Z e t a s A m b u s h • L A P D S I S • M u s li m B r o t h e r h o o d • a L J a z e e r a

Journal for Law Enforcement, Intelligence & Special Operations Professionals The Counterapril/may 2012

Volume 5 • Number 2

islamist economic warfare: jihad with money

An SSI ® Publication April/may 2012 www.thecounterterroristmag.com USA/CANADA $5.99

The Counter Terrorist ~ April/May 2012 1 © 2011 Thermo Fisher Scientific Inc. All rights reserved.

Every second matters.

When time and safety are critical, military and civilian first responders use Thermo Scientific handheld chemical identification instruments to rapidly identify explosives, precursors, narcotics and other chemical hazards directly at the point of need.

With more than 5,000 handheld chemical identification instruments deployed worldwide, we understand what first responders demand of their equipment—and why every second matters. These insights were key as we developed FirstDefender® RM and FirstDefender RMX, our next generation Raman instruments, which are even faster and easier to use than ever before. FirstDefender RMX and FirstDefender RM Next generation Raman instruments enable rapid identification of unknown chemicals in the field. For rapid, accurate analysis of a wide range of potential chemical hazards, turn to Thermo Scientific handheld instruments, formerly sold under the Ahura Scientific brand. To schedule a demonstration of our newest solutions, visit www.thermoscientific.com/mil-chemID or call +1 (978) 642-1132.

Moving science forward

Circle 254 on Reader Service Card 2 The Counter Terrorist ~ April/May 2012 The Counter Terrorist ~ April/May 2012 3 Circle 13 on Reader Service Card Circle 340 on Reader Service Card

The Counter Terrorist_Lenco_2010.indd 1 1/28/2010 10:50:42 AM 324 4 The Counter Terrorist ~ April/May 2012 CircleCircle 29 onon ReaderReader ServiceService CardCard The Journal for Law Enforcement, Intelligence & Special Operations Professionals april/may 2012 Counter Volume 5 • Number 2

COVER story:

Islamist Economic Warfare: 30 Jihad with Money by Kevin D. Freeman FEATURES: 30 Firsthand: 8 LAPD Special Investigation Section By Larry Winston and Brian Davis Case Study: 20 Los Zetas Cartel Ambush in Houston By Jennifer Hesterman Al Jazeera: News Organization or 46 Propaganda Network? 8 By M. Zuhdi Jasser

The Muslim Brotherhood Reinvented 58 By Dean T. Olson

departments:

6 from the Editor 46 From the Halls of Montezuma… 44 book Review You Don’t Need a Weatherman to Know Which Way the Wind Blows

69 Innovative Products Mattracks, The Hero, Peephole Reverser

72 training Review Confined Quarters Defensive Tactics 58 Cover: Israeli boy standing in his house that was destroyed by a Qassam rocket. contents Photo: Edi Israel

The Counter Terrorist ~ April/May 2012 5 From The Editor: CounterThe From the Halls of Montezuma…

By Chris Graham Journal for Law Enforcement, Intelligence & Special Operations Professionals Auto ® / .380 ® LCP Volume 5 • Number 2 RUGER April 2012/MAy 2012 n 2008 the U.S. Department of Defense warned of the possible “rapid and sudden Editor collapse” of Mexico.1 In the intervening years, Mexican organized crime factions, Chris Graham Igang elements, and corrupt government personnel have made strides toward making that Director of Operations happen. Thousands are killed each year andM exico currently exists in a state of chaos. Sol Bradman The progress made by Islamic supremacist groups around the world captivates the Director of Advertizing attention of any who have more than a passing interest in current events, and Iran’s Carmen Arnaes strategic ambitions may be one of the factors most likely to exacerbate global conflict; Director of Production however, the issue of Mexico could directly affect the security and finances of Americans Kelli Richardson more abruptly than almost any other threat. Contributing Editors Excluding less lethal threats, such as economic warfare, cyber-attacks, and Eeben Barlow electromagnetic pulses, Mexican crime and conflict has the ability to bring low-intensity Jennifer Hesterman conflict into the lives of Americans more rapidly than any other likely threat. Border Richard Marquise security is clearly a priority to the American citizen. Security efforts are as complex Tom Nypaver as the agendas of those who influence our security policies. Politicians often attempt Steve Young to frame our evaluation of them, on this subject, in terms of dollars spent on border Graphic Design Luger 9mm ™ laser. Morrison Creative Company ™ / security projects. ® LC9 Obviously, the only true measure of the effectiveness of our border security operations Copy Editor RUGER is the number of illegal incursions or infiltrations made in a given period of time: 100 Laura Town Shown with new LaserMax Centerfire 2008 Handgun in a year would suggest a highly effective operation. 1,000 would suggest room for Office Manager of the Year improvement. 100,000 or more would suggest that our border security operations are Lily Valdes highly inadequate. They are, in fact, highly inadequate. Publisher: Adding to confusion on the subject is the odd testimony of U.S. Attorney General Security Solutions International Eric Holder when subpoenaed by the U.S. Congress. Mr. Holder described a U.S. 13155 SW 134th St. • STE 204 operation named “Fast and Furious” that facilitated the transfer of thousands of Miami, Florida 33186 2011 Handgun American firearms to Mexican crime groups resulting in the deaths of an unknown of the Year number of Mexicans and at least one U.S. law enforcement agent.2 More than a year has passed since this operation was exposed. Mr. Holder’s unlikely ISSN 1941-8639 The Counter Terrorist assertion that his investigations still have not determined who is responsible for this Magazine, Journal for Law Enforcement, TWO AWARD-WINNING CHOICES, BOTH PERFECT FOR PERSONAL PROTECTION. debacle3 suggests very strongly who is, in fact, responsible. And the fact that the Intelligence & Special Operations Professionals is published by Security operation consisted of encouraging U.S. firearms vendors to transfer guns for transport Solutions International LLC, as a service to Mexican crime groups in order to be tracked, with, apparently, no serious effort made to the nation’s First Responders and to actually track them suggests a motive. Homeland Security Professionals with THE ® THE ™ The Counter Terrorist has as much interest in the tragic Mexican crime war on our the aim of deepening understanding ® ® doorstep as it does in modern jihad and any other form of unrestricted warfare. If you of issues related to Terrorism. No part RUGER LCP RUGER LC9 of the publication can be reproduced have experience in this conflict that others can learn from, I look forward to hearing 5.16'' 6.00'' without permission from the publisher. The Ruger® LCP® is a compact The Ruger® LC9 ™ is a from you. The opinions expressed herein are the opinions of the authors represented and not .380 Auto pistol that weighs double-action-only, 9mm Semper Fidelis, necessarily the opinions of the publisher. just 9.40 ounces (with an empty Luger pistol that is hammer- Please direct all Editorial correspondence Chris Graham 3.60'' magazine). It is lightweight and ideal fi red. It has a smooth trigger pull related to the magazine to: Security 4.50'' Solutions International SSI, 13155 SW for all-day carry–ensuring you have it and features smooth “melted” edges for 134th Street, Suite 204, Miami, Florida. when and where you need it. ease of holstering, carrying and drawing. *Editor’s note: If you received a copy of Vol. 5 No. 1 with faulty print on page 33186 or [email protected] The subscription price for 6 issues is $34.99 nine, you may access the entire issue for free at http://onlinedigitalpublishing.com/ and the price of the magazine is $5.99. publication?i=96637. (1-866-573-3999) Fax: 1-786-573-2090. For article reprints, e-prints, posters and 1 http://www.jfcom.mil/newslink/storyarchive/2008/JOE2008.pdf accessed Feb 29, 2012. plaques please contact: 2 http://cronkitenewsonline.com/2012/02/house-lawmakers-accuse-holder-of-obstructing- PARS International Corp. fast-and-furious-probe/ accessed Feb 29, 2012. Web: www.magreprints.com/quickquote.asp 3 Email: [email protected] http://www.usatoday.com/news/washington/story/2011-12-08/fast-and-furious-holder- Phone: 212-221-9595 • Fax: 212-221-9195 hearing/51746552/1 accessed Feb 29, 2012. Please visit the magazine web site where you can also contact the editorial staff: Join Ruger and help us raise $1,000,000 for the NRA. www.thecounterterrroristmag.com VISIT: WWW.RUGER.COM/MILLION TO BENEFIT THE NRA © 2012 Security Solutions International ©2012 Sturm, Ruger & Co., Inc. 112911 6 The Counter Terrorist ~ April/May 2012 Auto ® / .380 ® LCP RUGER

mm Luger ™ / 9 ™ laser. ® LC9 RUGER Shown with new LaserMax Centerfire 2008 Handgun of the Year

2011 Handgun of the Year

TWO AWARD-WINNING CHOICES, BOTH PERFECT FOR PERSONAL PROTECTION.

THE ® THE ™ RUGER® LCP RUGER® LC9 5.16'' 6.00'' The Ruger® LCP® is a compact The Ruger® LC9 ™ is a .380 Auto pistol that weighs double-action-only, 9mm just 9.40 ounces (with an empty Luger pistol that is hammer-

3.60'' magazine). It is lightweight and ideal fi red. It has a smooth trigger pull 4.50'' for all-day carry–ensuring you have it and features smooth “melted” edges for when and where you need it. ease of holstering, carrying and drawing.

Join Ruger and help us raise $1,000,000 for the NRA. VISIT: WWW.RUGER.COM/MILLION TO BENEFIT THE NRA

©2012 Sturm, Ruger & Co., Inc. Circle 347 on Reader Service Card 112911 Circle 301 on Reader Service Card The Counter Terrorist ~ April/May 2012 7 Firsthand: LAPD Special Investigation Section By Larry Winston and Brian Davis

To Protect and to Serve. Photo: Skyfox11 CounterThe

8 The Counter Terrorist ~ April/May 2012 In the early 1990s, Los Angeles Police Department (LAPD) Special Investigation Section (SIS) detectives received a bank robbery case from the FBI and the LAPD’s Robbery-Homicide Division. The case involved four suspects: three males and one female; all were African American.

hey were suspected of As a result of a reward offered by committing four takeover- the Wells Fargo Bank, an untested Tstyle bank robberies within Los informant provided a name and Angeles County. In three of the four possible address for one of the male robberies, the female suspect forced suspects. The suspect was identified bank security guards into a prone, using the department’s database. A SIS has strict guidelines face-down position, straddled them, record check revealed one outstand- to adhere to before and shot them in the back of the ing felony warrant for a robbery/ head, killing them. The suspects purse snatch. The suspect had sev- “working” a case. used stolen vans in each of the rob- eral arrests for burglary, grand theft Generally, the unit will beries and despite numerous surveil- auto, and robbery, two convictions not work a suspect with lance photos from each robbery site, for purse snatching with the use of the detectives could not identify any a knife, and 18 months served in an outstanding warrant. of the subjects. Some of them wore state prison. disguises.

Downtown Los Angeles. Photo: Serouj

The Counter Terrorist ~ April/May 2012 9 The Complete Tactical SIS has strict guidelines to adhere to before “working” a case. Gener- Video Tool System! ally, the unit will not work a suspect FOR MILITARY & LAW ENFORCEMENT OPERATIONS with an outstanding warrant. After all, that is an order from a judge requesting the arrest of an indi- vidual. However, “generally” means just what it implies—there is some wiggle room. In this case, we had four violent suspects. Locating the suspect with the warrant and taking him into custody might not have brought us any closer to stopping the other three suspects that were violent bank robbers responsible for at least three murders. So, in this case, the unit received approval from command-level personnel to work the case. Based on the level of violence, or lack of violence exhibited from a All products are interchangeable and new tools can be added at any time! suspect’s prior actions, and tactical concerns, Brian Davis, the senior ® Night Vision Monocular Pole Camera field supervisor, would, on many ® 2-20ft Pole Cameras An array of technology-based occasions, allow the unit to observe ® Fiberscopes & Videoscopes a crime “go down” and then affect a video surveillance tools that ® Under Door Cameras tactical arrest of the suspect or sus- ® Listening Devices allow a team to safely assess any pects after the crime has occurred. ® Thermal Imaging potentially dangerous situation In this case, however, the level of ® Robotic Remote Control Cameras violence demonstrated was extreme. ® Digital/Analog Wireless Video Davis advised the team that if the suspects were “looking” at a bank, that they should be prevented, at all Zistos Corporation costs, from entering the bank. Ph 631.434.1370 At 0700 hours, on a warm Mon- E-mail: [email protected] day morning in July, the unit set up on the address of the possible sus- Circle 311 on Reader Service Card pect. It was a multilevel, multiunit apartment building located in one of Los Angeles’ south-end, gang- infested regions. The informant supplied an address for the suspect but no apartment number and no vehicle information. An observation point, established by Larry Win- ston, provided a view of the rear of the building and a rear parking

Circle 191 on Reader Service Card 10 The Counter Terrorist ~ April/May 2012 Tacprogear manufacTures a compleTe line of HigH-speed low-drag TacTical gear & equipmenT

Tacprogear is widely used in global hot spots where High-speed, low-drag equipment is required, not optional!

Tacprogear’s manufacturing capabilities & network of reliable partners help us achieve extraordinary results… delivering mission critical equipment to wherever and whenever duty calls! sofT armor Tacprogear designs and builds all plaTe carriers products to not only meet, but exceed the rigorous demands of our clients.

TACProGEAr’S BATTlE TESTEd ProduCTS:

• Hard Armor • Weaponlights • Soft Armor • Apparel • Carriers • Gloves • Vests • Coveralls • Pockets • Balaclavas Hard armor • Pouches • Footwear pockeTs & poucHes • Packs • Weapon Accessories • Flashlights • Slings • Safety Equipment • Eye Protection • Sleeping Bags • PPE

Tacprogear, llc

601 N. CoNGrESS AVE., SuITE 305 dElrAY BEACH, FlorIdA 33445 uSA TEl: 561-265-4066 FAX: 561-265-4061 [email protected] HelmeTs weapon accessories

Circle 101 on Reader Service Card The Counter Terrorist ~ April/May 2012 11 www.AdamsIndustries.com Email:[email protected] West Coast Office: (310) 472-3017 East Coast Office: (540) 815-1421 PROVIDING THE BEST NIGHT VISION & THERMAL FOR 17 YEARS! MONOCULARS

AI/PVS-14: Mil-Spec FLIR Thermal Imager PITBULL: New! U.S. Military mo- Monoculars. Smaller/lighter/ nocular. tougher than PVS-14. GOGGLES

AI/PVS-15: PVS-15 AI/PVS-7: Mil-Spec with PINNACLE tubes. U.S. Military goggle. WEAPON SIGHTS

FLIR Night Vision L3 Night Vision Clip FLIR Thermal Clip on Clip on Rifle Sights. on Rifle Sights. Rifle Sights.

