<<

hotel bombings • task unit bravo • qods force • community policing

Journal for Law Enforcement, Intelligence & Special Operations Professionals The CounterFEBruary/march 2012

Volume 5 • Number 1 Is The U.N. Above The Law?

An SSI ® Publication February/march 2012 www.thecounterterroristmag.com USA/CANADA $5.99

The Counter Terrorist ~ Feburary/March 2012 1 © 2011 Thermo Fisher Scientific Inc. All rights reserved.

Every second matters.

When time and safety are critical, military and civilian first responders use Thermo Scientific handheld chemical identification instruments to rapidly identify explosives, precursors, narcotics and other chemical hazards directly at the point of need.

With more than 5,000 handheld chemical identification instruments deployed worldwide, we understand what first responders demand of their equipment—and why every second matters. These insights were key as we developed FirstDefender® RM and FirstDefender RMX, our next generation Raman instruments, which are even faster and easier to use than ever before. FirstDefender RMX and FirstDefender RM Next generation Raman instruments enable rapid identification of unknown chemicals in the field. For rapid, accurate analysis of a wide range of potential chemical hazards, turn to Thermo Scientific handheld instruments, formerly sold under the Ahura Scientific brand. To schedule a demonstration of our newest solutions, visit www.thermoscientific.com/mil-chemID or call +1 (978) 642-1132.

Moving science forward

Circle 254 on Reader Service Card 2 The Counter Terrorist ~ Feburary/March 2012 The Counter Terrorist ~ Feburary/March 2012 3 Circle 13 on Reader Service Card Circle 340 on Reader Service Card

The Counter Terrorist_Lenco_2010.indd 1 1/28/2010 10:50:42 AM 324 4 The Counter Terrorist ~ Feburary/March 2012 CircleCircle 29 onon ReaderReader ServiceService CardCard The Journal for Law Enforcement, Intelligence & Special Operations Professionals feburary/march 2012 Counter Volume 5 • Number 1

COVER story:

Is The U.N. Above The Law? 30 By Eeben Barlow FEATURES: 8 First Hand: 8 Rosie Khan, 60 Minutes, and Task unit Bravo By Bravo 25 Case Study: 20 , Hotel Bombings By Luke Bencie and Katie Mikalnik Community Policing, Counterinsurgency, 44 and Converging Threats 30 By Anthony Abati, Michael P. Downing, and John Zambri

Qods Force: Iranian Unit Tied to U.S. Plot 58 By Mark Sexton

departments:

6 from the Editor 44 No Rest for the Weary 42 book Review Brothers in Arms: How Palestinian Maoists Turned Jihadists

69 innovative Products Energizer Tactical Tango - LE, The BattleSling, HEAT Armor Tactical Truck

72 training Review Tactical Firearms Training Team Pre-Deployment Training 58 Cover: A Nepalese soldier providing security for the United Nations watches as pallets of

contents humanitarian aid drop from a U.S. Air Force C-17 Globemaster III aircraft over Mirebalais, Haiti, Jan. 21, 2010. Photo: Tech. Sgt. James L. Harper, Jr., USAF

The Counter Terrorist ~ Feburary/March 2012 5 From The Editor: CounterThe No Rest for the Weary

By Chris Graham Journal for Law Enforcement, Intelligence & Special Operations Professionals

Volume 5 • Number 1 FEB 2012/MAR 2012 Editor Chris Graham t appears that one or more European nations may enter the accelerated stages of Director of Operations Ifinancial collapse within the next year.1 Deficit government spending policies have Sol Bradman Director of Advertizing resulted in nations servicing debt payments with additional debt. It appears that the Carmen Arnaes point has been hit at which it is no longer possible for some nations to support their Director of Production debt legitimately. Kelli Richardson As the most poorly positioned debtor nations face crisis first, the possibility exists Contributing Editors Eeben Barlow that their inertia will adversely influence events in other interdependent debtor nations. Jennifer Hesterman The “free world” is in a uniquely vulnerable position whether national and ideological Richard Marquise Tom Nypaver adversaries take action to further exploit the situation or not. Steve Young Those of us who have taken the oath to “…support and defend the Constitution Graphic Design of the against all enemies, foreign and domestic…” have supported an Morrison Creative Company extremely high optempo for the past decade. It would appear that future crime and Copy Editor Laura Town conflict may only accelerate this pace of operations while adding an additional layer of Office Manager moral dilemmas as we come to grips with the most effective ways to protect the lives, Lily Valdes liberty, and property of citizens. Publisher: The Counter Terrorist remains committed to bringing you useful information on our Security Solutions International 13155 SW 134th St. • STE 204 adversaries’ tactics and techniques that are frequently unappreciated in conventional Miami, Florida 33186 media outlets. When the experience of your duties provides insight that will benefit others, share it here. Do not force our brothers and sisters to relearn what you have ISSN 1941-8639 The Counter Terrorist discovered. Magazine, Journal for Law Enforcement, I look forward to hearing from you. Intelligence & Special Operations Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with Semper Fidelis, the aim of deepening understanding of issues related to Terrorism. No part of the publication can be reproduced without permission from the publisher. Chris Graham The opinions expressed herein are the Editor, The Counter Terrorist opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security *Editor’s note: Vol. 4 No. 6, “Improvised Chemical Dispersal Devices Detonated Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. Against Civilians” incorrectly stated that Abu Musab al Zarqawi led al-Qaeda in Iraq in 33186 or [email protected] 2007 (page 23). Zarqawi was killed on June 7, 2006. Thanks to a vigilant reader (SSG The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. H, USASOC) for catching the error that I did not. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and 1 plaques please contact: http://www.stratfor.com/memberships/205285/analysis/20111130-portfolio-imf- PARS International Corp. unable-save-italy accessed Dec 15 2011 Web: www.magreprints.com/quickquote.asp Email: [email protected] Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can also contact the editorial staff: www.thecounterterrroristmag.com © 2010 Security Solutions International

6 The Counter Terrorist ~ Feburary/March 2012 ELEVATE YOUR TACTICS Patriot3’s all new Liberator HX is a hydraulically operated, single ramp Elevated Tactics System (ETS) that, when installed on your Armored Response Vehicle (ARV), greatly increases the vehicles capability and operator access. Designed to be light weight and fit a variety of vehicles like the Lenco BearCat (G2 and G3) and many other ARV’s. The Liberator can be fitted to existing ARV’s or installed on new vehicles. Capabilities include elevated entry, bus assault, sniper positioning, mass evacuation and more. All while still maintaining existing ARV functions and capabilities. Contact Patriot3 to learn more about how an ETS mounted to your ARV can help with your team’s mission success and increased level of safety. Lenco Bearcat G3 with Liberator HX

visit patriot3.com

Corporate Headquarters l Fredericksburg, VA Made in the USA 540.891.7353

Circle 301 on Reader Service Card

The Counter Terrorist ~ Feburary/March 2012 7 Firsthand: Rosie Khan, 60 Minutes, and Task Unit Bravo By Bravo 25

I had just returned from another mission on a blistering Afghan summer night. Twenty-nine teammates and I headed back to our compound to lay our heads down for a few hours. We were abruptly awakened by the task unit chief and informed that we had gotten an intelligence “hit” on a high value target that U.S. forces had been searching for since 2001.

CounterThe

8 The Counter Terrorist ~ Feburary/March 2012 long been jointly prosecuting targets he target’s name was Rosie of interest in support of Operation Khan. He was a powerful Enduring Freedom. A warning order TTaliban commander known for recruit- was issued to our team directing us ing fighters from Pakistan, controlling to conduct a mission in support of funds that supported some Taliban or- capturing this high value target in a ganizations, building IEDs, and train- remote Afghan province. We were ing IED makers. Khan had American briefed on the situation and, over the blood on his hands. course of the next four hours, our team We headed to the briefing room assessed the tasking and planned how where we were met by the task unit we would be most likely to succeed in commander and about 20 army and carrying out our mission. We presented navy support personnel. Army and this to the task unit commander, and navy special operations forces had appropriate changes were made based

A U.S. Navy SEAL team member provides cover for his teammates. Photo: U.S. Navy

The Counter Terrorist ~ Feburary/March 2012 9 on our previous experiences with this specific target and knowledge of his past movements. The mission was ap- proved and we were ready to go. Unbelievably, we were ordered to bring along a CBS news crew from “60 Minutes II”. The chain of command directed us to allow correspondent Lara Logan and her crew to join us on our helicopters. The addition of the news team, our obligation to dedicate personnel to their protection, and our need for an additional helicopter to transport our non-mission essential guests were demands that we were un- accustomed to. As a result, we moved forward with a sense of unease. Waiting on target indicators to A CH-47 helicopter drops off coalition force members into the Tora Bora region of Afghanistan. embark on a mission is one of the Photo by Staff Sgt. Jeremy T. Lock, USAF most frustrating tasks in war. The guys are simultaneously on edge, nervous, anxious and excited to do their chal-

Protective security equiPment

At ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support. • CALIBER® Robot • Hook & Line Kits • Search Mirrors • EOD Hand Tools • Search Kits

ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3 Tel: 613.745.3600 I Fax: 613.745.3590 I Email: [email protected] Toll Free: 1.877.483.7978 www.icortechnology.com

10 The Counter Terrorist ~ Feburary/March 2012 Circle 81 on Reader Service Card This program is focused on the use of architecture, engineering, people and the technologies used to deter attacks on building, critical infrastructure and public areas. The tools and techniques learned during this seminar can help save lives and protect assets. Day 1: • A review of typical threats to BUILDING SAFETY buildings/compounds. • Anatomy of an explosion • Case studies of different natures • Suicide Bombers AND SECURITY • Firearms attacks www.homelandsecurityssi.com Day 2: • Holistic approach to ENGINEERING Physical Security • Threat and risk analysis • Rings of security and their TWO-DAY SEMINAR common application • The Building domain — Physical security products • The Technology domain • The Human domain — Procedures and techniques for Find out more at: balancing the need for security guards • Prioritization security works • Physical Protection projects

® SECURITY SOLUTIONS INTERNATIONAL SSISSI Protecting the Homeland Together ® Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 [email protected]

Circle 251 on Reader Service Card

The Counter Terrorist ~ Feburary/March 2012 11 Circle 245 on Reader Service Card Circle 29 on Reader Service Card 282 12 The Counter Terrorist ~ Feburary/March 2012Circle on Reader Service Card Project1:Layout 1 12/22/11 3:15 PM Page 1

USMC designated marksman in Afghanistan. Photo: SSgt. Ezekiel R. Kitandwe lenging jobs. Sometimes, indicators down. The location of the target was come quickly; other times they seem to not confirmed. We hung around on take an eternity. We busied ourselves the tarmac waiting to get confirmation. with different things. All of us did After another long hour, we headed walkthroughs. Some prepped and re- back to the compound, amped up and prepped their gear, bullshitted with fel- frustrated. low operators, slept, and even prayed. Another hour went by and the Every aspect of a mission is time task unit commander gave the order sensitive, and we always created ways to for a second time. The unit became calm our nerves and get focused. impatient with the uncertainties and After two long hours, we got the go stresses of the pre-mission mind set. ahead from the task unit commander It was around noon that the second and started hastily grabbing gear. As order was received. We loaded up and if we weren’t already hot enough, we headed to the airfield once again, only added 100 lbs each to our person: 40 to be greeted with another order to lbs of body armor and 60 lb packs. stand down. Once we got back to the After suiting up, we headed to the compound, some of us hit the sack and transport vehicles. They took us to the some headed for the chow hall. airfield, where several CH-47 helicop- Waiting on target indicators could ters were waiting. We began loading drag out over days, so those of us who up, but received an order to stand ate had to check our radios and listen

Circle 271 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 13 M-ATV’s in Afghanistan. Photo: Petty Officer 2nd Class Jason Johnston for another “go” order. After a few the target was located. hours, we got the go ahead and loaded It wasn’t like getting pumped up up again. This time, we got on the heli- for a football game with high-fiving copters and into the air. It was about a and head butting. We spent our time 45 minute flight to where we “thought” getting into the right mental state and

14 The Counter Terrorist ~ Feburary/March 2012 Circle 259 on Reader Service Card .OGISTICS

241%74'/'06

241&7%65 5ERVICES

Circle 201 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 15 The Complete Tactical focusing on what we were about to do, mentally “what-iffing” all of the pos- Video Tool System! sible mission events. FOR MILITARY & LAW ENFORCEMENT OPERATIONS En route to the primary objective, our unit received another call to stand down and return to base. The target was not in the prospective village. We all started cursing and groaning. Shortly thereafter, we received another transmission. This one alerted us that the target had moved to another village in close proximity. We were ordered to divert to the new objective. Very shortly, we could see the small village that consisted of nearly 100 mud huts and a large exterior wall. The first helicopter landed with the guys who would take higher ground. The people of Afghanistan were used to the appearance of U.S. forces, so most of them didn’t overtly react to the All products are interchangeable and new tools can be added at any time! presence of our helicopters. Then our helicopter dropped us—the assault- ® Night Vision Monocular Pole Camera ers—off about 1000 meters outside ® 2-20ft Pole Cameras An array of technology-based the village. ® Fiberscopes & Videoscopes Once the over-watch was set, we video surveillance tools that ® Under Door Cameras began to move into our respective posi- ® Listening Devices allow a team to safely assess any tions. As we neared the structures, we ® Thermal Imaging potentially dangerous situation started to analyze the village and the ® Robotic Remote Control Cameras movement of the people. We contin- ® Digital/Analog Wireless Video ued and took positions with cover in areas where we could watch the village. We noticed that there was a group of Zistos Corporation elders speaking to an individual who fit Ph 631.434.1370 the description of our intended target. E-mail: [email protected] The target appeared to be very nervous, looking around and over his shoulder. Circle 311 on Reader Service Card It seemed as if he might have known that he had been compromised. He knew that we were watching. The man retreated up a small hill and took cover behind some large boulders. The mobile element— two operators on an ATV—headed out to observe him from the outskirts of the village. Within 50 meters of their approach, the man opened fire with an AK-47.

Circle 191 on Reader Service Card 16 The Counter Terrorist ~ Feburary/March 2012 The country’s backbone information source for First Responders. ~ And it’s free.

