ISRAELI CARRY • HISTORY OF SELOUS SCOUTS • FLYING ARMED • SECURITY CONSEQUENCES

Journal for Law Enforcement, Intelligence & Special Operations Professionals

FEBRUARY/MARCH 2016

VOLUME 9 • NUMBER 1

SECONDARY AND TERTIARY EXPLOITATION OF EVENTS

INTERNATIONAL EDITION An SSI ® Publication FEBRUARY/MARCH 2016 thecounterterroristmag.com USA/CANADA $5.99 LEGEND REFINED m 1 07a1

Battle Proven. Lighter Than Ever. Enhanced Precision. SUPPRESSOR CAPABLE .50 BMG

Barrett will not sell to government agencies in the State of California or New York. Learn more at barrett.net

2 The Counter Terrorist ~ February/March 2016 Circle 121 on Reader Service Card The Counter TerroristCircle ~319 February/March on Reader Service 2016 Card 3 4Circle The 301 Counter on Reader Terrorist Service ~Card February/March 2016 The Journal for Law Enforcement, Intelligence & Special Operations Professionals FEBRUARY/MARCH 2016 Counter VOLUME 9 • NUMBER 1

COVER STORY:

SECONDARY AND TERTIARY EXPLOITATION OF EVENTS 20 by Dr. Clairissa D. Breen, PhD, CAS FEATURES:

HISTORY OF THE SELOUS SCOUTS 20 0 8 by Lieutenant Colonel Ron Reid-Daly CLM, DMM, MBE, Selous Scouts

FLYING WITH 14 by Garret Machine

ISRAELI CARRY FOR ARMED AND RESPONSIBLE CITIZENS 34 by Ken Pagano

LESSONS FROM THE RECENT WAVE OF ATTACKS 42 by John Gomez 8 POTENTIAL SECURITY CONSEQUENCES OF THE 54 NEW AMERICAN COLLEGE CAMPUS by Joseph J. Kolb

DEPARTMENTS:

06 From the Editor If the U.S. does not negotiate with terrorists, then why are they arraigned in Civilian court?

32 Book Review 34 Bombs, IEDs, and Explosives: Identification, Investigation, and Disposal Techniques

66 Innovative Products The PDS™ system, Patriot3, Fairleigh Dickinson University, The Intimidator® Style 138, The Phantom Warrior MT™ Multitask Flashlight, The Lenco BearCat®

70 Training Review Federal Law Enforcement Training Center (FLETC) Training

42 CONTENTS Cover Photo: Illustration by Jennifer McKibben

The Counter Terrorist ~ February/March 2016 5 FROM THE EDITOR: The If the U.S. does not negotiate Counter

Journal for Law Enforcement, Intelligence with terrorists, then why are they & Special Operations Professionals arraigned in Civilian court? VOLUME 9 • NUMBER 1 FEBRUARY/MARCH 2016 by Garret Machine Editor Garret Machine Director of Operations Carmen Arnaes Director of Advertizing hould a terrorist be given the same civil rights and due process of law that a Sol Bradman criminal would have? Every society is plagued with crime, but only some are Administrative S Ashley Villegas plagued with terrorism. If a perpetrator is actively engaging in violent deadly behavior, Contributing Editors does it matter what their ideology is? No, in the moment it makes no difference. Can a Dr. Clairissa D. Breen first responder to an active shooter know in that moment the motivation of the shooter Lieutenant Colonel Ron Reid-Daly Ken Pagano and will they have enough information in that moment to decide the appropriate level John Gomez of force? In real time, no they will not. Joseph J. Kolb We need to make a shift in our way of thinking and it can only come from the top Graphic Design Morrison Creative Company down. If a person is stabbing, shooting, running over, etc., they are a terrorist, an enemy Copy Editor of our society, and must be dealt with swiftly. Until we recognize this as parallel to an Laura Town enemy combatant invading our country and intent on destroying our way of life, we will Advertising Sales not be able to effectively fight it. You cannot defeat terrorism because it is decentralized Sol Bradman [email protected] and the parameters for its success are undefined. You can, however, suppress it. Let me 305-302-2790 tell you a quick story to illustrate the point. Publisher: In 2008, a terrorist stole a front loader or bulldozer from a construction site on Security Solutions International 13155 SW 134th St. • STE 103 Jaffa Street in Jerusalem, Israel. This street in this city is equivalent to the main street Miami, Florida 33186 in downtown Anytown, U.S.A. at midday. The terrorist then proceeded to crush cars, run over people, and flip over a city bus. A twenty-year-old off-duty soldier (who had recently been drafted into the IDF) happened to be walking down the street when this ISSN 1941-8639 The Counter Terrorist happened. The soldier ran up to a security guard, grabbed his pistol, sprinted up to Magazine, Journal for Law Enforcement, Intelligence & Special Operations the bulldozer, and climbed up to the cockpit. He shot the terrorist in the head at point Professionals is published by Security Solutions International LLC, as a service to blank range as the terrorist was yelling “Allahu akbar.” There was no arrest, no court the nation’s First Responders and Homeland of public opinion, no investigation of the soldier’s actions, no lawyers, and no second- Security Professionals with the aim of deepening understanding of issues related guessing his reaction. He was commended for his aggression, decisiveness, bravery, and to Terrorism. No part of the publication for ridding the world of evil by the Prime Minister himself. can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 Garret Machine SW 134th Street, Suite 103, Miami, Florida. Editor, The Counter Terrorist 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: Security Solutions International at [email protected] or call 786-573-3999 Please visit the magazine web site where you can also contact the editorial staff: www.thecounterterrroristmag.com © 2016 Security Solutions International

6 The Counter Terrorist ~ February/March 2016 We want to hear from you! Tell us how CTS Less Lethal products have helped you accomplish your mission:

@COMBINEDSYSTEMSINC

@COMBINEDSYSINC

[email protected] WWW.COMBINEDSYSTEMS.COM

Circle 93 on Reader Service Card The Counter Terrorist ~ February/March 2016 7 HISTORY OF THE SELOUS SCOUTS

8 The Counter Terrorist ~ February/March 2016 by Lieutenant Colonel Ron Reid-Daly CLM, DMM, MBE, Selous Scouts

The first serious terrorist incursions into Rhodesia took place during 1967/68. In the military operations which were swiftly mounted by the Rhodesian security forces when these incursions were detected, the terrorist forces were annihilated almost to a man.

urvivors of these actions who they did with considerable efficiency. Rhodesia, using FRELIMO infrastructure managed to re-cross the Zambezi The terrorist hierarchy became aware as base areas. Intelligence, that vital SRiver and return to their bases sat down that they had ignored the major tenet ingredient in insurgent warfare, dried up, with their leaders to find out what had of Mao Tse-tung: if the guerrilla is to leaving the Rhodesian forces baffled and gone wrong so that they could revise their enjoy any measure of success, he must dispirited because they could not get to strategy and tactics. have the support of the people who will grips with their enemy. They realized that their first mistake feed him, hide him, guide him, and act Fortunately for the Rhodesians, at this had been to enter the uninhabited game as his eyes and ears against the security time a small experimental “pseudogroup” areas of the Zambezi Valley, which forces. Having grasped this fundamental had commenced operations. This group, the Rhodesian security forces knew truth, the terrorist forces set to work on modeled on the pseudo-gangs that had like the backs of their hands. For the implementing this strategy. been used in the Mau Mau campaign Rhodesian forces it was simply a matter The first fruits of their success came in Kenya, set out to make connections of finding their tracks, following them, about in December 1972, when the with the real terrorists with the aim of and neutralizing the terrorists when terrorists opened up a new campaign initiating a contact. This new dimension they were brought to contact. This in the northeastern border areas of in the Rhodesian Bush War was an

The Counter Terrorist ~ February/March 2016 9 …68% of terrorist kills in the internal operational areas were officially credited to Selous Scouts operations.

Operational areas of the Rhodesian Security Forces during the Bush War in the 1970s. Photo by: Cliftonian

immediate success and produced a major breakthrough in the means of acquiring of hot, accurate intelligence. Plans were immediately initiated to create a new unit to specialize in pseudo-operations, and the Selous Scouts were born. Volunteers from all units in the Rhodesian Army were called for, a selection and training course was decided on, and in January 1974 the first Selous Scouts troop deployed into the operational area. The second and third troops followed and by the end of March 1974 the Selous Scouts had the capability of deploying three troops into the field. The impact of these men in their operational areas was immediate and A Rhodesian soldier questioning villagers near the border of Botswana in the fall of 1977. Photo by: J. Ross Baughman electrifying. The Fire Force concept was initiated, and with the Selous Scouts locating terrorist targets for the Fire Force to neutralize, the kill rate rose to an all-time high. The morale of the security forces, which had taken a definite dip as a result of the terrorists changing

10 The Counter Terrorist ~ February/March 2016 The Counter Terrorist ~ February/March 2016 11 Circle 262 on Reader Service Card their tactics, rose with the kill rate. The group of black and white scouts was Rhodesia is no more and has joined the impact of the Selous Scouts on the war formed to pinpoint external terrorist pages of history. But her security forces is best illustrated by the fact that 68% of targets. These men, operating in pairs, one can be proud of the fight they carried terrorist kills in the internal operational black and one white, would be dropped to the enemy, for they won all their areas were officially credited to Selous by means of free-fall parachute, mostly by battles but lost the political war. And the Scouts operations. night, into target areas in Mozambique Selous Scouts Regiment can stand tall However, despite these successes, and Zambia. When enough data had been and proud at the forefront of these fine the war spread into new areas because collected the camps would be attacked, men. The Selous Scouts operators were the terrorists, taking advantage of the often by motorized raiding columns. innovative, imaginative, and brought a collapse of the Portuguese, organized an The Selous Scouts operated from new dimension to counterinsurgency on infrastructure of base and training camps January 1974 until March 1980, when a scale never before seen in any guerrilla in Mozambique. It was obvious that if Rhodesia was sold out. The operations war. And perhaps the greatest strength these camps were not neutralized, the carried out by this unit were many of the Selous Scouts Regiment was its Rhodesians would be fighting a losing and varied, ranging from internal tremendous esprit de corps, which was battle, because the rate of attrition in pseudo-operations to operations such that it pulled together not only men the operational areas was nowhere near designed to destroy FRELIMO and of different races and tribes, but even the terrorist influx into Rhodesia. But Zambian infrastructure such as trains, turned terrorists, and bonded them into a before these camps could be neutralized, bridges and long stretches of railway unique brotherhood. • it was necessary to have an exact pinpoint line. Neutralizing external camps of their position. And so yet another and administration bases was also ABOUT THE AUTHOR dimension was added to the Selous undertaken and perhaps the best external The author was a proud member of Scouts’ armory in the shape of a specialist operation was when seventy-two men the Selous Scouts. For a comprehensive external reconnaissance group. entered a Communist terrorist camp in account of the origins and history of the The foremost exponent of the art of Mozambique dressed up as FRELIMO famous special forces unit as told by the reconnaissance was, without doubt, troops. When the attack had been men of the unit themselves please review Captain Christopher Schulenburg. Under completed, 1,028 terrorists lay dead in Selous Scouts—the Men Speak by Schulie’s inspiration, a small dedicated the camp. Jonathan Pittaway.

Mineproofed armoured vehicles of the Zimbabwe National Army at Methuen Barracks, 1980. Photo by: John Wynne Hopkins

12 The Counter Terrorist ~ February/March 2016 Best Location in Orlando – The Florida Journal for Law Enforcement, Intelligence Hotel and The & Special Operations Professionals Conference Center What a fantastic hotel. Rooms were nicely appointed, the staff Counter was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall presents: attached to the hotel. –Top rated by TripAdvisor 11th Annual HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION October 25-26, 2016 • Orlando, FL

We sold out in 2015 Get your registration in as soon as possible: • Best speakers in Homeland Security • Premiere opportunity to network with your peers in US Homeland Security and across the Globe • Attended by more than 100 Federal, State and Local agencies • Selected Vendor expo of the latest in HS Technologies This year’s The Counter Terrorist Magazine Annual Homeland Security Professionals conference will celebrate its first decade. This will be a highly publicized event throughout the country and abroad. REGISTER NOW

REGISTRATION COST $399.00 *Government and group rates available. Call us for details.

