MOTORCYCLE HIT TEAM • HRT MANHUNT • LOS AZTECAS • RUSSIAN WEAPONS

Journal for Law Enforcement, Intelligence & Special Operations Professionals The Counterapril/may 2013

Volume 6 • Number 2

honor-crime in north america

INTERNATIONAL EDITION An SSI ® Publication april/may 2013 www.thecounterterroristmag.com USA/CANADA $5.99

The Counter Terrorist ~ April/May 2013 1 Circle 2372 on The Reader Counter Service Terrorist Card ~ April/May 2013 Circle 13 on Reader Service Card ~ April/May 2013 3 The Counter Terrorist340 CircleCircle 13 on onReader Reader Service Service Card Card WE’VE CREATED A MONSTER.

MRAD™

4 The Counter Terrorist ~ April/May 2013 Circle 121 on Reader Service Card The Journal for Law Enforcement, Intelligence & Special Operations Professionals April/may 2013 Counter Volume 6 • Number 2

COVER story:

Honor-Crime in North America 32 By M. Zuhdi Jasser and Raquel Evita Saraswati FEATURES:

32 Firsthand: 8 HRT MANHUNT By James A. McGee

Case Study: 20 The Motorcycle Hit Team: A Global Tactic By Glenn McGovern

Modern Russian Special Weapons 48 By Eeben Barlow 8 The , Los Aztecas Network 60 By John P. Sullivan

departments:

6 From the Editor Leadership 20 46 book Review Shariah Law and American Courts: An Assessment of State Appellate Court Cases

69 innovative Products Mini-Caliber Robot, Reconyx Camera, CQB-11

72 Training Review CDG Advanced Handgun Skills

48 Cover Photo: Muslim woman. Photo: Steve Evans contents

The Counter Terrorist ~ April/May 2013 5 From The Editor: CounterThe Leadership

By Chris Graham Journal for Law Enforcement, Intelligence & Special Operations Professionals

Volume 6 • Number 2 april/may 2013 n November 5, 2009 Nidal Hasan murdered 13 soldiers and wounded 29 Editor at Ft. Hood, Texas. Three days later Army Chief of Staff, General George Chris Graham OCasey said, “As horrific as this tragedy was, if our diversity becomes a casualty, I think Director of Operations that’s worse.” Sol Bradman On February 2, 2010 Chairman of the Joint Chiefs of Staff, Admiral Michael Mullen Director of Advertizing told the Senate Armed Services Committee, “It is my personal belief that allowing gays Carmen Arnaes and lesbians to serve openly would be the right thing to do” rather than answer the Production Assistants question he was asked. Giselle Manassa On January 25, 2013, Chairman of the Joint Chiefs of Staff, General Martin Melissa Berne Dempsey said, “If we do decide that a particular standard is so high that a woman Contributing Editors Eeben Barlow couldn’t make it, the burden is now on the service to come back and explain to the Jennifer Hesterman Secretary [of Defense], why is it that high? Does it really have to be that high?” Richard Marquise explaining his willingness to lower standards in order to facilitate women serving in Tom Nypaver combat arms. Steve Young Of course, “interesting” acts of leadership are not limited to the Department of Graphic Design Morrison Creative Company Defense. Elected officials act as if spending several times more money than they have been entrusted with is virtuous. Our recent Secretary of State has testified to congress Copy Editor Laura Town that she “takes responsibility” for the four Americans needlessly murdered in Benghazi, Libya and went on to express that she still wasn’t aware exactly what happened but that Advertising Sales Chris Bell some sort of un-admitted errors were committed by her staff without her knowledge. Publisher: Our Attorney General was caught in apparent lies to congress about the bizarre “Fast Security Solutions International and Furious” gun-running operation to Mexican drug cartels and then had himself 13155 SW 134th St. • STE 204 investigated and cleared by a subordinate. Miami, Florida 33186 Do I care that General Casey values “diversity” more than the lives of his soldiers? Do I care that Admiral Mullen is into gay rights? Do I care that General Dempsey is willing ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, to lower standards in order to build co-ed infantry squads? Nope…generals are free to Intelligence & Special Operations push whatever politically correct pet projects they wish. Professionals is published by Security However, I cannot help but notice that American grunts busted their asses to topple Solutions International LLC, as a service to the nation’s First Responders and Saddam Hussein from power only to watch Baghdad be delivered into the orbit of Homeland Security Professionals with Tehran. A brilliantly agile CIA/SOF anti-al Qaeda campaign in Afghanistan has been the aim of deepening understanding eclipsed by a lumbering, inefficient Big Army campaign with dubious results. Our of issues related to Terrorism. No part of the publication can be reproduced government fired more than 100 cruise missiles into Libya accomplishing what? A without permission from the publisher. small but dominant minority in our government championed the toppling of President The opinions expressed herein are the Mubarak in Egypt and what they called an “Arab Spring”. Now we predictably see opinions of the authors represented and not necessarily the opinions of the publisher. the Islamic supremacist cult, Muslim Brotherhood, controlling Egypt and followers Please direct all Editorial correspondence making a grab for power across the Middle East and North Africa. This, of course, related to the magazine to: Security doesn’t even touch on cyber, economic, and propaganda attacks or U.S. military bio-fuel Solutions International SSI, 13155 SW 134th Street, Suite 204, Miami, Florida. boondoggles, etc. 33186 or [email protected] We all share the hope that our elected leaders will become more discriminating about The subscription price for 6 issues is $34.99 the wars they choose to involve us in and more insightful about the nuances of our and the price of the magazine is $5.99. enemies and their goals, but is it too much to ask that we promote some men, women, (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and transvestites or illegal aliens to the general officer level whose pet project is raising plaques please contact: standards and winning wars? PARS International Corp. Web: www.magreprints.com/quickquote.asp Email: [email protected] Semper Fidelis, Phone: 212-221-9595 • Fax: 212-221-9195 Please visit the magazine web site where you can also contact the editorial staff: Chris Graham www.thecounterterrroristmag.com © 2012 Security Solutions International Editor, The Counter Terrorist

6 The Counter Terrorist ~ April/May 2013 “knowledge is critical to deter the threat of terrorism.”

Elena Mastors, Ph.D. | Dean, School of Security & Global Studies

Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network. Learn More at www.amuonline.com/counter-terrorist

Education | Management | Public Service & Health | Science & Technology | Security & Global Studies

Circle 211 on Reader Service Card The Counter Terrorist ~ April/May 2013 7 Firsthand: hrt manhunt By James A. McGee

On May 12, 1992, Danny Ray Horning disguised himself as a medical technician and casually strolled out of the Arizona State Prison in Florence, Arizona. He was serving four consecutive life terms for kidnapping, assault, bank robbery, and burglary.

CounterThe

8 The Counter Terrorist ~ April/May 2013 By James A. McGee

hen Horning entered FBI Academy in Quantico, Virginia. His ability to slip through the rugged back country The FBI Hostage Rescue Team (HRT) Wof the Coconino National Forest, his is a tier I tactical law enforcement team. road blocks undetected and escape became more than an Arizona law The HRT had just returned from a enforcement concern. He had entered successful hostage rescue at the Federal survive off the land resulted federal land, and his escape, along with Correctional Institute in Talladega, in comparisons to the any other crimes he committed, fell Alabama,* and was between missions. under federal jurisdiction. With federal Trained to operate in all environments, popular Sylvester Stallone jurisdiction came access to federal assets. the HRT was well equipped and suited One such asset was standing by at the to deploy to the remote and isolated movie character Rambo.

* Editor’s Note: see Vol. 2, No. 4 “FBI Rescue at Talladega”.

Patch of the FBI’s Hostage Rescue Team. Photo: FBI. Inset: John Rambo graffiti. Photo: HTO.

The Counter Terrorist ~ April/May 2013 9 He’d done a brief stint in the army and had acquired a basic understanding of fieldcraft while growing up in the area. As Horning continued his trek north, he burglarized homes for food and weapons. In late June, Horning abducted two hostages and forced them to drive him from Flagstaff into the Grand Canyon National Park where he booked a room at the El Tovar Hotel. After several weeks on the run, Horning was beginning to attract a following of groupies. His ability to slip through road blocks undetected and survive off the land resulted in comparisons to the popular Sylvester Stallone movie character Rambo. An alert was broadcast on all of the HRT Operator’s pagers notifying us to report to the HRT building ASAP. A warning order was issued in preparation for a full team deployment. The majority of the HRT gathered in the team room in preparation for the HRT Commander’s comments and a briefing from the assault team supervisor. We were told that a fugitive, named Danny Ray Horning, was armed and dangerous and, based on his criminal history, had demonstrated a propensity for violence. Horning had a previous conviction for child molestation and was suspected of the 1990 and dismemberment of a Stockton, California, catfish farmer. We filed out of the team room and gathered our individual kit bags. This operation was in a rural setting. Every operator had several kit bags, each one specifically packed with the gear necessary Oak Creek Canyon, Arizona. Photo: Postdlf for certain environments (e.g. cold weather, maritime, urban, etc.). For this mission, the shoulder weapon would At age 33, he was geographic areas encompassed within the be the CAR-15 in lieu of the MP-5 Coconino National Forest and the Grand A3 that was normally carried in urban lean and fit. He’d done Canyon National Park. close quarter battle. The black body Shortly after his escape from the armor carriers would be exchanged for a brief stint in the army Arizona State Prison, Horning robbed a woodland camouflage carriers and the and had acquired a Tucson bank of $2,300 before heading uniform would switch from black flight to the Blue Ridge Reservoir area of the suits to woodland camouflage BDUs. I basic understanding of Coconino National Forest. Horning, opted for my old 782 web gear with a a native of Winslow, Arizona, was butt pack instead of the standard load fieldcraft while growing knowledgeable of the northern Arizona bearing vest worn over the body armor. up in the area. landscape. At age 33, he was lean and fit. The mount out and trip north to

10 The Counter Terrorist ~ April/May 2013 Circle 301 on Reader Service Card The Counter Terrorist ~ April/May 2013 11

SAFELY ASSESS POTENTIALLY Andrews Air Force Base went smoothly for us. Men, assault vehicles, kit bags, DANGEROUS SITUATIONS and the rest of the support equipment were loaded onto a C-141 cargo plane Zistos Tactical Video System & New WalkAbout III for the flight to Arizona. As we all got comfortable on our bench seats lining the interior wall of the fuselage, the assault team supervisor began coordinating our arrival with the advance team that had left Quantico earlier. They were already on the ground in the Grand Canyon National Park. Once we were on the ground as well, an operations order would be delivered to the team and we would be updated with the most current intelligence regarding the possible whereabouts of Horning. Horning’s escapades were beginning to attract more and more national media attention. This could become a problem if overaggressive investigative reporters started trying to locate Horning on their own in the Grand Canyon National Park. Operational security was stressed and caution was given about discussing the investigation in the proximity of civilians. Call Zistos for a product During the operations order briefing, demonstration now! it was revealed that Horning might have prepositioned caches of weapons, ® New WalkAbout III: Larger 5.6” ® Specialized Cameras include: Under ammunition, food, and water within the LCD screen — same footprint! Door, Thermal Imaging, Fiberscopes back country of the Coconino National 4X greater resolution, color VGA, & Videoscopes, Robotic Remote Forest and the Grand Canyon National Park. The operations order also outlined a sunlight readable Control and Night Vision Monocular possible Horning plan to abduct victims, ® Pole lengths from 2ft- 20ft Pole Camera collect $1 million in ransom, and secure ® Vehicle Search Systems ® Rapidly Deployable Surveillance System the release of his brother, who was serving a twenty-nine-year sentence for child molestation. Zistos Corporation The next day, Horning attempted to kidnap a family of four, but his plan Ph 631.434 .1370 failed when one of the potential victims E-mail: [email protected] screamed for help. Some nearby park rangers heard the commotion and 311 Circle on Reader Service Card responded. Horning fled into the woods and the foot pursuit began again. This time HRT operators joined in the chase with professional scent tracking (canine) teams attached. The heat index in late June and early July was over 100 degrees Fahrenheit in the inner canyon during the day. At night the temperatures would drop dramatically to the mid- 40’s on the north and south rims of the canyon. This extreme temperature

Circle 191 on Reader Service Card 12 The Counter Terrorist ~ April/May 2013 WWW.TACPROGEAR.COM

Tacprogear is widely used in global hot spots where Personal Protection Equipment solutions are required, not optional Tacprogear’s functional products are designed for tier 1 operators and used by those who run towards the fight Tacprogear is available at retail locations around the world and online including: OpticsPlanet.com & Amazon.com

BULLET PROOF PACKS

Pistol ARMOR Wheel PLATES & HELMETS

BACKPACKS

VESTS & CARRIERS

MOLLE SPINE

GEAR BAGS

PERFORMANCE ABOVE ALL The Counter ELSETerrorist ~ April/May 2013 13 Circle 101 on Reader Service Card West Fork Trail in Oak Creek Canyon, Sedona. Photo: U.S. Forest Service, Coconino National Forest.

The heat index in fluctuation was challenging for those in challenge. Much of the surface being pursuit, including the dogs. They were traversed consisted of pumice, a natural late June and early July regularly airlifted from one location to lava rock made from ground volcanic another as possible sightings of Horning glass. The dogs suffered immensely from was over 100 degrees were reported to the command post. running on this surface and had to wear Before each shift, the dogs would socks to minimize the wear of their paw Fahrenheit in the inner be given an article to smell that had pads. Even with this added protection, canyon during the day. Horning’s scent on it. The next shift of the dogs ended each shift limping with personnel, along with the dog teams, blood-soaked socks. At night the temperatures would then be airlifted by helicopter During one of the helicopter to the location of the on-duty shift. transports, I noticed beads of sweat on would drop dramatically The new shift would then continue in the forehead of the pilot. I knew the to the mid-40’s on the pursuit of Horning. The temperatures pilot well. He was a former Vietnam- and the terrain, as well as Horning’s era helicopter pilot with many hours of north and south rims of antics of running in figure eight patterns combat mission experience. I couldn’t to confuse the dogs presented a grueling the canyon. understand why he looked so concerned.

