USING DEADLY FORCE • CIA’S CREATION OF TERRORISM • INTERNATIONAL TRADE TRANSPARENCY

Journal for Law Enforcement, Intelligence & Special Operations Professionals

OCTOBER/NOVEMBER 2015

VOLUME 8 • NUMBER 5

WHY DOMESTIC TERRORISTS GO SOFT.

INTERNATIONAL EDITION An SSI ® Publication OCTOBER/NOVEMBER 2015 thecounterterroristmag.com USA/CANADA $5.99 ACCURACY REDEFINED MRAD

338 LAPUA MAG 338 NORMA MAG 300 WIN MAG 300 NORMA MAG 7MM REM MAG 308 WIN 260 REM 6.5 CREED

AMBIDEXTEROUS CONTROLS. USER INTERCHANGEABLE CALIBERS. ADJUSTABLE MATCH GRADE TRIGGER. COMBAT PROVEN

Barrett will not sell to government agencies in the State of California or New York. Learn more at barrett.net

2 The Counter Terrorist ~ October/November 2015 Circle 121 on Reader Service Card 19947 Counter Terrorist Magazine Ad v1_Layout 1 8/18/15 2:41 PM Page 1

Online Undergraduate, Graduate & Certificate Studies in Public Safety & Homeland Security

Meeting the professional advancement needs of those committed to protecting the public. Earn your career credentials without job interruption through Fairleigh Dickinson University’s respected online degree and certificate offerings. Established in 1942, FDU is New Jersey’s largest private university with 12,000 students worldwide. Degree Offerings • Master of Administrative Science • Master of Science in Homeland Security • Bachelor of Arts in Individualized Studies Certificate Studies Career-relevant programs are available at the graduate and undergraduate level in such areas as terrorism, forensics, global security, disaster and emergency management, transit safety, homeland security, and more. Credits earned can be applied toward the appropriate degree program.

• FDU is proud to participate in the Yellow Ribbon G.I. Education Advancement program enabling eligible veterans to attend FDU at no charge. • FDU accepts Federal Tuition Assistance (FTA) for undergraduate and graduate courses (restrictions apply). • No entrance exams required.

For More Information Undergraduate Programs Graduate Programs JoAnna Steiner Ronald E. Calissi 201-692-7357 201-692-6522 [email protected] [email protected]

fdu.edu/mas

CALL TODAY. CLASSES BEGIN IN JANUARY.

Circle 10 on Reader Service Card The Counter Terrorist ~ October/November 2015 3 4 The Counter Terrorist ~ October/November 2015 Circle 259 on Reader Service Card The Journal for Law Enforcement, Intelligence & Special Operations Professionals OCTOBER/NOVEMBER 2015 Counter VOLUME 8 • NUMBER 5

COVER STORY:

WHY DOMESTIC TERRORISTS GO SOFT 30 by Karen Bunso FEATURES:

30 Firsthand: 0 8 DEADLY FORCE: THE USE OF FORCE CONTINUUM AND DEFENSIVE TACTICS OR COMBATIVES by Andrew Curtiss

Case Study: 18 THE CIA’S CREATION OF ISLAMIC TERRORISM ON AMERICAN SOIL by Paul L. Williams, Ph.D.

18 THE CHAPLAIN AS FIRST RESPONDER 48 by William A. Gralnick, BA, MA, DHL

“THE NEXT FRONTIER” 58 INTERNATIONAL TRADE TRANSPARENCY: by John Cassara

DEPARTMENTS: 48 06 From the Editor 9/11 Denial

46 Book Review Cycle of Fear: Syria’s Alawites in War and Peace

68 Innovative Products White Horse Research and Developement, Platesmart HD Engine, Lewis Machine & Tool, YakTrax™, Kent

72 Training Review 58 USCG Port Security Skills Course

CONTENTS Cover Photo: Illustrastion by: Scott Morrison

The Counter Terrorist ~ October/November 2015 5 FROM THE EDITOR: The 9/11 Denial Counter by Henry Morgenstern Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 8 • NUMBER 5 n the recent, and for me sacred, 9/11 anniversary, commemorating the lives of the OCTOBER/NOVEMBER 2015 O 2977 fallen and the heroes that together make up the worst Terrorist act on American Editor soil ever, I was shocked to hear John Hockenberry, a regular on National Public Radio give a Henry Morgenstern tirade called: Why I am done with 9/11: Director of Operations I was actually done with the whole 9/11 thing sometime between the famous and politically Carmen Arnaes disastrous “Mission Accomplished” moment from George W. Bush after the Iraq invasion, and the Director of Advertizing empty announcement by Barack Obama that this feeble terrorist mastermind, Osama bin Laden, had Sol Bradman been killed by Navy SEALs in Pakistan. Administrative I’m done with the whole heroes’ thing. Aren’t we over this? There’s the American tragedy story and Ashley Villegas the talk of America as the preeminent victim of terrorism—America isn’t even close to being the most Contributing Editors victimized nation by terrorism. If anything, we are more of a victim of our own domestic terrorism Garret Machine than from any foreign enemies, even though it’s easy and convenient to fear them more than kids with Paul L. Williams, Ph.D Karen Bunso guns who wander into churches to kill. Andrew Curtiss And as if this were not appalling enough he continues: John Cassara But I think the 9/11-ization of American life has been a kind of poison for all of us. We had our William A. Gralnick, BA, MA, DHL moment when the whole world was with us after 9/11, and we squandered it. Graphic Design We spent trillions on two wars that turned a battlefield into a killing field for ISIS and gave us a Morrison Creative Company refugee tidal wave from Syria and Iraq. And another battlefield in was turned into a Copy Editor fragile puppet government that rules over the biggest opium crop in the history of the world. Some of Laura Town that Afghan heroin finds its way into our cities where it kills and destroys lives much more easily than Advertising Sales Sol Bradman flying planes into towers. [email protected] But should I be shocked? Since the beginning of this year, Police are being hunted by terrorists 305-302-2790 incited by Black Lives Matter to openly kill our Police. The killing of a veteran police officer Publisher: north of Chicago is the latest in a string of recent law enforcement deaths. Lt. Charles Joseph Security Solutions International Gliniewicz’ death came after the death of Police Officer Darren Goforth was shot and killed 13155 SW 134th St. • STE 103 Aug. 28 in suburban Houston as the Harris County deputy stopped to put gas in his patrol car. Miami, Florida 33186 Henry Nelson, an officer in Sunset, Louisiana, was shot and killed Aug. 26 while responding to a domestic-violence call. Louisiana State trooper Steven J. Vincent died Aug. 14 after being shot in ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, the head while assisting a motorist. Intelligence & Special Operations And then what about Chattanooga, where brave Americans that had every right to feel Professionals is published by Security comfortable at a Recruiting Office, gunned down by a hateful Muslim Jihadist inspired by ISIS. Solutions International LLC, as a service to the nation’s First Responders and Homeland And ISIS continues to publish details of US servicemen and their families inciting their followers Security Professionals with the aim of to attack them here—in the USA. deepening understanding of issues related Yet, where is the official condemnation of these acts? The well-worn mantra about the Religion to Terrorism. No part of the publication can be reproduced without permission of Peace was trotted out yet again after the Chattanooga murders by none less than Jeh Johnson, from the publisher. The opinions expressed Secretary of Homeland Security: “it is “critical” to refrain from the “Islamic” label in order to herein are the opinions of the authors “build trust” among Muslims. The Tennessee murderer, Mohammad Abdulazeez, is officially a represented and not necessarily the opinions “homegrown violent extremist,” according to the government—even though he blogged about of the publisher. Please direct all Editorial correspondence related to the magazine to: his Islamic religious motivations for the attack. He and his family also attended a local mosque Security Solutions International SSI, 13155 controlled by a terror-tied Islamic trust. SW 134th Street, Suite 103, Miami, Florida. So is anything of any wonder anymore? As long as we bathe in these false moral equivalencies 33186 or [email protected] The subscription price for 6 issues is $34.99 generated by some misguided multi-cultural, post-modern relativism and equate a disturbed and the price of the magazine is $5.99. child’s acts in Charleston with 19 Terrorists killing nearly 3000 Americans; or we apologize (1-866-573-3999) Fax: 1-786-573-2090. for Muslim Jihadists but don’t condemn the attacks on our Police; when our leadership does For article reprints, e-prints, posters and plaques please contact: not step in to clear up the confusion but instead supports the illusion, we drift more and more Security Solutions International at towards chaos. Thanks to all that serve and protect despite this insanity. Thanks so very much. [email protected] or call 786-573-3999 Please visit the magazine web site where you can also contact the editorial staff: www.thecounterterrroristmag.com Henry Morgenstern © 2015 Security Solutions International Editor, The Counter Terrorist

6 The Counter Terrorist ~ October/November 2015 The Counter TerroristCircle ~ October/November 319 on Reader Service 2015 Card 7 Firsthand:

DEADLY FORCE: THE USE OF FORCE CONTINUUM AND DEFENSIVE TACTICS OR COMBATIVES

8 The Counter Terrorist ~ October/November 2015 by Andrew Curtiss

Recently, the term “use of force” has gotten a lot of publicity. First, we saw the Michael Brown incident and the rear naked choke applied to Eric Garner in that gained worldwide attention with the slogan “Black Lives Matter.” Then we saw the incident in Baltimore, where martial law was required to quell the city after another incident with local police.

s an arms professional, I the military and security professionals. stated, this article is written from the frequently find myself training There are two areas where my services are perspective of someone who sees the membersA of various law enforcement frequently requested: deadly force and issue of defensive tactics from numerous agencies. From run-of-the-mill patrolmen the use of force continuum and defensive standpoints and not from a narrow, to SWAT to undercover narcotics tactics or combatives. limited scope. This wide view was taught task forces, I have consulted, trained, One advantage of working to me by none other than Ultimate or advised a broad spectrum of law operationally and consulting on a broad Fighting Championship living legend enforcement officers (LEO). I also have spectrum is that I get to see things Dan “The Beast” Severn. Dan is a good the honor and privilege of working with from various perspectives. That being friend of mine and I have been privileged

The Counter Terrorist ~ October/November 2015 9 one of my client organizations. During are individuals with law enforcement this rewrite, I realized something that backgrounds who have elevated their reversed the way I was seeing things. positions politically and have consulted Because the program I was developing with the State’s attorneys rather than requires a high degree of knowledge of individuals who truly understand how the use of deadly force and the use of to apply biomechanics to the field of What techniques force continuum, I decided to use case unarmed defense techniques. law as a reference. During my research The next problem is the false idea that are best used of case law, I noticed a recurring theme. the State has the authority or the foresight and applied for Of the several cases of excessive force to dictate which techniques officers on studied, nearly all of them entailed the the street can and should be limited to law enforcement officer or officers charged making the for self-protection. When planning for and security following claims: combat operations, we used to say that professionals in 1. They rarely received training in “even the enemy has a vote sometimes.” defensive tactics (4–8 hours per year This means that you can develop the best the real world? on average). plan in the world beforehand, but a plan 2. During the event in question they is really just a theory until it is time to could not effectively apply the execute it. The following things dictate approved techniques required by their which techniques should be used: parent organization. • Mission: What is the desired end state 3. They were restricted to the use of the officer wants to achieve for this ONLY APPROVED TECHNIQUES. particular situation? 4. When all else failed, they simply • Enemy: What actions is the enemy resorted to causing their victim or taking? What is the actual “real” threat? subject more pain in order to get • Terrain/ Weather: What is the layout of the victim or subject to comply with the environment? Is it urban or rural? their commands. Wet and slippery? Crushed gravel? 5. They were in a panicked state, or what Icy? Etc. is commonly referred to in Cooper’s • Time Available: How urgent and dire to have the opportunity to train with him Color Spectrum Code as “The Black.” is the situation at hand? What is the on numerous occasions. It was on one of Therefore, based on these facts, I relative positioning of the threat? these occasions that I asked him what the will make my assessment of the “best” • Troops Available: How available is the best techniques were to use on the ground techniques for defensive tactics. nearest backup? in a professional fight. His answer was Officers restricted to the use and • Civil Considerations: Are there the age-old expression about techniques implementation of ONLY APPROVED innocents or other potential collateral being as relative as the individual TECHNIQUES. damage at risk? using them. This methodology, although useful All of these things are in direct This brings us to the subject at hand: in theory for mitigating legal liability, is correlation to the Ability, Opportunity, What techniques are best used and the start of all other failures. First, the and Intent equals Jeopardy algorithm. applied for law enforcement and security officials who decide which techniques This means that the tactical situation professionals in the real world? Because are approved and which are not usually dictates the methods and techniques techniques are relative and preferential, I not subject matter experts (SMEs), used, not the State. Organizations would would like to present this matter in a way even by the legal definition of the term. be wise to adhere to this model rather that identifies criteria upon which to base This means that they are not specialists than setting myopic standards based the choice of techniques. in the combative arts, nor are they solely on the premise of limiting the In late 2014, I began working on the medical doctors or specialists in the field State’s liability in a use of force case. rewrite of a defensive tactics program for of biomechanics. In most cases, they Officers rarely received training in

10 The Counter Terrorist ~ October/November 2015 Circle 16 on Reader Service Card The Counter Terrorist ~ October/November 2015 11 defensive tactics (4–8 hours per year 3. Because officers are largely untrained, technique, he or she is essentially making on average) they are not operant conditioned and the decision to cause harm to the subject After Basic Law Enforcement Training, crumble under the stress of real life in question in some way, shape, or form. many precincts and organizations situations. They panic and resort to The problem with this decision is that only focus on their defensive tactics the animal instinct to survive rather everyone perceives pain differently. The curriculum once per year. This is mostly than the calm, collected state of the perception of pain is dependent on due to the cost of providing such trained mind. A trained mind is able so many variables, including genetics, training, the availability of the trainees to focus on the whole situation because body composition, body hardening or and instructors, and in some cases a the trained body instinctively regresses physical conditioning, substance use, shortage of personnel. As a result, setting to the organized firing of neural mindset, mental state, and more. All of more than one day per year aside for transmitters, which operate along finely this can result in what an arresting officer Defensive Tactics (DT) seems a bit too developed neural pathways honed by perceives as a direct challenge by the much to ask. This, however, does has thousands of repetitions of training subject when he or she attempts to use multiple shortcomings: under stressful conditions. pain as a motivator during an arrest. This 1. Officers are not familiar with the Additionally, it is important for officers ultimately has the egotistical potential to approved techniques. to be familiar with the jurisprudence escalate to an excessive force scenario. 2. Officers learn just enough to confuse regarding the use of proportionate force, When mechanical failure and themselves, have a loose understanding the use of deadly force, and the premise leverage techniques are implemented, of the concepts, and eventually of vital targets. All of this brings us they change the diametric. When an succumb to the old adage of “more and to the discussion of pain compliance officer is concerned about mitigating a harder is better.” This leads to excessive versus mechanical failure. When an threat by bringing the threat to a state force cases. officer decides to use a pain compliance of mechanical failure, he or she is not focused on using pain or harm as a tool to force compliance by a subject. These techniques are completely likely to shut down the function of an edged -weapon- wielding arm without causing pain to the subject. In most cases where mechanical- failure-driven techniques are used, it is the subject’s refusal and outright resistance to the control technique that causes pain and discomfort. The officer is not concerned with causing pain to achieve compliance and instead aims to mitigate or neutralize the specific threat. Both the subject and the threat itself are inconsequential to the arresting authority, meaning that if the subject causes himself or herself pain it is unfortunate but it does not matter. There is no direct challenge with this methodology, therefore there is little or no ego involved. This means the officer is less likely to use a level of force that greatly outweighs the threat. Some basic but effective techniques include the following:

12 The Counter Terrorist ~ October/November 2015 Circle 18 on Reader Service Card THUMBTHUMB BREAKBREAK ® SCABBARDSCABBARD ® NEMESISNEMESIS

STICKS ALMOST LIKE FLY PAPER

MSRP MSRP $7599 $ 99 Style 25 Style 001 N38 • Most favored of Federal LE Agencies • Stays put when gun is drawn • Premium saddle leather • Available for most pocket guns • Optimum draw angle • Special polymer insert prevents molding • Secure & highly concealable

800-GUNHIDE800-GUNHIDE 631-841-6300631-841-6300 DeptDept #CTO5#CTO5 431431 BayviewBayview Avenue,Avenue, Amityville,Amityville, NYNY 1170111701

www.desantisholster.comwww.desantisholster.com The Counter Terrorist ~ October/November 2015 13 Circle 262 on Reader Service Card THE AMERICAN 2-ON-1, ARM BAR: This is based on the classic “Russian 2-on-1” wrestling arm hold. When properly employed, this technique implements complex torque and immobilization of multiple joints. It also provides the leverage required for a smaller subject to take down a much larger subject with ease. This technique THE CHIN LIFT places the officer in a tactical position and TAKEDOWN: gives him or her the option of escalating Similar in concept to the cross-face to a level of deadly force (by applying forehead takedown, this decentralizing enough force to break the elbow) or de- method attacks the body’s ability to escalating to a simple escort position. stand erect.

THE HEAD TWIST TAKEDOWN: This technique is similar to the cross- face forehead and chin lift takedowns. The difference in this case is that it is important to gain control of the entire THE CROSS-FACE head in order to dictate where the body FOREHEAD TAKEDOWN: will go. In the event that a subject attempts to escape either the escort or American arm bar, this is a great takedown that mechanically disables the subject’s ability to stand upright by decentralizing the subject with minimal force.

14 The Counter Terrorist ~ October/November 2015 THE REAR NAKED In closing, the vast landscape of political correctness should not dictate THE SEATBELT CHOKE: CHOKE: the arsenal of techniques that an officer This is a speedy and effective blood This is a blood choke that can render can use to deal with tactical situations. choke that also implements a neck crank. a person completely unconscious in The use of pain compliance should be This particular choke capitalizes on the seconds. This technique can easily be abandoned in favor of the mechanical virtue of position to render the near arm turned into a lethal technique by holding failure solution, which is deeply rooted of the subject immobile and ineffective. it for longer than a minute. in science. Officers need more training time in order to develop their techniques, and that means the State needs to take responsibility for ensuring that employees in uniform are receiving that training. The two things for which there is no substitute are repetition and stress. The things that officers should take away from this are that commonality in training and technique and effective and versatile implementation of techniques leads to certain fluidity and reflexiveness. After all, if your training is not instinctive it’s useless. •

THE KIMURA ARM AND SHOULDER LOCK: This arm and shoulder lock is excellent for controlling a hostile subject and preparing the subject to be restrained. This technique utilizes the principle of complex torque and immobilizes the elbow, shoulder, and wrist.

The Counter Terrorist ~ October/November 2015 15 ABOUT THE AUTHOR runner up kickboxer at the amateur Andrew Curtiss is a former US Army level. Andrew is a former national Special Forces Soldier and combat level full contact karate champion. He veteran. Andrew was nominated for the is the author of two published books Silver Star and was awarded the Bronze 1984 Redux a political commentary; Star with Valor. He holds advanced and Combat Application Techniques, black belt ranks in the martial arts of an instructional on edged weapon and Taekwondo and Shurite Kenpo Karate. unarmed combat. He is currently a Andrew was ranked black belt in tactical consultant for various government Brazilian Jiu-Jitsu under Professor Jon and private organizations and travels the Siracusano. He is a Professional Mixed country teaching firearms, use of force, Martial Arts Athlete and former world defensive tactics and combatives.

16 The Counter Terrorist ~ October/November 2015 Circle 20 on Reader Service Card CYBERWARFARE HAS A NEW FIRST LINE OF DEFENSE. LEARN FROM THE LEADER.

B.S., CYBERSECURITY M.S., CYBERSECURITY STUDIES

AMUONLINE.COM/COUNTER-TERRORIST

We want you to make an informed decision about the university that’s right for you. For more about the graduation rate and median debt of students who completed each program, as well as other important information—visit www.APUS.edu/disclosure.

Circle 25 on Reader Service Card The Counter Terrorist ~ October/November 2015 17 Case Study: THE CIA’S CREATION OF ISLAMIC TERRORISM ON AMERICAN SOIL

18 The Counter Terrorist ~ October/November 2015 by Paul L. Williams, Ph.D.

Islamic paramilitary camps have been set up in the and Canada to train African-American Muslims in guerilla warfare. After months of training on firing ranges and obstacle courses, the black Muslims are sent to Pakistan where they receive advanced training in explosives. Many never return.

tories about these camps are when the Agency sent hundreds not news. They have been of radical Islamic clerics to the United reportedS by the mainstream media, States in an effort to recruit black including Fox News. Muslims for the holy war against the The news is that these camps—from Soviets in Afghanistan. which the next 9/11 is expected to occur—have been established by the THE TABLIGHI Central Intelligence Agency. MISSIONARIES The origin of these compounds for By and large, these missionaries hailed would-be jihadis dates back to 1979, from Pakistan and belonged to Tablighi The seal of the U.S. Central Intelligence Agency inlaid in the floor of the main lobby of the Original Headquarters Building. Photo by: Duffman

Author of Operation Gladio: The Unholy Alliance between the Vatican, the CIA, and the Mafia

The Counter Terrorist ~ October/November 2015 19 Jamaat, a Muslim movement with 150 contact with all those who do not share members in 213 countries.1 Upholding their beliefs, and their approval of jihad a strict interpretation of Islamic law by sword (jihad bin saif).2 Members of (shariah), the Tablighi were united in the movement gathered every year for their resistance to Western culture, their three days in the small Pakistani town insistence that Muslims should avoid of Raiwind. In 1979, Sheikh Mubarek Ali Gilani, a Tablighi missionary from Lahore, Pakistan, arrived in Brooklyn, where he called upon members of Dar ul-Islam, a notoriously violent street gang, to take arms in the great jihad. Scores answered his call and were headed off to Pakistan with payments of thousands of dollars in cash and promises of seventy hours in seventh heaven if they were killed in action.3

WELCOME TO ISLAMBERG By 1980, the Agency realized that considerable expense could be saved by setting up paramilitary camps under the supervision of Shiekh Gilani in a rural area of the country. An ideal location was located near Hancock, New York, at 2009 Malaysian Annual Congregation of Tablighi. Photo by: Muhammad Hamza the base of Point Mountain, where the east and west branches of the Delaware River converge to form the headwaters that flow through Pennsylvania and New Jersey to the Atlantic Ocean. The rocky terrain was infested with rattlesnakes, and the woods were home to black bears, coyotes, wolves, and a few bobcats. Islamberg, a seventy acre complex, came into existence. Firing ranges and obstacle courses were set up in Islamberg along with a massive underground bunker and a landing strip. The residents lived in single-wide trailers that lined the hillside. The settlement contained a small shack that served as a laundry facility, a claptrap community center, a tiny grocery store, and a masjid. A sentry post was placed at the entranceway.4 The sound of gunfire and explosions Journalist, Paul L. Williams at the entranceway to Islamberg.

20 The Counter Terrorist ~ October/November 2015 HOMEGROWN JIHAD THE TERRORIST CAMPS AROUND U.S.

The sound of gunfire and explosions emanating from the property alarmed local residents, who filed complaints with local and state law enforcement agencies.

emanating from the property alarmed The camp also came to contain an local residents, who filed complaints illegal cemetery where bodies were with local and state law enforcement buried in unmarked graves.6 This alone agencies. But a marked law enforcement should have warranted a raid by the vehicle never appeared at the compound.5 New York State Police. But not even Islamberg was off-limits to police dead bodies could prompt a police inspection on the spurious grounds of investigation. “national security.” When Islamberg was established, Sheikh Mubarek Ali Gilani

The Counter Terrorist ~ October/November 2015 21 A mujahideen fighter in Kunar uses a communications receiver. Photo by: Erwin Lux

Mujahideen fighters in the Kunar Province of Afghanistan in 1987. Photo by: Erwin Lux

Gilani presented himself as an employee Hundreds of African-American Muslims of the CIA, and the future jihadis made their way to Afghanistan and joined who resided in the compound called the ranks of the mujahedeen. Several themselves CIA operatives.7 Few in law were killed in action.8 Others, including enforcement doubted the professed Clement Rodney Hampton-El, returned credentials of the Muslim newcomers. to the U.S. to plot the 1993 bombing of Mujahideen fighters with two captured the World Trade Center in New York.9 Soviet ZiS-2 field gun in Jaji of Paktia Province in Afghanistan. COMMUNITIES OF THE A host of other paramilitary camps Photo by: Erwin Lux IMPOVERISHED were established in such places as Red Islamberg was a great success. House, Virginia; Commerce, Georgia;

22 The Counter Terrorist ~ October/November 2015 Circle 213 on Reader Service Card York, South Carolina; Dover, Tennessee; more of his African-American recruits Buena Vista, Colorado; Macon, Georgia; appeared among the rank and file Squaw Valley, California; Marion, mujahedeen in various theaters of warfare Alabama; Talihina, Oklahoma; and throughout the world. Toronto, Ontario.10 Dr. Zawahiri’s help was so valuable Gilani placed Islamberg and the other that he was granted permanent U.S. camps under a governing organization residence by the U.S. Immigration and called “Jamaat ul-Fuqra” or “the Naturalization Service in January 2000.14 community of the impoverished.” He established the headquarters of this “charity” in Lahore. The American arm of Jamaat ul-Fuqra became the “The Muslims of America,” a tax-exempt corporation with Gilani’s mosque in Brooklyn as its address.11 Achieving the Goals of INCREASED NEED OF Shared Security and Prosperity RADICALS 3RD ANNUAL The Soviet withdrawal from Afghanistan in 1989 did not spell an end to the CIA’s support of radical Islam. Throughout the 1990s, Dr. Ayman Zawahiri, al-Qaeda’s second in command, travelled at the expense and bidding of the CIA throughout Central Asia, where he cultivated new armies of jihadis to destabilize the newly created republics. His efforts resulted in the uprising of the Chechens against the Russian Federation, the attempted toppling of the government in Uzbekistan, and the insurgence of the Uigurs in the Xinjiang province of China.12 A dutiful operative, Dr. Zawahiri met regularly with U.S. military and intelligence officials at the U.S. embassy in Baku, Azerbaijan, to plan the Balkan operations in which the CIA worked with al-Qaeda to overthrow the government OCTOBER 27 - 28, 2015 of Slobodan Milosevic for the creation of COBO CENTER | DETROIT, MI “Greater Albania,” encompassing Albania, Sponsors Kosovo, and parts of Macedonia.13 These operations, particularly in the Balkans, required the recruitment of more and more jihadis. Gilani’s camps continued to prosper. And more and Visit www.Beyond-Border.com for information on attending and sponsorships

Circle 103 on Reader Service Card The Counter Terrorist ~ October/November 2015 23 THE RISE OF ISIS the three great imperatives of imperial geostrategy are to prevent collusion and www.PoliceOneAcademy.com After 9/11, the Agency continued www.PoliceOneAcademy.com to cultivate Islamic holy warriors to maintain security dependence among the maintain the “strategy of tension” in vassals, to keep the tributaries pliant and the Middle East, the Balkan states, and protected, and to keep the barbarians 15 Central Asia, and to mount new uprisings from coming together. in Africa to expand U.S. hegemony. The In accordance with the strategy of grand purpose of these enterprises was keeping “the barbarians from coming Video Training U.S. economic and political control of together,” ISIS forces were and are Eurasia. Zbigniew Brzezinski, former trained at a secret U.S. military base 16 Secretary of State and leading strategist in the Jordanian town of Safawi. The On Demand for the Council on Foreign Relations, weapons for ISIS came, compliments of On Demand writes: the Agency, from the arsenal of deposed “PoliceOne Academy’s online Libyan dictator Muammar Gaddafi. The “PoliceOne Academy’s online Maximize your training budget with For America, the chief geopolitical training is a valuable tool Maximize your training budget with prize is Eurasia… Now a non-Eurasian shipment of these weapons to ISIS in training is a valuable tool 24/7 access to more than 500 HD Syria was supervised in 2012 by David 24/7 access to more than 500 HD Former Director of the Central Intelligence power is preeminent in Eurasia—and for any officer, that provides training videos! Agency, David Petraeus. America’s global primacy is directly Petraeus, the CIA director who would for any officer, that provides training videos! Photo by: Darren Livingston high liability training at a dependent on how long and how soon resign when it was alleged that he 17 high liability training at a • Fulfill FDLE Mandatory Retraining effectively its preponderance on the was having an affair with his biographer. moment’s notice.” moment’s notice.” • FulfillRequirements FDLE Mandatory online! Retraining Eurasian continent is sustained… To put Requirements online! it in a terminology that harkens back to SUPPLY AND DEMAND Lt. Eric Rauch In response to the increased demand, Lt. Eric Rauch the more brutal age of ancient empires, Polk County Sheriff’s Office • Provides Certificates of Completion for Polk County Sheriff’s Office • Provideseach one-hour Certificates course of completed Completion for each one-hour course completed • 80+ hours of training available • 80+ hours of training available • Ideal for in service/roll call training YOU CAN’T BE EVERYWHERE AT ONCE, • Ideal for in service/roll call training • Create self-paced training assignments . • Create self-paced training assignments WE CAN • Lesson plans and quizzes RECONYX High Definition motion activated security cameras do not • Lesson plans and quizzes require separate lines for power or communication. Extremely easy to • Tracking and reporting features deploy and hide, (5.5” x 4.5”) our cameras provide near instant • Tracking and reporting features notification of an intrusion by transmitting images via the cellular network directly to your cell phone or computer. • Full-featured mobile experience • Full-featured mobile experience General Surveillance and License Plate Capture • Department and individual models available. • Department and individual subscriptions available subscriptions available Contact us today at 866-941-4090Contact us today at [email protected] [email protected] for your FREE department preview! PHONE 866-493-6064 | WWW.RECONYX.COM for your FREE department preview!

