KANSAS BOMBER • GREEN ON BLUE IN • BACRIM • INTERNET SECURITY

Journal for Law Enforcement, Intelligence & Special Operations Professionals The CounterAPRIL/MAY 2014

VOLUME 7 • NUMBER 2

SAUDI INFLUENCE OPERATIONS IN AMERICA

INTERNATIONAL EDITION An SSI ® Publication APRIL/MAY 2014 www.thecounterterroristmag.com USA/CANADA $5.99

The Counter Terrorist ~ April/May 2014 1 Counter Terror_v_ad.pdf 1 1/2/2014 5:01:46 PM

C

M

Y

CM

MY

CY

CMY

K

170 2 The Counter TerroristCircle ~ on April/May Reader Service 2014 Card Circle 13 on Reader Service Card The Counter Terrorist ~ April/May 2014 3 The Journal for Law Enforcement, Intelligence & Special Operations Professionals APRIL/MAY 2014 Counter VOLUME 7 • NUMBER 2

COVER STORY:

SAUDI INFLUENCE OPERATIONS IN AMERICA 30 By Dean T. Olson FEATURES:

30 Firsthand: 0 8 GREEN ON BLUE IN AFGHANISTAN By Francis Marion Case Study: 18 KANSAS BOMBING DISRUPTED BY STING By Richard Marquise BACRIM: COLOMBIAN BANDAS 46 CRIMINALES EMERGENTES By John P. Sullivan YOU ARE DRIVEN TO 8 INTERNET SECURITY FOR LAW 56 ENFORCEMENT AGENTS By Michael Gordon

DEPARTMENTS:

06 From the Editor LEAD Nobel for WE ARE DRIVEN TO HELP YOU GET THERE. 46 At American Military University, we understand where you’ve been, what you’ve done and 44 Book Review what you’d like your team to achieve. Choose from more than 90 career-relevant online degrees “An Explanatory Memorandum” from the Archives of the — respected by the intelligence community — which can help your squad advance their careers Muslim Brotherhood in America while serving their country. Your team will join 100,000 professionals gaining relevant skills that 69 Innovative Products can be put into practice the same day. Take the next step, and learn from the leader. Portable Vehicle Barrier, Exoskel, Game Plan

72 Training Review Tactical Officer Proficiency Course To learn more visit, www.AMUonline.com/Counter-Terrorist 56 CONTENTS

4 ~ April/May 2014 Circle 211 on Reader Service Card ~ April/May 2014 5 Counter_TerroristThe Counter 1013.inddTerrorist 1 10/21/13 9:52 AM The Counter Terrorist FROM THE EDITOR: CounterThe Nobel for Bangash By Chris Graham Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 7 • NUMBER 2 APRIL/MAY 2014 Editor inth grader Aitazaz Hassan Bangash was on his way to school in Pakistan Chris Graham Director of Operations N on a Monday morning when someone dressed in a school uniform asked Sol Bradman him where the school was. A witness said, “Aitazaz became suspicious… The other Director of Advertizing students backed off, but Aitazaz challenged the [person] and tried to catch him. During Carmen Arnaes the scuffle, the bomber panicked and detonated his bomb.” Aitazaz and the bomber Production Assistants Giselle Manassa died at the scene. Witnesses say the blast injured two other people. Aitazaz may have Melissa Berne saved the lives of hundreds of students who were in morning assembly.1 Contributing Editors Visit us at IWA in Germany Kevin Freeman SCOUT Aitazaz’s alertness, initiative and selflessness are to be commended. Who has given Jennifer Hesterman Stand #9-248 more to protect others? I nominate Aitazaz Hassan Bangash for the Nobel Peace Richard Marquise Tom Nypaver Prize. The guidelines of the Nobel organization may need to be adapted to make a Dean Olson posthumous award possible, but Bangash’s family could, no doubt, make use of the Steve Young The Tacprogear SCOUT is a lightweight, $1 million (+) award. Naming this 14-year-old would both provide inspiration to Graphic Design Morrison Creative Company multi-impact, UHMWPE helmet developed children around the world and enhance the reputation of the Nobel committee, which Copy Editor with high V50 ballistic performance without has embarrassed itself with previous awards to communists, terrorists, and disgraced Laura Town sacri cing safety and comfort. UN officials. If you agree that Aitazaz Hassan Bangash would make a good Nobel Advertising Sales Chris Bell candidate, let the committee know at [email protected]. [email protected] Semper Fidelis, 305-632-2309 Publisher: Security Solutions International 13155 SW 134th St. • STE 204 Chris Graham Miami, Florida 33186 Editor, The Counter Terrorist ISSN 1941-8639 The Counter Terrorist www.30-10pistol.com Magazine, Journal for Law Enforcement, ACH Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland The Tacprogear Advanced Combat Helmet Security Professionals with the aim of deepening understanding of issues related (ACH) is based on the original US Army to Terrorism. No part of the publication can be reproduced without permission design. This helmet is available in standard from the publisher. The opinions expressed and lightweight con gurations, with herein are the opinions of the authors represented and not necessarily the opinions PASGT increased ballistic protection. of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 The Tacprogear Personal Armor System and the price of the magazine is $5.99. Ground Troops (PASGT) helmet is lightweight (1-866-573-3999) Fax: 1-786-573-2090. ® For article reprints, e-prints, posters and and functional with optimal protection, TEAM WENDY plaques please contact: Proudly oering Team Wendy® PARS International Corp. comfort and insulation for all situations 1Zahir Shah Sherazi and Saima Mohsin. “Teen Dies Stopping Suicide Bomber at Web: www.magreprints.com/quickquote.asp and weather conditions. pad systems & components Email: [email protected] School in Pakistan.” CNN January 9, 2014. http://www.cnn.com/2014/01/09/world/ Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can asia/pakistan-boy-stops-suicide-bomber/ accessed February 28, 2014. also contact the editorial staff: www.thecounterterrroristmag.com © 2012 Security Solutions International TACPROGEARBLACK.COM 6 The Counter Terrorist ~ April/May 2014 Circle 101 on Reader Service Card The Counter Terrorist ~ April/May 2014 7 Firsthand: GREEN ON BLUE IN By Francis Marion AFGHANISTAN

y purpose is to honor stability operations (VSOs) safe. my teammates Shortly after midnight, gunshots rang Mand provide information that other out. For the team members not in the I write this article understanding that the human Americans, particularly senior military command post, these shots sounded a command staff, might learn from. This great deal closer than normal, but our mind not only has a unique way of healing, but will hopefully serve to provide insight for Afghan Local Police (ALP) did shoot at those who continue to develop standard suspected Taliban attempting to cross also of erasing some critical details of dynamic operating procedures (SOPs) for keeping into our area from time to time. We had our U.S. Special Operations Force become accustomed to RPGs and machine and traumatic experiences. I have done my best (USSOF) personnel who conduct village gun fire between midnight and 3 AM. to recall this incident accurately.

An Afghan Soldier with the Afghan National Army, 6th Kandak, test fires his rifle, outside of an Afghan Border Police compound, in the Nazyan district, Nangarhar province, Afghanistan, March 10, 2012. Photo by: Spc. Amber Leach

8 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 9 Law Enforcement Should Look No Further! take your The limitless capabilities and ease of operation make this highly versatile, armored track vehicle stand above the tactics to rest. With its compact size and four custom resourceful attachments, The Rook can go where others cannot, the next providing the safest, most cost effective and efficient solutions for level SWAT teams. • Zero personnel exposure • Provide surveillance above and below ground floors • Gas deployment capability • Second-story access • Strategic positioning of fortified position • Removal of obstacles that are in harm’s way • Transport for bomb technicians • Post disaster clean-up • Breach and access schools and malls • Bus, plane and vehicle assaults • Reduced call-out times Afghan police officers enter a house while conducting a patrol in Kolagu, Paktia province, Afghanistan, March 9, 2012, during Operation Khoti Kheyl. Photo by: Spc. Phillip McTaggart • NIJ Level IV Protection

We later determined that the shooter Army Special Forces (ANASF) team and clothed in their uniforms almost was dressed in a variant of an Afghan living in our village stability post (VSP). constantly. Since they smoked hashish National Police (ANP) uniform, carrying The UAESF rarely wore uniforms. They by night, they helped to secure our $262,000 with an AK-47 with an extended magazine and were prohibited from going on missions, compound by standing security posts a residual of $70,000 a chest rig containing extra magazines. but we believed that NATO wanted to be during the day. A sister team had an This offer is for governmental agencies He nervously walked into our command able to say that an Islamic nation joined ANASF man climb into one of their only and expires 12/31/14. post and was immediately led back the International Security Assistance guard towers with an RPG and fire outside by one of the men who wondered Force (ISAF). They served no operational rockets into the area where the team how the individual was walking around purpose. Their selection for Special Forces slept screaming “Allah Akbar.” Our alone and armed during the middle of the was conducted by selecting members of team rotated operators on and off post night in our compound. a particular bloodline or socioeconomic throughout the night, alongside an In addition to our team, we had a status. They were out of shape and American infantry squad, in order to United Arab Emirates Special Forces generally smoked hookah 24 hours a day. maintain security. Shaun Mitchell: 904.494.7531 [email protected] (UAESF) team and an Afghan National The ANASF, by contrast, were armed As soon as our infiltrator was led

10 The Counter Terrorist ~ April/May 2014 Circle 178 on Reader Service Card The Counter Terrorist ~ April/May 2014 11 vicinity of the command post, no one group used a close-by mosque as a rally completely understood what had just point to drop their weapons, change their happened. All that was known was that clothes, and begin their escape. Their final approximately 45 rounds had just been destination was predictably Pakistan. As soon as our fired very close by. One of the men who Our air assets found a group of five escaped applied a makeshift tourniquet individuals who fit the profile attempting infiltrator was led to his teammate’s arm, and once the to move along a route that we had long outside the command bleeding was stopped he singlehandedly known to be used by the Taliban. The cleared his way to our hooches, knocking gunship could not confirm if any of the post, he turned his on every door to alert the remainder of five had weapons, so our hands were weapon and fired, the team that a lone shooter was loose in administratively tied. Aircraft watched the compound. He described what the the men as they used a barge to cross 352&85(0(176285&,1* killing the man who shooter was wearing, what he was armed the river. Five motorbikes were staged in '(',&$7('352&85(0(177($06:,7+ accompanied him with, his last known location, and that advance, facing westward in preparation */2%$/6285&,1*(;3(5,(1&( our team had suffered three Americans for the individuals’ escape. Based on ‡)HGHUDO3URJUDPV'LYLVLRQZLWK before he could draw killed and one shot in the arm. Because known insurgent tactics and techniques, 3DVW3HUIRUPDQFHRQ/2*&$3:336 $&27$$)5,&$381,620 0RUH his pistol in defense. of the warning we received, we were able coupled with the reporting we were ‡0LOLWDU\DQG/DZ(QIRUFHPHQW'LYLVLRQ to collectively respond without sustaining receiving, we were able to establish :LWK&XUUHQW.QRZOHGJHRI/DWHVW further casualties. positive identification. The Taliban knew 6ROXWLRQV 7HFKQLTXHV Armed with a mix of small arms and our rules of engagement and routinely ‡6WUHDPOLQHG3XUFKDVLQJ2UGHULQJ 'HOLYHU\DQG%LOOLQJ$SSOLFDWLRQV limited night vision equipment, the exploited them. Hiding in local mosques remainder of our team systematically and compounds was a favorite technique. outside the command post, he turned cleared the immediate area and Our close air support asset was running /2*,67,&6 $5($ .12:/('*( his weapon and fired, killing the man maneuvered to the command post. The low on gas and engaged four of the men. $*/2%$/1(7:25.2)0$18)$&785(56 American infantry attachment helped to We later received confirmation that we 6833/,(56$1'6<67(06,17(*5$7256 who accompanied him before he could 2))(5,1*727$/62/87,216 draw his pistol in defense. Our remaining secure our perimeter while we worked had indeed killed four Taliban who aided ‡2QWKHJURXQGLQ$IULFD$VLD0LGGOH personnel inside heard the shots and inside to organize a response. the attack. We also confirmed that the (DVW6RXWK$PHULFDDQG*OREDO+RW reacted immediately. As the shooter re- Our Joint Terminal Attack Controller shooter was still alive. It was now obvious 6SRWV:KHUH([SHULHQFHLV0DQGDWRU\ entered the command post (now knowing (JTAC) discovered the radio dedicated that the fifth man had been the shooter. ‡2IILFHV:DUHKRXVHV )XOILOOPHQW &HQWHUVLQ86$0LGGOH(DVW6RXWK the exact positions of the remaining men) to controlling air assets had been shot. We begrudgingly let him live because of $PHULFD$VLD $IULFD he shot through the walls while receiving Team members worked to swap out our rules of engagement. return fire from another man’s pistol. As the communications equipment and We later learned that this man made 352'8&76 6(59,&(6 two men attempted to escape through the send the “troops in contact” report and his way to Pakistan, where he was 7$5*(7'5,9(162/87,216'(6,*1(' side door and flank the shooter, one of MEDEVAC request quickly via satellite. welcomed as a hero of the Taliban. A )25&200(5&,$/0,/,7$5</(  them was shot in the arm as rounds came A MEDEVAC flight arrived and propaganda video was made of the 35,9$7(6(&85,7<352)(66,21$/6 ripping through the wall. As the shooter transported the casualties. The escorts man being promoted and rewarded. ‡3HUVRQDO3URWHFWLRQ(TXLSPHQW >33(@7UDLQLQJ3ODQQLQJ2SHUDWLRQV pushed farther into the command post, remained behind to help us track down Eventually, we were told that he was 0DLQWHQDQFH 3URJUDP0DQDJHPHQW attempting to kill those who fled, the the shooter. Our JTAC worked the pair killed by U.S. forces. Visit us at ‡,QWHUQDWLRQDO'HYHORSPHQW1DWLRQDO door swung open from an adjacent room of attack helicopters to scout all of the It is no secret that the people of 6HFXULW\3URJUDPV 5LVN$QDO\VLV  IWA in Germany where our Explosive Ordnance Disposal likely egress routes, while an AC-130 was Afghanistan are the center of gravity in an ‡6SHFLDOL]HG6HUYLFHV$YDLODEOH8SRQ 5HTXHVW Stand #9-248 (EOD) technician (already wounded) tasked to look inside our compound for Afghan counter-insurgency (CoIN) fight. immediately engaged the shooter at less any lone armed individuals. The VSO approach attempts to project than five meters with his M4. The shooter We soon received a report that the stability in insurgent-controlled areas killed him instantly, but our EOD shooter was not working alone. He had by focusing on the center of gravity: the technician halted the attack on the men a small group of insurgents outside our population. We lived inside the village. who escaped out the side door. compound walls who helped him escape The question is, how can we show the Aside from those in the immediate the area. The report indicated that the Afghan population that the system of