The first, truly nationalHomeland Security Network provides a backbone of information for over 3 million First Responders with super-secure delivery to your agency, and then to your cellular phones, PDA’s and mobile computers including:

· Free, on-demand training from the best sources in the world ·Critical interagency news in real-time ·Intelligence reports based on Open Source analysis ·Product training for critical equipment ·Special reports and much more ·A portal for exchange of tactics and techniques between agencies

Homeland Security H netwOrk www.Homelandsecuritynet.com Bona fide agency requests to be among the first network nodes should send email to: Henry Morgenstern, [email protected] 56 on Reader Service Card 19 The CounterCircle Terrorist on ~Reader Feburary/March Service Card 2012 17 The mobile element dismounted and attempted to find material that might Meanwhile, we blasted back with a MK-46 (light have intelligence value. The individual couldn’t see what machine gun). Meanwhile, we couldn’t had 10 AK-47 mags, U.S. currency, see what was happening; we could only and 2 grenades. Other unit members was happening; hear the gunfire and our mobile guys interviewed villagers to determine the we could only hear hollering “Troops in contact! Troops identity of the individual. in contact!” over the radio. We got We removed the man’s body. He had the gunfire and our information from over-watch that there been shot in the chest and head. It was, mobile guys hollering appeared to be only one combatant. in fact, Rosie Khan. We transported his Over-watch joined in the short fire body to our base. Once we returned “Troops in contact! fight with precision rifle fire. Gunfire to the compound, we headed over Troops in contact!” ceased within about 45 seconds, and to debrief the commanding general over-watch indicated that the target and his staff. Congratulations were wasn’t moving. spread around. Mission accomplished. We had to assess the situation. Some Rosie Khan is no longer feared by the of our elements converged on the loca- Afghans. • tion while my group moved uphill to check on the downed man. The mobile About the Author unit explained that the man had Bravo 25 is a U.S. military veteran opened fire and they had responded. of multiple international deployments. After the initial assessment of the area, He is a principal of Norse Security the mobile unit combed the scene and Group (www.nsgglobal.com).

18 The Counter Terrorist ~ Feburary/March 2012 Circle 261 on Reader Service Card “knowledge is critical to deter the threat of terrorism.”

Elena Mastors, Ph.D. | Dean, School of Security & Global Studies

Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network. Learn More at www.amuonline.com/counter-terrorist

Education | Management | Public Safety & Health | Science & Technology | Security & Global Studies

Circle 302344 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 19 Case Study: Amman, Jordan Hotel Bombings By Luke Bencie and Katie Mikalnik

Hyatt Hotel, Amman, Jordan. Photo: David Bjorgen CounterThe

20 The Counter Terrorist ~ Feburary/March 2012 On November 9, 2005, the Radisson SAS Hotel, the Grand Hyatt Hotel, and the Days Inn in Amman, Jordan, were the targets of a coordinated suicide bomber attack in which 60 Damage caused by suicide bombing. people were killed and another 115 Photo: FBI injured, including four Americans.

husband and wife team for many years, we have yet to encounter Atargeting a wedding ceremony carried a hotel attack similar to those experienced out the bombing at the Radisson. Those in Amman, Cairo, Mumbai, Jakarta, or killed at the Grand Hyatt included Syr- Islamabad. ian movie producer, Moustapha Akkad. The three hotels were presumably Deaths at the Days Inn included three chosen because of their appeal to Western members of a People’s Liberation Army travelers, however most victims were delegation from China. Apart from Jordanian citizens.1 Apparently motivated the wedding guests at the Radisson, the by U.S. operations in neighboring Iraq, casualties primarily included Palestinian, these Western-owned locations were cho- Syrian and Chinese businessmen and sen specifically by Jordanian-born terror political and military delegates. leader Zarqawi because they were alleged The attacks were perpetrated by suicide to be “centers for launching war on bombers loyal to the Jordanian-born Islam,”2 and were thus targets of military leader of al-Qaeda in Iraq, Abu Musab jihad. This rationale was possibly based, al-Zarqawi. They demonstrate the vul- in part, on the fact that Iraqi military nerabilities that hotels and other public forces were trained in Jordan, and Jordan’s venues face. Despite the fact that Ameri- King Abdullah supported the U.S. inva- cans have recognized this possible threat sion of Iraq.

The Counter Terrorist ~ Feburary/March 2012 21 Although terrorist plots had previously surfaced in the country, Jordan had never before been the target of such a deadly terrorist attack. Perhaps more alarming was the prospect of future attacks; indeed, this incident demonstrated that Zarqawi’s al-Qaeda fighters could easily cross the border and act on Zarqawi’s orders.

The Attackers An al-Qaeda website claiming respon- sibility for the attacks reportedly revealed information that led to the capture of the attackers—Iraqis identified as Ali Hussein Ali al-Shamari, Rawad Jassem Moham- med Abed, and Safaa Mohammed Ali. The bombers had entered the country several days prior to the attacks and stayed in furnished “safe houses” that they had rented in an Amman suburb. Appar- ently, they had driven across the border

Ruins of Zarqawi’s safehouse. Al-Zarqawi was killed during an air strike June 7, 2006, in a white car and used fake passports Photo: Sgt. Zach Mott for entry. On the day of the attacks, the

22 The Counter Terrorist ~ Feburary/March 2012 Circle 295 on Reader Service Card bombers are believed to have traveled to of Two Rivers”, al-Qaeda in Iraq (AQI) their targets by taxi. was created by the Jordanian-born Abu Sajida Mubarak Atrous al-Rishawi, one Musab al-Zarqawi in the early 1990s. of the would-be Radisson Hotel wedding The branch fought with core al-Qaeda ceremony attackers and the sister of a and Taliban in Afghanistan in 2001, but Zarqawi aide, survived because her ex- moved to Iraq to prepare for the coming plosive device reportedly malfunctioned. U.S. invasion. The group’s popularity Her husband, al-Shamari, was successful peaked from 2003-2007, but al-Zarqawi’s “My husband wore a in detonating his bomb, which consisted death in 2006 coincided with a decline in of the plastic explosive RDX with ball the group’s power.4 belt and put one on bearings added for fragmentation. The early stages of the investigations me. He taught me Al-Rishawi was sentenced to death into the attacks revealed that Zarqawi’s on September 21, 2006, and has been 2005 bombings represented a shift in tac- how to use it, how to appealing her case since that time. In tics from the 150 previous attempts that pull the [detonator] her publicly aired confession, Rishawi the Jordanians had foiled.5 Previously, the revealed details of her preparation for the plots against Jordan had involved political and operate it.” attack, “My husband wore a belt and put targets, such as embassies. Moreover, — Sajida Mubarak one on me. He taught me how to use it, in contrast to the earlier plots, the hotel Atrous al-Rishawi how to pull the [detonator] and operate bombings were executed using materials it.” When Al-Rishawi’s explosives failed assembled entirely outside of Jordan. It to detonate, al-Shamari pushed her out of was also unusual that the bombers were the ballroom to avoid drawing attention.3 not Jordanian. Also known as “al-Qaeda in the Land The Jordanian government wanted to

Halogen, HID, LED, Infrared, Thermal

Permanent, Portable & Handheld Units Remote Control or Fixed Units Industry Leading Warranties

308.278.3131 www.golight.com [email protected]

Circle 285 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 23 act quickly to prevent similar follow-up designed to influence public perception. attacks. It was believed that Zarqawi With controlled content and dissemina- could have been planning additional at- tion of the message, they engaged their tacks to avenge al-Rishawi’s arrest, either audience to take action against al-Qaeda. in Jordan or on Jordanian targets travel- This campaign should not be confused ing abroad. With tourism being Jordan’s with propaganda because it was primarily largest industry, time was of the essence. based on truthful information. It was a response from the Jordanian government, Initial Response expressing intolerance for terrorism. Much like the feeling of unification This outcry, although intentional, was in America following the 9/11 attacks, also genuine. large numbers of Jordanians reacted to The campaign consisted of three the bombings with outrage. Within phases: hours of the attacks, thousands of people • Demonstrating leadership and in Amman participated in protests, control; chanting, “Burn in hell, Abu Musab • Discrediting/denigrating the al-Zarqawi!” Jordanian flags waved from attackers; • And, providing measurements King Abdullah Ibn Al Hussein of the honking cars, while marchers displayed of effectiveness to the public for Hashemite Kingdom of Jordan, addressing images of King Abdullah. the Opening Plenary session of the World King Abdullah and his wife, Queen reinforcement. Economic Forum on the Middle East Rania, visited several victims of the 2008. Photo: World Economic Forum bombings in the hospital. The Jordanian Leadership government began a strategic communi- King Abdullah was adamant that cation plan that defamed al-Zarqawi and attacks such as these would not hap- may have successfully deterred further pen again. He immediately took to the attacks in the county. airwaves to condemn the attacks and King Abdullah was promised to hunt down the perpetrators. adamant that attacks The Use of Strategic The King was keenly aware of al-Qaeda’s such as these would Communication intention to divide the Jordanian popula- According to the U.S. Department tion against the monarchy. Jordan was not happen again. of Defense, strategic communication is one of the most liberal countries in the He immediately took defined as: Arab world, and it was only a matter of Focused government efforts to un- time before Islamists focused additional to the airwaves to derstand and engage key audiences in efforts on the tiny nation. condemn the attacks order to create, strengthen, or preserve Following an outpouring of inter- conditions favorable for the advancement national support, King Abdullah told and promised to hunt of government interests, policies, and American television that the Iraqis had down the perpetrators. objectives through the use of coordinated deliberately tried to kill Jordanians rather programs, plans, themes, messages, and than westerners: products synchronized with the actions This [attack] has nothing to do with the of all instruments of national power. west. This targeted Jordanian citizens—in- The Jordanian government used nocent men, women and children. The strategic communication to denigrate majority of the country poured out to terrorism; consistently coordinating denounce what Zarqawi and al-Qaeda media efforts to push a unifying message did, calling for Zarqawi to be brought to

24 The Counter Terrorist ~ Feburary/March 2012 justice, for him to burn in hell. pictured wearing the inert suicide vest, By addressing the situation on a global her head hung low. She was publicly stage—while not allowing the U.S.-led condemned as a “bad Muslim,” prevent- occupation of Iraq to serve as an excuse— ing even the most fervent radical Islamist the King helped refocus his countrymen from coming to her defense or acknowl- on the problem at hand—radical Islamic edging support. On November 14, terrorism. she was shown on Jordanian television confessing to the attacks—a confession Denigrating the she later retracted. She claimed that Attackers she watched as her husband detonated What is now most explosives that were strapped to his body Utilizing strategic communication, the noticeable to visitors Jordanian Government was able to largely after entering the Radisson SAS Hotel in redirect the initial fear experienced by Amman. She said she survived because in the Hashemite the civilian population into mass feelings the explosives she was wearing did not Kingdom of Jordan of anger, unity, and disgust toward the detonate. terrorists. Government-run media outlets is the security that publicly “shamed” the lone surviving ter- Providing Measures accompanies the rorist, Sajidah al-Rishawi, by referring to of Effectiveness her as “the whore.” This reference caught to the Public as average hotel stay. on with the population. As a result, the Reinforcement idea of a female suicide bomber took on Public opinion—whatever its attitudes new negative connotations. toward al-Qaeda before the attacks— Additionally, al-Rishawi was repeatedly turned against the terrorist mentality. In

Lind Shut Down Timer (Screw Terminal Option)

LIND ProtEct your VEhIclE’s BattEry Lind Shut Down Timer Easy to Install, sEt, and tEst (Block Terminal Option) Designed to protect your vehicle’s battery from over discharge, the Lind Shut Down Timer (SDT) is programmed to automatically turn off electrical loads at a preset time after the vehicle’s ignition has been shut off. The Shut Down Timer is easy to set and test without any confusing DIP switches or special tools. For more information, please contact Lind Electronics at 1.800.697.3701, via email at [email protected], or visit us online at www.lindelectronics.com. Power SPecialiStS for Mobile coMPuting

Circle 220 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 25 fact, a survey of 1,014 people published initially voiced their support for al-Qaeda his actions. Fifty-seven members of the in Al-Ghad newspaper revealed that 64% in Iraq suddenly changed their tune. The family, including al-Zarqawi’s brother reported a more negative perception of family of Abu Musab al-Zarqawi—born and cousin, also reiterated their strong al-Qaeda, while 2.1% reported a more Ahmed Fadheel Nazzal al-Khalayleh of allegiance to the king. The ads read: positive opinion.6 the al-Khalayleh tribe—took out half- As we pledge to maintain homage to King Following the bombings, the residents page advertisements in Jordan’s three Abdullah and to our precious Jordan...we of Zarqa—Zarqawi’s hometown—who main newspapers denouncing him and denounce in the clearest terms all the terror- ist actions claimed by the so-called Ahmed Fadheel Nazzal al-Khalayleh, who calls himself Abu-Musab al-Zarqawi...We an- nounce, and all the people are our witnesses, that we— the sons of the al-Khalayleh tribe—are innocent of him and all that emanates from him, whether action, asser- tion or decision...We sever links with him until doomsday.