24 The Counter Terrorist ~ October/November 2015 Circle 303 on Reader Service Card www.PoliceOneAcademy.com www.PoliceOneAcademy.com

Video Training On Demand “PoliceOne Academy’s online “PoliceOne Academy’s online Maximize your training budget with training is a valuable tool Maximize your training budget with training is a valuable tool 24/7 access to more than 500 HD for any officer, that provides 24/7 access to more than 500 HD for any officer, that provides training videos! high liability training at a training videos! high liability training at a moment’s notice.” • Fulfill FDLE Mandatory Retraining moment’s notice.” • FulfillRequirements FDLE Mandatory online! Retraining Requirements online! Lt. Eric Rauch Lt.Polk Eric County Rauch Sheriff’s Office • Provides Certificates of Completion for Polk County Sheriff’s Office • Provideseach one-hour Certificates course of completed Completion for each one-hour course completed • 80+ hours of training available • 80+ hours of training available • Ideal for in service/roll call training • Ideal for in service/roll call training • Create self-paced training assignments • Create self-paced training assignments • Lesson plans and quizzes • Lesson plans and quizzes • Tracking and reporting features • Tracking and reporting features • Full-featured mobile experience • Full-featured mobile experience • Department and individual • Departmentsubscriptions and available individual subscriptions available Contact us today at 866-941-4090Contact us today at [email protected] [email protected] for your FREE department preview! for your FREE department preview!

Circle 335 on Reader Service Card The Counter Terrorist ~ October/November 2015 25 U.S. court of such crimes as conspiracy to commit murder, firebombing, gun smuggling, and workers’ compensation fraud. Others remain leading suspects in criminal cases throughout the country, including ten unsolved assassinations and seventeen firebombings between 1979 and 1990.19 In 2001, a resident of the ul-Fuqra camp in California was charged with first-degree murder in the shooting of a sheriff’s deputy; another was charged with gun-smuggling; and twenty-four from the camp in Red House, Virginia, were convicted of firearms violations.20 By 2004, investigators uncovered evidence that purportedly linked both the Washington, DC “sniper killer” John Allen Muhammad and “Shoe Bomber” Richard Reid to Gilani’s group, and reports surfaced that Wall Street Journal reporter Daniel Pearl had been captured and killed in the process of attempting to gain an interview with Sheikh Gilani in Pakistan.21 The Al-Farooq Mosque at in Brooklyn, New York City, which describes itself as one of the oldest Islamic centers in New York City, was founded in 1976. The mosque has been described By 2015, Jamaat ul-Fuqra had been as having been “a center of radical Islamic thought in Brooklyn and a major spiritual and involved in more terror attacks on operational al-Qaeda hub in the United States before and after the September 11, 2001 America soil (30 and counting) than terrorist attacks.” Photo by: Beyond My Ken all the other terrorist groups combined. Despite these attacks, the group has never been placed on the official U.S. Terrorist Gilani continued to churn out more and Watchlist, and The Muslims of America more African-American jihadis. More and continues to operate as a legitimate non- more training camps opened, including profit, tax-exempt organization.22 one in Texas.18 More and more bodies were buried in unmarked graves. More THE WARNING and more complaints were made to law Investigators, including Patrick enforcement officials. And more and Walsh and William Krayer, who have more graduates from the training camps visited Islamberg and other paramilitary made their way to Pakistan. settlements, believe that the next major attack on U.S. soil will emanate The Bushmaster XM-15 used by the BLOWBACK from Gilani’s jamaats of homegrown Washington D.C. snipers during their Of course, there was blowback to terrorism. Based on the history of the attacks in October 2002. It is equipped the CIA’s establishment of Islamic CIA’s involvement in the creation with a 20-round STANAG magazine and paramilitary camps on American soil. of these camps, such an attack may a holographic weapon sight of some sort. Over the years, numerous members of occur in accordance with the Agency’s Photo by: Federal Bureau of Investigation Jamaat ul-Fuqra have been convicted in own design. •

26 The Counter Terrorist ~ October/November 2015 CounterThe

Asia Pacific Edition

The Counter Terrorist Magazine Asia Pacific Edition is finally available for the Asia Pacific region counter-terrorism and homeland security practitioners. The Asia Pacific Edition not only gives the readers a worldwide counter-terrorism perspective but also in-depth information about counter terrorism activities in Asia. The Asia Pacific Edition provides an excellent platform for counter-terrorism and homeland solutions providers to access and penetrate the Asia Pacific market.

Email: [email protected] 13 Circle 255 on Reader Service Card Circle on Reader Service Card The Counter Terrorist ~ October/November 2015 27 ABOUT THE AUTHOR Jamaat ul-Fuqra Training Compound Paul L. Williams holds a Ph.D. Inside the U.S.,” Northeast Intelligence in philosophical theology from Drew Network, February 28, 2006, http:// University. An award-winning journalist, politicsofcp.blogspot.com/2006/02/ he is the author of The Day of Islam and special-report-released-jamaat-ul.html 5 Crescent Moon Rising: The Islamic Ibid. 6 Transformation of America. His latest Paul L. Williams, Crescent Moon book is Operation Gladio: The Unholy Rising: The Islamic Transformation Alliance between the Vatican, the CIA, of America (Amherst, New York: and the Mafia (Prometheus, 2015). Prometheus Books, 2013), 134. 7 Williams served as a consultant (CI-14) “Afghanistan Update,” Daily Telegraph to the FBI. His work with the Agency (London), August 5, 1983; Los Angeles resulted in arrests and convictions. His Times, August 5, 1983. This is the title. 8 field work also served to unravel the Ibid. 9 plot of the Toronto 18 to blow up Zachary Crowley, “Jamaat ul-Fuqra Parliament and behead the Canadian Dossier,” Center for Policing Terrorism, prime minister. March 16, 2005, hard copy. 10Gordon Gregory and Sonna ENDNOTES Williams, “Jamaat ul-Fuqra,” Special 1Alex Alexiev, “Tablighi Jamaat: Jihad’s Research Report, Regional Organized Stealthy Legion,” Middle East Quarterly, Crime Information Center, 2006. 11 no. 1 (Winter 2005), 3-11. Ibid. 12 2Jane I. Smith, Islam in America (New Nafeez Mosaddeq Ahmed, York: Columbia University Press, 1999), “Whistleblower: Al Qaeda Chief Was US 161. Asset,” Huffington Post, May 21, 2013. 3Robert Dannin, Black Pilgrimage http://www.huffingtonpost.co.uk/dr- to Islam (New York: Oxford University nafeez-mosaddeq-ahmed/whistleblower- Press, 2002), 75-76. alqaeda-chi_b_3305954.html 13 4Douglas J. Hagmann, “Special Report: Sibel Edmonds, “Know Your Terrorists: Ayman al-Zawahiri,” Boiling

28 The Counter Terrorist ~ October/November 2015 Circle 87 on Reader Service Card Frogs Post, February 16, 2013, http:// “Gripping reading.” www.boilingfrogspost.com/2013/02/16/ NEXUS MAGAZINE video-report-know-your-terrorists-ayman- “Will cause the reader to question what person of al-zawahiri/ authority and leadership can be trusted. . . .” 14 SGT. THOMAS JUBY Rory McCarthy, “The Real Ayman Member of the Advisory Council for the Intelligence Summit al-Zawahiri,” , August 5, “Well-researched. . . . [This] scholarly work fills a major 2005, http://www.prisonplanet.com/ lacuna in the study of the US foreign policy.” articles/august2005/050805therealayman. THE WASHINGTON BOOK REVIEW htm (note: this site links to The WWW.PROMETHEUSBOOKS.COM Guardian)See also Michel Chossudovsky, The Globalization of War (Montreal: Global Research Publishers, 2015), 111. 15Zbigniew Brzezinski, The Grand Chessboard: American Primacy and Its Geostrategic Imperative (New York: Basic INNOVATION, NOT IMITATION Books, 1997), 20, 40. 16“Americans Are Training Syria Rebels in Jordan,” Reuters, March 10, 2013, /www.reuters.com/ article/2013/03/10/us-syria-crisis-rebels- usa-idUSBRE9290FI20130310 17Ibid. See also Sy Hersch, “Beyond Partisan politics: What Benzagi Is Really About,” WashingtonBlog, April 15, 2014, http://www.washingtonsblog. com/2014/04/real-benghazi-story.html 18Ryan Mauro, “Islamic Terror Enclave Discovered in Texas,” The Clarion Project, February 18, 2014, http://www. clarionproject.org/analysis/exclusive- clarion-project-discovers-texas-terror- enclave 19“Jamaat ul-Fuqra: Terror Group of Pakistan,” Institute of Contact Management, 2001, http://www.satp. org/satporgtp/countries/pakistan/ terroristoutfits/jamaat-ul-fuqra.htm 20Ibid. 21“The Jamaat ul-Fuqra Threat,” Stratfor, Security Consulting Intelligence Resources, June 3, 2005. 22Patrick B. Briley, “Al Fuqra: U.S. FROM THE MAKERS OF THE ORIGINAL Islamic Terror Network Protected by M9 ASSAULT MEDICAL BACKPACK FBI, U.S. State Department,” Liberty Medical, Response and EOD Kits / Logistics Services Solutions Post, July 28, 2006, http://www. newswithviews.com/Briley/Patrick28.htm TSSI-OPS.COM [email protected] Toll-free 877 535-8774

Circle 123 on Reader Service Card The Counter Terrorist ~ October/November 2015 29 WHY DOMESTIC TERRORISTS GO SOFT

Photo by: Al Jazeera English

30 The Counter Terrorist ~ October/November 2015 by Karen Bunso

With all of the information we have learned about mass shootings and domestic terror attacks, we have learned all too much of, I thought it would be a good idea to design visual models that could visually explain some of the factors contributing to such violent incidents.

s for explaining the “why” pyramid scale. It begins with the easiest behind these incidents is more category of target to assault and works Adifficult because that’s one detail that upward to the most difficult category of we usually learn after the fact; and even target to assault. I will attempt to explain then, these incidents still do not make factors that play a part in an assault based any sense. on the type of target. Tactical factors like the category of target, the degree of PART I difficulty, available targets (people), and TARGET HIERARCHY the preparation time will be covered. The first model is called the Target While the possibilities for a target Hierarchy and it is a hierarchy in a objective are unlimited, potential target

Photo by: Al Jazeera English

The Counter Terrorist ~ October/November 2015 31 TARGET HIERARCHY

u HARD Fewer targets TARGET Low opportunity for mass casualty event, unless attack on secondary target used as distraction Fort Knox Bullion Depository, White House, 1 assailant Level V Federal Buildings

Some preparation and planning needed to carry out an HARDENED Many targets to choose from SOFT TARGET

High opportunity for mass casualty event because Sport Stadiums, Concert Event, City Hall, Airports, Federal Buildings (Below Level V), 1 A on a Hardened Soft Target Police Station, Court Houses

est

Little to no preparation or planning needed, spontaneous assault possible

Numerous targets available SOFT TARGET

Medium opportunity for mass casualty event School, Medical Facilities, Places of Worship, Public Transportation, Restaurant, Mall, Theater, Park, Parade, Public Access spaces, Fire Station, Community Figures with routine public interaction

Note: all targets are stationary.

Content: Karen Bunso, Design: Jessica Rosenthal, 2015

objectives can be sorted into two categories: into the design of the building and site. (monument), and they require extensive, soft targets and hard targets. The degree It has layers of access constricts, multiple well thought out security measures to of difficulty assaulting a target depends on layers of security rings establishing stand- keep them safe. Some good examples of the category it is in, the number of targets off distance for explosives, line of site hard targets are the United States Bullion available, and the amount of time and precautions and steel-concrete barriers. It Depository at Fort Knox, the Pentagon, other resources the assailants will invest. has also prepared for and taken extensive and the Statue of Liberty. For this paper, all targets are fixed and are measures to handle and repel an intrusion Assaulting a hard target has the highest permanently stationary. or assault of varying tactics. Hard targets degree of difficulty because of the layered have permanent security personnel that security measures that are permanently in THE HARD TARGET are vetted, trusted, trained, and armed. place and have been specifically designed A hard target is a site that has well- Hard targets have a large monetary value, to actively defend it. established physical and technical house a world leader, or are a symbol There are 446,000 federal buildings defensive security measures engineered of national or international importance according to the U.S. Department of

32 The Counter Terrorist ~ October/November 2015 The Pentagon, headquarters of the United States Department of Defense, taken from an airplane in January 2008. Photo by: David B. Gleason

The United States Bullion Depository at Fort Knox, Kentucky. Photo by: David B. Gleason

Statue of Liberty. Photo by: Derek Jensen Justice, U.S. Marshals Service (USMS), (e.g., the Pentagon).” Information about Vulnerability Assessment of Federal Facilities the number of federal buildings classified report. Because of the Oklahoma City as Level V is not readily available, but I Bombing, an evaluation of security at all estimate there are less than 100 buildings federal buildings was commissioned and with this classification. was released in 1995. The report placed The amount of preparation time buildings into five categories, Level V “… required to plan an effective assault on a are considered critical to national security hard target depends upon the objective of

The Counter Terrorist ~ October/November 2015 33 An assailant has flexibility and can act spontaneously or on a whim.

the assailant(s). If they want to take over and destroy the target, it will necessitate a lot of planning and preparation in order to mount a sophisticated assault. If the assailant(s) simply wants to test security and see if they can breach it (for their 15 minutes of notoriety), very little planning time will be needed.

