the counter terrorist magazine - june/july 2009

64
The Counter Terrorist ~ June/July 2009 1 e An SSI ® Publication JUNE/JULY 2009 USA/CANADA $5.99 JUNE/JULY 2009 Official Journal of the Homeland Security Professional Counter MUMBAI ATTACK WEDDING CI TO LE ACTIVE SHOOTER RESPONSIBILITY MEXICAN DRUG WAR Spilling Across the Border VOLUME 2 • NUMBER 3 www.thecounterterroristmag.com A N N I V E RSA R Y I S S U E e Counter F I R S T Y E A R

Upload: solomon

Post on 02-Apr-2016

218 views

Category:

Documents


4 download

DESCRIPTION

Journal for Law Enforcement, Intelligence & Special Operations Professionals

TRANSCRIPT

Page 1: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 1

The

An SSI® PublicationJUNE/JULY 2009

USA/CANADA $5.99

JUNE/JULY 2009

Official Journal of the Homeland Security ProfessionalCounter MUMBAI ATTACK • WEDDING CI TO LE • ACTIVE SHOOTER RESPONSIBILITY

MEXICAN DRUG WARSpilling Across the Border

VOLUME 2 • NUMBER 3

www.thecounterterroristmag.com

AN

NIVERSARY I

SSUE

TheCounter FIRST YEAR

Page 2: The Counter Terrorist Magazine - June/July 2009

2 The Counter Terrorist ~ June/July 2009

• Complements FirstDefender to maximize in-the-fi eld coverage of unidentifi ed chemicals including TICs/TIMs, chemical weapons, explosives and more

• Ground-breaking design—fi ts in your hand, lightweight, yet rugged enough for fi eld use

• Fast and easy to use—delivers accurate results in less than a minute, even for complex mixtures

Made in the USA

TruDefender FTWhen every second counts, reliable results are at your fi ngertips.

To register for an upcoming seminar: +1.978.642.1132 or www.ahurascientifi c.com/ct

TruDefender | FTFTIR

FirstDefenderRaman

From the makers of FirstDefender, the revolutionary TruDefender FT handheld FTIR system enablesidentifi cation of an even broader range of unknown chemicals—right in the hotzone.

Circle 175 on Reader Service Card

Page 3: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 3

CO

NTE

NTS

Official Journal of the Homeland Security Professional

Counter TheJUNE/JULY 2009VOLUME 2 • NUMBER 3

26

50

57

COVER STORY: 26 THE MEXICAN DRUG WAR SPILLS OVER UNITED STATES BORDER by Jennifer L. Hesterman

FEATURES:

6 Case Study: MUMBAI, INDIA by Major Joe Bail

14 First Hand: WEDDING COUNTERINTELLIGENCE TO LAW ENFORCEMENT by Dr. Richard Saccone

40 THE “ACTIVE SHOOTER” Who’s Responsibility—Now and in the Future? by Jeffrey A. Hawkins

50 CRIMINAL ACTIVITY AND TERRORISTS What Every Law Enforcement Officer Should Know by John Andrews

DEPARTMENTS:4 From the Editor

47 Book Review

57 Product Review

61 Training Review

Cover Photo: Scott Morrison

40

Page 4: The Counter Terrorist Magazine - June/July 2009

4 The Counter Terrorist ~ June/July 2009

FROM THE EDITOR:

Global StrifeOfficial Journal of the Homeland Security Professional

Counter The

VOLUME 2 • NUMBER 3 JUNE/ JULY 2009

EditorChris GrahamDirector of OperationsSol BradmanDirector of AdvertizingCarmen ArnaesDirector of ProductionKelli RichardsonContributing EditorsJohn AndrewsJennifer HestermanRichard MarquiseChuck PfarrerGraphic DesignMorrison Creative CompanyCopy EditorLaura TownOffice ManagerLily ValdesPublisher:Security Solutions InternationalSuite 20414300 SW 129th StreetMiami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, The Official Journal of the Homeland Security Professional, is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 14300 SW 129th Street, Suite 204, Miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.For article reprints, e-prints, posters and plaques please contact:PARS International Corp.Web: www.magreprints.com/quickquote.asp Email: [email protected]: 212-221-9595 • Fax: 212-221-9195Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com© 2009 Security Solutions International

reetings and welcome back to The Counter Terrorist. In the weeks that have elapsed since our previous issue, global strife has not

abated. While counter insurgency efforts in Iraq appear to have made progress, other challenges remain.

Islamist terrorists and guerrillas continue to press the governments of Afghanistan, Pakistan and others. Open source reporting suggests that their influence in Pakistan has grown beyond the north western tribal areas to threaten the stability of that nation in its entirety. U.S. and allied forces prepare for increased activity in Afghanistan. Iran has given no indication of rehabilitation. Investigations into suspected terror cells are ongoing around the world and at home.

Maritime piracy remains an unsolved problem. The volume of continuing attacks in the vicinity of Somalia suggest that multi-national forces attempting to suppress regional piracy are not yet operating under directives that can allow strategic success.

Mexican drug battles have reportedly claimed approximately 9,000 lives since 2006. Combat continues and crime networks continue to cross that countries border with the United States.

While beauty and virtue can be found in the world, one can not deny that it also contains people and organizations that do not bear good will for Americans and our allies. Individuals from law enforcement to the military (and public and private organizations in between) continue to man the wall that holds these adversaries at bay.

The Counter Terrorist exists to serve as their forum. We are here to serve as part of the communication that is necessary to close the gaps in this effort. When you have something of value to share with your brothers in any of these fights, our pages are open. Help us to be a tool for the refinement of a noble effort.

Semper Fidelis,

Chris GrahamEditor of The Counter Terrorist

GBy Chris Graham

Page 5: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 5Circle 337 on Reader Service Card

�� ��������������������������������� ����������������������������������������������� ������������������������������������������������������ ��������������������������������������������������������� �����������������������������������������������������������

NO OTHER LAW ENFORCEMENT GAS MASK HAS THIS MUCH MILITARY PEDIGREE.

GR00191-02

Page 6: The Counter Terrorist Magazine - June/July 2009

6 The Counter Terrorist ~ June/July 2009

MUMBAI, INDIACase Study:

The Taj Mahal on a happier day. ©istockphoto.com/trait2lumiere

By Major Joe Bail

at least 10 terrorists left the Pakistani port of Kajhar Creek on the cargo ship MV Alpha. According to one of the terrorists who was later captured, the Alpha soon encountered the Lashkar-e-Tayyiba (LeT)–owned and crewed vessel Al Husseini, and the terrorists transferred aboard the second ship.

ON NOVEMBER 22, 2008,

Counter The

Page 7: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 7

(Jewish Center), the Leopold Café, and the Taj Mahal Hotel.

After their landing on the Mumbai shore, one team reportedly made its way by foot to the Leopold Café, an attraction known to be frequented by Americans and Britons. The restaurant is about three-quarters of a block north of a local police district station. After throwing a hand grenade and firing several shots into the café, killing eight people, the two terrorists ran about 100 yards down a small side street to the rear of the Taj Mahal Hotel, killing two shopkeepers on the way. Five AK magazines (three empty magazines and two with 13 rounds each) and two mobile phones were recovered at the café after the attack.

At the Taj Mahal Hotel, the Leopold Café team joined with two more terrorists from the group, who are believed to have arrived by taxi. The terrorists then planted two IEDs at opposing ends of the building. These IEDs were designed with time-delay fuses set to detonate five hours later, after the first responders arrived. The IEDs contained 17 pounds of RDX and ball bearings that were secured in a metal box, similar to an ammo can. Both devices left at the Taj Mahal were later deactivated by Indian explosive ordnance disposal (EOD) personnel. The IEDs, according to informed sources, closely resembled devices previously used by terrorist groups linked to Pakistan.

The main terrorist group is reported by witnesses to have walked into the lobby, while the Leopold Café team entered the 582-room Taj Mahal by way of a rear exit and then moved through the hotel, killing people at the pool area

The terrorist cell reached Badhwar Park in south Mumbai at about 2030. After stowing the dingy, the group broke into five two-man teams and reportedly moved by foot, cab, and motor scooter to their targets.

t was at this point that they were issued their weaponry, with each of them receiving a Chinese-made AK- 56 with 200 rounds in magazines,

a 9mm handgun with 200 rounds in magazines, eight grenades, pre-constructed improvised explosive devices (IEDs), and a cell phone.

Meanwhile, an Indian registered trawler named Kuber docked near the Al Husseini. This vessel was hijacked by a terrorist support team the next day, with the terrorists killing four of the trawler’s crew and transferring their bodies to the Al Husseini. The terrorists also loaded their equipment, including an eight-to-eleven man dinghy and a 40-horsepower outboard motor, onto the Kuber. Then, on November 23 at 0400 hours, the terrorists forced the captain of the Kuber to set course south toward Mumbai. The terrorists apparently hoped the vessel would help deflect any Indian Coast Guard suspicions.

The Kuber reached the Mumbai coast on November 26 at 1600 hours. As with most aspects of this attack, the reports of what happened next vary widely. At any rate, the terrorists apparently killed the captain of the Kuber and then transferred to their dinghy for the three- to four-nautical mile trip to shore. The terrorist cell reached Badhwar Park in south Mumbai at about 2030. After stowing the dingy, the group broke into five two-man teams and reportedly moved by foot, cab, and motor scooter to their targets. The teams’ prearranged targets were the crowded Chatrapati Shivaji Terminus (CST) railway station, the Oberoi/Trident Hotels, the Nariman House

I

Page 8: The Counter Terrorist Magazine - June/July 2009

8 The Counter Terrorist ~ June/July 2009

and in the lobby. The four terrorists then gathered hostages and took them to the upper floors, where a three-and-a-half day standoff with the Indian military began. The terrorists also reportedly set fires throughout the hotel.

During the seemingly endless hours of the siege, all of the hostages were killed. Indian commandos would encounter and evacuate another 450 other civilians from the Taj Mahal during their search and clearing mission, and they would also retrieve and disable many IEDs left by the terrorists.

It was later discovered that the sole captured terrorist, Azam Amir Qasab, apparently rented room 630 at the hotel, using false student identification, a few days prior to the attack, thus accounting for his apparent intimate knowledge of the building and its functions. Moreover, during the siege at the Taj Mahal, communications between the terrorists and their handlers were intercepted. In these communications, the terrorists were reportedly instructed to throw grenades and set fires throughout the hotel.

Meanwhile, as the Leopold/Taj Mahal

attacks were taking place, two more of the terrorists moved by taxi to the CST station (formerly called Victoria Station). Once there, they entered the waiting area near the tracks, where they threw grenades and opened fire on the unsuspecting travelers, killing 55 citizens. The terrorists were eventually engaged with small-arms fire by the railroad police, which forced them to flee on foot over a walkway toward the Cama hospital, where they killed four more people. Shortly thereafter, a police vehicle from the counter terrorist unit arrived, containing three of Mumbai’s senior counter terror police commanders and a fourth constable. The terrorists killed three of the responding senior police officers and wounded the fourth officer in the back seat before commandeering the vehicle. The attackers apparently believed that the fourth officer was dead. The terrorists then deposited the bodies of Chief Hemant Karkare (head of the police counter terrorist squad) and the other two officers in the street.

Using the police vehicle, with the wounded but conscious police officer lying on the rear floor, the terrorists next carried out a drive-by shooting at the local Metro Big Cinema movie theater only three-tenths of a mile from the CST station, killing one. They then hijacked a second car, after the police vehicle was damaged by police gunfire, and headed toward Girgaum Chowpatty, a crowded beach recreation area. On their way, they ran into a checkpoint at about 0100 hours, where one terrorist, Ismail Khan, was killed and another, Azam Amir Qasab, was wounded and captured. (Thankfully, the wounded officer in the disabled police vehicle was able to provide a description of the second hijacked vehicle, which permitted the intercept before the terrorists reached the resort area.) Within the second hijacked vehicle,

The terrorists approached Mumbai by water. ©istockphoto.com/ntn

The terrorists killed three of the responding senior

police officers and wounded the

fourth officer in the back seat before commandeering

the vehicle.

FREE 5.11 HAT

With purchase of any two 5.11 Tactical clothing items.Limited time offer, while supplies last.

FREE SHIPPING

FREE RETURN SHIPPINGwww.LAPoliceGear.com

5.11 Tactical Taclite Pro Pants

SKU: 511-74273

866-793-1911

FREE 5.11 TDU BELT WITH EVERY PAIR($12.99 M.S.R.P)

$39.95

GET THIS FROMLAPOLICEGEAR.COM

WHEN YOU BUY THESE

PLUSGET:

FREE

www.LAPoliceGear.com

Page 9: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 9

FREE 5.11 HAT

With purchase of any two 5.11 Tactical clothing items.Limited time offer, while supplies last.