Circle 245 on Reader Service Card Circle 29 on Reader Service Card 282 12 The Counter Terrorist ~ April/May 2012 Circle on Reader Service Card Circle 308 on Reader Service Card BWL09_CRC_CounterTerrMag AD:Layout 1 2/13/1

SAVE 20% lot that appeared to be used by the followed on foot back to his vehicle. on our Newest residents of the building. A second He then drove his vehicle back to Counterterrorism Books point was established to provide a his residence and parked next to the view of the front of the building as Astro van. A check of both license well as most of the street parking. numbers revealed the Toyota to be Because of the gang activity in the registered to an unknown elderly area, it was decided not to “chase female at the apartment address of down” every person leaving the the suspect. The Chevy van was a area. This would only “heat up” the North Hollywood Division stolen neighborhood and limit our effec- vehicle, taken three days prior. No tive time to remain in an undercover further activity was observed and capacity. It was hoped that person- the surveillance was ended at 2200 nel at the two observation points hours of day nine. would be able to identify the suspect On day 10, the unit set up on from booking photos and the unit the suspect’s apartment at 0600 would follow him in order to gather hours. Both vehicles were still in information on him and the other the rear parking lot. The operation suspects. was supported with 12 detectives The unit maintained the observa- and two supervisors. An air unit tion points for 12-hour days for was on standby. eight days and saw no one that At approximately 0800 hours, the matched or even came close to the suspect and three others (two males suspect description. No bank rob- and one female) were observed beries matching the distinct method together in the rear parking lot of of these robberies occurred during the apartment. The suspect and two this time frame. others (one male and the female) On day nine at approximately drove away in the Toyota. The third 1030 hours, Winston observed a unknown male followed in the sto- suspect matching the description of len van. The surveillance continued the booking photo exit a rear secu- with the assistance of the air unit rity door of the apartment building and traveled through residential and enter a brown 1987 Toyota neighborhoods into the business Celica. The unit followed the sus- districts of Wilshire Division and pect to various locations throughout eventually ended in Hollywood. the immediate area. Manpower on At approximately 0945 hours, CRC Press is a premier this day consisted of 12 detectives, the suspects parked the stolen van publisher of books on partnered in six cars, and two su- at a Builders Emporium parking lot counterterrorism. pervisors, each riding by themselves, at Sunset Boulevard and Western Visit www.crcpress.com to see along with one air unit. Several Avenue. All four suspects entered our complete selection of titles hours into the surveillance the sus- the Toyota. They proceeded west and use PROMO CODE BWL09 pect, still alone, parked his vehicle on Sunset, apparently paying no to receive a 20% DISCOUNT. behind a blue 1989 Chevy Astro particular attention to several banks van. Winston observed the suspect they passed. At approximately 1020 FREE standard shipping when you order at as he entered the driver’s side of the hours, the suspects drove past a www.crcpress.com van, started the motor, and drove to Bank of America located at Sunset the rear parking lot of his apartment and Argyle Boulevard. They circled building. He exited the van and was the block twice, each time stop-

Circle 331 on Reader Service Card The Counter Terrorist ~ April/May 2012 13 ping at an alley just west of the contamination to their hands or The SIS units continued to fol- bank doors. The suspects eventually clothing.) low the stolen van until it stopped returned to the Builders Emporium The suspects drove away from the momentarily in the alley just west and parked. One of the suspects alley. The air unit maneuvered so of the bank doors. Three of the retrieved a large plastic trash bag as not to be audible to the suspects suspects moved to exit the vehicle from the trunk of the Toyota and and handed them off to SIS ground wearing sweatshirts (with hoods up) placed it into the back seat of the units. They observed the suspects armed with 9mm handguns and a stolen van. circle the bank again. sawed-off 12-gauge shotgun. All four suspects proceeded This time the female was ob- The SIS vehicles converged and directly back to the vicinity of the served by a footman to be wearing performed a vehicle containment Bank of America in the stolen van. a large afro wig and dark glasses. maneuver. Detectives armed with Two blocks east of the bank the van This disguise matched the surveil- M1A4 assault rifles, 12-gauge shot- parked in a small alley at the rear lance photo of the female that had guns, and .45 cal. 1911-style pistols of a liquor store. Winston worked killed three security guards. Based positioned themselves to cover the his way in on foot, and while on this information and the obvious suspects without creating a crossfire. pretending to rummage through a preparation by the suspects, Davis A detective provided verbal com- trash bin, was able to observe one ordered the suspects to be taken mands to the suspects. They were suspect filling a five-gallon plastic into custody as soon as possible. He removed from the stolen van using pail with water from the rear of the phoned the bank, identified himself felony prone procedures, searched, liquor store. (Criminals often throw as a police officer, informed a bank and handcuffed. All four were taken money bundled with explosive dye employee of the imminent threat, into custody without incident. packs into water in an attempt to and asked the bank manager to lock The vehicle containment tech- deactivate the explosive and to limit the doors. nique boxes the suspect vehicle in,

14 The Counter Terrorist ~ April/May 2012 Circle 259 on Reader Service Card Paratech-CountTerFPApMayTFEbpF.pdf 1 2/24/12 8:09 AM

C

M

Y

CM

MY

CY

CMY

K

Circle 333 on Reader Service Card

Circle 201 on Reader Service Card The Counter Terrorist ~ April/May 2012 15 but still leaves an open background a coordinated show of overpower- sisted of firearms training only. The and a field of fire area should the ing force. The speed of the vehicle surveillance training was “on-the- situation require it. The procedure containment technique, when job” learning. Over the past 47 has designated roles based on posi- performed correctly, leaves suspects years, the unit has built upon the tion, which generally determines with two choices: give up or risk foundation laid by the original nine which detectives will take charge of being shot. 97% make the correct members and developed tactics for the suspects within the vehicle and decision. The technique works on vehicle, foot, and airborne surveil- which will be shooters if the need suspects in vehicles or on foot. lance involving both helicopters and arises. It also designates detectives LAPD’s SIS originated from a fixed-wing aircraft. for clearing the vehicle, handcuff- 1965 department surveillance unit. The unit has enjoyed many suc- ing suspects, and setting perimeters Its purpose was to follow individu- cesses in surveillance and the arrest in case of a runner. It provides for als who were suspected of violent of armed suspects. SIS has evolved a well-guarded safe area in which crimes and arrest suspects when into a highly trained, well-armed to place the suspects for searching detectives were sure that they had tactical unit that is often called and handcuffing as well as a vantage an airtight case that would ensure upon to interdict armed subjects point to use in clearing the vehicle. a conviction. The unit originally on-the-move in vehicles. The tactics The maneuver requires perfect consisted of 9 detectives. Today, the employed by the unit often involve timing and a lot of training. Its unit consists of 19 detectives and vehicle-containment techniques. sequence is determined by the one lieutenant. All 19 detectives The SIS has been called “SWAT on suspects’ actions as well as traffic work one case at a time until its wheels.” considerations and background. conclusion. Many crimes fall under the pur- Once the maneuver has begun, it is In the early days, training con- view of the SIS. The unit is tasked

16 The Counter Terrorist ~ April/May 2012 Circle 103 on Reader Service Card Circle 301 on Reader Service Card The Counter Terrorist ~ April/May 2012 17 to handle: violent takeover bank to. The news media has reported providing training to agencies robberies, street robberies, burglars, time and time again that the unit is throughout the United States, includ- rapists, cop killers, killer cops, and “secretive and controversial” because ing numerous federal agencies and all kidnap-for-ransom cases in Los it stands by and watches crimes the U.S. military. Mr. Winston is a Angeles. The SIS can boast that in occur before taking action, allegedly principal of the Tactical Surveillance its 47 years, it has recovered every putting the public at risk. Ultimate- Institute (www.tacticalsurveillancein- kidnap victim in kidnap-for-ransom ly, the truth of the matter is that the stitute.com). cases it has ever worked. SIS is not overly secretive. It is listed Mr. Davis has 30 years experience The Los Angeles Police Depart- in the department’s manual just like in criminal surveillance and super- ment’s motto is “To protect and to every other section or division in vision of specialist units of the Los serve.” It states that the essential the LAPD. Controversial? Maybe in Angeles Police Department, includ- goal of the LAPD is to protect the eyes of civil rights attorneys or ing the Special Investigation Section the right of all persons within its other untrained “tacticians.” • (SIS). His instructional experience jurisdiction to be free from criminal includes providing training to agen- attack, to be secure in their posses- ABOUT THE AUTHORs cies throughout the United States, sions, and to live in peace. Mr. Winston’s 30 years of service including numerous federal agencies SIS has been the object of numer- with the Los Angeles Police Depart- and the U.S. military. Mr. Davis is a ous federal civil suits since the early ment include 17 years with the principal of the Tactical Surveillance 1980s. Civil rights attorneys have Special Investigation Section (SIS). Institute (www.tacticalsurveillancein- claimed that the SIS operates in His instruction experience includes stitute.com). contradiction of the LAPD’s mot-

18 The Counter Terrorist ~ April/May 2012 Circle 261 on Reader Service Card www.homelandsecurityssi.com Take your training to a higher level... SSI Elevated Tactics training Enhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

Find out more at: • Vehicle driving and operating techniques in a variety of situations • Global case studies of real-world operations using the specific equipment • Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults • Elevated obstacle negotiation and firing platforms • Emergency evacuations, climbing and descending options • Distraction and deception techniques ® SECURITY • and much more... SOLUTIONS INTERNATIONAL SSISSI Protecting the Homeland Together ® Call now for more information. Elevated Tactics Training provided Phone: 866-573-3999 in partnership with Patriot3. Fax: 866-573-2090 [email protected]

Circle 313 on Reader Service Card 311 Circle on Reader Service Card The Counter TerroristCircle 183 ~ April/Mayon Reader Service 2012 Card 19 Case Study: Los Zetas Cartel Ambush in Houston By Jennifer Hesterman

US-Mexican border on the Rio Grande river. Photo: Dan Davis CounterThe

20 The Counter Terrorist ~ April/May 2012

Los Zetas Cartel Houston is a major distribution hub Two shooters ran to the Ambush in Houston for illegal drugs. Every advantage truck, pulled open the the city enjoys makes it a magnet for cab door, and fired on an unarmed Chapa, who put drug trafficking: major highways, his hands in the air. access to waterways and ports, and strong international trade.

artel activity in Houston with the feds and shocked he would risk has steadily increased over his life for this operation, possibly done Cthe last few years. in the name of making a few bucks. On the afternoon of November 21, On the day of the operation, Chapa 2011, confidential informant Lawrence rendezvoused with law enforcement in Chapa was doing what he had done the morning at the US/Mexico border in many times before: drive a semi loaded the Rio Grande Valley. The vehicle used with drugs for delivery to unsuspecting for the operation was a fuel truck, which traffickers, under the watchful eyes of is commonly employed by traffickers to a joint counterdrug task force. Chapa avoid detection and limit searches to the A U.S. Immigration and Customs was a 53-year-old licensed big rig driver external chassis if pulled over and chal- Enforcement agent arresting a suspect. with the “street cred” and mannerisms lenged. This load was a mere 300 pounds Photo: U.S. Govvernment necessary to be a productive informant. of marijuana, nothing compared to the He had an arrest record for cocaine pos- thousands usually delivered. Plainclothes session, resisting arrest, and assault on a officers trailed Chapa.2 store clerk just a few months before, but When the truck arrived in the Hous- he was a long-term asset, reportedly on ton area, the buyers informed Chapa of the books for at least 10 years.1 His fam- a change in the delivery destination. He ily was unaware of his prior cooperation made his way down Bourgeois Road (a

The Counter Terrorist ~ April/May 2012 21 suburban area of northwest Houston) Perpetrators in Harris County, an area with a quiet In the chaos, several vehicles fled the Their weaponry neighborhood, nice homes, and an el- scene, leaving behind four shooters and a and tactical skill ementary school. Lincoln Navigator. Police chased several As he headed up the dead-end road, gunmen on foot through the adjacent make them a toward an industrial park, several black, neighborhood and made successful ap- formidable force. high-end SUVs converged at an inter- prehensions.6 section and opened fire. The truck cab Eric De Luna, 23, was born in Nuevo They repeatedly 3 was quickly sprayed with bullets. Two Laredo, Mexico, but grew up in the demonstrate shooters ran to the truck, pulled open Houston area. De Luna was the leader of the cab door, and fired on an unarmed the group and reportedly recruited the willingness to 4 Chapa, who put his hands in the air. other three men arrested in the attack. brutally confront law A gunman pulled Chapa from the cab, According to an affidavit signed by a enforcement. throwing his lifeless body on the ground. member of the Pasadena Narcotics Task Officers raced to the scene, running over Force, just four days prior to the ambush, one of the gunmen in an attempt to stop De Luna was stopped in a town outside the shooting. A Harris County deputy in of Houston as he left a stash house (later plainclothes was downed by friendly fire found to contain rifles and bulk narcot- 5 when he was misidentified. Fortunately, ics).7 Police confiscated $5,600 from De he will make a full recovery from a gun- Luna’s clothing and decided to let him shot wound to the leg. go, possibly for surveillance reasons. Ac- cording to court records obtained from

22 The Counter Terrorist ~ April/May 2012 Circle 295 on Reader Service Card the Harris County district clerk, two months prior to the Chapa killing, De Luna was charged with aggravated assault by knife. He posted a $40,000 bond and was awaiting arraignment at the time of the attack.8 De Luna is reportedly the gunman hit by a police car during the at- tack as officers tried to suppress his fire. Fernando Tavera, 19, is a U.S. citizen from Houston and confessed to killing Chapa, exclaiming to arresting officers, "I emptied my clip into [Chapa]."9 Tavera had a prior misdemeanor marijuana pos- session charge in Harris County. Ricardo Ramirez, 35, also from Nuevo Laredo, and Rolando Resendiz, 34, from Mat- amoros, the other two shooters, also have prior brushes with law enforcement in the Houston area. A fifth gunman who fled the scene, Alfredo Gomez, was arrested several weeks after the shooting. The five men have been charged with U.S. Customs and Border Protection (CBP) Unmanned aerial vehicle of the CBP Air and Marine Unmanned Aircraft System. Photo: Gerald Nino

Halogen, HID, LED, Infrared, Thermal

Permanent, Portable & Handheld Units Remote Control or Fixed Units Industry Leading Warranties

308.278.3131 www.golight.com [email protected]