THE SOFT TARGET A soft target is the most vulnerable type of target because it has almost no security measures or protection in place, imaginary or otherwise. I do not consider observational security measures such as video monitoring as security, but view them as passive deterrents and investigative tools. Soft targets are places or people that the public has unrestricted, routine access to, such as unticketed public events, like parades. Other examples include schools, fire stations, public transportation, grocery stores, shopping malls, public parks, vulnerabilities. Perhaps the most difficult Hierarchy, there are more available soft places of worship, and medical facilities. thing for assailants assaulting soft targets than any other category. Community activists, local celebrities, targets is choosing which one to attack. From a preparation standpoint, very local judges, school principals and town Consider the fact that nearly every place little time is needed to plan an assault on mayors are also examples of soft targets. a person frequents throughout the day is a soft target. An assailant has flexibility Assaulting soft targets is not a a soft target. Soft targets are everywhere and can act spontaneously or on a whim. difficult task because of their security and they are abundant. On the Target For the reasons previously discussed,

34 The Counter Terrorist ~ October/November 2015 THE VENOM® PRODUCT LINE FROM CSI

® A family of high-capacity non-lethal grenade launchers designed to be fully interchangeable for mounted use on vehicles, tripod mounts, and static installations. Expanded in 2014, the VENOM® product line offers non-lethal solutions for a variety of calibers and ranges.

LIGHT WEIGHT // VERSATILE MULTI-CALIBER & TACTICAL SOLUTIONS

GET THE UPPER HAND... AND KEEP IT.

Deployed remotely or on land and marine platforms, the V3037 delivers non-lethal flash and sound, smoke obscuration, irritant, and blunt trauma effects. These capabilities support escalation of force, determination of intent, crowd dispersal and area denial objectives.

SEE THE PRODUCT LINE IN ACTION:

VISIT US AT THE FOLLOWING TRADESHOWS: AUSA: Booth #1460 MILIPOL Paris: Booth #5F120 in the U.S. Pavilion

Circle 93 on Reader Service Card The Counter Terrorist ~ October/November 2015 35 or site after it was constructed. These added security measures may include unarmed temporary security personnel interspersed with armed local or state law enforcement, bollards, chain link fencing, locking gates, and video cameras. Examples of hardened soft targets include police stations, sport stadiums or event sites, concert venues, airports, federal buildings, office buildings, courthouses, and city halls. A hardened soft target usually has some form of perimeter security that it is, in fact, duplicitous: it keeps the bad guys out and the attendees confined inside. With the attendees as a captive audience, the assailant(s) have the potential to carry out a mass casualty event. How difficult is it to carry out an assault on a hardened soft target? Not Super Bowl XLVII Kick Off. Photo by: Au Kirk very, especially if the assailant works at the venue. The insider threat is a very real vulnerability. Even without soft targets represent the worst case insider threats, hardened soft targets are scenario-they are the most likely places appealing targets because they advertise for mass casualty events to occur. security that they cannot deliver. Wherever a lot of people congregate with Security measures cannot keep people no security it IS the worst case scenario- it at venues 100% safe because the venues is a target rich environment. themselves were designed to let people in (spectators), not keep them out. THE HARDENED SOFT Additionally, most events scheduled at TARGET hardened soft targets are well publicized, Sandwiched between these two well- providing notice of certain events and a defined categories is what I term the timeline or deadline for those planning hardened soft target. This is simply a an assault. soft target that has been hardened with A hardened soft target with limited some security measures. A hardened soft security measures is an inviting target is a closed venue with restricted and possibly symbolic target for an access granted by purchased event tickets, assailant(s). Such an assault, while identification credentials, or employment. needing less preparation time than an It has passive but visible security assault on a hard target, still requires time The site of the first bomb at the 2013 Boston measures that were added to the venue to plan. Marathon finish line at 1:56:44pm April 15th, 54 minutes before the explosion. Photo by: Aaron “tango” Tang

36 The Counter Terrorist ~ October/November 2015 Even without insider threats, hardened soft targets are appealing targets because they advertise security that they cannot deliver.

The Counter Terrorist ~ October/November 2015 37 TACTIC HIERARCHY

$ $ $ HME R R R Can have a large blanket coverage range, not great precision, deadly by proximity + IEDs TATP, ANFO, TNT, RDX Moderate time needed for device preparation and planning for assault IED – Pipe bomb, grenade, VBIED – Car, truck, tractor HME could be made and used by just 1 assailant trailor, model aircraft, bicycle, motorcycle, SBIED

$ $ $ Inexpensive and easy to obtain

< 20 - > 50 yards for handgun, precision to blanket coverage; Range depends on FIREARMS R R R assailant’s expertise, Rifle range < 1000 yards, precision weapon

Handgun, automatic, revolver, shotgun,

$ $ $ Requires little expertise to be weaponized Has a blanket coverage range, not a weapon of precision unless FIRE R R R assailing one victim

Very little time needed for preparation or planning

Can be weaponized and used as a tactic by just 1 assailant Arson, incendiary device (Molotov cocktail)

Content: Karen Bunso, Design: Jessica Rosenthal, 2015

PART II excluding Advanced Conventional attainability, their ease of operability, TACTIC/WEAPONRY Weapons (ACW) such as Man-Portable their effective range (precision or blanket Air Defense Systems (MANPADS), HIERARCHY coverage), the time required to plan or tanks, etc., and military grade, state- prepare for their use (expertise, practice), Tactic-noun tac·tic \'tak-tik\ manufactured weapons. Basically, I and the number of assailants necessary :an action or method that is planned will cover small conventional weapons to carry out an effective assault. and used to achieve a particular goal that the average assailant can afford to Regarding the number of assailants Weaponry-noun weap·on·ry \-rē\ purchase or make on their own. necessary to carry out an effective 1: weapons Like the previous model, I have put assault, it only takes one. -Merriam-Webster Dictionary these weapons as tactics in a hierarchy, While pretty much anything can be creatively titled Tactic / Weaponry FIRE used as a weapon—your hand, a pencil, Hierarchy. The weapons are ranked According to the 2014 Global etc.—I will cover conventional weapons according to their affordability and Terrorism Index, “60% of all attacks

38 The Counter Terrorist ~ October/November 2015 involve the use of explosives, 30% use purchase, require a short waiting period, 4700 Providence Rd. firearms and 10 per cent used other and can be permitted to carry concealed. Perry, fl 32347 tactics including incendiary devices…” It They can also be purchased without a makes sense then that the first tier at the waiting period from private sellers. Since 1996, ALS has been serving law enforc4e7m0en0t, Prcoorrvecitdioensn caned Rmdi.litary base of the Tactic / Weaponry Hierarchy Most firearms are simple to operate; if communitPiees, rrboyt,h fl d o3m2e3st4ic7ally and is fire weaponized via incendiary device. some expertise is required, or if the user abroa4d.7 A0L0S Pwraos vpuidrcheansecd ein R2d01.1 by SNiantcioe na1l9 9PP6er, erAstoLr Sy In,h dflauss t br3ieee2sn 3 a4sned7rv ibnegc almawe Fire has been used to light up the dark needs to learn how to adjust the sights, enforc4e7m0en0t, Prcoorrvecitdioensn caned Rmdi.litary AMT4EC7 0LP0ees sPr Lrretohya,vl flSidyse t3enm2sc3, Ie4n7 cR. Ads .a full Since 199P6e, rALrSy ,h flas b3ee2n3 4se7rving law and to destroy entire cities. It’s easy to instructional videos can be found on the sceormvimceu npirtPoievesi,d rer booyft ,ht afl ctidc oa3lm 2aen3sdt4i co7aplelyra tioannadl enforcement, corrections and military overlook the simplistic importance of fire Internet. The effective range of firearms eSaqbinurocipeam d.1 e9An9tL 6S, AwaLnaSds phuarstc rhabiaenseiendg ,s ienr v2Ain0Mg11 T lEabwCy Scoinmcme u1n9it9i6es, , ALbSo th as dboemene stsicearvlliyn g laanwd eLNneafstosior-cLneaemlt heaPnlt rs,e tsrtiovc oesrIr nteodc tupisortonrvise isd ea anondnd ly mtbheielc iabtamersyet with the prevalence of firearms—until depends on the skill of the user as well as eanbfroracde. mAeLntS, wcaosr repcutricohnass eda nidn 2m01il1it abry pcAorMomdTmuEcutCns i Latinedss, s Lerebvthoicathel s S tyosd tomemeests, tItinhccea. l lnAye se ad saf unoldfl cNoamtimonuanl itiPerse, stob oItnhd usdtroiems esatincda llyb ecaamnde you read about arson, a small airplane the weapon used. A handgun used by an soaeburrvo iacdec. u pAsrtoLovmSid eewrrs a osf iptnau crtcichtoaadls aeaydn' ds i no pc2ehr0a1tn1igo inbnaygl AabMroTadE.C A LLeSss Lweatsh apl uSrycshtaesmesd, Iinnc . 2A0s1 1a fublyl flying into a building or recall the events experienced shooter has quite an effective eNqnauvtiporomnnaemln etP nrt.e sFtarono dm I nad cutosrtrareii neoisfn gma, nadn uAfbaMecctTuaErmeCde sNearvtiiocnea pl roPvriedsetro ofI ntadcutsitcraiel sa ndan odp erbaetcioanmael LApreMosdsT-uLEcetCst,h Lael stsost rLivesetthsra tlto eS gpyirscot vemidpsea, r oItncely.r sA t,h se aA b fLeuslSlt of 9/11, when jetliners full of petrol range, up to 100 yards. A handgun used eAqMuiTpmECen Lt ess Laentdh al Sytrsatienminsg, ,I nc. AMs aT fEuCll sperrovdviuicdceet sp rcaoonvmdi dpseerrer vhoiefcn etsasic vtteoic samol leauenttid ot hnoesp fenoreare tadiolsln oafl were used as incendiary devices. Jetliners by a novice has a shorter effective range, sLeersvsi-cLee pthroalv isdtreirv eosf ttoa cptircoavli daen do nolpye trhaeti obneaslt eyoqouur irp mctauecnsttio cmale, rasn odp einra titortanoiandlia nyg'as,n d cAhtrMaaniTngEinCg epqroudipumctesn atn d searnvdi ces ttora mineinegt ,t he AneMedTsE oCf are not the scale I am focusing on here less than 20 yards. The same is true with nLeneeevsdsir-soL.nemtheanl ts. tFrirvoems tao cporroev iodfe m oannlyu ftahcet ubreesdt Louers s-Lceutshtaolm sterrisv es itno prtoovdiadye' so nlyc hthaen gbiensgt products , andto s ersvtircaetse gtoic mepeat rthne rns,e edAsL oSf however, and their use as a weapon is the use of rifles, although with a longer penrovdiruocntsm aendt. sFerrovmic eas ctoor em oefe tm tahneu nfaecetdusr eodf opuror vidceus sctomeprse heninsi vet soodlauyti'so ns cfhoar naglli nogf another article entirely. range, the effectiveness and accuracy opuror ducctus,s tomtoe rs strainte gicto dapya'rst nercsh, anAgiLnSg yenovuirr ontamcetincta.l ,F roompe ara ctioornea ol f manadn uftaracitnuirnegd penrovviriodnesm ceonmt. pFrreohmen as icvoer seo oluf tmioannsu ffoarc atullr eodf Fire as an incendiary device is at the are limited by the user’s expertise. A nperoedus.cts, to strategic partners, ALS yporoudr ucttasc, tictaol, ostprearteagtiiocn al paarntnde rst,r aiAniLnSg provides comprehensive solutions for all of base of my hierarchy because it is easy to long gun (hunting rifle) can be used for nperoevdisd.es comprehensive solutions for all of your tactical, operational and training obtain, easy to use, has a blanket range, sniping and necessitates great expertise your tactical, operational and training needs. and requires little or no planning. It is through training and practice in order to needs. the most basic of weapons. If an assailant be accurate where it’s meant to be used– one can find a match, they can carry long range, 250 to 1000 yards. out arson, destruction, and murder with Firearms are versatile in that they this most primitive weapon. If targeting allow for precision as well as a blanket one person, an assailant can be precise range depending on whether they are 1-850-223-4066 at close range. With a rag, a glass bottle, automatic (continuous fire) or semi- www.LessLethal.com and a common accelerant like gasoline, automatic (fires one round at a time). an assailant can build the unsophisticated One assailant can easily carry out a 1-850-223-4066 incendiary device popularly known successful firearm attack. w1w-8w5.L0e-s2sL2e3t-h4al0.c6o6m as a “Molotov Cocktail.” It only takes There is a short learning curve for w1w-8w5.L0e-s2sL2e3t-h4al0.c6o6m one assailant to weaponize fire using an operating a handgun, and user planning www.LessLethal.com incendiary device and carry out an attack. time can be as short as learning how to www.LessLethal.com load the weapon. Planning time can be FIREARMS as long as the assailant needs for honing Firearms, handguns, and small arms their expertise or planning the details and are weapons that are commonly available logistics of an attack. Of course, the more and some examples are revolvers, rifles, planning an assailant does, the more and automatic handguns. Handguns are lethal the attack will be. This goes for any relatively inexpensive; for the price of tactic or weaponry used. a flat screen television an assailant can purchase a handgun. Handguns are also EXPLOSIVES easily concealed, giving them the element The National Counterterrorism of surprise in an assault. They are legal to Center (NCTC) has a very good