FREE SHIPPING

FREE RETURN SHIPPINGwww.LAPoliceGear.com

5.11 Tactical Taclite Pro Pants

SKU: 511-74273

866-793-1911

FREE 5.11 TDU BELT WITH EVERY PAIR($12.99 M.S.R.P)

$39.95

GET THIS FROMLAPOLICEGEAR.COM

WHEN YOU BUY THESE

PLUSGET:

FREE

www.LAPoliceGear.comCircle 305 on Reader Service Card

Page 10: The Counter Terrorist Magazine - June/July 2009

10 The Counter Terrorist ~ June/July 2009

police found two AKs, eight magazines, two handguns, ammunition, and five grenades.

Authorities have reported that when two of the terrorist teams got out of their taxis at their respective locations, they left explosive charges in the vehicles. Later on, the charges detonated, with the apparent goal of increasing confusion and destruction. One of the bombs killed a taxi driver, a lawyer that got into the cab at the CST station, and a civilian on the roadside. Remnants from this detonation traveled over 300 yards. The second taxi device killed a cab driver.

As the train station, Leopold Café, and Taj Mahal attacks were unfolding, a fourth terrorist team attacked the Chabad/Nariman House. At about 2145 hours, the terrorists entered the facility. They had already hurled grenades at a nearby gas station on the Colaba Causeway. The terrorists entered the

house shooting and throwing grenades and moved 13 hostages to the upper floors, ultimately killing five occupants.

This house was supposed to have been guarded by a security officer, who apparently was not present at the onset of the assault. A panic alarm was sounded by someone inside the Nariman House, causing the arrival of Israeli security service personnel from the nearby consulate within 15 minutes, but the Israelis were turned back by the crowd and allegedly taken into custody by the Mumbai police for not having identification.

During the Nariman assault, Indian commandos were given misinformation about the building, which resulted in them initially fast-roping from a helicopter (what the Indians call a “slithering operation”) onto the wrong building. However, at the end of the eventual two-hour assault by the Indian

Circle 349 on Reader Service Card

While the events involving the

other four teams of attackers were

occurring, the remaining set of

terrorists took a taxi to the Trident and

Oberoi hotels.

Page 11: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 11

Page 12: The Counter Terrorist Magazine - June/July 2009

12 The Counter Terrorist ~ June/July 2009

commandos, both terrorists were killed. As with the Taj Mahal terrorists,

conversations between the Nariman House attackers and their handlers were also intercepted. In these conversations, the terrorists were given specific instructions, and the handlers supposedly commented, “If the hostages are killed, it will spoil relations between India and Israel.”

While the events involving the other four teams of attackers were occurring, the remaining set of terrorists took a taxi to the Trident and Oberoi hotels. Contrary to some government reports, these are two separate and distinct facilities, totaling 877 rooms, connected by a common 15-yard breezeway. The assault on these facilities began at about 2235. At that time, both terrorists entered the Trident’s lobby while throwing grenades and firing indiscriminately, immediately killing at least seven people. Moreover, prior to entering the lobby, the terrorist pair placed a bomb near the hotel entrance, which was subsequently defused by a police EOD unit.

The terrorists next moved through the Trident’s lobby to an interior door and hallway that led to the Oberoi complex, where they entered the Tiffin restaurant, killing 12 more people. The duo then went into the Kandahar restaurant, killing one more person and taking 12 hostages before moving to the 22nd floor, killing even more people along the way. At the end of the Trident/Oberoi siege, a total of 33 civilians had been slaughtered, and authorities confiscated two AK-type rifles, two loaded magazines, four empty magazines, and multiple empty ammunition cases and hand grenade clips.

The choice of the Trident/Oberoi is significant in that it added to the confusion and problems facing the responding police. Reports of explosions,

shootings, and terrorists holding hostages in two attached buildings required a possible hostage rescue at every turn and floor in each building.

Once the aforementioned set of attacks was over, Indian authorities continued to recover additional equipment used by the terrorists, reportedly including one GPS device. Interestingly, the device, which was found aboard the Kuber, was pre-programmed for a return to Karachi, Pakistan.

During the coordinated Mumbai attacks, the terrorists exploited the cover of darkness as best they could, combining it with hit-and-run tactics at the Leopold Café and the CST station, a drive-by attack at the movie theater, and stand-and-hold hostage positions at the hotels and the Nariman House. Based on the countless emergency calls that were made, the terrorists succeeded in creating the impression that there were more attack teams than was actually the case.

In Mumbai, India, the evening of November 26, 2008, started out much like any other night in a large metropolitan area. Later on, however, terrorists originating from Pakistan would, in the words of the only captured attacker, attempt to make Mumbai the “Indian 9/11.” Although an unknown group called Deccan Mujahideen later took credit for the attack via e-mail sent to the Indian news media, it is believed that Lashkar-e-Tayyiba (LeT) was actually behind this tragic turn of events. •ABOUT THE AUTHOR

Maj. Bail is the SWAT Commander for the City of Chester (Pennsylvania) Police Department. He has served that agency for 36 years and is an instructor and consultant for the Archangel Group. His insight for the above article is based upon direct interview of key personnel and site visits.

©istockphoto.com/ewenjc

Page 13: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 13Circle 325 on Reader Service Card

Page 14: The Counter Terrorist Magazine - June/July 2009

14 The Counter Terrorist ~ June/July 2009

Inside Abu Ghraib Prison. Photo: Courtesy of Dr. Saccone.

WEDDINGCOUNTERINTELLIGENCE TO LAW ENFORCEMENT

By Dr. Richard Saccone

Counter The

First Hand:

Page 15: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 15

CI forces were assigned to human intelligence (HUMINT) support teams. In this capacity, CI agents were relegated to screening local nationals who required access to the base, as well as to gathering enemy intelligence generally reported up the chain of command in the form of Intelligence Information Reports. Because they were operating according to the intelligence-centric model, these CI agents supported the larger intelligence-gathering mission. By design, they suffered restricted arrest power, were limited in both investigative authority and investigative experience, and were prohibited from pursuing criminal matters.

At both Abu Ghraib and Mosul, however, CI elements were integrated with Force Protection, which is Army

This point is perhaps best illustrated through an example from Abu Ghraib. At the now-famous prison also known as “Abu G,” the smuggling of contraband, especially drugs, by both prisoners and Iraqi correction officers was rampant.

here are two primary models to conducting competent CI: the Army intelligence-centric model and the FBI law enforcement

(LE) model. The intelligence-centric model treats CI as a subset of the intelligence field, dedicated to gathering tactical and order-of-battle information about the enemy. In contrast, the FBI-based LE model treats CI as a law enforcement function that is inextricably entwined with the skill of investigation; incidentally, this approach is more applicable to domestic counter terror efforts.

In Iraq, the US Army generally assigned CI elements as direct support (DS) to combat units operating outside the wire on patrol or as general support (GS) anchored to a base. Other civilian

Whether protecting a municipal airport, an office building, or a manufacturing plant, counterintelligence (CI) principles are essential to success. Identifying hostile threats and neutralizing them before catastrophe strikes is a key role of CI agents.

WEDDINGCOUNTERINTELLIGENCE TO LAW ENFORCEMENT

The Counter Terrorist ~ June/July 2009 15

T

Page 16: The Counter Terrorist Magazine - June/July 2009

16 The Counter Terrorist ~ June/July 2009

in that drugs were sometimes used to “hype up” prisoners before an attempted breakout. Moreover, at Abu Ghraib, the Iraqis incarcerated terrorists along with common criminals, and the terrorists generally made use of the criminal connections to support their cause. Thus, similar techniques, along with the same networks of personnel used for smuggling drugs, were commonly employed to bring in weapons or an even more valuable commodity: information. In fact, the ability of the incarcerated terrorists to continue communicating with their associates outside the prison was vital to the insurgency. Prisoners used smuggling networks, composed of family visitors or corrupt guards, to pass information in and out of the prison system. Eventually, CI agents with dual LE mission experience were imperative in synthesizing criminal and counter intelligence information to infiltrate and break these networks, thus disrupting terrorist activity.

terminology for military police and base security. Here, the CI agents had law enforcement backgrounds and brought a highly developed investigative skill set to the fight. These agents didn’t merely relay information gathered from human sources; rather, they generated and investigated their own cases, similar to the ways in which detectives supplement a traditional police force. These CI agents with LE missions enjoyed the latitude to follow investigative leads, verify information, and challenge suspicious activity to uncover espionage and infiltration by hostile agents. After all, in the LE model, agents have the ability to collect criminal and counter intelligence information, investigate subsequent leads, and even interrogate suspects.

This point is perhaps best illustrated through an example from Abu Ghraib. At the now-famous prison also known as “Abu G,” the smuggling of contraband, especially drugs, by both prisoners and Iraqi correction officers was rampant. This presented an enormous problem

Working closely with Base Force

Protection, the team quickly discovered a

dangerous vulnerability in the lack of control

over foreign nationals with access to the

facilities. In fact, we had no way to know

for sure how many foreign nationals could

gain such access.

Capture of insurgent. Photo: Courtesy of Dr. Saccone.

Page 17: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 17Circle 105 on Reader Service Card

Page 18: The Counter Terrorist Magazine - June/July 2009

18 The Counter Terrorist ~ June/July 2009

The same was true in the volatile and extremely violent northern city of Mosul. The third largest city in Iraq, Mosul is an ancient crossroads for peoples from a variety of religious and ethnic backgrounds. Even today, it remains the last hotbed of violence in an otherwise subdued Iraq.

In December 2004, a suicide bomber blew himself up in the dining facility on Forward Operating Base (FOB) Marez in Mosul, killing Americans and Iraqis and wounding over 60 in a devastating terrorist attack that could have been prevented. I reached Mosul after the bombing, as the head of a HUMINT CI team assigned to support a new Army unit taking control of the base, which included FOBs Marez and MAF, coincidentally containing the largest airfield in northern Iraq. Working closely with Base Force Protection, the team quickly discovered a dangerous vulnerability in the lack of control over foreign nationals with access to the facilities. In fact, we had no way to know for sure how many foreign nationals could gain such access. Traditional law enforcement resources working with CI elements therefore began the long process of identifying and screening the thousands of personnel entering and exiting the facilities. Our task was further complicated by the diversity of the personnel. Faced with Arabs, Kurds, Iraqis, Turks, Filipinos, Somalis, Pakistanis, and even a few Iranians, Shiite and Sunni Muslims along with Christians, the task was indeed daunting. Language and cultural barriers combined with ethnic and sectarian differences presented an enormous problem.

The painstaking process of screening and investigating individual backgrounds and instances of suspicious behavior provided a foundational approach to sorting out the “bad guys.” What used

Circle 191 on Reader Service Card

Circle 281 on Reader Service Card

PRE-CONFERENCE 1 DAY TRAINING FROM SSI “THE ISLAMIC JIHADIST THREAT” CALL FOR DETAILS! 866-573-3999

Page 19: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 19Circle 107 on Reader Service Card

Page 20: The Counter Terrorist Magazine - June/July 2009

20 The Counter Terrorist ~ June/July 2009

Let

How REAL isyour TRAINING?

our knivesSHOCK you!

New for 2009!Shocknife

Spontaneous Edged Weapon Defense Instructor Course

New for 2009!Shocknife

Spontaneous Edged Weapon Defense Instructor Course

www.shocknife.com

to be called basic “gumshoe” detective work led to the uncovering of petty criminals and organized crime rings, as well as insurgents. It allowed our Force Protection/CI team to confiscate considerable contraband and even weapons. Most importantly, it facilitated our ability to identify and neutralize individuals who had penetrated our ranks, outwardly earning the trust of our soldiers while secretly acting in the interests of the insurgency. Whether these individuals were posing as simple construction workers or as critical translators, we eventually succeeded in uncovering them, thus regaining control

Source information developed during local national screening helped fill in the puzzle of who the on-base workers were, where they came from, what their reputation was, and what they were doing when they thought the Americans weren’t watching. Workers frequently informed on one another, providing details on past criminal histories or behaviors indicative of insurgent sympathy, which allowed us to focus our limited resources on those individuals with a high probability of insurgent or illegal activity.

The ability of our team to pursue criminal as well as counterintelligence-related data proved key to developing information related to the overall security of the base. Criminal activity and insurgent-related intelligence activity frequently overlap; after all, criminals and insurgents use similar methods to conceal their behavior and may even cooperate with each other to

of our installations by weeding out those that meant to do us harm. This herculean effort essentially took our base from the least secure in Iraq at the time of the December 2004 suicide bombing to the most secure by the fall of 2005.

Without question, the use of CI agents in an LE mode made the difference in Mosul. The ability to investigate suspicious activity and verify individual’s backgrounds at our discretion became a force multiplier in gathering criminal and counterintelligence information. In addition, the screening of thousands of foreign national employees through individual interviews served as a vital pool of confidential sources, exponentially increasing the number of eyes and ears spotting illegal activity or suspicious behavior around the area. This is the basis of a defensive counterintelligence program as effective in a US-based company as it is on the battlefront.

Without question, the use of CI agents in an LE mode made the

difference in Mosul.