Circle 285 on Reader Service Card The Counter Terrorist ~ April/May 2012 23 Mexico, operating in 17 states, or more the presence of law enforcement. than half the country, while its rival and Based on Tavera’s statement indicating second-largest cartel, Sinaloa, had opera- Chapa was the target, the fact that the tions in 16 states.11 Despite losing 17 of load was just 300 pounds, the shooters its leaders in 2011, the Zetas remain a were numerous, armed, and lying in wait formidable, transnational force. They are (after calling in a venue change), suggests reportedly at war with the Sinaloa cartel that this may have been a hit on Chapa. and gaining territory. Somehow, he was compromised, and paid According to law enforcement person- the ultimate price. Perhaps the attack in nel, Zeta tactics in the United States Houston wasn’t a failed mission for the are adapted to avoid detection. They Zetas—it was a successful elimination of From left to right, U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) use “cloned vehicles,” such as replicas an enemy. Acting Director Kenneth E. Melson; U.S. of delivery trucks and ambulances, to Some of the most compelling evidence Department of Homeland Security (DHS) run drugs and other contraband. Group of Zeta hit squads in the United States Secretary, Janet Napolitano; Mexican members are extremely proficient at came in January 2012 during the trial of Attorney-General Eduardo Medina-Mora falsifying paperwork for big rig trucks to Gerardo Castillo-Chavez, a Zetas-linked and Mexican National Public Security System successfully navigate weigh stations and hitman on trial for racketeering and Executive Secretary Jorge Tello Peón. Photo: Chuck Reed other checkpoints. weapons charges. During his trial, several We should not underestimate the Zetas previously convicted of murdering sophistication of this group; undetected, U.S. citizens confirmed the presence and it plans and practices for operations, activity of “sicario” (assassin) cells in Lar- performing surveillance and patiently edo, . Castillo-Chavez and several waiting for the right time to strike. The other Zetas in Laredo were rolled up in brazen daytime attack on a casino in “Operation Prophecy,” an investigation of capital murder and reportedly identified Monterrey, Mexico, in August 2011 that the killing of Americans in vicinity of the as connections to the Los Zetas drug left at least 52 people dead is an example border.12 cartel in their separate confessions. Louis of the escalation and calculation of Zeta Recent murders by cartels, including Guthrie, director of Special Crimes and violence: 12 gunmen entered the casino the Gulf Cartel and the spinoff Zetas, Narcotics for the Liberty County Sheriff's and started shooting into the crowd. included U.S. Immigration and Customs Department, stated: "This shootout is the Attackers simultaneously doused exits Enforcement Special Agent Jaime Zapata latest example of cartel-related violence with gasoline and threw grenades into and Border Patrol Agent Brian Terry. to hit the streets of Houston and Harris the building to start multiple fires. Such The cartels routinely issue a “green County.”10 attacks are less about the target and more light,” authorizing the killing of police about the message. and military in our country. In early Los Zetas 2010, according to the Department of The Zetas were originally trained by Assassination? Homeland Security, the Barrio Azteca the Mexican government to protect their Chapa’s accused killers will have their issued a “green light” authorizing the leaders from cartel violence. At some day in court later this year. Questions murder of law enforcement officers in El 13 point, the group flipped, became the over the Houston attack persist, such as: Paso. Shortly thereafter, members of the paramilitary “enforcer” wing of the Gulf if the shooters knew Chapa was an infor- Aztecas, who often carry out hits for the cartel and recruited new members. Their mant, wouldn’t they assume he was being La Linea cartel, targeted and killed U.S. weaponry and tactical skill make them a followed by law enforcement and not consulate employee Leslie Ann Enriquez formidable force. They repeatedly demon- attack? Most close to the investigation be- Catton and her husband across the border strate willingness to brutally confront law lieve this speaks to the culture of the Zetas in Ciudad Juarez. The husband of another enforcement. A Stratfor report indicates to carry out planned attacks in city limits, consulate employee, Jorge Salcido, was also 14 that Los Zetas is now the largest cartel in during the daytime, and with disregard for killed in the attack.

24 The Counter Terrorist ~ April/May 2012 Zeta Concerns about the group in online forums, the growing in size, operating at the border, hacker group “Anonymous” engaged, and forming ties with cartels and other Increasing Reach in the initiating “Operation Cartel” and vandal- drug trafficking organizations.18 The 1.7 United States izing websites with anti-Zeta propaganda. million gang members in our country are The recent arrest of 15 Zeta cartel The cartel retaliated by locating and kid- now engaging in nontraditional crimes, members in Chicago highlighted the napping an “Anonymous Iberoamerica” such as human trafficking and alien movement of drugs from Nuevo Lar- member. When the hacker group threat- smuggling. They are acquiring formidable edo, Mexico, via a U.S. fugitive working ened to release 25,000 personal emails weaponry and showing new sophistica- for the Zetas, through Texas and into exposing the identities of 60 Los Zetas tion in terms of recruitment and commu- Chicago. The street value of this cell was members, the cartel released the victim. nication. Law enforcement also believes staggering: feds seized $12.4 million in However, it was a victory for the Zetas: the Zetas may have already used MS-13 cash, and approximately 250 kilograms the victim had a note in his pocket saying in several operations in the United States, of cocaine.15 According to the FBI, in for every name Anonymous published, providing training and weaponry. addition to border states, Zeta cells are they would kill 10 civilians, starting with FTO Designation Stalled believed to be present in other states, the victim. Anonymous called a “truce” In April 2011 Congressman Michael Mc- including Tennessee, Oklahoma, South with the Zetas and backed away from its Caul from Texas’ Tenth District, located Carolina, Georgia.16 campaign.17 just outside of Houston, introduced HR Interaction with Dark Nexus with Street Gangs 1270, which would put Mexico's six Networks The FBI’s 2011 Gang Assessment biggest cartels on the State Department's After the Zetas tortured and killed three indicates a number of alarming trends, list of Foreign Terrorist Organizations 19 bloggers in Mexico for negative chat including that U.S. street gangs are (FTO). With many recognizing the

ProTecT Your Vehicle BaTTerY uSing 2 SeParaTe Timing DelaYS

T 2 S h u T Down Timer • Protect vehicle batteries from over-discharge by shutting off up to single 30 amp and 20 amp loads at a preset time after the engine is shut down or when the battery is discharged to a low voltage level

• Manage power loads separately using 2 independent timing circuits

• An emergency switch allows 15 minutes of operation after the timer shuts down the equipment

• The timed sequences can be activated by sensing when the ignition is turned to, or the alternator goes, off

POWER SPECIALISTS FOR MOBILE COMPUTING

1.800.697.3701 • [email protected] • www.lindelectronics.com

Circle 327 on Reader Service Card The Counter Terrorist ~ April/May 2012 25 criminal threat, but not the national secu- the group. Lacking this legislation, our are self-evident. The Mexican cartel con- rity threats, the bill will likely remain in government will likely see each event as nections to CONUS incidents are often committee and never get to the floor. As an individual crime and not leverage our under acknowledged. As a result, our a result, our country is inhibited in pros- fusion centers to connect dots. population is insufficiently informed of ecuting those who provide material sup- the threat, and will be caught unprepared port to the Zetas, and we cannot mount The Way Ahead in the crossfire in their neighborhoods. a broad, coordinated effort to attack the Studying the Houston attack and the Law enforcement is already heavily tasked organization’s financing, logistics, and op- increased scope, sophistication, and vio- dealing with standard criminal elements erations with the purpose of dismantling lence shown by the Zetas, several truths in our country, but we now have Zetas who brazenly threaten citizens as well. The Zetas employ guerilla warfare tactics, use the element of surprise, and learn from failures and adapt accordingly. This rogue special operations unit has announced its arrival in our country: are we prepared? • About the Author Ms. Hesterman is a retired U.S. Air P Force colonel. She is a senior analyst for RUBBER TRACK the MASY Group, and vice president of Academic Research and Development for CONVERSION SYSTEMS 75 MODELS TO CHOOSE FROM S R the 5th Generation Warfare Educational In- stitute. She authors a scholarly blog, www. counterterrorforum.com, and her upcoming O O book is Terror Groups (CRC, 2013). End notes 1 http://www.chron.com/news/hous- L ton-texas/article/How-one-man-s-drug- B mission-ended-in-violent-death-2342566. php 2 http://www.chron.com/news/hous- V ton-texas/article/Zeta-soldiers-launched- L Mattracks.com Mexico-style-attack-in-2283370.php 3 http://smallwarsjournal.com/blog/ mexican-cartel-tactical-note-7 E 4 http://www.chron.com/news/hous- E ton-texas/article/How-one-man-s-drug- mission-ended-in-violent-death-2342566. php D 5 http://www.chron.com/news/hous- M ton-texas/article/Police-let-suspect-go-4- days-before-a-deadly-2555838.php 6 http://www.khou.com/home/Under- cover-officer-shot-in-northwest-Harris- Karlstad, MN County-134260588.html 218-436-7000 110M000D0101

Circle 297 on Reader Service Card 26 The Counter Terrorist ~ April/May 2012 “knowledge is critical to deter the threat of terrorism.”

Elena Mastors, Ph.D. | Dean, School of Security & Global Studies

Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network. Learn More at www.amuonline.com/counter-terrorist

Education | Management | Public Service & Health | Science & Technology | Security & Global Studies

Circle 211 on Reader Service Card AMU_Counter Terrorist_0212.indd 1 The Counter Terrorist ~ April/May2/17/12 2012 9:38 AM 27 7 http://www.chron.com/news/hous- ton-texas/article/Police-let-suspect-go-4- days-before-a-deadly-2555838.php 8 http://www.hcdistrictclerk.com/edocs/ public/Search.aspx 9 According to Alfredo Gomez, 29, a prosecutor who read a preliminary sum- mary at the arraignment 10 www.texasgopvote.com/restore-fam- ilies/security/los-zetas-ambush-houston- deputy-shot-friendly-fire-003562 11 http://www.stratfor.com/analysis/ mexico-security-memo-guns-money-and- los-zetas-incursions-sinaloa-territory 12 http://www.gsnmagazine.com/ node/25526?c=border_security 13 http://www.elpasotimes.com/portlet/ article/html/imageDisplay.jsp?contentIte mRelationshipId=2929574 14 http://www.justice.gov/opa/pr/2011/ March/11-ag-299.html 15 http://www.justice.gov/dea/pubs/ states/newsrel/2011/chicago111611.html Circle 273 on Reader Service Card 16 http://insightcrime.org/insight-latest- news/item/1223-mexicos-zetas-gang- GW COLLEGE OF PROFESSIONAL STUDIES expand-influence-in-us-fbi ARLINGTON 17 http://www.theatlanticwire.com/ Master of Professional Studies Information Sessions technology/2011/11/anonymous- Saturday, April 14 barrett-brown-armed-mexican-drug- Security and 10:30 am cartels/44578/ Thursday, May 10 18 http://www.fbi.gov/news/sto- Safety Leadership 6:30 pm Learn from experts. Classes taught by professionals in 950 N. Glebe Rd., 6th Floor ries/2011/october/gangs_102011 homeland security policy, law enforcement cooperation, public Arlington, VA 22203 19 http://www.govtrack.us/congress/bill. safety leadership, emergency management, and cyber security. Metro: Orange Line to Ballston xpd?bill=h112-1270 Specialize your coursework. Choose to focus your studies Rsvp Today! on Fundamentals of Strategic Security or Strategic 703.248.2800 www.nearyou.gwu.edu/ssl Other sources: Cybersecurity Enforcement. Interview with M.M., a Texas law Attend convenient classes. Classes are offered one evening enforcement officer per week and one Saturday a month in Arlington, Virginia. Previous interviews with DEA and Earn credentials quickly. Complete a master’s degree in FBI agents working cartel issues on the approximately 16 months. Mexican border http://abclocal.go.com/ktrk/ video?id=8440277&pid=8439923 (raw video from the scene) http://www.borderlandbeat. com/2011/11/spillover-violence-riddles- grow-with.html

The GeorGe WashinGTon UniversiTy is an eqUal opporTUniTy/ 37306 affirmaTive acTion insTiTUTion cerTified To operaTe in va by schev. Circle 321 on Reader Service Card 28 The Counter Terrorist ~ April/May 2012 Circle 282 on Reader Service Card The Counter Terrorist ~ April/May 2012 29 Islamist Economic Warfare: Jihad with Money by Kevin D. Freeman

Wall Street. Photo: Poco a poco CounterThe

30 The Counter Terrorist ~ April/May 2012 “Al Qaeda’s supporters are aware of the cracks in the Western financial system as they are aware of the lines in their own hands.” — Osama bin laden, in a 2001 interview

Photo: FBI

t was not a coincidence that the World reason the World Trade Center was Trade Center towers were targeted by selected was that it was the most densely Islamic radicals. On February 26, 1993, concentrated zone of capitalist finance in a truck bomb was detonated with the the world. intention of knocking the North Tower To many strict Muslims, free market into the South Tower, killing thousands of capitalism is a violation of what is right. people.2 The attack was a failure, but al- It is viewed as human in origin and thus Qaeda didn’t give up. Despite an increase contrary to the divine plan of Allah as Besides the in security, the towers remained a primary revealed in the Koran.3 Perhaps the most target until planes brought them down significant disagreement with capitalism issues of greed less than a decade later in the worst act of is based on the concept of interest or and interest, terrorism ever perpetrated on American increase, also known as riba, which is soil, killing more than 3,000. The target considered forbidden to a Muslim.4 In jihadists wasn’t chosen solely to produce casualties, response to the rise of capitalism, Islamic also despise however. A crowded stadium on a Sunday economic principles were adapted into afternoon might have provided an easier an approach known as shariah-compliant capitalism opportunity to wipe out close to 100,000 finance (SCF)—jihad with money—in because of its football fans. The Trade Center towers the early twentieth century.5 One of the likewise weren’t chosen just for their fastest-growing forms of finance in the ability to fund symbolic value. That could more easily world today, SCF was largely constructed Western military have been accomplished by destroying a in its modern form by Muslim national monument. Instead, the main Brotherhood founder Hassan al Banna, might.

The Counter Terrorist ~ April/May 2012 31 who “designed political, economic, and financial foundations to enable Muslims to fulfill a key form of jihad mandated by the Koran—financial jihad.”6 According to Yusuf Qaradawi, an Egyptian Islamic theologian and host of ash-Shariah wal- Hayat (Shariah and Life) on Al Jazeera—a show with an audience of 60 million spanning the globe—“I like to call it Jihad with money, because Allah has ordered us to fight enemies with our lives and our money.”7 Besides the issues of greed and interest, jihadists also despise capitalism because of its ability to fund Western military might. Monin Khawaja, a Canadian citizen who attended Pakistani terror training camps and was later convicted of participating in a bomb plot in Great Britain, wrote, “We Mohamed el-Beltagy, a Muslim Brotherhood member running for the lower house have to come up with a way that we can of parliament as an independent, campaigns in his district in the Shobra el-Khaima drain their economy of all its resources, neighborhood of Cairo two days before the parliamentary election. Photo: Al Jazeera English cripple their industries, and bankrupt their systems in place, all so that they are

Protective security equiPment

At ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support. • CALIBER® Robot • Hook & Line Kits • Search Mirrors • EOD Hand Tools • Search Kits

ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3 Tel: 613.745.3600 I Fax: 613.745.3590 I Email: [email protected] Toll Free: 1.877.483.7978 www.icortechnology.com

32 The Counter Terrorist ~ April/May 2012 Circle 81 on Reader Service Card Mobility, Deployment, Maintenance, Sustainment And Operations Systems

Deployable Command Centers

Enhanced Command and Control Secure Communications Video Conferencing Increased Protection for Sensitive Equipment Increased Mission Flexibility Multiple System Configurations Deployable via Military and Commercial Vehicles Air-Transportable and Sling-Loadable

Deployable Data Security

360° High Data Container Density HVAC Weather and Fire-proof Insulation HVAC Condenser/ Maximum Flexibility Venting ISO Compatible Enclosure Evaporator Chilled H2O Completely Customized to Client Requirements

Fire Detection Un-Interruptable Power Distribution and Suppression Racks Power Supply (UPS) Unit (PDU)

Phone (866) 312-6226 (571) 259-2817 THE Fax (800) 862-9489 Email [email protected] SSEESSOOLLININC www.sesolinc.com GROUP Circle 239 on Reader Service Card

The Counter Terrorist ~ April/May 2012 33 forced to withdraw their troops, so they 9/11, he explained how crucial it was to cannot afford to go to war. . . . We need target the financial heart of the United constant economic [jihad], blow after States: blow, until they cripple and fall, never to I will talk briefly and concentrate on the The only question rise again.”8 These thoughts were echoed need to continue the jihad action, militarily is how would the by Osama bin Laden in his so-called and economically, against the United States. “Letter to the American People”: . . . The economic bleeding is continuing financial jihad be We call you to be a people of manners, to date, but it requires further strikes. The carried out? principles, honour, and purity; to reject the young people should make an effort to immoral acts of fornication, homosexuality, look for the key pillars of the US economy. intoxicants, gambling, and trading with The key pillars of the enemy should be interest. . . . You are the nation that permits struck, God willing. They shook America's Usury, which has been forbidden by all throne and struck at the US economy in religions. Yet you build your economy and the heart. . . . This is a clear proof that investments on Usury. . . . You are a nation this international usurious, damnable that permits gambling in all its forms. economy—which America uses along with [sic] The companies practice this as well, its military power to impose infidelity resulting in the investments becoming active and humiliation on weak people—can and the criminals becoming rich.9 easily collapse. Thanks to Almighty God, To replace capitalism with SCF, those blessed attacks, as they themselves capitalism must first be destroyed, as bin admitted, have inflicted on the New York Laden understood. Immediately after and other markets more than a trillion

Reconyx HyperFire security series cameras are designed for quick and easy deployment in areas where no power or communication lines exist. • Motion activated trigger as fast as 1/10th of a second. • Completely weatherproof housing designed for • 1080P High Definition color images by day, NoGlowTM Covert extreme duty usage. Infrared illumination by night. • General surveillance and license plate capture • Compact size (5.5” x 4.5” x 3”) aids in concealment. models available. No • On-board memory and power with a battery life of up to one • Made in the U.S.A. Glow CCovertovert year or 40,000 images. IInfrarednfrared

Visit www.reconyx.com for more information.