Circle 91 on Reader Service Card

The Counter Terrorist ~ October/November 2015 39 Counterterrorism Calendar that is tri-acetone tri-peroxide (TATP). posted to their website (www.nctc. • “Mixtures with solid oxidizers, (e.g. gov). Along with profiles of terrorist perchlorates and ammonium nitrate.)” groups and dates of terrorist incidents In this combination, ammonium worldwide, the NCTC includes a nitrate plus fuel oil yields ANFO. practical list of “Common Explosives— • “Mono-molecular mixtures, (e.g. urea Identification and Characteristics.” The nitrate, TATP, petric acids.)” In this explosives on this list are broken into combination, hydrogen peroxide can three categories: Military/Commercial, become tri-peroxide, the other half of Primary Explosive Booster, and tri-acetone tri-peroxide (TATP). Secondary Explosive/Main Charge. • “Nitrogen based explosives, (e.g. nitro Examples of military or industrial grade glycerin, EGDN, and methyl nitrate.)” explosives are Trinitrotoluene (TNT), In this combination, urea nitrate which is used in mining and industrial explosive is dissolved urea fertilizer plus operations; Tovex, a more stable version nitric acid. of dynamite in a liquid gel formula; and While the names given to these cyclotrimethylene trinitramine (RDX). HMEs reads like Chemistry 101, the Even though these explosives cannot combination information is my attempt be purchased at a local gun store, they to remove the glaze from your eyes. can be easily acquired by theft from an HMEs can be built out of common industrial worksite as domestic terrorist household and farming chemicals by and mass murderer Timothy McVeigh literate, determined assailants. If assailants did prior to the Oklahoma City Bombing lacks those skills, they can always opt to in 1995. Some education or expertise is steal industrial grade explosives rather be needed to make this type of explosive than mix their own. device, but it can most certainly be done An IED can use either commercial by those who are determined with know- explosives or HME. Some examples how, and the Internet. include, grenade, pipe bombs, pressure While NCTC lists two other cookers, people, bicycles, mail, and categories, I will be focus on Homemade vehicles or model aircraft. The options are Explosives (HME) and Improvised limited only by the assailant’s creativity Explosive Devices (IED). In 2008, the and expertise. Department of Homeland Security’s Detonation of the device can be (DHS) Science and Technology simple, such as a device that is command Directorate produced a document titled detonated by the assailant. Detonation “Homemade Explosives (HME) Program can also be more complex, such as a Overview.” The following HME’s were device that uses a timer, remote control or listed under the section “Taxonomy of physical or infrared activation. Current Threat”: In spite the ease with which the • “Liquid hydrogen peroxide/fuel components for HMEs can be obtained, formulations (HP/F)—(e.g. hydrogen other explosives are more commonly used. peroxide with various fuels)” In this According to information from the Bomb combination, hydrogen peroxide can Arson Tracking System, (BATS), the most become tri-peroxide, the other half of common explosive used are black powder,

40 The Counter Terrorist ~ October/November 2015 FOR A LIMITED TIME, THE Take your HOMELAND SECURITY NETWORK , the most valued and reliable resource education to a for Homeland Security professionals is available for FREE to criminal justice and higher level: homeland security students.

Education: Opportunities to Jobs: learn through film, Search for jobs webinars, and when it is time to expert postings. start your career and develop relationships with professionals that can help. Blogs: Blogs and feeds concentrated in one site to keep a pulse Mentoring: on what hands-on The ability to professionals are network with talking about. more than 6000 professional Homeland Security First Responders Giveaways that can help to mentor you & Gear: through your study. Participate in groups and discussions and be entered for prizes exceeding $10,000, weekly raffles, IT’S free giveaways, FREE! groupon-style The professional offers from resource in manufacturers and Homeland much more. Security, now in its 4th year, is available at no cost to students Get a FREE for a limited time. Subscription See below to find A $40 value. out how you can benefit from all the resources available to take your education to a higher level!

To take advantage of this opportunity, visit: www.homelandsecuritynet.com Homeland Security and then call Henry Morgenstern on 305-401-6906. H NETWORK Circle 19 on Reader Service Card The Counter Terrorist ~ October/November 2015 41 smokeless powder, and fireworks powders. including arson fires and a private plane.” gunman attacks described in the SPLC The most common explosive device in the It comes as no surprise that the report also fit directly into the Target U.S. is the pipe bomb. majority of attackers (mostly lone Hierarchy. The majority of attacks were gunmen) used firearms. For reasons on soft targets, with a smaller proportion PART III explained in my Tactic/Weaponry on hardened soft targets and only one TRENDS Hierarchy, firearms are relatively attack on a hard target, which was carried In February 2015, the Southern affordable, easy to obtain, easy to use, out by an insider. Poverty Law Center (SPLC) published require little to no time to plan an attack, Based on these statistics, the obvious a major study entitled “The Rise of and there are a large number of targets. trend is lone gunman plus firearm plus the Lone Wolf.” The study is a well- SPLC included the actual incidents soft target. But is this combination researched report with information and they based their study on in the report, really a trend, or does it just confirm statistics taken from the University of and I looked at them to see if they could what we already know? I don’t think Maryland’s Global Terrorism Database, yield any other useful information. I it’s a new trend in domestic terrorism. among other credible sources. The study found that of the 61 incidents where the The only thing new about these attacks covers a time span of 6 years, from April weapon used was known, 46 of them are the names of the groups or causes 1, 2009, to February 1, 2015. (I do were actually carried out and 17 of them carrying them out. They may be on the not use the term “lone wolf” because were disrupted by law enforcement. lower rungs of the Target Hierarchy and it was a term devised by a narcissistic Compared to the 46 incidents that Tactic/Weaponry Hierarchy today, but white supremacist. I use the term occurred, 17 may seem like a relatively they can only go up from there. It’s the lone gunman: 1 shooter, unassisted; a small number. It is, however 17 more logical progression. • gunman; alone-no wolf.) than 0. And it means we never had to SPLC researched incidents considered hear about how many innocent men, ABOUT THE AUTHOR acts of terrorism as defined by law women and children were murdered, or Karen is a former Intelligence Officer enforcement: incidents classified as how many first responders lost their lives for the United States Secret Service. domestic terrorism and violent incidents trying to save them. In the USSS’s Foreign Assessment and that “occurred when authorities I also found that of the 46 incidents Counterterrorism Branch (FAB), her confronted volatile political extremists.” that actually occurred, 35 of them (76%) area of concentration was the Middle According to the study, “the regularity were carried out by lone gunmen, which East (ME), Counterterrorism Section of major violence or planned violence is very close to the original percentage (CTS) and the Critical Protective from domestic terrorists—one attack, on (74%) from all 63 incidents. However, Analysis Group (CPAG). Karen is a average, (occurred) every 34 days.” of those 35 lone gunman attacks, 27 of veteran of the U.S. Army and served as a The study examined 63 incidents them, or 77%, used firearms, a significant Signals Intelligence Analyst (SIGINT). “culled from academic databases and increase, nearly 20% greater than SPLC’s Currently, Karen is a doctoral student the SPLC’s own files, 46 of them—fully original value of 59%. at Florida State University in the 74%—were carried out by lone wolves, As previously examined, the reasons Department of Sport Management. Her unassisted by others.” Lone gunmen why the majority of these domestic concentration is in Sport Security. accounted for the majority of all attacks. terrorists used firearms is clear: they SPLC’s study also reported that “of the are inexpensive, easy to obtain, easy ACRONYMS 61 incidents where the weapon used is to operate, for even the least skilled ACW: Advanced Conventional known, 59% of attackers used firearms, assailant, and portable—because they Weapons while 25% used explosives, including are easy to carry and conceal. They also ANFO: Ammonium Nitrate Fuel Oil such jury-rigged bombs as propane tanks. require little preparation time and are AOP: Area of Operations Five percent (5%) used both firearms and accurate at close range. CPAG: Critical Protective Analysis explosives. And 11% used other weapons, The targets attacked in the 35 lone Group

42 The Counter Terrorist ~ October/November 2015 Tactical Tools to Achieve The Mission!

• Pelican® Brand 1740 case attached to custom hitch that inserts in standard two inch tow receiver. Adaptable to replace push plate on Bear® and Bearcat®. Textured powder coated black

• Custom Laser Cut Foam insert for all kit items

• 4 Carabiners rated for over 6,000 lbs. each

• Two 30 foot custom made “black” tow straps rated at over 10,000 lbs. tensile strength each

• Two custom made hooks extra open non-gated for easy insertion – textured powder coated black for non-slip grip

• Custom-made 39” long, 1” diameter rolled steel window spear with rounded ends, and 6 foot chain - textured powder coated black for non-slip grip

• Custom made elongated Thor hammer 12 pound custom head with 3 foot composite handle

Universal Mounting Options Available!

Call now for more information. Pricing dependent on quantity and delivery location. Call Solomon Bradman at: (305) 302-2790 or email [email protected] Circle 179 on Reader Service Card

Circle 179 on Reader Service Card The Counter Terrorist ~ October/November 2015 43 CTS: Counterterrorism Section Frequently Asked Questions, Congressional DHS: Department of Homeland Research Service, June 17, 2014, Security Shawn Reese. EGDN: Ethyl Glycol Dinitrate Federal Building and Facility Security, FAB: Foreign Assessment and Congressional Research Service, March 24, Counterterrorism Section 2010, Shawn Reese, Lorraine H. Tong. FBI: Federal Bureau of Investigation Vulnerability Assessment of Federal HME: Home Made Explosives Facilities report, U.S. Department of HP/F: Hydrogen Peroxide / Fuel Justice, U.S. Marshals Service, June 1995 IED: Improvised Explosive Device Global Terrorism Index 2014, Institute MANPADS: Man-Portable Air for Economics and Peace, www. Defense Systems visionofhumanity.org ME: Middle East Homemade Explosive (HME) Program NCTC: National Counterterrorism Overview, Homeland Security Science and Center Technology, Department of Homeland RDX: Cyclotrimethylene Trinitramine Security, undated, www.dtic.mil/ SIGINT: Signals Intelligence ndia/2008homest/char.pdf SPLC: Southern Poverty Law Center Age of the Wolf, A Study of the Rise SPORTSEC: Sport Security of Lone Wolf and Leaderless Resistance START: National Consortium for Terrorism, Southern Poverty Law Center the Study of Terrorism and Responses (SPLC), February 12, 2015, splcenter.org. to Terrorism (Going by GTD now: The National Counterterrorism Center Global Terrorism Database) Counterterrorism 2015 Calendar, Common TATP: Tri-acetone Tri-peroxide Explosives and Characteristics, page 139, TNT: Trinitrotoluene nctc.gov. USMS: United States Marshals Service Bomb Arson Tracking System, (BATS), U.S. Bomb Data Center, www.bats.gov/ REFERENCES batsnet/ Circle 97 on Reader Service Card Federal Building and Facility Security: Miriam Webster’s Dictionary

44 The Counter Terrorist ~ October/November 2015 Circle 241 on Reader Service Card Best Location in Orlando – The Florida Journal for Law Enforcement, Intelligence Hotel and The & Special Operations Professionals Conference Center What a fantastic hotel. Rooms Counter were nicely appointed, the staff was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall presents: attached to the hotel. –Top rated by TripAdvisor 10th Annual HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION November 3-4, 2015 • Orlando, Florida We sold out in 2014. Get your registration in as soon as possible: • Best speakers in Homeland Security • Premiere opportunity to network with your peers in US Homeland Security and across the Globe • Attended by more than 100 Federal, State and Local agencies • Selected Vendor expo of the latest in HS Technologies This year’s The Counter Terrorist Magazine Annual Homeland Security Professionals conference will celebrate its first decade. This will be a highly publicized event throughout the country and abroad. REGISTER NOW

REGISTRATION COST $399.00 *Government and group rates available. Call us for details.

LEARN MORE at: www.thecounterterroristmag.com/conference Call now for more information. Phone: 866-573-3999 180 Fax: 866-573-2090 Circle on Reader Service [email protected] Circle 177 on Reader Service Card The Counter Terrorist ~ October/November 2015 45 BOOK REVIEW Cycle of Fear: Syria’s Alawites in War and Peace by Leon T. Goldsmith Reviewed by the Counter Terrorist Hurst and Company, London 2015 Magazine’s Editorial staff

ith the Syrian Conflict many of unknown tribal affiliation. dominating the news Indeed much of the support derived by Wrecently due to the flood of refugees that Asad’s Baathist party has come from a are swarming Europe, it seems like a good more secular element in the sect. They idea to understand this costly civil war a are not Shi’a but a break-away sect little better through understanding the from within the Twelver Shi’a Islam. Alawites, the Muslim religious sect that Their main point of difference is their through the family of Asad, has ruled elevation of the fourth caliph Ali ibn Syria since the 12th of March, 1971. Abi Talib and his descendants to near In March, of 2011, some 40 years divine status. The beliefs of the Alawite later, anti-government demonstrations incorporate Christianity and Paganism broke out that would lead to an estimated and they are liberal in the role of religion 250,000 - 300,000 Syrians killed in in their daily lives. Alcohol is permitted the conflict, with fully half the Syrian and women are not required to cover population being displaced either within their heads and can freely associate in Syria or spread into Turkey, Lebanon and public. Because they view their religious beyond. Now, that huge refugee swell commitment as a personal one, they is threatening Europe. The savagery of In 1305, Ibn-Taymiyya declared the are not required to attend the Mosque. the fighting, including Bashar Al-Asad’s sect heretics and enemies of Islam, a Needless to say, these attitudes have not use of Chemical weapons against his status the caused them to be persecuted, endeared them, not to the Shi’a where own population, has never raised any and contributed as other factors to the they are accused of being “extremists”. protests at Berkeley, Columbia, The feelings of solidarity in this very rural According to Goldstein, the revolt London School of Economics or other mountain tribe. The cycle of fear created that threatened to bring down the Liberal bastions of Academia. So fond of by these prosecutions gave rise to their Government in 2011 threatened the protesting when the Israelis, in defending tendency to be supportive of the Asad social and political order which had been themselves, hit a few Palestinians. So regime way past the point where it served favorable to them, and threatened once who are these Teflon Alawite’s that have their tribal interest. During the regime, again to make them, as they had been the backing of Iran and Russia, and who the tribe became the foremost element in for their 1100 year history, persecuted are demonized by the Sunni Muslim governing Syria. violently again. insurgency in Syria and Iraq and of The group cross-cuts the identities of To support their rise to power under course ISIS? How relevant is the Alawite Muslims, Shi’ites, Arabs, and Syrians Asad, the sect turned a blind eye to the sect to the Asad regime? (by no means are the last two the same). regime’s repression. It was a repression Alawites are a product of the great 4 main tribes: Khaytin, Kalbiyya, made necessary by the opposition. The divide between Sunni and Shia Islam. Haddadin and Matawira and there are Muslim Brotherhood, so active here in

46 The Counter Terrorist ~ October/November 2015 the USA, challenged the Government’s does have something to do with the It is highly recommended that secular constitution and economic Alawite’s. These rough mountain men, the current managers of our Foreign dissatisfaction among Sunni merchants. considered “hillbillies” by the Sunni Policy read books like this so that they The Brotherhood resorted to Majority in Syria have played a key can understand that in the Middle assassinations, a very well-known role in the stability and since that time, East there is nothing we recognize as Brotherhood tactic (think Sadat). equally, the destruction of Syria. democratic impetus outside of Israel. This resulted in brutal repression by But the book further underscores how Rather there are forces that have been Asad’s Brother Rifaat, that meant 6000 our US “religious” zeal in supporting created over more than a thousand years imprisoned and 30 executed. As fighting what appears, but rarely is, an that create solidarities that have nothing between Asad and his brother eventually outpouring of “democratic” aspirations to do with Democratic parties. And a led to the alliance with Iran. In 2000, his leads us into quagmires. There was no better reading of these forces, like the son Bashar was taken from his studies need to topple Hosni Mubarak, and Alawites, may make the moves we make as an optometrist and catapulted into a it certainly served to encourage the less damaging and more productive for dynastic succession which his father had Muslim Brotherhood opposition to our own interests. • assured by stocking the military with Asad. Given the nature of the regime; loyalists and ruthlessly eliminating any the usual suspects, corruption, brutal potential source of conflict to the Dynasty. repression, dynastic succession and The resulting decline of the rulers complete control of the power of the culminating in the revolution which State, these may indeed be a more began with the protests of 2011, shows palatable option in the Middle East than how complex the ruling situation in the forces that come to replace them like these countries really is. The interplay ISIS or in the case of Egypt, Morsi and between Iran and Russia with the regime the Brotherhood.