LEARN MORE at: www.thecounterterroristmag.com/conference Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 177 on Reader Service Card The Counter Terrorist ~~ February/MarchFebruary/March 20162015 1373 FLYING WITH FIREARMS

14 The Counter Terrorist ~ February/March 2016 by Garret Machine

Everyone has heard the phrase “have gun will travel”; well, some take it more seriously then others. Over the last five years I have been traveling all over the country teaching civilians, security, and police the strategies for combating terrorism through live fire training seminars.

have been fortunate enough to fall enough, then you too will have to travel TSA has three simple rules: the in with the right group of people and with your weapon at some point. So, this must be unloaded and separated from Ihave had the pleasure of making my way is for you. ammunition, locked in a hard sided through 35 states and Canada plus a few container, and declared at the check- other countries. But this is not about THE BASICS in counter. But unfortunately, it’s not the training; it’s about the traveling from We all know that the TSA has the that simple. Each airport has its own state to state by commercial aircraft with very important responsibility of keeping procedure and each airline has its own firearms. If you work in this field for long air travel safe and incident free. The regulations as well. What I have found,

The Counter Terrorist ~ February/March 2016 15 after traveling twice a week with fifteen a loaded magazine stored in the same pistols and two in tow, is that it container as the unloaded firearm. is up to the discretion of the individual “Firearm magazines and ammunition person at the checkin counter to clips, whether loaded or empty, must interpret those rules and regulations. be securely boxed or included within This can make the difference between an a hard-sided case containing an uneventful flight and a hassle that will unloaded firearm.” And “Small arms cost you time and money. ammunition, including ammunition Some incidents and lessons learned: not exceeding .75 caliber for or • If you read the TSA rules, you may pistol and shells of any gauge, believe that ammunition in a magazine may be carried in the same hard- is an acceptable way of transporting it. sided case as the firearm, as described Screening Checkpoint at Boston Logan It is not. It’s a $1,000 fine for having in the packing guidelines above.” In International Airport. Photo by: U.S. Federal Government

16 The Counter Terrorist ~ February/March 2016 20534 Counter Terrorist Magazine Ad v1_Layout 1 1/21/16 3:20 PM Page 1

Online Undergraduate, Graduate & Certificate Studies in Public Safety & Homeland Security

Meeting the professional advancement needs of those committed to protecting the public. Earn your career credentials without job interruption through Fairleigh Dickinson University’s respected online degree and certificate offerings. Established in 1942, FDU is New Jersey’s largest private university with 12,000 students worldwide. Degree Offerings • Master of Administrative Science • Master of Science in Homeland Security • Bachelor of Arts in Individualized Studies Certificate Studies Career-relevant programs are available at the graduate and undergraduate level in such areas as terrorism, forensics, global security, disaster and emergency management, transit safety, homeland security, and more. Credits earned can be applied toward the appropriate degree program.

• FDU is proud to participate in the Yellow Ribbon G.I. Education Advancement program enabling eligible veterans to attend FDU at no charge. • FDU accepts Federal Tuition Assistance (FTA) for undergraduate and graduate courses (restrictions apply). • No entrance exams required.

For More Information Undergraduate Programs Graduate Programs JoAnna Steiner Ronald E. Calissi 201-692-7357 201-692-6522 [email protected] [email protected]

fdu.edu/mas

CALL TODAY. CLASSES BEGIN YEAR-ROUND.

Circle 10 on Reader Service Card The Counter Terrorist ~ February/March 2016 17 They let me throw the ammunition in the trash right there at the terminal so I could check in and make the flight.

one incident I experienced, it was the individual agent who made the “loaded” determination, even after the police officer in the terminal inspected the weapon and called it “unloaded by definition.” • An airline ticket agent in a separate incident refused to accept ammunition even when it was in a separate locked container, but in the same larger suitcase. They let me throw the ammunition in the trash right there at the terminal so I could check in and make the flight. • At another airport, a check-in agent refused to accept fifteen firearms even after the TSA cleared them to fly. I had to have a friend from a local gun shop come pick up the firearms so I could make the flight. • Sometimes, the weapon cases come out on the belt with the rest of the baggage, and other times they come out with oversized bags. In some cases, the guns were “lost” and returned later after Detroit Wayne County Airport. Photo by: Minseong Kim

18 The Counter Terrorist ~ February/March 2016 9TH ANNUAL I didn’t even need them because the FOLLOW UP training had passed. The moral of the story is to drive when MILITARY • On three separate occasions I have you can. If not, use frequent flyer miles had the cases destroyed by the airline to upgrade yourself to first class, and RADAR to the point that the weapons had then they are noticeably more inclined SUMMIT 2016 to be removed and put in a separate to help your luggage make it to where it cardboard box. In one such incident the February 29-March 2, 2016 is supposed to be. When you do need to Washington D.C. firearms case was dragged behind the fly with weapons, the fewer the better. baggage tractor across the runway. Don’t even bother bringing ammo. Get DETERMINING REQUIREMENTS Perhaps a simple solution to hassle-free it where you are going. Finally, if you’re FOR FUTURE RADAR CAPABILITIES airline travel would be a unified procedure • Improving small target detection and using training guns or Sim guns, they UAV radar capabilities followed by all air carriers and all terminals get checked in as weapons, but let them • Expanding radar reach in the arctic with regard to firearm check-in. Seeing as know that they are training tools and not circle the TSA is the official governing body, one • Enabling features and capabilities of actual deadly weapons. This also makes Cognitive RF would think that their regulations trump a difference when they look alike to • The latest advancements in electronic airline-specific rules. However when untrained persons. • warfare capabilities reading the rules, each individual agent is left with their own interpretation due ABOUT THE AUTHOR to the ambiguity and the sheer number Garret Machine is a Certified Protection of employees and terminals. In the Professional and Board Certified in meantime, I have found that being overly Security Management. nice, polite, and excessively friendly makes www.MilitaryRadarSummit.com an enormous difference. Circle 113 on Reader Service Card

Circle 20 on Reader Service Card The Counter Terrorist ~ February/March 2016 19 SECONDARY AND TERTIARY EXPLOITATION OF EVENTS

20 The Counter Terrorist ~ February/March 2016 by Dr. Clairissa D. Breen, PhD, CAS

Douglas MacArthur once said that “there is no such thing as security, there is only opportunity.” The primary function of terrorism is to exploit any available opportunity.

ny event can be exploited by terrorism for their own benefit. It is terrorists. Events are a resource more likely that terrorists are not directly Athat can be used and manipulated by involved in the events that provide the terrorists for a variety of purposes. most opportunities for exploitation. However, it is not necessary for terrorists In some cases, the event in question is to participate in an event in order naturally occurring, such as a hurricane. to exploit it. Secondary and tertiary Military events not directed at a terrorist exploitation of events by terrorist organization are also easily exploited. organizations refers to a variety of ways Any event that has social or political in which terrorists can use an event ramifications can be exploited by a that may have had nothing to do with terrorist organization.

Community members gather around a firepit during the fifth night of demonstrations outside the Minneapolis Police Department's 4th Precinct following the police shooting death of Jamar Clark. Photo by: Tony Webster The Counter Terrorist ~ February/March 2016 21 The East German delegation marching in the opening ceremonies of the 1972 Summer Olympics. Photo by: Gahlbeck Friedrich

The concept of secondary or tertiary accomplish any goal in a vacuum; exploitation of events by terrorists is they need an audience. Changes in not new. Members of the Narodniki the availability of contact with a larger in the 1800s kept abreast of current audience have allowed terrorists to reach events around the world and used letters more supporters, more recruits, and more to newspapers in response to events, targets. It has become far easier for a such as the assassination of President wide range of terrorist groups to become McKinley, to acquire a platform for household names with far less effort than their cause on the global media stage.1 ever before. The Black September chose multiple There are a variety of ways to exploit means of exploiting the 1972 Summer an event. The first is offense collection. Olympic Games in Munich, Germany For both individual terrorists and Front view of the Israeli apartment at the to present their message to the world, organizations, the collection of offenses is 1972 Olympic Games in Munich where acquire supporters, and embarrass the important. Most terrorists like to portray the athletes were held hostage during the German government.2 Terrorists cannot themselves as responding to slight or Munich massacre. Photo by: ProhibitOnions

22 The Counter Terrorist ~ February/March 2016 aggression rather than being the instigator. Offense collection allows individual terrorists and organizations to respond to allegations or dissent with a list of terrible actions perpetrated by their targets or victims. For domestic right-wing terrorists, like Timothy McVeigh, the litany of offenses perpetrated by the Federal Government includes Ruby Ridge, where U.S. Marshals and later the FBI engaged in a fatal standoff with the white separatist family of Randy Weaver, and Waco, where state and federal law enforcement supported by the military laid siege to the Branch Davidians’ compound in Texas, a siege that ended with a tragic fire and the death of over eighty supporters of the cult in 1993.3 For international terrorists, the list of offenses can include the Mohammed cartoons, military operations, alliances between target nations, and diplomatic and/or economic sanctions. For single- This is the last photograph of Vicki Weaver before she was killed by an FBI sniper August 22, issue terrorists such as eco-terrorists, 1992 in the Ruby Ridge standoff. Photo by: U.S. Marshal Service animal rights extremists, and violent anti- abortionists, changes in legislation can be seen as a failure of government to protect their cause and can be collected as offenses just as easily as actual cases of pollution, animal experimentation or cruelty, or abortions.4,5 Likewise, media attention to Terrorists cannot their cause, investigative reports, articles, or documentaries can be seen as popular accomplish any support, as much as they provide evidence goal in a vacuum; to support offense collection. Popular opinion can be very important they need an to certain terrorist organizations. While audience. some organizations have engaged in social programs to assist individuals in areas where they operate, train, or recruit in order to buoy popular opinion, event exploitation provides a new way The Mount Carmel Center engulfed in of swaying popular opinion. This form flames on April 19, 1993. of event exploitation rarely includes Photo by: Federal Bureau of Investigation natural disasters, unless the exploiting

The Counter Terrorist ~ February/March 2016 23 Embarrassing the target is event exploitation that highlights some action by the target that is shameful domestically or internationally. A political or social failure, an incident that brings condemnation to the target country from outsiders, a military mistake, a protest, a riot, or any of the signs that there is malcontent in the target country, can be easily exploited to embarrass it. Hamas has actively used civilian areas to launch attacks against Israel, forcing Israel to attack areas that increase the likelihood of civilian casualties, such as schools, refugee camps, and hospitals. These death tolls can later be exploited by Hamas in Underground damage after the 1993 World Trade bombing. Photo by: Bureau of ATF 1993 the popular press to embarrass Israel on Explosives Incident Report the world stage. Similar actions seek to embarrass one target nation due to its connection to another, such as Ramzi terrorist organization is a single-issue Yousef’s motivations for the 1993 World environmental group, which then Trade Center attack, stating that the can argue that the natural disaster has primary motive was to end the United taken place because of some previous States’ political, military, and financial counter-environmental action or support to Israel. State supporters of neglect. Political, economic, or social terrorism have often highlighted protests actions are the easiest events to exploit and riots in enemy locations as a sign of in this fashion, especially in the era of weakness in that country and as signs instant opinion. A terrorist organization of the way policies or ideology in that can exploit any speech, any economic country is failing in comparison to their downturn, any social movement to own system. A combination of exploiting benefit its standing in popular opinion, popular opinion and embarrassing target mostly by highlighting the opposition nations can be used to gain supporters. as weak, wrong, dangerous to its own When terrorists use event exploitation people, insensitive, war-mongering, to gain supporters, they can be doing so or forcing the terrorist organization to to gain financial support, without actively respond in a negative fashion. In the seeking recruits. Terrorist organizations Procession of emergency vehicles at the 1993 case of military events, the accidental that create shell charities easily gain World Trade Center bombing. destruction of civilian sites is easily support through secondary and tertiary Photo by: Eric Ascalon exploited to show the opposition as exploitation of events by requesting more aggressive and disregarding human financial support for widows or orphans life. These situations are among those associated with an event. In these cases, best used for embarrassing the target of photos from the exploitable event are terrorist activity. used to create the personal response