Today and P Tomorrow In September 2006, the Jordanian RUBBER TRACK House of Representatives approved CONVERSION SYSTEMS 75 MODELS TO CHOOSE FROM S legislation increasing the State Security R Court’s power to monitor and detain those suspected of terrorism—a bill similar to U.S. and European legislation O created for the same purposes.7 This move O was part of Jordan’s controversial security crackdown, which, to ordinary Jordani- ans, seemed antithetical to the govern- L ment’s narrative about greater transpar- B ency and democratization.8 What is now most noticeable to visitors in the Hashemite Kingdom of Jordan is V the security that accompanies the average L Mattracks.com hotel stay. Separate vehicle entrances, armed guards, CCTV cameras, and E security screening areas are all part of the lodging experience. This is the new world E that Jordanian citizens live in. • D About the Authors M Mr. Bencie is Managing Director of Security Management International, LLC (www. smiconsultancy.com). He has per- formed security consulting work in Jordan since 2005 and has conducted counterter- Karlstad, MN 218-436-7000 110M000D0101

Circle 297 on Reader Service Card 26 The Counter Terrorist ~ Feburary/March 2012 ® SECURITY SOLUTIONS INTERNATIONAL SSISSI Protecting the Homeland Together ® www.homelandsecurityssi.com

The Counter Terrorist ~ Feburary/March 2012 27 rorism training and physical security opera- tions in over 100 countries. Ms. Mikalnik is a student at The George Washington University’s Elliott School of In- ternational Affairs and serves as a Research Assistant at SMI.

end notes 1 2006. “Amman Hotel Bombings.” Back- ground Information Summaries 2. International Security & Counter Terrorism Reference Center, EBSCOhost (accessed November 15, 2011). 2 Powell, Bill; Scott MacLeod; Saad Hat- tar; Michael Ware; Sally B. Donnelly; and Timothy J. Burger. 2005. “A War Without Borders.” Time 166, no. 21: 48-49. Academic Search Premier, EBSCOhost (accessed Novem- ber 15, 2011). 3 MSNBC. 2005. “Iraqi woman con- fesses to role in Jordan blasts.” MSNBC.com, November 13. http://www.msnbc.msn.com/ id/9979747/ns/world_news-terrorism/t/iraqi-

Circle 273 on Reader Service Card woman-confesses-role-jordan-blasts#.TsvLm- 7K5NGQ (accessed November 22, 2011). 4 Kirdar, M. J., 2011. “Al-Qaeda in Iraq.” Aqam Futures Project. CSIS. http://csis.org/ files/publication/110614_Kirdar_AlQaedaI- raq_Web.pdf (accessed November 22, 2011). 5 Slackman, Michael, 2005. “Jordan Says al-Zarqawi Sent Hotel Bombers.” New York Times, November 13 http://articles.sfgate. com/2005-11-13/news/17400025_1_al-zar- qawi-king-abdullah-hand-grenades (accessed November 22, 2011). 6 2006. “Amman Bombs Impact.” Middle East Monitor: East Med 16, no. 1: 1-8. Busi- ness Source Premier, EBSCOhost (accessed November 15, 2011). 7 2006. “Jordan Anti-Terror Bill Passes De- spite Islamic Bloc Opposition.” Geo-Strategy Direct. p. 13. 8 2006. “Amman Bombs Impact.” Middle East Monitor: East Med 16, no. 1: 1-8. Business Source Premier, EBSCOhost (accessed Novem- ber 15, 2011).

Circle 207 on Reader Service Card 28 The Counter Terrorist ~ Feburary/March 2012 www.AdamsIndustries.com Email:[email protected] West Coast Office: (310) 472-3017 East Coast Office: (540) 815-1421 PROVIDING THE BEST NIGHT VISION & THERMAL FOR 17 YEARS! MONOCULARS

AI/PVS-14: Mil-Spec FLIR Thermal Imager PITBULL: New! U.S. Military mo- Monoculars. Smaller/lighter/ nocular. tougher than PVS-14. GOGGLES

AI/PVS-15: PVS-15 AI/PVS-7: Mil-Spec with PINNACLE tubes. U.S. Military goggle. WEAPON SIGHTS

FLIR Night Vision L3 Night Vision Clip FLIR Thermal Clip on Clip on Rifle Sights. on Rifle Sights. Rifle Sights.

Circle 308 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 29 Is The U.N. Above The Law? By Eeben Barlow

The United Nations is an international organization founded in 1945 after the Second World War by 51 countries committed to maintaining international peace and security, developing friendly relations among nations and promoting social progress, better living standards and human rights.

CounterThe

30 The Counter Terrorist ~ Feburary/March 2012 UN personnel, he work of the United Nations protection, disaster relief, counter terrorism, hiding behind the reaches every corner of the globe. disarmament and non-proliferation, to immunity offered TAlthough best known for peacekeeping, promoting democracy, human rights, peacebuilding, conflict prevention and gender equality and the advancement of by the Vienna humanitarian assistance, there are many women, governance, economic and social Convention other ways the United Nations and its System development and international health, (specialized agencies, funds and programmes) clearing landmines, expanding food of 1961, are affect our lives and make the world a better production, and more, in order to achieve its seldom, if ever, place. The Organization works on a broad goals and coordinate efforts for a safer world range of fundamental issues, from sustainable for this and future generations.1 – prosecuted or development, environment and refugees —United Nations website punished.

An armed US Military Special Operations Security Team Member observes a United Nations (UN) MI-8 Hip helicopter approaching the US Embassy in Monrovia, Liberia. Photo: TSGT JUSTIN D. PYLE, USAF

The Counter Terrorist ~ Feburary/March 2012 31 There can be no doubt that these noble our past achievements are not enough. They aspirations, if implemented well, could are telling us we must do more, and do it But, it is not lead to improved living standards, crime better. 2 reduction, and the ability for people to In 2000 the organizers of the UN’s only Africa that live with a decreased fear of conflict and Millennium Summit declared that has suffered from violence. The extremely checkered history their meeting would “undertake a of the UN’s accomplishments, however, comprehensive review of successes, best the UN’s lack of goes largely unnoticed and its inefficiency practices and lessons learned, obstacles organizational is generally not publicized. Now, crimes and gaps, challenges and opportunities… committed by UN personnel may leading to concrete strategies for action.”3 discipline and undermine any claim of moral authority This may have been intended to usher lawlessness. and bring into question the value of the in a new approach on how the world very existence of the organization. is governed and appears to have been In a statement made by previous UN intended to increase the power of the Secretary General Kofi Atta Annan, he UN and theoretically herald a new era of stated: peace and stability. Let us never forget, Mr. President, that However, the UN’s record, prior our Organization was founded in the name to and after the UN’s Millennium of “We, the Peoples”—the words I have Summit, is not impressive and appears chosen as the title of my Report. We are at to have accomplished little for the very the service of the world’s peoples, and we people it claims to represent. Indeed, must listen to them. They are telling us that previous Secretary General Boutros

Reconyx HyperFire security series cameras are designed for quick and easy deployment in areas where no power or communication lines exist. • Motion activated trigger as fast as 1/10th of a second. • Completely weatherproof housing designed for • 1080P High Definition color images by day, NoGlowTM Covert extreme duty usage. Infrared illumination by night. • General surveillance and license plate capture • Compact size (5.5” x 4.5” x 3”) aids in concealment. models available. No • On-board memory and power with a battery life of up to one • Made in the U.S.A. Glow CCovertovert year or 40,000 images. IInfrarednfrared

Visit www.reconyx.com for more information.

303 32 The Counter Terrorist ~ Feburary/March 2012 Circle on Reader Service Card Circle 180 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 33 Boutros-Ghali played a leading role in in a growing tragedy that includes girls not only—related to sexual abuses litter supplying weapons to the Hutu regime from Burundi, Ivory Coast, East Timor, the African continent. But, it is not only in Rwanda that carried out a campaign Congo, Cambodia and Bosnia....” The Africa that has suffered from the UN’s of genocide against the Tutsi tribe in UN responded saying that the report was lack of organizational discipline and 1994. The weapons were smuggled into “outdated.” The Washington Times went lawlessness. Rwanda under the guise of being “relief on to report that it took UN Secretary- The rape of an 18-year old man material.” Boutros-Ghali stated that it General Kofi Annan nearly a year to in Haiti in July 2011 by five UN was merely his job as foreign minister respond to similar allegations from a “peacekeepers” within the confines of to sell weapons—an excuse that is likely UN mission in the Congo, but assured their base, and captured on video,7 unsatisfactory for the Tutsis (the people reporters that he was taking the matter makes a mockery of the UN’s claim to who bore the brunt of the genocide in “seriously.” 5 “help nations work together to improve that country).4 The very people the UN UN personnel, hiding behind the the lives of poor people, to conquer claimed to represent were slaughtered in immunity offered by the Vienna hunger, disease and illiteracy, and to the thousands while the UN looked on Convention of 1961, are seldom, if ever, encourage respect for each other’s with apparent indifference. prosecuted or punished.6 Instead, they rights and freedoms.”8 By September The Washington Times stated that may be merely transferred to another 15, 2011, the people of Haiti had had “U.N. peacekeepers in the war-torn, country to continue afresh with their enough of the UN’s efforts and began refugee-rich Liberia have been accused activities while reports on their activities rioting, demanding the UN withdraw of selling food for sex from girls as are not made readily available. Crimes its 12,000-man presence. The cholera young as 8. They are the latest victims committed by UN personnel, often—but outbreak, allegedly brought about by the

Scan here with your smartphone to learn how you can get special pricing on government orders

OfficerStore.com/GovernmentSales | 800.852.6088

34 The Counter Terrorist ~ Feburary/March 2012 Circle 299 on Reader Service Card U.N. peacekeepers from Nepal stand by as Haitian citizens wait for rice at a distribution point in Kenscoff, Haiti. Photo: U.S. Navy, Senior Chief Mass Communication Specialist Spike Call. UN battalion from Nepal, suggests that of tens of thousands of UN personnel in incompetence may also have been part of the wake of the signing of the Dayton their grievances. Peace Accord by Bosnia, Croatia, and Likewise, Bosnians have complaints Yugoslavia in 1995. The cholera outbreak, arising from the presence of UN’s In 2003 Madeleine Rees, the UN allegedly brought peacekeepers. With the arrival of the high commissioner for human rights UN peacekeepers, there was a massive in Bosnia, broke the policy of silence about by the UN increase in human trafficking, mainly that continues to protect the UN battalion from women, including girls as young as 12 and demanded that “UN officials, years old, from Eastern Europe.9 They international peacekeepers and police Nepal, suggests that were taken to Bosnia to serve in brothels who are involved in sex crimes be brought incompetence may servicing UN personnel. The trade of “sex to justice in their home countries.”10 Rees slaves” hardly existed in Bosnia until the said, “Visiting brothels where women also have been part mid-1990s. It was fuelled by the arrival have been gang-raped into submission, of their grievances.

The Counter Terrorist ~ Feburary/March 2012 35 into slavery, is not part of the UN’s Inga-Britt Ahlenius, as the head mandate.”11 Unfortunately, these of the Office of Internal Oversight activities seem to be common from the Services at the United Nations, claimed UN and worse still these despicable that there was no need to prosecute or actions do not stop with rape and further investigate the matter. Matthias human trafficking. Basanisi, a UN investigator charged with One could easily believe they looking into allegations against Pakistani were studying a large, organized peacekeepers in Congo, would later crime syndicate when reading the comment: submissions by the BBC and Human “…I was the investigator in charge Rights Watch regarding “evidence of the United Nations team that in that the United Nations covered up 2006 looked into allegations of abuses evidence of gold smuggling and arms by Pakistani peacekeepers in Congo trafficking by its peacekeepers in and found them credible. But the Congo. The peacekeepers are said to investigation was taken away from my have had illegal dealings with one of team after we resisted what we saw as the most murderous militias in the attempts to influence the outcome. My country, where millions have died in fellow team members and I were appalled one of the bloodiest yet least visible to see that the oversight office’s final conflicts in the world.”12 report was little short of a whitewash.”13

Photo of “Shake Hands with the Devil” being filmed in Kigali. Photo: Scott Chacon

Circle 328 on Reader Service Card 36 The Counter Terrorist ~ Feburary/March 2012 Displaced Haitians wait in line for fresh drinking water from a United Nations water truck at the Lifeline Christian Ministries Mission in Grand Goave, Haiti. Photo: U.S. Navy, Mass Communication Specialist 2nd Class Kristopher Wilson

Appalled at the Office of Internal Oversight’s view of UN activities that GW COLLEGE OF PROFESSIONAL STUDIES he described as being “little short of a ARLINGTON whitewash,” he resigned in May 2007. Master of Professional Studies Information Sessions The UN welcomes news coverage Saturday, April 14 that favorably reports attempts to bring Security and 10:30 am alleged war criminals to justice and stop Thursday, May 10 Safety Leadership 6:30 pm genocide, and regularly condemns the Learn from experts in homeland security policy, law 950 N. Glebe Rd., 6th Floor use of rape as a psychological weapon enforcement cooperation, public safety leadership, Arlington, VA 22203 Metro: Orange Line to Ballston while keeping its own shady activities well emergency management, and cyber security. hidden from public knowledge. Rsvp Today! Choose to focus your studies: 703.248.2800 A 2008 Save the Children report • Fundamentals of Strategic Security www.nearyou.gwu.edu/ssl covered the rape and pedophilia of • Strategic Cybersecurity Enforcement. children by UN peacekeepers in Haiti, Ivory Coast, and South Sudan:14 Attend convenient classes. One evening per week “Of the 341 children in Haiti, South and one Saturday a month in Arlington, Virginia. Sudan, and Ivory Coast who spoke to Complete a master’s degree in approximately 16 months. the British agency during its 12 month investigation, more than half reported cases of being coerced into sex, often in return for the very food or protection aid staff or peacekeepers were there to provide.