303 34 The Counter Terrorist ~ April/May 2012 Circle on Reader Service Card Video training from leading law enforcement experts. Anytime, anywhere.

With more than 500 high-definition videos covering dozens of critical training topics, the PoliceOne Academy gives you instant, cost-effective access to training that will improve your team’s performance and help keep them safe on the streets.

The PoliceOne Academy Offers

• No overtime, travel, or downtime costs associated with training • A wide variety of topics from Defensive Tactics to Leadership • Ideal for in service/roll call training • An easy-to-use video navigation and management system • Objective lesson plans and knowledge check quizzes • Tracking and reporting features • An advanced-delivery system that ensures the highest possible quality of streaming available based on your internet connection • Access from your mobile device • Available to departments for an affordable annual subscription based on agency size

Contact us today at (800)323-0037 for your FREE department preview! Circle 335 on Reader Service Card

is a Praetorian Group Company

Circle 180 on Reader Service Card www.PoliceOneAcademy.com The Counter Terrorist ~ April/May 2012 35 dollars in losses. . . . It is very important [in exchange] for the help that is given, has become a “hyperstrategic” weapon that is to concentrate on hitting the US economy you gain control over the policies of the attracting the attention of the world. This is through all possible means.10 country, and when you gain control over because financial war is easily manipulated The conflict between shariah finance the policies of a country, effectively you and allows for concealed actions, and is also and capitalism is almost universally have colonized that country.” highly destructive. . . . The most unsettling understood in the Islamic world. As Mohamad, bin Laden, Khawaja, aspect of financial terrorism is “hot money” another example, in 2002 then Malaysian Qaradawi, and al Banna represent various which is able to launch destructive attacks Prime Minister Mahathir Mohamad countries and Islamic backgrounds. upon a nation’s economy within several founded the Islamic Financial Services But, they all agreed on the principles of days, and the target varies from national Board to develop a “universal Islamic shariah finance and recognized the role of central banks to poor people.13 banking system” with the purpose of jihad with money. The only question is The Chinese strategy book went on abolishing the “slavery” of the Western how would the financial jihad be carried to describe the process for conducting international monetary system.11 In a out? I believe that the answer can be financial warfare, including the ability to PBS interview in July 2001, Mohamed found in a Chinese book, published by cause a stock market crash and pointing observed, “In the old days you needed the People’s Liberation Army in 1999 to the techniques of George Soros.14 to conquer a country with military under the translated title Unrestricted Soros is a well-known, multibillionaire force, and then you could control that Warfare: hedge fund manager known for dramatic country. Today it's not necessary at all. The goal should be to use all means financial movements and a strongly You can destabilize a country, make it whatsoever—to force the enemy to serve leftist philosophy. The Chinese authors poor, and then make it request help. And one’s own interests. . . . Financial warfare likened him to a “financial terrorist,”

All Armor. All The Time.

Armored SUVs Armored Tactical and Riot Trucks Armored Buses.

Armored Vehicles - From simple cargo transport to We provide the following products and services: dignitary protection, we have the skills needed to Armored Passenger Vehicles manufacture or acquire the right vehicle for your needs. Designed and Engineered Armored Solutions Fleet Management, Parts and Service Military Vehicles and Systems - Whether you are looking Contract Production for chassis up design and build, or are looking to protect Training and Education systems on existing platforms, our people and skills will provide a quality solution.

www.heat-armor.com 1.773.938.1030 [email protected]

36 The Counter Terrorist ~ April/May 2012 Circle 175 on Reader Service Card Soros talks in Malaysia. Photo: Jeff Ooi presumably for his success in breaking would be far more lethal than a direct There is reason the British pound and allegedly attacking military strike.16 When bin Laden was Asian economies.15 It is reasonable to killed, American special operations to consider the suspect that bin Laden himself not only personnel uncovered a document that possibility that the read but followed the directions of the outlined a “strategy concept for an attack Unrestricted Warfare manuscript. Bin on Europe’s economy.”17 Interestingly, stock market crash Laden was mentioned several dozen the document did not mention specific in 2008 may have times in its pages, mostly in close targets. Rather, it was a “concept strategy” proximity with mention of Soros. In that would appear to be much in line been triggered as an fact, the Chinese authors even made the with the Unrestricted Warfare approach.18 act of financial jihad. point that linking the approaches of bin Is it merely coincidence that bin Laden’s Laden and Soros, traditional terrorism financial jihad focus was on Europe even and financial warfare, would produce as the European economy appears to have a “supra-domain combination” that been under attack?

The Counter Terrorist ~ April/May 2012 37 There is reason to consider the authorized short selling under shariah possibility that the stock market crash finance just before the market turmoil?23 in 2008 may have been triggered as an Mahathir Mohamed once commented, act of financial jihad. Circumstantial “We know that players in the stock evidence, at least, seems to support market can also destroy the stock market the possibility of that hypothesis. We simply by short selling. And to short sell know in hindsight, according to a you don’t even need to have the shares.”24 George Soros op-ed in the Wall Street A postmortem Bloomberg review of Journal, that the collapse began with trading data seemingly confirmed that financial attacks known as “bear raids” this was, in fact, the mechanism used to perpetrated against Western financial bring down Lehman Brothers and Bear institutions, such as Bear Stearns Stearns.25 and Lehman Brothers.19 These banks It’s clear that radical Islamists have the (both with Jewish origins, making motive to attack capitalism. The financial them perhaps even more abhorrent crisis, overleveraged system (debt), and to Islamic supremacists) made their development of complex derivatives money from forbidden riba, in the and other financial weapons provide the forms of speculation and interest. opportunity. The one remaining question As such, they were ideal targets for then becomes whether or not they have financial jihad. This principle was the means to do so. explained by Nigerian Muslim Bank The fact that Gaddafi had more than robbers as reported in AllAfrica.com. $200 billion in investable assets stashed Spokesman of the group, Abu Zaid, around the world, a huge multiple of said: "Let me confirm to you that our what was expected and four times as warriors had actually attacked three much as Warren Buffett is reported to banks, namely Bank PHB, First Bank have, should answer the question.26 of Nigeria and Unity Bank where they This is the same Gaddafi who had been carted away huge sums of money. We caught giving money to radical Islamic took the measure because the mode of groups for various plots in the past.27 In operations of the banks was not based on addition, there are numerous reports of Islamic tenets." 20 a “golden chain” of Islamist billionaires In a similar way, the January 2011 who have supported bin Laden and other Inspire Magazine (al-Qaeda’s English terrorists.28 Of course, this doesn’t even language publication) cover story include the trillions of dollars held by explained “the Rule of Dispossessing Middle East Sovereign Wealth Funds, wealth from unbelievers,” justifying mostly controlled by SCF.29,30 There any attack on Western financial should be no doubt that the means exist institutions.21 for a financial attack if not an all-out What destroyed Bear Stearns and economic war. With oil over $100 per Lehman, according to Soros, were bear barrel, the risk grows exponentially with raids using financial means, including nearly another $500 billion sent to the unlimited short selling and complex Middle East annually.31 credit derivatives once described There are a lot of pieces to this puzzle by Warren Buffett as “financial and it is the complex subject to which weapons of mass destruction.”22 Is it I dedicated the book Secret Weapon: coincidence that Islamic authorities How Economic Terrorism Brought Down

Circle 343 on Reader Service Card 38 The Counter Terrorist ~ April/May 2012 A lone fire engine at the crime scene in Manhattan where the World Trade Center collapsed following the Sept. 11 terrorist attack. Photo: Chief Photographer's Mate Eric J. TIlford. the U.S. Stock Market and Why It Can attack by jihadists, however, there is little As they persisted Happen Again.32 What we can be certain cause for rest. As they persisted with of, however, is that some Islamists firmly the Twin Towers, finally succeeding in with the Twin Towers, believe in a “jihad with money” that 2001, we must be vigilant to prevent finally succeeding in another financial attack, this one aimed at sanctions financial terrorism, especially 2001, we must be against riba-based institutions. We also destroying our very way of life. • know, according to Chinese military vigilant to prevent documents, that a modern form of ABOUT THE AUTHOR another financial financial terrorism can be a destabilizing Mr. Freeman is author of Secret stock market attack using bear raid Weapon: How Economic Terrorism attack, this one aimed techniques attributed to George Soros. Brought Down the U.S. Stock Market at destroying our very Finally, it appears that those very and Why It Can Happen Again (www. techniques were used extensively in 2008 secretweapon.org). He has consulted for way of life. and played a serious role in our financial and briefed members of the US House collapse, and the issues unfolding in and Senate, CIA, DIA, FBI, SEC, Europe more recently. DOJ, and Homeland Security on the Fortunately, our economy appears issues of economic warfare and financial to have stabilized somewhat in the past terrorism. He authors the blog www. two years. If 2008 was a financial terror globaleconomicwarfare.com.

The Counter Terrorist ~ April/May 2012 39 end notes 1 “TERRORISM FINANCING: ORIGINATION, ORGANIZATION, AND PREVENTION,” U.S. Congress. Senate. Committee on Governmental Affairs. 108th Congress, 1st Session, 31 July 2003. Washington, DC: U.S. Government Printing Office, 2004. 194p. [Hearing]. http://www.odl.state.ok.us/ usinfo/terrorism/ideologies.pdf; accessed January 2012. 2 Childers, J. Gilmore; Henry J. DePippo (1998-02-24). "Senate Judiciary Committee Hearings: Foreign Terrorists in America: Five Years After the World Trade Center". US Senate Judiciary Committee. Archived from the original on 2007-12-27. http://web.archive.org/ web/20071227065444/http://judiciary. senate.gov/oldsite/childers.htm. Accessed January 2012. 3 Clancy N. Childs, “A Comparative Circle 207 on Reader Service Card Analysis of Capitalist and Islamic Economic Systems,” Final Paper, AAPTIS IR 331 – Section 3, April 22, 2002, http:// www.isu.ac.ir/farsi/academics/economics/ W NE Versions 6.8A and 6.8IR edu/dlc/2rd/01/other/1.2.pdf, accessed January 2012. One light with four colors and 15 different program settings, 4 including strictly IR modes and "Light Grenade/Distraction Mode” Ibid. 5 "E/T Light is now associated with the Standardized Equipment List(SEL) Mohammad Nejatullah Siddiqi, numbers [03OE-03-GLRL] System, Marking, Green Line/Red Line And [09MS-01-TTAG] Tags and Supplies, Triage." “Shariah, Economics and the Progress Recent Email from Soldier in Afghanistan: of Islamic Finance: The Role of Shariah Experts,” SEVENTH HARVARD Here's just a short list that I found useful for the lights: Used Flashlight Top and Magnetic base for Map Reading Lights in our HUMVEE FORUM ON ISLAMIC FINANCE, Same configuration mounted on top of HUMVEE for IFF (Blinking IR) identification Cambridge, Massachusetts, 21 April We trained using the traditional light as a Triage Use 2006, http://www.siddiqi.com/mns/ Used the Rapidly Flashing Multicolor as Casualty Collection Point Marking I mounted with 550 on the back of a few Soldiers to use as IFF Markings for Personnel Role_of_Shariah_Experts.htm, accessed - strobes tend to be way to intense for dismounted personnel and washes out NVG's. January 2012. These seemed to work much better and didn't wash out the NVG's 6 Rachel Ehrenfeld and Alyssa I used one in my tent simply for Low Level Light at night when I didn't want to blind everyone else sleeping in the tent. A. Lappen, “The Fifth Generation The Light can be used as a BUZZ Saw signal easily by tying it to a longer piece of 550 Cord. Warfare (5GW) Shari`ah Financing These are the main uses I found for the light. Simply use it for one thing and it transitions to another so simply. And when you don't need it, it turns off; chemlights have to be thrown away or hidden in a pocket. and the Coming Ummah,” published in “Armed Groups: Studies in National > Get Your Free Security, Counterterrorism, and “Disaster ID” Application Counterinsurgency,” chapter 28, US Naval War College, June 2008, Southwest Synergistic Solutions [email protected] | www.TriageLights.com 345 40 The Counter Terrorist ~ April/May 2012 Circle on Reader Service Card KNOW BEFORE YOU GO ® Before you send your tactical team through the door, throw in the stealthy Recon Scout® XT. It can crawl over clothing and other debris and transmit clear, crisp video that can reveal the location of subjects and the layout of rooms. The XT weighs just 1.2 lbs, and is exceptionally quiet. Its infrared optical system also allows you to see in complete darkness. Learn more about its life-saving capabilities and arrange a demo at www.recon-scout.com/XT

TM

WORLD LEADER IN TACTICAL MICRO-ROBOT SYSTEMS ® Contact: Aimee Barmore, 1-866-697-6267 x111 [email protected]

Circle 337 on Reader Service Card The Counter Terrorist ~ April/May 2012 41 Circle 305 on Reader Service Card

