the counter terrorist magazine - oct. / nov

76
USING DEADLY FORCE • CIA’S CREATION OF TERRORISM • INTERNATIONAL TRADE TRANSPARENCY thecounterterroristmag.com An SSI ® Publication VOLUME 8 • NUMBER 5 INTERNATIONAL EDITION OCTOBER/NOVEMBER 2015 Journal for Law Enforcement, Intelligence & Special Operations Professionals WHY DOMESTIC TERRORISTS GO SOFT. OCTOBER/NOVEMBER 2015 USA/CANADA $5.99

Upload: solomon

Post on 23-Jul-2016

222 views

Category:

Documents


3 download

DESCRIPTION

October / November 2015 issue of the Counter Terrorist Magazine

TRANSCRIPT

USING DEADLY FORCE • CIA’S CREATION OF TERRORISM • INTERNATIONAL TRADE TRANSPARENCY

thecounterterroristmag.comAn SSI® Publication

VOLUME 8 • NUMBER 5

INTERNATIONAL

EDITION

OCTOBER/NOVEMBER 2015

Journal for Law Enforcement, Intelligence & Special Operations Professionals

WHY DOMESTIC TERRORISTS

GO SOFT.

OCTOBER/NOVEMBER 2015USA/CANADA $5.99

2 The Counter Terrorist ~ October/November 2015 Circle 121 on Reader Service Card

Barrett will not sell to government agencies in the State of California or New York.Learn more at barrett.net

REDEFINEDACCURACY

338 LAPUA MAG338 NORMA MAG

300 WIN MAG300 NORMA MAG

7MM REM MAG308 WIN260 REM

6.5 CREED

MRAD

AMBIDEXTEROUS CONTROLS.USER INTERCHANGEABLE CALIBERS.ADJUSTABLE MATCH GRADE TRIGGER.

COMBAT PROVEN

The Counter Terrorist ~ October/November 2015 3Circle 10 on Reader Service Card

fdu.edu/mas

CALL TODAY. CLASSES BEGIN IN JANUARY.

Undergraduate ProgramsJoAnna [email protected]

Graduate ProgramsRonald E. [email protected]

For More Information

Earn your career credentials without job interruption through Fairleigh Dickinson University’srespected online degree and certificate offerings. Established in 1942, FDU is New Jersey’slargest private university with 12,000 students worldwide.

Degree Offerings • Master of Administrative Science • Master of Science in Homeland Security • Bachelor of Arts in Individualized Studies

Certificate StudiesCareer-relevant programs are available at the graduate and undergraduate level in such areas as terrorism, forensics, global security, disaster and emergency management, transit safety, homeland security, and more. Credits earned can be applied toward the appropriate degree program.

• FDU is proud to participate in the Yellow Ribbon G.I. Education Advancement program enabling eligible veterans to attend FDU at no charge.

• FDU accepts Federal Tuition Assistance (FTA) for undergraduate and graduate courses (restrictions apply).

• No entrance exams required.

Online Undergraduate, Graduate & Certificate Studies in

Public Safety & Homeland SecurityMeeting the professional advancement needs ofthose committed to protecting the public.

19947 Counter Terrorist Magazine Ad v1_Layout 1 8/18/15 2:41 PM Page 1

4 The Counter Terrorist ~ October/November 2015 Circle 259 on Reader Service Card

The Counter Terrorist ~ October/November 2015 5

Counter The

48

Journal for Law Enforcement, Intelligence & Special Operations Professionals

OCTOBER/NOVEMBER 2015VOLUME 8 • NUMBER 5

30

58CO

NTE

NTS

COVER STORY: 30 WHY DOMESTIC TERRORISTS GO SOFT by Karen Bunso

FEATURES:

08 Firsthand: DEADLY FORCE: THE USE OF FORCE CONTINUUM AND DEFENSIVE TACTICS OR COMBATIVES by Andrew Curtiss

18 Case Study: THE CIA’S CREATION OF ISLAMIC TERRORISM ON AMERICAN SOIL by Paul L. Williams, Ph.D.

48 THE CHAPLAIN AS FIRST RESPONDER by William A. Gralnick, BA, MA, DHL

58 “THE NEXT FRONTIER” INTERNATIONAL TRADE TRANSPARENCY: by John Cassara

DEPARTMENTS:

06 From the Editor 9/11 Denial

46 Book Review Cycle of Fear: Syria’s Alawites in War and Peace

68 Innovative Products White Horse Research and Developement, Platesmart HD Engine, Lewis Machine & Tool, YakTrax™, Kent

72 Training Review USCG Port Security Skills Course

18

Cover Photo: Illustrastion by: Scott Morrison

6 The Counter Terrorist ~ October/November 2015

O

Counter The

Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 8 • NUMBER 5OCTOBER/NOVEMBER 2015

EditorHenry Morgenstern Director of OperationsCarmen Arnaes Director of AdvertizingSol Bradman Administrative Ashley Villegas Contributing EditorsGarret Machine Paul L. Williams, Ph.DKaren BunsoAndrew CurtissJohn CassaraWilliam A. Gralnick, BA, MA, DHLGraphic DesignMorrison Creative CompanyCopy EditorLaura Town Advertising SalesSol Bradman [email protected] 305-302-2790 Publisher:Security Solutions International13155 SW 134th St. • STE 103 Miami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 103, Miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.For article reprints, e-prints, posters and plaques please contact:Security Solutions International at [email protected] or call 786-573-3999Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com© 2015 Security Solutions International

n the recent, and for me sacred, 9/11 anniversary, commemorating the lives of the 2977 fallen and the heroes that together make up the worst Terrorist act on American

soil ever, I was shocked to hear John Hockenberry, a regular on National Public Radio give a tirade called: Why I am done with 9/11:

I was actually done with the whole 9/11 thing sometime between the famous and politically disastrous “Mission Accomplished” moment from George W. Bush after the Iraq invasion, and the empty announcement by Barack Obama that this feeble terrorist mastermind, Osama bin Laden, had been killed by Navy SEALs in Pakistan.

I’m done with the whole heroes’ thing. Aren’t we over this? There’s the American tragedy story and the talk of America as the preeminent victim of terrorism—America isn’t even close to being the most victimized nation by terrorism. If anything, we are more of a victim of our own domestic terrorism than from any foreign enemies, even though it’s easy and convenient to fear them more than kids with guns who wander into churches to kill.

And as if this were not appalling enough he continues:But I think the 9/11-ization of American life has been a kind of poison for all of us. We had our

moment when the whole world was with us after 9/11, and we squandered it. We spent trillions on two wars that turned a battlefield into a killing field for ISIS and gave us a

refugee tidal wave from Syria and Iraq. And another battlefield in Afghanistan was turned into a fragile puppet government that rules over the biggest opium crop in the history of the world. Some of that Afghan heroin finds its way into our cities where it kills and destroys lives much more easily than flying planes into towers.

But should I be shocked? Since the beginning of this year, Police are being hunted by terrorists incited by Black Lives Matter to openly kill our Police. The killing of a veteran police officer north of Chicago is the latest in a string of recent law enforcement deaths. Lt. Charles Joseph Gliniewicz’ death came after the death of Police Officer Darren Goforth was shot and killed Aug. 28 in suburban Houston as the Harris County deputy stopped to put gas in his patrol car. Henry Nelson, an officer in Sunset, Louisiana, was shot and killed Aug. 26 while responding to a domestic-violence call. Louisiana State trooper Steven J. Vincent died Aug. 14 after being shot in the head while assisting a motorist.

And then what about Chattanooga, where brave Americans that had every right to feel comfortable at a Recruiting Office, gunned down by a hateful Muslim Jihadist inspired by ISIS. And ISIS continues to publish details of US servicemen and their families inciting their followers to attack them here—in the USA.

Yet, where is the official condemnation of these acts? The well-worn mantra about the Religion of Peace was trotted out yet again after the Chattanooga murders by none less than Jeh Johnson, Secretary of Homeland Security: “it is “critical” to refrain from the “Islamic” label in order to “build trust” among Muslims. The Tennessee murderer, Mohammad Abdulazeez, is officially a “homegrown violent extremist,” according to the government—even though he blogged about his Islamic religious motivations for the attack. He and his family also attended a local mosque controlled by a terror-tied Islamic trust.

So is anything of any wonder anymore? As long as we bathe in these false moral equivalencies generated by some misguided multi-cultural, post-modern relativism and equate a disturbed child’s acts in Charleston with 19 Terrorists killing nearly 3000 Americans; or we apologize for Muslim Jihadists but don’t condemn the attacks on our Police; when our leadership does not step in to clear up the confusion but instead supports the illusion, we drift more and more towards chaos. Thanks to all that serve and protect despite this insanity. Thanks so very much.

Henry MorgensternEditor, The Counter Terrorist

FROM THE EDITOR:9/11 Denial

by Henry Morgenstern

The Counter Terrorist ~ October/November 2015 7Circle 319 on Reader Service Card

8 The Counter Terrorist ~ October/November 2015

Firsthand:

DEADLY FORCE: THE USE OF FORCE CONTINUUM AND DEFENSIVE TACTICS OR COMBATIVES

8 The Counter Terrorist ~ October/November 2015

The Counter Terrorist ~ October/November 2015 9

by Andrew Curtiss

s an arms professional, I frequently find myself training

members of various law enforcement agencies. From run-of-the-mill patrolmen to SWAT to undercover narcotics task forces, I have consulted, trained, or advised a broad spectrum of law enforcement officers (LEO). I also have the honor and privilege of working with

the military and security professionals. There are two areas where my services are frequently requested: deadly force and the use of force continuum and defensive tactics or combatives.

One advantage of working operationally and consulting on a broad spectrum is that I get to see things from various perspectives. That being

Recently, the term “use of force” has gotten a lot of publicity. First, we saw the Michael Brown incident and the rear naked choke applied to Eric Garner in New York City that gained worldwide attention with the slogan “Black Lives Matter.” Then we saw the incident in Baltimore, where martial law was required to quell the city after another incident with local police.

A stated, this article is written from the perspective of someone who sees the issue of defensive tactics from numerous standpoints and not from a narrow, limited scope. This wide view was taught to me by none other than Ultimate Fighting Championship living legend Dan “The Beast” Severn. Dan is a good friend of mine and I have been privileged

The Counter Terrorist ~ October/November 2015 9

10 The Counter Terrorist ~ October/November 2015

to have the opportunity to train with him on numerous occasions. It was on one of these occasions that I asked him what the best techniques were to use on the ground in a professional fight. His answer was the age-old expression about techniques being as relative as the individual using them.

This brings us to the subject at hand: What techniques are best used and applied for law enforcement and security professionals in the real world? Because techniques are relative and preferential, I would like to present this matter in a way that identifies criteria upon which to base the choice of techniques.

In late 2014, I began working on the rewrite of a defensive tactics program for

What techniques are best used

and applied for law enforcement

and security professionals in the real world?

10 The Counter Terrorist ~ October/November 2015

are individuals with law enforcement backgrounds who have elevated their positions politically and have consulted with the State’s attorneys rather than individuals who truly understand how to apply biomechanics to the field of unarmed defense techniques.

The next problem is the false idea that the State has the authority or the foresight to dictate which techniques officers on the street can and should be limited to for self-protection. When planning for combat operations, we used to say that “even the enemy has a vote sometimes.” This means that you can develop the best plan in the world beforehand, but a plan is really just a theory until it is time to execute it. The following things dictate which techniques should be used:• Mission: What is the desired end state

the officer wants to achieve for this particular situation?

• Enemy: What actions is the enemy taking? What is the actual “real” threat?

• Terrain/ Weather: What is the layout of the environment? Is it urban or rural? Wet and slippery? Crushed gravel? Icy? Etc.

• Time Available: How urgent and dire is the situation at hand? What is the relative positioning of the threat?

• Troops Available: How available is the nearest backup?

• Civil Considerations: Are there innocents or other potential collateral damage at risk?All of these things are in direct

correlation to the Ability, Opportunity, and Intent equals Jeopardy algorithm. This means that the tactical situation dictates the methods and techniques used, not the State. Organizations would be wise to adhere to this model rather than setting myopic standards based solely on the premise of limiting the State’s liability in a use of force case.

Officers rarely received training in

one of my client organizations. During this rewrite, I realized something that reversed the way I was seeing things. Because the program I was developing requires a high degree of knowledge of the use of deadly force and the use of force continuum, I decided to use case law as a reference. During my research of case law, I noticed a recurring theme. Of the several cases of excessive force studied, nearly all of them entailed the officer or officers charged making the following claims:1. They rarely received training in

defensive tactics (4–8 hours per year on average).

2. During the event in question they could not effectively apply the approved techniques required by their parent organization.

3. They were restricted to the use of ONLY APPROVED TECHNIQUES.

4. When all else failed, they simply resorted to causing their victim or subject more pain in order to get the victim or subject to comply with their commands.

5. They were in a panicked state, or what is commonly referred to in Cooper’s Color Spectrum Code as “The Black.”Therefore, based on these facts, I

will make my assessment of the “best” techniques for defensive tactics.

Officers restricted to the use and implementation of ONLY APPROVED TECHNIQUES.

This methodology, although useful in theory for mitigating legal liability, is the start of all other failures. First, the officials who decide which techniques are approved and which are not usually not subject matter experts (SMEs), even by the legal definition of the term. This means that they are not specialists in the combative arts, nor are they medical doctors or specialists in the field of biomechanics. In most cases, they

The Counter Terrorist ~ October/November 2015 11Circle 16 on Reader Service Card

12 The Counter Terrorist ~ October/November 2015

defensive tactics (4–8 hours per year on average)

After Basic Law Enforcement Training, many precincts and organizations only focus on their defensive tactics curriculum once per year. This is mostly due to the cost of providing such training, the availability of the trainees and instructors, and in some cases a shortage of personnel. As a result, setting more than one day per year aside for Defensive Tactics (DT) seems a bit too much to ask. This, however, does has multiple shortcomings: 1. Officers are not familiar with the

approved techniques.2. Officers learn just enough to confuse

themselves, have a loose understanding of the concepts, and eventually succumb to the old adage of “more and harder is better.” This leads to excessive force cases.