12 The Counter Terrorist ~ April/May 2014 Circle 145 on Reader Service Card The Counter Terrorist ~ April/May 2014 13 New and improved

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

U.S. Marines conduct a patrol with Afghan National Police. Photo by: Sgt. Earnest J. Barnes

The question is, how can we show the government we intend to establish will to influence. This is the precise reason the provide a greater degree of stability and Taliban makes executing these “green on Afghan population prosperity than that of the Taliban? blue” attacks a priority. We believed that that the system of Our team conducted this mission our efforts were collectively the key to with enthusiasm and professionalism, success in Afghanistan. A visiting senior government we often forgoing our own personal safety officer said that we were a model VSP intend to establish and security in the name of mission for the entire country. Everyone wanted will provide a greater accomplishment. After all, we understood to know what it was we were doing that the increased risk, accepted it, and was so unique: how, despite our losses, we degree of stability acknowledged that in order for us to be continued to make progress. and prosperity than effective, we would have to remove as We had many vulnerabilities. We many degrees of separation as possible hosted many shuras in our compound that of the Taliban? between us and the individuals we sought and began an attempt at an expansion of Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email [email protected] Or visit our website: www.SSIPVB.com 308 Circle on ReaderCircle Service 317 on Card Reader Service Card Circle 226 on Reader Service Card 14 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 15 our influence into the surrounding areas. cured by mud packed around the frame value, those who live according to Afghan understood they had to choose their sides We had to break nearly every common Our “outdoor shura room” was located and left for the sun to dry and harden. customs and courtesies and even speak wisely. In a few short years, the Taliban sense security SOP we had collectively in the middle of our compound. In order Many members of the team were not the languages, should drive planning. We would be back with a vengeance and learned as a team since day one in order to access it, locals would enter into our comfortable with the decision to place could have saved everyone a lot of time would most likely cut the heads off of all to conduct this mission. compound through our main gate and this doorway in our compound wall. by simply telling the policy makers that of those who betrayed their faith during While many are grateful for a would be escorted down the thoroughfare Again, our concerns were voiced and Afghans want money, roads, vehicles, their absence. temporary respite from the Taliban, past the command post, gym, dining dismissed. We suspect this is how the food, and to be left alone. Some time after this green on blue Afghans have to choose sides, knowing hall, recreation tent, and a majority of shooter gained entry. Are we too politically correct to attack, our VSP was demilitarized. that one side is leaving. The people of the berthing areas. The command post Our compound’s security lighting understand that no matter what we do, The territory we fought to hold and Afghanistan have significantly different was easily distinguishable by the array plan was virtually nonexistent. There was we are still considered to be unbelievers stabilize is now under Taliban control. values from Westerners. We overestimate of antennae and constant foot traffic. At no physical compartmentalization on and at the end of the day, we will be American assistance is finite. The Taliban the idea that a system of government the time of the attack there were no locks the inside of our compound walls. We used as a temporary means to an end? know this, and as a result will only based on Western Judeo-Christian on any of the doors to prevent entry. realized the high potential for an insider The villagers knew we would eventually fight us seasonally. During the winter principles (whether an individual We thought there were enough armed threat in advance and could have made leave and that all the money and effort months, they pack up and go back to considers himself Christian or not) may personnel constantly present to prevent it difficult for an intruder to navigate we put into their village would result in Pakistan, leaving behind a skeleton crew be a very realistic fit for the historically unwanted entry. We hired villagers to the interior successfully. There were no short-lived benefit. The Taliban is playing to continue harassment operations in unmalleable Muslim people of what we support construction projects inside our individually coded doorways to get from the long-game. President Karzai makes support of their plan to lengthen the fight call Afghanistan. • compound in an effort to provide jobs. one end of the compound to another. it publically known that he does not and outlast our presence. Our concerns as a team were voiced and This was thought to be an advantage if we support our efforts. He professes that Our temporary success came with a ABOUT THE AUTHOR dismissed as paranoia. ever had to fight from our walls to repel we are simply an occupation force. The great cost to our team. We were successful Mr. Marion (pseudonym) is a veteran Our main door was secured only by a an assault. We would have had clear- villagers were grateful to be temporarily only because of the individuals on the of the Afghanistan war. He is a former non- small cypher lock. During the day, the cut channels to provide weapons and liberated from the Taliban, but ground who forced the concept to work. commissioned officer of the U.S. military. foot traffic in and out of that door was ammunition resupply to the posts along immeasurable. Although we changed the the perimeter. code on that door regularly, the village Another key point to consider is that children played a game attempting to the entire concept of VSO hinges on the learn the code being entered. We had ability to screen and vet the candidates numerous suicide bomb threats and other from the partner nation paramilitary Village elders listen to Haji Mohammad various threats of attack. Numerous times forces we are tasked with building TM , the governor of Nawbahar district, we witnessed support personnel and and training. Widely known incidents during a shura, or meeting, at the Afghan attachments failing to properly shield the suggest there is no reliable criminal data National Police compound in the district lock when the code was being entered. As base in Afghanistan. ISAF has little in Zabul province, Afghanistan, March 7, a result, we would have to immediately idea who we are giving weapons to. The 2012. Photo by: David Brandenburg change the code out of fear that one of regulations we have to follow in order to the ever-present children or elders saw it establish a history of enemy involvement, ELITE as well. from which we can positively identify Perhaps our gravest error was knocking individuals as insurgents, mirror those of TACTICAL a hole in our compound wall leading a state-side law enforcement agency, but directly to the Afghan National Police counterinsurgency is not synonymous (ANP) station, which was adjacent to with police action. GEAR. the portion of our compound where the We were professionals who obeyed team slept. The walls were approximately orders and achieved success no matter fifteen feet tall and one and one-half feet the hand we were dealt. Why are teams thick, made of straw and dried mud. tasked with what appears to be a VSO In that hole, we attempted to build a experiment without real input from doorway with a light metal frame, a thin those who have lived alongside Afghans? metal door, and a makeshift lock, all Those who understand what Afghans www.diamondbacktactical.com

74 16 The Counter Terrorist ~ April/May 2014 Circledbt_ad_5.5x8.5.indd on Reader 8 Service Card The Counter Terrorist ~ April/May2/19/14 2014 1:48 17PM Case Study: KANSAS BOMBING By Richard Marquise Most of the terrorist attacks that were committed DISRUPTED BY STING in 2013 within the United States appear to have been committed by domestic terrorists—those having little or no foreign influence.

Wichita Mid-Continent Airport. Photo by: 8thcountry

uring 2013 there were by international events: the Boston terrorists. Many of the arrests dealt 34 terrorist attacks that took Marathon attack. Few of these attacks with individuals who were charged with Dplace in the United States. Twenty of received much notice. providing material support to terrorists which were committed by individuals However, arrests were made in at least abroad. These include at least four arrests affiliated with the Animal Rights 25 cases in which a “terrorism” charge that involved individuals who wanted to Movement.1 Only one successful was lodged. Of those cases, 21 appear provide support for the al-Nusra Front, attack appears to have been influenced to have been connected to international a branch of al-Qaeda operating in Syria.

18 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 19 the implementation of shariah law is By early October, Loewen again that would be needed for the explosive absolutely demanded of all the Muslim expressed interest in carrying out an device. He said he would obtain all of Ummah [community].” Days later, an operation. He did express concern that the necessary components for the device undercover FBI employee (UCE) offered he was “being set up.” On October 7, and would wire the explosive himself, as to introduce him to someone who could Loewen sent the UCE photographs of that was something he did as a part of his help him engage in “violent” jihad.2 his airport access badge as well as pictures job. They agreed on a final plan and once In later communications he wrote that of the entrance gates to the tarmac and Loewen received final gate access, “they he had great admiration for Osama bin the devices used to access the gates. would drive to the terminal in the early Laden and Anwar al-Awlaki (the New Loewen said he assumed there were no Mexico-born Islamist who inspired a surveillance cameras at the gates. He did number of individuals around the globe state in one email that he was going to who have committed or attempted to be unable to get “gate access” until early commit significant terrorist attacks, in 2014. However, by mid-October he including Nidal Hasan, the Fort wrote, “Inshallah [God willing], this Hood shooter, and Umar Farouk operation will be huge. Just to be a part Abdulmutallab, the Christmas Day of any operation with these brothers is underwear bomber). Loewen said he had a great honor for me, but of [sic] it can Osama bin Laden. read al-Awlaki’s essay entitled “44 Ways instill and [sic] great financial loss to the Photo by: Hamid Mir to Support Jihad.” In one email, Loewen tagoot [those who worship other than noted that he had “numerous ideas of Allah] who run this country, then I will ways I could perform jihad in the path of feel truly blessed.”6 Allah but outside [prayer], none of them While he was communicating with are legal.”3 the first UCE, Loewen was under Imam Anwar al-Awlaki in In late August, he offered to take the the impression he was dealing with a Yemen October 2008. UCE on a tour of the Wichita Mid- member of al-Qaeda in the Arabian Photo by: Greg A L Continent Airport. He went on to say Peninsula (AQAP). In late October, that he had become “radicalized in the the first UCE introduced Loewen to strongest sense of the word… but direct a second UCE (UCE 2). UCE 2 had jihad against a civilian target is not out a personal meeting with Loewen and of the question. …Point being, is my led Loewen to believe that he was a While many of these arrests may not have having access to airport property the member of AQAP. On November 8, “I have been studying directly prevented attacks in the United primary reason for the tour- if the answer Loewen indicated to UCE 2 that he was States, a December arrest in the heartland subjects like jihad, is ‘no’ then I will not bring it up again.” interested in becoming a martyr. During stopped a plot which, if successful, could He described his access at the airport this meeting, Loewen discussed taking martyrdom operations have been as devastating as the bombing in emails and referred to himself as the a vehicle-borne improvised explosive and shariah law… I… in Oklahoma City. “access guy.”4 device to the terminal, which would be understand that jihad During 2013, 58 year old Terry In early September, Loewen wrote, “I near a number of planes. He suggested a Lee Loewen, an employee at the Mid- believe the potential for me to do more second individual (possibly UCE 2) could and the implementation Continent Airport in Wichita, Kansas, is staggering… but I know nothing wear a suicide vest to coincide with the of shariah law is began engaging in online discussions with about explosives. Don’t you think with explosion outside.7 absolutely demanded of someone he appears to have thought held my access to the airport that I should be On November 19, Loewen again met beliefs similar to his own. By August, put to good use?” By early September, with UCE 2 and expressed his desire to all the Muslim Ummah his conversations had begun to turn to Loewen wrote that he had decided martyr himself. He said he wanted to kill [community].” violence. He stated in one conversation, to only contribute money to “needy as many people as possible and provided “I have been studying subjects like jihad, Muslims,” but said that if not for his a diagram of the terminal and tarmac, martyrdom operations and shariah family “I would have already carried out including distances between the gate law…. I… understand that jihad and some sort of operation.”5 areas. Loewen agreed to purchase an item

20 The Counter Terrorist ~ April/May 2014 Circle 221 on Reader Service Card The Counter Terrorist ~ April/May 2014 21 provided by the FBI were inert), and at 5:19 am, the pair drove to the Wichita Mid-Continent Airport. They arrived at the gate around 5:40 am, and Loewen exited the vehicle and twice attempted to use his badge to enter the gate. He was then arrested.10 Among the items Loewen left behind morning hours and detonate the device badge and three days later used it to verify was a letter for a family member. It read between the terminals for maximum he would have gate access to the tarmac. in part, “By the time you read this I casualties, and both [UCE 2] and Loewen On December 11, Loewen and UCE will- if everything went as planned have would die in the process.”8 2 assembled the bomb and agreed that been martyred in the path of Allah. There In early December, Loewen obtained Friday, December 13 would be the day would have been an event at the airport containers in which the explosives would they would carry out the attack. Loewen which I am responsible for. The operation be housed. He also provided UCE 2 did not go to work that day (December was timed to cause maximum carnage + another diagram marked with an “X” 11), but spent the time writing notes to death. …My only explanation is that I to indicate where the vehicle should his family.9 believe in jihad for the sake of Allah + for be parked to cause the most damage. On December 13 at 4:45 am, UCE 2 the sake of my Muslim brothers + sisters. Loewen also provided time schedules picked Loewen up at a local hotel and …Fact is, most Muslims in this country and indicated that early morning would drove to the area where the bomb was will condemn what I have done. …I The National Homeland Security Association is partnering with the City of Philadelphia to host be the best time for the attack. On stored. Loewen finished wiring it to make expect to be called a terrorist (which I am), December 6, Loewen renewed his access it operational (the explosive materials a psychopath and a homicidal maniac…”11 The 2014 National Homeland Security Conference.