Circle 277 on Reader Service Card The Counter Terrorist ~ October/November 2015 47 THE CHAPLAIN AS FIRST RESPONDER

48 The Counter Terrorist ~ October/November 2015 by William A. Gralnick, BA, MA, DHL

Law Enforcement Chaplains are called on to play many roles. Their ministry, according to the International Conference of Police Chaplains, is a “ministry of presence.” And they are present in many different ways.

n some departments, the role is Beach County Sheriff’s Office (PBSO) chaplains don vests and do ride alongs. primarily ceremonial. The chaplain chaplain married two PBSO deputies The rationale comes from the old Iis seen giving invocations and to each other. Chaplains do baptisms proverb that you can’t know a man until benedictions at all manner of functions, and funerals. In many departments in you’ve walked a mile in his shoes. It is from banquets to departmental the Midwest, chaplains do an annual only through experience that a chaplain funerals. Chaplains often perform life blessing of the crops and of the animals. can feel the roller-coaster ride of a shift cycle events for sworn and non-sworn In a small west coast of Florida City, the and what that ride, day in and day out, employees of their departments who chaplain blesses the fishing fleet. can do to an officer and by extension are “unchurched.” Last year, a Palm In more and more departments, his or her family. Other than the

The Counter Terrorist ~ October/November 2015 49 New York, NY, September 30, 2001— A Chaplain is on hand at Ground Zero. Photo by Andrea Booher/ FEMA News military, law enforcement is the only job our chaplains, “If you’re talking… the social media are electronic means of where the morning kiss goodbye could deputy can’t.” continuing that presence so essential to potentially not be followed by an end Technology provides chaplains with the chaplain’s ministry. of shift kiss hello. The car also provides ever-increasing ways to “reach out and More departments, like this one, are the best “office” for spiritual counseling touch someone,” aside from dropping assigning chaplains to the more high- during a slow shift or after an intense in to the district and “schmoozing.” stress “specialty units.” This is not for encounter on the street. As we train Phone calls, emails, texts, and every chaplain, and frankly it takes a

50 The Counter Terrorist ~ October/November 2015 Photo by: Elvert Xavier Barnes Photography

lot longer for these “brotherhoods” to be accepting of a chaplain. PBSO staffs K-9, Homicide, TAC Gang Task Force, Marine, and Aviation. So as law Chaplain (Maj.) Jack Stanley, 422nd Air Base Group chaplain, runs along the perimeter enforcement has evolved, so has the role road at RAF Croughton, England, May 11, 2015, during a ruck march in honor of of the chaplain, a role first recognized in National Police Week. The event was held to honor law enforcement officers who have this country by the military in 1787! given their lives in the line of duty. Photo by: Staff Sgt. Jarad A. Denton

The Counter Terrorist ~ October/November 2015 51 American Airlines Flight 587 crash site. Photo by: NOAA

There is one glaring omission in most chaplaincies’ use: the natural or man- caused disaster. Disasters include acts of terrorism, domestic and foreign. As some departments like NYPD and the FBI have learned, who better to serve those traumatized but uninjured and who better to serve those injured waiting for triage than the chaplain? This lesson was learned during the aftermath of 9/11. As recounted by Fr. Paul Wierichs, there was a chaplain’s command post; it also dealt with the grief of the chaplains when they lost one of their own. Then came the plane crash of American Airlines Flight 587 in Queens at Long Island Sound. The second-worst domestic airlines crash in the U.S., it killed 280 Recovery of the American Airlines Flight 587 vertical stabilizer. Photo by: NTSB people on the plane and five more on the ground. Fear and anxiety ran rampant. Was it another act of terrorism? Or was it just another terrible tragedy? Either way, said Fr. Wierichs, the days ran into nights and night ran into days as chaplains played the hand that fate dealt them, many still in deep shock and great fatigue from 9/11.

52 The Counter Terrorist ~ October/November 2015 Active shooter Scenario

GAIN THE TACTICAL ADVANTAGE IN ACTIVE THREAT MANAGEMENT

Adapt to unpredictable and quickly evolving situations with our dynamic, expandable, full- mission profile training solution designed to take force-on-force, training to new levels of realism. Simulated gunfire, IEDs, smoke, noise and our industry-leading Tactical Operations Medical Manikin™ create a memorable training experience with realistic Photo by: West Midlands Police GSW injuries and hemorrhaging that allow for seamless integration into ALERRT & ASTTP programs. This was definitely not a time for On host, bringing together chaplains from Simultaneously control up to the Job Training. It is one thing to detail around the area for training. The rationale four units in your scenario with chaplains to a disaster scene; it is totally was simple. All one has had to do is look the hand-held remote, each unit customized with up to 250,000 another to have them prepared for what at a hurricane brewing off shore and possible wound they are going to face. This is the issue measure it against the areas it is likely to combinations, recently faced by the Palm Beach County hit and one sees the enormous swath of making TOMManikin™ Sheriff’s Office when it was chosen to be territory likely to be affected. Nor does the most the “faith-based” representative during it have to hit to raise anxiety levels that effective scenario disasters for the Red Cross/FEMA cause accidents from distracted driving, training manikin available today. disaster teams. While PBSO has by far fights on lines cued up for all manner of the largest chaplaincy in South Florida, necessities that should have been bought *RENTAL AND LEASE OPTIONS currently 35 with an allocation of 45, and stocked months before, and a host of AVAILABLE! it was quickly predetermined that its other actions that likely would result in FOR MORE INFORMATION, CONTACT: chaplaincy unit would act in part as a call outs. 1.866.839.3455

Circle 99 on Reader Service Card The Counter Terrorist ~ October/November 2015 53 Army Col. Jacob Goldstein, a Jewish chaplain visiting the Joint Task Force Guantanamo. Photo by: Navy Petty Officer 2nd Class Jayme Pastoric

So comes the training. Chaplains The intent is to invite from around the region, with the chaplains to a variety cooperation of the International Conference of Police Chaplains, came of different exercises: together at the PBSO training center tabletops at the Ops to spend three hours with Red Cross trainers. The academics of disaster relief Center, active shooter were covered: there were videos for trainings, and even discussion and even CPR training in the latest technique, one which SWAT trainings. eliminates mouth-to-mouth breaths. Clearly this isn’t enough. The Unit has There is also history in the face of that reached out to the Emergency Operations reality that shows the pulling together Center and the HLS Security Bureau of of the counties to help one another. the SO. The intent is to invite chaplains Thus chaplains from one community, to a variety of different exercises: tabletops even if well trained, shouldn’t be the at the Ops Center, active shooter only chaplains used. They might know trainings, and even SWAT trainings. the issues, but they would not know the Over the top, you say? The idea is not communities and their personalities, to have chaplains just learn how such often invaluable insight in helping to things are handled; the primary goal is calm an individual or area. to expose them to chaos—screaming and

Circle 343 on Reader Service Card 54 The Counter Terrorist ~ October/November 2015 New and improved

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email [email protected] Or visit our website: www.SSIPVB.com 308 Circle on ReaderCircle Service 317 on Card Reader Service Card Circle 226 on Reader Service Card The Counter Terrorist ~ October/November 2015 55 yelling, hysteria, loud and sudden noises, ABOUT THE AUTHOR all in stewpot of seeming disorganization. William A. Gralnick has spent four “ To Protect and Serve ” Chaplains who participated in an active May mean many things, but we all decades in many volunteer capacities understand the “Ultimate Sacrifice”. shooter scenario at the Wellington Green with law enforcement, including Train to Superiority Mall were not observers. They were Educate to Excellence Johnstown, PA after the assassination assigned rolls to play. Equip to Survive (or do we?) of Dr. Martin Luther King, Jr; in Many agreed with one chaplain who Atlanta, GA during the infamous said, “It was amazing, overwhelming—I child murders; in Miami, FL in the never realized what large-scale chaos was “With a targeted attacks on the rise for providers” aftermath of the Overtown Riots; and as Don’t join the STATITICS! like and how loud it could be!” The first Saves Time, Saves Blood, Saves Lives an adjunct training officer in diversity time entering such a maelstrom shouldn’t #Self-Aid/Buddy-Aid and ethnicity for seven different South The life you save may be your own! be “the first time.” Training, just like for Florida jurisdictions, including the , is the answer. Do it enough times so PBC Sheriff’s Office. Currently in that when one is thrown into this storm a second career as a paid employee of sound and emotion, one’s training at PBSO, Gralnick was tasked with kicks in, not one’s “flight” mechanism. reshaping and modernizing its then- As Ronald Reagan used to intone for Professional Multi-Disciplined small chaplaincy, which he has tripled Medical/Tactical: GE, “Progress is our most important in size and embedded throughout Products product.” To have a well-used chaplaincy, Kits/Go Bags the agency. Training & Consulting progress needs to be made in training and

407-248-0883 • Fax: 407-363-1383 expanding its purview. The ceremonial [email protected] chaplain is no longer the chaplain needed advancedtraumaspecialties.com for the 21st century. • Circle 89 on Reader Service Card

LET US SHOWCASE YOUR

BARRIO AZTECA PRC’S DEEP PANDA • 18TH ST. K&R • TROJAN HORSE SCHOOL PLOT • PRODUCTS, SERVICES AND TRAINING Journal for Law Enforcement, Intelligence & Special Operations Professionals TO OUR FIRST RESPONDERS... MS-13 RECRUITMENT RESCUE IN IRAQ • ISIS WARLORD BAGHDADI • PUTIN’S RING OF STEEL • JUNE/JULY 2015 Journal for Law Enforcement, Intelligence & Special Operations Professionals WINN D IN The Counter Terrorist is a peer We are now committed to bring AR G The NTH YE W E A A V R E The VOLUME 8 • NUMBER 4 S DEC 2014/JAN 2015 Counter

journal, that is read in the USA valuable tools to the attention of

A TH E N U N S I S V 7 I and in ASIA by: our First Responders through: Counter ERSARY

VOLUME 7 • NUMBER 6 UNDERSTANDING • Police • Detailed Product Reviews THE GLOBAL JIHAD • Fire • Innovative Product launches EBOLA AND BIOLOGICAL • Emergency Management • International Resources WARFARE • Emergency Medicine • The Military • Special Forces Call Sol Bradman now at 305-302-2790

INTERNATIONAL EDITION or write him at [email protected]

® An SSI Publication thecounterterroristmag.com

JUNE/JULY 2015 Whether it’s the magazine, our online sites and e-blasts or USA/CANADA $5.99 INTERNATIONAL EDITION our annual conference...he’ll help you reach your audience! An SSI ® Publication www.thecounterterroristmag.com Contact us today at: DECEMBER 2014/JANUARY 2015 USA/CANADA $5.99 www.homelandsecurityssi.com The Counter Terrorist ~ December 2014/January 2015 1 CounterThe ★ Homeland Security Professionals Conference and Exposition

56 The Counter Terrorist ~ October/November 2015 Circle 33 on Reader Service Card MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY TM MACTAC The Newest, Most Dynamic Training Program from SSI ®.

MACTAC is the new tactical philosophy offering your department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks. Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course Next training in Perry, FL November 17–20, 2015

Contact us today at: www.homelandsecurityssi.com Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 228 on Reader Service Card

The Counter Terrorist ~ October/November 2015 57 58 The Counter Terrorist ~ October/November 2015 by John Cassara

INTERNATIONAL TRADE TRANSPARENCY: “THE NEXT FRONTIER”

Shortly after the September 11 terrorist attacks, I had a conversation with a Pakistani businessman involved with the underworld of crime. He was involved in the gray markets of South Asia and the Middle East.

e said, “Mr. John, don’t you laundering” (TBML) and the transfer use trade-based value transfer. H know that the criminals and of “value” via commodities and trade The magnitude of TBML is difficult the terrorists are moving money and goods. In addition to customs fraud, to quantify and has never been transferring value right under your noses? trade-based value transfer is often used systematically examined. However, the But the West doesn’t see it. Your enemies to provide “counter-valuation,” or a way Financial Action Task Force (FATF), an are laughing at you.” of balancing the books in many global inter-governmental body that sets global The Pakistani businessman was underground financial systems such as anti-money laundering standards, believes referring to various forms of what hawala/hundi. Criminal organizations TBML is one of the three principal we loosely call “trade-based money and those that finance terror sometimes categories of money laundering.