14 The Counter Terrorist ~ April/May 2013 Circle 317 on Reader Service Card Circle 275 on Reader Service Card The Counter Terrorist ~ April/May 2013 15 I looked at the gauges and saw that the intensified its efforts and established altitude was increasing and we had a picket lines as far in front of the dog mountain to fly over in front of us! The teams as possible with the intent of Once out of the pilot looked at me a said, “We can’t make capturing Horning when he was flushed Grand Canyon it over that mountain. I’m going to do a into their position by those pursuing PEL (precautionary emergency landing) him. For several days, the dog teams and National Park, and get rid of some weight.” As I stood operators relentlessly continued their in the middle of the Coconino National pursuit. Horning ordered the Forest with one of my buddies, I watched Horning reappeared on the morning two hostages out as the helo lifted off and flew away. of July 4th standing next to a car that Fortunately, within a couple of miles was parked near one of the scenic of the car and tied we found a United States Forest Service overlooks in the Grand Canyon National outpost with a Bell 206 Jet Ranger sitting Park. Horning pointed a handgun at them to a tree. on the helo pad. They gave us a lift back the occupants of the car, two twenty- to our base camp. seven-year-old female British citizens As the July 4th holiday approached, on holiday, and ordered them to drive concern increased about Horning him out of the park. For the next forty- remaining at large inside the Grand five miles, Horning passed through two Canyon National Park. The HRT law enforcement road blocks without

A burned area of the Coconino National Forest as seen from Forest Road 420 heading toward Schultz Pass. Photo: USDA Forest Service, Coconino National Forest.

16 The Counter Terrorist ~ April/May 2013 FBI Hostage Rescue Team agents. Photo: FBI detection and successfully exited the by an alert police officer. Horning fired Grand Canyon National Park. a shot at the police officer and a chase Once out of the Grand Canyon commenced that ended a hundred miles National Park, Horning ordered the later when Horning crashed the stolen car two hostages out of the car and tied into an embankment near the Rocky Park them to a tree. As Horning drove Road interchange on Route 17. He fled away in their vehicle, the two women on foot into the treacherous terrain of untied themselves and ran to find help. Jacks Canyon and Oak Creek Canyon. This information was reported to the Again, picket lines were established command post and the pursuit efforts and operators with dog teams pursued were redirected to the areas around where Horning. For the next 9.5 miles, Horning the women were released. continued to elude his captors through As law enforcement officers from the rocky terrain. Heat, lack of water, multiple agencies focused on the location and the 54-day duration of the chase of the most recent sighting, Horning was were taking a toll on Horning’s physical seen in the stolen vehicle on Route 17 condition. Dehydration and exhaustion

The Counter Terrorist ~ April/May 2013 17 were setting in. the law enforcement officers who had As the sun vanished and the participated in the manhunt, each of the temperatures dropped, Horning made dogs were walked out by their handler. On July 5th at his way into the Village of Oak Creek. Then one by one they were escorted out Around ten p.m. Horning was seen and allowed to take a big whiff of the around two a.m., drinking from a garden hose by a couple. fugitive they had pursued so persistently; His hair was matted and his speech was a fitting end to the Danny Ray Horning Horning was found slurred from fatigue. He claimed to be a saga. Today, Danny Ray Horning is on sleeping beneath a lost hiker. The couple’s suspicions were death row in California’s San Quentin aroused and they called the police to Prison for the mutilation murder of the gazebo near a home report the incident. fish farmer from Stockton, California. th • in the Pine Valley On July 5 at around two a.m., Horning was found sleeping beneath a about the author gazebo near a home in the Pine Valley subdivision in the Mr. McGee has served as an FBI field subdivision in the Village of Oak Creek agent, a member of the Hostage Rescue by Yavapai County Sheriff’s Deputies. Village of Oak Creek Team, and a Supervisory Special Agent in Horning offered no resistance. He was the Domestic Terrorism/Counterterrorism by Yavapai County physically whipped. The relentless 54-day Planning Section. He currently teaches at pursuit had taken its toll and he could the University of Southern Mississippi and Sheriff’s Deputies. run no more. at Tulane University. He is the author of Once in custody, Horning was Phase Line Green: The FCI Talladega transported back to the law enforcement Hostage Rescue. base camp. As he stood in the center of

• Dynamic graphic presentation • Pages you can virtually flip through • Hyperlinks to various articles and advertisers • No waiting for the magazine to get to your doorstep • Secured access straight from our website! Receive the E-Zine FREE for a year!

Send an email to: [email protected] with FREE EZINE from The Counter Terrorist.

Circle 255 on Reader Service Card 18 The Counter Terrorist ~ April/May 2013 241%74'/'065174%+0) '(',&$7('352&85(0(177($06:,7+ */2%$/6285&,1*(;3(5,(1&( ‡)HGHUDO3URJUDPV'LYLVLRQZLWK 3DVWSHUIRUPDQFHRQ/2*&$3:336 $&27$$)5,&$381,620 PRUH ‡0LOLWDU\DQGODZHQIRUFHPHQWGLYLVLRQ ZLWKFXUUHQWNQRZOHGJHRIODWHVW VROXWLRQV WHFKQLTXHV ‡6WUHDPOLQHGSXUFKDVLQJRUGHULQJ GHOLYHU\DQGELOOLQJDSSOLFDWLRQV

.OGISTICS #4'#-019.'&)' $*/2%$/1(7:25.2)0$18)$&785(56 6833/,(56$1'6<67(06,17(*5$7256 2))(5,1*727$/62/87,216 ‡2QWKHJURXQGLQ$IULFD$VLD0LGGOH (DVW6RXWK$PHULFDDQGJOREDOKRW VSRWVZKHUHH[SHULHQFHLVPDQGDWRU\ ‡2IILFHVZDUHKRXVHV IXOILOOPHQW FHQWHUVLQ86$0LGGOH(DVW6RXWK $PHULFD $IULFD

241&7%65 5ERVICES 7$5*(7'5,9(162/87,216'(6,*1(' )25&200(5&,$/0,/,7$5</(  35,9$7(6(&85,7<352)(66,21$/6 ‡3HUVRQDO3URWHFWLRQ(TXLSPHQW >33(@7UDLQLQJ3ODQQLQJ2SHUDWLRQV 0DLQWHQDQFH 3URJUDP0DQDJHPHQW ‡,QWHUQDWLRQDO'HYHORSPHQW1DWLRQDO 6HFXULW\3URJUDPV 5LVN$QDO\VLV  ‡6SHFLDOL]HGVHUYLFHVDYDLODEOHXSRQ UHTXHVW

Circle 277 on Reader Service Card The Counter Terrorist ~ April/May 2013 19 Circle 145 on Reader Service Card Case Study: motorcycle hit team: A Global Tactic

Photo: US Navy.

20 The Counter Terrorist ~ April/MayFebruary/March 2013 2013 By Glenn McGovern

On April 7, 1977, two members of the German communist terrorist group Red Army Faction riding tandem on a motorcycle pulled alongside a Mercedes sedan as it sat at a traffic light. A shooter, armed with a short barrel 5.56 mm rifle, filled the interior of the sedan with rounds at nearly point blank range, tearing up the bodies of the three men seated inside.

Attack heir mission accomplished, Characteristics the motorcycle hit-team drove Over the past five decades, there have Toff. The Mercedes drifted through the been numerous documented attacks intersection, the driver, armed escort, on individuals in which employment and German Attorney General Siegfried of a motorcycle (M/C) hit team was a Buback having succumbed to their major factor. Attacks using this method injuries. Wearing protective leathers and of operation have occurred in at least helmets, there is still no confirmation 27 different countries and appear to of the identity of the shooter, to include be on the rise, as there were thirty-five even gender.

The Counter Terrorist ~ April/May 2013 21 during the 2000’s and forty-three during lanes when all other vehicles are stuck in just the last three years. In 2012 alone, traffic, drive on sidewalks and stairways, it has been reported that in Yemen, negotiate narrow roads and passageways, Of the 117 motorcycle hit teams have assassinated etc. It also provides a means of rapidly some forty members of the military and approaching the target with minimal attacks studied four civilians.2 The groups employing advance notice, followed by a rapid the tactic are organizations that include escape, in addition to a certain degree of where a motorcycle terrorists, guerrillas, , and operational cover. Motorcycles are also governmental operatives. Within just the simple to dispose of or conceal after use. was employed past few years, training camps offering When ridden tandem, the second in the attack, the “courses” in use of the motorcycle for individual, the “shooter,” has nearly a assassinations have been discovered under 360-degree field of fire, the majority of aggressor obtained the control and guidance of al Qaeda, as which is unobstructed. In addition, the well as various Mexican drug cartels.3 required positioning of two riders due to an overall success The nature of any planned attack the configuration of the seat facilitates rate, meaning the generally favors the aggressor. The the concealment of a weapon. While attacker will select a time, a location, and historically the preference of weapons target was killed, 89 a method of attack that will increase the in such attacks have been firearms, likelihood of a successful operation with usually pistols or sub-machineguns, more percent of the time. minimal risk to themselves. The use of recently, the tactic has evolved to employ a motorcycle offers several advantages. parasitic improvised explosive devices, A nimble machine, capable of 0 to 60 such as “sticky bombs.” mph in mere seconds, it can split traffic Of the 117 attacks studied where a

Homeland Security CERTIFICATE PROGRAM

Courses for Public Safety Practitioners Courses include:  Law Enforcement Professionals Available Now!

Rural Domestic Preparedness Consortium  Fire Service Professionals Available Now! Enroll in a course today.  Emergency Management No fees! No cost! Professionals Coming Soon!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

For more information please visit www.preventivestrategies.net or www.ruraltraining.org

22 The Counter Terrorist ~ April/May 2013 Circle 265 on Reader Service Card motorcycle was employed in the attack, the device on before speeding away just the aggressor obtained an overall success prior to detonation. The remaining three rate, meaning the target was killed, 89 attacks studied were by suicide bombers percent of the time. In 89 of the attacks, who pulled alongside the target and the target was an unprotected individual, triggered the device. who may or may not have been armed In terms of temporal characteristics, (22 of the victims were law enforcement, the vast majority of M/C based attacks military, or intelligence officers who may occurred during the traditional work have had access to weapons). In those week of Monday through Friday when instances, the victim was murdered 88 potential targets are moving within their percent of the time. Surprisingly, those occupational routine. While there was an 28 individuals in “protected status” faired average of 21 attacks per day, Monday even worse. In those attacks, the M/C hit accounted for the most with 26 percent team achieved success 93 percent of the of attacks. Only 9 percent of all attacks time. occurred during a weekend, which is of The use of explosives by M/C hit note as many individuals do not tend to teams is rare, accounting for only follow an identifiable routine on those eight documented cases. Five of these days. (including the last three) took the form The timing of these attacks also of parasitic attacks against the target. corresponded with the occupational In these cases, the M/C team rapidly routines of the targets. Most were focused approached the target vehicle and slapped upon the times of travel between the residence and work locations. Attacks

Halogen, HID, LED, Infrared, Thermal

Permanent, Portable & Handheld Units Remote Control or Fixed Units Industry Leading Warranties

308.278.3131 www.golight.com [email protected]

Circle 285 on Reader Service Card The Counter Terrorist ~ April/May 2013 23 between the hours of 0600 and 0900 accounted for 43 percent of the known times. Attacks between the hours of 1700 and 2000 had the next highest rate of frequency with 26 percent. The M/C-based attacks were perpetrated against mobile targets, i.e. those moving in motorized vehicles, 65 percent of the time, with pedestrian targets making up the remaining 35 percent. In those attacks against mobile targets, the majority occurred while the vehicle was moving. In many of these cases, the M/C team merely pulled alongside of the target vehicle and opened fire. However, in some instances, the assassins waited for a more opportune moment when the target vehicle was either stuck in traffic or stopped at a traffic intersection, thus limiting escape options. Perhaps the best example of this occurred on June 8, 2000, in Athens, Greece, when two members of the November 17 communist terrorist organization assassinated British General Stephen Saunders while he was traveling to his office at the British Embassy.4 As Circle 29 on Reader Service Card Gen. Saunders became stuck in morning rush hour traffic (caused in part by a traffic intersection), the M/C team pulled alongside and opened fire with a .45 caliber pistol. Attacks on pedestrian targets were found to often take advantage of the victim’s vulnerability while they moved between the car and either the home or office. In addition, in many cases, the victim was in the process of either exiting or entering the vehicle at these locations, putting them at even further disadvantage. The zones between the door of a structure and a vehicle tend to be flat, open areas with minimal potential options of cover for the target, and maximum maneuverability options for the adversary. With the high percentage of attacks against a mobile target in a vehicle, the angle of approach the M/C hit team will logically take is from the rear. While in some cases the shooter fired through the back window, most pulled alongside the targeted vehicle, either right or left side, before pulling the trigger (this was also

24 The Counter Terrorist ~ April/May 2013 Circle 131 on Reader Service Card Multiple-Assault Counter Terrorism Action Capability ® TM SSI SWAT MACTAC CT OPS The Newest, Most Dynamic ® EXPLOSIVE Training Program from SSI . THREAT MITIGATION COURSE The Most Complete CT Training Available.