Conference Sessions Our sessions promise to be dynamic, interactive and multi-disciplined, filled with timely and relevant topics, world-renowned speakers, and unique perspective! Session tracks include:  Responding to Unplanned Events  CBRNE Response  Training for Preparedness Homeland Security  Program Management & Sustainment CERTIFICATE PROGRAM  Role of the State Administrative Agent  The Emergency Medical Response Community Courses for Public Safety Practitioners Courses include:  Port and Transit Security  Law Enforcement Professionals  Enhancing Emergency Capabilities Available Now!

Rural Domestic Preparedness Consortium  Intelligence & Information Sharing  Fire Service Professionals  Preparedness Partnerships for the Whole Community Available Now! Enroll in a course today.  Emergency Management No fees! No cost! Professionals Coming Soon! Who should attend? Attendees typically include Homeland Security professionals, Emergency Managers and planners, public safety representatives from every response discipline, local, State, and Federal government leaders from the largest DISCLAIMER: This project was supported by Cooperative Agreement Number 2008-GD-T8-K015 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration metropolitan areas in the 50 states and U.S. territories, as well as subject matter experts from the private sector. Secretariat. Points of view or opinions in this document are those of the author and do not represent the o cial position or policies of the U.S. Department of Homeland Security.

For more information please visit www.preventivestrategies.net For more information and to register, visit: nationaluasi.com Circle 317 on Reader Service Card 22 The Counter Terrorist ~ April/May 2014 Circle 265 on Reader Service Card The Counter Terrorist ~ April/May 2014 23

IPS-RDPC-DHS-2012 Ad 7.25 x 4.875.new.indd 1 3/25/2013 2:19:36 PM American-born citizen, having no connection to the Middle East or any terrorist group, planning to carry out a terrorist attack in the United States. If Loewen had been successful, the attack at the Wichita Airport may well have been devastating. Many believe that terrorists only target larger cities or special events. The Boston Marathon attacks targeted an internationally known event, and the two brothers who were involved were alleged to have told a man they had kidnapped that they planned to go to New York to carry out additional attacks, possibly at Times Square. However, dating back to 2009, significant terrorist plots were disrupted in cities of all sizes and locations. These Naiz Khan, target of an FBI terror include Riverside/Newburgh, NY (James investigation­. Photo by: Thomas Good Cromitie et al.), Charlotte, NC (Daniel Boyd et al.), Denver, CO/New York, NY (Najibullah Zazi et al.), Springfield, IL (Michael Finton), Dallas, TX (Hosam Smadi), Washington, DC (Farooque Ahmed), Catonsville, MD (Antonio Martinez), Seattle, WA (Frederick Dominique and Joseph Davis) and Killeen, TX (Jason Abdo). The media has described the Wichita case as a “sting.” One Kansas defense attorney said, “If the fragile mental state of an otherwise upstanding individual is exploited to commit a crime that the individual otherwise would not have taken steps to commit, how does that make us safe and why spend taxpayer 14 Masjid al-Ikhlas, Newburgh, NY, USA, where the 2009 New York City bomb plot was hatched. Photo by: Daniel Case money on prosecution?” A study done by researchers at Fordham University in 2011 reported On December 18, 2013, Loewen If convicted, Loewen faces a maximum provide material support to a designated technician for Hawker Beechcraft that in the ten years after 9/11 the Photo released by the U.S. Army of Pfc. was indicted by a Federal Grand Jury penalty of life in prison on the charge foreign terrorist organization.12 Services and a long-time member of the entrapment defense was used in about ten Jason Abdo. in Wichita, Kansas, on three counts of attempting to use a weapon of mass Loewen, who was also known as Wichita community. He had only one terrorism cases, and all were unsuccessful. Photo: U.S. Army of Attempting to Use a Weapon of destruction, not less than five years and Terry Lane, was described by neighbors known criminal charge and that was The author of the study indicated she was Mass Destruction, Attempted Use of not more than 20 years on the charge of as someone who “pretty much kept to for carrying a concealed weapon at the not in favor of sting operations.15 an Explosive Device, and Attempted attempting to use an explosive to damage [himself].” The neighbors said that he Wichita airport in 2009.13 It is difficult to argue with success. Material Support for a Designated property, and a maximum penalty of and his wife were private people. The Loewen’s case is neither the first, Many of the cases cited above utilized Foreign Terrorist Organization (AQAP). 15 years on the charge of attempting to local media reported he was an avionics nor will it be the last, incident of an “sting” operations and had successful

24 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 25 MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY TM outcomes. How should the U.S. government agent and this person was government protect citizens? If one equally as disposed to carry out a criminal of Oklahoma City bomber Timothy act, would we be talking about Wichita McVeigh’s conspirators had informed like we now speak of Oklahoma City? the government about his plot and Law enforcement officers need government agents then arrested him as to continue to be alert to terrorist Any investigation— he acquired his materials and planned indicators and share information with especially an investigation his attack, what would have been the the Joint Terrorist Task Forces and state end result? One can only guess, but Fusion Centers. Any investigation— MACTAC The Newest, that is potentially as Oklahoma City might only be known as especially an investigation that is sensitive as a counter- a great place to live and not a city where potentially as sensitive as a counter- terrorism investigation— one of the most significant terrorist terrorism investigation—needs to be Most Dynamic attacks in history took place. closely supervised. Investigations must needs to be closely In the Loewen case, government agents, be monitored not only by the law Training Program supervised. in conjunction with prosecutors, likely enforcement agents involved, but by ® reviewed each of the emails and recorded agency leadership as well as prosecutors, conversations to ensure that Loewen was to ensure that a suspect is not made to do from SSI . only doing what he was predisposed to something they would not have done on do. Yes, a government agent made his their own. plot easier to advance, but if Loewen Terrorism is not going away, whether had found someone who was not a the threat comes from domestic or

MACTAC is the new tactical philosophy offering your department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks. Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course

Register for next program: MACTAC TTT Feb. 25–26 & 27–28, 2014 South Beach, FL. Contact us today at: www.homelandsecurityssi.com Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 [email protected]

Circle 228 on Reader Service Card 26 The Counter Terrorist ~ April/May 2014 Circle 83 on Reader Service Card The Counter Terrorist ~ April/May 2014 27 international terrorists. The numbers ENDNOTES bear that out. The fact that there 1“Slatt.org.” Institute for were 25 prevented plots during 2013 Intergovernmental Research: State and suggests that our law enforcement Local Anti-Terrorism Training (SLATT) agencies are doing their jobs. Agencies Program, January 6, 2014. Available at: are sharing information and they have https://www.slatt.org/. demonstrated the tenacity to conduct 2“United States of America v. Terry L. long-term undercover operations to arrest Loewen.” (Criminal Complaint filed in individuals who want to use violence to the U.S. District Court for the District further their agendas. • of Kansas, Wichita Docket, December 13, 2013). ABOUT THE AUTHOR 3Ibid. Mr. Marquise is the Director of 4Ibid. the Department of Justice’s, Bureau 5Ibid. of JusticeAssistance State and Local 6Ibid. Antiterrorism Training (SLATT) 7Ibid. program. He is a retired FBI senior 8Ibid. executive who led the investigation into 9Ibid. the bombing of Pan Am Flight 103 and 10Ibid. is the author of Scotbom: Evidence and 11Ibid. the Lockerbie Investigation. 12“Press release of the U.S. Attorney.” Timothy McVeigh about to be led out of a Perry, Oklahoma courthouse two days after the (Western District of Kansas, December Oklahoma City bombing. Photo by: Olaf Growald 18, 2013). 13Bill Wilson. “Neighbors Describe Terrorism Suspect Terry Lee Loewen.” The Wichita Eagle.com, December 13, YOU CAN’T BE EVERYWHERE AT ONCE, 2013. Available at: http://www.kansas. com/2013/12/13/3177345/neighbors- describe-terrorism-suspect.html. Retrieved January 6, 2014. . 14 WE CAN Associated Press. “Terry Lee Loewen RECONYX High Definition motion activated security cameras do not Case: Stings Used to Fight Domestic require separate lines for power or communication. Extremely easy to Terrorism.” The Epoch Times, December deploy and hide, (5.5” x 4.5”) our cameras provide near instant 16, 2013. Available at: http://www. notification of an intrusion by transmitting images via the cellular theepochtimes.com/n3/402614-terry-lee- network directly to your cell phone or computer. loewen-case-stings-used-to-fight-domestic- General Surveillance and License Plate Capture terrorism/. Retrieved January 18, 2014. Circle 151 on Reader Service Card models available. 15Karen Greenberg. “How Terrorist ‘Entrapment’ Ensnares Us All.” The Guardian, December 12, 2011. Available at: http://www.theguardian.com/ commentisfree/cifamerica/2011/dec/12/ how-terrorist-entrapment-ensares-us-all. Retrieved January 6, 2014.

PHONE 866-493-6064 | WWW.RECONYX.COM

28 The Counter Terrorist ~ April/May 2014 Circle 303 on Reader Service Card Circle 191 on Reader Service Card The Counter Terrorist ~ April/May 2014 29 Decades ago, the Kingdom of Saudi Arabia began to use its phenomenal oil wealth to fund the spread of a puritanical version of Islam known as Wahhabism in Western SAUDI INFLUENCE countries, including the United States.

he Wahhabi variant of Islam is a militant strain of Islam known best their emotions, motives, objective has been the dominant faith for the hate-fueled vision that inspired reasoning, and ultimately the behavior OPERATIONS IN Tof Saudi Arabia for more than two the 19 suicide terrorists (15 of whom of governments, nongovernmental centuries. In the 30 years following were Saudis) on 9/11. Wahhabists view organizations, other groups, and the OPEC Oil Crisis of 1973, Saudis Muslims not practicing their form of the population as a whole.3 The spent more than $87 billion to spread Islam as infidels and enemies to be fundamental purpose of psychological Wahhabism worldwide.1 subjugated or killed like Christians operations is to induce or reinforce An austere form of Islam embraced and Jews.2 attitudes and behavior favorable to by Osama bin Laden, the Taliban Influence operations are a subset the sponsor’s objectives. Because and some Muslim Brotherhood of psychological operations designed Wahhabism views other interpretations factions, Wahhabism demands a to convey selected information of Islam as heretical, a major focus of AMERICA literal interpretation of the Quran. It to foreign audiences to influence these Saudi influence operations is to By Dean T. Olson

30 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 31 Saves Time. Saves Blood. Saves Lives. TACTICAL MAKEHEMOSTASIS EVERY SECOND COUNT