24 The Counter Terrorist ~ February/March 2016 Police officers using tear gas during the first wave of the Ferguson Riots. Photo by: Loavesofbread that draws financial support. For more self-radicalize and prepare for lone wolf marches, rallies, and sometimes riots opportunistic terrorist organizations, operations. For others, it is the careful can be exploited for recruitment, as fake charities for a wide range of natural exploitation of events and the associated well as action, as in the case of Allen disasters have been created for funding, personal response of the recruit that Lawrence “Lance” Scarsella III, Nathan exploiting the desire of people to help can be used to draw an individual into Gustavsson, 21, and Daniel Macey, those in need in response to a hurricane a terrorist organization. For example, who shot five people at a Black Lives or tsunami. Recruitment of supporters by the Black Lives Matter movement Matter encampment in Minneapolis.6 exploiting events can be accomplished in has drawn a wide range of groups On the other side of the same series of a variety of ways. and individuals together to highlight events, supporters of the Black Lives For some, the event itself is violence against and within the African- Matter movement have highlighted galvanizing enough to draw the American community. For radical white and exploited the events leading to the individual to an organization or to supremacist organizations, the protests, creation of the movement to target

The Counter Terrorist ~ February/March 2016 25 NYC action in solidarity with Ferguson. Mo, encouraging a boycott of Black Friday Consumerism. Photo by: The All-Nite Images

26 The Counter Terrorist ~ February/March 2016 Photo by: The All-Nite Images and kill law enforcement, leading to the deaths of Wenjian Liu and Rafael Ramos.7 Protests and groups that have called for the assassination of white police officers include the African American Defense League.8 Another way in which events can be exploited is to allow terrorist organizations and individuals to gain access to targets. Events that open an area to the general public provide opportunities for terrorist organizations and individuals to gather information about a target, to conduct surveillance, and to prepare for future attacks. These can be public or personal events, such as David Headley’s use of seeking a venue for an upcoming wedding to conduct surveillance on the hotel chosen for the Mumbai attack.9 The increased use of a wide range of social Black Lives Matter supporters and allies gather inside the Minneapolis City Hall rotunda on media platforms means that additional December 3, 2015, after an early morning raid and eviction of demonstrators occupying the space outside the Minneapolis Police Department's 4th Precinct, following the police shooting information such as the average number death of Jamar Clark. Photo by: Tony Webster

The Counter Terrorist ~ February/March 2016 27 Events around the world, from the lighting of Christmas trees to rock concerts, can all be expxloited as opportunities for attack.

28 The Counter Terrorist ~ February/March 2016 of individuals attending a public event personal connection can be turning points can be identified and extrapolated by in self-radicalization. Sovereign Citizen terrorist organizations and individuals Jerry Kane became increasingly radical for future attacks. in his anti-government beliefs before he On occasion, terrorist organizations and his son were involved in the murder will seek to exploit an event to show of Officers Brandon Paudert and Bill the extent of their reach or influence. Evans through a series of interactions This has been actively encouraged by with law enforcement, courts, and banks. both al-Qaeda and ISIS through their Each one of these events perpetuating his propaganda magazines Inspire and Dabiq, beliefs in government enslavement and respectively, where potential followers the likelihood that his next interaction and supporters are advised to engage with law enforcement would be violent.13 in attacks without input, training, or For others, successful terrorist events or financial support from these terrorist activities can provide a reference point organizations, and state their connection for radicalization, such as the Fort Dix to al-Qaeda or ISIS. Then, those groups Six and repeated viewing of the videos of would claim them as followers.10,11 In the Baghdad Sniper,14 or the many videos these cases, there is a delay in terrorist and writings of Anwar al-Awlaki, who organizations claiming responsibility has inspired a wide range of individuals for attacks, and it muddies the water to engage in terrorist activities, including regarding the true extent of a terrorist the Tsarnaev brothers in Boston, Hasan in organization. This activity was previously Fort Hood, Texas, and Carlos Bledsoe in seen in organizations such as the Earth Little Rock, Arkansas. Al-Awlaki continues and Animal Liberation Fronts, who told to do so despite his death in 2011.15 supporters to engage in terrorist action Events around the world, from and use graffiti to show that the event the lighting of Christmas trees to was associated with the organization.4 In rock concerts, can all be exploited other cases, terrorist organizations have claimed unrelated events in efforts to show that they are more capable of attacking a target than previously believed, such as the claim by Tehrik-i-Taliban Pakistan chief Baitullah Mehsud that they were behind the shootings at the American Civic Association in Binghamton, NY in 2009.12 Another way in which events are exploited by terrorists is for the purposes of radicalization. In cases of self-radicalization, the benefit of the continuous exploitation of an event can be used to perpetuate the development of a personal ideology based on views of what that event symbolizes. Events to which an individual has created a 2013 Boston Marathon site after bombings. Photo by: AaronTang

The Counter Terrorist ~ February/March 2016 29 as opportunities for attack. Military recruits or even generous innocents— necessary for an event to be terroristic in operations, political speeches, rallies, to provide social or financial gain to nature for it to be exploited by terrorist marches, riots: each can be seen as a terrorist organizations. Instant access organizations, nor is it necessary for means to gain support for terrorist ideas to information and audiences through individuals who begin to exploit events and action. Once an event has occurred, social media allows for continuous for terroristic purposes to have any it can be repackaged and presented and immediate exploitation of events, direct connection to an existing terrorist to supporters of terrorism—potential opinions, and audiences. It is not organization or ideology. Terrorists will continue to exploit events. It is part of their nature. However, increased vigilance and wider collaboration between local, 10th Anniversary Event state, federal, and international agencies can counteract the negative impact of terrorist exploitation of events. • 20 SAN ANTONIO ABOUT THE AUTHOR

APRIL 16 Dr. Clairissa D. Breen, Ph.D. CAS, is program director for criminal 13-14 TEXAS justice and homeland security studies at Cazenovia College. She received her PhD from Temple University and is Countering Transnational Organized Crime: An certified as an anti-terrorism specialist by Important Component of Counter-Terrorism Strategy the anti-terrorism accreditation board. Her primary research interests include catastrophic criminology, terrorism, hate Now more than ever. groups, political and historical crime. Dr. Breen gives talk and seminars around the world. She can be reached at clairissa. [email protected] for consultation.

ENDNOTES 1Vera Figner, Memoirs of a Revolutionist (DeKalb, IL: Northern Illinois University Press, 2001). 2 Simon Reeve, One Day in September: ■ The largest gathering of border security leaders and field The Full Story of the 1972 Munich commanders Olympics Massacre and the Israeli Revenge ■ Largest exhibition of border technology products, Operation “Wrath of God” (New York: systems and solutions anywhere Arcade Publishing, 2000). ■ Daily keynotes, luncheons and awards ceremonies 3Mark Hamm, Apocalypse In ■ Host to the Salute to Fallen Heroes Memorial Ceremony Oklahoma: Waco and Ruby Ridge ■ Networking events throughout Revenged (Lebanon, NH: Northeastern University Press, 1997). 4United States Congress Senate Committee, Eco-terrorism Specifically Visit www.BorderSecurityExpo.com For Information on Attending, Sponsorships and Exhibiting

30 The Counter Terrorist ~ February/March 2016 Circle 103 on Reader Service Card Examining The Earth Liberation Front and 14Graham, Troy, “Jurors see videos 15Bergen, Peter, “The American who The Animal Liberation Front (Scholar’s taken from defendants Some appeared inspires terror from Paris to the U.S.,” Choice, 2015). to be pained,” Philly.com, October 23, CNN, January 11, 2015, http://www. 5Elanor Bader and Patricia Baird Windle, 2008, http://articles.philly.com/2008-10- cnn.com/2015/01/11/opinion/bergen- Targets of Hatred: Anti-Abortion Terrorism 23/news/25264414_1_video-fort-dix- american-terrorism-leader-paris-attack/ (New York: St. Martin’s Press, 2015). shain-duka. index.html. 6David Neiwert, “Three Men Who Shot Black Lives Matter Protesters Emerged From Internet’s Racist Swamps,” Southern Policy Law Center, November 25, 2015, https://www.splcenter.org/ hatewatch/2015/11/25/three-men-who- shot-black-lives-matter-protesters-emerged- internet%E2%80%99s-racist-swamps. 7Benjamin Mueller and Al Baker, “2 Rolling Mass Casualty Kit N.Y.P.D. Officers Killed in Brooklyn Ambush; Suspect Commits Suicide,” The New York Times, December 21, 2014, http://www.nytimes.com/2014/12/21/ nyregion/two-police-officers-shot-in-their- patrol-car-in-brooklyn.html. 8“African American Defense League,” Facebook, https://www.facebook.com/ pages/African-American-Defense- League/759646587404526. 9Kaare Sørensen and Cory Klingsporn, The Mind of a Terrorist: David Headley, the Mumbai Massacre, and His European Revenge (New York: Arcade Publishing, 2016). 10Al-Qaeda, Inspire Magazine, 2010. 11ISIS, Dabiq Magazine, 2012. 12Anwal Iqbar, “FBI Rejects Mehsud’s Claim for NY Attack,” Dawn, April 4, 2009, http://www.dawn.com/ news/454907/fbi-rejects-mehsudaes-claim- for-ny-attack. 13Zack McMillin and Marc Perrusquia, “Police killers identified as activists on mission to spread anti-government message,” Knoxville News Sentinel, May 22, 2010, http://www.knoxnews.com/news/ nation-and-world/police-killers-identified- activists-mission-spread. The TACOPS® line is sold exclusively through TSSi. TSSI-OPS.COM [email protected] / Toll-free 877 535-8774

Circle 123 on Reader Service Card The Counter Terrorist ~ February/March 2016 31 BOOK REVIEW Bombs, IEDs, and Explosives: Identification, Investigation, and Disposal Techniques by Paul R. Laska Reviewed by Garret Machine © 2016, Taylor & Francis Group, LLC

oming from the Israel Defense most of which are entertaining and a C Forces (IDF) and living in nice break from the depth of knowledge Israel for the better part of a decade, in the book. Then the subject matter I feel a little numb to the idea of moves to the structure of EOD and explosives and improvised explosive bomb disposal in the civilian law devices (IEDs) when compared to the enforcement and emergency response layman. Granted, I participated in field. This was a great overview and several operations involving breaching very educational for me, as I knew and responded to potential suicide little about U.S. civilian EOD and bombers. However, the truth is that I HAZMAT as they relate to the various was never a hot breacher or a bomb tech, agencies and training bodies. Next, the so my familiarity with the subject matter book explores the specifics of EOD of this book is still quite limited. investigation, organization, training, After working with the IDF, I trained legal considerations and response. After on IEDs for security operations but that, the focus turns to equipment, never really took much of a personal evidence handling, and documentation. interest in the topic. Explosive ordnance Finally, the last few chapters of the book disposal (EOD) is its own technical are dedicated to detailed case studies. profession and a high-stress field within Needless to say, the book is well an already intense line of work. This organized and informative for book was a great way for me to refresh the layman, as well as for the law my memory, expand my perspective, enforcement professional who is and get some details about U.S. bomb interested in career advancement. My disposal, how it is organized, and how it recommendation to anyone new to the operates in various law enforcement and technical topics presented in this volume emergency response scenarios. would be to read slowly—and read the IDF forces uncovered four improvised The book starts off with the history book twice. In fact, I would say that explosive devices in the bags of two of IEDs, including investigation and this book could even serve as one of the Palestinians at Beka'ot Crossing, north of disposal techniques, and it is interlaced manuals for an actual EOD course, or at Jericho. The devices were safely detonated with case studies and relevant images, least as required reading. • by a team of sappers. Photo by: Israel Defense Forces

32 The Counter Terrorist ~ February/March 2016 The Counter Terrorist ~ February/March 2016 33 ISRAELI CARRY FOR ARMED AND RESPONSIBLE CITIZENS

Marines practice drawing their pistols at a moment’s notice during a V.I.P. security course at the Indoor Small-Arms Range. For three days, Marines from Marine Corps Air Station Iwakuni, Japan, trained with former members of the Israeli Special Forces in tactics used in V.I.P. protection. Photo by: U.S. federal government, 34 The Counter Terrorist ~ February/March 2016 by Ken Pagano

The ancients had a saying: “The wicked flee when no one is pursuing, but the righteous are bold as a lion.” To broach this topic upon American soil is not for the faint of heart. Believe me, I know.