The GeorGe WashinGTon UniversiTy is an eqUal opporTUniTy/ 37294 affirmaTive acTion insTiTUTion cerTified To operaTe in va by schev. Circle 283 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 37 A third reported knowledge of other real investigations of credible allegations children who had been raped. resulting in appropriate punishments for Elizabeth (not her real name) knew any crimes committed. nothing of the commitments [by the UN] The UN has long amassed a to stop this exploitation as she walked to reputation for inefficiency and regularly her mother’s fields with her brother early demonstrates operational ineffectiveness. one June morning last year.... The men Criminality, corruption, and cover-ups, with the blue helmets who called to her however, are even more serious challenges from behind the sandbags of their camp’s that raise the question of the value of the guard position, however, should have very existence of the organization itself. known.”15 The UN can be expected to be the first These tragic stories have been repeated to cry foul and demand that judicial time and again around the globe. action be brought against those guilty Any sizable force will have occasional of such crimes if committed by others, incidents of impropriety on behalf of but the UN’s record in troubled and a small number of members, especially areas of conflict demonstrates that not when subjected to the pressures of only does the organization fail to adhere deployment. Of course, competent to any reasonable selection criteria for Boutros Boutros-Ghali at the 1995 World forces maintain internal discipline by “peacekeeping” troops, but it also sees Economic Forum. Photo: World Economic selective screening of personnel and with itself as being above the law. • Forum from Cologny, Switzerland

Ophir Falk and Henry Morgenstern have compiled a book that should be read by anyone serious about winning the war on terror. By painstakingly analyzing the empirical data, the better understand the nature of our enemies and why they employ thes who is

Morgenstern they offer important insights on how terrorism can be effectively confronted and ultimatel y help us

e barbaric tactics. Most crucially, alk

In so doing, they have performed an invaluable service for all those who are f crucial battle. y defeated. committed to winning this edited by —Benjamin Netanyahu,SUICIDE former Prime Minister of Israel ophir falk and henry Morgenstern FIRSTHAND ACCOUNTS TERROR SUICIDE FROM AND ANALYSES FRONTLINE PERSONNEL AND IN THE wwAR ExPERTS AR AGAINST TERROR Based on U. s. and israeli experiencesTERROR and detailed interviews with frontline personnel, policymakers, first responders, and students of homeland security to understand and deal with the growing threat of suicide terror. i Suicide Terror for future attacks. t analyzes recent suicide attacks as well as our current vulnerabilities and likely enables scenarios

following the expert authors’ advice, readers learn possible measures to prevent an attack. Moreover, they learn how to prepare for and implement an effective and quick response to minimize casualties and losses in the event of an attack. following an overview and historical review of suicide terror, the book covers: the Confronting and Understanding • Global jihad • Israel’s confrontation with suicide terrorism • America’s experience with suicide • Internationalization bombings Understanding and Confronting of suicide terrorism • High-risk scenarios defense and future trends • Methods for confronting suicide terror the threat • Medical management of suicide Using terrorism eye-witness accounts, studies help readers get into the mindstext of suicide terrorists in order to understand how to best prevent and confront recreates the look and feel of actual these very dangerous threats. terrorism incidents. Detailed case This book is a definitive study experts who have dealt with it of firsthand. suicide terror, synthesizing the devastating threat should read this booka andnyone consider responsible its recommendations for experience understanding, of with well-known preventing, all seriousness. and confronting this Israeli and American OPHIR FALK, LLB, MBA, institute for Counter is a Partner at the Naveh, Kantor of experience in variousterrorism, security where capacities he has and published served asnumerous a consultant Even-Har articles for inthe the 2004 field. Mr. law firm and a Research carried out risk assessments for Fellow at the olympic venues and critical national infrastructure. falk has over a decade HENRY MORGENSTERN olympic games, where he than 500 federal, state, and is local the Presidentagencies toof effectively confront the threat of terror and regularly takes groups of security solutions first responders international, a company that has trained more

to Israel to study threat of suicide Homeland Security. optic terror. He has offered Mr. Morgenstern group radio stations, and Web broadcasts. expert is a commentary on widely published terror-related issues author on the subject for NBC, ABC, CBS, Fox, numerous

www.SuicideTerror.com • 866-573-3999

117 38 The Counter Terrorist ~ Feburary/March 2012 Circle on Reader Service Card ISCW12_Ad_CTM.pdf 1 12/20/2011 2:39:02 PM

/

252 The Counter Terrorist ~ Feburary/March 2012 39 Circle 305 on Reader Service Card Circle on Reader Service Card About the author latin-america-14796970 8 Mr. Barlow is a former special http://www.nytimes. operations officer and intelligence officer com/2011/09/08/world/08nations. of the South African Defence Force. html?pagewanted=all The author was also the founder of the 9 http://www.un.org/en/aboutun/index. The UN has private military company, Executive shtml Outcomes, author of the book “Executive 10 http://news.scotsman.com/world/ long amassed Outcomes” (Galago Publishing, 2007) Bosnia-sex-trade-shames-UN.2400797.jp a reputation and eebenbarlowsmilitaryandsecurityblog. 11 http://news.scotsman.com/world/ blogspot.com Bosnia-sex-trade-shames-UN.2400797.jp for inefficiency 12 Endnotes http://www.nytimes. com/2008/05/23/opinion/23basanisi. and regularly 1http://www.un.org/en/aboutun/index. html?_r=1&ref=opinion&oref=slogin shtml demonstrates 13 http://www.nytimes. 2 http://www.un.org/millennium/sg/ com/2008/05/23/opinion/23basanisi. operational report/state.htm html?_r=1&ref=opinion&oref=slogin 3 http://www.un-ngls.org/spip. ineffectiveness. 14 http://www.savethechildren.org.uk/ php?page=article_s&id_article=1963 resources/online-library 4 http://www.wnd.com/?pageId=1671 15 http://www.philipbrennan. 5 http://www.washingtontimes.com/news/ net/2010/08/27/un-peacekeepers-just-as- 2006/may/09/20060509-090826-9806r/ guilty-of-child-rape-as-everyone-else-in- 6 http://www.glica.org/topics/show/50 africa-and-the-caribbean/ 7 http://www.bbc.co.uk/news/world- All Armor. All The Time.

K9Armored SUVs COP Armored Tactical and AD Riot Trucks Armored#1 Buses. Armored Vehicles - From simple cargo transport to We provide the following products and services: dignitary protection, we have the skills needed to Armored Passenger Vehicles manufacture or acquire the right vehicle for your needs. Designed and Engineered Armored Solutions Fleet Management, Parts and Service Military Vehicles and Systems - Whether you are looking Contract Production for chassis up design and build, or are looking to protect Training and Education systems on existing platforms, our people and skills will provide a quality solution.

www.heat-armor.com 1.773.938.1030 [email protected]

40 The Counter Terrorist ~ Feburary/March 2012 Circle 175 on Reader Service Card New and improved

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 ® SECURITY or email [email protected] SOLUTIONS INTERNATIONAL Or visit our website: www.SSIPVB.com ® SSISSI Protecting the Homeland Together 308 226 Circle on Reader Service Card Circle on Reader Service The Card Counter Terrorist ~ Feburary/MarchCircle 136 on Reader 2012 Service 41 Card Book Review Brothers in Arms : How Palestinian Maoists Turned Jihadists

By Manfred Sing Reviewed by: Chris Graham

hy have we seen fighters happened simultaneously by the herein we see the commonality between

communist revolutionaries Lebanon-Fatah-line and the -Gaza- communist revolutionary warfare and

‘ ‘ Wsupporting jihadists? Why do we see line, represented‘ by its main figures Fath.ī jihad. While many Westerners only cooperation between socialist activists Shiqāqī and Abd al- Azīz al- Awda. In recognize an armed attack as warfare, and islamists? An obvious answer would Lebanon, it was mostly Fatah officers, many of the powerbrokers that are our be that these groups see each other as often of Maoist or Marxist background, adversaries recognize all of the disciplines tools that can be wielded against societies who reintroduced the idea of jihad of unrestricted warfare, to include: that believe in individual liberty, and to the political and military scene.” subterfuge, and sponsored activism to be individual property rights. He adds, “the Maoists early on were tools to exert their will. While this answer may be a partial sympathetic to the revolution in Iran and Sing finds that, “Jihadist ideology explanation, the world is a complex place recognized the benefits of using Islam emerged from, but does not merely and there is always a collision of interests as a tool for mass mobilization.” Sing represent a mixture of Islam, nationalism, that determine events. Manfred Sing’s concludes, “Their main goal was to unite and Marxism. The result was neither an Brothers in Arms: How Palestinian Maoists the ‘masses’ according to the Chinese Islamized Maoism nor a Maoist Islam, Turned Jihadists (Koninklijke Brill, 2011) and Vietnamese model of a People’s but a reframing of the Maoist plea of successfully explains several of the lesser war…” Sing also observed that some People’s war in an intransigent way. In known aspects of the historical interplay communist revolutionaries “first came to a time of crisis and defeat, the actors between communist revolutionaries and the conclusion that Islam was a factor for insisted on the priority of armed struggle jihadists. mass mobilization and then individually and turned it into an article of faith.” Sing shares the writing and ideas of adopted Islam”. There is no question that the People’s some of the most historically influential The author notes that Palestinian Republic of China has sponsored Maoist guerrillas that transformed into fighters, when not achieving operational some of the revolutionaries that have jihadists. “Abu Hasan” al-Bahays and success, contemplated a peace settlement transformed into jihadists. It is unclear “Hamadi” al-Tamimi’s book As’ila h.awl with Israel, but “Observers attributed it to what degree China influences each of al-islām wa-l-mārkisīya min warā’al- to Chinese influence that the Palestinian today’s terrorists, but socialist activists qud.bān is one of the author’s primary National Charter from 1968 was revised a and islamists appear to demonstrate both sources. These men were leaders of the year later, stating that ‘the armed struggle passive and active cooperation. 1 Brothers Islamic Jihad Brigades before being is the only way to liberate Palestine.” in Arms provides readers valuable clues assassinated in Cyprus in 1988. Sing quotes one influential islamist to unravel the patchwork of internal and Sing states, “China was the most as writing, “according to Mao Zedong external adversaries that challenge liberty consistent big power supporter of the ‘armed struggle is neither the only, and the rule of law. • Palestinian guerrilla organizations, nor the sufficient precondition to 1 http://www.investigativeproject. arming them, criticizing them, seeking achieve a revolution.” To another he org/3312/is-the-occupy-wall-street- to unify them and…providing…material attributes, “…military, economical movement-occupied accessed 12-10-11 support.” The author also observes, “The and political power was not enough adoption of jihadism among Palestinian and therefore…[we] concentrated on the cultural-civilizational attack.” And

42 The Counter Terrorist ~ Feburary/March 2012 SOF Sub ad_Layout 1 11/4/11 7:44 AM Page 1

For over thirty years, Soldier of Fortune magazine has been supporting those individuals who have the courage to fight. Whether they fight for those who cannot defend themselves or they fight simply to uphold their beliefs...whomso- ever is in service to others and is willing to stand for justice, Soldier of Fortune will stand with them. Military, law en- forcement, border patrol, public serv- ice, U.S. allies...you can read of their adventures in the pages of Soldier of Fortune as well as his- torical pieces and regular new weapons reviews.

UES “Everywhere I go “In Theatre” in Iraq or Afganistan, 6 ISS "Everywhere I go "In Theatre" in Iraq or Afghanistan, BUY therethere isis oneone publicationpublication II invariablyinvariably seesee passedpassed EE! around by Soldiers, Sailors, Arimen, Guardsman ET 6 FR around by Soldiers, Sailors, Airmen, Guardsmen, G E $37! aandnd Marines—That'sMarines—That's SoldierSoldier of o fFortune Fortune.".” SAV —Lt. Col. Oliver North, USMC (Ret.) FOX NEWS Circle 309 on Reader Service Card —Lt. Col. Oliver North, USMC (Ret.) FOX NEWS Send me Send me my subscription to Soldier of Fortune of Sol 12 issues Now!! dier of Fortune for $34. Name______95

Address ______

City/State ______Country/ZIP ______

I Check/Money Order Enclosed I Visa/MC/AmEx #: ______Exp Date ______/______

Signature ______Print Name ______Fill out and mail to: SOLDIER OF FORTUNE, P.O. Box 18478, Anaheim, CA 92817-9928 For faster service, log on to www.sofmag.com or call 1-800-999-9718 43 U.S. Funds Only. Canada add $20/yr. Out of North America add $6 The5/yr .Counter Allow 4-6 wTerroristeeks for fir s~t i sFeburary/Marchsue to be delivered. 2012 Community Policing, Counterinsurgency, and Converging Threats

Sign in Gretna, Louisiana showing support for the controvercial actions of the police to block the bridge over the Mississippi River from being crossed by New Orleaninas trying to escape the flooding. Photo by Infrogmation CounterThe

44 The Counter Terrorist ~ Feburary/March 2012 “Where the law is subject to some other authority and has none of its own, Community Policing, the collapse of the state, in my view, is not far off; but if law is the master of the government and the government is its slave, then the situation is full of Counterinsurgency, and promise and men enjoy all the blessings that the Gods shower on a state.”1 — Plato Converging Threats By Anthony Abati, Michael P. Downing, and John Zambri

he twenty-first century presents similar methods (e.g., drug trafficking, In such communities, law enforcement with a monumental document fraud, surreptitious weapons citizens view Tchallenge: to prevent increasingly violent, trading, kidnapping, extortion, etcetera) well-financed, and equipped criminal to achieve their respective objectives.3 themselves and their groups from perpetrating acts that Furthermore, each threat’s criminal contributing peers threaten the functionality and security activities reduce the security, stability, of democratic society. These globally and resulting prosperity of associated as essential catalysts connected, functionally interactive societies, deliberately undermining the to resolving public groups—hereafter referred to as effectiveness, viability, and resulting convergent threats—include transnational legitimacy of governments. In total, such security challenges, terrorists, street gangs, drug cartels, methods and effects are consistent with improving their ethnically aligned organized crime, and a those of traditional insurgencies,4 leading host of domestic and foreign extremists.2 us to posit that effective counterinsurgency respective lives, The resulting criminal network conducts (COIN) principles may prove useful in and marginalizing interactively complex, technologically ongoing community policing efforts to adept activities that are influenced by disrupt, degrade, and ultimately defeat miscreants, confident dynamic socioeconomic and political convergent threats. in the knowledge factors around the world. that “no person or An examination of convergent threat Community Policing methods and effects provides insight to Community policing concepts emerged institution is above improving the effectiveness of current in the 1820s with Sir Robert Peel’s the law—including community policing enterprises. Although formulation of nine general principles different in organizational composition defining basic ethical requirements for government officials and motive, the individual threats employ British police officers to follow while and local elites.”

