PIPELINE TO JIHAD • MCDONALD’S GANG • IMIRAT KAVKAZ • WEAPONIZED TULEREMIA

Journal for Law Enforcement, Intelligence & Special Operations Professionals

AUGUST/SEPTEMBER 2014

VOLUME 7 • NUMBER 4

IRANIAN ECONOMIC WARFARE

INTERNATIONAL EDITION An SSI ® Publication AUGUST/SEPTEMBER 2014 www.thecounterterroristmag.com USA/CANADA $5.99

The Counter Terrorist ~ August/September 2014 1 6.8 SPC 5.56 NATO

The REC7 GEN II continues Barrett’s philosophy of designing the most rugged, reliable and powerful firearms. Created with passion and skill by the family that’s been building a legacy in forward-thinking firearms design for decades. When you offer the world’s strongest gas piston system in both 5.56 NATO and 6.8 SPC calibers, there really isn’t much more you need to say. Visit Barrett.net for a closer look.

Circle 121 on Reader Service Card

2 The Counter Terrorist ~ August/September 2014 LMTDEFENSE.COM

® ®

Circle 259 on Reader Service Card 100% US MADE3 The Counter Terrorist ~ August/September100% US 2014 MADE 4 The Counter Terrorist ~ August/September 2014 Circle 13 on Reader Service Card The Journal for Law Enforcement, Intelligence & Special Operations Professionals AUGUST/SEPTEMBER 2014 Counter VOLUME 7 • NUMBER 4

COVER STORY:

IRANIAN ECONOMIC WARFARE 29 By Kevin D. Freeman FEATURES:

29 Firsthand: 0 8 THE LAST DAYS OF THE MCDONALD’S GANG By Larry Winston and Brian Davis Case Study: 16 JOHN WALKER LINDH AND THE PIPELINE TO JIHAD By Walter Purdy TULAREMIA AS A WEAPON 8 46 By Jeffrey D Shuman UMAROV’S LEGACY AND THE FUTURE 56 OF THE IMIRAT KAVKAZ By Michael S. Toney

DEPARTMENTS:

06 From the Editor We Don’t Negotiate 16 44 Book Review Comrade J

69 Innovative Products Strategic Rifleman, LMT DMR Stock, Broco Jimmy

72 Training Review Vehicle Engagement Tactics

46 Cover Photo: After the Iranian hostage crisis (1979-1981), the walls of the former US embassy were covered in anti-US-murals. Photo by: Phillip Maiwald CONTENTS

The Counter Terrorist ~ August/September 2014 5 FROM THE EDITOR: CounterThe We Don’t Negotiate By Chris Graham Journal for Law Enforcement, Intelligence & Special Operations Professionals

VOLUME 7 • NUMBER 4 AUGUST/SEPTEMBER 2014 Editor Chris Graham n June 30, 2009, U.S. Army Private First Class Robert Bergdahl deserted Director of Operations and fell into the hands of the Taliban near the town of Yahya Kheyl in Sol Bradman OPaktika Province, Afghanistan. Director of Advertizing On May 31, 2014, The U.S. government traded five senior Taliban commanders Carmen Arnaes in custody at Guantanamo Bay, Cuba for Bergdahl. This appears to have been a trade Production Assistants Giselle Manassa that the Taliban has proposed for years. Based on what we have seen in the past, we can Melissa Berne expect these five to receive a hero’s welcome, be promoted and resume killing Americans Contributing Editors Kevin Freeman and our allies. Jennifer Hesterman Does the timing of this trade have anything to do with the latest domestic scandal? As Richard Marquise Tom Nypaver systemic corruption and incompetence at the Veteran’s Administration began to bubble Dean Olson to the surface, members of the public observed that Islamist terrorists in Guantanamo Steve Young receive superior medical care to American combat veterans. Resistance to the unpopular Graphic Design Morrison Creative Company “Affordable Care Act” stiffened as Americans gained their first glimpse of what Copy Editor government run healthcare looks like. Laura Town As coincidental as the timing of this trade may be, the opportunity now exists to Advertising Sales Chris Bell determine the full details of Bergdahl’s time with the Taliban. Of course, there is plenty [email protected] of downside to the terrorist trade. The U.S. government’s claim not to negotiate with 305-632-2309 terrorists is now dead, just like so many other standards eliminated in the last few years. Publisher: Security Solutions International All adversaries in the world now have proof that if they can bring some leverage to bear 13155 SW 134th St. • STE 103 against the U.S. government, they can get what they want. How many Americans do Miami, Florida 33186 you think will be kidnapped in the coming year? ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Semper Fidelis, Professionals is published by Security Solutions International LLC, as a service to the nation’s First Responders and Homeland Security Professionals with the aim of deepening understanding of issues related Chris Graham to Terrorism. No part of the publication can be reproduced without permission Editor, The Counter Terrorist from the publisher. The opinions expressed www.30-10pistol.com herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all Editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 103, Miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and plaques please contact: PARS International Corp. Web: www.magreprints.com/quickquote.asp Email: [email protected] Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can also contact the editorial staff: www.thecounterterrroristmag.com © 2014 Security Solutions International

6 The Counter Terrorist ~ August/September 2014 Circle 110 on Reader Service Card The Counter Terrorist ~ August/September 2014 7 Firsthand: THE LAST DAYS OF THE MCDONALD’S GANG

Photo by: iboy daniel 8 The Counter Terrorist ~ August/September 2014 By Larry Winston and Brian Davis

In August 1989, a series of McDonald’s fast food robberies took place in the city of Los Angeles. The suspects—three to four male Hispanics, wearing various types of facial covering and armed with blue steel revolvers and blue steel automatics—would force all employees into the rear portion of the store.

he suspects would then cover the Most of the robberies occurred in the robbery. The suspects would also take victims’ eyes with duct tape and early morning hours, usually on a Monday keys from the employees and shut off Twrap duct tape around the victims’ wrists. with most of the weekend receipts in alarms, open locked doors, and open safe On several occasions, plastic ties were used the safe. As the robberies continued doors. On several occasions, the suspects to bind the victims’ hands. The suspects into September and October of 1989, it would follow the last employee leaving would have one of the victims open the became apparent that the suspects were the business at closing (presumably the safe. If the safe had an inner door and no familiar with McDonald’s operations manager) to their home, kidnap them at key was available, the suspects would force due to some of the questions that they gunpoint, return the victim to the business, the door open with a hammer and chisel. asked employees present during the and force the victim to open the store.

The Counter Terrorist ~ August/September 2014 9 McDonald’s corporate security personnel contacted the L.A.P.D. Robbery/Homicide Division in late September 1989. McDonald’s security reported that two former employees were thought to be involved in as many as 25 robberies. Both had been former assistant managers at various stores before leaving the company in 1988. Many of the stores where these two men had worked had A short time later, four suspects theft, burglary and robbery problems. exited the residence, entered the black One of the men was administered a Thunderbird, drove for approximately polygraph. The polygraph examiner 40 minutes, and entered a McDonald’s determined the man to be deceptive, parking lot located in the Sunland/ giving conflicting statements. Tujunga area of Los Angeles. The suspects In mid-January 1990, Robbery/ drove around to the rear of the restaurant SIS trains to react to the actions of the Homicide contacted the Special and exited the property. They continued suspects it follows, whether in a vehicle Investigation Section, (SIS), with the to drive slowly through the residential or on foot. In this case, it was apparent above information. They provided photos area located just north of the McDonald’s that the suspect’s actions were indicative of the two former employees along with for 15 minutes, finally parking on a side of “casing” the location. The unit could a residence address for one of the men. street facing south, approximately 200 not be sure that a robbery would occur, Surveillance was conducted by SIS on yards north of the business with a view however. It has been our experience six separate occasions with no unusual of the front of the restaurant. The vehicle that many suspects perform a “dry run” activity noted until February. remained there for approximately 1-½ and may not be prepared to commit On February 11, 1990, at hours. During that period, SIS detectives the crime; therefore foot surveillance approximately 2200 hours, SIS on foot observed three suspects go to the becomes an essential part of a successful surveillance observed three male trunk of the T-bird, put on additional observation in order to determine if a Hispanics (two formerly identified and clothing, and re-enter their vehicle. crime is occurring or if an arrest needs to a third unknown), exit a home, walk to Additionally, Detective Larry Winston be made. a white Ford Granada parked in front of reported seeing the driver using binoculars At approximately 0030 hours, 12 the location, and remove two large black to observe the front of the restaurant. February 1990, the suspect vehicle duffle bags from the trunk. The suspects placed the bags into the trunk of a black Ford Thunderbird. All three then went back inside the home.

10 The Counter Terrorist ~ August/September 2014 Law Enforcement Should Look No Further! take your The limitless capabilities and ease of operation make this highly versatile, armored track vehicle stand above the rest. With its compact size and four tactics to custom resourceful attachments, The Rook can go where others cannot, providing the safest, most cost effective and efficient solutions for the next SWAT teams. • Zero personnel exposure • Provide surveillance above and below level ground floors • Gas deployment capability • Second-story access • Strategic positioning of fortified position • Removal of obstacles that are in harm’s way • Transport for bomb technicians • Post disaster clean-up • Breach and access schools and malls • Bus, plane and vehicle assaults • Reduced call-out times • NIJ Level IV Protection

This offer is for governmental agencies only and expires 12/31/14.

Shaun Mitchell: 904.494.7531 [email protected] Circle 178 on Reader Service Card The Counter Terrorist ~ August/September 2014 11 relocated, parking facing westbound at doors, out of the footman’s view, two communications to cancel the uniformed the north curb of the major street. The at the rear service door. SIS detectives response and that plainclothes detectives vehicle was now parked directly across were on foot at various locations so as were already at the scene. Shortly the street from the front doors of the not to lose track of the suspect’s actions. thereafter, SIS detectives observed two restaurant, approximately 50 yards away. Our primary concern was the two suspects in the lobby of the restaurant. A short time later, SIS detectives suspects at the rear service doors. In prior It was later determined that the suspects observed one suspect exit the vehicle, robberies the suspects had waited for at the west door used a coat hanger to cross the major street, walk to the the last employee to lock up, leave using open one of the doors by pulling down Northwest corner of the restaurant, look the service doors, and then force the on the door’s panic bar. This had never into a window, and walk to the east employee back inside to open the safe. been reported as a method of entry, and parking lot of the restaurant looking The driver now exited his vehicle and if it had been seen by the SIS detectives all around. He then returned to his walked to the west side of the business and had they had time to move in, we vehicle, entering the passenger side. while periodically looking up and down would have made an arrest prior to their Approximately 10 minutes later, two the major street. entry. One of the suspects now inside suspects exited their vehicle, repeating SIS field supervisor Brian Davis opened the service door at the rear. Now, the previous actions. Both suspects was monitoring the divisional radio all four suspects were in the business. returned to their vehicle. Approximately frequency and reported that a radio Moments later, the driver returned to his 30 minutes later, SIS detectives observed call “211 (robbery) suspects outside vehicle’s trunk via the west door, removed the suspects’ vehicle trunk open, followed the McDonald’s” was just broadcast to a small toolbox, and re-entered the by three suspects exiting their vehicle and patrol units in the area. Rather than business. SIS detectives on foot closest reaching into the trunk area. The three have uniformed officers respond to a to the restaurant reported hearing loud suspects walked across the street to the robbery call with plainclothes officers hammering noises coming from within restaurant, one positioned at the west already present, Detective Davis advised the building. Detectives then observed the interior restaurant lights go off in a systematic pattern as the driver exited the business, placed the tool box and a dark bag into the trunk of his vehicle, entered the driver’s side of the vehicle, started his

12 The Counter Terrorist ~ August/September 2014 An out-of-service Gold Line train stationed at the Atlantic station, East Los Angeles. Photo by: Tim Adams vehicle, and turned its lights on. Seconds A minimum of four detectives are arrive too soon and the suspects will flee later the remaining three suspects were required, and based on circumstances on foot, creating a foot pursuit and a observed running back to their vehicle. as many as eight men have been used possible running gun battle. Arrive too As the suspects were preparing to drive for this technique. Using and perfecting late, and the suspects will have driven off. away, SIS Detectives performed a vehicle this technique has resulted in 97% of all On the morning of 12 February, containment technique to prevent the vehicle containments conducted with a several of the responding detectives vehicle from driving away. This technique safe arrest and no shots fired. It has been observed the suspect in the left rear is designed to surprise the suspects with demonstrated that once suspects enter seat point a gun in the direction of one overwhelming manpower and weaponry their vehicle to drive off, they tend to relax of the officers. Detectives opened fire. while they are contained in their vehicle. for just a moment, believing that they are Three suspects died, and the fourth was SIS detectives were armed with S&W about to get away with their crime, and critically wounded. 4506 .45s, 18" Remington 870s, and they can be isolated from the majority Detectives entered the McDonald’s M1/A4 rifles with ACOG optics. of bystanders. Timing is critical, though: and rescued the manager, who had been