Circle 321 on Reader Service Card

Page 21: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 21Circle 341 on Reader Service Card

Page 22: The Counter Terrorist Magazine - June/July 2009

22 The Counter Terrorist ~ June/July 2009

accomplish their mission. For example, we discovered that Turkish organized crime sometimes cooperated with Iraqi insurgents in the kidnapping for ransom of foreign national employees on base. The insurgents needed money, and the Turkish criminals could help with spotting, translating, and contacting family or responsible parent employers

is that agents are plugged into the enormous network of information and sources that accompanies the traditional law enforcement mission. In other words, cops have a wider area of interest to “snoop around,” asking much broader questions and developing broader associations. In contrast, intelligence-centric CI agents are narrowly focused and miss opportunities to latch onto leads that may appear criminal but develop into CI-related activity. Incorporating LE with CI also makes agents more available and approachable. In fact, the reputation of our CI unit in Mosul attracted military supervisors to contact us concerning the suspicious behavior of their foreign national workers.

One such incident involved a translator who had been asking a few too many questions about a certain military unit’s operations. It was not uncommon for interpreters to desire access to information about a unit to facilitate better translations, but in this case, a few military personnel and even other Iraqi translators became uncomfortable. They might have let it pass but for the reputation of our unit and the relationship we developed with local military members. A few noncommissioned officers therefore approached us with their suspicions early on; this allowed our unit to conduct discreet checks concerning the suspect, eventually uncovering a previous history of suspicious behavior coupled with the suspect’s current overcuriosity. Ultimately, the individual was identified as either under the direction of or in some way assisting the insurgency.

Commercial security professionals can adapt the same battlefield techniques for use inside their companies. Commercial security and domestic LE organizations need to develop cooperative defensive criminal and counterintelligence information networks inside businesses. Frequent briefings that encourage

within Turkey. In other situations, the insurgents desired information about the base, its personnel, and the activities of US forces. Here, foreign nationals from a number of countries had access to such information, and they were sometimes willing to cooperate with the insurgents in exchange for money.

The strength of the CI/LE model

Circle 299 on Reader Service Card

Page 23: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 23Circle 109 on Reader Service Card

Page 24: The Counter Terrorist Magazine - June/July 2009

24 The Counter Terrorist ~ June/July 2009

Because it’s an

Secure Storage forArms, Ammunition & Explosives

www.armagcorp.com (502) 348-3987

16 x 8 x 8 (2 Compartment)C O R P O R A T I O N

®

C O R P O R A T I O N

®

McCormick Place, ChicagoJune 8–11, 2009

*Pre-Conference Seminars: June 6–8

Formerly the NFPA World Safety Conference & Expo® (WSC&E)

Get the latest information on a wide range of relevant topics:• Detection & Suppression

Systems• Fire & Life Safety• Facility Fire Safety & Security• Emergency Preparedness/

Business Continuity• Compliance & Regulatory

Updates

21 Pre-Conference Seminars* include:• NFPA 1600, Disaster/

Emergency Management and Business Continuity Programs

• NFPA 921, Guide for Fire and Explosion Investigations

Connect with more than 300 top fi re and life safety exhibitors at the Expo!

FOR DETAILS AND TO REGISTER, LOG ONTO

nfpa.org/conference

employees to remain alert for indications of criminal or other suspicious behavior can provide the leads internal investigators need to uncover both criminal and terror-related behavior. As we saw in the recent terror attack on the Taj Hotel in India, terrorists may have planned for a year beforehand. The surveillance, dry runs, and intelligence gathering required for an attack such as this leave telltale clues.

By educating employees on what to look for and who to report it to, security professionals ultimately encourage sources to come forward with information that can help uncover and foil developing terror activity before it happens. Industrial espionage, as well as personal security protection of employees and high-value targets such as executives, requires consistent effort. Counterintelligence awareness can prevent serious breeches of security. Defensive CI measures are especially important for companies operating overseas, where personnel and facilities may be even more vulnerable to intelligence gathering and terrorist attacks.

Even in the absence of a clear terrorist threat, a combined CI/LE approach to security will often reveal previously undetected criminal activity within an organization. Ultimately, close cooperation between CI and law enforcement/security is an effective preventive measure that can be employed to counter terrorist activity. •ABOUT THE AUTHOR

Dr. Saccone is a retired USAF counterintelligence officer. He served in Iraq at Abu Ghraib and Mosul. Dr. Saccone teaches at Saint Vincent College’s Alex G. McKenna School of Business, Economics, and Government in Latrobe, PA and is the author of The Unseen War in Iraq: Insurgents in the Shadows (Hollym, 2008).

Circle 111 on Reader Service Card

Circle 103 on Reader Service Card

Page 25: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 25

�����������������������������

������������������������������

���������������������������������������

������������������������

�����������������������

��������������������������

�� ��������������������������

�� ������������������������������

�� ������������������

�� ������������������������������

�����������������������������������

�����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

�������������������������������������������������������������������������

������������������������������������������� � ��������������������������������� �

�����������������������������������������

���������������������

��������������������������������������������

�������������������������������������

��������������������������������������������������

������������������������������������������

�������������������������������������������

�����������������������������������������

��������

�������������� ��������������������

Circle 295 on Reader Service Card

Page 26: The Counter Terrorist Magazine - June/July 2009

26 The Counter Terrorist ~ June/July 2009

THE MEXICAN DRUG WARSpills Over United States Border

©istockphoto.com/mikadx

By Jennifer L. Hesterman

Counter The

When Gen. Mauro Enrique Tello Quinonez retired after decades of service with the Mexican army, he still wanted to serve his country. He therefore willingly accepted a posting as a security advisor and senior counter-drug official in Cancún. Unfortunately, his first day on the job turned out to be his last: Tello was kidnapped, brutally tortured, and shot 11 times.

Page 27: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 27

was among those arrested for his direct involvement in the general’s assassination. Almanza, who was a Mexican soldier himself from 1997 to 2004, was stockpiling an impressive cache of weapons: Officials seized 43 rifles and handguns, two grenade launchers, 23 grenades, a rocket launcher, and more than 12,000 rounds of ammunition. Almanza’s brother Ricardo was also implicated in the killings, but unfortunately, he remains at large. Mexican officials have stated that Ricardo was in Belize at the time of his brother’s arrest, trying to smuggle a 20-ton shipment of cocaine into the country.

Through his involvement in the Tello killing, Octavio Almanza was sending a clear, unequivocal message to the Mexican government, one repeated both across Mexico and along the country’s border with the U.S.: The Zetas are unafraid and battle ready.

Imagine, for a moment, that one of America’s elite special operations units goes “rogue” and starts using its specialized skills, equipment, and training against the U.S. government...meet the Los Zetas organization.

O n February 3, 2009, his body, along with the mutilated and bullet- ridden bodies of his driver

and security officer, was found in a car alongside a road in Cancún.

Tello was not the only high-ranking army officer killed in the city, which is best known for its lucrative tourist industry. In 2006, Lt. Col. Wilfrido Flores Saucedo and his aide were gunned down on a Cancún street. The assailants escaped and were never captured.

Luckily, in Tello’s case, the military had several leads and quickly moved in to assume control of the investigation. Cancún’s police chief was removed from his position and put under house arrest. His detainment was quickly followed by the apprehension of seven men, all members of the deadly and widely feared Los Zetas organization.

A Los Zetas leader Octavio Almanza

THE MEXICAN DRUG WARSpills Over United States Border

©istockphoto.com/BWBImages

Page 28: The Counter Terrorist Magazine - June/July 2009

28 The Counter Terrorist ~ June/July 2009

its members receive specialized training in jungle, amphibious, urban, and high mountain operations from the best counterterrorism and counterinsurgency units in the world. In recent years, the GAFE’s primary mission morphed from providing protection to key officials and buildings to one of assisting the country in dismantling drugs cartels. Therefore, with their inside knowledge of the inner workings of cartels, along with their counterintelligence, disguise, and insurgency training, the Zetas are a complex and lethal force.

Under the umbrella of the Gulf cartel, the Zetas act as hit squads to eliminate the “enemy,” which typically consists of members of law enforcement and the Mexican government. Zeta executions are savage; they often set their targets on fire, decapitate them, and saturate their bodies with bullets. The Zetas also engage other cartels in the protracted battle for control of trafficking routes at the U.S.-Mexico border. Although other paramilitary or “enforcement groups” are present in those cartels, such as the Los Zeros of the Alianza (also known as Juarez) cartel, the DEA has labeled the Zetas as “the most technologically advanced, sophisticated, and violent.”1 This group is clearly operating in the border region; in November 2008, for example, a Zeta leader named Jaime Gonzalez Duran was arrested just across the border from McAllen, Texas. Furthermore, the group may wield control over such U.S.-based gangs as the Mexican Mafia, the Texas Syndicate, MS-13, and the Hermanos Pistoleros Latinos.2

CHAOS AT THE BORDER Marisella Molinar was like many people

who live in El Paso, Texas: Every day, she made the quick trip across the border to her workplace in Juarez, Mexico. Molinar

UNMASKING THE ZETASImagine, for a moment, that one

of America’s elite special operations units goes “rogue” and starts using its specialized skills, equipment, and training against the U.S. government. The members of the unit participate in illegal activities such as drug trafficking, gun running, and human smuggling. They also serve as hit squads, willing to murder innocent victims in return for cash. The unit does not fear, hide, or run from law enforcement; rather, it engages.

Meet the Los Zetas organization. With an estimated membership of 2,000, the core of the Zetas is composed of former members of the Grupo Aeromóvil de Fuerzas Especiales, or the GAFE. The GAFE is the special forces arm of the Mexican army, and

The protracted and violent battle

for control of highly coveted

drug routes into the United States is exacting a cost like never before.

©istockphoto.com/mikadx

Page 29: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 29

was a secretary for a top lawyer in Juarez, and unfortunately, she was with him on December 3, 2008, when a cartel sought vengeance. Molinar and her employer were instantly killed when their vehicle was hit with a barrage of fire from AK-47s, with 85 rounds expended in all. It was yet another ruthless killing and a message to law enforcement and the Mexican government from the cartels. The citizens of El Paso continue to face this menacing threat just across the river; in fact, the violence in Juarez is escalating, with 400 deaths already in 2009.3

The protracted and violent battle for control of highly coveted drug routes into the United States is exacting a cost like never before. In 2005, the governors of Arizona and New Mexico declared a state of emergency within their border counties due to the escalating violence and threat to American citizens. The Mexican government criticized this action, although it sent officials to the table to discuss how to best address this issue with its American neighbors. Four years later, the situation is as dire as ever. Areas along the border are virtual war zones, with towns on both sides caught in the crossfire. For instance, border-related crime in Arizona is rapidly escalating, with increased numbers of kidnappings, shootings, and home invasions by masked men wearing military battle dress uniforms.4 Incredibly, in 2008, Phoenix ranked second in the world in kidnappings for ransom, just behind Mexico City.5

A battle is also raging for control of Interstate 35, a highly desired route for drug traffickers. I-35 begins at the border in Laredo, Texas, and it traverses major cities like Dallas, where Zeta presence has already been detected. In fact, a 2005 Justice Department memo indicated that the Zetas had been active in the Dallas area since 2003, and police there have

launched a manhunt for Maximo Garcia Carrillo, a suspected Zeta who owns a house in the Oak Cliff suburb of the city. Carrillo is believed to have killed Dallas police officer Mark Nix.6

After Dallas, I-35 has intermittent empty stretches of highway, but it eventually passes through Oklahoma City, Kansas City, and Minneapolis. The interstate ends in Duluth, Minnesota, at the Canadian border. The importance of this corridor to the cartels is significant;

as the former head of the DEA’s El Paso Intelligence Center once stated, “Drug traffickers kill for I-35.”7

More recently, the Zetas have also become involved in the human smuggling business, charging a 10-percent commission for use of the border and the Interstate 35 corridor.8 If it seems incredible that the Zetas charge smugglers to operate on U.S. real estate, consider that Zeta commandos are now reportedly living north of the Rio Grande.9

2009 INCIDENTS: CRISIS AT THE BORDERWithin the first few months of 2009, the situation along the Mexican border has continued to worsen. Some examples and statistics that illustrate this trend are as follows:

• The murder rate in Mexico is escalating. As of February 2009, 1,000 people were dead; in 2008, that number wasn’t reached until late April.

• In early March, fighting between rival gangs in a Juarez prison leaves 20 people dead and seven injured. To help control the violence, 1,500 extra security forces are deployed to the city.21

• In late February, gunmen attack a convoy carrying the governor of the border state of Chihuahua. The attack results in the death of one of the governor’s bodyguards.22

• Also in February, gunmen in Juarez engage a military vehicle, firing over 100 rounds, killing the city's number-two law enforcement official and three bodyguards.23

• The same week in Juarez, five city police officers and a jail guard are killed. Signs soon appear in the city stating that an officer will die every 48 hours unless the police chief steps down. He promptly complies.

• Around the same time, “narco banners” in Juarez threaten the mayor’s family, including his relatives in the United States.24

• In mid-February, a shootout between cartel members and police leaves 10 dead in the border town of Reynosa, which is the home of many U.S.-owned factories.25

• In January, 11 people are killed and one is kidnapped within a 24–hour period in Juarez.26

Page 30: The Counter Terrorist Magazine - June/July 2009

30 The Counter Terrorist ~ June/July 2009

THE MAJOR CARTELS: FLUSH WITH CASH AND WEAPONS

When it comes to the ongoing battle for control of the Mexican drug trade, a majority of the violence is perpetrated by three groups, each of which has massive cash assets and the weaponry of a small army: the Gulf cartel (which is the Zeta’s parent organization), the Sinaloa cartel, and the Juarez cartel.