MACTAC is the new tactical philosophy offering your department and agency Learn from the Experts: training for an extremely flexible and • Terrorist Risk Assessments scalable response to any Active Shooter • Middle East Operational Debriefs—Improve Entry Methods situation while maintaining the ability to • Secure Search Techniques for Structures respond to additional attacks. • Multiple Breach Points and Advanced CT Tactics Tiered for full-spectrum training • Terrorist Hostage Rescue of your department personnel to • Suicide Terrorist Vehicle Interdiction meet multiple challenges. • Containment and Call-Out for Counter Terrorism Ops • Explosive Lab Interdiction in Urban Areas • MACTAC Officers Course • Explosive/IED Threat Mitigation in Structures • MACTAC Leaders Course • Command, Control and Planning Issues • MACTAC Instructors Course

Call to register for our next program: Call to register for our next program: Camp Blanding, Florida Camp Blanding, Florida

LEARN MORE at: www.homelandsecurityssi.com Call now for more information. ® SECURITY Phone: 866-573-3999 SOLUTIONS Fax: 866-573-2090 INTERNATIONAL ® [email protected] Protecting the Homeland Together The Counter Terrorist ~ April/May 2013 25 Circle 228 on Reader Service Card SSISSI surveillance detection, and operational security methodologies. As a result of that diligent practice, you detect the presence of a motorcycle approximately 100 meters behind you. You are aware there are a number of attacks that made use of a motorcycle in the past with lethal effectiveness, but is this particular motorcycle a threat, or are they just one of the millions of people heading to work? Are they surveilling you for some future event, or are they trying to position themselves for an imminent attack? More importantly, what are your immediate options to counter this potential hostile threat? When facing a possible motorcycle hit team, there are essentially four items of interest: the • Riding tandem case • Manner of dress in all of • Manner of riding the attacks • Location employing Of the 117 attacks researched, 89 explosives). As percent had two riders at the time. The such, the victim commonality or rarity of a tandem ridden was in a position to motorcycle is likely dependent upon detect the presence of the the region of the world and topology. hostile adversary, even if just In an effort to quantify, or what the US momentarily, prior to the attack. Marine Corps refers to in their teaching of Combat Profiling as “obtaining a Attack Recognition baseline,”5 an informal study of tandem Consider the following scenario: You ridden motorcycles was conducted in are on your way to work, commuting San Jose, California, the tenth largest city amongst the masses. Realizing you in the United States, over a four-week could be a target as a result of your period. During the one-hour commute job, you practice situational awareness, in the morning and evening of the Are You Protected? We protect you from Tasers, Fires, Knives & Stun Guns. BULLET PROOF CARRIERS guardian series multi-threat (Exclusively thru Point Blank Enterprises) protection uniforms Ÿ Electro Shock Weapon protection Ÿ Electro Shock Weapon (i.e. Taser) Ÿ Light Weight and Machine Washable Ÿ Cut/ Slash protection and Fire/Flame protection Ÿ Electro Static Discharge protection Protector Series multi-threat Connector Series Gloves protection gloves Ÿ Electro Static Discharge Ÿ Electro Shock Weapons (i.e. Taser) Ÿ Smartphone and Ÿ Cut/ Slash protection Touchscreen enabled Ÿ Fire/Flame protection CALL Ÿ Neoprene and Leather Ÿ Tear/Bite protection Ÿ Anti-Microbial protection NOW! Duty styles Ÿ Smartphone and Touch Screen enabled 877.562.1935 www.ThorShield.com [email protected] G-Squared Consulting LLC 3819 S. Evans Blvd. #306 Tucson, AZ 85714

26 The Counter Terrorist ~ April/May 2013 Circle 97 on Reader Service Card traditional work week, the total numbers usually driving in a similar fashion, trying Of the 117 attacks of motorcycles traveling on the roadways to get to their respective destinations in were counted along with the number that the shortest amount of time. Motorcycle researched, 89 had two riders.6 riders—the legitimate ones—are no The outcome of that study revealed different. They are moving with purpose percent had two that the daily average encountered was in a designated car pool/motorcycle lane, fifteen. normal traffic lanes, or splitting lanes, riders at the time. The Motorcycles with two riders were usually at a consistent speed. commonality or rarity discovered to be a rarity, with the Finally, the location you find yourself average plummeting to only once a in when the M/C has been detected is of a tandem ridden week, all of which occurred during the the last indicator. Unfortunately, until evening commute and while traveling you see a weapon, you will probably not motorcycle is likely upon a major highway. Armed with have any confirmation of hostile intent dependent upon the this information, any tandem ridden and thus are legally and perhaps morally motorcycle detected while commuting in prevented from taking any overt or region of the world the San Jose area could be viewed with aggressive action. suspicion until proven otherwise. and topology. Another indicator is the manner in Conclusion which the motorcycle is being ridden. As The purpose of this article is to with the majority of society, during the promote awareness. The majority of us morning and evening commute times, will never face such an attack. If you the goal is to get to work, home, or some practice situational awareness, you will other frequented location (gym, children’s see ghosts. Motorcycle riders are going school, etc.). This means everyone is to make moves that are indicative of a

Circle 83 on Reader Service Card The Counter Terrorist ~ April/May 2013 27 presents: Human possible attack, all the while the rider will Facilities be oblivious of the signature his actions GEOGRAPHY WEST are putting forward. This is okay as long 2013 as you are aware it is occurring. Use these Maintaining Public Safety and times to think through your actions. Geospatial Intelligence Focus Day: Accountability Despite Decreasing Budgets May 6, 2013 What options are available to you in that Main Summit Days: May 7-8, 2013 June 17th – 19th, 2013 | Denver, CO instant? However, if you are ever unlucky Washington, DC enough to find yourself under this Get military news, product deals and benefit LEARN AND BENEFIT FROM: resources straight to your inbox Innovative New Focus for 2013 type of attack, you must act decisively. • Dedicated networking event for Motorcycle hit teams are agile, but they • Uncovering future the Western states technological capabilities are also the most vulnerable vehicle on for Human Geography • Featuring prison experts with proven solutions to the greatest the road. Let your controlled rage course • Deploying new and innovative problems facing prisons and through your body as you go on the training techniques correctional facilities attack. Even if you are shot, breathe, keep It’s our mission to serve those who • Implementing next gen Human Geography methodology • Discover how the Federal, State, moving, and never quit. and Private prisons plan to cope • serve our country, and stand as a • Emphasizing the role of with mounting budget reductions Female Engagement Teams and increasing prison populations about the author resource to the world’s best. Whether Mr. McGovern has served in SWAT, • Optimizing budget effi ciency The Coast Guard spends much A US soldier captured a gunfight, SAVE 20% OFF more time thinking about how to When you leave the military, your in which he was shot four times, keep ships from sinking, than it mind is usually filled with a range with Taleban insurgents on a while improving our prisons JTTF and Protective Operations. He does about how to sink them. of emotions. There’s joy over your camera attached to his helmet. Standard fees with discount you’re active military, reserve, veteran, newfound freedom. code CTM_GEO when you register and corrections systems is the author of Targeted Violence by Friday, April 19, 2013 SAVE 20% OFF (CRC Press, April 2010) and Protective family or supporter - become a part of TWO EASY WAYS TO REGISTER: Standard fees with discount code CTM_WEST Operations (CRC Press, April 2011). when you register by Friday, May 24, 2013 Product Video Library Call: 1-800-882-8684 Find out how to simultaneously TWO EASY WAYS TO REGISTER: search vast public and proprietary Email: [email protected] the newest military community online. records Call: 1-800-882-8684 | Email: [email protected] Endnotes 1 www.humangeographyevent.com www.PrisonsCorrectionalFacilities.com “Top West German Prosecutor Murdered,” The St. Petersburg Times, Circle 113 on Reader Service Card Circle 293 on Reader Service Card April 8, 1977, page 11A. 2Ashraf Al-Muraqab, “Motorcyclists Assassinated 40 Soldiers and 4 Civilians in 2012,” The Yemen Times, January 3, 2013, www.yementimes.com/en/1639/ news/1810/Motorcyclists-assassinated-40- soldiers-and-4-civilians-in-2012.htm. March 25-28, 2013 | Detroit, MI 3Juan Carlos Llorca, “Guatemalan Exclusively designed for members of US and Police Raid Hitman Training Camp,” Securing Sensitive Networks Canadian Border Management and Security! Associated Press, March 27, 2009, Through Collaboration and Technology http://www.boston.com/news/world/ June 24-26, 2013 FEATURING DETAILED latinamerica/articles/2009/03/27/ Washington DC Metro Area DISCUSSIONS ON: guatemalan_police_seize_500_grenades_ In-depth discussions will cover: in_raid/. • Transportation: Cargo and 4 • First-hand Cyber perspectives, David Graves, Paul Anast, and container security challenges and initiatives from the Ben Fenton, “Fury as Terrorist Kill Air Force, Marine Corps, Army, • IT Interoperability: Cross border Envoy,” Telegraph, June 9, 2000, www. Department of Homeland Security communication and data sharing telegraph.co.uk/news/worldnews/europe/ and more collaboration • Improving Real-Time Response to greece/1341819/Fury-as-terrorists-kill- Cyber Attacks • Unmanned Systems: Securing envoy.html. Benefits Career Advice News Products our Waterways • Security and ROI–Creative Security 5For further information on Combat Funding Videos Forums Education • Unique Policy Updates and Profiling, see www.combatprofiling.com. Expert Columnists • Cyber Security Threat Intelligence– Conversations: Leading strategists 6 Access and Availability and policy makers The count was conducted by the author and lasted four weeks beginning • Pacifi c Northwest focus and SAVE 20% OFF in mid October through mid November. Standard fees with discount code CTM_CYBERD perspective: Focused on Port and when you register by Friday, May 24, 2013 Maritime Security This allowed for a variety of weather TWO EASY WAYS TO REGISTER: • And much more! patterns, from hot to wet and cold, as Call: 1-800-882-8684 | Email: [email protected] well as the yearly time change, to be ENLIST AT MILITARY1.COM! incorporated into the study. www.humangeographyevent.com www.BorderManagementSummit.com

Circle 148 on Reader Service Card Circle 115 on Reader Service Card 28 The Counter Terrorist ~ April/May 2013 Get military news, product deals and benefit resources straight to your inbox

It’s our mission to serve those who serve our country, and stand as a resource to the world’s best. Whether

The Coast Guard spends much A US soldier captured a gunfight, more time thinking about how to When you leave the military, your in which he was shot four times, keep ships from sinking, than it mind is usually filled with a range with Taleban insurgents on a does about how to sink them. of emotions. There’s joy over your camera attached to his helmet. you’re active military, reserve, veteran, newfound freedom. family or supporter - become a part of

Product Video Library Find out how to simultaneously search vast public and proprietary the newest military community online. records

Benefits Career Advice News Products Videos Expert Columnists Forums Education

ENLIST AT MILITARY1.COM!

Circle 335 on Reader Service Card The Counter Terrorist ~ April/May 2013 29 V CRAFTED BY EXPERIENCE... SSI’S VICTORY BOOT. www.ssitacticalgear.com

Authorized Dealer

30 The Counter Terrorist ~ April/May 2013 Circle 291 on Reader Service Card Victory!

O ne the most famous weapons in the world isn’t a IED’s, and any other obstacles that got in their way. weapon at all. Going back to the Han They crafted the Victory to withstand the rigors of Dynasty eight centuries ago and on through the kicking through doors and windows to get the bad Roman Empire, World War II and right up to present guys; accomplish the mission; come home safe and day, one of the decisive factors in victory on the never be defeated by anything. battlefield or in special operations has been none The Victory can now be yours through SSI Tactical other than the lowly boot. Without good boots, Gear. military disasters have frequently occurred. Using top quality components that are made in Take for example, Hitler’s campaign “Barbarossa” the United States of America including Velcro® or Red Beard, where the biggest invasion in history safety fasteners, 3M Thinsulate® and YKK (four million German soldiers along a front that was Zippers®, SSI’s Victory Boot is rugged as it is 2,900 miles wide) invaded Russia. The Germans flexible. With a composite toe and anti-puncture didn’t count on the invasion lasting until winter. sole it is customized to give you the traction you There on the outskirts of Moscow, exhausted German need on any surface. 1,000 Denier Nylon Cordura® soldiers that had been marching up to 12 hours with its breathable, antibacterial lining gives you a day, found themselves facing winter with light full weather resistance. Genuine leather and water summer boots. Their feet were soon devastated by the repellence completes the boot’s durability and freezing Russian cold, or what they called "General performance. Winter." They were ultimately defeated by ice. In tough times for budgets in departments across So, when SSI Tactical Gear set about designing the country, you can get the Victory for 30% less the best boot for combat for law enforcement and than any other competitive product that is made military personnel, they used the experience they in America—quality and durability that exceeds have as the leading trainners for SWAT and Special footwear our well-known competitors make in Operations teams around the world. This real-world China or in Asia— and still beats their price. experience led to a boot design that would protect The Chinese may have known how to make good warriors in any conditions. A boot warriors could boots eight centuries ago, but today, only SSI fight in over glass shards, sharp metal shrapnel from Tactical Gear leads to Victory.

Call now to get agency or distributor pricing. 1-786-573-3999 ext 113, 305-401-6906, 305-302-2790. www.ssitacticalgear.com

Circle 291 on Reader Service Card The Counter Terrorist ~ April/May 2013 31 Honor-Crime in North America

By M. Zuhdi Jasser and Raquel Evita Saraswati

CounterThe

32 The Counter Terrorist ~ April/MayFebruary/March 2013 2013 A Muslim woman. Photo: Muminah billah Noor Al-Maleki was a popular, spirited 20-year old Muslim woman. At school, she was known to be fun- loving and independent. At home, she lived under her father’s iron fist, followed endless rules, and was responsible for taking care of her six younger siblings. After years of withstanding abuse and resisting a forced marriage, Noor ran away.1

n October 20, 2009, the rock-solid case presented by the and similar operatives. However, Noor’s father, Faleh Al- prosecution. Where did this happen? Not genuine counterterrorism efforts must OMaleki, waited for his daughter outside in Al-Maleki’s native Iraq, but in Arizona. look beyond the isolated symptom of a government building. Fueled by rage, At least 5,000 girls and women lose politically inspired “violent extremism.” Al-Maleki directed his car toward his their lives in “honor killings” every year.3 Islamism, or political , is an daughter and her friend, accelerated, Noor’s case was certainly not the first all-encompassing ideology in which and struck them both. Noor was killed. in the West, and it wasn’t men committed to a supremacist Al-Maleki spoke candidly about having the first in the United States. interpretation of Islam invoke their killed Noor to protect his “honor,”2 In our national strategy against version of Islamic jurisprudence (shariah) cleansing his reputation with her blood. “terrorism,” we have for too long in society. Political Islam brings with it a For some reason, he was not charged focused narrowly on Islamist terrorism litany of pathologies, not just militancy. with premeditated murder, despite committed by groups like al Qaeda

The Counter The Counter Terrorist Terrorist ~ February/March ~ April/May 2013 33 Acid attack victim. Photo: Sand Paper Counterterrorism specialists must through honor-based abuse and violence. understand that every layer of society While honor violence occurs in multiple The price paid is affected by Islamic supremacism. religious and cultural communities, Terrorism as we know it strikes out in the majority of honor killings we’ve by women and the public and is thus addressed on many become aware of in the United States levels—including what is now the largest have been committed within the Muslim girls often goes agency in the US government—the community. unnoticed. At its Department of Homeland Security. No While these crimes are not sanctioned part of society is spared from the ravages by Islam as a personal faith, “honor worst, Islamism of Islamism. The Muslim family unit culture” is fostered by the totalitarian probably suffers the most, yet gets the ideology of political Islam, or Islamism. manifests within the least attention from any government or Islamism doesn’t recognize the value of family unit through media outlet. We believe ignorance and the individual, and misogyny thrives political correctness are two core reasons wherever it is found. To Islamists, the honor-based abuse for this. subjugation of women through the The price paid by women and girls control of dress, behavior, and sexual and violence. often goes unnoticed. At its worst, expression is a divine mandate. Because Islamism manifests within the family unit Islamism is a political ideology, it is

34 The Counter Terrorist ~ April/May 2013 Reconyx HyperFire security series cameras are designed for quick and easy deployment in areas where no power or communication lines exist. • Motion activated trigger as fast as 1/10th of a second. • Completely weatherproof housing designed for • 1080P High Definition color images by day, NoGlowTM Covert extreme duty usage. Infrared illumination by night. • General surveillance and license plate capture • Compact size (5.5” x 4.5” x 3”) aids in concealment. models available. No • On-board memory and power with a battery life of up to one • Made in the U.S.A. Glow CCovertovert year or 40,000 images. IInfrarednfrared

Visit www.reconyx.com for more information.