The Counter Terrorist ~ August/September 2014 13 Detectives entered bound and gagged in the locked office death of his three co-suspects as a result area. The property from the robbery of their actions, which caused our officer- the McDonald’s and was recovered from the trunk of the involved shooting. No detectives were rescued the manager, suspect vehicle along with two replica .45 injured. It is interesting to note that this pellet guns. Two additional pellet guns is not the first time SIS detectives have who had been bound were found in possession of two of the been confronted by suspects armed with and gagged in the deceased suspects. pellet guns. The psychology of suspects The fourth suspect survived and was who bring a pellet gun to a gunfight locked office area. ultimately convicted for robbery and the is itself a subject that has been written about many times. It is also worth noting that surveillance of suspects often does not allow detectives the opportunity to arrest the suspects prior to the crime being committed. Tactical concerns based on distance and locations of the suspects (in this case spread out over a large parking lot) may dictate that it would be safer for all involved, including victims, for officers to allow the suspects to commit the crime, let them leave the premises, and then make the arrest away from victims and bystanders. It can be extremely dangerous to allow uniformed officers to respond to a location where plainclothes detectives are already on scene in a fluid situation.• ABOUT THE AUTHORS Mr. Winston’s 30 years of service with the Los Angeles Police Department includes 17 years with the Special Investigation Section (SIS) as a Detective Supervisor. He also served six years in a deep, long-term undercover investigation of terrorist organizations, and today provides instruction as a consultant (www.train2tail.com). Mr. Davis’ 35-year career with the Los Angeles Police Department includes 30 years in criminal surveillance and crime scene analysis with 19 years as team supervisor, including nine years of homicide investigations and general crime investigations. He served as supervisor of the Special Investigation Section (SIS), and now provides

14 The Counter Terrorist ~ August/September 2014 Circle 198 on Reader Service Card Saves Time. Saves Blood. Saves Lives. People who know choose

TACTICALMAKE EVERY HEMOSTASIS SECOND COUNT

www.biostatllc.com | 844. BIO.STAT facebook.com/tactical.biostat

Circle 271 on Reader Service Card Biostat_Celox_May2014.indd 1 The Counter Terrorist ~ August/September4/19/14 2014 12:06 PM 15 Case Study: JOHN WALKER LINDH AND THE PIPELINE TO JIHAD

“What’s your name? Who brought you here? How did you get here? Why are you here?” Mike Spann, November 25, 2001

Photo by: LoggaWiggler 16 The Counter Terrorist ~ August/September 2014 By Walter Purdy

Thirteen years ago in the southern courtyard of Qala-i-Jangi prison in Northern Afghanistan, Mike Spann, a CIA case officer, asked these questions of a captured fighter. Spann thought the long-haired, pale-skinned prisoner wearing a British military-style sweater might be a member of the IRA.

ittle did he know that the man Washington, DC on February 9, 1981. he was attempting to question As a child his family lived in middle Lwas an American from Marin County, income neighborhoods in Takoma Park California.2 At no time did this trained and Silver Springs. The family moved to fighter answer Spann or tell him he was San Anselmo, California when he was an American fighting with the Taliban. ten. Six years later he converted to Islam, John Walker Lindh was born in began wearing Middle Eastern clothing,

John Walker Lindh in custody. Photo by: American military personnel

The Counter Terrorist ~ August/September 2014 17 a supporter of Usama bin Laden.4 In December 2000, Lindh traveled to Bannu, Pakistan to study at the Madrassa al Arabia. In May 2001, Lindh left the madrassa and attended a training camp run by Harakat ul-Mujahidin. He then attended al-Qaeda’s al Farooq training camp.5 After meeting Usama bin Laden he fought for the Taliban in Northern Afghanistan until the group he was with surrendered. Mike Spann would become the first American casualty in Afghanistan not long after questioning Lindh. Taliban prisoners rose up against their Northern Alliance guards and started an uprising, gaining control of weapons and fighting for a week. On December 2, 2001, Robert Pelton, a CNN journalist, was informed that 18 fighters from the Qala-i-Jangi uprising were taken to the hospital and one of them was an American. Surprised by this news, Pelton and a Special Forces medic raced over to the hospital and discovered an injured John Walker Lindh.6 Pelton’s video of his interaction with Lindh was the first that anyone knew that there was an American fighting with the Taliban in Afghanistan. Robert Pelton captured Lindh’s mindset when he asked “Was this the right cause and the right place?” Lindh responded, “This is exactly what I thought it would be.”7 After enduring A registration form for Harkat’s Khalid bin Whalid training camp. The form says a week of bombardment and fighting, ‘‘Jihad’’ on the top of the page, and common Islamic prayers cover the group’s seal. The that was where John Walker Lindh form asks for a recruit’s name, age, nationality, religious education, code name, skills, wanted to be. Lindh was not the first languages, military experience and blood type. Photo by: Unknown American to convert to Islam, travel to Afghanistan and train in the camps. I have had the opportunity to spend time and started using the name Suleyman with the first American who travelled to al-Lindh. His family afforded him the Afghanistan and trained in the Khalid opportunity to travel to Yemen to study bin Walid camp.8 Aqil Collins, a young Arabic and Islam.3 Lindh spent time convert to Islam from California, studying at al Iman University (Faith shared a tent in the training camp with University) in Sanaa, Yemen, operated Omar Sheikh, who would later kidnap by Sheikh Abdul Majid al-Zindani, American journalist Danny Pearl. After

18 The Counter Terrorist ~ August/September 2014 Aqil completed his training he traveled to Chechnya and waged jihad against the Russians. Aqil’s jihad was cut short when he stepped on a landmine and lost his right leg.9 The questions that Mike Spann asked John Walker Lindh are the same questions that need to be asked today of Americans waging jihad in places like Somalia, Pakistan, Yemen, and . Often a recruiter will manipulate, motivate and radicalize Americans to travel abroad and fight jihad. Other times, individuals will radicalize themselves, often using the Internet to accomplish this task. More often than not, there are others who participate in the recruiting, radicalization, and raising money for travel to train for jihad. One such recruiter, Omer Abdi Mohamed, put together a terrorist pipeline that stretched from Minneapolis B-1 accelerates for take off, during Operation Enduring Freedom. United States Air Force. Photo by: SrA Rebeca M. Luquin. DIRECTOR PATROL SERGEANT POLICE CHIEF OF POLICE POLICE SERGEANT DETECTIVE SERGEANT POLICE LIEUTENANT APPLY TODAY! POLICE CAPTAIN Waldorf.edu/CT or call DETECTIVE 888-494-0826 SERGEANT EMS DIRECTOR POLICE CHIEF EARN YOUR HOMELAND SECURITY DEGREE ONLINE Visit our website at www.waldorf.edu/disclosure for information about gainful employment including cost of attendance, on-time graduation rates, occupational opportunities, median student debt and other important information about Waldorf programs. REGULATORY AFFAIRS MANAGER BUSINESS PRACTICES SUPERVISOR POLICE CHIEF COMPLIANCE MANAGER OPERATIONS COMPLIANCE MANAGER COMPLIANCE AUDITORS EMERGENCY MANAGEMENT DIRECTOR • Textbooks Provided Through Waldorf Book Grant • No ACT or SAT Required for Online Programs • Flexible, Affordable Online Programs • Complimentary Tutoring • Financial Aid and Tuition Assistance (TA) and Veterans Benefits (VA)

Circle 197 on Reader Service Card The Counter Terrorist ~ August/September 2014 19 Often a recruiter will manipulate, motivate Aqil Collins, a young convert to Islam from California. Photo by: Dominique Mainon and radicalize Americans to travel to Mogadishu.10 Much of the recruitment In 2007, the first group of radicalized abroad and fight took place at the Abubakar As-Saddique Somali-Americans traveled to fight with jihad. Islamic Center and the Cedar Square al Shabaab (which means “the youth” in public housing complex known as Arabic). Shirwa Ahmed was part of the “Little Mogadishu.” Before departing, first group of Americans that traveled the individuals would listen to Anwar al from Minneapolis. On October 28, 2008, Awlaki’s lecture Constants on the Path of Ahmed became the first known suicide Jihad.11 Others raised money to pay for bomber from America when he drove travel and weapons for the fighters. Some a Toyota truck packed with explosives went door to door collecting money under into the Puntland Intelligence Service false pretenses from Somali-Americans, (PIS) compound in Bosaso, Puntland.12 while others donated funds to purchase It appears that on September 17, 2009, weapons and provide for fighters. Omar Mohamud, from Seattle, became

20 The Counter Terrorist ~ August/September 2014 Circle 317 on Reader Service Card The Counter Terrorist ~ August/September 2014 21 the second American suicide bomber. Driving a stolen white United Nations vehicle, he was able to detonate at the AMISOM Headquarters at the airport.12 On May 30, 2011, another American from the Twin Cities, Farah Mohamed Beledi, armed with a suicide bomb vest, was killed before he was able to detonate at a government checkpoint. Abdisalan Hussein Ali’s family had fled the fighting in Somalia and spent time living in a refugee camp in Kenya. The family was

22 The Counter Terrorist ~ August/September 2014 articles.”16 During his time in Somalia with al Shabaab, the American fighter from Daphne, Alabama had contact with numerous foreign fighters. He stated that “those Minnesota Brothers have almost all left their mark on the Jihad and many have received martyrdom; while the rest are still waiting.”17 Disputes with the leadership of al Shabaab led to a number of false reports of his death. But Ahmed Abdi Godane was on a mission to remove anyone who questioned his authority within al Shabaab. On September 12, 2013, Omar Hammami was killed along with a British jihadi, Usama al Britani. From Hammami’s Twitter account came the following: “We confirm the martyrdom of Omar Hammami in the morning of Thur 12 2013.”18 A fellow jihadi with access to Hammami’s Twitter account tweeted that Omar “was killed because he refused to bow down to Godane’s deviation from shariah.”19 Unfortunately, the list of Americans who have traveled to fight jihad continues Toronto, where he married a Somalian to grow. Robert Mueller, the former able to finally move to Seattle in 2000. wife. In 2006, he arrived in Somalia director of the FBI, speaking about They later moved to Minneapolis, where and quickly rose in importance within Americans who had gone to Somalia to Ali graduated from Edison High School, al Shabaab due to his computer skills fight, stated, “it raises the question of the home of the “Tommies.” The former and his ability to put together media whether these young men will one day University of Minnesota student became and propaganda. Omar, known by his come home, and, if so, what might they the third known American suicide kunya Abu Mansoor al Amriki, came to undertake here.”20 Today, Americans 13 bomber on October 29, 2011. the attention of two al-Qaeda operatives, can use social media to gain access to Since 2006, over 100 individuals have Fazul Abdullah Mohammed and Saleh Ali information and “follow” any number 14 traveled to Somalia from America to Saleh Nabhan. of jihadis who are fighting in Pakistan, wage jihad. Probably the most noted Under their leadership, Abu Somalia, Yemen and Syria. Terrorist American to join al Shabaab was Omar Mansoor al Amriki put out a number groups use English language social Hammami. Hammami went from of propaganda videos and conducted a media to recruit and radicalize potential the Jubilee City of Daphne, Alabama, number of interviews for al Shabaab. American fighters. We have seen a number to waging jihad in Somalia. Growing Many of his efforts led to recruitment of of American fighters who have taken up, Omar and his sister were raised as a number of English speaking fighters. selfies and created digital propaganda of Baptists like his mother and attended Abu Mansoor al Amriki wrote about his themselves posing with various weapons the Perdido Baptist Church. Omar life and journey to Somalia in The Story on international battlefields. These 15 played soccer, had a basketball hoop in of an American Jihadi: Part One. He Internet-based technologies are just some the driveway, and listened to Nirvana. writes of his conversion to Islam and how of the tools that are being used by terrorist Omar converted to Islam and went to he “began reading more Salafi books and groups to recruit and radicalize Americans.

The Counter Terrorist ~ August/September 2014 23 Since the Syria conflict escalated in Today, the same questions Mike Spann 2011, over 75 Americans have traveled to asked 13 years ago might have been asked fight in Syria. Nicole Lynn Mansfield, a of this Florida native, or of the Virginia convert to Islam, from Flint, Michigan, Five who went to Pakistan for jihad, or was killed in Syria last year. Eric Harroun, the Lackawanna Six, or those who travel a former soldier from Phoenix, Arizona, to Yemen, Somalia, Syria, and Iraq to fought in Syria. On May 25, 2014, a wage jihad. video was posted by Jabhat al-Nusrait Who brought you here? How did you get that announced Abu Hurayra al Amriki here? Why are you here?”21 • had carried out a suicide bombing attack on Syrian forces in Idlib. The video ABOUT THE AUTHOR showed Abusalha loading a truck with Walter Purdy is the President of the explosives and driving off to conduct the Terrorism Research Center, Inc., a attack. Moner Mohammad Abusalha Virginia-based company that provides had taken the kunya Abu Hurayra and cutting-edge training and research now has the distinction of being the on terrorism, counterinsurgency, and first known American suicide bomber in homeland security issues. His book, Syria. He grew up in a gated community Blue Mako Five: Exploits in Counter in Vero Beach playing basketball. Terrorism will be published this fall.

24 The Counter Terrorist ~ August/September 2014 Circle 83 on Reader Service Card MULTIPLE-ASSAULT COUNTER TERRORISM ACTION CAPABILITY TM MACTAC The Newest, Most Dynamic Training Program from SSI ®.