����������������������������������������

���������������������������������������������������������������

�������������������������������

��������������

�����������������

��������������������������������

������������ ������!�����"������#�

����������$�������������������� �%

&��������������'��������

���������##���#( ����������'���������

������������������������������������ ����!�� �������"�#�$���� �%�������������������

Circle 307 on Reader Service Card

• GULF CARTEL: Gulf cartel leader Osiel Cárdenas, a former state police officer in Mexico, was arrested and extradited to the U.S. in 2007. In his absence, the operational leadership of the Gulf cartel has been decentralized, with three major branches and leaders. Based in Matamoros, the cartel has a large presence in the border cities of Reynosa, Miguel Alemán, and Nuevo Laredo. The Gulf cartel also has an extensive support system, among them the Zetas, who are the enforcement arm of the organization. More than 175 Gulf cartel operatives who were working in the U.S. were arrested last fall as part of the DEA’s Project Reckoning, which identified networks reaching from the Mexican border to Georgia, New York, North Carolina, and other states. Through this operation, the DEA seized $60 million in cash and over 40 tons of illegal drugs that belonged to the Gulf cartel.10

• SINALOA CARTEL:The Sinaloas, also known as the

Federation, began to contest the Gulf cartel’s domination of the coveted southwest Texas corridor after Cárdenas’s arrest. Although it rapidly

©istockphoto.com/LilliDay

Page 31: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 31

grew in size and wealth, the Sinaloa cartel was recently dealt a major blow via the DEA’s Operation Xcellerator, which dismantled much of the cartel’s operation in the United States. The agency announced in February 2009 that over the last two years, they were able to pinpoint 70 drug distribution centers in 26 U.S. states; in all, agents arrested 750 traffickers and confiscated 23 tons of cocaine. Notably, many of the Sinaloa’s drug hubs were not in major metropolitan areas. For example, one distribution center was located in Stow, Ohio, a quiet community of 35,000. The Sinaloas were sending cocaine through the local airport, shipping the drug from California to Stow on a regular basis.11

• JUAREZ CARTEL: The Juarez cartel now calls itself

the Golden Triangle Alliance, or La Alianza Triángulo de Oro, because its leadership is located in three Mexican states. At its height in the late 1990s, when pushing 50 percent of the cocaine into the U.S., the Juarez cartel was considered the most powerful in the world, exacting a $200 million profit per week. The organization is still powerful, and it is currently fighting with the Zetas for control of the Nuevo Laredo area.

THE MEXICAN ARMY: ENGAGED IN LOW INTENSITY CONFLICT

Mexican president Felipe de Jesús Calderón Hinojosa’s primary goals when entering office in 2006 were to grow his country’s economy by creating jobs and to reduce poverty. Unfortunately, the battle for control with the drug cartels

©istockphoto.com/wsfurlan

KRAV MAGALearn

• Two program levels: Up-to-speed and Extreme*• No distinction between men and women in training• Mental preparation to defend yourself• Quickly neutralize an attacker• Transition from defense to offense quickly• Exploit the natural reflexes of the body • Exploit all vulnerable points on the body • Use any available objects as aids• See Haifa, Tel Aviv, Jerusalem and the Dead Sea (Masada). Tour while you train!

Join SSI, the premiere Homeland Security training company, in learning KRAV MAGA, the Israeli art of self-defense—taught by the world’s leading experts.

Whether you are professional or a civilian, you’ll learn to deal with any threat using one of the most effective, hand-to-hand martial arts in this very special training event held June 12th - 20th, 2009.

CALL US NOW TO RESERVE YOUR PLACE. 1-866-573-3999 (STRICTLY LIMITED TO 30 PARTICIPANTS)

$3900 includes EVERYTHING • Departs from Newark: June 12, 2009

~ Join the more than 700 Federal, State and local agencies that have chosen SSI as their training source ~

from the experts—in Israel

*Extreme is only for veteran practioners and US Krav trainers

www.homelandsecurityssi.com • 866-573-3999

SECURITY SOLUTIONS INTERNATIONALProtecting the Homeland Together ®SSI

®

SSI

Circle 119 on Reader Service Card

Page 32: The Counter Terrorist Magazine - June/July 2009

32 The Counter Terrorist ~ June/July 2009

EST. 1866

W.S. JENKS & SON

C

Our NEW Hands Free Gear Vest & Bib allows you to take only the tools needed on site. With over 16 velcro pouches, this

system can accomodate any tool requirement. Select the tool and pouch, slap on the vest and carry only what you need.

Case and Custom pouches available.

The Jenks BDK1-Y squad kit is the most complete kit on the market today. Our updated kit includes our new Hands

Free Gear Vest and Bib with 6 pouches and carry case.

When time is critical, our First Responders Kit gives you the essential tools to do the job.

The case has enough room to include either our Hands Free

Vest or Bib with pouches.

953 V ST N.E. Washington D.C. PH: 877-975-3657 (877-wsjenks) FX:202-832-3411 www.WSJENKS.com [email protected]

B D K 1 - F RF I R S T R E S P O N D E R S U N I T B D K 1 - Y

H I - V I S Y E L L O W M O B I L E C A S E

C

B D K 1 - G V Sh a n d s f r e e g e a r v e s t

C

B D K 1 - G V Bh a n d s f r e e g e a r b i b

has proved a major item on Calderón’s agenda. Mexico’s murder rate is escalating dramatically, from 3,000 in 2007 to over 6,000 in 2008. There were 1,000 murders in January 2009 alone, provoking the U.S. State Department to announce a travel advisory for American citizens planning to vacation in Mexico over the 2009 spring holiday.12 This type of announcement certainly doesn’t bode well for one of Mexico’s primary industries: tourism.

Calderón, who has compared Los Zetas to al-Qaeda, has made combating the drug cartels his highest law enforcement goal. He is employing Mexico’s military to enforce compliance with his objectives, using 45,000 soldiers to meet the threat and join the 5,000 federal police already detailed to the issue. The Mexican Army is engaging in small-scale combat with the cartels, particularly the paramilitary factions like the Zetas—who have the exact same weapons in their arsenal and

are able to meet confrontation head on. Unfortunately, illegal drug operations and corruption go hand-in-hand, so it is difficult to know who you can trust on the streets. For instance, last year, four policemen from Nuevo Laredo were arrested for conspiring with the Zetas, using police frequencies to pass them critical information.

THE U.S. RESPONSEClearly concerned with escalating

bloodshed at America’s southern border, the previous director of the CIA surprised many when he stated that the violence in Mexico presents the number-two threat to U.S. national security, just behind al-Qaeda. Accordingly, federal and state governments have recently unveiled new plans to bolster U.S.-Mexico border security. For example, the federal government has launched the Secure Border Initiative, which includes plans for more agents to patrol the border,

Circle 319 on Reader Service Card

secure ports of entry, and strictly enforce immigration laws. The government also placed National Guard troops at the southwestern border under Operation Jump Start, where they are assisting U.S. Customs and Border Protection.

Beyond these efforts, the United States is aiding Mexico’s fight against the cartels under the provisions of the Merida Initiative, a multiyear $1.4 billion anti-narcotics package that increases law enforcement cooperation and intelligence sharing between the U.S. and Mexico. This initiative includes aircraft, software, hardware, communications technology, training to strengthen the Mexican judicial system, intelligence instruction, and advice on vetting new law enforcement personnel to prevent and identify corruption.13

In addition, the state of Texas recently launched Operation Rio Grande to increase border security. The efforts consisted of short-duration, regional

Page 33: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 33

LockDown, Inc.™ specializes in products designed to keep your

valuable infrastructure secure. Our LockDown Security Device keeps

unauthorized personnel out of manholes and can be outfitted with a

fiber-optic sensing device to alert you if tampering were to occur. Also

available is our LockOut Device which secures fiber boxes and other

handholes, protecting valuable cables and connectors often targeted

by thieves.

All products proudly manufactured and assembled in the U.S.A.

How secure is your infrastructure?LockDown, Inc.™ specializes in products designed to keep your

valuable infrastructure secure. Our LockDown Security Device keeps

unauthorized personnel out of manholes and can be outfitted with a

fiber-optic sensing device to alert you if tampering were to occur. Also

available is our LockOut Device which secures fiber boxes and other

handholes, protecting valuable cables and connectors often targeted

by thieves.

All products proudly manufactured and assembled in the U.S.A.

How secure is your infrastructure?

Circle 329 on Reader Service Card

Page 34: The Counter Terrorist Magazine - June/July 2009

34 The Counter Terrorist ~ June/July 2009

International Law Enforcement Training & Consulting Facility9450 NW 58st - Unit 105 • Doral, Florida 33178 • Phone: 305.471.4733 • Fax: 305.471.4831

www.alphatactical.com

The new FORCE in Tactical Training...

Alpha Tactical: the ultimate professional tactical training facility.• Emphasizing “Force on Force” training techniques

with reactive targets that can think, move and shoot back• 10,000 ft2 indoor training facility with a real MD-80

aircraft, 10 room fully reconfigurable shoot house and rappel wall

• State-of-the-art marker guns for realistic scenarios• 20 qualified professional instructors with decades of operational experience from both law enforcement and military backgrounds• Multi-language capability• Instructors available to travel to your location within

the United States, South America, Central America, Europe and all allied nations

• LE products, Class III dealer, Type II manufacturer and tactical equipment supplier

Open Enrollment Specialty Courses • FI Concealed Carry • Basic Pistol • Tactical Pistol • Tactical Carbine • Tactical First Responder • Tactical Shotgun • Carabiner Armorer • Glock Armorer • Executive/Dignitary Protection • High Risk Protection

Law Enforcement Courses • SWAT Operator Certification • High Power Tactical Rifle • SWAT Rappel • Aircraft Interdiction • Bus Assault • Low Light CQB • SWAT Instructor Certification • Vessel Search/Maritime Operations

Circle 317 on Reader Service Card

Page 35: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 35

operations that integrated local, state, and federal agencies.14 However, the spike in violence and necessary response to protect citizens is sapping the already resource-constrained state; in fact, Texas governor Rick Perry recently requested another $135 million to go toward the border security of his state.15

STRATEGIC IMPLICATIONS

Since 2005, the DEA has continually warned that drug-related violence will spill over the Mexican border into the United States. More recently, an October 21, 2008, FBI intelligence report painted a particularly grim picture. It advised that the Zetas were reinforcing their ranks and stockpiling weapons in safe houses in the U.S. in response to crackdowns; moreover, the report predicted an escalation of violence on both sides of border in the months to come.16

Thus, the future is now a harsh reality. Although it appears that tactical-level needs are being addressed, larger national security questions will require additional action to turn the tide on the growing instability in the region and the entire hemisphere. For instance, can national assets be used for domestic security when it is threatened by criminal terrorists such as the Zetas? Also, with $12 billion to $15 billion per year flowing from the United States to Mexican drug traffickers,17 how can we reduce demand or discourage use?

Michael Sullivan, former acting director of the ATF, recently stated that investigators have traced large numbers of the illegal weapons found in Mexico to the United States.18 The U.S. is addressing the issue with gun dealers in our country and at the border through the ATF’s Project Gunrunner, but how can Mexico tighten its border security to

9450 NW 58st - Unit 105 • Doral, Florida 33178 • Phone: 305.471.4733 • Fax: 305.471.4831Circle 335 on Reader Service Card

stop the southward flow of weapons into the hands of the cartels?

Furthermore, how can the U.S. better secure long, unattended, open stretches of its northern border now that Mexican gangs have infiltrated Canada? The Sinaloa and Gulf cartels have been strengthening their drug trafficking operations in Canada, and they are contributing to escalating gang and drug-related violence in that country.19

It’s also critical to note that Hezbollah, Hamas, and possibly al-Qaeda are already operating in South America. Therefore, policymakers and operators alike must ask the following question and confront the inevitable answer: Would the Zetas partner with these groups and provide a new, asymmetric challenge to the U.S.?

In the face of the escalating threats at the U.S. border, perhaps it is time to take a harder line to protect our security. One option is to officially designate Los Zetas

Page 36: The Counter Terrorist Magazine - June/July 2009

36 The Counter Terrorist ~ June/July 2009

as a terrorist group. The Zetas meet the State Department’s threshold as a foreign organization that threatens our national security, and they certainly pose more of a danger to our national security than several dormant groups that reside on the

Circle 279 on Reader Service Card

list (November 17 and Aum Shinriyko/Aleph, for example). The Zetas also have the weaponry to operate as irregular forces, with fire teams capable of carrying out autonomous operations with tactical flexibility. It is time to recognize that some transnational criminal groups aren’t just in the money-making business—they also use terror as a tactic and act in a subversive manner toward governments and law enforcement institutions.