3. Because officers are largely untrained, they are not operant conditioned and crumble under the stress of real life situations. They panic and resort to the animal instinct to survive rather than the calm, collected state of the trained mind. A trained mind is able to focus on the whole situation because the trained body instinctively regresses to the organized firing of neural transmitters, which operate along finely developed neural pathways honed by thousands of repetitions of training under stressful conditions.Additionally, it is important for officers

to be familiar with the jurisprudence regarding the use of proportionate force, the use of deadly force, and the premise of vital targets. All of this brings us to the discussion of pain compliance versus mechanical failure. When an officer decides to use a pain compliance

12 The Counter Terrorist ~ October/November 2015

technique, he or she is essentially making the decision to cause harm to the subject in question in some way, shape, or form. The problem with this decision is that everyone perceives pain differently. The perception of pain is dependent on so many variables, including genetics, body composition, body hardening or physical conditioning, substance use, mindset, mental state, and more. All of this can result in what an arresting officer perceives as a direct challenge by the subject when he or she attempts to use pain as a motivator during an arrest. This ultimately has the egotistical potential to escalate to an excessive force scenario.

When mechanical failure and leverage techniques are implemented, they change the diametric. When an officer is concerned about mitigating a threat by bringing the threat to a state of mechanical failure, he or she is not focused on using pain or harm as a tool to force compliance by a subject. These techniques are completely likely to shut down the function of an edged -weapon-wielding arm without causing pain to the subject. In most cases where mechanical-failure-driven techniques are used, it is the subject’s refusal and outright resistance to the control technique that causes pain and discomfort. The officer is not concerned with causing pain to achieve compliance and instead aims to mitigate or neutralize the specific threat. Both the subject and the threat itself are inconsequential to the arresting authority, meaning that if the subject causes himself or herself pain it is unfortunate but it does not matter. There is no direct challenge with this methodology, therefore there is little or no ego involved. This means the officer is less likely to use a level of force that greatly outweighs the threat.

Some basic but effective techniques include the following:

Circle 18 on Reader Service Card

The Counter Terrorist ~ October/November 2015 13

• Stays put when gun is drawn• Available for most pocket guns• Special polymer insert prevents molding

MSRP

StyleN38

2599$

STICKS ALMOST LIKE FLY PAPER

• Most favored of Federal LE Agencies• Premium saddle leather• Optimum draw angle• Secure & highly concealable

MSRP

Style001

7599$

www.desantisholster.com

800-GUNHIDE 631-841-6300Dept #CTO5

431 Bayview Avenue, Amityville, NY 11701

www.desantisholster.com

NEMESIS®NEMESIS

www.desantisholster.com

®THUMB BREAK

SCABBARDTHUMB BREAK

SCABBARD

800-GUNHIDE 631-841-6300Dept #CTO5

431 Bayview Avenue, Amityville, NY 11701

Circle 262 on Reader Service Card

14 The Counter Terrorist ~ October/November 2015

THE AMERICAN 2-ON-1, ARM BAR:

This is based on the classic “Russian 2-on-1” wrestling arm hold. When properly employed, this technique implements complex torque and immobilization of multiple joints. It also provides the leverage required for a smaller subject to take down a much larger subject with ease. This technique places the officer in a tactical position and gives him or her the option of escalating to a level of deadly force (by applying enough force to break the elbow) or de-escalating to a simple escort position.

THE CROSS-FACE FOREHEAD TAKEDOWN:

In the event that a subject attempts to escape either the escort or American arm bar, this is a great takedown that mechanically disables the subject’s ability to stand upright by decentralizing the subject with minimal force.

THE CHIN LIFT TAKEDOWN:

Similar in concept to the cross-face forehead takedown, this decentralizing method attacks the body’s ability to stand erect.

THE HEAD TWIST TAKEDOWN:

This technique is similar to the cross-face forehead and chin lift takedowns. The difference in this case is that it is important to gain control of the entire head in order to dictate where the body will go.

14 The Counter Terrorist ~ October/November 2015

The Counter Terrorist ~ October/November 2015 15

THE KIMURA ARM AND SHOULDER LOCK: This arm and shoulder lock is excellent for controlling a hostile subject and preparing the subject to be restrained. This technique utilizes the principle of complex torque and immobilizes the elbow, shoulder, and wrist.

THE SEATBELT CHOKE: This is a speedy and effective blood

choke that also implements a neck crank. This particular choke capitalizes on the virtue of position to render the near arm of the subject immobile and ineffective.

THE REAR NAKED CHOKE:

This is a blood choke that can render a person completely unconscious in seconds. This technique can easily be turned into a lethal technique by holding it for longer than a minute.

In closing, the vast landscape of political correctness should not dictate the arsenal of techniques that an officer can use to deal with tactical situations. The use of pain compliance should be abandoned in favor of the mechanical failure solution, which is deeply rooted in science. Officers need more training time in order to develop their techniques, and that means the State needs to take responsibility for ensuring that employees in uniform are receiving that training. The two things for which there is no substitute are repetition and stress. The things that officers should take away from this are that commonality in training and technique and effective and versatile implementation of techniques leads to certain fluidity and reflexiveness. After all, if your training is not instinctive it’s useless. •

The Counter Terrorist ~ October/November 2015 15

16 The Counter Terrorist ~ October/November 2015 Circle 20 on Reader Service Card

ABOUT THE AUTHORAndrew Curtiss is a former US Army

Special Forces Soldier and combat veteran. Andrew was nominated for the Silver Star and was awarded the Bronze Star with Valor. He holds advanced black belt ranks in the martial arts of Taekwondo and Shurite Kenpo Karate. Andrew was ranked black belt in Brazilian Jiu-Jitsu under Professor Jon Siracusano. He is a Professional Mixed Martial Arts Athlete and former world

runner up kickboxer at the amateur level. Andrew is a former national level full contact karate champion. He is the author of two published books 1984 Redux a political commentary; and Combat Application Techniques, an instructional on edged weapon and unarmed combat. He is currently a tactical consultant for various government and private organizations and travels the country teaching firearms, use of force, defensive tactics and combatives.

The Counter Terrorist ~ October/November 2015 17Circle 25 on Reader Service Card

CYBERWARFARE HAS A NEW FIRST LINE OF DEFENSE.

LEARN FROM THE LEADER.

We want you to make an informed decision about the university that’s right for you. For more about the graduation rate and median debt of students who

completed each program, as well as other important information—visit www.APUS.edu/disclosure.

AMUONLINE.COM/COUNTER-TERRORIST

B.S., CYBERSECURITYM.S., CYBERSECURITY STUDIES

18 The Counter Terrorist ~ October/November 2015

Case Study:

THE CIA’S CREATIONOF ISLAMIC TERRORISM ON AMERICAN SOIL

The Counter Terrorist ~ October/November 2015 19

by Paul L. Williams, Ph.D.

tories about these camps are not news. They have been reported by the mainstream media, including Fox News.

The news is that these camps—from which the next 9/11 is expected to occur—have been established by the Central Intelligence Agency.

The origin of these compounds for would-be jihadis dates back to 1979,

when the Agency sent hundreds of radical Islamic clerics to the United States in an effort to recruit black Muslims for the holy war against the Soviets in Afghanistan.

THE TABLIGHI MISSIONARIES

By and large, these missionaries hailed from Pakistan and belonged to Tablighi

Author of Operation Gladio: The Unholy Alliance between the Vatican, the CIA, and the Mafia

Islamic paramilitary camps have been set up in the United States and Canada to train African-American Muslims in guerilla warfare. After months of training on firing ranges and obstacle courses, the black Muslims are sent to Pakistan where they receive advanced training in explosives. Many never return.

S

The seal of the U.S. Central Intelligence Agency inlaid in the floor of the main lobby

of the Original Headquarters Building. Photo by: Duffman

20 The Counter Terrorist ~ October/November 2015

Jamaat, a Muslim movement with 150 members in 213 countries.1 Upholding a strict interpretation of Islamic law (shariah), the Tablighi were united in their resistance to Western culture, their insistence that Muslims should avoid

Journalist, Paul L. Williams at the entranceway to Islamberg.

2009 Malaysian Annual Congregation of Tablighi. Photo by: Muhammad Hamza

contact with all those who do not share their beliefs, and their approval of jihad by sword (jihad bin saif ).2 Members of the movement gathered every year for three days in the small Pakistani town of Raiwind.

In 1979, Sheikh Mubarek Ali Gilani, a Tablighi missionary from Lahore, Pakistan, arrived in Brooklyn, where he called upon members of Dar ul-Islam, a notoriously violent street gang, to take arms in the great jihad. Scores answered his call and were headed off to Pakistan with payments of thousands of dollars in cash and promises of seventy hours in seventh heaven if they were killed in action.3

WELCOME TO ISLAMBERG

By 1980, the Agency realized that considerable expense could be saved by setting up paramilitary camps under the supervision of Shiekh Gilani in a rural area of the country. An ideal location was located near Hancock, New York, at the base of Point Mountain, where the east and west branches of the Delaware River converge to form the headwaters that flow through Pennsylvania and New Jersey to the Atlantic Ocean. The rocky terrain was infested with rattlesnakes, and the woods were home to black bears, coyotes, wolves, and a few bobcats. Islamberg, a seventy acre complex, came into existence.

Firing ranges and obstacle courses were set up in Islamberg along with a massive underground bunker and a landing strip. The residents lived in single-wide trailers that lined the hillside. The settlement contained a small shack that served as a laundry facility, a claptrap community center, a tiny grocery store, and a masjid. A sentry post was placed at the entranceway.4

The sound of gunfire and explosions

The Counter Terrorist ~ October/November 2015 21

emanating from the property alarmed local residents, who filed complaints with local and state law enforcement agencies. But a marked law enforcement vehicle never appeared at the compound.5 Islamberg was off-limits to police inspection on the spurious grounds of “national security.”

The camp also came to contain an illegal cemetery where bodies were buried in unmarked graves.6 This alone should have warranted a raid by the New York State Police. But not even dead bodies could prompt a police investigation.

When Islamberg was established,

HOMEGROWN JIHADTHE TERRORIST CAMPS AROUND U.S.

The sound of gunfire and explosions emanating from the property alarmed local residents, who filed complaints with local and state law enforcement agencies.

Sheikh Mubarek Ali Gilani

22 The Counter Terrorist ~ October/November 2015

Gilani presented himself as an employee of the CIA, and the future jihadis who resided in the compound called themselves CIA operatives.7 Few in law enforcement doubted the professed credentials of the Muslim newcomers.

COMMUNITIES OF THE IMPOVERISHED

Islamberg was a great success.

Hundreds of African-American Muslims made their way to Afghanistan and joined the ranks of the mujahedeen. Several were killed in action.8 Others, including Clement Rodney Hampton-El, returned to the U.S. to plot the 1993 bombing of the World Trade Center in New York.9

A host of other paramilitary camps were established in such places as Red House, Virginia; Commerce, Georgia;

Mujahideen fighters in the Kunar Province of Afghanistan in 1987. Photo by: Erwin Lux

A mujahideen fighter in Kunar uses a communications receiver.

Photo by: Erwin Lux

Mujahideen fighters with two captured Soviet ZiS-2 field gun in Jaji of Paktia

Province in Afghanistan. Photo by: Erwin Lux

Circle 213 on Reader Service Card

The Counter Terrorist ~ October/November 2015 23

York, South Carolina; Dover, Tennessee; Buena Vista, Colorado; Macon, Georgia; Squaw Valley, California; Marion, Alabama; Talihina, Oklahoma; and Toronto, Ontario.10

Gilani placed Islamberg and the other camps under a governing organization called “Jamaat ul-Fuqra” or “the community of the impoverished.” He established the headquarters of this “charity” in Lahore. The American arm of Jamaat ul-Fuqra became the “The Muslims of America,” a tax-exempt corporation with Gilani’s mosque in Brooklyn as its address.11

INCREASED NEED OF RADICALS

The Soviet withdrawal from Afghanistan in 1989 did not spell an end to the CIA’s support of radical Islam. Throughout the 1990s, Dr. Ayman Zawahiri, al-Qaeda’s second in command, travelled at the expense and bidding of the CIA throughout Central Asia, where he cultivated new armies of jihadis to destabilize the newly created republics. His efforts resulted in the uprising of the Chechens against the Russian Federation, the attempted toppling of the government in Uzbekistan, and the insurgence of the Uigurs in the Xinjiang province of China.12

A dutiful operative, Dr. Zawahiri met regularly with U.S. military and intelligence officials at the U.S. embassy in Baku, Azerbaijan, to plan the Balkan operations in which the CIA worked with al-Qaeda to overthrow the government of Slobodan Milosevic for the creation of “Greater Albania,” encompassing Albania, Kosovo, and parts of Macedonia.13

These operations, particularly in the Balkans, required the recruitment of more and more jihadis. Gilani’s camps continued to prosper. And more and

more of his African-American recruits appeared among the rank and file mujahedeen in various theaters of warfare throughout the world.

Dr. Zawahiri’s help was so valuable that he was granted permanent U.S. residence by the U.S. Immigration and Naturalization Service in January 2000.14

Visit www.Beyond-Border.comfor information on attending and sponsorships

Achieving the Goals of Shared Security and Prosperity

Sponsors

OCTOBER 27 - 28, 2015C O B O C E N T E R | D E T R O I T , M I

3R D A N N UA L

Circle 103 on Reader Service Card

24 The Counter Terrorist ~ October/November 2015

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

YOU CAN’T BE EVERYWHERE AT ONCE,

WE CAN.RECONYX High Definition motion activated security cameras do not require separate lines for power or communication. Extremely easy to deploy and hide, (5.5” x 4.5”) our cameras provide near instant notification of an intrusion by transmitting images via the cellular network directly to your cell phone or computer.  GeneGeneral Surveillance and License Plate Capturemodels available. 

PHONE 866-493-6064 | WWW.RECONYX.COM

Circle 303 on Reader Service Card

THE RISE OF ISISAfter 9/11, the Agency continued

to cultivate Islamic holy warriors to maintain the “strategy of tension” in the Middle East, the Balkan states, and Central Asia, and to mount new uprisings in Africa to expand U.S. hegemony. The grand purpose of these enterprises was U.S. economic and political control of Eurasia. Zbigniew Brzezinski, former Secretary of State and leading strategist for the Council on Foreign Relations, writes:

For America, the chief geopolitical prize is Eurasia… Now a non-Eurasian power is preeminent in Eurasia—and America’s global primacy is directly dependent on how long and how effectively its preponderance on the Eurasian continent is sustained… To put it in a terminology that harkens back to the more brutal age of ancient empires,

the three great imperatives of imperial geostrategy are to prevent collusion and maintain security dependence among the vassals, to keep the tributaries pliant and protected, and to keep the barbarians from coming together.15

In accordance with the strategy of keeping “the barbarians from coming together,” ISIS forces were and are trained at a secret U.S. military base in the Jordanian town of Safawi.16 The weapons for ISIS came, compliments of the Agency, from the arsenal of deposed Libyan dictator Muammar Gaddafi. The shipment of these weapons to ISIS in Syria was supervised in 2012 by David Petraeus, the CIA director who would soon resign when it was alleged that he was having an affair with his biographer.17

SUPPLY AND DEMANDIn response to the increased demand,

Former Director of the Central Intelligence Agency, David Petraeus.