Circle 303 on Reader Service Card

Circle 81 on Reader Service Card The Counter Terrorist ~ April/May 2013 35 able to fortify misogyny within the when there is fear of behavior that social interactions, promiscuity, or culture by engaging both those who hasn’t yet occurred.4 Cases of honor homosexuality, especially if the child has identify as religious and those who do violence—beatings, torture, physical been abused by an adult of the same sex. not. In short, it is a malignant brand mutilation, and “corrective rape,” as well Perpetrators and potential perpetrators of tribal or familial politics masked as honor killings—have been carried of honor-based violence demonstrate an in piety—targeting women as public out against women who are perceived obsession with sexuality, often marked by enemy number one. As cases like Noor’s to be “too Western,” who are seen or the insistence that they are surrounded continue to come to light, it is imperative suspected of speaking with members by immoral behavior that threatens their that we recognize these tragedies as of the opposite sex (including phone traditional belief system. Behaviors seen warning signs of a deeper common communication, social media interaction, by the larger society as perfectly normal problem of radicalization, and an urgent and text messaging), who are suspected and non-sexual such as the wearing of need for reform. of dating or socializing with men, and t-shirts, participating in a co-ed study Honor violence is a specific form of so on. In some of the most extreme group at school, etc.—have fed some domestic and community violence, in cases, victims of rape and other sexual individuals’ obsessive and irrational which its victims, predominantly women, assault are murdered because they are fixation on sex and sexuality. are targeted due to a perceived sexual seen as sexually impure.5 This includes Perpetrators of honor-based violence or social indiscretion, often involving sexual violence and abuse carried out often engage in surveillance of their the opposite sex. In honor violence, the by family members, who may kill the victims, including spying on the victims’ family, often with the help of members victim to both destroy evidence of their phone calls, text messages, mail, and of the larger identity group, punishes or crime and to clear their own reputation. internet communications; following kills the victim as a way to “cleanse” the This is regularly characterized by a the victim to school, work or social reputation of the family and/or identity perpetrator accusing a family member activities; having community members group. (a son or daughter, niece or nephew) of (including siblings and other family) spy In some cases, honor violence occurs sexual indiscretions, indecency, improper and report on the victims’ behavior and relationships, etc. We classify individuals who participate in this behavior as perpetrators of honor-based crime (rather than as potential perpetrators) because these behaviors constitute emotional and psychological abuse in themselves. It may seem unlikely to many Americans that some individuals who come to the United States by choice, and who clearly engage aspects of American society (including professional and academic environments) without a problem would commit an honor killing. Unfortunately, honor violence and honor killings are occurring with increasing frequency in the United States,6 and while the perpetrators are of varied national and cultural origins, the warning signs are nearly always striking in their similarity. It must be recognized that for every one girl who pays the ultimate price—her life—due to honor violence, thousands, if not more, are more subtly victimized by a culture which ostracizes and marginalizes women who choose to behave independently from the mores of their family or “tribe” in the United States. This marginalization can manifest

307 36 The Counter Terrorist ~ April/May 2013 Circle on Reader Service Card A veiled Muslim woman makes her way through an Astoria, Queens neighborhood in New York City. Photo: russavia

The Counter Terrorist ~ April/May 2013 37 of Buffalo’s “Bridges TV,” a television network meant to increase understanding and cooperation between and those of other faiths, was able to justify the brutal beheading of his wife, Aasiya Zubair, in 2009. On February 12 of that year, Hassan stabbed Ms. Zubair as many as 40 times, severing her head.7 Three days prior to the killing, Ms. Zubair had dared to seek a divorce in the United States and had filed the necessary paperwork. Hassan had been served with an order of protection and divorce papers citing “inhumane treatment and ongoing abuse.” Ms. Zubair’s sisters reported that she had spent eight years of marriage “living in fear,” and that she had once visited them requiring $3,000 in treatment for injuries inflicted by her husband.8 She was reportedly terrified of leaving Hassan, and had rightfully feared for her life. Muzzammil Hassan came to the United States from at the age of 17, received his MBA at the University of Rochester, and went on to become a well-known leader who claimed to seek a more harmonious relationship A picture of the Islamic prophet Mohammed, along with Buraq and Gabriel, visit Hell, and between Muslims and non-Muslims in see a demon punishing “shameless women” who had exposed their hair to strangers. For this a post-9/11 America. Why would this crime of inciting lust in men, the women are strung up by their hair and burned for eternity. supposedly modern and integrated man Persian, 15th century. be so controlling and vicious? The answer is that to men like Hassan, one can enjoy the pleasures of a modern life whilst retaining the misogyny of honor culture. To Hassan, Ms. Zubair was not an equal through abandonment, bullying, and partner, entitled to happiness, freedom, psychological abuse. We believe that and safety. She was his property. Any Muslim girls are often psychologically expression of independence or autonomy Women are spied tortured in a community conspiracy, with regard to her body was a direct which leaves them empty and with few threat to his “honor” —which he valued on, stalked, lured into choices despite living in the United above life and law. States. Yasser Said, an Egyptian immigrant dangerous situations Each case of honor violence has a living in Texas, was a cab driver married story unique to the victim and those to an American non-Muslim woman by family members, who targeted her. Yet each bear the named Patricia Owens. On January 1, and accused of markings of honor-based culture, in 2008, Said shot his two daughters, Sarah which those views and practices deemed and Amina Said, to death in the back of sexual impropriety. “sacred” are placed in higher regard his car.9 Sarah and Amina were 18 and than human dignity and the rule of 17 years old, respectively, and had been law. This is why a man like Muzzammil physically and sexually abused by their Hassan, successful banker and founder father for years. They had finally decided

38 The Counter Terrorist ~ April/May 2013 Photo: Khashayar Elyassi to run away. Their mother, Patricia Witnesses to the family’s relationship Western.” In the eyes of their father, they Owens, appears to have been under say that they heard Owens herself say had succumbed to the “sexually deviant” the influence of Said’s manipulation— that, should the girls return home, their American lifestyle, and deserved to die and lured the girls back home despite father would surely kill them for having so he would not be shamed. To this day, knowing what surely awaited them. American boyfriends and becoming “too Yasser Said is still at large.

Circle 147 on Reader Service Card The Counter Terrorist ~ April/May 2013 39 “No Women” sign at the Marriott Hotel, Jeddah. Photo: Jpatokal

None of these men—Faleh Al- In honor violence, a female member of Maleki, Muzzammil Hassan, or Yasser the family or identity group is punished Said—are especially pious, but they at any point a man feels that his are certainly misogynist supremacists ownership over her body is compromised. who value the tribal code of “honor” Women are spied on, stalked, lured into over human life and US law. According dangerous situations by family members, to their worldview, they are entitled and accused of sexual impropriety. to enjoy the benefits of an American Victims are often too terrified to attempt lifestyle and the refuge provided to leaving—believing that the perpetrator’s them by this country—but the rights family and associates will find them—and and freedoms of the US Constitution may even carry out the killings themselves don’t apply to the women in their lives. to “cleanse” the reputation of the entire As far as men like these are concerned, community. women answer to the men in their While an honor killing is an obvious lives, and men are not just immune crime, it is actually the predictable from punishment, but even glorified endpoint of a pattern of criminal abuse for carrying out these crimes. In many against women and girls. Unfortunately, cases of honor-based violence, the in too many cases of honor violence, surrounding community doesn’t just the abusive parent, relative, or spouse is turn a blind eye to the crime, but even able to continue abusing the victim for endorses it.10 It is believed that Yasser months or years, until it is too late. In Said has evaded arrest for so long with the case of Sarah and Amina Said, for the assistance of others in the Iraqi example, friends of the girls reported that community. they’d show up to school with “welts and It is important to recognize that bruises,” and that the girls had spoken honor killings do not happen on a of numerous threats their father had whim—they usually follow years of made against their lives. Yet, no one psychological, emotional, physical, intervened on the girls’ behalf, perhaps and often sexual abuse of the victim. because people considered such extreme

Circle 343 on Reader Service Card 40 The Counter Terrorist ~ April/May 2013 Circle 279 on Reader Service Card The Counter Terrorist ~ April/May 2013 41 of secrecy raised whenever a matter is male dominated, oppressive, and insular. justified by religion or culture. Marital Where Islamism seeks global domination rape, spousal abuse, and forced marriage through a misogynistic legal system, While imams and are other radical practices clearly in “honor culture” achieves this on a micro violation of American law and universal level. community leaders human rights—which continue in insular The silences around honor-based communities protected by conspicuous violence and the intimidation of those do at times speak silence. who speak out against it are similar to the out against these Sadly, the rest of society looks at reaction of Islamists to honest discussion these human rights crises as internal of radicalization within our community. atrocities, all too matters about which they have no say. Islamists threaten, bully, and intimidate As Muslims, we cannot help but look their critics both abroad and here in often discussion of upon such avoidance and blinders as the United States. Honest discussion of honor and gender- “the soft bigotry of low expectations,” honor-based violence and the problem This bizarre respect for “other” cultures of radicalization within the Muslim based violence is even when it tramples over the human community both result in accusations rights of women actually contributes to of “Islamophobia,” bigotry, racism, and met with hostility and a culture of impunity on our own soil. “selling out.” Figures from the Council on In the well-intentioned attempt to avoid American Islamic Relations (CAIR), the condemnation of disrespecting culture, they are saying Muslim Public Affairs Council (MPAC), the person speaking that Muslims—both women and men— the Islamic Society of North America deserve no more than the brutality of the (ISNA), and others repeatedly downplay against the violence, worst in our community. the threat of radicalization and gender- While the majority of Muslims based violence within our community, rather than against condemn these practices, the simple fact claiming that to discuss these inspires the attacker. is that they would not continue at the anti-Muslim hatred and violence. rate they do without the support of a For example, when 32-year-old Shaima powerful minority and the inaction of Alawadi was murdered in California too many. While imams and community in March 2012, many of these groups leaders do at times speak out against immediately came out to condemn it these atrocities, all too often discussion as a hate crime committed by a bigoted of honor and gender-based violence is non-Muslim, despite signs that it could treatment of girls as “cultural,” and didn’t met with hostility and condemnation have been an honor killing or other feel that it was their place to attempt to of the person speaking against the type of familial foul play.12 Anyone help them. This cultural relativism and violence, rather than against the attacker. who questioned these groups’ theories political correctness, combined with This reveals a deep and urgent need for about Ms. Alawadi’s untimely death was the demonstrably fatal nature of honor reform within the Muslim community to demonized and called an Islamophobe. culture, ultimately costs women and girls address the core of radicalism of all kinds: CAIR and other so-called Muslim civil their lives. It also provides radicals with Islamism, or political Islam, as well as rights groups equated Shaima’s plight the assurance that if their ideology is tribal and cultural forces that influence with that of Trayvon Martin. Ultimately, cloaked in religion or culture, it will be our communities in a malignant way. Ms. Alawadi’s husband, Kassim Alhimdi, safe from scrutiny. These same forces are those that have was arrested and charged with her death, This trend of “double blindness”—the led to acts of terrorism, threats against confirming our suspicions that this was combined complicity of the community dissidents and critics of Islamism, and likely an honor killing. There were no in which the crime is taking place and human rights abuses of minorities. “mea culpas” to be heard from the media silence from the surrounding culture— Honor-based violence is a byproduct or activists who exploited her death to enables criminal acts like honor violence, of the collectivist mentality of Islamism tarnish Americans as bigots. There were as well as a multitude of other alarming and the direct result of the inherently also no further attempts to expose the practices, to flourish. Female genital misogynist, supremacist nature of pervasiveness of women victimized by mutilation (FGM), for example, occurs Islamism itself. Where honor-based misogynistic Islamist men who believe in the United States,11 and prevention violence occurs, you will find a family they own them. remains difficult because of the curtain unit run like a theocratic fascist unit: When Islamists indoctrinate Muslims

42 The Counter Terrorist ~ April/May 2013 NEW LOCATION Journal for Law Enforcement, Intelligence The & Special Operations Professionals FOR 2013! The Florida Counter Hotel and Conference presents: Center, Orlando 8th Annual Homeland Security Professionals Conference and Exposition November 5-7, 2013 • Orlando, Florida With a sellout in 2012 at the Gaylord Palms you spoke and we listened: • more centrally-located, deluxe hotel • No parking charges • Inexpensive and plentiful alternatives to hotel meals • Internet in the rooms and in the lobby Program for the 2013 Conference: Hot Topics in International Crime & Terrorism • money laundering, Fraud and Counterfeit: Special case studies • Crime, Innovation and the Mexican Border • Syria: new breeding ground for terrorists—lessons learned • Iran’s Terrorist Empire • Cyber Crime and Terrorism • Islamist Economic Warfare • The importance of Counter Intelligence • Cognitive warfare—how to fight it in the USA • Takeaways for the First Responder in fighting International Crime and Terrorism • And More! Register now to get a special This conference is approved for introductory price of only $199.00 graduate and undergraduate credits through Saint Leo University instead of $399.00 (valid only until April 15th, 2013)

LEARN MORE at: www.thecounterterroristmag.com/conference Call now for more information. ® SECURITY Phone: 866-573-3999 SOLUTIONS Fax: 866-573-2090 INTERNATIONAL ® [email protected] Protecting the Homeland Together ~ April/May 2013 43 Circle 177 on Reader Service Card SSISSI The Counter Terrorist to feel victimized rather than empowered Murdering His Americanized Daughter,” 4H AnnUAL to create positive change, they silence Phoenix New Times, April 21, 2011, important and life-saving dialogue about http://www.phoenixnewtimes.com/2011- the most pressing problems faced by our 04-21/news/iraqi-faleh-almaleki-gets- SECURIng THE U.S.-MExICO wITH community today. While we, as American 34-years-in-prison-for-murdering-his- TACTICAL STRATEgIES & TECHnOLOgIES Muslims, are, of course, alarmed by americanized-daughter/. MAy 29 - 31, 2013 • TUCSOn, AZ legitimate evidence of bias crimes against 3Honor Based Violence Awareness Muslims (and individuals of any group), Network, http://hbv-awareness.com/ MEET MICHAEL FISHER, we believe that radicalization in all its statistics-data/. CHIEF, U.S. BORDER PATROL forms can only be solved through the 4Jim Wilkes and Isabel Teotonio,

