assault rifles (including the AK-47 and its variants known as the cuerno de chivo as well as modified AR-15s and M-16s), and .50 caliber Barrett sniper rifles. Their allies include the Barrio Azteca, Texas Syndicate, Mexican Mafia, and Mara Salvatrucha (MS-13) street gangs, remnants of the Beltrn-Leyva organization and the Vicente Carrillo-Fuentes organization, as well as a number of smaller drug trafficking organizations in Colombia and Venezuela.

    Praetorian revolt: GaininG indePendence

    By early spring of 2010, the Zetas split from the Gulf cartels control, triggering a tectonic shift in Mexican cartel alliances. The Gulf-Zeta split broke the duopoly known as the Company, which had been maintained by both factions to pursue drug trafficking and distribution, human trafficking, product piracy, kidnapping, and petroleum theft. This shiftannounced by posting banners known as narcomantas in several Mexican statesis currently fueling the high levels of violence throughout much of Mexico, especially those areas (plazas and corridors) being contested by the Zetas.6 The result was a war of all against allcartels vs. Zetas vs. the police, military, and increasingly, the state itself. The result of the Gulf-Zeta split is a new battle for primacy among Mexicos criminal enterprises. The Zetas, formerly enforcers, muscle or a praetorian guard, turned on their masters.7

    Zistos Corporation631.434 .1370www.zistos.comE-mail: [email protected]

    IMPROVED!IMPROVED!

    Search all areas of a vehicle, cargo, under carriage, engine and passenger areas with just one system

    System includes three uniquely configured, interchangeablevideo cameras and a body-worn, battery operated LCD monitor

    Look for weapons, IEDs, contraband, stolen materials Use immediately no installation required Affordable and easy to operate Also search public/employee areas on grounds and in buildings

    Designed for Vehicle Screening at Check Pointsand Entrances of Secure Facilities

    The system includes a WalkAbout body-worn LCD Monitor with interchangeable camera

    components that can be configured as a 14-foot Pole Camera, 2-foot Baton Camera, and an

    Under Vehicle Inspection Trolley Camera.Product No. WA-VSWD14

    Under Vehicle Inspection TrolleyCamera with 6-Foot Pole

    14-Foot Pole Camera

    2-Foot Baton Camera

    The Complete Portable

    Vehicle Search System

    The Complete Portable

    Vehicle Search System

    Circle 139 on Reader Service Card

    CTdecjan2011art.indd 48 10/25/10 10:20 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 49Circle 92 on Reader Service Card

    Raiding PEMEX: KidnaPPing and divERsification

    The Zetas are known to have pilfered large quantities of oil from PEMEX (Petroleos Mexicanos) to fund their enterprises. Gangsters have siphoned more than $1 billion worth of oil from Mexicos pipelines over the past two years. Much of this clandestine oil business has been linked to the Zetas who now dominate criminal enterprises in the oil-rich states of Veracruz and Tamaulipas. In Veracruz alone, the Mexican Justice Department has opened investigations into 70 different companies suspected of having purchased stolen diesel from Los Zetas representatives, concentrated in the Veracruz city of Poza Rica.

    Meanwhile, a firefight between Los Zetas gunmen and the Mexican military left five dead on July 27, when Los Zetas fought to retain control over a PEMEX well near Ciudad Mier, Tamaulipas. The petro theft constitutes a symbolic and a financial threat to the Mexican government while providing a vast stream of income, perhaps as much as $715 million a year, that gangsters use to buy weapons, bribe officials, and bankroll their brutal assault against the Mexican government.

    EXPansion and tERRitoRial contRol

    The Zetas have steadily expanded their reach across Mexico and beyond. They operate camps (known

    On Tuesday August 24, 2010, the worst massacre in Mexicos drug wars to date was reported in San Fernando, Tamaulipas.

    Mexican gas station, operated by PEMEX.

    CTdecjan2011art.indd 49 10/25/10 10:20 AM

  • 50 The Counter Terrorist ~ December 2010/January 2011 Circle 117 on Reader Service Card

    SUICIDETERROR

    Understanding and Confronting the threat

    edited byophir falk and henry Morgenstern

    falkM

    orgensternSUICIDE TERROR

    Understan

    ding an

    d Confron

    ting the threat

    Based on U.s. and israeli experiences and detailed interviews with frontline personnel, Suicide Terror enables

    policymakers, first responders, and students of homeland security to understand and deal with the growing

    threat of suicide terror. it analyzes recent suicide attacks as well as our current vulnerabilities and likely scenarios

    for future attacks. following the expert authors advice, readers learn possible measures to prevent an attack.