The Counter Terrorist ~ Feburary/March 2012 45 engaging with the populace, building crime in London, prompting other United the “police are the public and the public shared trust and respect, and enforcing Kingdom cities to form similar police are the police,” creating invaluable, two- community laws. In conjunction organizations. way information gateways that formed the with the Metropolitan Police Bill of In accordance with Peel’s principles, basis for identifying and rectifying local 1829—legislation Home Secretary Peel MPS constables were physically immersed security problems, arresting criminals, composed in an effort to reformB ritish and mentally invested in their respective and reducing the likelihood of future criminal law—these principles guided the communities, employing recurrent criminality. establishment and subsequent operations personal interactions and physical presence Such enterprises require police of the London Metropolitan Police Service to gain and maintain intimate, firsthand officers to possess expertise in standard (MPS).5 Based at London’s Scotland Yard, knowledge and understanding of the local law enforcement functions,6 conflict the 1,000 MPS constables or “bobbies” populace’s culture, expectations, priorities, resolution, and negotiation theory, as well were unpopular at first; however, they and concerns. In so doing, the constables as knowledge of neighborhood cultures soon proved very successful in cutting embodied Peel’s fundamental belief that and dynamics, applicable languages and customs, and other societal characteristics. Recurrent face-to-face interactions and personal relationships are the norm. Day-to-day police operations embrace neighborhood collaboration, emphasizing foot patrols and ride-along programs, organizational manning that attempts Surface Warship Weapons Focus Day: April 23, 2012 to reflect local demographics, and other activities that facilitate the sharing of Main Summit: April 24-25, 2012 | Norfolk, VA security/policing responsibilities with Maximizing Operational Capabilities for individual citizens. The sharing of security responsibilities Global Special Operations Forces is a fundamental aspect of community policing, linking interests and objectives Join the Surface Warfare Community in the across individuals, law enforcement Washington DC, Metro Area to: personnel, and, ultimately, the community • Address concerns relevant to the DoD 30 Year at large. In fact, the authority to police Shipbuilding Plan and the Air-Sea Battle Concept comes from the people, with policing • Identify opportunities for industry to provide the best success positively correlated to public surface warship solutions with a range of capabilities approval. Underlying personal decisions across the full spectrum of naval threats and crises to trust each other, to share and pool • Discuss requirements and modifications that allow available resources (e.g., time, effort, surface warships to sustain and adapt intellectual energy, and physical assets) • Look at transforming strategies that support modern reflect mutually beneficial exchange sea control and interdiction objectives opportunities where participants believe they are better off working together. The • Delve into interagency cooperation: DoD, DoS and DHS end result is a lawful community where Exclusive Discount for the majority of people desire and act in Counter Terrorist Readers! accordance with the rule of law, trusting the police, reporting crimes, serving as Save 20% off the standard witnesses, and relying on socially accepted All-Access fee with code: CTM_SWS practices and the justice system to protect individual property rights. In such communities, citizens view Visit www.SurfaceWarfareSummit.com or call 1-800-882-8684 today

46 The Counter Terrorist ~ Feburary/March 2012 Circle 293 on Reader Service Card Mobility, Deployment, Maintenance, Sustainment And Operations Systems

Deployable Command Centers

Enhanced Command and Control Secure Communications Video Conferencing Increased Protection for Sensitive Equipment Increased Mission Flexibility Multiple System Configurations Deployable via Military and Commercial Vehicles Air-Transportable and Sling-Loadable

Deployable Data Security

360° High Data Container Density HVAC Weather and Fire-proof Insulation HVAC Condenser/ Maximum Flexibility Venting ISO Compatible Enclosure Evaporator Chilled H2O Completely Customized to Client Requirements

Fire Detection Un-Interruptable Power Distribution and Suppression Racks Power Supply (UPS) Unit (PDU)

Phone (866) 312-6226 (571) 259-2817 THE Fax (800) 862-9489 Email [email protected] SSEESSOOLLININC www.sesolinc.com GROUP Circle 239 on Reader Service Card

The Counter Terrorist ~ Feburary/March 2012 47 themselves and their contributing Like community policing, traditional peers as essential catalysts to resolving insurgencies require the active involvement public security challenges, improving of the local populace to succeed; however, their respective lives, and marginalizing insurgencies strive to overthrow or force miscreants, confident in the knowledge the change of governing authorities that “no person or institution is above the “through the organized use of subversion law—including government officials and and violence.”8 Possessing a rich history local elites.”7 that includes multiple protagonists, venues, and circumstances, traditional insurgencies have altered the perspectives Peel’s Nine and actions of governments, civilian populaces, and related entities across the Policing Principles globe since at least 207 BC, when a group • Police exist to prevent crime of rebel peasants forced the last ruler of and disorder China’s Qin Dynasty to abdicate authority • Ability to perform police duties and surrender.9 CLEAR depends upon public approval of Some traditional insurgencies have police actions relied almost exclusively on violence and • Secure the willing co-operation of terrorism to effect change; others have the public in [observing] the law, favored sedition and “passive resistance” [in order] to secure and maintain the SECURE to build support across key leaders and respect of the public community groups. Regardless of selected • Public cooperation diminishes employment methodology, all traditional proportionately to the use of physical insurgencies share a common objective: to force TRAIN usurp the authority and resulting viability • [Develop] public favor not of the “targeted” government and, in so by catering to public opinion, but doing, radically alter sanctioned policies, by constantly demonstrating programs, and organizational structures. impartial service to the law Convergent threats have poignant • Use physical force to secure [law and parallels with traditional insurgency, order] only when persuasion, advice, attempting to undermine the authority, and warning [are] insufficient effectiveness, and resulting public • Maintain relationships that perceptions of constitutional functions: [demonstrate …] that the police namely, law enforcement entities, the are the public and the public are criminal justice system, and rule of law. the police; the police being members Additionally, they threaten and frequently of the public who are paid to [fulfill] ignore nonmember property rights—a duties which are incumbent upon fundamental characteristic of voluntary every citizen trade and commerce. Unfettered illicit • Police should always direct their activities and resulting rewards entice action strictly towards their other community members to practice functions, and never appear to criminal behaviors and beliefs.10 Learning usurp the powers of the judiciary a trade and abiding by societal rules are • The test of police efficiency is the time-consuming, difficult tasks that can absence of crime and disorder, not appear foolhardy when juxtaposed with the visible evidence of police action the money, lifestyles, and excitement in dealing with it offered by powerful criminal gangs, drug roncoconsulting.com cartels, and ethnic-based criminal groups.

Circle 324 on Reader Service Card 48 The Counter Terrorist ~ Feburary/March 2012 The same dichotomy applies to radical to defeat insurgent forces, address core Three interactive components form extremism and accepted societal behaviors grievances, and resolve other causal the operational environment’s nucleus: because impassioned messages and factors.12 Furthermore, depending on the affected nation’s people, government, goals convince ill-informed, disaffected situation-specific considerations (e.g., and insurgency. The resulting trilogy members of the populace to reject civilian populace preferences, insurgent embodies several basic, yet critical COIN democratic principles and transform their modus operandi, constitutional considerations. First and foremost is volatile emotions into destructive actions. authorities, etcetera), an effective OC IN the essential nature of the populace in Whereas most convergent threats do not strategy could actually minimize direct both governing and undermining a fully satisfy the definition of traditional military involvement while emphasizing democratic nation. Gaining populace insurgencies (i.e., primarily seeking to law enforcement and other nonmilitary support and resultant participation overthrow an existing government), all elements of national power.13 This is true are fundamental objectives for the of them unquestionably seek to change in both post-conflict zones and challenged the actions of government authorities high-crime societies with weak or corrupt through sedition and various forms of governments and ineffective civilian police Select COIN Principles violence. Street gangs in the United institutions. • Gain, retain, and actively involve the States, for example, do not necessarily Situational variability is an essential civilian populace—the nation’s most advocate or strive for the violent overthrow characteristic of successful COIN important “natural resource” of local, state, or national government strategies. Insurgencies and contributing • Perceived government legitimacy is organizations. Nonetheless, through factors vary across cultures, geographic directly proportional to the brutal criminal acts, dedicated recruiting, regions, and time; moreover, tactics, government’s ability to fulfill societal and other destabilizing influences, techniques, and procedures (TTPs) expectations street gangs are de facto assuming that worked during a particular COIN • Eliminating enemy forces and leadership roles, supplanting legitimate endeavor may not apply in another infrastructure is often less important government functions. Unchecked, this venture. Prudent counterinsurgents than positively influencing the populace menacing threat will continue to grow, embrace such distinctions, incorporating • When possible, execute actions in exploiting ready information exchange general principles14 rather than hard-fast accordance with societal rule of across geographically disparate gangs, rules or situational-specific TTPs, while law and the concurrence of civilian connectivity with other convergent threats, assessing insurgencies and developing populace leaders and subsequent learning across criminal appropriate remediation strategies. These • Complementary interests promote the networks. principles provide time-proven intellectual collective pursuit of mutually beneficial Protecting individual citizens and their guides. objectives and resource sharing way of life from the destabilizing, typically The OC IN operational environment is • Build partnerships on complementary violent effects of traditional insurgencies not a geographic area or region on a map, characteristics, while harnessing and has been the raison d’être for COIN although it possesses physical components integrating differences strategies and supporting operations. and includes the targeted nation’s land • Physical capabilities, strong Based on contemporary news reports mass and infrastructure. It is also not organizations, and unwavering and resulting public perceptions, many defined by conflicts between an insurgent desire are critical to governments and people mistakenly associate COIN with group and national government. Rather, insurgencies military-centric applications of national the operational environment is a dynamic, • Reconciliation and reassimilation power.11 Some COIN practitioners have interactively and structurally complex are more important than revenge and employed force-based, military-centric system15 that includes the thoughts and retribution; former enemies can be approaches that concentrate on capturing/ actions of multiple thinking, adaptive strong allies killing enemy insurgents at the expense of entities and a host of other evolving • The COIN environment necessitates diminished civil liberties and rule of law; elements. In total, it comprises all the a whole of government approach that however, such approaches neither define factors, conditions, and characteristics that employs all elements of national power nor embody COIN. Instead, COIN a beleaguered government must assess and is actually a synchronized blending of understand to protect its people, maintain available civilian and military resources sovereignty, and defeat an insurgency.16

The Counter Terrorist ~ Feburary/March 2012 49 Circle 252 on Reader Service Card 50 The Counter Terrorist ~ Feburary/March 2012 Instant Access Introducing the All New Alpha Series Concealment Holsters from

The DSG Alpha Series Holsters Feature: • Solid Kydex Construction • Large In-Stock Inventory • Available for Most Popular Handguns • Models for Surefi re and Streamlight Weapon Lights • Formed for Close to the Body Fit • Adjustable Cant and Height

Available in black and dark earth • Convertible to Inside the Waistband Carry

Specialized Gear for Military and Law Enforcement Weapons & Components — Optics — Ammo dsgarms.com 1.800.382.7571

FREE SHIPPING on your fi rst order this month! Promotion Code: CT0312 Circle 275 on Reader Service Card GSA: GS-07F-6007R • CAGE: 1L0J5 The Counter Terrorist ~ Feburary/March 2012 51 government and insurgency because various means, including physical actions the purpose for democratic government and compelling messages. During the is to serve its citizens and insurgencies assessment process, social and personal The importance cannot thrive without support. Our expectations are not static; changing in of community constitutional government must seek accordance with evolving knowledge, willing participation of its citizens in the cultural norms, and other factors. The involvement governing processes—to include security government, insurgency, populace in government attainment and rule of law adherence— members, and a variety of external whereas an insurgency may employ influences can also affect expectations and processes—to truth, deception, and various coercive subsequent legitimacy assessments. In the include local security measures (e.g., extortion, blackmail, end, assessments and resulting support patrols, intelligence- and outright violence) to gain support. depend on the congruence of personal Populace members choose between these expectations and competitor actions, gathering efforts, opposing entities, assessing the legitimacy rather than reliance on platitudes and and other of competing claims and actions in promises. conjunction with personal preferences, In tandem with efforts to positively activities—cannot anticipated costs and benefits, and what influence citizen perceptions through be understated or they personally see and hear.17 recognizable actions and messages, the Citizen perception of legitimacy government and insurgency strive to undervalued. is critical. Individuals assess relative enhance organic capabilities and diminish legitimacy based on perceived fulfillment those of their opponent. The government of expected functions and adherence to seeks improved governance capacity18 and stated commitments. The government and underlying resolve while conducting and insurgency influence perceptions through pursuing actions that will degrade the

tribu is t D e

d

W o r l d w i d e K9 COPMAGAZINE TM FOR POLICE AND MILITARY WORKING DOG HANDLERS The largest and most read Police and Military K-9 magazine in the world SUBSCRIPTIONS available to EVERYONE ONLY $29.95 1 year (6 issues)

Scan code with your smartphone to subscribe today!

www.k9copmagazine.com (270) 534-0500 [email protected]

52 The Counter Terrorist ~ Feburary/March 2012 Circle 277 on Reader Service Card insurgency’s abilities, determination, and popular appeal. Eliminating insurgent leaders, capturing propaganda material and computer hard drives, and destroying weapon stockpiles are common elements. When executed with excess or inefficiency, outside the rule of law, such force-based offensive activities can unintentionally benefit the enemy by alienating populace segments and inciting individuals to support or join the insurgency. COIN practitioners must consider potential second and third order effects, eschewing actions and policies that would imperil government legitimacy and individual commitment to the governance processes. Readily observable, force-based actions against the enemy are often of little value. Eradicating insurgent forces and equipment unilaterally, without populace support, can be less beneficial than persuading the citizenry to shun insurgent overtures and voluntarily provide security forces with timely information on insurgent intentions. Recognizing and correctly evaluating such competing actions and results are paramount to successful COIN operations and, as a consequence, the government’s continued survival. While assessing insurgent capacity and resolve, it is natural to focus on elements such as leadership, infrastructure, controlled territory, or techniques. Doing so exclusively can be shortsighted because the insurgency gains “combat power” from at least two cognitive components: the ideology and supporting narrative that describe insurgent grievances, objectives, and methods, and negative public perceptions of government leaders, institutions, and abilities to fulfill expected functions or adhere to the rule of law. The importance of community involvement in government processes—to Malaysian UNGERIN anti-terror-police on the Community Policing show on May 23rd, at include local security patrols, intelligence- the Muar in Johore, Malaysia. Photo: Rizuan gathering efforts, and other activities— cannot be understated or undervalued.