IDGA’s 4th Annual Border Management Southwest empowerment of Muslims against those “Teen’s Slaying Sparks ‘Honor Killing’ will bring together all relevant stakeholders to discuss most actively trying to silence us against Debate,” The Star,December 14, 2007, the most pressing issues facing the Department the tyranny of Islamism. http://www.thestar.com/news/gta/ of Homeland Security, from efforts to build new partnerships to modernizing security capabilities. Non-Muslims must also recognize article/285589--teen-s-slaying-sparks- the need to join us in combating honour-killing-debate. Gain access to valuable insights, recommendations, 5 and best practices on: abuses of women committed in the Tina Susman and Caesar Ahmed, “In name of religion and culture. These Iraq, a Story of Rape, Shame and ‘Honor • New technologies and applications for behaviors don’t exist in isolation. They Killing,’” Los Angeles Times, April 23, border surveillance, safety and security • Integration of homeland security are symptoms of the cancer that is 2009, http://articles.latimes.com/2009/ intelligence and information sharing radicalism. Like the symptoms of a apr/23/world/fg-iraq-woman23. • Border tactics, training and capabilities possibly terminal illness, to ignore them 6Oren Dorell, “’Honor Killings’ in USA for the DHS, DOD and DOJ is to surrender everything. Not until we Raise Concerns,” USA Today, November • Current and future requirements of U.S. begin to topple the supremacists in our 30, 2009, http://usatoday30.usatoday. Customs and Border Protection own homes, empowering both women com/news/nation/2009-11-29-honor- Policy makers, uniformed service leaders, law and men to reach their fullest potential, killings-in-the-US_N.htm. enforcement and industry partners will gather in 7 Tucson to network, share best practices and explore will we be positioned to defeat the global Carolyn Thompson, “Muzzammil potential paths to fortify the United States border. supremacist threat of radical Islam. • Hassan Convicted of Beheading Wife,” Huffington Post,February 7, 2011, http:// www.BorderSouthwest.com About the author www.huffingtonpost.com/2011/02/08/ muzzammil-hassan-convicte_n_820389. Circle 168 on Reader Service Card Dr. Jasser is the author of A Battle for the Soul of Islam: An American Muslim html. 8 Patriot’s Fight to Save His Faith (Simon Ashley Broughton, “Beheaded & Schuster, 2012) and is president Woman’s Sister: I Might Have Heard and founder of the American Islamic Deadly Confrontation,” CNN, February Forum for Democracy. He also serves as 17, 2009, http://articles.cnn.com/2009- a commissioner on the US Commission 02-17/justice/new.york.beheading_1_ DATA CENTER for International Religious Freedom (the american-muslim-cape-town-south- CONSOLIDATION opinions expressed are his own). africa?_s=PM:CRIME. 9 The Federal IT Revolution: Doing More with Less Ms. Saraswati is an American Muslim Glenna Whitley, “American Girls,” MAy 21-22, 2013 | WAShIngTOn, DC activist and writer whose primary area Dallas Observer, June 19, 2008, http:// www.dallasobserver.com/2008-06-19/ Tackling the Revolutionary Challenges Facing of focus is the rights of women and girls the IT Community in Data Center Consolidation in the Muslim world and in Islamic news/american-girls/. 10Phyllis Chesler, “Are Honor Killings In-Depth DIscussIons wIll cover: communities in the West. Find more of her • Department perspectives on the Federal Data Center work at www.raquelevita.com. Simply Domestic Violence?” Middle Consolidation Initiative: Challenges and opportunities East Forum, Spring 2009,http://www. • Reducing data center energy usage • The persistent need for cyber security meforum.org/2067/are-honor-killings- • Latest advancements in consolidation technologies, Endnotes: simply-domestic-violence. including cloud computing and virtualization 1 Lisa Freed and Jonathan Leach, “Was 11“Female Genital Mutilation in the learn More on the latest InDustry Noor Almaleki the victim of an honor U.S. Factsheet, Equality Now, http:// consolIDatIon solutIons, IncluDIng: killing?” Forty-Eight Hours, September www.equalitynow.org/node/866. • Cloud Computing: Its benefits to consolidation and the security implications 1, 2012, http://www.cbsnews.com/8301- 12Linda Sarsour, “My Take: My Hijab • Virtualization: Allowing for data center sustainability 18559_162-57408082/was-noor- is my Hoodie,”Belief Blog, CNN, April • RDF Stores: Optimizing storage and retrieval of data almaleki-the-victim-of-an-honor-killing/. 5, 2012, http://religion.blogs.cnn. 2 www.DCCEvent.com | Email: [email protected] | Call: 1-800-882-8684 Paul Rubin, “Iraq Native Faleh com/2012/04/05/my-take-my-hijab-is- Almaleki Gets 34 Years in Prison for my-hoodie/. Circle 289 on Reader Service Card

44 The Counter Terrorist ~ April/May 2013 New and improved

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 ® SECURITY or email [email protected] SOLUTIONS INTERNATIONAL Or visit our website: www.SSIPVB.com Protecting the Homeland Together ® Circle 308 on Reader Service Card Circle 226 on Reader Service Card TheSSISSI Counter Terrorist ~ April/May 2013 45 Book Review Shariah Law and American Courts: An Assessment of State Appellate Court Cases

By Center for Security Policy Reviewed by: Chris Graham

ave American officials concerns about state courts citing foreign law provides a legal framework for advanced initiatives that and transnationalist laws and precedents, violence up to and including legalized Hundermine the U.S. Constitution? Have including shariah law. murder against… blasphemers… Shariah any judges considered legal precedents The authors note, “…institutionalized, criminal punishments are extreme, that do not have jurisdiction in the authoritative shariah is comprehensive including amputations and lashings for United States when deciding numerous crimes…” cases? History will likely judge Their document “evaluates these questions to be among published appellate legal cases that the most important of our involved “conflict of law” issues time. The Center for Security between shariah (Islamic law) and Policy studied these questions American state law.” The writers in Shariah Law and American say, “For every case in this sample Courts: An Assessment of State drawn from published appellate Appellate Court Cases (2011). legal cases, there are innumerable The writers observe, “there are cases at the trial level that organizations and individuals remain unnoticed except by the within the United States actively participants. Thus, this report is and openly advocating for only a sample of possible cases—a the establishment of shariah “tip of the iceberg”—of legal cases law in America, especially for involving shariah in local, state personal status and family and federal courts. Our findings law. A prominent one is the suggest that shariah law has Assembly of Muslim Jurists of entered into state court decisions, America1 (AMJA) with more in conflict with the Constitution than 100 members including and state public policy. Some local Imams and shariah commentators have said there are authorities across America, as no more than one or two cases well as shariah authorities from of shariah law in U.S. state court other countries... Given these cases; yet we found 50 significant stated goals of AMJA and similar cases just from the small sample organizations, this study was conducted and by definition without limit in its of appellate published cases. Others state to discover the extent to which shariah ambitions and scope, and it also includes with certainty that state court judges will law had in fact entered U.S. state courts. legally mandated, recommended, always reject any foreign law, including News reports have identified individual permitted, discouraged and prohibited shariah law, when it conflicts with the cases of plaintiffs, defendants or judges practices that are strongly biased Constitution or state public policy; yet citing shariah or Islamic law. Many and discriminatory against women, we found 15 Trial Court cases, and 12 groups and individuals have raised homosexuals and non-Muslims. Shariah Appellate Court cases, where shariah was

46 The Counter Terrorist ~ April/May 2013 found to be applicable in the case at bar. of 50 cases designated Relevant... In Muslims in the United States, and the The facts are the facts: some judges are addition, the cases were also assessed as to rapid rise of political and militant Islam making decisions deferring to shariah whether or not the ultimate decision of globally, the conflict between Shariah law even when those decisions conflict the court was in accordance with shariah law and the Constitution requires a new with Constitutional protections. This is law at both the Trial Court and Appellate level of debate among policymakers, a serious issue and should be a subject Court levels: At the Trial Court level: 22 media, the legal community, and most of public debate and engagement by decisions found that the application of importantly, the American public.” policymakers. With the publication of shariah was at odds with the state’s public The liberty that was born in North this study and subsequent studies now in policy; 15 found shariah to be applicable America in the late 1700’s is an historical preparation, our objective is to encourage in the case at bar; 9 were indeterminate; anomaly. If it is permitted to burn out, an informed, serious and civil public and in 4 cases shariah was not applicable it is unknowable how many generations debate and policymakers’ engagement to the decision at this level, but was will pass before there will be another with the issue of shariah law in the applicable at the appellate level. At the opportunity to win freedom from the United States of America. This public Appellate Court level: 23 decisions found oppression that is the historical norm. debate is more urgent than ever before, that the application of shariah was at We must always be vigilant against as organizations such as the Muslim odds with the state’s public policy; 12 actions that undermine our Constitution. Brotherhood and their salafist coalition found shariah to be applicable in the case Shariah Law and American Courts partners state openly their intent to at bar; 8 were indeterminate; and in 7 contains valuable information for each impose the Shariah State and shariah law cases shariah was not applicable to the of us who has taken the oath to “support as dominant across all Muslim majority decision, but had been applicable at the and defend the Constitution of the countries. trial court level. United States, against all enemies foreign We found an initial sample of The writers conclude, “The topic is not and domestic…” • approximately 150 cases involving shariah new to academics or lawyers; but, with doctrine, which were narrowed to a set an increased presence of shariah-adherent

Bite Suit Reward Balls with Helmet Tug Handles $74.95 3" Ball $12.95 2.5" Ball $11.95 2" Ball $9.95

Hand Protectors E-Collar Holsters $39.95 ea Special Operations $39.95 Harness available in black, coyote or multicam* Has cutouts so the buttons can still be worked while it’s Bite Suit with plastic with metal cobra holstered. Has 2¼" metal clip $1,189.95 buckles buckles on back of holster so it can be $149.95 $199.95 worn on a 2" duty belt or clipped to a MOLLE tactical vest. *with attachments for MOLLE pouches and K-9 camera Muzzles

Follow us on[ $69.95 [

Scan our QR code with your smart phone to view our online catalog. Malinois German Shepherd

YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

Circle 277 on Reader Service Card The Counter Terrorist ~ April/May 2013 47 modern russian special weapons

48 The Counter Terrorist ~ April/May 2013 modern By Eeben Barlow The Cold War witnessed both russian the West and the East increase their research and development special into small arms and associated battlefield technologies. As both weapons sides vied for influence over non- aligned countries in Africa and A young Marine operates an RPD. the Middle East, it was the Soviet small arms that would eventually dominate in these areas.

he African and Middle Eastern Modern Russian small arms and close operating environments are both combat weapons comprise much more Tharsh and unforgiving. It is, therefore, than just the prolific AK-47 and RPG- no small wonder that many African 7 rocket propelled grenade launcher. and Middle Eastern armies opted for These weapons include side arms, assault Russian (or old Soviet-bloc) weapons; rifles, shotguns, grenade launchers, these weapons were unsophisticated, disposable anti-tank and anti-personnel simple to operate, relatively inexpensive, weapons. Designed to fulfil multiple and reliable. They also have stopping missions and roles,3 these weapons are power that equals or exceeds that of well-suited to covert, clandestine, and many Western small arms.1 Their modern conventional operations. counterparts are no different.2

The Counter Terrorist ~ April/May 2013 49 Gsh-18 9mm Pistol This new-generation sidearm was developed as a reliable, compact, and powerful close-quarter weapon. Chambered for the 9mm Para round, the pistol is fed with a double-column magazine. It can also fire the 7N31 cartridge, an armor-piercing round that is advertised as capable of defeating Level 2 body armor. To enable left- and right-hand shooting, the magazine release is accessible on both sides of the frame. Weight-reduction is achieved with the use of composite materials. It can be fitted with a lasers or light accessories. Caliber (mm)...... 9 Cartridge...... 9x19 Para/7N31 Effective rate of fire (rds/min)...... 36 Effective range (m)...... 50 Weight without magazine (kg)...... 0.48 Weight of empty magazine (kg)...... 0.09 Magazine capacity...... 18 Muzzle velocity (7N31 AP cartridge) (m/s)...... 535 –570 Gsh-18 9mm Pistol Dimensions...... 183 x 133 x33

Yarygin PYa 9mm Pistol Chambered for the 9mm Para cartridge, the Yarygin pistol was developed to provide a reliable blow-back operated sidearm. The pistol can also feed the 7N31 9mm armor-piercing cartridge. It operates in either single- action or double-action mode. Caliber (mm)...... 9 Cartridge...... 9x19 Para/7N31 Effective rate of fire (rds/min)...... 36 Effective range (m)...... 50 Weight without magazine (kg)...... 0.95 Weight of empty magazine (kg)...... 0.12 Magazine capacity...... 18 Muzzle velocity (7N31 AP cartridge) (m/s)...... 535 –570 Dimensions...... 195 x 140 x38

Yarygin PYa 9mm Pistol

Kedr 9mm Sub-Machinegun The 9mm Kedr sub-machinegun is a mass-produced, close- quarter weapon designed for use in confined spaces or for covert concealment. It is fitted with a stock that folds up and over the receiver and can be employed semi or full auto. It is designed to accommodate suppressors and lasers. Caliber (mm)...... 9 Cartridge ...... 9x18 PM Cyclic rate of fire (rds/min)...... 800–1000 Effective range (m)...... 100 Weight without magazine (kg)...... 1.40 Weight with loaded magazine (kg)...... 1.82 Muzzle velocity (m/s)...... 310 Length, butt extended (mm)...... 540 Length with butt folded (mm)...... 310 Magazine capacity (rds)...... 20 or 30 Kedr 9mm Sub-Machinegun

50 The Counter Terrorist ~ April/May 2013 AEK-919K Kashtan 9mm Sub-Machinegun The Kashtan is a lightweight, compact, recoil-operated 9mm sub-machinegun developed as a self-defence weapon for special operations forces. The weapon combines both metal and plastics with a cold-stamped receiver, a radial-forged barrel, and a high-impact plastic frame and pistol grip. An adjustable rear sight ranges from 50m to 100m. The SMG has a telescopic butt with a swivel heel. Ammunition is fed via a double-stack box magazine. The Kashtan can be fitted with a suppressor, a laser, or a collimator sight/occluded eye sight (OEG).