Celox™RAPID Ribbon Bandage dimensions 1”x 5’ P/N # FG08839041

Mecca, Saudi Arabia. Photo by: MorgueFile

Celox™RAPID Bandage dimensions achieve Wahhabi dominance over the foundations, student associations, and the Ministry of Labor and Social Welfare, 3”x 5’ practice of Islam in the West. schools around the world.5 While Saudi charities and international relief agencies P/N #FG08839011 Saudi influence operations are driven officials continue to assert publicly such as the World Assembly of Muslim by a religious imperative to spread the and in private discussions with U.S. Youth (WAMY) are currently regulated faith until the entire world is under officials that the government cannot by the Ministry of Islamic Affairs. This Celox™RAPID the sway of Islam. The methods used be held responsible for the actions of Ministry uses zakat, obligatory Islamic The fastest to achieve this domination are based non-governmental organizations, private charitable giving, and government funds hemostatic gauze Celox™RAPID Ribbon on the Islamic concept of jihad. It is an donors, and religious leaders, these to spread Wahhabi beliefs throughout treatment available1 The first compact carry unambiguous concept in Wahhabism, protestations belie the fact that much the world.”7 defined as holy war that seeks to force of the nongovernmental organization Wahhabism experienced explosive minimal compression time unbelievers to convert to Islam and live (NGO) network in Saudi Arabia was growth worldwide beginning in the gauze for narrow entry wounds. under the 7th century Islamic code of law created by Saudi government officials, early 1970s, when Saudi charities called shariah.4 providing an arm’s length relationship and started funding Wahhabi schools and Rapid Packing2 Minimum Compression Time1 Reduces Blood Loss3 In the years prior to the terrorist plausible deniability. mosques from Islamabad, Pakistan to 5’ in length, Celox™ RAPID Requires Minimal compression time Celox Rapid clots blood within 1 attacks of 9/11, the U.S. government Many NGOs are funded by the Saudi Culver City, California.8 Saudi efforts to packs faster than 12’ competitive compared to 3 minutes compression minute compared to 3-5 minutes products. for Combat Gauze™ (per Manufactures with Combat Gauze™. paid little attention to the flow of government or members of the royal spread Wahhabism in the United States Instructions For Use) money and religious propaganda family. The Wahhabi-dominated religious began as simple proselytization called exported worldwide from Saudi Arabia. hierarchy in Saudi Arabia is tightly da’wa, literally “invitation to Islam” in *Combat Gauze™ is a registered TM of Z-Medica Beginning in the 1960s, the Saudis controlled by the Saudi regime and royal Arabic. Saudi influence operations have funded radical movements, including family.6 The Commission investigating blossomed into a multifaceted effort that Contact us at www.biostatllc.com | 407.252.6758 the Muslim Brotherhood, to establish an the terror attacks on 9/11 found: “While has successfully affected the perceptions facebook.com/tactical.biostat elaborate network of Islamic charities, Saudi domestic charities are regulated by and behaviors of the institutions of RAPID Gauze could be rapidly applied on the wound on average within half the time of the predicate devices. Has been proven in controlled trials to stop major arterial bleeding by coagulating the blood within 1 minute, reducing blood loss. (1). Testing a new gauze hemostat with reduced treatment time. A Hoggarth et al. Poster, ATACCC 2011, FL. (2) Reduced Application Time with a Rapid Packing Gauze Hemostat Andrew Hoggarth, Craig Hardy, Guy Eason, Chris Marsden (Medtrade Products Ltd, Crewe, UK) (3) Chitosan based advanced hemostatic dressing is associated with decreased blood loss in a swine uncontrolled hemorrhage model Corrected Proof, 15 March 2013 Nicholas R. Kunio, Gordon M. Riha, Katherine M. Watson, Jerome A. Differding, Martin A. Schreiber, Jennifer M. Watters 10.1016/j.amjsurg.2013.01.014 The American Journal of Surgery 32 The Counter Terrorist ~ April/May 2014 Circle 271 on Reader Service Card The Counter Terrorist ~ April/May 2014 33 American society, including politics Mohamed Akram, a senior Muslim they enjoy quasi-official status and strong and religion, diplomacy, education, the Brotherhood operative in the United government support.13 judiciary, law enforcement, and States and chronicler of this strategy, The Saudi Wahhabi effort to the military. penned a memorandum entitled “An undermine our nation from within Members of Muslim Brotherhood front Explanatory Memorandum on the is most pronounced in our schools. groups in the U.S. are pawns in these General Strategic Goal for the Group in Many Americans are unaware that influence operations. The Brotherhood North America.”11* In that document, their children are on the front lines of was founded in Egypt in 1928 and acts Akram laid out a plan to conquer and a hidden cultural jihad.14 In thousands as a transnational Islamist organization. Islamize the United States as a stepping of public school districts across the Their motto is: “Allah is our objective; stone toward the larger goal of ultimately United States, taxpayers are unaware the Quran is our law, the Prophet is establishing “the global Islamic state.” that they pay to disseminate pro-Islamic our leader; Jihad is our way; and dying 12 Federal investigators found Akram’s materials that are anti-American, anti- in the way of Allah is the highest of memo in the home of Ismael Elbarasse, Israel, and anti-Jewish. Often bypassing our aspirations.” The English language a founder of the Dar Al-Hijrah mosque school boards and edging out approved website of the Brotherhood states the in Falls Church, Virginia, after serving a curricula, teaching programs funded by organization is “an Egypt-born Islamist search warrant in 2004. Saudis make their way into elementary organization founded for launching Jihad Akram’s 18-page document listed and secondary school classrooms, often against the infidels in general, and the 29 likeminded “organizations of our with the help of a federal program, Christian West in particular, has been friends” that shared the common goal of Title VI of the Higher Education Act. an ideological protectorate of Saudi dismantling American institutions and Analyses of these materials have found Arabia for over half a century.”9 Muslim turning the U.S. into a Muslim nation. them to be full of inaccuracies, bias and Brotherhood operatives in America These “friends” were identified as groups proselytizing for Islam. They also have strive to “present Islam as a civilization that could help convince Muslims “that found that many of the major history alternative.”10 their work in America is a kind of grand and social studies textbooks used in Jihad in eliminating and destroying schools across America are highly critical the Western civilization from within of democratic institutions and forgiving Sidi Abdul Wahhab Mosque in the medina of Libya's capital Tripoli. Photo by: Abdul-Jawad Elhusuni and ‘sabotaging’ its miserable house by of repressive ones. These materials praise their hands… so that… God’s religion and sometimes promote Islam, while In thousands of [Islam] is made victorious over all other criticizing Christianity and Judaism and curriculum without being subject to the teacher-trainers at a number of university Harvard, and a former senior associate public school districts religions.” The list includes many Muslim being filled with false assertions and normal public vetting processes. Middle East Studies centers have been commissioner of the Massachusetts Brotherhood front groups that are now historical inaccuracies.15 In an ingenious Meanwhile, the federal government, trained by the very same Saudi-funded Department of Education. Stotsky’s across the United routinely sought out by politicians and deception, the system of federal subsidies which both subsidizes and lends its stamp foundations that design K-12 course stint as a commissioner ran from 1999 States, taxpayers are the media. These groups have been to university programs of Middle East of approval to these special K-12 course materials. These Saudi-friendly minions to 2003. She was present when the unaware that they alleged to be “moderate” Muslims Studies under Title VI of the Higher materials, has effectively abandoned happily build their outreach efforts Massachusetts Department of Education in America. Education Act has been serving as a kind oversight of the program that provides around Saudi-financed K-12 curricula.18 tried to respond to the challenge of pay to disseminate The entire cultural jihad process is of Trojan horse for Saudi influence over them. By lavishly funding several Without realizing it, America’s taxpayers 9/11 by organizing special seminars in pro-Islamic materials designed to create rapid ideological American K-12 education.16 Because organizations that design Saudi-friendly subsidize—and provide official federal Islamic history for K-12 teachers. The change. At its core are two organizations federally subsidized Middle East Studies English-language K-12 curricula, all that approval for—K-12 educational materials department accepted a proposal with that are anti- that coordinate and direct much of the centers are required to pursue public remains is to convince the “outreach on the Middle East that have been participation from Harvard’s Center American, anti-Israel, work of the global Wahhabi movements: outreach, the centers meet this obligation coordinators” at prestigious, federally created under Saudi auspices. for Middle Eastern Studies, which, as the Muslim World League (MWL), by designing lesson plans and seminars subsidized universities to purvey these The basic outlines of the problem a prestigious university and a federally and anti-Jewish. also known as Rabita, and the World on the Middle East for America’s K-12 materials to America’s teachers.17 were exposed in 2004 by Sandra Stotsky, subsidized Title VI “National Resource Assembly of Muslim Youth, or WAMY. teachers. These university-distributed To reinforce the effectiveness of this a former director of a professional Center,” seemed an obvious choice.19 Both are based in Saudi Arabia, where teaching aids slip into the K-12 subversion, outreach coordinators or development institute for teachers at The Massachusetts Department of

*Editor’s note: See this issue’s Book Review “An Explanatory Memorandum” From the Archives of the Muslim Brotherhood, by Mohamed Akram. 34 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 35 Education commissioned a teacher- their materials, appears to be the and social studies teachers, combined training seminar designed to cover indoctrination of children by bending with equally misleading professional Islamic history and touch on key and falsifying historical content. They development workshops that propagate contemporary questions, such as the compound this approach by appealing the distorted content and recommended nature of Islamic Fundamentalism and to teachers’ sense of “fairness” and their teaching practices of such materials to terrorism, the lack of democracy in the currently presumed obligation to promote teachers and their classrooms, thereby Middle East, and the challenge of gaining “social justice” and withhold negative influencing what both teachers and basic legal and political rights for women moral judgments about other cultures. students learn.23 The devious methods in much of the Muslim world. It quickly Saudi influence enters the classrooms used to indoctrinate children include: became apparent, however, that Harvard’s in three different ways. The first is omitting important details about the outreach program had little interest in through teacher-training seminars topic including those that are positive tackling these issues, or in representing that provide teachers with graduate for this country or the West, or negative “…English explorers a broad range of views on contemporary or continuing-education credits. The about non-Western cultures; providing were to meet “Iroquois Middle Eastern culture. Stotsky came to second is through the dissemination false information; focusing attention on feel that the Massachusetts Education of supplementary teaching materials details of chiefly anthropological interest, and Algonquin Department’s efforts to achieve balance in designed and distributed with Saudi thereby omitting culture-specific details chiefs with names its teacher training seminars were giving support. Such materials flood the of historical significance; dwelling on Arab World and Islamic Resources and Europe were the first to sail across the way to a “distorted” and “manipulative” educational system and are available negative details about America or the School Services (AWAIR). The Middle Atlantic and land in the New World in like Abdul-Rahim and political agenda.20 online. The third is through school West disproportionately to historical East Policy Council (formerly the Arab 889. It also advances the unsupported Abdallah Ibn Malik.” Stotsky found that the source of the textbooks paid for by taxpayers, some of context; inflating the significance of American Affairs Council) sponsors notion that West African Muslims had problem with many of the supplemental them vetted by activists with Saudi ties a minor historical event; and making workshops about the Arab world and not only spread throughout South and resources used for history and social who advise and influence major textbook false historical analogies. More than one Islam for teachers, while AWAIR runs Central America but had also reached studies is the ideological mission of the companies about the books’ Islamic, method is used in many cases.24 the workshops and distributes printed Canada, intermarrying with the Iroquois influence, the most important are organizations that create them.21 While Arab, Palestinian, Israeli, and Middle An example of particularly egregious materials and videos. The 1989 version and Algonquin nations so that, much professional development workshops. their stated goal is to combat intolerance Eastern content.22 curricular material that flagrantly falsifies (about 300 pages long) stated among later, early English explorers were to meet The use of these supplemental by expanding students’ knowledge of The process used in the attempt to history in its attempt to indoctrinate both other non-facts that Yasir Arafat was “Iroquois and Algonquin chiefs with curricula resources fails to help other cultures and providing them with indoctrinate school children begins teachers and students is the Arab World president of a newly declared State names like Abdul-Rahim and students understand 9/11 and why so other “points of view,” the organizations’ with manipulative and incomplete Studies Notebook, published jointly by of Palestine, that the United Nations Abdallah Ibn Malik.”25 many Muslims hate America; Islamic real goal, based on an analysis of supplemental resources for history the Middle East Policy Council and the General Assembly had voted to ISLAM: A Simulation of Islamic Fundamentalism or Islamist terrorism; recognize this state in 1988, and that History and Culture, 610-1100 was lack of democracy in the Muslim world; the Canaanites were the ancestors of published in 1991 by Interaction the lack of basic legal and political many present-day Palestinians. The 1998 Publishers of Carlsbad, California and rights for women in most of the Muslim Department iOp FirEarMS price price Notebook (now 513 pages long) appears promoted as a curriculum manual for world; the lack of a free press in most of to induce teachers to embrace Islamic history teachers in grades 6-12. It consists the Muslim world; the deplorable state Sig 516 Patrol $1135.00 $1344.00 religious beliefs, support political views of enough material for a three-week of elementary, secondary, and higher Sig M400 Enhanced $814.00 $964.00 favored by MEPC and AWAIR, and program of instruction in which students education in the Muslim world; and the Sig P226/P229 (.9mm/.40) $591.00 $740.00 disseminate those religious beliefs and “simulate becoming Muslims” and “learn dramatic decline in intellectual creativity Sig P238 (.380) $418.00 $495.00 political views in their classrooms. about the history and culture of Islam.” and scientific achievement in the Muslim Its attempt at indoctrination goes Like the Notebook described above, it world since 1500.27 Department price beyond presenting religious myths as falsifies history with ludicrous claims The full extent of Saudi curricular 1,000 Rounds matters of fact, and includes some bizarre and anachronisms.26 funding, and the magnitude of its To order contact: history. One article titled “Early Muslim Among the mechanisms used for influence over university outreach Gander Mtn. Law Enforcement Sales at: Exploration Worldwide: Evidence of legitimating the content and providers programs funded under Title VI, was 877-482-3982, 651-325-4911 or [email protected] Muslims in the New World Before of manipulative supplemental curricula only revealed in late 2005 by a special Offer is valid for qualified Law Enforcement Depts & Officers only. Columbus” claims that Muslims from resources, and for spreading their four-part investigative report by the This offer is not available in stores. Contact Gander Mountain LE Sales for full list of firearms offered under this program.

Circle 28 on Reader Service Card 36 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 37 Jewish Telegraphic Agency (JTA). As ThE ThE the JTA put it: “Saudi Arabia is paying to influence the teaching of American public schoolchildren. And the U.S. PREmiPREERmi EREVENT EVENT taxpayer is an unwitting accomplice… Ironically, what gives credibility to… iN FiiREN Fi RE& &Li LiFEFE these distorted materials is Title VI of the Higher Education Act… Believing they’re importing the wisdom of places like Harvard or Georgetown, they are actually inviting into their schools whole sasFETaFETyy curricula and syllabuses developed with CONFERENCE & EXPOCONFERENCE & EXPO the support of Riyadh.”28 JuNE 9-12, 2014 • Las VEgas,JuNE 9-12, NV 2014 • Las VEgas, NV One of the groups Saudi money elements of the Muslim Brotherhood supports is AWAIR. According to the [italics added] were “largely secular” JTA, AIWAR’s founder, Audrey Shabbas, in testimony to Congress. The 2013 also edits the controversial Arab World Boston Marathon bombing was the Studies Notebook. Shabbas is reportedly 59th publicly known Islamist-inspired employed by the Middle East Policy terror plot against the United States 32 Council (MEPC) to conduct its teacher- since 9/11. In recent years, the training and seminar programs. And number of such plots has tripled from 33 MEPC (formerly the Arab American three per year to nine. And yet, on Affairs Council) is headed by a former January 15, 2014, news broke that U.S. ambassador to Saudi Arabia and U.S. Attorney General Eric Holder maN damaNLdaayLay Bay Bay allegedly receives direct funding from would soon issue new Department Saudi Arabia.29 of Justice (DOJ) guidelines that will CONVENTCONVENTiONi ONCENTER CENTER The JTA also asserts that the Middle prohibit religious “profiling” in terror 34 East Policy Council was seeking funding cases. The FBI, part of the DOJ for its teaching efforts from Saudi Prince and the federal law enforcement Alwaleed bin Talal bin Abdulaziz in agency primarily responsible for JOiN usJO iNN us L asiN L asVE VEgasgas late 2005. Alwaleed personally initiated counterterrorism, had already been Learn fromLearn the from code the code experts experts contacts with MEPC after hearing about forced to scrub references to “Islam” its seminars designed to shape American and “jihad” from its counterterrorism Choose fromChoose more from thanmore than 150 150 sessions sessions 35 teachers’ perceptions of the Middle East. training materials. Attorney General Earn valuable Earn valuable CEUs CEUs and and more! more! It appears that the partnership between Holder reportedly now wants to MEPC and Prince Alwaleed has borne make it illegal for agents to even fruit. In March 2007, Prince Alwaleed30 consider religion and national origin announced that he was supplementing in their investigations. The FBI purge nfpa.org/conferencenfpa.org/conference his earlier donation of $100,000 to of anti-terrorism training material MEPC with a $1 million gift for its and curricula deemed “offensive” teacher-training programs.31 occurred following a February 8, In 2011 U.S. Director of National 2012 meeting between FBI Director Intelligence, James Clapper made Robert Mueller and various Islamic the transparently false statement that organizations, many of them apparent