MACTAC is the new tactical philosophy offering your department and agency training for an extremely flexible and scalable response to any Active Shooter situation while maintaining the ability to respond to additional attacks. Tiered for full-spectrum training of your department personnel to meet multiple challenges. • MACTAC Officers Course • MACTAC Leaders Course • MACTAC Instructors Course

Contact us today at: www.homelandsecurityssi.com Call now for more information. Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 228 on Reader Service Card

Circle 83 on Reader Service Card The Counter Terrorist ~ August/September 2014 25 ENDNOTES 7Transcript of Robert Young Pelton 15Abu Mansuur al-Amriiki, The Story 1Transcript of Robert Young Pelton Video Qala-i-Jangi Prison Uprising and of An American Jihaadi Part One, Video Qala-i-Jangi Prison Uprising and John Walker Lindh Interview. accessed at http://azelin.files.wordpress. 8 John Walker Lindh Interview Aukai “Aqil” Collins, Interview by com/2012/05/omar-hammami-abc5ab- 2Robert Young Pelton, Interview by Author, Phoenix, AZ, January 28-29, mane1b9a3c5abr-al-amrc4abkc4ab- Author, May 2006 2002. 22the-story-of-an-american- 3Terrorism Research Center Inc., TRC 9Aukai “Aqil” Collins, Interview by jihc481dc4ab-part-122.pdf 16 Report: The Path of John Walker Lindh Author, Washington, DC, January 9, Ibid, p. 18. 17 From California to Jihad, March 24, 2003. Ibid, p. 122. 10 18 2012 FBI Press Release, Minneapolis Man Unknown Person Tweeted from 4Timothy Roche, Brian Bennett, Anne Pleads Guilty to Terror Offense, July 18, Abum@abumamerican (September Berryman, Hilary Hylton, Siobhan 2011. 15, 2013) retrieved June 6, 2014 from 11 Morrissey and Amany Radwan, Time, Interview with Unnamed Law https://twitter.com/abuamerican. 19 The Making of John Walker Lindh, Enforcement Officer, Minneapolis, MN, Ibid, September 28 2013. 20 October 7, 2007 June 8, 2010. Johnston, David, Militants Drew 12 5U.S. Department of Justice TRC Study of Significant Worldwide Recruits in US, FBI Says, New York Indictment: United States v. John Phillip Suicide Bombings, p. 37, March 2013. Times, February 23, 2009. 13 21 Walker Lindh: February 5, 2002 Ibid. p.42. Transcript of Robert Young Pelton 14 6Robert Young Pelton, Interview by Elliott, Andrea, The Jihadist Next Video Qala-i-Jangi Prison Uprising and Author, May 2006. Door, New York Times, January 27, 2010 John Walker Lindh Interview

YOU CAN’T BE EVERYWHERE AT ONCE, WE CAN. RECONYX High Definition motion activated security cameras do not require separate lines for power or communication. Extremely easy to deploy and hide, (5.5” x 4.5”) our cameras provide near instant notification of an intrusion by transmitting images via the cellular network directly to your cell phone or computer.

General Surveillance and License Plate Capture models available.

PHONE 866-493-6064 | WWW.RECONYX.COM

26 The Counter Terrorist ~ August/September 2014 Circle 303 on Reader Service Card Tacprogear o ers a complete line of hard body armor products that meets or exceeds U.S. Military and National Institute of Justice (NIJ) performance standards.

CITADEL™ SERIES - Hard Armor

Tacprogear proudly o ers its own CITADEL™ line of hard armor plates as the strongest part of its personal protection systems. Available in a wide range of material constructions, weights, shapes, and performance levels, the CITADEL™ line of armor is that last line of defense against rie threats for the rst responder, tactical entry personnel, or any other law enforcement professional who is placed in harm’s way. Tacprogear is committed to providing “performance above all else®.”

FULL SIZE (FS) SAPI/ESAPI (SE) SHOOTER’S (SH)

Circle 101 on Reader Service Card The Counter Terrorist ~ August/September 2014 27 IRANIAN ECONOMIC WARFARE

President Barack Obama talks with President Hassan Rouhani of Iran during a phone call in the Oval Office, Sept. 27, 2013. Photo by: Pete Souza

28 The Counter Terrorist ~ August/September 2014 by Kevin D. Freeman

The United States has been in an economic war with the Islamic Republic of Iran in one form or another since the 1979 hostage crisis.1 This war intensified in 2007 when President George W. Bush ordered sanctions designed to force Iran to give up nuclear ambitions.2

he sanctions were increased succeeded in “bringing the entire sanctions, which the president signed multiple times under President world together over the last few years into law.3” TObama. According to The New American: with the most withering economic There should be little doubt as to “David Axelrod, senior advisor sanctions that have ever been whether the sanctions were serious or to the president, said on ABC’s administered against any country.” powerful. Yet, there should be substantial This Week on March 4th of this On August 1st, both the House doubt with regard to whether or not the year [2012] that the president had and Senate approved even more sanctions have been effective in terms

The Counter Terrorist ~ August/September 2014 29 Vice President George Bush and other VIP's wait to welcome the former hostages from Iran home. Photo by: Templeton

of achieving their primary objective. In fact, some observers believe that the Iranians matched the United States in the economic war, albeit at great cost. We threw everything at them, inflicting “a currency collapse, hyperinflation, and a bank run and… caused a scarcity of food, gasoline and consumer goods, through the expedient of cutting Iran out of the global payments system.”4 Despite this, we have seen no real evidence of slowdown in Iranian nuclear development and the government remains as defiant as ever. Even if the Obama administration Recently freed Americans held hostage by Iran disembark Freedom One, an Air Force VC-137 would like to credit the sanctions process Stratoliner aircraft, upon their arrival. Photo by: Don Koralewski for bringing Iran into negotiations,

30 The Counter Terrorist ~ August/September 2014 Secretary of Defense Leon Panetta tells the audience at the Saban Forum, held at the Willard Hotel in Washington, D. C. on Dec. 2, 2011, that the United States and its allies and partners in the international community must do everything possible to make sure Iran never obtains a nuclear weapon. Photo by: R. D. Ward/Released the truth may be much less flattering. ‘Total nonsense,’ scoffed former defiant,” and they always had ways of According to the Los Angeles Times: U.S. Ambassador William Miller getting around them. The deal that’s “Sanctions did not bring Iran to the when I put the question to him. being discussed now is almost exactly table. Not only Iranian officials but Miller has closely monitored Iranian the same one the Iranians offered other undeniably objective observers affairs since he was stationed in that back in 2003—full transparency concur that the reason negotiations have country in the 1960s, and has close on their nuclear program, but commenced is emphatically not because contacts with the current leadership. recognition of Iran’s right to enrich Iran could endure the pain no longer. “Sanctions only made them more uranium.5”

The Counter Terrorist ~ August/September 2014 31 Iran concluded negotiations about nuclear capabilities on November 2013. Photo by: U.S. Department of State from United States

Iranian Nuclear Negotiators. Photo by: Dragan Tatic

This is one of the great untold stories of economic might of the United States instruments of power that the current the past few years, at least untold in the and remained standing. The failure to administration is willing to deploy in an American media. Iran, with an economy provide a knockout punch, however, increasingly complex world.8 The United equal to a little over 3% of that of the risks damaging American credibility at States backed down on the sanctions and United States,6 and roughly the size of a crucial time when financial warfare accepted a 10-year-old Iranian proposal New Jersey7, went toe-to-toe against the and sanctions appear to be the only that had been repeatedly rejected by both

32 The Counter Terrorist ~ August/September 2014 Anti-aircraft guns guarding Natanz Nuclear Facility, Iran. Photo by: Hamed Saber

Presidents Bush and Obama. We loosened despite enormous disruption to the battlefield is financial or electronic.9” sanctions without getting anything new in Iranian economy. The U.S.-Iranian To be clear, there has been considerable return. Quoting James Rickards, author of financial war of 2012–13 illustrates collateral damage inflicted upon the “The Death of Money”: how nations that could not stand Iranian people, but not all of Iran has “Iran had fought the United States up to the United States militarily suffered. In fact, the leadership, especially to a standstill in its financial war, could prove a tough match when the the “supreme leader” Khamenei and his

The Counter Terrorist ~ August/September 2014 33 Vladimir Putin answered journalists’ questions on the situation in (2014-03-04). Photo by: The Presidential Press and Information Office

supporters, actually found ways to enrich Khamenei is about 40% greater than the dollar. By instituting new payment themselves and further consolidate power total annual oil exports from Iran. It also arrangements as well as utilizing during the sanctions.10 One Reuter’s is a powerful base of funds from which centuries-old mechanisms, Iran found estimate suggests that a single entity retaliatory economic warfare might be a way to buy and sell without access to controlled by Khamenei has a value launched. Some estimate this to be far American-controlled systems.14 They used approaching $100 billion.11 The wealth in excess of the wealth controlled by gold,15 barter,16 non-dollar currencies, is largely based on seized assets, some the Shah at his peak prior to the 1979 and hawala17 (an ancient Arabic method of which were achieved under the cover revolution that deposed him.13 of transferring funds) to circumvent of sanctions.12 The holdings are largely controls. According to Immigration and secret and subject almost exclusively HOW IRAN SURVIVED Customs Enforcement (as quoted in The to Khamenei’s control, thus wielding SANCTIONS Cornerstone Report): tremendous power and influence even in The simple answer to how Iran could “The hawala system can be a country potentially rocked by division. survive under sanctions is that they utilized by criminal organizations To understand the context, the roughly learned to operate without using the to transfer funds in or out of a $95 billion of wealth controlled by country with little or no detection

34 The Counter Terrorist ~ August/September 2014 by law enforcement. Hawalas allow British resentment of American sanctions the transfer of millions, if not can be summed up in the following email billions of dollars tracked only by comment quoted from : a secret code and disposable scraps “You fucking Americans. Who are of paper. Transfers of money take you to tell us that we’re not going to 23” place based on communications deal with Iranians. between members of a network of It’s one thing to quietly attempt to go hawaladars…18” around the sanctions. It’s quite another, Oil for gold also became commonplace however, to boldly reject them. Yet, that is in significant transactions with Turkey precisely what Vladimir Putin’s did and India, among others. The growth in a multi-billion dollar deal announced 24 in gold trade became so significant that in advance of the Winter Olympics. the United States attempted to enforce a This was perhaps foreshadowing of gold ban on Iran in July 2013.19 When how Putin would respond to American the gold trade tightened, Iran began complaints after seizing Crimea. processing sales in other non-dollar Even after the negotiated agreement currencies. Although less convenient than allowed increased Iranian oil shipments, the dollar-based system, it was ultimately the Islamic Republic has found creative 25 effective and exposed the reality that there ways to blow past the limits. There are other currencies in the world. In some seems to be little, if any interest in cases, it actually provided a convenience abiding by the watered-down agreements. to not have to convert currencies back to dollars for trade. IMPLICATIONS GOING The Iranians also worked through FORWARD Chinese and Russian banks that served One of the consequences has been the as fronts for them to the international exposure of American weakness. Once system. Iran had used Western banks Iran demonstrated that it could survive, for this purpose during the Bush despite serious hardship, without the administration, but the banks were dollar-based system, others took notice. caught and had to pay stiff penalties.20 Many accurately expected the sanctions Chinese banks supported some $40 approach to fail or at least fall far short billion in transactions, largely avoiding of its objectives. I made the following The problem is that the political pressure because of the observation in my blog on February 22, at the end of the day, political complications for the U.S. 2012: Russian, Turkish, and Indian banks also “The economic weapon the the world may prefer supported Iranian oil sales in spite of U.S. government is using against Iran to have their oil rather sanctions.21 is sadly exposing our greatest Even British banks had found it vulnerability. In essence, to than our paper. difficult to turn down the profits punish Iran for continued nuclear associated with helping Iran circumvent development, we have threatened American sanctions. Standard Chartered to deprive them of access to the was responsible for $250 billion in U.S. dollar. That is a serious threat transactions, and when caught paid over and has serious implications for $300 million in fines.22 Interestingly, the domestic Iranian economy. The