have been an advocate of the Israeli in the chamber you might as well carry a method of carry for almost forty years. brick; an unloaded gun is just an expensive IWhile the topic could be applied to others’ paperweight; or anyone who carries a gun focus groups, in this case I will specifically with the chamber empty must be afraid of be concerned with civilians who carry a their gun or doesn’t have proper training. concealed firearm. All such comments are banal nonsense. I purposefully choose to sidestep I grew up in a family that possessed a and refuse to respond to the common deep respect and admiration for firearms. gun range and Internet chatter. Such For the most part we were just ordinary comments as, if you don’t have a round civilians. Albeit, I did have relatives who

The Counter Terrorist ~ February/March 2016 35 served as police, deputy sheriffs and federal agents. I had thirteen uncles who fought during WWII. But when it was all said and done, when they came home they returned to their civilian life. But they all had an appreciation for guns as citizens. I myself grew up hunting and sport shooting in the Northeast when guns were still popular. I was a gun guy, as a civilian, before I served in the U.S. Marine Corps, and I am still a gun guy today. Before I started serving as a deputy sheriff, I was a gun guy, and see myself still being a gun guy when I no longer have active police powers. I do not believe that firearms should be limited to military and police. I fully respect and admire military, police, and all other first responders. I am one and have been, off and on, for the past forty years. But my passion lies with training civilians, the ordinary man or woman who carries a firearm primarily for self-defense. They are not police, nor do they wish to be. They carry a gun to protect themselves or their loved ones from harm. In fact, they are often the true first responders when a situation goes “sideways,” often before 911 is called and help arrives. I call them “self-responders.” My goal is to train average civilians in a safe and effective system that will help them become responsible armed citizens. This means they must be just as responsible when not using their firearms as they would be if they had to deploy one in self-defense. Since the object of the article has been established, namely the armed responsible civilian, let me now explain the subject. It is what I have found to be the best method of training for citizens, the Israeli carry system. Notice that I used the word “system.” The Israeli method of carry comprises so much more than what the average person Muslim Quarter. Photo by: James Emery would normally think when hearing this

36 The Counter Terrorist ~ February/March 2016 terminology. Let me begin by stating they were then: Israeli carry provides a what the Israeli method of carry is not. means that allows safe carry with quick It is not merely the carrying of a response time for a population largely firearm without a round in the chamber. untrained in the use of firearms, in close Although the majority of Israelis do quarters urban environment. This is quite indeed carry without a chambered often the same situation when training round, some specialized military/police civilians to prepare for concealed carry. units do not. Yet they still carry “Israeli.” Most have semi-auto of various calibers Why? Because the Israeli technique is and design and are urbanites who have a complete system that begins with a little or no prior training. In this climate proper mindset and embraces other topics the Israeli method flourishes. such as open hand self-defense, first aid, The method of carrying with a loaded and physical conditioning, to name a magazine in the gun without a chambered few. It is a close-quarters fighting system round has been around since the advent that relies primary on point shooting. of semi-auto pistols. Some would argue The body position, gun presentation, and that the practice was around in the Old operating under stress are part and parcel West, when single action ruled of the Israeli method. Merely carrying a the day, and many would not carry with firearm without a chambered round is a round under the hammer. Currently just a small piece of the puzzle. Yet when the commonly known conditions of most people hear of the Israeli method or carry that are based upon the usage of carrying Israeli, they think of a pistol sans the 1911, single-action semi-auto are: a loaded chamber. Condition 1, loaded magazine in the I was first introduced to Condition 3 weapon, a round in the chamber, the carry, also known as Cruiser carry, while hammer cocked and locked. Condition a young man in the Marines almost 2 is a loaded magazine in, a round in forty years ago. As I began to expand my the chamber and hammer fully down or training with firearms, I would later come in the half cock position. Condition 3, to logically understand and fully embrace which has become known as Israeli carry, the Israeli carry method. is a loaded magazine in the weapon but The technique of carrying chamber no round in the chamber. The gun must empty is not restricted to the Israelis, nor be drawn and the slide cycled in order to did they develop it. It goes back to the chamber the first round. Condition 4 is days of Fairbairn and Sykes, when they the weapon without a round or magazine The gun must worked with the Shanghai Municipal in the chamber and the slide locked back Police during the 1920s and ‘30s. Their in the open position. be drawn method was later adopted and enhanced Condition 3 carry is a valid method and the slide by one Hector Grant-Taylor, whose and is still taught and practiced by our teaching later became the basis for The military in certain venues. It is a practice cycled in order Palestinian Police Force Manual. The utilized by some of the largest civilian to chamber the manual provided the foundation for armed security companies across the Israeli method. It acquired that label globe. And it is often the primary fashion first round. because the Israelis popularized it as that most civilians feel comfortable a method of carry and developed an when first beginning to carry a semi- entire system around empty-chamber auto firearm. Some states even teach in carry utilizing point shooting. And their their mandated Department of Criminal reasons for doing so are as valid today as Justice Training (DOCJT) curriculum

The Counter Terrorist ~ February/March 2016 37 that a single action , be it the introduction of another, the potential without a live round in the chamber. It pistol or , should not be carried of a negligent discharge. is a safe and effective method that I too with a round in the chamber or under Bearing all this in mind, I think it is learned many years ago. I am convinced the hammer. Since 9/11, with the rise safe to say whether or not one agrees with now more than ever, under normal daily of terrorism, the concern with active this fashion of carry, it is still valid option conditions, that this is still the best shooter events, and the vast majority in which teaching needs to be provided. method of carry, especially for civilians. of states allowing for concealed carry, The primary reason for Israeli carry All one needs to do is a quick Internet there are now more armed civilians then has always been safety. The Israeli army search on the topic of negligent/ ever before. And as some states consider is made up of conscripts, young men and accidental discharges (NDs/ADs) expanding concealed carry of firearms women who not only want but also have to understand the reasoning behind to include public schools, some policy to serve in the military. Many if not most carrying Israeli. The number of NDs makers need to consider balancing the have no prior firearms training. It is a by trained professionals, such as law mitigation of one type of vulnerability, reasonable and safe practice to introduce enforcement officers (LEOs), is mind the potential of an active shooter, with these young soldiers to firearms training numbing and somewhat embarrassing, to say the least. Most of these NDs occur during administrative handling of the firearm, such as drawing, holstering, or cleaning of the weapon. Some will argue that this boils down to a training issue, to which I have no quarrel. If one would simply keep their finger off the trigger, most of this discussion would be moot. However, sometimes it is also due to an equipment failure such as a faulty holster. There may be other factors such as the weapons platform itself, that make it easier for an ND to occur, but that is for another discussion. The fact remains that NDs still occur, and perpetrated by people who are considered to be the trained professionals. Sad but true, many officers only practice with their firearms when qualifications are due. Many never take Soldiers of the Caracal co-ed battalion during a platoon exercise in southern Israel. their guns from their holsters until this Photo by: The Israel Defense Forces time. Routinely, most don then remove their gun belts without even touching the sidearm, which is often secured in a multiple retention holster. And even March 30 – April 1, 2016 · McAllen, TX then, there are still reported cases of negligent discharges. So how much more likely are these to occur for the average civilian? One who most likely uses a simple concealment holster, level, who may be removing their firearms multiple times in the course of the day, depending ADVANCING CAPABILITIES IN THE FIELD on their circumstances? Every time a gun REGISTER TODA WWW.BORDERSOUTWEST.COM

38 The Counter Terrorist ~ February/March 2016 Circle 117 on Reader Service Card Circle 279 on Reader Service Card The Counter Terrorist ~ February/March 2016 39 is handled, the risk potential goes up. actual gunfight is not that likely; it’s a And since these individuals are not LE, once in a lifetime. And if it does happen, they arguably are more likely to shoot it is going to involve a few seconds of themselves with their own firearm by my life. Admittedly, they are going to be means of administrative handling then extremely important seconds, but I have they are of being shot in a gunfight. to balance that against the thousands As a general proposition, the risk of of hours I will carry the gun, and the a ND from carrying C1 is far greater thousands of times I will administratively than the risk of being killed because handle the gun. Only then can I do a someone is carrying Israeli. That is the honest and responsible risk assessment. simple truth for most civilians who carry Israeli carry without a round in the a concealed firearm. The preponderance chamber, for the average citizen, is the of self-defense situations, of which I am safest manner of carry, bar none. aware, do not include an ambush or As an instructor, I can attest to the other such circumstances that require fact that the vast majority of those who a one-hand only, instant response. Part carry a firearm are not as proficient as A civilian who is and parcel of training for responsible they should be. They are unconsciously proficient in the Israeli citizens is to prepare for the worst but incompetant. It is a sad fact that most are practice for what is most probable. not “gun people.” Most who reject the draw can draw, Knowing how to clear a double feed, Israeli method of carry do so because they from concealment, with your support hand only, while in believe it is too slow on the draw and the prone position, is a good thing. But takes more time to chamber the round. in about 1.5–2.5 the practice of safely handling a firearm Having been trained in both chambered seconds, some less. on a daily basis in one’s normal civilian and unchambered Israeli methodologies, setting, I think, is better. To truly look I can attest that the Israeli method of at the safety issue, we need to move carry is less than .5 seconds slower than beyond the “I’m in a gunfight right now” chambered carry, if you are proficient. mentality and move more toward the I have been timed and have timed “What is the risk involved in carrying a others who are proficient in the Israeli gun on a daily basis?” Honestly, for the technique, and this has been proven to average civilian, being involved in an be true.

40 The Counter Terrorist ~ February/March 2016 Circle 213 on Reader Service Card A civilian who is proficient in the Israeli attack between 2.0 and 2.5 seconds. due to a weapon’s design. No playing draw can draw, from concealment, in about I will say that you must train in the with different safety mechanisms. Simply 1.5–2.5 seconds, some less. I will concede Israeli method at least as much as you draw, cock, and shoot. that the Israeli method will add perhaps would any other carry method. Frankly, I have found the training .5 seconds to the draw compared to C1 I think it is fair to say that most that goes with the carrying of a weapon carry. As a trained, responsible, and logical people will gravitate to that which they without a chambered round to be quite civilian, I can afford the extra .5 seconds know and often how they have been superior to much of what I have seen on on the draw. What I cannot afford is the trained. Me too. For some, it is difficult today’s market. While the Israeli method chance of an ND/AD. An ND/AD has the to understand or embrace a different of carry may not be for all people, I potential to wreck my life and that of my methodology. But if I am to be a do think it has more going for it, for friends or family. And that may well be true responsible civilian carry holder, I must the responsible civilian concealed carry even if the round does not strike anyone. If explore and examine multiple techniques holder, than most people care to admit. the extra .5 seconds will make a difference and find what best fits my current needs Live fire demonstrations of the Israeli in a critical incident, I confess perhaps and conditions. Under stress, you will method can be found at www.youtube. I let my guard down on my situational revert back to your training. com/TrainWithTheIDF.• awareness and that I probably need do The entire methodology of Israeli something else before going to my firearm. carry is different. But different does not ABOUT THE AUTHOR I cannot out-draw a trigger pull. If my mean inferior. In fact, the Israeli method Ken Pagano has been teaching students threat already has drawn on me, I need to has been found to be time tested on the in the Israeli method for almost 40 yrs. do something else. Action trumps reaction. mean streets of the Middle East, and He is a graduate of the FBI’s Police If a bad guy with a knife is suddenly upon has been more than a little successful. Firearms Instructor course, a member of me, well perhaps I need to seek a means It works with those of various ages and IALEFI, a certified NRA instructor, as of escape or engage my attacker with abilities and those who carry a multitude well as, an instructor trainer for Private open hand techniques, if space permits. of different weapon platforms. It works Armed Security Guards and Concealed Do the math: if the attack comes in less under stress and is safe. Carry of Deadly Weapons in his state than 2.0 seconds, it will not matter what The system focuses upon instinctive of residence. He also currently serves as condition my weapon is in because any body responses and utilizes constant a deputy sheriff and may be contact at holstered weapon would be to slow. If the repetitions of drills to develop muscle [email protected] or Facebook attack comes in over 2.5 seconds, then memory. Chamber empty is not only a at https://www.facebook.com/Israeli- any condition will be fast enough. So I safe method of carry but also helps to Tactical-Sport-Shooting-Association- am really only concerning myself with an overcome possible training complications Israeli-Combat-Sport-Shooting.