If the murder statistics and the fact that the Mexican Army is engaged in conflict with its own citizens aren’t convincing enough, consider that 53 percent of Mexicans believing the drug cartels are winning the ongoing battle.20 In the words of former U.S. drug czar Gen. Barry McCaffrey, “This is the most alarming situation I’ve seen in Mexico in 15 years. Our own interests are at stake. We must stand with these people; they’re literally fighting for their lives.”

And, it appears, so are we. •ENDNOTES1 2008 National Drug Assessment http://

www.usdoj.gov/ndic/pubs25/25921/25921p.pdf2 http://www.fpri.org/enotes/200805.

grayson.loszetas.html#note123 http://www.cnn.com/2009/WORLD/

americas/02/27/juarez.mexico.violence/index.html

It’s also critical to note that Hezbollah, Hamas, and possibly al-Qaeda are already operating

in South America.

Circle 123 on Reader Service Card

For more information please visit www.preventivestrategies.net or www.ruraltraining.org

I�������� ��� P��������� S���������

Rural Domestic Preparedness Consortium

I�������� ��� P��������� S���������at The Center for Rural Development

Homeland SecurityCERTIFICATE PROGRAM

Courses for Public Safety PractitionersCourses include:

Law Enforcement ProfessionalsAvailable Now!

Fire Service ProfessionalsComing Soon!

Emergency ManagementProfessionalsComing Soon!

Enroll in a course today.No fees! No cost!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

IPS-RDPC-DHS Ad 4.75 x 4.875.indd 1 4/13/2009 4:33:01 PM

Page 37: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 37

PRE-CONFERENCE 1 DAY TRAINING FROM SSI “THE ISLAMIC JIHADIST THREAT” CALL FOR DETAILS! 866-573-3999

Personal Trauma Kits A few ounces in your pocket could save your life.

with

RESQ-PAK.COM • 888.949.RESQ (7377)Enter coupon code SSCT0709 to receive a 10% discount from ResQ-PAK.com ( Offer valid through July 15, 2009 )

Approx. 4” x 5”

Approx. 4” x 8”

Approx. 4” x 6”

Circle 315 on Reader Service Card

Page 38: The Counter Terrorist Magazine - June/July 2009

38 The Counter Terrorist ~ June/July 2009

4 http://www.nytimes.com/2009/02/24/us/24border.html?_r=2&ref=us

5 http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/03/01/IN7S1648NJ.DTL

6 http://www.faoa.org/journal/los_zetas.html

7 http://www.dallasnews.com/sharedcontent/dws/news/longterm/stories/061905dnmetmimicourt.222e0d0b.html

8 http://www.dallasnews.com/sharedcontent/dws/news/longterm/stories/061905dnmetmimicourt.222e0d0b.html

9 http://www.fpri.org/enotes/200805.grayson.loszetas.html#note12

10 http://www.usdoj.gov/dea/pubs/pressrel/pr091708.html

11 http://www.usdoj.gov/dea/pubs/states/newsrel/2009/la022509.html

12 http://travel.state.gov/travel/cis_pa_tw/pa/pa_3028.html

13 http://thomas.loc.gov/cgi-bin/query/D?c111:1:./temp/~c111MNdV5a::

14 http://www.usdoj.gov/ndic/pubs22/22651/outlook.htm

15 http://www.elpasotimes.com/news/ci_11770847

16 http://www.washingtontimes.com/news/2008/oct/26/fbi-warns-of-cartel-arming/

17 http://worldblog.msnbc.msn.com/archive/2008/06/25/1166487.aspx

18 http://www.usatoday.com/news/nation/2008-08-11-1597322846_x.htm

19 http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/20090304/mexico_drugs_090304/20090304?hub=Canada

20 http://www.msnbc.msn.com/id/24923577/

21 http://www.elpasotimes.com/news/ci_11839520

22 http://www.dallasnews.com/sharedcontent/dws/news/world/mexico/stories/DN-attack_24int.ART.State.Edition1.4bf6aec.html

23 http://www.npr.org/templates/story/story.php?storyId=101166509

24 http://www.dallasnews.com/sharedcontent/dws/news/world/mexico/stories/DN-attack_24int.ART.State.Edition1.4bf6aec.html

25 http://www.mysanantonio.com/news/Border_bridges_shut_down_after_violence.html

26 http://purescience.wordpress.com/2009/01/14/11-killed-1-kidnapped-latest-victims-in-mexico-drug-cartel-war-on-us-mexico-border/

ABOUT THE AUTHORMs. Hesterman is a retired Air Force

colonel. She is a senior analyst for The MASY Group, a Global Intelligence and Risk Management firm, and is a professor at American Military University, teaching courses in homeland security and intelligence studies. Her book Transnational Crime and the Criminal-Terrorist Nexus, was published in 2005.

We have been specializing in providing U.S. government

agencies with specialty explosives for 25 years!

We provide a full line of REAL & INERT explosive

products especially suited for Bomb Techs, Entry Teams,

Special Teams and K9 Professionals.

www.OMNIexplosives.comWebsite password... “omniexplo”

Omni Distribution Inc. Explosive Products Division

PO Box 69, Marion AR 72364 800.277.6664

Now Available

The Omni UBSUniversal Breaching SystemMake Any Size Frame or Port.

Please visit our website for more images.

Circle 309 on Reader Service Card

Page 39: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 39

�������������������������������������������������������������

Our Responder series of portable evacuation systems provides a simple solution for emergency egress when permanent systems have not yet been installed. Assembly time is approximately two minutes and can evacuate dozens of individuals.

The Xscape Safe™ Kit includes: Purify Air 30M Smoke Hood, Xscape Safe™ Suit, Accessory Kit (light/clicker), Soft Traveling Case and Training DVD.

The LifeBox system houses everything needed to evacuate

an entire floor! Its weather-resistant enclosure is only 10

inches deep, 38 inches across and can be painted to match

the structure. Everything is pre-assembled and ready to

deploy! When mounted next to an exit point, the arm

swings out 34” away from the structure. This extension

protects the users from dragging or needing to “rappel”

down. There is extra room inside to store smoke hoods,

flash lights, evacuation plans and more!

At High Rise Escape Systems, we preach time and time again to “Plan two ways out!”

The National Fire Protection Agency (NFPA) just approved a new standard effective January 1st, 2009 adopting Supplemental Evacuation into the Building Code and Life Safety Code. Our systems are designed to be set up quickly, easily and may be your only way out in an emergency. We can quickly generate simple to understand evacuation scenarios for individuals or groups up to 100 floors! Evacuation Suits offer fire protection and reduce fear of heights as users are lowered slowly and automatically at three feet per second.

GS-07F-0340U

���������������������������������������������������������������������� ������������

INTERNATIONAL

������

Circle 333 on Reader Service Card

Page 40: The Counter Terrorist Magazine - June/July 2009

40 The Counter Terrorist ~ June/July 2009

Counter The

By Jeffrey A. Hawkins

Mark Twain once said, “Everyone talks about the weather, but nobody does anything about it.” You kind of get that feeling now with the current buzz words “active shooter.”

THE“ACTIVE SHOOTER”Who’s Responsibility—Now and in the Future?

Page 41: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 41

2007 – Virginia – Virginia Tech University – 23-year-old Asian male armed with two handguns kills 32, wounds countless others – commits suicide – total time: estimated under 15 minutes 2

SHOPPING MALLS2007 – Nebraska – Westroads Mall

– 19-year-old Caucasian male armed with an AK-47 rifle kills eight, wounds four – commits suicide – total time: 6 minutes 3

2007 – Utah – Trolley Square Mall – 19-year-old Caucasian male armed with a shotgun and handgun kills five, wounds four – shot and killed by police – total time: under 10 minutes 4

RESTAURANTS1985 – California – McDonalds – 41-

year-old Caucasian male armed with 9mm Uzi, shotgun and handgun kills 21, wounds 19 – shot and killed by police – total time: 77 minutes 5

1991 – Texas – Luby’s Café – 35-year-old Caucasian male armed with two handguns kills 23 people and wounds 20 – commits suicide – total time: under 15 minutes 6

PLACES OF WORSHIP2005 – Wisconsin – Living Church of

God – 44-year-old Caucasian male armed with one handgun kills seven, wounds four – commits suicide – total time: under 10 minutes 7

hat Twain was referring to is that everyone talks about the weather, and

this is not a new phenomenon, yet they talk about it like it is new and that there is something that can be done to alter it.

Likewise, it seems that everyone is writing, discussing, planning and becoming an authority on active shooter situations. However, this phenomenon of the active shooter is not new. The patterns have not changed very much over the last several decades. The shooter profile has remained pretty consistent, and, unfortunately, the death toll continues to rise. Moreover, after each incident you still hear people, even in the security and law enforcement sectors, say “You would never think it would happen here,” or “You would never think it would happen that way.”

There is hardly an industry or part of the country that has not been touched by an active shooter incident; perform a quick Internet search and here is just a random sampling of the incidents that come up:

UNIVERSITIES2008 – Illinois – Northern Illinois

University – 27-year-old Caucasian male armed with a shotgun and three handguns kills five, wounds 18 – commits suicide – elapsed time: estimated under 10 minutes 1

W

You can discuss the political, emotional, and psychological state of a shooter at length, but it is of little consequence once the person has begun shooting and the only goal is to kill as many people as he or she can in the shortest amount of time.

Photo: Scott Morrison

Page 42: The Counter Terrorist Magazine - June/July 2009

42 The Counter Terrorist ~ June/July 2009

1989 – Kentucky – Standard Gravure – 47-year-old Caucasian male armed with an AK-47 and several other firearms kills eight, wounds 12 – commits suicide – total time: 30 minutes 12

GOVERNMENT BUILDINGS

1993 – Virginia – Outside CIA Offices – 29-year-old Egyptian-male armed with an AK-47 rifle kills two, wounds three – flees the scene, arrested later – total time: under 5 minutes 13

1998 – Washington, DC/U.S. Capitol – 41-year-old Caucasian armed with a handgun kills two, wounds one – shot and wounded by special agent – total time: approximately 10 minutes 14

AIRPORTS2002 – California – LAX terminal

– 41-year-old Egyptian male armed with two handguns and a knife kills two,

2007 – Colorado – New Life Church – 24-year-old Caucasian male armed with a rifle and two handguns kills two, wounds one – commits suicide after being shot by security officer – total time: under 10 minutes 8

BUSINESSES2001 – Illinois – Navistar Plant – 66-

year-old African-American male armed with an AK-47 rifle, a shotgun, a hunting rifle and a handgun kills four, wounds four – commits suicide – total time: under 10 minutes 9

2000 – Massachusetts – Edgewater Technology – 43-year-old Caucasian male armed with an AK-47 rifle, a shotgun and a handgun kills seven – surrenders to police – total time: approximately 8 minutes 10

1990 – Florida – GMAC – 42-year-old Caucasian male armed with a rifle and a handgun kills nine, wounds four – commits suicide – total time: 2 minutes 11

What experience has found is that SWAT

plays a critical role in any incident in which

there is a hostage, barricade or unknown type situation where it

would be more harmful to rush in, both for the innocent parties and

for the police.

Photo: Scott Morrison

Page 43: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 43

wounds four – shot and killed by security officer – total time: estimated under 10 minutes 15

These are just a few random examples of incidents from each type of business or organization; there are many more incidents that total hundreds of people killed and thousands wounded since the 1980’s alone.

The paradigm is shifting, at least in the law enforcement community. There is much needed discussion about handling of pre-shooting intelligence, counseling of individuals, profiling, recognition of behavioral signs, etc. All these preventative measures are worthwhile, even if they stop only one shooter before he or she carries out the act.

Likewise, there are great plans by law enforcement for reacting to an active shooter in a quick manner with what are sometimes called “quad-teams,” armed with rifles, that are capable of approaching a shooter who is probably well-armed with his or her own rifle (see above how many times an AK-47 or other rifle was used). This represents a dramatic change from the older philosophy that the first officers on the scene are to contain the area and wait for a SWAT or Special Operations Team to handle the situation, which could take an hour or more.

What experience has found is that SWAT plays a critical role in any incident in which there is a hostage, barricade or unknown type situation where it would be more harmful to rush in, both for the innocent parties and for the police. However, what has been learned over the years is that in a rapidly escalating violent confrontation, where the offender is aggressively taking lives in a quick manner, the only way to stop this wave of violence is with greater, focused violence.The bottom line in looking at most active

shooter situations is:1. The incident will probably be over in less than 10 minutes.2. Police will rarely have time to respond in a manner that will end the situation.3. The only thing that will stop active shooters once they have started is greater force.

You can discuss the political, emotional, and psychological state of a shooter at length, but it is of little consequence once the person has begun shooting and the only goal is to kill as many people as he or she can in the shortest amount of time.

The question comes down to two issues:1. Who is responsible for protecting people in any given institution or organization?2. What is the extent of the measures that should be taken, if any?

RESPONSIBILITYLaw enforcement is almost always

looked at as the cure-all for every situation, and then they are judged when the event is over – they’re usually criticized for acting too quickly, not acting quickly enough, or using too much force or not enough. This criticism, as unfair as it is, is often brought on by law enforcement agencies themselves.