Recon Scout XT Law Enforcement 2012_Counter Terrorist_8.375 x 10.875”_2/15/12 http://www.acpr.org.il/nativ/0811-6- economy, report says,” M&C News, Aug 2009, http://www.bloomberg.com/apps/ rehrenfeldE1.pdf, accessed December 24, 2011, http://www.monstersandcritics. news?pid=newsarchive&sid=aB1jlqmFO 2012. com/news/europe/news/article_1658910. TCA, accessed January 2012 7 “Panorama: Faith, Hate and php/Al-Qaeda-plotting-against- 26 Muammar Gaddafi spirited over Charity,” BBC, July 30, 2006, http:// European-economy-report-says, accessed $200 billion out of Libya: Report,” The www.bbc.co.uk/pressoffice/pressreleases/ January 2012 Economic Times, 22 October 2011, stories/2006/07_july/30/panorama.shtml, 18 Ibid. http://economictimes.indiatimes.com/ accessed August 2011. 19 George Soros, “One Way to Stop news/politics/nation/muammar-gaddafi- 8 Matthew Levitt, “TERRORISM Bear Raids,” The Wall Street Journal, spirited-over-200-billion-out-of-libya- SALON: Matthew Levitt on March 24, 2009, http://online.wsj.com/ report/articleshow/10450416.cms, Al Qaeda’s Economic Warfare,” article/SB123785310594719693.html, accessed January 2012 TheWashingtonNote.com, 30 July, 2008, accessed January 2012. 27 Écrit par Point de Bascule, “The http://www.thewashingtonnote.com/ 20 Hamza Idris And Yahaya Ibrahim, Muslim Brotherhood and Gaddafi were archives/2008/07/terrorism_salon_29/, “Boko Haram - Why We Are Attacking partners not too long ago,” 28 February accessed September 2011 Banks - Sets Terms for Ceasefire,” 2011, http://pointdebasculecanada.ca/ 9 “Full text: bin Laden’s ‘letter to 14 July 2011, http://allafrica.com/ articles/1467.html, accessed January 2012 America,’” Guardian (UK), November stories/201107140416.html, accessed 28 Glenn R. Simpson, “List of Early 24, 2002, http://www.guardian.co.uk/ January 2012. al Qaeda Donors Points to Saudi Elite, world/2002/nov/24/theobserver, accessed 21 Thomas Joscelyn, “Anwar al Awlaki: Charities,” The Wall Street Journal, August 22, 2011. Jihadists should steal from disbelievers,” March 18, 2003, http://www67. 10 Osama Bin Laden, FBIS translated The Long War Journal, January 17, homepage.villanova.edu/andrew.gasperi/ text of message carried on Al-Jazirah 2011, http://www.longwarjournal.org/ article%204.htm, accessed January 2012 satellite channel television, 27 December archives/2011/01/anwar_al_awlaki_jiha. 29 “Sovereign Wealth Funds 2001, http://groups.yahoo.com/group/ php#ixzz1iYgon833, accessed January Backgrounder,” Council on Foreign MewNews/message/4339, accessed 2012 Relations, January 28, 2009, http://www. March 2009. 22 “Buffett warns on investment 'time cfr.org/international-finance/sovereign- 11 Gamal Essam El-Din, “A financial bomb,’” BBC News, 4 March 2003, wealth-funds/p15251, accessed January jihad,” Al-Ahram Weekly, 21 - 27 http://news.bbc.co.uk/2/hi/2817995.stm, 2012 November 2002 (Issue No. 613) http:// accessed January 2012. 30 Tahir Jawed, “Hedge Funds Home weekly.ahram.org.eg/2002/613/ec2.htm, 23 Joanna Slater, “When Hedge In On Islamic Investors,” FINalternatives, accessed June 2009. Funds Meet Islamic Finance,” November 6, 2008, http://www. 12 Commanding Heights interview with The Wall Street Journal, August finalternatives.com/node/5994, accessed Dr. Mahathir bin Mohamad conducted 9, 2007, http://online.wsj.com/ January 2012 2 July 2001 for PBS, http://www.pbs. article/SB118661926443492441. 31 Gal Luft, Oil Dependency is org/wgbh/commandingheights/shared/ html?mod=googlenews_wsj, accessed America's Financial Ruin, The Cuttying minitext/int_mahathirbinmohamad. January 2012 Edge, March 31, 2008, http://www. html, accessed September 2011. 24 Commanding Heights interview with thecuttingedgenews.com/index.php?arti 13 Col.K9 Qiao Liang and Col. WangCOP Dr. Mahathir bin Mohamad AD conducted cle=401&pageid=&pagename=, #1 accessed Xiangsui, Unrestricted Warfare (Panama 2 July 2001 for PBS, http://www.pbs. January 2012 City, Panama: Pan American Publishing org/wgbh/commandingheights/shared/ 32 Kevin D. Freeman, “Secret Weapon: Company, 2002), 43, 40, 127 minitext/int_mahathirbinmohamad. How Economic Terrorism Brought Down 14 Ibid, 16, 39 html, accessed September 2011. the U.S. Stock Market and Why It Can 15 Ibid, 36 25 Gary Matsumoto, “Naked Short Happen Again,” (Regnery, 2012) 16 Ibid, 163 Sales Hint Fraud in Bringing Down 17 “Al-Qaeda plotting against European Lehman,” Bloomberg News, March 19,

42 The Counter Terrorist ~ April/May 2012 New and improved

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB. The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever. The Portable Vehicle Barrier comes with several customized configurations: • You can put wheels on it so that it acts as a swing barrier and easily opens a road • You can toughen the line by adding anchoring cables or place the PVB’s in one single row or even three rows to stop anything • Additional safety features can be added PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable. Best of all NO maintenance is required. Made in the USA means jobs in the USA and supporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity and delivery location. Call: (305) 401-6906 ® SECURITY or email [email protected] SOLUTIONS INTERNATIONAL Or visit our website: www.SSIPVB.com ® SSISSI Protecting the Homeland Together 308 226 Circle on Reader Service Card Circle on Reader Service Card The Counter Terrorist ~Circle April/May 136 on Reader 2012 Service 43 Card Book Review You Don’t Need a Weatherman to Know Which Way the Wind Blows By Karin Asbley, Bill Ayers, Bernardine Dohrn, et al. Reviewed by: Chris Graham

he (1969) riots known as the “Days people have less stake in a society (no

of Rage” mark the turning point of family, fewer debts, etc.)…” and add, “In

‘ ‘ Ta small domestic group from protesting ‘ jail-like schools, kids are fed a mish-mash and rioting to the initiation of a vio- of…lies while being channeled into job lent terrorist campaign to achieve their and career paths set up according to the demands. This series of events is highly priorities of monopoly capital.” The writ- instructional today for the understand- ers state, “Activists and cadres …will help ing of domestic militant groups and expand and deepen the movement in… their operational transformation. Their schools.” It is worth noting that some of experience also demonstrates the multi- the document’s writers do the “channel- track strategy that is popular to this day ing” now as college professors.1 in which nonviolent groups and terrorists The revolutionaries predicted, “Win- maneuver in tandem for the realization of ning state power in the US will occur shared objectives. as a result of the military forces of the Some of those associated with the US overextending themselves around Days of Rage, Karin Asbley, Bill Ayers, the world…struggle within the US will Bernardine Dohrn, et al., published “You be a vital part of this process, but when Bill Ayers. Photo: Thomas Good Don’t Need to be aWeatherman to Know the revolution triumphs in the US it Which Way the Wind Blows” (New Left struggling businessmen…we…look to will have been made by the people of Notes, 1969). This document reveals Mao…the [Black] Panthers, the Third the whole world.” They insist, “…when tactics, strategy, and ideology from one World, for our models…” imperialism is defeated in the US, it will of the most dangerous domestic terrorist The writers state, “In all our work we be replaced by socialism—nothing else.” groups the USA has experienced. It can should try to formulate demands that… The writers observe, “When the petit be accessed at www.archive.org. tie us to…separate struggles…to show bourgeoisie’s interest is for fighting The writers describe their objectives: that we’re one multi-issue movement…” imperialism on a particular issue, but “…the goal of the revolutionary struggle They assert that “Agitational demands not for overthrowing it and replacing must be the control…of…wealth in the for impossible, but reasonable [sound- it with socialism, it is still contributing interests of the oppressed peoples of the ing] reforms are a good way to make a to revolution…” and, they admonish, world.” They add, “…we determine who revolutionary point.” They add, “Mix- “The development of revolutionary are our friends and who are our enemies ing different issues, struggles and groups Marxist-Leninist-Maoist collective according to whether they help US impe- demonstrates …there is one system...so formations…is…the responsibility of rialism or fight to defeat it.” all these different problems have the same every revolutionary.” • The Weather-people understood that solution, revolution.” “…oppression falls heavier on…workers The revolutionaries suggest, “To win a 1 http://www.nbcchicago.com/news/ [it] is worsened through rising taxes, in- war with…the imperialists will require a local/Controversial-Professor-Bill-Ayers- flation and the fall of real wages….” They (clandestine) organization of revolution- Speaks-With-Occupy-Chicago-Protes- decided that “Our heroes are no longer aries…” They understood that “…young tors--134045388.html accessed 2-7-12

44 The Counter Terrorist ~ April/May 2012 TSAC CONFERENCE April 10 – 12, 2012 / Las Vegas / M Resort

Are you looking for the most cutting-edge • Learn from the leaders in the field like Cmdr. tactical research and training methods? Thor Eells, Kathy Vonk, Dr. Brian Schilling, Join us at the 2012 TSAC Conference. Frank Palkoska, Col. Brian McGuire, and Presented by experts in tactical research and more. training implementation, this conference • Engage in hands-on sessions like High encompasses all aspects of tactical strength Intensity Tactical Training, Explosive Power and conditioning including; injury prevention, Development, and Injury Prevention. testing and evaluation, nutrition, load carriage, and much more. With individual • Session topics range from Metabolic Training and Needs Analysis to Program military, firefighter and law enforcement Design and Physical Readiness Training. tracks, you’ll learn training methods specific to the demands of each job and take away the knowledge and skills to build safe and effective training protocols.

Don’t miss Stew Smith’s keynote presentation on “The Need for Physical Training among Tactical Populations.” Use promo code CT12 to save $25 off of registration.

800-815-6826 National Strength and Conditioning Association www.nsca-lift.org/TSAC2012

Circle 329 on Reader Service Card The Counter Terrorist ~ April/May 2012 45 Al Jazeera: News Organization or Propaganda Network?

CounterThe Photo: Al Jazeera English 46 The Counter Terrorist ~ April/May 2012 More than 10 years have passed since the 9/11 terrorist attacks and we face a dramatically increasing terror threat from radical Islamist groups, based here at home and abroad.

By M. Zuhdi Jasser

his threat continues to grow because Counterterrorism2 fails to name the Sadly, the enemy we, as a country, continue to ideology we are fighting. Further, the Tmyopically focus on the symptom of strategy fails to identify the threat posed provides daily tutorials Al Jazeera: terror and have failed to realize that we by Islamist indoctrination3 that exists to to the world via the are, in fact, in an ideological war against propagandize young Muslims to support militant Islamism, the violent offshoot of and participate in a worldwide jihad Internet and satellite News Organization or the deeper, more pervasive theopolitical against the United States and the West. programming on construct of political Islam or “the Islamic Groups such as al-Qaeda and Hezbollah state.” The binL adens of the world have been extremely effective at gathering how it uses global Propaganda Network? are merely by-products of the primary new recruits and encouraging “lone media to spread its ideological threat. Despite bin Laden’s wolves” through global media and Islamist recent demise, al-Qaeda and groups like programming. supremacist ideas it will continue to reshape themselves If we truly hope to defeat terrorism, we while the West largely with new ideological leaders and handlers must engage in the ideological conflict. remains asleep. around the world because we have yet to Islamism will not be defeated by bullets or effectively engage in the battle against the valor in combat. It will only be defeated ideology that creates Islamist extremism. in an open war of ideas where we pit According to the Investigative Project Western principles of universal equality on Terrorism, of 228 recent arrests on and individual liberty under God against terrorism charges, more than 80 percent political Islam and Islamist interpretations (186) involve defendants “driven by a of shariah. As British Prime Minister 1 radical Islamist agenda.” Yet the United David Cameron recently noted, we must States’ current National Strategy for not only remove the militants, we must

The Counter Terrorist ~ April/May 2012 47 drain the pool in which they swim.4 That doubt that the Internet, Facebook, Twitter, pool is their ideology. and YouTube played a major role in Sadly, the enemy provides daily tutorials mobilizing and unifying the opposition in to the world via the Internet and satellite Egypt, Tunisia, Bahrain, Libya, and Syria, programming on how it uses global media to name a few. But, again, the Internet to spread its supremacist ideas while the simply served as a vehicle for that change. West largely remains asleep. It is certainly playing a growing role in Cyberjihad, which understandably what is “Muslim culture and ideology,” but receives a lot of publicity, is effective for it is still outpaced by the profound impact radicals when Islamist Muslims are looking of major satellite television networks like to cross the firewall of nonviolence to Al Jazeera or Al Manar. In fact, Al Manar violence. TheI nternet aptly serves the identifies its mission on its main website as radicalization process moving susceptible “psychological warfare against the Zionist Muslims toward that endpoint of enemy.”6 Regardless of the medium, the militant jihad as the NYPD Report on United States continues to be “missing CLEAR Radicalization in the West: Homegrown in action” in the war of ideas within all Threat illustrated so well.5 But television outlets. And when the United States does is the most effective radicalizer because venture into “Muslim” media, it does so it provides a daily diet of Islamist from a position of defense rather than propaganda and indoctrination that offense. SECURE permeates culture. One of the reasons many in the Television media can be far more United States and Israel are watching effective in swaying and moving large the revolution in Syria with hope is the numbers of people because they do profoundly negative impact that the fall TRAIN not depend upon the navigation of of the Bashar Assad regime would have certain websites and ideas. It has far less upon Hezbollah and its radical Islamist competition and can actively and passively operations in Lebanon. The amount of radicalize people through the fostering resources that are funneled from Iran of a media culture that is dominated by through Syria into the coffers of Hezbollah Islamist ideas. Muslims who are raised in are untold, but crucial to the organization. an Islamist political culture will slowly A central part of the Hezbollah operation slide toward sympathy and deeper bonds is its television broadcasting arm, Al with militant Islamist organizations. Manar. Recent reports out of Lebanon TheI slamist political culture has many are that Hezbollah has taken over the hallmarks, most notable of which is Lebanese government as announced by the prevalence of Islamic supremacist Prime Minister Najib Mikati in June ideas, nonfactual conspiracy theories, 2011.7 Its rise to power has been to the anti-Semitism, and anti-Israeli and anti- result of many factors, not least of which American sentiments. is its information war advanced from its Whereas Islamist websites serve as a terrestrial and satellite station, Al Manar. resource that may answer some questions for budding Islamists, the psychological Al Jazeera indoctrination of Islamists usually begins Al Manar is overt in terms of within more insidious elements of the propaganda TV for Islamist ideology, but “Muslim” culture. As we observe the it is just the tip of the iceberg in terms of transformations sprouting from what was the global reach of Islamist ideological dubbed the “Arab Spring,” there is no programming. Al Jazeera, which is much roncoconsulting.com