Circle 343 on Reader Service Card The Counter Terrorist ~ February/March 2016 41 LESSONS FROM THE RECENT WAVE OF ATTACKS

42 The Counter Terrorist ~ February/March 2016 by John Gomez

Any terrorist attack is undoubtedly going to lead to a variety of assumptions, most of which are based on less than solid intelligence. This was especially true for the recent terrorist attacks in California.

ithin hours of the San operational intelligence. One of the key operational methods, or tactics utilized Bernardino attacks, several takeaways from this event, especially by global terrorists, specifically those Wmedia outlets began interviewing experts in terms of the early speculation and associated with radical Islamic ideology in regard to their assumptions of what guidance, is that our understanding and objectives. had occurred and what was meant. of terrorism is rather limited and still This lack of understanding was not Unfortunately, much of what was developing. Most Law Enforcement Line only prevalent in the hours and days after presented by experts was somewhat Officers (Street LEOs), even at the federal the San Bernardino attacks, but also was a dated and did not align with real-world level, are not well versed in the ideology, key construct of the Paris attacks. As was

Blood and sand on the ground in front of Le Petit Cambodge/ Carillon on the day following November 2015 Paris attacks. Photo by: Maya-Anaïs Yataghène The Counter Terrorist ~ February/March 2016 43 The suspect's vehicle involved in a shootout with the police in the 2015 San Bernardino shooting. Photo by: San Bernardino County Sheriff's Department

the case in California, investigators and enemy. In today’s world of global terrorism, experts (advisors, etc.) made statements understanding the enemy has never been so and assumptions that were not in line critical, because frankly, so much has never with the actual operational tactics, been at stake. techniques, and procedures (TTPs) I have done what I can to present employed by today’s leading terrorist responses to common assumptions that organizations, such as ISIS. were made specifically after the California Four of the guns believed used by the couple In this article, I will examine some attacks. These responses are limited who killed 14 people and injured 21 others at of the assumptions that were made by in scope, but do a good job, I believe, the 2015 San Bernardino shooting. The rifles those either involved in the investigation of representing the broader counter- were identified as the DPMS Panther Arms or those speculating and adding color intelligence workup that was developed model A15 and a Smith & Wesson M&P15. commentary from the sidelines. My by Group Espada. In some cases I have The 9mm were from Llama arms hope is that by sharing some of the purposefully refrained from providing and Springfield Armory. Photo by: San counter-intelligence work that my firm detail or naming sources, given that this is Bernardino County Sheriff's Department put together publicly, it will help those an ongoing investigation. That stated, the in leadership positions realize that their information presented here should provide assumptions may need to evolve. Sun a fresh basis for planning and decision- Tzu, in the classic work The Art of War, making for those who are responsible for coached that it is critical to know one’s responding to terrorist attacks.

44 The Counter Terrorist ~ February/March 2016 ASSUMPTION: A female does including the amount of explosives found not fit the profile of the average terrorist at their home, which were not part of or jihadist. a trap. Based on their TTP and other details, it is my belief that the attackers There is no RESPONSE: The belief that became overzealous in their pursuit of there is such a thing as an “average” accomplishing their first mission. After restriction in the the explosives in the county building did terrorist or jihadist is counter to Koran or Hadith following the evidence. The evidence not detonate, I suspect they returned to shows that this terrorist incident did the area, or waited in the area discussing for the employment involve a female. Further, we have seen what they should do, to successfully of woman in direct the employment of females in various detonate the explosives. Upon being terrorist incidents in the past several spotted by police, they attempted to action or support years. This includes the attacks in Paris as flee. They did not stand and fight; they roles related to well as Australia and a large percentage of did not move to a hardened location: homicide bomber attacks in the Middle they attempted to continue with their jihadist activities. East. The employment of females, and secondary mission(s). Their operational in some cases children, is not atypical. mistake cost them their lives, but it is Terrorist organizations employ females naive to believe they stayed in the area on because they realize that most anti-terror purpose. This assumption does not follow agents or others (civilian population) the evidence. to embrace. Most jihadists are not do not view females as threats. The martyrs. Jihadists are warriors focused on employment of a female playing the role ASSUMPTION: There are no winning the war, not simply the battle. of a lost person, pretending to be helpless, secondary targets. Those selected for martyrdom are few or using other charms, dates back well and far between, when compared to the before the modern age of terrorism. There RESPONSE: All of the evidence overall number of jihadists employed on is no restriction in the Koran or Hadith points to secondary targets. The amount missions. There is no requirement for a for the employment of woman in direct of explosives at their base, the state of jihadist to commit martyrdom. Further action or support roles related to jihadist their personal luggage (packed and ready martyrdom does not always require the activities. The assumption that this to go), and other indicators show that practitioner to end their life. Martyrdom was an evolution of tactics is false and they were planning to return, resupply, is traditionally a complete and total does not contribute to our ability to and continue their operations. What devotion to a way of life or belief. Some prepare effectively and employ counter is unknown is if the secondary targets may be martyrs simply by carrying intelligence or action. Women are integral would be engaged directly or after a out a mission with conviction and yet part of the terrorist force and are heavily period of time. A large factor in this is continue to fight another day. That said, relied-upon assets. that they wore masks. If their goal were any jihadist who dies in battle is entitled not to continue the fight, but to martyr to the heavenly rewards described in ASSUMPTION: Why would themselves, they would have no need for their religious texts, at least as it relates the attackers stay in the area and not exit? anonymity. Anonymity is only employed to Islam. This was a well thought out when your goal is continued execution of mission and the goal was not to end their RESPONSE: It is my belief that operations, escape, or evasion. lives, but to fight on. the attackers planned to return to their base or other location (storage facility, ASSUMPTION: They weren’t ASSUMPTION: They must secondary support area, staging area) martyrs so this is workplace violence. have had help building the pipe bombs. and resupply, and that they did not plan to stay in the area. My reasoning for RESPONSE: This is another RESPONSE: It is possible they this belief is based on several factors, unqualified assumption that is dangerous did have assistance, but the fact is that

The Counter Terrorist ~ February/March 2016 45 relatively unskilled individuals can build skills and determination to build close pipe bombs. In this case specifically, to twenty pipe bombs on their own. the male attacker was highly skilled in This also fits the pattern of operational the repair of cars, understood the use of security that they employed for what tools, had the ability to read plans, and appears to have been two years or longer. had an engineering background. He had It is important to understand this, access to plans (Inspire Magazine, etc.) because the notion that a cell requires and access to the materials. His job at tremendous support or funding is a very the county also provided opportunity dangerous assumption. Driver license photo of Syed and access to compounds without Rizwan Farook. raising concern. Although they may have ASSUMPTION: He wasn’t Photo by: Department of had help, and possibly did, they did not radicalized and this wasn’t an ISIS Motor Vehicles have to have help. The attackers had the mission, since they didn’t take credit.

Tactical belt used by one of the shooters at the 2015 San Bernardino shooting. Photo by: San Bernardino County Sheriff's Department

46 The Counter Terrorist ~ February/March 2016 CounterThe

Asia Pacific Edition

The Counter Terrorist Magazine Asia Pacific Edition is finally available for the Asia Pacific region counter-terrorism and homeland security practitioners. The Asia Pacific Edition not only gives the readers a worldwide counter-terrorism perspective but also in-depth information about counter terrorism activities in Asia. The Asia Pacific Edition provides an excellent platform for counter-terrorism and homeland solutions providers to access and penetrate the Asia Pacific market.

Email: [email protected] 13 Circle 255 on Reader Service Card Circle on Reader Service Card The Counter Terrorist ~ February/March 2016 47 RESPONSE: Radicalization does overt or covert connection to a cause. ISIS, who would in turn utilize it for not require a pledge, membership, or This is franchising without the legal further marketing, specifically in the U.S. trip to a country. It might help, might paperwork and is highly effective, with a The very fact that this was part of their make things easier, but radicalization tremendous return on investment. planning and objectives demonstrates the only requires a personal commitment level of patience and professional detail to a cause. There is no fanfare required, ASSUMPTION: The GoPro was employed in planning these attacks. no requirement to post something to so they could film their martyrdom videos. social media or to take an oath. In fact, ASSUMPTION: They really doing so may not be the best operational RESPONSE: The GoPro wanted a fight with police. security and at worst is somewhat was not for martyrdom, but rather dramatic. To believe that you must have for socialization of their cause and RESPONSE: This is not what a handler, affiliation, or proof of such demonstration of what can be the evidence shows. They disposed connection is a Western belief, not a accomplished. The attackers, I believe, burner cell phones, hard drives, and other factual understanding of jihadist or wanted to use the GoPro video to show intelligence, which were recovered by terrorists overall. No mission approval others what they could do and how easy police, after the operation. This action is required, or command and control. they could do it—and still live to fight does not fit with the actions of someone Once a personal decision is made to fight, another day. There is no evidence they wanting to fight. You don’t dispose of access to resources is plentiful. We should were martyrs. Further, a martyrdom video evidence if your goal is to die fighting; also keep in mind that ISIS has repeatedly is done prior to the operation and part of in fact you don’t even think of evidence called for lone wolf attacks; this is a a ritual, which includes cleansing. None disposal. Their goal was to continue clear lone wolf attack and demonstrates of this evidence was found. These were the mission and to fight on. This is a the effectiveness and danger of such a highly intelligent attackers who would very critical lesson to be learned by law personal decision in which there is no have probably submitted the video to enforcement as it speaks to the potential

48 The Counter Terrorist ~ February/March 2016 Circle 277 on Reader Service Card to deal with prolonged operations, If you don’t think what you assume, something most U.S. Law Enforcement believe, or think matters, think again! agencies do not train for and are not You don’t dispose equipped to manage. FROM PARIS Within days of the Paris attacks, of evidence if ASSUMPTION: The 3,000 French authorities began to decipher the your goal is to die rounds of ammunition was a lot of after action reviews from the various law fighting; in fact you ammunition and required tremendous enforcement agencies that responded to funding. How could they get that on the terrorist attacks in and around Paris. don’t even think of his salary? Many lessons were learned and much of evidence disposal. that will be incorporated into go-forward RESPONSE: A lot of training programs. The top three lessons, ammunition is subjective. This is not that much ammunition and actually is similar to what was owned by the Aurora NO COST PASSES AVAILABLE FOR FEDERAL attacker. The cost of 3,000 rounds of GOVERNMENT EMPLOEES AND ACTIVE MILITAR ammunition is approximately $650, including shipping. It is not an extreme economical challenge, and does not require sophisticated funding or tactics. Since the attacks in California, much more has come to light, including trips to April 25-27, 2016 | Washington D.C. Saudi Arabia, wedding gifts, and possible participation by neighbors or family ADVANCING NETWORKS IN THE members of the attackers. Although that DOD AND MILITARY SERVICES evidence is important to understand, the real goal of this article is to drive  elp forge the way in future network requirements change in our tactics as law enforcement. and initiatives Life has dramatically changed, and  Learn how to get involved with the military’s evolution to our understandings of the life cycle Joint networks of a terrorist event, our response and  Acuire insight on where cloud computing can impact pre-planning, cannot be based on false government and military networks assumptions, outdated information, or  Learn about Emerging Technologies Supporting the limited Western perspectives that do not “Mobile” Warfi ghter match the reality of our enemies.  ear from Experts on the Army’s Roadmap to If you wonder just how drastically Network Modernization false perceptions or assumptions hinder  Discuss the Newest Advances in SATCOM and Tactical our effectiveness, I will share with you a Radio capabilities quote from a member of the French CT  Gain a deeper understanding of the big picture for our teams, who are extremely well trained. Military’s Joint Information Environment. “Nous ne crovions qu’ils etaient ce bien,  ce bien equipe, ce professionnel or ce ear fi rst hand about the future of information and technology policies of all the Military Services sophistiquee.” Translation: “We never believed that they were this good, this  Deep Dive into the organizations tasked with NETMOD initiatives well equipped, this professional, or  Gain insight about the newest advances in information this sophisticated.” assurance and security