Circle 343 on Reader Service Card Circle 105 on Reader Service Card 38 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 39 Terrorism. Manhattan Institute, Classroom: A fundamental front in the Quebec, became aware of the academic NY for Policy Research. www.cpt- war, National Review Online, http:// travesty being committed in its mi.org/ http://www.cpt-mi.org/ article.nationalreview.com/?q=YjRhZjYw name (i.e., English explorers meeting WahabbiOragnziationsNorthAmerica. MjU4MGY5ODJmM2MzNGNhNzljM Algonquin chiefs with Muslim names) pdf zk4ZDFiYmQ. Published July 25, 2007. and issued an alert on November 28, 14Pen vs. Sword, 2004. The 17Ibid 16. 2003, “to state that there is no credible Islamization of American Schools: A 18Ibid 16. evidence to support these theories, in critique of the course and textbook on 19Ibid 16. the archival record, academic study, Islam taught to the 7th grade students in 20Ibid 16. or in oral history” and that “we are California Public Schools, The Pen vs. 21Stotsky, Sandra, 2004. The Stealth extremely concerned that such nonsense The Sword, Los Angeles, CA, December, Curriculum: Manipulating America’s would be circulated as curriculum 2004. History Teachers, Thomas B. Fordham intended for use in schools.”[13]The 15Hostein, Lisa and Fishkoff, Sue, Foundation, Washington, DC. Secretariat calls upon the sponsors of the 2005. Tainted Teachings, What Your 22Ibid 15. Arab World Studies Notebook to render Kids are Learning about Israel, America, 23Ibid 21. an “explanation and an apology” for and Islam, Parts 1 through 4, JTA 24Ibid 21. “material that is so patently untrue and Staff Report, Jewish Telegraph Agency, 25This particular bit of fake history academically indefensible.” October 27, 2005, http://jta.org/ may soon be cleaned up at the request 26Ibid 21. schools.asp. of the Algonquin Nation. In 2003, 27Ibid 21. United States President Barack Obama is briefed on the 2013 Boston Marathon explosions, in the Oval Office, on 16 April 2013. 16Kurtz, Stanley, 2007. Saudi in the the Algonquin Nation Secretariat, in 28Ibid 15. Photo by: White House

Muslim Brotherhood front groups.36 ENDNOTES documents/testimony/324.pdf Among them were the Islamic Society 1Amb. Curtin Winsor, Ph.D. (2007- 6Ibid 3. P.41 of North America (ISNA), the Council 10-22). “Saudi Arabia, Wahhabism 7“..The 9-1 1 Commission on American Islamic Relations (CAIR), and the Spread of Sunni Theofascism”. Report: Final Report of the National and the North American Islamic Trust Global Politician. Commission on Terrorist Attacks Lipon (NAIT). Both the ISNA and CAIR had 2Olson, Dean, 2008. Perfect Enemy: the LIGHTING THE WAY been named by the government in 2007 The Law Enforcement Manual of United States” W.W. Norton & as unindicted co-conspirators in the Holy Islamist Terrorism, Charles C,. Thomas, Company: July 2004 at p. 372. Land Foundation terrorist financing Pub., Springfield, IL, p. 48. 8Ibid 3, p.40. trial.37 What is the source of information 3Judicial Watch Special Report: U.S. 9Ramashray Upadhyay, “‘Muslim that has led these officials to make Government Purges of Law Enforcement Brotherhood’ – An ideological such illogical statements and issue such Training Material Deemed “Offensive” Protectorate of Saudi Arabia?,” counterproductive orders? • to Muslims, December 5, 2013, Judicial Ikwhanweb, December 29, 2009, Watch,, Washington, DC 20024, p. http://www.ikhwanweb.com/article. ABOUT THE AUTHOR 302. php?id=22363&ref=search.php Mr. Olson is a retired sheriff’s 4Footnote to Surah 2:190 on page 10http://www.discoverthenetworks.org/ department Criminal Investigation 39 of The official Wahhabi version of viewSubCategory.asp?id=815 Bureau commander. He is the author the Qur’an is entitled The Noble Qur’an 11Ibid 3, p. 244. of Tactical Counterterrorism: The Law published in Saudi Arabia by the “King 12Ibid 3, p. 48. Enforcement Manual of Terrorism Fahd Complex for the Printing of the 13Center for Policing Terrorism, Prevention, published by Charles C. Holy Qur’an, Madinah, K.S.A.” n.d. Guide to Wahhabi Organizations Thomas Publishing. 5http://www.investigativeproject.org/ in North America, Center for Policing 800.557.0098 | 308.278.3131 www.golight.com | [email protected]

40 The Counter Terrorist ~ April/May 2014 Circle 285 on Reader Service Card The Counter Terrorist ~ April/May 2014 41 29Ibid 15. 30This is the same Prince Alwaleed whose $10 million post-9/11 gift was returned by New York Mayor Rudy Giuliani because that gift was accompanied by a letter blaming American foreign policy for the attack on the Pentagon and World Trade Center. 31Ibid 16. 32Jessica Zuckerman, Steven P. Bucci, PhD, and James Jay Carafano, PhD, 60 Terrorist Plots Since 9/11: Continued Lessons in Domestic Counterterrorism, Special Report 137, The Heritage Foundation, Washington, DC. 33Ibid, p.3 34Apuzzo, Matt, 2014. Justice Dept. to change rules on terror investigations, New York Times, Jan. 16, 2014, p. A1. 35Scarborough, Rowan, 2013. Obama’s 131 Circle on Reader Service Card scrub of Muslim terms under question; Circle 305 on Reader Service Card common links in attacks, Washington Times, April 25, 2013 36Judicial Watch Special Report: U.S. Government Purges of Law Enforcement Learn. Training Material Deemed “Offensive” to Muslims, December 5, 2013, Judicial Watch,, Washington, DC 20024. Prevent. 37Johnson, Scott, 2007. AUGUST 22, 2007 Coming Clean About CAIR, CAIR finds itself among the unindicted co-conspirators of the Holy Land Defend. Foundation, http://www.nationalreview. Prepare for the fight against terrorism on all of its fronts. com/articles/221895/coming-clean- From the cyberwar to the economic arena to the frontline, about-cair/scott-w-johnson. U.S. v. WWW.jntactical.COM Southern New Hampshire University can help you be ready for anything. Holy Land Foundation, United States District Court, Northern District • Counterterrorism and Cybersecurity education in SNHU’s Justice Studies programs of Texas, Dallas Division, CR NO. • More than 180 degree and certificate programs, completely online 3:04-CR-240-G, Attachment A, List of • Corporate and military discounts for eligible students Unindicted Co-conspirators.

Visit snhu.edu/ct to get started on your counterterrorism education.

/ct 800.607.8374

42 The Counter Terrorist ~ April/May 2014 Circle 111 on Reader Service Card Circle 155 on Reader Service Card The Counter Terrorist ~ April/May 2014 43 BOOK REVIEW The memo asserts that the role of the … + photographers + producers + ISNA, Islamic Circle of North America, Brotherhood “is the initiative, pioneering, programs anchors + journalists + in BMI, Baitul Mal Inc., IIIT, International leadership, raising the banner and addition to other media and art.…” Institute for Islamic Thought, [and the] “An Explanatory Memorandum” pushing people in that direction. They The memo provides “A list of our IIC, Islamic Information Center….” are then to work to employ, direct and organizations and the organizations of Muslim Brotherhood alumni support from the Archives of the Muslim unify Muslims’ efforts and powers for our friends… ISNA, Islamic Society the worldwide ideology of Islamic this process. In order to do that, we must of North America, MSA, Muslim supremacism, either by serving as a non- possess a mastery of the art of ‘coalitions,’ Students Association, MCA, Muslim violent “carrot” to subvert governments, Brotherhood in America the art of ‘absorption,’ and the principles Communities Association, AMSS, the as is advocated in An Explanatory of ‘cooperation’ …. The success of the Association of Muslim Social Scientists, Memorandum, or as a “stick” to deliver Movement in America and establishing AMSE, Association of Muslim Scientists manipulative pressure by serving in Reviewed by: Chris Graham Written by: Mohamed Akram an observant Islamic base with power and and Engineers, IMA, Islamic Medical terrorist groups such as al-Qaeda, Hamas, effectiveness will be the best support and Association, ITC, Islamic Teaching and countless others. It is their objectives aid to the global Movement project.” Center, NAIT, North American that must be defeated, not merely one of n August 2004, an alert Maryland America which was approved by the Akram explains, “If we examined the Islamic Trust, FID, Foundation for the complimenting strategies or the other. police officer observed a woman Shura Council and the Organizational human and the financial resources the International Development, IHC, Islamic An Explanatory Memorandum Iwearing traditional Islamic garb Conference for the year [1987] Ikwhan [Brotherhood] alone own in this Housing Cooperative, ICD, Islamic should be required reading for the law videotaping the support structures of is ‘Enablement of Islam in North country, we and others would feel proud Centers Division, ATP, American Trust enforcement agents and military personnel the Chesapeake Bay Bridge from a America,’ meaning: establishing and glorious. And if we add to them and Publications, AVC, Audio-Visual Center, of all Western nations. The book is vehicle, and conducted a traffic stop. The effective and a stable Islamic Movement the resources of our friends and allies, IBS, Islamic Book Service, MBA, Muslim invaluable for officials who wish to avoid driver, Ismail Elbarasse, was detained led by the Muslim Brotherhood which those who circle in our orbit and those Businessmen Association, MYNA, embarrassing themselves further with on an outstanding warrant issued in adopts Muslims’ causes domestically waiting on our banner, we would realize Muslim Youth of North America, IFC, dangerous ignorance, and for citizens who connection with investigations of and globally, which works to expand the that we are able to open the door to ISNA FIQH Committee, IPAC, ISNA wish to understand the threat they face fundraising for Hamas. observant Muslim base, aims at unifying settlement and walk through it seeking to Political Awareness Committee, IED and possess the knowledge necessary to The FBI executed a search warrant on and directing Muslims’ efforts, presents make Almighty God’s word the highest.” Islamic Education Department, MAYA, educate friends and family. • Elbarasse’s residence in Virginia. In the Islam is a civilization alternative, The Muslim Brotherhood memo Muslim Arab Youth Association, MISG, basement, agents found a secret room and supports the global Islamic State advocates a “gradual” process. It states, Malaysian Islamic Study Group, IAP, ABOUT THE AUTHOR full of documents. Documents from this wherever it is.” “We have a seed for a ‘comprehensive Islamic Association for Palestine, UASR Mr. Graham is a former commander raid were entered into evidence during The Muslim Brotherhood document media and art’ organization: we own… United Association for Studies and of a military anti-terrorism unit and he the U.S. v. Holy Land Foundation trial. explains: “The process of settlement audio and visual center + art production Research, OLF, Occupied Land Fund, is the editor of The Counter Terrorist One of the most important papers was is a ‘Civilization-Jihadist process’ office + magazines in Arabic and English MIA, Mercy International Association, magazine (www.30-10pistol.com) entitled An Explanatory Memorandum: On with all the word means. The Ikwhan the General Strategic Goal for the Group [Brotherhood] must understand that in North America. Written by Muslim their work in America is a kind of grand Brotherhood, North American Board Jihad in eliminating and destroying the of Directors member and senior Hamas review by the Brothers’ leadership in Western civilization from within and leader Mohamed Akram, it is accessible Egypt. It was certainly not intended for “sabotaging” its miserable house by their in “An Explanatory Memorandum” from public consumption… in …the United hands and the hands of the believers so the Archives of the Muslim Brotherhood States.” The intro also asserts, “[These] that it is eliminated and God’s religion is in America (Center for Security Policy, papers … confirm what investigators made victorious over all other religions. 2013). The memorandum is reproduced and counterterrorism experts had long Without this level of understanding, we from the official federal court translation suspected and contended about the are not up to this challenge and have not of government Exhibit 003–0085 3:04 myriad Muslim-American groups in prepared ourselves for Jihad yet. It is a – CR – 240 – G from U.S. v. Holy Land United States: nearly all of them are Muslim’s destiny to perform Jihad and Standard and Reverse Foundation, et al. controlled by the Muslim Brotherhood.” work wherever he is and wherever he lands Polarity Views CSP’s introduction describes the The translated document states, “The until final hour comes, and there is no memo: “It was meant for internal general strategic goal of the Group in escape from that destiny…”

44 The Counter Terrorist ~ April/May 2014 Circle 231 on Reader Service Card The Counter Terrorist ~ April/May 2014 45 By John P. Sullivan BACRIM: COLOMBIAN BANDAS Conflict and crime converge in interesting ways. As CRIMINALES EMERGENTES the relevance of the nation-state declines, gangsters, revolutionaries, and terrorists interact in a variety of ways that are increasingly significant.1 “Bacrim” may represent an emerging and adaptive adversary in , the epicenter of contemporary drug wars.