    Moreover, they learn how to prepare for and implement an effective and quick response to minimize casualties

    and losses in the event of an attack.following an overview and historical review of suicide terror, the book covers: Globaljihad Israelsconfrontationwithsuicideterrorism Americasexperiencewithsuicidebombings Internationalizationofsuicideterrorism High-riskscenariosandfuturetrends Methodsforconfrontingsuicideterror MedicalmanagementofsuicideterrorismUsing eye-witness accounts, the text recreates the look and feel of actual terrorism incidents.Detailed case

    studies help readers get into the minds of suicide terrorists in order to understand how to best prevent and confront

    these very dangerous threats.Thisbookisadefinitivestudyofsuicideterror,synthesizingtheexperienceofwell-knownIsraeliandAmerican

    experts who have dealt with it firsthand. anyone responsible for understanding, preventing, and confronting this

    devastating threat should read this book and consider its recommendations with all seriousness.OPHIR FALK, LLB, MBA, isaPartnerattheNaveh,KantorEven-HarlawfirmandaResearchFellowatthe

    institute for Counter terrorism, where he has published numerous articles in the field. Mr. falk has over a decade

    of experience in various security capacities and served as a consultant for the 2004 olympic games, where he

    carried out risk assessments for olympic venues and critical national infrastructure.HENRY MORGENSTERN is the President of security solutions international, a company that has trained more

    than 500 federal, state, and local agencies to effectively confront the threat of terror and regularly takes groups of

    firstresponderstoIsraeltostudyHomelandSecurity.Mr.Morgensternisawidelypublishedauthoronthesubject

    ofsuicideterror.Hehasofferedexpertcommentaryonterror-relatedissuesforNBC,ABC,CBS,Fox,numerous

    radio stations, and Web broadcasts.

    Ophir Falk and Henry Morgenstern have compiled a book that should be read by anyone who is

    serious about winning the war on terror. By painstakingly analyzing the empirical data, they help us

    better understand the nature of our enemies and why they employ these barbaric tactics. Most crucially,

    they offer important insights on how terrorism can be effectively confronted and ultimately defeated.

    In so doing, they have performed an invaluable service for all those who are committed to winning this

    crucial battle. Benjamin Netanyahu, former Prime Minister of Israel

    FIRSTHAND ACCOUNTS AND ANALYSES FROM FRONTLINE PERSONNEL AND ExPERTS IN THE wAR AGAINST TERROR

    FIRSTHAND ACCOUNTS AND ANALYSES FROM FRONTLINE PERSONNEL AND ExPERTS IN THE wAR AGAINST TERROR

    www.SuicideTerror.com 866-573-3999

    as narcocampamentos) in Mexico and Guatemala, and perhaps even Honduras. In Mexico they operate in the states of Tamaulipas, Nuevo Len, Coahuila, Veracruz, Tabasco, Campeche, Yucatn, Quintana Roo, San Luis Potos, Chiapas, Puebla, Tlaxcala, Hidalgo, Quertaro, Zacatecas, Guerrero, Oaxaca, Baja California, and Michoacn, as well as Mexico City. In addition, they are believed to operate in Guatemala, Honduras, El Salvador, Colombia, and Venezuela, and in Texas, Georgia, Mississippi, Florida, and California in the United States. eir activities increasingly involve direct confrontation with the state. ese confrontations range from bold attacks on security forces (ambushes, raids, assassinations, assaults on army garrisons and police stations) to urban blockades.

    TACTICS OF EXTREME VIOLENCE

    On Tuesday August 24, 2010, the worst massacre in Mexicos drug wars to date was reported in San Fernando, Tamaulipas. After a shootout between Zeta gunmen and Mexican marines that killed one marine and three suspects, Mexican forces made a chilling discovery: 72 migrants (58 men and 14 women, including one in the last stages of pregnancy) were brutally massacred after refusing to be pressed into service by the Zetas. e migrantsapparently en route to the United Stateswere seized by the Zeta cadre. According to press reports, the Zetas tried to extort the migrants and when the migrants were unable to make payments, they were o ered employment as Zeta operatives. e migrants (from a range of Latin American states: El

    The result of the Gulf-Zeta split is a new battle for primacy among

    Mexicos criminal enterprises. The Zetas, formerly

    enforcers, muscle or a praetorian guard,

    turned on their masters.