53 The Counter Terrorist ~Circle Feburary/March 183 on Reader 2012Service Card The government must create circumstances into national-level aspirations, “blending” COIN is more than killing, arresting, that promote partnerships between and national and local efforts into mutually and incapacitating government adversaries with seemingly distinct civilian groups supporting activities. Collaborative and political opponents. It must also by highlighting shared interests and thought is, of course, difficult to achieve, provide disaffected protagonists with mutual advantages that exist across the necessitating candid dialogue, reciprocal incentives to pursue attainable goals, groups.19 Throughout such processes, the learning, and earned trust between and offer constructive suggestions, and watchword is individual participation across national and local government prompt change “within the system,” and commitment, rather than “buy-in” to elements. while operating in accordance with government-generated concepts. Insurgencies are internecine conflicts, established laws and social dynamics. Such To successfully counter an insurgency pitting family members, friends, and options present disruptive, lawbreaking across a nation that encompasses multiple others against one another. National individuals and parent groups with viable cultures, preferences, and communities, prosperity and development are opportunities to transform themselves and national government organizations cannot incompatible with such internal distrust join/rejoin society as respected, accepted dictate the ways, means, and objectives of and enmity. Reconciling destabilizing members—without fear of incrimination COIN efforts that are designed to address internal conflicts are critical OC IN for past misdeeds—as long as they local circumstances. Instead, leaders objectives. In fact, to achieve sustainable, genuinely commit to and actively support must identify strategic-level goals and long-term success, counterinsurgents constructive, lawful behavior.21 Whole-of- priorities, provide “commander’s intent,” must convince large segments of insurgent government approaches that are tailored to and empower and assist local COIN group members and supporters to shun meet specific situational circumstances, yet programs.20 Concurrently, national and illicit, seditious activities and “join” are flexible enough to adapt to unforeseen local entities must work in tandem to productive, “legitimate” enterprises and and intended changes, are necessary. integrate local actions and desired effects political processes. One component of a nation’s capacity— regardless of size, power, and financial potential—will not suffice.• ABOUT THE AUTHORs SOF Mobile Systems Focus Day: Mr. Abati is a retired U.S. Army March 26, 2012 Main Summit: March 27-28, 2012 Special Forces colonel. April 23-25, 2012 San Diego, CA USA Mr. Downing is a Los Angeles Police Washington DC Metro Area Maximizing Operational Department assistant chief and serves Capabilities for Global as the commanding officer, Counter- Special Operations Forces Terrorism and Special Operations Bureau. Mr. Zambri is a detective in the Los ReGiSteR tOday tO heaR FROM key deCiSiOn MakeRS FROM vaRiOuS Angeles Police Department, Counter- Expanding the Military’s COMbatant COMMandS, inCludinG: Terrorism and Special Operations Bureau, Intelligence Gathering Capabilities SOCOM Anti-Terrorism Intelligence Section. Invest your time networking with PACOM leaders of the NTISR community SOUTHCOM and hear briefings on: EUCOM ENDNOTES • Current effects and future National Geospatial-Intelligence Agency 1 guidance of NTISR policy Cooper, John et al. Complete Works by Naval Surface Warfare Center Plato, (Hackett Publishing, 1997), p 1402. • The role of Non-Traditional ISR in Joint Special Operations University combat effectiveness 2 Army Special Operations Capabilities California Department of Justice, • Cost savings from utilization of Integration Center 2005, CAL/GANGS statistics for City nontraditional assets of Los Angeles; retrieved from http:// • Developments in the Global exclusive discount for Hawk Program the Counter terrorist Subscribers! www.lacp.org/2005-Articles-Main/ • Latest updates and advancements Save 20% off the standard LAGangsInNeighborhoods.html.); in GEOINT All-Access fee with code: CTM_SOW Archibald, R.C., 2009, “Mexican Visit www.SpecialOperationsWest.com 1-800-882-8684 or call 1-800-882-8684 today Drug Cartel Violence Spills Over, www.NonTraditionalISR.com

Circle 289 on Reader Service Card Circle 291 on Reader Service Card 54 The Counter Terrorist ~ Feburary/March 2012 Alarming U.S.,” The New York Times, retrieved from http://www.nytimes. 27 Years Scanning T he World com/2009/03/23/us/23border.html). 3 Department of State. (2009). U.S. Counter Terrorism Solutions Government Counterinsurgency Guide. Bureau of Political-Military Affairs. Per Joint Publication 1-02 (JP 1-02), Department of Defense Dictionary of Military and Associated Terms, 12 April 2001 (as amended through 31 July 2010). 4 Per Joint Publication 1-02 (JP 1-02), Department of Defense Dictionary of Infrared Visual Military and Associated Terms, 12 April 2001 (as amended through 31 July 2010), a traditional insurgency is “the organized use of subversion and violence by a group or movement that seeks to overthrow or force change of a governing authority.” 5 Retrieved from http://www.met. police.uk/history/peel.htm and http:// en.wikipedia.org/wiki/Robert_Peel#cite_ 1-800-888-2440 ref-0 on November 20, 2010 and August www.infrared.com 28, 2010, respectively. Circle 177 on Reader Service Card 6 Standard law enforcement functions include criminal investigations, traffic control, service calls, community problem solving efforts, counternarcotics, and gang suppression. We are not the Best because we are the oldest… 7 As presented by the National Strategy We are the oldest because we ARE the Best! Information Center in ongoing research pertaining to cultures of lawfulness (see http://www.strategycenter.org/articles/ America’s Top EP Training School teaching-the-rule-of-law). 8 Op.cit. (JP 1-02). Traditional Featuring the world renowned 7-Day insurgencies and resistance movements Providing Executive Protection Program are different: traditional insurgencies Established in 1978 by Dr. Richard W. Kobetz are internal struggles, whereas resistance Over 100 hours with 20 plus instructors movements confront invading or occupying forces of an external power. 9 Historic examples illustrate the 5-Day LEO Dignitary Protection Program diversity and social significance of Other Specialized and Custom insurgency: revolts in Flanders (1323- Training Courses 1328) attacking taxation; the English Civil War (1642-1653) and resulting Perfect for Military, Government, Police and Commonwealth; American Revolution (1774-1783) creating a nation; China’s Private Security Protective Services Taiping Rebellion (1851-1864) causing www.personalprotection.com 16 Penn Plaza Suite 1570, New York, NY, 10001 (212)268.4555 [email protected]

Circle 281 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 55 217-281_HmldSctyAd_2.25x10_4C_Layout 1 12/20/

BACHELOR OF SCIENCE OR MASTER OF SCIENCE IN over 25 million deaths; American of such distinctions, see retired Army Civil War (1861-1865) pitting states’ Colonel Rod Paschell’s article, “Marxist rights against national will; Russian Counterinsurgencies,” in the summer Legal Revolution (1905-1917) overthrowing a 1986 issue of Parameters. government and formalizing socialism; 15 A system is “a functionally, Indian Revolt (1920-1947) securing physically, and/or behaviorally related Studies India’s independence from the British group of regularly interacting or Empire; Chinese Revolution (1927-1949) interdependent elements … forming a 100% ONLINE DEGREE replacing the Nationalist Party with unified whole” (Ibid, JP 1-02). B ased the People’s Republic; Southeast Asian on space limitations, we will not discuss • LAW & PUBLIC POLICY TRACK Rebellion (1941-1955) ending regional system theory and associated assessment • HOMELAND SECURITY TRACK French colonialism; Cuban Revolution methodologies (e.g., systemic operational • CRIMINAL JUSTICE TRACK (1956-1959) empowering Fidel Castro; design, effects based operations, etcetera) The 100% online curriculum Iranian Revolution (1987-1979) replacing in depth. For additional information on provides students with a strong a monarchy with a radical Islamic systems theory and related assessment foundation in criminal, family, real theocracy; and Chechen Rebellion (early methods, see chapters 2 and 4 of JP 3-0, estate, administrative and business law. It also includes a set of 1990’s to present day) pitting Islamic Joint Operations, 17 Sep 2006 (with competencies in legal research fundamentalists and nationalists against change 2, as of 22 March 2010). and writing, litigation, estates and Russia. 16 This comprehensive set of information trusts, bankruptcy, ethics and 10 Retrieved from International Relations is consistent with a recently definedU S constitutional law. and Security Network, at http://www. military term: battlespace (see JP 1-02 and Cal U’s web-based format allows isn.ethz.ch/isn/Current-Affairs/Security- FM 1-02, Ibid). students the opportunity to pursue Watch/Detail/?id=110419&lng=en, on 17 This discussion assumes that their interests in a variety of legal March 15, 2011. government, insurgency, and populace topics, preparing them for a host 11 In this context, elements of national members are rational decision makers— of different career options. power are “all the means available to individuals who deliberately seek To learn more about the 100% the government in pursuit of national attainment of desired objectives in online BS and MS in Legal Studies: objectives” (Note: See JP 1-02, Ibid). accordance with underlying rationale and Law & Public Policy, Homeland This paper employs an expanded definition purpose. Along these lines, rationality Security and Criminal Justice tracks, and other unique online of national power: specifically, diplomatic, does not imply that everyone agrees with opportunities, visit Cal U’s website information, military, economic, financial, selected outcomes or assesses particular at www.calu.edu/go or call intelligence, and law enforcement (i.e., choices in the same manner; instead, all 724-597-7400. DIMEFIL). that is required is that decision makers 12 University in the This definition is consistent with the have a rationale for their respective # country for online definition presented in JP 1-02 (Ibid). decisions. degree programs.* 13 See William Colby’s Lost Victory, 18 Capacity consists of the physical 1*www.guidetoonlineschools.com Robert Komer’s The Malayan Emergency abilities, resources, and knowledge in Retrospect, and Robert Thompson’s required to conduct required actions. Defeating Communist Insurgency. 19 The identification of shared interests 14 This paper focuses on insurgencies and areas of mutual advantage is simply that beset nascent, developing, or applied microeconomic theory. C 20 GLOABALLONLUINE developed democracies, rather than This is a critical point, highlighting totalitarian or Marxist regimes. Hence, the fact that national governments are built California University of specified OC IN principles and from the bottom up. Pennsylvania relationships differ from those repressive 21 The Sons of Iraq provide an example, Building Character. Building Careers. governments consider and employ while where various sectarian groups aligned in www.calu.edu addressing insurgencies. For a discussion pursuit of collective objectives. A proud member of the Pennsylvania State System of Higher Education.

Circle 263 on Reader Service Card 56 The Counter Terrorist ~ Feburary/March 2012 Circle 265 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 57 Qods Force: Iranian Unit Tied to U.S. Plot

Iranian Revolutionary Guard Air Force helicopter. Photo: Shahram Sharifi CounterThe

58 The Counter Terrorist ~ Feburary/March 2012 Qods Force: The United States’ imminent withdrawal from Iraq and force drawdown in Afghanistan has likely Iranian Unit Tied to U.S. Plot encouraged Iran’s ruling regime to hold course on its current political and military strategies. The Iranian government can be expected to continue its operations to shape the political climate in target countries and further consolidate its gains through the use of political, intelligence, and paramilitary operations conducted by its Qods Force operatives.

By Mark Sexton

ods Force initiative in the pursuit of “commander’s The Qods Force QThe Iranian paramilitary organization intent” as Eastern forces often do. The known as Qods (also spelled Quds) Force United States has designated the Iranian specializes in a unique is for Jerusalem, in reference to Revolutionary Guards and the Qods 2 form of unconventional the Holy City. Qods Force is one of the Force as terrorist organizations. five military branches of the Iranian warfare.Qods Force Revolutionary Guards (IRG), also Organizational appears doctrinally identified as a council and abbreviated Structure IRGC.1 Qods is believed to have begun as a tasked with “exporting Iran deploys Qods Force operators to militia after the 1979 revolution led by the revolution.”Qods, 3 conduct unrestricted warfare campaigns Ayatollah Khomeini and it was officially like the U.S. Army and export a unique brand of Shia-based established in 1990.4 Islamic terror outside Iranian borders. According to author Mohammad Special Forces, is Qods is deployed globally and acts as an Mohaddessin, the Qods Force is organized based intelligence-gathering and operational under the IRG Central Headquarters arm of the Iranian government that may with directorates such as Operations, on geographic carry out orders from the ayatollah as a Intelligence, Training, and Finance. specialization. Western-styled force might or exercise Each directorate is headed by an

The Counter Terrorist ~ Feburary/March 2012 59

IRG General.5 Qods directorates are organized to support Qods’ operatives while on missions. The number of Qods personnel has been estimated at 5,000.6 This number is likely inexact because of the organization’s secrecy. The current commander of Qods, according to the U.S. government, is Qassem Soleimani.7 General Soleimani also acts as the advisor to Iran’s supreme leader on Qods’ operations within Iraq and Afghanistan.8 Qods chain of command appears to go directly from the commander and IRG directorate to the Supreme Leader Ayatollah Khamenei. The Iranian president and Ministry of Interior do not appear to be in the chain of authority for Qods.

Qods Force Operational Areas Lebanon, Jordan, Turkey, Afghanistan, Qods’ members outside of Iran may and Missions Pakistan, North Africa, the Arabian operate out of Iranian embassies under The Qods Force specializes in a unique Peninsula, former Soviet Republics,12 official diplomatic mission cover.15 form of unconventional warfare.9 Qods Europe, and the United States.13 It can Qods’ members have trained Hezbollah Force appears doctrinally tasked with be surmised that Qods’ operatives receive personnel in Lebanon for their fight “exporting the revolution.”10 Qods, additional advanced training in languages against the Israeli army’s occupation like the U.S. Army Special Forces, and cultural issues particular to their of southern Lebanon. Hezbollah is the is organized based on geographic operational area.14 Qods’ members train archetype protégé to Qods and has specialization.11 Qods regional areas Islamic terrorist groups and conduct pre- become the most successful and reliable of responsibility are Iraq, Palestine, attack target surveillance and planning. proxy of Iran. Qods and Hezbollah

60 The Counter Terrorist ~ Feburary/March 2012 KEYNOTE ANNOUNCED! Senator George J. Mitchell TURMOIL IN THE MIDDLE EAST: WHAT IT MEANS FOR AMERICAN SECURITY

FEATURING:

PREPARE. PREVENT. PROTECT. RESPOND.

We deliver the training, education and critical tools you need on infrastructure protection, counterterrorism and protecting against cyber attacks!