Too often police officials will not admit that they cannot be at every location at all times. This is not what police officers were ever meant to do – i.e., patrol private property and act in a security role. When public police were formed over 200 years ago in this country, their mission was to apprehend criminals and bring them to justice.

Over the decades police have taken on a greater role in our society, acting as marriage counselors, social workers, crime prevention departments, neighborhood organizers and everything else to cure

©istockphoto.com/senorjackson

Page 44: The Counter Terrorist Magazine - June/July 2009

44 The Counter Terrorist ~ June/July 2009 Circle 197 on Reader Service Card

social ills that society itself should be taking on. Police keep taking on more and more responsibilities.

The same can be said about active shooter situations. Police are meant to patrol public property and respond to crimes when called. When they patrol private property and act in a security capacity, a mixed message is sent to the public and to the businesses themselves – “We are protected by the police and we can leave everything up to them. It is their responsibility.”

Thus, when a shooting takes place in the mall and lasts less than 10 minutes – people do not ask, “Where was the security for the mall?” They ask, “Why didn’t the police get there faster?” Realistically, unless they are just lucky, there will not be enough officers on the scene in time to stop an active shooter.

When a shooting takes place on private property – be it a mall, church or business – the question of responsibility should be posed: “What did management or the owners of the property have in place to protect the people they invited in?”

Unfortunately many businesses state after an incident, “We did everything we could” or “There is nothing you can do in a situation like this.” This is false. Many of the places in which an active shooting occurs have already hired unarmed, untrained security guards. Many of these instances are caught on CCTV, showing that there was a measure of security in place.

The question becomes, “What if the shopping center had employed armed security officers and placed them at entrances or other strategic locations?” Israel learned this lesson years ago. Go to the local McDonalds or hotel or restaurant in Tel Aviv and you will see an armed security guard or guards at the entrances. Go to the shopping mall in Tel Aviv and see how many layers of security you have to go through to shop inside the mall.

The Israelis learned a long time ago

Circle 347 on Reader Service Card

Page 45: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 45

that the police cannot be everywhere; it is up to the individual business owners to protect their property and their patrons. In fact, in most business areas of Israel the police tell the business owners how much security they will need before they are even given a business license, and if the security is not in place after they open for business, the police have the authority to temporarily close the business for lack of adequate security.

The difference here is that the Israelis place the responsibility for security and dealing with armed gunmen and suicide bombers on the property owners and private security companies; in the U.S. we rely on already thinly-stretched police departments.

EXTENT OF MEASURESThe arguments you will often hear

after an incident like that involving an

active shooter is “The odds are it would never happen here”, “People will become more fearful if they see armed security,” or “There is too much liability in having armed security personnel” – none of which are completely true. The fact of the matter is that random acts of violence can happen anywhere. In this day and age people are not only used to seeing armed police and security in places they have never seen them before, but feel safer when they do see them. The big question is not the liability of having armed security but the liability of not having an armed plan in place?

As a society and as law enforcement and security professionals, we should be past these long-time excuses. After grand-scale attacks like September 11th and Oklahoma City and all the random violent acts we have witnessed over and over again, we should be past the

claim, “That could never happen here.” It has happened here, in every area, at every level. There is no safe place. One could say “the odds are it could never happen here” – but when do truly proactive security professionals gamble with people’s lives like this? How do you explain “odds” to victims’ families?

The excuse that people will become more fearful if they see armed security or police in places like shopping malls, amusement parks and museums is not giving them enough credit for knowing that these measures are for their own protection. In fact, people are so aware of what proper security measures are that they tend to mock or laugh at security methods that do not go far enough, such as using unarmed, uniformed security personnel who try to look like the police and carry around radios and big flashlights, or employing young college

Circle 101 on Reader Service Card

Page 46: The Counter Terrorist Magazine - June/July 2009

46 The Counter Terrorist ~ June/July 2009

students at public events to search purses of people entering a facility, but not checking backpacks or people wearing large coats.

When the topic of arming security personnel is discussed, the cries of liability are almost always heard, when in fact what this can be translated to is complaints about the costs of managing, training and equipping a professional, private security force. So security often remains at a status-quo stand-still: putting up cameras and hiring under-trained, under-equipped and under-paid guards – none of which will deter or stop a violent attack.

However, lawsuits for security negligence, failure to protect, and failure to provide adequate security are now filed and won all the time, with awards in the millions of dollars. The standard of due diligence is being changed because our society is changing. Businesses

cannot hide behind excuses or blame law enforcement any more. The courts are sending a message to take measures that are reasonable and prudent in today’s world. •

ENDNOTES1 http://en.wikipedia.org/wiki/Northern_

Illinois_University_shooting, 02 June 2008.

2 http://en.wikipedia.org/wiki/Virginia_Tech_massacre, 02 June 2008.

3 http://en.wikipedia.org/wiki/Westroads_Mall_shooting, 02 June 2008.

4 http://en.wikipedia.org/wiki/Trolley_Square_shooting, 02 June 2008.

5 http://en.wikipedia.org/San_Ysidro_McDonald’s_massacre, 02 June 2008.

6 http://en.wikipedia.org/wiki/ Luby’s Cafe_massacre, 02 June 2008.

7 CBSNEWS.com, “Church, Police Probe 7 Murders” CBS Broadcasting, Inc., 14 March 2005.

8 http://en.wikipedia.org/wiki/2007_Colorado_YWAM_and_New_Life_shootings, 02 June 2008.

9 Pam Belluck, “Ex-Worker Opens Fire at

Illinois Plant; 5 Are Killed,” The New York Times, 06 February 2001.

10 http://en.wikipedia.org/wiki/Wakefield_massacre, 06 June 2008.

11 http://en.wikipedia.org/wiki/GMAC_massacre, 06 June 2008.

12 http://en.wikipedia.org/wiki/Standard_Gravure_shooting, 06 June 2008.

13 http://en.wikipedia.org/wiki/1993_CIA_ shootings, 06 June 2008.

14 http://en.wikipedia.org/wiki/U.S._Capitol_shooting_incident_(1998), 03 June 2008.

15 Airline Industry Information, “Gunman opens fire at Los Angeles airport” M2

Communications Ltd., 08 July 2002.

ABOUT THE AUTHORMr. Hawkins presently serves as Executive

Director for the Christian Security Network (www.christiansecuritynetwork.org). He is a senior management professional with over 27 years of diverse experience working for profit, not-for-profit and government organizations on a local, regional and global level.

Circle 117 on Reader Service Card

UNDERSTANDING AND CONFRONTING THE THREAT

Edited byOphir Falk and Henry Morgenstern

FalkM

orgensternSUICIDE TERROR

UNDERSTAN

DING AN

D CONFRON

TING THE THREAT

Based on U.S. and Israeli experiences and detailed interviews with frontline personnel, Suicide Terror enables

policymakers, first responders, and students of homeland security to understand and deal with the growing

threat of suicide terror. It analyzes recent suicide attacks as well as our current vulnerabilities and likely scenarios

for future attacks. Following the expert authors’ advice, readers learn possible measures to prevent an attack.

Moreover, they learn how to prepare for and implement an effective and quick response to minimize casualties

and losses in the event of an attack.Following an overview and historical review of suicide terror, the book covers:�� �������������� ����������������������������������������������� �������������������������������������������� ������������������������������������������� ��������������������������������������� ���������������������������������������� ��������������������������������������������� ������������ ���������� ���� ����� ���������� ���� ����� ���� ����� ��� ������� ���������� ����������� ��������� �����

studies help readers get into the minds of suicide terrorists in order to understand how to best prevent and confront

these very dangerous threats.������������������������������������������������������������������������������������������������������������������

experts who have dealt with it firsthand. Anyone responsible for understanding, preventing, and confronting this

devastating threat should read this book and consider its recommendations with all seriousness.OPHIR FALK, LLB, MBA,� ���������������������������������������������������������������������������������

Institute for Counter Terrorism, where he has published numerous articles in the field. Mr. Falk has over a decade

of experience in various security capacities and served as a consultant for the 2004 Olympic Games, where he

carried out risk assessments for Olympic venues and critical national infrastructure.HENRY MORGENSTERN is the President of Security Solutions International, a company that has trained more

than 500 federal, state, and local agencies to effectively confront the threat of terror and regularly takes groups of

�������������������������������������������������������������������������������������������������������������������

��������������������������������������������������������������������������������������������������������������

radio stations, and Web broadcasts.

Ophir Falk and Henry Morgenstern have compiled a book that should be read by anyone who is

serious about winning the war on terror. By painstakingly analyzing the empirical data, they help us

better understand the nature of our enemies and why they employ these barbaric tactics. Most crucially,

they offer important insights on how terrorism can be effectively confronted and ultimately defeated.

In so doing, they have performed an invaluable service for all those who are committed to winning this

crucial battle. —Benjamin Netanyahu, former Prime Minister of Israel

FIRSTHAND ACCOUNTS AND ANALYSESFROM FRONTLINE PERSONNEL AND EXPERTSIN THE WAR AGAINST TERROR

FIRSTHAND ACCOUNTS AND ANALYSESFROM FRONTLINE PERSONNEL AND EXPERTSIN THE WAR AGAINST TERROR

“Ophir Falk and Henry Morgenstern have compiled a book that should be read by anyone who is serious about winning the War on Terror. By painstakingly analyzing the data, they help us better understand the natiure of our enemies and why they employ these barbaric tactics. Most crucially, they offer important insights into how terrorism can be effectively confronted and ultimately defeated. In so doing, they have performed an invaluable service for all those that are committed to winning this crucial battle.”

Benjamin Netanyahu – Prime Minister Elect of Israel

Frontline and Firsthand: FROM THE EXPERTS IN THE WAR AGAINST TERROR...

Includes personalized inscription by Henry MorgensternAvailable for June delivery from SSI for only $65.00 +shipping and handling

SECURITY SOLUTIONS INTERNATIONALProtecting the Homeland Together ®SSISSIwww.homelandsecurityssi.com • 866-573-3999

Page 47: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 47

BOOK REVIEW

Modern Warfare: A French View of Counterinsurgency

Reviewed by: Chris Graham

ffective counter terrorism is a multidisciplinary art. Military forces must adapt to missions that

resemble policing, and police agencies must always be aware of the paramilitary nature and strategic objectives of terrorist criminals. Neither effort alone is sufficient, but both, supplemented with other specialists, must be blended in combinations constantly adapted to the ever-changing environment in order to achieve the desired goal.

French colonel Roger Trinquier is one of the relatively small number of individuals who spent a lifetime applying a clever mind to the full spectrum of guerrilla and counter-guerrilla operations, basing his ideas on his experiences in Indochina, China, and Algeria, among other places. In 1964, Trinquier published these ideas in Modern Warfare: A French View of Counterinsurgency. In a testament to the timeless nature of Trinquier’s principles of warfare and counter terrorism, Praeger Security International released the book again in 2006.

In Chapter Two, entitled “Modern Warfare Defined,” Trinquier makes an interesting statement: “[I]t is essential to realize that in modern warfare we are not up against a few armed bands spread across a given territory, but rather against an armed clandestine organization whose essential role is to impose its will upon the population. Victory will be obtained only through the complete destruction of that organization.” In this statement, Trinquier clearly recognized both the sophisticated nature of his opponent and the growth potential of any element left unchecked.

Later, in Chapter Four, “Terrorism—The Principal Weapon of Modern Warfare,” Trinquier shares many observations of terrorist operations. He states, “When it has been decided to kill someone, sometime somewhere with the sole purpose of terrorizing the populace and strewing a certain number of bodies along the streets of a city or on country roads, it is quite easy under existing laws

escapes, and to refuse interrogation specialists the right to seize the truly guilty terrorist and spare the innocent.” This is the heart of a subject still debated today. Even with modern technology and restrictive rules of engagement, civilians still become “collateral damage.” Trinquier advances a compelling argument with the comparison.

The author also notes, “Even a band of gangsters, lacking any political ideology at all, but without scruples and determined to employ the same methods [as terrorists], could constitute a grave danger.” Here, too, Trinquier’s words were prophetic, and they have since been demonstrated around the world, with various groups in Colombia and Mexico serving as just a few of many modern examples.

In Chapter Six, “Defense of the Territory,” Trinquier writes, “For the inhabitant to elude the threats of the enemy, to cease to be an isolated target that no police force can protect, we must have him participate in his own defense.” Perhaps in an environment such as the current United States, little more is needed than the continued encouragement of citizens to volunteer relevant information to policing agencies, along with vigorous defense of Second Amendment rights. Perhaps in an environment of greater threat, an expansion of police reserve units and joining of official groups with citizen groups is warranted.

In Chapter Seven, “Direct Action on the Populations of Cities,” the author states, “[O]ur opponents will seek to slow

Author: Roger Trinquier

E

to escape the police.” While the degree of truth of this statement is dependent upon several variables, it accurately identifies the impossibility of preventing all crime, the vulnerability of civilization, and the ability of terrorists to overwhelm even the most competent police forces with volume of action.