The Counter Terrorist ~ August/September 2014 35 problem is that at the end of the day, involvement of Russia, China, and the with SWIFT. Now imagine that a the world may prefer to have their oil BRICS nations to de-Americanize the combination of actions—triggered rather than our paper. Certainly that world and destroy the dollar.27 Putin has only by an attempt to circumvent is what the market is telling us as the long been close to Iran and sympathized some really very silly sanctions—can price of oil in dollars has been rising. with their position regarding dollar- suddenly unleash some unexpected Given the global situation, do based attacks.28 When the United possibilities that were beyond the we remain so arrogant as to believe States cut Iran off from dollar-based realm of imagination a mere few that the world prefers American transactions, the Russians helped build years ago. paper to oil from any source? At a alternative payment systems that in turn Imagine the emergence, say, of minimum, we know that the amount undermined the dollar. Then, when regional economic hubs, powered of American paper available (whether sanctions were placed against Russia, by the currencies of the local in the form of currency or Treasury Putin requested Iranian assistance in hegemonic powers, where bartering debt) has and continues to grow circumventing them.29 natural resources, goods and exponentially while the amount of The Islamic world was also watching services becomes as commonplace available oil reserves are reasonably closely as sanctions were imposed, with as transactions involving currency stagnant (at least by comparison). some expecting their failure to expose transfers. Because of the frailty Add to this the fact that oil has American weakness. Consider this from inherent in dealing with these new enormous use and the demand for February 2012, “How Iran Changed local currencies and a bartering it will grow markedly over the long the World” in al-Akhbar, a daily Arabic- system, nations tend to trade term. As for American paper? Nearly language newspaper: most with those closest to them in every major nation of the world “Imagine: Iran stops selling oil to geography and culture. Shocking? including our best trading partners the EU; China tells the US to take a Maybe not. Sometimes it just takes have begun to question (some hike on currency values; India starts a need for change... and a handy publicly, some privately) its long- trading in large quantities of rupees; tipping point. term usefulness.26” Russia’s central bank becomes a “This is not the time to fan the Frighteningly, I wasn’t alone in this depot for holding dollars that don’t flames,” someone should have observation. In fact, it almost seemed need to pass through New York; told the United States. “You and as if the defeat of sanctions was part of the creation of a global payment your pals are sitting in a jalopy a larger plan being instituted with the messaging system competing tottering on the cliff’s edge — why

36 The Counter Terrorist ~ August/September 2014 Circle 343 on Reader Service Card risk making moves now?” they economic war already underway. Iran has should have warned. “Be a little less borrowed from the Unrestricted Warfare arrogant”… playbook and created combination But Washington is absolutely, efforts built around a cyber strategy.31 irrevocably, dangerously fixated on The Iranians coordinated specific attacks showing Iran who’s boss, and spends directly targeting American banks as a good part of every day trying to retaliation for economic sanctions. tighten the screws around the Islamic Even the largest banks were found to Republic. For the most part, the US’s be vulnerable to disruption and the pursuit of this dubious objective tactics were beyond what had been has instead stripped it of the vital previously experienced.32 This shouldn’t political tools it once wielded. be a surprise. Iran has built a very No more UN Security Council sophisticated hacking network. According resolutions, no more unscrutinized to Foreign Policy: military adventures. The only thing “In March 2012, Ayatollah Ali left is the nefarious tentacles of Khameini, the Supreme Leader the United States Department of of Iran, publicly announced the Treasury and its financial weapons.30 creation [of] a new Supreme Council Unfortunately, the “Almighty of Cyberspace to oversee the defense Dollar” has been shown to be mortal of the Islamic republic’s computer after all. Sanctions were unable to networks and develop new ways of Anti-American mural in the Iranian capital achieve their objective and the world infiltrating or attacking the computer Tehran. Photo by: Ali Abbas has seen it. With the Russian conflict networks of its enemies. Less than over the Ukraine, the issue has two years later, security experts become increasingly serious.” and U.S. intelligence, officials are alarmed by how quickly Iran has CYBER BATTLES managed to develop its cyber warfare Of course, sanctions, oil sales, and capabilities—and by how much it’s currency battles are just part of the willing to use them.33”

Department iOp FirEarMS price price

Sig 516 Patrol $1135.00 $1344.00 Sig M400 Enhanced $814.00 $964.00 Sig P226/P229 (.9mm/.40) $591.00 $740.00 Sig P238 (.380) $418.00 $495.00

Department price 1,000 Rounds

To order contact: Gander Mtn. Law Enforcement Sales at: 877-482-3982, 651-325-4911 or [email protected]

Offer is valid for qualified Law Enforcement Depts & Officers only. This offer is not available in stores. Contact Gander Mountain LE Sales for full list of firearms offered under this program.

Circle 28 on Reader Service Card The Counter Terrorist ~ August/September 2014 37 The Iranians have become a “first- a slight detour in direction, not a 4Wiggin, Addison. “How Gold Helped tier cyber power.”34 They have launched pathway to ending conflict. We cannot Iran Withstand U.S. Financial Fury.” sophisticated attacks against military be complacent. The government of Iran Forbes. N.p., 23 May 2014. Web. June websites. It took four months and $10 was not beaten by sanctions and remains 2014. . networks and control systems with the to prepare for war.39 By May, despite the 5Cockburn, Andrew. “Why sanctions potential to damage or sabotage pipelines, promise of eased tensions, Khamenei was don’t really work.” Los Angeles Times. energy distribution, and the electric calling for renewed jihad “until America N.p., 19 Mar. 2014. Web. June 2014. grid.36 A disruption in any of these areas was no more.”40 We face a number of . Iranian cyber efforts have also targeted most serious. • 6“Iran.” The World Bank. N.p., n.d. Web. U.S. officials to seek intelligence, June 2014. . vulnerabilities. This is an extraordinarily Mr. Freeman (CFA) is the author of 7“Current-Dollar GDP by State, 2009- broad effort: utilizing Facebook, fake Secret Weapon: How Economic Terrorism 2012.” US Bureau of Economic Analysis. emails, password theft, and other Brought Down the U.S. Stock Market N.p., 6 June 2013. Web. June 2014. clandestine tactics to augment more (www.secretweapon.org) and Game . Iran has developed a cyber army Yourself From Economic Attack (Regnery, 8Griffin, Christopher. “The War of intended to win 21st Century wars. It is 2014). He authors the blog: www. Wills Between U.S. and Iran.” Real Clear also responding to the cyber capabilities globaleconomicwarfare.com. World. N.p., 8 Feb. 2014. Web. June reportedly demonstrated by the United 2014. . 38 9 the so-called Stuxnet virus attack. Policy Forum. GPF, n.d. Web. June 2014. Wiggin, Addison. “How Gold Helped The Iranians adapted to alleged U.S. . 2014. . 10 that it is preparing for a multi-phased war Iran.” Reuters. N.p., 18 Dec. 2012. Web. “To expand Khamenei’s grip on the with the United States using physical, June 2014. . June 2014. . 11 to conclude that the war is underway in Economic War on Iran.” The New Stecklow, Steve, Babak the economic and cyber realms as well. American. N.p., 13 Nov. 2012. Web. June Dehghanpisheh, and Yeganeh Torbati. The American reduction of sanctions in 2014. . Investigates. Reuters, 12 Nov. 2013. Web.

38 The Counter Terrorist ~ August/September 2014 June 2014. . sites/greatspeculations/2014/05/23/how- nytimes.com/2009/01/10/business/ 12Stecklow, Steve, Babak gold-helped-iran-withstand-u-s-financial- worldbusiness/10bank.html?_r=0 >. Dehghanpisheh, and Yeganeh Torbati. fury/>. 21Wouk, Joseph. “Iran’s $40 billion “Khamenei controls massive financial 20Bajaj, Vikas, and John Eligon. Transfers to Chinese Banks Sidestep empire built on property seizures.” Reuters “Iran Moved Billions via U.S. Banks.” Financial Isolation.” A Sclerotic Goes to Investigates. Reuters, 11 Nov. 2013. Web. The New York Times. N.p., 9 Jan. War. Wordpress, 23 Mar. 2012. Web. June June 2014. . 13 IBID 14“Iranian banks bypass electronic money payment systems.” Gulf News. Al Nisr, 10 Feb. 2013. Web. 9 June 2014. . 15Wiggin, Addison. “How Gold Helped Iran Withstand U.S. Financial Fury.” Forbes. N.p., 23 May 2014. Web. June 2014. . 16Saul, Jonathan, and Parisa Hafezi. “Exclusive: Iran, Russia negotiating big oil-for-goods deal.” Reuters. N.p., 10 Jan. 2014. Web. June 2014. . 17The Editors. “Global Insider: Iran’s Informal Financial Sector Has Boomed Under Sanctions.” World Politics Review. N.p., 31 Jan. 2013. Web. June 2014. . 18“Hawalas.” The Cornerstone Report. N.p., n.d. Web. June 2014. . 19Wiggin, Addison. “How Gold Helped Iran Withstand U.S. Financial Fury.” Forbes. N.p., 23 May 2014. Web.

Circle 213 on Reader Service Card The Counter Terrorist ~ August/September 2014 39 2014. . sh) >. com/2012/03/23/irans-40-billion- 29Kredo, Adam. “Russia Asks Iran: Help 31Wiggin, Addison. “How Gold Helped transfers-to-chinese-banks-sidestep- Us Skirt U.S. Sanctions.” The Washington Iran Withstand U.S. Financial Fury.” financial-isolation/ >. Free Beacon. N.p., 8 May 2014. Web. June Forbes. N.p., 23 May 2014. Web. June 22Rappaport, Liz. “Bank Settles Iran 2014. . helped-iran-withstand-u-s-financial- . 00008723963904443181045775893804 Culture & Society Economy Opinion 32Perlroth, Nicole, and Quentin Hardy. 27559426>. Portraits In Focus Blogs GI Files “Bank Hacking Was the Work of Iranians, 23Salmon, Felix. “Counterparties: Syria Files Arabic Edition Follow Al- Officials Say.” The New York Times. N.p., 8 “You f—ing Americans. Who are you Akhbar on Twitter Like Al-Akhbar on Jan. 2013. Web. June 2014. . reuters.com/felix-salmon/2012/08/06/ 2014. < http://english.al-akhbar.com/ 33Harris, Shane. “Forget China: Iran’s counterparties-you-fucking-americans- blogs/sandbox/how-iran-changed- Hackers Are America’s Newest Cyber who-are-you-to-tell-us-that- world?utm_source=feedburner&utm_ Threat.”Foreign Policy. N.p., 18 Feb. we%E2%80%99re-not-going-to-deal- medium=feed&utm_campaign=Feed%3 2014. Web. June 2014. . A+AlAkhbarEnglish+(Al+Akhbar+Engli foreignpolicy.com/posts/2014/02/18/ 24Saul, Jonathan, and Parisa Hafezi. “Exclusive: Iran, Russia negotiating big oil-for-goods deal.” Reuters. N.p., 10 Jan. 2014. Web. June 2014. < http://www. reuters.com/article/2014/01/10/us-iran- russia-oil-idUSBREA090DK20140110 >. SPOT THEM FIRST 25 Caruso-Cabrera, Michelle. “Iranian Dual Illumination Capability oil exports on course to blow past Visible LED White Light limits.” CNBC. N.p., 3 June 2014. Web. 225,000cd June 2014. . 26Freeman, Kevin D. “Our Paper or 24 Volt DC Their Oil?” Global Economic Warfare. 360° Continuous Horizontal N.p., 22 Feb. 2012. Web. June 2014. 180° Vertical Tilt < http://globaleconomicwarfare. Auto Engage Speed Control com/2012/02/our-paper-or-their-oil/ >. 27The Counter Terrorist—June/July Hard Wired Dash Control 2013 Programmable Home Button Weather-Tight Enclosure Cover: Russia, China and The New Model #4600 Global Democratic Peace Carbon Fiber Body 28CNN Wire Staff. “Russia slams new Separate Stainless Steel Mounting Plate sanctions against Iran.” CNN World. N.p., 22 Nov. 2011. Web. June 2014.

40 The Counter Terrorist ~ August/September 2014 Circle 285 on Reader Service Card New and improved

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 or email [email protected] Or visit our website: www.SSIPVB.com 308 Circle on ReaderCircle Service 317 on Card Reader Service Card Circle 226 on Reader Service Card The Counter Terrorist ~ August/September 2014 41 forget_china_iran_s_hackers_are_ america_s_newest_cyber_threat >. 34IBID 35Neal, Ryan W. “US Navy Needed Four Months And $10 Million To Clear Iranian Hackers From Marine Corps Network.” International Business Times. N.p., 18 Feb. 2014. Web. June 2014. < http://www. ibtimes.com/us-navy-needed-four-months- 10-million-clear-iranian-hackers-marine- corps-network-1556377 >. 36Neal, Ryan W. “US Navy Needed Four Months And $10 Million To Clear Iranian Hackers From Marine Corps Network.” International Business Times. N.p., 18 Feb. 2014. Web. June 2014. . 37Gorman, Siobhan. “Iran-Based Cyberspies Targeting U.S. Officials, Report Alleges.” The Wall Street Journal. 131 Circle on Reader Service Card N.p., 29 May 2014. Web. June 2014.

cyberspies-targeting-u-s-officials-report- alleges-1401335072 >. Rdt 38Sanger, David E. “Obama Order Sped Up Wave of Cyberattacks Against Iran.”