CONFERENCE: APRIL 2–4, 2012 EXPO: APRIL 3–4, 2012 WASHINGTON CONVENTION CENTER ★ FREE EXPO WASHINGTON, D.C. Meet hundreds of leading security vendors essential to keeping our country safe and secure. Plus, PLUS—GET FREE ACCESS participate in interactive workshops TO THESE EVENTS HELD and see demos showcasing the JOINTLY WITH GOVSEC: latest advances in infrastructure protection, counterterrorism, cyber Topics include: warfare technology and much more! • Continuity of Operations (COOP) • Risk Assessment • Disaster Recovery • Emergency Response

Topics include: • Mass Noti cation • IT Security • IP Video • Surveillance SAVE $200! • Access Control Use priority code: GOVAD2 • Wireless Technology

REGISTER TODAY! PRODUCED BY: GovSecInfo.com Circle 257 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 61

GovSec12_1-PgAd_CT_1211.indd 1 12/22/11 4:59 PM Hamas rally in Bethlehem. Photo: Soman

COUNTER TERROR EXPO 25 – 26 April 2012 Olympia London www.counterterrorexpo.com

The UK’s largest show for International counter terrorism and specialist security 400 Security & Counter Terrorism Focused Exhibitors LIVE Demonstrations for IEDD & Access Control OVER 9,000 International Attendees NEW Light Armoured & Support Vehicle Display FIVE High Level Conferences INTERNATIONAL Meet the VIP Buyer Programme FREE Workshop Programme covering the latest technologies

PRE-REGISTRATION ADMITANCE ONLY. NO ONSITE REGISTRATION. Register Now at www.counterrorexpo.com/advert

Conference Partner Network Reception Sponsor Supported by Co-located

(UK) LIMITED

62 282 ~ Feburary/March 2012 Circle 267 on Reader Service Card CircleCTX12The Ad Counter 120x190 on Reader Dec11.indd Terrorist Service 1 Card 16/12/2011 16:58 members have also been implicated in smuggled into Gaza allegedly originating the U.S. Marine barracks and embassy from . At least two Qods’ officers bombings of 1983 in Lebanon. Qods’ reportedly infiltrated Gaza (using involvement is generally accepted in the as guides) through Egypt, bombing of the Khobar towers in Saudi entering smuggling tunnels into Gaza.19 Arabia in 1996 in which 19 Americans Qods’ Force leaders have been indicted in were killed.16 Argentina for their alleged involvement Qods-trained Hezbollah has operated in the 1994 bombing of the Argentine within the Lebanese diaspora of the tri- Israelite Mutual Association that killed 85 border regions of Argentina, Brazil, and people.20 Paraguay.17 Hezbollah has used South America and Mexico to position itself Qods in Iraq Qods’ within the narcotics and weapons trade18 According to a report by Anthony to transfer funds back to Lebanon to Cordsman for the Center for Strategic operations in finance Hezbollah operations. and International Studies, in January Iraq have directly IRGC Qods’ officers have reportedly 2006 the Qods were placed in charge trained a special operations unit for of Iranian operations in Iraq.21 An threatened U.S. Hamas within Gaza. This new Hamas unclassified assessment provided to the military forces. unit is designed to conduct urban Senate Select Committee on Intelligence guerilla-type operations along the border asserted that the Qods’ Force was with Israel and is equipped with weapons providing funding, weaponry, and

Khobar Towers bombing in Dhahran, on 25 June 1996. Photo: United States Federal Government

The Counter Terrorist ~ Feburary/March 2012 63

training to Iraqi insurgents.22 These or EFPs. These specialized explosive reports show that Iran gave clandestine devices are just a small percent of all Iran has kept Qods assistance to elements (generally Shia) IEDs, but they produce significant actively deployed within Iraq to influence the political casualties. These devices require machine- situation and act as a counter to U.S. tooled metal plates, usually a malleable on campaigns efforts to install a pro-West government. metal such as copper, that when projected regardless of criticism Qods’ operations in Iraq have directly from a cylinder by the detonation of an threatened U.S. military forces. This explosive charge form a semi-molten and threats of threat was demonstrated January 20, metal slug that travels at such a high increased sanctions 2007, by a bold daylight attack against velocity that the projectile is able to U.S. forces at a U.S. Army Provincial defeat armor. The amount and type of from the former Bush Joint Coordination Center located in the explosives require careful measurements administration and Iraqi city of Karbala. Reports of the attack and assembly of the device, not like the President Barack indicate it was extremely sophisticated ordinary IEDs that can be put together to the degree that the attackers utilized in a garage and placed in or along the Obama. were English speakers, dressed in Western road. EFPs have to be placed in a specific clothes, and drove SUVs similar to those manner to be effective.24 popular with U.S. government agencies. Karbala is home to one of the holiest Qods’ Tactical shrines in Shia Islam, and it appears that Approach in Iraq Iran gained cooperation of the police and and Afghanistan local officials to conduct the attack. The Insurgent supply lines into Iraq from Iranian Qods’ Force has been implicated Iran have been traced to determine the in that attack and suspected of assisting origins of the EFP devices and the United local Shia insurgents with planning for States has acknowledged that the Iranians the assault on the Joint Center. The are providing training to insurgents.25 It is contribution Qods made seems to be interesting to note that the introduction not just in the planning but also in of EFPs occurred well after the U.S. the support needed, such as obtaining invasion of Iraq and after the United American-style vehicles and clothing,23 States had begun to look toward a more and training in urban assault tactics. unified and pluralistic-style political Other activities linked to Qods’ system to govern the Iraqi people. members in Iraq are the deadly These same threats are now improvised explosive devices (IED) appearing in Afghanistan. Iranian known as explosively formed penetrators

64 The Counter Terrorist ~ Feburary/March 2012 influence of Afghan government and uncovered assassination plot against the naturalized U.S. citizen of Iranian birth, increased sophistication of attacks Saudi ambassador on U.S. soil suggests Manssor Arbabsiar, and Iranian national and the insurgents’ networks, reveal indifference to Western rhetoric. Gholam Shakuri, in a plot to murder the Qods involvement. Qods supplies Saudi Arabian ambassador to the United and trains Afghan Taliban to fight U.S. Assassination States. The indictment outlined the U.S. and coalition forces.26 With the Plot conversations, money transfers, and plans 2012 drawdown of U.S. forces from On October 11, 2011, the New to hire narcotics organization members to Afghanistan, the Iranians Qods Force has York U.S. district attorney announced assassinate the ambassador and to blow been given a prime window to influence a five–count, 21-page indictment of a up embassies and restaurants frequented the Afghan government and populace.27

The Arab Spring and Qods Qods has fomented protest and RBR North America is pleased to announce the rebirth dissent in Bahrain.28 Qods predictably of the RBR Helmet in North America. All the quality and has used the chaos in Libya to mask the acquisition of weapons for Hamas in features you’ve come to know and appreciate. Gaza and it is unknown how deeply it is entrenched there.29 Dealer inquiries welcome. Iran is believed to have Qods Force operatives currently assisting Syrian security forces in their suppression of demonstrators calling for the removal of President Bashar al-Assad from power. A recent video on YouTube was uploaded by the Middle East and North Africa (MENA) organization purportedly showing two hooded Syrian dissidents holding an identification card of what appears to be a IRGC Qods’ member who was reportedly killed in .30

Dialogue Irrelevant Iran has kept Qods actively deployed on campaigns regardless of criticism and threats of increased sanctions from the former Bush administration and President Barack Obama. When running for president, candidate Obama asserted that dialogue with Iran was possible. The current reality is that no productive engagement has occurred despite President Obama’s declaration www.rbrnorthamerica.com of extending his hand to the Iranian government. Iranian nuclear capabilities’ Contact [email protected] development continues and the recently North American Distributors for LBA International Limited. RBR North America is a division of Defense Optics Group Corporation RBR North America

Circle 248 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 65 prevent dissident activities against the Syrian government from being emulated in Iran.33 Iranian operatives have a history of questionable operations with mixed results, however. David Belfield, AKA Dawud Salahuddin, is an example. The American-born Islamic convert murdered Ali Akbar Tabatabai, Iranian dissident and critic of the Iranian Islamic regime in service of the Iranian regime. Salahuddin Small craft suspected to be from the Islamic Republic of Iran Revolutionary Guard Navy fled the United States to Iran via Canada (IRGCN), maneuver in close proximity of the U.S. Navy Aegis-class cruiser USS Port Royal after shooting Tabatabai to death at his (CG 73), Aegis-class destroyer USS Hopper (DDG 70) and frigate USS Ingraham (FFG home in Bethesda Maryland, in 1980.34 61). Photo: U.S. Navy That was not the only time Iranians by U.S. senators. The indictment also CIA, facilitated the plot to precipitate a have been implicated in a botched identified Shakuri as a senior Qods Force confrontation with Iran.32 Another theory assassination in the United States. In operative.31 was that the plot would be uncovered 2010 Mohammad Reza Sadeghnia was Some have speculated that the plot and stopped, justifying a limited U.S. charged and imprisoned for attempting was launched by members of the Iranian military action to divert attention to pay another Iranian American to government to discredit Ayatollah from internal financial problems and murder anti-regime broadcaster Jamshid Khamenei or that an Iranian dissident disaffected segments of society or to Sharmahd. Sadeghnia is also believed to faction and U.S. agencies, such as the provoke U.S. military action that could have conducted surveillance on London- S-003 horizAd_Layout 1 16/12/2011 10:08 Page 1

ts it’s i presen SM nsport ural Tra inaug part event - ecurity g S xpandin f SMi’s e o Event ecurity S o Portfoli MONDAY 13TH & TUESDAY 14TH FEBRUARY 2012 COPTHORNE TARA HOTEL, LONDON

KEY SPEAKERS INCLUDE: HALF-DAY POST-CONFERENCE • Stephen Thomas QPM, Assistant Chief Constable, Operations, British Transport WORKSHOP Police Wednesday 15th February 2012 • Dvir Rubinshtein, Aviation Security Operation Center Manager, Security Department, 9.00am – 12.30pm State of Israel Copthorne Tara Hotel, London • Rear Admiral Claudio Confessore, Head of the National School for Training of Navy military personnel, Italian Navy Exercise Rolling Defence • Roberto Mugavero, President, Osdife - Observatory on Security and CBRNe Defence Workshop leader: • Commander Stein Olav Hagalid, Branch Head, NCAGS/NATO Shipping Centre Charlie Swanson, Owner, STC • Wlodzimierz Ternawski, Security Expert, PKP Polskie Linie kolejowe S.A www.transportsec.com Register online or contact James Hitchen on: +44 (0)20 7827 6054 or email [email protected]

307 66 The Counter Terrorist ~ Feburary/March 2012 Circle on Reader Service Card based Voice of America commentator Individuals for Proliferation Activities and Reza Nourizadeh. Sadeghnia was released Support for Terrorism. Retrieved April on bail after a year in custody to visit his 23, 2010, from http://www.ustreas.gov/ sick father in Iran, but he has not returned press/releases/hp644.htm and a warrant was issued for his arrest. 3 Spiegel, B. D. (2007, February Department of State cables released by 15). Iran’s elite and mysterious fighters. WikiLeaks described FBI cooperation Retrieved April 23, 2010, from http:// with British authorities and described articles.latimes.com/2007/feb/15/world/ Sadeghnia as a self-admitted Iranian agent fg-quds15 according to information shared with 4 STRATFOR. (2010, June 21). British authorities.35 Iranian Intelligence and Regime It is entirely possible that the current Preservation. Austin: STRATFOR Global alleged U.S. assassination conspiracy is a Intelligence. Qods’ operation, whether a direct order 5 Mohaddessin, M. (1993). Islamic from the chain of command or as an Fundamentalism - The new Global Threat. initiative-based action that is popular with Seven Locks Press. agile non-Western forces. 6 Cordesman, A. H. (2007). Iran’s Revolutionary Guards, the Al Quds. Conclusion Washington DC: Center for Strategic Tehran can be expected to continue to and International Studies. deploy Qods’ operatives in a clandestine 7 Treasury, U. D. Designation of Iranian war against the United States, Western Entities and Individuals for Proliferation nations, and Israel. The Iranian regime will Activities and Support for Terrorism. likely expand its Qods’ operations because 8 Darling, D. (2005, October 5). Meet there appears to be no real incentive not to. Brigadier General Qassem Suleimani, Qods Force members are a force multiplier the commander of Iran’s anti-American used as an instrument to influence, shape, Qods Force. Retrieved April 24, 2010, and manipulate the policies of other from http://intellibriefs.blogspot. nations. • com/2007/02/how-iranian-qods-force-is- operating-in.html ABOUT THE AUTHOR 9 Cordesman. Iran’s Revolutionary Mr. Sexton has deployed to Afghanistan Guards, the Al Quds. 10 as a member of Special Forces A-Teams STRATFOR. Iranian Intelligence An abandoned Tiran-5 main battle tank in (ODAs) and as a security contractor and and Regime Preservation. South Lebanon, now displaying a wooden 11 advisor to the Afghan Presidential Protective Clancy, T. (2001). Special Forces. display of late Ayatollah Khomeni. Security Detail. He is a National Guard Berkley Publishing Group: New York. Photo: Eternalsleeper at en.wikipedia 12 warrant officer. Mr. Sexton is the founder Mohaddessin, M. Islamic of Vista Tracking (www.vistatracking.com). Fundamentalism - The new Global Threat. 13 Iran Terror Database. (2005, End Notes July 19). The Qods Force. Retrieved October, 21, 2011, from http://www. 1 Telegraph. (2007, October 4). iranterror.com Iran’s Revolutionary Guards: Quds 14 Clancy, T. Special Forces force. Retrieved April 23, 2010, from 15 Global Security. (2005, April http://www.telegraph.co.uk/news/ 26). Qods (Jerusalem) Force. Retrieved worldnews/1565107/Irans-Revolutionary- April 23, 2010, from http://www. Guards-Quds-force.html globalsecurity.org/intell/world/iran/ 2 Treasury, U. D. (2007, October qods.htm 25). Designation of Iranian Entities and