Circle 324 on Reader Service Card 48 The Counter Terrorist ~ April/May 2012 more well known in the West and operates freely in Western countries, uses many similar tactics. Terrorism analyst, Walid Phares, describes Al Jazeera as “Jihad television.” Although it is not run by a terrorist organization like Hezbollah, it is owned and operated by the autocratic Qatari government’s Emir Sheikh Hamad bin Khalifa al-Thani. Thus, according to the Department of State (as reported in the Guardian from recent WikiLeaks files), it is basically a major policy arm for the Qatari government and they note that its programming is used as a bargaining tool in international negotiations.8 Al Jazeera is based in Doha, Qatar, and was launched in 1996. It has grown to be the most watched satellite television station in the Middle East. The Qatari government claims to champion press freedom elsewhere, but generally does not tolerate it at home,” the US embassy stated when the French director of the Doha Centre for Media Freedom resigned in June 2009. He cited restrictions upon his “freedom to report” in his departure. Yet the same organization refused to stop airing bin Laden’s videos citing journalistic freedoms. Al Jazeera’s programming has many Bashar and Asmaa al-Assad in Moscow. Photo: Rakkar of the same traits as Al Manar, tending toward incitement, and anti-Americanism cleric among Islamists and Salafists. and anti-Israeli propaganda. But they are During a typical show, for example, one often more subtle and less direct because viewer addressed a question to Sheikh al- Al Jazeera seeks a more “mainstream” Qaradawi. He inquired about the role of The amount of audience. When Ghassan Bin Jeddo, the righteous (al-salihun) in the Koran in resources that are a well-known Al Jazeera journalist, the liberation of the holy places of Islam confirmed a report that he was leaving Al and the victory of the (Muslim) nation. funneled from Iran Jazeera in April 2011, he reportedly stated Al-Qaradawi connected righteousness to through Syria into the that Al Jazeera was an “operation room” those who were responsible for liberating for incitement and mobilization.9 lands. He confirmed the Hadith (saying of coffers of Hezbollah One of Al Jazeera’s most popular shows the Prophet Muhammad) that states that are untold, but has been “Religious Law and Life” (al Jews who fought Muslims must be killed. Shar’iah wal hayat), which features Yusuf Nevermind that many other scholars crucial to the Al-Qaradawi, the senior spiritual leader have dismissed that Hadith as fabricated. organization. of the Global Muslim Brotherhood Regardless, Al-Qaradawi’s anti-Semitism network. He is perhaps the leading Sunni is deep and hateful. He has condoned

The Counter Terrorist ~ April/May 2012 49 Riots in Egypt, 2010. Photo: Jerry Jackson suicide bombing in Israel and Iraq. He by the enemies of Islam.”10 These are the selections dedicated to explaining the said that “the righteous were the source of radicalizing positions of a leading icon on theological importance of the Islamic state hope and aspiration and they would bring Al Jazeera. and the method of implementing shariah about the liberation of Jerusalem, as well His websites www.qaradawi.net and in an Islamic democracy. They are some as Palestine, Gaza, and all the lands ruled www.Islamonline.net have had large of the most trafficked sites byM uslims The Jersey Cuff™ The Next Generation in Disposable Restraints

Actual Size 7.5 inches 0.7 grams

• Patented Jersey Cuff™ is the lightest, smallest, safest and most versatile disposable cuff in the world • Fits in a pocket, a molle strap or in an operational carry pouch Tac-Pac™ - (pictured right) holds 4 Jersey Cuffs and a safety cutter Made in the U.S.A. G-Pac™ - gas mask pouch, holds 20 Jersey Cuffs Sold exclusively by Combined Systems, Inc. and attaches via drop style, molle system or D-rings 388 Kinsman Road Jamestown, PA 16134 and sling (888) 989-7800 Evac-Pac™ - for riot control or jail evacuations, the www.combinedsystems.com Evac-Pac™ holds 96 Jersey Cuffs

319 50 ~ April/May 2012 Circle 252 on Reader Service Card Circle on Reader Service Card CT_JerseyThe Counter Cuff Ad.indd Terrorist 1 2/28/12 9:05 AM Instant Access Introducing the All New Alpha Series Concealment Holsters from

The DSG Alpha Series Holsters Feature: • Solid Kydex Construction • Large In-Stock Inventory • Available for Most Popular Handguns • Models for Surefi re and Streamlight Weapon Lights • Formed for Close to the Body Fit • Adjustable Cant and Height

Available in black and dark earth • Convertible to Inside the Waistband Carry

Specialized Gear for Military and Law Enforcement Weapons & Components — Optics — Ammo dsgarms.com 1.800.382.7571

FREE SHIPPING on your fi rst order this month! Promotion Code: CT0312

GSA: GS-07F-6007R • CAGE: 1L0J5 Circle 275 on Reader Service Card The Counter Terrorist ~ April/May 2012 51 3RD IRREGULAR ARFARE Evolving Operational W Capabilities to Counter Irregular Adversaries Psychological Warfare Focus Day: May 30, 2012 Main Summit May 31-June 1, 2012 Washington, DC USA LEARN FROM AN UNPRECEDENTED SPEAKER LINEUP OF SENIOR IRREGULAR WARFARE LEADERS INCLUDING: • Major General Paul E. Lefebvre, USMC Commander, United States Marine Corps Special Operations Command • William F. Wechsler, SES Deputy Assistant, Secretary of Defense for Counternarcotics & Global Threats • Colonel Jon Doering, USMC Director, United States Marine Corps Center for Irregular Warfare • Lieutenant Colonel John Paganini, USA Director, Army Counter-Insurgency Center Army Irregular Warfare Fusion Cell • And more! Al Jazeera building in Doha, Qatar. Photo: Giorgio Montersino

Exclusive Discount for The Counter Terrorist Readers! 12 Save 20% off the standard around the world and virtual clinics in something has changed.’ All-Access fee with code: CTM_IW2012 Thus, the often incendiary footage Visit www.IrregularWarfareSummit.com or Islamist indoctrination. His ideas are call 1-800-882-8684 today clearly the underpinnings for the Islamist and vigorously anti-American and anti- Circle 289 on Reader Service Card movement globally and Al Jazeera has Israeli viewpoints fall in line with the provided him with a platform of which he agenda of the Muslim Brotherhood. This could have never dreamed.11 becomes exceedingly clear when one According to Eileen Toplansky, in the looks at the close relationship that exists American Thinker: between the ruling family in Qatar and FoRGe pARTneRShipS wiTh A CoMMUniTy At a conference in June 2011 at the the global Muslim Brotherhood where oF BoRDeR MAnAGeMenT expeRTS National Press Club, the panel of experts al-Qaradawi is a prime example. Al Jazeera Border Security Technologies Focus Day: May 21, 2012 concluded that ‘the network’[Al Jazeera] has over 60 million regular viewers. Its Main Summit: May 22 – 23, 2012 is often used by terrorists to deliver their Arabic broadcasts are far more overtly Tucson, AZ, USA messages to ‘the world’ and has ‘actually anti-American and anti-Western than its English broadcasts. Tackle the latest border challenges with: helped radical [groups] such as al-Qaeda, • Maj Gen Michael C. Kostelnik, USAF (ret), Hizb’allah and Hamas in their efforts to Assistant Commissioner, U.S. Customs and Border Protection, Office of Air and Marine (tentative) radicalize Muslims.’ The Al Jazeera Arabic Winning the War • Michael J. Fisher, Chief of the U.S. Border Patrol language network has ‘frequently served USM David P. Gonzales, U.S. Marshal for of Ideas—The District as a mouthpiece for Muslim Brotherhood • Thomas G. Atteberry, Special Agent in Charge, Only Way to Real Bureau of Alcohol, Tobacco, Firearms and figures’ according to conference members. Explosives (ATF), Phoenix Field Division Counterterrorism • Richard A. Barlow, Chief Patrol Agent, U.S. Border Furthermore, independent TV producer Patrol, Tucson Sector Jerry Kenney alleges that ‘[i]n effect, foreign and Security • Doug Coleman, Acting Special Agent in Charge, U.S. Drug Enforcement Administration (DEA), propagandists have hijacked public television Clearly, the Islamists have a significant Phoenix Division • James Turgal, Special Agent in Charge, FBI, stations made possible by the American advantage with organizations like Al Phoenix Division Manar and Al Jazeera that do not have • And many more! taxpayers.’ He voiced concern that in the past ‘public TV stations adhered to production to play by the same rules as American ExclusivE Discount for thE countEr tErrorist rEaDErs! standards that put a substantial emphasis on networks. In the United States, we rightly Save 20% off the standard accuracy in content’ but he affirms ‘obviously have an aversion to our government All-Access fee with code: TCT_BSW12 Visit www.BorderManagementSummit.com/Southwest or call 1-800-882-8684 today Circle 291 on Reader Service Card 52 The Counter Terrorist ~ April/May 2012 6th Annual National Homeland Security Conference

See Something, Say Something, Do Something, Together!

Circle 265 on Reader Service Card The Counter Terrorist ~ April/May 2012 53 conducting propaganda efforts against 27 Years Scanning T he World our own people as evidenced in 2002 by the media’s outcry against the Pentagon’s Counter Terrorism Solutions Office of StrategicI nfluence.13 Yet, this aversion should not preclude us from participating in a robust campaign against the foundations of Islamist ideology. When we look back at the cold war, one of the most important tools we utilized was the programming of the Voice of America and Radio Free Europe that Infrared Visual highlighted the benefits of a free society and revealed the ideological underpinnings of communism and socialism. This battle against militant Islamism is in many ways more significant than the ideological battle against communism because with the Soviet Union we had an enemy that respected the validity of the concept of “mutually assured destruction.” Our 1-800-888-2440 Islamist enemies do not have that fear www.infrared.com and, in fact, can glorify individuals within Circle 177 on Reader Service Card their society who are willing to sacrifice themselves to inflict damage on the “Great Satan.” With regard to Al Manar and Al Jazeera, the following policy recommendations We are not the Best because we are the oldest… need consideration: We are the oldest because we ARE the Best! • Sanctions against Al Manar’s funders and satellite providers. • Just as our own media is critical of its America’s Top EP Training School own funding sources and perceived bias, there needs to be an ongoing campaign Featuring the world renowned 7-Day of critique with respect to Al Manar’s Providing Executive Protection Program and Al Jazeera’s conflicts of interests with Established in 1978 by Dr. Richard W. Kobetz autocrats, absence of journalistic ethics, and inherently corrupt operations. Over 100 hours with 20 plus instructors • Western media need to build a firewall around them with regard to refusing 5-Day LEO Dignitary Protection Program to “do business” with so-called media Other Specialized and Custom agencies that promote violence and Training Courses Islamist ideas that are not compatible with free societies. Perfect for Military, Government, Police and • Nonprofit groups and media- monitoring organizations must openly Private Security Protective Services counter the mainstreaming of Al Jazeera into American households via regular cable www.personalprotection.com 16 Penn Plaza Suite 1570, New York, NY, 10001 (212)268.4555 [email protected]

281 54 The Counter Terrorist ~ April/May 2012 Circle on Reader Service Card Circle 323 on Reader Service Card The Counter Terrorist ~ April/May 2012 55 217-281_HmldSctyAd_2.25x10_4C_Layout 1 12/20/

BACHELOR OF SCIENCE OR MASTER OF SCIENCE IN Legal Studies

100% ONLINE DEGREE

• LAW & PUBLIC POLICY TRACK • HOMELAND SECURITY TRACK • CRIMINAL JUSTICE TRACK

The 100% online curriculum provides students with a strong foundation in criminal, family, real estate, administrative and business Foreign Minister Walid al-Moualem attacks regional bloc after it rejects proposed law. It also includes a set of amendments to observers mission. Photo: Al Jazeera English competencies in legal research and writing, litigation, estates and trusts, bankruptcy, ethics and networks and expose the ethical lapses that Muslims around the world can embrace constitutional law. the English and Arabic networks exhibit the idea of individual liberty codified in a frequently. form of governance that separates mosque Cal U’s web-based format allows students the opportunity to pursue To win this war and bring true national and state and protects freedom of religion their interests in a variety of legal security, the United States and its allies for all. topics, preparing them for a host have to be willing to engage in the We must shape our own narrative of different career options. ideological battle. We must help foster a that the United States is not an enemy To learn more about the 100% debate within the Muslim consciousness of Islam, but an enemy of governments online BS and MS in Legal Studies: about modernity and the role of shariah and ideologies that usurp individual Law & Public Policy, Homeland in governance. We must help foster a freedom through theocratic ideologies Security and Criminal Justice debate about “the Illusion of the Islamic like Islamism. Understanding the types tracks, and other unique online State,” a powerful phrase that former of ideas, programming, and networks opportunities, visit Cal U’s website at www.calu.edu/go or call president of Indonesia and longtime disseminated and promoted on Al 724-597-7400. head of one of the world’s largest Muslim Manar and Al Jazeera is of the highest organizations, Kyai Haji Abddurrahman priority from every vantage point in our University in the Wahid (1940–2009), described in his counterterrorism efforts. We cannot # country for online 14 degree programs.* work with Mustapha Bisri. We need continue to allow Al Manar and Al 1*www.guidetoonlineschools.com to engage leading American Muslims who Jazeera to define who we are as a Western are liberty-minded and anti-Islamist to society with no ideological push back take the offense and reshape the narrative or alternatives. Winning the ideological of freedom and liberty against agents of war will minimize the need for military the Islamic state. If we are able to shape intervention and set the stage for real C the narrative of liberty as being one fully national security. This will not be a battle GLOABALLONLUINE open to Muslim devotion and practice as won in a two-week campaign. It will be long as there is a separation of mosque generational and require an unparalleled University of and state, that can ultimately be the way commitment from our people and our Pennsylvania toward victory in the war of ideas. With government, but it is the only path that Building Character. Building Careers. www.calu.edu the right context and opportunities, will bring true victory. • A proud member of the Pennsylvania State System of Higher Education.

Circle 263 on Reader Service Card 56 The Counter Terrorist ~ April/May 2012 at Munich Security Conference. is still used as a venue for blatant anti- ABOUT THE AUTHOR February 5, 2011. Semitism,” by the Intelligence and 5 Dr. Jasser is a devout practicing Mitchell Silber and Arvin Bhatt. Terrorism Information Center, March American Muslim and a former physician NYPD Report on Radicalization in 19, 2009 to the U.S. Congress. He is the founder the West: The Homegrown Threat. 11 M. Zuhdi Jasser. As the West and president of the American Islamic NYC Policy Department, 2007 Sleeps Islamists work on establishing Forum for Democracy (AIFD, www. 6 Avi Jorisch. Beacon of Hatred: a worldwide Islamic state. Family aifdemocracy.org). Inside Hizballah’s Al Manar Security Matters. August 8 and 25 Television. Washington Institute of 2008. End Notes Near East Policy. 2004 pg. 26. 12 Eileen Toplansky. American War 7 1 Islamists Dominate DOJ Terror Terrorist Group takes over Museum and Al Jazeera. American Lists Prosecutions. Investigative Project Lebanon. CBS News. June 13, 2011. Thinker. July 24, 2011. 8 13 on Terrorism. March 9, 2011. Robert Booth. WikiLeaks cables Eric Schmitt and James Dao. 2 National Strategy for claim al-Jazeera changed coverage “A 'Damaged' Information Office Is Counterterrorism. The White House. to suit Qatari foreign policy. The Declared Closed by Rumsfeld”. The June 2011. Guardian. December 6, 2010. New York Times. February27, 2002 9 14 3 A Communiqué in Response Al Jazeera director resigns in The Illusion of an Islamic State: to the National Strategy for protest of coverage. IPT News. April How an Alliance of Moderates Counterterrorism. American Islamic 25, 2011. Launched a Successful Jihad Against 10 Leadership Coalition. July 2011 Sheikh Qaradawi, March 15, Radicalization and Terrorism in the 4 Radicalization and Islamic 2009. Al Jazeera programming in World’s Largest Muslim-Majority Extremism. Prime Minister’s Speech “Anti-Semitism on Arab media: the Country, p. 35. Jakarta: Wahid popular Qatari TV channel Al-Jazeera Institute, Maarif Institute and LibForAll Foundation Press, 2011

Circle 241 on Reader Service Card The Counter Terrorist ~ April/May 2012 57 Rally in Damascus, Syria, December 2008. Photo: Jane Houle The Muslim Brotherhood Reinvented

CounterThe

58 The Counter Terrorist ~ April/May 2012 The Muslim Brotherhood, al-Ikhwan al-Muslimin in Arabic, was established in Egypt by Hassan al-Banna in 1928. Al-Banna believed that Islam’s decline and the societal ills that plagued the Islamic world stemmed from secularism. To restore the former glory of the Islamic world, al-Banna stressed returning to the origins of the faith as practiced by its founders.