Photo by: Darren Livingston

The Counter Terrorist ~ October/November 2015 25Circle 335 on Reader Service Card

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

www.PoliceOneAcademy.com

Video Training On DemandMaximize your training budget with 24/7 access to more than 500 HD training videos!

• FulfillFDLEMandatoryRetrainingRequirementsonline!

• ProvidesCertificatesofCompletionforeachone-hourcoursecompleted

• 80+hoursoftrainingavailable

• Idealforinservice/rollcalltraining

• Createself-pacedtrainingassignments

• Lessonplansandquizzes

• Trackingandreportingfeatures

• Full-featuredmobileexperience

• Departmentandindividualsubscriptionsavailable

Contactustodayat

866-941-4090 [email protected]

foryourFREEdepartmentpreview!

“PoliceOne Academy’s online training is a valuable tool for any officer, that provides high liability training at a moment’s notice.” Lt. Eric RauchPolk County Sheriff’s Office

Circle 335 on Reader Service Card

26 The Counter Terrorist ~ October/November 2015

Gilani continued to churn out more and more African-American jihadis. More and more training camps opened, including one in Texas.18 More and more bodies were buried in unmarked graves. More and more complaints were made to law enforcement officials. And more and more graduates from the training camps made their way to Pakistan.

BLOWBACKOf course, there was blowback to

the CIA’s establishment of Islamic paramilitary camps on American soil. Over the years, numerous members of Jamaat ul-Fuqra have been convicted in

U.S. court of such crimes as conspiracy to commit murder, firebombing, gun smuggling, and workers’ compensation fraud. Others remain leading suspects in criminal cases throughout the country, including ten unsolved assassinations and seventeen firebombings between 1979 and 1990.19

In 2001, a resident of the ul-Fuqra camp in California was charged with first-degree murder in the shooting of a sheriff’s deputy; another was charged with gun-smuggling; and twenty-four from the camp in Red House, Virginia, were convicted of firearms violations.20

By 2004, investigators uncovered evidence that purportedly linked both the Washington, DC “sniper killer” John Allen Muhammad and “Shoe Bomber” Richard Reid to Gilani’s group, and reports surfaced that Wall Street Journal reporter Daniel Pearl had been captured and killed in the process of attempting to gain an interview with Sheikh Gilani in Pakistan.21

By 2015, Jamaat ul-Fuqra had been involved in more terror attacks on America soil (30 and counting) than all the other terrorist groups combined. Despite these attacks, the group has never been placed on the official U.S. Terrorist Watchlist, and The Muslims of America continues to operate as a legitimate non-profit, tax-exempt organization.22

THE WARNINGInvestigators, including Patrick

Walsh and William Krayer, who have visited Islamberg and other paramilitary settlements, believe that the next major attack on U.S. soil will emanate from Gilani’s jamaats of homegrown terrorism. Based on the history of the CIA’s involvement in the creation of these camps, such an attack may occur in accordance with the Agency’s own design. •

The Bushmaster XM-15 used by the Washington D.C. snipers during their

attacks in October 2002. It is equipped with a 20-round STANAG magazine and

a holographic weapon sight of some sort.Photo by: Federal Bureau of Investigation

The Al-Farooq Mosque at in Brooklyn, New York City, which describes itself as one of the oldest Islamic centers in New York City, was founded in 1976. The mosque has been described

as having been “a center of radical Islamic thought in Brooklyn and a major spiritual and operational al-Qaeda hub in the United States before and after the September 11, 2001

terrorist attacks.” Photo by: Beyond My Ken

The Counter Terrorist ~ October/November 2015 27Circle 13 on Reader Service Card

Counter The

The Counter Terrorist Magazine Asia Pacific Edition is finally available for the Asia Pacific region counter-terrorism and homeland security practitioners. The Asia Pacific Edition not only gives the readers a worldwide counter-terrorism perspective but also in-depth information about counter terrorism activities in Asia. The Asia Pacific Edition provides an excellent platform for counter-terrorism and homeland solutions providers to access and penetrate the Asia Pacific market.

Asia Pacific Edition

Circle 255 on Reader Service Card

Email: [email protected]

28 The Counter Terrorist ~ October/November 2015

ABOUT THE AUTHORPaul L. Williams holds a Ph.D.

in philosophical theology from Drew University. An award-winning journalist, he is the author of The Day of Islam and Crescent Moon Rising: The Islamic Transformation of America. His latest book is Operation Gladio: The Unholy Alliance between the Vatican, the CIA, and the Mafia (Prometheus, 2015). Williams served as a consultant (CI-14) to the FBI. His work with the Agency resulted in arrests and convictions. His field work also served to unravel the plot of the Toronto 18 to blow up Parliament and behead the Canadian prime minister.

ENDNOTES1Alex Alexiev, “Tablighi Jamaat: Jihad’s

Stealthy Legion,” Middle East Quarterly, no. 1 (Winter 2005), 3-11.

2Jane I. Smith, Islam in America (New York: Columbia University Press, 1999), 161.

3Robert Dannin, Black Pilgrimage to Islam (New York: Oxford University Press, 2002), 75-76.

4Douglas J. Hagmann, “Special Report:

Jamaat ul-Fuqra Training Compound Inside the U.S.,” Northeast Intelligence Network, February 28, 2006, http://politicsofcp.blogspot.com/2006/02/special-report-released-jamaat-ul.html

5Ibid.6Paul L. Williams, Crescent Moon

Rising: The Islamic Transformation of America (Amherst, New York: Prometheus Books, 2013), 134.

7“Afghanistan Update,” Daily Telegraph (London), August 5, 1983; Los Angeles Times, August 5, 1983. This is the title.

8Ibid.9Zachary Crowley, “Jamaat ul-Fuqra

Dossier,” Center for Policing Terrorism, March 16, 2005, hard copy.

10Gordon Gregory and Sonna Williams, “Jamaat ul-Fuqra,” Special Research Report, Regional Organized Crime Information Center, 2006.

11Ibid.12Nafeez Mosaddeq Ahmed,

“Whistleblower: Al Qaeda Chief Was US Asset,” Huffington Post, May 21, 2013. http://www.huffingtonpost.co.uk/dr-nafeez-mosaddeq-ahmed/whistleblower-alqaeda-chi_b_3305954.html

13Sibel Edmonds, “Know Your Terrorists: Ayman al-Zawahiri,” Boiling

Circle 87 on Reader Service Card

The Counter Terrorist ~ October/November 2015 29

WWW.PROMETHEUSBOOKS.COM

“Gripping reading.”NEXUS MAGAZINE

“Will cause the reader to question what person of authority and leadership can be trusted. . . .”

SGT. THOMAS JUBYMember of the Advisory Council for the Intelligence Summit

“Well-researched. . . . [This] scholarly work fills a major lacuna in the study of the US foreign policy.”

THE WASHINGTON BOOK REVIEW

Circle 123 on Reader Service Card

INNOVATION, NOT IMITATION

[email protected] 877 535-8774

FROM THE MAKERS OF THE ORIGINAL M9 ASSAULT MEDICAL BACKPACK

Medical, Response and EOD Kits / Logistics Services Solutions

Frogs Post, February 16, 2013, http://www.boilingfrogspost.com/2013/02/16/video-report-know-your-terrorists-ayman-al-zawahiri/

14Rory McCarthy, “The Real Ayman al-Zawahiri,” The Guardian, August 5, 2005, http://www.prisonplanet.com/articles/august2005/050805therealayman.htm (note: this site links to The Guardian)See also Michel Chossudovsky, The Globalization of War (Montreal: Global Research Publishers, 2015), 111.

15Zbigniew Brzezinski, The Grand Chessboard: American Primacy and Its Geostrategic Imperative (New York: Basic Books, 1997), 20, 40.

16“Americans Are Training Syria Rebels in Jordan,” Reuters, March 10, 2013, /www.reuters.com/article/2013/03/10/us-syria-crisis-rebels-usa-idUSBRE9290FI20130310

17Ibid. See also Sy Hersch, “Beyond Partisan politics: What Benzagi Is Really About,” WashingtonBlog, April 15, 2014, http://www.washingtonsblog.com/2014/04/real-benghazi-story.html

18Ryan Mauro, “Islamic Terror Enclave Discovered in Texas,” The Clarion Project, February 18, 2014, http://www.clarionproject.org/analysis/exclusive-clarion-project-discovers-texas-terror-enclave

19“Jamaat ul-Fuqra: Terror Group of Pakistan,” Institute of Contact Management, 2001, http://www.satp.org/satporgtp/countries/pakistan/terroristoutfits/jamaat-ul-fuqra.htm

20Ibid.21“The Jamaat ul-Fuqra Threat,”

Stratfor, Security Consulting Intelligence Resources, June 3, 2005.

22Patrick B. Briley, “Al Fuqra: U.S. Islamic Terror Network Protected by FBI, U.S. State Department,” Liberty Post, July 28, 2006, http://www.newswithviews.com/Briley/Patrick28.htm

30 The Counter Terrorist ~ October/November 2015

WHY DOMESTIC TERRORISTS GO SOFT

Photo by: Al Jazeera English

The Counter Terrorist ~ October/November 2015 31

by Karen Bunso

s for explaining the “why” behind these incidents is more

difficult because that’s one detail that we usually learn after the fact; and even then, these incidents still do not make any sense.

PART I TARGET HIERARCHY

The first model is called the Target Hierarchy and it is a hierarchy in a

pyramid scale. It begins with the easiest category of target to assault and works upward to the most difficult category of target to assault. I will attempt to explain factors that play a part in an assault based on the type of target. Tactical factors like the category of target, the degree of difficulty, available targets (people), and the preparation time will be covered.

While the possibilities for a target objective are unlimited, potential target

A

With all of the information we have learned about mass shootings and domestic terror attacks, we have learned all too much of, I thought it would be a good idea to design visual models that could visually explain some of the factors contributing to such violent incidents.

Photo by: Al Jazeera English

32 The Counter Terrorist ~ October/November 2015

objectives can be sorted into two categories: soft targets and hard targets. The degree of difficulty assaulting a target depends on the category it is in, the number of targets available, and the amount of time and other resources the assailants will invest. For this paper, all targets are fixed and are permanently stationary.

THE HARD TARGETA hard target is a site that has well-

established physical and technical defensive security measures engineered

into the design of the building and site. It has layers of access constricts, multiple layers of security rings establishing stand-off distance for explosives, line of site precautions and steel-concrete barriers. It has also prepared for and taken extensive measures to handle and repel an intrusion or assault of varying tactics. Hard targets have permanent security personnel that are vetted, trusted, trained, and armed. Hard targets have a large monetary value, house a world leader, or are a symbol of national or international importance

(monument), and they require extensive, well thought out security measures to keep them safe. Some good examples of hard targets are the United States Bullion Depository at Fort Knox, the Pentagon, and the Statue of Liberty.

Assaulting a hard target has the highest degree of difficulty because of the layered security measures that are permanently in place and have been specifically designed to actively defend it.

There are 446,000 federal buildings according to the U.S. Department of

HARD TARGET

HARDENED SOFT TARGET

SOFT TARGET

Fort Knox Bullion Depository, White House, Level V Federal Buildings

Sport Stadiums, Concert Event, City Hall, Airports, Federal Buildings (Below Level V), 

Police Station, Court Houses

School, Medical Facilities, Places of Worship, Public Transportation, Restaurant, Mall, Theater, Park, Parade, Public Access spaces, Fire Station, 

Community Figures with routine public interaction

Fewer targets

Low opportunity for mass casualty event, unless attack on secondary target used as distraction

1 assailant

Some preparation and planning needed to carry out an 

Many targets to choose from

High opportunity for mass casualty event because 

on a Hardened Soft Target

Little to no preparation or planning needed, spontaneous assault possible

Numerous targets available

Medium opportunity for mass casualty event

Note: all targets are stationary.

TARGET HIERARCHYu

1 A

est

Content: Karen Bunso, Design: Jessica Rosenthal, 2015

The Counter Terrorist ~ October/November 2015 33

Statue of Liberty. Photo by: Derek Jensen

The Pentagon, headquarters of the United States Department of Defense, taken from an airplane in January 2008. Photo by: David B. Gleason

The United States Bullion Depository at Fort Knox, Kentucky. Photo by: David B. Gleason

Justice, U.S. Marshals Service (USMS), Vulnerability Assessment of Federal Facilities report. Because of the Oklahoma City Bombing, an evaluation of security at all federal buildings was commissioned and was released in 1995. The report placed buildings into five categories, Level V “…are considered critical to national security

(e.g., the Pentagon).” Information about the number of federal buildings classified as Level V is not readily available, but I estimate there are less than 100 buildings with this classification.

The amount of preparation time required to plan an effective assault on a hard target depends upon the objective of

34 The Counter Terrorist ~ October/November 2015

the assailant(s). If they want to take over and destroy the target, it will necessitate a lot of planning and preparation in order to mount a sophisticated assault. If the assailant(s) simply wants to test security and see if they can breach it (for their 15 minutes of notoriety), very little planning time will be needed.

THE SOFT TARGETA soft target is the most vulnerable

type of target because it has almost no security measures or protection in place, imaginary or otherwise. I do not consider observational security measures such as video monitoring as security, but view them as passive deterrents and investigative tools. Soft targets are places or people that the public has unrestricted, routine access to, such as unticketed public events, like parades. Other examples include schools, fire stations, public transportation, grocery stores, shopping malls, public parks, places of worship, and medical facilities. Community activists, local celebrities, local judges, school principals and town mayors are also examples of soft targets.

Assaulting soft targets is not a difficult task because of their security

vulnerabilities. Perhaps the most difficult thing for assailants assaulting soft targets is choosing which one to attack. Consider the fact that nearly every place a person frequents throughout the day is a soft target. Soft targets are everywhere and they are abundant. On the Target

An assailant has flexibility and can act spontaneously

or on a whim.