The Counter Terrorist ~ October/November 2015 59 According to the U.S. State and/or the value of goods is Department, TBML has reached misrepresented. Sometimes this is done “staggering” proportions in recent years. to facilitate simple customs fraud—i.e., It is found in every country but remains minimizing the payment of taxes and virtually unrecognizable. duties. In most jurisdictions, customs The rapid expansion of worldwide fraud is a predicate offense for money trade increases the possibilities for TBML. laundering. However, often invoice fraud Today, total annual global merchandise is part of value transfer. As Raymond trade is in the tens of trillions of dollars. Baker, the Director of Global Financial Money laundering in international Integrity (GFI), said, “Anything that trade works just as in traditional money can be priced can be mispriced and false laundering via financial institutions, in pricing is done every day…” which criminals “mix” or “co-mingle” illicit money with licit money. However, INVOICE MANIPULATION the large volume of international trade AND VALUE TRANSFER masks the occasional suspect transfer. MADE SIMPLE: The FATF defines TBML as “the To move money out: process of disguising the proceeds of • Import goods at overvalued prices or crime and moving value through the use export goods at undervalued prices of trade transactions in an attempt to To move money in: legitimize their illicit origins.” • Import goods at undervalued prices or The key word in the definition is export goods at overvalued prices value, particularly because it is getting The illustration below1 shows the increasingly difficult to define currency. fluctuating value associated with Most forms of TBML revolve around thousands of refrigerators exported from invoice fraud and manipulation. the United States (light color) to Country Generally speaking, “invoice fraud” X (dark color). Official trade data from means that the contents, description, both sides was matched and compared.

10 MILLION

9 MILLION

8 MILLION

7 MILLION

6 MILLION

5 MILLION

4 MILLION

3 MILLION

2 MILLION

1 MILLION FEB FEB SEP SEP APR APR JAN JAN JULY JULY DEC DEC OCT OCT MAY MAY MAR MAR AUG AUG NOV NOV JUNE JUNE

60 The Counter Terrorist ~ October/November 2015 Photo by: Andrzej Barabasz The Counter Terrorist ~ October/November 2015 61 With some recognized variables, the $341,086,166,561 was moved into the declared export price should equal the United States! That figure represents declared import price. The difference 8.87% of U.S. trade in 2013.2 complimentary between the two ranges of peaks and the The numbers are jaw dropping. subscription valleys—the two colors shown on the They are particularly telling because in www.tacticaldefensemedia.com graph—represents the transfer of value my opinion the U.S. has the best and Scan the code to sign up now! in the form of refrigerators. In this case, most robust customs enforcement in value transfer also masked the proceeds the world. If this much money/value is of narcotics trafficking. being purloined every year due primarily Dr. John Zdanowicz, an academic to trade fraud, what is going on in the and early pioneer in the field of rest of the world? TBML, examined 2013 U.S. trade data GFI has done considerable work in obtained from the U.S. Census Bureau. examining trade misinvoicing, which By examining undervalued exports is a method for moving money illicitly ($124,116,420,714) and overvalued across borders that involves deliberately imports ($94,796,135,280) similar to misreporting the value of a commercial TDM PUBLICATIONS what is described above, Dr. Zdanowicz transaction on an invoice and other found that $218,912,555,994 was documents submitted to customs. A moved out of the United States form of trade-based money laundering, in the form of value transfer! That trade misinvoicing is the largest figure represents 5.69% of U.S. component of illicit financial outflows trade. Examining overvalued exports measured by GFI. After examining trade ($68,332,594,940) and undervalued data covering developing countries, GFI imports ($272,753,571,621), concluded that a record $991.2 billion Dr. Zdanowicz calculates that was siphoned from those countries in 2012 via trade misinvoicing!3 Of course, much of this hemorrhage of capital originates from crime, corruption, fraud, and tax evasion. An additional concern is that for …Dr. Zdanowicz the most part value transfer schemes avoid countries’ financial intelligence found that reporting requirements; compliance $218,912,555,994 with these requirements is one of the key FATF recommendations and the was moved out cornerstone of almost every country’s of the United anti-money laundering and counter terrorist finance countermeasures. And States in the form thus far, for the most part banks have DOUBLE ISSUE of value transfer! been reluctant to incorporate anti- money laundering/counter terrorist finance (AML/CFT) safeguards into their trade finance programs. Because of the sheer volume of international trade, physical scrutiny of trade items is impossible—a fact taken advantage of by criminals and tax cheats

Circle 141 on Reader Service Card 62 The Counter Terrorist ~ October/November 2015 Circle 279 on Reader Service Card The Counter Terrorist ~ October/November 2015 63 Cyber Security for

PROACTIVE STRATEGIES FOR MANAGING CYBER VULNERABILITIES DECEMBER 9 – 11, 2015 | WASHINGTON, D.C.

WHAT WILL BE COVERED? 3 Meeting Persistent, Evolving Challenges with Effective Cyber Security Strategies 3 Building a Culture of Security to Com- bat Human Factors 3 Inspiring and Training the Next Cyber Security Leaders 3 Moving Towards Greater Unity of Effort for Government Cyber Security Pre- paredness 3 Proactive Cyber Security Initiatives for Critical Infrastructure 3 Thought Leading Panel: “Tech Talk” to “Policy Speak” Translation to Cultivate a National Posture on Cyber Security A 1951 hundi of Bombay Province for Rs 2500 with a pre-printed revenue stamp. NO COST TO ALL ACTIVE Photo by: British Government GOVERNMENT AND MILITARY PERSONNEL

www.CyberSecurityGovernment.com around the world. In the United States, differences in terminology, most such 113 Circle on Reader Service Card approximately 20 million containers systems are adept at clandestinely enter the country every year. Maritime transferring money from one location to commerce alone is expected to triple another without physically moving it. by 2020.4 Approximately five percent Multi-hundreds of billions of dollars are of inbound containers are physically transferred via IVTS every year. Most inspected and about two percent of these transfers are benign and used outbound. Vehicular and airborne primarily for immigrants’ remittances. cargo is also worrisome. The situation Unfortunately, their veiled nature also is far worse in most other countries. makes them attractive to criminals and December 7-9, 2015 | Washington, D.C. And in some jurisdictions, the lack sometimes terrorists. The common RELIABILITY, ECONOMY, AND ENDURANCE of customs inspection and control denominator is that, historically and WHY ATTEND UNMANNED MARITIME SYSTEMS? is facilitated by corruption. So not culturally, IVTS use trade as the primary 3 Hear from key thought leaders only is TBML a concern, but so are means of providing “counter-valuation,” in Unmanned Maritime Systems, including the latest requirements the associated threats of smuggling, or a means of balancing the books for Surface and Undersea systems corruption, and proliferation. between brokers. 3 Gain invaluable access to military Globalization has led to increased Other subsets of suspect trade-based stakeholders as they develop and refine requirements surrounding scrutiny of underground financial value transfer include international unmanned maritime vehicle systems such as hawala, hundi, fei-chein, barter trade, trade diversion, abusive programs including updates and shortfalls in existing systems padala, black market peso exchanges, transfer pricing to low tax jurisdictions,

3 Receive a holistic perspective on and others. These are sometimes known VAT, drawback, carousel fraud, next-generation technology by as alternative remittance systems, parallel commodity-based capital flight, etc. attending workshop day banking, or informal value transfer So what can be done? 3 Understand UMS technology gaps, training challenges, lessons systems (IVTS). Most are regional, Trade transparency is the single best learned, and future needs cultural, and ethnic based. Despite measure to detect trade-based money

www.UnmannedMaritimeSystems.com

Circle 115 on Reader Service Card 64 The Counter Terrorist ~ October/November 2015 Circle 249 on Reader Service Card The optic of choice for military and law enforcement professionals.

Available at

Call 877 535-8774, email [email protected] or build an RFQ at agency.tssi-ops.com.

Circle 249 on Reader Service Card The Counter Terrorist ~ October/November 2015 65 laundering and associated financial money laundering and counter terrorist crimes. It is something that every finance enforcement. • government and legitimate industry and trader should welcome. Fortunately, ABOUT THE AUTHOR with modern advances in data and John Cassara is a former U.S. analytics, trade transparency is now intelligence officer and Treasury Special technically feasible. Agent. He has developed expertise in All countries track what comes in and various AML/CFT issues including what goes out for security, statistical, trade-based money laundering and and revenue purposes. So by examining underground finance. He is a consultant and comparing one country’s targeted for government and industry. Mr. exports with the corresponding trading Cassara has authored several articles partner’s record of imports, it is a fairly and books. His latest is Trade-Based straightforward process to spot anomalies. Money Laundering: The Next Frontier Some trade irregularities can be easily in International Money Laundering dismissed as numerical outliers, but Enforcement (Wiley, November, 2015). sometimes anomalies can be indicative of www.JohnCassara.com customs fraud, tax evasion, value transfer, TBML, or perhaps even underground ENDNOTES financial systems such as hawala. 1John Cassara and Avi Jorisch, On In 2004, the United States adopted the Trail of Terror Finance, Red Cell a proposal I advanced and created the Intelligence Group, 2010, p. 63. world’s first trade transparency unit 2Analysis given to the author by Dr. (TTU). It is located within Homeland John Zdanowicz via June 30, 2015, Security Investigations. Since that email. time, about a dozen other countries 3Clark Gascoigne, “New Study: Crime, have established similar units. The Corruption, Tax Evasion Drained a creation of TTUs has simultaneously Record US $991.2bn in Illicit Financial overlapped with exponential advances Flows from Developing Economies in big data and advanced analytics. in 2012,” Global Financial Integrity, Overlaying financial intelligence, law December 15, 2014. Retrieved from enforcement and customs data, travel http://www.gfintegrity.org/press-release/ data, commercial records, etc. further new-study-crime-corruption-tax-evasion- increases transparency and facilitates drained-a-record-us991-2-billion-in- more precise targeting.5 And via illicit-financial-flows-from-developing- customs-to-customs agreements, TTUs economies-in-2012/. are able to exchange specific information 4Container Security Initiative, Customs about suspect transactions. and Border Protection, 2006 – 2011 In addition to being an innovative Strategic Plan. Retrieved from http://epic. countermeasure to TBML and value org/privacy/surveillance/spotlight/1006/ transfer, systematically cracking down csiplan.pdf. on trade-fraud is a revenue enhancer for 5For additional information, the HIS/ participating governments. Frankly, it is ICE Trade Transparency Unit (TTU) for this reason that many countries have program is described online at http:// expressed interest in the concept. www.ice.gov/trade-transparency/. I believe trade transparency is the “next frontier” in international

Circle 143 on Reader Service Card 66 The Counter Terrorist ~ October/November 2015 Circle 301 on Reader Service Card Circle 301 onon ReaderReader ServiceService CardCard The Counter Terrorist ~ October/November 2015 67 Innovative Products

WHITE HORSE RESEARCH AND PLATESMART HD ENGINE DEVELOPMENT Soon to be introduced in all PlateSmart White Horse Research and Development produces Advanced ALPR solutions, our new High Composites Solutions, Ballistic Defense Applications, Blast Mitigation Definition (HD) engine enables greater and Fragmentation Protection. flexibility in your video surveillance Cost effective, state of the art six years running. Diversified go- system. With PlateSmart’s HD engine, to-market applications for Military, security, Law Enforcement and multiple license plates can be captured commercial use. and read even from a wide-angle view, Off the shelf products: Boss Box (weapons release systems); Close which means that you can have more Quarter Trainer Targets (CQT) ricochet safe up to 5 feet; Bomb complete area coverage and still perform Containment Unit (BCU) pipe bomb fragmentation containment and ALPR operations with a single camera. blast redirecion. This results in a reduction in footprint Just-In-Time made to order products: 50 caliber armor piercing, and cost currently unavailable in any multi hit Fighting Positions (guard posts, safe rooms, in theater other ALPR solution. High Definition protection, exterior walls in high action locations); Blast Mitigation ALPR will soon be available in ARES, (exterior walls of high targeted buildings); Threat Vehicle Targets PlateSmart’s enterprise fixed-location (TVTs) – custom made for the Military – full size enemy targets set ALPR-based video analytics suite. on training bases for accrete instrumentation reading and firing. ARES’ real-time analytic data provides Commercial Use: Tank or Vessel leak prevention and protection unparalleled situational awareness and (Self-Sealing coating can protect against nuisance acts; Contaminated is the best tool available for Enhanced Waste Containment (nuclear barrels, meth waste containment). Force Protection. Give your key assets whitehorserd.com the extra level of protection they need with PlateSmart ALPR-based video analytics solutions. www.platesmart.com

LEWIS MACHINE & TOOL For 35 years, LMT has been designing and manufacturing The laser features a battery life of over 12 hours and can use 123 quality weapons without compromises. LMT is proud to expand or AA batteries with no modifications and has a salt water depth that product line to include Precision Aiming Lasers. The latest down to 30 meters. This makes the LMT Precision Aiming Laser offset Infra-red aimer is offset aimer with an ultra-compact the lightest IR aimer with the longest battery life and deepest lightweight design. The aimer features and tightly focused underwater capacity. precision beam profile with precise windage and elevation dials. lmtdefense.com

68 The Counter Terrorist ~ October/November 2015 VIDEO ANALYTICS THE WORLD’S MOST SOPHISTICATED SENSING DEVICE Video Analytics solve a long-standing surveillance challenge. Traditional cameras (the old way of doing things) rely on human beings to be flawlessly vigilant and this is simply an unrealistic expectation, particularly when you consider the number of cameras being monitored. Today it is typical that the current cameras serve the community through an entirely forensic approach, should an incident actually occur. At Kent, we eliminate this problem. Our Video Analytics solutions use smart surveillance technology that allows cameras to analyze events as they happen and determine whether or not they constitute threats or merit further attention. If so, the system instantly logs the event and notifies the proper authorities to spring into action. Our Remote Guards can call upon the management team or local police force to react to the incident, as well as “Voice Down” the perpetrators in real-time The 4-channel encoder incorporates advanced, auto-adapting video analytics, a video server and video recording, all in a single device. It converts analog CCTV surveillance camera systems from forensic tools into proactive video surveillance and alarm verification solutions. • Easily add the encoder to existing analog cameras and DVRs and integrate with alarm panels • Remotely configure and manage all encoder devices from a convenient Web Portal • View video event clips, live streaming and recorded video from a convenient Web Portal • Send video alerts to smartphones, email addresses, or a remote monitoring service • Expand cloud-based system without requiring investment in servers or software www.kentsecurity.com

YAKTRAX™ Winter weather is unpredictable enough without having to worry about walking from point A to point B and making it in one piece. YakTrax™ Ice Traction Device for your shoes is the answer. It stretches over any footwear, from boots to jogging shoes, and stays in place. A grid of 360° steel coils gives you traction on ice and snow with hundreds of edges gripping any slick, icy surface, providing stability. Best of all they are so comfortable, you won’t even realize you are wearing them. Walk normally as you would on dry ground. Even World Cup Bobsledders wear YakTrax® to walk up the bobsled run. Stay safe and upright with YakTrax®. AVAILABLE AT: www.andax.com