Caliber (mm)...... 9 Cartridge types...... 9x18 PM effective rate of fire (rds/min)...... • Single shot (rds/min)...... 40 • Bursts (rds/min)...... 100 Maximum Effective range (m)...... 100 AEK-919K Kashtan 9mm Sub-Machinegun Weight with empty magazine (kg)...... 1.68 Weight with loaded magazine (kg)...... 2.02 Muzzle velocity (m/s)...... 315 Length, butt extended (mm)...... 610 Length with butt folded (mm)...... 360 Magazine capacity (rds)...... 20 or 30

PP-2000 9mm Sub-Machinegun Caliber (mm)...... 9 The PP-2000 is a 9mm sub-machinegun that was developed Cartridge type...... 9x19 armor-piercing for special applications. It is currently in service with the Russian Fire mode...... Single-shot/automatic Interior Ministry. Firing the 9 x 19mm armor-piercing round, it Effective rate of fire (rds/min)...... 600–800 is advertised as capable of penetrating Class 2 body armor, soft- Maximum effective range (m)...... 200 skinned vehicles, or light cover. Weight with empty magazine (kg)...... 1.40 The generous use of high-impact plastic has resulted in a Weight with loaded magazine (kg)...... Approx 1.92 decrease in weight whilst simultaneously increasing its resistance Muzzle velocity (m/s)...... 550 to corrosion. The PP-2000 can be fitted with a suppressor (and a Length, butt extended (mm)...... 555 flash suppressor). Length with butt folded (mm)...... 340 Magazine capacity (rds)...... 20 or 44

PP-2000 9mm Sub-Machinegun

The Counter Terrorist ~ April/May 2013 51 AM (SR3) Assault Rifle (9 x 39mm) The AM (SR3) assault rifle was designed for use by special Caliber/cartridge...... 9 x 39mm SP-6 operations forces and airborne and mechanised infantry, allowing Muzzle velocity (m/s)...... 290 the soldiers to engage enemy infantry wearing body armor, as well Effective range (m)...... 200 as soft-skinned vehicles with the SP-6 round. The SP-6 round is effective rate of fire (rds/min)...... designed to penetrate two 1.4mm thick titanium plates, as well as • Single shots...... 30 Kevlar body armor (30 layers) at 100m. • Bursts...... 90 A specially-designed, ricochet-reduced round allows the weapon Weight with empty magazine (20 rounds) (kg)...... 2.1 to be used in confined spaces. The weapon utilises a folding butt Length with butt extended (mm)...... 640 that folds over the receiver cover when not in use. The AM (SR3) Length with butt folded (mm)...... 396 is fitted with iron sights graduated for 100m and 200m ranges Magazine capacity (rds)...... 10 or 20 and can be used when the butt has been folded over the receiver.

AM (SR3) Assault Rifle (9 x 39mm)

SR.3M Assault Rifle (9 x 39mm) Caliber/Cartridge 9 x 39mm SP-6 and SP-5 The SR.3M is a variant of the AM SR3 assault rifle. The 9 x (sniper round) 39mm cartridge (SP-6) allows the firer to engage enemy infantry Muzzle velocity (m/s)...... 295 and soft-skinned vehicles. The SP-6 round may defeat CRISANT effective range (m)...... NATO-type body armor at a range of up to 400m. The weapon • With iron sights...... 100–200 has a collapsible fore grip and removable suppressor. The SR.3M • With PSO-1M2-1...... 400 uses sub-sonic ammunition to reduce both muzzle flash and noise • With NSPU-3...... 300 when suppressed. Effective rate of fire (rds/min)...... 900 The weapon can be accurately fired using its own iron sights Weight without silencer and magazine (kg)...... 2.2 with aiming ranges of 100m to 200m. It can also be fitted with Weight of empty magazine (20/30 rds) (kg)...... 0.18/0.34 the PSO-1M2-1 optical sight with an effective range 400m (as Length with butt extended/folded (mm)...... 675/410 depicted in the photograph) or with the NSPU-3 night sight, Magazine capacity (rds)...... 20 or 30 giving it an effective range of 300m.

SR.3M Assault Rifle (9 x 39mm)

52 The Counter Terrorist ~ April/May 2013 MTs-116M Sniper Rifle (7.62 x 54mm iron sights, the rifle can be fitted with various day and night or 7.62 x 51mm) sights. An anti-mirage device is intended to make sighting easier The MTs-116M sniper rifle is based on the MTs-116 sporting in hot temperatures. rifle. The weapon is deployed to engage enemy troops with or without body armor, as well as soft-skinned vehicles and high- Cartridge (mm)...... 7.62 x 54/7.62 x 51 value targets. The rifle is a manual, bolt-action loaded rifle and is Effective range (m)...... 600 fitted with a Picatinny rail on the receiver. The stock is adjustable Weight (unloaded) with magazine (kg)...... 6.5 in height and has an adjustable cheek piece. A folding bipod is Barrel length (mm)...... 650 mounted on the shortened forearm grip. A slot flash suppressor Length without muzzle suppressor (mm)...... 1250 is attached to the muzzle. In addition to the standard ramp-type Magazine capacity (rds)...... 5 or 10

MTs-116M Sniper Rifle (7.62 x 54mm or 7.62 x 51mm)

7.62 x 54mm Kalashnikov The KPMG’s accuracy has been improved by reducing thermal Pecheneg Machinegun distortion and the absence of hot air flow by a more rigid barrel. The Kalashnikov Pecheneg machinegun (KPMG) was Cartridge (mm)...... 7.62 x 54 developed as an infantry light machine gun (LMG) to engage Rate of fire (rds/min)...... 600–800 enemy infantry in the open, weapon systems, soft-skinned Belt capacity (rds)...... 100 and 200 vehicles, and low-flying aircraft. Although similarities exist Magazine...... Box with the PKM machinegun, the KPMG features improved Expected service life (rds)...... Approx 25 000 barrel cooling, allegedly making a second barrel redundant. Length (mm)...... 1,2000

7.62 x 54mm Kalashnikov Pecheneg Machinegun

The Counter Terrorist ~ April/May 2013 53 OSV-96 Sniper Rifle (12.7 x 108mm) Caliber (mm)...... 12.7 The OSV-96 is a 12.7mm sniper rifle developed to allow Cartridge...... 12.7 x 108 (sniper) the sniper and his spotter to remain beyond the range of effective range (m)...... conventional small arms while engaging personnel and • Against infantry in the open...... 1,200 equipment. • Against vehicles...... 1,800 The weapon is also intended to monitor border crossing Effective range with night sight (m)...... 600 points, attack small sea or riverine vessels and destroy sea mines. Penetration of 20mm armor plate at 100m (%)...... The OSV-96 is a gas-operated rifle and can fire either the 12.7 Not less than...... 90 x 108mm sniper cartridge or the 12.7mm machinegun round. It Weight without optical sight (kg)...... 12.6 can be fitted with a collimator sight or a night sight. The rifle can Length (mm)...... 1,700 be disassembled into individually packable loads. Length with butt folded (mm)...... 1,300 Magazine capacity (rds)...... 5

OSV-96 Sniper Rifle (12.7x 108mm) Learn.

Prevent. BR-3 BR-5 Defend. BR-6 Prepare for the fight against terrorism on all of its fronts. From the cyberwar to the economic arena to the frontline, Southern New Hampshire University can help you be ready for anything.

• Counterterrorism and Cybersecurity education in SNHU’s Justice Studies programs • More than 180 degree and certificate programs, completely online • Corporate and military discounts for eligible students VANDAL BR-3 Visit snhu.edu/ct to get started on your counterterrorism education.

/ct 800.607.8374 WWW.jntactical.COM

54 The Counter Terrorist ~ April/May 2013 Circle 111 on Reader Service Card Circle 155 on Reader Service Card Penetrating the Night...

Industries, Inc. Adams Night vision/thermal Monoculars, goggles and weapon sights. www.adamsindustries.com [email protected] West: (310) 472-3017 East: (540) 815-1421

Circle 308 on Reader Service Card The Counter Terrorist ~ April/May 2013 55 12.7mm Machinegun Kord with • BS (API) Bipod 6P50-1 • BZT-44M (APIT) The 12.7mm Kord machinegun with lightweight bipod Caliber (mm)...... 12.7 6P50-1 was developed to engage enemy troops, lightly armored Effective rate of fire (rds/min)...... 600–750 vehicles, fortified positions, and low-flying aircraft. The Kord has Effective range (m)...... 2,000 a cut-down butt and, with its lightweight bipod, can be brought Lifespan (rds)...... 10,000 rapidly into action to engage targets. It can also be fitted with Weight without sight (kg)...... 32.6 optical day and night sights. Length of weapon (mm)...... 1,980 The weapon can fire the following rounds: Feed...... Belt • B-32 (API)

12.7mm Machinegun Kord with Bipod 6P50-1

GM-94 Grenade launcher Magazine capacity (rds) ...... 3 The GM-94 grenade launcher was designed to attack infantry Ammunition types...... and other soft targets in the open, as well as behind cover. • Thermobaric...... VGM93.100 The GM-94 is fed from a magazine tube and fires a variety of • Irritant-Gas...... VGM93.200 ammunition types to fulfill multiple roles. These include setting • Smoke...... VGM93.300 fire to bush/buildings, screening from enemy observers, and • Flash/Bang...... VGM93.400 suppressing rioters. The weapon is highly versatile, although it is • HE...... VGM93.500 limited in range. • Shock effect...... VGM93.600 • Inert/Training...... VGM93.700/VGM93.800 Caliber (mm)...... 43 Effective range of fire (m)...... 100–300 Weight (empty) (kg)...... 4.5 Dimensions (stock folded) mm...... 528 x 70 x 196

GM-94 Grenade launcher

56 The Counter Terrorist ~ April/May 2013 ® SECURITY SOLUTIONS INTERNATIONAL Protecting the Homeland Together ® is proudSSISSI to provide the Homeland Security Network with content, operations and administration, and advertising management. If you want simply the best web site to reach the $170 billion dollar Homeland Security market, call us about:

H Homeland Security netwOrk Homeland Security Network addresses the needs of more than three million Homeland Security First Responders by providing training, intelligence, technology, and the latest news reports. The Homeland Security Network offers an efficient, private-industry alternative to the disparate and fragmented sources available at the Federal, State and Local levels. ALL CONTENT IS COMPLETELY FREE.

All members are hand-vetted members of Homeland Security agencies and Homeland Security Professionals. If you want to reach the decision makers, when they communicate with each other call Henry Morgenstern at Homeland Security Network. www.homelandsecuritynet.com

LEARN MORE at: www.homelandsecuritynet.com Call now for more information. 56 Phone: 866-573-3999 • Fax: 866-573-2090 Circle on Reader Service Card Circle 19 on Reader Service Card Circle 19 on Reader Service Card The Counter Terrorist ~ April/May 2013 57 RPG-26 Weight (Kg)...... 2.9 The RPG-26 is a disposable anti-armor rocket launcher. It is an Effective engagement range (m)...... 250 air droppable weapon that fires a 72.5mm High Explosive Anti- penetration (mm)...... Tank (HEAT) rocket. • Homogenous armor...... 440 • Reinforced concrete...... 1,000 Warhead...... HEAT • Brick...... 1,500 Caliber (mm)...... 72.5 • Log and earth...... 2,400

Caliber (mm)...... 72.5 RPG-27 Weight (Kg)...... 2.9 The RPG-27 is a larger and more effective weapon than the Effective engagement range (m)...... 250 RPG-26. It is a disposable anti-armor rocket. Its improved penetration (mm)...... capabilities come with a cost in terms of weight. Like the RPG- • Homogenous armor...... 440 26, the weapon is air droppable. • Reinforced concrete...... 1,000 • Brick...... 1,500 Warhead...... HEAT • Log and earth...... 2,400

RPG-27

RShG-1 Assault Weapon The RShG-1 is a disposable assault weapon. It fires a thermobaric warhead that was developed to attack enemy concentrations in the open, as well as enemy troops hiding ADDRESSING THE CHALLENGES behind field fortifications and OF FUNDING AND INTEROPERABILITY inside buildings. It is also highly effective against soft-skinned and June 24–26, 2013 | Washington, DC Metro Area lightly-armoured vehicles. The Highlights of GIS for Government 2013: thermobaric warhead utilises • Learn from an exclusive lineup of the TOP experts in the considerable blast and shock, fi eld of GIS, as well as leading authorities from a full fragmentation, and incendiary spectrum of government representation: from the Federal, State, and County levels effects neutralizing troops in • Gain unparalleled insight into varied GIS applications, while buildings up to 300m². addressing the need for analysis-oriented and standards compliant systems Warhead...... Thermobaric • Delve into the development and integration of GIS, strengthening your knowledge of LiDAR technology, WebGIS, Caliber (mm)...... 105 ArcGIS, and much more Weight (kg)...... 8.3 Length (mm)...... 1,135 Top Priorities: Effective range (m)...... 200 • Explore emerging initiatives and ongoing programs and projects, as well as address the challenges of funding • Analyze existing systems and issues of interoperability and standardization within geospatial software • Reveal advances in GIS development, and the integration and implementation across various applications RShG-1 Assault Weapon www.GISforGovernment.com 58 The Counter Terrorist ~ April/May 2013 Circle 119 on Reader Service Card Increasing global instability guarantees that many RPO-A, -D and -Z of these small arms and close combat weapons will Rocket Flame find their way into the armories of armies, guerrillas, Throwers terrorists, and criminals. It remains to be seen if any The RPO series of rocket flame of them will displace the AK-47 as the most common throwers was developed to attack firearm on planet earth. • numerous targets. They are in service with mechanised infantry about the author and airborne units as a fire Mr. Barlow is a former special operations officer support weapon. of the South African Defence force. He was the RPO-D: This weapon creates founder of the company Executive Outcomes, and an effective smoke screen to blind eebenbarlowsmilitaryandsecurity blog.blogspot.com. The enemy crew served weapon teams, author is the chairman of STTEP International. He is anti-tank teams, ATGM-teams, the author of Executive Outcomes (Galago Publishing, observation posts, and sniper 2007) and Composite Warfare: The Conduct of positions. Ground Forces Operations in Africa (Dec. 2013). RPO-Z: This system was developed to create fires in Endnotes buildings, concrete, and other 1This is the author’s opinion and is based on structures and open terrain covered several years’ experience in the African operating by flammable vegetation. environment. Caliber (mm)...... 93 2The information contained herein was obtained by Length (mm)...... 920 the author during discussions with Rosoboron staff at engagement range (m) the African Aerospace and Defence Exhibition (2012) • Maximum range... 1,000 3The specifications contained herein were extracted • Effective range...... 600 from the official Rosoboronexport catalogue, 2012. • Minimum range...... 25 Similarly, all photographs were obtained from the Weight (kg)...... 12 RPO-A, -D and -Z Rocket Flame Throwers Rosoboron catalogue. Getting You Where You Need To Be

SEE THE COMPLETE LINE OF MATTRACKS SYSTEMS AT MATTRACKS.COM Karlstad, MN / 877-436-7800 [email protected] toll free US & Canada 218-683-9800 / 218-436-7000 12SM00000206