BACRIM: PARAMILITARY SUCCESSORS n estimated 3,800-10,000 Unidas de Colombia, or AUC (United Self- result, many demobilizing paramilitaries people are believed to Defense Forces of Colombia) in 2006. saw the amnesty for armed groups as Aparticipate in criminal bands formed The demobilization of the AUC left an opportunity to move into the narco from the remnants of Colombia’s many of its 31,670 members adrift. trade for themselves. Former paramilitary paramilitaries.2 These groups, known The AUC, which was formed in the late leaders and soldiers formed new bands to as bandas criminales (criminal gangs) or 1990s to combat the FARC (Fuerzas exploit the lucrative drug trade.3 bandas criminals emergentes (emerging Armadas Revolucionarias de Colombia/ The term BACRIM was coined by criminal gangs)—BACRIM—are Revolutionary Armed Forces of Colombia), former Colombian President Álvaro exploiting the vacuum left in the wake derived approximately 70% of its Uribe to describe the emerging criminal of the demobilization of the Autodefensas revenue from narcotrafficking. As a gangs. Alternative names for the gangs

Medellín (Antioquia),Colombia Photo by: EEIM 46 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 47 Terrorist attack by the FARC with a car bomb at the headquarters of Caracol Radio. The attack left 43 people injured. Photo by: Julián Ortega Martínez

include New Illegal Armed Groups The top six groups include: Los (NIAGs)4 and neo-paramilitaries. Among Urabeños, in the departments of Antioquía, the gangs identified as BACRIM are: Chocó, Bolívar, Magdalena and Norte de Águilas Negras, Autodefensas Gaitanistas de Santander; , in Nariño, Cauca Colombia, Banda Criminal de Urabá, Los and Putumayo; and El Bloque Meta, Los Urabeños, Los Machos, Los Paisas, Renacer, Libertadores de Vichada, Renacer and Los Nueva Generación, Los Rastrojos, ERPAC, Machos, in Meta, Vichada and Guainía.7 Cordillera, Cacique Pipintá, Grupo de In 2008 Bacrim presence was reported Martín Llanos, Los Nevados, and La in 259 municipalities, by 2009 in 278, .5 in 2010 360, and in 2011 they were BACRIM are believed to operate in 31 found in 347 of Colombia’s 1,102 of Colombia’s 32 departments. Estimates municipalities (a slight decrease). In of their strength range from a National 2011 Los Rastrojos sustained a presence Police assessment of 3,870 members to an in 207 municipalities, while Los Urabeños Institute of Studies for Development and were present in 181. Águilas Negras was Álvaro Uribe, . Peace (INDEPAZ) assessment of 7,000. present in 88 municipalities, Los Paisas Photo by: Center for American Progress Human Rights Watch places the estimate in 87, and ERPAC in 36 towns. The higher at 10,000 members.6 situation is reportedly most critical in

48 The Counter Terrorist ~ April/May 2014 Circle 117 on Reader Service Card The Counter Terrorist ~ April/May 2014 49 Antioquía, Bolívar, Chocó, Sucre, and in other areas the new gangs and the TRANSNATIONAL 8 11 Valle. The ERPAC officially surrendered guerrillas have clashed.” CONNECTIONS to the government in 2011, but less than The various BACRIM bands also fight BACRIM have spread their tentacles half its members actually surrendered. among themselves for turf and control beyond Colombia’s borders. This The remaining members continue their of illicit trade flows. For example, battles expansion results from a dual desire to operations as part of two rival factions: El between Los Rastrojos and Los Urabeños in enhance profit and to elude the reach Bloque Meta and Libertadores de Vichada.9 2006-2009 left 2,300 dead during that of the Colombian government. This three-year timeframe.12 expansion is also a consequence of the Public corruption is also a key feature BACRIM ACTIVITIES global illicit flows: the markets are global of BACRIM activity. In order to protect The BACRIM are involved in drug and transnational actors gain competitive their turf and business interests and trafficking, extortion, unauthorized advantage. Los Rastrojos are believed to be gain freedom of movement, BACRIM mining, and smuggling contraband. allies of the Mexican while (like other entities) However, their core competency is their rivals Los Urabeños are linked to deeply rooted in narcotrafficking, suborn public officials through bribes Sinaloa’s enemy, .14 including growing coca, processing coca and corruption. Over 200 contemporary Certainly, the expanding into cocaine, and moving cocaine to Colombian anticorruption investigations transnational reach of Mexican cartels international cartels. The BACRIM are involve BACRIM connections with and transnational gangs like Mara also involved in gambling, prostitution, officials. These officials include police, Salvatrucha (MS-13) have contributed to unauthorized logging, extortion, arms security forces, municipal council this search for new markets. BACRIM trafficking and fuel smuggling.10 members, and mayors.13 FARC guerrillas during the Caguan peace leaders have been found in Argentina, The corrosive presence of BACRIM- process March 22, 2006. The BACRIM work with a range of Bolivia, Honduras, Panama, Peru, and linked corruption is believed to be Photo by: DEA Public Affairs gangs and guerrilla groups to sustain the Venezuela. In addition, BACRIM are the legacy of linkages between public drug trade. According to a BBC report, believed to be directly operating in Spain officials and the BACRIM’s paramilitary the Colombian government believes that, and Italy, where they can earn three times predecessor the AUC. The current political “in some regions they have joined forces the profit they can realize from trading power of the BACRIM is assessed to be less with left-wing rebels [like the FARC and with Mexican cartels.15 ELN-Ejército de Liberación Nacional] to substantial than that of the AUC, but it Operation Martillo, Spanish for hammer, is a U.S., European and Western Hemisphere partner nation effort targeting illicit trafficking routes in coastal waters along the Central run drug-trafficking operations, while has the potential to grow if left unchecked. American isthmus. Photo by: U.S. Navy

COUNTERCOFUENITTEERRFSEI TBERESW BAEWRAER!E!

-Uses the precise wavelength of light to show you EVERYTHING -Uses the precise wavelen gt(cha no’tf gloig inhtto tdoet asihlso hwere y douue tEoV OEPRSEYCT.)HING (can’t go into details here due to OPSEC.) -Innovative design protects eye and skin from excessive UV radiation. -Innovative design protects eye and skin from excessive UV radiation. -Four C cell batteries = 10,000 swipes.

-Battery or line powered. -Four C cell batteries = 10,000 swipes. -Sensor switch allows hands-free activation. -Battery or line powered. Integrated white light magnifier.

-Sensor switch allows hands-free activation. Phantom Products, Inc. Use this light to authenticate all TSA-acceptable IDs. 474 Barnes Blvd., Rockledge 32955 For a current list, visit: www.tsa.gov/traveler-informationI/nactcepgtarblae-tides.d white light magnifier. 888-533-4698 Personal-Vehicular-Equipment-Movement-Specialty Actual size 12.5”L x 4.5”H x 3.2”W www.phantomscout.com Lighting Made in USA [email protected]

50Ph aThentom Counter Product sTerrorist, Inc. ~ April/May 2014 Circle 309 on Reader ServiceUse th iCards light to authenticate all TSA-acceptable IDs. Circle 146 on Reader Service Card The Counter Terrorist ~ April/May 2014 51 474 Barnes Blvd., Rockledge 32955 For a current list, visit: www.tsa.gov/traveler-information/acceptable-ids. 888-533-4698 Personal-Vehicular-Equipment-Movement-Specialty Actual size 12.5”L x 4.5”H x 3.2”W www.phantomscout.com Lighting Made in USA [email protected] Fuel containers which have been modified to carry an estimated $70,000 of cocaine each sit on the flight deck of the guided-missile frigate USS Carr (FFG 52) after being seized during Operation Martillo. Carr and her crew have been supporting Operation Martillo (Spanish for Hammer), an interagency operation combating the spread of illegal drugs to the U.S. and the use of Central American coastal waterways as shipment routes by organized criminal organizations. Photo by: Mass Communication Specialist 1st Class Ian W. Anderson

political dimension. In Medellín the is fraught with danger. The vigilantes ABOUT THE AUTHOR Urabeños claimed responsibility for a (paramilitaries or autodefensas) need Mr. Sullivan (PhD) is a senior fellow drop in murders in the aftermath of a funds to operate and often garner them at Small Wars Journal-El Centro and criminal pact between themselves and from criminal enterprises. Second, armed an adjunct researcher at the Fundación 21 Chief of Naval Operations Adm. Gary Roughead drives a semi-submersible boat while meeting with Colombian forces at Naval the Oficina de Envigado. The pact groups rarely totally abandon violence Vortex in Bogotá, Colombia. He serves Base Bolivar in Cartagena, Columbia, Dec. 5, 2009. Photo by: Tiffini Jones Vanderwyst and drop in murder have clear political when the conflict is over. Opportunity as a lieutenant with the Los Angeles dividends, especially as the “Urabeños for rebels, criminal soldiers, and gangsters Sheriff’s Department. like to maintain the pretense they are is limited. Violence and profit (as well 16 19 are purely criminal actors). Despite (essentially third generation gangs), a political organization in the mold of as plunder) often become their “reason ENDNOTES ADAPTIVE ACTORS AND this view, victims of BACRIM atrocity using violence as a means of seeking their paramilitary predecessors, capable of for being.” This is a continuing concern 1For an overview of converging STATE CHALLENGES are eligible in Colombia for the same control of narco enterprises and other replacing the state when it fails.”22 in Colombia, where the government illicit networks, see Convergence: Illicit Colombia has been working toward type of reparations afforded victims of criminal activities (mainly extortion). is negotiating a peace with the FARC. Networks and National Security in the Age demobilizing guerrilla groups. As part of conventional guerrilla groups.17 As law professor David Attanasio Like the AUC before them, many CONCLUSION: of Globalization, ed. Michael Miklaucic a “transitional justice” initiative toward The BACRIM are clandestine observed, “BACRIM primarily affect FARC operatives may find opportunity LESSONS FOR SECURITY and Jacqueline Brewer, National Defense peace, the Colombian Congress approved challengers to the state. Like other marginalized populations of limited among the BACRIM. In addition, in The BACRIM seek dominance in University Press, 2013. a “Legal Framework for Peace.” As “criminal insurgents,” they seek to avoid interest to state officials. The main areas Michoacán, Mexico, we are also seeing criminal enterprise, as well as territorial 2Ernesto Suárez Gómez. “BACRIM: part of that framework, guerillas were interference from the government.18 where BACRIM have control are rural a rise of autodefensas (self-defense forces, and social control in the areas they Heirs to Colombia’s paramilitary recognized as actors in armed conflict and They do so by corrupting and co-opting areas suitable for the manufacturing aka vigilantes) as the state appears operate, in order to sustain organizational groups.” Infosuryhoy, September 18, given lenient judicial treatment on their state officials and institutions. Co-opted or transportation of cocaine and ineffective or insufficient for combatting viability and profitability. In sustaining 2013. Available at: http://infosurhoy. surrender. Members of the BACRIM officials give the BACRIM cover and help impoverished zones in cities.”20 drug cartels. It may be a function of time viability and profitability, they challenge com/en_GB/articles/saii/features/ are excluded from this approach (which them elude prosecution. The BACRIM While many note the BACRIM, before that current crop of vigilantes the state. Two major lessons emerge. First, main/2013/09/18/feature-02. was applied to ERPAC in 2011 and the morphed from guerrilla groups, like other brigands, have a sparse relying on vigilantes to combat rebels mimics the BACRIM. • AUC in 2003 on the rationale that they becoming militarized criminal enterprises political agenda, the gangs do have a

52 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 53 Best Location in Orlando – The Florida Journal for Law Enforcement, Intelligence 3Gómez, 2013. Show Reach of BACRIM in Colombia.” Insurgency in Mexico and Central Hotel and The & Special Operations Professionals 4NIAG is the term preferred by InSight Crime, November 5, 2013. America, and their Implications for Conference the International Crisis Group, Available at: http://www.insightcrime. Global Security.” Vortex Working Paper Center see “Dismantling Colombia’s New org/news-briefs/over-200-investigations- No. 6, Bogotá: Fundación Vortex, March What a fantastic hotel. Rooms were nicely appointed, the staff Counter Illegal Armed Groups: Lessons from show-reach-of-bacrim-corruption-in- 2012. Available at: http://www.scivortex. was courteous, and the business a Surrender.” Latin America Report, colombia. org/6FromDrugWarsCriminalInsurgen center was by far the best I’ve seen. And if you love to shop, No41, June 8, 2012. Available at: http:// 14Paula Delgado-Kling. “Mexican cy.pdf. you can’t beat having the mall presents: 19 attached to the hotel. www.crisisgroup.org/en/regions/latin- Cartels Making Territory in Colombia, John P. Sullivan and Robert J. –Top rated by TripAdvisor america-caribbean/andes/colombia/041- Allying with Bacrim and FARC.” Talking Bunker. “A Crucible of Conflict: Third dismantling-colombias-new-illegal- About Colombia, March 12, 2013. Generation Gang Studies Revisited.” 9th Annual armed-groups-lessons-from-a-surrender. Available at: http://talkingaboutcolombia. Journal of Gang Research, 19.4 (2012): aspx. com/2013/03/12/mexican-cartels- 1-20. Available at: http://scholarship. 5“BACRIMs, Colombia’s “New” marking-territory-in-colombia-allying- claremont.edu/cgu_fac_pub/140/. HOMELAND SECURITY Nightmare.” LatAm-Threads, August with-bacrim-and-farc/. 20Attanasio, 2013. PROFESSIONALS 18, 2012. Available at: http://latam- 15Gómez, 2013. 21Charles Parkinson, “Urabeños Claim threads.blogspot.com/2012/08/bacrims- 16Mariel Perez-Santiago. “Colombia’s Responsibility for Drop in Medellin CONFERENCE AND colombias-new-nightmare.html. BACRIM: Common Criminals or Actors Murders,” InSight Crime, January 6Gómez, 2013. in Armed Conflict?” InSight Crime, 13, 2014. Available at: http://www. EXPOSITION 7 Gómez, 2013. July 23, 2012. Available at: http:// insightcrime.org/news-briefs/urabenos- 8“Bandas criminales operan en 347 www.insightcrime.org/news-analysis/ and-authorities-dispute-credit-for-drop-in- municipios.” El Espectador, November colombias-bacrim-common-criminals-or- medellin-murders. November 4-6, 2014 • Orlando, Florida 17, 2011. Available at: http://www. actors-in-armed-conflict. 22Parkinson, 2014. We sold out in 2013. Get your registration in as soon as possible: 17 elespectador.com/impreso/temadeldia/ David Attanasio. “Emerging Voices: • Best speakers in Homeland Security articulo-311652-bandas-criminales- Drug Cartels, Bacrim, and Other • Premiere opportunity to network with your peers in operan-347-municipios. Militarized Criminal Organizations–A 5tH ANNuAl US Homeland Security and across the Globe 9“ERPAC.” InSight Crime. Available New Role for the Inter-American • Attended by more than 100 Federal, State and Local agencies at: http://www.insightcrime.org/groups- System?” Opino Juris, August 29, • Selected Vendor expo of the latest in HS Technologies colombia/erpac. 2013. Available at: http://opiniojuris. SeCuriNg tHe u.S.-mexiCo witH 10LatAm-Threads, 2012. org/2013/08/29/emerging-voices-drug- tACtiCAl StrAtegieS & teCHNologieS PROGRAM FOR THE 2014 CONFERENCE 11“Profiles: Colombia’s armed groups.” cartels-bacrim-militarized-criminal- mAy 19-22, 2014 • SAN Diego, CA “TOOLS TO MITIGATE ACTS OF TERRORISM AND VIOLENT CRIME” BBC News, August 29, 2013. Available organizations-new-role-inter-american- • Next Generation in Behavior Analysis at: http://www.bbc.co.uk/news/world- system/. 23 All New SPeAkerS • Terrorism Funding – The many different scenarios latin-america-11400950. 18John P. Sullivan. “From Drug from CBP, DHS & more • Personal and Professional Resilience: Are you Ready 12 • Active shooters – profiling mass killers Gómez, 2013. Wars to Criminal Insurgency: Mexican IDGA’s 5th Annual Border Management Southwest • Survival against a Suicide Bomber 13James Bargent. “Investigations Cartels, Criminal Enclaves and Criminal will bring together all relevant stakeholders to discuss the most pressing issues facing the Department • Human Trafficking the Terror Nexus of Homeland Security, from efforts to build new partnerships to modernizing security capabilities. • Medical Response to a Terrorist incident • Future Threats to Homeland Security Attendees will learn: • Transit System employees – Training to prevent an incident • New technologies and applications for Main Expo: June, 24-25, 2014 And many more… border surveillance, safety and security 6th Annual Summit A: Fort Bragg SOF Outlook: June 24, 2014 • Integration of homeland security Summit B: Fort Bragg intelligence and information sharing SOLDIER EQUIPMENT Acquisition Outlook: June 25th, 2014 • Border tactics, training and capabilities Live Fire Day: June, 26th 2014 for the DHS, DOD and DOJ REGISTER NOW to get a special introductory price of and TECHNOLOGY Offi cers Club, Fort Bragg • Current and future requirements of U.S. Expo and Summit North Carolina Customs and Border Protection only $249.00 instead of $399 (valid until May 30th, 2014) Policy makers, uniformed service leaders, law enforcement and industry partners will gather in Featuring 40+ Exhibitors and 600+ Tucson to network, share best practices and explore LEARN MORE at: potential paths to fortify the United States border. www.thecounterterroristmag.com/conference Expo Hall Visitors over two days! Call now for more information. Phone: 866-573-3999 Register Today! www.soldierequipmentexpo.com www.BorderSouthwest.com 180 Fax: 866-573-2090 Circle on Reader Service [email protected] 115 54 The Counter Terrorist ~ April/May 2014 Circle on Reader Service Card Circle 113 on Reader Service Card Circle 177 on Reader Service Card The Counter Terrorist ~ April/May 2014 55 By Michael Gordon INTERNET SECURITY