NEW FOR - The New York Times. N.p., 1 June 2012. 1 2014 tool delivery Robot Web. 9 June 2014. . 39Haaretz. “Prepare for cyber war, Iran’s supreme leader tells students.” Haaretz. N.p., 13 Feb. 2014. Web. June 2014. . 40Kahlili, Reza. “Iran’s Supreme Leader: Jihad Will Continue Until America is No More.” The Daily Caller. N.p., 25 May 2014. Web. June 2014.

more/ >. www.jntactical.com

42 The Counter Terrorist ~ August/September 2014 Circle 155 on Reader Service Card Circle 301 on Reader Service Card Circle 301 on Reader Service Card The Counter Terrorist ~ August/September 2014 43 BOOK REVIEW Comrade J

By Pete Earley Reviewed by: Chris Graham

olonel Sergei Tretyakov— of the Canadian “Comrade J”—is the highest- Parliament. Cranking Russian SVR officer to defect to LAZAR’s expertise the United States. He collaborated with was in international writer Pete Earley to share his insights in environmental Comrade J: The Untold Secrets of Russia’s law, and the Master Spy in America After the End of KGB used him the Cold War (Berkley, 2009). Tretyakov’s whenever it could account of life behind the Iron Curtain to cause headaches and life under Vladimir Putin reveals for the U.S. The the amount of institutional deception Center in Moscow that is necessary to bring an oppressive provided LAZAR government to power and the scope of with scientific domestic spying and manipulation that information that is necessary to retain that power. was specifically The author opens quoting Colonel written to disrupt Tretyakov, “I want to warn Americans. relations between As a people, you are very naïve about Canada and Russia and its intentions. You believe the U.S. over because the no longer environmental exists, Russia now is your friend. It isn’t, issues. LAZAR and I can show you how the SVR is would deliver these trying to destroy the U.S. even today anti-U.S. reports and even more than the KGB did during to his political the Cold War.” He goes on to warn connections in Americans how Soviet socialists achieved the Canadian their aims by quoting Stalin: “the parliament. They people who cast the votes don’t decide in turn would an election, the people who count the cite these reports, votes do.” drafting legislation on environmental done, it is the way products are sold.” Tretyakov recounts a KGB operation concerns. LAZAR never believed he was Tretyakov relayed to the author that that he believes is representative of committing treason… he thought he “Gorbachev and Yeltsin did not fire the Russian schemes to manipulate world was protecting the… environment.” The generals who ran the [KGB] Center. opinion. “[LAZAR] was a coworker of author quotes writer Michael Creighton Nor did they put an outsider in charge Arthur’s at the Canadian arms control describing another Russian enviro-scam of foreign intelligence and order him disarmament center in Ottawa. He as a “well orchestrated media campaign.” to clean house. Instead, Gorbachev had a close relationship with members And adds, “This is not the way science is promoted a former KGB lieutenant

44 The Counter Terrorist ~ August/September 2014 general to take charge of the SVR.” “we ignored this rule because we had so It was the United States, followed by In the days following the collapse many sources at the U.N.” NATO… What is the official guideline of the Soviet Union, Russia agreed The colonel explains, “We looked for for the SVR today? The terms have to stop engaging in active measures diplomats who disliked the U.S. even changed. It is now called the Main (disinformation campaigns). Tretyakov though they were from countries that Target. But it is exactly the same, the reports, “we said, ‘okay, now we are were considered by America to be a United States followed by NATO.” He friends. We will stop doing this’ and the friend… I was always amazed at how identifies the targets he was instructed SVR shutdown Directorate A (A stood cheaply we could get U.N. diplomats to penetrate in New York: “military for active measures), but Directive A to work for us…We would buy jewelry and government, New York financial basically underwent a name change. at Walmart and they would gobble it institutions including the New York That’s all. It became department MS up as if it were some precious treasure Stock Exchange… New York University (measures of support) and the very same when they were actually betraying their [and] Columbia University.” people who had run it under the KGB countries… for a few hundred dollars Little consideration is given to the were still doing it for the SVR.” worth of gold trinkets.” enduring wounds inflicted by the The author explains how Saddam Tretyakov tells us, “from my parents KGB’s subversive activities. Even less Hussein and the SVR exploited I had learned neither communism nor consideration is given to the current corruption in the U.N. to beat an oil socialism worked in Soviet society… efforts of Vladimir Putin’s SVR. embargo and specifies, “[U.N. Secretary As new citizens we found ourselves… How many subversive seeds sown by General Kofi] Annan’s son, Kojo Annan, offended when we see how natural born yesterday’s communists are employed had earned as much as $485,000 in Americans take liberties for granted. as weapons by today’s radicals? Read ‘consulting fees’ related to Iraqi oil Sometimes I believe only someone Comrade J and decide for yourself. • transactions.” Tratyakov continues, who’s lived in a corrupt society can truly “Politicians from nearly every country understand the importance of America’s ABOUT THE AUTHOR at the U.N.—except the U.S.—received liberties.” Mr. Graham is the former commander money from Saddam’s scam. Many of Colonel Tretyakov warns, “During of a military anti-terrorism unit, the them were U.N. diplomats.” the Cold War in the Soviet military creator of 30-10 training (www.30- Tretyakov relates, “officers brazenly doctrine there was the definition of 10pistol.com) and he is the editor of The met their sources inside the U.N.’s main the Main Enemy, which was also used Counter Terrorist magazine. building.” This was against rules, but by intelligence as a basic principal.

Circle 309 on Reader Service Card The Counter Terrorist ~ August/September 2014 45 TULAREMIA AS A WEAPON Tularemia is a bacteria-based disease that is highly contagious and potentially fatal. It spreads to humans through insect bites, skin contact with infected animals, ingesting contaminated water or food, or inhaling contaminated dusts or aerosols.

Photo by: James R. Evans 46 The Counter Terrorist ~ August/September 2014 By Jeffrey D. Shuman

abbits, hares, squirrels, mice, and to observe a mass jackrabbit die-off, The type of infection depends on other rodents are especially and suspected tularemia. This person where the bacteria enters the body. Rsusceptible and die in large numbers contacted airport and city officials, who Most common routes are through the during outbreaks.¹ Birds, reptiles and fish quickly enacted quarantine protocols and skin or mucous membranes, but the may also be carriers.2 The disease is often appear to have successfully stemmed the bacteria may also be inhaled or eaten. called “rabbit fever” due to its virulence spread of the disease to other rodents or Ulceroglandular tularemia is the most among rabbits. The disease is endemic humans.4 common. Symptoms include skin throughout North America, continental ulcers at the site of infection, swollen Europe, Russia, China, and Japan. It EFFECTS ON HUMANS and painful lymph glands, chills, is rare in the United Kingdom, Africa, There are six types of tularemia. headache, and exhaustion. Glandular 3 and Central and South America. The Each has specific symptoms and all are tularemia exhibits the same symptoms Amarillo, Texas International Airport accompanied by fever. Symptoms are as ulceroglandular but without the skin experienced a tularemia outbreak in displayed within ten days of infection. ulcers. Oculoglandular tularemia affects 2006. An entomologist was the first the eyes and causes eye pain, redness, eye

Photo by: James R. Evans The Counter Terrorist ~ August/September 2014 47 A culture of Francisella tularensis. Photo by: MarcoTolo

swelling and discharge, and an ulcer on the inside of the eyelid. Oropharyngeal tularemia is usually caused by eating infected game that is improperly cooked, or by drinking contaminated water. Symptoms include sore throat, mouth ulcers, tonsillitis, swollen lymph glands in the neck, vomiting, and diarrhea. Pneumonic tularemia is more common in elderly people. It displays symptoms of pneumonia, and may be contracted in conjunction with the other forms of The image, taken with a fluorescent microscope, shows mouse macrophages 12 hours after tularemia. Typhoidal tularemia is rare and infection with a virulent strain of Francisella tularensis. The cells on the left are untreated, more serious than the others. Symptoms while the cells on the right were treated 3 days in advance with CLDC+MPF. The include high fever, extreme exhaustion, untreated cells fail to control replication of F. tularensis. In contrast, cells activated with the vomiting and diarrhea, enlarged spleen, CLDC+MPF therapeutic have nearly eliminated all of the bacteria. enlarged liver, and pneumonia. Of all Photo by: National Institutes of Health (NIH) the types listed, typhoidal tularemia

48 The Counter Terrorist ~ August/September 2014 YOU ARE DRIVEN TO LEAD WE ARE DRIVEN TO HELP YOU GET THERE. At American Military University, we understand where you’ve been, what you’ve done and what you’d like your team to achieve. Choose from more than 90 career-relevant online degrees — respected by the intelligence community — which can help your squad advance their careers while serving their country. Your team will join 100,000 professionals gaining relevant skills that can be put into practice the same day. Take the next step, and learn from the leader.

To learn more visit, www.AMUonline.com/Counter-Terrorist

Circle 211 on Reader Service Card The Counter Terrorist ~ August/September 2014 49 Counter_Terrorist 1013.indd 1 10/21/13 9:52 AM A Tularemia lesion on the dorsal skin of the right hand. Photo by: CDC Public Health Image Library in an inhaled form would be the most century in the United States, Europe, of a form of tularemia. There is some dangerous and successful if weaponized. the former Soviet Union countries, and speculation about a tularemia outbreak This is due to the seriousness of its Japan. Outbreaks may have occurred along the German-Russian front in symptoms when compared to the other as early as the nineteenth century, but 1942. Soldiers on both sides reportedly forms.1, 3 Tularemia is rare and shares were likely improperly identified as contracted the disease. Some believe the symptoms common with other diseases. isolated cases and not associated with Russian forces released the bacteria as This makes proper identification difficult. a larger infectious process. In the early a form of defense to stem the German Doctors may check for the bacteria in part of the twentieth century, a Japanese attack. Russian soldiers may have been blood or sputum. Chest x-rays may physician noted a comparison between sickened because this weapon does not show signs of pneumonia. All forms the number of dead rabbits and the discriminate. Others dispute this and of the disease may be successfully number of people becoming sick who claim the outbreak may have been due treated if diagnosed early and treated had somehow handled or been exposed to a breakdown in health and hygiene with antibiotics. There are no known to these rabbits.3 Around the same and an increase in contact with disease- vaccines for tularemia, but the symptoms time in the United States, physicians bearing rodents.3 may be treated with streptomycin or in California investigated dead rats and One of the largest outbreaks of doxycycline.2 squirrels in an attempt to tie them to tularemia occurred in Sweden between an outbreak of plague in San Francisco. 1966 and 1967.3 The outbreak coincided PAST OUTBREAKS These doctors noted lesions in infected with a large increase, then sudden drop, Several tularemia outbreaks have samples that were different from plague in the number of voles in that country. been recorded throughout the twentieth samples, and this led to their discovery Sweden reported 2,739 cases of tularemia

50 The Counter Terrorist ~ August/September 2014 that year which is nearly half of the total successful. The sound of the detonation number of cases the country reported would alert people that something had between 1931 and 1993.3 The United happened. Investigators could discover States has reported between 200-300 the biological agent and enact procedures cases of tularemia each year with the most to limit contamination. occurring in Arkansas, Illinois, Missouri, Employing any biological agent as a Oklahoma, Virginia, and Tennessee. The weapon requires patience. A biological disease has been reported in all states release would not garner the immediate except Hawaii.3 headlines associated with an Improvised While there is no known immunization Explosive Device (IED) detonated for tularemia, the spread of the disease in a populated area. However, the appears to be halted by minimizing eventual confusion and fear following contact with infected animals, following a successful bioterrorist attack could good hygiene standards, and treating be unimaginable. Sickened people, people who have the sickness. Victims of depending on where the agent was the disease go through a clinical program introduced, could easily number into to treat the symptoms.3 This has proven the thousands. Victims could overwhelm Bacillus anthracis Bioterrorism Incident, successful in past cases and outbreaks. hospitals and emergency rooms. Local, Kameido, Tokyo, 1993, Fluid collected from Not treating the symptoms has the state, and federal government offices the Kameido site cultured on Petri dishes to potential to allow the disease to progress would be inundated with calls for action. identify potential Bacillus anthracis isolates. to respiratory failure, shock, and possibly Bioterrorists realize this potential and Photo by: Centers for Disease Control death.3 In 2000, the Working Group on may attempt to covertly release their Civilian Biodefense noted a mortality rate agent on unsuspecting communities. An for pneumonic tularemia, if untreated, attack would likely occur at night and as high as 60%.3 In 1970, a World Health Organization committee asserted that roughly 100 pounds of tularemia dispersed as an aerosol over a population of 5 million could result in an estimated 250,000 casualties, including nearly 19,000 deaths.3, 5

WEAPONIZATION Biological agents are difficult to successfully weaponize. They are living organisms that die if not maintained within the limits of their required environment. Weaponization conjures images of vials filled with bio-agents either inside a bomb or secured around an explosive. In this case, the biological agent is released upon detonation. That is a possible form of dissemination. However, the heat from the explosion would likely kill a large amount of the agent and render the attack less Kasumigaseki Station, one of the many stations affected during the attack. Photo by: WikimediaCommons

The Counter Terrorist ~ August/September 2014 51 A template for a bioterrorist attack would be the Aum Shinrikyo sarin gas attack on the Tokyo subway in 1995. The Aum Shinrikyo cult placed plastic bags filled with home-made sarin gas on five subway cars during Tokyo’s early morning rush hour. The gas dispersed throughout the subway cars and Kasumigaseki station. Twelve people died and an estimated 5,000 were injured.6 A biological agent could be released in a similar fashion. Innocent people would be sickened and a percentage will likely die. The ideal biological weapon would be effective in small doses, have a short incubation period, withstand the stresses of dissemination, and be minimally contagious to the person, or persons, employing it.