Circle 297 on Reader Service Card The Counter Terrorist ~ April/May 2013 59 the barrio azteca, los aztecas network

60 The Counter Terrorist ~ April/May 2013 By John P. Sullivan

The US-Mexico border zone is a complex region. Commerce, culture, and crime are linked in a series of complex transactions and connections. Some analysts call it the hyperborder due to its dense human, cultural, and economic interconnectedness. Along this border, 14 sets of twin cities (28 total) link the United States and Mexico.

ach of these bi-national urban Origins of Barrio settings essentially forms a Ebifurcated metropolitan area. People, Azteca/Los Aztecas commerce, and crime on each side of the Barrio Azteca (BA) was founded border are deeply connected. Familiarity in 1986 as a prison gang. Several El and connections provide opportunity for Paso gang members—Benito “Benny” cross-border drug trafficking and crime. Acosta, Alberto “Indio” Estrada, The El Paso-Ciudad Juárez twin cities are Benjamín “T-Top” Olivarez, Manuel home to the transnational Azteca gang “Tolon” Cardoza, Manuel “El Grande” network. The gang is known as Barrio Fernandez, Raúl “Rabillo” Fierro, Azteca in El Paso and Los Aztecas in and José “Gitano” Ledesma—banded Ciudad Juárez. together in the Coffield Unit of the

US-Mexico border. Photo: Tomas Castelazo

The Counter Terrorist ~ April/May 2013 61 Texas Department of Criminal Justice activities. The gang’s hierarchy is designed (Corrections) to protect themselves from to seek profit and territorial control. other prison gangs such as While the gang operates both on the and the , which were at street and in prison, the prison is its war at the time. They became a powerful central authority. Street taxes or “quota” prison gang in their own right.2 Under extracted from drug dealers are funneled the leadership of Eduardo Ravelo, known into prison commissary accounts for BA as “Tablas,”3 the gang morphed into leaders to dispense favor within the prison a comprehensive criminal enterprise system. Coded letters and contraband cell operating on both sides of the border. phones are used for communication with The gang became a hybrid transnational the street and the issuance of the green street and prison gang.4 light (or luz verde) targeting for murder, The El Paso Police Department— or enforcement action, persons not in which has a gang injunction against the good standing with the gang. BA—observes that “Most of the original The gang taxes street-level drug sales in members were from the Second Ward El Paso, West Texas, and southeast New (Segundo Barrio) area of El Paso, which is Mexico. Its members have been found located in the south central region of the in Arizona, California, Colorado, New city. As the Aztecas grew in numbers, they Mexico, and Mexico (Ciudad Juárez and Eduardo Ravelo, an FBI Ten Most Wanted became involved in the now standard other parts of Chihuahua). It engages activities of prison gangs: narcotics, in drug trafficking, money laundering, Fugitive. Photo: FBI extortion, assaults, , theft, and extortion, intimidation, and murder intimidation. The Aztecas recruit directly (enforcement). Other activities include from the pool of street gang members prostitution, kidnapping, arson, and auto who have been arrested or imprisoned; theft. According to the FBI, “because of however, [they] also form alliances and the BA’s alliance with the Juarez Drug intimidate various street-level gangs Cartel, the gang receives illegal drugs at who have not progressed to the prison low cost and profits on its importation, Money laundering, system.”5 sale, and distribution within the United extortion, and The FBI reports: “According to court States.”7 documents and information presented in The Aztecas’ allies include several enforcement are court, the Barrio Azteca is a violent street El Paso gangs, including Puro Barrio and prison gang that began in the late Sandoval, Barrio Cantu Rifa, Varrio linked on both sides 1980s and expanded into a transnational Hacienda Heights, the Colonel Street criminal organization. In the 2000s, the Locos, and Varrio Northeast. Their rivals of the border. BA formed an alliance in Mexico with ‘La include Los Mexicles and the Artistas Linea,’ which is part of the Juarez Drug Asesinos (AA) both linked to the Cartel (also known as the Vicente Carrillo Cartel. The Aztecas are linked with Fuentes or VCF). The the Juárez cartel and the mercenary purpose of the BA-La Linea alliance was enforcement army known as La Línea. to battle the Chapo Guzman Cartel and its allies for control of the drug trafficking 6 La Línea Links routes.” The Aztecas have chapters in Ciudad Juárez, where they act as proxies and Los Aztecas enforcers for the Juárez Cartel (Vicente Structure Carrillo Fuentes Organization). Both The BA is configured as a paramilitary the BA and Los Aztecas are believed to hierarchy with a defined internal rank be integral components of the La Línea structure. The structure includes capos organization. Here the transnational mayor (president/vice president), capos network linkages that permeate the Juárez (captains), lieutenants, sergeants, and Plaza are apparent. Money laundering, soldados/carnal (soldiers). In addition extortion, and enforcement are linked prospectos (prospective members) and on both sides of the border. La Línea esquinas (associates) contribute to gang is a hybrid entity within the array of The U.S. border fence near EL PASO. Photo: Office of Representative Phil Gingrey

62 The Counter Terrorist ~ April/May 2013 Though governed by separate countries, the cities of El Paso, Texas, and Juárez, Mexico, merge into an apparently seamless metropolis in this satellite image. Acquired by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA’s Terra satellite, this false-color image shows a cityscape straddling the Rio Grande, the river that divides the United States an Mexico. Photo: Jesse Allen

The Counter Terrorist ~ April/May 2013 63 Mexico 2010, Ciudad Juárez, Mexico. Photo: Astrid Bussink

networked non-state actors in Mexico’s inter-networked cross-border narco-conflict. It serves as a protective gangs and cartel partners. detail, an enforcement operation, and Azteca tactics, collectors of street taxes. Its members Azteca Attacks are a cadre that may serve as liaison techniques and officers to other organizations. “La Línea and Tactics The Aztecas (on both sides of the has their networks in gangs like Los border) played a key role in the brutal procedures (TTPs) center Aztecas who are hired killers (sicarios) violence in the battle for the Juárez Plaza. and the municipal police that protect on mass shootings; Massacres in prison, including Juárez’s their precious cargo.”8 9 Together, Los Cereso prison, and in the community are Aztecas and La Línea form a hybrid however they are their hallmark. Notable prison massacres node in the transnational criminal include the March 5, 2009, attack on Los known to employ network. Barrio Azteca is a tier-two Mexicles and that left enterprise (i.e., a superpandilla) with blocking positions in 20 dead11 and the July 26, 2011, attack regional reach working for a tier-one on Los Mexicles that left 17 dead and 20 transnational criminal organization (the surrounding areas to injured.12 Community attacks include the Juárez Cartel).10 Together with La Línea, Villas de Salvárcar massacre13 where 16 support their attacks. it is a specialized variant of a third- youths (aged 15-20) were gunned down generation gang whose members are using the Cuerno de Chivo (AK-47) and essentially serving as mercenaries. It has the October 23, 2010, Horizontes del Sur transnational reach through its allies and

64 The Counter Terrorist ~ April/May 2013 El Paso, Texas. Photo: Zereshk massacre where 14 were killed and over Conclusion: 20 injured.14 Both occurred in Juárez and it is believed that the gangsters mistakenly Cross-Border believed rival gang members were at the Gangsters locations. Barrio Azteca/Los Aztecas are a The Aztecas (in league with La Línea) networked third-generation/second-tier are also linked to the US Consulate gang. Together, their network operates on assassinations on March 13, 2010, both sides of the Texas Chihuahua border where three people affiliated with the with a prison-street cross-border nexus. consulate were killed in two separate They are linked with the Juárez Cartel incidents.15 Azteca tactics, techniques and La Línea and are active participants and procedures (TTPs) center on mass in Mexico’s drug war. Their ability to shootings; however, they are known to negotiate the human terrain on both sides employ blocking positions in surrounding of the “hyperborder” makes these cross- areas to support their attacks. While border gangs a valuable ally to the major they appear to primarily employ small cartels. It also makes them a threat to arms, they can be expected to marshal police and communities on both sides of the full range of armament associated the frontier. with La Línea, including rocket propelled • grenades (RPGs), and IEDs (including car bombs).16

The Counter Terrorist ~ April/May 2013 65 About the author Gangs: The Impact of Third Generation “La Línea: Network, Gang, and Mr. Sullivan is a lieutenant in the Gangs in Central America,” Air & Space Mercenary Army,” The Counter Terrorist, Los Angeles Sheriff’s Department. He is Power Journal—Spanish Edition, July Vol. 4, No. 4, August/September 2011. 10 a senior research fellow with the Center 1, 2008,http://www.Airpower.maxwell. Samuel Logan has developed a three for the Advanced Studies of Terrorism af.mil/apjinternational/apj-s/2008/2tri08/ tier ranking of criminal enterprises (CAST) and a member of the Advisory sullivaneng.htm. operating in Mexico. Tier-one enterprises 5 Board of Southern Pulse | Networked El Paso Police Department, are transnational criminal organizations; Intelligence. “An Innovative Tool to Create safe tier-two organizations are regional Communities,”, http://www.elpasotexas. superpandillas that often work for tier- gov/police/gang_injunctions.asp one entities; tier-three entities are local Endnotes 6 1 Federal Bureau of Investigation, street gangs. Tier-two entities correspond Fernando Romero/LAR, Hyper-Border: “Barrio Azteca Leader Sentenced to Life to second or third generation gangs; The Contemporary U.S.-Mexico Border in Prison and Two Barrio Azteca Soldiers tier-three entities correspond with first and its Future (New York: Princeton Sentenced to 20 and 30 Years in Prison,” generation gangs. See Ciudad Juárez Architectural Press, 2008). Criminal Environment 2 press release, El Paso Division, June , Southern Pulse, “Barrio Azteca,” Prison Offenders, 29, 2012,http://www.fbi.gov/elpaso/ 2012 and John P. Sullivan, “Maras http://www.prisonoffenders.com/barrio_ press-releases/2012/barrio-azteca-leader- Morphing: Revisiting Third Generation azteca.html. Global Crime 3 sentenced-to-life-in-prison-and-two- Gangs, , Vol. 7, Issue 3-4, Federal Bureau of Investigation,“New barrio-azteca-soldiers-sentenced-to-20- 2006, p.478-504. Top Ten Fugitive: Leader of Violent and-30-years-in-prison. 11“Mexican Prison Riot ‘Kills 20,’” BBC Barrio Azteca Gang,” news release, 7Ibid. News, March 5, 2009, http://news.bbc. October 20, 2009, http://www.fbi. 8“La Línea,” Borderland Beat, October co.uk/2/hi/americas/7924815.stm. gov/news/stories/2009/october/ 14, 2009, http://www.Borderlandbeat. 12Jo Tuckman, “Mexican Prison ravelo_102009. 4 com/2009/10/la-linea.html; Massacre That Left 17 Dead Captured John P. Sullivan, “Transnational 9John P. Sullivan and Samuel Logan, on Video,” The Guardian, 28 July 2011, http://www.guardian.co.uk/world/2011/ jul/28/mexican-prison-massacre-video. 13Mario Héctor Silva, “Juárez Llora; Exigen Justicia Tras Matanza,” El Universal, February 2, 2010, http://www. GW COLLEGE OF PROFESSIONAL STUDIES • ARLINGTON eluniversal.com.mx/estados/74615.html. 14Elisabeth Malkin, “Death Toll in Master of Professional studies Juárez Attack Rises to 14,” The New York Times, October 24, 2010, http:// security and safety leadershiP www.nytimes.com/2010/10/25/world/ learn from experts in homeland security Information Sessions americas/25mexico.html?_r=0. 15Marc Lacey and Ginger Thompson, policy, law enforcement cooperation, public Monday, April 22 safety leadership, emergency management, 6:30 pm “Two Drug Slayings in Mexico Rock U.S. Consulate,” The New York and cyber security. Monday, May 20 6:30 pm Times, March 14, 2010, http://www. Choose to focus your studies: nytimes.com/2010/03/15/world/ 950 N. Glebe Rd., 6th Floor • fundamentals of strategic security americas/15juarez.html?pagewanted=all. Arlington, VA 22203 • strategic cybersecurity enforcement. 16 Metro: Orange Line Sullivan and Logan, “La Línea” and John P. Sullivan, “Explosive escalation: Attend convenient classes. one evening to Ballston Reflections on the Car Bombing in per week and one saturday a month in RSvp Today! Ciudad Juárez,” Small Wars Journal, 21 arlington, Virginia. complete a master’s 703.248.2800 July 2010 at http://smallwarsjournal. degree in approximately 16 months. www.cps.gwu.edu/ com/blog/journal/docstemp/474- www.cps.gwu.edu/security-leadership security-leadership sullivan.pdf.

for a list of all GW graduate programs, visit www.gwu.edu/gradapply.

the GeorGe WashinGton uniVersity is an equal oPPortunity/ 38386 affirMatiVe action institution certified to oPerate in Va by scheV.

66 The Counter Terrorist ~ April/May 2013 Circle 283 on Reader Service Card Introducing Your New Visitor Management Solution...

Compliant with HSPD 12 Homeland Security Presidential Directive

Since 2003, Security Solutions International (SSI) has taken a holistic approach to security and is the leading provider of Identity Management Solutions for the Maritime industry, Education, Healthcare, Corporations, Government and Law Enforcement Agencies. The New leader in Identity Management for Schools The SSI Visitor Management System thoroughly complies with initiatives such as the Jessica Lundsford Act requiring thorough identification of those accessing educational facilities. The system cross checks Criminal, Sex Offender, and Internal Watch Lists. As schools recognize a need for greater security, they are identifying visitor management as essential front line protection in controlling and tracking individuals gaining access to school facilities. Schools utilizing the SSI Visitor Management System are processing thousands of visitors, contractors and vendors daily.

Once a visitor is cleared, a photo badge is instantly printed designating expiration and final destination. The system is easy to use and completes the process in seconds. Additionally, the system generates an electronic audit trail of all activity that can be printed, emailed or stored for later retrieval for management or investigative reports.

The SSI Visitor Management System acts as a frontline deterrent, eliminating the opportunity for undesirables to act on their intentions.