    CTdecjan2011art.indd 50 10/25/10 10:20 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 51Circle 136 on Reader Service Card

    CTdecjan2011art.indd 51 10/25/10 10:21 AM

  • 52 The Counter Terrorist ~ December 2010/January 2011 Circle 88 on Reader Service Card

    Easy to Install, sEt, and tEstDesigned to protect your vehicles battery from over discharge, the Lind Shut Down Timer (SDT) is programmed to automatically turn off electrical loads at a preset time after the vehicles ignition has been shut off. The Shut Down Timer is easy to set and test without any confusing DIP switches or special tools.

    For more information, please contact Lind at 1.800.697.3701, via email at [email protected], or visit us online at www.lindelectronics.com. PowEr sPEcIalIsts for MobIlE coMPutIng

    LINDProtEct your VEhIclEs battEry

    Salvador, Honduras, Ecuador, and Brazil) refused, and were executed.

    In the aftermath of the massacre, the lead investigator and another police o cer were reported missing. Car bombs exploded near a police station and a Televisa o ce; a grenade exploded in a Puerto Vallarta bar; and, the mayor of Hidalgo was assassinated. e Zetas are suspected in those actions, too. Such is the tempo of extreme violence in areas contested by the Zetas: primitive car bombs, grenade attacks, assassinations, and massacres. Tamaulipas, Nuevo

    Len, and Jaliscostates contested by the Zetasare deluged by the spate of violence.

    Urban blockades, or narcobloqueos, are a quasi-political tool recently employed by Los Zetas in Monterrey and Reynosa. For example, on August 14, 2010, members of the Zetas blocked o at least 13 major roads in Monterrey, preventing access to the citys international airport and major highways entering and exiting the northern industrial city. e narcobloqueos were deployed in the aftermath of a shootout between the military and Los Zetas that killed reputed Monterrey Zeta leader El Sonrics. Drivers were carjacked and their cars were used to close the roads. ese blockades are a show of force, a demonstration of the Zetas power.

    Mass attacks are another favored tactic. Recent attacks in Torreon (Coahuila) left 17 dead, the majority from 5.56mm

    In the camp, troops found grenade launchers, grenades, 50-caliber machine guns, and

    AR type rifl es, as well as uniforms and SUVs marked with Zetas insignia, and votive candles

    venerating Santa Muerte, Holy Death.

    CTdecjan2011art.indd 52 10/25/10 10:21 AM

    creo

  • The Counter Terrorist ~ December 2010/January 2011 53

    Campeche City, Campeche, Mexico. Photo: El gora

    weapons. The aforementioned San Fernando attack left 72 dead. In July 2010 a mass grave with 51 bodies was discovered near Monterrey in Nuevo Len. The May 12, 2010, raid by Mexican forces on a Zeta camp in Higueras also helps frame an understanding of Zeta capabilities. In the camp, troops found grenade launchers, grenades, 50-caliber machine guns, and AR type rifles, as well as uniforms and SUVs marked with Zetas insignia, and votive candles venerating Santa Muerte, Holy Death. More recently, grenade attacks against Mexican navy headquarters in Matamoros, drive-bys on police stations and prosecutor general of the Republic, Mexicos attorney general offices, and bombings of Televisa media facilities have joined running gun battles and kidnappings in the Zeta bag of tricks.

    Circle 142 on Reader Service Card

    CTdecjan2011art.indd 53 10/25/10 10:21 AM

  • 54 The Counter Terrorist ~ December 2010/January 2011 Circle 72 on Reader Service Card

    NEW PROGRAM FOR 2010 > GLOBAL EXPERTISE > GLOBAL BEST PRACTICES

    > > > > > >

    CONCLUSION: MASSACRES AND BARBARIZATION

    Los Zetas have spread from an original 31 mercenaries into a sizable private army and criminal enterprise. On the business side of the house, they specialize in drugs, human tra cking, small arms tra cking, extortion (street taxes), kidnapping (levantones), murder, petroleum theft, and CD/DVD piracy. Indeed, drug tra cking likely comprises less than half their criminal revenue-

    generating portfolio. eir current allies include factions of the Beltrn-Leyva organization, the Juarez and Tijuana cartels, Bolivian drug clans, third-generation (transnational street/prison) gangs, and the Italian Ndrangheta. ey conduct raids and ambushes, and employ small unit infantry tactics supported by intelligence operations to engage in close quarters battle with state security forces. Assassinations of police and political gures, including mayors and candidates for state o ce, and threats against journalists and judicial o cials