IMPACT OF A BIOTERRORIST ATTACK One of the greatest unknowns regarding a bioterrorist attack is how far the disease could spread before being A chest X-ray showing increased opacity in both lungs, indicative of pneumonia, in a patient discovered. As discussed above, releasing with SARS. Photo by: PerPlex a biological agent would most likely take place quietly and in a non-descript manner. People would not know they employ a quiet dispersal device such were exposed until after symptoms as a fan or sprayer. Alternately, the appeared. Victims would eventually be bioterrorist may simply open or secrete identified through hospitalization, from As the disease spreads a container downwind from the target family members reporting sicknesses and knowledge of the or near a public area such as an office or deaths, or from people not showing building, courtyard, stadium or mass up to work. Hospital emergency rooms attack grows, so too transit station. A night attack would would be the first to notice an increase would fear spread. minimize the sun’s adverse affects on in people seeking treatment for related the agent. The incubation period takes ailments. Eventually medical professionals time and this could allow a bioterrorist and other specialists would put the dots to escape the area. The bioterrorist together and realize that a biological risks the threat of self-contamination, agent has been released. They may even but if they understand the disease and be able to pinpoint the date, time, and the nature of their attack, then they location of the release. This would help may take the necessary precautions to with clean-up efforts but little else. protect themselves. Stopping the spread would require

52 The Counter Terrorist ~ August/September 2014 Entrance to the headquarters of the Centers for Disease Control and Prevention. Photo by: Daniel Mayer

knowing how far the disease travelled. throughout the world in a very short time. into the billions of dollars based on lost A disease such as typhoidal tularemia As the disease spreads and knowledge productivity, insurance claims, the money in its inhaled form could spread like of the attack grows, so too would fear expended by governments for emergency wildfire. The 2002 spread of Severe spread. People would avoid public response, and countless man-hours for Acute Respiratory Syndrome (SARS) is places including mass transit, shopping police and other investigators, hospital a good comparison for how tularemia centers, and parks. People would stay staffs, clean-up crews, etc. Finally, the may spread. The SARS disease was first away from work for fear of coming into fallout from dealing with diseased persons discovered in China in late 2002 and contact with an infected person. The could be unconscionable. Mandatory spread to over two dozen countries area around the initial exposure may treatments might be enforced as well as before being contained in mid 2003.7 completely shut down. If this area was the quarantine of entire neighborhoods. The disease first crossed into countries a city government or federal building The legal issues of these procedures are nearest to China, such as Vietnam and then that function could, conceivably, almost limitless.8 Hong Kong, and then travelled to the be shut down until disinfected. Tourism Philippines, Europe, and North America. would end either by mandatory notices CONCLUSION It is probable that the disease travelled to from governments or voluntary bans on The Center for Disease Control and these cities via airports. If tularemia was travel from tourists. Businesses would Prevention has identified tularemia dispersed in a city with an international suffer as goods and services into and as a Category A Bioterrorism Agent. airport or an international population, out of the affected area would grind to a Category A agents are easily transmitted such as New York City, then it would halt. Least known would be the cost of from person to person, result in a high be possible for the disease to travel clean-up after an attack. This could range mortality rate, have the potential for

The Counter Terrorist ~ August/September 2014 53 outbreak at a metropolitan airport, Texas. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 7(3). Retrieved from Academic OneFile database. 5World Health Organization. (1970). Health aspects of chemical and biological weapons. Geneva, Switzerland: World Health Organization; 1970:105-107 6Seto, Y. (2001). The sarin gas attack in Japan and the related forensic investigation. Retrieved from http:// www.opcw.org/news/article/the-sarin-gas- attack-in-japan-and-the-related-forensic- investigation/ 7Hunter, N.D. (2009). The Law of Emergencies Public Health and Disaster The Aeromedical Isolation Team of the US Army Medical Research Institute of Infectious Management, Butterworth-Heinemann. Diseases at Fort Detrick, Maryland. Photo by: US Government 8Tognotti, E. (2013). Lessons from the history of quarantine, from plague to influenza A. Emerging Infectious a major public health impact, may ABOUT THE AUTHOR Diseases, 19(2). Retrieved from Academic cause panic and social disruption, Mr. Shuman is a former U.S. Air OneFile database. and require special action for public Force Explosive Ordnance Disposal 1 health preparedness. The United States technician and master sergeant. He has historically done well fighting works as a government consultant in the conventional adversaries. This was Washington D.C. area. evidenced by the success of the first Gulf War and the quick defeat of the ENDNOTES Iraqi Army in 2003. However, the 1Center for Disease Control and october 6-9, 2014 | Washington Dc government is still coming to grips with Prevention (CDC). (2014). Tularemia. Unrestricted Warfare and unconventional register for your Retrieved from http://www.cdc.gov/ adversaries. A biological attack, while free expo pass tularemia not immediately gratifying for a terrorist, 2 Mayo Clinic. (2014). Diseases and Now in its 4th year, Homeland Security Week 2014 does have the potential to produce conditions tularemia. Retrieved from will bring together high profi le speakers from the massive casualties, chaos, and fear. These Department of Homeland Security including CBP, http://www.mayoclinic.com/health/ TSA, ICE, USCG, FEMA and more to discuss the asymmetric warriors may be the most tularemia/DS00714 most pressing issues facing the homeland security likely to employ biological agents or community including: 3Texas Department of State Health other Weapons of Mass Destruction • Preventing Terrorism and Enhancing Services. (2010). History of tularemia Security (WMD) against the United States or – tularemia through the ages. Retrieved • Border Management & Immigration other free societies. A biological agent • Cybersecurity from https://www.dshs.state.tx.us/ release would be difficult to determine • Disaster Relief and Emergency preparedness/bt_public_history_ Preparedness until after the damage has been done. tularemia.shtm • Science & Technology Deterring potential adversaries and being 4Alexander, J. L., Bell, T. E., Duke, Over the course of 4 days, attendees will have prepared to react to a release may be the exclusive entry to over 40 high level presentations on D., Thomas, S. G., Rush, P. Jr., & most successful approach to dealing with Homeland Security, access to 60+ exhibitors, products Richardson, J. M. (2009). Tularemia demonstrations, and networking opportunities with a bioterrorist attack. • over 700 attendees.

www.HomelandSecurityExpo.com

54 The Counter Terrorist ~ August/September 2014 Circle 113 on Reader Service Card Best Location in Orlando – The Florida Journal for Law Enforcement, Intelligence Hotel and The & Special Operations Professionals Conference Center What a fantastic hotel. Rooms were nicely appointed, the staff Counter was courteous, and the business center was by far the best I’ve seen. And if you love to shop, you can’t beat having the mall presents: attached to the hotel. –Top rated by TripAdvisor 9th Annual HOMELAND SECURITY PROFESSIONALS CONFERENCE AND EXPOSITION November 4-6, 2014 • Orlando, Florida We sold out in 2013. Get your registration in as soon as possible: • Best speakers in Homeland Security • Premiere opportunity to network with your peers in US Homeland Security and across the Globe • Attended by more than 100 Federal, State and Local agencies • Selected Vendor expo of the latest in HS Technologies

PROGRAM FOR THE 2014 CONFERENCE “TOOLS TO MITIGATE ACTS OF TERRORISM AND VIOLENT CRIME” • Next Generation in Behavior Analysis • Terrorism Funding – The many different scenarios • Personal and Professional Resilience: Are you Ready • Active shooters – profiling mass killers • Survival against a Suicide Bomber • Human Trafficking the Terror Nexus • Medical Response to a Terrorist incident • Future Threats to Homeland Security • Transit System employees – Training to prevent an incident And many more…

REGISTRATION COST $399.00 (valid until July 30th, 2014) *Government and group rates available. Call us for details.

LEARN MORE at: www.thecounterterroristmag.com/conference Call now for more information. Phone: 866-573-3999 180 Fax: 866-573-2090 Circle on Reader Service [email protected] Circle 177 on Reader Service Card The Counter Terrorist ~ August/September 2014 55 UMAROV’S LEGACY AND THE FUTURE OF THE IMIRAT KAVKAZ

Photo by: Angelliuel7 56 The Counter Terrorist ~ August/September 2014 By Michael S. Toney

In a mixture of Arabic and heavily accented Russian, Dokku Umarov’s successor, Aliashab Alibulatovich Kebekov, also known as Sheikh Ali Abu Mukhammad ad-Dagestani, announced that he was the new emir of the Imirat Kavkaz (IK).1

marov, often referred to as March 2014.4 He had been reportedly Russia’s bin Laden, was killed eight times before, forced to retire Udeclared dead at age 49 on March 19, by senior Chechen commanders, and 2014.2, 3 Various sources reported that he then been reinstated as emir by an IK had been seriously wounded in a battle shariah court; however, this time he against Russian forces, succumbing to his would not be returning from the dead. injuries sometime between January and Umarov’s death was confirmed by

The Counter Terrorist ~ August/September 2014 57 Vladimir Putin chaired a meeting on the “environmental” aspects of the 2014 Winter Olympic Games in Sochi. Photo by: premier.gov.ru

an IK media release and other terrorist 2010, Russian authorities believe that organizations from Turkey to Syria. It Umarov was behind other high casualty was also confirmed by Russian President attacks such as the Moscow theater siege Vladimir Putin and Russia’s Federal in 2002, which resulted in the deaths of Security Service (FSB).5 Umarov’s 129 people.7, 8 death was a major accomplishment for In the months leading up to the 2014 Putin, ending a decades-long manhunt Olympic Games in Sochi, Umarov for Russia’s most wanted terrorist, an intensified his threats, resulting in He attempted to event similar in importance to the significantly increased security actions killing of Osama bin Laden for the U.S. by the Russian government. Umarov enrage his followers government. Russian authorities have had encouraged his followers to use “any with messages such as accused Umarov of ordering Chechen methods that Allah allows” to stop the “they plan to hold the rebels to carry out some 2,400 insurgency Olympic Games, including biological operations, including 54 suicide attacks, weapons.9, 10 He attempted to enrage Olympics on the bones resulting in as many as 9,000 casualties.6 his followers with messages such as of our ancestors.” In addition to the more recent bombing “they plan to hold the Olympics on the of the Domodedovo airport in January bones of our ancestors.” To his dismay, 2011, and two metro stations using his demands went unanswered and led female suicide bombers in September to nothing more than threats, fear and

58 The Counter Terrorist ~ August/September 2014 the arrest of his followers. The Olympic Games concluded successfully and his aspirations for violence had been a humiliating failure. Omar al-Shishani, a Chechen commander in the Islamic State of Iraq and the Levant (ISIL), and Abdullah Mansour, the leader of the Turkistan Islamic Party (TIP), announced condolences and gave eulogies to Umarov.11, 12 According to the Kavkaz Center, processions were held in several cities in Turkey, which were reportedly attended by thousands of Turkish Muslims.4 Mukhtar Abu al-Zubeir, the leader of al Qaeda’s branch in Syria, the Domodedovo Airport, lobby and check-in desks. Photo by: A.Savin Shabaab al-Mujahideen Movement, offered his condolences as well.13

UMAROV’S RISE TO POWER Umarov, also known as Dokku Umarov, was born April 13, 1964, in the village of Kharsenoi in the Shatoysky District of Southern Chechnya.14 Umarov’s first run-in with the government was in 1980 with a conviction for reckless homicide. Following this incident, in 1992, he was wanted for murder and later for kidnapping. His military career began before 1994 when he served in the special forces under Ruslan Gelayev, a prominent commander in the Chechen separatist movement against Russia.15 In 1997, Umarov held the position of Secretary “Dozens killed in Domodedovo airport blast”. Law enforcement officers guard the entrance to Domodedovo airport as part of increased security measures following the deadly blast. of the Security Council of the self- Photo by: Andrey Stenin proclaimed Republic of Ichkeria.16 Chechnya is recognized as a Republic, or subject of Russia, split into two Russia following the second Chechen territory, but as a terrorist organization by parts, the Republic of Ingushetia and War. 17 Chechen extremists continue to Russian authorities. the Chechen Republic, also referred to battle Russian forces with the goal of Umarov’s rise through the ranks as the Chechen Republic of Ichkeria. establishing an independent Islamic accelerated after Russian forces killed In the first Chechen War with Russia, state. Umarov’s IK is supposed to be the his predecessors, Aslan Maskhadov, in Ichkeria established independence, but manifestation of an independent Islamic 2005, and then Khalim Saydullayev, in surrendered this independence back to state; however, it is recognized not as a 2006.16, 18 Umarov formed the IK on

The Counter Terrorist ~ August/September 2014 59 Aslan Maskhadov. Photo by: Natalia Medvedeva

Overcrowded surface public transport lines on the day of the 2010 Moscow Metro bombings. the global jihadist community. The Photo by: Anton Nossik tentativeness of his messages reflected a form of adaptive control in which he adjusted his messages in response to the political environment and mainstream media. Umarov rationalized his thought processes and actions while implying a sense of insight into future events from a narcissistic point-of-view. He was hypersensitive to managing social perception, and likely considered it imperative to his survival and role as regional unifier. Umarov likely anticipated that at some point, perception and reality would converge, materializing into an acceptable variation of his political objectives, but his death leaves this convergence to his successor. Legitimization of his role and People mourning the victims and bringing flowers and candles at the scene of the terrorist attack in the Lubyanka metro station in Moscow. Photo by: Leonid Dzhepko the ongoing validation of the IK were extremely important to him, particularly the perception within the IK ranks, as this was his only means of protecting the October 31, 2007, citing liberation, UMAROV’S LEADERSHIP organization from fragmentation. While and that he was following Allah’s path.6 STYLE he was self-focused, he also demonstrated He divided the Caucasus into six fronts, Based upon a detailed analysis of an emotional attachment to the IK and some further subdivided into sectors, 20 Umarov’s video messages, he can be its ideology as an altruistic participant. each headed by its own Emir who described as an exploitative leader who The religious context of his messages in reported directly to Umarov personally. used his followers as a means for creating, effect, served as a recruitment tool for Although he had declared himself as the validating, and perpetuating his power attracting disillusioned Muslim youths supreme Emir in 2007, most Chechens in the Northern Caucasus and within and the sustainment of his organization rejected this proclamation.19