Trinquier writes, “It is deceitful to permit artillery or aviation to bomb villages and slaughter women and children while the real enemy usually

Page 48: The Counter Terrorist Magazine - June/July 2009

48 The Counter Terrorist ~ June/July 2009

down and, if possible, put an end to our operations. The fact that a state of war will generally not have been declared will be, as we have already indicated, one of their most effective means of achieving this. In particular, they will attempt to have arrested terrorists treated as ordinary criminals and to have members of their organization considered as minor peace time offenders.” In this area, Trinquier displayed greater insight nearly half a century ago than many people possess today.

Finally, in the conclusion to Modern Warfare, Trinquier states, “We lost the war in Indochina largely because we hesitated to take the necessary measures or took them too late. For the same reason we are going to lose the war in Algeria.” This sentence was another accurate prophecy. Trinquier also wrote, “Other soldiers have been confronted with problems of this nature in the course of history. At the battle of Crecy in 1346, the Army of the French King refused to use the bow and arrow the English handled so effectively. For them, true combat, the only fair and permissible kind, remained man-to-man, body-to-body. To use an arrow, to kill one’s adversary from afar, was a kind of impermissible cowardliness not compatible with their concepts of honor and chivalry.” Today, some 650 years after this battle, failure to adapt continues to be the undoing of many.

When it comes to the conduct of counter terrorism, we must not permit the voices of the few with experience to be drowned out by the many with theories. Modern Warfare: A French View of Counterinsurgency is the work of one of those few. Whether you are a gang cop in Phoenix, a platoon commander in Kandahar, or a policy maker in Washington, DC, Trinquier’s insights will most certainly be invaluable to you in the months to come. •

Circle 339 on Reader Service Card

Circle 345 on Reader Service Card

Page 49: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 49

NIGHT VISION: A.I. carries a full line of night vision including PVS-14s, PVS-7Ds, and now our AI/NVG-S offering PVS-15 like performance minus the pain-ful price or wait for delivery.

Contact: Adams Industries, Inc. P.O. Box 641413 • Los Angeles, CA 90064

Tel: (310) 472-3017 Fax: (310) 861-5324

Email: [email protected]

www.AdamsIndustries.com

In the world of tactical electronics, one company has been at it every day since 1994:

www.AdamsIndustries.com

THERMAL TECHNOLOGY: From handhelds to extreme range systems, A.I. has off-the-shelf and build-to-suit answers for any requirement.

SENSOR SYSTEMS: We are proud to distribute the Mil-lennium Sensor line of covert tacti-cal sensor and surveillance kits used by the US Military, US Border Patrol, and SWAT Teams nationwide. This force multiplier provides extra eyes and ears where you need them.

Circle 271 on Reader Service Card

Page 50: The Counter Terrorist Magazine - June/July 2009

50 The Counter Terrorist ~ June/July 2009

CRIMINAL ACTIVITY AND TERRORISTSWhat Every Law Enforcement Officer Should Know

Counter The

By John Andrews

©istockphoto.com/egdigital

Page 51: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 51

and arms. Moreover, this activity was completely legal until the 1990s, when the federal government enacted legislation that outlawed U.S.-based fundraising for terrorist organizations. In the wake of this law, numerous front groups were investigated and prosecuted, and millions

For decades, terrorist organizations have been involved in activities spanning the entire spectrum of criminal enterprise, from sophisticated white-collar crimes such as mortgage fraud to common street crimes such as strong-arm robberies.

n recent years, jihadist groups have participated in training on how to deal with and, if necessary,

neutralize law enforcement officials, ranging from the patrol officer to the intelligence agent. These terrorists will continue to bring their battle to America’s shores and to our country’s police officers, whether the officers have prepared for it or not. The police officer is the first line of defense against terrorism; he or she is the eyes and ears of the community and the first person to be on site when criminal activity takes place. Given this role, it’s important that the police officer keep a variety of indicators in mind when investigating criminal activity so that he or she can better determine whether the suspect is a common criminal or instead a terrorist involved in illegal activity to obtain funds to complete his mission.

Historically, the United States has been the “goose that laid the golden egg” when it comes to fundraising for various causes. Over the years, the IRA, PLO, Hezbollah, Tamil Tigers, and every other group labeled a terrorist organization by the U.S. government has established a front group in America to raise funds for its cause. These front organizations purport to raise money for widows and orphans but, in reality, actually raise large sums of money for suicide bombers

Police officers are currently facing an enemy that is better trained, more disciplined, and more motivated than any subject they have ever encountered.

I

CRIMINAL ACTIVITY AND TERRORISTSWhat Every Law Enforcement Officer Should Know

©istockphoto.com/paulthepunk

Page 52: The Counter Terrorist Magazine - June/July 2009

52 The Counter Terrorist ~ June/July 2009

the investigators eventually determined that Washington had converted to Islam while serving a three-year prison term. Moreover, he had been a close associate of Kevin James, who was the leader of Jamiyyat Ul-Islam Is-Saheeh, a radical Sunni group that advocated violent attacks on enemies of Islam, including the U.S. government and Jewish interests.2 (Both James and Washington were members of violent street gangs before entering prison.) James ordered Washington to establish a cell outside prison and recruit members without felony convictions, then train them to conduct covert operations, acquire firearms, and carry out attacks against enemy targets.

Washington thus recruited Patterson and Hammad Riza Samana, a native of Pakistan. (Washington, Patterson, and Samana all attended the same mosque.) The three men compiled a list of targets, including the Israeli consulate in Los Angeles, several synagogues, the El Al ticket counter at LAX, and several National Guard recruitment centers. The trio decided to finance their operation by robbing gas stations.3 During the investigation, a search of Washington’s apartment revealed radical jihadist literature, bulletproof vests, and a list of Jewish and military targets. Computers utilized by Patterson were also examined, and they contained searches involving synagogues, Jewish events, National Guard recruitment centers, and Israeli establishments. In addition, investigators uncovered items indicating that the group conducted military-type training, including firearms training and physical activity in local parks. It should be noted that the group robbed 12 gas stations in a five-week period, including three stations in one day alone.4

So, what did the police do that enabled them to uncover this terrorist cell while conducting a routine

of dollars were seized from them. Once this source of money dried up, the jihadists and other terrorists began to turn to criminal activity to raise funds.

For decades, terrorist organizations have been involved in activities spanning the entire spectrum of criminal enterprise, from sophisticated white-collar crimes such as mortgage fraud to common street crimes such as strong-arm robberies. For instance, during the 1980s, counterfeit U.S. $100 bills were found throughout Europe and traced back to Lebanon. Eventually, it was determined that Hezbollah, with the aid of the Iranian government, was involved in the bills’ production and distribution. These counterfeits were so well done that only trained experts could tell them from real currency. Today, however, the criminal activity that provides terrorists with their largest source of income is narcotics trafficking; indeed, Lebanon is a major source of hashish, and Afghanistan is the world’s supplier of opium. That being said, terrorist-related criminal activity continues to take a variety of forms, and while each particular crime is unique, nearly all of these crimes feature one or more specific characteristics indicating that the perpetrators may be involved with terrorist organizations.

One of the most interesting cases of a terrorist-related incident involved three individuals who went on a crime spree, robbing a string of gas stations in Los Angeles and Orange County, California. There was nothing unusual about these robberies, and police in Torrance (a suburb southwest of Los Angeles) conducted a criminal investigation that resulted in the arrest of two individuals: Levar Washington and Gregory Patterson. Washington had recently been paroled from prison for robbery.1 On the surface, nothing about this investigation seemed to indicate any involvement with terrorism. However, by digging deeper,

Circle 343 on Reader Service Card

Page 53: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 53

investigation of strong-arm robberies? In short, they looked for the various indicators of terrorist activity that should be considered during all criminal investigations, including common criminals in possession of radical literature, surveillance equipment, multiple identity documents, maps, drawings, and lists of targets, as well as evidence of physical/military training that includes such things as firearms, paintball, and martial arts. The

SUPPLY

WWW.IDEALSUPPLYINC.COM800-533-0144 or 828-274-0140

EOD EQUIPMENT

Circle 311 on Reader Service Card

investigators also realized the importance of checking all known associates of their subjects—especially prison associations if the subjects are ex-convicts—to

determine whether these individuals have any connection to terrorist organizations. Most importantly, the police also conducted a detailed examination of all computers that the subjects had access to. During such examination, it’s critical to pay close attention to websites recently viewed by the subjects, because such sites may include jihadist recruitment information and propaganda, as well as potential targets. Remember, if you have any suspicions about the individuals

you are investigating, check with your local joint terrorism task force to run background reports on your subjects and their associates.

©istockphoto.com/grahambedingfield

Circle 233 on Reader Service Card

Page 54: The Counter Terrorist Magazine - June/July 2009

54 The Counter Terrorist ~ June/July 2009

Circle 313 on Reader Service Card

Zistos CorporationPh 631.434 .1370E-mail: [email protected]

System applications include:� High Risk Targets� Hospitals� Transportation Hubs� Large Public Venues� Municipal & Military Vehicles� Areas of Critical Commerce

Features:� Easy to install � Compatible with existing analog video systems, (IP output option available)� Suitable for fixed or mobile applications� Uses existing video surveillance cables & monitoring devices� Powered by 12V DC or 24V AC� Weatherproof enclosure� Also supports audio

The NEW VRAD(Pat. Pend.) Video Radiological Adapter ReportsRadiological Events on Existing Surveillance Video

Add Radiation Detection to Existing Surveillance System!

Contact ourSales Dept. now forVRAD information!

The James/Washington case is an excellent example of the importance of thorough police work despite the mundane nature of the related crime: armed robbery. However, as previously stated, any criminal activity can be a source of income for a terrorist cell. For instance, both Hamas and Hezbollah have become associates of Mexican drug trafficking cartels and are furnishing these groups with weapons and helping them distribute drugs in Europe and the Middle East. In fact, these terrorist groups have million-dollar contracts to sell weapons to Mexican and Colombian narcotics traffickers in exchange for drugs. According to a report compiled by the National Drug Intelligence Center in 2007, one of the primary gangs these terrorists deal with is Mara Salvatrucha of El Salvador (otherwise known as MS-13), which is currently the most violent

gang in the United States.5 As early as 2004, intelligence officials warned national law enforcement agencies that al-Qaeda operatives had been spotted with members of MS-13 in El Salvador.6 Today, MS-13 has an estimated 10,000 members in 33 states in the U.S.7

There have also been documented cases of terrorists raising funds through money laundering, cigarette smuggling, selling counterfeit goods, identity theft, credit card theft, mortgage fraud, cyber crime, vehicle theft, and even black-market baby formula. Therefore, what every law enforcement officer must know is that the traditional distinctions between organized crime, espionage, and terrorism have broken down. Globalization and the Internet have encouraged terrorists and criminal organizations to operate together in sophisticated networks. Identity theft is being perpetrated by both the Russian

There have also been documented cases of terrorists raising

funds through money laundering, cigarette

smuggling, selling counterfeit goods,

identity theft, credit card theft, mortgage fraud,

cyber crime, vehicle theft, and even black-market baby formula.

Page 55: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 55Circle 121 on Reader Service Card

mafia and Hezbollah; organized crime is laundering money for terrorists; al-Qaeda operatives are some of the biggest drug dealers in the world; and MS-13 may be a prime conduit for smuggling terrorists over the southern border into the U.S. Today’s law enforcement officer should therefore look closely at the motives of all criminals he or she arrests. •ENDNOTES

1“Four Indicted in Alleged U.S. Terror Plot,” Jeremiah Marquez, Associated Press, 8/31/2005

2“DOJ Press Release on Indictment,” U.S. Department of Justice, 8/31/2005 (MILNET Mirror)

3Marquez, 8/31/20054U.S. Department of Justice, 8/31/20055“Mexican Drug Cartels and Islamic

Radicals Working Together,” J. Jesus Esquivel, Mexidata.Info, 7/14/2008

6 “Arrested MS-13 Member Wanted in Police Slayings,” Michele McPhee, Boston Herald, 01/12/2005

7“The Most Dangerous Gang in America,” Arian Campo-Flores, Newsweek, 3/28/2005

ABOUT THE AUTHORMr. Andrews served as a Special Agent

of the Federal Bureau of Investigation for twenty-three years. He conducted international terrorist investigations for nine years and has coordinated with the United States Foreign Intelligence Court in order to initiate extraordinary investigative techniques in complex terrorist investigations. Mr. Andrews currently serves as an Adjunct Professor at Florida State University and has been a guest lecturer at Troy University and conducts police training throughout the United States for Benchmark Professional Seminars and Unitech.

©istockphoto.com/mikadx

SECURITY SOLUTIONS INTERNATIONALProtecting the Homeland Together ®SSISSIwww.homelandsecurityssi.com • 866-573-3999

SWAT Counter Terrorism Course

Learn from the experts

• Terrorist Risk — Threat and risk assessment capabilities• Middle East operations debriefs — Strengthen search strategies• Secure search — Deliberate clearing of structures• Dynamic entry and coordinating response• Low visibility containment options —Reduce consequences• Command, control and planning• Containment and callout vs. dynamic assault in multi-agency operations• Explosive lab operations within population concentrations• Terrorist hostage rescue• Terrorist vehicle interdiction• Dealing with IED’s in target structure — Critical infrastructure protection

The most complete CT training available!