Hierarchy, there are more available soft targets than any other category.

From a preparation standpoint, very little time is needed to plan an assault on a soft target. An assailant has flexibility and can act spontaneously or on a whim.

For the reasons previously discussed,

The Counter Terrorist ~ October/November 2015 35

THE VENOM® PRODUCT LINE FROM CSI

A family of high-capacity non-lethal grenade launchers designed to be fullyinterchangeable for mounted use onvehicles, tripod mounts, and static installations. Expanded in 2014, the VENOM® product line offersnon-lethal solutions for a variety ofcalibers and ranges.

®

LIGHT WEIGHT // VERSATILE MULTI-CALIBER & TACTICAL SOLUTIONS

Deployed remotely or on land and marine platforms, the V3037 delivers non-lethal flash and sound, smoke obscuration, irritant, and blunt trauma effects. These capabilities support escalation of force, determination of intent, crowd dispersal and area denial objectives.

SEE THE PRODUCT LINE IN ACTION:

VISIT US AT THE FOLLOWING TRADESHOWS:AUSA: Booth #1460

MILIPOL Paris: Booth #5F120 in the U.S. Pavilion

GET THE UPPER HAND...AND KEEP IT.

Circle 93 on Reader Service Card

36 The Counter Terrorist ~ October/November 2015

soft targets represent the worst case scenario-they are the most likely places for mass casualty events to occur. Wherever a lot of people congregate with no security it IS the worst case scenario- it is a target rich environment.

THE HARDENED SOFT TARGET

Sandwiched between these two well-defined categories is what I term the hardened soft target. This is simply a soft target that has been hardened with some security measures. A hardened soft target is a closed venue with restricted access granted by purchased event tickets, identification credentials, or employment. It has passive but visible security measures that were added to the venue

or site after it was constructed. These added security measures may include unarmed temporary security personnel interspersed with armed local or state law enforcement, bollards, chain link fencing, locking gates, and video cameras. Examples of hardened soft targets include police stations, sport stadiums or event sites, concert venues, airports, federal buildings, office buildings, courthouses, and city halls.

A hardened soft target usually has some form of perimeter security that it is, in fact, duplicitous: it keeps the bad guys out and the attendees confined inside. With the attendees as a captive audience, the assailant(s) have the potential to carry out a mass casualty event.

How difficult is it to carry out an assault on a hardened soft target? Not very, especially if the assailant works at the venue. The insider threat is a very real vulnerability. Even without insider threats, hardened soft targets are appealing targets because they advertise security that they cannot deliver. Security measures cannot keep people at venues 100% safe because the venues themselves were designed to let people in (spectators), not keep them out.

Additionally, most events scheduled at hardened soft targets are well publicized, providing notice of certain events and a timeline or deadline for those planning an assault.

A hardened soft target with limited security measures is an inviting and possibly symbolic target for an assailant(s). Such an assault, while needing less preparation time than an assault on a hard target, still requires time to plan.The site of the first bomb at the 2013 Boston

Marathon finish line at 1:56:44pm April 15th, 54 minutes before the explosion.

Photo by: Aaron “tango” Tang

Super Bowl XLVII Kick Off. Photo by: Au Kirk

The Counter Terrorist ~ October/November 2015 37

Even without insider threats, hardened soft targets are appealing targets because they advertise security that they cannot deliver.

The Counter Terrorist ~ October/November 2015 37

38 The Counter Terrorist ~ October/November 2015

PART IITACTIC/WEAPONRY HIERARCHY

Tactic-noun tac·tic \'tak-tik\:an action or method that is planned

and used to achieve a particular goalWeaponry-noun weap·on·ry \-rē\1: weapons-Merriam-Webster DictionaryWhile pretty much anything can be

used as a weapon—your hand, a pencil, etc.—I will cover conventional weapons

excluding Advanced Conventional Weapons (ACW) such as Man-Portable Air Defense Systems (MANPADS), tanks, etc., and military grade, state-manufactured weapons. Basically, I will cover small conventional weapons that the average assailant can afford to purchase or make on their own.

Like the previous model, I have put these weapons as tactics in a hierarchy, creatively titled Tactic / Weaponry Hierarchy. The weapons are ranked according to their affordability and

Inexpensive and easy to obtain

< 20 - > 50 yards for handgun, precision to blanket coverage; Range depends onassailant’s expertise, Rifle range < 1000 yards, precision weapon 

Requires little expertise to be weaponized

Has a blanket coverage range, not a weapon of precision unless assailing one victim

Very little time needed for preparation or planning

Can be weaponized and used as a tactic by just 1 assailant

TACTIC HIERARCHY

Can have a large blanket coverage range, not great precision, deadly by proximity 

Moderate time needed for device preparation and planning for assault

HME could be made and used by just 1 assailant

FIREARMS

FIRE

Handgun, automatic, revolver, shotgun, 

Arson, incendiary device (Molotov cocktail)

HME + IEDs 

TATP, ANFO, TNT, RDXIED – Pipe bomb, grenade, VBIED – Car, truck, tractor 

trailor, model aircraft, bicycle, motorcycle, SBIED  

R R R

R R R

R R R

$ $ $

$ $ $

$ $ $

Content: Karen Bunso, Design: Jessica Rosenthal, 2015

attainability, their ease of operability, their effective range (precision or blanket coverage), the time required to plan or prepare for their use (expertise, practice), and the number of assailants necessary to carry out an effective assault. Regarding the number of assailants necessary to carry out an effective assault, it only takes one.

FIREAccording to the 2014 Global

Terrorism Index, “60% of all attacks

The Counter Terrorist ~ October/November 2015 39

Circle 91 on Reader Service Card

involve the use of explosives, 30% use firearms and 10 per cent used other tactics including incendiary devices…” It makes sense then that the first tier at the base of the Tactic / Weaponry Hierarchy is fire weaponized via incendiary device. Fire has been used to light up the dark and to destroy entire cities. It’s easy to overlook the simplistic importance of fire with the prevalence of firearms—until you read about arson, a small airplane flying into a building or recall the events of 9/11, when jetliners full of petrol were used as incendiary devices. Jetliners are not the scale I am focusing on here however, and their use as a weapon is another article entirely.

Fire as an incendiary device is at the base of my hierarchy because it is easy to obtain, easy to use, has a blanket range, and requires little or no planning. It is the most basic of weapons. If an assailant one can find a match, they can carry out arson, destruction, and murder with this most primitive weapon. If targeting one person, an assailant can be precise at close range. With a rag, a glass bottle, and a common accelerant like gasoline, an assailant can build the unsophisticated incendiary device popularly known as a “Molotov Cocktail.” It only takes one assailant to weaponize fire using an incendiary device and carry out an attack.

FIREARMS Firearms, handguns, and small arms

are weapons that are commonly available and some examples are revolvers, rifles, and automatic handguns. Handguns are relatively inexpensive; for the price of a flat screen television an assailant can purchase a handgun. Handguns are also easily concealed, giving them the element of surprise in an assault. They are legal to

purchase, require a short waiting period, and can be permitted to carry concealed. They can also be purchased without a waiting period from private sellers.

Most firearms are simple to operate; if some expertise is required, or if the user needs to learn how to adjust the sights, instructional videos can be found on the Internet. The effective range of firearms depends on the skill of the user as well as the weapon used. A handgun used by an experienced shooter has quite an effective range, up to 100 yards. A handgun used by a novice has a shorter effective range, less than 20 yards. The same is true with the use of rifles, although with a longer range, the effectiveness and accuracy are limited by the user’s expertise. A long gun (hunting rifle) can be used for sniping and necessitates great expertise through training and practice in order to be accurate where it’s meant to be used– long range, 250 to 1000 yards.

Firearms are versatile in that they allow for precision as well as a blanket range depending on whether they are automatic (continuous fire) or semi-automatic (fires one round at a time). One assailant can easily carry out a successful firearm attack.

There is a short learning curve for operating a handgun, and user planning time can be as short as learning how to load the weapon. Planning time can be as long as the assailant needs for honing their expertise or planning the details and logistics of an attack. Of course, the more planning an assailant does, the more lethal the attack will be. This goes for any tactic or weaponry used.

EXPLOSIVES The National Counterterrorism

Center (NCTC) has a very good

Since 1996, ALS has been serving law enforcement, corrections and military communities, both domestically and abroad. ALS was purchased in 2011 by National Presto Industries and became AMTEC Less Lethal Systems, Inc. As a full service provider of tactical and operational equipmentequipment and training, AMTEC Less-Lethal strives to provide only the best products and services to meet the needs of our customers in today's changing environment. From a core of manufactured products, to strategic partners, ALS provides comprehensive solutions for all of youryour tactical, operational and training needs.

1-850-223-4066www.LessLethal.com

4700 Providence Rd.Perry, fl 32347

Since 1996, ALS has been serving law enforcement, corrections and military communities, both domestically and abroad. ALS was purchased in 2011 by National Presto Industries and became AMTEC Less Lethal Systems, Inc. As a full service provider of tactical and operational equipmentequipment and training, AMTEC Less-Lethal strives to provide only the best products and services to meet the needs of our customers in today's changing environment. From a core of manufactured products, to strategic partners, ALS provides comprehensive solutions for all of youryour tactical, operational and training needs.

1-850-223-4066www.LessLethal.com

4700 Providence Rd.Perry, fl 32347

Since 1996, ALS has been serving law enforcement, corrections and military communities, both domestically and abroad. ALS was purchased in 2011 by National Presto Industries and became AMTEC Less Lethal Systems, Inc. As a full service provider of tactical and operational equipmentequipment and training, AMTEC Less-Lethal strives to provide only the best products and services to meet the needs of our customers in today's changing environment. From a core of manufactured products, to strategic partners, ALS provides comprehensive solutions for all of youryour tactical, operational and training needs.

1-850-223-4066www.LessLethal.com

4700 Providence Rd.Perry, fl 32347

Since 1996, ALS has been serving law enforcement, corrections and military communities, both domestically and abroad. ALS was purchased in 2011 by National Presto Industries and became AMTEC Less Lethal Systems, Inc. As a full service provider of tactical and operational equipmentequipment and training, AMTEC Less-Lethal strives to provide only the best products and services to meet the needs of our customers in today's changing environment. From a core of manufactured products, to strategic partners, ALS provides comprehensive solutions for all of youryour tactical, operational and training needs.

1-850-223-4066www.LessLethal.com

4700 Providence Rd.Perry, fl 32347

Since 1996, ALS has been serving law enforcement, corrections and military communities, both domestically and abroad. ALS was purchased in 2011 by National Presto Industries and became AMTEC Less Lethal Systems, Inc. As a full service provider of tactical and operational equipmentequipment and training, AMTEC Less-Lethal strives to provide only the best products and services to meet the needs of our customers in today's changing environment. From a core of manufactured products, to strategic partners, ALS provides comprehensive solutions for all of youryour tactical, operational and training needs.

1-850-223-4066www.LessLethal.com

4700 Providence Rd.Perry, fl 32347

Since 1996, ALS has been serving law enforcement, corrections and military communities, both domestically and abroad. ALS was purchased in 2011 by National Presto Industries and became AMTEC Less Lethal Systems, Inc. As a full service provider of tactical and operational equipmentequipment and training, AMTEC Less-Lethal strives to provide only the best products and services to meet the needs of our customers in today's changing environment. From a core of manufactured products, to strategic partners, ALS provides comprehensive solutions for all of youryour tactical, operational and training needs.

1-850-223-4066www.LessLethal.com

4700 Providence Rd.Perry, fl 32347

40 The Counter Terrorist ~ October/November 2015

Counterterrorism Calendar that is posted to their website (www.nctc.gov). Along with profiles of terrorist groups and dates of terrorist incidents worldwide, the NCTC includes a practical list of “Common Explosives—Identification and Characteristics.” The explosives on this list are broken into three categories: Military/Commercial, Primary Explosive Booster, and Secondary Explosive/Main Charge.

Examples of military or industrial grade explosives are Trinitrotoluene (TNT), which is used in mining and industrial operations; Tovex, a more stable version of dynamite in a liquid gel formula; and cyclotrimethylene trinitramine (RDX). Even though these explosives cannot be purchased at a local gun store, they can be easily acquired by theft from an industrial worksite as domestic terrorist and mass murderer Timothy McVeigh did prior to the Oklahoma City Bombing in 1995. Some education or expertise is be needed to make this type of explosive device, but it can most certainly be done by those who are determined with know-how, and the Internet.

While NCTC lists two other categories, I will be focus on Homemade Explosives (HME) and Improvised Explosive Devices (IED). In 2008, the Department of Homeland Security’s (DHS) Science and Technology Directorate produced a document titled “Homemade Explosives (HME) Program Overview.” The following HME’s were listed under the section “Taxonomy of Current Threat”: • “Liquid hydrogen peroxide/fuel

formulations (HP/F)—(e.g. hydrogen peroxide with various fuels)” In this combination, hydrogen peroxide can become tri-peroxide, the other half of

tri-acetone tri-peroxide (TATP).• “Mixtures with solid oxidizers, (e.g.

perchlorates and ammonium nitrate.)” In this combination, ammonium nitrate plus fuel oil yields ANFO.

• “Mono-molecular mixtures, (e.g. urea nitrate, TATP, petric acids.)” In this combination, hydrogen peroxide can become tri-peroxide, the other half of tri-acetone tri-peroxide (TATP).

• “Nitrogen based explosives, (e.g. nitro glycerin, EGDN, and methyl nitrate.)” In this combination, urea nitrate explosive is dissolved urea fertilizer plus nitric acid. While the names given to these

HMEs reads like Chemistry 101, the combination information is my attempt to remove the glaze from your eyes. HMEs can be built out of common household and farming chemicals by literate, determined assailants. If assailants lacks those skills, they can always opt to steal industrial grade explosives rather than mix their own.

An IED can use either commercial explosives or HME. Some examples include, grenade, pipe bombs, pressure cookers, people, bicycles, mail, and vehicles or model aircraft. The options are limited only by the assailant’s creativity and expertise.

Detonation of the device can be simple, such as a device that is command detonated by the assailant. Detonation can also be more complex, such as a device that uses a timer, remote control or physical or infrared activation.