60 The Counter Terrorist ~ August/September 2014 Emergency meeting following explosions at Domodedovo Airport with head of Investigative Committee of the Russian Federation Alexander Bastrykin, Prosecutor General Yury Chaika and Transport Minister Igor Levitin (right). Photo by: The Presidential Press and Information Office

during times of crisis. his followers, providing status of his Umarov viewed his efforts with efforts and the state of the IK as facts and permanence and resoluteness, to strategic imperatives. His rhetoric followed the degree of denying real-world a tentative format allowing the maximum circumstances and obstacles. This number of outcomes to align with his behavior reflected the intent to drive insights and forecasts. Contrary to other group cohesion by emphasizing the news reports, his behaviors demonstrated IK’s successes and future objectives, a political savvy and sensitivity to the which is a common practice by jihadist critical observations of his followers and organizations. Communications were opponents. It was this political savvy important as he frequently addressed that enabled him to unite Chechen

The Counter Terrorist ~ August/September 2014 61 A mountain outpost of the 33rd Mountain Rifle Brigade in Dagestan. Photo by: Sergey Pyatakov

jihadists with other terrorist groups in the the position of “Qadi,” chief theologian, North Caucasus as well as extending his judge and ideologist, monitoring relationships beyond the Caucasus. organizational compliance with the Koran and Sunna.6 It is unclear if he will MUKHAMMAD AND THE maintain that role in addition to Emir. IK’S FUTURE He has already earned a position on Hidden away in the North Caucasus, Russia’s list of most wanted terrorists and Mukhammad declared his acceptance of will likely take on the priority for “kill or the role of IK Emir via recorded video. capture” once held by his predecessor. Mukhammad was born in 1972 in the The IK as an organization will likely Sovyetsky District of Dagestan.21 He go through a period of chaos while studied shariah law in Syria in the early Mukhammad seeks to impose his 2000s under his nephew, Murtuzali authority and organize his command Magomedov. Since 2010, he has held structure. As a Caucasian Avar, a non-

62 The Counter Terrorist ~ August/September 2014 www.homelandsecurityssi.com TAKE YOUR TRAINING TO A HIGHER LEVEL... SSI ELEVATED TACTICS TRAINING Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

Find out more at: • Vehicle driving and operating techniques in a variety of situations • Global case studies of real-world operations using the specific equipment • Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults • Elevated obstacle negotiation and firing platforms • Emergency evacuations, climbing and descending options • Distraction and deception techniques ® SECURITY • and much more... SOLUTIONS INTERNATIONAL SSISSI Protecting the Homeland Together ® Call now for more information. Elevated Tactics Training provided Phone: 866-573-3999 in partnership with Patriot3. Fax: 866-573-2090 [email protected]

Circle 313 on Reader Service Card 63 The Counter Terrorist ~Circle August/September 183 on Reader Service 2014 Card Chechen, it is not clear yet if he will an opportunity to gain access to Assad’s Sharia Judge, Ali Abu Muhammad, be capable of holding the organization chemical weapons cache, he ordered his elected as new CE Emir by leaders of together.22 Mukhammad’s video releases fighters to remain in the Caucasus.24 CE provinces, in Kavkaz Center. 2014, demonstrate an increase in the radical It remains to be seen whether he will Kavkaz Center: Online. nature of the IK, indicating that he will inspire and order violent actions or 2Winter, J., US, Russian forces hunt rule with an iron fist under an extremist’s drive away the more liberal Chechen jihadist widow feared inside Olympic zone, interpretation of Islam. Umarov’s efforts prospects. His rigidity and obsession in Fox News. 2014, Fox News: Online. to unite the Northern Caucasus and with shariah law, as noted in his blanket 3News, F., Islamic group reports death legitimize the IK will likely dissipate statement of waging war against of Chechen warlord who threatened Sochi into disorganization. Sub-factions may noncompliant Muslims, may become his Olympics, in Fox News. 2014, Fox News: form and break away from IK-proper, Achilles’ heel in sustaining an active and Online. as has happened to many other violent cohesive organization. 4Kavkaz Center, Thousands prayed for organizations during periods of major Under Mukhammad’s self-admission, martyr, Insha’Allah, Dokku Abu Usman in transition. he lacks the combat training and hands- Turkey in Kavkaz Center. 2014, Kavkaz It is equally possible that the IK will on experience that enabled Umarov Center: Online. reject Mukhammad’s heavy-handed to evade capture by Russian forces for 5Baczynska, G., Russia confirms death of rule by shariah law. In a video release, so many years.25 Although Umarov’s Islamist militant, its most wanted man, in he stated “If you consider yourselves political and strategic competencies Reuters. 2014, Reuters: Online. Muslims, then impose shariah law, are considered far worse than his 6Roggio, W., House Homeland Security and we shall stop waging war against predecessors, Mukhammad seems to Subcommittee on Counterterrorism and you.”21 Included in this message was a be a step further away from increasing Intelligence Hearing. 2014, Federal warning that his men will target those the tactical competency of the IK or Information & News Dispatch, Inc: who engage in promoting depravity and garnering international sympathy. Online. vice, such as owners of liquor stores, With the death of Umarov and the 7Lister, T., Moscow attack renews saunas, and bordellos. He expects strict inexperience of Mukhammad, the spotlight on ‘Emir of the Caucasus’, in adherence to the Koran and Sunna. FSB has the clear strategic advantage, CNN. 2011, CNN: Online. Mukhammad’s ideological position equipment, and force strength to quickly 8RT, Two blasts in Moscow Metro, aligns with the extremist values of the dismantle the IK threat, beginning with a dozens killed, in RT. 2010, RT: Online. broader jihadist movement, but it fails kill or capture order for Mukhammad. • 9Kavkaz Center, Circassians got no reply to demonstrate the larger view and goals from the IOC. Perhaps, Dokku Umarov of regional unification and establishment ABOUT THE AUTHOR and his friends answer them in Kavkaz of an Islamic state that his predecessor Mr. Toney holds a doctorate in business Center. 2013, Kavkaz Center: Online. 10 held. He has several pending actions administration with specialization de Carbonnel, A. and S. Gutterman, awaiting his attention. Organizations in organizational behavior from the Russia says foils plot to attack chemical such as the Syrian Al-Nusrah Front for University of Phoenix. He has worked arms facility, in Reuters. 2013. 11 the People of the Levant, the Islamic with the U.S. Department of Defense SITE Monitoring Service. Chechen State of Iraq and the Sham (ISIS), and for more than 25 years, teaches graduate ISIL Commander Gives Eulogy for Former the Ukrainian Right Sector expect courses at Ashford University, and has IEC Leader Doku Umarov. 2014 [cited support in the form of people, weapons published three books on terrorism: 2014 May 27]; Available from: https:// and funding.23 Terrorist Organizational Behavior, news.siteintelgroup.com/Jihadist-News/ The global jihadist community awaits Organizational Behavior Profile: chechen-isil-commander-gives-eulogy- Mukhammad’s first actions as the IK AQIM, and Terrorist Leader Profiles and for-former-iec-leader-doku-umarov.html. 12 Emir, particularly al-Qaeda. While Comparative Behavioral Analysis. SITE Monitoring Service. TIP Leader it would be a logical first action to Expresses Solidarity with Chechen Fighters build upon the relationship with the FOOTNOTES Over Umarov Death. 2014 [cited 2014 May 27]; Available from: https://news. mujahidin in Syria because it presents 1Kavkaz Center, ’s siteintelgroup.com/Jihadist-News/tip-

64 The Counter Terrorist ~ August/September 2014 Circle 279 on Reader Service Card The Counter Terrorist ~ August/September 2014 65 leader-expresses-solidarity-with-chechen- Gazavat to Jihad. 1 ed. 2011: Praeger alibulatovich-kebekov-individual-profile. fighters-over-umarov-death.html. Security International. 22TRAC. Caucasus Emirate chooses www.PoliceOneAcademy.com 13SITE Monitoring Service. Shabaab 18Anthony, L. and W. Helen, Russia’s a new leader. 2014 [cited 2014 May www.PoliceOneAcademy.com Leader Links France, Missionaries to bin Laden dead, rebels admit, in The 27]; Available from: http://www. Car Attacks. 2014 [cited 2014 May Times (London, England). 2014, News trackingterrorism.org/what-to-watch/ 27]; Available from: https://news. International Trading Limited: London caucasus-emirate-new-leader-old-choice- siteintelgroup.com/Western-Jihadist- (UK). p. 26. and-uncertain-future. Forum-Digest/shabaab-leader-links- 19Kavkaz Center, Caucasus Emirate, in 23Kavkaz Center, Ukrainian Right Video Training france-missionaries-to-car-attacks.html. Kavkaz Center. 2007, Kavkaz Center: Sector declares mobilization and appeals Video Training 14Opperman, J., Latest Report of Online. to Caucasus Emirate’s Emir Dokku Abu Umarov’s Death Leaves Details Unclear, 20Toney, M., Terrorist Leader Profiles Usman, in Kavkaz Center. 2014, Kavkaz On Demand in Radio Free Europe. 2014, Radio Free and Comparative Behavioral Analysis: Center: Online. On Demand Europe: Online. Abdullaah Yusuf Azzam, Abdelmalek 24Paraszczuk, J. New Caucasus Emirate “PoliceOne Academy’s online 15Kavkaz Center, Combats in Western Droukdel, Osama bin Laden, Dokku Emir Kebekov: Jihad In North Caucasus “PoliceOne Academy’s online Maximize your training budget with training is a valuable tool Maximize your training budget with Ichkeria in Kavkaz Center. 2003, Kavkaz Umarov Abu Uthman and Ayman Priority Over Syria. 2014 [cited 2014 training is a valuable tool 24/7 access to more than 500 HD Center: Online. al-Zawahiri. 2013: CreateSpace May 27]; Available from: http://www. for any officer, that provides 24/7 access to more than 500 HD 16 training videos! Kavkaz Center, Caucasus Emirate’s Independent Publishing. chechensinsyria.com/?p=21203. for any officer, that provides training videos! Emir Dokku Abu Usman martyred, 21TRAC. Ali Abu-Muhammad (aka 25Radio Free Europe, Avar Theologian high liability training at a high liability training at a • Fulfill FDLE Mandatory Retraining Insha’Allah. Obituary in Kavkaz Center. Aliashab Alibulatovich Kebekov). 2014 Named To Succeed Umarov As Insurgency moment’s notice.” • Fulfill FDLE Mandatory Retraining 2014, Kavkaz Center: Online. [cited 2014 May 27]; Available from: Leader, in Radio Free Europe,. 2014, moment’s notice.” Requirements online! Requirements online! 17Schaefer, R.W., The Insurgency in http://www.trackingterrorism.org/ Radio Free Europe,: Online. Lt. Eric Rauch Chechnya and the North Caucasus: From group/ali-abu-muhammad-aka-aliashab- Lt.Polk Eric County Rauch Sheriff’s Office • Provides Certificates of Completion for Polk County Sheriff’s Office • Provideseach one-hour Certificates course of completed Completion for each one-hour course completed • 80+ hours of training available • 80+ hours of training available • Ideal for in service/roll call training Bite Suit Reward Balls with • Ideal for in service/roll call training Helmet Tug Handles • Create self-paced training assignments $74.95 3" Ball • Create self-paced training assignments $12.95 2.5" Ball $11.95 2" Ball • Lesson plans and quizzes $9.95 • Lesson plans and quizzes • Tracking and reporting features Hand • Tracking and reporting features E-Collar Holsters Protectors $39.95 ea Special Operations • Full-featured mobile experience $39.95 • Full-featured mobile experience Has cutouts so the buttons Harness can still be worked while it’s available in black, coyote or multicam* holstered. Has 2¼" metal clip Bite Suit with plastic with metal cobra • Department and individual on back of holster so it can be $1,189.95 buckles buckles • Department and individual worn on a 2" duty belt or clipped subscriptions available to a MOLLE tactical vest. $149.95 $199.95 subscriptions available *with attachments for MOLLE pouches and K-9 camera

Follow us on[ Muzzles Contact us today at $69.95 Contact us today at [ 866-941-4090 Scan our QR 866-941-4090 code with your smart phone [email protected] to view our Malinois German Shepherd [email protected] online catalog. for your FREE department preview! for your FREE department preview! YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

66 The Counter Terrorist ~ August/September 2014 Circle 277 on Reader Service Card www.PoliceOneAcademy.com www.PoliceOneAcademy.com

Video Training On Demand “PoliceOne Academy’s online “PoliceOne Academy’s online Maximize your training budget with training is a valuable tool Maximize your training budget with training is a valuable tool 24/7 access to more than 500 HD for any officer, that provides 24/7 access to more than 500 HD for any officer, that provides training videos! high liability training at a training videos! high liability training at a moment’s notice.” • Fulfill FDLE Mandatory Retraining moment’s notice.” • FulfillRequirements FDLE Mandatory online! Retraining Requirements online! Lt. Eric Rauch Lt.Polk Eric County Rauch Sheriff’s Office • Provides Certificates of Completion for Polk County Sheriff’s Office • Provideseach one-hour Certificates course of completed Completion for each one-hour course completed • 80+ hours of training available • 80+ hours of training available • Ideal for in service/roll call training • Ideal for in service/roll call training • Create self-paced training assignments • Create self-paced training assignments • Lesson plans and quizzes • Lesson plans and quizzes • Tracking and reporting features • Tracking and reporting features • Full-featured mobile experience • Full-featured mobile experience • Department and individual • Departmentsubscriptions and available individual subscriptions available Contact us today at 866-941-4090Contact us today at [email protected] [email protected] for your FREE department preview! for your FREE department preview!