By Dean T. Olson

he ultimate goal was, and remains the U.S. government and many Western Long adept at secrecy to be, to reestablish the global Islamic media observers optimistically predicted and obfuscation, the The Muslim Tempire called the caliphate. Since its that freedom and enlightenment would founding, the Ikhwan has grown into sweep the Middle East and North Africa Brotherhood has a the largest and most influential Islamic (MENA). Some Western analysts have supremacist organization in existence suggested that the Egyptian Brotherhood history of cloaking its Brotherhood with followers throughout the Middle has a “conservative” camp and a real intentions by using East, Europe, Australia, Canada, and “reformist” camp, and that it is important reassuring terms like the the United States. Brotherhood alumni to support the so-called reformist wing.3 are founders of terrorist groups such as Others feared that radical regimes current title of the group’s 1 2 Reinvented Hamas, and al-Qaeda, and operate in dominated by the Brotherhood would Egyptian political the Palestinian territories. enforce Iranian style theocracies in the When Egypt’s Hosni Mubarak was region. apparatus, the Freedom toppled from power in February 2011, The idea of reformation in the and Justice Party.

The Counter Terrorist ~ April/May 2012 59 The Muslim Brotherhood is at odds with the with Islamists, including the Muslim organization’s own comments, however: Brotherhood Freedom and Justice Party Brotherhood has “There are no competing factions and allied Salafist parties Al Nour, Al- proven to be a within the Muslim Brotherhood,” said Asalah, Al-Fadilah, and Al Islah, winning Saad al-Husseini, Brotherhood MP and a 360 out of its 498 seats, an astounding 72 dangerous movement newly-elected Guidance Bureau member. percent.5 that both motivates “We all share the single goal of reforming Although reassuring to the gullible, society…The election results did not such terms belie the Brotherhood’s goal to terrorists and inspires represent a victory for one faction over implement shariah by describing it as the insurgent activism. another, and no one was excluded,” al- group’s form of democracy and freedom. Husseini added,“This is just government Yousef al-Qaradawi, the top Brotherhood History demonstrates propaganda.”4 theologian, admits that “our democracy that the Brotherhood For most of its history, the is different”6 and that secular democracy Brotherhood has successfully avoided like that in the West does not honor God is a highly deceptive internecine division, evidenced by the and is immoral. He states, “What I am organization. limited abilities of governments to for is a genuine type of democracy, for a infiltrate the group and dismantle it. society driven by the laws of Shari’ah… Fears of Brotherhood influence Our democracy…is well connected to the have proven justified after Egypt’s laws of Shari’ah…We have pillars of our Lower House convened January 23 Shari’ah that we have to abide by.”7

THE PREMIER EVENTIN FIRE & LIFE SAFETY

CONFERENCE & EXPO JUNE 11-14, 2012 • LAS VEGAS, NV

MANDALAY BAY CONVENTION CENTER

JOIN US IN LAS VEGAS AND: • Learn from the code experts • Choose from more than 130 sessions • Earn valuable CEUs and more!

REGISTER BY APRIL 27, 2012 AND SAVE! FOR MORE DETAILS, GO TO NFPA.ORG/CONFERENCE

60 The Counter Terrorist ~ April/May 2012 Circle 105 on Reader Service Card Patrol, SWAT, CNT, TEMS, EOD... NTOA is where you belong!

memBer Benefits › Training › Conferences › The Tactical Edge › Resource Library › Research › Members-only Website › Grants › Scholarships › PCIR/Less-Lethal Database › Networking › Member Tested Program

2012 conferences International Tactical Operations Crisis Negotiations Breachers Symposium Conference and trade show Conference May 7-10, 2012 • Dallas, TX sepTeMber 9-14, 2012 • seattle, Wa OcTOber 23-26, 2012 • Mesa, aZ

Ber National Tactical Officers Association Become a mem PO Box 797, Doylestown, PA 18901 | 800-279-9127 at www.ntoa.org

Circle 222 on Reader Service Card Circle 257 on Reader Service Card The Counter Terrorist ~ April/May 2012 61 What Qaradawi fails to mention is that all law must come from Allah, “subhane wa ta’ala” in Arabic. Western-style democracy does not exist in Qaradawi’s version of democracy because it is wholly incompatible. Islamists insist that Allah is the only source of law and “He does not share His [authority to] lead with anyone.”8 There certainly is room for concern given that the Brotherhood’s charter calls on members to deflect attention through their long-established “flexibility” strategy—“muruna” in Arabic. To spread Islam and shariah, Brotherhood adherents also routinely practice concealment, known alternatively as either “taqiyya”9 or “kitman.”10 Muruna calls for a minority group of Muslims to use all legal means to infiltrate majority-dominated, non- Muslim secular and religious institutions, starting with universities.11 As a result, Mohamed Badia -General Guide of Muslim Brotherhood- during opening ceremony of Alexan- Islamist Muslim and non-Muslim dria Muslim Brotherhood main office Photo: Mohamedhph university graduates enter the nation’s workforce, including government and

What does terror mean to you?

Whatever your role in the counter terror community, nation from terrorist attacks. Based on the highly successful Counter Terror Expo U.S. is the nation’s only event Counter Terror Expo in London, England, the U.S. edition designed to secure and protect us from those with will present more than 200 U.S. and international exhibitors the intent to do harm. and a comprehensive conference program featuring thought leaders exploring today’s most pressing counter terror and At Counter Terror Expo U.S., the nation’s leaders from security-related issues. both public and private sectors will gather to collaborate on leading-edge initiatives and technology to secure our www.counterterrorus.com

Reserve exhibit space or sign up to receive information at www.counterterrorUS.com

62 The Counter Terrorist ~ April/May 2012 Circle 267 on Reader Service Card civil service, where they are poised to subvert law enforcement agencies, intelligence communities, military branches, foreign services, and financial institutions.12 Muruna involves the tactical expressions of taqiyya. One aspect of muruna is gradualism. In a June 11, 2011, article on the website of the Egyptian Muslim Brotherhood, veteran movement member Sheikh Ahmad Gad argued that the implementation of Shariah in Egypt must be achieved gradually, by preparing the peoples’ hearts and minds for it and introducing it in stages.13 He proposed learning from the methods of the early Brotherhood, which worked in a step-by-step fashion, and called on Al-Azhar University in Cairo to focus on promoting the implementation of Shariah. The following are excerpts A supporter of the Muslim Brotherhood at a protest on election night in Mansoura displays from the article:14 ballots that he said were removed from a polling station earlier in the day by a monitor from “There Is No Hope for Reform another political party to demonstrate how easy it was to manipulate the electoral process. Photo: Al Jazeera English

Circle 235 on Reader Service Card The Counter Terrorist ~ April/May 2012 63 Cairo - Islamic district - Al Azhar Mosque and University. Photo: Daniel Mayer

Without a Return to Divine Rule…” the Middle Ages….This minority, which “Following the blessed popular denies the results of the referendum revolution on January 25, 2011, there while calling for democracies made up was a debate between the majority, which of those who oppose a religious state or hopes and yearns for the implementation a caliphate state, and advocate a return of Allah’s shariah, and the minority, to the tyrannical secular regime that which uses Islam as a tool of intimidation corrupted the land and the people – a and fears the Islamists and a return to minority [that receives] prominent

Circle 349 on Reader Service Card 64 The Counter Terrorist ~ April/May 2012 media coverage…Islamic shari’a ruled Islamists evaluate their performance and In December, the for centuries, but became distant and recalibrate their strategy accordingly. The absent for centuries more…This nation West often misinterprets this as being Brotherhood’s will have no chance of success, [except] “moderate,” when in reality, simply not supreme guide, by that which caused it to succeed in its all Islamists are as reckless as al-Qaeda. beginning.15 [However,] we must not “Gradualism in applying the Shar’ia is a Mohamed Badi, impose Islamic shari’a, forcing the people wise requirement to follow,” Qaradawi outlined six phases: to adopt something about which they declared, stating that Mohammed shariah over are ignorant and with which they are followed it.18 unfamiliar… If we do this, [various] ploys The Brotherhood is in the process of the individual; will be used to circumvent it, and there completing the fourth phase in Egypt, shariah over the will be hypocrisy. [People] will exhibit and it remains to be seen who will Islamic [behavior] only outwardly…”16 ultimately hold the reigns of power in family; shariah On November 20, 2011, Qaradawi, other MENA countries emerging from over the society; arguably the most influential Sunni the “Arab Spring.” cleric in the world, called on Muslims In this stage, Islamists begin to shariah over the to embrace “gradualism.”17 The doctrine implement shariah by describing it as government; the of gradualism is successful because their form of “democracy” and “freedom.” resurrection of many fail to appreciate the ability of They will argue that each democracy is Islamists to be skillful political strategists. different and so people must be tolerant the caliphate and Gradualism is an intelligent form of of their version. Qaradawi explains, finally, “mastership jihad based on pragmatism, patience, “What I am for is a genuine type of long-term planning, and self-evaluation. democracy, for a society driven by the of the world.”

tribu is t D e

d

W o r l d w i d e K9 COPMAGAZINE TM FOR POLICE AND MILITARY WORKING DOG HANDLERS The largest and most read Police and Military K-9 magazine in the world SUBSCRIPTIONS available to EVERYONE ONLY $29.95 1 year (6 issues)

Scan code with your smartphone to subscribe today!

www.k9copmagazine.com (270) 534-0500 [email protected]

Circle 277 on Reader Service Card The Counter Terrorist ~ April/May 2012 65 laws of Shar’ia that is compatible with the values of freedom, human rights, justice and equity.” Hamas also acts in accordance with gradualism. In December, a leader of Hamas stated that it was working toward the “interim objective of liberation of Gaza, the West Bank, or Jerusalem.”20 The destruction of Israel, or in the Islamists words, the “liberation of all [emphasis added] Palestine,” follows.21 Wherever the Brotherhood and similar Islamist groups operate, there is a phased strategy—even in the United States. The Islamic Circle of North America, one of the most powerful Muslim-American groups in the United States and a Brotherhood-affiliated group, explained its five phases in its handbook published in 2010 and it very closely follows what Badi said in Egypt.22 The phases are: educating yourself; converting your family; outreach into the community; and “establish an Islamic society” on the state level and then a “united Islamic state, governed by an elected khalifah in accordance with the laws of Shar’ia.” An FBI memo written in 1988 likewise documented that a source, believed to be A boy with a Qassam rocket, in Sderot, Israel. Photo: Giorgio Montersino within the ranks of the Brotherhood in the United States, described a six-phased

S-005 Cyber Defence AD_Layout 1 24/02/2012 10:20 Page 1

18TH - 19TH JUNE 2012 | LONDON CYBER DEFENCE 2012

SPEAKER PANEL INCLUDES: FULL DAY POST-CONFERENCE • Lieutenant Colonel Christopher Barrington Brown, SO1 Land Information Assurance Group, WORKSHOP – 20TH APRIL 2012 British Army Defending Cyberia: A Practical • Thomas Kristmar, Head of GovCERT, Danish Government Exercise for the Planning and • Steven Mehringer, Head of Communications Services, Public Diplomacy Division, NATO HQ Execution of Comprehensive • Roar Thon, Senior Advisor, Norwegian National Security Authority (NSM) Cyber Defence for the Armed • John Wayne Ross, Senior Analyst, Canadian Department of National Defence Forces of a Model State • Stuart Aston, Chief Security Advisor, Microsoft UK HOSTED BY: Brigadier (R) Rahul • Heli Tiirma-Klaar, Cyber Policy, European Union Bhonsle, Former Indian Army HQ • Lou Giannelli, Senior Adversary Cyber Threat Analyst SME, United States Air Force

Register online at www.cyber-defence.com James Hitchen on +44 (0)20 7827 6054 [email protected]

339 66 The Counter Terrorist ~ April/May 2012 Circle on Reader Service Card plan.23 At the time, the Brotherhood, various sectors of government,” “gaining specifically the International Institute of religious institutions,” “gaining public Islamic Thought and the North American support and sympathy,” and “establishing Islamic Trust, were working on the first a shadow government.” phase. It included creating “political • “Escalation phase.” This focuses on action front groups with no traceable “utilizing mass media” and the document ties” so that it can “peacefully get inside says that this stage is “currently in Wherever the the United States government and also progress.” Brotherhood and American universities.” The source told • “Open confrontation with the the FBI that Brotherhood operatives government through…political pressure.” similar Islamist “claimed success infiltrating the United It also calls for “training on the use of groups operate, States government.”24 weapons domestically” and says that there In 2004 the FBI seized another are “noticeable activities in this regard.” there is a phased Brotherhood strategy document that • The final phase: “Seizing power to strategy—even in the describes its “work in America as a establish their Islamic Nation under kind of grand jihad in eliminating and which all parties and Islamic groups are United States. destroying Western civilization from united.” within.” It describes five phases:25 The Muslim Brotherhood has proven • The “secret establishment of to be a dangerous movement that both leadership” motivates terrorists and inspires insurgent • “…gradual appearance on the public activism. History demonstrates that scene.” This phase calls for “infiltrating the Brotherhood is a highly deceptive