In spite the ease with which the components for HMEs can be obtained, other explosives are more commonly used. According to information from the Bomb Arson Tracking System, (BATS), the most common explosive used are black powder,

The Counter Terrorist ~ October/November 2015 41

Jobs:Search for jobs when it is time to start your career and develop relationships with professionals that can help.

Education:Opportunities to learn through film, webinars, and expert postings.

IT’S FREE!The professional resource in Homeland Security, now in its 4th year, is available at no cost to students for a limited time. See below to find out how you can benefit from all the resources available to take your education to a higher level!

Take your education to a

higher level:

FOR A LIMITED TIME, THE HOMELAND SECURITY NETWORK , the most valued and reliable resource for Homeland Security professionals is available for FREE to criminal justice and homeland security students.

To take advantage of this opportunity, visit: www.homelandsecuritynet.com and then call Henry Morgenstern on 305-401-6906.

Mentoring:The ability to network with more than 6000 professional Homeland Security First Responders that can help to mentor you through your study.

Blogs:Blogs and feeds concentrated in one site to keep a pulse on what hands-on professionals are talking about.

Giveaways & Gear:Participate in groups and discussions and be entered for prizes exceeding $10,000, weekly raffles, free giveaways, groupon-style offers from manufacturers and much more.

Get a FREE SubscriptionA $40 value.

NETWORKH Homeland Security

Circle 19 on Reader Service Card

42 The Counter Terrorist ~ October/November 2015

smokeless powder, and fireworks powders. The most common explosive device in the U.S. is the pipe bomb.

PART III TRENDS

In February 2015, the Southern Poverty Law Center (SPLC) published a major study entitled “The Rise of the Lone Wolf.” The study is a well-researched report with information and statistics taken from the University of Maryland’s Global Terrorism Database, among other credible sources. The study covers a time span of 6 years, from April 1, 2009, to February 1, 2015. (I do not use the term “lone wolf ” because it was a term devised by a narcissistic white supremacist. I use the term lone gunman: 1 shooter, unassisted; a gunman; alone-no wolf.)

SPLC researched incidents considered acts of terrorism as defined by law enforcement: incidents classified as domestic terrorism and violent incidents that “occurred when authorities confronted volatile political extremists.” According to the study, “the regularity of major violence or planned violence from domestic terrorists—one attack, on average, (occurred) every 34 days.”

The study examined 63 incidents “culled from academic databases and the SPLC’s own files, 46 of them—fully 74%—were carried out by lone wolves, unassisted by others.” Lone gunmen accounted for the majority of all attacks.

SPLC’s study also reported that “of the 61 incidents where the weapon used is known, 59% of attackers used firearms, while 25% used explosives, including such jury-rigged bombs as propane tanks. Five percent (5%) used both firearms and explosives. And 11% used other weapons,

gunman attacks described in the SPLC report also fit directly into the Target Hierarchy. The majority of attacks were on soft targets, with a smaller proportion on hardened soft targets and only one attack on a hard target, which was carried out by an insider.

Based on these statistics, the obvious trend is lone gunman plus firearm plus soft target. But is this combination really a trend, or does it just confirm what we already know? I don’t think it’s a new trend in domestic terrorism. The only thing new about these attacks are the names of the groups or causes carrying them out. They may be on the lower rungs of the Target Hierarchy and Tactic/Weaponry Hierarchy today, but they can only go up from there. It’s the logical progression. •ABOUT THE AUTHOR

Karen is a former Intelligence Officer for the United States Secret Service. In the USSS’s Foreign Assessment and Counterterrorism Branch (FAB), her area of concentration was the Middle East (ME), Counterterrorism Section (CTS) and the Critical Protective Analysis Group (CPAG). Karen is a veteran of the U.S. Army and served as a Signals Intelligence Analyst (SIGINT). Currently, Karen is a doctoral student at Florida State University in the Department of Sport Management. Her concentration is in Sport Security.

ACRONYMSACW: Advanced Conventional WeaponsANFO: Ammonium Nitrate Fuel OilAOP: Area of OperationsCPAG: Critical Protective Analysis Group

including arson fires and a private plane.”It comes as no surprise that the

majority of attackers (mostly lone gunmen) used firearms. For reasons explained in my Tactic/Weaponry Hierarchy, firearms are relatively affordable, easy to obtain, easy to use, require little to no time to plan an attack, and there are a large number of targets.

SPLC included the actual incidents they based their study on in the report, and I looked at them to see if they could yield any other useful information. I found that of the 61 incidents where the weapon used was known, 46 of them were actually carried out and 17 of them were disrupted by law enforcement. Compared to the 46 incidents that occurred, 17 may seem like a relatively small number. It is, however 17 more than 0. And it means we never had to hear about how many innocent men, women and children were murdered, or how many first responders lost their lives trying to save them.

I also found that of the 46 incidents that actually occurred, 35 of them (76%) were carried out by lone gunmen, which is very close to the original percentage (74%) from all 63 incidents. However, of those 35 lone gunman attacks, 27 of them, or 77%, used firearms, a significant increase, nearly 20% greater than SPLC’s original value of 59%.

As previously examined, the reasons why the majority of these domestic terrorists used firearms is clear: they are inexpensive, easy to obtain, easy to operate, for even the least skilled assailant, and portable—because they are easy to carry and conceal. They also require little preparation time and are accurate at close range.

The targets attacked in the 35 lone

The Counter Terrorist ~ October/November 2015 43Circle 179 on Reader Service Card

Call now for more information. Pricing dependent on quantity and delivery location. Call Solomon Bradman at: (305) 302-2790

or email [email protected]

• Pelican® Brand 1740 case attached to custom hitch that inserts in standard two inch tow receiver. Adaptable to replace push plate on Bear® and Bearcat®. Textured powder coated black

• Custom Laser Cut Foam insert for all kit items

• 4 Carabiners rated for over 6,000 lbs. each

• Two 30 foot custom made “black” tow straps rated at over 10,000 lbs. tensile strength each

• Two custom made hooks extra open non-gated for easy insertion – textured powder coated black for non-slip grip

• Custom-made 39” long, 1” diameter rolled steel window spear with rounded ends, and 6 foot chain - textured powder coated black for non-slip grip

• Custom made elongated Thor hammer 12 pound custom head with 3 foot composite handle

Tactical Tools to Achieve The Mission!

Universal Mounting Options Available!

Circle 179 on Reader Service Card

44 The Counter Terrorist ~ October/November 2015 Circle 241 on Reader Service Card

Circle 97 on Reader Service Card

CTS: Counterterrorism SectionDHS: Department of Homeland SecurityEGDN: Ethyl Glycol DinitrateFAB: Foreign Assessment and Counterterrorism SectionFBI: Federal Bureau of InvestigationHME: Home Made ExplosivesHP/F: Hydrogen Peroxide / FuelIED: Improvised Explosive DeviceMANPADS: Man-Portable Air Defense SystemsME: Middle EastNCTC: National Counterterrorism CenterRDX: Cyclotrimethylene TrinitramineSIGINT: Signals IntelligenceSPLC: Southern Poverty Law CenterSPORTSEC: Sport SecuritySTART: National Consortium for the Study of Terrorism and Responses to Terrorism (Going by GTD now: Global Terrorism Database)TATP: Tri-acetone Tri-peroxideTNT: TrinitrotolueneUSMS: United States Marshals Service

REFERENCESFederal Building and Facility Security:

Frequently Asked Questions, Congressional Research Service, June 17, 2014, Shawn Reese.

Federal Building and Facility Security, Congressional Research Service, March 24, 2010, Shawn Reese, Lorraine H. Tong.

Vulnerability Assessment of Federal Facilities report, U.S. Department of Justice, U.S. Marshals Service, June 1995

Global Terrorism Index 2014, Institute for Economics and Peace, www.visionofhumanity.org

Homemade Explosive (HME) Program Overview, Homeland Security Science and Technology, Department of Homeland Security, undated, www.dtic.mil/ndia/2008homest/char.pdf

Age of the Wolf, A Study of the Rise of Lone Wolf and Leaderless Resistance Terrorism, Southern Poverty Law Center (SPLC), February 12, 2015, splcenter.org.

The National Counterterrorism Center Counterterrorism 2015 Calendar, Common Explosives and Characteristics, page 139, nctc.gov.

Bomb Arson Tracking System, (BATS), U.S. Bomb Data Center, www.bats.gov/batsnet/

Miriam Webster’s Dictionary

The Counter Terrorist ~ October/November 2015 45Circle 180 on Reader Service Card

TheCounter Journal for Law Enforcement, Intelligence & Special Operations Professionals

10th Annual

presents:

HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION November 3-4, 2015 • Orlando, Florida

Best Location in Orlando – The Florida Hotel and

Conference Center

What a fantastic hotel. Rooms were nicely appointed, the staff was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall

attached to the hotel. –Top rated by TripAdvisor

LEARN MORE at: www.thecounterterroristmag.com/conferenceCall now for more information.

Phone: 866-573-3999Fax: 866-573-2090

[email protected]

We sold out in 2014. Get your registration in as soon as possible:• Best speakers in Homeland Security• Premiere opportunity to network with your peers in US Homeland Security and across the Globe• Attended by more than 100 Federal, State and Local agencies• Selected Vendor expo of the latest in HS Technologies

This year’s The Counter Terrorist Magazine Annual Homeland Security Professionals conference will celebrate its first decade. This will be a highly publicized event throughout the country and abroad.

REGISTER NOW

REGISTRATION COST $399.00*Government and group rates available. Call us for details.

Circle 177 on Reader Service Card

46 The Counter Terrorist ~ October/November 2015

W

BOOK REVIEW

Cycle of Fear: Syria’s Alawites in War and Peace

Reviewed by the Counter Terrorist Magazine’s Editorial staff

by Leon T. GoldsmithHurst and Company, London 2015

ith the Syrian Conflict dominating the news

recently due to the flood of refugees that are swarming Europe, it seems like a good idea to understand this costly civil war a little better through understanding the Alawites, the Muslim religious sect that through the family of Asad, has ruled Syria since the 12th of March, 1971.

In March, of 2011, some 40 years later, anti-government demonstrations broke out that would lead to an estimated 250,000 - 300,000 Syrians killed in the conflict, with fully half the Syrian population being displaced either within Syria or spread into Turkey, Lebanon and beyond. Now, that huge refugee swell is threatening Europe. The savagery of the fighting, including Bashar Al-Asad’s use of Chemical weapons against his own population, has never raised any protests at Berkeley, Columbia, The London School of Economics or other Liberal bastions of Academia. So fond of protesting when the Israelis, in defending themselves, hit a few Palestinians. So who are these Teflon Alawite’s that have the backing of Iran and Russia, and who are demonized by the Sunni Muslim insurgency in Syria and Iraq and of course ISIS? How relevant is the Alawite sect to the Asad regime?

Alawites are a product of the great divide between Sunni and Shia Islam.

In 1305, Ibn-Taymiyya declared the sect heretics and enemies of Islam, a status the caused them to be persecuted, and contributed as other factors to the feelings of solidarity in this very rural mountain tribe. The cycle of fear created by these prosecutions gave rise to their tendency to be supportive of the Asad regime way past the point where it served their tribal interest. During the regime, the tribe became the foremost element in governing Syria.

The group cross-cuts the identities of Muslims, Shi’ites, Arabs, and Syrians (by no means are the last two the same). 4 main tribes: Khaytin, Kalbiyya, Haddadin and Matawira and there are

many of unknown tribal affiliation. Indeed much of the support derived by Asad’s Baathist party has come from a more secular element in the sect. They are not Shi’a but a break-away sect from within the Twelver Shi’a Islam. Their main point of difference is their elevation of the fourth caliph Ali ibn Abi Talib and his descendants to near divine status. The beliefs of the Alawite incorporate Christianity and Paganism and they are liberal in the role of religion in their daily lives. Alcohol is permitted and women are not required to cover their heads and can freely associate in public. Because they view their religious commitment as a personal one, they are not required to attend the Mosque. Needless to say, these attitudes have not endeared them, not to the Shi’a where they are accused of being “extremists”.

According to Goldstein, the revolt that threatened to bring down the Government in 2011 threatened the social and political order which had been favorable to them, and threatened once again to make them, as they had been for their 1100 year history, persecuted violently again.

To support their rise to power under Asad, the sect turned a blind eye to the regime’s repression. It was a repression made necessary by the opposition. The Muslim Brotherhood, so active here in

The Counter Terrorist ~ October/November 2015 47

the USA, challenged the Government’s secular constitution and economic dissatisfaction among Sunni merchants.

The Brotherhood resorted to assassinations, a very well-known Brotherhood tactic (think Sadat). This resulted in brutal repression by Asad’s Brother Rifaat, that meant 6000 imprisoned and 30 executed. As fighting between Asad and his brother eventually led to the alliance with Iran. In 2000, his son Bashar was taken from his studies as an optometrist and catapulted into a dynastic succession which his father had assured by stocking the military with loyalists and ruthlessly eliminating any potential source of conflict to the Dynasty.

The resulting decline of the rulers culminating in the revolution which began with the protests of 2011, shows how complex the ruling situation in these countries really is. The interplay between Iran and Russia with the regime

does have something to do with the Alawite’s. These rough mountain men, considered “hillbillies” by the Sunni Majority in Syria have played a key role in the stability and since that time, equally, the destruction of Syria.

But the book further underscores how our US “religious” zeal in supporting what appears, but rarely is, an outpouring of “democratic” aspirations leads us into quagmires. There was no need to topple Hosni Mubarak, and it certainly served to encourage the Muslim Brotherhood opposition to Asad. Given the nature of the regime; the usual suspects, corruption, brutal repression, dynastic succession and complete control of the power of the State, these may indeed be a more palatable option in the Middle East than the forces that come to replace them like ISIS or in the case of Egypt, Morsi and the Brotherhood.

It is highly recommended that the current managers of our Foreign Policy read books like this so that they can understand that in the Middle East there is nothing we recognize as democratic impetus outside of Israel. Rather there are forces that have been created over more than a thousand years that create solidarities that have nothing to do with Democratic parties. And a better reading of these forces, like the Alawites, may make the moves we make less damaging and more productive for our own interests. •

Circle 277 on Reader Service Card

48 The Counter Terrorist ~ October/November 2015

THE CHAPLAIN AS FIRST RESPONDER

The Counter Terrorist ~ October/November 2015 49

I n some departments, the role is primarily ceremonial. The chaplain

is seen giving invocations and benedictions at all manner of functions, from banquets to departmental funerals. Chaplains often perform life cycle events for sworn and non-sworn employees of their departments who are “unchurched.” Last year, a Palm

Beach County Sheriff’s Office (PBSO) chaplain married two PBSO deputies to each other. Chaplains do baptisms and funerals. In many departments in the Midwest, chaplains do an annual blessing of the crops and of the animals. In a small west coast of Florida City, the chaplain blesses the fishing fleet.