SECURITY SOLUTIONS INTERNATIONALProtecting the Homeland Together ®SSISSI

For more information and class details:www.homelandsecurityssi.com • [email protected]

NEXT COURSE:Camp Blanding • Florida • June 16-19, 2009

Must be an active member in a SRT Team or SWAT Team

Page 56: The Counter Terrorist Magazine - June/July 2009

56 The Counter Terrorist ~ June/July 2009

presented by endorsed by

JULY 28-30, 2009 | Miami Beach, USAWhere security, fi re, and life safety leaders converge

Now More than Ever AFSE is the Best Single Source for Security, Fire and Life Safety Innovation.AFSE is the centralized place for leaders from Latin America, the Caribbean Islands and the Southeast United States to gather for professional development, networking, new ideas, and product innovations. When you attend AFSE, you get a cost-eff ective way to secure knowledge and ideas and establish relationships that will benefi t you throughout the year.

Interested in Exhibiting?Our Expo delivers you prime access to decision-makers from numerous countries all in one place.

New & Improved for 2009:Focused program content for a wide variety • of facility types with a special session on airport/seaport security—many sessions can be attended free of charge

Seminars and professional development courses • on fi re protection; hazard management; and business continuity planning and design

High-level training sessions for personal • and executive protection

National Association of Hispanic Firefi ghters • 14th Annual International Training Conference will be held in conjunction with AFSE 2009

On display, the latest products for integrators, • distributors, installers and end users

Plan now. For more information on enrolling in the conference, exhibiting, or to register for the expo, visit NFPA.org/AFSE.

NFPA.org/AFSE

On display, the latest products for integrators, distributors, installers and end users

Find It All In One Place!

AFSE_Ad_English.indd 1 3/12/09 11:25:30 AM

Circle 113 on Reader Service Card

Page 57: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 57

PRODUCT REVIEW

Innovative Products Watch

SHOCKNIFE™ is a training knife for law enforcement, military and security agencies. The blade is incapable of cutting, but delivers a localized shock that causes pain, but not serious injury or incapacitation. Unlike rubber training knives, Shocknife causes the same acute stress during training that an officer would experience in a real attack and better prepares officers to survive a deadly force encounter. The Shocknife Spontaneous Edged Weapon Defense Instructor Course was launched in 2008, and it focuses on how someone with minimal training will actually respond in these situations. The system accepts the natural human response and builds in a cognitive response once the brain has “caught up”. Setcan, www.shocknife.com

American Standard ANSI/ISEA110. iEvac® protects against fire-related risks including toxic gases, harmful particulates and life-threatening physical hazards. American certification involves rigorous independent testing against many challenges including carbon monoxide, smoke, hydrogen cyanide, sulfur dioxide, other gases, particulates, soot, radiant heat & environmental conditioning. One universal size can be put on in 30 seconds. Contains a HEPA filter, also protects against ammonia, chlorine, phosphine & more. Easy-to-breathe dual-cartridges, high visibility reflective strips, compact, lightweight, vacuum sealed in a foil bag for a long shelf life. Elmridge Protection Products www.elmridgeprotection.com

THE IEVAC® FIRE ESCAPE HOOD is first to earn Certification to the new

he field of Homeland Security is inundated with a bewildering range of technologies, including everything from smart video, biometrics, millimeter wave and backscatter, to varying detection equipment such as biological, chemical and explosive.

To help our readers make sense of this, a committee at SSI have chosen to highlight the following products in this, the Innovative Products section. We consider these products to embody the best of both the American and the worldwide spirit of finding solutions to better protect each and every one of us.

Henry MorgensternPresident

Security Solutions International (Publisher)

continued on page 58

T

Page 58: The Counter Terrorist Magazine - June/July 2009

58 The Counter Terrorist ~ June/July 2009

videoNEXT’S suite of products is an open, standards-based PSIM software solution that works with almost any digital or analog camera, including high definition and megapixel. It aggregates data from video, audio, RFID, radar and many other sensors to capture organize, store and distribute security information and events across any network. All videoNEXT products run on standard Intel based servers and transform an organization’s existing security and data infrastructure into a powerful, easy to use enterprise-class PSIM system. The growing family of videoNEXT enterprise-class offerings

includes: SKM-Stratus, SKM-Altus, SKM-Cirrus, v-AC (access control module), v-MX (video wall offering),

v-IQ (video analytics), v-PS (point of sale module) and v-MB. VideoNEXT www.videoNEXT.com

continued on page 60

Circle 301 on Reader Service Card

OPFOR Munitions and

Equipment

PR Pyro IED Simulator StandWeatherproof, powder-coated, solid steel, 22 lbs. Holds 3 IEDs, 2 Mortars, and 1 Smoke simultaneously.Unlimited use.

PR RPG Launcher Simulator Replica of the Rocket Propelled Grenade Launcher. Fires 4 types of PR Pyro munitions.

Smoke Munition

IED Munition

Optional 50 mm SAM Munition Holder

PR CorporationPyrotechnic Battle Scene Simulator Systems

Visit www.OPFORmunitions.com for our complete line of OPFOR training products.

713-728-4772 • fax 713-723-2985

Made in the USA

© 2009 PR Corporation

New PR SuicideVest Simulator

NewPR Pyro Grenade Simulator

See us at FPED • Booth 17-P

Page 59: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 59

4th Annual Gulf Coast Terrorism Prevention Conference

A FULL WEEK OF COUNTER TERROR TRAINING

Law Enforcement and Security Professionals education on combating terrorism

• Terror Groups and Gangs in the USA• Protecting National Infrastructure and Hospitals• The exploitation of children by Terror Groups• Border Protection and Marine Incursions• Lessons learned in Iraq• Educational Facilities and Challenges in Response• Tactical Rescue Operations

August 17-21, 2009 Sarasota Florida USA

Hosted by:

Counter TheSECURITY SOLUTIONSINTERNATIONALSSI

®

Official Publication:

Register at: www.terrorconference.com1-866-573-3999

THE CAPS SYSTEM was originally developed in 1988 in response to processing concerns looming on the Cold War front. The ideology behind CAPS was to produce equipment that could be used to process contaminated personnel utilizing any set of procedures and any set of chemical protective ensembles. Standardization is the key to successfully processing individuals and The USAF led the way by naming the

CAPS line of decontamination systems as the USAF standard. The current, CBRIPs system, is capable of decontaminating personnel exposed to chemical, biological,

radiological and high yield explosive threats and still requires no tools to assemble. Ultimate Survival Technologies www.ultimatesurvival.com

Circle 115 on Reader Service Card

Page 60: The Counter Terrorist Magazine - June/July 2009

60 The Counter Terrorist ~ June/July 2009

Expert Commentary onCurrent and Future Threats

Written for professionals and policymakersworking at the forefront of anti-terroristefforts, this authoritative and comprehensivework covers the weapons of mass destructionthat jihadist terrorists have historically usedand are likely to use in the future. Leadinginternational experts examine terrorist ideolo-gy, strategy, and target selection. Theydescribe chemical, biological, radiological, andnuclear weapons, and discuss how terroristsmight acquire or manufacture them. They alsoaddress detection, prevention, and attack miti-gation techniques. Devoid of sensationalism,this multidimensional evaluation adds aheightened level of sophistication to ourunderstanding of terrorism.

Catalog no. AU6964, February 2009494 pp., ISBN: 978-1-4200-6964-8$79.95 / £38.99

Discounted Price: $67.96 / £33.14

New Edition of a Bestseller!Considered the definitive handbook on the ter-rorist threat to commercial airline and airportsecurity, Colonel Kathleen Sweet’s updatedseminal resource now includes an analysis ofmodern day risks and examines the myriad ofchanges applied to air security policies, prac-tices, and regulations since 9/11. The bookalso covers the history of aviation security andcompares current in-flight security practiceswith those of other countries. In addition tocargo and passenger security, the text looks atairport and aviation business practices andhow security considerations are factored intobusiness processes. New regulations for theTransportation Security Administration arealso detailed.

Catalog no. AU8165, January 2009 336 pp., ISBN: 978-1-4200-8816-8$79.95 / £49.99

Discounted Price: $67.96 / £42.49

Get Inside the Mind of a Terrorist

Confronting the possible collapse of societiesand the potential for religious warfare, thisbook provides a thought-provoking discussionon terrorism and the clash of civilizations. Thetext focuses on terrorists as well as terrorismtargets by analyzing counter-terrorism controlstrategies and terrorist ideology. A look at therole of the intelligence community in the col-lection and analysis of data provides importantinformation for shaping national security poli-cy. The author addresses weapons of massdestruction in terms of their threat potentialand the social costs of strategies that mitigatetheir risk. A separate chapter examines the roleof local and state enforcement agencies.

Catalog no. 79875, January 2009392 pp., ISBN: 978-1-4200-7987-6$79.95 / £49.99

Discounted Price: $67.96 / £42.49

Circle 331 on Reader Service Card

Page 61: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 61

TRAINING REVIEW By Chris Graham

Zodiac Operator Course

matched the vessel’s speed, paralleled the vessel for a moment, and then turned into it. Our inflatable gunwale hit its mark, and I steered into the boat we had been pacing and adjusted the throttles to hold us in place.

This was not a flashback to an exercise

advanced the dual throttles of my 28- foot Zodiac Enforcer to maximum power. We rocketed off a swell, tasted

chilly ocean spray, and flew toward our target. Twin 175-horsepower engines propelled us toward the vessel to be boarded. Less than 10 feet away, we

I Twin 175-horse-power engines propelled us toward the vessel to be boarded. Less than 10 feet away, we matched the vessel’s speed, paralleled the vessel for a moment, and then turned into it.

Photo: Courtesy of Zodiac

Photo: Courtesy of Ed Morris

Page 62: The Counter Terrorist Magazine - June/July 2009

62 The Counter Terrorist ~ June/July 2009

Stabilization through innovation

You can’t turn back time

but you can stop it>>

Sign up in advance to successfullydismantle our training simulator at the

IABTI show and WIN the training devicefor your unit!For details and scheduling, please

contact [email protected]

BeattheBomber!

Tel . 519.842.0023 ke i th@protect ivesystems.com www.protect ivesystems.com

Introducing the NEW FCC certifiedWSK-EMR100 & WSK-HD50 bomb stabilizing device>> Impedes and stops ALL electronic circuitry within any threat device>> Does not use Radio Frequency Jammer>> Uses radiation interference to stop the flow of electrons within a threat device>> Effective against Passive infra red

Protective_Sys_Counter_Terrorist_Final 4/6/09 9:20 AM Page 1

Circle 243 on Reader Service Card

Circle 193 on Reader Service Card

from yesteryear; rather, this was the Zodiac Maritime Training Academy’s Rigid (Hull) Inflatable Boat Operator Course. Over a three-day period, first responders from multiple agencies were given the opportunity to operate 21-, 24-, and 28-foot Zodiac Enforcers.

Day one of the course began with introductions and PowerPoint lectures. Dave Grandin, a career Reconnaissance Marine, served as lead instructor. He discussed survival gear, including cold weather suits, and then introduced a model for risk assessment. Students practiced applying the risk assessment model to a rescue scenario. Next, they watched a video that mirrored the scenario given and, unfortunately, ended tragically. Personnel recovery strategies and techniques for fixing the boats’ inflatable chambers were then reviewed.

After departing the classroom, students were given the opportunity to pilot the boats under the clear blue skies of Miami Beach. Coxswains operated the boats at low speeds and experienced wind, current, and drift while maneuvering in confined spaces. They also practiced low-speed J-turns, shallow approaches, steep approaches, and bow approaches.

Students then had multiple opportunities to pilot the RIBs (rigid inflatable boats) in the open ocean. After tackling five-foot swells, the students practiced station holding, maintaining position in strong and variable currents, and high speed J-turns.

If your organization is responsible for waterborne rescue operations or maritime interdiction, a RIB such as the Zodiac Enforcer may be one of your tools of choice. The Zodiac RIB Operator Course is an appropriate foundation for the development of your coxswain’s skills. •

Page 63: The Counter Terrorist Magazine - June/July 2009

The Counter Terrorist ~ June/July 2009 63

Stabilization through innovation

You can’t turn back time

but you can stop it>>

Sign up in advance to successfullydismantle our training simulator at the

IABTI show and WIN the training devicefor your unit!For details and scheduling, please

contact [email protected]

BeattheBomber!

Tel . 519.842.0023 ke i th@protect ivesystems.com www.protect ivesystems.com

Introducing the NEW FCC certifiedWSK-EMR100 & WSK-HD50 bomb stabilizing device>> Impedes and stops ALL electronic circuitry within any threat device>> Does not use Radio Frequency Jammer>> Uses radiation interference to stop the flow of electrons within a threat device>> Effective against Passive infra red

Protective_Sys_Counter_Terrorist_Final 4/6/09 9:20 AM Page 1

Circle 327 on Reader Service Card

Page 64: The Counter Terrorist Magazine - June/July 2009

64 The Counter Terrorist ~ June/July 2009Circle 297 on Reader Service Card