The Counter Terrorist ~ Feburary/March 2012 67 16 Shane, S. (2007, February 17). www.usatoday.com/news/world/ death-in-syria/?tr=y&auid=9644523 Iranian Force, Focus of U.S., Still a iraq/2007-07-11-karbala-report_N.htm 31 Department of Justice. (2011, Mystery. Retrieved April 24, 2010, from 24 EFP IEDs in Iraq. (2006, February). October 11). Two Men Charged in http://www.nytimes.com/2007/02/17/ Retrieved April 24, 2010, from www. Alleged Plot to Assassinate Saudi Arabian world/middleeast/17quds.html?_ nh-tems.com/.../EFP_IEDs_in_SE_Iraq_ Ambassador to the United States. Retrieved r=2&oref=slogin Basrah_RROC_G2.pps October, 23, 2011, from http://www. 17 Gato, P. (2007, May 9). Hezbollah 25 Conroy, S. (2007, February 11). U.S. fbi.gov/newyork/press-releases/2011/ builds a Western base. Retrieved October, Sees New Weapon In Iraq: Iranian EFPs. two-men-charged-in-alleged-plot-to- 21, 2011, from http://www.msnbc. Retrieved April 24, 2010, from http:// assassinate-saudi-arabian-ambassador-to- msn.com/id/17874369/ns/world_news- www.cbsnews.com/stories/2007/02/11/ the-united-states americas/t/hezbollah-builds-western-base/ iraq/main2458318.shtml 32 Mackey, R. (2011, October 12). 18 Kephart, J. (2011). Indicting 26 Three Years Later: A Socio-Political Some Experts Question Iran’s Role in Hezbollah in Mexico. Retrieved October, Assessment of Uruzgan Province from Bungled Plot. Retrieved October, 24, 21, 2011, from http://www.cis.org 2006-2006. (2009, September 18). 2011, from http://thelede.blogs.nytimes. 19 Frontline. (2011, July 21). Iranian Kabul: The Liaison Office. com/2011/10/12/iran-experts-ponder-an- Revolutionary Guards train new Hamas 27 Unclassified Report on Military alleged-terror-plots-b-movie-qualities/ commando brigade in Gaza. Retrieved Power of Iran. (2010, April). Secretary of 33 DEBKAfile. (2011, October 14). October, 23, 2011, from http://www. Defense. Iranian radicals look for a limited armed israelifrontline.com/2011/07/iranian- 28 Bahrain News Agency. (201, October clash with the US. Retrieved October, revolutionary-guards-train-new.html 22). Bahraini Intelligence Totally Aware 24, 2011, from http://www.debka.com/ 20 Department of State. (2011, of Shakuri’s Activities”. Retrieved article/21387/ February 17). Background Note: Iran. October, 21, 2011, from http://www.bna. 34 Peterson, S. (2011, October 14). Retrieved October, 21, 2011, from http:// bh/portal/en/news/477754 Former Iran assassin says alleged plot ‘makes www.state.gov/r/pa/ei/bgn/5314.htm 29 Frontline. Iranian Revolutionary no sense’. Retrieved October, 21, 2011 21 Cordesman. Iran’s Revolutionary Guards train new Hamas commando from http://www.csmonitor.com/layout/ Guards, the Al Quds. brigade in Gaza. set/print/content/ view/print/415574 22 McConnell, J. M. (2008). SSCI 30 Coughlin, C. (2011, October 5). 35 Man Who Targeted Iran Critics ATA Feb 2008–Dni Statement For The Iran embarrassed by Revolutionary Guard Skips LA Court Date. (2010, December Record. death in Syria. Retrieved October, 21, 3). Retrieved October, 21, 2011, 23 Zoroya, G. (2007, July 17). U.S. 2011, from http://blogs.telegraph. from http://losangeles.cbslocal. Army report analyzes Karbala attack. co.uk/news/concoughlin/100109105/ com/2010/12/03/man-who-targeted- Retrieved April 24, 2010, from http:// iran-embarrassed-by-revolutionary-guard- iran-critics-skips-la-court-date/

68 The Counter Terrorist ~ Feburary/March 2012 Circle 174 on Reader Service Card Innovative Products

The BattleSling HEAT Armor The BattleSling was designed to provide operators with the ability Tactical Truck to cross open ground while keeping hands free for weapons. Many tactical trucks come with one shooting It provides large, looping weight-bearing straps to allow those platform located in the roof of the unit in wounded in operations to be transported by the large muscles of the form of a rotating turret. HEAT Armor’s the backs and legs of the carriers, rather than the fatiguing effect newest Tactical Truck also comes with a to hands, forearms and shoulders caused by conventional hand- rear shooting platform to provide teams the carried stretchers and litters. The BattleSling is flat packed and maximum coverage. With an officer in the can be hooked onto harnesses, belts, vests, or vehicles. turret and one on the rear shooting platform, www.battlesling.com officers can maintain a 360° field of vision and field of fire. www.heat-armor.com

Energizer Tactical Tango - LE The Energizer Hard Case Tactical Tango light has two visible LEDs – high intensity white and blue with eight separate intensity configurations. It has integrated IR and IFF with a lockout switch and omni-directional beacon capability. It rotates 360° in 18° increments and locks in place. It includes mounts for either side of a helmet or on a MOLLE system. It does not protrude below the rim of a helmet and is waterproof. www.hardcasetactical.com

The Counter Terrorist ~ Feburary/March 2012 69 The december 2011/january 2012 Counter Volume 4 • Number 6

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, circle the appropriate reader service number (RSN) on the attached Reader Service Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.

Page Ad/Company • website and/or email...... RSN Number 50 4Sevens, LLC • www.4sevens.com/ctm...... 252 57 6th Annual UASI Conference • www.uasicolumbus2012.us...... 265 14 836 Technologies • www.uasicolumbus2012.us...... 259 29 Adams Industries • www.adamsindustries.com...... 308 2 Ahura Scientific •www.thermoscientific.com/mil-chemid ...... 254 19 American Military University • www.amuonline.com/counter-terrorist...... 344 74 Applied Research Associates, Inc. • www.ara.com/robotics...... 256 18 AWC Systems Technology • www.awcsilencers.com...... 261 ndex 56 California University of Pennsylvania • www.calu.edu...... 263 267 i 62 Counter Terror Expo • www.counterterrorexpo.com...... 13 CRC Press • www.crcpress.com...... 271 28 Defense Group - CoBra Software • www.cobrafirstresponder.com...... 273

65 Defense Optics Group • www.rbrnorthamerica.com...... 248 51 Defense Solutions Group - DSG Arms • www.dsgarms.com...... 275 73 Elite K9 • www.elitek9.com...... 279 76 Energizer • www.hardcasetactical.com...... 209

r 55 Executive Protection Institute • www.personalprotection.com...... 281 37 George Washington University • www.gwu.edu/gradapply...... 283 23 Golight Inc • www.golight.com...... 285 61 GovSec • www.govsecinfo.com...... 257 40 Heat Armor • www.heat-armor.com...... 175 17 Homeland Security Network • www.homelandsecuritynet.com/network...... 19 10 Icor Technology • www.icortechnology.com...... 81 54 IDGA 3rd Annual Non-Traditional ISR • www.nontraditionalisr.com...... 289 54 IDGA Special Operations Summit West • www.specialoperationswest.com...... 291

se 46 IDGA Surface Warfare Summit • www.surfacewarfaresummit.com...... 293 55 Infrared, Inc. • www.infrared.com...... 177

i 39 ISC West • www.iscwest.com/ctm...... 305 22 ITT • www.einidine-defense.com...... 295 52 K9 Cop Magazine • www.k9copmagazine.com...... 277 3 Lenco Industries Inc. • www.swattrucks.com...... 13 t 25 Lind Electronics Inc. • www.lindelectronics.com...... 220 26 Mattracks • www.mattracks.com...... 297 68 Mid-Michigan Kennels Inc. • www.midmichigankennels.com...... 174 75 Oasys Technology • [email protected]...... 334 r 34 Officerstore.com •www.officerstore.com/governmentsales ...... 299 7 Patriot3 • www.patriot3.com...... 301 33 PoliceOne • www.policeoneacademy.com...... 180 16 PoliceTraining.net • www.policetraining.net...... 191

e 32 Reconyx • www.reconyx.com...... 303 28 RM Equipment • www.m203grip.com...... 207 48 RONCO Consulting • www.roncoconsulting.com...... 324 12 Seabotix • www.seabotix.com...... 282 27 Security Solutions International • www.homelandsecurityssi.com...... 241

v 66 Smi Transport Security Expo • www.transportsec.com...... 307 43 Soldier of Fortune • www.sofmag.com...... 309 47 Southeastern Solutions • www.sesolinc.com...... 239 36 Southern Police Equipment • www.sooutherpoliceequipment.com...... 328 11 SSI Building Safety Training • www.homelandsecurityssi.com...... 251 71 SSI Elevated Tactics Training • www.homelandsecurityssi.com...... 313 d 41 SSI PVBs • www.ssipvb.com...... 226 38 Suicide Terror Book • www.suicideterror.com...... 117 15 Tactical Products Group Inc. • www.tacprogroup.com...... 201 4 Tex Shield Inc • [email protected]...... 29 16 Zistos Corp • www.zistos.com...... 311 a

70 The Counter Terrorist ~ Feburary/March 2012 www.homelandsecurityssi.com Take your training to a higher level... SSI Elevated Tactics training Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

Find out more at: • Vehicle driving and operating techniques in a variety of situations • Global case studies of real-world operations using the specific equipment • Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults • Elevated obstacle negotiation and firing platforms • Emergency evacuations, climbing and descending options • Distraction and deception techniques ® SECURITY • and much more... SOLUTIONS INTERNATIONAL SSISSI Protecting the Homeland Together ® Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 [email protected]

Circle 313 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 71 Training Review Tactical Firearms Training Team Pre-Deployment Training By Max F. Joseph

ne would think that being cover, shooting on the move, and engag- oengaged in conflict as long as we have ing multiple targets. Transitioning from that the training our soldiers receive the rifle to the pistol was also covered. In would be at the highest level of realism addition to the marksmanship training, and demanding standards. I find over combat medic skills were taught and and over again that this is not the case. practiced by the students. Although there is no doubt that special operations forces generally receive very Phase Two: Close good training, the standard infantryman Quarter Battle usually does not. On most military bases There was a fairly large emphasis there is such an obsession with artificial on close quarter battle (CQB) during safety standards that the overall mental this course because this particular unit and physical preparation of soldiers is anticipated operating in military op- Photo courtesy of www.tftt.com often less than adequate. Tier one units erations on urbanized terrain (MOUT) often seek off-base training with private Phase One: Weapons environments. In phase two, we began companies to circumvent the dreaded Marksmanship Train- with an open-air façade house; first dry “Range Control,” whose mission seems ing—M-4/M-9 fire then live fire. Once we sorted out to be to throw a wrench into any quality This first phase began with proper weapon handling errors and other safety training plan. weapons indoctrination. Each day started issues, it was off to the shoot house. This I have been training warriors full time with a troop formation at which time a was the first time that many of these for over 25 years and I feel that I have a detailed safety brief was issued. A negli- men had ever been inside of a live fire better-than-average perspective on how gent discharge by a student would mean kill house. They had plenty of experience to maximize training time and get the immediate removal from the course. The with Simunitions and blanks inside of a utmost from students to make them as men burned through 48,000 quality MOUT house, but live fire is a different confident and skilled operators as possible rounds over 12 days. I do not believe in animal entirely. We began with 2-man in the time allotted. wasting ammunition, so every drill that room combat then progressed to 3 men. I was recently tasked to train a unit in the men shot had objectives and the men Once they had these basic tactics down a wide range of pre-deployment skills. were accountable for every round fired. safely, we then began to conduct hits as I was given 12 days to train a 24-man After reconfirmation of zero they worked a 12-man element. The students worked unit. Upon arrival at the training site, the on combat firing positions and use of on multiple rooms with open and closed unit immediately began to assume the cover. Drills were fired on both paper doors and hallways. duties of a forward operating base (FOB) and steel targets out to 200 yards. Range The next progression of CQB was complete with guard posts, checkpoints, firing at 50–200 yards was the focus at mechanical breaching. The students were and react positions. FOB operations were first as the men learned their different given periods of instruction on the proper conducted 24/7 complete with armed holds at varying ranges. Following this use of sledgehammers, Halligan tools, sentry posts throughout the night. From was close quarter shooting from 10 yards breaching shotguns, chain saws, and training day one, every time the students to 50 yards. quickie saws. The students then began to deployed from the FOB to report to their The combat pistol drills focused on incorporate these tools into all their CQB assigned training area, they moved as a dynamic close quarter engagements. scenarios. Finally, hand-to-hand combat tactical convoy. Students executed stationary turns, use of

72 The Counter Terrorist ~ Feburary/March 2012 and defensive tactics combined with pris- The students conducted foot patrols to received much less sleep and were tasked oner securing and searching techniques accomplish various missions. Land navi- with missions throughout the night. The were rolled into the missions. gation using map/compass and GPS units course culminated with a live fire camp Phase Three: Tactical were also incorporated. Included with attack on an insurgent base where the Convoy Movements the patrolling techniques were live fire final hostage was known to be held. break contact drills, hasty ambushes, and This was an intense 12 days that the The proper organization of motorcades envelopments. Raids and camp attacks students will remember for a long time and convoys was put into play in phase were also conducted. These drills were regardless of their MOS or tier level. I three. Proper vehicle load and prepara- the most intense of the live fire scenarios hope this brief account motivates other tion were discussed as well as pre-rigging that the students had yet encountered in military instructors to maximize the vehicles with tow straps front and back. the course. In addition, surveillance and training time of their troops. The last Live fire vehicle contact drills and anti- reporting missions gave the student tools thing men going to war need is another ambush drills were practiced during the needed for the final phase. PowerPoint presentation and sexual day and at night. Nighttime driving harassment brief. with night observation devices became Phase Five: Field Train- • www.tftt.com an important part of the team’s move- ing Exercise Missions ment on various missions. Vehicle rescue During the final phase, operation or- About the author and vehicle evacuation scenarios were all ders and mission planning were the prior- "Mr. Joseph" is a former reconnais- executed with live fire. ity. The students were given a briefing on sance Marine and Department of State Phase Four: the abduction of several U.S personnel. Anti-Terrorism Assistance Program Patrolling They began to use all the skills they had instructor. He is the founder of Tactical been given over the previous nine days to Firearms Training Team. During phase four, patrolling tech- try to locate and rescue the hostages. They niques were taught and put into practice.

Bite Suit Reward Balls with Helmet Tug Handles $74.95 3" Ball $12.95 2.5" Ball $11.95 2" Ball $9.95

Hand Protectors E-Collar Holsters $39.95 ea Special Operations $39.95 Harness Has cutouts so the buttons Bite Suit available in black, coyote or multicam* can still be worked while it’s with plastic with metal cobra holstered. Has 2¼" metal $1,189.95 buckles buckles clip on back of holster so it can be worn on a 2" $149.95 $199.95 duty belt or clipped to a *with attachments for MOLLE pouches MOLLE tactical vest. Muzzles and K-9 camera $69.95

Scan our QR code with your smart phone to view our online catalog.

Malinois German Shepherd

YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

Circle 279 on Reader Service Card The Counter Terrorist ~ Feburary/March 2012 73 Circle 252 on Reader Service Card 74Circle The 256 Counter on Reader Terrorist Service Card ~ Feburary/March 2012 Circle 334 on Reader Service Card

The Counter Terrorist ~ Feburary/March 2012 75 209 76 The Counter Terrorist ~ Feburary/March 2012 Circle on Reader Service Card