The Counter Terrorist ~ October/November 2015 69 The OCTOBER/NOVEMBER 2015 Counter VOLUME 8 • NUMBER 5

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page Ad/Company • website and/or email...... RSN Number

2 Barrett Firearms Manufacturing • www.barrett.net...... 121 3 Fairleigh Dickinson University • www.fdu.edu/mas...... 10 4 Lewis Machine & Tool • www.lmtdefense.com...... 259 7 Surveilance One • www.survone.com...... 319 11 Group Espada LLC • www.groupespada.com...... 16 13 DeSantis Holster & Leathergoods • www.desantisholster.com...... 262 16 Resco Instruments • www.rescoinstruments.com...... 20 17 American Public University • www.amuonline.com/counter-terrorist...... 25 22 Occupational Health Dynamics • www.ohdusa.com...... 213 23 3rd Annual US/Canada Border Conference • www.beyond-border.com...... 103 24 Reconyx • www.reconyx.com...... 303 25 Police One • www.policeoneacademy.com...... 335 27 Asia Pacific Edition – The Counter Terrorist •[email protected] ...... 255 28 Field Forensics, Inc. • swww.fieldforensics.com...... 95 29 TSSI • www.TSSI-OPS.com...... 123 28 Prometheus Books • www.prometheusbooks.com...... 87 35 Combined Systems, Inc. • www.combinedsystems.com...... 93 12 Group Espada LLC • www.groupespada.com...... 18 39 AMTEC Less-Lethal Systems • www.lesslethal.com...... 91 41 Homeland Security Network • www.homelandsecuritynet.com...... 19 43 SSI Pull Kit • [email protected]...... 179 44 Counter Assault • www.counterassault.com...... 241 44 Hilomast LLC • www.hilomast.com...... 97 45 10th Annual Homeland Security Professionals Conference & Expo • www.terrorconference.com...... 177 47 Elite K9 • www.elitek9.com...... 277 56 Advanced Trauma Specialties • www.advancedtraumaspecialties.com...... 89 53 Innovative Tactical Training Solutions • www.4ITTS.com...... 99 54 Southern Police Equipment • www.southernpoliceequipment.com...... 343 55 SSI PVBs • www.ssipvb.com...... 226 56 The Counter Terrorist Magazine • [email protected]...... 33 57 MACTAC • www.homelandsecurityssi.com...... 228 62 Tactical Defense Media • www.tacticaldefensemedia.com...... 141 63 K9 Cop magazine • www.k9copmagazine.com...... 279 64 IDGA Cyber Security for Government • www.cybersecuritygovernment.com...... 113 64 IDGA Unmanned Maritime Systems • www.unmannedmaritimesystems.com...... 115 65 TSSI • agency.tssi-ops.com...... 249 66 TRU-SPEC • www.truspec.com...... 143 67 Patriot3 • www.patriot3.com...... 301 71 Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com...... 215 ADVERTISER INDEX ADVERTISER 75 Phantom Products Inc. • www.phantomlights.com...... 209

76 Broco • www.broco-rankin.com...... 198 70 The Counter Terrorist ~ October/November 2015 ® The Advanced Global

The experts on training in: Security Workshop in

Israelthe Homeland Security professionals best resource

Since 2005, SSI has taken Hezbollah - a threat as deadly as al-Qaeda - Learn about them in nearly 500 First Responders their own territory, along Israel’s northern border. to Israel and shown them Hostage Rescue - Discover how they go wrong. the basics of the Israel security concept. Hospital Response - Find out how Israel’s critical response hospitals Thanks in part to that handle surge and multi-casualty incidents. program, we are better able Israel Counter Terrorism units - Learn how they operate. to defend ourselves in the Israel National Police - National Academy; See how they train? United States. In response to demand, we are now Sensitive Installations - Participate in a day-long exercise and offering a once-in-a-lifetime training program in how to set up a complete security system. experience covering the Secret Israel Homeland Security Simulator - See how this works following advanced subjects: at a base south of Tel Aviv.

May 13–21 Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland 2016 Security Professional, a Security Professional, an EMS, or an EMT.

LEARN MORE at: www.homelandsecurityssi.com Call now for more information. 215 Circle on Reader Service Card Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 50 on Reader Service Card Circle 215 on Reader Service Card The Counter Terrorist ~ October/November 2015 71 TRAINING REVIEW USCG Port Security Skills Course by Garret Machine

he U.S. Coast Guard Port of the CG go through this training. the course and get our minds right. We Security Training Detachment or Similar toIn the Marines, in which spent the next few days in a classroom TPSU TRADET was is the USCG premier each member goes through Marine environment, learning the fundamentals training site for operational readiness, Combat Training (MCT) in order to of Tactical Combat Casualty Care, or maritime security training, and CT/ operate in a combat environment, and TCCC, discussing Chemical Biological Force Protection tactics techniques and Coastguardsmen should also have this Radiological and Nuclear defense, or procedures (TTP). Originally located ability. I firmly believe that this training CBRN, creating range cards, and the in Port Clinton, Ohio and tasked with like. We also had classes on the finer training the 8 PSUs, it now sits within points of land navigation, patrolling, the Special Missions Training Center and entry control points. The water side or SMTC in Camp Lejeune, NC (since of the operation has its own training 1998). The SMTC name came into courses and is separate from the shore being in 2002 and the training center side operations. was commissioned in 2003. This was After only a few days in the shortly after the USCG was transferred classroom and in crew-serviced weapons from the Department of Transportation familiarization, we were in the field to DHS and the scope of operations for the remainder of the course., Wwe expanded to USCG Maritime Safety learned how to set up a base camp, and Security Teams (MSST), as well as entry control points (ECP), guard other Deployable Special Forces (DSF) shifts, and did daily patrols which units within the CG and Navy/Marine included MOUT training and basic expeditionary forces. land navigation. During this course we Let me start by saying that I have had trained on the M240B 7.62mm machine the privilege of attending many training gun and M2HB .50 caliber machine courses related to the topics of physical gun. We had the opportunity to engage security and, security operations and targets out to 1000 meters and manage have managed security operations and should be included in CG basic training simulated malfunctions in a stress- PSD teams both here in the U.S. and and could even afford to be extended. induced environment on those weapon internationally in high risk environments. I was able to take this course on my systems, but you we weare expected to Like anyone in my position, I came with annual Active Duty for Training, or come with a basic knowledge of the an open mind and, of course, an internal AD-T. Iand if you are a reservist in M16 and other related field equipment knowledge set, which worked both for the CG (blue side), then this is a great from your our parent commands. The and against me. The course1 is 12 days opportunity for you to see a side of course culminated with a force-on-force in duration and open to anyone in the the guard (green side) few will likely scenario that involved multiple squads, CG, active duty or reserve. You do not experience and get some great hands-on flanking maneuvers, TCCC, CBRN, need to be a member of a Port Security real-world training in combat arms. and exfiltration. All of this is directly in Unit to attend, but PSU members do On Monday morning, on day one, line with the PSU fundamental mission get priority. http://www.uscg.mil/smtc/ andthe first classes we received was of being able to deploy anywhere in Training_PSU_Basic.asp were on combat mindset and the the world in 96 hours, set up security After taking the course, it is my importance of mental conditioning., operations within 24 hours, and sustain recommendation that every member Tthis was a great way to set the tone of itself for 30 days.

Photos courtesy of United States Coast Guard 72 The Counter Terrorist ~ October/November 2015 One of the nice things about PSU 1www.uscg.mil/smtc/Training_PSU_ distinguished himself by earning the Basic Skills Course (BSC), other than 3 Basic.asp Director of Homeland Security Award MREs a day, is the student-to-instructor for his performance at the Federal Law ratio and quality of subject matter experts ABOUT THE AUTHOR Enforcement Training Center (FLETC). they employ for each phase of training. Garret Machine served as a combat Machine has published two DVDs If there is one thing that will stick with soldier in the Duvdevan Unit of the on combat shooting (Pressure Makes me from PSU BSC, it is the diverse Israeli Defense Force, where he gained Diamonds) and a book on combat backgrounds that each person brought extensive combat experience from tactics (Israeli Security Concepts), both to the course, each with a different multiple operations in support of Israeli available on Amazon. perspective,, not only the students but counter terrorism and national security the instructor staff as well. My one objectives. Duvdevan is a counter terror recommendation to BSC is to extend the (CT) unit specializing in urban warfare, course a week so that graduates could hostage rescue, targeted assassinations, can benefit from full qualification in each and kidnapping of wanted militants subject matter (TCCC/CBRN/M240/ throughout the West Bank, Gaza Strip, M2HB), versusVS just “familiarization.”. and border nations. He was a firearms However, in just two weeks’ time, we tactics instructor in his unit and later actually started to look like a high-speed provided Personnel Security Detail (PSD) infantry element,; moving, shooting and for Ministry of Defense officials on high- communicating like it was all we did. • risk assignments. In 2012, Machine NOTE: Information contained in this joined the ranks of TACLET, the SOF article is available through public search. component of the USCG, and further

The Counter Terrorist ~ October/November 2015 73 SubscribeSubscribe Today!Today!

I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address)

SUBSCRIPTION INFORMATION (please print clearly)

NAME______ADDRESS______CITY______STATE______ZIP______EMAIL______q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.)

Name on Card______Card #______

Exp. Date______Billing Address______FREE MEMBERSHIP TO *THE HOMELAND SECURITY Scan to subscribe NETWORK WITH EVERY GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999 SUBSCRIPTION SubscribeSubscribe Today!Today!

I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address)

SUBSCRIPTION INFORMATION (please print clearly)

NAME______

ADDRESS______The Phantom Warrior TLS™ was never designed to be the brightest light. You can get CITY______STATE______ZIP______those at a camping store. The Phantom Warrior TLS™ uses solid-state LEDs for 100 EMAIL______lumen output on common AA batteries. This fully-adjustable light gives you the proper light to do your job, adds the features shown above, and keeps your position q PAYMENT ENCLOSED q Visa q MC q Amex q Discover secure. Phantom also offers a universal mounting bracket (UMB), a pocket clip, and q Check (Please make checks payable to Security Solutions International.) lanyard for the TLS™ as well as our new ResQ™ lens which converts this covert, Name on Card______Card #______tactical light into a superior rescue beacon!

Exp. Date______Billing Address______Phantom Warrior Flashlights FREE MEMBERSHIP TO *THE HOMELAND SECURITY Scan to subscribe NETWORK WITH EVERY GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999 74SUBSCRIPTION The Counter Terrorist ~ October/November 2015 ThTeh Peh Pahnatnotmom W Warariroriro TrL TSL™S ™w awsa nse nveevre dr edseigsingende dto t bo eb teh teh be rbigrihgthetset sltig lihgth. Yt.o Yuo cua cna gn egte t thtohsoes ea ta at aca cmampipnign gst ostroer. eT. hTeh eP hPahnatnotmom W Warariroriro Tr LTSL™S ™u suesse so sloidli-dst-astaet eL ELDEsD fso fro 1r 0100 0 lulmumene no uotuptuptu ot no nc ocmommmono nA AA Ab abtatettreiersie. sT. hTihs isfu flulyl-lya-dajdujsutastbalbe leli glihgth gt igveivse sy oyuo uth teh e prporpoepre lrig lihgth tto t od od oyo yuoru jro jbo,b a,d addsd tsh teh fee faetautruerse ssh sohwonw nab aobvoev, ea,n adn dke keepesp yso yuoru pr opsoitsiiotino n sesceucruer. eP. hPahnatnotmom al saols o ffoeffres ras ua nuinveivresarsl aml mouonutnintign gb rbarcakcekte (tU (MUMB)B, )a, pa opcokcekte ctl icpli,p a,n adn d lanlaynayradr dfo fro trh teh eT LTSL™S ™a sa ws ewlle lal sa os uoru nr enwew R eRseQs™Q ™le lnesn ws whihchic hc ocnovnevretsrt tsh tihs ics ocvoevret,r t, tatcatcictaicla lli glihgth itn itnot oa sau spuepreioriro rre rsecsuceu be ebaecaocno!n!

PhaPnhtaonmto Wma Wrraiorrior FlaFslhalsighhlitgshts

Circle 209 on Reader Service Card The Counter Terrorist ~ October/November 2015 75

NEW! Non-Spark Door Ram ® BRO-RAM-ENF32NS

Broco introduces the first Enforcer™ door ram with a non ‐spark striking surface. Engineered at the request of our customers, the model BRO‐RAM‐ENF32NS features a high impact plastic face.

This new ram fills the middle of the Broco Enforcer lineup, weighing 32 lbs and having an overall length of only 21”. Broco’s original Enforcer ram is 37 lbs and 24” long while the Baby™ Enforcer weighs 25 lbs and is only 16” long.

Like the other Broco rams, the new 32NS features:  Reach through fixed rear handle  Rotating front handle  Rubber non‐slip grips  Steel knuckle guard BRO-RAM-ENF32NS, 21” OA length, 32 lb.  Weight forward design  Balanced sling point and sling MADE IN THE U.S.A.

NEW! Ultimate Breacher Tool ® BRO-UBT-24D, BRO-UBT-26S

Designed to be the one simple go‐to tool for First Responders, the Broco Ultimate Breacher Tool (UBT) combines four tools into one: a Sledge, Pry, Ram and Rake.

Whether it be an active shooter event, medical related or some other emergency, the first person on‐scene needs basic entry capability that is easy to carry, easy to use. BRO-UBT-26S, 26” OA length, 14 lb. A Choice of Handles Broco’s Ultimate Breacher Tool is offered with either a ‘D” handle or BRO-UBT-24D, 24” OA length, 16 lb. straight handle. The ‘D’ handle pro‐ vides more ramming power and makes carrying easier. The straight handle version of the UBT is offered at the request of mili‐ Broco’s innovative breaching solutions are available glob‐ tary operators who carry the tool on ally through leading military and police products distributors. their back in a pack or a tube. Visit Broco’s web page for details on exothermic torch sets, diamond rescue blades, and mechanical and hydraulic tools. MADE IN THE U.S.A.

400 S. Rockefeller Ave., Ontario, CA 91761 U.S.A. Tel: 909 483 3222; 800 845 7259 Fax: 909 483 3233 Email: [email protected] www.Broco‐Rankin.com/Tactical

Circle 198 on Reader Service Card