he main objectives of a person The groups Anonymous and AntiSec #antisec vessels took aim at the corrupt doxing a law enforcement officer perpetrated a notable example of doxing bootboys of the 1%: the police. We FOR LAW Tinclude: to cause embarrassment, to against law enforcement officers during hacked, defaced, and destroyed several harass, to blackmail, or to take revenge. the 2011 International Chiefs of Police law enforcement targets, leaking over The biggest challenge, however, is Conference (IACP) in Chicago.1 A press 600MB of private information including that once the personal information is release by Anonymous on October internal documents, membership rosters, publically disseminated, related and 21, 2011 said, “In solidarity with addresses, passwords, social security ENFORCEMENT unrelated individuals with criminal the Occupation Movement and the numbers, and other confidential data. intentions have enough information to International Day of Action Against According to the IACP’s development AGENTS commit a myriad of crimes. Police Brutality, allied #anonymous and documents, their systems cost several

“Doxing” is short for document tracing and revealing information about a person, often for a nefarious reason. This information is gathered through publically available sources on the Internet, social media sites, and via social engineering or hacking.

56 The Counter Terrorist ~ April/May 2014 The Counter Terrorist ~ April/May 2014 57 Anonymous with Guy Fawkes masks at the Scientology area in Los Angeles. Photo by: Vincent Diamante

hundred thousand dollars. We are pleased • Phone number to destroy it all for free, leaking their • Social networking profiles, websites, private info and defacing their websites in and blogs one swift blow.” • IP addresses Doxing is not limited to technology • Internet Service Provider Doxing is not limited savvy activist groups and could easily be • Computer Operating Systems to technology savvy committed by your neighbor, co-worker, • Home Address supervisor, or a person you may have • Websites activist groups and come in contact with on the streets or • Pictures could easily be arrested. Doxing creates many safety • Financial information committed by your issues and concerns for law enforcement • Medical information agents. Doxing is a high tech assault • Romantic/sexual information neighbor, co-worker, practiced in all jurisdictions today. supervisor, or a person So what would they be looking to HOW EASY IS THIS you may have come obtain? Some of the most commonly INFORMATION TO targeted pieces of information are: OBTAIN? • Full name in contact with on the The very first place someone doxing • Age, gender, and date of birth streets or arrested. often starts is Google. Google indexes • Location and place of birth nearly everything on the Internet, • Email addresses and username sometimes even the most private

58 The Counter Terrorist ~ April/May 2014 Circle 301 on Reader Service Card The Counter Terrorist ~ April/May 2014 59 information. In my two day Open Source Intelligence and Social Media Research and Investigations course, I devote one portion of the class solely to advanced Google searching techniques. I am simply amazed at how easily abundant information and pictures of law enforcement professionals can be obtained through advanced Google searches, without any additional effort. Social networking sites such as Facebook, Instagram, LinkedIn, and Twitter are virtual jackpots for finding information on an individual. Most people, including law enforcement agents, want privacy online but post tremendous amounts of information U.S. Marine Cpl. Jonathan S. Ayala a Communication specialist from the 15th Marine about themselves on social media sites. Expeditionary Unit (15th MEU) programs a Deployed Security Interdiction Device “People who work for LAPD” or “People (DSID) during a field radio operation at Camp Del Mar, Camp Pendleton, Calif. Aug. 3, 2011. The DSID. Photo by: Lance Cpl. Danny L. Shaffer II who work for Department of Homeland Security” typed into Facebook’s Graph Search yields an amazing amount of information on unwary and vulnerable law enforcement professionals. I suspect that most have no idea how much of their information is available. That brings us to the fact that most social media users are unaware of the proper security settings or unaware of how to properly set the security settings. This lack of proper security settings makes it easier for a bad guy to find out your most detailed personal information. Location and other details can often be harvested from posted photos. Twitter, for example, can be a treasure trove of information for a person simply skimming through users’ tweets. Information such as phone numbers, additional social media accounts, friends, and pictures with locations can be found in user tweets. One common problem is that most people use the same user name and email accounts for multiple social media accounts. Locating multiple social media accounts leads to more information, email addresses, pictures,

60 The Counter Terrorist ~ April/May 2014 Circle 279 on Reader Service Card The Counter Terrorist ~ April/May 2014 61 CounterThe

Asia Pacific Edition

The Counter Terrorist Magazine Asia Pacific Edition is finally available for the Asia Pacific region counter-terrorism and homeland security practitioners. The Asia Pacific Edition not only gives the readers a worldwide counter-terrorism perspective but also in-depth information about counter terrorism activities in Asia. The Asia Pacific Edition provides an excellent platform for counter-terrorism and Another way your information can be homeland solutions providers to access discovered is through your IP Address. Sites like whatstheirip.com4 provide links and penetrate the Asia Pacific market. that can be sent to a targeted individual. Once this individual clicks on that link, the bad guy would receive an email with the individual’s IP Address. Making matters worse, if the targeted individual and possible physical addresses. Many of information on law enforcement sent someone an email, the bad guy could times people will leave location services agents. Most of these sites provide a great go to a site such as whatismyipaddress. turned on their mobile applications deal of information at little to no cost. com5, insert the email source of the when they post pictures, status updates, During my training courses I ask the law target, and trace the target’s IP address. or comments to social media sites, thus enforcement students in attendance to Even posting a comment on a WordPress making the individual a much easier use these sites so they can see how much website or blog can expose your IP target to geolocate. of their sensitive information is accessible address. So you say you’re not on social online. It hits home for my students Photo tracing with websites such as media? Are you mentioned in a friend’s when they see their personal details and tineye.com6 and Google Images7 is a social media? Making people searches that of their family readily accessible to quick way to see if pictures of a targeted on the Internet using websites such as anyone with an Internet connection and individual have been used on any other Spokeo2 and Pipl3 can offer a great deal the desire to search. website, or even if they are fake.

62 The Counter Terrorist ~ April/May 2014 Circle 255 on Reader Service Card The Counter Terrorist ~ April/May 2014 63 www.homelandsecurityssi.com TAKE YOUR TRAINING TO A HIGHER LEVEL... SSI ELEVATED TACTICS TRAINING Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical Sailors conduct computer based training. Photo by: James F. Antonucci surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

Find out more at: • Vehicle driving and operating techniques in a variety of situations STEPS FOR PROTECTION If you are unwilling to leave Facebook, get a disposable phone number in case • Global case studies of real-world operations using the specific equipment • Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults One of the best ways to protect Instagram, or Twitter, consider a fake you need a phone number to register • Elevated obstacle negotiation and firing platforms yourself as a law enforcement agent is account with a fake name and a new and create your new social media • Emergency evacuations, climbing and descending options to get off of social media sites. With so email address. Remember, don’t use the account. Keep in mind, a fake account • Distraction and deception techniques ® much information leaked from social same user name for each social media really does little if you continue to post SECURITY account you’re going to keep open. With what school you went to, where you • and much more... SOLUTIONS media sites, the safest bet is to run as far INTERNATIONAL the sophistication of facial recognition work, or what neighborhood you live in. ® from social media sites as possible. Go SSISSI Protecting the Homeland Together to the website deleteyouraccount.com8 you might want to think twice about Make sure all of your Internet profiles for links to delete many of the popular what pictures you post on your fake are set to private. Use Google, Yahoo, or Call now for more information. 9 social media sites. profile. Try the mobile app “Burner” to Bing search engines and type in your user Elevated Tactics Training provided Phone: 866-573-3999 in partnership with Patriot3. Fax: 866-573-2090 [email protected]

Circle 313 on Reader Service Card 64 65 The Counter Terrorist ~ April/May 2014 The Counter TerroristCircle 183 ~ April/Mayon Reader Service 2014 Card name, email address, or name to make cleaning it up is impossible. Watch ENDNOTES sure all your Internet profiles are secure what you say and expect that all online 1 www.PoliceOneAcademy.com Paolo Passeri. “Another Friday, Another www.PoliceOneAcademy.com and private. Go to Pipl and Spokeo communications are permanently Dump.” Hackmageddon, October 22, websites and dox yourself. If you can archived and accessible by outsiders. 2011. Available at: http://hackmageddon. find your information, so can any other Being responsible online goes a long way. com/2011/10/22/another-friday-another- person snooping around the Internet. Those of us in law enforcement have dump/. Retrieved January 27, 2014. Ensure you use different email a very small expectation of privacy in 2Spokeo. Available at: www.spokeo.com. addresses for different social media sites the real world and an even smaller one 3 Video Training Pipl. Available at: www.pipl.com. Video Training and accounts you have online. One online. Understanding how the Internet 4Whatstheirip. Available at: www. email with many Internet/social media and social media work can go a long way whatstheirip.com. accounts equals one very big problem. toward preventing you or your family 5Whatismyipaddress. Available at: On Demand Making matters worse, by using the same from being doxed. On Demand • www.whatismyipaddress.com. password for each and every one of these 6Tineye. Available at: www.tineye.com. “PoliceOne Academy’s online 7 “PoliceOne Academy’s online Maximize your training budget with accounts, if one gets compromised, they ABOUT THE AUTHOR Google Images. Available at: http:// training is a valuable tool Maximize your training budget with all get compromised. Mr. Gordon is CEO of Dataveillance www.google.com/imghp. training is a valuable tool 24/7 access to more than 500 HD (www.dataveillance.us) and serves as 8 for any officer, that provides 24/7 access to more than 500 HD Deleteyouraccount. Available at: for any officer, that provides training videos! THE BOTTOM LINE a police officer in South Florida. Mr. www.deleteyouraccount.com. high liability training at a training videos! Everyone has online vulnerabilities. Gordon is a former Marine with over 9Burner. Available at: http:// high liability training at a • Fulfill FDLE Mandatory Retraining Even if you are smart enough to stay 28 years of law enforcement experience. burnerapp.com/. moment’s notice.” moment’s notice.” • FulfillRequirements FDLE Mandatory online! Retraining off social media, employing agencies, He has worked as a patrol officer, traffic Requirements online! medical providers, and others routinely investigator, recruiter, training officer, Lt. Eric Rauch leak your information. Everyone leaves a narcotics detective, and analyst. Lt.Polk Eric County Rauch Sheriff’s Office • Provides Certificates of Completion for Polk County Sheriff’s Office • Provideseach one-hour Certificates course of completed Completion for digital footprint online and completely each one-hour course completed • 80+ hours of training available • 80+ hours of training available • Ideal for in service/roll call training Bite Suit Reward Balls with • Ideal for in service/roll call training Helmet Tug Handles $74.95 3" Ball • Create self-paced training assignments $12.95 2.5" Ball • Create self-paced training assignments $11.95 2" Ball $9.95 • Lesson plans and quizzes • Lesson plans and quizzes • Tracking and reporting features Hand • Tracking and reporting features E-Collar Holsters Protectors $39.95 $39.95 ea Special Operations • Full-featured mobile experience Has cutouts so the buttons Harness • Full-featured mobile experience can still be worked while it’s available in black, coyote or multicam* holstered. Has 2¼" metal clip Bite Suit with plastic with metal cobra • Department and individual on back of holster so it can be buckles buckles worn on a 2" duty belt or clipped $1,189.95 • Department and individual to a MOLLE tactical vest. $149.95 $199.95 subscriptions available *with attachments for MOLLE pouches subscriptions available and K-9 camera