In more and more departments,

chaplains don vests and do ride alongs. The rationale comes from the old proverb that you can’t know a man until you’ve walked a mile in his shoes. It is only through experience that a chaplain can feel the roller-coaster ride of a shift and what that ride, day in and day out, can do to an officer and by extension his or her family. Other than the

by William A. Gralnick, BA, MA, DHL

Law Enforcement Chaplains are called on to play many roles. Their ministry, according to the International Conference of Police Chaplains, is a “ministry of presence.” And they are present in many different ways.

50 The Counter Terrorist ~ October/November 2015

military, law enforcement is the only job where the morning kiss goodbye could potentially not be followed by an end of shift kiss hello. The car also provides the best “office” for spiritual counseling during a slow shift or after an intense encounter on the street. As we train

social media are electronic means of continuing that presence so essential to the chaplain’s ministry.

More departments, like this one, are assigning chaplains to the more high-stress “specialty units.” This is not for every chaplain, and frankly it takes a

our chaplains, “If you’re talking… the deputy can’t.”

Technology provides chaplains with ever-increasing ways to “reach out and touch someone,” aside from dropping in to the district and “schmoozing.” Phone calls, emails, texts, and

New York, NY, September 30, 2001— A Chaplain is on hand at Ground Zero. Photo by Andrea Booher/ FEMA News

The Counter Terrorist ~ October/November 2015 51

lot longer for these “brotherhoods” to be accepting of a chaplain. PBSO staffs K-9, Homicide, TAC Gang Task Force, Marine, and Aviation. So as law enforcement has evolved, so has the role of the chaplain, a role first recognized in this country by the military in 1787!

Chaplain (Maj.) Jack Stanley, 422nd Air Base Group chaplain, runs along the perimeter road at RAF Croughton, England, May 11, 2015, during a ruck march in honor of

National Police Week. The event was held to honor law enforcement officers who have given their lives in the line of duty. Photo by: Staff Sgt. Jarad A. Denton

Photo by: Elvert Xavier Barnes Photography

52 The Counter Terrorist ~ October/November 2015

There is one glaring omission in most chaplaincies’ use: the natural or man-caused disaster. Disasters include acts of terrorism, domestic and foreign. As some departments like NYPD and the FBI have learned, who better to serve those traumatized but uninjured and who better to serve those injured waiting for triage than the chaplain?

This lesson was learned during the aftermath of 9/11. As recounted by Fr. Paul Wierichs, there was a chaplain’s command post; it also dealt with the grief of the chaplains when they lost one of their own.

Then came the plane crash of American Airlines Flight 587 in Queens at Long Island Sound. The second-worst domestic airlines crash in the U.S., it killed 280 people on the plane and five more on the ground. Fear and anxiety ran rampant. Was it another act of terrorism? Or was it just another terrible tragedy? Either way, said Fr. Wierichs, the days ran into nights and night ran into days as chaplains played the hand that fate dealt them, many still in deep shock and great fatigue from 9/11.

American Airlines Flight 587 crash site. Photo by: NOAA

Recovery of the American Airlines Flight 587 vertical stabilizer. Photo by: NTSB

The Counter Terrorist ~ October/November 2015 53

This was definitely not a time for On the Job Training. It is one thing to detail chaplains to a disaster scene; it is totally another to have them prepared for what they are going to face. This is the issue recently faced by the Palm Beach County Sheriff’s Office when it was chosen to be the “faith-based” representative during disasters for the Red Cross/FEMA disaster teams. While PBSO has by far the largest chaplaincy in South Florida, currently 35 with an allocation of 45, it was quickly predetermined that its chaplaincy unit would act in part as a

Photo by: West Midlands Police

Activeshooter Scenario

Adapt to unpredictable and quickly evolving situations with our dynamic, expandable, full-mission profile training solution designed to take force-on-force, training to new levels of realism.

Simulated gunfire, IEDs, smoke, noise and our industry-leading Tactical Operations Medical Manikin™ create a memorable training experience with realistic GSW injuries and hemorrhaging that allow for seamless integration into ALERRT & ASTTP programs.

Simultaneously control up to four units in your scenario with the hand-held remote, each unit customized with up to 250,000 possible wound combinations, making TOMManikin™ the most effective scenario training manikin available today.

FOR MORE INFORMATION, CONTACT:

1.866.839.3455

*RENTAL AND LEASE OPTIONS AVAILABLE!

GAIN THE TACTICAL ADVANTAGE IN ACTIVE THREAT MANAGEMENT

host, bringing together chaplains from around the area for training. The rationale was simple. All one has had to do is look at a hurricane brewing off shore and measure it against the areas it is likely to hit and one sees the enormous swath of territory likely to be affected. Nor does it have to hit to raise anxiety levels that cause accidents from distracted driving, fights on lines cued up for all manner of necessities that should have been bought and stocked months before, and a host of other actions that likely would result in call outs.

Circle 99 on Reader Service Card

54 The Counter Terrorist ~ October/November 2015Circle 343 on Reader Service Card

There is also history in the face of that reality that shows the pulling together of the counties to help one another. Thus chaplains from one community, even if well trained, shouldn’t be the only chaplains used. They might know the issues, but they would not know the communities and their personalities, often invaluable insight in helping to calm an individual or area.

So comes the training. Chaplains from around the region, with the cooperation of the International Conference of Police Chaplains, came together at the PBSO training center to spend three hours with Red Cross trainers. The academics of disaster relief were covered: there were videos for discussion and even CPR training in the latest technique, one which eliminates mouth-to-mouth breaths.

Clearly this isn’t enough. The Unit has reached out to the Emergency Operations Center and the HLS Security Bureau of the SO. The intent is to invite chaplains to a variety of different exercises: tabletops at the Ops Center, active shooter trainings, and even SWAT trainings. Over the top, you say? The idea is not to have chaplains just learn how such things are handled; the primary goal is to expose them to chaos—screaming and

Army Col. Jacob Goldstein, a Jewish chaplain visiting the Joint Task Force Guantanamo. Photo by: Navy Petty Officer 2nd Class Jayme Pastoric

The intent is to invite chaplains to a variety of different exercises: tabletops at the Ops

Center, active shooter trainings, and even

SWAT trainings.

The Counter Terrorist ~ October/November 2015 55Circle 317 on Reader Service CardCircle 308 on Reader Service Card

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906

or email [email protected]

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB.

The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever.

The Portable Vehicle Barrier comes with several customized configurations:

• You can put wheels on it so that it acts as a swing barrier and easily opens a road

• You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything

• Additional safety features can be added

PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable.Best of all NO maintenance is required.

Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Or visit our website: www.SSIPVB.comCircle 226 on Reader Service Card

New and improved

56 The Counter Terrorist ~ October/November 2015

Contact us today at: www.homelandsecurityssi.com

★★★★★

TheCounter Homeland Security Professionals Conference and Exposition

LET US SHOWCASE YOUR PRODUCTS, SERVICES AND TRAINING TO OUR FIRST RESPONDERS...

The Counter Terrorist is a peer journal, that is read in the USA and in ASIA by:• Police• Fire• Emergency Management• Emergency Medicine• The Military• Special Forces

Call Sol Bradman now at 305-302-2790 or write him at [email protected]

Whether it’s the magazine, our online sites and e-blasts or our annual conference...he’ll help you reach your audience!

We are now committed to bring valuable tools to the attention of our First Responders through:• Detailed Product Reviews• Innovative Product launches• International Resources

The Counter Terrorist ~ December 2014/January 2015 1

An SSI® Publication

Counter PUTIN’S RING OF STEEL • RESCUE IN IRAQ • ISIS WARLORD BAGHDADI • MS-13 RECRUITMENT

www.thecounterterroristmag.com

TheJournal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 7 • NUMBER 6

INTERNATIONAL

EDITION

DEC 2014/JAN 2015

EBOLA AND BIOLOGICAL WARFARE

DECEMBER 2014/JANUARY 2015USA/CANADA $5.99

TROJAN HORSE SCHOOL PLOT • 18TH ST. K&R • PRC’S DEEP PANDA • BARRIO AZTECA

thecounterterroristmag.comAn SSI® Publication

VOLUME 8 • NUMBER 4

INTERNATIONAL

EDITION

JUNE/JULY 2015

Journal for Law Enforcement, Intelligence & Special Operations Professionals

JUNE/JULY 2015

USA/CANADA $5.99

UNDERSTANDING

THE GLOBAL JIHAD

AW

ARD WINNING

AN

N

IVERSARY ISS

UE

TheCounter

S

EV

ENTH YEAR

7TH

yelling, hysteria, loud and sudden noises, all in stewpot of seeming disorganization. Chaplains who participated in an active shooter scenario at the Wellington Green Mall were not observers. They were assigned rolls to play.

Many agreed with one chaplain who said, “It was amazing, overwhelming—I never realized what large-scale chaos was like and how loud it could be!” The first time entering such a maelstrom shouldn’t be “the first time.” Training, just like for cops, is the answer. Do it enough times so that when one is thrown into this storm of sound and emotion, one’s training kicks in, not one’s “flight” mechanism.

As Ronald Reagan used to intone for GE, “Progress is our most important product.” To have a well-used chaplaincy, progress needs to be made in training and expanding its purview. The ceremonial chaplain is no longer the chaplain needed for the 21st century. •

ABOUT THE AUTHORWilliam A. Gralnick has spent four

decades in many volunteer capacities with law enforcement, including Johnstown, PA after the assassination of Dr. Martin Luther King, Jr; in Atlanta, GA during the infamous child murders; in Miami, FL in the aftermath of the Overtown Riots; and as an adjunct training officer in diversity and ethnicity for seven different South Florida jurisdictions, including the PBC Sheriff’s Office. Currently in a second career as a paid employee at PBSO, Gralnick was tasked with reshaping and modernizing its then-small chaplaincy, which he has tripled in size and embedded throughout the agency.

Circle 33 on Reader Service Card

Circle 89 on Reader Service Card

407407--248248--0883 •0883 • Fax: 407Fax: 407--363363--13831383 [email protected]@advancedtraumaspecialties.com advancedtraumaspecialties.comadvancedtraumaspecialties.com

“ To Protect and Serve ”“ To Protect and Serve ” May mean many things, but we all

understand the “Ultimate Sacrifice”. Train to SuperiorityTrain to Superiority

Educate to ExcellenceEducate to Excellence Equip to Survive Equip to Survive (or do we?)

Professional MultiProfessional Multi--Disciplined Disciplined Medical/Tactical:Medical/Tactical:

ProductsProducts Kits/Go BagsKits/Go Bags

Training & ConsultingTraining & Consulting

#Self#Self--Aid/BuddyAid/Buddy--AidAid The life you save may be your own!

“With a targeted attacks on the rise for providers” “With a targeted attacks on the rise for providers” Don’t join the STATITICSDon’t join the STATITICS!

Saves Time, Saves Time, Saves Blood, Saves Blood, Saves LivesSaves Lives

The Counter Terrorist ~ October/November 2015 57

Circle 228 on Reader Service Card

MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY

Contact us today at: www.homelandsecurityssi.comCall now for more information.

Phone: 866-573-3999Fax: 866-573-2090

[email protected]

MACTACTM

MACTAC is the new tactical philosophy offering your department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks.

Tiered for full-spectrum training of your department personnel to meet multiple challenges.

•MACTAC Officers Course•MACTAC Leaders Course•MACTAC Instructors Course

The Newest, Most Dynamic Training Program from SSI ®.

Next training in Perry, FL November 17–20, 2015

58 The Counter Terrorist ~ October/November 2015

The Counter Terrorist ~ October/November 2015 59

INTERNATIONAL TRADE TRANSPARENCY:

by John Cassara

e said, “Mr. John, don’t you know that the criminals and

the terrorists are moving money and transferring value right under your noses? But the West doesn’t see it. Your enemies are laughing at you.”

The Pakistani businessman was referring to various forms of what we loosely call “trade-based money

laundering” (TBML) and the transfer of “value” via commodities and trade goods. In addition to customs fraud, trade-based value transfer is often used to provide “counter-valuation,” or a way of balancing the books in many global underground financial systems such as hawala/hundi. Criminal organizations and those that finance terror sometimes

Shortly after the September 11 terrorist attacks, I had a conversation with a Pakistani businessman involved with the underworld of crime. He was involved in the gray markets of South Asia and the Middle East.

H

“THE NEXT FRONTIER”

use trade-based value transfer.The magnitude of TBML is difficult

to quantify and has never been systematically examined. However, the Financial Action Task Force (FATF), an inter-governmental body that sets global anti-money laundering standards, believes TBML is one of the three principal categories of money laundering.

60 The Counter Terrorist ~ October/November 2015

According to the U.S. State Department, TBML has reached “staggering” proportions in recent years. It is found in every country but remains virtually unrecognizable.

The rapid expansion of worldwide trade increases the possibilities for TBML. Today, total annual global merchandise trade is in the tens of trillions of dollars. Money laundering in international trade works just as in traditional money laundering via financial institutions, in which criminals “mix” or “co-mingle” illicit money with licit money. However, the large volume of international trade masks the occasional suspect transfer.

The FATF defines TBML as “the process of disguising the proceeds of crime and moving value through the use of trade transactions in an attempt to legitimize their illicit origins.”

The key word in the definition is value, particularly because it is getting increasingly difficult to define currency.

Most forms of TBML revolve around invoice fraud and manipulation. Generally speaking, “invoice fraud” means that the contents, description,

and/or the value of goods is misrepresented. Sometimes this is done to facilitate simple customs fraud—i.e., minimizing the payment of taxes and duties. In most jurisdictions, customs fraud is a predicate offense for money laundering. However, often invoice fraud is part of value transfer. As Raymond Baker, the Director of Global Financial Integrity (GFI), said, “Anything that can be priced can be mispriced and false pricing is done every day…”

INVOICE MANIPULATION AND VALUE TRANSFER MADE SIMPLE:

To move money out:• Import goods at overvalued prices or

export goods at undervalued pricesTo move money in:• Import goods at undervalued prices or

export goods at overvalued pricesThe illustration below1 shows the

fluctuating value associated with thousands of refrigerators exported from the United States (light color) to Country X (dark color). Official trade data from both sides was matched and compared.