Register Today www.MilitaryNetworModerniation.com 1-00-2-6 idgaidga.org

Circle 115 on Reader Service Card The Counter Terrorist ~ February/March 2016 49 Soldiers from France’s First Infantry Regiment march down Camps del Elysee during the 2012 14th of July parade in Paris. Photo by: U.S. Air Force photo/Staff Sgt. Benjamin Wilson

in my opinion, that were learned were that are either simultaneous or as follows. waterfall in nature. It is imperative that organizations responsible for responding SPEED AND to terrorist events train and plan for COORDINATION MATTER dealing with situations where resources One of the biggest challenges was the are challenged with multiple highly ability of ground teams to move quickly sophisticated events. and coordinate. There was a slowing of responses, in some cases, because there OPERATOR was a lack of coordination. PSYCHOLOGY MATTERS A key challenge that came out of TRAIN AND PLAN FOR Paris is that the requirements of entry SIMULTANEOUS ATTACKS teams may have changed forever. The Paris attacks forced the entry teams to November 18, 2015—French police search A key learning point of the Paris make a rather heroic choice. Stay outside for suspects after the Paris attacks in attacks, is that terrorist cells can and continue to hear their countrymen Saint-Denis. Photo by: Chris93 effectively execute coordinated attacks

50 The Counter Terrorist ~ February/March 2016 Circle 301 on Reader Service Card Circle 329301 on Reader Service Card The Counter Terrorist ~ February/March 2016 51 being slaughtered by the attackers or ABOUT THE AUTHOR enter the theatre and face near certain John Gomez is CEO of Group death. Although all entry teams realize Espada and has a background in special there is a risk, few are asked to enter operations, counter terrorism and a location with multiple attackers cyber-warfare. wearing homicide vests, who have www.groupespada.com planned to detonate themselves. The Paris entry teams knew the attackers had explosives, they knew that they were being taunted to enter and yet they had no choice but to enter. This is a major psychological challenge that leaders in law enforcement must address. Asking your entry team to enter, knowing they will most likely die, is vastly different than asking a team to enter with a good chance of winning the fight due to their conditioning.•

Photo by: Mstyslav Chernov 52 The Counter Terrorist ~ February/March 2016 www.homelandsecurityssi.com TAKE YOUR TRAINING TO A HIGHER LEVEL... SSI ELEVATED TACTICS TRAINING Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

Find out more at: • Vehicle driving and operating techniques in a variety of situations • Global case studies of real-world operations using the specific equipment • Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults • Elevated obstacle negotiation and firing platforms • Emergency evacuations, climbing and descending options • Distraction and deception techniques ® SECURITY • and much more... SOLUTIONS INTERNATIONAL SSISSI Protecting the Homeland Together ® Call now for more information. Elevated Tactics Training provided Phone: 866-573-3999 in partnership with Patriot3. Fax: 866-573-2090 [email protected]

Circle 313 on Reader Service Card 291 Circle on Reader Service Card The Counter The Counter Terrorist TerroristCircle ~ February/March 183 ~ on June/July Reader Service 20162015 Card 5329 POTENTIAL SECURITY CONSEQUENCES OF THE NEW AMERICAN COLLEGE CAMPUS

For generations, American universities have fomented radical beliefs through the free exchange of ideas critical of the dominant culture. These ideas ultimately traveled down dangerous paths.

54 The Counter Terrorist ~ February/March 2016 by Joseph J. Kolb

he recent wave of demonstrations people fighting American imperialism students are taking up the disturbing on American campuses to look to America’s youth to use our mantle, albeit naively, of radicalism. ensureT cultural and personal sensitivity strategic position behind enemy lines There is an inherent ambivalence of race and religion at the expense of to join forces in the destruction of the among most American college open dialogue could be detrimental to empire,” Dorhn said in the Weather students as to the root causes of understanding and preventing Islamic Underground’s 1970 Declaration of a terrorism as well as the implications radicalization on campus. This could State of War. The Weather Underground of international events on domestic incite some students to commit acts of was a militant spinoff of the Students for security. The elimination of open violence, either on or off campus. a Democratic Society and responsible dialogue about religion and its A generation ago, a harbinger of for taking the rhetoric operational with implications to acts of terrorism, a domestic radicalism was put forth by numerous domestic bombings. refusal to recognize an event such Bernadine Dohrn. “All over the world, Now a new generation of college as 9/11 for no other reason that

United Airlines Flight 175 crashes into the south tower of the World Trade Center complex in New York City during the September 11th attacks. Photo by: Robert J. Fisch

The Counter Terrorist ~ February/March 2016 55 it being potentially Islamaphobic,1 the around, to upload the video. Mohamed growing sense of anti-Semitism through “embraces a violent and extreme ideology” the nationwide boycott, divestment, and and “has a particular dislike of Americans,” sanctions (BDS) against Israel campaigns, said Assistant U.S. Attorney Robert Monk and an unknown demographic of Muslim at the time of Mohamed’s sentencing.4 students, such as Faisal Mohammad, The consequences of unilateral who investigators identified as being a expression while suppressing free speech troubled, isolated young man who knew through intimidation creates a hostile few people on campus, may actually environment eliminating the ability to create a sense of empowerment to execute have an atmosphere of philosophical an act of terrorism.2 checks and balances to prevent some On November 10, the (University of) theories to evolve to the operational level. Minnesota Student Association voted We will likely never know what was against a resolution to annually recognize in the mind of Faisal Mohammad when 9/11 on campus out of fear of offending he went on a stabbing spree at The Muslim students on campus.1 This University of California, Merced in seemingly benign decision was preceded November 2015 that resulted in four on November 4, when at The University people being wounded and his ultimate of California, Merced, eighteen-year-old death by police, but the subsequent freshman Faisal Mohammad went on discovery of an ISIS flag among his a stabbing spree on the campus. In the belongings and the utilization of the 2013–2014 college school year there were very same knifing tactic being employed some 400 anti-Israel events calling for the by Palestinians against Israelis is a point boycott, divestment, and sanctions in an that can’t be ignored. The narrative that attempt to dismantle/disrupt Israel.3 Mohammad went on his violent attacks A more tangible incident occurred in because he was removed from a study August 2007, when two University of group may very well be true, but the South Florida students, Ahmed Abdelatif opportunity for him to stew in his anger Sherif Mohamed and Youssef Samir and hate to the point this random act Megahed, were stopped by a Berkley of violence could have been fueled by a County sheriff deputy not far from festering disdain for American society, a Naval installation in Goose Creek, and his victims merely served as a catalyst S.C., that housed enemy combatants. for the opportunity. In the trunk of the student’s car were In Mohammad’s two-page manifesto, pipe bombs. Megahed would be found he described taking students hostage not guilty of federal charges in 2009. In then summoning campus police to 2008, Mohamed pleaded guilty to aiding steal an officer’s firearm, which he then terrorists and was sentenced to 15 years in planned to use to kill students at a prison after a YouTube video he produced dormitory. Investigators contend that the showed how to make a bomb detonator model for the attack may have been an out of a toy remote control. extremist group.2 The similarity between In the video, Mohamed admitted he Mohammad’s attacks and those carried wanted to target “infidels,” including out by Palestinians against Israelis could American troops overseas, without not be ignored. Mohammad was killed by “martyrs” having to sacrifice their lives.4 police before carrying out the plan. It was also revealed that he used USF The ingredients for subsequent radical Photo by: Bsstu equipment at night, when no one else was Islam-inspired campus attacks are rapidly

56 The Counter Terrorist ~ February/March 2016 Palestine Columbia Students for Justice in Palestine organized a mock Israeli Checkpoint to raise awareness of human rights abuses and subsequent obstruction of education. In respose pro Israeli groups on campus handed out a factsheet describing checkpoints as a "necessary evil" essential for preventing terrorist attacks. Photo by: Andra MIhali emerging, not only of actual group members, but those disenfranchised and living on the fringes of society, who will be attracted to the glamor of the jihad that can flourish in the “tolerant” college environment. Mohammad was identified as a loner, but investigators are staunchly claiming his violent act was out of revenge for being snubbed from the study group despite having an ISIS flag replica in his backpack. At the heart of the emerging anti- Israel sentiment is the Muslim Students Association (MSA) and Students for Justice in Palestine (SJP), who have been inciting a groundswell of student involvement to urge universities to Students for Justice in Palestine at UC Berkeley. Photo by: Ariel Hayat

The Counter Terrorist ~ February/March 2016 57 August 2, 2014—Students for Justice in Palestine march. Photo by: William Stadtwald Demchick boycott, divest, and create sanctions • Harvard a hostile atmosphere for pro-Israel against Israel, in large part for its • Rutgers-New Brunswick and Jewish students,” said Oren Segal, alleged repression of Palestine. Pro- • San Francisco State University director, Center on Extremism, Anti- Israeli supporters such as author David • University of California-Irvine Defamation League.6 “That in and of Horowitz says the two student groups • University of California-Los Angeles itself is troubling and should be rejected. were created by members of the Muslim • University of San Diego But there is little evidence to suggest that Brotherhood, forerunner to al-Qaeda and • University of Michigan these same student groups are incubating Hamas.5 Subsequent to vitriolic levels of • University of New Mexico hard core extremists that view foreign anti-Israel sentiment, Horowitz devised “The increase in programs and terrorist organizations such as ISIS as a a Top 10 list of American universities initiatives designed to isolate, defame, legitimate force.” “friendly to terrorists.”5 and delegitimize Israel on college Horowitz alleges that schools such as • Brandeis campuses have resulted in increased UNM (and the others) are a breeding • Columbia tension between students and can foster ground for terrorists and practice a

58 The Counter Terrorist ~ February/March 2016 This acceptance of countercultural beliefs already instilled in many of these institutions presents a daunting conundrum between free speech and religious freedom. Efforts to prevent student dissent and protest from accelerating in violence, an atmosphere of what may appear to be forced tolerance for one group at the expense of the right to free speech and expression, or the ability for nefarious individuals to plot and execute an attack under the cover of this newfound tolerance, cannot be ignored. Michael Fagel, Ph.D, Adjunct Professor at the Illinois Institute of Technology in Chicago, where he teaches in the Master of Public Administration program, focusing on homeland security and emergency planning topics, said the inherent nature of the university structure is capable of breeding radicalization. “Universities are afraid to disenfranchise a student population that generally are high revenue students,” Fagel said.9 Fagel goes on to say that many schools are hotbeds of unrest and free thinking, as many tenure track professors are radicals themselves as a throwback to the late 60s and 70s generation, and due to the fact that many universities are stuck in the politically correct mode versus the patriotic mode. What is particularly disconcerting given the open university atmosphere is the absence of any universal strategies to double standard contending that the the university were arrested on trespass identify or mitigate campus radicalization. universities have a Code of Conduct charges after hitching a ride on a school “IACLEA does not have a specific and would never tolerate such behavior bus transporting high school students.8 policy on identifying Islamic against non-Jewish students.7 With the environment of anti- radicalization, as that is an operational Not mentioned on the list is the Semitism through the BDS campaign decision of each individual institution, University of South Florida. USF has fueled by a robust radical Islamist social and its public safety organization been the focus of law enforcement media campaign, disgruntled students which is influenced by national policy attention in the past because of former such as Faisal Mohammad may pick up set by the federal government,” said computer engineering Professor Sami the mantle to carry out campus attacks. Kendra Pheasant, Associate Director al-Arian’s acknowledged connection to In a similar vein, the University of South International Association of Campus Law the Palestinian Islamic Jihad organization. Florida students planning the attack in Enforcement Administrators.10 USF also gained attention in 2006, South Carolina used their student status Fagel says such programs are few and when two Saudi students attending as a cover. far between.