LEARN MORE at: www.homelandsecurityssi.com/products Call now for more information. ® SECURITY Phone: 866-573-3999 SOLUTIONS Circle 239Fax: on Reader 866-573-2090 Service Card INTERNATIONAL ® [email protected] Protecting the Homeland Together CircleCircle 295 295 on on Reader Reader Service Service Card Card SSISSI The Counter Terrorist ~ April/May 2013 67 international Resources

ITW Nexus Advanced Products and Accessories A Division of Illinois Tool Works Inc. Throughout the years, ITW Nexus APA’s breadth of engineered products has expanded exponentially. Our mission is to outperform conventional solutions while conforming to strict performance and quality standards. We provide unique access to the newest advances in research and development across a wide spectrum of applications. Divisions such as Nexus, Fastex, and our new Advanced Products and Accessories division are known throughout the world for their history of quality and innovation. Now these products and associated technologies are being made available to all end-users through our expanding group of strategic distribution partners, targeted at value-added opportunities in the Commercial/Industrial, Military/Defense, Law Enforcement, Hunting/Outdoor, Maritime and Personal security markets. In addition to our world class high performance plastic and metal hardware, find end user accessory products like the FASTmag, Grimloc, TacLink, Web Dominator, Quick Cap Connector, MASH Hook and CLASH Hook at www.itwmilitaryproducts.com. Please contact us for more information or to find a an authorized source for ITW Products. www.itwmilitaryproducts.com

K2B International In today’s business world it’s knowledge that drives opportunities and advancement. K2B International, standing for Knowledge 2 Business, is dedicated to creating content-rich communities – in the form of technical training courses, conferences, summits and online portals – providing platforms for gaining knowledge when it’s needed most. Delivering practical insights from seasoned practitioners, each K2B forum empowers participants to make a real difference in their organisations. For more information about K2B International’s training courses, please visit www.k2binternational.com or email [email protected]

Milipol qatar Milipol Paris is the worldwide event of the internal State security market for all public and industrial security professionals. Participate at the 18th edition of Milipol Paris, 19-22 November 2013: • meet the key international players of the public and industrial security sector, • discover and discuss new trends, products and services of the market, develop your business! www.milipol.com Milipol Qatar is the foremost exhibition of the key players involved in the Middle East internal State security sector. Milipol Qatar 2012 boasted record participation at the region’s premier security show: • 244 exhibitors – coming from 37 countries – 97% of them were satisfied with their participation • 5,820 visitors – coming from 66 countries – 96% of them were satisfied with their visit Attend the 10th edition of Milipol Qatar, 10-12 November 2014! www.milipolqatar.com

68 The Counter Terrorist ~ April/May 2013 Circle 81 on Reader Service Card Innovative Products

RECONYX Camera These Cameras are used by law enforcement agencies to provide covert 24/7 surveillance where no power or communication lines exist. Both the License Plate Capture and General Surveillance models are capable of operating outdoors with battery life up to a year. When equipped with the cellular upgrade option the camera will provide near instant notification of an intrusion by transmitting images directly to your cell phone or computer. www.reconyx.com

Mini-CALIBER Robot This SWAT tool is designed to increase situational awareness and allow resolution of dangerous incidents from a distance. Wireless RF control, 5 onboard cameras (color, IR, and zoom cameras), 2-way audio communication, remotely controlled front/rear flippers for stair climbing, and a robotic claw to open doors and manipulate objects allows search and clearance, gathering audio and video intelligence on barricaded suspects, delivers packages, and supports crisis negotiation without putting team members in harm’s way. www.icortechnology.com

CQB-11 This Bravo Company rifle is the CQB model of one of the highest quality families of rifles available. It features: select fire (auto or burst), a BCMGunfighter charging handle, USGI 5.56mm, flat top receiver, chrome lined bore and chamber, manganese phosphate barrel finish, and many other innovations designed to deliver the highest performance. Bravo Company Manufacturing is a leader among a growing number of companies standing up for the Second Amendment! www.bravocompanyusa.com

The Counter Terrorist ~ April/May 2013 69 The APRIL/maY 2013 Counter Volume 6 • Number 2

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, visit our website www.thecounterterroristmag.com/advertising.asp or scan this code. Select the appropriate Reader Service Number (RSN) on the web-form and submit your contact information. Individual advertiser’s websites are also provided below for your convenience.”

Page Ad/Company • website and/or email...... RSN Number

44 4th Annual Border Management Southwest • www.bordersouthwest.com...... 168 43 8th Annual Homeland Security Professionals Conference • www.terrorconference.com...... 177 55 Adams Industries • www.adamsindustries.com...... 308 24 ALLRed - Armadillo Tactical Gear • www.armadillotacticalgear.com...... 131 7 American Public University • www.amuonline.com/counter-terrorist...... 211 4 Barrett Firearms Manufacturing • www.barrett.net...... 121 28 Border Management North Summit • www.bordermanagementsummit.com...... 115 22 Center for Rural Development • www.ruraltraining.org...... 265 28 Cyber Defense and Network Security Summit • www.defensecybersecurity.com...... 148 44 Data Center Consolidation Summit • www.dccevent.com...... 289 47 Elite K9 • www.elitek9.com...... 277 66 George Washington University • www.cps.gwu.edu/security-leadership...... 283 58 GIS for Government • www.gisforgovernment.com...... 119 27 Golden Engineering • www.goldenengineering.com...... 83 23 Golight Inc • www.golight.com...... 285 57 Homeland Security Network • www.homelandsecuritynet.com...... 19 28 Human Geography 2013 • www.humangeographyevent.com...... 113 35 Icor Technology • www.icortechnology.com...... 81 54 J & N Tactical • www.jntactical.com...... 155 41 K9 Cope Magazine • www.k9copmagazine.com...... 279 3 Lenco Industries Inc. • www.lencoarmor.com...... 13 36 Lithos Robotics • www.lithosrobotics.com...... 307 59 Mattracks • www.mattracks.com...... 297 29 Military1.com • www.military1.com...... 335 15 National Homeland Security Conference • www.la2013conference.org...... 317 2 NEMO Arms • www.nemoarms.com...... 237 tise r index 73 NTOA • www.ntoa.org...... 222 11 Patriot3 • www.patriot3.com...... 301 12 PoliceTraining.net • www.policetraining.net...... 191 28 Prisons & Correctional Facilities West • www.prisonscorrectionalfacilities.com...... 293 35 Reconyx • www.reconyx.com...... 303 75 Remploy • frontline.remploy.co.uk...... 331 54 Southern New Hampshire University • www.snhu.edu/ct...... 111 40 Southern Police Equipment • www.southernpoliceequipment.com...... 343 71 SSI Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com...... 215 45 SSI PVBs • www.ssipvb.com...... 226 25 SSI SWAT-MACTAC • www.homelandsecurityssi.com...... 228 30-31 SSI Victory Boots • www.ssitacticalgear.com...... 291 67 SSI Visitor Management System • www.homelandsecurityssi.com/products...... 295 76 Sturm, Ruger & Co., Inc. • www.ruger.com/sr-series...... 347 13 Tactical Products Gear • www.tacprogear.com...... 101 19 Tactical Products Group Inc. • www.tacprogroup.com...... 145 24 Tex-Shield • [email protected]...... 29 39 TGA Readiness Action Division • www.taniaglenn.com...... 147 18 The Counter Terrorist Magazine • www.thecounterterroristmag.com/subscribe.php...... 255 26 Thorshield - G Squared Consulting • www.thorshield.com...... 97 12 Zistos • [email protected]...... 311 a d v e r

70 The Counter Terrorist ~ April/May 2013 ® SECURITY The Advanced Global SOLUTIONS INTERNATIONAL SSISSIThe experts on training in: Security Workshop in

Israelthe Homeland Security professional’s best resource

Since 2005, SSI has taken Hezbollah - a threat as deadly as al-Qaeda - Learn about them in nearly 500 First Responders their own territory, along Israel’s northern border. to Israel and shown them Hostage Rescue - Discover how they go wrong. the basics of the Israel security concept. Hospital Response - Find out how Israel’s critical response hospitals Thanks in part to that handle surge and multi-casualty incidents. program, we are better able Israel Counter Terrorism units - Learn how they operate. to defend ourselves in the Israel National Police - National Academy; See how they train? United States. In response to demand, we are now Sensitive Installations - Participate in a day-long exercise and offering a once-in-a-lifetime training program in how to set up a complete security system. experience covering the Secret Israel Homeland Security Simulator - See how this works following advanced subjects: at a base south of Tel Aviv.

May 17-25, Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland 2013 Security Professional, a Security Professional, an EMS, or an EMT.

LEARN MORE at: www.homelandsecurityssi.com Call now for more information. ® SECURITY 215 Circle on Reader Service Card Phone: 866-573-3999 SOLUTIONS INTERNATIONAL Fax: 866-573-2090 ® [email protected] Protecting the Homeland Together Circle 50 on Reader Service Card Circle 215 on Reader Service Card SSISSI The Counter Terrorist ~ April/May 2013 71 Training Review CDG Advanced Handgun Skills By Mac Mackinzie “Among the many misdeeds of the British rule in India, history will look upon the act of depriving a whole nation of arms, as the blackest.” - Mahatma Gandhi

n December 13, 2012, Min Yingjun stabbed 22 Ochildren in one of China’s many school attacks. On December 14, 2012, Adam Lanza shot 20 children and six adults at the Sandy Hook Elementary School. Such attacks, along with the advancement of ill-conceived “gun control” legislation, have created a national buying frenzy for firearms and expanded interest in firearms training. Also, in December 2012, a dozen returning students attended Critical Defense Group’s two-day advanced handgun skills course. On a cool Texas day, after a thorough safety briefing, we proceeded to a square range for our end-of-the year shot at “the title.” No dry-fire practice, no warm-up shoot. We stood on the 10 yard line, loaded and ready. The challenge was three shots to the chest and one to the head in the “A” zone of a standard IPSC target under time constraint. Students were taught from day one of involvement with CDG that misses are unacceptable. As responsible shooters, we must be accountable for every shot fired to insure bystander safety.

Photos courtesy of Mac MacKinzie.

72 The Counter Terrorist ~ April/May 2013 Circle 222 on Reader Service Card The Counter Terrorist ~ April/May 2013 73 Students were reminded of the importance of mastering the fundamentals of shooting. We worked on:

• Stance/Position • Grip • Sight Alignment • Sight Picture • Trigger Control • Controlled Breathing • Fire/Follow Through

With the fundamentals in place, students could accurately diagnose to an instructor why they may have missed a shot. After our initial shoot, we began implementing additional live fire drills, which included stationary turns or pivots from different directions, kneeling fire, shooting on the move, barricade fire, close quarter engagements from positions two and three, speed reload drills involving a shot timer, shift/failure-to-stop drills, low-light engagements, supine shooting, position sul shooting, extended range fire, and support hand shooting with reloads. We finished day two with a timed course of fire qualification and a written exam requiring a perfect score to pass. Students had the opportunity to fire at a steel IPSC target at ranges exceeding replicating a head shot with a subject themselves by their oppressive communist 50 yards and one close to 100 yards. By behind a vehicle. Several students made government. In recognition of the fact late afternoon of the second day, students the bonus shot. Upon completion of the that each American cannot be assigned a were required to shoot the qualification class, I could see the disappointment in bodyguard, Americans are guaranteed the course (60 rounds) for a maximum score some students, motivation in others, and right to defend themselves with firearms of 300 and a passing score of 90 percent peace in some. I explained to the students by the Second Amendment to the U.S. or better. Support hand draw with 6 that they were paying me to share my Constitution. One can only wonder… rounds fired and a support-hand-only experience, training, and skills and that If just one of the adult victims at Sandy reload proved to be very challenging one of the priorities of my school is to Hook had not been prohibited from for all the students. This was just one never allow students to stay in their being armed, and was in possession of the of the many requirements at distances comfort zones. We will always be learning most basic level of fighting proficiency, starting at 25 yards and ending at 7 and growing. The course was designed how many of those twenty murdered yards. The experience reminded students with a 90 percent failure rate anticipated. children might be alive today? • how important it is to be well rounded The moment you choose to live your life www.criticaldefensegroup.com in using a handgun safely with either in a comfort zone, you are slowly dying. I hand should the dominant hand become always push standards so my students will Mr. Mackinzie is a former ANGLICO disabled. The end result was a 100 stay ahead of their opponents. Marine, competitive shooter, personal percent failure. Students were humbled, The two school attacks we started security specialist, security manager, and but they identified their weaknesses. with have something in common— project manager. He has trained hundreds We ended day 2 with our timed course tragedy. They also have a significant of personnel from military, security and of fire starting with a barricaded position difference. Chinese citizens have been law enforcement agencies worldwide. He is at 25 yards and a bonus target at 35 yards, stripped of the means of defending director of Critical Defense Group.

74 The Counter Terrorist ~ April/May 2013 High Comfort & High Protection CBRN Oversuit

Kestrel High Comfort & High Protection The Ketrel is constructed using a lightweight activated CBRN Oversuit carbon liner, combined with a breathable, rugged and The Kestrel is a highly comfortable and highly anti-rip outer. protective two piece CBRN oversuit harnessing • Lightweight and breathable, the Kestrel has been much of the technology used in the Phoenix tested using the Avon FM12 respirator, and can Lightweight Protection suit. At around 30% be configured to suit many other types of lighter than conventional systems, it provides respiratory protection qualified CBRN vapour protection with the added benefit of water/oil repellence and fire Highlights retardant coatings, thus making the Kestrel an extremely versatile CBRN protection system • Conforms to NATO standards for use in multiple CBRN threat environments • High protection • High air permeability For further information: • Greater comfort and low physiological burden W: http://frontline.remploy.co.uk • 20 times launderable E: [email protected] • 10 year shelf life Compatible with a range of accessories T: +44 (0) 151 630 3811 • • Fire retardant and water/oil repellent • Stand alone garment or overgarment • Rugged and durable Frontline • Available in various colours and camo patterns

Circle 331 on Reader Service Card The Counter Terrorist ~ April/May 2013 75 THE RUGER® SR45™ Like the popular Ruger® SR9® and SR40® pistols, the SR45™ is perfectly sized to be comfortable and controllable with a slim, ergonomic grip and narrow slide. A short reach from the backstrap to the trigger creates a comfort level that will challenge any standard-sized, striker- fi red pistol available today. Its structurally rigid, recoil-reducing, glass-fi lled nylon frame and alloy or stainless steel slide combine to create a low- maintenance, rugged and reliable handgun.

Large Caliber Pistol with High Visibility a Trim, Ergonomic Profi le 3-Dot Sight System

Unique Reversible Backstrap is Adjustable Ambidextrous Thumb Safety and D-Shaped for a Flat or Arched Fit Ambidextrous Magazine Release

Ships with Two Flush-Fit, 10-Round Magazines Brushed Stainless or Black Nitride Finishes

LEARN MORE ABOUT THE FULL LINE OF SR-SERIES PISTOLS ONLINE AT: WWW.RUGER.COM/SR-SERIES

WWW.RUGER.COM/SR45 ©2013 Sturm, Ruger & Co., Inc. 121812 76Circle The 347 Counter on Reader Terrorist Service ~ Card April/May 2013