10 MILLION

9 MILLION

8 MILLION

7 MILLION

6 MILLION

5 MILLION

4 MILLION

3 MILLION

2 MILLION

1 MILLION

JAN

FEB

MA

R

APR

MAY

JUN

E

JULY

AU

G

SEP

OC

T

NO

V

DEC JAN

FEB

MA

R

APR

MAY

JUN

E

JULY

AU

G

SEP

OC

T

NO

V

DEC

The Counter Terrorist ~ October/November 2015 61Photo by: Andrzej Barabasz

62 The Counter Terrorist ~ October/November 2015

With some recognized variables, the declared export price should equal the declared import price. The difference between the two ranges of peaks and the valleys—the two colors shown on the graph—represents the transfer of value in the form of refrigerators. In this case, value transfer also masked the proceeds of narcotics trafficking.

Dr. John Zdanowicz, an academic and early pioneer in the field of TBML, examined 2013 U.S. trade data obtained from the U.S. Census Bureau. By examining undervalued exports ($124,116,420,714) and overvalued imports ($94,796,135,280) similar to what is described above, Dr. Zdanowicz found that $218,912,555,994 was moved out of the United States in the form of value transfer! That figure represents 5.69% of U.S. trade. Examining overvalued exports ($68,332,594,940) and undervalued imports ($272,753,571,621), Dr. Zdanowicz calculates that

$341,086,166,561 was moved into the United States! That figure represents 8.87% of U.S. trade in 2013.2

The numbers are jaw dropping. They are particularly telling because in my opinion the U.S. has the best and most robust customs enforcement in the world. If this much money/value is being purloined every year due primarily to trade fraud, what is going on in the rest of the world?

GFI has done considerable work in examining trade misinvoicing, which is a method for moving money illicitly across borders that involves deliberately misreporting the value of a commercial transaction on an invoice and other documents submitted to customs. A form of trade-based money laundering, trade misinvoicing is the largest component of illicit financial outflows measured by GFI. After examining trade data covering developing countries, GFI concluded that a record $991.2 billion was siphoned from those countries in 2012 via trade misinvoicing!3 Of course, much of this hemorrhage of capital originates from crime, corruption, fraud, and tax evasion.

An additional concern is that for the most part value transfer schemes avoid countries’ financial intelligence reporting requirements; compliance with these requirements is one of the key FATF recommendations and the cornerstone of almost every country’s anti-money laundering and counter terrorist finance countermeasures. And thus far, for the most part banks have been reluctant to incorporate anti-money laundering/counter terrorist finance (AML/CFT) safeguards into their trade finance programs.

Because of the sheer volume of international trade, physical scrutiny of trade items is impossible—a fact taken advantage of by criminals and tax cheats

TDM PUBLICATIONS

DOUB

LE IS

SUE

complimentary subscription www.tacticaldefensemedia.comScan the code to sign up now!

Circle 141 on Reader Service Card

…Dr. Zdanowicz found that

$218,912,555,994 was moved out

of the United States in the form of value transfer!

The Counter Terrorist ~ October/November 2015 63Circle 279 on Reader Service Card

64 The Counter Terrorist ~ October/November 2015

around the world. In the United States, approximately 20 million containers enter the country every year. Maritime commerce alone is expected to triple by 2020.4 Approximately five percent of inbound containers are physically inspected and about two percent outbound. Vehicular and airborne cargo is also worrisome. The situation is far worse in most other countries. And in some jurisdictions, the lack of customs inspection and control is facilitated by corruption. So not only is TBML a concern, but so are the associated threats of smuggling, corruption, and proliferation.

Globalization has led to increased scrutiny of underground financial systems such as hawala, hundi, fei-chein, padala, black market peso exchanges, and others. These are sometimes known as alternative remittance systems, parallel banking, or informal value transfer systems (IVTS). Most are regional, cultural, and ethnic based. Despite

differences in terminology, most such systems are adept at clandestinely transferring money from one location to another without physically moving it. Multi-hundreds of billions of dollars are transferred via IVTS every year. Most of these transfers are benign and used primarily for immigrants’ remittances. Unfortunately, their veiled nature also makes them attractive to criminals and sometimes terrorists. The common denominator is that, historically and culturally, IVTS use trade as the primary means of providing “counter-valuation,” or a means of balancing the books between brokers.

Other subsets of suspect trade-based value transfer include international barter trade, trade diversion, abusive transfer pricing to low tax jurisdictions, VAT, drawback, carousel fraud, commodity-based capital flight, etc.

So what can be done? Trade transparency is the single best

measure to detect trade-based money

Cyber Security for

www.CyberSecurityGovernment.com

PROACTIVE STRATEGIES FORMANAGING CYBER VULNERABILITIES

DECEMBER 9 – 11, 2015 | WASHINGTON, D.C.

WHAT WILL BE COVERED?Meeting Persistent, Evolving Challenges with Effective Cyber Security StrategiesBuilding a Culture of Security to Com-bat Human FactorsInspiring and Training the Next Cyber Security LeadersMoving Towards Greater Unity of Effort for Government Cyber Security Pre-parednessProactive Cyber Security Initiatives for Critical InfrastructureThought Leading Panel: “Tech Talk” to “Policy Speak” Translation to Cultivate a National Posture on Cyber Security

3

3

3

3

3

3

NO COST TO ALL ACTIVE GOVERNMENT AND MILITARY

PERSONNEL

December 7-9, 2015 | Washington, D.C.RELIABILITY, ECONOMY, AND ENDURANCE

www.UnmannedMaritimeSystems.com

WHY ATTEND UNMANNED MARITIME SYSTEMS?

Hear from key thought leaders in Unmanned Maritime Systems, including the latest requirements for Surface and Undersea systems

Gain invaluable access to military stakeholders as they develop and refine requirements surrounding unmanned maritime vehicle programs including updates and shortfalls in existing systems

Receive a holistic perspective on next-generation technology by attending workshop day

Understand UMS technology gaps, training challenges, lessons learned, and future needs

3

3

3

3

Circle 115 on Reader Service CardCircle 249 on Reader Service Card

Circle 113 on Reader Service Card

A 1951 hundi of Bombay Province for Rs 2500 with a pre-printed revenue stamp. Photo by: British Government

The Counter Terrorist ~ October/November 2015 65

The optic of choice for military and law enforcement professionals.

Call 877 535-8774, email [email protected] or build an RFQ at agency.tssi-ops.com.

Available at

Circle 249 on Reader Service Card

66 The Counter Terrorist ~ October/November 2015 Circle 301 on Reader Service CardCircle 143 on Reader Service Card

laundering and associated financial crimes. It is something that every government and legitimate industry and trader should welcome. Fortunately, with modern advances in data and analytics, trade transparency is now technically feasible.

All countries track what comes in and what goes out for security, statistical, and revenue purposes. So by examining and comparing one country’s targeted exports with the corresponding trading partner’s record of imports, it is a fairly straightforward process to spot anomalies. Some trade irregularities can be easily dismissed as numerical outliers, but sometimes anomalies can be indicative of customs fraud, tax evasion, value transfer, TBML, or perhaps even underground financial systems such as hawala.

In 2004, the United States adopted a proposal I advanced and created the world’s first trade transparency unit (TTU). It is located within Homeland Security Investigations. Since that time, about a dozen other countries have established similar units. The creation of TTUs has simultaneously overlapped with exponential advances in big data and advanced analytics. Overlaying financial intelligence, law enforcement and customs data, travel data, commercial records, etc. further increases transparency and facilitates more precise targeting.5 And via customs-to-customs agreements, TTUs are able to exchange specific information about suspect transactions.

In addition to being an innovative countermeasure to TBML and value transfer, systematically cracking down on trade-fraud is a revenue enhancer for participating governments. Frankly, it is for this reason that many countries have expressed interest in the concept.

I believe trade transparency is the “next frontier” in international

money laundering and counter terrorist finance enforcement. •ABOUT THE AUTHOR

John Cassara is a former U.S. intelligence officer and Treasury Special Agent. He has developed expertise in various AML/CFT issues including trade-based money laundering and underground finance. He is a consultant for government and industry. Mr. Cassara has authored several articles and books. His latest is Trade-Based Money Laundering: The Next Frontier in International Money Laundering Enforcement (Wiley, November, 2015). www.JohnCassara.com

ENDNOTES1John Cassara and Avi Jorisch, On

the Trail of Terror Finance, Red Cell Intelligence Group, 2010, p. 63.

2Analysis given to the author by Dr. John Zdanowicz via June 30, 2015, email.

3Clark Gascoigne, “New Study: Crime, Corruption, Tax Evasion Drained a Record US $991.2bn in Illicit Financial Flows from Developing Economies in 2012,” Global Financial Integrity, December 15, 2014. Retrieved from http://www.gfintegrity.org/press-release/new-study-crime-corruption-tax-evasion-drained-a-record-us991-2-billion-in-illicit-financial-flows-from-developing-economies-in-2012/.

4Container Security Initiative, Customs and Border Protection, 2006 – 2011 Strategic Plan. Retrieved from http://epic.org/privacy/surveillance/spotlight/1006/csiplan.pdf.

5For additional information, the HIS/ICE Trade Transparency Unit (TTU) program is described online at http://www.ice.gov/trade-transparency/.

The Counter Terrorist ~ October/November 2015 67Circle 301 on Reader Service CardCircle 301 on Reader Service Card

68 The Counter Terrorist ~ October/November 2015

Innovative ProductsPLATESMART HD ENGINE

Soon to be introduced in all PlateSmart ALPR solutions, our new High Definition (HD) engine enables greater flexibility in your video surveillance system. With PlateSmart’s HD engine, multiple license plates can be captured and read even from a wide-angle view, which means that you can have more complete area coverage and still perform ALPR operations with a single camera. This results in a reduction in footprint and cost currently unavailable in any other ALPR solution. High Definition ALPR will soon be available in ARES, PlateSmart’s enterprise fixed-location ALPR-based video analytics suite. ARES’ real-time analytic data provides unparalleled situational awareness and is the best tool available for Enhanced Force Protection. Give your key assets the extra level of protection they need with PlateSmart ALPR-based video analytics solutions.

www.platesmart.com

LEWIS MACHINE & TOOL For 35 years, LMT has been designing and manufacturing

quality weapons without compromises. LMT is proud to expand that product line to include Precision Aiming Lasers. The latest offset Infra-red aimer is offset aimer with an ultra-compact lightweight design. The aimer features and tightly focused precision beam profile with precise windage and elevation dials.

WHITE HORSE RESEARCH AND DEVELOPMENT

White Horse Research and Development produces Advanced Composites Solutions, Ballistic Defense Applications, Blast Mitigation and Fragmentation Protection.

Cost effective, state of the art six years running. Diversified go-to-market applications for Military, security, Law Enforcement and commercial use.

Off the shelf products: Boss Box (weapons release systems); Close Quarter Trainer Targets (CQT) ricochet safe up to 5 feet; Bomb Containment Unit (BCU) pipe bomb fragmentation containment and blast redirecion.

Just-In-Time made to order products: 50 caliber armor piercing, multi hit Fighting Positions (guard posts, safe rooms, in theater protection, exterior walls in high action locations); Blast Mitigation (exterior walls of high targeted buildings); Threat Vehicle Targets (TVTs) – custom made for the Military – full size enemy targets set on training bases for accrete instrumentation reading and firing.

Commercial Use: Tank or Vessel leak prevention and protection (Self-Sealing coating can protect against nuisance acts; Contaminated Waste Containment (nuclear barrels, meth waste containment).

whitehorserd.com

The laser features a battery life of over 12 hours and can use 123 or AA batteries with no modifications and has a salt water depth down to 30 meters. This makes the LMT Precision Aiming Laser the lightest IR aimer with the longest battery life and deepest underwater capacity.

lmtdefense.com

The Counter Terrorist ~ October/November 2015 69

VIDEO ANALYTICS THE WORLD’S MOST SOPHISTICATED SENSING DEVICE

Video Analytics solve a long-standing surveillance challenge. Traditional cameras (the old way of doing things) rely on human beings to be flawlessly vigilant and this is simply an unrealistic expectation, particularly when you consider the number of cameras being monitored.

Today it is typical that the current cameras serve the community through an entirely forensic approach, should an incident actually occur.

At Kent, we eliminate this problem. Our Video Analytics solutions use smart surveillance technology that allows cameras to analyze events as they happen and determine whether or not they constitute threats or merit further attention. If so, the system instantly logs the event and notifies the proper authorities to spring into action. Our Remote Guards can call upon the management team or local police force to react to the incident, as well as “Voice Down” the perpetrators in real-time

The 4-channel encoder incorporates advanced, auto-adapting video analytics, a video server and video recording, all in a single device. It converts analog CCTV surveillance camera systems from forensic tools into proactive video surveillance and alarm verification solutions.• Easily add the encoder to existing analog cameras and DVRs

and integrate with alarm panels• Remotely configure and manage all encoder devices from a

convenient Web Portal• View video event clips, live streaming and recorded video

from a convenient Web Portal• Send video alerts to smartphones, email addresses, or a remote

monitoring service• Expand cloud-based system without requiring investment in

servers or softwarewww.kentsecurity.com

YAKTRAX™Winter weather is unpredictable enough without

having to worry about walking from point A to point B and making it in one piece. YakTrax™ Ice Traction Device for your shoes is the answer. It stretches over any footwear, from boots to jogging shoes, and stays in place. A grid of 360° steel coils gives you traction on ice and snow with hundreds of edges gripping any slick, icy surface, providing stability. Best of all they are so comfortable, you won’t even realize you are wearing them. Walk normally as you would on dry ground. Even World Cup Bobsledders wear YakTrax® to walk up the bobsled run. Stay safe and upright with YakTrax®. AVAILABLE AT: www.andax.com

70 The Counter Terrorist ~ October/November 2015

Barrett Firearms Manufacturing • www.barrett.net .................................................................................................................................

Fairleigh Dickinson University • www.fdu.edu/mas ................................................................................................................................

Lewis Machine & Tool • www.lmtdefense.com ...........................................................................................................................................

Surveilance One • www.survone.com .........................................................................................................................................................

Group Espada LLC • www.groupespada.com ..............................................................................................................................................