The Counter Terrorist ~ February/March 2016 59 In 2005, the FBI launched the National international students, visas, technology use of university computer equipment, Security Higher Education Advisory export policy, and the special culture of as Mohamed had done with his training Board, a seventeen-member panel that colleges and universities,” said then-FBI video. Students who are disenfranchised includes presidents from top public and Director Robert Mueller.11 with the “American Dream” and exist on private research schools. The board meets the fringe of the social strata could also be approximately three times a year and WARNING SIGNS susceptible to radicalization. provides a forum for FBI leadership and Prevention is paramount to prevent Kamran Bhatti, a Canadian university presidents to discuss national campus radicalization. Warning signs volunteer outreach social worker, says security issues of mutual concern. The may be as subtle as a course major or he has observed four signs of potential College and University Security Effort—or personality traits. Burton and Stewart radicalization among youth, especially CAUSE—allows FBI Special Agents in suggest that the major of a potential in the wake of the death of four young Charge to meet with the heads of local jihadist could be a compelling factor.8 Canadians in January 2015, who left colleges to discuss national security issues Although there is no evidence at this to fight for ISIS in Syria.12 Mulholland and to share information and ideas. These point to indicate that Megahed was referenced 24-year-old John Maguire, a discussions include the national security anything but a normal student, past former University of Ottawa student who implications these world-renowned cases suggest that radical Muslim advocated domestic attacks on Canadian, research facilities may be facing and how youth studying the applied sciences as well as three Somali-Canadian cousins and why some foreign governments may are disproportionately more prone from Edmonton.12 be attempting to pry loose their research to embrace jihadism than are those Bhati warns that some students and intellectual property creations. who pursue studies in social sciences, display an obsession with Islam as a “As we do our work, we wish to be humanities, liberal arts, or business.8 result of an underlying mental illness; sensitive to university concerns about Evidence might include surreptitious some show an attraction to an extremist

Israeli Security Concepts A Comprehensive Guide For Selecting Training And Deploying A Security Team For Installation And Personnel Protection

BY GARRET MACHINE, CPP TO PURCHASE: AMZN.COM/1453769838

60 The Counter Terrorist ~ February/March 2016 ideology obsessed with fighting the The signs of an emerging radicalized combat potential digital radicalization mainstream norms; some are religious student can be as subtle as a student on campus, the University of New zealots (these are the most dangerous isolating themselves from the greater class Mexico has joined 44 other universities and most likely to strike); and some are or student body. Other signs include around the world in participating in disgruntled, typically immigrant youths computer searches, hardcopy notes or the Peer to Peer (P2P) Extremism striking back at society for their inability manifestos, or inexplicable outbursts initiative.13 The U.S. Department of to assimilate.12 against other students or university State-sponsored program creates student faculty and staff. It is for these reasons teams to “create digital media content APPLIED SECURITY that universities need to expand their in the form of an initiative, product, or MEASURES awareness programs to include everyone tool that empowers networks of youth Universities are typically cities from campus police, to students, faculty, to counter the social media presence themselves operating with their own police and clerical and maintenance staff. and effectiveness of violent extremists’ departments and policies of behavior. online messaging.” The notion these institutions are capable SOCIAL MEDIA Identifying, preventing, and or even willing to structure and prepare Internet and social media outlets mitigating operational level their public safety departments, faculty, have become the primary source of radicalization on college campuses is and staff on the current day anti-terrorist recruitment, radicalization, training, and a daunting proposition. However, war fighting has been slow to materialize, operational incitement for extremists. with the rise and digital influence of largely for the very reason the problems Al-Qaeda quickly caught the wave of ISIS and al-Qaeda, failure to do so may fester. The concern over First popularity in the relatively new medium will be catastrophic in an age Amendment rights and student privacy are during its more operational phases, but where active shooter incidents have intractable issues on campuses. most recently, ISIS has perfected it. To exponentially increased. •

WWW.jntactical.COM

Circle 155 on Reader Service Card The Counter Terrorist ~ February/March 2016 61 ABOUT THE AUTHOR html?referrer=https://search.yahoo.com/#. Intelligence, August 8, 2007, https://www. Joseph J. Kolb, M.A., is the founder of VkqitHarSM8. stratfor.com/traffic_stops_and_thwarted_plots. 4 9 the Border Security Studies Program in the Elaine Silverstrini, “Former USF Michael Fagel, e-mail interview, Criminal Justice Department at Western Student Gets 15 Years for Aiding December 3, 2015. 10 New Mexico University. Terrorists,” The Tampa Tribune, December Kendra Pheasant, e-mail interview, 18, 2008, http://www2.tbo.com/news/ December 4, 2015. ENDNOTES northeast/2008/dec/18/ex-usf-student- 11FBI, “FBI Director Appoints National mohamed-gets-xx-terrorism-case- Security Higher Education Advisory 1Kasey Carpenter, “MSA Rejects ar-114406/. Board,” September 15, 2005, https:// Moment of Recognition Resolution 5Jacob Kamaras, “Watchdog Lists ‘Top www.fbi.gov/news/pressrel/press-releases/ for 9/11,” The Minnesota Republic, Ten American Universities Friendly to fbi-appoints-national-security-higher- November 11, 2015, http://www. Terrorists,’” Stop the Jihad on Campus, education-advisory-board. mnrepublic.com/msa-rejects-moment-of- November 9, 2015, http://www. 12Angela, Mulholland, “Identifying recognition-resolution-for-911/. stopthejihadoncampus.org/. Radicals: The Four Types of Youth Attracted 2R. Parsons, B. Calix, and M. Morgante, 6Oren Segal, Anti-Defamation League, to Extremism,” CTV News, January 16, “UC Merced Stabbing Investigation Leads e-mail interview, November 28, 2015. 2015, http://www.ctvnews.ca/canada/ to Questions on Student’s Background,” 7Caleb James, “Students and Muslim identifying-radicals-the-four-types-of- The Modesto Bee, November 10, Groups, UNM Denounce Report Calling youth-attracted-to-extremism-1.2192009. 2015, http://www.modbee.com/news/ University ‘Terrorist Friendly,’” KOB4, 13Reuters, “University of New Mexico to article44189529.html. November 17, 2015, http://www.kob. Participate in P2P: Challenging Extremism 3Anti-Defamation League, “BDS on com/article/stories/s3966495.shtml#. Initiative,” October 2, 2015, http://www. American College Campuses: 2013-2014 VnRrkMArIy4. reuters.com/article/2015/10/02/unm-p2p- Year in Review,” June 4, 2014, http:// 8Fred Burton and Scott Stewart, “Traffic campaign-idUSnPnCxmW6+52+PRN2015 www.adl.org/israel-international/anti- Stops and Thwarted Plots,” Stratfor Global 1002#ABV70uIGCCP1RrYb.97. israel-activity/bds-on-american-college.

LET US SHOWCASE YOUR

BARRIO AZTECA PRC’S DEEP PANDA • 18TH ST. K&R • TROJAN HORSE SCHOOL PLOT • PRODUCTS, SERVICES AND TRAINING Journal for Law Enforcement, Intelligence & Special Operations Professionals TO OUR FIRST RESPONDERS... MS-13 RECRUITMENT RESCUE IN IRAQ • ISIS WARLORD BAGHDADI • PUTIN’S RING OF STEEL • JUNE/JULY 2015 Journal for Law Enforcement, Intelligence & Special Operations Professionals WINN D IN The Counter Terrorist is a peer We are now committed to bring AR G The NTH YE W E A A V R E The VOLUME 8 • NUMBER 4 S DEC 2014/JAN 2015 Counter

journal, that is read in the USA valuable tools to the attention of

A TH E N U N S I S V 7 I and in ASIA by: our First Responders through: Counter ERSARY

VOLUME 7 • NUMBER 6 UNDERSTANDING • Police • Detailed Product Reviews THE GLOBAL JIHAD • Fire • Innovative Product launches EBOLA AND BIOLOGICAL • Emergency Management • International Resources WARFARE • Emergency Medicine • The Military • Special Forces Call Sol Bradman now at 305-302-2790

INTERNATIONAL EDITION or write him at [email protected]

® An SSI Publication thecounterterroristmag.com

JUNE/JULY 2015 Whether it’s the magazine, our online sites and e-blasts or USA/CANADA $5.99 INTERNATIONAL EDITION our annual conference...he’ll help you reach your audience! An SSI ® Publication www.thecounterterroristmag.com DECEMBER 2014/JANUARY 2015 USA/CANADA $5.99 The Counter Terrorist ~ December 2014/January 2015 1 CounterThe ★ Homeland Security Professionals Conference and Exposition

62 The Counter Terrorist ~ February/March 2016 Circle 33 on Reader Service Card CNI PROTECTION | CYBER SECURITY | POLICING AND LAW ENFORCEMENT MAJOR EVENT SECURITY | BORDER SECURITY | OFFENDER MANAGEMENT | SERVICES

Supported by

The leading event for public and private sector security and counter terror professionals

3,000+ products and services on display 100+ free conference and seminar sessions 10,000+ private & public sector visitors 200+ expert speakers from the private sector, police, government, military and intelligence services

#SCTX16

Register as a free visitor online and save £50 www.counterterrorexpo.com/counterterrorist

Co-located with Sponsored by Follow us on Organised by

CircleJ309428_SCTX_Counter 221 on Reader Service Terrorist_2016_v1.indd Card 1 The Counter Terrorist ~ February/March18/01/2016 2016 17:26 63 Save the Date

TACKLING GLOBAL SECURITY THREATS JUNE 7–9, 2016 WASHINGTON, DC

Three of the leading organizations in global security: WHO SHOULD The Anti Money Laundering Association, (The AMLA) Quaynote Communications and Security Solutions ATTEND? • Human Resources International-SSI will be hosting the first Tackling Global directors Security Threats conference in Washington DC on June • Risk managers 7–9, 2016. Each organization will showcase best practices • Security directors and vital to tackling Global Threats for corporations. Besides managers their expertise, all three organizations are well known for • Crisis management their very successful conferences. executives • Business continuity Against a background of heightened tensions across executives the Globe this conference is imperative for corporations • Insurers, lawyers, medical, that are concerned with optimizing their response to the operational, travel and current environment. procurement professionals • AML or BSA executives • C-Suite executives

64 The Counter Terrorist ~ February/March 2016 JUNE 7 Corporate JUNE 8 Tactical and strategic responses to Liability, Travel Risk & Duty of Global Security Threats Care Conference Day 2 organized by Security Solutions Day 1 organized by International—will answer the question: How should Quaynote Communications— corporate security departments react to complex physical will answer the question: and cyber security challenges What does it take to enhance corporate sustainability in high risk Day 2 will concentrate on new strategies for assessing environments? risk and threat in a fast paced challenging environments by hearing from SSI partners, Israeli corporate security Day 1 is dedicated to examining specialists. Red Teaming as a tactical tool will be issues of corporate liability and duty examined for its contribution to auditing corporate of care of organisations towards security. In the second part of the Day our cyber their employees, especially when security partners will speak about the new challenges sending them overseas to work. for corporate cyber security and the necessity and vulnerability caused by social media in the enterprise. “It is often the C-Suite Executives Creating comprehensive policies for both Cyber security who responsible for duty of care and social media will also be discussed. In addition, the policy issues”, explained Lorna value of having a social media targeting program will be discussed by one of the creators of the leading social Titley, Director at Quaynote, “so we media targeting platform. are therefore including a session targeting this group and asking the critical issue of whether effective risk mitigation can simultaneously Henry Morgenstern: +1-305-401-6906 address duty of care and protect [email protected] the bottom line”.

JUNE 9 Organized by the AMLA—The Anti Money Laundering Association

Day 3 The AMLA—this one day conference will Lorna Titley: +1-604-538-3353 focus on the financial institution sector crimes such [email protected] as money laundering, fraud, cyber threats, terrorist financing and more. This is a must for the AML, BSA and other professionals dealing with reporting unusual or suspect activity.

Mary Miele: 407-864-532 [email protected]

The Counter Terrorist ~ February/March 2016 65 Innovative Products

THE PDS™ SYSTEM The PDS™ system utilizes a heavy-duty catch that simply Push the gun downwards in a natural draw motion securely latches around the trigger guard when the weapon and the locking lever is released. is holstered. The greatest advantage of this Retention system is that there This prevents the pistol from being grabbed by anyone is No Need to Train or Change the way you draw your gun. other than the operator. The PDS unique latching It is based on the natural instinctive movement of the draw. mechanism prevents accidental discharge of the weapon For more information about the Holster please contact while drawing by keeping the trigger finger away from [email protected] (417) 849-3233 and mention the trigger guard in a natural position. To Draw the gun you saw it in the The Counter Terrorist Magazine.