REGISTER ONLINE! www.apco2012.org

317 Circle on Reader Service Card The Counter Terrorist ~ April/May 2012 67 organization. Its attempts at rebranding don-t-ignore-electoral-fraud-egypt-daniel- ikhwanonline.com, June 11, 2011. must be viewed with caution and pipes 16 Ibid. historical awareness. • 6 de Vries, Idries, 2012, An Open 17 Bostom, Andrew, 2011. Qaradawi: Letter to Sheikh Yusuf Qaradawi, New Sharia “Gradualism” For Egypt—And About the Author Civilization, International Affairs Middle Beyond, December 9th, 2011, www. Mr. Olson is a retired sheriff’s East, 04 January 2012 andrewbostom.org/ department bureau commander. 7 Ibid. 18 Mauro, Ryan, 2012. The Islamist He is the author of Tactical 8 Lynch, Marc, 2008. The Plan for Victory: “Gradualism,” Family Counterterrorism: The Law Brotherhood’s Dilemma, Middle East Security Matters, January 17, 2012, Enforcement Manual of Terrorism Brief No. 25, Crown Center for Middle http://www.familysecuritymatters.org/ Prevention (May 2012 release, Charles East Studies or Brandeis University, publications/id.11234/pub_detail.asp. C. Thomas Publishing). Waltham, Mass., p.3 19 Ibid. 9 Olson, Dean T., 2009. Perfect 20 Marcus, Itamar and Zilberdik, Endnotes Enemy: The Law Enforcement Manual Nan, 2011. Palestine Media Watch 1 Olson, Dean T., 2009. Perfect of Islamist Terrorism, Charles C. Thomas Bulletins, Hamas leader Haniyeh: Enemy: The Law Enforcement Manual Publishing, Springfield, IL, p. 211. Goal is destruction of Israel, Dec. 10 of Islamist Terrorism, Charles C. Thomas Ibid, p. 211 27, 2011, http://palwatch.org/main. 11 Publishing, Springfield, IL, p. 22. Ibid. aspx?fi=157&doc_id=6024 12 21 2 Ibid, p. 104. Ibid. Ibid. 13 22 3 Lynch, Marc, 2008. The Gad, Ahmad Sheikh, 2011. There CSP, 2010. Shariah The Threat to Brotherhood’s Dilemma, Middle East Is No Hope for Reform Without a America, An Exercise in Competitive Brief No. 25, Crown Center for Middle Return to Divine Rule, http://www. Analysis, Center for Security Policy, East Studies or Brandeis University, ikhwanonline.com, June 11, 2011. Washington, DC, p. 144. 14 23 Waltham, Mass., p. 3. MEMRI, Article on Muslim Poole, Patrick, 2006. The Muslim 4 Ibid, p. 11. Brotherhood Website: Implement Shari'a Brotherhood “Project,” Front Page 5 Pipes, Daniel, Farahat, Cynthia, in Phases, Middle East Media Research Magazine, 5/11/2006 24 2012. Don’t Ignore Electoral Fraud in Institute, Special Dispatch No. 3969, July Ibid. 25 Egypt, Egypt’s Lower House election is a 5, 2011. Poole, Patrick, 2006. The Muslim 15 sham of the military leadership, National Gad, Ahmad Sheikh, 2011. There Brotherhood “Project,” Front Page Review, January 24, 2012. http://www. Is No Hope for Reform Without a Magazine, 5/11/2006. nationalreview.com/articles/288975/ Return to Divine Rule, http://www.

68 The Counter Terrorist ~ April/May 2012 Circle 174 on Reader Service Card Innovative Products

PEEPHOLE REVERSER This unique viewing device was developed to assist law enforcement MATTRACKS officers assess potential threats and view 75 different rubber track conversion systems for 4x4 ATVs, UTVs, real-time activity behind a door when SUVs, trucks, tractors and specialty vehicles. Mattracks LiteFoot is the door has a peephole. It provides intended for year round use in mud, sand, snow, swamp, rough terrain or a clear, discreet view into the room. down the road. The Sprositive Drive System has been specially designed Its special lens system is engineered to compensate for the miss match ratios on ATVs and UTVs using to negate the effects of the peephole's overrunning front differentials. By eliminating the slack in the front lenses, thereby allowing the user to see sprockets pitch and changing the pitch ratio in the rear, the Sprositive directly into the room. It is effective Drive is designed to allow your vehicle to stay locked in 4WD and helps on all major brands of standard door keep all tracks pulling at the same speed. peepholes used on apartment, hotel, and ww.mattracks.com residential doors. www.shomer-tec.com

THE HERO This reusable marking tool is manufactured by CEJAY Engineering. It is intended for use in operations and training, and can be used as a distraction device employing multi-directional bright light flashes and a 130dB tone. It is compact, rugged, and able to withstand deployment from aircraft and moving vehicles. When activated, the Hero first emits a constant sound and rapid light flashes for maximum affect. After sixty seconds, Hero begins emitting a single light flash per second and constant beeping sound for ease in location and recovery. The Hero is available from Adams Industries. www.adamsindustries.com

The Counter Terrorist ~ April/May 2012 69 The April/May 2012 Counter Volume 5 • Number 2

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, circle the appropriate reader service number (RSN) on the attached Reader Service Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.

Page Ad/Company • website and/or email...... RSN Number

14 836 Technologies • www.836technologies.com...... 259 12 Adams Industries • www.adamsindustries.com...... 308 2 Ahura Scientific• www.thermoscientific.com/mil-chemid...... 254 27 American Military University • www.amuonline.com/counter-terrorist...... 211 67 APCO • www.apco2012.org...... 317 74 Applied Research Associates, Inc. • www.ara.com/robotics...... 256 18 AWC Systems Technology • www.awcsilencers.com...... 261 56 California University of Pennsylvania • www.calu.edu...... 263 ndex 50 Combined Systems Inc. • www.combinedsystems.com...... 319 62 Counter Terror Expo • www.counterterrorexpo.com/advert...... 267 i 13 CRC Press • www.crcpress.com...... 331 28 Defense Group - CoBra Software • www.cobrafirstresponder.com...... 273 51 Defense Solutions Group - DSG Arms www.dsgarms.com...... 275 • 73 Elite K9 • www.elitek9.com...... 279 76 Energizer • www.hardcasetactical.com...... 209 54 Executive Protection Institute • www.personalprotection.com...... 281 28 George Washington University • www.nearyou.gwu.edu/ssl...... 321 r 23 Golight Inc • www.golight.com...... 285 36 Heat Armor • www.heat-armor.com...... 175 55 Hydrosack • www.homelandsecurityssi.com...... 323 32 Icor Technology • www.icortechnology.com...... 81 52 IDGA Irregular Warfare Summit • www.irregularwarfaresummit.com...... 289 52 IDGA Border Management Summit • www.bordermanagementsummit.com/southwest...... 291 54 Infrared, Inc. • www.infrared.com...... 177 22 ITT • www.einidine-recoil.com...... 295 65 K9 Cop Magazine • www.k9copmagazine.com...... 277

se 3 Lenco Industries Inc. • www.swattrucks.com...... 13 25 Lind Electronics Inc. • www.lindelectronics.com...... 327

i 26 Mattracks • www.mattracks.com...... 297 68 Mid-Michigan Kennels Inc. • www.midmichigankennels.com...... 174 60 NFPA Conference & Expo • www.nfpa.org/conference...... 105 45 TSAC Conference • www.nsca-lift.org/TSAC2012...... 329

t 61 NTOA • www.ntoa.org...... 222 75 Oasys Technology • [email protected]...... 334 71 Oshkosh Defense • www.oshkosh-tacticalprotector.com...... 50 17 Patriot3 • www.patriot3.com...... 301

r 15 Paratech • www.paratech-tactical.com...... 333 35 PoliceOne • www.policeoneacademy.com...... 335 10 PoliceTraining.net • www.policetraining.net...... 191 63 Precision Reflex• www.pri-mounts.com...... 235 41 Recon Robotics • www.recon-scout.com/XT...... 337 e 34 Reconyx • www.reconyx.com...... 303 40 RM Equipment • www.m203grip.com...... 207 48 RONCO Consulting • www.roncoconsulting.com...... 324 7 Ruger • www.ruger.com/million...... 347 29 Seabotix • www.seabotix.com...... 282 v 53 6th Annual National Homeland Security Conference • www.uasicolumbus2012.us...... 265 66 Smi Cyber Defence 2012 • www.cyber-defence.com...... 339 33 Southeastern Solutions • www.sesolinc.com...... 239 38 Southern Police Equipment • www.southernpoliceequipment.com...... 343 40 Southwest Synergistic Solutions • www.triagelights.com...... 345

d 19 SSI Elevated Tactics Training • www.homelandsecurityssi.com...... 313 43 SSI Portable Vehicle Barriers (PVB) • www.ssipvb.com...... 226 57 STI International • [email protected]...... 241 64 Sun Badge Company • www.sunbadgeco.com...... 349 11 Tactical Products Group Inc. • www.tacprogear.com...... 101 4 Tex Shield Inc • [email protected]...... 29

a 16 Vidisco • www.vidisco.com...... 103 10 Zistos Corp • www.zistos.com...... 311

70 The Counter Terrorist ~ April/May 2012 get In. get around. gaIn control. IntroducIng a new standard In hIgh mobIlIty and maneuverabIlIty.

Tactical Protector Vehicle TM from Oshkosh Defense creates a new strategic dimension for special operation missions. With a new standard in mobility, military-grade protection and capacity for up to nine officers, it enhances access, speed and safety in urban, rural and off-road high-risk situations.

find out more: oshkosh-tacticalprotector.com

CONTACT: Brian Manthey Program Manager, Tactical Protector Vehicle™ 920.235.9150 extension 22106 [email protected]

Financing is available for Tactical Protector Vehicle™ through Oshkosh Capital.

© 2012 Oshkosh Corporation • Oshkosh and the Oshkosh logo are registered trademarks and Tactical Protector Vehicle is a trademark of Oshkosh Corporation, Oshkosh, WI, USA The Counter Terrorist ~ April/May 2012 71 Circle 50 on Reader Service Card

14110_TPV_ad_CounterTerroristMag_022212.indd 1 2/23/12 8:44 AM Training Review Confined Quarters Defensive Tactics By Andrew Curtiss

n a cold autumn day in upstate New York, 13 Omembers of the Oneida County Sheriff’s Counter Narcotics Task Force assembled in a low-profile building. The build- ing, surrounded by run-down houses, chain-link and distressed picket fences, appeared to pose no threat to the hustlers and dealers that rolled down the neigh- boring streets in lowered Cadillacs with glittery paint jobs and chromed rims. In fact, the task force members based them- selves in what seemed to be the epicenter of a “Narcotics Wall Street.” The task force had requested the de- velopment of a defensive tactics program designed to be useful in confined spaces, like that of the vehicles in which these undercover agents operated daily. Most Trainee (driver side) disarming an attacker (passenger) and applying a joint lock. defensive tactics programs are similar in Photo courtesy of Andrew Curtiss. that they train man against man, counter- edged weapon, weapon disarms, and I explained that the temporary or from what the officers are accustomed to weapon-retention techniques. Most pro- permanent disruption of faculties on an practicing, I showed them the ways to grams focus on training the trainee in an attacker is far more effective than that of maximize the effects of joint locks that open area from a standing position. There pain compliance techniques. This lecture they already knew and how to seamlessly are very few programs that train officers led to practical application where stu- transition to cuffing procedures. For the what to do against armed and multiple dents slapped, poked, and struck various brief practical, the students practiced attackers from a seated position within a points on each other’s body to experience joint locks, manipulations, and restrain- vehicle. After multiple correspondences the sensation of numerous pressure points ing one another. over a period of several weeks, I built the used in pain compliance techniques. After I asked the officers what they would program tailored to the needs of under- studying pressure points, we moved into say if I told them that they could counter cover counter-narcotics operations. a brief discussion of “vital targets.” We any attack with one or two of the same Training began at the safe house with a talked about escalation and use of force, counter techniques. One student, an of- study of the schematics of different motor and the moral, ethical, and legal dilem- ficer who had been serving for more than vehicles on a dry-erase board. We dis- mas officers can encounter for exploiting 10 years and a defensive tactics instructor, cussed the types of seating arrangements the vital and non-vital targets of their spoke up: “I’d say you’re full of shit.” in different vehicles an undercover might attacker’s body. I explained that there are a limited encounter. I narrowed the seating possi- Immediately following the vital target number of ways in which an officer may bilities down to five. The explanation was and deadly force lecture, the class studied be attacked. Based on position in the basic, mathematical, and pragmatic in the principles and fundamentals of joint vehicle, I narrowed it down to no more approach. Afterward, we discussed pain locks and joint manipulations, and their than four directions of attack that the of- compliance versus mechanical failure. practical application. Not straying far ficer may encounter. I then specified three

72 The Counter Terrorist ~ April/May 2012 general attack types in each position. lunch and apply them to weapon disarms unarmed, edged-weapon and pistol- I challenged the officers to present and retention. Again, they conducted armed attackers in each seating position another way in which an attack could practical application sitting at desks ar- of the vehicles. The day was filled with come. None of the 13 students were able ranged like the seating of a motor vehicle rapid intense instruction on a variety to disagree with this logic. I demonstrated and in actual vehicles. of topics. At the end of the day all were two counter techniques to each of the The last portion of the training exhausted. Later, the officers were issued three types of attacks from all four direc- revolved around countering multiple their training certificates. I departed and tions. The officers practiced first in mock attackers and using the vehicle as a the task force prepared for a raid on a vehicles made up of desks and chairs, weapon. This training was unique in that major drug dealer that evening. • and then in three vehicles that sat in the I narrowed down all possibilities of attack garage bay of the building. The training from multiple attackers down to one or About the Author was progressive in that each attack was two per position in the vehicle. I then Mr. Curtiss is a U.S. Army Special practiced in a stationary manner. Then covered using only one of two possible Forces veteran of multiple international the officers practiced against slow attacks techniques that they already knew and deployments. He is a licensed professional and fast attacks under known scenarios. had been training on that day against martial arts fighter, and the author of After the trainees learned the basic attacks all attacks from multiple attackers. The Combat Application Techniques: Prin- and counters from inside the vehicle in all students also learned to manipulate and ciples of Destruction and 1984 Redux. positions, they took a lunch in town. limit possible attacks by using seatbelts, Curtiss writes two columns for the The afternoon training began with a and the seat, steering wheel, brake, and “Examiner”: The Fort Worth Libertarian brief discussion on counter-weapon tech- emergency brake of the vehicle. and Fort Worth Martial Arts Examiner. niques and weapons retention. After the The day’s training culminated with He is the founder of The Academy of lecture, the students learned to take the live-action scenarios in real vehicles. Each Combat Application Techniques (www. very same techniques they learned before trainee ran an unknown scenario against knife-and-h2h-combat.com).

Bite Suit Reward Balls with Helmet Tug Handles $74.95 3" Ball $12.95 2.5" Ball $11.95 2" Ball $9.95

Hand Protectors E-Collar Holsters $39.95 ea Special Operations $39.95 Harness Has cutouts so the buttons Bite Suit available in black, coyote or multicam* can still be worked while it’s with plastic with metal cobra holstered. Has 2¼" metal $1,189.95 buckles buckles clip on back of holster so it can be worn on a 2" $149.95 $199.95 duty belt or clipped to a *with attachments for MOLLE pouches MOLLE tactical vest. Muzzles and K-9 camera $69.95

Scan our QR code with your smart phone to view our online catalog.

Malinois German Shepherd

YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

Circle 279 on Reader Service Card The Counter Terrorist ~ April/May 2012 73 Circle 252 on Reader Service Card 74Circle The 256 Counter on Reader Terrorist Service Card ~ April/May 2012 Circle 334 on Reader Service Card

The Counter Terrorist ~ April/May 2012 75 209 76 The Counter Terrorist ~ April/May 2012 Circle on Reader Service Card