Follow us on[ Muzzles $69.95 Contact us today at [ 866-941-4090Contact us today at Scan our QR code with your 866-941-4090 smart phone [email protected] to view our Malinois German Shepherd [email protected] online catalog. for your FREE department preview! for your FREE department preview! YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

66 The Counter Terrorist ~ April/May 2014 Circle 277 on Reader Service Card Circle 335 on Reader Service Card The Counter Terrorist ~ April/May 2014 67 INTERNATIONAL RESOURCES SSI Innovative Products ® SSI began life in a one-room office with three very busy people working around the clock to provide the very best training available. That was in 2004, just a few years after 9/11. Today the company has trained representatives from more than 1000 different Federal, State and Local agencies PORTABLE VEHICLE BARRIER and has become the Homeland Security training leader. In 2013 alone, the company trained more SSI The Portable Vehicle Barrier transfers the SSI than 250 SWAT team members and over 1000 sworn patrol officers from across the country in the cutting-edge MACTAC — active shooter program. In addition over 500 people attended programs momentum of a moving vehicle upwards and stops such as Transit Employee IED Awareness Training, Operational Response to Mass Casualty, it in its tracks. Two adults can deploy the barrier in Radical Islam: understanding the terror threat and many more. The 9th annual Homeland Security minutes without any need for electricity. It can be Professionals Conference will be held in Orlando — a major event in the HS calendar. equipped with wheels to act as a swing barrier. You Now in its 10th year, SSI is about to celebrate the anniversary by having a traded share on the can add anchoring cables and place the PVBs in a OTCBB. This will mark a new milestone in the company’s growth which has always relied on the single row or more. The PVB can be folded quickly commitment and excellence that are invested in the training; The Counter Terrorist magazine (SSI for moving and storage; it is reusable and durable. publishes the Magazine), media and even products. SSI is now going global in its second decade in www.ssipvb.com countries all over the world from Singapore to Africa. Contact: Henry Morgenstern [email protected]

TACTICAL PRODUCTS GROUP Tacprogear is a leading manufacturer of tactical equipment used by professionals around the EXOSKEL globe. The Tacprogear product lines include apparel, armor, bags and packs, nylon pouches, Exoskel is designed for times when proper climbing technique is accessories and more. unattainable, but there is need for speed and low profile scrambling. Bridging the gap between outdoor functionality and real world requirements, Tacprogear is It assists the user to rapidly ascend and negotiate obstacles, while designing new solutions through the innovative use of lightweight materials and cutting edge offering lower limb protection. Armed with teeth designed to lock on manufacturing techniques. Tacprogear relies heavily upon the constant feedback and input from to any terrain, it allows the user, via the stirrup system, to climb. operators in the field, and seeks to continually evolve the product offerings. www.exoskel-group.com www.tacprogear.com or www.tacprogearblack.com

RING POWER XGO is a leading manufacturer of highly technical base layer garments. XGO’s Phase system of GAME PLAN next-to-skin garments is designed for performance, protection, comfort and durability. XGO base The US government’s acknowledged layers allow the wearer to maximize comfort and performance for any temperature or activity. Our debt is about $17 trillion. Analysts Phase 1-4 system helps you choose the layer that’s right for you—no matter what the conditions. such as Boston University economics The system is available in Acclimate Dry, Flame Retardant and new for 2013 PT wear lines. The professor Laurence Kotlikoff place garments have been tested by outside testing labs, Natick and in theatre by our armed forces. The our government’s true liabilities features of the fabrics meet and exceed the military standards. The Acclimate FR is the patented as closer to $211 trillion. A major proprietary blend of flame-retardant fibers in all XGO FR garments that are inherent to the fibers transformation is coming and the and stay in the fabric for the lifetime of the garment. The XGO FR garments meet and exceed the sharks of the world are circling. Read ASTM 06413 standard for after flame and no drip properties. XGO is 100% Made in the USA and Berry compliant. Kevin Freeman’s Game Plan and www.proxgo.com choose your destiny. www.secretweapon.org

68 The Counter Terrorist ~ February/MarchApril/May 2014 2014 The Counter Terrorist ~ April/May 2014 69 ® The Advanced Global The APRIL/MAY 2014 The experts on training in: Security Workshop in Counter VOLUME 7 • NUMBER 2

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page Ad/Company • website and/or email...... RSN Number

55 30-10 Pistol Training • www.chrisgrahamauthor.com...... 299 49 707 Tactical Gear • www.707tacticalgear.com...... 291 16 8th Annual Border Security Expo • www.bordersecurityexpo.com...... 103 75 Adamson Police Products • www.policeproducts.com...... 116 the Homeland Security professionals best resource 71 Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com...... 215 42 ALLRed - Armadillo Tactical Gear • www.armadillotacticalgear.com...... 131 211 Israel 13 American Public University • www.amuonline.com/counter-terrorist...... 39 Armored Vehicles training by SSI • www.homelandsecurityssi.com...... 117 4 Barrett Firearms Manufacturing • www.barrett.net/training...... 121 33 BioStat LLC • www.biostatllc.com...... 271 28 Center for Rural Development • www.preventivestrategies.net...... 265 35 Charles C. Thomas Publishing • www.ccthomas.com...... 208 67 Counter Terror Expo • www.counterterrorexpo.com/exhibit...... 267 43 Cyalume Technologies Inc. • www.visipad.com...... 305 14 Diamondback Tactical • www.diamondbacktactical.com...... 74 66 Elite K9 • www.elitek9.com...... 277 2 Fechheimer Brothers Company - Vertx • www.vertx.com...... 170 21 Frazer, Ltd • www.frazerbilt.com...... 221 26 Golden Engineering • www.goldenengineering.com...... 83 Since 2005, SSI has taken Hezbollah - a threat as deadly as al-Qaeda - Learn about them in 29 Golight Inc • www.golight.com...... 285 nearly 500 First Responders their own territory, along Israel’s northern border. 64 IDGA’s Tactical Power Summit • www.specialoperationswest.com...... 113 43 J & N Tactical • www.jntactical.com...... 155 to Israel and shown them Hostage Rescue - Discover how they go wrong. 61 K9 Cop Magazine • www.k9copmagazine.com...... 279 the basics of the Israel 60 MGM Targets • www.mgmtargets.com...... 231 security concept. Hospital Response - Find out how Israel’s critical response hospitals 73 National Homeland Security Conference (UASI) • www.nationaluasi.com...... 317 Thanks in part to that handle surge and multi-casualty incidents. 15 NTOA • www.ntoa.org...... 329 59 Patriot3 • www.patriot3.com...... 301 program, we are better able Israel Counter Terrorism units - Learn how they operate. 50 Phantom Scout • www.phantomscout.com...... 309 to defend ourselves in the Israel National Police - National Academy; See how they train? 23 PoliceOne • www.policeoneacademy.com...... 335 United States. In response 62 PoliceTraining.net • ww.policetraining.net...... 191 to demand, we are now Sensitive Installations - Participate in a day-long exercise and 11 Precision Reflex Inc •www.precisionreflex.com ...... 235 training program in how to set up a complete security system. 17 Reconyx • www.reconyx.com...... 303 offering a once-in-a-lifetime 40 Ring Power - CAT • www.ringpower.com/tacticalsolutions...... 178 experience covering the Secret Israel Homeland Security Simulator - See how this works 42 Southern New Hampshire University • www.snhu.edu/ct...... 111 following advanced subjects: at a base south of Tel Aviv. 38 Southern Police Equipment • www.southernpoliceequipment.com...... 343 53 SSI Elevated Tactics • www.homelandsecurityssi.com...... 313 27 SSI MACTAC • www.homelandsecurityssi.com...... 228 May 16–24, Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most 76 SSI PVBs • www.ssipvb.com...... 226 amazing sites! Register now if you are US Military, a Homeland 65 SSI SWAT Counter Terrorism Training • www.homelandsecurityssi.com...... 179 Security Professional, a Security Professional, an EMS, or an EMT. 7 Tactical Products Gear Inc. • www.tacprogearblack.com...... 101 2014 3 Tactical Products Group Inc. • www.tacprogroup.com...... 145 63 The Counter Terrorist magazine - Asia edition • www.thorshield.com...... 255 41 XGO • www.proxgo.com...... 146 LEARN MORE at: www.homelandsecurityssi.com Call now for more information. ADVERTISER INDEX ADVERTISER 215 Circle on Reader Service Card Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 50 on Reader Service Card 70 The Counter Terrorist ~ April/May 2014 Circle 215 on Reader Service Card The Counter Terrorist ~ April/May 2014 71 TRAINING REVIEW Tactical Officer Proficiency Course By Greg Lapin

he majority of law enforcement a CQB course. It is a skills enhancement This course is designed to enhance the agencies—local, state, and federal— course. We sit down with each team prior skills and knowledge of a team of tactical haveT a continuing need for unbiased, to commencing the training and do a job officers. We don’t reinvent the wheel with up-to-date training. I believe most law analysis with them. Where do they work? them, but we do bring them up to date enforcement agencies train in something What type of terrain? What is their main and expose them to some “best practices.” like a fish bowl, and the oldest, biggest job, threat, call out, or crime? What do Day one is shooting. We use day one fish in the bowl usually dictates what they feel their greatest need is? From where to assess officers’ marksmanship and SOPs, TTPs, and training are used. and from whom did their firearms training weapons manipulation skills. We usually At times this leads to antiquated, or come? Have they received or attended any spend most of the day adjusting grips unsound tactics. outside training? What is the team’s CQB and making stances more aggressive. The Our Tactical Officer Proficiency Course experience? What are their SOPs? Do they majority of officers we deal with have (TOPC), is not a beginner’s course. It is use strong wall, direct to threat, opposing good understandings of sight picture not just a shooting package, and it is not corners, or something else? and trigger control, but once we fault

72 The Counter Terrorist ~ April/May 2014 Circle 329 on Reader Service Card The Counter Terrorist ~ April/May 2014 73 check their grips and stances, get them then move into aspects driving their support thumbs more on often overlooked by law pistols, grasping the ends of the hand enforcement personnel on guards on their M4s, and opening up the entry. We start with their stances a bit, they are amazed at the facades of open doorways. In change in recoil management and gun most law enforcement-related control. At the end of the day, we work entries, speed is not a massive with the officers on the use of cover/ concern. Unless you’re really concealment and, more specifically, on worried about vital evidence understanding and mastering their optical getting destroyed or it’s a off-set. We explain the effects of canting a hostage situation, why rush? weapon, given their specific zero and the A murder suspect can’t flush engagement distance, and we get them himself down the toilet. We exposing themselves less. start by clearing as much On day two, we focus our range drills of the room from outside on the CQB tactics that we cover in the as possible before making house and introduce the “high ready” and entry. This is not something “breakdown” positions. They are different we developed, nor is it new. tools for different applications and a Foreign special operations forces have and tragic gun fight. Unfortunately, two professional gun toter should be versed been doing this for more than a decade of his fellow deputies, one of whom was in both a low ready and a high ready. It in order to mitigate explosive threats a rookie on their SRT and also in their is my experience and opinion that in the and because of hardened emplacements TOPC, were ambushed and killed by two majority of CQB, the high ready (when being set up in rooms. We finish out the subjects with AKs. Still visibly shaken used correctly) is safer for teammates and day getting the guys working in two to from the incident, he recounted the faster for getting the gun into the room. four man teams, making entry on the incident, explaining fine details about his We show them the specifics and get them doorways utilizing the new techniques position, movement and awareness. The shooting range drills that utilize the high they’ve learned. deputy was a senior deputy who was no ready. The breakdown is nothing more The next three days are typically spent stranger to violence. On that day he took than what the retention position is for in the shoot house. Some teams request out two lowlifes who were armed with your pistol: with both hands still on the some open-air work; vehicle assaults or AKs while he was armed with a pistol. He gun in your normal grip position, the rifle small unit patrolling techniques, so we utilized cover and maneuver and worked is sucked back and up high underneath cater each course to suit the specific unit. with his teammates to end the fight. your arm. Your barrel is aligned to chest In the shoot house, we start by simply Technology changes, bad guys change height and your muzzle is brought back watching. We then start offering the and tactics must adapt. It is necessary drastically to allow you to get closer to officers a different way of doing things. to stay not just one, but multiple steps corners and thresholds without exposing Most often, we start by slowing the guys ahead, and to remain a humble student. anything. It opens up your field of view, down, teaching them to clear rooms The day you stop learning is the day you allowing you to see “hands” without before they make entry and offset angles should find a new job. compromising speed on target. The break to cover threats that their buddies are www.vatagroup.net down is almost solely for the number exposed to. After three days of CQB, one man. The rest of the team should most guys start seeing the benefit of these ABOUT THE AUTHOR be in either the high ready or low ready, newer methods and become much more Mr. Lapin is a former detective and depending on the situation and their efficient in the house. member of a specialized tactical team. positions. This course has been very rewarding for He has provided “operational support” At this point, guys aren’t just getting us. A TOPC student from a few months and advanced training to U.S. comfortable with the techniques, but ago told us he could hear us yelling at government agencies in high-threat start to really see the benefits. We him in his head during a recent intense regions around the world. •

74 The Counter Terrorist ~ April/May 2014 Circle 116 on Reader Service Card The Counter Terrorist ~ April/May 2014 75 Circle 280 on Reader Service Card