PATRIOT3 The XPS-G2’s unique; Patent Pending design incorporates the first ever, Folding Ballistic Wings. These Ballistic Wings are added to the XPS Base Unit to provide a wide area of coverage beyond that of the base unit. With Patriot3’s revolutionary wing-deployment mechanism, the Ballistic Wings can be folded backwards to reduce the width of the shield allowing passage through commercial doorways. In addition, each of the XPS Ballistic Wings can be removed instantly with one hand, allowing the XPS to split into as many as 2 separate hand held shields (NIJ 3 only) allowing team members to break away with ballistic protection to clear additional areas, simultaneously. The XPS Base Unit has several options such as Ballistic Gun Port, Lighting System, Folding Ballistic Wings, Ballistic Wing View Ports and Ballistic Wing Handles (NIJ 3 only). This shield is truly a game changer that will give you and your department or agency the tactical advantage.

66 The Counter Terrorist ~ February/March 2016 FAIRLEIGH DICKINSON UNIVERSITY Master of Science in Homeland Security A dramatic rise in terrorist activities around the world has increased awareness of the need to safeguard the United States against terrorism and other threats. The Master of Science in in advancement in this evolving field, the MSHS may be Homeland Security (MSHS) at Fairleigh Dickinson University is a completed online or on campus. 36-credit program focused on the practical and theoretical aspects of enforcing and ensuring the security of the homeland. Students The MSHS program participates in the Order of the choose from three areas of specialization: Emergency Management, Sword & Shield, the only national honor society dedicated to Leadership, and Terrorism and Security Studies. homeland security. The curriculum is designed to make your classroom experiences To learn more about the MSHS at Fairleigh Dickinson immediately applicable in the workplace. For the convenience of University, visit fdu.edu/mshs or call Paulette Laubsch, deployed military and other working professionals interested program director, at 201-692-6523.

THE INTIMIDATOR® STYLE 138 THE PHANTOM The Intimidator® 2.0 is a minimal two slot WARRIOR MT™ pancake style holster. The holster body is formed MULTITASK of precision-model Kydex® sheet while the back FLASHLIGHT component is formed of leather and synthetic Phantom Products is materials making it both compact and lightweight. proud to introduce the It is immediately available for a large number of newest addition to its handguns in both right and left. hand held lighting line: www.DeSantisHolster.com The Phantom Warrior MT™ Multitask Flashlight. This AA battery unit employs all solid state bulbs and has two intensity levels on the primary forward flashlight mode--this saves both your night eyes and your power consumption as you only use the light you need. The high intensity shoots 100 lumens out in a powerful blast to let you see EVERYTHING. But what is truly unique about this light is the side light feature. We make the only flashlight with an integrated side strobe/steady—this keeps you and your team safe in crowds as you will easily locate each other by sight instead of providing locations verbally—just hold up your light and announce your presence. The side lights are available in Amber/White, Red/Blue, or Red/White. The light can mount on your belt for easy access. This is the light that will be on every department’s “required equipment” list. phantomlights.com

THE LENCO BEARCAT® Lenco trucks can be used in a variety of missions. The BearCat, our best selling truck, may be used as a S.W.A.T. or Military Counter Attack and Rescue Vehicle and is often used in hostile Urban Environments or as a Patrol/Reaction Vehicle on a Military Base. The BearCat, with its standard NIJ IV armor and 4WD system, can carry up to 10 people through varying terrain. The BearCat has been embraced by several DoD and DoE Security Forces and, because of its affordability, low maintenance expenses, ease of use and superior armor level, is increasingly the replacement vehicle of choice for up-armored Humvees. It may also be equipped with our optional Mechanical Rotating Turret with Cupola (Tub) and Weapon Ready Mounting System, suitable for the M60, 240B and Mark 19 weapons system. www.lencoarmor.com

The Counter Terrorist ~ February/March 2016 67 The FEBRUARY/MARCH 2016 Counter VOLUME 9 • NUMBER 1

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page Ad/Company • website and/or email...... RSN Number

30 10th Annual Border Security Expo • www.bordersecurityexpo.com...... 103

73 10th Annual National Homeland Security Conference • www.nationaluasi.com...... 317

13 11th Annual Homeland Security Conference • www.thecounterterroristmag.com/conference...... 177

19 9th Annual Military Radar Summit • www.militaryradarsummit.com...... 113

71 Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com...... 215

47 Asia Pacific Edition - The Counter Terrorist •[email protected] ...... 255

2 Barrett Firearms Manufacturing • www.barrett.net...... 121

7 Combined Systems, Inc. • www.counterterrorexpo.com/counterterrorist...... 93

63 Counter Terror Expo • www.counterterrorexpo.com/counterterrorist...... 221

11 DeSantis Holster & Leathergoods • www.desantisholster.com...... 262

53 Elevated tactics by SSI • www.homelandsecurityssi.com...... 313

48 Elite K9 • www.elitek9.com...... 277

17 Fairleigh Dickinson University • www.fdu.edu/mas...... 10

61 J & N Tactical • www.jntactical.com...... 155

39 K9 Cop Magazine • www.k9copmagazine.com...... 279

69 MACTAC • www.homelandsecurityssi.com...... 228

49 NETMOD 2016 • www.militarynetworkmodernization.com...... 115

51 NTOA • www.ntoa.org/tactical-conference...... 329

40 Occupational Health Dynamics • www.ohdusa.com...... 213

4 Patriot 3 • www.patriot3.com...... 301

76 Phantom Lights • www.phantomlights.com...... 209

19 Resco Instruments • www.rescoinstruments.com...... 20

41 Southern Police Equipment • www.southernpoliceequipment.com...... 343

38 Southwest Border Security Expo 2016 • www.bordersouthwest.com...... 117

75 SSI PVBs • www.SSIPVB.com...... 226

72 SSI SWAT • www.homelandsecurityssi.com...... 13

3 Surveilance One • www.survone.com...... 319

62 The Counter Terrorist Magazine • [email protected]...... 33

31 TSSI • www.tssi-ops.com...... 123 ADVERTISER INDEX ADVERTISER

68 The Counter Terrorist ~ February/March 2016 MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY TM MACTAC The Newest, Most Dynamic Training Program from SSI ®.

MACTAC is the new tactical philosophy offering your department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks. Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course Next training in Miami, FL March 15th-18th, 2016

Contact us today at: www.homelandsecurityssi.com Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 228 on Reader Service Card

The The Counter Counter Terrorist Terrorist ~ ~August/September February/March 20152016 5769 TRAINING REVIEW Federal Law Enforcement Training Center (FLETC) Training by Garret Machine

he Federal Law Enforcement their campuses you will find the alphabet something that I felt was critical in the Training Center (FLETC) is what soup of agencies and quite a few I bet you field of law enforcement and security Tsome in the industry would call the have never even heard of. Back when was combat doctrine. It standardized it, much gold standard in LE training. Under I was working for the Israeli Ministry of the way it is in Israel, so I thought. the umbrella of the Department of Defense as a physical security specialist, Fast forward a few years, and I ended Homeland Security (DHS), the five I became interested in the different up in a place I had never imagined training sites (and countless accredited units, agencies and training offered by possible, as a student in a basic law offsite facilities) educate almost all federal partner nations. I thought FLETC was an enforcement academy, at you guessed it: law enforcement officers. At any one of interesting entity because it accomplished FLETC. I went on to take a few other

CBP Field Operations Academy at the Federal Law Enforcement Training Center in Glynco, Georgia. CBP officers initiate an arrest at the mock port of entry while overseen by a CBP Instructor. Photo by: Gerald L. Nino, CBP, U.S. Dept. of Homeland Security

70 The Counter Terrorist ~ February/March 2016 ® The Advanced Global

The experts on training in: Security Workshop in

Israelthe Homeland Security professionals best resource

Since 2005, SSI has taken Hezbollah - a threat as deadly as al-Qaeda - Learn about them in nearly 500 First Responders their own territory, along Israel’s northern border. to Israel and shown them Hostage Rescue - Discover how they go wrong. the basics of the Israel security concept. Hospital Response - Find out how Israel’s critical response hospitals Thanks in part to that handle surge and multi-casualty incidents. program, we are better able Israel Counter Terrorism units - Learn how they operate. to defend ourselves in the Israel National Police - National Academy; See how they train? United States. In response to demand, we are now Sensitive Installations - Participate in a day-long exercise and offering a once-in-a-lifetime training program in how to set up a complete security system. experience covering the Secret Israel Homeland Security Simulator - See how this works following advanced subjects: at a base south of Tel Aviv.

May 13–21 Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland 2016 Security Professional, a Security Professional, an EMS, or an EMT.

LEARN MORE at: www.homelandsecurityssi.com Call now for more information. 215 Circle on Reader Service Card Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 50 on Reader Service Card Circle 215 on Reader Service Card The Counter Terrorist ~ February/March 2016 71 advanced courses there and always look proficiency that adheres to industry best their initial certification at the state level, forward to going back there. Here is practices. Getting a FLETC diploma which depending on your municipality what you need to know about FLETC: is a prestigious thing. Consolidating can be hit-or-miss. you will be treated like a first class the training of several government law professional and receive training in the enforcement entities makes resources SUMMARY finest facilities and have all the resources available that would otherwise not be, I am a big proponent of you need to that end. Food is good and meaning you will get training that is as standardization of tactics, techniques, living conditions are nice as well: you can realistic as it can safely get. The vetting procedures, use of force policy, weapons, have your car there and keep business process for instructor staff is extensive. ammo, and training doctrine. You will hours +/-. For someone like me, I loved I made friends with the staff because of not get exactly that, but this is defiantly the various education and opportunities mutual respect. All the while, they knew as close as it is going to get in the that only a place like that can provide. when to turn up the pressure on my class foreseeable future. There is a lot to be said to get us where we needed to be. We shot for standardization and reciprocity among THE CONCEPT every day, did physical training every high liability skill sets. Looking back over FLETC sets a standard with end-state day, had defensive tactics every day, and the last fifteen years, we can see a trend objectives; how you get there is agency- class every day. We kept long hours and of skills and experiences trickling down specific. Meaning that I was trained were constantly tested, the way it should from the military to civilian LE. This is with firearms by GS staff, defensive be. I have several friends who attended a good thing, and I hope our industry tactics by contractors, and academic different courses offered through FLETC, continues to grow in this direction. • classes by agency-specific instructors. from air marshals to high-speed vessel While each agency and organization pursuit, and each came away with what will use different firearms, calibers, and they expected. Most law enforcement targets, the end result must be a level of officers will attend a local academy for

Next training: April 5th-8th, 2016 Miami, FL. Hosted by Miami Airsoft!

72 The Counter Terrorist ~ February/March 2016 Circle 13 on Reader Service Card Save The Date 10th Annual National Homeland Security Conference Tampa Bay, Florida : June 28-30, 2016

Breakout Sessions Include: Recent Events Training for Preparedness Grant Management Emergency Medical Response Port & Transit Authority Intelligence & Information Sharing Whole Community Preparedness Public Safety NCTC

For More Information Visit: WWW.NATIONALUASI.COM Securing Our Liberty by Protecting Our Homeland

Circle 317 on Reader Service Card The Counter Terrorist ~ February/March 2016 73 SubscribeSubscribe Today!Today!

I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address)

SUBSCRIPTION INFORMATION (please print clearly)

NAME______ADDRESS______CITY______STATE______ZIP______EMAIL______q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.)

Name on Card______Card #______

Exp. Date______Billing Address______FREE MEMBERSHIP TO *THE HOMELAND SECURITY Scan to subscribe NETWORK WITH EVERY GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999 SUBSCRIPTION SubscribeSubscribe Today!Today!

I would like to subscribe to The Counter Terrorist Magazine! q One year $34.99 Domestic q Two-year $64.99 Domestic q eZine $19.99 (International subscribers – must include email address)

SUBSCRIPTION INFORMATION (please print clearly)

NAME______ADDRESS______CITY______STATE______ZIP______EMAIL______q PAYMENT ENCLOSED q Visa q MC q Amex q Discover q Check (Please make checks payable to Security Solutions International.)

Name on Card______Card #______Exp. Date______Billing Address______FREE MEMBERSHIP TO *THE HOMELAND SECURITY Scan to subscribe NETWORK WITH EVERY GO ONLINE TO: www.thecounterterroristmag.com • Call us (866) 573-3999 74SUBSCRIPTION The Counter Terrorist ~ February/March 2016 New and improved

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email [email protected] Or visit our website: www.SSIPVB.com 308 Circle on ReaderCircle Service 317 on Card Reader Service Card Circle 226 on Reader Service Card The Counter Terrorist ~ February/March 2016 75 Circle 209 on Reader Service Card