Circle 335 on Reader Service Card The Counter Terrorist ~ August/September 2014 67 INTERNATIONAL RESOURCES RING POWER When Law Enforcement officers are called to any emergency situation – they have to be prepared for the worst case scenario. Whether dealing with a hostage rescue, barricaded suspects, riot scene, or natural disaster, having the tactical advantage is critical. The Rook was custom designed with mission specific attachments that increase job safety, while also improving the ease and speed of changing attachments. The Armored Deployment Platform(APD) allows officers to approach structures with reduced exposure. A team can be placed anywhere and have a secure position from which to make better tactical decisions. Officers can also gain entry to the second story of a house or building without a ladder, allowing them to search the house from the top down without using stairways to work their way up. The ADP can also be used to deploy snipers to a rooftop. The Rook integrated video system gives visibility into areas that small robotic video cameras cannot. www.ringpower.com

EXOSKEL Exoskel™ is designed for times when proper climbing technique is out, replaced by the need for speed and low profile scrambling. Exoskel™ assists the user to rapidly ascend and negotiate obstacles, while offering enhanced stabilization and lower limb protection. After constantly failing to negotiate obstacles when rushed and weighed down, and after multiple cuts and damaged lower limbs, Exoskel™ was developed. Armed with teeth to lock on to any terrain, it lifts the user, via the stirrup system, up, over, and on… • Assists the operator rapidly ascend and negotiate obstacles • Stabilizes the firing or anchor position on irregular terrain • Shin protection • Close Quarter Battle tool • Perpetrator restraint • Injury Prevention • Berry Compliant The Exoskel™ guards hold in excess of 1000 lbs (450kg), on the teeth, buckle and stirrup, and each weight only 1.1 lbs (500g). They are Berry Compliant, and are made from high specification specialty engineering grade Polyamide which is: high impact, puncture, UV, hydrolysis, and flame resistant - UL94 VO rated. “If Exoskel-Group Inc can assist one operator get over one obstacle one second faster, it will have achieved its aim”. www.exoskel-group.com

® SSI PVB The Portable Vehicle Barrier transfers the momentum of a moving vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes without any need for electricity. It can be equipped with wheels to act as a swing barrier. You can SSISSI add anchoring cables and place the PVBs in a single row or more. The PVB can be folded quickly for moving and storage; it is reusable and durable. www.ssipvb.com

68 The Counter Terrorist ~ August/September 2014 Innovative Products

BROCO JIMMY LMT DMR STOCK Broco introduced the Jimmy as the first purpose-built, This buttstock offers the user customization that low cost tactical pry bar at the request of federal law the designated marksman requires by including enforcement agent clients. Key features requested were: features already known on the LMT SOPMOD. high strength, light weight, a compact size for carrying The DMR buttstock fits Mil-Spec carbine extension yet large enough to leverage the operator’s strength. The tube rifles in both the 5.56 and .308 platforms. It Jimmy has a 5:1 mechanical advantage with its fulcrum includes 0.725" adjustable SOPMOD style cheek point 1.75" from the 25° angled tip and a shaft length of rest height, 1.25" adjustable length of pull with 9". The handle features a foam core with cord over-wrap SOPMOD buttpad for reduced felt recoil and a for grip and comfort. The Jimmy fits under MOLLE. It concealed Mil-Std 1913 STANAG 4694 compliant is made in the U.S.A. and sells for under $30.00. rail for mono-pod attachment. The DMR stock was www.broco-rankin.com designed to be able to replace current adjustable stocks in less than twenty seconds without using special tools. www.lmtstore.com

STRATEGIC RIFLEMAN Former Chairman of the Joint Chiefs Michael Mullen acknowledged that debt was America’s greatest vulnerability. In the near future, the U.S. government will have to drastically reduce spending or face creditors unwilling to continue lending. America’s defense apparatus is going to have to shift to a more cost effective model. John Poole advocates a lighter, more agile, initiative driven force that is capable of handling the adversaries our current force has had such challenges with. Read Strategic Rifleman and see how austerity could actually be used to improve the U.S. military’s capabilities. www.posteritypress.org

The Counter Terrorist ~ August/September 2014 69 The AUGUST/SEPTEMBER 2014 Counter VOLUME 7 • NUMBER 4

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, visit our website http://thecounterterroristmag.com/readerservicecard.php or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page Ad/Company • website and/or email...... RSN Number

55 9th Annual Homeland Security Professionals Conference & Expo • www.terrorconference.com...... 177 75 Adamson Police Products • policeproducts.com...... 116 71 Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com...... 215 42 ALLRed - Armadillo Tactical Gear • ArmadilloTacticalGear.com...... 131 49 American Public University • www.AMUonline.com/Counter-Terrorist...... 211 2 Barrett Firearms Manufacturing • www.barrett.net...... 121 15 BioStat LLC • www.biostatllc.com...... 271 14 Broco • [email protected]...... 198 7 Designsteins • www.blackrainordnance.com...... 110 66 Elite K9 • www.EliteK9.com...... 277 76 Exoskel • www.exoskel-group.com...... 280 37 Gander Mountain LE Sales • [email protected]...... 28 24 Golden Engineering • www.goldenengineering.com...... 83 40 Golight Inc • www.golight.com...... 285 54 IDGA Homeland Security Week • www.HomelandSecurityExpo.com...... 113 42 J & N Tactical • www.JNTactical.com...... 155 65 K9 Cop Magazine • www.k9copmagazine.com...... 279 4 Lenco Industries Inc. • www.lencoarmor.com...... 13 3 Lewis Machine & Tool • www.lmtdefense.com...... 259 73 NTOA Tactical Operations Conference & Trade Show • www.ntoa.org...... 329 39 Occupational Health Dynamics • www.ohdusa.com...... 213 43 Patriot3 • www.patriot3.com...... 301 45 Phantom Products Inc. • www.phantomscout.com...... 309 67 PoliceOne Academy • www.PoliceOneAcademy.com...... 335 26 Reconyx • www.reconyx.com...... 303 11 Ring Power • Ringpower.com/tacticalsolutions...... 178 36 Southern Police Equipment • www.southernpoliceequipment.com...... 343 63 SSI Elevated Tactics • www.homelandsecurityssi.com...... 313 25 SSI MACTAC • www.homelandsecurityssi.com...... 228 41 SSI PVBs • www.SSIPVB.com...... 226 27 Tactical Products Group Inc. • www.taccprogearblack.com...... 101 21 Urban Shield 2014 • UrbanShield.org...... 317 19 Waldorf College • Waldorf.edu/CT...... 197 ADVERTISER INDEX ADVERTISER

70 The Counter Terrorist ~ August/September 2014 ® The Advanced Global

The experts on training in: Security Workshop in

Israelthe Homeland Security professionals best resource

Since 2005, SSI has taken - a threat as deadly as al-Qaeda - Learn about them in nearly 500 First Responders their own territory, along Israel’s northern border. to Israel and shown them Hostage Rescue - Discover how they go wrong. the basics of the Israel security concept. Hospital Response - Find out how Israel’s critical response hospitals Thanks in part to that handle surge and multi-casualty incidents. program, we are better able Israel Counter Terrorism units - Learn how they operate. to defend ourselves in the Israel National Police - National Academy; See how they train? United States. In response to demand, we are now Sensitive Installations - Participate in a day-long exercise and offering a once-in-a-lifetime training program in how to set up a complete security system. experience covering the Secret Israel Homeland Security Simulator - See how this works following advanced subjects: at a base south of Tel Aviv.

Nov. 7-15, Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland 2014 Security Professional, a Security Professional, an EMS, or an EMT.

LEARN MORE at: www.homelandsecurityssi.com Call now for more information. 215 Circle on Reader Service Card Phone: 866-573-3999 Fax: 866-573-2090 [email protected] Circle 50 on Reader Service Card Circle 215 on Reader Service Card The Counter Terrorist ~ August/September 2014 71 TRAINING REVIEW Vehicle Engagement Tactics By Max Joseph

e all spend a great vehicles is a real possibility. Our highest drive over or through many obstacles that amount of time in and chances of being hit may occur while we seem impassible to those who are not Waround our vehicles. Considering this, are arriving or departing from venues. trained in vehicle dynamics. it stands to reason that our chances There are four basic options presented to The driver should focus on nothing of becoming involved in a lethal force us if we are caught in a vehicle ambush. but driving. This man is critical to our encounter in a vehicle is high. In survival. He has one job: “Drive the car!” recognition of this fact, I created a three- DRIVE THROUGH Everyone else has one job also: “Protect the day Vehicle Engagements Tactics course The safest way to survive a shootout is driver!” Only after a vehicle is completely for personnel who may be required to to not be there when it happens. This is incapacitated does it make sense for the employ their firearms from, in, and where the drive through option comes driver to become another shooter. around their vehicles. Here are some of into play. For example, we may be taking the topics we cover: sporadic hits from a hasty or far ambush. RAM THROUGH The sooner we can get out of the kill We should always use the most COUNTER AMBUSH zone, the safer we will be. We refer to effective weapons at our disposal. Your PROCEDURES this as “duck your head / punch your gas vehicle is often your best weapon. Why Being caught in an ambush while in our / and pucker your ass.” Our vehicles will reach for a four-pound weapon when

72 The Counter Terrorist ~ August/September 2014 Circle 329 on Reader Service Card The Counter Terrorist ~ August/September 2014 73 you have a 4,000-pound one available? SOPs would be to ram through any A second reason that the team may If the enemy deploys a barricade or obstacles they present, they may choose deploy from the vehicle is that it may vehicle blockade to stop your forward to beef up their barricade. An armored be their mission to serve as a counter movement, the best option may be to car or cement truck will pose a more assault team for a motorcade. While the ram through the obstacle. Care should be formidable obstacle and will negate the principal’s vehicle is departing the kill taken in controlling the speed used when ramming option. In this case, either a zone, the CAT will be delivering accurate making contact with the barricade. The straight reverse out or a J turn would fire into the threat to mitigate their desire maxim that has been taught for quite a be the next option. When involved in and ability to continue the attack. while is to slow down as if you are going motorcade operations, coordinating Always seek cover. Understand what to stop. This will momentarily lull the this procedure with multiple vehicles in parts of your vehicle will and will not stop enemy into thinking that you are in fact training is crucial. rounds. Always be aware of your muzzle complying with their orders. When about control. While we are scrambling across 25 yards out, accelerate and prepare for DEBUSS seats and providing covering fire for our contact. Too high a rate of speed on your The option to dismount is a critical teammates who are deploying from the part may cause disabling damage to your decision, and it is generally best to drive vehicle, we must be cognizant that our own vehicle. We are normally looking through when possible. The debuss is muzzles never flags our teammates or for contact between our front end and performed in only two occasions. First, any part of our bodies. Keep your finger their rear axle to have the best leverage for if the vehicle is fatally disabled and it straight except when actually firing. In pushing that barricade out of our path. becomes a bullet trap. Dynamically debuss drills, we may be firing through deploying from the vehicle using the windshield one second then the next REVERSE OUT coordinated fire and movement may second be opening our doors to deploy. If the enemy has conducted allow the passengers to move to a more During this mental transition between surveillance on us and knows that our advantageous position. firing and then moving, our fingers must come out of the trigger guards and our weapons must be either decocked or put back on safe. Always remember that a well-executed ambush is fast and violent with a maximum amount of firepower brought to bear on the kill zone. As in any ambush, the faster those in the kill zone can drive through and get rounds on target, the better chance they will have of surviving the ambush. • www.tftt.com

ABOUT THE AUTHOR Mr. Joseph is the founder and training director of both TFTT)and the Direct Action Group. He is a former Recon Marine and has trained and worked with personnel from Asia, Africa, Eastern Europe, the Middle East and South America and has worked protective details in Central America, South America, Eastern Europe, and Afghanistan.

74 The Counter Terrorist ~ August/September 2014 Circle 116 on Reader Service Card The Counter Terrorist ~ August/September 2014 75 Circle 280 on Reader Service Card