DeSantis Holster & Leathergoods • www.desantisholster.com ..................................................................................................................

Resco Instruments • www.rescoinstruments.com .........................................................................................................................................

American Public University • www.amuonline.com/counter-terrorist ..........................................................................................................

Occupational Health Dynamics • www.ohdusa.com ................................................................................................................................

3rd Annual US/Canada Border Conference • www.beyond-border.com ................................................................................................

Reconyx • www.reconyx.com ......................................................................................................................................................................

Police One • www.policeoneacademy.com ...................................................................................................................................................

Asia Pacific Edition – The Counter Terrorist • [email protected] .....................................................................................

Field Forensics, Inc. • swww.fieldforensics.com ...........................................................................................................................................

TSSI • www.TSSI-OPS.com ............................................................................................................................................................................

Prometheus Books • www.prometheusbooks.com .......................................................................................................................................

Combined Systems, Inc. • www.combinedsystems.com ..............................................................................................................................

Group Espada LLC • www.groupespada.com ..............................................................................................................................................

AMTEC Less-Lethal Systems • www.lesslethal.com ....................................................................................................................................

Homeland Security Network • www.homelandsecuritynet.com .................................................................................................................

SSI Pull Kit • [email protected] .........................................................................................................................................

Counter Assault • www.counterassault.com ................................................................................................................................................

Hilomast LLC • www.hilomast.com ..............................................................................................................................................................

10th Annual Homeland Security Professionals Conference & Expo • www.terrorconference.com .....................................................

Elite K9 • www.elitek9.com ..........................................................................................................................................................................

Advanced Trauma Specialties • www.advancedtraumaspecialties.com ......................................................................................................

Innovative Tactical Training Solutions • www.4ITTS.com .......................................................................................................................

Southern Police Equipment • www.southernpoliceequipment.com ..............................................................................................................

SSI PVBs • www.ssipvb.com .........................................................................................................................................................................

The Counter Terrorist Magazine • [email protected] .....................................................................................................

MACTAC • www.homelandsecurityssi.com......................................................................................................................................................

Tactical Defense Media • www.tacticaldefensemedia.com ..........................................................................................................................

K9 Cop magazine • www.k9copmagazine.com ..........................................................................................................................................

IDGA Cyber Security for Government • www.cybersecuritygovernment.com ............................................................................................

IDGA Unmanned Maritime Systems • www.unmannedmaritimesystems.com ............................................................................................

TSSI • agency.tssi-ops.com ............................................................................................................................................................................

TRU-SPEC • www.truspec.com ......................................................................................................................................................................

Patriot3 • www.patriot3.com .......................................................................................................................................................................

Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com .................................................................................

Phantom Products Inc. • www.phantomlights.com .....................................................................................................................................

Broco • www.broco-rankin.com ....................................................................................................................................................................

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Counter TheOCTOBER/NOVEMBER 2015

VOLUME 8 • NUMBER 5

Page Ad/Company • website and/or email ......................................................................................................... RSN Number

2

3

4

7

11

13

16

17

22

23

24

25

27

28

29

28

35

12

39

41

43

44

44

45

47

56

53

54

55

56

57

62

63

64

64

65

66

67

71

75

76

To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

ADVE

RTIS

ER IN

DEX

121

10

259

319

16

262

20

25

213

103

303

335

255

95

123

87

93

18

91

19

179

241

97

177

277

89

99

343

226

33

228

141

279

113

115

249

143

301

215

209

198

The Counter Terrorist ~ October/November 2015 71Circle 50 on Reader Service Card

Circle 215 on Reader Service Card

LEARN MORE at: www.homelandsecurityssi.comCall now for more information.

Phone: 866-573-3999Fax: 866-573-2090

[email protected]

The experts on training in:

IsraelThe Advanced Global Security Workshop in

the Homeland Security professionals best resource

Since 2005, SSI has taken nearly 500 First Responders

to Israel and shown them the basics of the Israel

security concept.Thanks in part to that

program, we are better able to defend ourselves in the United States. In response

to demand, we are now offering a once-in-a-lifetime

experience covering the following advanced subjects:

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel’s northern border.

Hostage Rescue - Discover how they go wrong.

Hospital Response - Find out how Israel’s critical response hospitals handle surge and multi-casualty incidents.

Israel Counter Terrorism units - Learn how they operate.

Israel National Police - National Academy; See how they train?

Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system.

Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

May 13–21

2016Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

Circle 215 on Reader Service Card

®

72 The Counter Terrorist ~ October/November 2015

TRAINING REVIEW

USCG Port Security Skills Course

Tby Garret Machine

he U.S. Coast Guard Port Security Training Detachment or

PSU TRADET was is the USCG premier training site for operational readiness, maritime security training, and CT/Force Protection tactics techniques and procedures (TTP). Originally located in Port Clinton, Ohio and tasked with training the 8 PSUs, it now sits within the Special Missions Training Center or SMTC in Camp Lejeune, NC (since 1998). The SMTC name came into being in 2002 and the training center was commissioned in 2003. This was shortly after the USCG was transferred from the Department of Transportation to DHS and the scope of operations expanded to USCG Maritime Safety and Security Teams (MSST), as well as other Deployable Special Forces (DSF) units within the CG and Navy/Marine expeditionary forces.

Let me start by saying that I have had the privilege of attending many training courses related to the topics of physical security and, security operations and have managed security operations and PSD teams both here in the U.S. and internationally in high risk environments. Like anyone in my position, I came with an open mind and, of course, an internal knowledge set, which worked both for and against me. The course1 is 12 days in duration and open to anyone in the CG, active duty or reserve. You do not need to be a member of a Port Security Unit to attend, but PSU members do get priority. http://www.uscg.mil/smtc/Training_PSU_Basic.asp

After taking the course, it is my recommendation that every member

of the CG go through this training. Similar toIn the Marines, in which each member goes through Marine Combat Training (MCT) in order to operate in a combat environment, and Coastguardsmen should also have this ability. I firmly believe that this training

the course and get our minds right. We spent the next few days in a classroom environment, learning the fundamentals of Tactical Combat Casualty Care, or TCCC, discussing Chemical Biological Radiological and Nuclear defense, or CBRN, creating range cards, and the like. We also had classes on the finer points of land navigation, patrolling, and entry control points. The water side of the operation has its own training courses and is separate from the shore side operations.

After only a few days in the classroom and in crew-serviced weapons familiarization, we were in the field for the remainder of the course., Wwe learned how to set up a base camp, entry control points (ECP), guard shifts, and did daily patrols which included MOUT training and basic land navigation. During this course we trained on the M240B 7.62mm machine gun and M2HB .50 caliber machine gun. We had the opportunity to engage targets out to 1000 meters and manage simulated malfunctions in a stress-induced environment on those weapon systems, but you we weare expected to come with a basic knowledge of the M16 and other related field equipment from your our parent commands. The course culminated with a force-on-force scenario that involved multiple squads, flanking maneuvers, TCCC, CBRN, and exfiltration. All of this is directly in line with the PSU fundamental mission of being able to deploy anywhere in the world in 96 hours, set up security operations within 24 hours, and sustain itself for 30 days.

Photos courtesy of United States Coast Guard

should be included in CG basic training and could even afford to be extended. I was able to take this course on my annual Active Duty for Training, or AD-T. Iand if you are a reservist in the CG (blue side), then this is a great opportunity for you to see a side of the guard (green side) few will likely experience and get some great hands-on real-world training in combat arms.

On Monday morning, on day one, andthe first classes we received was were on combat mindset and the importance of mental conditioning., Tthis was a great way to set the tone of

The Counter Terrorist ~ October/November 2015 73

One of the nice things about PSU Basic Skills Course (BSC), other than 3 MREs a day, is the student-to-instructor ratio and quality of subject matter experts they employ for each phase of training. If there is one thing that will stick with me from PSU BSC, it is the diverse backgrounds that each person brought to the course, each with a different perspective,, not only the students but the instructor staff as well. My one recommendation to BSC is to extend the course a week so that graduates could can benefit from full qualification in each subject matter (TCCC/CBRN/M240/M2HB), versusVS just “familiarization.”. However, in just two weeks’ time, we actually started to look like a high-speed infantry element,; moving, shooting and communicating like it was all we did. •

NOTE: Information contained in this article is available through public search.

1www.uscg.mil/smtc/Training_PSU_Basic.asp

ABOUT THE AUTHORGarret Machine served as a combat

soldier in the Duvdevan Unit of the Israeli Defense Force, where he gained extensive combat experience from multiple operations in support of Israeli counter terrorism and national security objectives. Duvdevan is a counter terror (CT) unit specializing in urban warfare, hostage rescue, targeted assassinations, and kidnapping of wanted militants throughout the West Bank, Gaza Strip, and border nations. He was a firearms tactics instructor in his unit and later provided Personnel Security Detail (PSD) for Ministry of Defense officials on high-risk assignments. In 2012, Machine joined the ranks of TACLET, the SOF component of the USCG, and further

distinguished himself by earning the Director of Homeland Security Award for his performance at the Federal Law Enforcement Training Center (FLETC). Machine has published two DVDs on combat shooting (Pressure Makes Diamonds) and a book on combat tactics (Israeli Security Concepts), both available on Amazon.

The Counter Terrorist ~ October/November 2015 73

74 The Counter Terrorist ~ October/November 2015

The Phantom Warrior TLS™ was never designed to be the brightest light. You can get those at a camping store. The Phantom Warrior TLS™ uses solid-state LEDs for 100 lumen output on common AA batteries. This fully-adjustable light gives you the proper light to do your job, adds the features shown above, and keeps your position secure. Phantom also offers a universal mounting bracket (UMB), a pocket clip, and lanyard for the TLS™ as well as our new ResQ™ lens which converts this covert, tactical light into a superior rescue beacon!

Phantom WarriorFlashlights

SUBSCRIPTION INFORMATION (please print clearly)

NAME ___________________________________________________________________

ADDRESS ________________________________________________________________

CITY ________________________ STATE _______ZIP ____________________________

EMAIL ___________________________________________________________________

q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.)

Name on Card _____________________________ Card # _________________________

Exp. Date ______________________ Billing Address _____________________________

q One year $34.99 Domestic q Two-year $64.99 Domestic

q eZine $19.99 (International subscribers – must include email address)

Scan to subscribeGO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999

Subscribe Today!Subscribe Today!I would like to subscribe to The Counter Terrorist Magazine!

SUBSCRIPTION INFORMATION (please print clearly)

NAME ___________________________________________________________________

ADDRESS ________________________________________________________________

CITY ________________________ STATE _______ZIP ____________________________

EMAIL ___________________________________________________________________

q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.)

Name on Card _____________________________ Card # _________________________

Exp. Date ______________________ Billing Address _____________________________

q One year $34.99 Domestic q Two-year $64.99 Domestic

q eZine $19.99 (International subscribers – must include email address)

Scan to subscribeGO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999

Subscribe Today!Subscribe Today!I would like to subscribe to The Counter Terrorist Magazine!

*FREE MEMBERSHIP TO THE HOMELAND SECURITY NETWORK WITH EVERY SUBSCRIPTION

*FREE MEMBERSHIP TO THE HOMELAND SECURITY NETWORK WITH EVERY SUBSCRIPTION

The Counter Terrorist ~ October/November 2015 75

The Phantom Warrior TLS™ was never designed to be the brightest light. You can get those at a camping store. The Phantom Warrior TLS™ uses solid-state LEDs for 100 lumen output on common AA batteries. This fully-adjustable light gives you the proper light to do your job, adds the features shown above, and keeps your position secure. Phantom also offers a universal mounting bracket (UMB), a pocket clip, and lanyard for the TLS™ as well as our new ResQ™ lens which converts this covert, tactical light into a superior rescue beacon!

Phantom WarriorFlashlights

The Phantom Warrior TLS™ was never designed to be the brightest light. You can get those at a camping store. The Phantom Warrior TLS™ uses solid-state LEDs for 100 lumen output on common AA batteries. This fully-adjustable light gives you the proper light to do your job, adds the features shown above, and keeps your position secure. Phantom also offers a universal mounting bracket (UMB), a pocket clip, and lanyard for the TLS™ as well as our new ResQ™ lens which converts this covert, tactical light into a superior rescue beacon!

Phantom WarriorFlashlights

Circle 209 on Reader Service Card

Circle 198 on Reader Service Card

NEW! Non-Spark Door Ram BRO-RAM-ENF32NS

®

    Broco introduces the first Enforcer™ door ram with a non‐spark striking surface. Engineered at the request of our customers, the model BRO‐RAM‐ENF32NS features a high impact plastic face.      This new ram fills the middle of the Broco Enforcer lineup, weighing 32 lbs and having an overall length of only 21”. Broco’s original Enforcer ram is 37 lbs and 24” long while the Baby™ Enforcer weighs 25 lbs and is only 16” long.      Like the other Broco rams, the new 32NS features:  Reach through fixed rear handle  Rotating front handle  Rubber non‐slip grips  Steel knuckle guard  Weight forward design   Balanced sling point and sling 

NEW! Ultimate Breacher Tool BRO-UBT-24D, BRO-UBT-26S

®

BRO-UBT-26S, 26” OA length, 14 lb.

BRO-UBT-24D, 24” OA length, 16 lb.

Designed to be the one simple go‐to tool for First Responders, the Broco Ultimate Breacher Tool (UBT) combines four tools into one: a Sledge, Pry, Ram and Rake.        Whether it be an active shooter event, medical related or some other        emergency, the first person on‐scene needs basic entry            capability that is easy to carry, easy to use.  

      A Choice of Handles     Broco’s Ultimate Breacher Tool is offered with either a ‘D” handle or straight handle. The ‘D’ handle pro‐vides more ramming power and  makes carrying  easier.      The straight handle version of the UBT is offered at the request of mili‐tary operators who carry the tool on their back in a pack or a tube. 

BRO-RAM-ENF32NS, 21” OA length, 32 lb.

400 S. Rockefeller Ave., Ontario, CA 91761 U.S.A. Tel: 909 483 3222; 800 845 7259  Fax: 909 483 3233 Email: [email protected]  www.Broco‐Rankin.com/Tactical                                                    

    Broco’s innovative breaching solutions are available glob‐ally through leading military and police products distributors. Visit Broco’s web page for details on exothermic torch sets, diamond rescue blades, and mechanical and hydraulic tools. 

MADE IN THE U.S.A. 

MADE IN THE U.S.A.